← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set III
CompTIA Network+ N10-007 - Set II
Congratulations - you have completed CompTIA Network+ N10-007 - Set II.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
-WLAN architecture supporting speeds in excess of 150 Mbps
-Client less remote network access
-Port-based network access control
A | 802.11g, MS-CHAP, 802.16 |
B | 802.11n, SSL-VPN, 802.1x |
C | 802.11b, PPTP,802.1x |
D | 802.11ac, MPLS, 802.3 |
E | 802.11a, IPSec VPN, 802.1x |
Question 2 |
A | penetration testing. |
B | role separation. |
C | device hardening. |
D | risk assessment. |
Question 3 |
A | There is one collision domain for this network. |
B | There are 3 collision domains, one for each switch-to-switch connection. |
C | There are 12 collision domains, one for each switch connection. |
D | There are 9 collision domains, one for each half-duplex connection. |
Question 4 |
A | SNR |
B | RFI |
C | SVC |
D | BRI |
Question 5 |
A | Implement WEP authentication. |
B | Change the WiFi password. |
C | Activate MAC address filtering. |
D | Disable the SSID broadcast. |
Question 6 |
A | Jumbo frames |
B | QoS tags |
C | iSCSI |
D | Port aggregation |
Question 7 |
A | Replace the NIC |
B | Change the switch |
C | Plug in to another port |
D | Modify the speed and duplex |
Question 8 |
A | Samba |
B | TFTP |
C | Telnet |
D | LDAP |
Question 9 |
A | Door locks |
B | Motion detectors |
C | Biometric scanners |
D | Video surveillance |
Question 10 |
A | The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours. |
B | The LAN and WLAN should be configured in the DMZ so traffic is denied automatically. |
C | The LAN and WLAN should be configured in separate zones with a firewall in between. |
D | The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules. |
Question 11 |
A | Change default credentials |
B | Generate new keys |
C | Perform file hashing |
D | Update firmware |
Question 12 |
A | Data link |
B | Session |
C | Presentation |
D | Transport |
Question 13 |
A | Reverse the wires leading to pins 1 and 3 |
B | Reverse the wires leading to pins 1 and 2 |
C | Reverse the wires leading to pins 2 and 4 |
D | Reverse the wires leading to pins 2 and 3 |
Question 14 |
A | MX |
B | A |
C | CNAME |
D | NS |
E | PTR |
Question 15 |
A | BYOD |
B | MOU |
C | NDA |
D | AUP |
Question 16 |
A | Crosstalk |
B | Jitter |
C | Transceiver mismatch |
D | Open/short on the cable |
Question 17 |
A | SQL |
B | DHCP |
C | TCP/IP |
D | DNS |
Question 18 |
A | RG-6 |
B | Cat 5 |
C | SMF |
D | Cat 6 |
E | Cat 3 |
Question 19 |
A | IDF/MDF documentation |
B | Physical diagram |
C | Change management |
D | Performance baseline |
Question 20 |
A | The legal department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
B | The R&D department should have 172.16.49.207 as a broadcast address. |
C | The R&D department should receive a /27 network. |
D | The legal department should have a first usable IP address of 172.16.49.190. |
E | The marketing department should receive a /25 network. |
F | The finance department should have 172.16.49.127 as a broadcast address. |
G | The marketing department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
H | The R&D department should have a last usable IP address of 172.16.49.190. |
Question 21 |
A | arp |
B | nslookup |
C | ipconfig |
D | dig |
Question 22 |
Which of the following would MOST likely allow the network drives to be accessed?
