← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set II | Set III
CompTIA Network+ N10-007 - Set I
Congratulations - you have completed CompTIA Network+ N10-007 - Set I.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Permit 192.168.1.143 port 25 |
B | Permit 192.168.1.143 port 587 |
C | Permit 192.168.1.143 port 443 |
D | Permit 192.168.1.143 port 110 |
E | Permit 192.168.1.143 port 80 |
F | Permit 192.168.1.143 port143 |
Question 2 |
A | NAT |
B | ACL |
C | Sticky MAC |
D | 802.1x |
E | NAC |
Question 3 |
A | AAA server |
B | SONET |
C | SIP trunk |
D | Media converter |
E | Smart jack |
Question 4 |
A | VLAN mismatch |
B | Evil twin |
C | Rogue DHCP server |
D | Packet intrusion |
E | Honey pot |
Question 5 |
A | Application |
B | Security |
C | System |
D | Setup |
Question 6 |
A | Network |
B | Application |
C | Data link |
D | Transport |
E | Presentation |
F | Physical |
G | Session |
Question 7 |
A | Hubs |
B | Firewalls |
C | Routers |
D | Bridges |
Question 8 |
A | USB 3.0 |
B | USB 2.0 |
C | DB9 |
D | RJ45 |
E | RC5 |
Question 9 |
A | IDS |
B | NGFW |
C | NAS |
D | RADIUS |
Question 10 |
A | Uninterruptible Power Supply (UPS) |
B | Redundant circuits |
C | Power looping |
D | Dual power supplies |
E | Power redundancy |
Question 11 |
A | Operating system update |
B | Feature change |
C | Driver update |
D | BOIS firmware patch |
E | Vulnerability patch |
Question 12 |
A | VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges. |
B | VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation. |
C | VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commands. |
D | VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection. |
Question 13 |
SANUJA.COM 430 IN mx mx1.SANUJA.COM
SANUJA.COM 5 IN mx mx2.SANUJA.COM
SANUJA.COM 430 IN mx mx10.SANUJA.COM
SANUJA.COM 521 IN NS ns1.SANUJA.COM
SANUJA.COM 521 IN NS ns2.SANUJA.COM
SANUJA.COM 521 IN NS ns3.SANUJA.COM
SANUJA.COM 521 IN NS ns4.SANUJA.COM
A | iptables –f SANUJA.COM |
B | netstat –a SANUJA.COM |
C | NMAP –t SANUJA.COM |
D | dig –t ANY SANUJA.COM |
Question 14 |
A | Fault tolerance |
B | Distributed server system |
C | Remote connection |
D | Network management |
E | Site-to-site VPN |
Question 15 |
A | Use a modem to console into the router |
B | Travel to the branch office |
C | Hire a third-party contractor to go on-site |
D | Walk a user through troubleshooting the connection |
Question 16 |
A | device hardening |
B | tamper detection |
C | asset tracking |
D | hardware security |
E | biometrics |
Question 17 |
A | Ethernet-over-power adapter |
B | Powerline extender |
C | Power-over-Ethernet switch |
D | Power distribution unit |
E | Ethernet power controller |
Question 18 |
A | LACP |
B | SIP |
C | LLDP |
D | BGP |
Question 19 |
A | Enable port mirroring |
B | Implement spanning tree |
C | Change default admin password |
D | Perform VLAN hopping |
E | Perform backups |
F | Patch and update |
Question 20 |
A | Circuit labeling |
B | UPS capability |
C | Power redundancy |
D | Airflow and cooling |
Question 21 |
A | Site-to-site |
B | Host-to-site |
C | Branch-to-server |
D | Extranet |
E | Host-to-host |
Question 22 |
A | Accounting |
B | Auditing |
C | Authentication |
D | Authorization |
Question 23 |
A | Clustering |
B | RAID 1 |
C | UPS |
