← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set II
CompTIA Network+ N10-007 - Set III
Congratulations - you have completed CompTIA Network+ N10-007 - Set III.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Subnetting |
B | Unicast |
C | Multicast |
D | Broadcast |
Question 2 |
A | Z-Wave |
B | 802.11n |
C | 802.11g |
D | 802.11ac |
E | 802.11b |
Question 3 |
A | Logical and physical diagrams |
B | IDF/MDF documentation |
C | Network performance baseline |
D | Rack diagram |
Question 4 |
A | A trap message is sent via UDP to the monitoring workstation |
B | The object identifier is modified and reported during the next monitoring cycle |
C | The SET function pushes an alert to the MIB database |
D | A response message is sent from the agent to the manager |
Question 5 |
A | Privilege escalation |
B | Impersonation |
C | Whaling |
D | Spear phishing |
Question 6 |
A | Distance limitations |
B | Absorption |
C | Security type mismatch |
D | Latency |
Question 7 |
A | HTTPS |
B | Remote file access |
C | TLS |
D | Split tunneling |
Question 8 |
A | Evil twin |
B | DNS poisoning |
C | Ransomware |
D | ARP poisoning |
E | Reflective |
F | Man-in-the-middle |
Question 9 |
A | New servers are being provisioned in the cloud |
B | Some of the servers are configured to use different gateways |
C | Those servers have host-based firewalls |
D | Part of the subnet is configured to use different VLANs |
Question 10 |
A | MTU size greater than 1500 |
B | Commonly used on IaaS |
C | MTU size greater than 10000 |
D | Commonly used on SAN |
E | MTU size greater than 12000 |
Question 11 |
A | Insider threat |
B | Man-in-the-middle |
C | Logic bomb |
D | Social engineering |
Question 12 |
A | Layer 1 |
B | Layer 7 |
C | Layer 3 |
D | Layer 2 |
E | Layer 6 |
F | Layer 4 |
G | Layer 5 |
Question 13 |
A | The WAP transmitter light is dim |
B | The LWAPP image is installed on the WAP |
C | The WAP antenna is damaged |
D | The terminal emulation software is misconfigured |
Question 14 |
A | SLA |
B | NDA |
C | SOP |
D | AUP |
Question 15 |
A | Coaxial |
B | Serial |
C | Multimode |
D | UTP |
Question 16 |
A | Network |
B | Data link |
C | Physical |
D | Transport |
E | Session |
Question 17 |
A | 256 bits |
B | 32 bits |
C | 128 bits |
D | 64 bits |
Question 18 |
A | MIMO |
B | Increase the signal |
C | Channel bonding |
D | Disable SSID |
Question 19 |
A | 3, 13, 23 |
B | 4, 8, 16 |
C | 2, 5, 10 |
D | 1, 6, 11 |
Question 20 |
A | Wireless firewall |
B | Wireless hub |
C | Wireless access point |
D | Wireless bridge |
Question 21 |
A | Username + password |
B | Smart card + PIN |
C | Key fob + ID card |
D | Fingerprint + retina scan |
Question 22 |
A | WLAN |
B | Ring |
C | Star |
D | Bus |
Question 23 |
A | Bridge |
B | Router |
C | IDS |
D | Managed switch |
E | Firewall |
Question 24 |
A | Router to switch |
B | Switch to AP |
C | Router to modem |
D | PC to PC |
E | PC to switch |
Question 25 |
A | Token |
B | Ticket |
C | Time |
D | Certificate |
Question 26 |
A | env |
B | lsenv |
C | ls |
D | lsshell |
E | getargs |
Question 27 |
A | ISAKMP |
B | L2TP |
