← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set III
CompTIA Network+ N10-007 - Set II
Congratulations - you have completed CompTIA Network+ N10-007 - Set II.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | There is no reverse DNS entry for this host |
B | The reverse DNS entry is pointing to a different host |
C | The server IP address is incorrectly configured |
D | The DNS lookup entry is incorrectly configured |
Question 2 |
A | TCP offloading |
B | Round robin |
C | Clustering |
D | Jumbo frames |
E | Load balancer |
Question 3 |
A | Video camera |
B | Biometric device |
C | Proximity reader |
D | Identification card |
Question 4 |
A | Proxy server |
B | Switch |
C | Load balancer |
D | Router |
Question 5 |
A | The ports are associated with deprecated services |
B | The ports replied with a SYN/ACK response |
C | The ports belong to an active system and are denying requests |
D | The ports do not belong to a live system |
Question 6 |
A | Punchdown tool |
B | Multimeter |
C | Tone generator |
D | Loopback adapter |
Question 7 |
A | Enable AP isolation on each access point. |
B | Enable MAC address filtering on each access point. |
C | Reduce the TX power on each access point. |
D | Disable the SSID broadcast on each access point. |
Question 8 |
A | Replace the new switch with a hub to ensure Layer1 connectivity on the new network segment. |
B | Move the straight-through Ethernet cable connecting the switches to the first port on both switches. |
C | Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end. |
D | Add a second cable connecting the switches for redundancy and disabling STP on both switches. |
Question 9 |
A | Routing table |
B | Route redistribution |
C | Routing loop |
D | DHCP |
E | Dynamic routes |
Question 10 |
A | SPF |
B | GBIC |
C | SFP |
D | MDI-X |
E | ASIC |
Question 11 |
A | Because a secure firewall will protect the device |
B | Because secure protocols would reject malicious packets |
C | Because SCP is not a secure service |
D | Because FTP is not a secure service |
Question 12 |
A | Video cameras |
B | Sign-in sheets |
C | Motion sensors |
D | Swipe badges |
Question 13 |
A | Session |
B | Presentation |
C | Transport |
D | Data link |
Question 14 |
A | PPP |
B | RDMA |
C | iSCSI |
D | Fibre Channel |
Question 15 |
A | Router |
B | Hub |
C | Bridge |
D | Switch |
Question 16 |
A | Broadband |
B | Analog modem |
C | CSMA |
D | Baseband |
Question 17 |
A | Hostname |
B | Media type |
C | Room number |
D | Rack location |
Question 18 |
A | Packet capturing utility |
B | MS Windows command-line tool |
C | Packet filtering utility |
D | Packet tracing utility |
E | Linux command-line tool |
Question 19 |
A | WPA-PSK |
B | EAP-TLS |
C | WEP-TKIP |
D | AES-CCMP |
Question 20 |
A | Intrusion detection |
B | Dynamic DNS |
C | Content filtering |
D | Proxy service |
Question 21 |
A | Change default credentials |
B | Update firmware |
C | Generate new keys |
D | Perform file hashing |
Question 22 |
A | Trojan horse |
B | Insider threat |
C | Social engineering |
D | Session hijacking |
E | Logic bomb |
Question 23 |
Subnet 1: 192.168.1.0/26
Subnet 2: 192.168.1.65/26
Company B uses the following scheme:
Subnet 1: 192.168.1.50/28
A | NAT |
B | VLAN |
C | PAT |
D | DMZ |
Question 24 |
A | Damaged cable |
B | Incorrect pin-out |
C | Switch configuration |
D | Attenuation |
Question 25 |
A | DMZ |
B | Demarc |
C | IDF |
D | Data tier |
Question 26 |
A | TCP/IP |
B | DHCP |
C | SQL |
D | DNS |
Question 27 |
A | Data loss prevention |
B | Incident response policy |
C | Licensing restrictions |
