← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set III
CompTIA Network+ N10-007 - Set II
Congratulations - you have completed CompTIA Network+ N10-007 - Set II.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | There are seven collision domains and three broadcast
domains. |
B | There is one collision domain and one broadcast domain. |
C | There are three collision domains and one broadcast domain. |
D | There are nine collision domains and three broadcast
domains. |
E | There are three collision domains and three broadcast
domains. |
Question 2 |
A | 2001:0:d58::95:7565:1 |
B | 2001:0:0d58::95:7565:1 |
C | 2001:0:d58:0:0:95:7565:1 |
D | 2001::d58::95:7565:1 |
Question 3 |
A | PPTP |
B | IPSec |
C | PTP |
D | SSL VPN |
Question 4 |
A | Point-to-point |
B | Client-to-site |
C | Point-to-multipoint |
D | Site-to-site |
Question 5 |
A | Document the findings |
B | Gather information |
C | Determine the symptoms |
D | Establish a plan of action |
Question 6 |
A | The use of autonomous APs with a wireless controller |
B | The use of autonomous APs with a load balancer |
C | The use of lightweight APs with a wireless controller |
D | The use of lightweight APs with a load balancer |
Question 7 |
A | Port aggregation |
B | Trunking |
C | Port mirroring |
D | Spanning tree |
Question 8 |
A | PVC |
B | Single-mode |
C | Cat 7 |
D | Plenum |
Question 9 |
A | Replace the new switch with a hub to ensure Layer1 connectivity on the new network segment. |
B | Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end. |
C | Move the straight-through Ethernet cable connecting the switches to the first port on both switches. |
D | Add a second cable connecting the switches for redundancy and disabling STP on both switches. |
Question 10 |
A | risk assessment. |
B | penetration testing. |
C | device hardening. |
D | role separation. |
Question 11 |
A | Distance limitations are preventing the students from connecting |
B | One of the wireless access points is on the wrong frequency |
C | The students are attempting to connect 802.11g devices |
D | The students are using more than one wireless device port seat |
Question 12 |
A | Verify the default passwords have been changed |
B | Upgrade to the latest firmware |
C | Generate new SSH keys |
D | Review and modify the firewall rules |
Question 13 |
A | ipconfig /flushdns |
B | ipconfig /all |
C | ipconfig /release |
D | ipconfig /renew |
Question 14 |
A | 192.168.12.97 to 255.255.255.224 |
B | 192.168.12.97 to 255.255.255.240 |
C | 192.168.12.97 to 255.255.255.248 |
D | 192.168.12.97 to 255.255.255.192 |
Question 15 |
A | Presentation |
B | Transport |
C | Data link |
D | Session |
Question 16 |
A | Demarc |
B | Wireless router |
C | Access point |
D | DSL modem |
E | DOCSIS modem |
Question 17 |
A | It cannot be used on modern Windows computers. |
B | Provides username & password authentication. |
C | Enables remote login and command execution. |
D | It does not provide authentication. |
E | Transmits data in an unencrypted form. |
F | Encrypts network connection. |
Question 18 |
A | PRI |
B | Frame relay |
C | Broadband cable |
D | MPLS |
E | ISDN |
Question 19 |
-WLAN architecture supporting speeds in excess of 150 Mbps
-Client less remote network access
-Port-based network access control
A | 802.11g, MS-CHAP, 802.16 |
B | 802.11ac, MPLS, 802.3 |
C | 802.11b, PPTP,802.1x |
D | 802.11a, IPSec VPN, 802.1x |
E | 802.11n, SSL-VPN, 802.1x |
Question 20 |
A | The R&D department should have a last usable IP address of 172.16.49.190. |
B | The R&D department should have 172.16.49.207 as a broadcast address. |
C | The R&D department should receive a /27 network. |
D | The legal department should have a first usable IP address of 172.16.49.190. |
E | The marketing department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
F | The legal department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
