← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set II
CompTIA Network+ N10-007 - Set III
Congratulations - you have completed CompTIA Network+ N10-007 - Set III.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Absorption |
B | Frequency mismatch |
C | Channel overlap |
D | Reflection |
Question 2 |
A | Port scanning |
B | Log scanning |
C | Baseline review |
D | Packet capturing |
Question 3 |
A | PPTP |
B | L2TP |
C | FTP |
D | CARP |
E | ISAKMP |
Question 4 |
A | TCP port 22 |
B | UDP port 69 |
C | UDP port 53 |
D | TCP port 25 |
E | UDP port 22 |
Question 5 |
A | Soft spoken |
B | HTTPS server |
C | Shared secret |
D | Private certificate |
Question 6 |
A | Data link |
B | Network |
C | Physical |
D | Transport |
E | Session |
Question 7 |
A | Packet sniffer |
B | IDS |
C | IPS |
D | Port scan |
Question 8 |
A | Wireless firewall |
B | Wireless hub |
C | Wireless access point |
D | Wireless bridge |
Question 9 |
A | Install antivirus software and set an ACL on the servers |
B | Create a DMZ for public servers and secure a segment for the internal network |
C | Create a VLAN for the unused ports and create a honeyspot on the VLAN |
D | Install a BPDU guard on switchports and enable STP |
Question 10 |
A | DHCP snooping |
B | Spanning tree |
C | Flood guard |
D | BPDU guard |
Question 11 |
A | 802.11b |
B | 802.11ac |
C | Z-Wave |
D | 802.11n |
E | 802.11g |
Question 12 |
A | WPA |
B | 802.1x |
C | MIMO |
D | IPsec |
E | FIFO |
Question 13 |
A | Attenuation |
B | Interference |
C | Latency |
D | Packet loss |
E | Signal-to-noise ratio |
F | Reflection |
Question 14 |
A | Buffer overflow attack |
B | Smurf attack |
C | Social engineering |
D | MITM |
E | NMAP |
Question 15 |
A | Cable tester |
B | Punch down tool |
C | OTDR |
D | Environmental monitor |
Question 16 |
A | WEP’s IV is too small |
B | WEP uses plain text |
C | WEP uses RC4 which is easily accessible and not secure |
D | WEP is not well supported |
Question 17 |
A | LC |
B | MT-RJ |
C | ST |
D | SC |
Question 18 |
A | TLS |
B | HTTPS |
C | Split tunneling |
D | Remote file access |
Question 19 |
A | SNMP |
B | L2TP |
C | QoS |
D | SSH |
Question 20 |
A | Fingerprint + retina scan |
B | Key fob + ID card |
C | Smart card + PIN |
D | Username + password |
Question 21 |
A | Hybrid |
B | Point-to-multipoint |
C | Point-to-point |
D | Peer-to-peer |
Question 22 |
SSID: SANUJA-WiFi
Signal: 5%
SNR: 2
A | Incorrect antenna type |
B | Overcapacity |
C | Latency |
D | Channel overlap |
Question 23 |
Cable | Test | Result |
---|---|---|
1.2 | Open | 7ft |
3.6 | Short | 7ft |
4.5 | Open | 7ft |
7.8 | Open | 7ft |
A | Multimeter |
B | Cable Certifier |
C | Toner Probe |
D | Punch Down Tool |
E | OTDR |
F | Crimper |
G | Protocol Analyzer |
Question 24 |
A | MTU size greater than 10000 |
B | MTU size greater than 12000 |
C | Commonly used on SAN |
D | MTU size greater than 1500 |
E | Commonly used on IaaS |
Question 25 |
A | SMTP |
B | POP3 |
C | LDAP |
D | NTP |
E | IMAP |
Question 26 |
IP address: 172.16.204.12
Subnet Mask: 255.255.0.0
Default Gateway: 172.15.204.254
DNS address: 172.16.204.1
Broadcast address: 172.16.255.255
A | Broadcast address |
B | IP address |
C | Subnet mask |
D | DNS address |
E | Default gateway |
Question 27 |
A | Public IP |
B | Virtual IP |
C | Reserved IP |
D | Loopback IP |
Question 28 |
A | CHAP |
B | Digital signatures |
C | MAC filtering |
