← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set III
CompTIA Network+ N10-007 - Set II
Congratulations - you have completed CompTIA Network+ N10-007 - Set II.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Key escrow |
B | CRL |
C | CSR |
D | OCSP |
Question 2 |
A | Upgrade to the latest firmware |
B | Review and modify the firewall rules |
C | Generate new SSH keys |
D | Verify the default passwords have been changed |
Question 3 |
A | TDR |
B | OTDR |
C | Spectrum analyzer |
D | Loopback adapter |
Question 4 |
A | Ransomware |
B | Phishing |
C | Man-in-the-middle |
D | Spam |
Question 5 |
A | SIP |
B | ICMP |
C | H.323 |
D | SMB |
E | NTP |
F | RTP |
Question 6 |
A | permit tcp any any eq 110 |
B | permit udp any any eq 53 |
C | permit udp any any eq 25 |
D | permit tcp any any eq 20 |
E | permit tcp any any eq 8080 |
F | permit udp any any eq 68 |
Question 7 |
A | DHCP |
B | LADP |
C | HTTP |
D | DNS |
E | ICMP |
Question 8 |
A | PTP |
B | SSL VPN |
C | IPSec |
D | PPTP |
Question 9 |
A | Biometric scanners |
B | Motion detectors |
C | Video surveillance |
D | Door locks |
Question 10 |
A | Open/short |
B | Attenuation |
C | TX/RX reverse |
D | EMI |
Question 11 |
A | Flood guard |
B | Spanning tree |
C | DHCP snooping |
D | BPDU guard |
Question 12 |
A | 5 collision domains, 48 segments |
B | 48 collision domains, 5 broadcast domains |
C | 48 networks, 5 segments |
D | 240 private networks |
E | 240 usable IP addresses |
Question 13 |
A | Router |
B | Media converter |
C | Wireless access point |
D | Network switch |
E | Firewall |
Question 14 |
A | Additional lease time for the laptop computers |
B | CNAME record in the users dynamic DNS accounts |
C | DHCP reservation for the laptops MACs |
D | IP helper relay system for configuration hops |
Question 15 |
A | TTL |
B | DNS record type |
C | DHCP lease time |
D | IP helper |
E | Ping table |
Question 16 |
A | VLAN mismatch |
B | TX/RX reverse |
C | Duplex mismatch |
D | Damaged cables |
E | Bent pins |
F | Crosstalk |
Question 17 |
A | ipconfig /flushdns |
B | ipconfig /renew |
C | ipconfig /all |
D | ipconfig /release |
Question 18 |
A | Port aggregation |
B | iSCSI |
C | Jumbo frames |
D | QoS tags |
Question 19 |
A | One router connected to one 12-port switch configured for the manager's computers, phones, and printer, and one 12-port switch configured for the other computers, VoIP phones, and printer |
B | Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the manager's desktop computers, VoIP phones, and printer |
C | One router connected to one 24-port switch configured with two VLANS: one for the manager's computers, VoIP phones, and printer, and one for the other computers, VoIP phones, and printer |
D | One router connected to one 24-port switch configured with three VLANS: one for the manager's computers and printer, one for the other computers and printer, and one for the VoIP phones |
Question 20 |
A | Next-generation firewall |
B | Switch |
C | Multilayer switch |
D | Bridge |
Question 21 |
A | Monitoring of network-attached devices |
B | Allocation of IP addresses |
C | Synchronization of clocks over a computer network |
