← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set II | Set III
CompTIA Network+ N10-007 - Set I
Congratulations - you have completed CompTIA Network+ N10-007 - Set I.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | traceroute |
B | netstat |
C | ping |
D | ifconfig |
Question 2 |
A | There is a security type mismatch. |
B | The password needs to be re-entered |
C | There is insufficient antenna power |
D | The channel has changed |
E | There is a frequency mismatch |
Question 3 |
A | Bandwidth quotas |
B | Throttling |
C | Data usage limits |
D | Blocking |
E | Session hijacking |
Question 4 |
A | Brute-force |
B | War driving |
C | Bluejacking |
D | Port scanning |
E | Port sweeping |
Question 5 |
A | Transport |
B | Network |
C | Session |
D | Application |
E | Presentation |
F | Data link |
G | Physical |
Question 6 |
A | PEAP |
B | WPA |
C | WPA2 |
D | WEP |
Question 7 |
A | PAT |
B | ARP |
C | NAT |
D | SNAT |
E | STP |
Question 8 |
A | Perform backups |
B | Enable port mirroring |
C | Perform VLAN hopping |
D | Change default admin password |
E | Patch and update |
F | Implement spanning tree |
Question 9 |
A | SYN/ACK, SYN/ACK |
B | SYN, SYN, ACK, ACK |
C | SYN, ACK, SYN, ACK |
D | SYN, SYN/ACK, ACK |
Question 10 |
A | MS-CHAPv2 |
B | EAP |
C | CHAP |
D | WEP |
E | PAP |
Question 11 |
A | Sticky MAC |
B | 802.1x |
C | ACL |
D | NAT |
E | NAC |
Question 12 |
A | PSK |
B | WEP |
C | CCMP-AES |
D | EAP-PEAP |
Question 13 |
A | Walk a user through troubleshooting the connection |
B | Hire a third-party contractor to go on-site |
C | Use a modem to console into the router |
D | Travel to the branch office |
Question 14 |
A | Captive portal |
B | Port security |
C | Access control lists |
D | WPA2 |
Question 15 |
A | NDA |
B | SLA |
C | BYOD |
D | IRP |
Question 16 |
A | FTPS |
B | IPsec |
C | L2TP |
D | PPTP |
Question 17 |
A | 143 |
B | 80 |
C | 25 |
D | 110 |
E | 989 |
Question 18 |
A | IDS |
B | NGFW |
C | RADIUS |
D | NAS |
Question 19 |
A | Social engineering |
B | Evil twin |
C | Logic bomb |
D | Wardriving |
Question 20 |
A | arp -s |
B | arp -c * |
C | arp -a |
D | arp -d * |
Question 21 |
A | ifconfig |
B | netstat |
C | ipconfig |
D | ping |
E | tracert |
Question 22 |
A | Layer 7 |
B | Layer 3 |
C | Layer 1 |
D | Layer 2 |
E | Layer 4 |
F | Layer 6 |
G | Layer 5 |
Question 23 |
A | RAID 0 |
B | RAID 5 |
C | RAID 10 |
D | RAID 1 |
Question 24 |
A | ping |
B | monitor |
C | netstat |
D | top |
E | cpustat |
Question 25 |
A | Tracert |
B | Netstat |
C | Route |
D | Nslookup |
E | Ping |
Question 26 |
A | 10GBase-ER |
B | 10GBase-LR |
C | 10GBase-SR |
D | 10GBase-LX4 |
E | 10GBase-CX4 |
Question 27 |
A | Ethernet-over-power adapter |
B | Power distribution unit |
C | Powerline extender |
D | Power-over-Ethernet switch |
E | Ethernet power controller |
Question 28 |
A | A private IP pointing to the web front end |
B | A virtual IP pointing to the active DB |
C | A static IP pointing to the passive DB |
D | A private IP pointing to the web proxy |
Question 29 |
A | RJ11 |
B | RJ45 |
C | MTRJ |
D | F-type |
E | ST |
Question 30 |
A | An NDA ensuring work data stored on the personal phone remains confidential |
B | An AUP covering how a personal phone may be used for work matters |