D | Remote access policies |
E | International export controls |
Question 28 |
A | Media converter |
B | Network switch |
C | Firewall |
D | Wireless access point |
E | Router |
Question 29 |
A | 2048 |
B | 510 |
C | 512 |
D | 1022 |
E | 2046 |
F | 1024 |
Question 30 |
A | Reverse the fiber strands of the cable and reconnect them to the server |
B | Move the fiber cable to a different port on the switch where both strands function |
C | Replace the server's single-mode fiber cable with multimode fiber |
D | Use a TDR to test both strands of a new replacement cable prior to connecting it to the server |
Question 31 |
A | Layer 2 switch |
B | Load balancer |
C | Bridge |
D | Layer 3 switch |
Question 32 |
A | RDP set to console connection |
B | EAP-PEAP |
C | SFTP |
D | SSH in tunnel mode |
Question 33 |
A | IPSec |
B | SSL VPN |
C | PPTP |
D | PTP |
Question 34 |
A | Distance limitations are preventing the students from connecting |
B | The students are attempting to connect 802.11g devices |
C | One of the wireless access points is on the wrong frequency |
D | The students are using more than one wireless device port seat |
Question 35 |
A | Add a redundant power supply to the switch |
B | Implement stacking on the switches in the rack |
C | Install a power converter for the switch |
D | Add a second UPS into the rack |
Question 36 |
A | Credentials |
B | Geotagging application |
C | VNC application |
D | Kerberos |
Question 37 |
A | Multiple NAT |
B | NIC teaming |
C | Clustering |
D | Redundant circuits |
E | Load balancing |
Question 38 |
A | Flood guard |
B | DHCP snooping |
C | BPDU guard |
D | Spanning tree |
Question 39 |
A | dig |
B | ipconfig |
C | arp |
D | nslookup |
Question 40 |
A | Reverse the wires leading to pins 1 and 2 |
B | Reverse the wires leading to pins 1 and 3 |
C | Reverse the wires leading to pins 2 and 3 |
D | Reverse the wires leading to pins 2 and 4 |
Question 41 |
A | 10.5.4.0/22 |
B | 172.18.0.0/23 |
C | 172.16.0.0/22 |
D | 10.233.2.0/23 |
E | 192.168.25.0/24 |
Question 42 |
A | 14 |
B | 13 |
C | 3 |
D | 15 |
E | 12 |
Question 43 |
A | Network configuration |
B | Network diagram |
C | Change management |
D | Rack diagram |
Question 44 |
A | Offboarding |
B | AUP |
C | Incident response |
D | Remote access |
E | DLP |
Question 45 |
A | IP helper |
B | DHCP timer |
C | Lease time |
D | MAC reservation |
E | Pool |
Question 46 |
A | penetration testing. |
B | risk assessment. |
C | role separation. |
D | device hardening. |
Question 47 |
A | EAP-TLS |
B | SSL certificate |
C | MAC filtering |
D | Captive portal |
E | WPA2 |
Question 48 |
A | Generate new SSH keys |
B | Upgrade to the latest firmware |
C | Review and modify the firewall rules |
D | Verify the default passwords have been changed |
Question 49 |
A | Site-to-site |
B | Point-to-point |
C | Point-to-multipoint |
D | Client-to-site |
Question 50 |
A | EMI |
B | Open/short |
C | Attenuation |
D | TX/RX reverse |
Question 51 |
A | Bent pins |
B | Crosstalk |
C | Damaged cables |
D | Duplex mismatch |
E | VLAN mismatch |
F | TX/RX reverse |
Question 52 |
A | There are 3 collision domains, one for each switch-to-switch connection. |
B | There are 12 collision domains, one for each switch connection. |
C | There is one collision domain for this network. |
D | There are 9 collision domains, one for each half-duplex connection. |
Question 53 |
A | The cable is damaged |
B | The cable is a Cat 5 cable |
C | The cable is a crossover cable |
D | The cable is rollover cable |
E | The cable has bent pins |
Question 54 |
A | Server room |
B | Equipment closet |
