← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set III
CompTIA Network+ N10-007 - Set II
Congratulations - you have completed CompTIA Network+ N10-007 - Set II.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
Image Credits: https://www.homedepot.com/p/ Ideal-Punchdown-Tool- with-110-and-66- Blades-35-485/ 203761571
A | Butt set |
B | Crimper |
C | Punchdown tool |
D | Tone generator and locator |
Question 2 |
A | The use of autonomous APs with a load balancer |
B | The use of lightweight APs with a load balancer |
C | The use of lightweight APs with a wireless controller |
D | The use of autonomous APs with a wireless controller |
Question 3 |
A | Proximity reader |
B | Biometric device |
C | Video camera |
D | Identification card |
Question 4 |
A | OTDR |
B | Packet sniffer |
C | Spectrum analyzer |
D | Multimeter |
Question 5 |
A | The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules. |
B | The LAN and WLAN should be configured in separate zones with a firewall in between. |
C | The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours. |
D | The LAN and WLAN should be configured in the DMZ so traffic is denied automatically. |
Question 6 |
A | Remote access |
B | Offboarding |
C | Incident response |
D | AUP |
E | DLP |
Question 7 |
A | Change the WiFi password. |
B | Disable the SSID broadcast. |
C | Activate MAC address filtering. |
D | Implement WEP authentication. |
Question 8 |
A | 2046 |
B | 2048 |
C | 1022 |
D | 1024 |
E | 510 |
F | 512 |
Question 9 |
A | WP2-PSK |
B | PEAP |
C | EAP-TLS |
D | Captive portal |
Question 10 |
A | Loopback adapter |
B | Multimeter |
C | Cable tester |
D | Tone generator |
Question 11 |
A | CRL |
B | CSR |
C | OCSP |
D | Key escrow |
Question 12 |
A | IaaS |
B | SAN |
C | NAS |
D | SaaS |
Question 13 |
A | STP cabling |
B | Coaxial cabling |
C | Fiber-optic cabling |
D | UTP cabling |
Question 14 |
A | 192.168.12.97 to 255.255.255.192 |
B | 192.168.12.97 to 255.255.255.224 |
C | 192.168.12.97 to 255.255.255.240 |
D | 192.168.12.97 to 255.255.255.248 |
Question 15 |
A | Datagrams |
B | Packets |
C | Frames |
D | Segments |
Question 16 |
A | Retrieving contents of an Internet page from a web server |
B | Synchronization of clocks over a computer network |
C | Allocation of IP addresses |
D | Monitoring of network-attached devices |
Question 17 |
A | IDF/MDF documentation |
B | Change management |
C | Physical diagram |
D | Performance baseline |
Question 18 |
A | Load balancer |
B | Layer 2 switch |
C | Bridge |
D | Layer 3 switch |
Question 19 |
A | 802.1X |
B | 802.1q |
C | 802.3af |
D | 802.3at |
E | 802.11ac |
Question 20 |
A | Logical network diagram |
B | WAP power level controls |
C | Network mapper |
D | Protocol analyzer |
Question 21 |
A | There are three collision domains and three broadcast
domains. |
B | There is one collision domain and one broadcast domain. |
C | There are three collision domains and one broadcast domain. |
D | There are nine collision domains and three broadcast
domains. |
E | There are seven collision domains and three broadcast
domains. |
Question 22 |
A | penetration testing. |
B | role separation. |
C | device hardening. |
D | risk assessment. |
Question 23 |
A | RADIUS |
B | Kerberos |
C | Certificate |
D | MFA |
E | SSO |
F | NAC |
Question 24 |
A | FTP |
B | CHAP |
C | SSL |
D | SSH |
E | SNMP |
Question 25 |
A | Domain server |
B | Layer 2 switch |
C | Layer 3 switch |
D | Signal repeater |
E | Bridge |
Question 26 |
A | MTU |
B | Duplex |
C | TTL |
D | Speed |
Question 27 |
A | permit tcp any any eq 8080 |
B | permit udp any any eq 25 |
