← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set II | Set III
CompTIA Network+ N10-007 - Set I
Congratulations - you have completed CompTIA Network+ N10-007 - Set I.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | UPS |
B | RAID 1 |
C | Clustering |
D | SNMP |
Question 2 |
A | QSFP |
B | BiDi |
C | SFP |
D | GBIC |
Question 3 |
A | Encapsulate the storage traffic in a GRE tunnel |
B | Utilize UDP to eliminate packet overhead |
C | Turn off MDIX settings on the NAS and server switchports |
D | Enable jumbo frames on the NAS and server |
Question 4 |
A | Ring |
B | Bus |
C | Star |
D | Ad hoc |
E | Mesh |
Question 5 |
A | Social engineering |
B | Logic bomb |
C | Evil twin |
D | Wardriving |
Question 6 |
A | UDP |
B | ICMP |
C | IP |
D | TCP |
E | Ethernet |
Question 7 |
A | device hardening |
B | tamper detection |
C | biometrics |
D | hardware security |
E | asset tracking |
Question 8 |
A | Hubs |
B | Routers |
C | Bridges |
D | Firewalls |
Question 9 |
A | Authorization |
B | Administration |
C | Accounting |
D | Authentication |
Question 10 |
A | SSL |
B | VoIP |
C | QoS |
D | CARP |
E | IPv6 |
Question 11 |
A | EMI from the lights is interfering with the network cables |
B | Temperature changes are causing attenuation in copper cabling |
C | Light sensors are interfering with the network |
D | Network wiring is run perpendicular to electrical conduit |
Question 12 |
A | WPA2 |
B | WEP |
C | WPA |
D | 802.1X |
Question 13 |
Image Credit: https://www.tequipment.net/ FlukeNetworks52801009.html
A | To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector’s pins. |
B | When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. |
C | By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. |
D | By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls. |
Question 14 |
A | Circuit diagrams |
B | Physical network diagram |
C | Logical network diagram |
D | Wiring schematic |
E | Asset management files |
Question 15 |
A | VIP |
B | PAT |
C | SIP |
D | NAT |
Question 16 |
A | Data usage limits |
B | Bandwidth quotas |
C | Blocking |
D | Session hijacking |
E | Throttling |
Question 17 |
A | The public key |
B | The private key |
C | The session key |
D | The secure key |
E | The ticket granting key |
Question 18 |
A | Extranet |
B | Host-to-host |
C | Host-to-site |
D | Site-to-site |
E | Branch-to-server |
Question 19 |
A | TCP |
B | UDP |
C | HTTP |
D | IP |
Question 20 |
A | VPN concentrator |
B | Web application firewall |
C | Content filter |
D | VLAN restrictions |
E | IPS |
Question 21 |
A | Layer 7 |
B | Layer 4 |
C | Layer 1 |
D | Layer 5 |
E | Layer 3 |
F | Layer 6 |
G | Layer 2 |
Question 22 |
A | A hub |
B | A switch |
C | A router |
D | A gateway |
Question 23 |
A | Short circuits |
B | Open circuits |
C | Split pairs |
D | Transposed wires |
Question 24 |
A | Auditing |
B | Accounting |
C | TGS |
D | Authentication |
E | Authorization |
Question 25 |
A | ping 192.168.1.1 -n 2048 |
B | ping 192.168.1.1 -l 2048 -n 6 |
C | ping 192.168.1.1 -t |
D | ping 192.168.1.1 -l 2048 -t |
E | ping 192.168.1.1 -l 2048 -t 6 |
Number of messages: -n parameter = 6
Question 26 |
A | VPN |
B | PaaS |
C | IaaS |
D | Hosted |
E | SaaS |
Question 27 |
A | 192.168.1.1 |
B | 255 255 255.0 |
C | 255 255 255.0 |