C | Demarcation point |
D | Intermediate distribution frame |
Question 55 |
A | MX |
B | AAAA |
C | SRV |
D | CNAME |
Question 56 |
A | Port 110 |
B | Port 80 |
C | Port 110 |
D | Port 443 |
E | Port 22 |
Question 57 |
A | SSL |
B | SFTP |
C | TFTP |
D | FTPS |
E | Telnet |
Question 58 |
A | 2001::d58::95:7565:1 |
B | 2001:0:0d58::95:7565:1 |
C | 2001:0:d58::95:7565:1 |
D | 2001:0:d58:0:0:95:7565:1 |
Question 59 |
A | SLA |
B | AUP |
C | NDA |
D | DLP |
Question 60 |
A | -a |
B | eth_addr |
C | -i address |
D | /all |
Question 61 |
A | Adding a router diverts traffic to an alternate path through the network. |
B | Adding a router prevents computers on one LAN from communicating with computers on another LAN. |
C | Adding a router reduces the amount of broadcast traffic on each of the two LANs. |
D | Adding a router reduces the amount of unicast traffic on each of the two LANs. |
Question 62 |
A | Port aggregation |
B | Spanning tree |
C | Port mirroring |
D | Trunking |
Question 63 |
A | DSCP |
B | STP |
C | VLANs |
D | SIP |
Question 64 |
A | Telnet |
B | FTP |
C | DHCP |
D | TFTP |
E | SCP |
Question 65 |
A | Replacing the management software's self-signed certificate with a valid certificate |
B | Disabling unnecessary services from the server and management software |
C | Changing the management software's default credentials |
D | Changing the management software's default port |
Question 66 |
User A
IP address: 192.168.1.121
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
User B
IP address: 192.168.1.125
Subnet mask: 255.255.248.0
Default gateway: 192.168.1.1
A | The default gateway should have different values |
B | The subnet values should be the same |
C | User B's IP address is not a loopback address |
D | There is no problem identifiable by the values given. |
Question 67 |
A | Captive portal |
B | TACACS+ |
C | RADIUS |
D | Single sign-on |
Question 68 |
A | 3DES encryption |
B | Digital signatures |
C | SSL certificate |
D | Digital signatures |
Question 69 |
A | Host-based firewall settings |
B | Server IP address |
C | DNS SRV record |
D | TACAS+ server time |
Question 70 |
A | There are nine collision domains and three broadcast
domains. |
B | There are seven collision domains and three broadcast
domains. |
C | There are three collision domains and three broadcast
domains. |
D | There is one collision domain and one broadcast domain. |
E | There are three collision domains and one broadcast domain. |
Question 71 |
A | Create a honeypot to attract attackers. |
B | Implement a DMZ for all external services. |
C | Implement root guard on all switches. |
D | Create a VLAN for all unused switchports. |
Question 72 |
A | APIPA address |
B | Loopback address |
C | Duplicate MAC addresses |
D | Duplicate IP addresses |
Question 73 |
A | Biometric scanners |
B | Door locks |
C | Video surveillance |
D | Motion detectors |
Question 74 |
A | Backs up all files and sets the archive bit. |
B | Backs up files with the creation or modified date as the current date. |
C | Backs up files with a date earlier than today’s date with a clear archive bit. |
D | Backs up files with the archive bit set but does not clear the bit. |
Question 75 |
A | Datagrams |
B | Packets |
C | Frames |
D | Segments |
Question 76 |
A | 802.1X |
B | 802.3af |
C | 802.1q |
D | 802.11ac |
E | 802.3at |
Question 77 |
A | RFI |
B | BRI |
C | SVC |
D | SNR |
Question 78 |
A | Speed |
B | Duplex |
C | TTL |
D | MTU |
Question 79 |
A | Change the switch |
B | Modify the speed and duplex |
C | Plug in to another port |
D | Replace the NIC |
Question 80 |