C | permit tcp any any eq 110 |
D | permit udp any any eq 68 |
E | permit udp any any eq 53 |
F | permit tcp any any eq 20 |
Question 28 |
A | Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address. |
B | Change the IP scope on the DHCP server to a public IP address range. |
C | Perform a traceroute command to identify the router that is not functioning. |
D | Verify the host has physical connectivity and is on the correct VLAN. |
Question 29 |
A | DNS sinkhole |
B | DDoS |
C | DDoS |
D | IDS firewall |
E | MITM |
Question 30 |
A | InfiniBand |
B | iSCSI |
C | OC3 |
D | FCoE |
Question 31 |
A | authpriv |
B | MD5 |
C | Authentication passphrase |
D | SHA |
Question 32 |
A | Access point |
B | DSL modem |
C | Wireless router |
D | Demarc |
E | DOCSIS modem |
Question 33 |
A | pathping |
B | netstat |
C | nslookup |
D | nbtstat |
Question 34 |
A | DDoS |
B | Phishing |
C | Evil twin |
D | MITM |
E | OCSP stapling |
Question 35 |
A | Establish a plan of action |
B | Document the findings |
C | Gather information |
D | Determine the symptoms |
Question 36 |
A | GBIC |
B | DB-9 |
C | SC |
D | RJ45 |
E | LC |
F | SFTP |
Question 37 |
A | Wireless controller |
B | VoIP PBX |
C | RADIUS server |
D | Content filter |
Question 38 |
A | It segments broadcast domains in the network infrastructure |
B | It provides a faster port to all servers |
C | It provides multiple broadcast domains within a single collision domain |
D | It provides multiple collision domains on one switchport |
Question 39 |
A | BPDU guard |
B | Spanning tree |
C | Flood guard |
D | DHCP snooping |
Question 40 |
A | IP helper relay system for configuration hops |
B | Additional lease time for the laptop computers |
C | DHCP reservation for the laptops MACs |
D | CNAME record in the users dynamic DNS accounts |
Question 41 |
A | The STP root bridge cannot be changed. |
B | Broadcast storms entering from a root port are blocked. |
C | Loop protection is enabled on the root port of a switch. |
D | BPDUs entering the root bridge are ignored. |
Question 42 |
A | Ad hoc |
B | Partial mesh |
C | Bus |
D | Ring |
Question 43 |
A | Perform file hashing |
B | Change default credentials |
C | Generate new keys |
D | Update firmware |
Question 44 |
A | 802.11ac |
B | 802.11b |
C | 802.11n |
D | 802.11a |
Question 45 |
A | Incident response |
B | Acceptable use |
C | Data loss prevention |
D | Asset disposal |
Question 46 |
A | Video cameras |
B | Sign-in sheets |
C | Swipe badges |
D | Motion sensors |
Question 47 |
A | RDMA |
B | Fibre Channel |
C | iSCSI |
D | PPP |
Question 48 |
A | 3 |
B | 15 |
C | 14 |
D | 13 |
E | 12 |
Question 49 |
A | DNS server |
B | SOHO router |
C | Layer 2 switch |
D | Cable modem |
Question 50 |
A | DHCP scope availability |
B | VLAN routing |
C | Patch cable type |
D | Server-based firewall configuration issue |
Question 51 |
A | Disable DHCP service on the server |
B | Disable Telnet service on the server |
C | Disable the SMTP service on the server |
D | Disable FTP service on the server |
Question 52 |
route add 0.0.0.0 mask 0.0.0.0 192.169.1.222 metric 1
A | The technician is setting the default gateway. |
B | The technician is adding a static IP address. |
C | The technician is clearing the subnet mas setting. |
D | The technician is clearing the route table. |
Question 53 |
A | Disable unused ports. |
B | Disable virtual ports. |
C | Reset the two-factor token. |
D | Upgrade the firmware. |
Question 54 |
A | Content filtering |
B | Proxy service |
C | Dynamic DNS |
D | Intrusion detection |
Question 55 |
Subnet 1: 192.168.1.0/26
Subnet 2: 192.168.1.65/26
Company B uses the following scheme:
Subnet 1: 192.168.1.50/28
A | PAT |
B | DMZ |
C | VLAN |
D | NAT |
Question 56 |
A | Loopback address |
B | Duplicate IP addresses |
C | APIPA address |
D | Duplicate MAC addresses |
Question 57 |
A | Attenuation |
B | Jitter |
C | Frequency mismatch |
D | Latency |
Question 58 |
A | Router |
B | Hub |
C | Switch |
D | Bridge |
Question 59 |
A | LADP |
B | DHCP |
C | HTTP |
D | DNS |
E | ICMP |
Question 60 |
A | TACACS+ |
B | Captive portal |
C | Single sign-on |
D | RADIUS |
Question 61 |
A | arp |
B | ipconfig |
C | dig |
D | nslookup |
Question 62 |
A | Document the findings and outcomes |
B | Do nothing |
C | Escalate the ticket to a senior technician |
D | Establish a theory of probable cause |
E | Implement the solution |
Question 63 |
A | SSL |
B | SNMP |
C | NTP |
D | RDP |
E | SMB |
Question 64 |
A | Install a power converter for the switch |
B | Implement stacking on the switches in the rack |
C | Add a second UPS into the rack |
D | Add a redundant power supply to the switch |
Question 65 |
A | Pre-shared key |
B | Open wireless |
C | Geofencing |
D | MAC filtering |
Question 66 |
A | Change management |
B | Labeling report |
C | Inventory report |
D | Network diagrams |
Question 67 |
A | TX/RX reverse |
B | EMI |
C | Open/short |
D | Attenuation |
Question 68 |
A | HTTP over WPA2-TKIP WiFi |
B | SSH over IPsec client-to-site VPN |
C | Telnet over PSTN |
D | RDP over SSLv2 HTTPS terminal services gateway |
Question 69 |
A | Crosstalk |
B | Bad port |
C | ACL misconfiguration |
D | Duplex/speed mismatch |
Question 70 |
A | ipconfig /flushdns |
B | ipconfig /release |
C | ipconfig /renew |
D | ipconfig /all |
Question 71 |
A | Load balancer |
B | Jumbo frames |
C | Round robin |
D | Clustering |
E | TCP offloading |
Question 72 |
A | nslookup |
B | Spectrum analyzer |
C | netstat |
D | Packet sniffer |
Question 73 |
A | Switch |
B | Proxy server |
C | Router |
D | Load balancer |
Question 74 |
A | The technician should reset all the phones and deprovision information from the provider |
B | The technician should use a packet tracer to see if the traffic is getting out of the network |
C | The technician should run ping tests on the Internet line to monitor for packet loss and latency |
D | The technician should check the internal diagnostics on all the phones to look for a common thread |
Question 75 |
A | Duplicate IP address |
B | Duplex/Speed mismatch |
C | VLAN mismatch |
D | TX/RX reverse |
Question 76 |
A | Intermediate distribution frame |
B | Equipment closet |
C | Server room |
D | Demarcation point |
Question 77 |
A | Digital signatures |
B | 3DES encryption |
C | Digital signatures |
D | SSL certificate |
Question 78 |
A | Document findings |
B | Duplicate the problem |
C | Establish a theory of probable cause |
D | Question users |
E | Test solutions |
F | Implement preventive measures |
Question 79 |
A | Create a honeypot to attract attackers. |
B | Implement root guard on all switches. |
C | Create a VLAN for all unused switchports. |
D | Implement a DMZ for all external services. |
Question 80 |
A | Enforcing a stronger password policy and using a hand geometry scan |
B | Adding a fingerprint reader and retina scanner |
C | Using a smart card and RSA token |
D | Adding a fingerprint reader to each workstation and providing a RSA authentication token |
Question 81 |
A | 10.0.0.0/24 |
B | 10.8.0.0/16 |
C | 10.8.0.0/19 |
D | 10.8.0.0/20 |
Question 82 |
A | 56MHz |
B | 5GHz |
C | 900MHz |
D | 2.4 GHz |
Question 83 |
“The Security certificate presented by this website was not trusted by trusted certificate authority.”
