← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set III
CompTIA Network+ N10-007 - Set II
Congratulations - you have completed CompTIA Network+ N10-007 - Set II.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Connect the legacy devices with a PSK while the modern devices should use the more secure EAP. |
B | Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices. |
C | Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility. |
D | Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption. |
Question 2 |
A | Enforce port security to require system authentication |
B | Label existing systems with current hostnames |
C | Implement a standardized UNC |
D | Forward the DHCP logs to the security manager every day |
Question 3 |
A | Telnet |
B | TFTP |
C | SSL |
D | SFTP |
E | FTPS |
Question 4 |
A | RADIUS server |
B | Content filter |
C | VoIP PBX |
D | Wireless controller |
Question 5 |
A | Accessing a DSL router via the console port. |
B | Implementing a modem on the AUX port to access a network device. |
C | Telnet into the router over a secure VPN. |
D | Using a secure SSH connection over the WAN link to connect to a server. |
Question 6 |
A | DDoS attacks target multiple networks |
B | Spoofing attacks require physical presence |
C | Spoofing attacks originate from a single host |
D | DDoS attacks are launched from multiple hosts |
Question 7 |
A | Packet sniffer |
B | netstat |
C | nslookup |
D | Spectrum analyzer |
Question 8 |
A | Captive portal |
B | RADIUS |
C | Single sign-on |
D | TACACS+ |
Question 9 |
A | Take pictures upon arrival |
B | Implement a chain of custody |
C | Document the scene |
D | Secure the area |
Question 10 |
A | OC3 |
B | FCoE |
C | iSCSI |
D | InfiniBand |
Question 11 |
A | Loopback adapter |
B | TDR |
C | OTDR |
D | Spectrum analyzer |
Question 12 |
A | Demarc |
B | IDF |
C | Data tier |
D | DMZ |
Question 13 |
A | Rogue DHCP server |
B | Expired IP address |
C | Misconfigured VLSM |
D | Exhausted dynamic scope |
Question 14 |
A | Motion detectors |
B | Biometric scanners |
C | Door locks |
D | Video surveillance |
Question 15 |
A | Determine the symptoms |
B | Establish a plan of action |
C | Gather information |
D | Document the findings |
Question 16 |
A | Establish a theory of probable cause |
B | Do nothing |
C | Implement the solution |
D | Document the findings and outcomes |
E | Escalate the ticket to a senior technician |
Question 17 |
A | The Faraday cage is creating interference within the bookstore. |
B | The Faraday cage is creating attenuation of the cellular network. |
C | The Faraday cage is creating latency on the cellular network. |
D | The Faraday cage prevents access by redirecting signals. |
Question 18 |
A | APIPA address |
B | Loopback address |
C | Duplicate IP addresses |
D | Duplicate MAC addresses |
Question 19 |
A | root |
B | top |
C | gdm |
D | systemd |
E | sanuja |
Question 20 |
A | Multimeter |
B | Loopback adapter |
C | Tone generator |
D | Punchdown tool |
Question 21 |
A | SIP |
B | VLANs |
C | DSCP |
D | STP |
Question 22 |
A | Analog modem |
B | CSMA |
C | Baseband |
D | Broadband |
Question 23 |
A | Disable the SMTP service on the server |
B | Disable FTP service on the server |
C | Disable DHCP service on the server |
D | Disable Telnet service on the server |
Question 24 |
A | 10Base5 |
B | 1000BaseSX |
C | 10Base2 |
D | 10GBaseT |
E | 1000BaseLX |
F | 1000BaseT |
Question 25 |
A | Channel 9 |
B | Channel 10 |
C | Channel 7 |
D | Channel 6 |
Question 26 |
User A
IP address: 192.168.1.121
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
User B
IP address: 192.168.1.125
Subnet mask: 255.255.248.0
Default gateway: 192.168.1.1
A | The default gateway should have different values |
B | User B's IP address is not a loopback address |
C | The subnet values should be the same |
D | There is no problem identifiable by the values given. |
Question 27 |
A | 240 private networks |
B | 48 collision domains, 5 broadcast domains |