D | SNMP |
Question 24 |
A | A privilege escalation script |
B | An SNMPv1 private community |
C | A router with default credentials |
D | An open mail relay server |
Question 25 |
A | IMAP |
B | ICMP |
C | IGMP |
D | IP |
Question 26 |
A | Wardriving |
B | Evil twin |
C | Logic bomb |
D | Social engineering |
Question 27 |
Image Credit: https://www.tequipment.net/ FlukeNetworks52801009.html
A | To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector’s pins. |
B | By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. |
C | By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls. |
D | When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. |
Question 28 |
A | ADSL |
B | Jumbo frame |
C | Bridge mode |
D | Double NAT |
E | DOCSIS |
Question 29 |
A | A consent to monitoring policy covering company audits of the personal phone |
B | An AUP covering how a personal phone may be used for work matters |
C | An NDA ensuring work data stored on the personal phone remains confidential |
D | Real-time remote monitoring of the phone’s activity and usage |
Question 30 |
A | dig |
B | ifconfig |
C | route |
D | traceroute |
E | netstat |
Question 31 |
A | Network map |
B | Building blueprints |
C | Wiring schematic |
D | Logical diagram |
E | Rack diagram |
Question 32 |
A | Application |
B | Data Link |
C | Network |
D | Session |
E | Transport |
Question 33 |
A | System |
B | Security |
C | Application |
D | Setup |
Question 34 |
A | Use port mirroring |
B | Use SQL injectors |
C | Configure port aggregation |
D | Install an inline tap |
E | Periodically view the server logs |
Question 35 |
A | Enterrpise APs |
B | Fiber-optic cabling |
C | Coaxial cabling |
D | Twisted pair cabling |
Question 36 |
A | Tamper detection |
B | Biometrics |
C | Face geometry |
D | Pattern recognition |
E | Geofencing |
Question 37 |
A | Preshared |
B | Private |
C | Secured |
D | Public |
E | Privileged |
Question 38 |
A | IGMP |
B | ICMP |
C | UDP |
D | TCP |
Question 39 |
A | NIC teaming |
B | Server clustering |
C | RAID 1 |
D | DNS round robin |
E | Muti-ISP connections |
Question 40 |
A | Performance Monitor |
B | Event Viewer |
C | ntop |
D | Syslog |
E | Network Monitor |
Question 41 |
A | Latency |
B | EMI |
C | Signal attenuation |
D | Crosstalk |
Question 42 |
A | VRF |
B | IDF |
C | MDF |
D | TDM |
Question 43 |
A | Circuit diagrams |
B | Physical network diagram |
C | Logical network diagram |
D | Wiring schematic |
E | Asset management files |
Question 44 |
A | 23 |
B | 1999 |
C | 1024 |
D | 995 |
E | 50134 |
F | 80 |
Question 45 |
A | Create a secondary NAT and connect the kiosks on it hence limit kiosks' ability to access the main network. |
B | Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks. |
C | Install an IDS to monitor all traffic to and from the kiosks. |
D | Install honeypots on the network to detect and analyze potential kiosk attacks before they occur. |
E | Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network. |
Question 46 |
A | arp -s |
B | arp -c * |
C | arp -a |
D | arp -d * |
Question 47 |
A | Overcapacity |
B | Channel overlap |
C | Cross talk |
D | Wrong passphrase |
Question 48 |
A | IP |
B | HTTP |
C | TCP |
D | UDP |
Question 49 |
A | Transposed wires |
B | Open circuits |
C | Split pairs |