D | Retrieving contents of an Internet page from a web server |
Question 22 |
A | SFTP |
B | FTPS |
C | SSL |
D | TFTP |
E | Telnet |
Question 23 |
A | Media type |
B | Hostname |
C | Rack location |
D | Room number |
Question 24 |
A | Router |
B | Load balancer |
C | Switch |
D | Proxy server |
Question 25 |
route add 0.0.0.0 mask 0.0.0.0 192.169.1.222 metric 1
A | The technician is adding a static IP address. |
B | The technician is clearing the subnet mas setting. |
C | The technician is clearing the route table. |
D | The technician is setting the default gateway. |
Question 26 |
A | DDoS attacks are launched from multiple hosts |
B | Spoofing attacks originate from a single host |
C | Spoofing attacks require physical presence |
D | DDoS attacks target multiple networks |
Question 27 |
A | Create a honeypot to attract attackers. |
B | Create a VLAN for all unused switchports. |
C | Implement root guard on all switches. |
D | Implement a DMZ for all external services. |
Question 28 |
A | Data link |
B | Session |
C | Presentation |
D | Transport |
Question 29 |
A | 192.168.12.97 to 255.255.255.240 |
B | 192.168.12.97 to 255.255.255.192 |
C | 192.168.12.97 to 255.255.255.224 |
D | 192.168.12.97 to 255.255.255.248 |
Question 30 |
A | SVC |
B | SNR |
C | RFI |
D | BRI |
Question 31 |
A | Route redistribution |
B | Routing table |
C | Dynamic routes |
D | DHCP |
E | Routing loop |
Question 32 |
A | Duplex/speed mismatch |
B | Bad port |
C | ACL misconfiguration |
D | Crosstalk |
Question 33 |
A | IaaS |
B | SAN |
C | NAS |
D | SaaS |
Question 34 |
A | Network mapper |
B | Protocol analyzer |
C | Logical network diagram |
D | WAP power level controls |
Question 35 |
A | 2048 |
B | 510 |
C | 2046 |
D | 512 |
E | 1022 |
F | 1024 |
Question 36 |
A | Rack diagram |
B | Network configuration |
C | Change management |
D | Network diagram |
Question 37 |
A | Equipment closet |
B | Server room |
C | Intermediate distribution frame |
D | Demarcation point |
Question 38 |
A | top |
B | gdm |
C | systemd |
D | sanuja |
E | root |
Question 39 |
A | DHCP timer |
B | MAC reservation |
C | IP helper |
D | Pool |
E | Lease time |
Question 40 |
A | Fibre Channel |
B | iSCSI |
C | PPP |
D | RDMA |
Question 41 |
A | The use of lightweight APs with a load balancer |
B | The use of autonomous APs with a wireless controller |
C | The use of lightweight APs with a wireless controller |
D | The use of autonomous APs with a load balancer |
Question 42 |
A | Ports 80 and 443 |
B | Ports 56 and 57 |
C | Port 123 and 8080 |
D | Ports 20 and 21 |
E | Ports 67 and 68 |
Question 43 |
A | RDP over SSLv2 HTTPS terminal services gateway |
B | SSH over IPsec client-to-site VPN |
C | Telnet over PSTN |
D | HTTP over WPA2-TKIP WiFi |
Question 44 |
A | There is additional data being transferred over the wireless network |
B | There is interference with the smart reader |
C | An IoT device is causing a DoS attack on the wireless network |
D | The utility company throttles power during peak hours |
Question 45 |
Which of the following ones should the technician use to place the webserver and which of the following firewall rules should the technician configure?
A | Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the webserver |
B | Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the webserver |
C | Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the webserver |
D | Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the webserver |
Question 46 |
A | Plug in to another port |
B | Replace the NIC |
C | Modify the speed and duplex |
D | Change the switch |
Question 47 |
A | SFP |
B | SPF |
C | ASIC |
D | GBIC |
E | MDI-X |
Question 48 |
A | RDP set to console connection |
B | EAP-PEAP |
C | SFTP |
D | SSH in tunnel mode |
Question 49 |
A | VPN concentrator |
B | IPS |
C | Proxy server |
D | IDS |
E | Load balancer |
Question 50 |
A | Partial mesh |
B | Bus |
C | Ad hoc |
D | Ring |
Question 51 |
A | Layer 2 switch |
B | Load balancer |
C | Layer 3 switch |
D | Bridge |
Question 52 |
A | Reduce the TX power on each access point. |
B | Enable MAC address filtering on each access point. |
C | Enable AP isolation on each access point. |
D | Disable the SSID broadcast on each access point. |
Question 53 |
A | authpriv |
B | SHA |
C | MD5 |
D | Authentication passphrase |
Question 54 |
A | TLS |
B | LDAP |
C | SSH |
D | SFTP |
Question 55 |
A | Misconfigured VLSM |
B | Exhausted dynamic scope |
C | Expired IP address |
D | Rogue DHCP server |
Question 56 |
A | dig |
B | ipconfig |
C | arp |
D | nslookup |
Question 57 |
A | Set the AP to half-duplex to compensate for signal loss |
B | Replace the UTP cable with plenum cable |
C | Install a repeater to boost the signal to its destination |
D | Upgrade the cable from Cat 5 to Cat 5e or Cat 6 |
Question 58 |
A | CNAME |
B | SRV |
C | MX |
D | AAAA |
Question 59 |
A | Video camera |
B | Biometric device |
C | Proximity reader |
D | Identification card |
Question 60 |
A | Layer 4 – Transport |
B | Layer 3 – Network |
C | Layer 7 – Application |
D | Layer 6 - Presentation |
E | Layer 1 – Physical |
Question 61 |
User A
IP address: 192.168.1.121
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
User B
IP address: 192.168.1.125
Subnet mask: 255.255.248.0
Default gateway: 192.168.1.1
A | User B's IP address is not a loopback address |
B | The subnet values should be the same |
C | The default gateway should have different values |
D | There is no problem identifiable by the values given. |
Question 62 |
A | Star |
B | Ad hoc |
C | Mesh |
D | Ring |
Question 63 |
Which of the following would MOST likely allow the network drives to be accessed?
A | Disable the WLAN adapter |
B | Disable the LAN adapter |
C | Check the wireless DHCP configuration |
D | Update the WLAN adapter driver |
Question 64 |
A | Switch |
B | Bridge |
C | Hub |
D | Router |
Question 65 |
A | Site-to-site |
B | Client-to-site |
C | Point-to-point |
D | Point-to-multipoint |
Question 66 |
A | NDA |
B | BYOD |
C | MOU |
D | AUP |
Question 67 |
A | Cat 7 |
B | Cat 5e |
C | Cat 6a |
D | Cat 6 |
Question 68 |
A | Protocol analyzer |
B | Tone generator |
C | Multimeter |
D | Spectrum analyzer |
E | OTDR |
Question 69 |
A | Duplex GBIC |
B | 1000BaseLX SFP |
C | Bidirectional SFP |
D | Duplex SFP+ |
Question 70 |
A | RADIUS server |
B | Content filter |
C | VoIP PBX |
D | Wireless controller |
Question 71 |
A | SNMP host |
B | SNMP agent |
C | OUI |
D | OID |
E | OTDR |
Question 72 |
A | TFTP |
B | DHCP |
C | FTP |
D | SCP |
E | Telnet |
Question 73 |
A | Port 25 |
B | Port 161 |
C | Port 123 |
D | Port 69 |
Question 74 |
A | UDP |
B | Ethernet |
C | IP |
D | TCP |
E | None of the answers are correct. |
Question 75 |
A | Determine the symptoms |
B | Document the findings |
C | Establish a plan of action |
D | Gather information |
Question 76 |
A | 802.11b |
B | 802.11a |
C | 802.11ac |
D | 802.11n |
Question 77 |
“The Security certificate presented by this website was not trusted by trusted certificate authority.”
Sanuja has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error. Which of the following is the MOST likely cause of this error?