G | The marketing department should receive a /25 network. |
H | The finance department should have 172.16.49.127 as a broadcast address. |
Question 21 |
A | SaaS |
B | SAN |
C | IaaS |
D | NAS |
Question 22 |
A | Modify the speed and duplex |
B | Plug in to another port |
C | Replace the NIC |
D | Change the switch |
Question 23 |
A | The technician should use a packet tracer to see if the traffic is getting out of the network |
B | The technician should run ping tests on the Internet line to monitor for packet loss and latency |
C | The technician should check the internal diagnostics on all the phones to look for a common thread |
D | The technician should reset all the phones and deprovision information from the provider |
Question 24 |
A | Port 80 |
B | Port 110 |
C | Port 22 |
D | Port 443 |
E | Port 110 |
Question 25 |
A | IDF/MDF documentation |
B | Performance baseline |
C | Physical diagram |
D | Change management |
Question 26 |
A | Reverse the wires leading to pins 1 and 3 |
B | Reverse the wires leading to pins 2 and 3 |
C | Reverse the wires leading to pins 1 and 2 |
D | Reverse the wires leading to pins 2 and 4 |
Question 27 |
A | Proxy service |
B | Intrusion detection |
C | Content filtering |
D | Dynamic DNS |
Question 28 |
A | Jumbo frames |
B | TCP offloading |
C | Load balancer |
D | Clustering |
E | Round robin |
Question 29 |
A | Duplex GBIC |
B | 1000BaseLX SFP |
C | Duplex SFP+ |
D | Bidirectional SFP |
Question 30 |
A | Spectrum analyzer |
B | TDR |
C | Loopback adapter |
D | OTDR |
Question 31 |
A | Motion sensors |
B | Video cameras |
C | Swipe badges |
D | Sign-in sheets |
Question 32 |
A | Monitoring of network-attached devices |
B | Allocation of IP addresses |
C | Retrieving contents of an Internet page from a web server |
D | Synchronization of clocks over a computer network |
Question 33 |
A | Spoofing attacks require physical presence |
B | DDoS attacks are launched from multiple hosts |
C | DDoS attacks target multiple networks |
D | Spoofing attacks originate from a single host |
Question 34 |
A | SSL |
B | RDP |
C | SMB |
D | NTP |
E | SNMP |
Question 35 |
A | Switch |
B | Hub |
C | Router |
D | Bridge |
Question 36 |
A | VLAN mismatch |
B | TX/RX reverse |
C | Damaged cables |
D | Bent pins |
E | Crosstalk |
F | Duplex mismatch |
Question 37 |
A | Logical network diagram |
B | Protocol analyzer |
C | WAP power level controls |
D | Network mapper |
Question 38 |
A | Reviewing a baseline report |
B | Reviewing a vulnerability scan |
C | Reviewing SLA requirements |
D | Reviewing application logs |
Question 39 |
A | Mesh |
B | Star |
C | Bus |
D | Ring |
Question 40 |
A | Multimeter |
B | Spectrum analyzer |
C | Packet sniffer |
D | OTDR |
Question 41 |
A | Loop protection is enabled on the root port of a switch. |
B | The STP root bridge cannot be changed. |
C | Broadcast storms entering from a root port are blocked. |
D | BPDUs entering the root bridge are ignored. |
Question 42 |
A | root |
B | sanuja |
C | gdm |
D | top |
E | systemd |
Question 43 |
“The Security certificate presented by this website was not trusted by trusted certificate authority.”
Sanuja has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error. Which of the following is the MOST likely cause of this error?
A | The website is missing an HTTPS certificate. |
B | The SSL certificate has expired. |
C | The web server is missing an intermediate certificate. |
D | TLS is not enabled in the browser. |
Question 44 |
A | SIP |
B | DSCP |
C | VLANs |
D | STP |
Question 45 |
A | Disable virtual ports. |
B | Disable unused ports. |
C | Reset the two-factor token. |
D | Upgrade the firmware. |
Question 46 |

Which of the following ones should the technician use to place the webserver and which of the following firewall rules should the technician configure?
A | Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the webserver |
B | Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the webserver |
C | Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the webserver |
D | Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the webserver |
Question 47 |
A | DHCP timer |
B | Pool |
C | Lease time |
D | IP helper |
E | MAC reservation |
Question 48 |
A | AUP |
B | NDA |
C | SLA |
D | DLP |
Question 49 |
A | Differential |
B | Incremental |
C | Snapshots |
D | Replica |
Question 50 |
A | Bridge |
B | Load balancer |
C | Layer 2 switch |
D | Layer 3 switch |
Question 51 |
A | DHCP |
B | Routing loop |
C | Route redistribution |
D | Routing table |
E | Dynamic routes |
Question 52 |
A | Authentication passphrase |
B | SHA |
C | MD5 |
D | authpriv |
Question 53 |
A | Implement WEP authentication. |
B | Activate MAC address filtering. |
C | Disable the SSID broadcast. |
D | Change the WiFi password. |
Question 54 |
A | NDA |
B | AUP |
C | MOU |
D | BYOD |
Question 55 |
A | SFTP |
B | LDAP |
C | SSH |
D | TLS |
Question 56 |
A | Motion detectors |
B | Door locks |
C | Video surveillance |
D | Biometric scanners |
Question 57 |
A | There is additional data being transferred over the wireless network |
B | The utility company throttles power during peak hours |
C | There is interference with the smart reader |
D | An IoT device is causing a DoS attack on the wireless network |
Question 58 |
A | Multiple NAT |
B | Clustering |
C | NIC teaming |
D | Load balancing |
E | Redundant circuits |
Question 59 |
A | 6 |
B | 2 |
C | 0 |
D | 1 |
E | 12 |
Question 60 |

Which of the following devices is causing the issue?
A | Router |
B | Switch 1 |
C | Firewall |
D | Switch 2 |
Question 61 |
A | Social engineering |
B | Session hijacking |
C | DHCP exhaustion |
D | ARP poisoning |
E | Evil twin |
Question 62 |
A | Media converter |
B | Firewall |
C | Router |
D | Wireless access point |
E | Network switch |
Question 63 |
A | Switch |
B | Bridge |
C | Next-generation firewall |
D | Multilayer switch |
Question 64 |
A | Add a second UPS into the rack |
B | Install a power converter for the switch |
C | Implement stacking on the switches in the rack |
D | Add a redundant power supply to the switch |
Question 65 |
A | Implement a DMZ for all external services. |
B | Implement root guard on all switches. |
C | Create a VLAN for all unused switchports. |
D | Create a honeypot to attract attackers. |
Question 66 |
A | DHCP |
B | Telnet |
C | TFTP |
D | FTP |
E | SCP |
Question 67 |
A | Datagrams |
B | Frames |
C | Packets |
D | Segments |
Question 68 |
A | Server IP address |
B | Host-based firewall settings |
C | DNS SRV record |
D | TACAS+ server time |
Question 69 |
A | Backs up files with a date earlier than today’s date with a clear archive bit. |
B | Backs up all files and sets the archive bit. |
C | Backs up files with the archive bit set but does not clear the bit. |
D | Backs up files with the creation or modified date as the current date. |
Question 70 |
A | SRV |
B | CNAME |
C | MX |
D | AAAA |
Question 71 |
A | permit tcp any any eq 20 |
B | permit udp any any eq 25 |
C | permit udp any any eq 68 |
D | permit udp any any eq 53 |
E | permit tcp any any eq 110 |
F | permit tcp any any eq 8080 |
Question 72 |
A | Ransomware |
B | Man-in-the-middle |
C | Phishing |
D | Spam |
Question 73 |
A | There are 3 collision domains, one for each switch-to-switch connection. |
B | There are 12 collision domains, one for each switch connection. |
C | There are 9 collision domains, one for each half-duplex connection. |
D | There is one collision domain for this network. |
Question 74 |
A | EMI |
B | Open/short |
C | TX/RX reverse |
D | Attenuation |
Question 75 |
A | Inventory report |
B | Labeling report |
C | Change management |
D | Network diagrams |
Question 76 |
A | Channel 9 |
B | Channel 10 |
C | Channel 7 |
D | Channel 6 |
Question 77 |
A | Port 161 |
B | Port 25 |
C | Port 123 |
D | Port 69 |
Question 78 |
A | Network configuration |
B | Rack diagram |
C | Change management |
D | Network diagram |
Question 79 |
A | 3DES encryption |
B | SSL certificate |
C | Digital signatures |
D | Digital signatures |
Question 80 |
Gigabit Ethernet 1 Interface: 10.10.0.1/24 Serial 0 Interface: 10.10.0.253/30
A | The router was configured with an incorrect loopback address |
