← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set II
CompTIA Network+ N10-007 - Set III
Congratulations - you have completed CompTIA Network+ N10-007 - Set III.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
Cable | Test | Result |
---|---|---|
1.2 | Open | 7ft |
3.6 | Short | 7ft |
4.5 | Open | 7ft |
7.8 | Open | 7ft |
A | Crimper |
B | OTDR |
C | Multimeter |
D | Punch Down Tool |
E | Toner Probe |
F | Cable Certifier |
G | Protocol Analyzer |
Question 2 |
A | 802.11b |
B | Z-Wave |
C | 802.11g |
D | 802.11n |
E | 802.11ac |
Question 3 |
A | L2TP |
B | PPTP |
C | CARP |
D | ISAKMP |
E | FTP |
Question 4 |
A | Blocking |
B | Forwarding |
C | Disabled |
D | Learning |
Question 5 |
A | Man-in-the-middle attacks |
B | DoS attacks |
C | Rogue access points |
D | Phishing |
Question 6 |
A | Packet capturing |
B | Log scanning |
C | Baseline review |
D | Port scanning |
Question 7 |
A | 192.168.2.1 |
B | 00:f3:82:99:a2:b8 |
C | 61.23.168.192.in-addr.arpa |
D | 3ffe:1900:4545:3:200:f8ff:fe21:67cf |
Question 8 |
A | Full backup |
B | Hot site |
C | Differential backup |
D | Cold site |
E | Warm site |
F | Incremental backup |
Question 9 |
A | POP3 |
B | LDAP |
C | NTP |
D | IMAP |
E | SMTP |
Question 10 |
A | LC |
B | SC |
C | ST |
D | MT-RJ |
Question 11 |
A | Fiber cable mismatch |
B | Bad fiber switch |
C | Fiber type mismatch |
D | Bend radius exceeded |
Question 12 |
A | 56:AD:BX:89:55:54 |
B | 94:9E:FE:EE:8C:DF |
C | 44:98:3E:F8:33:23 |
D | AA:CE:58:FD:90:08 |
Question 13 |
A | Star |
B | Ring |
C | Bus |
D | Mesh |
Question 14 |
A | Spanning tree |
B | DHCP snooping |
C | ARP protection |
D | BPDU guard |
Question 15 |
A | IPsec |
B | APIPA |
C | EUI-64 |
D | IPv4 to IPv6 tunnel |
E | MAC reservations |
Question 16 |
A | Multimode |
B | Serial |
C | Coaxial |
D | UTP |
Question 17 |
A | Subnetting |
B | Broadcast |
C | Unicast |
D | Multicast |
Question 18 |
A | Replace the switch uplink cable |
B | Install a power conditioner |
C | Install a UPS |
D | Install a new electrical circuit |
E | Install a new switch |
Question 19 |
IP address: 172.16.204.12
Subnet Mask: 255.255.0.0
Default Gateway: 172.15.204.254
DNS address: 172.16.204.1
Broadcast address: 172.16.255.255
A | Default gateway |
B | Subnet mask |
C | Broadcast address |
D | IP address |
E | DNS address |
Question 20 |
A | Wireless bridge |
B | Wireless firewall |
C | Wireless hub |
D | Wireless access point |
Question 21 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Eqach department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where would you place the Layer 2 and Layer 3 switches? Click on the image to enlarge.