D | Short circuits |
Question 50 |
A | The firewall is configured to throttle traffic to specific websites |
B | The wireless access points were misconfigured |
C | There is less local congestion on the wireless network |
D | The testing server for the wired network was farther away |
Question 51 |
A | CIFS |
B | InfiniBand |
C | Fibre Channel |
D | iSCSI |
Question 52 |
A | Star |
B | Point-to-point |
C | Ring or circular |
D | Bus |
E | Mesh |
Question 53 |
A | SYN, SYN/ACK, ACK |
B | SYN, SYN, ACK, ACK |
C | SYN/ACK, SYN/ACK |
D | SYN, ACK, SYN, ACK |
Question 54 |
A | Class A |
B | Class C |
C | None of the classes |
D | Class D |
E | Class B |
Question 55 |
A | Speed |
B | Bandwidth |
C | Distance |
D | Hop count |
E | Ping time |
Question 56 |
A | NS |
B | A |
C | TXT |
D | AAAA |
E | MX |
Question 57 |
A | Unshielded twisted pair |
B | Multimode fiber optic |
C | Coaxial |
D | Single-mode fiber optic |
E | Shielded twisted pair |
Question 58 |
A | SQL injection |
B | Directory traversal |
C | Wardriving |
D | Packet sniffing |
E | XSS |
Question 59 |
A | Session hijacking |
B | DDoS |
C | Ransomware |
D | Spoofing |
E | Phishing |
Question 60 |
A | MTRJ |
B | RJ45 |
C | RJ11 |
D | LC |
E | F-type |
F | ST |
Question 61 |
A | Set up an SSH session to the desktop. |
B | Configure port security on the switch. |
C | Reference the ARP table in the router. |
D | Perform a DNS lookup on the server. |
Question 62 |
A | RC4 |
B | 802.1X |
C | TKIP |
D | Kerberos |
E | AES |
Question 63 |
A | tcpdump |
B | netstat |
C | nmap |
D | dig |
Question 64 |
A | WEP |
B | WPA2 |
C | WPA |
D | 802.1X |
Question 65 |
A | Port security |
B | WPA2 |
C | Access control lists |
D | Captive portal |
Question 66 |
A | CARP |
B | Quality of service |
C | Round-robin DNS |
D | Voice over IP |
Question 67 |
A | IDS |
B | Proxy server |
C | Wireless controller |
D | Load balancer |
E | Enterprise firewall |
Question 68 |
A | War driving |
B | Port scanning |
C | Port sweeping |
D | Brute-force |
E | Bluejacking |
Question 69 |
A | A private IP pointing to the web proxy |
B | A private IP pointing to the web front end |
C | A virtual IP pointing to the active DB |
D | A static IP pointing to the passive DB |
Question 70 |
A | Certification |
B | Authentication |
C | Authorization |
D | Enrollment |
E | Encryption |
Question 71 |
A | Configure geofencing |
B | Enable WPA and change the SSID |
C | Move from WPA2 to WEP |
D | Have the ISP double the bandwidth |
Question 72 |
A | session hijacking |
B | penetration testing |
C | friendly DoS |
D | vulnerability scanning |
E | social engineering |
Question 73 |
A | Netmon |
B | Top |
C | Netstat |
D | Syslog |
Question 74 |
A | BCP |
B | RAID |
C | MIB |
D | RPO |
E | RTO |
Question 75 |
A | PaaS |
B | SaaS |
C | VPN |
D | Hosted |
E | IaaS |
Question 76 |
A | FTP |
B | FCoE |
C | SAN |
D | NAS |
E | iSCSI |
Question 77 |
A | Octal |
B | CIDR |
C | Binary |
D | Hex |
Question 78 |
A | VPN concentrator |
B | Proxy server |
C | UTM appliance |
D | VoIP gateway |
Question 79 |
A | Authorization |
B | Auditing |
C | TGS |
D | Accounting |
E | Authentication |
Question 80 |
A | RADIUS |
B | Kerberos |
C | EAP-TLS |
D | WPA2 |
Question 81 |
A | WEP |
B | WPA |
C | WPA2 |
D | PEAP |
Question 82 |
