← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set II | Set III
CompTIA Network+ N10-007 - Set I
Congratulations - you have completed CompTIA Network+ N10-007 - Set I.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Perform a DNS lookup on the server. |
B | Set up an SSH session to the desktop. |
C | Reference the ARP table in the router. |
D | Configure port security on the switch. |
Question 2 |
A | Social engineering |
B | Evil twin |
C | Wardriving |
D | Logic bomb |
Question 3 |
A | 8 |
B | 16 |
C | 17 |
D | 15 |
Question 4 |
A | Spoofing |
B | DDoS |
C | Ransomware |
D | Phishing |
E | Session hijacking |
Question 5 |
A | EAP-TLS |
B | RADIUS |
C | Kerberos |
D | WPA2 |
Question 6 |
A | Application server |
B | Client terminal |
C | RDP |
D | KDC |
Question 7 |
A | Netmon |
B | Top |
C | Syslog |
D | Netstat |
Question 8 |
A | arp -c * |
B | arp -a |
C | arp -d * |
D | arp -s |
Question 9 |
A | Perform frequent IT audits. |
B | Physical inspection of each site/workstation. |
C | Install and maintain advanced enterprise firewall applications. |
D | Configure advance intrusion detection and firewall rules on the main datacenter. |
E | Perform frequent security and vulnerability updates. |
Question 10 |
A | Site-to-site |
B | Extranet |
C | Branch-to-server |
D | Host-to-site |
E | Host-to-host |
Question 11 |
A | 5060 , 5061 |
B | 80 , 443 |
C | 5060 , 3389 |
D | 143 , 993 |
E | 161 , 162 |
Question 12 |
A | Star |
B | Mesh |
C | Bus |
D | Ad hoc |
E | Ring |
Question 13 |
A | iSCSI |
B | Fibre Channel |
C | CIFS |
D | InfiniBand |
Question 14 |
A | Default gateway |
B | Subnet mask |
C | IP address |
D | MAC address |
Question 15 |
A | Layer 3 switch |
B | NAT |
C | Layer 7 firewall |
D | Web proxy |
E | Protocol analyzer |
Question 16 |
A | ping |
B | netstat |
C | ifconfig |
D | traceroute |
Question 17 |
A | UDP |
B | TCP |
C | IP |
D | HTTP |
Question 18 |
A | Private |
B | Public |
C | SaaS |
D | IaaS |
E | PaaS |
F | Hybrid |
Question 19 |
A | Implement spanning tree |
B | Patch and update |
C | Perform backups |
D | Enable port mirroring |
E | Change default admin password |
F | Perform VLAN hopping |
Question 20 |
A | Application |
B | Transport |
C | Physical |
D | Network |
E | Session |
F | Presentation |
G | Data link |
Question 21 |
A | 49152 through 65535 |
B | 1 through 1024 |
C | 1024 to 49151 |
D | 1023 through 65534 |
Question 22 |
A | LC to SC |
B | SC to SC |
C | LC to ST |
D | ST to ST |
E | SC to ST |
Question 23 |
A | PAT |
B | VIP |
C | SIP |
D | NAT |
Question 24 |
A | SLA |
B | IRP |
C | BYOD |
D | NDA |
Question 25 |
A | F-type |
B | MTRJ |
C | ST |
D | RJ45 |
E | LC |
F | RJ11 |
Question 26 |
A | DSL |
B | PRI |
C | E1/E3 |
D | BRI |
Question 27 |
A | A private IP pointing to the web proxy |
B | A virtual IP pointing to the active DB |
C | A static IP pointing to the passive DB |
D | A private IP pointing to the web front end |
Question 28 |
A | AAAA |
B | TXT |
C | NS |
D | MX |
E | A |
Question 29 |
A | Tamper detection |
B | Geofencing |
C | Asset tracking |
D | Social engineering |
E | Biometric |
Question 30 |
A | 10.0.0.0 to 10.0.255.255 |
B | 192.168.0.0 to 192.168.0.255 |
C | 169.254.0.0 to 169.254.255.255 |
D | 224.0.0.0 to 224.0.255.255 |
Question 31 |
A | WEP |