C | CARP |
D | FTP |
E | PPTP |
Question 28 |
A | Interference |
B | Channel overlapping |
C | DHCP exhaustion |
D | Overcapacity |
Question 29 |
A | BPDU guard |
B | DHCP snooping |
C | Spanning tree |
D | Flood guard |
Question 30 |
IP address: 172.16.204.12
Subnet Mask: 255.255.0.0
Default Gateway: 172.15.204.254
DNS address: 172.16.204.1
Broadcast address: 172.16.255.255
A | Subnet mask |
B | DNS address |
C | IP address |
D | Broadcast address |
E | Default gateway |
Question 31 |
A | SaaS |
B | PaaS |
C | IaaS |
D | CASB |
Question 32 |
A | The technician should set up individual routes between the machines. |
B | The technician should add a route in each virtual machine to the default gateway. |
C | The technician should connect the machine to its own separate switch. |
D | The technician should configure a virtual switch. |
Question 33 |
A | Unidirectional |
B | Parabolic |
C | Yagi |
D | Omnidirectional |
Question 34 |
A | Distance vector |
B | Static |
C | Hybrid |
D | Link state |
Question 35 |
A | Multipath support |
B | Gigabit wireless bandwidth |
C | Channel expansion |
D | Channel bonding |
Question 36 |
A | Router |
B | Switch |
C | IDS |
D | IPS |
E | Network tap |
F | Hub |
Question 37 |
A | Replace the 802.11n access point in the office with an 802.11a access point |
B | Turn off as many lights in the executive’s office as possible to reduce interference |
C | Change the channel on the access point to channel 11 |
D | Turn off SSID broadcasting for the executive’s access point |
Question 38 |
A | Create a VLAN for the unused ports and create a honeyspot on the VLAN |
B | Install a BPDU guard on switchports and enable STP |
C | Create a DMZ for public servers and secure a segment for the internal network |
D | Install antivirus software and set an ACL on the servers |
Question 39 |
A | DTLS |
B | DNS |
C | SNMP |
D | TFTP |
E | Datagram Transport Layer Security (DTLS) |
Question 40 |
A | MDF |
B | Switch |
C | IDF |
D | CSU/DSU |
Question 41 |
A | ACL allowing only Telnet |
B | Out-of-band console router |
C | ACL allowing only HTTP |
D | Out-of-band modem |
Question 42 |
A | OSPF |
B | BGP |
C | RIP |
D | EIGRP |
Question 43 |
A | MX |
B | PTR |
C | SRV |
D | CNAME |
E | NS |
Question 44 |
A | MS-CHAP |
B | CHAP |
C | MAC filtering |
D | Digital signatures |
Question 45 |
A | Ping |
B | Nessus |
C | Protocol analyzer |
D | Baseline analyzer |
Question 46 |
A | Replace multimode with single-mode cable |
B | Fall back to the old switch |
C | Replace SFP with a new one |
D | Transpose the fiber pairs |
Question 47 |
A | Used to verify functionality after a NIC is installed. |
B | Used to determine which port a CAT6 cable is connected. |
C | Used to verify known good patch cables. |
D | Used to correct open short on a cable. |
E | Used to terminate a cable at a 110 block. |
Question 48 |
A | TPM |
B | WPA |
C | IDS |
D | DLP |
E | WAF |
Question 49 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Each department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where should the router be palced? Click on the image to enlarge.