A | SC to ST |
B | LC to SC |
C | SC to SC |
D | LC to ST |
E | ST to ST |
Question 83 |
A | Electrical |
B | Infrared |
C | Fiber optic |
D | Microwave |
Question 84 |
A | Multiport bridge |
B | Layer 3 repeater |
C | Layer 2 router |
D | Ethernet hub |
Question 85 |
A | Redundant mode |
B | Individual mode |
C | High-efficiency mode |
D | Hot backup mode |
E | Combined mode |
Question 86 |
A | Data link |
B | Session |
C | Presentation |
D | Application |
E | Transport |
F | Physical |
G | Network |
Question 87 |
A | Layer 1 |
B | Layer 6 |
C | Layer 5 |
D | Layer 2 |
E | Layer 3 |
F | Layer 4 |
G | Layer 7 |
Question 88 |
A | Session |
B | Transport |
C | Application |
D | Presentation |
E | Data Link |
F | Network |
G | Physical |
Question 89 |
A | Double NAT issue |
B | VLAN mismatch |
C | Damaged or malfunctioning LAN port |
D | Damaged or malfunctioning fiber port |
E | Corrupted config files or operating system |
Question 90 |
A | Layer 3 switch |
B | NAT |
C | Protocol analyzer |
D | Web proxy |
E | Layer 7 firewall |
Question 91 |
A | VPN gateway |
B | Encryption key |
C | HTTPS server |
D | Secure server |
E | Authentication server |
Question 92 |
A | A router |
B | A gateway |
C | A switch |
D | A hub |
Question 93 |
A | Centimeters |
B | Units |
C | Millimeters |
D | Inches |
E | Number of screw holes |
Question 94 |
A | Allow the firewall to accept inbound traffic to ports 80,110,143, and 443 |
B | Allow the firewall to accept inbound traffic to ports 25, 67,179, and 3389 |
C | Set the firewall to operate in transparent mode |
D | Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123 |
Question 95 |
A | IP address |
B | Subnet mask |
C | MAC address |
D | Default gateway |
Question 96 |
A | Demarcation point |
B | Network firewall |
C | Demarcation point |
D | Wireless controller |
E | Wireless endpoint |
Question 97 |
A | 1 through 1024 |
B | 1023 through 65534 |
C | 1024 to 49151 |
D | 49152 through 65535 |
Question 98 |
A | cpustat |
B | monitor |
C | netstat |
D | top |
E | ping |
Question 99 |
A | MSS |
B | Window |
C | MMS |
D | WinMS |
Question 100 |
A | Bridge |
B | Switch |
C | Hub |
D | Router |
Question 101 |
A | 10.1.0.255 |
B | 192.168.0.1 |
C | 192.168.1.109 |
D | 10.1.1.255 |
E | 192.168.0.55 |
Question 102 |
A | Kerberos |
B | TKIP |
C | LDAP |
D | Radius |
E | 802.1X |
Question 103 |
A | END |
B | URG |
C | PSH |
D | SYN |
E | FIN |
Question 104 |
A | FTP |
B | SIP |
C | ARP |
D | SCP |
Question 105 |
A | LDAP |
B | Single sign-on |
C | TACACS+ |
D | Local authentication |
Question 106 |
A | -n |
B | -a |
C | -i |
D | -t |
Question 107 |
A | RDP |
B | MTBF |
C | PBX |
D | MDF |
E | IDF |
Question 108 |
A | Data usage limits |
B | Blocking |
C | Session hijacking |
D | Throttling |
E | Bandwidth quotas |
Question 109 |
A | iptables |
B | nmap |
C | tcpdump |
D | dig |
Question 110 |
A | Evil twin |
B | Social engineering |
C | Logic bomb |
D | Wardriving |
Question 111 |
A | T-1 |
B | T-3 |
C | OC-1 |
D | E-1 |
Question 112 |
A | Loopback adapter |
B | Tone generator |
C | Cable tester |
D | Multimeter |
Question 113 |
A | RAID 5 |
B | RAID 0 |
C | RAID 10 |
D | RAID 1 |
Question 114 |
A | ifconfig |
B | traceroute |
C | netstat |
D | ping |
Question 115 |
A | BRI |
B | DSL |
C | E1/E3 |
