← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set III
CompTIA Network+ N10-007 - Set II
Congratulations - you have completed CompTIA Network+ N10-007 - Set II.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | PTR |
B | A |
C | NS |
D | MX |
E | CNAME |
Question 2 |
Gigabit Ethernet 1 Interface: 10.10.0.1/24 Serial 0 Interface: 10.10.0.253/30
A | The router was configured with an incorrect loopback address |
B | The router was configured with an incorrect IP address |
C | The router was configured with an incorrect subnet mask |
D | The router was configured with an incorrect default gateway |
Question 3 |
A | Layer 3 – Network |
B | Layer 6 - Presentation |
C | Layer 1 – Physical |
D | Layer 4 – Transport |
E | Layer 7 – Application |
Question 4 |
A | Loopback adapter |
B | Punchdown tool |
C | Multimeter |
D | Tone generator |
Question 5 |
A | MTU |
B | TTL |
C | Duplex |
D | Speed |
Question 6 |
A | NDA |
B | BYOD |
C | MOU |
D | AUP |
Question 7 |
Image Credits: https://www.homedepot.com/p/ Ideal-Punchdown-Tool- with-110-and-66- Blades-35-485/ 203761571
A | Punchdown tool |
B | Butt set |
C | Crimper |
D | Tone generator and locator |
Question 8 |
A | Cable 3 should be an STP cable. |
B | Cable 2 should be an STP cable. |
C | Cable 1 does not need to be plenum rated. |
D | None, the network looks good. |
Question 9 |
A | Forward the DHCP logs to the security manager every day |
B | Label existing systems with current hostnames |
C | Implement a standardized UNC |
D | Enforce port security to require system authentication |
Question 10 |
A | Layer 3 switch |
B | Bridge |
C | Load balancer |
D | Layer 2 switch |
Question 11 |
A | Nmap |
B | traceroute |
C | netstat |
D | pathping |
Question 12 |
A | IPS |
B | Proxy server |
C | Load balancer |
D | IDS |
E | VPN concentrator |
Question 13 |
A | IEEE 802.1X |
B | IEEE 802.1q |
C | IEEE 802.11ac |
D | IEEE 802.3x |
Question 14 |
A | Attenuation |
B | Jitter |
C | Latency |
D | Frequency mismatch |
Question 15 |
A | Evil twin |
B | DHCP exhaustion |
C | Session hijacking |
D | Social engineering |
E | ARP poisoning |
Question 16 |
A | Linux command-line tool |
B | Packet filtering utility |
C | Packet tracing utility |
D | Packet capturing utility |
E | MS Windows command-line tool |
Question 17 |
A | Disable the SSID broadcast on each access point. |
B | Reduce the TX power on each access point. |
C | Enable AP isolation on each access point. |
D | Enable MAC address filtering on each access point. |
Question 18 |
A | Logic bomb |
B | Session hijacking |
C | Trojan horse |
D | Insider threat |
E | Social engineering |
Question 19 |
A | 5GHz |
B | 2.4 GHz |
C | 56MHz |
D | 900MHz |
Question 20 |
A | Attenuation |
B | Open/short |
C | TX/RX reverse |
D | EMI |
Question 21 |
A | 0 |
B | 1 |
C | 6 |
D | 2 |
E | 12 |
Question 22 |
A | TFTP |
B | FTP |
C | SCP |
D | DHCP |
E | Telnet |
Question 23 |
A | RDMA |
B | PPP |
C | Fibre Channel |
D | iSCSI |
Question 24 |
A | Geotagging application |
B | VNC application |
C | Kerberos |
D | Credentials |
Question 25 |
A | Virtual switch |
B | Fiber Channel |
C | vSAN |
D | FCoE |
E | VPC |
Question 26 |
A | APIPA address |
B | Duplicate MAC addresses |
C | Duplicate IP addresses |
D | Loopback address |
Question 27 |
A | BPDU guard |
B | Flood guard |
C | Spanning tree |
D | DHCP snooping |
Question 28 |
Subnet 1: 192.168.1.0/26
Subnet 2: 192.168.1.65/26
Company B uses the following scheme:
Subnet 1: 192.168.1.50/28
A | PAT |
B | DMZ |
C | VLAN |
D | NAT |
Question 29 |
A | Cat 5 |
B | Cat 6 |
C | SMF |
D | RG-6 |
E | Cat 3 |
Question 30 |
A | Document the scene |
B | Secure the area |