A | Layer 2 at C10 and Layer 3 at C12 |
B | Layer 2 at C8 and Layer 3 at C6 |
C | Layer 2 at C6 and Layer 3 at C6 |
D | Layer 2 at C5 and Layer 3 at C6 |
E | Layer 2 at C7 and Layer 3 at C6 |
Question 22 |
A | getargs |
B | lsenv |
C | ls |
D | env |
E | lsshell |
Question 23 |
A | OSPF |
B | BGP |
C | EIGRP |
D | RIP |
Question 24 |
A | SLA |
B | SOP |
C | NDA |
D | AUP |
Question 25 |
A | Rollback plan |
B | Vulnerability report |
C | Baseline report |
D | Business continuity plan |
Question 26 |
A | Session |
B | Data link |
C | Network |
D | Transport |
E | Physical |
Question 27 |
A | Client-to-site VPN |
B | Router ACL |
C | Out-of-band management |
D | HTTPS management URL |
Question 28 |
A | Switches packets within the same subnet based on MAC addresses |
B | Switches packets between different subnets based on MAC addresses |
C | Switches packets between same subnets based on IP addresses |
D | Switches packets between different subnets based on IP addresses |
Question 29 |
A | Log scanning |
B | Baseline review |
C | Port scanning |
D | Packet capturing |
Question 30 |
A | OTDR |
B | Environmental monitor |
C | Punch down tool |
D | Cable tester |
Question 31 |
A | The object identifier is modified and reported during the next monitoring cycle |
B | The SET function pushes an alert to the MIB database |
C | A response message is sent from the agent to the manager |
D | A trap message is sent via UDP to the monitoring workstation |
Question 32 |
A | SMTP |
B | RDP |
C | HTTP |
D | NTP |
Question 33 |
A | LC |
B | MT-RJ |
C | SC |
D | ST |
Question 34 |
A | Network map |
B | Syslog |
C | Environmental monitor |
D | Placement map |
Question 35 |
A | A missing route on the network routers |
B | Incorrect speed/duplex setting on the alarm device |
C | A missing route on the alarm device |
D | Incorrect VLAN assignment on the router |
Question 36 |
A | Smart card reader |
B | Biometric locks |
C | Asset tracking tags |
D | Motion detection |
Question 37 |
A | Allow TCP port 3389 outbound |
B | Allow TCP port 3389 inbound |
C | Allow UDP port 3389 inbound |
D | Allow UDP port 3389 outbound |
Question 38 |
A | Used to verify functionality after a NIC is installed. |
B | Used to terminate a cable at a 110 block. |
C | Used to correct open short on a cable. |
D | Used to verify known good patch cables. |
E | Used to determine which port a CAT6 cable is connected. |
Question 39 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Each department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where should the router be palced? Click on the image to enlarge.
A | C5 |
B | C7 |
C | C6 |
D | C10 |
E | C8 |
Question 40 |
A | Impersonation |
B | Spear phishing |
C | Whaling |
D | Privilege escalation |
Question 41 |
A | Layer 7 |
B | Layer 6 |
C | Layer 4 |
D | Layer 3 |
E | Layer 1 |
F | Layer 5 |
G | Layer 2 |
Question 42 |
A | netstat |
B | route |
C | tcpdump |
D | nslookup |
E | pathping |
F | tracert |
G | ping |
Question 43 |
A | Baseline analyzer |
B | Protocol analyzer |
C | Nessus |
D | Ping |
Question 44 |
A | E3 |
B | T3 |
C | OC3 |
D | DS3 |
Question 45 |
A | DNS |
B | SNMP |
C | TFTP |
D | Datagram Transport Layer Security (DTLS) |
E | DTLS |
Question 46 |
A | CNAME |
B | PTR |
C | SRV |
D | NS |
E | MX |
Question 47 |
A | CAT3 |
B | CAT6a |
C | CAT5e |
D | Fiber |
Question 48 |
A | Kerberos |
B | CHAP |
C | MS-CHAP |
D | NTLM |
Question 49 |
A | Increases port speed |
B | Decreases bandwidth on a network |
C | Segments broadcast traffic |