A | The web server is missing an intermediate certificate. |
B | The website is missing an HTTPS certificate. |
C | The SSL certificate has expired. |
D | TLS is not enabled in the browser. |
Question 78 |
A | Jitter |
B | Crosstalk |
C | Transceiver mismatch |
D | Open/short on the cable |
Question 79 |
A | Use an FTP server and provide the file hash. |
B | Use an HTTP server to share the file. |
C | Use a TFTP server and UDP protocol. |
D | Use a modem and dial-up connection. |
Question 80 |
A | FCoE |
B | OC3 |
C | iSCSI |
D | InfiniBand |
Question 81 |
A | Document findings |
B | Establish a theory of probable cause |
C | Duplicate the problem |
D | Question users |
E | Implement preventive measures |
F | Test solutions |
Question 82 |
A | DSL modem |
B | Access point |
C | Wireless router |
D | Demarc |
E | DOCSIS modem |
Question 83 |
A | 5GHz |
B | 2.4 GHz |
C | 56MHz |
D | 900MHz |
Question 84 |
A | Document the scene |
B | Secure the area |
C | Take pictures upon arrival |
D | Implement a chain of custody |
Question 85 |
A | Duplicate MAC addresses |
B | APIPA address |
C | Loopback address |
D | Duplicate IP addresses |
Question 86 |
A | Clustering |
B | Round robin |
C | Jumbo frames |
D | Load balancer |
E | TCP offloading |
Question 87 |
Which of the following devices is causing the issue?
A | Switch 2 |
B | Switch 1 |
C | Router |
D | Firewall |
Question 88 |
A | 12 |
B | 15 |
C | 3 |
D | 14 |
E | 13 |
Question 89 |
A | 10.8.0.0/19 |
B | 10.0.0.0/24 |
C | 10.8.0.0/16 |
D | 10.8.0.0/20 |
Question 90 |
A | Fiber-optic cabling |
B | STP cabling |
C | Coaxial cabling |
D | UTP cabling |
Question 91 |
A | Certificate |
B | NAC |
C | MFA |
D | SSO |
E | Kerberos |
F | RADIUS |
Question 92 |
A | Enables remote login and command execution. |
B | Provides username & password authentication. |
C | Transmits data in an unencrypted form. |
D | It cannot be used on modern Windows computers. |
E | It does not provide authentication. |
F | Encrypts network connection. |
Question 93 |
A | MS Windows command-line tool |
B | Packet tracing utility |
C | Linux command-line tool |
D | Packet filtering utility |
E | Packet capturing utility |
Question 94 |
A | The cable is damaged |
B | The cable is a Cat 5 cable |
C | The cable is rollover cable |
D | The cable has bent pins |
E | The cable is a crossover cable |
Question 95 |
A | Implement a Faraday cage within the building premises |
B | Use MAC filtering for authorization to the wireless network |
C | Require PEAP for authentication to the wireless network |
D | Require a pre-shared key for authentication to the wireless network |
Question 96 |
A | Pre-shared key |
B | Open wireless |
C | Geofencing |
D | MAC filtering |
Question 97 |
A | ARP poisoning |
B | Evil twin |
C | Session hijacking |
D | Social engineering |
E | DHCP exhaustion |
Question 98 |
A | traffic-routing protocols |
B | packet flow |
C | public/private networks |
D | network devices |
Question 99 |
A | WP2-PSK |
B | Captive portal |
C | EAP-TLS |
D | PEAP |
Question 100 |
A | Multimeter |
B | Spectrum analyzer |
C | Packet sniffer |
D | OTDR |
Question 101 |
A | Create a port location diagram |
B | Create a network baseline |
C | Create an inventory database |
D | Create a rack diagram |
Question 102 |
A | There are 12 collision domains, one for each switch connection. |
B | There is one collision domain for this network. |
C | There are 3 collision domains, one for each switch-to-switch connection. |
D | There are 9 collision domains, one for each half-duplex connection. |
Question 103 |
Subnet 1: 192.168.1.0/26
Subnet 2: 192.168.1.65/26
Company B uses the following scheme:
Subnet 1: 192.168.1.50/28
A | DMZ |