C | Implement a chain of custody |
D | Take pictures upon arrival |
Question 31 |
A | Reviewing SLA requirements |
B | Reviewing a baseline report |
C | Reviewing application logs |
D | Reviewing a vulnerability scan |
Question 32 |
A | Reverse the fiber strands of the cable and reconnect them to the server |
B | Replace the server's single-mode fiber cable with multimode fiber |
C | Use a TDR to test both strands of a new replacement cable prior to connecting it to the server |
D | Move the fiber cable to a different port on the switch where both strands function |
Question 33 |
A | LADP |
B | DNS |
C | DHCP |
D | ICMP |
E | HTTP |
Question 34 |
A | risk assessment. |
B | device hardening. |
C | penetration testing. |
D | role separation. |
Question 35 |
A | None of the answers are correct. |
B | TCP |
C | IP |
D | Ethernet |
E | UDP |
Question 36 |
A | Verify the host has physical connectivity and is on the correct VLAN. |
B | Change the IP scope on the DHCP server to a public IP address range. |
C | Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address. |
D | Perform a traceroute command to identify the router that is not functioning. |
Question 37 |
A | WAP power level controls |
B | Protocol analyzer |
C | Network mapper |
D | Logical network diagram |
Question 38 |
A | Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption. |
B | Connect the legacy devices with a PSK while the modern devices should use the more secure EAP. |
C | Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility. |
D | Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices. |
Question 39 |
A | CSR |
B | OCSP |
C | Key escrow |
D | CRL |
Question 40 |
A | 1000BaseT |
B | 1000BaseLX |
C | 10Base5 |
D | 10GBaseT |
E | 1000BaseSX |
F | 10Base2 |
Question 41 |
A | Signal repeater |
B | Domain server |
C | Bridge |
D | Layer 3 switch |
E | Layer 2 switch |
Question 42 |
A | Escalate the ticket to a senior technician |
B | Do nothing |
C | Document the findings and outcomes |
D | Establish a theory of probable cause |
E | Implement the solution |
Question 43 |
A | Session |
B | Data link |
C | Transport |
D | Presentation |
Question 44 |
A | The ports are associated with deprecated services |
B | The ports belong to an active system and are denying requests |
C | The ports do not belong to a live system |
D | The ports replied with a SYN/ACK response |
Question 45 |
A | RJ45 |
B | SFTP |
C | DB-9 |
D | GBIC |
E | SC |
F | LC |
Question 46 |
A | Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end. |
B | Replace the new switch with a hub to ensure Layer1 connectivity on the new network segment. |
C | Move the straight-through Ethernet cable connecting the switches to the first port on both switches. |
D | Add a second cable connecting the switches for redundancy and disabling STP on both switches. |
Question 47 |
A | SaaS |
B | NAS |
C | SAN |
D | IaaS |
Question 48 |
A | SNMP agent |
B | OUI |
C | OID |
D | OTDR |
E | SNMP host |
Question 49 |
A | AUP |
B | NDA |
C | SLA |
D | DLP |
Question 50 |
A | Change management |
B | IDF/MDF documentation |
C | Physical diagram |
D | Performance baseline |
Question 51 |
A | 10.8.0.0/16 |
B | 10.8.0.0/20 |
C | 10.8.0.0/19 |
D | 10.0.0.0/24 |
Question 52 |
A | Generate new SSH keys |
B | Verify the default passwords have been changed |
C | Upgrade to the latest firmware |
D | Review and modify the firewall rules |
Question 53 |
A | Wireless router |
B | DOCSIS modem |
C | Access point |
D | DSL modem |
E | Demarc |
Question 54 |
Which of the following ones should the technician use to place the webserver and which of the following firewall rules should the technician configure?
A | Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the webserver |
B | Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the webserver |
C | Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the webserver |
D | Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the webserver |
Question 55 |
A | The Faraday cage is creating latency on the cellular network. |
B | The Faraday cage prevents access by redirecting signals. |
C | The Faraday cage is creating attenuation of the cellular network. |
D | The Faraday cage is creating interference within the bookstore. |
Question 56 |
A | FTPS |
B | SSL |
C | SFTP |
D | TFTP |
E | Telnet |
Question 57 |
A | Transmits data in an unencrypted form. |
B | It cannot be used on modern Windows computers. |
C | Provides username & password authentication. |
D | Encrypts network connection. |
E | Enables remote login and command execution. |
F | It does not provide authentication. |
Question 58 |
A | 192.168.12.97 to 255.255.255.224 |
B | 192.168.12.97 to 255.255.255.192 |
C | 192.168.12.97 to 255.255.255.240 |
D | 192.168.12.97 to 255.255.255.248 |
Question 59 |
A | QoS tags |
B | Jumbo frames |
C | Port aggregation |
D | iSCSI |
Question 60 |
A | Require PEAP for authentication to the wireless network |
B | Require a pre-shared key for authentication to the wireless network |
C | Use MAC filtering for authorization to the wireless network |
D | Implement a Faraday cage within the building premises |
Question 61 |
A | Change the switch |
B | Modify the speed and duplex |
C | Plug in to another port |
D | Replace the NIC |
Question 62 |
A | DHCP reservation for the laptops MACs |
B | Additional lease time for the laptop computers |
C | IP helper relay system for configuration hops |
D | CNAME record in the users dynamic DNS accounts |
Question 63 |
User A
IP address: 192.168.1.121
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
User B
IP address: 192.168.1.125
Subnet mask: 255.255.248.0
Default gateway: 192.168.1.1
A | There is no problem identifiable by the values given. |
B | The default gateway should have different values |
C | The subnet values should be the same |
D | User B's IP address is not a loopback address |
Question 64 |
A | Transport |
B | Physical |
C | Network |
D | Application |
Question 65 |
A | Bidirectional SFP |
B | 1000BaseLX SFP |
C | Duplex SFP+ |
D | Duplex GBIC |
Question 66 |
A | Synchronization of clocks over a computer network |
B | Monitoring of network-attached devices |
C | Retrieving contents of an Internet page from a web server |
D | Allocation of IP addresses |
Question 67 |
A | -a |
B | eth_addr |
C | /all |
D | -i address |
Question 68 |
A | SSL |
B | SNMP |
C | CHAP |
D | FTP |
E | SSH |
Question 69 |
A | LDAP |
B | Telnet |
C | TFTP |
D | Samba |
Question 70 |
A | public/private networks |
B | network devices |
C | packet flow |
D | traffic-routing protocols |
Question 71 |
A | MITM |
B | DDoS |
C | IDS firewall |
D | DNS sinkhole |
E | DDoS |
Question 72 |
A | Switch |
B | Load balancer |
C | Proxy server |
D | Router |
Question 73 |
A | EAP-TLS |
B | AES-CCMP |
C | WPA-PSK |
D | WEP-TKIP |
Question 74 |
A | Spoofing attacks originate from a single host |
B | DDoS attacks target multiple networks |