A | 48 collision domains, 5 broadcast domains |
B | 48 networks, 5 segments |
C | 240 private networks |
D | 240 usable IP addresses |
E | 5 collision domains, 48 segments |
Question 81 |
A | NDA |
B | SLA |
C | AUP |
D | MOU |
Question 82 |
A | MITM |
B | DNS sinkhole |
C | IDS firewall |
D | DDoS |
E | DDoS |
Question 83 |
A | The use of lightweight APs with a load balancer |
B | The use of autonomous APs with a wireless controller |
C | The use of autonomous APs with a load balancer |
D | The use of lightweight APs with a wireless controller |
Question 84 |
A | Key escrow |
B | CRL |
C | CSR |
D | OCSP |
Question 85 |
A | Nmap |
B | netstat |
C | traceroute |
D | pathping |
Question 86 |
A | Use an HTTP server to share the file. |
B | Use a modem and dial-up connection. |
C | Use a TFTP server and UDP protocol. |
D | Use an FTP server and provide the file hash. |
Question 87 |
A | Geofencing |
B | Pre-shared key |
C | Open wireless |
D | MAC filtering |
Question 88 |
A | Samba |
B | TFTP |
C | LDAP |
D | Telnet |
Question 89 |
A | OTDR |
B | SNMP agent |
C | OUI |
D | OID |
E | SNMP host |
Question 90 |
A | Label existing systems with current hostnames |
B | Implement a standardized UNC |
C | Forward the DHCP logs to the security manager every day |
D | Enforce port security to require system authentication |
Question 91 |
A | netstat |
B | nslookup |
C | Spectrum analyzer |
D | Packet sniffer |
Question 92 |
A | 192.168.12.97 to 255.255.255.248 |
B | 192.168.12.97 to 255.255.255.240 |
C | 192.168.12.97 to 255.255.255.192 |
D | 192.168.12.97 to 255.255.255.224 |
Question 93 |
A | BYOD |
B | NDA |
C | MOU |
D | AUP |
Question 94 |
A | Crosstalk |
B | Transceiver mismatch |
C | Open/short on the cable |
D | Jitter |
Question 95 |
A | Captive portal |
B | PEAP |
C | WP2-PSK |
D | EAP-TLS |
Question 96 |
A | A |
B | NS |
C | MX |
D | CNAME |
E | PTR |
Question 97 |
A | DDoS |
B | Phishing |
C | OCSP stapling |
D | MITM |
E | Evil twin |
Question 98 |
A | Crosstalk |
B | ACL misconfiguration |
C | Duplex/speed mismatch |
D | Bad port |
Question 99 |
A | SMB |
B | RTP |
C | SIP |
D | NTP |
E | H.323 |
F | ICMP |
Question 100 |
A | Layer 3 – Network |
B | Layer 4 – Transport |
C | Layer 7 – Application |
D | Layer 6 - Presentation |
E | Layer 1 – Physical |
Question 101 |
A | 10.0.0.0/24 |
B | 10.8.0.0/16 |
C | 10.8.0.0/19 |
D | 10.8.0.0/20 |
Question 102 |
A | Access point |
B | DSL modem |
C | Wireless router |
D | DOCSIS modem |
E | Demarc |
Question 103 |
A | Ports 56 and 57 |
B | Port 123 and 8080 |
C | Ports 80 and 443 |
D | Ports 20 and 21 |
E | Ports 67 and 68 |
Question 104 |
A | Man-in-the-middle |
B | Bluesnarfing |
C | VLAN hopping |
D | MAC spoofing |
E | Session hijacking |
Question 105 |
A | SNMP |
B | CHAP |
C | SSL |
D | SSH |
E | FTP |
Question 106 |
A | 802.11a |
B | 802.11n |
C | 802.11ac |
D | 802.11b |
Question 107 |
A | Logical network diagram |
B | Protocol analyzer |
C | WAP power level controls |
D | Network mapper |
Question 108 |
A | OTDR |
B | Loopback adapter |
C | Spectrum analyzer |
D | TDR |
Question 109 |
A | IEEE 802.1q |
B | IEEE 802.1X |
C | IEEE 802.11ac |
D | IEEE 802.3x |
Question 110 |
A | 6 |
B | 1 |
C | 12 |
D | 0 |
E | 2 |
Question 111 |
A | Expired IP address |
B | Exhausted dynamic scope |
C | Misconfigured VLSM |
D | Rogue DHCP server |
Question 112 |
A | Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices. |
B | Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption. |
C | Connect the legacy devices with a PSK while the modern devices should use the more secure EAP. |
D | Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility. |
Question 113 |
A | sanuja |
B | top |
C | root |
D | systemd |
E | gdm |
Question 114 |
A | iSCSI |
B | OC3 |
C | InfiniBand |
D | FCoE |
Question 115 |
A | Implementing a modem on the AUX port to access a network device. |
B | Accessing a DSL router via the console port. |
C | Telnet into the router over a secure VPN. |
D | Using a secure SSH connection over the WAN link to connect to a server. |
Question 116 |
A | Cat 7 |
B | Cat 6a |
C | Cat 5e |
D | Cat 6 |
Question 117 |
A | VLAN mismatch |
B | Duplex/Speed mismatch |
C | Duplicate IP address |
D | TX/RX reverse |
Question 118 |
A | Take pictures upon arrival |
B | Secure the area |
C | Implement a chain of custody |
D | Document the scene |
Question 119 |
A | DNS |
B | ICMP |
C | HTTP |
D | DHCP |
E | LADP |
Question 120 |
Gigabit Ethernet 1 Interface: 10.10.0.1/24 Serial 0 Interface: 10.10.0.253/30
A | The router was configured with an incorrect loopback address |
B | The router was configured with an incorrect default gateway |
C | The router was configured with an incorrect IP address |
D | The router was configured with an incorrect subnet mask |
Question 121 |
route add 0.0.0.0 mask 0.0.0.0 192.169.1.222 metric 1
A | The technician is setting the default gateway. |
B | The technician is adding a static IP address. |
C | The technician is clearing the route table. |
D | The technician is clearing the subnet mas setting. |
Question 122 |
A | Reviewing a vulnerability scan |
B | Reviewing SLA requirements |
C | Reviewing a baseline report |
D | Reviewing application logs |
Question 123 |
Which of the following devices is causing the issue?
A | Firewall |
B | Switch 2 |
C | Switch 1 |
D | Router |
Question 124 |
A | nmap |
B | dig |
C | tcpdump |
D | arp |
Question 125 |
A | SSH |
B | TLS |
C | LDAP |
D | SFTP |
Question 126 |
A | Session hijacking |
B | ARP poisoning |
C | Social engineering |
D | Evil twin |
E | DHCP exhaustion |
Question 127 |
Image Credits: https://www.homedepot.com/p/ Ideal-Punchdown-Tool- with-110-and-66- Blades-35-485/ 203761571
A | Punchdown tool |
B | Butt set |
C | Crimper |
D | Tone generator and locator |
Question 128 |
A | NTP |
B | SSL |
C | RDP |
D | SNMP |
E | SMB |
Question 129 |
A | Install a repeater to boost the signal to its destination |
B | Set the AP to half-duplex to compensate for signal loss |
C | Replace the UTP cable with plenum cable |
D | Upgrade the cable from Cat 5 to Cat 5e or Cat 6 |
Question 130 |
A | It segments broadcast domains in the network infrastructure |
B | It provides a faster port to all servers |
C | It provides multiple collision domains on one switchport |
D | It provides multiple broadcast domains within a single collision domain |
Question 131 |
A | Patch cable type |
B | Server-based firewall configuration issue |
C | DHCP scope availability |
D | VLAN routing |
Question 132 |
A | Ring |
B | Bus |
C | Ad hoc |
D | Partial mesh |
Question 133 |
A | Disable virtual ports. |
B | Disable unused ports. |
C | Reset the two-factor token. |
D | Upgrade the firmware. |
Question 134 |
A | Phishing |
B | Spam |
C | Man-in-the-middle |
D | Ransomware |
Question 135 |
A | Data loss prevention |
B | Incident response |
C | Acceptable use |
D | Asset disposal |
Question 136 |
A | nbtstat |
B | netstat |
C | nslookup |
D | pathping |
Question 137 |
A | The LAN and WLAN should be configured in the DMZ so traffic is denied automatically. |
B | The LAN and WLAN should be configured in separate zones with a firewall in between. |
C | The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours. |