C | 5 collision domains, 48 segments |
D | 48 networks, 5 segments |
E | 240 usable IP addresses |
Question 28 |
A | 12 |
B | 15 |
C | 3 |
D | 13 |
E | 14 |
Question 29 |
A | Ad hoc |
B | Ring |
C | Bus |
D | Partial mesh |
Question 30 |
A | IEEE 802.3x |
B | IEEE 802.1q |
C | IEEE 802.11ac |
D | IEEE 802.1X |
Question 31 |
A | MTU |
B | Duplex |
C | Speed |
D | TTL |
Question 32 |
A | RTP |
B | ICMP |
C | H.323 |
D | SMB |
E | SIP |
F | NTP |
Question 33 |
A | traffic-routing protocols |
B | public/private networks |
C | packet flow |
D | network devices |
Question 34 |
A | SSH in tunnel mode |
B | EAP-PEAP |
C | SFTP |
D | RDP set to console connection |
Question 35 |
A | 2048 |
B | 1022 |
C | 510 |
D | 512 |
E | 1024 |
F | 2046 |
Question 36 |
A | NTP |
B | RDP |
C | SSL |
D | SMB |
E | SNMP |
Question 37 |
A | RG-6 |
B | Cat 6 |
C | Cat 5 |
D | SMF |
E | Cat 3 |
Question 38 |
A | 3DES encryption |
B | Digital signatures |
C | SSL certificate |
D | Digital signatures |
Question 39 |
A | NDA |
B | DLP |
C | AUP |
D | SLA |
Question 40 |
A | Proxy server |
B | Router |
C | Load balancer |
D | Switch |
Question 41 |
A | International export controls |
B | Incident response policy |
C | Data loss prevention |
D | Remote access policies |
E | Licensing restrictions |
Question 42 |
A | Round robin |
B | Load balancer |
C | TCP offloading |
D | Clustering |
E | Jumbo frames |
Question 43 |
A | Change management |
B | Network configuration |
C | Network diagram |
D | Rack diagram |
Question 44 |
A | Identification card |
B | Biometric device |
C | Proximity reader |
D | Video camera |
Question 45 |
A | Packet tracing utility |
B | Linux command-line tool |
C | Packet filtering utility |
D | Packet capturing utility |
E | MS Windows command-line tool |
Question 46 |
A | VPC |
B | Virtual switch |
C | vSAN |
D | Fiber Channel |
E | FCoE |
Question 47 |
A | Spoofing attack |
B | DDoS attack |
C | MITM attack |
D | Session hijacking |
E | Wardriving |
Question 48 |
A | DHCP |
B | Route redistribution |
C | Routing table |
D | Routing loop |
E | Dynamic routes |
Question 49 |
A | Tone generator |
B | Cable tester |
C | Loopback adapter |
D | Multimeter |
Question 50 |
A | Patch cable type |
B | VLAN routing |
C | DHCP scope availability |
D | Server-based firewall configuration issue |
Question 51 |
A | Signal repeater |
B | Layer 3 switch |
C | Domain server |
D | Layer 2 switch |
E | Bridge |
Question 52 |
A | Bus |
B | Ring |
C | Star |
D | Mesh |
Question 53 |
A | One router connected to one 24-port switch configured with two VLANS: one for the manager's computers, VoIP phones, and printer, and one for the other computers, VoIP phones, and printer |
B | Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the manager's desktop computers, VoIP phones, and printer |
C | One router connected to one 12-port switch configured for the manager's computers, phones, and printer, and one 12-port switch configured for the other computers, VoIP phones, and printer |
D | One router connected to one 24-port switch configured with three VLANS: one for the manager's computers and printer, one for the other computers and printer, and one for the VoIP phones |
Question 54 |
A | tcpdump |
B | arp |
C | nmap |
D | dig |
Question 55 |
A | There are seven collision domains and three broadcast
domains. |
B | There are three collision domains and one broadcast domain. |
C | There are nine collision domains and three broadcast
domains. |
D | There is one collision domain and one broadcast domain. |
E | There are three collision domains and three broadcast
domains. |
Question 56 |
A | 10.8.0.0/20 |
B | 10.8.0.0/16 |
C | 10.8.0.0/19 |
D | 10.0.0.0/24 |
Question 57 |
A | TX/RX reverse |
B | VLAN mismatch |
C | Duplicate IP address |
D | Duplex/Speed mismatch |
Question 58 |
A | Plug in to another port |
B | Modify the speed and duplex |
C | Change the switch |
D | Replace the NIC |
Question 59 |

Which of the following devices is causing the issue?