A | Disable the LAN adapter |
B | Check the wireless DHCP configuration |
C | Update the WLAN adapter driver |
D | Disable the WLAN adapter |
Question 23 |
A | pathping |
B | netstat |
C | nbtstat |
D | nslookup |
Question 24 |
A | Punchdown tool |
B | Tone generator |
C | Multimeter |
D | Loopback adapter |
Question 25 |
A | DLP |
B | Incident response |
C | Offboarding |
D | Remote access |
E | AUP |
Question 26 |
A | Duplicate IP addresses |
B | Loopback address |
C | APIPA address |
D | Duplicate MAC addresses |
Question 27 |
A | 10.233.2.0/23 |
B | 192.168.25.0/24 |
C | 172.18.0.0/23 |
D | 10.5.4.0/22 |
E | 172.16.0.0/22 |
Question 28 |
A | There are three collision domains and one broadcast domain. |
B | There are seven collision domains and three broadcast
domains. |
C | There is one collision domain and one broadcast domain. |
D | There are three collision domains and three broadcast
domains. |
E | There are nine collision domains and three broadcast
domains. |
Question 29 |
A | Network |
B | Physical |
C | Transport |
D | Application |
Question 30 |
A | Because SCP is not a secure service |
B | Because FTP is not a secure service |
C | Because a secure firewall will protect the device |
D | Because secure protocols would reject malicious packets |
Question 31 |
A | IP helper relay system for configuration hops |
B | Additional lease time for the laptop computers |
C | CNAME record in the users dynamic DNS accounts |
D | DHCP reservation for the laptops MACs |
Question 32 |
A | Telnet into the router over a secure VPN. |
B | Using a secure SSH connection over the WAN link to connect to a server. |
C | Implementing a modem on the AUX port to access a network device. |
D | Accessing a DSL router via the console port. |
Question 33 |
A | permit udp any any eq 53 |
B | permit udp any any eq 25 |
C | permit tcp any any eq 110 |
D | permit udp any any eq 68 |
E | permit tcp any any eq 8080 |
F | permit tcp any any eq 20 |
Question 34 |
A | Cable modem |
B | Layer 2 switch |
C | SOHO router |
D | DNS server |
Question 35 |
A | DNS sinkhole |
B | DDoS |
C | DDoS |
D | MITM |
E | IDS firewall |
Question 36 |
A | BPDU guard |
B | Spanning tree |
C | Flood guard |
D | DHCP snooping |
Question 37 |
A | Upgrade to the latest firmware |
B | Generate new SSH keys |
C | Review and modify the firewall rules |
D | Verify the default passwords have been changed |
Question 38 |
A | Add a second cable connecting the switches for redundancy and disabling STP on both switches. |
B | Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end. |
C | Replace the new switch with a hub to ensure Layer1 connectivity on the new network segment. |
D | Move the straight-through Ethernet cable connecting the switches to the first port on both switches. |
Question 39 |
A | Implement root guard on all switches. |
B | Implement a DMZ for all external services. |
C | Create a honeypot to attract attackers. |
D | Create a VLAN for all unused switchports. |
Question 40 |
A | Clustering |
B | Jumbo frames |
C | Load balancer |
D | TCP offloading |
E | Round robin |
Question 41 |
A | Ad hoc |
B | Mesh |
C | Ring |
D | Star |
Question 42 |
A | Port mirroring |
B | Trunking |
C | Spanning tree |
D | Port aggregation |
Question 43 |
A | Network mapper |
B | Protocol analyzer |
C | Logical network diagram |
D | WAP power level controls |
Question 44 |
Which of the following ones should the technician use to place the webserver and which of the following firewall rules should the technician configure?
A | Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the webserver |
B | Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the webserver |
C | Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the webserver |
D | Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the webserver |
Question 45 |
A | Network switch |
B | Media converter |
C | Firewall |
D | Wireless access point |
E | Router |
Question 46 |
A | Routing table |
B | Dynamic routes |
C | Routing loop |
D | Route redistribution |
E | DHCP |
Question 47 |
A | RTP |
B | H.323 |
C | SMB |
D | NTP |
E | SIP |
F | ICMP |
Question 48 |
A | Proxy server |
B | Switch |
C | Router |
D | Load balancer |
Question 49 |
A | VLAN mismatch |
B | Duplex/Speed mismatch |
C | Duplicate IP address |
D | TX/RX reverse |
Question 50 |
A | NIC teaming |
B | Load balancing |
C | Clustering |
D | Multiple NAT |
E | Redundant circuits |
Question 51 |
A | Synchronization of clocks over a computer network |
B | Retrieving contents of an Internet page from a web server |
C | Allocation of IP addresses |
D | Monitoring of network-attached devices |
Question 52 |
A | MOU |
B | AUP |
C | SLA |
D | NDA |
Question 53 |
A | Server IP address |
B | DNS SRV record |
C | Host-based firewall settings |
D | TACAS+ server time |
Question 54 |
A | Baseband |
B | Analog modem |
C | Broadband |
D | CSMA |
Question 55 |
A | The use of lightweight APs with a load balancer |
B | The use of autonomous APs with a load balancer |
C | The use of lightweight APs with a wireless controller |
D | The use of autonomous APs with a wireless controller |
Question 56 |
A | Certificate |
B | MFA |
C | NAC |
D | Kerberos |
E | RADIUS |
F | SSO |
Question 57 |
A | OCSP stapling |
B | DDoS |
C | Evil twin |
D | MITM |
E | Phishing |
Question 58 |
A | Channel 7 |
B | Channel 10 |
C | Channel 9 |
D | Channel 6 |
Question 59 |
A | The technician should reset all the phones and deprovision information from the provider |
B | The technician should check the internal diagnostics on all the phones to look for a common thread |
C | The technician should run ping tests on the Internet line to monitor for packet loss and latency |
D | The technician should use a packet tracer to see if the traffic is getting out of the network |
Question 60 |
A | MITM attack |
B | Session hijacking |
C | Wardriving |
D | Spoofing attack |
E | DDoS attack |
Question 61 |
A | 3DES encryption |
B | Digital signatures |
C | Digital signatures |
D | SSL certificate |
Question 62 |
A | Backs up all files and sets the archive bit. |
B | Backs up files with the archive bit set but does not clear the bit. |
C | Backs up files with the creation or modified date as the current date. |
D | Backs up files with a date earlier than today’s date with a clear archive bit. |
Question 63 |
A | DNS |
B | LADP |
C | DHCP |
D | HTTP |
E | ICMP |
Question 64 |
A | network devices |
B | packet flow |
C | traffic-routing protocols |
D | public/private networks |
Question 65 |
A | Authentication passphrase |
B | MD5 |
C | authpriv |
D | SHA |
Question 66 |
A | Disable the SSID broadcast on each access point. |
B | Reduce the TX power on each access point. |
C | Enable AP isolation on each access point. |
D | Enable MAC address filtering on each access point. |
Question 67 |
A | ACL misconfiguration |
B | Bad port |
C | Duplex/speed mismatch |
D | Crosstalk |
Question 68 |
A | DSL modem |
B | Demarc |
C | DOCSIS modem |
D | Wireless router |
E | Access point |
Question 69 |
A | Incident response policy |
B | Remote access policies |
C | Data loss prevention |