B | CCMP-AES |
C | PSK |
D | EAP-PEAP |
Question 32 |
A | High-efficiency mode |
B | Hot backup mode |
C | Combined mode |
D | Individual mode |
E | Redundant mode |
Question 33 |
A | BiDi |
B | SFP |
C | GBIC |
D | QSFP |
Question 34 |
A | 24 inches |
B | 16 inches |
C | 19 inches |
D | 12 inches |
Question 35 |
A | AAAA |
B | MX |
C | TXT |
D | NS |
E | A |
Question 36 |
A | Hex |
B | Octal |
C | CIDR |
D | Binary |
Question 37 |
A | MD |
B | CNAME |
C | A |
D | MX |
E | PTR |
Question 38 |
A | Control the jitter of the affected traffic across the network links |
B | Control the attenuation of the non-voice traffic across the network links |
C | Control the latency of traffic across the network links |
D | Control the EMI of the multimedia traffic across the network links |
Question 39 |
A | Cable tester |
B | Multimeter |
C | Loopback adapter |
D | Tone generator |
Question 40 |
A | InfinitiBand |
B | NAS |
C | iSCSI |
D | Fibre Channel |
Question 41 |
A | Allow the firewall to accept inbound traffic to ports 80,110,143, and 443 |
B | Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123 |
C | Set the firewall to operate in transparent mode |
D | Allow the firewall to accept inbound traffic to ports 25, 67,179, and 3389 |
Question 42 |
A | Channel overlap |
B | Wrong passphrase |
C | Overcapacity |
D | Cross talk |
Question 43 |
A | asset tracking |
B | hardware security |
C | tamper detection |
D | biometrics |
E | device hardening |
Question 44 |
A | RAID 10 |
B | RAID 1 |
C | RAID 5 |
D | RAID 0 |
Question 45 |
A | Smartcards |
B | RADIUS server |
C | Wireless access point |
D | Biometric systems |
E | Domain controller |
Question 46 |
A | Secure server |
B | Encryption key |
C | Authentication server |
D | HTTPS server |
E | VPN gateway |
Question 47 |
A | VDSL |
B | RADSL |
C | IDSL |
D | HDSL |
Question 48 |
A | Dial-up modem |
B | Cable broadband |
C | ISDN |
D | DSL |
Question 49 |
A | 110 block |
B | Fiber distribution panel |
C | CMTS |
D | 66 block |
E | Patch panel |
Question 50 |
A | Network management |
B | Remote connection |
C | Distributed server system |
D | Site-to-site VPN |
E | Fault tolerance |
Question 51 |
A | SSL |
B | IPSec |
C | Telnet |
D | SSH |
Question 52 |
A | 2 unit |
B | 4 unit |
C | 1 unit |
D | 3 unit |
Question 53 |
A | F-type |
B | MTRJ |
C | 8P8C |
D | BNC |
E | RJ45 |
Question 54 |
A | 10GBase-LX4 |
B | 10GBase-LR |
C | 10GBase-SR |
D | 10GBase-ER |
E | 10GBase-CX4 |
Question 55 |
A | Application |
B | System |
C | Security |
D | Setup |
Question 56 |
A | A switch |
B | A gateway |
C | A hub |
D | A router |
Question 57 |
A | PaaS |
B | VPN |
C | SaaS |
D | Hosted |
E | IaaS |
Question 58 |
A | MAC filtering |
B | WAP |
C | Port security |
D | Captive portal |
E | NAC |
Question 59 |
A | IP |
B | ICMP |
C | IMAP |
D | IGMP |
Question 60 |
A | WEP |
B | WPA |
C | 802.1X |
D | WPA2 |
Question 61 |
A | IDS |
B | RADIUS |
C | NGFW |
D | NAS |
Question 62 |
A | Something you know |
B | Something you have |
C | Somewhere you are |
D | Something you do |
Question 63 |
A | TGS |
B | Authentication |
C | Accounting |
D | Auditing |
E | Authorization |
Question 64 |
A | Authorization |
B | Encryption |
C | Authentication |
D | Certification |
E | Enrollment |
Question 65 |