B | The router was configured with an incorrect IP address |
C | The router was configured with an incorrect subnet mask |
D | The router was configured with an incorrect default gateway |
Question 81 |
A | Spectrum analyzer |
B | OTDR |
C | Protocol analyzer |
D | Multimeter |
E | Tone generator |
Question 82 |
A | 10.8.0.0/20 |
B | 10.8.0.0/19 |
C | 10.8.0.0/16 |
D | 10.0.0.0/24 |
Question 83 |
A | dig |
B | arp |
C | nslookup |
D | ipconfig |
Question 84 |
A | IEEE 802.11ac |
B | IEEE 802.1q |
C | IEEE 802.3x |
D | IEEE 802.1X |
Question 85 |
A | EAP-PEAP |
B | SSH in tunnel mode |
C | SFTP |
D | RDP set to console connection |
Question 86 |
A | Rack location |
B | Room number |
C | Hostname |
D | Media type |
Question 87 |
A | Attenuation |
B | Frequency mismatch |
C | Latency |
D | Jitter |
Question 88 |
A | BRI |
B | RFI |
C | SNR |
D | SVC |
Question 89 |
A | Load balancer |
B | Switch |
C | Router |
D | Proxy server |
Question 90 |
A | Social engineering |
B | Trojan horse |
C | Insider threat |
D | Session hijacking |
E | Logic bomb |
Question 91 |
A | Using a smart card and RSA token |
B | Enforcing a stronger password policy and using a hand geometry scan |
C | Adding a fingerprint reader and retina scanner |
D | Adding a fingerprint reader to each workstation and providing a RSA authentication token |
Question 92 |
A | iSCSI |
B | FCoE |
C | InfiniBand |
D | OC3 |
Question 93 |
A | TACACS+ |
B | Captive portal |
C | Single sign-on |
D | RADIUS |
Question 94 |
A | Disable Telnet service on the server |
B | Disable the SMTP service on the server |
C | Disable FTP service on the server |
D | Disable DHCP service on the server |
Question 95 |
route add 0.0.0.0 mask 0.0.0.0 192.169.1.222 metric 1
A | The technician is adding a static IP address. |
B | The technician is clearing the subnet mas setting. |
C | The technician is setting the default gateway. |
D | The technician is clearing the route table. |
Question 96 |
A | Loopback address |
B | Duplicate MAC addresses |
C | APIPA address |
D | Duplicate IP addresses |
Question 97 |
A | DDoS attack |
B | Wardriving |
C | MITM attack |
D | Session hijacking |
E | Spoofing attack |
Question 98 |
A | Cat 6 |
B | Cat 7 |
C | Cat 6a |
D | Cat 5e |
Question 99 |
A | Implement the solution |
B | Do nothing |
C | Establish a theory of probable cause |
D | Escalate the ticket to a senior technician |
E | Document the findings and outcomes |
Question 100 |
A | 56MHz |
B | 5GHz |
C | 2.4 GHz |
D | 900MHz |
Question 101 |
A | One router connected to one 24-port switch configured with three VLANS: one for the manager's computers and printer, one for the other computers and printer, and one for the VoIP phones |
B | One router connected to one 24-port switch configured with two VLANS: one for the manager's computers, VoIP phones, and printer, and one for the other computers, VoIP phones, and printer |
C | Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the manager's desktop computers, VoIP phones, and printer |
D | One router connected to one 12-port switch configured for the manager's computers, phones, and printer, and one 12-port switch configured for the other computers, VoIP phones, and printer |
Question 102 |
A | 802.3at |
B | 802.3af |
C | 802.1q |
D | 802.11ac |
E | 802.1X |
Question 103 |
A | Patch cable type |
B | Server-based firewall configuration issue |
C | DHCP scope availability |
D | VLAN routing |
Question 104 |
A | Physical |
B | Transport |
C | Application |
D | Network |
Question 105 |
A | AES-CCMP |
B | EAP-TLS |
C | WPA-PSK |
D | WEP-TKIP |
Question 106 |
A | Tone generator |
B | Multimeter |
C | Cable tester |
D | Loopback adapter |
Question 107 |
A | OID |
B | SNMP host |
C | SNMP agent |
D | OUI |
E | OTDR |
Question 108 |
A | SLA |
B | NDA |
C | MOU |
D | AUP |
Question 109 |
A | Equipment closet |
B | Intermediate distribution frame |
C | Server room |
D | Demarcation point |
Question 110 |
A | /all |
B | -i address |
C | eth_addr |
D | -a |
Question 111 |
A | traffic-routing protocols |
B | packet flow |
C | public/private networks |
D | network devices |
Question 112 |
A | CHAP |
B | SSH |
C | SNMP |
D | SSL |
E | FTP |
Question 113 |
A | arp |
B | nmap |
C | dig |
D | tcpdump |
Question 114 |

Which of the following would MOST likely allow the network drives to be accessed?
