← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set III
CompTIA Network+ N10-007 - Set II
Congratulations - you have completed CompTIA Network+ N10-007 - Set II.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | FTP |
B | Telnet |
C | TFTP |
D | SCP |
E | DHCP |
Question 2 |
A | OUI |
B | SNMP agent |
C | OID |
D | OTDR |
E | SNMP host |
Question 3 |
A | Bridge |
B | Layer 2 switch |
C | Layer 3 switch |
D | Load balancer |
Question 4 |
A | IEEE 802.11ac |
B | IEEE 802.3x |
C | IEEE 802.1X |
D | IEEE 802.1q |
Question 5 |
A | Require PEAP for authentication to the wireless network |
B | Use MAC filtering for authorization to the wireless network |
C | Implement a Faraday cage within the building premises |
D | Require a pre-shared key for authentication to the wireless network |
Question 6 |
A | Loopback address |
B | Duplicate IP addresses |
C | Duplicate MAC addresses |
D | APIPA address |
Question 7 |
A | Disable virtual ports. |
B | Reset the two-factor token. |
C | Upgrade the firmware. |
D | Disable unused ports. |
Question 8 |
A | Incident response |
B | Data loss prevention |
C | Asset disposal |
D | Acceptable use |
Question 9 |
A | 802.3af |
B | 802.1X |
C | 802.11ac |
D | 802.1q |
E | 802.3at |
Question 10 |
A | Cat 5e |
B | Cat 6a |
C | Cat 7 |
D | Cat 6 |
Question 11 |
A | Take pictures upon arrival |
B | Implement a chain of custody |
C | Document the scene |
D | Secure the area |
Question 12 |
A | It segments broadcast domains in the network infrastructure |
B | It provides a faster port to all servers |
C | It provides multiple broadcast domains within a single collision domain |
D | It provides multiple collision domains on one switchport |
Question 13 |
A | IDF |
B | Data tier |
C | Demarc |
D | DMZ |
Question 14 |
A | Cable 2 should be an STP cable. |
B | None, the network looks good. |
C | Cable 3 should be an STP cable. |
D | Cable 1 does not need to be plenum rated. |
Question 15 |
A | Performance baseline |
B | IDF/MDF documentation |
C | Physical diagram |
D | Change management |
Question 16 |
-WLAN architecture supporting speeds in excess of 150 Mbps
-Client less remote network access
-Port-based network access control
A | 802.11a, IPSec VPN, 802.1x |
B | 802.11ac, MPLS, 802.3 |
C | 802.11b, PPTP,802.1x |
D | 802.11g, MS-CHAP, 802.16 |
E | 802.11n, SSL-VPN, 802.1x |
Question 17 |
route add 0.0.0.0 mask 0.0.0.0 192.169.1.222 metric 1
A | The technician is clearing the subnet mas setting. |
B | The technician is clearing the route table. |
C | The technician is setting the default gateway. |
D | The technician is adding a static IP address. |
Question 18 |
A | Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the manager's desktop computers, VoIP phones, and printer |
B | One router connected to one 12-port switch configured for the manager's computers, phones, and printer, and one 12-port switch configured for the other computers, VoIP phones, and printer |
C | One router connected to one 24-port switch configured with two VLANS: one for the manager's computers, VoIP phones, and printer, and one for the other computers, VoIP phones, and printer |
D | One router connected to one 24-port switch configured with three VLANS: one for the manager's computers and printer, one for the other computers and printer, and one for the VoIP phones |
Question 19 |
A | Authentication passphrase |
B | SHA |
C | MD5 |
D | authpriv |
Question 20 |
A | Use a modem and dial-up connection. |
B | Use a TFTP server and UDP protocol. |
C | Use an HTTP server to share the file. |
D | Use an FTP server and provide the file hash. |
Question 21 |
A | DLP |
B | SLA |
C | NDA |
D | AUP |
Question 22 |
A | DNS server |
B | Cable modem |
C | Layer 2 switch |
D | SOHO router |
Question 23 |
A | traffic-routing protocols |
B | packet flow |
C | public/private networks |
D | network devices |
Question 24 |
Which of the following devices is causing the issue?