A | A user application problem |
B | A network-wide problem |
C | A wide area newtwork problem |
D | A system-wide problem |
E | A shared resource problem |
Question 66 |
A | Ping time |
B | Speed |
C | Hop count |
D | Distance |
E | Bandwidth |
Question 67 |
A | Sticky MAC |
B | 802.1x |
C | ACL |
D | NAC |
E | NAT |
Question 68 |
A | DNS server issue |
B | DHCP server issue |
C | Duplex/speed mismatch |
D | VLAN mismatch |
E | Spanning tree blocked ports |
Question 69 |
A | 169.254.54.5 |
B | 175.168.0.255 |
C | 192.168.0.1 |
D | 175.255.255.255 |
E | 192.168.1.1 |
Question 70 |
A | Biometrics |
B | Video surveillance |
C | Motion detection |
D | Smartcards |
Question 71 |
A | Dual power supplies |
B | Power looping |
C | Redundant circuits |
D | Power redundancy |
E | Uninterruptible Power Supply (UPS) |
Question 72 |
A | Gateway |
B | Switch |
C | Bridge |
D | Router |
Question 73 |
A | nmap |
B | tcpdump |
C | dig |
D | iptables |
Question 74 |
A | System |
B | Security |
C | Setup |
D | Application |
Question 75 |
A | Transport |
B | Network |
C | Data Link |
D | Physical |
E | Presentation |
F | Session |
G | Application |
Question 76 |
A | Session |
B | Network |
C | Data Link |
D | Transport |
E | Application |
Question 77 |
A | Access control lists |
B | Port security |
C | Captive portal |
D | WPA2 |
Question 78 |
A | DDoS |
B | QoS |
C | NAT |
D | DMZ |
E | RIP |
Question 79 |
A | Configure geofencing |
B | Enable WPA and change the SSID |
C | Move from WPA2 to WEP |
D | Have the ISP double the bandwidth |
Question 80 |
A | Tamper detection |
B | Geofencing |
C | Biometrics |
D | Face geometry |
E | Pattern recognition |
Question 81 |
A | USB 2.0 |
B | USB 3.0 |
C | RJ45 |
D | RC5 |
E | DB9 |
Question 82 |
A | Layer 7 |
B | Layer 3 |
C | Layer 4 |
D | Layer 2 |
E | Layer 6 |
F | Layer 5 |
G | Layer 1 |
Question 83 |
A | Light sensors are interfering with the network |
B | Temperature changes are causing attenuation in copper cabling |
C | EMI from the lights is interfering with the network cables |
D | Network wiring is run perpendicular to electrical conduit |
Question 84 |
A | DHCP relay |
B | DHCP reservation |
C | DHCP restriction |
D | DHCP exclusion |
E | DHCP option |
Question 85 |
A | Source route |
B | Transparent |
C | Store and forward |
D | Multiport |
Question 86 |
A | SMTP |
B | LDAP |
C | IMAP |
D | POP |
Question 87 |
A | Directory traversal |
B | Wardriving |
C | SQL injection |
D | XSS |
E | Packet sniffing |
Question 88 |
A | https://sanuja.com/123456 |
B | None of the answers are correct because you cannot assign random port numbers. |
C | http://sanuja.com/123456 |
D | https://sanuja.com:123456 |
E | http://sanuja.com:123456 |
Question 89 |
A | Verify file version |
B | Verify file size |
C | Verify file date |
D | Verify file hash |
E | Verify file type |
Question 90 |
A | SYN/ACK, SYN/ACK |
B | SYN, SYN, ACK, ACK |
C | SYN, SYN/ACK, ACK |
D | SYN, ACK, SYN, ACK |
Question 91 |
A | Port security |
B | Data security |
C | Physical security |
D | Asset tracking |
Question 92 |
Image Credit: https://www.tequipment.net/ FlukeNetworks52801009.html
A | To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector’s pins. |
B | By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. |