D | International export controls |
E | Licensing restrictions |
Question 70 |
A | Secure the area |
B | Implement a chain of custody |
C | Document the scene |
D | Take pictures upon arrival |
Question 71 |
A | IP helper |
B | DHCP timer |
C | Lease time |
D | MAC reservation |
E | Pool |
Question 72 |
A | Point-to-point |
B | Client-to-site |
C | Site-to-site |
D | Point-to-multipoint |
Question 73 |
A | Session hijacking |
B | Bluesnarfing |
C | MAC spoofing |
D | Man-in-the-middle |
E | VLAN hopping |
Question 74 |
A | One router connected to one 24-port switch configured with three VLANS: one for the manager's computers and printer, one for the other computers and printer, and one for the VoIP phones |
B | One router connected to one 12-port switch configured for the manager's computers, phones, and printer, and one 12-port switch configured for the other computers, VoIP phones, and printer |
C | Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the manager's desktop computers, VoIP phones, and printer |
D | One router connected to one 24-port switch configured with two VLANS: one for the manager's computers, VoIP phones, and printer, and one for the other computers, VoIP phones, and printer |
Question 75 |
A | dig |
B | nmap |
C | tcpdump |
D | arp |
Question 76 |
A | Spoofing attacks require physical presence |
B | DDoS attacks target multiple networks |
C | Spoofing attacks originate from a single host |
D | DDoS attacks are launched from multiple hosts |
Question 77 |
Gigabit Ethernet 1 Interface: 10.10.0.1/24 Serial 0 Interface: 10.10.0.253/30
A | The router was configured with an incorrect default gateway |
B | The router was configured with an incorrect subnet mask |
C | The router was configured with an incorrect IP address |
D | The router was configured with an incorrect loopback address |
Question 78 |
A | Port 123 and 8080 |
B | Ports 80 and 443 |
C | Ports 67 and 68 |
D | Ports 56 and 57 |
E | Ports 20 and 21 |
Question 79 |
A | 0 |
B | 12 |
C | 1 |
D | 2 |
E | 6 |
Question 80 |
A | Content filter |
B | RADIUS server |
C | VoIP PBX |
D | Wireless controller |
Question 81 |
A | Bus |
B | Partial mesh |
C | Ad hoc |
D | Ring |
Question 82 |
A | OUI |
B | SNMP agent |
C | OID |
D | SNMP host |
E | OTDR |
Question 83 |
A | Ping table |
B | DHCP lease time |
C | TTL |
D | IP helper |
E | DNS record type |
Question 84 |
A | LDAP |
B | TLS |
C | SFTP |
D | SSH |
Question 85 |
A | The Faraday cage prevents access by redirecting signals. |
B | The Faraday cage is creating attenuation of the cellular network. |
C | The Faraday cage is creating interference within the bookstore. |
D | The Faraday cage is creating latency on the cellular network. |
Question 86 |
A | vSAN |
B | FCoE |
C | Fiber Channel |
D | Virtual switch |
E | VPC |
Question 87 |
route add 0.0.0.0 mask 0.0.0.0 192.169.1.222 metric 1
A | The technician is adding a static IP address. |
B | The technician is clearing the subnet mas setting. |
C | The technician is clearing the route table. |
D | The technician is setting the default gateway. |
Question 88 |
A | Provides username & password authentication. |
B | Encrypts network connection. |
C | It cannot be used on modern Windows computers. |
D | Enables remote login and command execution. |
E | Transmits data in an unencrypted form. |
F | It does not provide authentication. |
Question 89 |
A | SaaS |
B | SAN |
C | IaaS |
D | NAS |
Question 90 |
A | Disable unused ports. |
B | Reset the two-factor token. |
C | Disable virtual ports. |
D | Upgrade the firmware. |
Question 91 |