A | Switch 1 |
B | Firewall |
C | Switch 2 |
D | Router |
Question 60 |
A | WPA-PSK |
B | EAP-TLS |
C | WEP-TKIP |
D | AES-CCMP |
Question 61 |
A | eth_addr |
B | /all |
C | -a |
D | -i address |
Question 62 |
A | CRL |
B | CSR |
C | OCSP |
D | Key escrow |
Question 63 |
A | Ports 67 and 68 |
B | Ports 56 and 57 |
C | Ports 20 and 21 |
D | Ports 80 and 443 |
E | Port 123 and 8080 |
Question 64 |
A | DDoS |
B | MITM |
C | IDS firewall |
D | DDoS |
E | DNS sinkhole |
Question 65 |
A | iSCSI |
B | Port aggregation |
C | Jumbo frames |
D | QoS tags |
Question 66 |
A | SOHO router |
B | Layer 2 switch |
C | Cable modem |
D | DNS server |
Question 67 |
A | Demarcation point |
B | Equipment closet |
C | Server room |
D | Intermediate distribution frame |
Question 68 |

Which of the following ones should the technician use to place the webserver and which of the following firewall rules should the technician configure?
A | Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the webserver |
B | Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the webserver |
C | Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the webserver |
D | Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the webserver |
Question 69 |
A | Multilayer switch |
B | Switch |
C | Bridge |
D | Next-generation firewall |
Question 70 |
A | Evil twin |
B | Phishing |
C | OCSP stapling |
D | MITM |
E | DDoS |
Question 71 |
A | Performance baseline |
B | IDF/MDF documentation |
C | Physical diagram |
D | Change management |
Question 72 |
A | MAC reservation |
B | Lease time |
C | Pool |
D | IP helper |
E | DHCP timer |
Question 73 |
IP: 192.168.1.100
Mask: 255.255.255.0
Router: 192.168.1.1
A | Channel overlap |
B | Security type mismatch |
C | Interference |
D | Wrong SSID |
Question 74 |
A | The technician should use a packet tracer to see if the traffic is getting out of the network |
B | The technician should check the internal diagnostics on all the phones to look for a common thread |
C | The technician should reset all the phones and deprovision information from the provider |
D | The technician should run ping tests on the Internet line to monitor for packet loss and latency |
Question 75 |
A | Ring |
B | Mesh |
C | Ad hoc |
D | Star |
Question 76 |
A | Port 110 |
B | Port 110 |
C | Port 22 |
D | Port 80 |
E | Port 443 |
Question 77 |
A | SNR |
B | BRI |
C | SVC |
D | RFI |
Question 78 |
A | CNAME |
B | MX |
C | AAAA |
D | SRV |
Question 79 |
A | Bridge |
B | Layer 2 switch |
C | Layer 3 switch |
D | Load balancer |
Question 80 |
A | IaaS |
B | SAN |
C | SaaS |
D | NAS |
Question 81 |
A | netstat |
B | nbtstat |
C | pathping |
D | nslookup |
Question 82 |
A | Fibre Channel |
B | RDMA |
C | iSCSI |
D | PPP |
Question 83 |
A | 802.11ac |
B | 802.11n |
C | 802.11a |
D | 802.11b |
Question 84 |
A | Disable the SSID broadcast on each access point. |
B | Reduce the TX power on each access point. |
C | Enable AP isolation on each access point. |
D | Enable MAC address filtering on each access point. |
Question 85 |
A | Captive portal |
B | EAP-TLS |
C | WP2-PSK |
D | PEAP |
Question 86 |
A | NetBIOS |
B | DHCP |
C | ICMP |
D | HTTP |
E | DNS |
Question 87 |
A | Move the fiber cable to a different port on the switch where both strands function |
B | Reverse the fiber strands of the cable and reconnect them to the server |
C | Use a TDR to test both strands of a new replacement cable prior to connecting it to the server |
D | Replace the server's single-mode fiber cable with multimode fiber |
Question 88 |
A | Create a VLAN for all unused switchports. |
B | Create a honeypot to attract attackers. |
C | Implement a DMZ for all external services. |
D | Implement root guard on all switches. |
Question 89 |
A | Install a repeater to boost the signal to its destination |
B | Set the AP to half-duplex to compensate for signal loss |
C | Replace the UTP cable with plenum cable |
D | Upgrade the cable from Cat 5 to Cat 5e or Cat 6 |
Question 90 |
A | Proxy service |
B | Intrusion detection |
C | Dynamic DNS |
D | Content filtering |
Question 91 |