A | Disable the WLAN adapter |
B | Update the WLAN adapter driver |
C | Check the wireless DHCP configuration |
D | Disable the LAN adapter |
Question 115 |
A | Create an inventory database |
B | Create a network baseline |
C | Create a port location diagram |
D | Create a rack diagram |
Question 116 |
A | Change the IP scope on the DHCP server to a public IP address range. |
B | Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address. |
C | Perform a traceroute command to identify the router that is not functioning. |
D | Verify the host has physical connectivity and is on the correct VLAN. |
Question 117 |
Image Credits: https://www.homedepot.com/p/ Ideal-Punchdown-Tool- with-110-and-66- Blades-35-485/ 203761571
A | Crimper |
B | Punchdown tool |
C | Tone generator and locator |
D | Butt set |
Question 118 |
A | IDF |
B | Data tier |
C | Demarc |
D | DMZ |
Question 119 |
A | Evil twin |
B | DDoS |
C | OCSP stapling |
D | Phishing |
E | MITM |
Question 120 |
A | 10Base2 |
B | 10GBaseT |
C | 1000BaseLX |
D | 1000BaseT |
E | 1000BaseSX |
F | 10Base5 |
Question 121 |
A | UDP |
B | None of the answers are correct. |
C | IP |
D | Ethernet |
E | TCP |
Question 122 |
A | Key escrow |
B | OCSP |
C | CSR |
D | CRL |
Question 123 |
A | Use a TFTP server and UDP protocol. |
B | Use a modem and dial-up connection. |
C | Use an HTTP server to share the file. |
D | Use an FTP server and provide the file hash. |
Question 124 |
A | MDI-X |
B | SFP |
C | ASIC |
D | SPF |
E | GBIC |
Question 125 |
A | Reverse the fiber strands of the cable and reconnect them to the server |
B | Move the fiber cable to a different port on the switch where both strands function |
C | Use a TDR to test both strands of a new replacement cable prior to connecting it to the server |
D | Replace the server's single-mode fiber cable with multimode fiber |
Question 126 |
A | Disable the SSID broadcast on each access point. |
B | Enable MAC address filtering on each access point. |
C | Enable AP isolation on each access point. |
D | Reduce the TX power on each access point. |
Question 127 |
A | HTTP |
B | ICMP |
C | DNS |
D | DHCP |
E | LADP |
Question 128 |
A | DHCP lease time |
B | IP helper |
C | DNS record type |
D | Ping table |
E | TTL |
Question 129 |
A | 802.11a |
B | 802.11ac |
C | 802.11b |
D | 802.11n |
Question 130 |
A | Disabling unnecessary services from the server and management software |
B | Replacing the management software's self-signed certificate with a valid certificate |
C | Changing the management software's default credentials |
D | Changing the management software's default port |
Question 131 |
A | Use MAC filtering for authorization to the wireless network |
B | Require PEAP for authentication to the wireless network |
C | Implement a Faraday cage within the building premises |
D | Require a pre-shared key for authentication to the wireless network |
Question 132 |
A | VLAN mismatch |
B | TX/RX reverse |
C | Duplicate IP address |
D | Duplex/Speed mismatch |
Question 133 |
A | HTTP |
B | DHCP |
C | ICMP |
D | NetBIOS |
E | DNS |
Question 134 |
A | Because FTP is not a secure service |
B | Because SCP is not a secure service |
C | Because a secure firewall will protect the device |
D | Because secure protocols would reject malicious packets |
Question 135 |
A | LC |
B | GBIC |
C | DB-9 |
D | SC |
E | RJ45 |
F | SFTP |
Question 136 |
A | TCP/IP |