B | NAT |
C | VLAN |
D | PAT |
Question 104 |
A | 0 |
B | 6 |
C | 2 |
D | 12 |
E | 1 |
Question 105 |
A | AUP |
B | Offboarding |
C | Remote access |
D | Incident response |
E | DLP |
Question 106 |
A | Load balancing |
B | NIC teaming |
C | Clustering |
D | Multiple NAT |
E | Redundant circuits |
Question 107 |
A | Plenum |
B | PVC |
C | Single-mode |
D | Cat 7 |
Question 108 |
A | Jitter |
B | Attenuation |
C | Frequency mismatch |
D | Latency |
Question 109 |
A | MOU |
B | SLA |
C | NDA |
D | AUP |
Question 110 |
A | VLAN hopping |
B | Man-in-the-middle |
C | Bluesnarfing |
D | Session hijacking |
E | MAC spoofing |
Question 111 |
A | Host-based firewall settings |
B | DNS SRV record |
C | TACAS+ server time |
D | Server IP address |
Question 112 |
A | The Faraday cage is creating interference within the bookstore. |
B | The Faraday cage is creating latency on the cellular network. |
C | The Faraday cage prevents access by redirecting signals. |
D | The Faraday cage is creating attenuation of the cellular network. |
Question 113 |
A | Telnet |
B | LDAP |
C | Samba |
D | TFTP |
Question 114 |
A | Data loss prevention |
B | Acceptable use |
C | Incident response |
D | Asset disposal |
Question 115 |
A | Loopback adapter |
B | Punchdown tool |
C | Multimeter |
D | Tone generator |
Question 116 |
A | 172.16.0.0/22 |
B | 10.233.2.0/23 |
C | 192.168.25.0/24 |
D | 10.5.4.0/22 |
E | 172.18.0.0/23 |
Question 117 |
A | Implement a standardized UNC |
B | Enforce port security to require system authentication |
C | Label existing systems with current hostnames |
D | Forward the DHCP logs to the security manager every day |
Question 118 |
A | Port 110 |
B | Port 80 |
C | Port 110 |
D | Port 443 |
E | Port 22 |
Question 119 |
A | Adding a fingerprint reader and retina scanner |
B | Using a smart card and RSA token |
C | Adding a fingerprint reader to each workstation and providing a RSA authentication token |
D | Enforcing a stronger password policy and using a hand geometry scan |
Question 120 |
A | Disable virtual ports. |
B | Disable unused ports. |
C | Reset the two-factor token. |
D | Upgrade the firmware. |
Question 121 |
A | Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices. |
B | Connect the legacy devices with a PSK while the modern devices should use the more secure EAP. |
C | Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility. |
D | Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption. |
Question 122 |
A | Bus |
B | Ring |
C | Star |
D | Mesh |
Question 123 |
A | Proxy service |
B | Content filtering |
C | Intrusion detection |
D | Dynamic DNS |
Question 124 |
A | Implement the solution |
B | Escalate the ticket to a senior technician |
C | Establish a theory of probable cause |
D | Do nothing |
E | Document the findings and outcomes |
Question 125 |
A | Nmap |
B | netstat |
C | traceroute |
D | pathping |
Question 126 |
A | Snapshots |
B | Incremental |
C | Replica |
D | Differential |
Question 127 |
A | Data loss prevention |
B | Licensing restrictions |
C | Incident response policy |
D | International export controls |
E | Remote access policies |
Question 128 |
A | role separation. |
B | penetration testing. |
C | device hardening. |
D | risk assessment. |
Question 129 |
A | The R&D department should receive a /27 network. |
B | The R&D department should have a last usable IP address of 172.16.49.190. |
C | The marketing department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
D | The R&D department should have 172.16.49.207 as a broadcast address. |
E | The finance department should have 172.16.49.127 as a broadcast address. |
F | The legal department should have a first usable IP address of 172.16.49.190. |