Sanuja has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error. Which of the following is the MOST likely cause of this error?
A | The SSL certificate has expired. |
B | The website is missing an HTTPS certificate. |
C | TLS is not enabled in the browser. |
D | The web server is missing an intermediate certificate. |
Question 84 |
A | Multimeter |
B | Protocol analyzer |
C | Tone generator |
D | Spectrum analyzer |
E | OTDR |
Question 85 |
A | RFI |
B | SVC |
C | BRI |
D | SNR |
Question 86 |
A | Enforce port security to require system authentication |
B | Implement a standardized UNC |
C | Forward the DHCP logs to the security manager every day |
D | Label existing systems with current hostnames |
Question 87 |
A | iSCSI |
B | Jumbo frames |
C | Port aggregation |
D | QoS tags |
Question 88 |
A | Tone generator |
B | Loopback adapter |
C | Multimeter |
D | Punchdown tool |
Question 89 |
A | Attenuation |
B | Switch configuration |
C | Damaged cable |
D | Incorrect pin-out |
Question 90 |
A | Upgrade to the latest firmware |
B | Review and modify the firewall rules |
C | Generate new SSH keys |
D | Verify the default passwords have been changed |
Question 91 |
A | CNAME |
B | AAAA |
C | SRV |
D | MX |
Question 92 |
Which of the following ones should the technician use to place the webserver and which of the following firewall rules should the technician configure?
A | Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the webserver |
B | Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the webserver |
C | Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the webserver |
D | Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the webserver |
Question 93 |
A | Ping table |
B | TTL |
C | DHCP lease time |
D | IP helper |
E | DNS record type |
Question 94 |
A | Expired IP address |
B | Misconfigured VLSM |
C | Rogue DHCP server |
D | Exhausted dynamic scope |
Question 95 |
A | Move the fiber cable to a different port on the switch where both strands function |
B | Replace the server's single-mode fiber cable with multimode fiber |
C | Reverse the fiber strands of the cable and reconnect them to the server |
D | Use a TDR to test both strands of a new replacement cable prior to connecting it to the server |
Question 96 |
A | 5 collision domains, 48 segments |
B | 48 networks, 5 segments |
C | 240 private networks |
D | 240 usable IP addresses |
E | 48 collision domains, 5 broadcast domains |
Question 97 |
A | One of the wireless access points is on the wrong frequency |
B | The students are using more than one wireless device port seat |
C | The students are attempting to connect 802.11g devices |
D | Distance limitations are preventing the students from connecting |
Question 98 |
A | Reverse the wires leading to pins 2 and 4 |
B | Reverse the wires leading to pins 1 and 3 |
C | Reverse the wires leading to pins 1 and 2 |
D | Reverse the wires leading to pins 2 and 3 |
Question 99 |
A | Mesh |
B | Ad hoc |
C | Star |
D | Ring |
Question 100 |
A | There are 12 collision domains, one for each switch connection. |
B | There is one collision domain for this network. |
C | There are 3 collision domains, one for each switch-to-switch connection. |
D | There are 9 collision domains, one for each half-duplex connection. |
Question 101 |
A | The ports do not belong to a live system |
B | The ports belong to an active system and are denying requests |
C | The ports are associated with deprecated services |
D | The ports replied with a SYN/ACK response |
Question 102 |
A | AUP |
B | NDA |
C | SLA |
D | MOU |
Question 103 |
A | The marketing department should receive a /25 network. |
