← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set III
CompTIA Network+ N10-007 - Set II
Congratulations - you have completed CompTIA Network+ N10-007 - Set II.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
Gigabit Ethernet 1 Interface: 10.10.0.1/24 Serial 0 Interface: 10.10.0.253/30
A | The router was configured with an incorrect IP address |
B | The router was configured with an incorrect default gateway |
C | The router was configured with an incorrect loopback address |
D | The router was configured with an incorrect subnet mask |
Question 2 |
A | Server-based firewall configuration issue |
B | VLAN routing |
C | Patch cable type |
D | DHCP scope availability |
Question 3 |
A | OTDR |
B | Loopback adapter |
C | Spectrum analyzer |
D | TDR |
Question 4 |
Which of the following devices is causing the issue?
A | Switch 2 |
B | Firewall |
C | Router |
D | Switch 1 |
Question 5 |
A | Incident response |
B | DLP |
C | Remote access |
D | Offboarding |
E | AUP |
Question 6 |
A | VLAN hopping |
B | MAC spoofing |
C | Session hijacking |
D | Bluesnarfing |
E | Man-in-the-middle |
Question 7 |
A | 172.18.0.0/23 |
B | 10.233.2.0/23 |
C | 192.168.25.0/24 |
D | 172.16.0.0/22 |
E | 10.5.4.0/22 |
Question 8 |
A | Changing the management software's default port |
B | Disabling unnecessary services from the server and management software |
C | Changing the management software's default credentials |
D | Replacing the management software's self-signed certificate with a valid certificate |
Question 9 |
A | netstat |
B | Spectrum analyzer |
C | nslookup |
D | Packet sniffer |
Question 10 |
A | penetration testing. |
B | role separation. |
C | risk assessment. |
D | device hardening. |
Question 11 |
A | DHCP |
B | TCP/IP |
C | SQL |
D | DNS |
Question 12 |
A | DNS server |
B | Cable modem |
C | Layer 2 switch |
D | SOHO router |
Question 13 |
A | Replace the NIC |
B | Change the switch |
C | Plug in to another port |
D | Modify the speed and duplex |
Question 14 |
A | AUP |
B | SLA |
C | MOU |
D | NDA |
Question 15 |
A | 802.11ac |
B | 802.11n |
C | 802.11a |
D | 802.11b |
Question 16 |
A | NIC teaming |
B | Load balancing |
C | Clustering |
D | Redundant circuits |
E | Multiple NAT |
Question 17 |
A | Packet filtering utility |
B | Packet capturing utility |
C | MS Windows command-line tool |
D | Packet tracing utility |
E | Linux command-line tool |
Question 18 |
A | IDF/MDF documentation |
B | Change management |
C | Performance baseline |
D | Physical diagram |
Question 19 |
A | The technician should use a packet tracer to see if the traffic is getting out of the network |
B | The technician should check the internal diagnostics on all the phones to look for a common thread |
C | The technician should run ping tests on the Internet line to monitor for packet loss and latency |
D | The technician should reset all the phones and deprovision information from the provider |
Question 20 |
A | Single sign-on |
B | RADIUS |
C | TACACS+ |
D | Captive portal |
Question 21 |
A | 3DES encryption |
B | Digital signatures |
C | SSL certificate |
D | Digital signatures |
Question 22 |
A | Bus |
B | Ring |
C | Partial mesh |
D | Ad hoc |
Question 23 |
A | Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption. |
B | Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices. |
C | Connect the legacy devices with a PSK while the modern devices should use the more secure EAP. |
D | Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility. |