D | MS-CHAP |
Question 29 |
A | Distance vector |
B | Link state |
C | Static |
D | Hybrid |
Question 30 |
A | OSPF |
B | EIGRP |
C | BGP |
D | RIP |
Question 31 |
A | Some of the servers are configured to use different gateways |
B | New servers are being provisioned in the cloud |
C | Those servers have host-based firewalls |
D | Part of the subnet is configured to use different VLANs |
Question 32 |
A | GBIC |
B | MT-RJ |
C | F-type |
D | BNC |
Question 33 |
A | lsenv |
B | getargs |
C | ls |
D | env |
E | lsshell |
Question 34 |
A | IDF/MDF documentation |
B | Network performance baseline |
C | Rack diagram |
D | Logical and physical diagrams |
Question 35 |
A | Social engineering |
B | Insider threat |
C | Man-in-the-middle |
D | Logic bomb |
Question 36 |
A | Incorrect VLAN assignment on the router |
B | Incorrect speed/duplex setting on the alarm device |
C | A missing route on the network routers |
D | A missing route on the alarm device |
Question 37 |
A | NDA |
B | AUP |
C | SOP |
D | SLA |
Question 38 |
A | IPsec |
B | MAC reservations |
C | EUI-64 |
D | IPv4 to IPv6 tunnel |
E | APIPA |
Question 39 |
A | Enable access point antenna isolation |
B | Use the 40MHz channels in the 2.4GHz band |
C | Limit the clients to 802.11g compatible laptops |
D | Enable wireless multimedia (WMM) for QoS |
Question 40 |
A | Transpose the fiber pairs |
B | Fall back to the old switch |
C | Replace SFP with a new one |
D | Replace multimode with single-mode cable |
Question 41 |
A | Packet sniffer |
B | DCCP |
C | SNMP |
D | Simple Network Management Protocol (SNMP) |
E | SCTP |
Question 42 |
A | MS-CHAP |
B | Kerberos |
C | CHAP |
D | NTLM |
Question 43 |
A | Attenuation |
B | Distance |
C | Reflection |
D | Refraction |
E | Absorption |
Question 44 |
A | 1, 6, 11 |
B | 2, 5, 10 |
C | 3, 13, 23 |
D | 4, 8, 16 |
Question 45 |
A | The WAP antenna is damaged |
B | The LWAPP image is installed on the WAP |
C | The WAP transmitter light is dim |
D | The terminal emulation software is misconfigured |
Question 46 |
A | Used to verify functionality after a NIC is installed. |
B | Used to determine which port a CAT6 cable is connected. |
C | Used to terminate a cable at a 110 block. |
D | Used to verify known good patch cables. |
E | Used to correct open short on a cable. |
Question 47 |
A | NTP |
B | ACL |
C | SDN |
D | Traffic shaping |
E | NAC |
Question 48 |
A | BYOD policy |
B | DLP policy |
C | Incident response policy |
D | Remote access policy |
Question 49 |
A | PC to PC |
B | Router to switch |
C | Switch to AP |
D | Router to modem |
E | PC to switch |
Question 50 |
A | SC |
B | ST |
C | MT-RJ |
D | LC |
Question 51 |
A | Turn off SSID broadcasting for the executive’s access point |
B | Replace the 802.11n access point in the office with an 802.11a access point |
C | Turn off as many lights in the executive’s office as possible to reduce interference |
D | Change the channel on the access point to channel 11 |
Question 52 |
A | IPv6 |
B | ICMP |
C | UDP |
D | EIGRP |
Question 53 |
A | Distance limitations |
B | Security type mismatch |
C | Latency |
D | Absorption |
Question 54 |
A | PPP |
B | Frame relay |
C | MPLS |
D | ATM |
Question 55 |
A | nslookup |
B | tracert |
C | ping |
D | route |
E | netstat |
F | pathping |
G | tcpdump |
Question 56 |
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40
Which is true about the above configuration?
A | Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. |
B | An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
C | An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
D | Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client. |
Question 57 |
A | The channels are overlapping with other wireless networks and should be changed. |
B | The users have incompatible wireless network cards and should upgrade. |
C | The SSIDs are incompatible and should be renamed. |
D | The default idle period for logoff is too short and should be changed to a longer limit. |
Question 58 |
A | CSMA/CA |
B | OSPF |
C | CSMA/CD |
D | MPLS |
Question 59 |
A | Client-to-site VPN |
B | Router ACL |
C | Out-of-band management |
D | HTTPS management URL |
Question 60 |
A | Change management records |
B | Logical diagrams |
C | Inventory management |
D | Network log files |
Question 61 |
A | Multicast |
B | Unicast |
C | Subnetting |
D | Broadcast |
Question 62 |
A | Bus |
B | Hub and spoke |
C | Ring |
D | Full mesh |
E | Partial mesh |
Question 63 |
A | Shared secret keys |
B | Key rotation |
C | Strong RC4 encryption |
D | AES encryption |
E | MAC filtering |
Question 64 |
A | Bridge |
B | Firewall |
C | Multiplayer switch |
D | Router |
Question 65 |
A | Layer 2 |
B | Layer 7 |
C | Layer 1 |
D | Layer 6 |
E | Layer 5 |
F | Layer 3 |
G | Layer 4 |
Question 66 |
Department-VLAN#-Subnet used
Marketing-20-192.168.20.0/28
Customer Service-25-192.168.20.64/28
Finance-30-192.168.30.0/28
WHSE-35-192.168.30.16/28
Sales-40-192.168.3.16/28
The users experiencing this issue need to be added to which of the following VLANs?
A | 30 |
B | 40 |
C | 35 |
D | 25 |
Question 67 |
A | Excessive bandwidth usage |
B | STP convergence |
C | Broadcast storm |
D | Power failure |
Question 68 |
A | Behavior-based IPS |
B | DMZ |
C | Signature-based IPS |
D | Honeypots |
E | WPA2 |
Question 69 |
A | Learning |
B | Disabled |
C | Forwarding |
D | Blocking |
Question 70 |
A | LC |
B | ST |
C | MT-RJ |
D | SC |
Question 71 |
A | PKI should be turned off |
B | WPA should be enabled |
C | WAPs are transmitting on same channel |
D | WAP SSIDs are matching |
Question 72 |
A | CSU/DSU |
B | Switch |
C | MDF |
D | IDF |
Question 73 |
A | Cold site |
B | Incremental backup |
C | Warm site |
D | Full backup |
E | Hot site |
F | Differential backup |
Question 74 |
A | Content filtering on the wireless access point |
B | Block traffic from the wireless access point |
C | Allow traffic from the wireless access point |
D | Packet filtering on the wireless access point |
Question 75 |
A | IaaS |
B | CASB |
C | PaaS |
D | SaaS |
Question 76 |
A | 192.1.0.124/30 |
B | 10.10.50.0/30 |
C | 172.16.20.0/30 |
D | 192.168.0.192/24 |
E | 192.170.10.0/24 |
Question 77 |
A | PVC Cat 5 |
B | Plenum Cat 5e |
C | Plenum Cat 6a |
D | PVC Cat 7 |
Question 78 |
A | Out-of-band modem |
B | ACL allowing only HTTP |
C | Out-of-band console router |
D | ACL allowing only Telnet |
Question 79 |
A | DS3 |
B | OC3 |
C | T3 |
D | E3 |
Question 80 |
A | VTP |
B | CDP |
C | IPSec |
D | SNMPv3 |
Question 81 |
A | AA:CE:58:FD:90:08 |
B | 56:AD:BX:89:55:54 |
C | 44:98:3E:F8:33:23 |
D | 94:9E:FE:EE:8C:DF |
Question 82 |
A | Bridge |
B | Firewall |
C | Router |
D | Managed switch |
E | IDS |
Question 83 |
A | Hub |
B | Modem |
C | Router |
D | Switch |
Question 84 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Each department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where should the router be palced? Click on the image to enlarge.