B | The R&D department should receive a /27 network. |
C | The R&D department should have 172.16.49.207 as a broadcast address. |
D | The marketing department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
E | The legal department should have a first usable IP address of 172.16.49.190. |
F | The finance department should have 172.16.49.127 as a broadcast address. |
G | The R&D department should have a last usable IP address of 172.16.49.190. |
H | The legal department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
Question 104 |
A | Bidirectional SFP |
B | Duplex GBIC |
C | Duplex SFP+ |
D | 1000BaseLX SFP |
Question 105 |
A | eth_addr |
B | -a |
C | -i address |
D | /all |
Question 106 |
A | International export controls |
B | Data loss prevention |
C | Incident response policy |
D | Licensing restrictions |
E | Remote access policies |
Question 107 |
A | DMZ |
B | IDF |
C | Data tier |
D | Demarc |
Question 108 |
A | Social engineering |
B | Insider threat |
C | Trojan horse |
D | Logic bomb |
E | Session hijacking |
Question 109 |
Gigabit Ethernet 1 Interface: 10.10.0.1/24 Serial 0 Interface: 10.10.0.253/30
A | The router was configured with an incorrect IP address |
B | The router was configured with an incorrect default gateway |
C | The router was configured with an incorrect loopback address |
D | The router was configured with an incorrect subnet mask |
Question 110 |
A | Port aggregation |
B | Spanning tree |
C | Port mirroring |
D | Trunking |
Question 111 |
A | Create a port location diagram |
B | Create an inventory database |
C | Create a rack diagram |
D | Create a network baseline |
Question 112 |
A | Accessing a DSL router via the console port. |
B | Using a secure SSH connection over the WAN link to connect to a server. |
C | Implementing a modem on the AUX port to access a network device. |
D | Telnet into the router over a secure VPN. |
Question 113 |
A | Because secure protocols would reject malicious packets |
B | Because a secure firewall will protect the device |
C | Because SCP is not a secure service |
D | Because FTP is not a secure service |
Question 114 |
A | Single-mode |
B | Cat 7 |
C | Plenum |
D | PVC |
Question 115 |
A | Port 22 |
B | Port 110 |
C | Port 110 |
D | Port 443 |
E | Port 80 |
Question 116 |
A | VNC application |
B | Geotagging application |
C | Kerberos |
D | Credentials |
Question 117 |
A | Point-to-multipoint |
B | Client-to-site |
C | Site-to-site |
D | Point-to-point |
Question 118 |
A | Baseband |
B | CSMA |
C | Broadband |
D | Analog modem |
Question 119 |
A | 1000BaseLX |
B | 10GBaseT |
C | 1000BaseT |
D | 10Base2 |
E | 10Base5 |
F | 1000BaseSX |
Question 120 |
A | Cat 7 |
B | Cat 6a |
C | Cat 6 |
D | Cat 5e |
Question 121 |
A | Hostname |
B | Media type |
C | Rack location |
D | Room number |
Question 122 |
User A
IP address: 192.168.1.121
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
User B
IP address: 192.168.1.125
Subnet mask: 255.255.248.0
Default gateway: 192.168.1.1
A | There is no problem identifiable by the values given. |
B | The default gateway should have different values |
C | The subnet values should be the same |
D | User B's IP address is not a loopback address |
Question 123 |
A | TFTP |
B | SSL |
C | SFTP |
D | FTPS |
E | Telnet |
Question 124 |
A | Cable 3 should be an STP cable. |
B | Cable 1 does not need to be plenum rated. |
C | Cable 2 should be an STP cable. |
D | None, the network looks good. |
Question 125 |
A | Motion detectors |
B | Biometric scanners |
C | Video surveillance |
D | Door locks |
Question 126 |
Which of the following would MOST likely allow the network drives to be accessed?