D | The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules. |
Question 138 |
A | Star |
B | Mesh |
C | Ad hoc |
D | Ring |
Question 139 |
A | Activate MAC address filtering. |
B | Change the WiFi password. |
C | Disable the SSID broadcast. |
D | Implement WEP authentication. |
Question 140 |
A | Channel 9 |
B | Channel 6 |
C | Channel 10 |
D | Channel 7 |
Question 141 |
A | packet flow |
B | network devices |
C | traffic-routing protocols |
D | public/private networks |
Question 142 |
A | UTP cabling |
B | Fiber-optic cabling |
C | Coaxial cabling |
D | STP cabling |
Question 143 |
A | 10GBaseT |
B | 1000BaseSX |
C | 10Base5 |
D | 1000BaseLX |
E | 10Base2 |
F | 1000BaseT |
Question 144 |
A | Signal repeater |
B | Domain server |
C | Bridge |
D | Layer 2 switch |
E | Layer 3 switch |
Question 145 |
Which of the following would MOST likely allow the network drives to be accessed?
A | Disable the WLAN adapter |
B | Check the wireless DHCP configuration |
C | Update the WLAN adapter driver |
D | Disable the LAN adapter |
Question 146 |
A | The STP root bridge cannot be changed. |
B | Loop protection is enabled on the root port of a switch. |
C | Broadcast storms entering from a root port are blocked. |
D | BPDUs entering the root bridge are ignored. |
Question 147 |
A | Duplex SFP+ |
B | Duplex GBIC |
C | 1000BaseLX SFP |
D | Bidirectional SFP |
Question 148 |
A | Session hijacking |
B | Wardriving |
C | MITM attack |
D | Spoofing attack |
E | DDoS attack |
Question 149 |
A | LC |
B | DB-9 |
C | SC |
D | RJ45 |
E | GBIC |
F | SFTP |
Question 150 |
A | ISDN |
B | MPLS |
C | PRI |
D | Broadband cable |
E | Frame relay |
Question 151 |
A | NAC |
B | Certificate |
C | RADIUS |
D | MFA |
E | SSO |
F | Kerberos |
Question 152 |
A | IPS |
B | VPN concentrator |
C | Proxy server |
D | IDS |
E | Load balancer |
Question 153 |
A | There is interference with the smart reader |
B | The utility company throttles power during peak hours |
C | An IoT device is causing a DoS attack on the wireless network |
D | There is additional data being transferred over the wireless network |
Question 154 |
A | Snapshots |
B | Incremental |
C | Differential |
D | Replica |
Question 155 |
A | One router connected to one 24-port switch configured with three VLANS: one for the manager's computers and printer, one for the other computers and printer, and one for the VoIP phones |
B | One router connected to one 12-port switch configured for the manager's computers, phones, and printer, and one 12-port switch configured for the other computers, VoIP phones, and printer |
C | One router connected to one 24-port switch configured with two VLANS: one for the manager's computers, VoIP phones, and printer, and one for the other computers, VoIP phones, and printer |
D | Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the manager's desktop computers, VoIP phones, and printer |
Question 156 |
A | Plenum |
B | PVC |
C | Cat 7 |
D | Single-mode |
Question 157 |
A | Cat 5 |
B | Cat 3 |
C | Cat 6 |
D | RG-6 |
E | SMF |
Question 158 |
A | IaaS |
B | NAS |
C | SaaS |
D | SAN |
Question 159 |
A | 56MHz |
B | 2.4 GHz |
C | 5GHz |
D | 900MHz |
Question 160 |
A | Attenuation |
B | Frequency mismatch |
C | Jitter |
D | Latency |
Question 161 |
A | Synchronization of clocks over a computer network |
B | Allocation of IP addresses |
C | Monitoring of network-attached devices |
D | Retrieving contents of an Internet page from a web server |
Question 162 |
A | Cable 3 should be an STP cable. |
B | Cable 2 should be an STP cable. |
C | Cable 1 does not need to be plenum rated. |