A | Flood guard |
B | DHCP snooping |
C | BPDU guard |
D | Spanning tree |
Question 92 |
A | The students are using more than one wireless device port seat |
B | The students are attempting to connect 802.11g devices |
C | One of the wireless access points is on the wrong frequency |
D | Distance limitations are preventing the students from connecting |
Question 93 |
A | NDA |
B | AUP |
C | MOU |
D | SLA |
Question 94 |
A | Segments |
B | Datagrams |
C | Packets |
D | Frames |
Question 95 |
A | ipconfig /release |
B | ipconfig /renew |
C | ipconfig /flushdns |
D | ipconfig /all |
Question 96 |
A | Geotagging application |
B | VNC application |
C | Kerberos |
D | Credentials |
Question 97 |
A | Damaged cable |
B | Attenuation |
C | Switch configuration |
D | Incorrect pin-out |
Question 98 |
Gigabit Ethernet 1 Interface: 10.10.0.1/24 Serial 0 Interface: 10.10.0.253/30
A | The router was configured with an incorrect default gateway |
B | The router was configured with an incorrect loopback address |
C | The router was configured with an incorrect subnet mask |
D | The router was configured with an incorrect IP address |
Question 99 |
A | LC |
B | SFTP |
C | SC |
D | DB-9 |
E | GBIC |
F | RJ45 |
Question 100 |
A | Damaged cables |
B | VLAN mismatch |
C | TX/RX reverse |
D | Duplex mismatch |
E | Crosstalk |
F | Bent pins |
Question 101 |
A | 900MHz |
B | 5GHz |
C | 2.4 GHz |
D | 56MHz |
Question 102 |
A | None, the network looks good. |
B | Cable 3 should be an STP cable. |
C | Cable 2 should be an STP cable. |
D | Cable 1 does not need to be plenum rated. |
Question 103 |
A | The ports belong to an active system and are denying requests |
B | The ports are associated with deprecated services |
C | The ports replied with a SYN/ACK response |
D | The ports do not belong to a live system |
Question 104 |
A | Reviewing a vulnerability scan |
B | Reviewing application logs |
C | Reviewing SLA requirements |
D | Reviewing a baseline report |
Question 105 |
A | Load balancing |
B | NIC teaming |
C | Multiple NAT |
D | Clustering |
E | Redundant circuits |
Question 106 |
A | Host-based firewall settings |
B | TACAS+ server time |
C | DNS SRV record |
D | Server IP address |
Question 107 |
A | The cable is a Cat 5 cable |
B | The cable is rollover cable |
C | The cable is a crossover cable |
D | The cable has bent pins |
E | The cable is damaged |
Question 108 |
A | Use MAC filtering for authorization to the wireless network |
B | Require PEAP for authentication to the wireless network |
C | Require a pre-shared key for authentication to the wireless network |
D | Implement a Faraday cage within the building premises |
Question 109 |
A | ISDN |
B | PRI |
C | Broadband cable |
D | MPLS |
E | Frame relay |
Question 110 |
A | The STP root bridge cannot be changed. |
B | Loop protection is enabled on the root port of a switch. |
C | BPDUs entering the root bridge are ignored. |
D | Broadcast storms entering from a root port are blocked. |
Question 111 |
A | MAC filtering |
B | Geofencing |
C | Pre-shared key |
D | Open wireless |
Question 112 |
A | LADP |
B | DHCP |
C | DNS |
D | ICMP |
E | HTTP |
Question 113 |
A | Crosstalk |
B | ACL misconfiguration |
C | Bad port |
D | Duplex/speed mismatch |
Question 114 |
A | Use a modem and dial-up connection. |
B | Use an HTTP server to share the file. |
C | Use a TFTP server and UDP protocol. |
D | Use an FTP server and provide the file hash. |
Question 115 |
Image Credits: https://www.homedepot.com/p/ Ideal-Punchdown-Tool- with-110-and-66- Blades-35-485/ 203761571
A | Butt set |
B | Punchdown tool |
C | Tone generator and locator |
D | Crimper |
Question 116 |
A | Frequency mismatch |
B | Attenuation |
C | Jitter |
D | Latency |
Question 117 |
A | Presentation |
B | Session |
C | Data link |
D | Transport |
Question 118 |
A | 192.168.12.97 to 255.255.255.240 |
B | 192.168.12.97 to 255.255.255.224 |
C | 192.168.12.97 to 255.255.255.248 |
D | 192.168.12.97 to 255.255.255.192 |
Question 119 |

Which of the following would MOST likely allow the network drives to be accessed?