A | Disable the LAN adapter |
B | Update the WLAN adapter driver |
C | Disable the WLAN adapter |
D | Check the wireless DHCP configuration |
Question 127 |
A | Change the switch |
B | Modify the speed and duplex |
C | Replace the NIC |
D | Plug in to another port |
Question 128 |
A | VLANs |
B | SIP |
C | STP |
D | DSCP |
Question 129 |
A | SNMP agent |
B | OID |
C | OUI |
D | SNMP host |
E | OTDR |
Question 130 |
A | DHCP |
B | DNS |
C | SQL |
D | TCP/IP |
Question 131 |
A | The Faraday cage is creating interference within the bookstore. |
B | The Faraday cage is creating attenuation of the cellular network. |
C | The Faraday cage is creating latency on the cellular network. |
D | The Faraday cage prevents access by redirecting signals. |
Question 132 |
A | PTP |
B | SSL VPN |
C | IPSec |
D | PPTP |
Question 133 |
A | ICMP |
B | NetBIOS |
C | DNS |
D | DHCP |
E | HTTP |
Question 134 |
A | NDA |
B | BYOD |
C | AUP |
D | MOU |
Question 135 |
A | Cat 3 |
B | RG-6 |
C | Cat 5 |
D | Cat 6 |
E | SMF |
Question 136 |
A | Data link |
B | Transport |
C | Session |
D | Presentation |
Question 137 |
A | LDAP |
B | Telnet |
C | Samba |
D | TFTP |
Question 138 |
A | Snapshots |
B | Differential |
C | Incremental |
D | Replica |
Question 139 |
A | Network switch |
B | Media converter |
C | Firewall |
D | Wireless access point |
E | Router |
Question 140 |
A | Use a modem and dial-up connection. |
B | Use a TFTP server and UDP protocol. |
C | Use an FTP server and provide the file hash. |
D | Use an HTTP server to share the file. |
Question 141 |
A | Enable AP isolation on each access point. |
B | Enable MAC address filtering on each access point. |
C | Disable the SSID broadcast on each access point. |
D | Reduce the TX power on each access point. |
Question 142 |
A | One router connected to one 24-port switch configured with two VLANS: one for the manager's computers, VoIP phones, and printer, and one for the other computers, VoIP phones, and printer |
B | One router connected to one 12-port switch configured for the manager's computers, phones, and printer, and one 12-port switch configured for the other computers, VoIP phones, and printer |
C | One router connected to one 24-port switch configured with three VLANS: one for the manager's computers and printer, one for the other computers and printer, and one for the VoIP phones |
D | Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the manager's desktop computers, VoIP phones, and printer |
Question 143 |
A | Physical |
B | Network |
C | Transport |
D | Application |
Question 144 |
A | Replacing the management software's self-signed certificate with a valid certificate |
B | Changing the management software's default port |
C | Disabling unnecessary services from the server and management software |
D | Changing the management software's default credentials |
Question 145 |
A | DHCP |
B | Routing loop |
C | Dynamic routes |
D | Routing table |
E | Route redistribution |
Question 146 |
A | Star |
B | Ring |
C | Bus |
D | Mesh |
Question 147 |
A | NTP |
B | H.323 |
C | RTP |
D | SIP |
E | SMB |
F | ICMP |
Question 148 |
A | TDR |
B | Spectrum analyzer |
