← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set III
CompTIA Network+ N10-007 - Set II
Congratulations - you have completed CompTIA Network+ N10-007 - Set II.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | The technician should reset all the phones and deprovision information from the provider |
B | The technician should check the internal diagnostics on all the phones to look for a common thread |
C | The technician should use a packet tracer to see if the traffic is getting out of the network |
D | The technician should run ping tests on the Internet line to monitor for packet loss and latency |
Question 2 |
A | 510 |
B | 2046 |
C | 1024 |
D | 1022 |
E | 512 |
F | 2048 |
Question 3 |
A | Biometric scanners |
B | Video surveillance |
C | Door locks |
D | Motion detectors |
Question 4 |
A | IPSec |
B | PPTP |
C | SSL VPN |
D | PTP |
Question 5 |
A | Frame relay |
B | MPLS |
C | ISDN |
D | Broadband cable |
E | PRI |
Question 6 |
A | Jumbo frames |
B | Port aggregation |
C | iSCSI |
D | QoS tags |
Question 7 |
A | Disable DHCP service on the server |
B | Disable the SMTP service on the server |
C | Disable Telnet service on the server |
D | Disable FTP service on the server |
Question 8 |
A | Wireless controller |
B | VoIP PBX |
C | RADIUS server |
D | Content filter |
Question 9 |
Which of the following devices is causing the issue?
A | Router |
B | Switch 2 |
C | Firewall |
D | Switch 1 |
Question 10 |
A | Credentials |
B | VNC application |
C | Kerberos |
D | Geotagging application |
Question 11 |
A | Packets |
B | Segments |
C | Frames |
D | Datagrams |
Question 12 |
A | Layer 7 – Application |
B | Layer 4 – Transport |
C | Layer 3 – Network |
D | Layer 1 – Physical |
E | Layer 6 - Presentation |
Question 13 |
A | 802.11ac |
B | 802.1X |
C | 802.3at |
D | 802.3af |
E | 802.1q |
Question 14 |
A | Motion sensors |
B | Video cameras |
C | Swipe badges |
D | Sign-in sheets |
Question 15 |
A | Cat 6 |
B | SMF |
C | Cat 3 |
D | RG-6 |
E | Cat 5 |
Question 16 |
A | Distance limitations are preventing the students from connecting |
B | The students are attempting to connect 802.11g devices |
C | The students are using more than one wireless device port seat |
D | One of the wireless access points is on the wrong frequency |
Question 17 |
A | Hostname |
B | Room number |
C | Media type |
D | Rack location |
Question 18 |
A | Star |
B | Ring |
C | Bus |
D | Mesh |
Question 19 |
A | It provides multiple collision domains on one switchport |
B | It segments broadcast domains in the network infrastructure |
C | It provides a faster port to all servers |
D | It provides multiple broadcast domains within a single collision domain |
Question 20 |
A | SPF |
B | ASIC |
C | GBIC |
D | SFP |
E | MDI-X |
Question 21 |
A | Disable unused ports. |
B | Reset the two-factor token. |
C | Upgrade the firmware. |
D | Disable virtual ports. |
Question 22 |
A | RDP over SSLv2 HTTPS terminal services gateway |
B | HTTP over WPA2-TKIP WiFi |
C | SSH over IPsec client-to-site VPN |
D | Telnet over PSTN |
Question 23 |
A | Ports 56 and 57 |
B | Ports 67 and 68 |
C | Ports 20 and 21 |
D | Ports 80 and 443 |
E | Port 123 and 8080 |
Question 24 |
A | Backs up files with the archive bit set but does not clear the bit. |
B | Backs up files with a date earlier than today’s date with a clear archive bit. |