C | DDoS attacks are launched from multiple hosts |
D | Spoofing attacks require physical presence |
Question 75 |
A | 192.168.25.0/24 |
B | 172.18.0.0/23 |
C | 10.233.2.0/23 |
D | 172.16.0.0/22 |
E | 10.5.4.0/22 |
Question 76 |
A | TDR |
B | Loopback adapter |
C | OTDR |
D | Spectrum analyzer |
Question 77 |
A | Video cameras |
B | Swipe badges |
C | Sign-in sheets |
D | Motion sensors |
Question 78 |
A | DHCP |
B | DNS |
C | HTTP |
D | ICMP |
E | NetBIOS |
Question 79 |
A | It provides a faster port to all servers |
B | It provides multiple collision domains on one switchport |
C | It segments broadcast domains in the network infrastructure |
D | It provides multiple broadcast domains within a single collision domain |
Question 80 |
A | NTP |
B | ICMP |
C | SIP |
D | H.323 |
E | SMB |
F | RTP |
Question 81 |
A | Use an HTTP server to share the file. |
B | Use an FTP server and provide the file hash. |
C | Use a TFTP server and UDP protocol. |
D | Use a modem and dial-up connection. |
Question 82 |
A | Update firmware |
B | Generate new keys |
C | Change default credentials |
D | Perform file hashing |
Question 83 |
A | There is one collision domain for this network. |
B | There are 3 collision domains, one for each switch-to-switch connection. |
C | There are 9 collision domains, one for each half-duplex connection. |
D | There are 12 collision domains, one for each switch connection. |
Question 84 |
A | Change management |
B | Network configuration |
C | Rack diagram |
D | Network diagram |
Question 85 |
A | 1022 |
B | 510 |
C | 1024 |
D | 2046 |
E | 512 |
F | 2048 |
Question 86 |
A | Question users |
B | Test solutions |
C | Document findings |
D | Duplicate the problem |
E | Establish a theory of probable cause |
F | Implement preventive measures |
Question 87 |
A | SSH over IPsec client-to-site VPN |
B | Telnet over PSTN |
C | HTTP over WPA2-TKIP WiFi |
D | RDP over SSLv2 HTTPS terminal services gateway |
Question 88 |
A | Spanning tree |
B | Port aggregation |
C | Port mirroring |
D | Trunking |
Question 89 |
A | Duplicate IP address |
B | TX/RX reverse |
C | VLAN mismatch |
D | Duplex/Speed mismatch |
Question 90 |
A | Ring |
B | Bus |
C | Partial mesh |
D | Ad hoc |
Question 91 |
A | Multimeter |
B | Spectrum analyzer |
C | OTDR |
D | Packet sniffer |
Question 92 |
A | WPA2 |
B | SSL certificate |
C | EAP-TLS |
D | Captive portal |
E | MAC filtering |
Question 93 |
A | Accessing a DSL router via the console port. |
B | Implementing a modem on the AUX port to access a network device. |
C | Using a secure SSH connection over the WAN link to connect to a server. |
D | Telnet into the router over a secure VPN. |
Question 94 |
IP: 192.168.1.100
Mask: 255.255.255.0
Router: 192.168.1.1
A | Interference |
B | Wrong SSID |
C | Channel overlap |
D | Security type mismatch |
Question 95 |
A | Disable FTP service on the server |
B | Disable Telnet service on the server |
C | Disable the SMTP service on the server |
D | Disable DHCP service on the server |
Question 96 |
“The Security certificate presented by this website was not trusted by trusted certificate authority.”
Sanuja has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error. Which of the following is the MOST likely cause of this error?