B | DNS |
C | SQL |
D | DHCP |
Question 137 |
A | Cable 1 does not need to be plenum rated. |
B | None, the network looks good. |
C | Cable 3 should be an STP cable. |
D | Cable 2 should be an STP cable. |
Question 138 |
A | Label existing systems with current hostnames |
B | Implement a standardized UNC |
C | Forward the DHCP logs to the security manager every day |
D | Enforce port security to require system authentication |
Question 139 |
A | IPS |
B | Load balancer |
C | VPN concentrator |
D | Proxy server |
E | IDS |
Question 140 |
A | Additional lease time for the laptop computers |
B | DHCP reservation for the laptops MACs |
C | CNAME record in the users dynamic DNS accounts |
D | IP helper relay system for configuration hops |
Question 141 |
A | Cat 6 |
B | Cat 3 |
C | Cat 5 |
D | RG-6 |
E | SMF |
Question 142 |
A | DLP |
B | Remote access |
C | Offboarding |
D | Incident response |
E | AUP |
Question 143 |
A | nbtstat |
B | netstat |
C | pathping |
D | nslookup |
Question 144 |
A | CNAME |
B | A |
C | MX |
D | PTR |
E | NS |
Question 145 |
A | SIP |
B | SMB |
C | NTP |
D | RTP |
E | ICMP |
F | H.323 |
Question 146 |
A | VLAN hopping |
B | Man-in-the-middle |
C | MAC spoofing |
D | Bluesnarfing |
E | Session hijacking |
Question 147 |
A | Asset disposal |
B | Incident response |
C | Acceptable use |
D | Data loss prevention |
Question 148 |
A | Implement a chain of custody |
B | Take pictures upon arrival |
C | Secure the area |
D | Document the scene |
Question 149 |
A | Port aggregation |
B | iSCSI |
C | QoS tags |
D | Jumbo frames |
Question 150 |
A | SSL |
B | FTPS |
C | TFTP |
D | SFTP |
E | Telnet |
Question 151 |
A | 10.233.2.0/23 |
B | 192.168.25.0/24 |
C | 172.16.0.0/22 |
D | 172.18.0.0/23 |
E | 10.5.4.0/22 |
Question 152 |
A | The Faraday cage is creating attenuation of the cellular network. |
B | The Faraday cage prevents access by redirecting signals. |
C | The Faraday cage is creating interference within the bookstore. |
D | The Faraday cage is creating latency on the cellular network. |
Question 153 |
A | 48 networks, 5 segments |
B | 240 private networks |
C | 48 collision domains, 5 broadcast domains |
D | 240 usable IP addresses |
E | 5 collision domains, 48 segments |
Question 154 |
A | Identification card |
B | Video camera |
C | Biometric device |
D | Proximity reader |
Question 155 |
A | Exhausted dynamic scope |
B | Misconfigured VLSM |
C | Rogue DHCP server |
D | Expired IP address |
Question 156 |
A | MAC filtering |
B | Geofencing |
C | Open wireless |
D | Pre-shared key |
Question 157 |
A | The cable is damaged |
B | The cable is a crossover cable |
C | The cable has bent pins |
D | The cable is a Cat 5 cable |
E | The cable is rollover cable |
Question 158 |
A | Domain server |
B | Layer 2 switch |
C | Layer 3 switch |
D | Signal repeater |
E | Bridge |
Question 159 |
A | VPC |
B | vSAN |
C | Fiber Channel |
D | Virtual switch |
E | FCoE |
Question 160 |
A | DHCP snooping |
B | Spanning tree |
C | BPDU guard |
D | Flood guard |
Question 161 |
IP: 192.168.1.100
Mask: 255.255.255.0
Router: 192.168.1.1
A | Interference |
B | Security type mismatch |
C | Channel overlap |
D | Wrong SSID |
Question 162 |
A | Update firmware |
B | Perform file hashing |
C | Change default credentials |
D | Generate new keys |
Question 163 |
A | Samba |
B | Telnet |
C | LDAP |
D | TFTP |
Question 164 |
A | Damaged cable |