A | C5 |
B | C10 |
C | C7 |
D | C6 |
E | C8 |
Question 50 |
Cable | Test | Result |
---|---|---|
1.2 | Open | 7ft |
3.6 | Short | 7ft |
4.5 | Open | 7ft |
7.8 | Open | 7ft |
A | Crimper |
B | Toner Probe |
C | Cable Certifier |
D | OTDR |
E | Multimeter |
F | Protocol Analyzer |
G | Punch Down Tool |
Question 51 |
A | Differential backup |
B | Incremental backup |
C | Hot site |
D | Warm site |
E | Full backup |
F | Cold site |
Question 52 |
A | DLP policy |
B | BYOD policy |
C | Incident response policy |
D | Remote access policy |
Question 53 |
A | IP addresses |
B | Switching loop |
C | STP blocking |
D | MTU mismatch |
Question 54 |
A | UDP |
B | ICMP |
C | IPv6 |
D | EIGRP |
Question 55 |
A | CSMA/CD |
B | MPLS |
C | OSPF |
D | CSMA/CA |
Question 56 |
A | 162.17.43.22 |
B | 152.119.25.213 |
C | 132.216.14.184 |
D | 172.23.226.34 |
Question 57 |
A | IPSec |
B | SNMPv3 |
C | VTP |
D | CDP |
Question 58 |
A | Placement map |
B | Environmental monitor |
C | Syslog |
D | Network map |
Question 59 |
A | Baseline review |
B | Log scanning |
C | Packet capturing |
D | Port scanning |
Question 60 |
A | Connection speeds decrease |
B | Throughput decreases |
C | Attenuation increases |
D | Cell size increases |
Question 61 |
A | Add a router and enable OSPF. |
B | Add a bridge between two switches. |
C | Add a firewall and implement proper ACL. |
D | Add a layer 3 switch and create a VLAN. |
Question 62 |
A | Star |
B | Bus |
C | Ring |
D | Mesh |
Question 63 |
A | The network administrator should install and configure a traffic analysis server |
B | The network administrator should install and configure a network sniffer |
C | The network administrator should install and configure a syslog server |
D | The network administrator should install and configure a DMZ server |
Question 64 |
A | Logical diagrams |
B | Network log files |
C | Inventory management |
D | Change management records |
Question 65 |
A | LC |
B | SC |
C | ST |
D | MT-RJ |
Question 66 |
Department-VLAN#-Subnet used
Marketing-20-192.168.20.0/28
Customer Service-25-192.168.20.64/28
Finance-30-192.168.30.0/28
WHSE-35-192.168.30.16/28
Sales-40-192.168.3.16/28
The users experiencing this issue need to be added to which of the following VLANs?
A | 40 |
B | 25 |
C | 30 |
D | 35 |
Question 67 |
A | WPA |
B | FIFO |
C | 802.1x |
D | MIMO |
E | IPsec |
Question 68 |
A | Client-to-site VPN |
B | Out-of-band management |
C | HTTPS management URL |
D | Router ACL |
Question 69 |
A | ATM |
B | MPLS |
C | PPP |
D | Frame relay |
Question 70 |
A | Forwarding |
B | Blocking |
C | Learning |
D | Disabled |
Question 71 |
A | The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem |
B | The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem |
C | The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router |
D | The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router |
Question 72 |
A | White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown |
B | White/Blue, Orange, White/Green, Blue, White/Orange, Green, White/Brown, Brown |
C | White/Orange, Orange, White/Brown, Blue, White/Blue, Green, White/Green, Brown |
D | White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown. Brown |
E | White/Green, Green, White/Blue, Blue, White/Orange, Orange, White/Brown. Brown |
Question 73 |
A | SDN |
B | NAC |
C | Traffic shaping |
D | ACL |
E | NTP |
Question 74 |
A | Public IP |
B | Loopback IP |
C | Reserved IP |
D | Virtual IP |
Question 75 |
A | Plenum Cat 5e |
B | Plenum Cat 6a |
C | PVC Cat 5 |
D | PVC Cat 7 |
Question 76 |
A | SNMP |
B | L2TP |
C | QoS |
D | SSH |
Question 77 |
A | OC3 |
B | T3 |
C | DS3 |
D | E3 |
Question 78 |
A | WEP uses plain text |
B | WEP uses RC4 which is easily accessible and not secure |
C | WEP’s IV is too small |
D | WEP is not well supported |
Question 79 |
A | route |
B | nmap |
C | nslookup |
D | pathping |
Question 80 |
A | SC |
B | ST |
C | MT-RJ |