A | The web server is missing an intermediate certificate. |
B | The SSL certificate has expired. |
C | The website is missing an HTTPS certificate. |
D | TLS is not enabled in the browser. |
Question 97 |
A | Because SCP is not a secure service |
B | Because FTP is not a secure service |
C | Because secure protocols would reject malicious packets |
D | Because a secure firewall will protect the device |
Question 98 |
A | Motion detectors |
B | Biometric scanners |
C | Door locks |
D | Video surveillance |
Question 99 |
A | Adding a router prevents computers on one LAN from communicating with computers on another LAN. |
B | Adding a router diverts traffic to an alternate path through the network. |
C | Adding a router reduces the amount of unicast traffic on each of the two LANs. |
D | Adding a router reduces the amount of broadcast traffic on each of the two LANs. |
Question 100 |
A | The cable is a Cat 5 cable |
B | The cable is damaged |
C | The cable is rollover cable |
D | The cable has bent pins |
E | The cable is a crossover cable |
Question 101 |
A | Replacing the management software's self-signed certificate with a valid certificate |
B | Changing the management software's default credentials |
C | Changing the management software's default port |
D | Disabling unnecessary services from the server and management software |
Question 102 |
route add 0.0.0.0 mask 0.0.0.0 192.169.1.222 metric 1
A | The technician is clearing the route table. |
B | The technician is adding a static IP address. |
C | The technician is clearing the subnet mas setting. |
D | The technician is setting the default gateway. |
Question 103 |
A | Ping table |
B | TTL |
C | IP helper |
D | DNS record type |
E | DHCP lease time |
Question 104 |
A | DNS |
B | SQL |
C | DHCP |
D | TCP/IP |
Question 105 |
A | Remote access policies |
B | Incident response policy |
C | Data loss prevention |
D | Licensing restrictions |
E | International export controls |
Question 106 |
A | An IoT device is causing a DoS attack on the wireless network |
B | There is additional data being transferred over the wireless network |
C | The utility company throttles power during peak hours |
D | There is interference with the smart reader |
Question 107 |
A | Cable modem |
B | DNS server |
C | Layer 2 switch |
D | SOHO router |
Question 108 |
A | Activate MAC address filtering. |
B | Change the WiFi password. |
C | Implement WEP authentication. |
D | Disable the SSID broadcast. |
Question 109 |
A | Damaged cable |
B | Attenuation |
C | Incorrect pin-out |
D | Switch configuration |
Question 110 |
A | The use of autonomous APs with a load balancer |
B | The use of lightweight APs with a load balancer |
C | The use of autonomous APs with a wireless controller |
D | The use of lightweight APs with a wireless controller |
Question 111 |
-WLAN architecture supporting speeds in excess of 150 Mbps
-Client less remote network access
-Port-based network access control
A | 802.11g, MS-CHAP, 802.16 |
B | 802.11a, IPSec VPN, 802.1x |
C | 802.11ac, MPLS, 802.3 |
D | 802.11b, PPTP,802.1x |
E | 802.11n, SSL-VPN, 802.1x |
Question 112 |
A | Create a port location diagram |
B | Create a network baseline |
C | Create an inventory database |
D | Create a rack diagram |
Question 113 |
A | Spam |
B | Ransomware |
C | Man-in-the-middle |
D | Phishing |
Question 114 |
A | NTP |
B | SMB |
C | SSL |
D | SNMP |
E | RDP |
Question 115 |
A | 2001:0:d58:0:0:95:7565:1 |
B | 2001::d58::95:7565:1 |
C | 2001:0:d58::95:7565:1 |
D | 2001:0:0d58::95:7565:1 |
Question 116 |
A | SSH |
B | LDAP |
C | SFTP |
D | TLS |
Question 117 |
A | Document the findings |
B | Determine the symptoms |
C | Establish a plan of action |
D | Gather information |
Question 118 |
A | permit tcp any any eq 110 |
B | permit udp any any eq 25 |