Question 24 |
A | It provides multiple collision domains on one switchport |
B | It provides a faster port to all servers |
C | It provides multiple broadcast domains within a single collision domain |
D | It segments broadcast domains in the network infrastructure |
Question 25 |
A | permit tcp any any eq 110 |
B | permit tcp any any eq 8080 |
C | permit udp any any eq 53 |
D | permit tcp any any eq 20 |
E | permit udp any any eq 25 |
F | permit udp any any eq 68 |
Question 26 |
A | Credentials |
B | Kerberos |
C | VNC application |
D | Geotagging application |
Question 27 |
A | Spanning tree |
B | BPDU guard |
C | Flood guard |
D | DHCP snooping |
Question 28 |
A | An IoT device is causing a DoS attack on the wireless network |
B | There is additional data being transferred over the wireless network |
C | The utility company throttles power during peak hours |
D | There is interference with the smart reader |
Question 29 |
A | Signal repeater |
B | Layer 3 switch |
C | Layer 2 switch |
D | Domain server |
E | Bridge |
Question 30 |
A | Change management |
B | Labeling report |
C | Network diagrams |
D | Inventory report |
Question 31 |
A | Reduce the TX power on each access point. |
B | Enable MAC address filtering on each access point. |
C | Enable AP isolation on each access point. |
D | Disable the SSID broadcast on each access point. |
Question 32 |
A | Certificate |
B | SSO |
C | RADIUS |
D | NAC |
E | Kerberos |
F | MFA |
Question 33 |
A | None, the network looks good. |
B | Cable 3 should be an STP cable. |
C | Cable 1 does not need to be plenum rated. |
D | Cable 2 should be an STP cable. |
Question 34 |
A | 15 |
B | 13 |
C | 14 |
D | 12 |
E | 3 |
Question 35 |
A | Distance limitations are preventing the students from connecting |
B | The students are attempting to connect 802.11g devices |
C | The students are using more than one wireless device port seat |
D | One of the wireless access points is on the wrong frequency |
Question 36 |
A | MITM attack |
B | Spoofing attack |
C | Wardriving |
D | DDoS attack |
E | Session hijacking |
Question 37 |
A | SRV |
B | MX |
C | AAAA |
D | CNAME |
Question 38 |
A | Disable DHCP service on the server |
B | Disable the SMTP service on the server |
C | Disable FTP service on the server |
D | Disable Telnet service on the server |
Question 39 |
A | Implement stacking on the switches in the rack |
B | Install a power converter for the switch |
C | Add a redundant power supply to the switch |
D | Add a second UPS into the rack |
Question 40 |
A | MITM |
B | Phishing |
C | OCSP stapling |
D | DDoS |
E | Evil twin |
Question 41 |
A | Enforcing a stronger password policy and using a hand geometry scan |
B | Using a smart card and RSA token |
C | Adding a fingerprint reader and retina scanner |
D | Adding a fingerprint reader to each workstation and providing a RSA authentication token |
Question 42 |
A | Reset the two-factor token. |
B | Disable virtual ports. |
C | Upgrade the firmware. |
D | Disable unused ports. |
Question 43 |
A | Perform a traceroute command to identify the router that is not functioning. |
B | Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address. |
C | Change the IP scope on the DHCP server to a public IP address range. |
D | Verify the host has physical connectivity and is on the correct VLAN. |
Question 44 |
A | IaaS |
B | SaaS |
C | NAS |
D | SAN |
Question 45 |
A | sanuja |
B | root |
C | systemd |
D | top |
E | gdm |
Question 46 |
A | Port 123 and 8080 |