G | The marketing department should receive a /25 network. |
H | The legal department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
Question 130 |
A | Cable 3 should be an STP cable. |
B | Cable 1 does not need to be plenum rated. |
C | None, the network looks good. |
D | Cable 2 should be an STP cable. |
Question 131 |
A | Reverse the wires leading to pins 2 and 4 |
B | Reverse the wires leading to pins 1 and 2 |
C | Reverse the wires leading to pins 2 and 3 |
D | Reverse the wires leading to pins 1 and 3 |
Question 132 |
A | SSL certificate |
B | Digital signatures |
C | 3DES encryption |
D | Digital signatures |
Question 133 |
A | Social engineering |
B | Trojan horse |
C | Insider threat |
D | Session hijacking |
E | Logic bomb |
Question 134 |
A | LC |
B | RJ45 |
C | DB-9 |
D | GBIC |
E | SFTP |
F | SC |
Question 135 |
A | Channel 7 |
B | Channel 9 |
C | Channel 10 |
D | Channel 6 |
Question 136 |
A | SOHO router |
B | Layer 2 switch |
C | DNS server |
D | Cable modem |
Question 137 |
A | The server IP address is incorrectly configured |
B | The DNS lookup entry is incorrectly configured |
C | The reverse DNS entry is pointing to a different host |
D | There is no reverse DNS entry for this host |
Question 138 |
A | DMZ |
B | IDF |
C | Demarc |
D | Data tier |
Question 139 |
A | SSL |
B | CHAP |
C | SSH |
D | SNMP |
E | FTP |
Question 140 |
A | Swipe badges |
B | Sign-in sheets |
C | Motion sensors |
D | Video cameras |
Question 141 |
A | Damaged cable |
B | Attenuation |
C | Switch configuration |
D | Incorrect pin-out |
Question 142 |
A | The LAN and WLAN should be configured in separate zones with a firewall in between. |
B | The LAN and WLAN should be configured in the DMZ so traffic is denied automatically. |
C | The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules. |
D | The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours. |
Question 143 |
A | 1000BaseT |
B | 10GBaseT |
C | 10Base2 |
D | 1000BaseSX |
E | 10Base5 |
F | 1000BaseLX |
Question 144 |
A | Verify the host has physical connectivity and is on the correct VLAN. |
B | Perform a traceroute command to identify the router that is not functioning. |
C | Change the IP scope on the DHCP server to a public IP address range. |
D | Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address. |
Question 145 |
A | The technician should use a packet tracer to see if the traffic is getting out of the network |
B | The technician should check the internal diagnostics on all the phones to look for a common thread |
C | The technician should run ping tests on the Internet line to monitor for packet loss and latency |
D | The technician should reset all the phones and deprovision information from the provider |
Question 146 |
A | Broadband cable |
B | Frame relay |
C | ISDN |
D | PRI |
E | MPLS |
Question 147 |
A | Spanning tree |
B | Port aggregation |
C | Port mirroring |
D | Trunking |
Question 148 |
A | 802.3at |
B | 802.11ac |
C | 802.1q |
D | 802.1X |
E | 802.3af |
Question 149 |
A | Duplex/Speed mismatch |
B | TX/RX reverse |
C | VLAN mismatch |
D | Duplicate IP address |
Question 150 |
A | Generate new keys |
B | Perform file hashing |
C | Update firmware |
D | Change default credentials |
Question 151 |
A | Disable the SMTP service on the server |
B | Disable DHCP service on the server |
C | Disable Telnet service on the server |
D | Disable FTP service on the server |
Question 152 |
A | Change management |
B | IDF/MDF documentation |
C | Performance baseline |
D | Physical diagram |
Question 153 |
A | There are nine collision domains and three broadcast
domains. |
B | There are three collision domains and one broadcast domain. |