C | permit udp any any eq 53 |
D | permit tcp any any eq 8080 |
E | permit tcp any any eq 20 |
F | permit udp any any eq 68 |
Question 119 |
A | Mesh |
B | Star |
C | Ring |
D | Bus |
Question 120 |
A | MAC reservation |
B | IP helper |
C | Lease time |
D | DHCP timer |
E | Pool |
Question 121 |
A | WP2-PSK |
B | EAP-TLS |
C | Captive portal |
D | PEAP |
Question 122 |
A | Star |
B | Mesh |
C | Ring |
D | Ad hoc |
Question 123 |
A | Session hijacking |
B | MAC spoofing |
C | VLAN hopping |
D | Bluesnarfing |
E | Man-in-the-middle |
Question 124 |
A | DLP |
B | Offboarding |
C | Remote access |
D | AUP |
E | Incident response |
Question 125 |
A | TX/RX reverse |
B | Bent pins |
C | Crosstalk |
D | Damaged cables |
E | VLAN mismatch |
F | Duplex mismatch |
Question 126 |
A | Channel 6 |
B | Channel 7 |
C | Channel 10 |
D | Channel 9 |
Question 127 |
A | Certificate |
B | NAC |
C | SSO |
D | RADIUS |
E | Kerberos |
F | MFA |
Question 128 |
A | The reverse DNS entry is pointing to a different host |
B | The server IP address is incorrectly configured |
C | There is no reverse DNS entry for this host |
D | The DNS lookup entry is incorrectly configured |
Question 129 |
A | There is one collision domain and one broadcast domain. |
B | There are seven collision domains and three broadcast
domains. |
C | There are three collision domains and one broadcast domain. |
D | There are three collision domains and three broadcast
domains. |
E | There are nine collision domains and three broadcast
domains. |
Question 130 |
A | Port 443 |
B | Port 110 |
C | Port 22 |
D | Port 80 |
E | Port 110 |
Question 131 |
A | SNR |
B | BRI |
C | RFI |
D | SVC |
Question 132 |
A | The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours. |
B | The LAN and WLAN should be configured in separate zones with a firewall in between. |
C | The LAN and WLAN should be configured in the DMZ so traffic is denied automatically. |
D | The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules. |
Question 133 |
A | gdm |
B | sanuja |
C | top |
D | systemd |
E | root |
Question 134 |
A | Change management |
B | Inventory report |
C | Labeling report |
D | Network diagrams |
Question 135 |
A | Fiber-optic cabling |
B | UTP cabling |
C | STP cabling |
D | Coaxial cabling |
Question 136 |
A | Packets |
B | Datagrams |
C | Frames |
D | Segments |
Question 137 |
A | Add a redundant power supply to the switch |
B | Install a power converter for the switch |
C | Implement stacking on the switches in the rack |
D | Add a second UPS into the rack |
Question 138 |
A | Implement a DMZ for all external services. |
B | Implement root guard on all switches. |
C | Create a honeypot to attract attackers. |
D | Create a VLAN for all unused switchports. |
Question 139 |
A | FCoE |
B | OC3 |
C | InfiniBand |
D | iSCSI |
Question 140 |
A | Geofencing |
B | Open wireless |
C | MAC filtering |
D | Pre-shared key |
Question 141 |
A | 3DES encryption |
B | Digital signatures |
C | SSL certificate |
D | Digital signatures |
Question 142 |
A | DHCP scope availability |
B | Server-based firewall configuration issue |
C | VLAN routing |
D | Patch cable type |
Question 143 |
A | The finance department should have 172.16.49.127 as a broadcast address. |
B | The legal department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
C | The marketing department should have usable IPs ranging from 172.16.49.129 to 172.16.49.190. |
D | The R&D department should receive a /27 network. |
E | The marketing department should receive a /25 network. |
F | The R&D department should have 172.16.49.207 as a broadcast address. |
G | The legal department should have a first usable IP address of 172.16.49.190. |
H | The R&D department should have a last usable IP address of 172.16.49.190. |
Question 144 |
A | Switch |
B | Bridge |