B | Ports 20 and 21 |
C | Ports 80 and 443 |
D | Ports 67 and 68 |
E | Ports 56 and 57 |
Question 47 |
A | iSCSI |
B | FCoE |
C | InfiniBand |
D | OC3 |
Question 48 |
A | Layer 1 – Physical |
B | Layer 6 - Presentation |
C | Layer 7 – Application |
D | Layer 4 – Transport |
E | Layer 3 – Network |
Question 49 |
A | H.323 |
B | SMB |
C | RTP |
D | ICMP |
E | NTP |
F | SIP |
Question 50 |
A | public/private networks |
B | packet flow |
C | network devices |
D | traffic-routing protocols |
Question 51 |
A | MAC filtering |
B | Geofencing |
C | Pre-shared key |
D | Open wireless |
Question 52 |
A | Router |
B | Hub |
C | Switch |
D | Bridge |
Question 53 |
A | Routing table |
B | DHCP |
C | Routing loop |
D | Route redistribution |
E | Dynamic routes |
Question 54 |
A | Allocation of IP addresses |
B | Synchronization of clocks over a computer network |
C | Monitoring of network-attached devices |
D | Retrieving contents of an Internet page from a web server |
Question 55 |
A | Jitter |
B | Crosstalk |
C | Open/short on the cable |
D | Transceiver mismatch |
Question 56 |
A | Incremental |
B | Replica |
C | Differential |
D | Snapshots |
Question 57 |
A | Test solutions |
B | Question users |
C | Implement preventive measures |
D | Duplicate the problem |
E | Establish a theory of probable cause |
F | Document findings |
Question 58 |
A | Telnet |
B | DHCP |
C | FTP |
D | TFTP |
E | SCP |
Question 59 |
A | ipconfig /all |
B | ipconfig /release |
C | ipconfig /flushdns |
D | ipconfig /renew |
Question 60 |
A | 1000BaseSX |
B | 1000BaseLX |
C | 10Base2 |
D | 1000BaseT |
E | 10Base5 |
F | 10GBaseT |
Question 61 |
A | Tone generator |
B | Cable tester |
C | Multimeter |
D | Loopback adapter |
Question 62 |
A | Multilayer switch |
B | Switch |
C | Next-generation firewall |
D | Bridge |
Question 63 |
A | Implement a chain of custody |
B | Document the scene |
C | Take pictures upon arrival |
D | Secure the area |
Question 64 |
A | iSCSI |
B | PPP |
C | Fibre Channel |
D | RDMA |
Question 65 |
A | Cat 7 |
B | Cat 5e |
C | Cat 6a |
D | Cat 6 |
Question 66 |
A | TTL |
B | MTU |
C | Speed |
D | Duplex |
Question 67 |
A | Because FTP is not a secure service |
B | Because SCP is not a secure service |
C | Because a secure firewall will protect the device |
D | Because secure protocols would reject malicious packets |
Question 68 |
A | Media converter |
B | Router |
C | Firewall |
D | Network switch |
E | Wireless access point |
Question 69 |
A | -i address |
B | -a |
C | /all |
D | eth_addr |
Question 70 |
A | WAP power level controls |
B | Network mapper |
C | Logical network diagram |
D | Protocol analyzer |
Question 71 |
A | Door locks |
B | Biometric scanners |
C | Video surveillance |
D | Motion detectors |
Question 72 |
A | Physical |
B | Network |
C | Transport |
D | Application |
Question 73 |
A | AUP |
B | NDA |
C | DLP |
D | SLA |
Question 74 |
A | DHCP reservation for the laptops MACs |
B | CNAME record in the users dynamic DNS accounts |
C | Additional lease time for the laptop computers |
D | IP helper relay system for configuration hops |
Question 75 |
A | PVC |
B | Single-mode |
C | Plenum |
D | Cat 7 |
Question 76 |
A | VoIP PBX |
B | Content filter |
C | RADIUS server |
D | Wireless controller |
Question 77 |
“The Security certificate presented by this website was not trusted by trusted certificate authority.”
Sanuja has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error. Which of the following is the MOST likely cause of this error?