C | Real-time remote monitoring of the phone’s activity and usage |
D | A consent to monitoring policy covering company audits of the personal phone |
Question 31 |
A | MTBF |
B | MDF |
C | PBX |
D | IDF |
E | RDP |
Question 32 |
A | Face geometry |
B | Tamper detection |
C | Pattern recognition |
D | Geofencing |
E | Biometrics |
Question 33 |
A | Packet intrusion |
B | Rogue DHCP server |
C | Honey pot |
D | Evil twin |
E | VLAN mismatch |
Question 34 |
A | Security |
B | Setup |
C | System |
D | Application |
Question 35 |
A | CARP |
B | Quality of service |
C | Voice over IP |
D | Round-robin DNS |
Question 36 |
A | EMI from the lights is interfering with the network cables |
B | Network wiring is run perpendicular to electrical conduit |
C | Temperature changes are causing attenuation in copper cabling |
D | Light sensors are interfering with the network |
Question 37 |
A | SIP |
B | FTP |
C | SCP |
D | ARP |
Question 38 |
A | 7 |
B | 4 |
C | 0 |
D | 2 |
E | 6 |
Question 39 |
A | MAC address |
B | Default gateway |
C | IP address |
D | Subnet mask |
Question 40 |
A | traceroute |
B | netstat |
C | ifconfig |
D | route |
E | dig |
Question 41 |
A | Bridge |
B | Router |
C | Hub |
D | Switch |
Question 42 |
A | Electrical |
B | Fiber optic |
C | Microwave |
D | Infrared |
Question 43 |
A | Perform a DNS lookup on the server. |
B | Reference the ARP table in the router. |
C | Configure port security on the switch. |
D | Set up an SSH session to the desktop. |
Question 44 |
A | Session |
B | Application |
C | Transport |
D | Network |
E | Data Link |
Question 45 |
A | 192.168.0.55 |
B | 10.1.1.255 |
C | 192.168.0.1 |
D | 10.1.0.255 |
E | 192.168.1.109 |
Question 46 |
A | Muti-ISP connections |
B | Server clustering |
C | DNS round robin |
D | RAID 1 |
E | NIC teaming |
Question 47 |
A | Physical inspection of each site/workstation. |
B | Perform frequent security and vulnerability updates. |
C | Configure advance intrusion detection and firewall rules on the main datacenter. |
D | Install and maintain advanced enterprise firewall applications. |
E | Perform frequent IT audits. |
Question 48 |
A | Permit 192.168.1.143 port143 |
B | Permit 192.168.1.143 port 110 |
C | Permit 192.168.1.143 port 443 |
D | Permit 192.168.1.143 port 25 |
E | Permit 192.168.1.143 port 80 |
F | Permit 192.168.1.143 port 587 |
Question 49 |
A | HTTPS server |
B | Encryption key |
C | Secure server |
D | Authentication server |
E | VPN gateway |
Question 50 |
A | Have the ISP double the bandwidth |
B | Configure geofencing |
C | Move from WPA2 to WEP |
D | Enable WPA and change the SSID |
Question 51 |
A | Authorization |
B | TGS |
C | Authentication |
D | Auditing |
E | Accounting |
Question 52 |
Image Credit: https://www.tequipment.net/ FlukeNetworks52801009.html
A | When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. |
B | By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. |
C | By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls. |
D | To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector’s pins. |
Question 53 |
A | HDSL |
B | IDSL |
C | RADSL |
D | VDSL |
Question 54 |
A | Corrupted config files or operating system |
B | Double NAT issue |
C | VLAN mismatch |
D | Damaged or malfunctioning fiber port |
E | Damaged or malfunctioning LAN port |