C | OTDR |
D | Loopback adapter |
Question 149 |
A | TCP |
B | IP |
C | None of the answers are correct. |
D | UDP |
E | Ethernet |
Question 150 |
A | pathping |
B | Nmap |
C | traceroute |
D | netstat |
Question 151 |
A | Switch |
B | Next-generation firewall |
C | Bridge |
D | Multilayer switch |
Question 152 |
A | Bent pins |
B | Duplex mismatch |
C | Damaged cables |
D | Crosstalk |
E | VLAN mismatch |
F | TX/RX reverse |
Question 153 |
A | The server IP address is incorrectly configured |
B | The DNS lookup entry is incorrectly configured |
C | The reverse DNS entry is pointing to a different host |
D | There is no reverse DNS entry for this host |
Question 154 |
A | NIC teaming |
B | Redundant circuits |
C | Clustering |
D | Load balancing |
E | Multiple NAT |
Question 155 |
A | Man-in-the-middle |
B | Ransomware |
C | Phishing |
D | Spam |
Question 156 |
A | Layer 4 – Transport |
B | Layer 3 – Network |
C | Layer 1 – Physical |
D | Layer 6 - Presentation |
E | Layer 7 – Application |
Question 157 |
A | Implement a chain of custody |
B | Take pictures upon arrival |
C | Document the scene |
D | Secure the area |
Question 158 |
A | DLP |
B | AUP |
C | NDA |
D | SLA |
Question 159 |
A | Captive portal |
B | WPA2 |
C | EAP-TLS |
D | MAC filtering |
E | SSL certificate |
Question 160 |
A | Backs up files with the archive bit set but does not clear the bit. |
B | Backs up all files and sets the archive bit. |
C | Backs up files with a date earlier than today’s date with a clear archive bit. |
D | Backs up files with the creation or modified date as the current date. |
Question 161 |
A | DHCP exhaustion |
B | ARP poisoning |
C | Social engineering |
D | Evil twin |
E | Session hijacking |
Question 162 |
A | Port 123 |
B | Port 69 |
C | Port 25 |
D | Port 161 |
Question 163 |
A | There is additional data being transferred over the wireless network |
B | The utility company throttles power during peak hours |
C | An IoT device is causing a DoS attack on the wireless network |
D | There is interference with the smart reader |
Question 164 |
A | RDP set to console connection |
B | SFTP |
C | SSH in tunnel mode |
D | EAP-PEAP |
Question 165 |
A | Adding a router reduces the amount of unicast traffic on each of the two LANs. |
B | Adding a router prevents computers on one LAN from communicating with computers on another LAN. |
C | Adding a router diverts traffic to an alternate path through the network. |
D | Adding a router reduces the amount of broadcast traffic on each of the two LANs. |
Question 166 |
A | 2001:0:d58::95:7565:1 |
B | 2001::d58::95:7565:1 |
C | 2001:0:d58:0:0:95:7565:1 |
D | 2001:0:0d58::95:7565:1 |
Question 167 |
A | Enables remote login and command execution. |
B | Transmits data in an unencrypted form. |
C | Provides username & password authentication. |
D | It cannot be used on modern Windows computers. |
E | Encrypts network connection. |
F | It does not provide authentication. |
Question 168 |
A | 12 |
B | 0 |
C | 1 |
D | 2 |
E | 6 |
Question 169 |
A | nmap |
B | dig |
C | tcpdump |
D | arp |
Question 170 |
Which of the following devices is causing the issue?