D | 192.168.1.0 |
E | 192.168.0.55 |
Question 28 |
A | 25 |
B | 110 |
C | 80 |
D | 143 |
E | 989 |
Question 29 |
A | IPsec |
B | FTPS |
C | PPTP |
D | L2TP |
Question 30 |
A | arp -c * |
B | arp -d * |
C | arp -s |
D | arp -a |
Question 31 |
A | Biometrics |
B | Geofencing |
C | Face geometry |
D | Pattern recognition |
E | Tamper detection |
Question 32 |
A | A |
B | PTR |
C | MD |
D | CNAME |
E | MX |
Question 33 |
A | Proxy server |
B | VoIP gateway |
C | VPN concentrator |
D | UTM appliance |
Question 34 |
A | A private IP pointing to the web front end |
B | A private IP pointing to the web proxy |
C | A static IP pointing to the passive DB |
D | A virtual IP pointing to the active DB |
Question 35 |
A | Source route |
B | Store and forward |
C | Transparent |
D | Multiport |
Question 36 |
A | VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation. |
B | VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commands. |
C | VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection. |
D | VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges. |
Question 37 |
A | Accounting |
B | Authorization |
C | Auditing |
D | Authentication |
Question 38 |
A | Crosstalk |
B | Latency |
C | EMI |
D | Signal attenuation |
Question 39 |
A | Presentation |
B | Transport |
C | Physical |
D | Application |
E | Session |
F | Network |
G | Data Link |
Question 40 |
A | Power distribution unit |
B | Ethernet-over-power adapter |
C | Power-over-Ethernet switch |
D | Powerline extender |
E | Ethernet power controller |
Question 41 |
A | Motion detection |
B | Biometrics |
C | Video surveillance |
D | Smartcards |
Question 42 |
A | 802.1X |
B | AES |
C | TKIP |
D | Kerberos |
E | RC4 |
Question 43 |
A | Router |
B | Gateway |
C | Switch |
D | Bridge |
Question 44 |
A | Physical |
B | Data link |
C | Session |
D | Transport |
E | Network |
F | Presentation |
G | Application |
Question 45 |
A | Network |
B | Data Link |
C | Session |
D | Application |
E | Transport |
Question 46 |
A | ACL |
B | Sticky MAC |
C | 802.1x |
D | NAC |
E | NAT |
Question 47 |
A | Site-to-site VPN |
B | Fault tolerance |
C | Distributed server system |
D | Remote connection |
E | Network management |
Question 48 |
A | Collision domains occur in layer 1 while broadcast domains occur in layer 2. |
B | It is impossible to have a collision domain in a wireless network infrastructure. |
C | It is impossible to have a collision domain in a wired (LAN) network infrastructure. |
D | Broadcast domains occur in layer 1 while collision domains occur in layer 2. |
E | Both broadcast and collision domains occur at layer 2. |
Question 49 |
A | ping |
B | netstat |
C | ifconfig |
D | traceroute |
Question 50 |
A | Enable port mirroring |
B | Implement spanning tree |
C | Change default admin password |
D | Perform backups |
E | Perform VLAN hopping |
F | Patch and update |
Question 51 |
A | Set up an SSH session to the desktop. |
B | Perform a DNS lookup on the server. |
C | Reference the ARP table in the router. |
D | Configure port security on the switch. |
Question 52 |
A | RADIUS server |
B | Biometric systems |
C | Domain controller |
D | Smartcards |
E | Wireless access point |
Question 53 |
A | Biometric |
B | Social engineering |
C | Geofencing |
D | Asset tracking |