Question 55 |
A | Ad hoc |
B | Ring |
C | Star |
D | Mesh |
E | Bus |
Question 56 |
A | ICMP |
B | IGMP |
C | IMAP |
D | IP |
Question 57 |
A | A router |
B | A gateway |
C | A switch |
D | A hub |
Question 58 |
A | Network Monitor |
B | Syslog |
C | Event Viewer |
D | Performance Monitor |
E | ntop |
Question 59 |
A | E-1 |
B | T-1 |
C | T-3 |
D | OC-1 |
Question 60 |
A | 175.168.0.255 |
B | 169.254.54.5 |
C | 192.168.0.1 |
D | 192.168.1.1 |
E | 175.255.255.255 |
Question 61 |
A | Bus |
B | Star |
C | Mesh |
D | Ring or circular |
E | Point-to-point |
Question 62 |
A | DHCP reservation |
B | DHCP relay |
C | DHCP exclusion |
D | DHCP restriction |
E | DHCP option |
Question 63 |
A | FTP |
B | HTTP |
C | HTML |
D | SMTP |
E | SSL |
Question 64 |
A | Transposed wires |
B | Open circuits |
C | Split pairs |
D | Short circuits |
Question 65 |
A | Authorization |
B | Authentication |
C | Accounting |
D | Auditing |
Question 66 |
A | Verify file size |
B | Verify file hash |
C | Verify file type |
D | Verify file date |
E | Verify file version |
Question 67 |
A | Signal attenuation |
B | Crosstalk |
C | Latency |
D | EMI |
Question 68 |
SANUJA.COM 430 IN mx mx1.SANUJA.COM
SANUJA.COM 5 IN mx mx2.SANUJA.COM
SANUJA.COM 430 IN mx mx10.SANUJA.COM
SANUJA.COM 521 IN NS ns1.SANUJA.COM
SANUJA.COM 521 IN NS ns2.SANUJA.COM
SANUJA.COM 521 IN NS ns3.SANUJA.COM
SANUJA.COM 521 IN NS ns4.SANUJA.COM
A | iptables –f SANUJA.COM |
B | dig –t ANY SANUJA.COM |
C | NMAP –t SANUJA.COM |
D | netstat –a SANUJA.COM |
Question 69 |
A | Radius |
B | 802.1X |
C | TKIP |
D | LDAP |
E | Kerberos |
Question 70 |
A | Logic bomb |
B | Evil twin |
C | Wardriving |
D | Social engineering |
Question 71 |
A | Data security |
B | Port security |
C | Physical security |
D | Asset tracking |
Question 72 |
A | Coaxial cabling |
B | Enterrpise APs |
C | Twisted pair cabling |
D | Fiber-optic cabling |
Question 73 |
A | Destination switch |
B | Source route |
C | Cut-through |
D | Store-and-forward |
Question 74 |
A | 224.0.0.0 to 224.0.255.255 |
B | 192.168.0.0 to 192.168.0.255 |
C | 10.0.0.0 to 10.0.255.255 |
D | 169.254.0.0 to 169.254.255.255 |
Question 75 |
A | Switch |
B | Gateway |
C | Bridge |
D | Router |
Question 76 |
A | MTRJ |
B | 8P8C |
C | BNC |
D | F-type |
E | RJ45 |
Question 77 |
A | Private |
B | SaaS |
C | PaaS |
D | Public |
E | Hybrid |
F | IaaS |
Question 78 |
A | System |
B | Setup |
C | Security |
D | Application |
Question 79 |
A | Presentation |
B | Transport |
C | Application |
D | Network |
E | Session |
F | Data Link |
G | Physical |
Question 80 |
A | PSH |
B | END |
C | FIN |
D | URG |
E | SYN |
Question 81 |
A | Remote connection |
B | Fault tolerance |
C | Site-to-site VPN |
D | Distributed server system |
E | Network management |
Question 82 |
A | Tone generator |
B | Multimeter |
C | Cable tester |
D | Loopback adapter |
Question 83 |
A | ping |
B | pathping |
C | netstat |
D | route |
Question 84 |
A | SC to ST |
B | ST to ST |
C | LC to SC |
D | LC to ST |
E | SC to SC |
Question 85 |
A | Physical |
B | Presentation |
C | Transport |
D | Network |
E | Application |
F | Session |
G | Data link |
Question 86 |
A | Local authentication |
B | TACACS+ |
C | Single sign-on |
D | LDAP |
Question 87 |