D | PRI |
Question 116 |
A | AAAA |
B | NS |
C | MX |
D | TXT |
E | A |
Question 117 |
A | SSL gateway |
B | SSL tunnel |
C | SSL client |
D | SSL portal |
Question 118 |
A | http://sanuja.com:123456 |
B | https://sanuja.com:123456 |
C | https://sanuja.com/123456 |
D | None of the answers are correct because you cannot assign random port numbers. |
E | http://sanuja.com/123456 |
Question 119 |
A | Verify file version |
B | Verify file type |
C | Verify file date |
D | Verify file hash |
E | Verify file size |
Question 120 |
A | Transport |
B | Application |
C | Physical |
D | Presentation |
E | Data Link |
F | Session |
G | Network |
Question 121 |
A | 192.168.1.1 |
B | 255 255 255.0 |
C | 255 255 255.0 |
D | 192.168.0.55 |
E | 192.168.1.0 |
Question 122 |
A | DHCP restriction |
B | DHCP relay |
C | DHCP exclusion |
D | DHCP option |
E | DHCP reservation |
Question 123 |
A | VPN concentrator |
B | VLAN restrictions |
C | Web application firewall |
D | Content filter |
E | IPS |
Question 124 |
A | Physical security |
B | Port security |
C | Asset tracking |
D | Data security |
Question 125 |
A | 4 unit |
B | 3 unit |
C | 1 unit |
D | 2 unit |
Question 126 |
A | WAP |
B | Port security |
C | MAC filtering |
D | Captive portal |
E | NAC |
Question 127 |
A | L2TP |
B | PPTP |
C | IPsec |
D | FTPS |
Question 128 |
A | SSL |
B | FTP |
C | HTML |
D | SMTP |
E | HTTP |
Question 129 |
A | IRP |
B | NDA |
C | BYOD |
D | SLA |
Question 130 |
A | Backups |
B | Snapshots |
C | Cold sites |
D | Failover |
Question 131 |
A | tracert |
B | netstat |
C | ping |
D | ifconfig |
E | ipconfig |
Question 132 |
A | Video surveillance |
B | Smartcards |
C | Biometrics |
D | Motion detection |
Question 133 |
A | Biometrics |
B | Tamper detection |
C | Single sign-on (SSO) |
D | Hand geometry |
E | Pattern recognition |
Question 134 |
A | There is a security type mismatch. |
B | The channel has changed |
C | The password needs to be re-entered |
D | There is a frequency mismatch |
E | There is insufficient antenna power |
Question 135 |
A | A network-wide problem |
B | A shared resource problem |
C | A user application problem |
D | A wide area newtwork problem |
E | A system-wide problem |
Question 136 |
A | Logical network diagram |
B | Wiring schematic |
C | MSConfig file |
D | Asset management files |
E | Physical network diagram |
Question 137 |
A | 24 inches |
B | 19 inches |
C | 12 inches |
D | 16 inches |
Question 138 |
A | 5060 , 5061 |
B | 161 , 162 |
C | 5060 , 3389 |
D | 143 , 993 |
E | 80 , 443 |
Question 139 |
A | Store and forward |
B | Multiport |
C | Source route |
D | Transparent |
Question 140 |
A | 80 |
B | 25 |
C | 989 |
D | 110 |
E | 143 |
Question 141 |
A | Enable jumbo frames on the NAS and server |
B | Utilize UDP to eliminate packet overhead |
C | Turn off MDIX settings on the NAS and server switchports |
D | Encapsulate the storage traffic in a GRE tunnel |
Question 142 |
A | Instead of replacing current units during failures, use parts from the spare units to fix the current unit. |
B | Do nothing and keep the spare nearby for an emergency. |
C | Update the firmware and drivers on spare network equipment regularly. |
D | Keep purchasing new spare equipment. |
E | Store all spare equipment in a sepearete office building for extra protection. |