A | TLS is not enabled in the browser. |
B | The web server is missing an intermediate certificate. |
C | The SSL certificate has expired. |
D | The website is missing an HTTPS certificate. |
Question 78 |
A | There are nine collision domains and three broadcast
domains. |
B | There is one collision domain and one broadcast domain. |
C | There are three collision domains and one broadcast domain. |
D | There are three collision domains and three broadcast
domains. |
E | There are seven collision domains and three broadcast
domains. |
Question 79 |
A | CRL |
B | CSR |
C | Key escrow |
D | OCSP |
Question 80 |
A | Gather information |
B | Determine the symptoms |
C | Establish a plan of action |
D | Document the findings |
Question 81 |
A | Move the fiber cable to a different port on the switch where both strands function |
B | Replace the server's single-mode fiber cable with multimode fiber |
C | Use a TDR to test both strands of a new replacement cable prior to connecting it to the server |
D | Reverse the fiber strands of the cable and reconnect them to the server |
Question 82 |
A | The server IP address is incorrectly configured |
B | The reverse DNS entry is pointing to a different host |
C | There is no reverse DNS entry for this host |
D | The DNS lookup entry is incorrectly configured |
Question 83 |
A | VPN concentrator |
B | IDS |
C | Load balancer |
D | Proxy server |
E | IPS |
Question 84 |
A | 2001::d58::95:7565:1 |
B | 2001:0:d58:0:0:95:7565:1 |
C | 2001:0:0d58::95:7565:1 |
D | 2001:0:d58::95:7565:1 |
Question 85 |
A | Client-to-site |
B | Point-to-point |
C | Site-to-site |
D | Point-to-multipoint |
Question 86 |
A | Escalate the ticket to a senior technician |
B | Do nothing |
C | Implement the solution |
D | Establish a theory of probable cause |
E | Document the findings and outcomes |
Question 87 |
A | NS |
B | CNAME |
C | A |
D | MX |
E | PTR |
Question 88 |
A | Reverse the wires leading to pins 1 and 3 |
B | Reverse the wires leading to pins 2 and 3 |
C | Reverse the wires leading to pins 2 and 4 |
D | Reverse the wires leading to pins 1 and 2 |
Question 89 |
A | 2046 |
B | 1024 |
C | 2048 |
D | 510 |
E | 512 |
F | 1022 |
Question 90 |
A | 10.8.0.0/16 |
B | 10.8.0.0/20 |
C | 10.0.0.0/24 |
D | 10.8.0.0/19 |
Question 91 |
-WLAN architecture supporting speeds in excess of 150 Mbps
-Client less remote network access
-Port-based network access control
A | 802.11a, IPSec VPN, 802.1x |
B | 802.11g, MS-CHAP, 802.16 |
C | 802.11ac, MPLS, 802.3 |
D | 802.11b, PPTP,802.1x |
E | 802.11n, SSL-VPN, 802.1x |
Question 92 |
A | Loop protection is enabled on the root port of a switch. |
B | The STP root bridge cannot be changed. |
C | Broadcast storms entering from a root port are blocked. |
D | BPDUs entering the root bridge are ignored. |
Question 93 |
A | SPF |
B | SFP |
C | MDI-X |
D | ASIC |
E | GBIC |
Question 94 |
A | Spoofing attacks require physical presence |
B | DDoS attacks are launched from multiple hosts |
C | Spoofing attacks originate from a single host |
D | DDoS attacks target multiple networks |
Question 95 |
User A
IP address: 192.168.1.121
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
User B
IP address: 192.168.1.125
Subnet mask: 255.255.248.0
Default gateway: 192.168.1.1
A | User B's IP address is not a loopback address |
B | The subnet values should be the same |
C | There is no problem identifiable by the values given. |
D | The default gateway should have different values |
Question 96 |
A | DNS |
B | ICMP |
C | HTTP |
D | LADP |
E | DHCP |
Question 97 |
A | Port 161 |
B | Port 25 |
C | Port 123 |
D | Port 69 |
Question 98 |