E | Tamper detection |
Question 54 |
A | A system-wide problem |
B | A shared resource problem |
C | A user application problem |
D | A network-wide problem |
E | A wide area newtwork problem |
Question 55 |
A | RAID 1 |
B | Muti-ISP connections |
C | Server clustering |
D | NIC teaming |
E | DNS round robin |
Question 56 |
A | Subnet mask |
B | Default gateway |
C | MAC address |
D | IP address |
Question 57 |
A | Session |
B | Physical |
C | Data link |
D | Transport |
E | Network |
F | Presentation |
G | Application |
Question 58 |
A | Damaged or malfunctioning fiber port |
B | Damaged or malfunctioning LAN port |
C | VLAN mismatch |
D | Corrupted config files or operating system |
E | Double NAT issue |
Question 59 |
A | RDP |
B | MTBF |
C | PBX |
D | MDF |
E | IDF |
Question 60 |
A | 10GBase-LR |
B | 10GBase-SR |
C | 10GBase-ER |
D | 10GBase-CX4 |
E | 10GBase-LX4 |
Question 61 |
A | Keep purchasing new spare equipment. |
B | Store all spare equipment in a sepearete office building for extra protection. |
C | Instead of replacing current units during failures, use parts from the spare units to fix the current unit. |
D | Do nothing and keep the spare nearby for an emergency. |
E | Update the firmware and drivers on spare network equipment regularly. |
Question 62 |
A | CHAP |
B | PAP |
C | EAP |
D | MS-CHAPv2 |
E | WEP |
Question 63 |
A | Project management |
B | Change management |
C | Process management |
D | Standard operating procedure |
Question 64 |
A | Periodically view the server logs |
B | Use port mirroring |
C | Install an inline tap |
D | Configure port aggregation |
E | Use SQL injectors |
Question 65 |
A | route |
B | pathping |
C | ping |
D | netstat |
Question 66 |
A | Demarcation point |
B | Network firewall |
C | Wireless endpoint |
D | Demarcation point |
E | Wireless controller |
Question 67 |
A | IPSec |
B | SSH |
C | SSL |
D | Telnet |
Question 68 |
A | RADIUS |
B | NGFW |
C | IDS |
D | NAS |
Question 69 |
A | Snapshots |
B | Failover |
C | Cold sites |
D | Backups |
Question 70 |
A | TCP |
B | ICMP |
C | UDP |
D | IGMP |
Question 71 |
A | Network Monitor |
B | Event Viewer |
C | Syslog |
D | Performance Monitor |
E | ntop |
Question 72 |
A | IDF |
B | VRF |
C | TDM |
D | MDF |
Question 73 |
A | WAP |
B | Captive portal |
C | NAC |
D | MAC filtering |
E | Port security |
Question 74 |
A | Change the default credentials |
B | Apply patches and updates |
C | Disable unused switchports |
D | Verify the firmware file hash |
Question 75 |
A | Netstat |
B | Netmon |
C | Syslog |
D | Top |
Question 76 |
A | 5060 , 3389 |
B | 161 , 162 |
C | 5060 , 5061 |
D | 143 , 993 |
E | 80 , 443 |
Question 77 |
A | Ping time |
B | Speed |
C | Distance |
D | Bandwidth |
E | Hop count |
Question 78 |
A | Port security |
B | Data security |
C | Asset tracking |
D | Physical security |
Question 79 |
A | 16 inches |
B | 12 inches |
C | 24 inches |
D | 19 inches |
Question 80 |
A | Layer 3 repeater |
B | Layer 2 router |
C | Multiport bridge |
D | Ethernet hub |
Question 81 |
A | Cross talk |
B | Overcapacity |
C | Channel overlap |
D | Wrong passphrase |
Question 82 |
A | Encryption key |
B | HTTPS server |
C | Secure server |
D | VPN gateway |
E | Authentication server |
Question 83 |
A | SYN, SYN/ACK, ACK |