A | Replace the server's single-mode fiber cable with multimode fiber |
B | Move the fiber cable to a different port on the switch where both strands function |
C | Reverse the fiber strands of the cable and reconnect them to the server |
D | Use a TDR to test both strands of a new replacement cable prior to connecting it to the server |
Question 92 |
A | Incorrect pin-out |
B | Damaged cable |
C | Switch configuration |
D | Attenuation |
Question 93 |
A | Document the findings |
B | Gather information |
C | Establish a plan of action |
D | Determine the symptoms |
Question 94 |
A | DLP |
B | AUP |
C | NDA |
D | SLA |
Question 95 |
A | 2001::d58::95:7565:1 |
B | 2001:0:d58:0:0:95:7565:1 |
C | 2001:0:0d58::95:7565:1 |
D | 2001:0:d58::95:7565:1 |
Question 96 |
A | Add a redundant power supply to the switch |
B | Implement stacking on the switches in the rack |
C | Install a power converter for the switch |
D | Add a second UPS into the rack |
Question 97 |
A | Change management |
B | Network configuration |
C | Network diagram |
D | Rack diagram |
Question 98 |
A | Intrusion detection |
B | Content filtering |
C | Dynamic DNS |
D | Proxy service |
Question 99 |
A | pathping |
B | traceroute |
C | netstat |
D | Nmap |
Question 100 |
A | OC3 |
B | FCoE |
C | iSCSI |
D | InfiniBand |
Question 101 |
A | Geofencing |
B | MAC filtering |
C | Open wireless |
D | Pre-shared key |
Question 102 |
A | Implement the solution |
B | Do nothing |
C | Establish a theory of probable cause |
D | Escalate the ticket to a senior technician |
E | Document the findings and outcomes |
Question 103 |
A | ARP poisoning |
B | Social engineering |
C | Session hijacking |
D | Evil twin |
E | DHCP exhaustion |
Question 104 |
A | Cat 7 |
B | Cat 6 |
C | Cat 5e |
D | Cat 6a |
Question 105 |
A | Layer 2 switch |
B | Bridge |
C | Signal repeater |
D | Layer 3 switch |
E | Domain server |
Question 106 |
Subnet 1: 192.168.1.0/26
Subnet 2: 192.168.1.65/26
Company B uses the following scheme:
Subnet 1: 192.168.1.50/28
A | VLAN |
B | NAT |
C | PAT |
D | DMZ |
Question 107 |
A | 48 collision domains, 5 broadcast domains |
B | 240 private networks |
C | 48 networks, 5 segments |
D | 5 collision domains, 48 segments |
E | 240 usable IP addresses |
Question 108 |
A | VLAN mismatch |
B | TX/RX reverse |
C | Crosstalk |
D | Duplex mismatch |
E | Damaged cables |
F | Bent pins |
Question 109 |
A | EMI |
B | Open/short |
C | Attenuation |
D | TX/RX reverse |
Question 110 |
A | Disable FTP service on the server |
B | Disable the SMTP service on the server |
C | Disable DHCP service on the server |
D | Disable Telnet service on the server |
Question 111 |
A | PPTP |
B | SSL VPN |
C | IPSec |
D | PTP |
Question 112 |
A | IEEE 802.1X |
B | IEEE 802.3x |
C | IEEE 802.1q |
D | IEEE 802.11ac |
Question 113 |
A | Star |
B | Bus |
C | Mesh |
D | Ring |
Question 114 |
A | Load balancer |
B | Layer 2 switch |
C | Bridge |
D | Layer 3 switch |
Question 115 |
A | sanuja |
B | gdm |
C | systemd |
D | top |
E | root |
Question 116 |
A | Use an FTP server and provide the file hash. |
B | Use a TFTP server and UDP protocol. |
C | Use an HTTP server to share the file. |
D | Use a modem and dial-up connection. |
Question 117 |
Image Credits: https://www.homedepot.com/p/ Ideal-Punchdown-Tool- with-110-and-66- Blades-35-485/ 203761571
A | Punchdown tool |
B | Tone generator and locator |
C | Butt set |
D | Crimper |
Question 118 |
A | Require PEAP for authentication to the wireless network |
B | Use MAC filtering for authorization to the wireless network |