Question 143 |
A | Duplex/speed mismatch |
B | DNS server issue |
C | DHCP server issue |
D | Spanning tree blocked ports |
E | VLAN mismatch |
Question 144 |
A | EAP-PEAP |
B | WEP |
C | CCMP-AES |
D | PSK |
Question 145 |
A | Destination switch |
B | Source route |
C | Store-and-forward |
D | Cut-through |
Question 146 |
A | Authorization |
B | Authentication |
C | Accounting |
D | Administration |
Question 147 |
A | Incompatibility with the current network |
B | Inconsistent data accessability |
C | Increased malware exposure |
D | Decreased performance of the internal network |
E | Loss of full control over data resources |
Question 148 |
A | RADIUS |
B | LDAP |
C | NAC |
D | TKIP-RC4 |
Question 149 |
A | IP |
B | ICMP |
C | UDP |
D | TCP |
E | Ethernet |
Question 150 |
A | Fiber channel |
B | Jumbo frames |
C | FTP |
D | SAN |
E | NAS |
Question 151 |
A | pathping |
B | route |
C | ping |
D | netstat |
Question 152 |
A | Remove one of the routers and if requires use VLANs to create separate subnets with specific firewall rules. |
B | Remove the firewall between the Internet/modem and the router. |
C | Add a firewall between the domain controller and the router. |
D | Add additional printers across both NATs. |
Question 153 |
A | ping 192.168.1.1 -l 2048 -t |
B | ping 192.168.1.1 -l 2048 -t 6 |
C | ping 192.168.1.1 -l 2048 -n 6 |
D | ping 192.168.1.1 -t |
E | ping 192.168.1.1 -n 2048 |
Number of messages: -n parameter = 6
Question 154 |
A | Asset management files |
B | Wiring schematic |
C | Logical network diagram |
D | Circuit diagrams |
E | Physical network diagram |
Question 155 |
A | Collision domains occur in layer 1 while broadcast domains occur in layer 2. |
B | It is impossible to have a collision domain in a wireless network infrastructure. |
C | Both broadcast and collision domains occur at layer 2. |
D | It is impossible to have a collision domain in a wired (LAN) network infrastructure. |
E | Broadcast domains occur in layer 1 while collision domains occur in layer 2. |
Question 156 |
A | 169.254.0.0 to 169.254.255.255 |
B | 224.0.0.0 to 224.0.255.255 |
C | 10.0.0.0 to 10.0.255.255 |
D | 192.168.0.0 to 192.168.0.255 |
Question 157 |
A | Something you do |
B | Something you know |
C | Something you have |
D | Somewhere you are |
Question 158 |
A | iSCSI |
B | InfinitiBand |
C | Fibre Channel |
D | NAS |
Question 159 |
A | Dial-up modem |
B | Cable broadband |
C | DSL |
D | ISDN |
Question 160 |
A | Verify the firmware file hash |
B | Apply patches and updates |
C | Change the default credentials |
D | Disable unused switchports |
Question 161 |
A | VDSL |
B | HDSL |
C | RADSL |
D | IDSL |
Question 162 |
A | arp -s |
B | arp -c |
C | arp -a |
D | arp -t |
E | arp -d |
Question 163 |
A | PaaS |
B | IaaS |
C | Hybrid |
D | Public |
E | SaaS |
F | Private |
Question 164 |
A | Mesh |
B | Point-to-multipoint |
C | Ring |
D | Peer-peer |
E | Bus |
F | Point-to-point |
Question 165 |
A | Ring |
B | Ad hoc |
C | Mesh |
D | Bus |
E | Star |
Question 166 |
A | MTRJ |
B | F-type |
C | RJ45 |
D | BNC |
E | 8P8C |
Question 167 |
A | Wireless access point |
B | RADIUS server |
C | Domain controller |
D | Biometric systems |
E | Smartcards |
Question 168 |
A | A hub |
B | A gateway |