D | None, the network looks good. |
Question 163 |
A | The Faraday cage is creating latency on the cellular network. |
B | The Faraday cage prevents access by redirecting signals. |
C | The Faraday cage is creating attenuation of the cellular network. |
D | The Faraday cage is creating interference within the bookstore. |
Question 164 |
A | Application |
B | Network |
C | Physical |
D | Transport |
Question 165 |
A | Disable DHCP service on the server |
B | Disable FTP service on the server |
C | Disable Telnet service on the server |
D | Disable the SMTP service on the server |
Question 166 |
“The Security certificate presented by this website was not trusted by trusted certificate authority.”
Sanuja has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error. Which of the following is the MOST likely cause of this error?
A | The web server is missing an intermediate certificate. |
B | The SSL certificate has expired. |
C | TLS is not enabled in the browser. |
D | The website is missing an HTTPS certificate. |
Question 167 |
A | Create a network baseline |
B | Create an inventory database |
C | Create a port location diagram |
D | Create a rack diagram |
Question 168 |
A | Enforcing a stronger password policy and using a hand geometry scan |
B | Using a smart card and RSA token |
C | Adding a fingerprint reader and retina scanner |
D | Adding a fingerprint reader to each workstation and providing a RSA authentication token |
Question 169 |
A | permit udp any any eq 25 |
B | permit udp any any eq 53 |
C | permit tcp any any eq 110 |
D | permit tcp any any eq 8080 |
E | permit tcp any any eq 20 |
F | permit udp any any eq 68 |
Question 170 |
-WLAN architecture supporting speeds in excess of 150 Mbps
-Client less remote network access
-Port-based network access control
A | 802.11b, PPTP,802.1x |
B | 802.11g, MS-CHAP, 802.16 |
C | 802.11a, IPSec VPN, 802.1x |
D | 802.11n, SSL-VPN, 802.1x |
E | 802.11ac, MPLS, 802.3 |
Question 171 |
A | The technician should use a packet tracer to see if the traffic is getting out of the network |
B | The technician should run ping tests on the Internet line to monitor for packet loss and latency |
C | The technician should reset all the phones and deprovision information from the provider |
D | The technician should check the internal diagnostics on all the phones to look for a common thread |
Question 172 |
A | DHCP reservation for the laptops MACs |
B | Additional lease time for the laptop computers |
C | CNAME record in the users dynamic DNS accounts |
D | IP helper relay system for configuration hops |
Question 173 |
A | vSAN |
B | Virtual switch |
C | Fiber Channel |
D | VPC |
E | FCoE |
Question 174 |
A | Implement a Faraday cage within the building premises |
B | Require a pre-shared key for authentication to the wireless network |
C | Use MAC filtering for authorization to the wireless network |
D | Require PEAP for authentication to the wireless network |
Question 175 |
A | Switch |
B | Multilayer switch |
C | Bridge |
D | Next-generation firewall |
Question 176 |
A | DNS |
B | DHCP |
C | HTTP |
D | NetBIOS |
E | ICMP |
Question 177 |
A | Perform a traceroute command to identify the router that is not functioning. |
B | Verify the host has physical connectivity and is on the correct VLAN. |
C | Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address. |
D | Change the IP scope on the DHCP server to a public IP address range. |
Question 178 |
A | Document findings |
B | Question users |
C | Test solutions |
D | Duplicate the problem |
E | Implement preventive measures |