C | Router |
D | Hub |
Question 145 |
A | Backs up files with the archive bit set but does not clear the bit. |
B | Backs up all files and sets the archive bit. |
C | Backs up files with a date earlier than today’s date with a clear archive bit. |
D | Backs up files with the creation or modified date as the current date. |
Question 146 |
A | EAP-PEAP |
B | SSH in tunnel mode |
C | RDP set to console connection |
D | SFTP |
Question 147 |
A | MD5 |
B | SHA |
C | authpriv |
D | Authentication passphrase |
Question 148 |
A | One router connected to one 24-port switch configured with three VLANS: one for the manager's computers and printer, one for the other computers and printer, and one for the VoIP phones |
B | Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the manager's desktop computers, VoIP phones, and printer |
C | One router connected to one 24-port switch configured with two VLANS: one for the manager's computers, VoIP phones, and printer, and one for the other computers, VoIP phones, and printer |
D | One router connected to one 12-port switch configured for the manager's computers, phones, and printer, and one 12-port switch configured for the other computers, VoIP phones, and printer |
Question 149 |
A | Redundant circuits |
B | Multiple NAT |
C | NIC teaming |
D | Load balancing |
E | Clustering |
Question 150 |
A | Server room |
B | Equipment closet |
C | Demarcation point |
D | Intermediate distribution frame |
Question 151 |
A | Routing loop |
B | Route redistribution |
C | Routing table |
D | DHCP |
E | Dynamic routes |
Question 152 |
A | Cat 6 |
B | Cat 6a |
C | Cat 5e |
D | Cat 7 |
Question 153 |
A | Cable tester |
B | Tone generator |
C | Loopback adapter |
D | Multimeter |
Question 154 |
A | ASIC |
B | SPF |
C | MDI-X |
D | GBIC |
E | SFP |
Question 155 |
A | Session hijacking |
B | Spoofing attack |
C | MITM attack |
D | Wardriving |
E | DDoS attack |
Question 156 |
A | Install a repeater to boost the signal to its destination |
B | Upgrade the cable from Cat 5 to Cat 5e or Cat 6 |
C | Set the AP to half-duplex to compensate for signal loss |
D | Replace the UTP cable with plenum cable |
Question 157 |
A | SIP |
B | STP |
C | DSCP |
D | VLANs |
Question 158 |
A | nslookup |
B | dig |
C | arp |
D | ipconfig |
Question 159 |
A | Analog modem |
B | CSMA |
C | Broadband |
D | Baseband |
Question 160 |
A | TACACS+ |
B | Captive portal |
C | RADIUS |
D | Single sign-on |
Question 161 |
A | Point-to-point |
B | Site-to-site |
C | Point-to-multipoint |
D | Client-to-site |
Question 162 |
A | Using a smart card and RSA token |
B | Enforcing a stronger password policy and using a hand geometry scan |
C | Adding a fingerprint reader to each workstation and providing a RSA authentication token |
D | Adding a fingerprint reader and retina scanner |
Question 163 |
A | Snapshots |
B | Incremental |
C | Replica |
D | Differential |
Question 164 |
A | AUP |
B | SLA |
C | MOU |
D | NDA |
Question 165 |
A | Upgrade the firmware. |
B | Disable unused ports. |
C | Reset the two-factor token. |
D | Disable virtual ports. |
Question 166 |
A | PTP |
B | IPSec |
C | SSL VPN |
D | PPTP |
Question 167 |
A | 802.11n |
B | 802.11b |
C | 802.11a |
D | 802.11ac |
Question 168 |
A | pathping |
B | nslookup |
C | nbtstat |
D | netstat |
Question 169 |
A | Spectrum analyzer |
B | Packet sniffer |
C | netstat |
D | nslookup |
Question 170 |
A | Incident response |
B | Asset disposal |
C | Acceptable use |
D | Data loss prevention |
Question 171 |
A | Round robin |
B | Jumbo frames |
C | Clustering |
D | TCP offloading |
E | Load balancer |
Question 172 |
A | SRV |
B | CNAME |
C | MX |
D | AAAA |
Question 173 |
A | 12 |
B | 3 |
C | 14 |
D | 15 |
E | 13 |
Question 174 |
Which of the following would MOST likely allow the network drives to be accessed?