A | Disable the WLAN adapter |
B | Disable the LAN adapter |
C | Update the WLAN adapter driver |
D | Check the wireless DHCP configuration |
Question 120 |
route add 0.0.0.0 mask 0.0.0.0 192.169.1.222 metric 1
A | The technician is clearing the route table. |
B | The technician is clearing the subnet mas setting. |
C | The technician is adding a static IP address. |
D | The technician is setting the default gateway. |
Question 121 |
A | permit udp any any eq 68 |
B | permit udp any any eq 53 |
C | permit tcp any any eq 110 |
D | permit tcp any any eq 20 |
E | permit udp any any eq 25 |
F | permit tcp any any eq 8080 |
Question 122 |
A | Ping table |
B | IP helper |
C | DNS record type |
D | TTL |
E | DHCP lease time |
Question 123 |
A | Bluesnarfing |
B | VLAN hopping |
C | Man-in-the-middle |
D | Session hijacking |
E | MAC spoofing |
Question 124 |
A | Port 161 |
B | Port 25 |
C | Port 69 |
D | Port 123 |
Question 125 |
A | Backs up all files and sets the archive bit. |
B | Backs up files with the archive bit set but does not clear the bit. |
C | Backs up files with the creation or modified date as the current date. |
D | Backs up files with a date earlier than today’s date with a clear archive bit. |
Question 126 |
A | Incident response |
B | AUP |
C | Offboarding |
D | Remote access |
E | DLP |
Question 127 |
A | SFTP |
B | TLS |
C | LDAP |
D | SSH |
Question 128 |
A | Replacing the management software's self-signed certificate with a valid certificate |
B | Changing the management software's default credentials |
C | Changing the management software's default port |
D | Disabling unnecessary services from the server and management software |
Question 129 |
A | Disable virtual ports. |
B | Reset the two-factor token. |
C | Disable unused ports. |
D | Upgrade the firmware. |
Question 130 |
A | Packet sniffer |
B | Multimeter |
C | Spectrum analyzer |
D | OTDR |
Question 131 |
A | Document findings |
B | Duplicate the problem |
C | Establish a theory of probable cause |
D | Test solutions |
E | Implement preventive measures |
F | Question users |
Question 132 |
A | Telnet |
B | TFTP |
C | DHCP |
D | SCP |
E | FTP |
Question 133 |
A | Allocation of IP addresses |
B | Retrieving contents of an Internet page from a web server |
C | Monitoring of network-attached devices |
D | Synchronization of clocks over a computer network |
Question 134 |
A | EAP-TLS |
B | WPA2 |
C | SSL certificate |
D | MAC filtering |
E | Captive portal |
Question 135 |
A | Activate MAC address filtering. |
B | Implement WEP authentication. |
C | Change the WiFi password. |
D | Disable the SSID broadcast. |
Question 136 |
“The Security certificate presented by this website was not trusted by trusted certificate authority.”
Sanuja has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error. Which of the following is the MOST likely cause of this error?