D | Allows another connection to the router |
Question 50 |
A | Shared secret |
B | Private certificate |
C | Soft spoken |
D | HTTPS server |
Question 51 |
A | WEP uses plain text |
B | WEP uses RC4 which is easily accessible and not secure |
C | WEP’s IV is too small |
D | WEP is not well supported |
Question 52 |
A | Some of the servers are configured to use different gateways |
B | Part of the subnet is configured to use different VLANs |
C | Those servers have host-based firewalls |
D | New servers are being provisioned in the cloud |
Question 53 |
A | ACL allowing only Telnet |
B | ACL allowing only HTTP |
C | Out-of-band modem |
D | Out-of-band console router |
Question 54 |
A | Plenum Cat 6a |
B | Plenum Cat 5e |
C | PVC Cat 5 |
D | PVC Cat 7 |
Question 55 |
A | 32 bits |
B | 256 bits |
C | 128 bits |
D | 64 bits |
Question 56 |
A | Ring |
B | Full mesh |
C | Hub and spoke |
D | Bus |
E | Partial mesh |
Question 57 |
A | The network administrator should install and configure a syslog server |
B | The network administrator should install and configure a traffic analysis server |
C | The network administrator should install and configure a network sniffer |
D | The network administrator should install and configure a DMZ server |
Question 58 |
A | IDS |
B | WAF |
C | DLP |
D | TPM |
E | WPA |
Question 59 |
SSID: SANUJA-WiFi
Signal: 5%
SNR: 2
A | Overcapacity |
B | Latency |
C | Incorrect antenna type |
D | Channel overlap |
Question 60 |
A | The technician should configure a virtual switch. |
B | The technician should add a route in each virtual machine to the default gateway. |
C | The technician should set up individual routes between the machines. |
D | The technician should connect the machine to its own separate switch. |
Question 61 |
A | Hybrid |
B | Point-to-point |
C | Point-to-multipoint |
D | Peer-to-peer |
Question 62 |
A | Incident response policy |
B | DLP policy |
C | Remote access policy |
D | BYOD policy |
Question 63 |
A | Firewall |
B | Router |
C | Multiplayer switch |
D | Bridge |
Question 64 |
A | SaaS |
B | PaaS |
C | CASB |
D | IaaS |
Question 65 |
A | Limit the clients to 802.11g compatible laptops |
B | Enable wireless multimedia (WMM) for QoS |
C | Enable access point antenna isolation |
D | Use the 40MHz channels in the 2.4GHz band |
Question 66 |
A | Logic bomb |
B | Insider threat |
C | Man-in-the-middle |
D | Social engineering |
Question 67 |
A | Link state |
B | Distance vector |
C | Static |
D | Hybrid |
Question 68 |
A | UDP port 69 |
B | UDP port 22 |
C | TCP port 22 |
D | UDP port 53 |
E | TCP port 25 |
Question 69 |
A | Time |
B | Token |
C | Certificate |
D | Ticket |
Question 70 |
A | GBIC |
B | F-type |
C | MT-RJ |
D | BNC |
Question 71 |
A | Channel bonding |
B | MIMO |
C | Disable SSID |
D | Increase the signal |
Question 72 |
A | NMAP |
B | Buffer overflow attack |
C | MITM |
D | Smurf attack |
E | Social engineering |
Question 73 |
A | CDP |
B | VTP |
C | SNMPv3 |
D | IPSec |
Question 74 |
A | Connect utilizing client-to-site VPN |
B | Utilize an SSH connection to the corporate server |
C | Allow RDP through an external firewall |
D | Use TFTP to transfer files to corporate resources |
Question 75 |
A | Add a layer 3 switch and create a VLAN. |
B | Add a router and enable OSPF. |
C | Add a bridge between two switches. |
D | Add a firewall and implement proper ACL. |
Question 76 |
A | Distance limitations |
B | Absorption |
C | Security type mismatch |
D | Latency |
Question 77 |
A | Reflection |
B | Attenuation |