F | Establish a theory of probable cause |
Question 179 |
A | Port 161 |
B | Port 123 |
C | Port 69 |
D | Port 25 |
Question 180 |
A | Multimeter |
B | OTDR |
C | Spectrum analyzer |
D | Packet sniffer |
Question 181 |
A | Spoofing attacks require physical presence |
B | Spoofing attacks originate from a single host |
C | DDoS attacks are launched from multiple hosts |
D | DDoS attacks target multiple networks |
Question 182 |
A | Network diagrams |
B | Change management |
C | Inventory report |
D | Labeling report |
Question 183 |
A | Gather information |
B | Establish a plan of action |
C | Document the findings |
D | Determine the symptoms |
Question 184 |
A | Tone generator |
B | Multimeter |
C | Loopback adapter |
D | Cable tester |
Question 185 |
A | Mesh |
B | Star |
C | Bus |
D | Ring |
Question 186 |
A | Multimeter |
B | Spectrum analyzer |
C | Protocol analyzer |
D | OTDR |
E | Tone generator |
Question 187 |
A | SOHO router |
B | DNS server |
C | Layer 2 switch |
D | Cable modem |
Question 188 |
A | authpriv |
B | MD5 |
C | SHA |
D | Authentication passphrase |
Question 189 |
A | Document the findings and outcomes |
B | Escalate the ticket to a senior technician |
C | Implement the solution |
D | Do nothing |
E | Establish a theory of probable cause |
Question 190 |
A | It does not provide authentication. |
B | Provides username & password authentication. |
C | It cannot be used on modern Windows computers. |
D | Encrypts network connection. |
E | Transmits data in an unencrypted form. |
F | Enables remote login and command execution. |
Question 191 |
A | Ethernet |
B | IP |
C | TCP |
D | None of the answers are correct. |
E | UDP |
Question 192 |
IP: 192.168.1.100
Mask: 255.255.255.0
Router: 192.168.1.1
A | Wrong SSID |
B | Interference |
C | Channel overlap |
D | Security type mismatch |
Question 193 |
A | ipconfig /release |
B | ipconfig /flushdns |
C | ipconfig /renew |
D | ipconfig /all |
Question 194 |
A | Change management |
B | IDF/MDF documentation |
C | Performance baseline |
D | Physical diagram |
Question 195 |
A | SSH over IPsec client-to-site VPN |
B | RDP over SSLv2 HTTPS terminal services gateway |
C | Telnet over PSTN |
D | HTTP over WPA2-TKIP WiFi |
Question 196 |
A | Content filter |
B | Wireless controller |
C | VoIP PBX |
D | RADIUS server |
Question 197 |
A | The marketing department should receive a /25 network. |
B | The legal department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
C | The finance department should have 172.16.49.127 as a broadcast address. |
D | The marketing department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
E | The R&D department should have 172.16.49.207 as a broadcast address. |
F | The legal department should have a first usable IP address of 172.16.49.190. |
G | The R&D department should receive a /27 network. |
H | The R&D department should have a last usable IP address of 172.16.49.190. |
Question 198 |
A | iSCSI |
B | Port aggregation |
C | Jumbo frames |
D | QoS tags |
Question 199 |
Which of the following ones should the technician use to place the webserver and which of the following firewall rules should the technician configure?
A | Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the webserver |
B | Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the webserver |
C | Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the webserver |
D | Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the webserver |
Question 200 |
A | IP helper |
B | DHCP lease time |
C | TTL |
D | DNS record type |
E | Ping table |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.