A | The web server is missing an intermediate certificate. |
B | The SSL certificate has expired. |
C | The website is missing an HTTPS certificate. |
D | TLS is not enabled in the browser. |
Question 137 |
A | Cat 6a |
B | Cat 6 |
C | Cat 7 |
D | Cat 5e |
Question 138 |
A | WAP power level controls |
B | Logical network diagram |
C | Network mapper |
D | Protocol analyzer |
Question 139 |
A | The use of autonomous APs with a load balancer |
B | The use of lightweight APs with a load balancer |
C | The use of autonomous APs with a wireless controller |
D | The use of lightweight APs with a wireless controller |
Question 140 |
A | DHCP reservation for the laptops MACs |
B | IP helper relay system for configuration hops |
C | Additional lease time for the laptop computers |
D | CNAME record in the users dynamic DNS accounts |
Question 141 |
A | Swipe badges |
B | Video cameras |
C | Sign-in sheets |
D | Motion sensors |
Question 142 |
A | HTTP over WPA2-TKIP WiFi |
B | Telnet over PSTN |
C | SSH over IPsec client-to-site VPN |
D | RDP over SSLv2 HTTPS terminal services gateway |
Question 143 |
A | Add a second cable connecting the switches for redundancy and disabling STP on both switches. |
B | Replace the new switch with a hub to ensure Layer1 connectivity on the new network segment. |
C | Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end. |
D | Move the straight-through Ethernet cable connecting the switches to the first port on both switches. |
Question 144 |
A | There are 12 collision domains, one for each switch connection. |
B | There is one collision domain for this network. |
C | There are 3 collision domains, one for each switch-to-switch connection. |
D | There are 9 collision domains, one for each half-duplex connection. |
Question 145 |
A | SSL |
B | SSH |
C | FTP |
D | CHAP |
E | SNMP |
Question 146 |
A | Session hijacking |
B | Trojan horse |
C | Logic bomb |
D | Insider threat |
E | Social engineering |
Question 147 |
Subnet 1: 192.168.1.0/26
Subnet 2: 192.168.1.65/26
Company B uses the following scheme:
Subnet 1: 192.168.1.50/28
A | PAT |
B | NAT |
C | DMZ |
D | VLAN |
Question 148 |
A | DOCSIS modem |
B | Wireless router |
C | DSL modem |
D | Access point |
E | Demarc |
Question 149 |
A | NDA |
B | MOU |
C | BYOD |
D | AUP |
Question 150 |
A | Site-to-site |
B | Client-to-site |
C | Point-to-multipoint |
D | Point-to-point |
Question 151 |
A | STP cabling |
B | Fiber-optic cabling |
C | UTP cabling |
D | Coaxial cabling |
Question 152 |
A | It provides multiple broadcast domains within a single collision domain |
B | It provides multiple collision domains on one switchport |
C | It segments broadcast domains in the network infrastructure |
D | It provides a faster port to all servers |
Question 153 |
A | Acceptable use |
B | Asset disposal |
C | Data loss prevention |
D | Incident response |
Question 154 |
A | 12 |
B | 1 |
C | 2 |
D | 6 |
E | 0 |
Question 155 |
A | Adding a router diverts traffic to an alternate path through the network. |
B | Adding a router prevents computers on one LAN from communicating with computers on another LAN. |
C | Adding a router reduces the amount of unicast traffic on each of the two LANs. |
D | Adding a router reduces the amount of broadcast traffic on each of the two LANs. |
Question 156 |
A | Because SCP is not a secure service |
B | Because a secure firewall will protect the device |
C | Because FTP is not a secure service |
D | Because secure protocols would reject malicious packets |
Question 157 |
A | Spectrum analyzer |
B | Tone generator |
C | Protocol analyzer |
D | Multimeter |
E | OTDR |
Question 158 |
A | Plenum |
B | Single-mode |