A | C6 |
B | C5 |
C | C7 |
D | C8 |
E | C10 |
Question 85 |
A | 32 bits |
B | 256 bits |
C | 64 bits |
D | 128 bits |
Question 86 |
A | STP blocking |
B | MTU mismatch |
C | IP addresses |
D | Switching loop |
Question 87 |
A | Add a router and enable OSPF. |
B | Add a layer 3 switch and create a VLAN. |
C | Add a firewall and implement proper ACL. |
D | Add a bridge between two switches. |
Question 88 |
A | Fiber type mismatch |
B | Fiber cable mismatch |
C | Bad fiber switch |
D | Bend radius exceeded |
Question 89 |
A | Certificate |
B | Time |
C | Token |
D | Ticket |
Question 90 |
A | TFTP |
B | SNMP |
C | DTLS |
D | Datagram Transport Layer Security (DTLS) |
E | DNS |
Question 91 |
A | IPS |
B | IDS |
C | Network tap |
D | Router |
E | Switch |
F | Hub |
Question 92 |
A | Rollback plan |
B | Baseline report |
C | Vulnerability report |
D | Business continuity plan |
Question 93 |
A | Coaxial |
B | Multimode |
C | Serial |
D | UTP |
Question 94 |
A | Environmental monitor |
B | Placement map |
C | Syslog |
D | Network map |
Question 95 |
A | SMTP |
B | RDP |
C | HTTP |
D | NTP |
Question 96 |
A | The technician should configure a virtual switch. |
B | The technician should set up individual routes between the machines. |
C | The technician should add a route in each virtual machine to the default gateway. |
D | The technician should connect the machine to its own separate switch. |
Question 97 |
A | SRV |
B | MX |
C | PTR |
D | CNAME |
E | NS |
Question 98 |
A | WPA |
B | WAF |
C | TPM |
D | DLP |
E | IDS |
Question 99 |
A | Rogue access points |
B | DoS attacks |
C | Phishing |
D | Man-in-the-middle attacks |
Question 100 |
A | MT-RJ |
B | SC |
C | ST |
D | LC |
Question 101 |
A | Remove unnecessary testing accounts. |
B | Upgrade the firmware on the firewall. |
C | Disable the HTTP port in the host firewall. |
D | Issue a new self-signed certificate. |
E | Generate new SSH host keys. |
Question 102 |
A | RIP |
B | OSPF |
C | BGP |
D | EIGRP |
Question 103 |
A | Biometric locks |
B | Smart card reader |
C | Asset tracking tags |
D | Motion detection |
Question 104 |
A | Evil twin |
B | Reflective |
C | Ransomware |
D | ARP poisoning |
E | Man-in-the-middle |
F | DNS poisoning |
Question 105 |
A | White/Blue, Orange, White/Green, Blue, White/Orange, Green, White/Brown, Brown |
B | White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown |
C | White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown. Brown |
D | White/Orange, Orange, White/Brown, Blue, White/Blue, Green, White/Green, Brown |
E | White/Green, Green, White/Blue, Blue, White/Orange, Orange, White/Brown. Brown |
Question 106 |
A | Cell size increases |
B | Attenuation increases |
C | Throughput decreases |
D | Connection speeds decrease |
Question 107 |
A | The network administrator should install and configure a DMZ server |
B | The network administrator should install and configure a syslog server |
C | The network administrator should install and configure a traffic analysis server |
D | The network administrator should install and configure a network sniffer |
Question 108 |
A | CAT6a |
B | CAT3 |
C | CAT5e |
D | Fiber |
Question 109 |
A | route |
B | nslookup |
C | pathping |
D | nmap |
Question 110 |
A | Bus |
B | Mesh |
C | Ring |
D | Star |
Question 111 |
A | Ping |
B | Protocol analyzer |
C | Baseline analyzer |
D | Nessus |
Question 112 |
A | Channel bonding |
B | MIMO |
C | Increase the signal |
D | Disable SSID |
Question 113 |
A | FEEF:/12 |
B | FF00::/8 |
C | 2FFE::/16 |
D | FE80::/10 |
Question 114 |