B | SYN, SYN, ACK, ACK |
C | SYN, ACK, SYN, ACK |
D | SYN/ACK, SYN/ACK |
Question 84 |
A | Session hijacking |
B | Phishing |
C | Ransomware |
D | DDoS |
E | Spoofing |
Question 85 |
A | Individual mode |
B | Hot backup mode |
C | High-efficiency mode |
D | Combined mode |
E | Redundant mode |
Question 86 |
A | Dial-up modem |
B | DSL |
C | ISDN |
D | Cable broadband |
Question 87 |
SANUJA.COM 430 IN mx mx1.SANUJA.COM
SANUJA.COM 5 IN mx mx2.SANUJA.COM
SANUJA.COM 430 IN mx mx10.SANUJA.COM
SANUJA.COM 521 IN NS ns1.SANUJA.COM
SANUJA.COM 521 IN NS ns2.SANUJA.COM
SANUJA.COM 521 IN NS ns3.SANUJA.COM
SANUJA.COM 521 IN NS ns4.SANUJA.COM
A | dig –t ANY SANUJA.COM |
B | netstat –a SANUJA.COM |
C | NMAP –t SANUJA.COM |
D | iptables –f SANUJA.COM |
Question 88 |
A | Microwave |
B | Fiber optic |
C | Infrared |
D | Electrical |
Question 89 |
A | Point-to-multipoint |
B | Point-to-point |
C | Bus |
D | Mesh |
E | Peer-peer |
F | Ring |
Question 90 |
A | RJ11 |
B | LC |
C | RJ45 |
D | F-type |
E | MTRJ |
F | ST |
Question 91 |
A | PAT |
B | SNAT |
C | ARP |
D | STP |
E | NAT |
Question 92 |
A | Source route |
B | Cut-through |
C | Store-and-forward |
D | Destination switch |
Question 93 |
A | RAID 1 |
B | RAID 5 |
C | RAID 0 |
D | RAID 10 |
Question 94 |
A | RADIUS |
B | NAC |
C | LDAP |
D | TKIP-RC4 |
Question 95 |
A | Ping |
B | Route |
C | Nslookup |
D | Netstat |
E | Tracert |
Question 96 |
A | Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network. |
B | Install honeypots on the network to detect and analyze potential kiosk attacks before they occur. |
C | Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks. |
D | Install an IDS to monitor all traffic to and from the kiosks. |
E | Create a secondary NAT and connect the kiosks on it hence limit kiosks' ability to access the main network. |
Question 97 |
A | CIDR |
B | Hex |
C | Octal |
D | Binary |
Question 98 |
A | 192.168.0.0 to 192.168.0.255 |
B | 169.254.0.0 to 169.254.255.255 |
C | 224.0.0.0 to 224.0.255.255 |
D | 10.0.0.0 to 10.0.255.255 |
Question 99 |
A | Rogue DHCP server |
B | VLAN mismatch |
C | Packet intrusion |
D | Evil twin |
E | Honey pot |
Question 100 |
A | E1/E3 |
B | DSL |
C | BRI |
D | PRI |
Question 101 |
A | NAT |
B | DMZ |
C | DDoS |
D | RIP |
E | QoS |
Question 102 |
A | Remove the firewall between the Internet/modem and the router. |
B | Add additional printers across both NATs. |
C | Remove one of the routers and if requires use VLANs to create separate subnets with specific firewall rules. |
D | Add a firewall between the domain controller and the router. |
Question 103 |
A | Control the EMI of the multimedia traffic across the network links |
B | Control the jitter of the affected traffic across the network links |
C | Control the latency of traffic across the network links |
D | Control the attenuation of the non-voice traffic across the network links |
Question 104 |
A | RAID 5 |
B | RAID 0 |
C | RAID 10 |
D | RAID 1 |
Question 105 |
A | ADSL |
B | Bridge mode |
C | Jumbo frame |
D | Double NAT |
E | DOCSIS |
Question 106 |
A | SSL |
B | SMTP |
C | FTP |
D | HTML |
E | HTTP |
Question 107 |
A | IP address resolution |
B | Network switching |
C | Password protection |
D | Name resolution |
Question 108 |
A | WEP |
B | WPA2 |
C | PEAP |
D | WPA |