C | Cat 7 |
D | PVC |
Question 159 |
A | MD5 |
B | authpriv |
C | Authentication passphrase |
D | SHA |
Question 160 |
A | SNMP host |
B | SNMP agent |
C | OUI |
D | OID |
E | OTDR |
Question 161 |
A | LDAP |
B | Telnet |
C | TFTP |
D | Samba |
Question 162 |
A | The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours. |
B | The LAN and WLAN should be configured in the DMZ so traffic is denied automatically. |
C | The LAN and WLAN should be configured in separate zones with a firewall in between. |
D | The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules. |
Question 163 |
A | It does not provide authentication. |
B | Encrypts network connection. |
C | It cannot be used on modern Windows computers. |
D | Provides username & password authentication. |
E | Transmits data in an unencrypted form. |
F | Enables remote login and command execution. |
Question 164 |
A | The legal department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
B | The R&D department should have 172.16.49.207 as a broadcast address. |
C | The finance department should have 172.16.49.127 as a broadcast address. |
D | The marketing department should receive a /25 network. |
E | The R&D department should receive a /27 network. |
F | The R&D department should have a last usable IP address of 172.16.49.190. |
G | The marketing department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
H | The legal department should have a first usable IP address of 172.16.49.190. |
Question 165 |
A | Switch |
B | Bridge |
C | Router |
D | Hub |
Question 166 |
A | ASIC |
B | SFP |
C | MDI-X |
D | GBIC |
E | SPF |
Question 167 |
A | Layer 1 – Physical |
B | Layer 3 – Network |
C | Layer 7 – Application |
D | Layer 6 - Presentation |
E | Layer 4 – Transport |
Question 168 |
A | Upgrade to the latest firmware |
B | Verify the default passwords have been changed |
C | Review and modify the firewall rules |
D | Generate new SSH keys |
Question 169 |
A | penetration testing. |
B | role separation. |
C | device hardening. |
D | risk assessment. |
Question 170 |
A | Social engineering |
B | Evil twin |
C | DHCP exhaustion |
D | Session hijacking |
E | ARP poisoning |
Question 171 |
A | Phishing |
B | Spam |
C | Ransomware |
D | Man-in-the-middle |
Question 172 |
A | Install a power converter for the switch |
B | Add a redundant power supply to the switch |
C | Implement stacking on the switches in the rack |
D | Add a second UPS into the rack |
Question 173 |
A | 2001::d58::95:7565:1 |
B | 2001:0:0d58::95:7565:1 |
C | 2001:0:d58:0:0:95:7565:1 |
D | 2001:0:d58::95:7565:1 |
Question 174 |
A | Firewall |
B | Router |
C | Media converter |
D | Wireless access point |
E | Network switch |
Question 175 |
A | DHCP |
B | DNS |
C | TCP/IP |
D | SQL |
Question 176 |
A | Network diagrams |
B | Labeling report |
C | Inventory report |
D | Change management |
Question 177 |
A | Jitter |
B | Crosstalk |
C | Open/short on the cable |
D | Transceiver mismatch |
Question 178 |
A | Adding a fingerprint reader and retina scanner |
B | Using a smart card and RSA token |
C | Adding a fingerprint reader to each workstation and providing a RSA authentication token |
D | Enforcing a stronger password policy and using a hand geometry scan |
Question 179 |
A | NAC |
B | MFA |
C | Certificate |
D | SSO |
E | Kerberos |
F | RADIUS |
Question 180 |
A | Generate new keys |
B | Change default credentials |
C | Perform file hashing |
D | Update firmware |
Question 181 |
A | There is interference with the smart reader |
B | The utility company throttles power during peak hours |
C | An IoT device is causing a DoS attack on the wireless network |