A | Require a pre-shared key for authentication to the wireless network |
B | Use MAC filtering for authorization to the wireless network |
C | Require PEAP for authentication to the wireless network |
D | Implement a Faraday cage within the building premises |
Question 99 |
A | Jumbo frames |
B | Port aggregation |
C | iSCSI |
D | QoS tags |
Question 100 |
A | RJ45 |
B | SFTP |
C | LC |
D | GBIC |
E | DB-9 |
F | SC |
Question 101 |
A | Bidirectional SFP |
B | 1000BaseLX SFP |
C | Duplex SFP+ |
D | Duplex GBIC |
Question 102 |
A | Datagrams |
B | Packets |
C | Segments |
D | Frames |
Question 103 |
A | PEAP |
B | Captive portal |
C | EAP-TLS |
D | WP2-PSK |
Question 104 |
A | Duplicate IP addresses |
B | Loopback address |
C | Duplicate MAC addresses |
D | APIPA address |
Question 105 |
A | TCP offloading |
B | Load balancer |
C | Round robin |
D | Jumbo frames |
E | Clustering |
Question 106 |
route add 0.0.0.0 mask 0.0.0.0 192.169.1.222 metric 1
A | The technician is setting the default gateway. |
B | The technician is clearing the subnet mas setting. |
C | The technician is adding a static IP address. |
D | The technician is clearing the route table. |
Question 107 |
A | Create a port location diagram |
B | Create a rack diagram |
C | Create a network baseline |
D | Create an inventory database |
Question 108 |
A | Social engineering |
B | Evil twin |
C | ARP poisoning |
D | Session hijacking |
E | DHCP exhaustion |
Question 109 |
A | Multimeter |
B | Spectrum analyzer |
C | OTDR |
D | Tone generator |
E | Protocol analyzer |
Question 110 |
A | RFI |
B | SVC |
C | SNR |
D | BRI |
Question 111 |
A | Rack location |
B | Hostname |
C | Room number |
D | Media type |
Question 112 |
A | Broadband |
B | Baseband |
C | Analog modem |
D | CSMA |
Question 113 |
A | Jitter |
B | Latency |
C | Frequency mismatch |
D | Attenuation |
Question 114 |
A | It cannot be used on modern Windows computers. |
B | Transmits data in an unencrypted form. |
C | Encrypts network connection. |
D | Provides username & password authentication. |
E | It does not provide authentication. |
F | Enables remote login and command execution. |
Question 115 |
A | Video cameras |
B | Swipe badges |
C | Motion sensors |
D | Sign-in sheets |
Question 116 |
A | Duplicate IP address |
B | Duplex/Speed mismatch |
C | VLAN mismatch |
D | TX/RX reverse |
Question 117 |
A | Equipment closet |
B | Demarcation point |
C | Intermediate distribution frame |
D | Server room |
Question 118 |
A | Asset disposal |
B | Data loss prevention |
C | Incident response |
D | Acceptable use |
Question 119 |
A | ACL misconfiguration |
B | Bad port |
C | Crosstalk |
D | Duplex/speed mismatch |
Question 120 |
A | SSH |
B | CHAP |
C | FTP |
D | SNMP |
E | SSL |
Question 121 |
A | None of the answers are correct. |
B | IP |
C | TCP |
D | Ethernet |
E | UDP |
Question 122 |
Which of the following ones should the technician use to place the webserver and which of the following firewall rules should the technician configure?
A | Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the webserver |
B | Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the webserver |
C | Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the webserver |
D | Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the webserver |
Question 123 |
A | Loopback adapter |
B | Punchdown tool |
C | Tone generator |
D | Multimeter |
Question 124 |
A | Port 443 |
B | Port 22 |
C | Port 80 |
D | Port 110 |
E | Port 110 |
Question 125 |
A | Bus |
B | Ring |
C | Mesh |
D | Star |
Question 126 |
Which of the following would MOST likely allow the network drives to be accessed?