A | Control the attenuation of the non-voice traffic across the network links |
B | Control the EMI of the multimedia traffic across the network links |
C | Control the latency of traffic across the network links |
D | Control the jitter of the affected traffic across the network links |
Question 88 |
A | Authentication |
B | Enrollment |
C | Authorization |
D | Certification |
E | Encryption |
Question 89 |
A | VRF |
B | IDF |
C | TDM |
D | MDF |
Question 90 |
A | Social engineering |
B | Geofencing |
C | Tamper detection |
D | Biometric |
E | Asset tracking |
Question 91 |
A | Tamper detection |
B | Biometrics |
C | Hand geometry |
D | Single sign-on (SSO) |
E | Pattern recognition |
Question 92 |
A | Allow the firewall to accept inbound traffic to ports 25, 67,179, and 3389 |
B | Set the firewall to operate in transparent mode |
C | Allow the firewall to accept inbound traffic to ports 80,110,143, and 443 |
D | Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123 |
Question 93 |
A | TCP |
B | UDP |
C | IGMP |
D | ICMP |
Question 94 |
A | TKIP-RC4 |
B | LDAP |
C | RADIUS |
D | NAC |
Question 95 |
A | iSCSI |
B | Fibre Channel |
C | NAS |
D | InfinitiBand |
Question 96 |
A | Administration |
B | Authorization |
C | Accounting |
D | Authentication |
Question 97 |
A | IMAP |
B | SMTP |
C | POP |
D | LDAP |
Question 98 |
A | Privileged |
B | Private |
C | Public |
D | Secured |
E | Preshared |
Question 99 |
A | DSL |
B | PRI |
C | BRI |
D | E1/E3 |
Question 100 |
A | Encapsulate the storage traffic in a GRE tunnel |
B | Turn off MDIX settings on the NAS and server switchports |
C | Enable jumbo frames on the NAS and server |
D | Utilize UDP to eliminate packet overhead |
Question 101 |
A | Branch-to-server |
B | Host-to-site |
C | Host-to-host |
D | Extranet |
E | Site-to-site |
Question 102 |
A | CMTS |
B | 110 block |
C | Patch panel |
D | 66 block |
E | Fiber distribution panel |
Question 103 |
A | F-type |
B | RJ45 |
C | RJ11 |
D | LC |
E | ST |
F | MTRJ |
Question 104 |
A | Demarcation point |
B | Network firewall |
C | Wireless endpoint |
D | Wireless controller |
E | Demarcation point |
Question 105 |
A | 1024 to 49151 |
B | 1023 through 65534 |
C | 49152 through 65535 |
D | 1 through 1024 |
Question 106 |
A | iSCSI |
B | CIFS |
C | Fibre Channel |
D | InfiniBand |
Question 107 |
A | Store all spare equipment in a sepearete office building for extra protection. |
B | Instead of replacing current units during failures, use parts from the spare units to fix the current unit. |
C | Keep purchasing new spare equipment. |
D | Update the firmware and drivers on spare network equipment regularly. |
E | Do nothing and keep the spare nearby for an emergency. |
Question 108 |
A | social engineering |
B | penetration testing |
C | friendly DoS |
D | vulnerability scanning |
E | session hijacking |
Question 109 |
A | Power redundancy |
B | Uninterruptible Power Supply (UPS) |
C | Power looping |
D | Dual power supplies |
E | Redundant circuits |
Question 110 |
A | traceroute |
B | iptables |
C | tcpdump |
D | ipconfig |
E | netstat |
Question 111 |
A | VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection. |
B | VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation. |
C | VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commands. |
D | VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges. |
Question 112 |
A | Layer 3 |
B | Layer 1 |
C | Layer 4 |
D | Layer 2 |
Question 113 |
A | Both broadcast and collision domains occur at layer 2. |
B | Broadcast domains occur in layer 1 while collision domains occur in layer 2. |
C | Collision domains occur in layer 1 while broadcast domains occur in layer 2. |
D | It is impossible to have a collision domain in a wireless network infrastructure. |
E | It is impossible to have a collision domain in a wired (LAN) network infrastructure. |
Question 114 |
A | Increased malware exposure |
B | Loss of full control over data resources |
C | Incompatibility with the current network |
D | Inconsistent data accessability |
E | Decreased performance of the internal network |
Question 115 |
A | Failover |
B | Backups |
C | Cold sites |
D | Snapshots |
Question 116 |
A | PTR |
B | A |
C | MX |
D | MD |
E | CNAME |
Question 117 |
A | Periodically view the server logs |
B | Configure port aggregation |
C | Use SQL injectors |
D | Use port mirroring |
E | Install an inline tap |
Question 118 |
A | 995 |
B | 1999 |
C | 23 |
D | 80 |
E | 50134 |
F | 1024 |
Question 119 |
A | Unshielded twisted pair |
B | Multimode fiber optic |
C | Coaxial |
D | Single-mode fiber optic |
E | Shielded twisted pair |
Question 120 |
A | arp -t |
B | arp -a |
C | arp -d |
D | arp -s |
E | arp -c |
Question 121 |
A | 161 , 162 |
B | 5060 , 5061 |
C | 5060 , 3389 |
D | 80 , 443 |
E | 143 , 993 |
Question 122 |
A | Number of screw holes |
B | Inches |
C | Millimeters |
D | Centimeters |
E | Units |
Question 123 |
A | RAID 1 |
B | RAID 0 |
C | RAID 5 |
D | RAID 10 |
Question 124 |
A | Layer 3 repeater |
B | Ethernet hub |
C | Multiport bridge |
D | Layer 2 router |
Question 125 |
A | BGP |
B | LACP |
C | SIP |
D | LLDP |
Question 126 |
A | 80 |
B | 990 |
C | 110 |
D | 443 |
E | 25 |
Question 127 |
A | Logical network diagram |
B | Asset management files |
C | Wiring schematic |
D | Physical network diagram |
E | Circuit diagrams |
Question 128 |
A | WAP |
B | NAC |
C | Port security |
D | MAC filtering |
E | Captive portal |
Question 129 |
A | SSL gateway |
B | SSL tunnel |
C | SSL client |
D | SSL portal |
Question 130 |
A | Ransomware |
B | Session hijacking |
C | Phishing |
D | Spoofing |
E | DDoS |
Question 131 |
A | netstat |
B | dig |
C | nmap |
D | tcpdump |
Question 132 |
A | 19 inches |
B | 16 inches |
C | 12 inches |
D | 24 inches |
Question 133 |
A | IP address resolution |
B | Password protection |
C | Network switching |
D | Name resolution |
Question 134 |
A | SSL |
B | IPSec |
C | SSH |
D | Telnet |
Question 135 |
A | Building blueprints |
B | Network map |
C | Wiring schematic |
D | Rack diagram |
E | Logical diagram |
Question 136 |
A | IPv6 |
B | VoIP |
C | CARP |
D | QoS |
E | SSL |
Question 137 |
A | ping 192.168.1.1 -l 2048 -n 6 |
B | ping 192.168.1.1 -l 2048 -t 6 |
C | ping 192.168.1.1 -l 2048 -t |
D | ping 192.168.1.1 -t |
E | ping 192.168.1.1 -n 2048 |
Number of messages: -n parameter = 6
Question 138 |
A | http://sanuja.com:123456 |
B | http://sanuja.com/123456 |
C | https://sanuja.com/123456 |
D | https://sanuja.com:123456 |
E | None of the answers are correct because you cannot assign random port numbers. |
Question 139 |