D | LC |
Question 81 |
A | Block traffic from the wireless access point |
B | Packet filtering on the wireless access point |
C | Content filtering on the wireless access point |
D | Allow traffic from the wireless access point |
Question 82 |
A | Incorrect speed/duplex setting on the alarm device |
B | A missing route on the alarm device |
C | Incorrect VLAN assignment on the router |
D | A missing route on the network routers |
Question 83 |
A | Allow UDP port 3389 inbound |
B | Allow TCP port 3389 outbound |
C | Allow UDP port 3389 outbound |
D | Allow TCP port 3389 inbound |
Question 84 |
A | ARP protection |
B | DHCP snooping |
C | BPDU guard |
D | Spanning tree |
Question 85 |
A | MT-RJ |
B | ST |
C | SC |
D | LC |
Question 86 |
A | Partial mesh |
B | Hub and spoke |
C | Ring |
D | Bus |
E | Full mesh |
Question 87 |
A | NTLM |
B | MS-CHAP |
C | Kerberos |
D | CHAP |
Question 88 |
A | Man-in-the-middle attacks |
B | Rogue access points |
C | Phishing |
D | DoS attacks |
Question 89 |
A | The channels are overlapping with other wireless networks and should be changed. |
B | The SSIDs are incompatible and should be renamed. |
C | The users have incompatible wireless network cards and should upgrade. |
D | The default idle period for logoff is too short and should be changed to a longer limit. |
Question 90 |
A | Shared secret keys |
B | Strong RC4 encryption |
C | Key rotation |
D | MAC filtering |
E | AES encryption |
Question 91 |
A | A network built with Mesh Topology |
B | A network built with Ring Topology |
C | A network built with Star Topology |
D | A network built with Bus Topology |
E | A network built with Logical Topology |
Question 92 |
A | Hybrid |
B | Peer-to-peer |
C | Point-to-point |
D | Point-to-multipoint |
Question 93 |
A | Buffer overflow attack |
B | NMAP |
C | Social engineering |
D | MITM |
E | Smurf attack |
Question 94 |
A | CAT3 |
B | CAT6a |
C | CAT5e |
D | Fiber |
Question 95 |
A | Smart card reader |
B | Motion detection |
C | Asset tracking tags |
D | Biometric locks |
Question 96 |
A | EIGRP |
B | BGP |
C | RIP |
D | OSPF |
Question 97 |
A | Fiber cable mismatch |
B | Bad fiber switch |
C | Fiber type mismatch |
D | Bend radius exceeded |
Question 98 |
A | GBIC |
B | F-type |
C | BNC |
D | MT-RJ |
Question 99 |
A | Bridge |
B | Firewall |
C | Multiplayer switch |
D | Router |
Question 100 |
A | Switches packets between different subnets based on IP addresses |
B | Switches packets within the same subnet based on MAC addresses |
C | Switches packets between different subnets based on MAC addresses |
D | Switches packets between same subnets based on IP addresses |
Question 101 |
A | WPA should be enabled |
B | WAP SSIDs are matching |
C | WAPs are transmitting on same channel |
D | PKI should be turned off |
Question 102 |
A | VoIP endpoint |
B | Range extender |
C | Access point |
D | Router |
Question 103 |
A | Port scan |
B | Packet sniffer |
C | IPS |
D | IDS |
Question 104 |
A | Enable wireless multimedia (WMM) for QoS |
B | Use the 40MHz channels in the 2.4GHz band |
C | Enable access point antenna isolation |
D | Limit the clients to 802.11g compatible laptops |
Question 105 |
A | Hub |
B | Router |
C | Switch |
D | Modem |
Question 106 |
A | Baseline report |
B | Rollback plan |
C | Vulnerability report |
D | Business continuity plan |
Question 107 |
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40
Which is true about the above configuration?
A | An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
B | Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client. |
C | Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. |
D | An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
Question 108 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Eqach department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where would you place the Layer 2 and Layer 3 switches? Click on the image to enlarge.