Question 109 |
A | 0 |
B | 2 |
C | 4 |
D | 7 |
E | 6 |
Question 110 |
A | Permit 192.168.1.143 port 587 |
B | Permit 192.168.1.143 port 443 |
C | Permit 192.168.1.143 port 25 |
D | Permit 192.168.1.143 port 110 |
E | Permit 192.168.1.143 port143 |
F | Permit 192.168.1.143 port 80 |
Question 111 |
A | PSK |
B | CCMP-AES |
C | EAP-PEAP |
D | WEP |
Question 112 |
A | dig |
B | netstat |
C | tcpdump |
D | nmap |
Question 113 |
A | iSCSI |
B | NAS |
C | FCoE |
D | FTP |
E | SAN |
Question 114 |
A | Round-robin DNS |
B | CARP |
C | Quality of service |
D | Voice over IP |
Question 115 |
A | Switch |
B | Hub |
C | Router |
D | Bridge |
Question 116 |
A | LDAP |
B | TKIP |
C | Radius |
D | Kerberos |
E | 802.1X |
Question 117 |
A | Fiber-optic cabling |
B | Twisted pair cabling |
C | Enterrpise APs |
D | Coaxial cabling |
Question 118 |
A | NAS |
B | FTP |
C | SAN |
D | Jumbo frames |
E | Fiber channel |
Question 119 |
A | nmap |
B | iptables |
C | tcpdump |
D | dig |
Question 120 |
A | NAT |
B | Web proxy |
C | Protocol analyzer |
D | Layer 7 firewall |
E | Layer 3 switch |
Question 121 |
A | Real-time remote monitoring of the phone’s activity and usage |
B | A consent to monitoring policy covering company audits of the personal phone |
C | An AUP covering how a personal phone may be used for work matters |
D | An NDA ensuring work data stored on the personal phone remains confidential |
Question 122 |
A | 175.168.0.255 |
B | 192.168.1.1 |
C | 169.254.54.5 |
D | 175.255.255.255 |
E | 192.168.0.1 |
Question 123 |
A | Coaxial |
B | Unshielded twisted pair |
C | Single-mode fiber optic |
D | Shielded twisted pair |
E | Multimode fiber optic |
Question 124 |
A | Allow the firewall to accept inbound traffic to ports 80,110,143, and 443 |
B | Allow the firewall to accept inbound traffic to ports 25, 67,179, and 3389 |
C | Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123 |
D | Set the firewall to operate in transparent mode |
Question 125 |
A | Something you have |
B | Something you do |
C | Something you know |
D | Somewhere you are |
Question 126 |
A | BGP |
B | SIP |
C | LACP |
D | LLDP |
Question 127 |
A | Smart jack |
B | SONET |
C | SIP trunk |
D | Media converter |
E | AAA server |
Question 128 |
A | F-type |
B | MTRJ |
C | 8P8C |
D | BNC |
E | RJ45 |
Question 129 |
A | 1999 |
B | 1024 |
C | 995 |
D | 23 |
E | 50134 |
F | 80 |
Question 130 |
A | Layer 2 |
B | Layer 4 |
C | Layer 3 |
D | Layer 1 |
Question 131 |
A | IGMP |
B | IP |
C | IMAP |
D | ICMP |
Question 132 |
A | Physical network diagram |
B | Circuit diagrams |
C | Wiring schematic |
D | Asset management files |
E | Logical network diagram |
Question 133 |
A | A router with default credentials |
B | An open mail relay server |
C | An SNMPv1 private community |
D | A privilege escalation script |
Question 134 |
A | Evil twin |
B | Logic bomb |
C | Wardriving |
D | Social engineering |
Question 135 |
A | netstat |
B | ping |
C | ifconfig |
D | tracert |
E | ipconfig |
Question 136 |
A | MX |
B | TXT |
C | NS |
D | A |
E | AAAA |
Question 137 |
A | Verify file type |
B | Verify file size |
C | Verify file hash |
D | Verify file version |
E | Verify file date |
Question 138 |
A | Public |
B | Privileged |
C | Secured |
D | Private |
E | Preshared |
Question 139 |