A | Firewall |
B | Switch 2 |
C | Switch 1 |
D | Router |
Question 25 |
A | Broadband cable |
B | MPLS |
C | ISDN |
D | PRI |
E | Frame relay |
Question 26 |
A | The technician should run ping tests on the Internet line to monitor for packet loss and latency |
B | The technician should use a packet tracer to see if the traffic is getting out of the network |
C | The technician should reset all the phones and deprovision information from the provider |
D | The technician should check the internal diagnostics on all the phones to look for a common thread |
Question 27 |
A | Proxy server |
B | Load balancer |
C | VPN concentrator |
D | IPS |
E | IDS |
Question 28 |
A | The ports are associated with deprecated services |
B | The ports replied with a SYN/ACK response |
C | The ports do not belong to a live system |
D | The ports belong to an active system and are denying requests |
Question 29 |
A | DNS |
B | SQL |
C | DHCP |
D | TCP/IP |
Question 30 |
A | 172.16.0.0/22 |
B | 172.18.0.0/23 |
C | 10.233.2.0/23 |
D | 192.168.25.0/24 |
E | 10.5.4.0/22 |
Question 31 |
A | VLAN mismatch |
B | Duplicate IP address |
C | Duplex/Speed mismatch |
D | TX/RX reverse |
Question 32 |
A | Create a port location diagram |
B | Create a network baseline |
C | Create a rack diagram |
D | Create an inventory database |
Question 33 |
A | SSL certificate |
B | Digital signatures |
C | Digital signatures |
D | 3DES encryption |
Question 34 |
A | Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility. |
B | Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption. |
C | Connect the legacy devices with a PSK while the modern devices should use the more secure EAP. |
D | Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices. |
Question 35 |
A | MAC filtering |
B | Captive portal |
C | WPA2 |
D | SSL certificate |
E | EAP-TLS |
Question 36 |
A | NS |
B | MX |
C | CNAME |
D | A |
E | PTR |
Question 37 |
A | Reverse the wires leading to pins 2 and 4 |
B | Reverse the wires leading to pins 1 and 2 |
C | Reverse the wires leading to pins 1 and 3 |
D | Reverse the wires leading to pins 2 and 3 |
Question 38 |
A | Certificate |
B | RADIUS |
C | NAC |
D | MFA |
E | Kerberos |
F | SSO |
Question 39 |
A | Cat 6 |
B | Cat 5 |
C | Cat 3 |
D | RG-6 |
E | SMF |
Question 40 |
A | Misconfigured VLSM |
B | Exhausted dynamic scope |
C | Expired IP address |
D | Rogue DHCP server |
Question 41 |
A | Video surveillance |
B | Biometric scanners |
C | Motion detectors |
D | Door locks |
Question 42 |
A | NDA |
B | BYOD |
C | MOU |
D | AUP |
Question 43 |
A | FTPS |
B | SFTP |
C | SSL |
D | Telnet |
E | TFTP |
Question 44 |
A | InfiniBand |
B | iSCSI |
C | OC3 |
D | FCoE |
Question 45 |
A | Man-in-the-middle |
B | Spam |
C | Ransomware |
D | Phishing |
Question 46 |
A | Reviewing a baseline report |
B | Reviewing a vulnerability scan |
C | Reviewing SLA requirements |
D | Reviewing application logs |
Question 47 |
A | TACACS+ |
B | RADIUS |
C | Single sign-on |
D | Captive portal |
Question 48 |
A | 56MHz |
B | 2.4 GHz |
C | 900MHz |
D | 5GHz |
Question 49 |
Which of the following ones should the technician use to place the webserver and which of the following firewall rules should the technician configure?
A | Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the webserver |
B | Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the webserver |
C | Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the webserver |
D | Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the webserver |
Question 50 |
A | Load balancing |
B | Clustering |
C | Redundant circuits |
D | Multiple NAT |
E | NIC teaming |
Question 51 |
A | Identification card |
B | Video camera |
C | Proximity reader |
D | Biometric device |
Question 52 |
A | Loopback adapter |
B | Multimeter |
C | Tone generator |
D | Punchdown tool |
Question 53 |
A | nslookup |
B | Spectrum analyzer |
C | netstat |
D | Packet sniffer |
Question 54 |
A | Telnet |
B | TFTP |
C | Samba |
D | LDAP |
Question 55 |
A | MITM attack |
B | Spoofing attack |
C | Session hijacking |
D | DDoS attack |
E | Wardriving |
Question 56 |
A | PTP |
B | PPTP |
C | SSL VPN |
D | IPSec |
Question 57 |
A | Retrieving contents of an Internet page from a web server |
B | Allocation of IP addresses |
C | Monitoring of network-attached devices |
D | Synchronization of clocks over a computer network |
Question 58 |
A | Establish a plan of action |
B | Document the findings |
C | Gather information |
D | Determine the symptoms |
Question 59 |
A | Install a power converter for the switch |
B | Add a redundant power supply to the switch |
C | Implement stacking on the switches in the rack |
D | Add a second UPS into the rack |
Question 60 |
A | tcpdump |
B | nmap |
C | dig |
D | arp |
Question 61 |
A | Kerberos |
B | VNC application |
C | Geotagging application |
D | Credentials |
Question 62 |
A | Loopback adapter |
B | Multimeter |
C | Tone generator |
D | Cable tester |
Question 63 |
Subnet 1: 192.168.1.0/26
Subnet 2: 192.168.1.65/26
Company B uses the following scheme:
Subnet 1: 192.168.1.50/28
A | PAT |
B | DMZ |
C | NAT |
D | VLAN |
Question 64 |
A | Crosstalk |
B | Jitter |
C | Open/short on the cable |
D | Transceiver mismatch |
Question 65 |
A | Because secure protocols would reject malicious packets |
B | Because FTP is not a secure service |
C | Because a secure firewall will protect the device |
D | Because SCP is not a secure service |
Question 66 |
A | Distance limitations are preventing the students from connecting |
B | The students are attempting to connect 802.11g devices |
C | The students are using more than one wireless device port seat |
D | One of the wireless access points is on the wrong frequency |
Question 67 |
A | There are 3 collision domains, one for each switch-to-switch connection. |
B | There are 12 collision domains, one for each switch connection. |
C | There are 9 collision domains, one for each half-duplex connection. |
D | There is one collision domain for this network. |
Question 68 |
A | The cable is a Cat 5 cable |
B | The cable is damaged |
C | The cable is a crossover cable |
D | The cable is rollover cable |
E | The cable has bent pins |
Question 69 |
A | 192.168.12.97 to 255.255.255.192 |
B | 192.168.12.97 to 255.255.255.224 |
C | 192.168.12.97 to 255.255.255.248 |
D | 192.168.12.97 to 255.255.255.240 |
Question 70 |
A | Port 110 |
B | Port 22 |
C | Port 443 |
D | Port 110 |
E | Port 80 |
Question 71 |
A | Attenuation |
B | Incorrect pin-out |
C | Damaged cable |
D | Switch configuration |
Question 72 |
A | Install a repeater to boost the signal to its destination |
B | Replace the UTP cable with plenum cable |
C | Upgrade the cable from Cat 5 to Cat 5e or Cat 6 |
D | Set the AP to half-duplex to compensate for signal loss |
Question 73 |
A | Packet sniffer |
B | Multimeter |