C | By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls. |
D | When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. |
Question 93 |
A | Instead of replacing current units during failures, use parts from the spare units to fix the current unit. |
B | Keep purchasing new spare equipment. |
C | Update the firmware and drivers on spare network equipment regularly. |
D | Do nothing and keep the spare nearby for an emergency. |
E | Store all spare equipment in a sepearete office building for extra protection. |
Question 94 |
A | NAS |
B | Jumbo frames |
C | Fiber channel |
D | SAN |
E | FTP |
Question 95 |
A | RAID 1 |
B | NIC teaming |
C | DNS round robin |
D | Server clustering |
E | Muti-ISP connections |
Question 96 |
A | Vulnerability patch |
B | BOIS firmware patch |
C | Feature change |
D | Operating system update |
E | Driver update |
Question 97 |
A | UPS |
B | SNMP |
C | Clustering |
D | RAID 1 |
Question 98 |
A | tcpdump |
B | dig |
C | netstat |
D | nmap |
Question 99 |
A | Backups |
B | Cold sites |
C | Snapshots |
D | Failover |
Question 100 |
A | Physical |
B | Presentation |
C | Session |
D | Transport |
E | Data link |
F | Application |
G | Network |
Question 101 |
A | Window |
B | MMS |
C | MSS |
D | WinMS |
Question 102 |
A | NAT |
B | STP |
C | SNAT |
D | PAT |
E | ARP |
Question 103 |
A | Increased malware exposure |
B | Incompatibility with the current network |
C | Inconsistent data accessability |
D | Loss of full control over data resources |
E | Decreased performance of the internal network |
Question 104 |
A | Authentication |
B | Accounting |
C | Authorization |
D | Auditing |
Question 105 |
A | LACP |
B | BGP |
C | LLDP |
D | SIP |
Question 106 |
A | FCoE |
B | iSCSI |
C | NAS |
D | SAN |
E | FTP |
Question 107 |
A | The firewall is configured to throttle traffic to specific websites |
B | The wireless access points were misconfigured |
C | The testing server for the wired network was farther away |
D | There is less local congestion on the wireless network |
Question 108 |
A | Mesh |
B | Point-to-point |
C | Ring or circular |
D | Bus |
E | Star |
Question 109 |
A | CHAP |
B | MS-CHAPv2 |
C | EAP |
D | PAP |
E | WEP |
Question 110 |
A | The session key |
B | The private key |
C | The ticket granting key |
D | The public key |
E | The secure key |
Question 111 |
A | RG-58 |
B | RG-8 |
C | RJ-11 |
D | RJ-45 |
Question 112 |
A | PPTP |
B | FTPS |
C | L2TP |
D | IPsec |
Question 113 |
A | Source route |
B | Cut-through |
C | Destination switch |
D | Store-and-forward |
Question 114 |
A | PBX |
B | MTBF |
C | IDF |
D | RDP |
E | MDF |
Question 115 |
A | Password protection |
B | Name resolution |
C | IP address resolution |
D | Network switching |
Question 116 |
A | 25 |
B | 110 |
C | 989 |
D | 80 |
E | 143 |
Question 117 |
A | -a |
B | -t |
C | -n |
D | -i |
Question 118 |
A | Quality of service |
B | Voice over IP |
C | CARP |
D | Round-robin DNS |
Question 119 |
A | Session |
B | Network |
C | Data Link |
D | Presentation |
E | Physical |
F | Application |
G | Transport |
Question 120 |
A | Fiber-optic cabling |
B | Coaxial cabling |
C | Enterrpise APs |
D | Twisted pair cabling |
Question 121 |
A | Radius |
B | Kerberos |
C | LDAP |
D | TKIP |
E | 802.1X |
Question 122 |
A | Class A |
B | None of the classes |