A | Disable the WLAN adapter |
B | Check the wireless DHCP configuration |
C | Update the WLAN adapter driver |
D | Disable the LAN adapter |
Question 127 |
Image Credits: https://www.homedepot.com/p/ Ideal-Punchdown-Tool- with-110-and-66- Blades-35-485/ 203761571
A | Butt set |
B | Crimper |
C | Punchdown tool |
D | Tone generator and locator |
Question 128 |
A | Attenuation |
B | Open/short |
C | EMI |
D | TX/RX reverse |
Question 129 |
A | Reviewing SLA requirements |
B | Reviewing application logs |
C | Reviewing a vulnerability scan |
D | Reviewing a baseline report |
Question 130 |
A | traceroute |
B | Nmap |
C | pathping |
D | netstat |
Question 131 |
A | Rogue DHCP server |
B | Expired IP address |
C | Exhausted dynamic scope |
D | Misconfigured VLSM |
Question 132 |
A | Samba |
B | LDAP |
C | Telnet |
D | TFTP |
Question 133 |
A | Biometric device |
B | Proximity reader |
C | Identification card |
D | Video camera |
Question 134 |
A | There are 9 collision domains, one for each half-duplex connection. |
B | There are 3 collision domains, one for each switch-to-switch connection. |
C | There are 12 collision domains, one for each switch connection. |
D | There is one collision domain for this network. |
Question 135 |
A | The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules. |
B | The LAN and WLAN should be configured in separate zones with a firewall in between. |
C | The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours. |
D | The LAN and WLAN should be configured in the DMZ so traffic is denied automatically. |
Question 136 |
A | SSH over IPsec client-to-site VPN |
B | RDP over SSLv2 HTTPS terminal services gateway |
C | HTTP over WPA2-TKIP WiFi |
D | Telnet over PSTN |
Question 137 |
A | Logic bomb |
B | Insider threat |
C | Social engineering |
D | Session hijacking |
E | Trojan horse |
Question 138 |
A | The use of lightweight APs with a load balancer |
B | The use of autonomous APs with a load balancer |
C | The use of lightweight APs with a wireless controller |
D | The use of autonomous APs with a wireless controller |
Question 139 |
A | Ransomware |
B | Spam |
C | Man-in-the-middle |
D | Phishing |
Question 140 |
A | 5 collision domains, 48 segments |
B | 240 usable IP addresses |
C | 48 networks, 5 segments |
D | 240 private networks |
E | 48 collision domains, 5 broadcast domains |
Question 141 |
A | MAC reservation |
B | IP helper |
C | DHCP timer |
D | Lease time |
E | Pool |
Question 142 |
A | FTPS |
B | TFTP |
C | Telnet |
D | SFTP |
E | SSL |
Question 143 |
A | Backs up all files and sets the archive bit. |
B | Backs up files with the archive bit set but does not clear the bit. |
C | Backs up files with a date earlier than today’s date with a clear archive bit. |
D | Backs up files with the creation or modified date as the current date. |
Question 144 |
A | Fiber-optic cabling |
B | UTP cabling |
C | STP cabling |
D | Coaxial cabling |
Question 145 |
A | International export controls |
B | Incident response policy |
C | Remote access policies |
D | Licensing restrictions |
E | Data loss prevention |
Question 146 |
A | The cable is a crossover cable |
B | The cable has bent pins |
C | The cable is a Cat 5 cable |
D | The cable is rollover cable |
E | The cable is damaged |
Question 147 |
A | Multimeter |
B | Packet sniffer |
C | OTDR |
D | Spectrum analyzer |
Question 148 |
A | EAP-TLS |
B | Captive portal |
C | WPA2 |
D | SSL certificate |
E | MAC filtering |
Question 149 |
A | dig |
B | nmap |
C | tcpdump |
D | arp |
Question 150 |
A | The Faraday cage prevents access by redirecting signals. |
B | The Faraday cage is creating latency on the cellular network. |