A | Router |
B | Switch 1 |
C | Firewall |
D | Switch 2 |
Question 171 |
IP: 192.168.1.100
Mask: 255.255.255.0
Router: 192.168.1.1
A | Interference |
B | Channel overlap |
C | Wrong SSID |
D | Security type mismatch |
Question 172 |
-WLAN architecture supporting speeds in excess of 150 Mbps
-Client less remote network access
-Port-based network access control
A | 802.11g, MS-CHAP, 802.16 |
B | 802.11a, IPSec VPN, 802.1x |
C | 802.11b, PPTP,802.1x |
D | 802.11ac, MPLS, 802.3 |
E | 802.11n, SSL-VPN, 802.1x |
Question 173 |
A | Connect the legacy devices with a PSK while the modern devices should use the more secure EAP. |
B | Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices. |
C | Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility. |
D | Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption. |
Question 174 |
A | LDAP |
B | TLS |
C | SSH |
D | SFTP |
Question 175 |
A | MAC reservation |
B | Pool |
C | DHCP timer |
D | Lease time |
E | IP helper |
Question 176 |
A | ASIC |
B | GBIC |
C | SFP |
D | MDI-X |
E | SPF |
Question 177 |
A | Require PEAP for authentication to the wireless network |
B | Implement a Faraday cage within the building premises |
C | Require a pre-shared key for authentication to the wireless network |
D | Use MAC filtering for authorization to the wireless network |
Question 178 |
A | Session hijacking |
B | Wardriving |
C | Spoofing attack |
D | MITM attack |
E | DDoS attack |
Question 179 |
A | The cable is damaged |
B | The cable is a crossover cable |
C | The cable is a Cat 5 cable |
D | The cable is rollover cable |
E | The cable has bent pins |
Question 180 |
A | Ports 67 and 68 |
B | Ports 80 and 443 |
C | Ports 56 and 57 |
D | Ports 20 and 21 |
E | Port 123 and 8080 |
Question 181 |
A | DHCP |
B | TFTP |
C | SCP |
D | FTP |
E | Telnet |
Question 182 |
A | Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end. |
B | Replace the new switch with a hub to ensure Layer1 connectivity on the new network segment. |
C | Move the straight-through Ethernet cable connecting the switches to the first port on both switches. |
D | Add a second cable connecting the switches for redundancy and disabling STP on both switches. |
Question 183 |
A | EAP-TLS |
B | WPA-PSK |
C | WEP-TKIP |
D | AES-CCMP |
Question 184 |
A | sanuja |
B | gdm |
C | root |
D | top |
E | systemd |
Question 185 |
A | Install a repeater to boost the signal to its destination |
B | Upgrade the cable from Cat 5 to Cat 5e or Cat 6 |
C | Replace the UTP cable with plenum cable |
D | Set the AP to half-duplex to compensate for signal loss |
Question 186 |
A | MX |
B | CNAME |
C | A |
D | NS |
E | PTR |
Question 187 |
A | TACAS+ server time |
B | Host-based firewall settings |
C | Server IP address |
D | DNS SRV record |
Question 188 |
A | IEEE 802.1X |
B | IEEE 802.3x |
C | IEEE 802.1q |
D | IEEE 802.11ac |
Question 189 |
A | VLAN hopping |
B | Session hijacking |
C | MAC spoofing |
D | Bluesnarfing |
E | Man-in-the-middle |
Question 190 |
A | Network configuration |
B | Change management |
C | Rack diagram |
D | Network diagram |
Question 191 |
A | Spoofing attacks originate from a single host |
B | DDoS attacks target multiple networks |
C | Spoofing attacks require physical presence |
D | DDoS attacks are launched from multiple hosts |
Question 192 |
A | IPS |
B | IDS |
C | VPN concentrator |
D | Load balancer |
E | Proxy server |
Question 193 |
A | Packet filtering utility |
B | Packet capturing utility |
C | Linux command-line tool |
D | MS Windows command-line tool |
E | Packet tracing utility |
Question 194 |
A | Channel 7 |
B | Channel 10 |
C | Channel 6 |
D | Channel 9 |
Question 195 |
A | Reviewing application logs |
B | Reviewing a baseline report |
C | Reviewing a vulnerability scan |
D | Reviewing SLA requirements |
Question 196 |
A | PRI |
B | MPLS |
C | Broadband cable |
D | ISDN |
E | Frame relay |
Question 197 |
A | Crosstalk |
B | Open/short on the cable |
C | Transceiver mismatch |
D | Jitter |
Question 198 |
A | 172.16.0.0/22 |
B | 10.233.2.0/23 |
C | 10.5.4.0/22 |
D | 192.168.25.0/24 |
E | 172.18.0.0/23 |
Question 199 |
A | VPC |
B | FCoE |
C | Fiber Channel |
D | Virtual switch |
E | vSAN |
Question 200 |
A | traffic-routing protocols |
B | public/private networks |
C | packet flow |
D | network devices |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.