C | OTDR |
D | Spectrum analyzer |
Question 74 |
A | Network |
B | Application |
C | Transport |
D | Physical |
Question 75 |
A | Changing the management software's default credentials |
B | Replacing the management software's self-signed certificate with a valid certificate |
C | Disabling unnecessary services from the server and management software |
D | Changing the management software's default port |
Question 76 |
A | DSL modem |
B | Wireless router |
C | Demarc |
D | DOCSIS modem |
E | Access point |
Question 77 |
A | Host-based firewall settings |
B | Server IP address |
C | TACAS+ server time |
D | DNS SRV record |
Question 78 |
A | DHCP timer |
B | Pool |
C | IP helper |
D | MAC reservation |
E | Lease time |
Question 79 |
A | DHCP |
B | DNS |
C | HTTP |
D | NetBIOS |
E | ICMP |
Question 80 |
A | Frames |
B | Segments |
C | Packets |
D | Datagrams |
Question 81 |
A | Latency |
B | Jitter |
C | Attenuation |
D | Frequency mismatch |
Question 82 |
A | 13 |
B | 12 |
C | 14 |
D | 3 |
E | 15 |
Question 83 |
A | Network configuration |
B | Rack diagram |
C | Network diagram |
D | Change management |
Question 84 |
A | Broadband |
B | Analog modem |
C | CSMA |
D | Baseband |
Question 85 |
A | The utility company throttles power during peak hours |
B | There is additional data being transferred over the wireless network |
C | There is interference with the smart reader |
D | An IoT device is causing a DoS attack on the wireless network |
Question 86 |
A | Round robin |
B | TCP offloading |
C | Load balancer |
D | Jumbo frames |
E | Clustering |
Question 87 |
A | Transmits data in an unencrypted form. |
B | It cannot be used on modern Windows computers. |
C | Enables remote login and command execution. |
D | Provides username & password authentication. |
E | Encrypts network connection. |
F | It does not provide authentication. |
Question 88 |
A | permit udp any any eq 53 |
B | permit tcp any any eq 20 |
C | permit udp any any eq 68 |
D | permit tcp any any eq 110 |
E | permit tcp any any eq 8080 |
F | permit udp any any eq 25 |
Question 89 |
A | Port 123 and 8080 |
B | Ports 56 and 57 |
C | Ports 67 and 68 |
D | Ports 20 and 21 |
E | Ports 80 and 443 |
Question 90 |
A | SFTP |
B | SSH |
C | LDAP |
D | TLS |
Question 91 |
A | SMB |
B | SNMP |
C | NTP |
D | SSL |
E | RDP |
Question 92 |
A | Telnet over PSTN |
B | HTTP over WPA2-TKIP WiFi |
C | SSH over IPsec client-to-site VPN |
D | RDP over SSLv2 HTTPS terminal services gateway |
Question 93 |
A | VLAN mismatch |
B | Crosstalk |
C | Duplex mismatch |
D | Bent pins |
E | Damaged cables |
F | TX/RX reverse |
Question 94 |
A | Content filtering |
B | Intrusion detection |
C | Proxy service |
D | Dynamic DNS |
Question 95 |
A | 802.11n |
B | 802.11ac |
C | 802.11a |
D | 802.11b |
Question 96 |
A | Load balancer |
B | Proxy server |
C | Switch |
D | Router |
Question 97 |
A | Cat 7 |
B | PVC |
C | Plenum |
D | Single-mode |
Question 98 |
A | pathping |
B | netstat |
C | nbtstat |
D | nslookup |
Question 99 |
A | Evil twin |
B | Social engineering |
C | Session hijacking |
D | ARP poisoning |
E | DHCP exhaustion |
Question 100 |
A | Implement a DMZ for all external services. |
B | Create a honeypot to attract attackers. |
C | Implement root guard on all switches. |
D | Create a VLAN for all unused switchports. |
Question 101 |
A | Star |
B | Ad hoc |
C | Mesh |
D | Ring |
Question 102 |
A | SaaS |
B | SAN |
C | IaaS |
D | NAS |
Question 103 |
A | 2001:0:d58:0:0:95:7565:1 |
B | 2001::d58::95:7565:1 |
C | 2001:0:d58::95:7565:1 |
D | 2001:0:0d58::95:7565:1 |
Question 104 |
User A
IP address: 192.168.1.121