B | Attenuation |
C | Switch configuration |
D | Incorrect pin-out |
Question 165 |
A | Layer 3 – Network |
B | Layer 1 – Physical |
C | Layer 4 – Transport |
D | Layer 7 – Application |
E | Layer 6 - Presentation |
Question 166 |
A | Captive portal |
B | MAC filtering |
C | SSL certificate |
D | WPA2 |
E | EAP-TLS |
Question 167 |
A | Content filter |
B | RADIUS server |
C | VoIP PBX |
D | Wireless controller |
Question 168 |
A | 12 |
B | 15 |
C | 13 |
D | 3 |
E | 14 |
Question 169 |
A | iSCSI |
B | PPP |
C | RDMA |
D | Fibre Channel |
Question 170 |
A | The LAN and WLAN should be configured in separate zones with a firewall in between. |
B | The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours. |
C | The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules. |
D | The LAN and WLAN should be configured in the DMZ so traffic is denied automatically. |
Question 171 |
A | Data loss prevention |
B | Licensing restrictions |
C | International export controls |
D | Incident response policy |
E | Remote access policies |
Question 172 |
A | Cable modem |
B | DNS server |
C | Layer 2 switch |
D | SOHO router |
Question 173 |
A | The DNS lookup entry is incorrectly configured |
B | The reverse DNS entry is pointing to a different host |
C | The server IP address is incorrectly configured |
D | There is no reverse DNS entry for this host |
Question 174 |
A | Document findings |
B | Test solutions |
C | Duplicate the problem |
D | Implement preventive measures |
E | Establish a theory of probable cause |
F | Question users |
Question 175 |
A | Install a repeater to boost the signal to its destination |
B | Replace the UTP cable with plenum cable |
C | Set the AP to half-duplex to compensate for signal loss |
D | Upgrade the cable from Cat 5 to Cat 5e or Cat 6 |
Question 176 |
A | Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices. |
B | Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption. |
C | Connect the legacy devices with a PSK while the modern devices should use the more secure EAP. |
D | Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility. |
Question 177 |
A | Mesh |
B | Star |
C | Ring |
D | Ad hoc |
Question 178 |
A | EAP-TLS |
B | Captive portal |
C | PEAP |
D | WP2-PSK |
Question 179 |
A | NAC |
B | SSO |
C | RADIUS |
D | Kerberos |
E | Certificate |
F | MFA |
Question 180 |
A | Duplex/speed mismatch |
B | Bad port |
C | Crosstalk |
D | ACL misconfiguration |
Question 181 |
A | Bus |
B | Ring |
C | Ad hoc |
D | Partial mesh |
Question 182 |
A | VNC application |
B | Geotagging application |
C | Kerberos |
D | Credentials |
Question 183 |
A | Packet tracing utility |
B | MS Windows command-line tool |
C | Packet capturing utility |
D | Linux command-line tool |
E | Packet filtering utility |
Question 184 |
A | STP cabling |
B | Coaxial cabling |
C | UTP cabling |
D | Fiber-optic cabling |
Question 185 |
A | Telnet into the router over a secure VPN. |
B | Accessing a DSL router via the console port. |
C | Using a secure SSH connection over the WAN link to connect to a server. |
D | Implementing a modem on the AUX port to access a network device. |
Question 186 |
A | 2048 |
B | 1024 |
C | 1022 |
D | 510 |
E | 512 |
F | 2046 |
Question 187 |
Subnet 1: 192.168.1.0/26
Subnet 2: 192.168.1.65/26
Company B uses the following scheme:
Subnet 1: 192.168.1.50/28
A | PAT |
B | VLAN |
C | NAT |
D | DMZ |
Question 188 |