C | A router |
D | A switch |
Question 169 |
A | Telnet |
B | SSL |
C | SSH |
D | IPSec |
Question 170 |
A | Ping |
B | Route |
C | Nslookup |
D | Tracert |
E | Netstat |
Question 171 |
A | Light sensors are interfering with the network |
B | EMI from the lights is interfering with the network cables |
C | Temperature changes are causing attenuation in copper cabling |
D | Network wiring is run perpendicular to electrical conduit |
Question 172 |
A | Fiber distribution panel |
B | CMTS |
C | Patch panel |
D | 66 block |
E | 110 block |
Question 173 |
A | Bridge |
B | Router |
C | Switch |
D | Gateway |
Question 174 |
A | EAP |
B | CHAP |
C | PAP |
D | MS-CHAPv2 |
E | WEP |
Question 175 |
A | tcpdump |
B | ipconfig |
C | netstat |
D | traceroute |
E | iptables |
Question 176 |
A | MX |
B | A |
C | MD |
D | PTR |
E | CNAME |
Question 177 |
A | 1 |
B | 2 |
C | 3 |
D | 4 |
E | 0 |
Question 178 |
A | SSL |
B | CARP |
C | QoS |
D | VoIP |
E | IPv6 |
Question 179 |
A | RAID 1 |
B | RAID 10 |
C | RAID 5 |
D | RAID 0 |
Question 180 |
A | Layer 3 |
B | Layer 4 |
C | Layer 2 |
D | Layer 1 |
Question 181 |
A | Biometric |
B | Tamper detection |
C | Social engineering |
D | Geofencing |
E | Asset tracking |
Question 182 |
A | RJ-11 |
B | RG-8 |
C | RG-58 |
D | RJ-45 |
Question 183 |
A | SIP |
B | PAT |
C | VIP |
D | NAT |
Question 184 |
A | RIP |
B | DMZ |
C | QoS |
D | NAT |
E | DDoS |
Question 185 |
A | 7 |
B | 0 |
C | 4 |
D | 6 |
E | 2 |
Question 186 |
A | PAT |
B | NAT |
C | ARP |
D | SNAT |
E | STP |
Question 187 |
A | 16 |
B | 8 |
C | 15 |
D | 17 |
Question 188 |
A | QSFP |
B | GBIC |
C | SFP |
D | BiDi |
Question 189 |
A | Transport |
B | Application |
C | Physical |
D | Network |
E | Session |
F | Presentation |
G | Data link |
Question 190 |
A | The private key |
B | The ticket granting key |
C | The session key |
D | The secure key |
E | The public key |
Question 191 |
A | Standard operating procedure |
B | Process management |
C | Change management |
D | Project management |
Question 192 |
A | 175.168.0.255 |
B | 192.168.0.1 |
C | 175.255.255.255 |
D | 169.254.54.5 |
E | 192.168.1.1 |
Question 193 |
A | 10GBase-LX4 |
B | 10GBase-ER |
C | 10GBase-LR |
D | 10GBase-SR |
E | 10GBase-CX4 |
Question 194 |
A | 80 |
B | 990 |
C | 25 |
D | 443 |
E | 110 |
Question 195 |
A | RJ45 |
B | ST |
C | RJ11 |
D | MTRJ |
E | F-type |
Question 196 |
A | Control the EMI of the multimedia traffic across the network links |
B | Control the attenuation of the non-voice traffic across the network links |
C | Control the latency of traffic across the network links |
D | Control the jitter of the affected traffic across the network links |
Question 197 |
A | Password protection |
B | IP address resolution |
C | Network switching |
D | Name resolution |
Question 198 |
A | Client terminal |
B | Application server |
C | RDP |
D | KDC |
Question 199 |
A | Configure advance intrusion detection and firewall rules on the main datacenter. |
B | Perform frequent security and vulnerability updates. |
C | Install and maintain advanced enterprise firewall applications. |
D | Physical inspection of each site/workstation. |
E | Perform frequent IT audits. |
Question 200 |
A | IMAP |
B | POP |
C | SMTP |
D | LDAP |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.