C | The Faraday cage is creating attenuation of the cellular network. |
D | The Faraday cage is creating interference within the bookstore. |
Question 151 |
A | Telnet into the router over a secure VPN. |
B | Implementing a modem on the AUX port to access a network device. |
C | Using a secure SSH connection over the WAN link to connect to a server. |
D | Accessing a DSL router via the console port. |
Question 152 |
A | DMZ |
B | Data tier |
C | Demarc |
D | IDF |
Question 153 |
A | Fiber Channel |
B | VPC |
C | vSAN |
D | Virtual switch |
E | FCoE |
Question 154 |
A | The ports replied with a SYN/ACK response |
B | The ports are associated with deprecated services |
C | The ports do not belong to a live system |
D | The ports belong to an active system and are denying requests |
Question 155 |
A | MOU |
B | NDA |
C | BYOD |
D | AUP |
Question 156 |
A | Channel 7 |
B | Channel 6 |
C | Channel 10 |
D | Channel 9 |
Question 157 |
A | pathping |
B | nslookup |
C | nbtstat |
D | netstat |
Question 158 |
A | authpriv |
B | Authentication passphrase |
C | MD5 |
D | SHA |
Question 159 |
A | SIP |
B | VLANs |
C | STP |
D | DSCP |
Question 160 |
A | PRI |
B | Frame relay |
C | MPLS |
D | Broadband cable |
E | ISDN |
Question 161 |
A | 5GHz |
B | 2.4 GHz |
C | 56MHz |
D | 900MHz |
Question 162 |
A | 802.1q |
B | 802.11ac |
C | 802.3at |
D | 802.3af |
E | 802.1X |
Question 163 |
A | Install a repeater to boost the signal to its destination |
B | Set the AP to half-duplex to compensate for signal loss |
C | Replace the UTP cable with plenum cable |
D | Upgrade the cable from Cat 5 to Cat 5e or Cat 6 |
Question 164 |
A | Change management |
B | Rack diagram |
C | Network configuration |
D | Network diagram |
Question 165 |
A | DDoS |
B | DNS sinkhole |
C | DDoS |
D | MITM |
E | IDS firewall |
Question 166 |
A | SSH in tunnel mode |
B | SFTP |
C | EAP-PEAP |
D | RDP set to console connection |
Question 167 |
Subnet 1: 192.168.1.0/26
Subnet 2: 192.168.1.65/26
Company B uses the following scheme:
Subnet 1: 192.168.1.50/28
A | DMZ |
B | PAT |
C | VLAN |
D | NAT |
Question 168 |
A | Cat 5 |
B | Cat 3 |
C | RG-6 |
D | SMF |
E | Cat 6 |
Question 169 |
A | Add a second cable connecting the switches for redundancy and disabling STP on both switches. |
B | Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end. |
C | Move the straight-through Ethernet cable connecting the switches to the first port on both switches. |
D | Replace the new switch with a hub to ensure Layer1 connectivity on the new network segment. |
Question 170 |
A | DHCP |
B | DNS |
C | NetBIOS |
D | ICMP |
E | HTTP |
Question 171 |
A | RDP |
B | SMB |
C | SNMP |
D | SSL |
E | NTP |
Question 172 |
A | 1 |
B | 0 |
C | 12 |
D | 6 |
E | 2 |
Question 173 |
IP: 192.168.1.100
Mask: 255.255.255.0
Router: 192.168.1.1
A | Security type mismatch |
B | Interference |
C | Wrong SSID |
D | Channel overlap |
Question 174 |
A | Upgrade to the latest firmware |
B | Review and modify the firewall rules |
C | Verify the default passwords have been changed |
D | Generate new SSH keys |
Question 175 |
A | Implement WEP authentication. |
B | Disable the SSID broadcast. |
C | Change the WiFi password. |
D | Activate MAC address filtering. |
Question 176 |
A | The finance department should have 172.16.49.127 as a broadcast address. |
B | The legal department should have a first usable IP address of 172.16.49.190. |
C | The marketing department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
D | The marketing department should receive a /25 network. |
E | The R&D department should receive a /27 network. |
F | The R&D department should have 172.16.49.207 as a broadcast address. |