C | Class C |
D | Class D |
E | Class B |
Question 123 |
A | An NDA ensuring work data stored on the personal phone remains confidential |
B | A consent to monitoring policy covering company audits of the personal phone |
C | An AUP covering how a personal phone may be used for work matters |
D | Real-time remote monitoring of the phone’s activity and usage |
Question 124 |
A | Pattern recognition |
B | Biometrics |
C | Tamper detection |
D | Hand geometry |
E | Single sign-on (SSO) |
Question 125 |
A | Use port mirroring |
B | Use SQL injectors |
C | Install an inline tap |
D | Periodically view the server logs |
E | Configure port aggregation |
Question 126 |
A | Logical network diagram |
B | MSConfig file |
C | Asset management files |
D | Wiring schematic |
E | Physical network diagram |
Question 127 |
A | Logical diagram |
B | Network map |
C | Building blueprints |
D | Rack diagram |
E | Wiring schematic |
Question 128 |
A | Units |
B | Centimeters |
C | Millimeters |
D | Inches |
E | Number of screw holes |
Question 129 |
A | TACACS+ |
B | Single sign-on |
C | Local authentication |
D | LDAP |
Question 130 |
A | Point-to-multipoint |
B | Bus |
C | Mesh |
D | Point-to-point |
E | Peer-peer |
F | Ring |
Question 131 |
A | Preshared |
B | Privileged |
C | Public |
D | Private |
E | Secured |
Question 132 |
A | The password needs to be re-entered |
B | The channel has changed |
C | There is insufficient antenna power |
D | There is a security type mismatch. |
E | There is a frequency mismatch |
Question 133 |
A | Switch |
B | Router |
C | Bridge |
D | Hub |
Question 134 |
A | 4 |
B | 7 |
C | 6 |
D | 2 |
E | 0 |
Question 135 |
A | Change the default credentials |
B | Verify the firmware file hash |
C | Apply patches and updates |
D | Disable unused switchports |
Question 136 |
A | Wireless controller |
B | Load balancer |
C | Enterprise firewall |
D | IDS |
E | Proxy server |
Question 137 |
A | tracert |
B | ipconfig |
C | ping |
D | ifconfig |
E | netstat |
Question 138 |
A | Create a secondary NAT and connect the kiosks on it hence limit kiosks' ability to access the main network. |
B | Install honeypots on the network to detect and analyze potential kiosk attacks before they occur. |
C | Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks. |
D | Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network. |
E | Install an IDS to monitor all traffic to and from the kiosks. |
Question 139 |
A | ADSL |
B | Bridge mode |
C | Double NAT |
D | DOCSIS |
E | Jumbo frame |
Question 140 |
A | War driving |
B | Brute-force |
C | Port sweeping |
D | Bluejacking |
E | Port scanning |
Question 141 |
A | An SNMPv1 private community |
B | An open mail relay server |
C | A router with default credentials |
D | A privilege escalation script |
Question 142 |
A | VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation. |
B | VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges. |
C | VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection. |
D | VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commands. |
Question 143 |
A | Administration |
B | Authentication |
C | Authorization |
D | Accounting |
Question 144 |
A | A gateway |
B | A router |
C | A hub |
D | A switch |
Question 145 |