D | There is additional data being transferred over the wireless network |
Question 182 |
A | Incremental |
B | Replica |
C | Differential |
D | Snapshots |
Question 183 |
-WLAN architecture supporting speeds in excess of 150 Mbps
-Client less remote network access
-Port-based network access control
A | 802.11a, IPSec VPN, 802.1x |
B | 802.11n, SSL-VPN, 802.1x |
C | 802.11b, PPTP,802.1x |
D | 802.11g, MS-CHAP, 802.16 |
E | 802.11ac, MPLS, 802.3 |
Question 184 |
A | Spanning tree |
B | Trunking |
C | Port aggregation |
D | Port mirroring |
Question 185 |
A | UDP |
B | None of the answers are correct. |
C | TCP |
D | IP |
E | Ethernet |
Question 186 |
A | pathping |
B | traceroute |
C | netstat |
D | Nmap |
Question 187 |
A | The reverse DNS entry is pointing to a different host |
B | The server IP address is incorrectly configured |
C | The DNS lookup entry is incorrectly configured |
D | There is no reverse DNS entry for this host |
Question 188 |
A | Physical |
B | Transport |
C | Application |
D | Network |
Question 189 |
A | Duplex GBIC |
B | 1000BaseLX SFP |
C | Duplex SFP+ |
D | Bidirectional SFP |
Question 190 |
A | 802.11ac |
B | 802.1q |
C | 802.1X |
D | 802.3at |
E | 802.3af |
Question 191 |
A | Media type |
B | Hostname |
C | Room number |
D | Rack location |
Question 192 |
A | Reverse the wires leading to pins 2 and 4 |
B | Reverse the wires leading to pins 2 and 3 |
C | Reverse the wires leading to pins 1 and 2 |
D | Reverse the wires leading to pins 1 and 3 |
Question 193 |
A | 172.16.0.0/22 |
B | 192.168.25.0/24 |
C | 10.233.2.0/23 |
D | 172.18.0.0/23 |
E | 10.5.4.0/22 |
Question 194 |
A | IDS |
B | Proxy server |
C | IPS |
D | VPN concentrator |
E | Load balancer |
Question 195 |
A | TX/RX reverse |
B | Attenuation |
C | Open/short |
D | EMI |
Question 196 |
A | dig |
B | arp |
C | ipconfig |
D | nslookup |
Question 197 |
A | Create a rack diagram |
B | Create a network baseline |
C | Create a port location diagram |
D | Create an inventory database |
Question 198 |
A | PTR |
B | CNAME |
C | MX |
D | A |
E | NS |
Question 199 |
A | PPTP |
B | PTP |
C | SSL VPN |
D | IPSec |
Question 200 |
A | Perform a traceroute command to identify the router that is not functioning. |
B | Change the IP scope on the DHCP server to a public IP address range. |
C | Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address. |
D | Verify the host has physical connectivity and is on the correct VLAN. |
← |
List |
→ |
| 1 | 2 | 3 | 4 | 5 |
| 6 | 7 | 8 | 9 | 10 |
| 11 | 12 | 13 | 14 | 15 |
| 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 |
| 26 | 27 | 28 | 29 | 30 |
| 31 | 32 | 33 | 34 | 35 |
| 36 | 37 | 38 | 39 | 40 |
| 41 | 42 | 43 | 44 | 45 |
| 46 | 47 | 48 | 49 | 50 |
| 51 | 52 | 53 | 54 | 55 |
| 56 | 57 | 58 | 59 | 60 |
| 61 | 62 | 63 | 64 | 65 |
| 66 | 67 | 68 | 69 | 70 |
| 71 | 72 | 73 | 74 | 75 |
| 76 | 77 | 78 | 79 | 80 |
| 81 | 82 | 83 | 84 | 85 |
| 86 | 87 | 88 | 89 | 90 |
| 91 | 92 | 93 | 94 | 95 |
| 96 | 97 | 98 | 99 | 100 |
| 101 | 102 | 103 | 104 | 105 |
| 106 | 107 | 108 | 109 | 110 |
| 111 | 112 | 113 | 114 | 115 |
| 116 | 117 | 118 | 119 | 120 |
| 121 | 122 | 123 | 124 | 125 |
| 126 | 127 | 128 | 129 | 130 |
| 131 | 132 | 133 | 134 | 135 |
| 136 | 137 | 138 | 139 | 140 |
| 141 | 142 | 143 | 144 | 145 |
| 146 | 147 | 148 | 149 | 150 |
| 151 | 152 | 153 | 154 | 155 |
| 156 | 157 | 158 | 159 | 160 |
| 161 | 162 | 163 | 164 | 165 |
| 166 | 167 | 168 | 169 | 170 |
| 171 | 172 | 173 | 174 | 175 |
| 176 | 177 | 178 | 179 | 180 |
| 181 | 182 | 183 | 184 | 185 |
| 186 | 187 | 188 | 189 | 190 |
| 191 | 192 | 193 | 194 | 195 |
| 196 | 197 | 198 | 199 | 200 |
| End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.