C | There are three collision domains and three broadcast
domains. |
D | There is one collision domain and one broadcast domain. |
E | There are seven collision domains and three broadcast
domains. |
Question 154 |
A | Add a second UPS into the rack |
B | Implement stacking on the switches in the rack |
C | Install a power converter for the switch |
D | Add a redundant power supply to the switch |
Question 155 |
A | The students are using more than one wireless device port seat |
B | The students are attempting to connect 802.11g devices |
C | One of the wireless access points is on the wrong frequency |
D | Distance limitations are preventing the students from connecting |
Question 156 |
A | Spectrum analyzer |
B | nslookup |
C | Packet sniffer |
D | netstat |
Question 157 |
A | Backs up files with the archive bit set but does not clear the bit. |
B | Backs up files with the creation or modified date as the current date. |
C | Backs up all files and sets the archive bit. |
D | Backs up files with a date earlier than today’s date with a clear archive bit. |
Question 158 |
IP: 192.168.1.100
Mask: 255.255.255.0
Router: 192.168.1.1
A | Wrong SSID |
B | Channel overlap |
C | Interference |
D | Security type mismatch |
Question 159 |
A | Replace the server's single-mode fiber cable with multimode fiber |
B | Reverse the fiber strands of the cable and reconnect them to the server |
C | Move the fiber cable to a different port on the switch where both strands function |
D | Use a TDR to test both strands of a new replacement cable prior to connecting it to the server |
Question 160 |
A | TCP/IP |
B | DHCP |
C | DNS |
D | SQL |
Question 161 |
A | Using a secure SSH connection over the WAN link to connect to a server. |
B | Implementing a modem on the AUX port to access a network device. |
C | Telnet into the router over a secure VPN. |
D | Accessing a DSL router via the console port. |
Question 162 |
A | Layer 2 switch |
B | Domain server |
C | Signal repeater |
D | Layer 3 switch |
E | Bridge |
Question 163 |
Gigabit Ethernet 1 Interface: 10.10.0.1/24 Serial 0 Interface: 10.10.0.253/30
A | The router was configured with an incorrect default gateway |
B | The router was configured with an incorrect loopback address |
C | The router was configured with an incorrect subnet mask |
D | The router was configured with an incorrect IP address |
Question 164 |
A | DNS |
B | NetBIOS |
C | HTTP |
D | DHCP |
E | ICMP |
Question 165 |
A | Cable tester |
B | Loopback adapter |
C | Tone generator |
D | Multimeter |
Question 166 |
A | The ports are associated with deprecated services |
B | The ports belong to an active system and are denying requests |
C | The ports replied with a SYN/ACK response |
D | The ports do not belong to a live system |
Question 167 |
A | -a |
B | /all |
C | -i address |
D | eth_addr |
Question 168 |
A | Wardriving |
B | MITM attack |
C | Spoofing attack |
D | DDoS attack |
E | Session hijacking |
Question 169 |
A | Datagrams |
B | Segments |
C | Packets |
D | Frames |
Question 170 |
A | Kerberos |
B | Credentials |
C | Geotagging application |
D | VNC application |
Question 171 |
A | SSL |
B | SMB |
C | RDP |
D | SNMP |
E | NTP |
Question 172 |
A | CSMA |
B | Baseband |
C | Broadband |
D | Analog modem |
Question 173 |
A | 2001:0:d58:0:0:95:7565:1 |
B | 2001::d58::95:7565:1 |
C | 2001:0:d58::95:7565:1 |
D | 2001:0:0d58::95:7565:1 |
Question 174 |
A | Loop protection is enabled on the root port of a switch. |
B | Broadcast storms entering from a root port are blocked. |
C | BPDUs entering the root bridge are ignored. |
D | The STP root bridge cannot be changed. |
Question 175 |
A | nslookup |
B | nbtstat |
C | pathping |
D | netstat |