A | Remove one of the routers and if requires use VLANs to create separate subnets with specific firewall rules. |
B | Remove the firewall between the Internet/modem and the router. |
C | Add additional printers across both NATs. |
D | Add a firewall between the domain controller and the router. |
Question 146 |
A | ifconfig |
B | dig |
C | netstat |
D | route |
E | traceroute |
Question 147 |
A | pathping |
B | netstat |
C | route |
D | ping |
Question 148 |
A | IPv6 |
B | SSL |
C | VoIP |
D | CARP |
E | QoS |
Question 149 |
A | Web application firewall |
B | VLAN restrictions |
C | IPS |
D | Content filter |
E | VPN concentrator |
Question 150 |
A | Packet intrusion |
B | Rogue DHCP server |
C | Honey pot |
D | Evil twin |
E | VLAN mismatch |
Question 151 |
A | MTRJ |
B | RJ11 |
C | RJ45 |
D | ST |
E | F-type |
Question 152 |
A | Double NAT issue |
B | VLAN mismatch |
C | Damaged or malfunctioning LAN port |
D | Corrupted config files or operating system |
E | Damaged or malfunctioning fiber port |
Question 153 |
A | SCP |
B | FTP |
C | SIP |
D | ARP |
Question 154 |
A | ICMP |
B | Ethernet |
C | UDP |
D | IP |
E | TCP |
Question 155 |
A | LDAP |
B | NAC |
C | TKIP-RC4 |
D | RADIUS |
Question 156 |
A | Signal attenuation |
B | Latency |
C | EMI |
D | Crosstalk |
Question 157 |
A | Power redundancy |
B | UPS capability |
C | Airflow and cooling |
D | Circuit labeling |
Question 158 |
A | Turn off MDIX settings on the NAS and server switchports |
B | Encapsulate the storage traffic in a GRE tunnel |
C | Enable jumbo frames on the NAS and server |
D | Utilize UDP to eliminate packet overhead |
Question 159 |
A | top |
B | netstat |
C | monitor |
D | cpustat |
E | ping |
Question 160 |
SANUJA.COM 430 IN mx mx1.SANUJA.COM
SANUJA.COM 5 IN mx mx2.SANUJA.COM
SANUJA.COM 430 IN mx mx10.SANUJA.COM
SANUJA.COM 521 IN NS ns1.SANUJA.COM
SANUJA.COM 521 IN NS ns2.SANUJA.COM
SANUJA.COM 521 IN NS ns3.SANUJA.COM
SANUJA.COM 521 IN NS ns4.SANUJA.COM
A | iptables –f SANUJA.COM |
B | NMAP –t SANUJA.COM |
C | dig –t ANY SANUJA.COM |
D | netstat –a SANUJA.COM |
Question 161 |
A | URG |
B | END |
C | SYN |
D | FIN |
E | PSH |
Question 162 |
A | Power-over-Ethernet switch |
B | Ethernet-over-power adapter |
C | Powerline extender |
D | Ethernet power controller |
E | Power distribution unit |
Question 163 |
A | T-1 |
B | T-3 |
C | E-1 |
D | OC-1 |
Question 164 |
A | Asset management files |
B | Physical network diagram |
C | Circuit diagrams |
D | Wiring schematic |
E | Logical network diagram |
Question 165 |
A | arp -t |
B | arp -d |
C | arp -c |
D | arp -a |
E | arp -s |
Question 166 |
A | Change management |
B | Process management |
C | Project management |
D | Standard operating procedure |
Question 167 |
A | tcpdump |
B | traceroute |
C | ipconfig |
D | netstat |
E | iptables |
Question 168 |
A | 995 |
B | 1999 |
C | 1024 |
D | 23 |
E | 80 |
F | 50134 |
Question 169 |
A | Unshielded twisted pair |
B | Single-mode fiber optic |
C | Coaxial |
D | Shielded twisted pair |
E | Multimode fiber optic |
Question 170 |
A | Evil twin |
B | Social engineering |
C | Wardriving |
D | Logic bomb |
Question 171 |
A | Electrical |
B | Microwave |
C | Fiber optic |
D | Infrared |
Question 172 |
A | Proxy server |
B | VPN concentrator |
C | UTM appliance |
D | VoIP gateway |