A | traceroute |
B | ipconfig |
C | iptables |
D | tcpdump |
E | netstat |
Question 140 |
A | Port sweeping |
B | Bluejacking |
C | Port scanning |
D | War driving |
E | Brute-force |
Question 141 |
A | SSL portal |
B | SSL tunnel |
C | SSL client |
D | SSL gateway |
Question 142 |
A | Single sign-on |
B | TACACS+ |
C | Local authentication |
D | LDAP |
Question 143 |
A | 1 through 1024 |
B | 49152 through 65535 |
C | 1023 through 65534 |
D | 1024 to 49151 |
Question 144 |
A | WPA2 |
B | RADIUS |
C | EAP-TLS |
D | Kerberos |
Question 145 |
A | The password needs to be re-entered |
B | The channel has changed |
C | There is a security type mismatch. |
D | There is a frequency mismatch |
E | There is insufficient antenna power |
Question 146 |
A | Building blueprints |
B | Network map |
C | Rack diagram |
D | Wiring schematic |
E | Logical diagram |
Question 147 |
A | FTP |
B | ARP |
C | SCP |
D | SIP |
Question 148 |
A | USB 2.0 |
B | DB9 |
C | RC5 |
D | RJ45 |
E | USB 3.0 |
Question 149 |
A | ST to ST |
B | SC to SC |
C | LC to ST |
D | SC to ST |
E | LC to SC |
Question 150 |
A | Port security |
B | WPA2 |
C | Access control lists |
D | Captive portal |
Question 151 |
A | CIFS |
B | InfiniBand |
C | Fibre Channel |
D | iSCSI |
Question 152 |
A | IDSL |
B | HDSL |
C | RADSL |
D | VDSL |
Question 153 |
A | 4 unit |
B | 1 unit |
C | 2 unit |
D | 3 unit |
Question 154 |
A | Wardriving |
B | Directory traversal |
C | Packet sniffing |
D | SQL injection |
E | XSS |
Question 155 |
A | traceroute |
B | netstat |
C | ifconfig |
D | route |
E | dig |
Question 156 |
A | IaaS |
B | Hybrid |
C | PaaS |
D | SaaS |
E | Public |
F | Private |
Question 157 |
A | Walk a user through troubleshooting the connection |
B | Travel to the branch office |
C | Hire a third-party contractor to go on-site |
D | Use a modem to console into the router |
Question 158 |
A | Cable tester |
B | Tone generator |
C | Loopback adapter |
D | Multimeter |
Question 159 |
A | cpustat |
B | monitor |
C | netstat |
D | ping |
E | top |
Question 160 |
A | Hand geometry |
B | Tamper detection |
C | Biometrics |
D | Single sign-on (SSO) |
E | Pattern recognition |
Question 161 |
A | END |
B | FIN |
C | SYN |
D | URG |
E | PSH |
Question 162 |
A | https://sanuja.com/123456 |
B | https://sanuja.com:123456 |
C | None of the answers are correct because you cannot assign random port numbers. |
D | http://sanuja.com:123456 |
E | http://sanuja.com/123456 |
Question 163 |
A | Bus |
B | Star |
C | Point-to-point |
D | Ring or circular |
E | Mesh |
Question 164 |
A | System |
B | Application |
C | Security |
D | Setup |
Question 165 |
A | Have the ISP double the bandwidth |
B | Configure geofencing |
C | Enable WPA and change the SSID |
D | Move from WPA2 to WEP |
Question 166 |
A | IMAP |
B | POP |
C | LDAP |
D | SMTP |
Question 167 |
A | 4 |
B | 3 |
C | 2 |
D | 1 |
E | 0 |
Question 168 |
A | There is less local congestion on the wireless network |
B | The firewall is configured to throttle traffic to specific websites |
C | The wireless access points were misconfigured |
D | The testing server for the wired network was farther away |
Question 169 |
A | TXT |
B | MX |
C | AAAA |
D | NS |
E | A |
Question 170 |
A | DNS server issue |
B | DHCP server issue |
C | VLAN mismatch |