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
User B
IP address: 192.168.1.125
Subnet mask: 255.255.248.0
Default gateway: 192.168.1.1
A | The subnet values should be the same |
B | The default gateway should have different values |
C | User B's IP address is not a loopback address |
D | There is no problem identifiable by the values given. |
Question 105 |
A | Star |
B | Mesh |
C | Ring |
D | Bus |
Question 106 |
A | Differential |
B | Snapshots |
C | Replica |
D | Incremental |
Question 107 |
A | Disable FTP service on the server |
B | Disable DHCP service on the server |
C | Disable Telnet service on the server |
D | Disable the SMTP service on the server |
Question 108 |
A | Speed |
B | MTU |
C | TTL |
D | Duplex |
Question 109 |
A | Enable MAC address filtering on each access point. |
B | Reduce the TX power on each access point. |
C | Enable AP isolation on each access point. |
D | Disable the SSID broadcast on each access point. |
Question 110 |
A | iSCSI |
B | Port aggregation |
C | Jumbo frames |
D | QoS tags |
Question 111 |
A | Using a secure SSH connection over the WAN link to connect to a server. |
B | Telnet into the router over a secure VPN. |
C | Implementing a modem on the AUX port to access a network device. |
D | Accessing a DSL router via the console port. |
Question 112 |
“The Security certificate presented by this website was not trusted by trusted certificate authority.”
Sanuja has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error. Which of the following is the MOST likely cause of this error?
A | The web server is missing an intermediate certificate. |
B | TLS is not enabled in the browser. |
C | The SSL certificate has expired. |
D | The website is missing an HTTPS certificate. |
Question 113 |
A | BPDU guard |
B | Flood guard |
C | Spanning tree |
D | DHCP snooping |
Question 114 |
A | IP |
B | TCP |
C | None of the answers are correct. |
D | Ethernet |
E | UDP |
Question 115 |
A | DSCP |
B | STP |
C | VLANs |
D | SIP |
Question 116 |
A | Protocol analyzer |
B | Network mapper |
C | Logical network diagram |
D | WAP power level controls |
Question 117 |
A | Rack location |
B | Room number |
C | Media type |
D | Hostname |
Question 118 |
A | CHAP |
B | SSL |
C | SNMP |
D | SSH |
E | FTP |
Question 119 |
A | Move the straight-through Ethernet cable connecting the switches to the first port on both switches. |
B | Replace the new switch with a hub to ensure Layer1 connectivity on the new network segment. |
C | Add a second cable connecting the switches for redundancy and disabling STP on both switches. |
D | Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end. |
Question 120 |
A | -i address |
B | /all |
C | -a |
D | eth_addr |
Question 121 |
A | Layer 3 switch |
B | Layer 2 switch |
C | Bridge |
D | Signal repeater |
E | Domain server |
Question 122 |
A | Bad port |
B | Crosstalk |
C | ACL misconfiguration |
D | Duplex/speed mismatch |
Question 123 |
A | DDoS |
B | DNS sinkhole |
C | DDoS |
D | MITM |
E | IDS firewall |
Question 124 |
A | Additional lease time for the laptop computers |
B | IP helper relay system for configuration hops |
C | DHCP reservation for the laptops MACs |
D | CNAME record in the users dynamic DNS accounts |
Question 125 |
A | Generate new SSH keys |
B | Review and modify the firewall rules |
C | Upgrade to the latest firmware |
D | Verify the default passwords have been changed |
Question 126 |
A | Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address. |
B | Perform a traceroute command to identify the router that is not functioning. |