A | MTU |
B | TTL |
C | Speed |
D | Duplex |
Question 189 |
A | IDS firewall |
B | DDoS |
C | MITM |
D | DDoS |
E | DNS sinkhole |
Question 190 |
A | Adding a router reduces the amount of broadcast traffic on each of the two LANs. |
B | Adding a router diverts traffic to an alternate path through the network. |
C | Adding a router reduces the amount of unicast traffic on each of the two LANs. |
D | Adding a router prevents computers on one LAN from communicating with computers on another LAN. |
Question 191 |
A | Spectrum analyzer |
B | netstat |
C | Packet sniffer |
D | nslookup |
Question 192 |
A | Analog modem |
B | CSMA |
C | Baseband |
D | Broadband |
Question 193 |
A | The ports belong to an active system and are denying requests |
B | The ports are associated with deprecated services |
C | The ports do not belong to a live system |
D | The ports replied with a SYN/ACK response |
Question 194 |
A | Ports 80 and 443 |
B | Ports 20 and 21 |
C | Ports 56 and 57 |
D | Port 123 and 8080 |
E | Ports 67 and 68 |
Question 195 |
A | Punchdown tool |
B | Tone generator |
C | Multimeter |
D | Loopback adapter |
Question 196 |
User A
IP address: 192.168.1.121
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
User B
IP address: 192.168.1.125
Subnet mask: 255.255.248.0
Default gateway: 192.168.1.1
A | There is no problem identifiable by the values given. |
B | User B's IP address is not a loopback address |
C | The default gateway should have different values |
D | The subnet values should be the same |
Question 197 |
A | Crosstalk |
B | Open/short on the cable |
C | Transceiver mismatch |
D | Jitter |
Question 198 |
A | HTTP over WPA2-TKIP WiFi |
B | RDP over SSLv2 HTTPS terminal services gateway |
C | Telnet over PSTN |
D | SSH over IPsec client-to-site VPN |
Question 199 |
A | traceroute |
B | pathping |
C | Nmap |
D | netstat |
Question 200 |
A | It segments broadcast domains in the network infrastructure |
B | It provides a faster port to all servers |
C | It provides multiple broadcast domains within a single collision domain |
D | It provides multiple collision domains on one switchport |
← |
List |
→ |
| 1 | 2 | 3 | 4 | 5 |
| 6 | 7 | 8 | 9 | 10 |
| 11 | 12 | 13 | 14 | 15 |
| 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 |
| 26 | 27 | 28 | 29 | 30 |
| 31 | 32 | 33 | 34 | 35 |
| 36 | 37 | 38 | 39 | 40 |
| 41 | 42 | 43 | 44 | 45 |
| 46 | 47 | 48 | 49 | 50 |
| 51 | 52 | 53 | 54 | 55 |
| 56 | 57 | 58 | 59 | 60 |
| 61 | 62 | 63 | 64 | 65 |
| 66 | 67 | 68 | 69 | 70 |
| 71 | 72 | 73 | 74 | 75 |
| 76 | 77 | 78 | 79 | 80 |
| 81 | 82 | 83 | 84 | 85 |
| 86 | 87 | 88 | 89 | 90 |
| 91 | 92 | 93 | 94 | 95 |
| 96 | 97 | 98 | 99 | 100 |
| 101 | 102 | 103 | 104 | 105 |
| 106 | 107 | 108 | 109 | 110 |
| 111 | 112 | 113 | 114 | 115 |
| 116 | 117 | 118 | 119 | 120 |
| 121 | 122 | 123 | 124 | 125 |
| 126 | 127 | 128 | 129 | 130 |
| 131 | 132 | 133 | 134 | 135 |
| 136 | 137 | 138 | 139 | 140 |
| 141 | 142 | 143 | 144 | 145 |
| 146 | 147 | 148 | 149 | 150 |
| 151 | 152 | 153 | 154 | 155 |
| 156 | 157 | 158 | 159 | 160 |
| 161 | 162 | 163 | 164 | 165 |
| 166 | 167 | 168 | 169 | 170 |
| 171 | 172 | 173 | 174 | 175 |
| 176 | 177 | 178 | 179 | 180 |
| 181 | 182 | 183 | 184 | 185 |
| 186 | 187 | 188 | 189 | 190 |
| 191 | 192 | 193 | 194 | 195 |
| 196 | 197 | 198 | 199 | 200 |
| End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.