C | Absorption |
D | Refraction |
E | Distance |
Question 78 |
A | PPP |
B | ATM |
C | Frame relay |
D | MPLS |
Question 79 |
A | Interference |
B | Channel overlapping |
C | Overcapacity |
D | DHCP exhaustion |
Question 80 |
A | 4, 8, 16 |
B | 1, 6, 11 |
C | 3, 13, 23 |
D | 2, 5, 10 |
Question 81 |
A | IPsec |
B | MIMO |
C | 802.1x |
D | FIFO |
E | WPA |
Question 82 |
A | Digital signatures |
B | MS-CHAP |
C | CHAP |
D | MAC filtering |
Question 83 |
A | MTU size greater than 12000 |
B | Commonly used on SAN |
C | MTU size greater than 10000 |
D | MTU size greater than 1500 |
E | Commonly used on IaaS |
Question 84 |
A | Remove unnecessary testing accounts. |
B | Issue a new self-signed certificate. |
C | Upgrade the firmware on the firewall. |
D | Disable the HTTP port in the host firewall. |
E | Generate new SSH host keys. |
Question 85 |
A | Turn off as many lights in the executive’s office as possible to reduce interference |
B | Replace the 802.11n access point in the office with an 802.11a access point |
C | Change the channel on the access point to channel 11 |
D | Turn off SSID broadcasting for the executive’s access point |
Question 86 |
A | WAPs are transmitting on same channel |
B | PKI should be turned off |
C | WPA should be enabled |
D | WAP SSIDs are matching |
Question 87 |
A | LC |
B | SC |
C | MT-RJ |
D | ST |
Question 88 |
A | DNS poisoning |
B | Reflective |
C | Ransomware |
D | ARP poisoning |
E | Evil twin |
F | Man-in-the-middle |
Question 89 |
A | Channel overlap |
B | Frequency mismatch |
C | Reflection |
D | Absorption |
Question 90 |
A | Excessive bandwidth usage |
B | STP convergence |
C | Broadcast storm |
D | Power failure |
Question 91 |
A | CSMA/CA |
B | CSMA/CD |
C | OSPF |
D | MPLS |
Question 92 |
Department-VLAN#-Subnet used
Marketing-20-192.168.20.0/28
Customer Service-25-192.168.20.64/28
Finance-30-192.168.30.0/28
WHSE-35-192.168.30.16/28
Sales-40-192.168.3.16/28
The users experiencing this issue need to be added to which of the following VLANs?
A | 35 |
B | 25 |
C | 30 |
D | 40 |
Question 93 |
A | Connection speeds decrease |
B | Cell size increases |
C | Throughput decreases |
D | Attenuation increases |
Question 94 |
A | FF00::/8 |
B | FE80::/10 |
C | 2FFE::/16 |
D | FEEF:/12 |
Question 95 |
A | SNMP |
B | SCTP |
C | Packet sniffer |
D | DCCP |
E | Simple Network Management Protocol (SNMP) |
Question 96 |
A | White/Green, Green, White/Blue, Blue, White/Orange, Orange, White/Brown. Brown |
B | White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown |
C | White/Orange, Orange, White/Brown, Blue, White/Blue, Green, White/Green, Brown |
D | White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown. Brown |
E | White/Blue, Orange, White/Green, Blue, White/Orange, Green, White/Brown, Brown |
Question 97 |
A | IDF/MDF documentation |
B | Logical and physical diagrams |
C | Network performance baseline |
D | Rack diagram |
Question 98 |
A | UDP |
B | IPv6 |
C | ICMP |
D | EIGRP |
Question 99 |
A | Range extender |
B | VoIP endpoint |
C | Access point |
D | Router |
Question 100 |
A | Bus |
B | Star |
C | WLAN |
D | Ring |
Question 101 |
A | ST |
B | LC |
C | MT-RJ |
D | SC |
Question 102 |
A | Block traffic from the wireless access point |
B | Allow traffic from the wireless access point |
C | Packet filtering on the wireless access point |
D | Content filtering on the wireless access point |
Question 103 |
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40
Which is true about the above configuration?