C | Backs up all files and sets the archive bit. |
D | Backs up files with the creation or modified date as the current date. |
Question 25 |
A | Port 110 |
B | Port 443 |
C | Port 22 |
D | Port 80 |
E | Port 110 |
Question 26 |
A | Create a rack diagram |
B | Create a network baseline |
C | Create an inventory database |
D | Create a port location diagram |
Question 27 |
A | The Faraday cage is creating latency on the cellular network. |
B | The Faraday cage is creating attenuation of the cellular network. |
C | The Faraday cage prevents access by redirecting signals. |
D | The Faraday cage is creating interference within the bookstore. |
Question 28 |
A | Proximity reader |
B | Biometric device |
C | Identification card |
D | Video camera |
Question 29 |
A | SMB |
B | NTP |
C | ICMP |
D | RTP |
E | SIP |
F | H.323 |
Question 30 |
A | Punchdown tool |
B | Tone generator |
C | Multimeter |
D | Loopback adapter |
Question 31 |
A | Using a secure SSH connection over the WAN link to connect to a server. |
B | Implementing a modem on the AUX port to access a network device. |
C | Telnet into the router over a secure VPN. |
D | Accessing a DSL router via the console port. |
Question 32 |
A | Differential |
B | Incremental |
C | Replica |
D | Snapshots |
Question 33 |
A | None, the network looks good. |
B | Cable 3 should be an STP cable. |
C | Cable 1 does not need to be plenum rated. |
D | Cable 2 should be an STP cable. |
Question 34 |
A | 2001:0:d58::95:7565:1 |
B | 2001:0:0d58::95:7565:1 |
C | 2001:0:d58:0:0:95:7565:1 |
D | 2001::d58::95:7565:1 |
Question 35 |
A | Server room |
B | Intermediate distribution frame |
C | Equipment closet |
D | Demarcation point |
Question 36 |
A | IEEE 802.1q |
B | IEEE 802.1X |
C | IEEE 802.11ac |
D | IEEE 802.3x |
Question 37 |
A | Packet sniffer |
B | OTDR |
C | Multimeter |
D | Spectrum analyzer |
Question 38 |
A | 10.5.4.0/22 |
B | 192.168.25.0/24 |
C | 172.16.0.0/22 |
D | 172.18.0.0/23 |
E | 10.233.2.0/23 |
Question 39 |
A | Media converter |
B | Network switch |
C | Firewall |
D | Router |
E | Wireless access point |
Question 40 |
A | Duplicate IP addresses |
B | Loopback address |
C | Duplicate MAC addresses |
D | APIPA address |
Question 41 |
A | SFTP |
B | TLS |
C | LDAP |
D | SSH |
Question 42 |
A | There are 9 collision domains, one for each half-duplex connection. |
B | There is one collision domain for this network. |
C | There are 12 collision domains, one for each switch connection. |
D | There are 3 collision domains, one for each switch-to-switch connection. |
Question 43 |
Image Credits: https://www.homedepot.com/p/ Ideal-Punchdown-Tool- with-110-and-66- Blades-35-485/ 203761571
A | Punchdown tool |
B | Butt set |
C | Crimper |
D | Tone generator and locator |
Question 44 |
A | DNS |
B | ICMP |
C | DHCP |
D | HTTP |
E | LADP |
Question 45 |
A | RADIUS |
B | SSO |
C | NAC |
D | MFA |
E | Kerberos |
F | Certificate |
Question 46 |
A | iSCSI |
B | PPP |
C | Fibre Channel |
D | RDMA |
Question 47 |
A | Duplex/Speed mismatch |
B | VLAN mismatch |
C | TX/RX reverse |
D | Duplicate IP address |
Question 48 |
A | Network |
B | Application |
C | Physical |
D | Transport |
Question 49 |
Which of the following ones should the technician use to place the webserver and which of the following firewall rules should the technician configure?
A | Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the webserver |
B | Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the webserver |
C | Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the webserver |
D | Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the webserver |
Question 50 |
A | SSH |
B | FTP |
C | SNMP |
D | SSL |
E | CHAP |
Question 51 |
A | There are three collision domains and three broadcast
domains. |
B | There is one collision domain and one broadcast domain. |
C | There are nine collision domains and three broadcast
domains. |
D | There are three collision domains and one broadcast domain. |
E | There are seven collision domains and three broadcast
domains. |
Question 52 |
A | DHCP lease time |
B | Ping table |
C | IP helper |
D | TTL |
E | DNS record type |
Question 53 |
A | Reverse the wires leading to pins 1 and 2 |
B | Reverse the wires leading to pins 2 and 3 |
C | Reverse the wires leading to pins 2 and 4 |
D | Reverse the wires leading to pins 1 and 3 |
Question 54 |
A | Adding a router diverts traffic to an alternate path through the network. |
B | Adding a router reduces the amount of broadcast traffic on each of the two LANs. |
C | Adding a router prevents computers on one LAN from communicating with computers on another LAN. |
D | Adding a router reduces the amount of unicast traffic on each of the two LANs. |
Question 55 |
A | The LAN and WLAN should be configured in separate zones with a firewall in between. |
B | The LAN and WLAN should be configured in the DMZ so traffic is denied automatically. |
C | The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours. |
D | The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules. |
Question 56 |
A | Single sign-on |
B | RADIUS |
C | TACACS+ |
D | Captive portal |
Question 57 |
A | OTDR |
B | SNMP agent |
C | SNMP host |
D | OID |
E | OUI |
Question 58 |
route add 0.0.0.0 mask 0.0.0.0 192.169.1.222 metric 1
A | The technician is adding a static IP address. |
B | The technician is clearing the subnet mas setting. |
C | The technician is setting the default gateway. |
D | The technician is clearing the route table. |
Question 59 |
A | WPA-PSK |
B | EAP-TLS |
C | AES-CCMP |
D | WEP-TKIP |
Question 60 |
A | Spoofing attacks require physical presence |
B | DDoS attacks target multiple networks |
C | Spoofing attacks originate from a single host |
D | DDoS attacks are launched from multiple hosts |
Question 61 |
A | Expired IP address |
B | Exhausted dynamic scope |
C | Misconfigured VLSM |
D | Rogue DHCP server |
Question 62 |
A | UDP |
B | None of the answers are correct. |
C | Ethernet |
D | TCP |
E | IP |
Question 63 |
A | Captive portal |
B | EAP-TLS |
C | WP2-PSK |
D | PEAP |
Question 64 |
A | DHCP reservation for the laptops MACs |
B | CNAME record in the users dynamic DNS accounts |
C | Additional lease time for the laptop computers |
D | IP helper relay system for configuration hops |
Question 65 |
A | packet flow |
B | network devices |
C | public/private networks |
D | traffic-routing protocols |
Question 66 |
A | Proxy service |
B | Intrusion detection |
C | Dynamic DNS |
D | Content filtering |
Question 67 |
A | EMI |
B | Open/short |
C | Attenuation |
D | TX/RX reverse |
Question 68 |
A | There is additional data being transferred over the wireless network |
B | The utility company throttles power during peak hours |
C | There is interference with the smart reader |
D | An IoT device is causing a DoS attack on the wireless network |
Question 69 |
A | 802.11a |
B | 802.11b |
C | 802.11ac |
D | 802.11n |
Question 70 |
A | 1000BaseLX |
B | 10Base2 |
C | 10GBaseT |
D | 1000BaseSX |
E | 1000BaseT |
F | 10Base5 |
Question 71 |
A | ipconfig |
B | dig |
C | nslookup |
D | arp |
Question 72 |
A | Social engineering |
B | Insider threat |
C | Session hijacking |
D | Trojan horse |
E | Logic bomb |
Question 73 |
A | Retrieving contents of an Internet page from a web server |
B | Synchronization of clocks over a computer network |
C | Allocation of IP addresses |