Question 176 |
A | IEEE 802.1q |
B | IEEE 802.1X |
C | IEEE 802.11ac |
D | IEEE 802.3x |
Question 177 |
A | Disabling unnecessary services from the server and management software |
B | Changing the management software's default credentials |
C | Changing the management software's default port |
D | Replacing the management software's self-signed certificate with a valid certificate |
Question 178 |
A | dig |
B | arp |
C | tcpdump |
D | nmap |
Question 179 |
-WLAN architecture supporting speeds in excess of 150 Mbps
-Client less remote network access
-Port-based network access control
A | 802.11b, PPTP,802.1x |
B | 802.11n, SSL-VPN, 802.1x |
C | 802.11ac, MPLS, 802.3 |
D | 802.11a, IPSec VPN, 802.1x |
E | 802.11g, MS-CHAP, 802.16 |
Question 180 |
A | MITM |
B | DNS sinkhole |
C | DDoS |
D | DDoS |
E | IDS firewall |
Question 181 |
A | Fiber Channel |
B | FCoE |
C | VPC |
D | Virtual switch |
E | vSAN |
Question 182 |
A | A |
B | PTR |
C | CNAME |
D | NS |
E | MX |
Question 183 |
A | Adding a router reduces the amount of broadcast traffic on each of the two LANs. |
B | Adding a router reduces the amount of unicast traffic on each of the two LANs. |
C | Adding a router diverts traffic to an alternate path through the network. |
D | Adding a router prevents computers on one LAN from communicating with computers on another LAN. |
Question 184 |
A | Because secure protocols would reject malicious packets |
B | Because FTP is not a secure service |
C | Because SCP is not a secure service |
D | Because a secure firewall will protect the device |
Question 185 |
A | Replace the new switch with a hub to ensure Layer1 connectivity on the new network segment. |
B | Add a second cable connecting the switches for redundancy and disabling STP on both switches. |
C | Move the straight-through Ethernet cable connecting the switches to the first port on both switches. |
D | Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end. |
Question 186 |
Image Credits: https://www.homedepot.com/p/ Ideal-Punchdown-Tool- with-110-and-66- Blades-35-485/ 203761571
A | Tone generator and locator |
B | Crimper |
C | Butt set |
D | Punchdown tool |
Question 187 |
A | Network diagrams |
B | Labeling report |
C | Change management |
D | Inventory report |
Question 188 |
A | It segments broadcast domains in the network infrastructure |
B | It provides multiple collision domains on one switchport |
C | It provides a faster port to all servers |
D | It provides multiple broadcast domains within a single collision domain |
Question 189 |
A | SIP |
B | VLANs |
C | DSCP |
D | STP |
Question 190 |
A | Disable the SSID broadcast. |
B | Change the WiFi password. |
C | Activate MAC address filtering. |
D | Implement WEP authentication. |
Question 191 |
A | Physical |
B | Transport |
C | Network |
D | Application |
Question 192 |
A | DLP |
B | SLA |
C | AUP |
D | NDA |
Question 193 |
A | Captive portal |
B | SSL certificate |
C | EAP-TLS |
D | WPA2 |
E | MAC filtering |
Question 194 |
A | RADIUS |
B | Single sign-on |
C | TACACS+ |
D | Captive portal |
Question 195 |
A | RG-6 |
B | SMF |
C | Cat 6 |
D | Cat 3 |
E | Cat 5 |
Question 196 |
A | WEP-TKIP |
B | EAP-TLS |
C | WPA-PSK |
D | AES-CCMP |
Question 197 |
A | Server-based firewall configuration issue |
B | Patch cable type |
C | VLAN routing |
D | DHCP scope availability |
Question 198 |
A | Reviewing SLA requirements |
B | Reviewing application logs |
C | Reviewing a baseline report |
D | Reviewing a vulnerability scan |
Question 199 |
A | Speed |
B | Duplex |
C | MTU |
D | TTL |
Question 200 |
A | Evil twin |
B | OCSP stapling |
C | DDoS |
D | MITM |
E | Phishing |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.