C | Change the IP scope on the DHCP server to a public IP address range. |
D | Verify the host has physical connectivity and is on the correct VLAN. |
Question 127 |
A | RDP set to console connection |
B | SFTP |
C | EAP-PEAP |
D | SSH in tunnel mode |
Question 128 |
A | Ping table |
B | DNS record type |
C | TTL |
D | DHCP lease time |
E | IP helper |
Question 129 |
A | ASIC |
B | GBIC |
C | SPF |
D | MDI-X |
E | SFP |
Question 130 |
A | Adding a router reduces the amount of broadcast traffic on each of the two LANs. |
B | Adding a router diverts traffic to an alternate path through the network. |
C | Adding a router reduces the amount of unicast traffic on each of the two LANs. |
D | Adding a router prevents computers on one LAN from communicating with computers on another LAN. |
Question 131 |
A | arp |
B | ipconfig |
C | nslookup |
D | dig |
Question 132 |
A | The finance department should have 172.16.49.127 as a broadcast address. |
B | The R&D department should receive a /27 network. |
C | The legal department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
D | The marketing department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
E | The R&D department should have a last usable IP address of 172.16.49.190. |
F | The legal department should have a first usable IP address of 172.16.49.190. |
G | The R&D department should have 172.16.49.207 as a broadcast address. |
H | The marketing department should receive a /25 network. |
Question 133 |
A | Point-to-point |
B | Site-to-site |
C | Point-to-multipoint |
D | Client-to-site |
Question 134 |
A | BPDUs entering the root bridge are ignored. |
B | Broadcast storms entering from a root port are blocked. |
C | The STP root bridge cannot be changed. |
D | Loop protection is enabled on the root port of a switch. |
Question 135 |
A | Man-in-the-middle |
B | VLAN hopping |
C | Bluesnarfing |
D | MAC spoofing |
E | Session hijacking |
Question 136 |
A | Pre-shared key |
B | Geofencing |
C | MAC filtering |
D | Open wireless |
Question 137 |
A | Modify the speed and duplex |
B | Plug in to another port |
C | Replace the NIC |
D | Change the switch |
Question 138 |
A | The Faraday cage is creating interference within the bookstore. |
B | The Faraday cage is creating attenuation of the cellular network. |
C | The Faraday cage prevents access by redirecting signals. |
D | The Faraday cage is creating latency on the cellular network. |
Question 139 |
A | Media converter |
B | Wireless access point |
C | Network switch |
D | Router |
E | Firewall |
Question 140 |
A | UTP cabling |
B | Fiber-optic cabling |
C | Coaxial cabling |
D | STP cabling |
Question 141 |
A | Virtual switch |
B | vSAN |
C | VPC |
D | FCoE |
E | Fiber Channel |
Question 142 |
A | Inventory report |
B | Labeling report |
C | Change management |
D | Network diagrams |
Question 143 |
A | SLA |
B | NDA |
C | AUP |
D | MOU |
Question 144 |
A | OTDR |
B | Spectrum analyzer |
C | TDR |
D | Loopback adapter |
Question 145 |
A | risk assessment. |
B | role separation. |
C | device hardening. |
D | penetration testing. |
Question 146 |
A | NTP |
B | ICMP |
C | RTP |
D | SMB |
E | H.323 |
F | SIP |
Question 147 |
A | root |
B | gdm |
C | top |
D | sanuja |
E | systemd |
Question 148 |
A | LADP |
B | DHCP |
C | DNS |
D | HTTP |
E | ICMP |
Question 149 |
A | OCSP stapling |
B | Evil twin |
C | Phishing |
D | MITM |
E | DDoS |
Question 150 |
A | PPP |
B | iSCSI |
C | RDMA |
D | Fibre Channel |
Question 151 |
A | Ring |
B | Partial mesh |
C | Ad hoc |
D | Bus |
Question 152 |
A | traceroute |
B | Nmap |
C | netstat |
D | pathping |
Question 153 |
A | Perform file hashing |