A | 192.168.2.1 |
B | 3ffe:1900:4545:3:200:f8ff:fe21:67cf |
C | 00:f3:82:99:a2:b8 |
D | 61.23.168.192.in-addr.arpa |
Question 115 |
A | The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router |
B | The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem |
C | The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem |
D | The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router |
Question 116 |
A | Omnidirectional |
B | Yagi |
C | Unidirectional |
D | Parabolic |
Question 117 |
A | ARP protection |
B | Spanning tree |
C | BPDU guard |
D | DHCP snooping |
Question 118 |
A | DHCP exhaustion |
B | Channel overlapping |
C | Overcapacity |
D | Interference |
Question 119 |
A | Change management log |
B | Physical diagram |
C | Network baseline |
D | Logical diagram |
Question 120 |
A | Star |
B | Ring |
C | Bus |
D | WLAN |
Question 121 |
A | Install a UPS |
B | Install a new electrical circuit |
C | Replace the switch uplink cable |
D | Install a new switch |
E | Install a power conditioner |
Question 122 |
A | A trap message is sent via UDP to the monitoring workstation |
B | The SET function pushes an alert to the MIB database |
C | The object identifier is modified and reported during the next monitoring cycle |
D | A response message is sent from the agent to the manager |
Question 123 |
A | Allow TCP port 3389 outbound |
B | Allow UDP port 3389 inbound |
C | Allow TCP port 3389 inbound |
D | Allow UDP port 3389 outbound |
Question 124 |
A | Connect utilizing client-to-site VPN |
B | Use TFTP to transfer files to corporate resources |
C | Utilize an SSH connection to the corporate server |
D | Allow RDP through an external firewall |
Question 125 |
A | Packet capturing |
B | Baseline review |
C | Port scanning |
D | Log scanning |
Question 126 |
A | Fibre Channel |
B | iSCSI |
C | InfiniBand |
D | NAS |
Question 127 |
A | 132.216.14.184 |
B | 172.23.226.34 |
C | 152.119.25.213 |
D | 162.17.43.22 |
Question 128 |
A | Change service port 636 to port 389 |
B | Restart the web server |
C | Verify the browser is using port 443 |
D | Check port 636 to see if it is being blocked |
Question 129 |
A | Router |
B | Range extender |
C | VoIP endpoint |
D | Access point |
Question 130 |
A | Decreases bandwidth on a network |
B | Segments broadcast traffic |
C | Allows another connection to the router |
D | Increases port speed |
Question 131 |
A | Impersonation |
B | Whaling |
C | Privilege escalation |
D | Spear phishing |
Question 132 |
A | A network built with Mesh Topology |
B | A network built with Bus Topology |
C | A network built with Ring Topology |
D | A network built with Logical Topology |
E | A network built with Star Topology |
Question 133 |
A | Switches packets within the same subnet based on MAC addresses |
B | Switches packets between different subnets based on MAC addresses |
C | Switches packets between different subnets based on IP addresses |
D | Switches packets between same subnets based on IP addresses |
Question 134 |
A | Gigabit wireless bandwidth |
B | Multipath support |
C | Channel bonding |
D | Channel expansion |
Question 135 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Eqach department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where would you place the Layer 2 and Layer 3 switches? Click on the image to enlarge.
A | Layer 2 at C6 and Layer 3 at C6 |
B | Layer 2 at C5 and Layer 3 at C6 |
C | Layer 2 at C7 and Layer 3 at C6 |
D | Layer 2 at C8 and Layer 3 at C6 |
E | Layer 2 at C10 and Layer 3 at C12 |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.