G | The legal department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
H | The R&D department should have a last usable IP address of 172.16.49.190. |
Question 177 |
A | OUI |
B | SNMP agent |
C | OTDR |
D | OID |
E | SNMP host |
Question 178 |
A | SSH |
B | LDAP |
C | TLS |
D | SFTP |
Question 179 |
A | dig |
B | ipconfig |
C | nslookup |
D | arp |
Question 180 |
A | SSL VPN |
B | IPSec |
C | PTP |
D | PPTP |
Question 181 |
A | Generate new keys |
B | Change default credentials |
C | Update firmware |
D | Perform file hashing |
Question 182 |
A | Host-based firewall settings |
B | TACAS+ server time |
C | DNS SRV record |
D | Server IP address |
Question 183 |
A | Access point |
B | DOCSIS modem |
C | DSL modem |
D | Wireless router |
E | Demarc |
Question 184 |
A | Dynamic DNS |
B | Intrusion detection |
C | Content filtering |
D | Proxy service |
Question 185 |
A | Load balancer |
B | Switch |
C | Router |
D | Proxy server |
Question 186 |
A | Adding a router reduces the amount of unicast traffic on each of the two LANs. |
B | Adding a router diverts traffic to an alternate path through the network. |
C | Adding a router reduces the amount of broadcast traffic on each of the two LANs. |
D | Adding a router prevents computers on one LAN from communicating with computers on another LAN. |
Question 187 |
A | IEEE 802.1q |
B | IEEE 802.1X |
C | IEEE 802.3x |
D | IEEE 802.11ac |
Question 188 |
A | One router connected to one 24-port switch configured with two VLANS: one for the manager's computers, VoIP phones, and printer, and one for the other computers, VoIP phones, and printer |
B | One router connected to one 12-port switch configured for the manager's computers, phones, and printer, and one 12-port switch configured for the other computers, VoIP phones, and printer |
C | One router connected to one 24-port switch configured with three VLANS: one for the manager's computers and printer, one for the other computers and printer, and one for the VoIP phones |
D | Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the manager's desktop computers, VoIP phones, and printer |
Question 189 |
A | Spanning tree |
B | Port aggregation |
C | Port mirroring |
D | Trunking |
Question 190 |
A | 192.168.12.97 to 255.255.255.192 |
B | 192.168.12.97 to 255.255.255.240 |
C | 192.168.12.97 to 255.255.255.224 |
D | 192.168.12.97 to 255.255.255.248 |
Question 191 |
A | IP helper |
B | DNS record type |
C | TTL |
D | DHCP lease time |
E | Ping table |
Question 192 |
A | WEP-TKIP |
B | AES-CCMP |
C | WPA-PSK |
D | EAP-TLS |
Question 193 |
A | Duplex mismatch |
B | VLAN mismatch |
C | Crosstalk |
D | Damaged cables |
E | TX/RX reverse |
F | Bent pins |
Question 194 |
A | Create a honeypot to attract attackers. |
B | Create a VLAN for all unused switchports. |
C | Implement a DMZ for all external services. |
D | Implement root guard on all switches. |
Question 195 |
A | Use an HTTP server to share the file. |
B | Use a TFTP server and UDP protocol. |
C | Use an FTP server and provide the file hash. |
D | Use a modem and dial-up connection. |
Question 196 |
A | Label existing systems with current hostnames |
B | Forward the DHCP logs to the security manager every day |
C | Enforce port security to require system authentication |
D | Implement a standardized UNC |
Question 197 |
A | Star |
B | Ad hoc |
C | Mesh |
D | Ring |
Question 198 |
A | Layer 2 switch |
B | Bridge |
C | Layer 3 switch |
D | Load balancer |
Question 199 |
A | Transport |
B | Presentation |
C | Data link |
D | Session |
Question 200 |
A | Switch configuration |
B | Attenuation |
C | Damaged cable |
D | Incorrect pin-out |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.