B | Update firmware |
C | Generate new keys |
D | Change default credentials |
Question 154 |
A | RFI |
B | SNR |
C | SVC |
D | BRI |
Question 155 |
A | VoIP PBX |
B | Content filter |
C | RADIUS server |
D | Wireless controller |
Question 156 |
A | There are seven collision domains and three broadcast
domains. |
B | There are nine collision domains and three broadcast
domains. |
C | There are three collision domains and one broadcast domain. |
D | There are three collision domains and three broadcast
domains. |
E | There is one collision domain and one broadcast domain. |
Question 157 |
Gigabit Ethernet 1 Interface: 10.10.0.1/24 Serial 0 Interface: 10.10.0.253/30
A | The router was configured with an incorrect loopback address |
B | The router was configured with an incorrect default gateway |
C | The router was configured with an incorrect subnet mask |
D | The router was configured with an incorrect IP address |
Question 158 |
A | Server room |
B | Equipment closet |
C | Demarcation point |
D | Intermediate distribution frame |
Question 159 |
A | Dynamic routes |
B | Route redistribution |
C | DHCP |
D | Routing loop |
E | Routing table |
Question 160 |
A | Spanning tree |
B | Trunking |
C | Port aggregation |
D | Port mirroring |
Question 161 |
A | MS Windows command-line tool |
B | Packet capturing utility |
C | Linux command-line tool |
D | Packet filtering utility |
E | Packet tracing utility |
Question 162 |
A | The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules. |
B | The LAN and WLAN should be configured in the DMZ so traffic is denied automatically. |
C | The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours. |
D | The LAN and WLAN should be configured in separate zones with a firewall in between. |
Question 163 |
A | WP2-PSK |
B | EAP-TLS |
C | PEAP |
D | Captive portal |
Question 164 |
A | DLP |
B | Offboarding |
C | Incident response |
D | AUP |
E | Remote access |
Question 165 |
A | The use of autonomous APs with a wireless controller |
B | The use of autonomous APs with a load balancer |
C | The use of lightweight APs with a load balancer |
D | The use of lightweight APs with a wireless controller |
Question 166 |
A | LC |
B | DB-9 |
C | GBIC |
D | SC |
E | SFTP |
F | RJ45 |
Question 167 |
A | OTDR |
B | Multimeter |
C | Tone generator |
D | Protocol analyzer |
E | Spectrum analyzer |
Question 168 |
A | Next-generation firewall |
B | Bridge |
C | Multilayer switch |
D | Switch |
Question 169 |
A | ipconfig /flushdns |
B | ipconfig /renew |
C | ipconfig /all |
D | ipconfig /release |
Question 170 |
A | Layer 7 – Application |
B | Layer 1 – Physical |
C | Layer 4 – Transport |
D | Layer 3 – Network |
E | Layer 6 - Presentation |
Question 171 |
A | Reverse the fiber strands of the cable and reconnect them to the server |
B | Replace the server's single-mode fiber cable with multimode fiber |
C | Use a TDR to test both strands of a new replacement cable prior to connecting it to the server |
D | Move the fiber cable to a different port on the switch where both strands function |
Question 172 |
A | Port 69 |
B | Port 25 |
C | Port 123 |
D | Port 161 |
Question 173 |
A | Server-based firewall configuration issue |
B | VLAN routing |
C | Patch cable type |
D | DHCP scope availability |
Question 174 |
A | 10.8.0.0/19 |
B | 10.0.0.0/24 |
C | 10.8.0.0/20 |
D | 10.8.0.0/16 |
Question 175 |
A | AAAA |
B | MX |
C | SRV |
D | CNAME |
Question 176 |
A | Adding a fingerprint reader and retina scanner |
B | Enforcing a stronger password policy and using a hand geometry scan |