A | An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
B | Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client. |
C | Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. |
D | An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
Question 104 |
A | The WAP transmitter light is dim |
B | The LWAPP image is installed on the WAP |
C | The terminal emulation software is misconfigured |
D | The WAP antenna is damaged |
Question 105 |
A | Hub |
B | Router |
C | Modem |
D | Switch |
Question 106 |
A | HTTPS |
B | Split tunneling |
C | Remote file access |
D | TLS |
Question 107 |
A | Logical diagram |
B | Change management log |
C | Network baseline |
D | Physical diagram |
Question 108 |
A | 172.23.226.34 |
B | 152.119.25.213 |
C | 132.216.14.184 |
D | 162.17.43.22 |
Question 109 |
A | A network built with Mesh Topology |
B | A network built with Bus Topology |
C | A network built with Ring Topology |
D | A network built with Star Topology |
E | A network built with Logical Topology |
Question 110 |
A | Channel bonding |
B | Channel expansion |
C | Gigabit wireless bandwidth |
D | Multipath support |
Question 111 |
A | Signal-to-noise ratio |
B | Packet loss |
C | Interference |
D | Reflection |
E | Attenuation |
F | Latency |
Question 112 |
A | Public IP |
B | Loopback IP |
C | Reserved IP |
D | Virtual IP |
Question 113 |
A | Hub |
B | IDS |
C | Switch |
D | Router |
E | IPS |
F | Network tap |
Question 114 |
A | PC to switch |
B | Router to switch |
C | Router to modem |
D | Switch to AP |
E | PC to PC |
Question 115 |
A | The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router |
B | The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router |
C | The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem |
D | The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem |
Question 116 |
A | RIP |
B | OSPF |
C | EIGRP |
D | BGP |
Question 117 |
A | Change management records |
B | Inventory management |
C | Logical diagrams |
D | Network log files |
Question 118 |
A | Restart the web server |
B | Check port 636 to see if it is being blocked |
C | Verify the browser is using port 443 |
D | Change service port 636 to port 389 |
Question 119 |
A | SSH |
B | QoS |
C | SNMP |
D | L2TP |
Question 120 |
A | Unidirectional |
B | Yagi |
C | Omnidirectional |
D | Parabolic |
Question 121 |
A | Shared secret keys |
B | Key rotation |
C | MAC filtering |
D | Strong RC4 encryption |
E | AES encryption |
Question 122 |
A | IDS |
B | Port scan |
C | Packet sniffer |
D | IPS |
Question 123 |
A | The default idle period for logoff is too short and should be changed to a longer limit. |
B | The users have incompatible wireless network cards and should upgrade. |
C | The channels are overlapping with other wireless networks and should be changed. |
D | The SSIDs are incompatible and should be renamed. |
Question 124 |
A | Create a VLAN for the unused ports and create a honeyspot on the VLAN |
B | Install antivirus software and set an ACL on the servers |
C | Create a DMZ for public servers and secure a segment for the internal network |
D | Install a BPDU guard on switchports and enable STP |
Question 125 |
A | STP blocking |
B | Switching loop |
C | IP addresses |
D | MTU mismatch |
Question 126 |
A | Honeypots |
B | DMZ |
C | Behavior-based IPS |
D | Signature-based IPS |
E | WPA2 |
Question 127 |
A | NAC |
B | ACL |
C | Traffic shaping |
D | NTP |
E | SDN |
Question 128 |
A | iSCSI |
B | InfiniBand |
C | Fibre Channel |
D | NAS |
Question 129 |
A | nslookup |
B | pathping |
C | route |
D | nmap |
Question 130 |
A | Switch |
B | IDF |
C | CSU/DSU |
D | MDF |
Question 131 |
A | Replace SFP with a new one |
B | Transpose the fiber pairs |
C | Replace multimode with single-mode cable |
D | Fall back to the old switch |
Question 132 |
A | DHCP snooping |
B | Flood guard |
C | Spanning tree |
D | BPDU guard |
Question 133 |
A | Fingerprint + retina scan |
B | Username + password |
C | Key fob + ID card |
D | Smart card + PIN |
Question 134 |
A | 192.170.10.0/24 |
B | 172.16.20.0/30 |
C | 192.1.0.124/30 |
D | 10.10.50.0/30 |
E | 192.168.0.192/24 |
Question 135 |
A | IDS |
B | Router |
C | Bridge |
D | Firewall |
E | Managed switch |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.