C | Require a pre-shared key for authentication to the wireless network |
D | Implement a Faraday cage within the building premises |
Question 119 |
A | WEP-TKIP |
B | EAP-TLS |
C | WPA-PSK |
D | AES-CCMP |
Question 120 |
A | netstat |
B | nslookup |
C | Spectrum analyzer |
D | Packet sniffer |
Question 121 |
A | Geotagging application |
B | VNC application |
C | Credentials |
D | Kerberos |
Question 122 |
A | Coaxial cabling |
B | STP cabling |
C | Fiber-optic cabling |
D | UTP cabling |
Question 123 |
A | ISDN |
B | Broadband cable |
C | Frame relay |
D | MPLS |
E | PRI |
Question 124 |
A | Changing the management software's default port |
B | Changing the management software's default credentials |
C | Replacing the management software's self-signed certificate with a valid certificate |
D | Disabling unnecessary services from the server and management software |
Question 125 |
A | RDP |
B | NTP |
C | SNMP |
D | SSL |
E | SMB |
Question 126 |
A | DMZ |
B | Demarc |
C | Data tier |
D | IDF |
Question 127 |
A | Connect the legacy devices with a PSK while the modern devices should use the more secure EAP. |
B | Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility. |
C | Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices. |
D | Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption. |
Question 128 |
A | Hostname |
B | Room number |
C | Rack location |
D | Media type |
Question 129 |
A | MAC filtering |
B | EAP-TLS |
C | SSL certificate |
D | WPA2 |
E | Captive portal |
Question 130 |
A | Create an inventory database |
B | Create a port location diagram |
C | Create a network baseline |
D | Create a rack diagram |
Question 131 |
A | Insider threat |
B | Trojan horse |
C | Logic bomb |
D | Social engineering |
E | Session hijacking |
Question 132 |
A | Incremental |
B | Replica |
C | Differential |
D | Snapshots |
Question 133 |
A | Port 80 |
B | Port 443 |
C | Port 22 |
D | Port 110 |
E | Port 110 |
Question 134 |
A | Speed |
B | TTL |
C | Duplex |
D | MTU |
Question 135 |
A | Network diagrams |
B | Change management |
C | Labeling report |
D | Inventory report |
Question 136 |
User A
IP address: 192.168.1.121
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
User B
IP address: 192.168.1.125
Subnet mask: 255.255.248.0
Default gateway: 192.168.1.1
A | The subnet values should be the same |
B | User B's IP address is not a loopback address |
C | There is no problem identifiable by the values given. |
D | The default gateway should have different values |
Question 137 |
A | STP |
B | DSCP |
C | SIP |
D | VLANs |
Question 138 |
A | Enforcing a stronger password policy and using a hand geometry scan |
B | Using a smart card and RSA token |
C | Adding a fingerprint reader and retina scanner |
D | Adding a fingerprint reader to each workstation and providing a RSA authentication token |
Question 139 |
A | The cable is a Cat 5 cable |
B | The cable has bent pins |
C | The cable is damaged |
D | The cable is a crossover cable |
E | The cable is rollover cable |
Question 140 |
A | 5GHz |
B | 900MHz |
C | 56MHz |
D | 2.4 GHz |
Question 141 |
A | MS Windows command-line tool |
B | Linux command-line tool |
C | Packet capturing utility |
D | Packet filtering utility |
E | Packet tracing utility |
Question 142 |
A | 192.168.12.97 to 255.255.255.224 |
B | 192.168.12.97 to 255.255.255.248 |
C | 192.168.12.97 to 255.255.255.240 |
D | 192.168.12.97 to 255.255.255.192 |
Question 143 |
A | Single sign-on |
B | RADIUS |
C | TACACS+ |
D | Captive portal |
Question 144 |
Which of the following devices is causing the issue?