D | Monitoring of network-attached devices |
Question 74 |
A | Channel 9 |
B | Channel 6 |
C | Channel 10 |
D | Channel 7 |
Question 75 |
A | The cable is damaged |
B | The cable is rollover cable |
C | The cable is a Cat 5 cable |
D | The cable has bent pins |
E | The cable is a crossover cable |
Question 76 |
A | Remote access policies |
B | International export controls |
C | Licensing restrictions |
D | Data loss prevention |
E | Incident response policy |
Question 77 |
A | Lease time |
B | DHCP timer |
C | IP helper |
D | Pool |
E | MAC reservation |
Question 78 |
A | The use of autonomous APs with a wireless controller |
B | The use of lightweight APs with a wireless controller |
C | The use of autonomous APs with a load balancer |
D | The use of lightweight APs with a load balancer |
Question 79 |
A | Reviewing SLA requirements |
B | Reviewing a baseline report |
C | Reviewing a vulnerability scan |
D | Reviewing application logs |
Question 80 |
A | Incident response |
B | Data loss prevention |
C | Asset disposal |
D | Acceptable use |
Question 81 |
A | Change the WiFi password. |
B | Implement WEP authentication. |
C | Activate MAC address filtering. |
D | Disable the SSID broadcast. |
Question 82 |
A | Packet sniffer |
B | netstat |
C | Spectrum analyzer |
D | nslookup |
Question 83 |
A | SRV |
B | CNAME |
C | MX |
D | AAAA |
Question 84 |
A | Coaxial cabling |
B | Fiber-optic cabling |
C | STP cabling |
D | UTP cabling |
Question 85 |
A | Change management |
B | Rack diagram |
C | Network diagram |
D | Network configuration |
Question 86 |
A | Data tier |
B | IDF |
C | Demarc |
D | DMZ |
Question 87 |
A | Social engineering |
B | DHCP exhaustion |
C | ARP poisoning |
D | Session hijacking |
E | Evil twin |
Question 88 |
A | /all |
B | -a |
C | eth_addr |
D | -i address |
Question 89 |
A | 240 usable IP addresses |
B | 48 networks, 5 segments |
C | 240 private networks |
D | 5 collision domains, 48 segments |
E | 48 collision domains, 5 broadcast domains |
Question 90 |
A | Physical diagram |
B | IDF/MDF documentation |
C | Performance baseline |
D | Change management |
Question 91 |
A | Telnet |
B | Samba |
C | TFTP |
D | LDAP |
Question 92 |
A | Ad hoc |
B | Mesh |
C | Star |
D | Ring |
Question 93 |
A | Transceiver mismatch |
B | Open/short on the cable |
C | Crosstalk |
D | Jitter |
Question 94 |
A | Phishing |
B | Spam |
C | Man-in-the-middle |
D | Ransomware |
Question 95 |
A | Reverse the fiber strands of the cable and reconnect them to the server |
B | Move the fiber cable to a different port on the switch where both strands function |
C | Replace the server's single-mode fiber cable with multimode fiber |
D | Use a TDR to test both strands of a new replacement cable prior to connecting it to the server |
Question 96 |
A | 192.168.12.97 to 255.255.255.224 |
B | 192.168.12.97 to 255.255.255.240 |
C | 192.168.12.97 to 255.255.255.192 |
D | 192.168.12.97 to 255.255.255.248 |
Question 97 |
A | 12 |
B | 15 |
C | 14 |
D | 3 |
E | 13 |
Question 98 |
A | Transport |
B | Data link |
C | Presentation |
D | Session |
Question 99 |
A | 2.4 GHz |
B | 5GHz |
C | 900MHz |
D | 56MHz |
Question 100 |
Subnet 1: 192.168.1.0/26
Subnet 2: 192.168.1.65/26
Company B uses the following scheme:
Subnet 1: 192.168.1.50/28
A | PAT |
B | DMZ |
C | NAT |
D | VLAN |
Question 101 |
A | DHCP |
B | NetBIOS |
C | ICMP |
D | HTTP |
E | DNS |
Question 102 |
A | Update firmware |
B | Generate new keys |
C | Change default credentials |
D | Perform file hashing |
Question 103 |
A | Implement a Faraday cage within the building premises |
B | Require a pre-shared key for authentication to the wireless network |
C | Require PEAP for authentication to the wireless network |
D | Use MAC filtering for authorization to the wireless network |
Question 104 |
A | Telnet |
B | FTP |
C | SCP |
D | TFTP |
E | DHCP |
Question 105 |
A | Multilayer switch |
B | Switch |
C | Bridge |
D | Next-generation firewall |
Question 106 |
A | Site-to-site |
B | Point-to-multipoint |