A | Layer 2 at C8 and Layer 3 at C6 |
B | Layer 2 at C5 and Layer 3 at C6 |
C | Layer 2 at C7 and Layer 3 at C6 |
D | Layer 2 at C6 and Layer 3 at C6 |
E | Layer 2 at C10 and Layer 3 at C12 |
Question 109 |
A | APIPA |
B | EUI-64 |
C | IPsec |
D | MAC reservations |
E | IPv4 to IPv6 tunnel |
Question 110 |
A | Check port 636 to see if it is being blocked |
B | Change service port 636 to port 389 |
C | Verify the browser is using port 443 |
D | Restart the web server |
Question 111 |
A | Cable tester |
B | Environmental monitor |
C | OTDR |
D | Punch down tool |
Question 112 |
A | Remove unnecessary testing accounts. |
B | Issue a new self-signed certificate. |
C | Generate new SSH host keys. |
D | Upgrade the firmware on the firewall. |
E | Disable the HTTP port in the host firewall. |
Question 113 |
A | 192.168.2.1 |
B | 00:f3:82:99:a2:b8 |
C | 3ffe:1900:4545:3:200:f8ff:fe21:67cf |
D | 61.23.168.192.in-addr.arpa |
Question 114 |
A | TCP port 25 |
B | TCP port 22 |
C | UDP port 22 |
D | UDP port 53 |
E | UDP port 69 |
Question 115 |
A | NAS |
B | InfiniBand |
C | iSCSI |
D | Fibre Channel |
Question 116 |
A | SMTP |
B | NTP |
C | LDAP |
D | POP3 |
E | IMAP |
Question 117 |
A | Frequency mismatch |
B | Absorption |
C | Channel overlap |
D | Reflection |
Question 118 |
A | STP convergence |
B | Power failure |
C | Excessive bandwidth usage |
D | Broadcast storm |
Question 119 |
A | Physical diagram |
B | Network baseline |
C | Logical diagram |
D | Change management log |
Question 120 |
A | Connect utilizing client-to-site VPN |
B | Utilize an SSH connection to the corporate server |
C | Allow RDP through an external firewall |
D | Use TFTP to transfer files to corporate resources |
Question 121 |
A | Interference |
B | Attenuation |
C | Signal-to-noise ratio |
D | Reflection |
E | Packet loss |
F | Latency |
Question 122 |
A | FEEF:/12 |
B | FF00::/8 |
C | FE80::/10 |
D | 2FFE::/16 |
Question 123 |
A | AA:CE:58:FD:90:08 |
B | 44:98:3E:F8:33:23 |
C | 56:AD:BX:89:55:54 |
D | 94:9E:FE:EE:8C:DF |
Question 124 |
A | Packet capturing |
B | Port scanning |
C | Log scanning |
D | Baseline review |
Question 125 |
A | Install a new electrical circuit |
B | Replace the switch uplink cable |
C | Install a power conditioner |
D | Install a UPS |
E | Install a new switch |
Question 126 |
A | Absorption |
B | Refraction |
C | Reflection |
D | Distance |
E | Attenuation |
Question 127 |
A | tcpdump |
B | tracert |
C | route |
D | nslookup |
E | netstat |
F | pathping |
G | ping |
Question 128 |
A | SCTP |
B | Packet sniffer |
C | Simple Network Management Protocol (SNMP) |
D | SNMP |
E | DCCP |
Question 129 |
A | RDP |
B | SMTP |
C | NTP |
D | HTTP |
Question 130 |
A | WPA2 |
B | DMZ |
C | Signature-based IPS |
D | Behavior-based IPS |
E | Honeypots |
Question 131 |
A | 10.10.50.0/30 |
B | 192.170.10.0/24 |
C | 172.16.20.0/30 |
D | 192.168.0.192/24 |
E | 192.1.0.124/30 |
Question 132 |
A | MT-RJ |
B | LC |
C | SC |
D | ST |
Question 133 |
A | Shared secret |
B | HTTPS server |
C | Private certificate |
D | Soft spoken |
Question 134 |
SSID: SANUJA-WiFi
Signal: 5%
SNR: 2
A | Channel overlap |
B | Incorrect antenna type |
C | Latency |
D | Overcapacity |
Question 135 |
A | Increases port speed |
B | Decreases bandwidth on a network |
C | Segments broadcast traffic |
D | Allows another connection to the router |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.