A | Router |
B | Switch 2 |
C | Firewall |
D | Switch 1 |
Question 145 |
A | Acceptable use |
B | Incident response |
C | Asset disposal |
D | Data loss prevention |
Question 146 |
A | Equipment closet |
B | Demarcation point |
C | Intermediate distribution frame |
D | Server room |
Question 147 |
A | Telnet over PSTN |
B | RDP over SSLv2 HTTPS terminal services gateway |
C | SSH over IPsec client-to-site VPN |
D | HTTP over WPA2-TKIP WiFi |
Question 148 |
A | Duplex SFP+ |
B | 1000BaseLX SFP |
C | Bidirectional SFP |
D | Duplex GBIC |
Question 149 |
A | GBIC |
B | LC |
C | SFTP |
D | DB-9 |
E | SC |
F | RJ45 |
Question 150 |
A | Tone generator |
B | Loopback adapter |
C | Cable tester |
D | Multimeter |
Question 151 |
A | 10.8.0.0/19 |
B | 10.8.0.0/20 |
C | 10.0.0.0/24 |
D | 10.8.0.0/16 |
Question 152 |
A | There is additional data being transferred over the wireless network |
B | There is interference with the smart reader |
C | The utility company throttles power during peak hours |
D | An IoT device is causing a DoS attack on the wireless network |
Question 153 |
A | Install a repeater to boost the signal to its destination |
B | Set the AP to half-duplex to compensate for signal loss |
C | Replace the UTP cable with plenum cable |
D | Upgrade the cable from Cat 5 to Cat 5e or Cat 6 |
Question 154 |
A | ipconfig /release |
B | ipconfig /flushdns |
C | ipconfig /all |
D | ipconfig /renew |
Question 155 |
A | EAP-PEAP |
B | SFTP |
C | SSH in tunnel mode |
D | RDP set to console connection |
Question 156 |
A | Misconfigured VLSM |
B | Rogue DHCP server |
C | Exhausted dynamic scope |
D | Expired IP address |
Question 157 |
A | Telnet |
B | TFTP |
C | SFTP |
D | FTPS |
E | SSL |
Question 158 |
A | Reviewing SLA requirements |
B | Reviewing application logs |
C | Reviewing a vulnerability scan |
D | Reviewing a baseline report |
Question 159 |
A | CRL |
B | Key escrow |
C | CSR |
D | OCSP |
Question 160 |
A | Perform a traceroute command to identify the router that is not functioning. |
B | Verify the host has physical connectivity and is on the correct VLAN. |
C | Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address. |
D | Change the IP scope on the DHCP server to a public IP address range. |
Question 161 |
A | 15 |
B | 13 |
C | 12 |
D | 14 |
E | 3 |
Question 162 |
A | Enforce port security to require system authentication |
B | Label existing systems with current hostnames |
C | Implement a standardized UNC |
D | Forward the DHCP logs to the security manager every day |
Question 163 |
A | TCP |
B | UDP |
C | IP |
D | Ethernet |
E | None of the answers are correct. |
Question 164 |
A | Layer 1 – Physical |
B | Layer 3 – Network |
C | Layer 4 – Transport |
D | Layer 6 - Presentation |
E | Layer 7 – Application |
Question 165 |
A | SNMP |
B | FTP |
C | CHAP |
D | SSL |
E | SSH |
Question 166 |
A | PEAP |
B | WP2-PSK |
C | Captive portal |
D | EAP-TLS |
Question 167 |
“The Security certificate presented by this website was not trusted by trusted certificate authority.”
Sanuja has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error. Which of the following is the MOST likely cause of this error?