C | Client-to-site |
D | Point-to-point |
Question 107 |
A | SFTP |
B | TFTP |
C | Telnet |
D | FTPS |
E | SSL |
Question 108 |
A | IDS |
B | VPN concentrator |
C | IPS |
D | Proxy server |
E | Load balancer |
Question 109 |
A | Upgrade to the latest firmware |
B | Generate new SSH keys |
C | Verify the default passwords have been changed |
D | Review and modify the firewall rules |
Question 110 |
A | Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the manager's desktop computers, VoIP phones, and printer |
B | One router connected to one 24-port switch configured with two VLANS: one for the manager's computers, VoIP phones, and printer, and one for the other computers, VoIP phones, and printer |
C | One router connected to one 12-port switch configured for the manager's computers, phones, and printer, and one 12-port switch configured for the other computers, VoIP phones, and printer |
D | One router connected to one 24-port switch configured with three VLANS: one for the manager's computers and printer, one for the other computers and printer, and one for the VoIP phones |
Question 111 |
A | Evil twin |
B | Phishing |
C | DDoS |
D | MITM |
E | OCSP stapling |
Question 112 |
A | The marketing department should receive a /25 network. |
B | The R&D department should receive a /27 network. |
C | The legal department should have a first usable IP address of 172.16.49.190. |
D | The marketing department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
E | The finance department should have 172.16.49.127 as a broadcast address. |
F | The R&D department should have a last usable IP address of 172.16.49.190. |
G | The R&D department should have 172.16.49.207 as a broadcast address. |
H | The legal department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
Question 113 |
A | Nmap |
B | pathping |
C | traceroute |
D | netstat |
Question 114 |
A | Create a VLAN for all unused switchports. |
B | Implement a DMZ for all external services. |
C | Create a honeypot to attract attackers. |
D | Implement root guard on all switches. |
Question 115 |
A | Loopback adapter |
B | OTDR |
C | Spectrum analyzer |
D | TDR |
Question 116 |
-WLAN architecture supporting speeds in excess of 150 Mbps
-Client less remote network access
-Port-based network access control
A | 802.11a, IPSec VPN, 802.1x |
B | 802.11g, MS-CHAP, 802.16 |
C | 802.11n, SSL-VPN, 802.1x |
D | 802.11b, PPTP,802.1x |
E | 802.11ac, MPLS, 802.3 |
Question 117 |
A | Cat 7 |
B | Cat 6a |
C | Cat 5e |
D | Cat 6 |
Question 118 |
A | Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption. |
B | Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices. |
C | Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility. |
D | Connect the legacy devices with a PSK while the modern devices should use the more secure EAP. |
Question 119 |
A | Spanning tree |
B | DHCP snooping |
C | Flood guard |
D | BPDU guard |
Question 120 |
A | PVC |
B | Cat 7 |
C | Plenum |
D | Single-mode |
Question 121 |
A | Layer 2 switch |
B | Cable modem |
C | DNS server |
D | SOHO router |
Question 122 |
A | The DNS lookup entry is incorrectly configured |
B | The reverse DNS entry is pointing to a different host |
C | There is no reverse DNS entry for this host |
D | The server IP address is incorrectly configured |
Question 123 |
A | IaaS |
B | SAN |
C | NAS |
D | SaaS |
Question 124 |
A | Document the findings |
B | Gather information |
C | Establish a plan of action |
D | Determine the symptoms |
Question 125 |
A | BYOD |
B | NDA |
C | MOU |
D | AUP |
Question 126 |
A | Add a second cable connecting the switches for redundancy and disabling STP on both switches. |
B | Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end. |
C | Replace the new switch with a hub to ensure Layer1 connectivity on the new network segment. |
D | Move the straight-through Ethernet cable connecting the switches to the first port on both switches. |
Question 127 |
A | Load balancer |
B | TCP offloading |
C | Round robin |
D | Clustering |
E | Jumbo frames |