C | Adding a fingerprint reader to each workstation and providing a RSA authentication token |
D | Using a smart card and RSA token |
Question 177 |
A | Enforce port security to require system authentication |
B | Label existing systems with current hostnames |
C | Implement a standardized UNC |
D | Forward the DHCP logs to the security manager every day |
Question 178 |
A | 48 collision domains, 5 broadcast domains |
B | 240 private networks |
C | 48 networks, 5 segments |
D | 240 usable IP addresses |
E | 5 collision domains, 48 segments |
Question 179 |
IP: 192.168.1.100
Mask: 255.255.255.0
Router: 192.168.1.1
A | Security type mismatch |
B | Wrong SSID |
C | Interference |
D | Channel overlap |
Question 180 |
A | CSR |
B | OCSP |
C | Key escrow |
D | CRL |
Question 181 |
A | EAP-TLS |
B | WEP-TKIP |
C | WPA-PSK |
D | AES-CCMP |
Question 182 |
A | Insider threat |
B | Session hijacking |
C | Logic bomb |
D | Trojan horse |
E | Social engineering |
Question 183 |
A | The reverse DNS entry is pointing to a different host |
B | The server IP address is incorrectly configured |
C | There is no reverse DNS entry for this host |
D | The DNS lookup entry is incorrectly configured |
Question 184 |
A | Document findings |
B | Implement preventive measures |
C | Duplicate the problem |
D | Establish a theory of probable cause |
E | Question users |
F | Test solutions |
Question 185 |
A | Channel 7 |
B | Channel 6 |
C | Channel 9 |
D | Channel 10 |
Question 186 |
A | Attenuation |
B | TX/RX reverse |
C | Open/short |
D | EMI |
Question 187 |
A | 10GBaseT |
B | 10Base2 |
C | 1000BaseT |
D | 1000BaseSX |
E | 1000BaseLX |
F | 10Base5 |
Question 188 |
A | Bidirectional SFP |
B | Duplex SFP+ |
C | Duplex GBIC |
D | 1000BaseLX SFP |
Question 189 |
A | Presentation |
B | Data link |
C | Transport |
D | Session |
Question 190 |
A | DDoS attacks target multiple networks |
B | Spoofing attacks originate from a single host |
C | DDoS attacks are launched from multiple hosts |
D | Spoofing attacks require physical presence |
Question 191 |
Which of the following would MOST likely allow the network drives to be accessed?
A | Disable the WLAN adapter |
B | Update the WLAN adapter driver |
C | Check the wireless DHCP configuration |
D | Disable the LAN adapter |
Question 192 |
A | Do nothing |
B | Establish a theory of probable cause |
C | Escalate the ticket to a senior technician |
D | Document the findings and outcomes |
E | Implement the solution |
Question 193 |
A | Video cameras |
B | Motion sensors |
C | Swipe badges |
D | Sign-in sheets |
Question 194 |
A | 2 |
B | 12 |
C | 0 |
D | 6 |
E | 1 |
Question 195 |
Image Credits: https://www.homedepot.com/p/ Ideal-Punchdown-Tool- with-110-and-66- Blades-35-485/ 203761571
A | Crimper |
B | Punchdown tool |
C | Tone generator and locator |
D | Butt set |
Question 196 |
A | Router |
B | Hub |
C | Bridge |
D | Switch |
Question 197 |
A | Backs up files with a date earlier than today’s date with a clear archive bit. |
B | Backs up files with the creation or modified date as the current date. |
C | Backs up files with the archive bit set but does not clear the bit. |
D | Backs up all files and sets the archive bit. |
Question 198 |
A | Data loss prevention |
B | Licensing restrictions |
C | Incident response policy |
D | International export controls |
E | Remote access policies |
Question 199 |
A | 1024 |
B | 512 |
C | 510 |
D | 2048 |
E | 1022 |
F | 2046 |
Question 200 |
A | Implement WEP authentication. |
B | Change the WiFi password. |
C | Disable the SSID broadcast. |
D | Activate MAC address filtering. |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.