D | Duplex/speed mismatch |
E | Spanning tree blocked ports |
Question 171 |
A | Enterprise firewall |
B | Load balancer |
C | Wireless controller |
D | IDS |
E | Proxy server |
Question 172 |
A | Transport |
B | Data link |
C | Presentation |
D | Physical |
E | Session |
F | Application |
G | Network |
Question 173 |
A | Dual power supplies |
B | Uninterruptible Power Supply (UPS) |
C | Redundant circuits |
D | Power looping |
E | Power redundancy |
Question 174 |
A | NAS |
B | InfinitiBand |
C | iSCSI |
D | Fibre Channel |
Question 175 |
A | OC-1 |
B | T-3 |
C | E-1 |
D | T-1 |
Question 176 |
A | Asset management files |
B | Wiring schematic |
C | Logical network diagram |
D | Physical network diagram |
E | MSConfig file |
Question 177 |
A | System |
B | Security |
C | Application |
D | Setup |
Question 178 |
A | Centimeters |
B | Millimeters |
C | Number of screw holes |
D | Units |
E | Inches |
Question 179 |
A | arp -t |
B | arp -s |
C | arp -a |
D | arp -c |
E | arp -d |
Question 180 |
A | F-type |
B | ST |
C | RJ11 |
D | MTRJ |
E | RJ45 |
Question 181 |
A | Incompatibility with the current network |
B | Decreased performance of the internal network |
C | Inconsistent data accessability |
D | Loss of full control over data resources |
E | Increased malware exposure |
Question 182 |
A | Configure advance intrusion detection and firewall rules on the main datacenter. |
B | Physical inspection of each site/workstation. |
C | Perform frequent security and vulnerability updates. |
D | Install and maintain advanced enterprise firewall applications. |
E | Perform frequent IT audits. |
Question 183 |
A | -a |
B | -i |
C | -t |
D | -n |
Question 184 |
A | Physical |
B | Transport |
C | Session |
D | Application |
E | Network |
F | Data Link |
G | Presentation |
Question 185 |
A | RJ-11 |
B | RG-58 |
C | RJ-45 |
D | RG-8 |
Question 186 |
A | 66 block |
B | CMTS |
C | Patch panel |
D | Fiber distribution panel |
E | 110 block |
Question 187 |
A | A router |
B | A hub |
C | A switch |
D | A gateway |
Question 188 |
A | SLA |
B | IRP |
C | NDA |
D | BYOD |
Question 189 |
A | 990 |
B | 25 |
C | 80 |
D | 110 |
E | 443 |
Question 190 |
A | 16 |
B | 8 |
C | 15 |
D | 17 |
Question 191 |
A | WinMS |
B | Window |
C | MMS |
D | MSS |
Question 192 |
A | DHCP reservation |
B | DHCP restriction |
C | DHCP relay |
D | DHCP option |
E | DHCP exclusion |
Question 193 |
A | RAID |
B | MIB |
C | BCP |
D | RTO |
E | RPO |
Question 194 |
A | Circuit labeling |
B | Power redundancy |
C | UPS capability |
D | Airflow and cooling |
Question 195 |
A | Authorization |
B | Certification |
C | Authentication |
D | Encryption |
E | Enrollment |
Question 196 |
A | Class A |
B | Class C |
C | Class B |
D | None of the classes |
E | Class D |
Question 197 |
A | session hijacking |
B | social engineering |
C | penetration testing |
D | friendly DoS |
E | vulnerability scanning |
Question 198 |
A | 10.1.0.255 |
B | 10.1.1.255 |
C | 192.168.0.1 |
D | 192.168.1.109 |
E | 192.168.0.55 |
Question 199 |
A | Application server |
B | RDP |
C | Client terminal |
D | KDC |
Question 200 |
A | Feature change |
B | Operating system update |
C | BOIS firmware patch |
D | Driver update |
E | Vulnerability patch |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.