Question 128 |
A | 3DES encryption |
B | Digital signatures |
C | Digital signatures |
D | SSL certificate |
Question 129 |
Gigabit Ethernet 1 Interface: 10.10.0.1/24 Serial 0 Interface: 10.10.0.253/30
A | The router was configured with an incorrect loopback address |
B | The router was configured with an incorrect default gateway |
C | The router was configured with an incorrect IP address |
D | The router was configured with an incorrect subnet mask |
Question 130 |
A | OCSP |
B | CRL |
C | Key escrow |
D | CSR |
Question 131 |
A | Bridge |
B | Load balancer |
C | Layer 2 switch |
D | Layer 3 switch |
Question 132 |
A | Spanning tree |
B | Port aggregation |
C | Port mirroring |
D | Trunking |
Question 133 |
A | Linux command-line tool |
B | Packet filtering utility |
C | Packet capturing utility |
D | MS Windows command-line tool |
E | Packet tracing utility |
Question 134 |
User A
IP address: 192.168.1.121
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
User B
IP address: 192.168.1.125
Subnet mask: 255.255.248.0
Default gateway: 192.168.1.1
A | User B's IP address is not a loopback address |
B | The subnet values should be the same |
C | The default gateway should have different values |
D | There is no problem identifiable by the values given. |
Question 135 |
A | VLAN hopping |
B | Session hijacking |
C | Man-in-the-middle |
D | MAC spoofing |
E | Bluesnarfing |
Question 136 |
A | RFI |
B | BRI |
C | SVC |
D | SNR |
Question 137 |
A | Jitter |
B | Attenuation |
C | Latency |
D | Frequency mismatch |
Question 138 |
A | OC3 |
B | FCoE |
C | InfiniBand |
D | iSCSI |
Question 139 |
A | The ports are associated with deprecated services |
B | The ports do not belong to a live system |
C | The ports replied with a SYN/ACK response |
D | The ports belong to an active system and are denying requests |
Question 140 |
A | Attenuation |
B | Damaged cable |
C | Incorrect pin-out |
D | Switch configuration |
Question 141 |
A | pathping |
B | nslookup |
C | nbtstat |
D | netstat |
Question 142 |
IP: 192.168.1.100
Mask: 255.255.255.0
Router: 192.168.1.1
A | Wrong SSID |
B | Channel overlap |
C | Interference |
D | Security type mismatch |
Question 143 |
A | Port 123 |
B | Port 25 |
C | Port 69 |
D | Port 161 |
Question 144 |
A | Transmits data in an unencrypted form. |
B | Encrypts network connection. |
C | It cannot be used on modern Windows computers. |
D | It does not provide authentication. |
E | Provides username & password authentication. |
F | Enables remote login and command execution. |
Question 145 |
A | Server-based firewall configuration issue |
B | VLAN routing |
C | Patch cable type |
D | DHCP scope availability |
Question 146 |
A | Add a second UPS into the rack |
B | Implement stacking on the switches in the rack |
C | Add a redundant power supply to the switch |
D | Install a power converter for the switch |
Question 147 |
A | Label existing systems with current hostnames |
B | Implement a standardized UNC |
C | Enforce port security to require system authentication |
D | Forward the DHCP logs to the security manager every day |
Question 148 |
A | tcpdump |
B | dig |
C | arp |
D | nmap |
Question 149 |
A | Offboarding |
B | Incident response |
C | DLP |
D | AUP |
E | Remote access |
Question 150 |
A | Change management |
B | Labeling report |
C | Inventory report |
D | Network diagrams |
Question 151 |
A | Question users |
B | Establish a theory of probable cause |
C | Test solutions |
D | Document findings |
E | Implement preventive measures |
F | Duplicate the problem |
Question 152 |
A | risk assessment. |
B | role separation. |
C | penetration testing. |
D | device hardening. |
Question 153 |
A | NDA |
B | SLA |
C | AUP |
D | MOU |
Question 154 |
A | Damaged cables |
B | Bent pins |
C | VLAN mismatch |
D | Crosstalk |
E | Duplex mismatch |
F | TX/RX reverse |
Question 155 |
A | 12 |
B | 2 |
C | 6 |
D | 0 |
E | 1 |
Question 156 |
“The Security certificate presented by this website was not trusted by trusted certificate authority.”