A | 2 |
B | 3 |
C | 0 |
D | 1 |
E | 4 |
Question 140 |
A | NS |
B | MX |
C | A |
D | TXT |
E | AAAA |
Question 141 |
A | Hop count |
B | Speed |
C | Ping time |
D | Bandwidth |
E | Distance |
Question 142 |
A | A shared resource problem |
B | A network-wide problem |
C | A system-wide problem |
D | A wide area newtwork problem |
E | A user application problem |
Question 143 |
A | The ticket granting key |
B | The secure key |
C | The public key |
D | The session key |
E | The private key |
Question 144 |
A | QoS |
B | RIP |
C | NAT |
D | DDoS |
E | DMZ |
Question 145 |
A | Presentation |
B | Transport |
C | Physical |
D | Application |
E | Data link |
F | Network |
G | Session |
Question 146 |
A | Netstat |
B | Top |
C | Syslog |
D | Netmon |
Question 147 |
A | Wireless access point |
B | Biometric systems |
C | Smartcards |
D | RADIUS server |
E | Domain controller |
Question 148 |
A | 802.1X |
B | TKIP |
C | AES |
D | Kerberos |
E | RC4 |
Question 149 |
A | device hardening |
B | biometrics |
C | hardware security |
D | asset tracking |
E | tamper detection |
Question 150 |
A | Remove the firewall between the Internet/modem and the router. |
B | Add a firewall between the domain controller and the router. |
C | Add additional printers across both NATs. |
D | Remove one of the routers and if requires use VLANs to create separate subnets with specific firewall rules. |
Question 151 |
A | dig |
B | iptables |
C | nmap |
D | tcpdump |
Question 152 |
A | 4 unit |
B | 3 unit |
C | 1 unit |
D | 2 unit |
Question 153 |
A | Change the default credentials |
B | Disable unused switchports |
C | Apply patches and updates |
D | Verify the firmware file hash |
Question 154 |
A | Smart jack |
B | SIP trunk |
C | Media converter |
D | AAA server |
E | SONET |
Question 155 |
A | RADIUS |
B | WPA2 |
C | Kerberos |
D | EAP-TLS |
Question 156 |
A | Ethernet |
B | UDP |
C | IP |
D | ICMP |
E | TCP |
Question 157 |
A | Project management |
B | Change management |
C | Standard operating procedure |
D | Process management |
Question 158 |
A | Layer 3 switch |
B | Protocol analyzer |
C | Web proxy |
D | NAT |
E | Layer 7 firewall |
Question 159 |
A | 16 |
B | 15 |
C | 17 |
D | 8 |
Question 160 |
A | Physical |
B | Application |
C | Session |
D | Presentation |
E | Data Link |
F | Transport |
G | Network |
Question 161 |
A | Wiring schematic |
B | Physical network diagram |
C | Logical network diagram |
D | MSConfig file |
E | Asset management files |
Question 162 |
A | Clustering |
B | RAID 1 |
C | UPS |
D | SNMP |
Question 163 |
A | Channel overlap |
B | Wrong passphrase |
C | Cross talk |
D | Overcapacity |
Question 164 |
A | The wireless access points were misconfigured |
B | There is less local congestion on the wireless network |
C | The testing server for the wired network was farther away |
D | The firewall is configured to throttle traffic to specific websites |
Question 165 |
A | Proxy server |
B | Wireless controller |
C | Load balancer |
D | IDS |
E | Enterprise firewall |
Question 166 |
A | Class C |
B | Class A |
C | None of the classes |
D | Class B |
E | Class D |
Question 167 |
A | BCP |
B | RPO |
C | RTO |
D | MIB |
E | RAID |
Question 168 |
A | Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network. |