A | TLS is not enabled in the browser. |
B | The website is missing an HTTPS certificate. |
C | The SSL certificate has expired. |
D | The web server is missing an intermediate certificate. |
Question 168 |
A | Proximity reader |
B | Biometric device |
C | Identification card |
D | Video camera |
Question 169 |
IP: 192.168.1.100
Mask: 255.255.255.0
Router: 192.168.1.1
A | Wrong SSID |
B | Security type mismatch |
C | Channel overlap |
D | Interference |
Question 170 |
A | IPS |
B | VPN concentrator |
C | IDS |
D | Proxy server |
E | Load balancer |
Question 171 |
A | VLAN routing |
B | Patch cable type |
C | DHCP scope availability |
D | Server-based firewall configuration issue |
Question 172 |
A | It provides multiple broadcast domains within a single collision domain |
B | It segments broadcast domains in the network infrastructure |
C | It provides a faster port to all servers |
D | It provides multiple collision domains on one switchport |
Question 173 |
A | Spectrum analyzer |
B | Loopback adapter |
C | OTDR |
D | TDR |
Question 174 |
A | Bridge |
B | Switch |
C | Hub |
D | Router |
Question 175 |
A | None, the network looks good. |
B | Cable 3 should be an STP cable. |
C | Cable 2 should be an STP cable. |
D | Cable 1 does not need to be plenum rated. |
Question 176 |
A | Multimeter |
B | OTDR |
C | Spectrum analyzer |
D | Packet sniffer |
Question 177 |
A | 1000BaseSX |
B | 10Base5 |
C | 1000BaseLX |
D | 10Base2 |
E | 1000BaseT |
F | 10GBaseT |
Question 178 |
A | -a |
B | /all |
C | -i address |
D | eth_addr |
Question 179 |
A | Protocol analyzer |
B | Tone generator |
C | Spectrum analyzer |
D | OTDR |
E | Multimeter |
Question 180 |
A | CNAME |
B | MX |
C | SRV |
D | AAAA |
Question 181 |
A | Phishing |
B | Ransomware |
C | Man-in-the-middle |
D | Spam |
Question 182 |
A | DHCP |
B | TFTP |
C | SCP |
D | FTP |
E | Telnet |
Question 183 |
A | Test solutions |
B | Establish a theory of probable cause |
C | Question users |
D | Implement preventive measures |
E | Duplicate the problem |
F | Document findings |
Question 184 |
A | 802.11b |
B | 802.11ac |
C | 802.11a |
D | 802.11n |
Question 185 |
A | Port 161 |
B | Port 69 |
C | Port 25 |
D | Port 123 |
Question 186 |
A | Jitter |
B | Attenuation |
C | Latency |
D | Frequency mismatch |
Question 187 |
A | ASIC |
B | SPF |
C | GBIC |
D | SFP |
E | MDI-X |
Question 188 |
A | 512 |
B | 1022 |
C | 510 |
D | 2048 |
E | 2046 |
F | 1024 |
Question 189 |
A | Loop protection is enabled on the root port of a switch. |
B | BPDUs entering the root bridge are ignored. |
C | The STP root bridge cannot be changed. |
D | Broadcast storms entering from a root port are blocked. |
Question 190 |
A | The server IP address is incorrectly configured |
B | The reverse DNS entry is pointing to a different host |
C | There is no reverse DNS entry for this host |
D | The DNS lookup entry is incorrectly configured |
Question 191 |
A | Frames |
B | Datagrams |
C | Packets |
D | Segments |
Question 192 |
A | Video cameras |
B | Motion sensors |
C | Sign-in sheets |
D | Swipe badges |
Question 193 |
A | DNS |
B | NetBIOS |
C | HTTP |
D | ICMP |
E | DHCP |
Question 194 |
A | The ports replied with a SYN/ACK response |
B | The ports are associated with deprecated services |
C | The ports belong to an active system and are denying requests |
D | The ports do not belong to a live system |
Question 195 |
A | Adding a router diverts traffic to an alternate path through the network. |
B | Adding a router reduces the amount of unicast traffic on each of the two LANs. |
C | Adding a router prevents computers on one LAN from communicating with computers on another LAN. |
D | Adding a router reduces the amount of broadcast traffic on each of the two LANs. |
Question 196 |
A | Fibre Channel |
B | PPP |
C | RDMA |
D | iSCSI |
Question 197 |
A | Cat 7 |
B | PVC |
C | Single-mode |
D | Plenum |
Question 198 |
A | Switch |
B | Bridge |
C | Next-generation firewall |
D | Multilayer switch |
Question 199 |
A | The students are attempting to connect 802.11g devices |
B | Distance limitations are preventing the students from connecting |
C | One of the wireless access points is on the wrong frequency |
D | The students are using more than one wireless device port seat |
Question 200 |
A | 802.1q |
B | 802.1X |
C | 802.11ac |
D | 802.3af |
E | 802.3at |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.