Sanuja has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error. Which of the following is the MOST likely cause of this error?
A | The SSL certificate has expired. |
B | The web server is missing an intermediate certificate. |
C | TLS is not enabled in the browser. |
D | The website is missing an HTTPS certificate. |
Question 157 |
A | Replace the UTP cable with plenum cable |
B | Set the AP to half-duplex to compensate for signal loss |
C | Install a repeater to boost the signal to its destination |
D | Upgrade the cable from Cat 5 to Cat 5e or Cat 6 |
Question 158 |
A | Use an HTTP server to share the file. |
B | Use a TFTP server and UDP protocol. |
C | Use a modem and dial-up connection. |
D | Use an FTP server and provide the file hash. |
Question 159 |
A | Take pictures upon arrival |
B | Document the scene |
C | Implement a chain of custody |
D | Secure the area |
Question 160 |
A | SFTP |
B | LC |
C | RJ45 |
D | SC |
E | DB-9 |
F | GBIC |
Question 161 |
A | Domain server |
B | Layer 2 switch |
C | Signal repeater |
D | Bridge |
E | Layer 3 switch |
Question 162 |
A | AUP |
B | NDA |
C | SLA |
D | DLP |
Question 163 |
A | Wireless router |
B | DSL modem |
C | Demarc |
D | DOCSIS modem |
E | Access point |
Question 164 |
A | NS |
B | A |
C | CNAME |
D | MX |
E | PTR |
Question 165 |
A | DHCP |
B | Routing table |
C | Dynamic routes |
D | Route redistribution |
E | Routing loop |
Question 166 |
A | Replacing the management software's self-signed certificate with a valid certificate |
B | Disabling unnecessary services from the server and management software |
C | Changing the management software's default port |
D | Changing the management software's default credentials |
Question 167 |
A | 10.8.0.0/16 |
B | 10.0.0.0/24 |
C | 10.8.0.0/19 |
D | 10.8.0.0/20 |
Question 168 |
A | ipconfig /renew |
B | ipconfig /release |
C | ipconfig /all |
D | ipconfig /flushdns |
Question 169 |
A | Ad hoc |
B | Ring |
C | Bus |
D | Partial mesh |
Question 170 |
A | MAC filtering |
B | SSL certificate |
C | WPA2 |
D | EAP-TLS |
E | Captive portal |
Question 171 |
A | Disable the SSID broadcast on each access point. |
B | Reduce the TX power on each access point. |
C | Enable AP isolation on each access point. |
D | Enable MAC address filtering on each access point. |
Question 172 |
A | MITM |
B | IDS firewall |
C | DDoS |
D | DDoS |
E | DNS sinkhole |
Question 173 |
A | Plug in to another port |
B | Modify the speed and duplex |
C | Change the switch |
D | Replace the NIC |
Question 174 |
A | OTDR |
B | Multimeter |
C | Tone generator |
D | Spectrum analyzer |
E | Protocol analyzer |
Question 175 |
A | Speed |
B | Duplex |
C | TTL |
D | MTU |
Question 176 |
A | Pre-shared key |
B | MAC filtering |
C | Geofencing |
D | Open wireless |
Question 177 |
A | Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address. |
B | Change the IP scope on the DHCP server to a public IP address range. |
C | Verify the host has physical connectivity and is on the correct VLAN. |
D | Perform a traceroute command to identify the router that is not functioning. |
Question 178 |
A | Proxy server |
B | Switch |
C | Load balancer |
D | Router |
Question 179 |
A | Protocol analyzer |
B | Network mapper |
C | WAP power level controls |
D | Logical network diagram |
Question 180 |
A | DNS SRV record |
B | Server IP address |
C | TACAS+ server time |
D | Host-based firewall settings |
Question 181 |
A | Bad port |
B | ACL misconfiguration |
C | Crosstalk |
D | Duplex/speed mismatch |
Question 182 |
Which of the following would MOST likely allow the network drives to be accessed?