Question 173 |
A | RAID 10 |
B | RAID 1 |
C | RAID 5 |
D | RAID 0 |
Question 174 |
A | AES |
B | Kerberos |
C | 802.1X |
D | TKIP |
E | RC4 |
Question 175 |
A | Travel to the branch office |
B | Use a modem to console into the router |
C | Hire a third-party contractor to go on-site |
D | Walk a user through troubleshooting the connection |
Question 176 |
A | Bridges |
B | Firewalls |
C | Hubs |
D | Routers |
Question 177 |
A | MDF |
B | VRF |
C | TDM |
D | IDF |
Question 178 |
A | 192.168.1.109 |
B | 192.168.0.1 |
C | 10.1.0.255 |
D | 192.168.0.55 |
E | 10.1.1.255 |
Question 179 |
A | Bandwidth quotas |
B | Blocking |
C | Data usage limits |
D | Session hijacking |
E | Throttling |
Question 180 |
A | AAA server |
B | Smart jack |
C | Media converter |
D | SIP trunk |
E | SONET |
Question 181 |
A | friendly DoS |
B | session hijacking |
C | penetration testing |
D | vulnerability scanning |
E | social engineering |
Question 182 |
A | Ping |
B | Tracert |
C | Nslookup |
D | Route |
E | Netstat |
Question 183 |
A | Open circuits |
B | Transposed wires |
C | Split pairs |
D | Short circuits |
Question 184 |
A | Multiport bridge |
B | Ethernet hub |
C | Layer 2 router |
D | Layer 3 repeater |
Question 185 |
A | 2 |
B | 3 |
C | 0 |
D | 1 |
E | 4 |
Question 186 |
A | ping 192.168.1.1 -t |
B | ping 192.168.1.1 -l 2048 -t |
C | ping 192.168.1.1 -l 2048 -t 6 |
D | ping 192.168.1.1 -l 2048 -n 6 |
E | ping 192.168.1.1 -n 2048 |
Number of messages: -n parameter = 6
Question 187 |
A | Transport |
B | Presentation |
C | Physical |
D | Application |
E | Session |
F | Data link |
G | Network |
Question 188 |
A | Circuit diagrams |
B | Wiring schematic |
C | Logical network diagram |
D | Asset management files |
E | Physical network diagram |
Question 189 |
A | Permit 192.168.1.143 port 80 |
B | Permit 192.168.1.143 port 110 |
C | Permit 192.168.1.143 port143 |
D | Permit 192.168.1.143 port 587 |
E | Permit 192.168.1.143 port 443 |
F | Permit 192.168.1.143 port 25 |
Question 190 |
A | SSL client |
B | SSL tunnel |
C | SSL portal |
D | SSL gateway |
Question 191 |
A | ntop |
B | Event Viewer |
C | Network Monitor |
D | Performance Monitor |
E | Syslog |
Question 192 |
A | HTML |
B | SSL |
C | SMTP |
D | FTP |
E | HTTP |
Question 193 |
A | 990 |
B | 443 |
C | 25 |
D | 80 |
E | 110 |
Question 194 |
A | Demarcation point |
B | Wireless controller |
C | Wireless endpoint |
D | Network firewall |
E | Demarcation point |
Question 195 |
A | Layer 4 |
B | Layer 2 |
C | Layer 3 |
D | Layer 1 |
Question 196 |
A | It is impossible to have a collision domain in a wired (LAN) network infrastructure. |
B | Broadcast domains occur in layer 1 while collision domains occur in layer 2. |
C | Collision domains occur in layer 1 while broadcast domains occur in layer 2. |
D | It is impossible to have a collision domain in a wireless network infrastructure. |
E | Both broadcast and collision domains occur at layer 2. |
Question 197 |
A | WEP |
B | WPA2 |
C | PEAP |
D | WPA |
Question 198 |
A | 192.168.1.1 |
B | 192.168.0.55 |
C | 255 255 255.0 |
D | 192.168.1.0 |
E | 255 255 255.0 |
Question 199 |
A | RPO |
B | RTO |
C | RAID |
D | BCP |
E | MIB |
Question 200 |
A | ICMP |
B | TCP |
C | IGMP |
D | UDP |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.