B | Install honeypots on the network to detect and analyze potential kiosk attacks before they occur. |
C | Create a secondary NAT and connect the kiosks on it hence limit kiosks' ability to access the main network. |
D | Install an IDS to monitor all traffic to and from the kiosks. |
E | Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks. |
Question 169 |
A | XSS |
B | Packet sniffing |
C | Wardriving |
D | SQL injection |
E | Directory traversal |
Question 170 |
A | Asset management files |
B | Circuit diagrams |
C | Logical network diagram |
D | Physical network diagram |
E | Wiring schematic |
Question 171 |
A | Store and forward |
B | Multiport |
C | Source route |
D | Transparent |
Question 172 |
A | 255 255 255.0 |
B | 192.168.1.0 |
C | 255 255 255.0 |
D | 192.168.1.1 |
E | 192.168.0.55 |
Question 173 |
A | NS |
B | AAAA |
C | MX |
D | A |
E | TXT |
Question 174 |
A | Driver update |
B | Feature change |
C | Operating system update |
D | Vulnerability patch |
E | BOIS firmware patch |
Question 175 |
A | MMS |
B | WinMS |
C | MSS |
D | Window |
Question 176 |
A | Hex |
B | Binary |
C | CIDR |
D | Octal |
Question 177 |
A | NAS |
B | Fiber channel |
C | Jumbo frames |
D | FTP |
E | SAN |
Question 178 |
A | Video surveillance |
B | Motion detection |
C | Smartcards |
D | Biometrics |
Question 179 |
A | Routers |
B | Bridges |
C | Firewalls |
D | Hubs |
Question 180 |
A | DOCSIS |
B | Bridge mode |
C | Double NAT |
D | ADSL |
E | Jumbo frame |
Question 181 |
A | -a |
B | -i |
C | -t |
D | -n |
Question 182 |
A | IPS |
B | Web application firewall |
C | Content filter |
D | VLAN restrictions |
E | VPN concentrator |
Question 183 |
A | High-efficiency mode |
B | Individual mode |
C | Redundant mode |
D | Combined mode |
E | Hot backup mode |
Question 184 |
A | Airflow and cooling |
B | UPS capability |
C | Circuit labeling |
D | Power redundancy |
Question 185 |
A | VIP |
B | NAT |
C | PAT |
D | SIP |
Question 186 |
A | Something you know |
B | Something you do |
C | Something you have |
D | Somewhere you are |
Question 187 |
A | Client terminal |
B | KDC |
C | RDP |
D | Application server |
Question 188 |
A | Mesh |
B | Peer-peer |
C | Point-to-point |
D | Ring |
E | Point-to-multipoint |
F | Bus |
Question 189 |
A | A router |
B | A switch |
C | A hub |
D | A gateway |
Question 190 |
A | WEP |
B | 802.1X |
C | WPA2 |
D | WPA |
Question 191 |
A | SaaS |
B | Hosted |
C | VPN |
D | IaaS |
E | PaaS |
Question 192 |
A | Proxy server |
B | VoIP gateway |
C | VPN concentrator |
D | UTM appliance |
Question 193 |
A | USB 3.0 |
B | DB9 |
C | USB 2.0 |
D | RJ45 |
E | RC5 |
Question 194 |
A | VLAN mismatch |
B | DNS server issue |
C | Spanning tree blocked ports |
D | DHCP server issue |
E | Duplex/speed mismatch |
Question 195 |
A | iSCSI |
B | FCoE |
C | SAN |
D | NAS |
E | FTP |
Question 196 |
A | DSL |
B | ISDN |
C | Dial-up modem |
D | Cable broadband |
Question 197 |
A | RJ-11 |
B | RG-58 |
C | RG-8 |
D | RJ-45 |
Question 198 |
A | UDP |
B | TCP |
C | HTTP |
D | IP |
Question 199 |
A | An open mail relay server |
B | A router with default credentials |
C | An SNMPv1 private community |
D | A privilege escalation script |
Question 200 |
A | QSFP |
B | GBIC |
C | BiDi |
D | SFP |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.