A | Disable the WLAN adapter |
B | Disable the LAN adapter |
C | Update the WLAN adapter driver |
D | Check the wireless DHCP configuration |
Question 183 |
A | Switch |
B | Bridge |
C | Hub |
D | Router |
Question 184 |
A | authpriv |
B | MD5 |
C | SHA |
D | Authentication passphrase |
Question 185 |
A | SQL |
B | TCP/IP |
C | DHCP |
D | DNS |
Question 186 |
A | Broadband |
B | CSMA |
C | Analog modem |
D | Baseband |
Question 187 |
A | root |
B | systemd |
C | top |
D | gdm |
E | sanuja |
Question 188 |
A | Do nothing |
B | Implement the solution |
C | Escalate the ticket to a senior technician |
D | Document the findings and outcomes |
E | Establish a theory of probable cause |
Question 189 |
A | Loop protection is enabled on the root port of a switch. |
B | Broadcast storms entering from a root port are blocked. |
C | BPDUs entering the root bridge are ignored. |
D | The STP root bridge cannot be changed. |
Question 190 |
A | RDP |
B | NTP |
C | SSL |
D | SNMP |
E | SMB |
Question 191 |
A | Adding a fingerprint reader and retina scanner |
B | Enforcing a stronger password policy and using a hand geometry scan |
C | Using a smart card and RSA token |
D | Adding a fingerprint reader to each workstation and providing a RSA authentication token |
Question 192 |
A | Virtual switch |
B | Fiber Channel |
C | FCoE |
D | VPC |
E | vSAN |
Question 193 |
A | Tone generator |
B | Multimeter |
C | Cable tester |
D | Loopback adapter |
Question 194 |
A | SSH in tunnel mode |
B | SFTP |
C | EAP-PEAP |
D | RDP set to console connection |
Question 195 |
A | Session hijacking |
B | DDoS attack |
C | MITM attack |
D | Spoofing attack |
E | Wardriving |
Question 196 |
A | 1000BaseLX SFP |
B | Duplex GBIC |
C | Bidirectional SFP |
D | Duplex SFP+ |
Question 197 |
A | permit tcp any any eq 20 |
B | permit udp any any eq 53 |
C | permit udp any any eq 25 |
D | permit tcp any any eq 110 |
E | permit tcp any any eq 8080 |
F | permit udp any any eq 68 |
Question 198 |
A | Because FTP is not a secure service |
B | Because secure protocols would reject malicious packets |
C | Because SCP is not a secure service |
D | Because a secure firewall will protect the device |
Question 199 |
A | NIC teaming |
B | Load balancing |
C | Clustering |
D | Multiple NAT |
E | Redundant circuits |
Question 200 |
A | STP |
B | SIP |
C | VLANs |
D | DSCP |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.