A | Check the wireless DHCP configuration |
B | Update the WLAN adapter driver |
C | Disable the LAN adapter |
D | Disable the WLAN adapter |
Question 175 |
A | dig |
B | arp |
C | nmap |
D | tcpdump |
Question 176 |
A | Reverse the wires leading to pins 1 and 2 |
B | Reverse the wires leading to pins 1 and 3 |
C | Reverse the wires leading to pins 2 and 3 |
D | Reverse the wires leading to pins 2 and 4 |
Question 177 |
A | Host-based firewall settings |
B | TACAS+ server time |
C | Server IP address |
D | DNS SRV record |
Question 178 |
A | ipconfig /renew |
B | ipconfig /release |
C | ipconfig /all |
D | ipconfig /flushdns |
Question 179 |
A | One of the wireless access points is on the wrong frequency |
B | Distance limitations are preventing the students from connecting |
C | The students are using more than one wireless device port seat |
D | The students are attempting to connect 802.11g devices |
Question 180 |
A | The technician should check the internal diagnostics on all the phones to look for a common thread |
B | The technician should reset all the phones and deprovision information from the provider |
C | The technician should run ping tests on the Internet line to monitor for packet loss and latency |
D | The technician should use a packet tracer to see if the traffic is getting out of the network |
Question 181 |
A | Multilayer switch |
B | Bridge |
C | Switch |
D | Next-generation firewall |
Question 182 |
A | IDF |
B | DMZ |
C | Demarc |
D | Data tier |
Question 183 |
A | Loop protection is enabled on the root port of a switch. |
B | BPDUs entering the root bridge are ignored. |
C | Broadcast storms entering from a root port are blocked. |
D | The STP root bridge cannot be changed. |
Question 184 |
Which of the following devices is causing the issue?
A | Switch 1 |
B | Switch 2 |
C | Firewall |
D | Router |
Question 185 |
A | 802.11ac |
B | 802.1q |
C | 802.1X |
D | 802.3at |
E | 802.3af |
Question 186 |
A | Port 161 |
B | Port 25 |
C | Port 69 |
D | Port 123 |
Question 187 |
A | Plenum |
B | PVC |
C | Cat 7 |
D | Single-mode |
Question 188 |
A | Frame relay |
B | Broadband cable |
C | MPLS |
D | PRI |
E | ISDN |
Question 189 |
A | Dynamic DNS |
B | Proxy service |
C | Content filtering |
D | Intrusion detection |
Question 190 |
A | Transceiver mismatch |
B | Jitter |
C | Open/short on the cable |
D | Crosstalk |
Question 191 |
A | Wireless access point |
B | Media converter |
C | Network switch |
D | Firewall |
E | Router |
Question 192 |
A | Ports 56 and 57 |
B | Ports 67 and 68 |
C | Ports 80 and 443 |
D | Port 123 and 8080 |
E | Ports 20 and 21 |
Question 193 |
A | Duplex/speed mismatch |
B | ACL misconfiguration |
C | Bad port |
D | Crosstalk |
Question 194 |
A | Phishing |
B | MITM |
C | OCSP stapling |
D | Evil twin |
E | DDoS |
Question 195 |
A | Rogue DHCP server |
B | Misconfigured VLSM |
C | Exhausted dynamic scope |
D | Expired IP address |
Question 196 |
A | Wireless controller |
B | VoIP PBX |
C | Content filter |
D | RADIUS server |
Question 197 |
A | 5 collision domains, 48 segments |
B | 240 usable IP addresses |
C | 48 collision domains, 5 broadcast domains |
D | 48 networks, 5 segments |
E | 240 private networks |
Question 198 |
A | OTDR |
B | Multimeter |
C | Protocol analyzer |
D | Spectrum analyzer |
E | Tone generator |
Question 199 |
A | Rack location |
B | Hostname |
C | Room number |
D | Media type |
Question 200 |
A | Proximity reader |
B | Biometric device |
C | Video camera |
D | Identification card |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.