← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set II
CompTIA Network+ N10-007 - Set III
Congratulations - you have completed CompTIA Network+ N10-007 - Set III.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Transport |
B | Data link |
C | Session |
D | Physical |
E | Network |
Question 2 |
A | Firewall |
B | Managed switch |
C | Bridge |
D | IDS |
E | Router |
Question 3 |
A | Rollback plan |
B | Business continuity plan |
C | Vulnerability report |
D | Baseline report |
Question 4 |
A | Static |
B | Hybrid |
C | Link state |
D | Distance vector |
Question 5 |
A | ARP protection |
B | Spanning tree |
C | DHCP snooping |
D | BPDU guard |
Question 6 |
A | ISAKMP |
B | L2TP |
C | PPTP |
D | CARP |
E | FTP |
Question 7 |
A | Star |
B | Ring |
C | Bus |
D | WLAN |
Question 8 |
A | IPv4 to IPv6 tunnel |
B | IPsec |
C | MAC reservations |
D | EUI-64 |
E | APIPA |
Question 9 |
A | 802.11b |
B | Z-Wave |
C | 802.11ac |
D | 802.11g |
E | 802.11n |
Question 10 |
A | Baseline review |
B | Port scanning |
C | Packet capturing |
D | Log scanning |
Question 11 |
A | DNS poisoning |
B | Ransomware |
C | ARP poisoning |
D | Reflective |
E | Man-in-the-middle |
F | Evil twin |
Question 12 |
A | Phishing |
B | Man-in-the-middle attacks |
C | DoS attacks |
D | Rogue access points |
Question 13 |
A | Layer 7 |
B | Layer 4 |
C | Layer 5 |
D | Layer 2 |
E | Layer 1 |
F | Layer 3 |
G | Layer 6 |
Question 14 |
A | NTP |
B | SMTP |
C | RDP |
D | HTTP |
Question 15 |
A | Install antivirus software and set an ACL on the servers |
B | Create a VLAN for the unused ports and create a honeyspot on the VLAN |
C | Install a BPDU guard on switchports and enable STP |
D | Create a DMZ for public servers and secure a segment for the internal network |
Question 16 |
A | Mesh |
B | Bus |
C | Star |
D | Ring |
Question 17 |
A | 132.216.14.184 |
B | 172.23.226.34 |
C | 152.119.25.213 |
D | 162.17.43.22 |
Question 18 |
A | Wireless hub |
B | Wireless access point |
C | Wireless firewall |
D | Wireless bridge |
Question 19 |
A | MIMO |
B | Channel bonding |
C | Increase the signal |
D | Disable SSID |
Question 20 |
A | Bad fiber switch |
B | Bend radius exceeded |
C | Fiber cable mismatch |
D | Fiber type mismatch |
Question 21 |
A | NTP |
B | Traffic shaping |
C | SDN |
D | NAC |
E | ACL |
Question 22 |
A | Channel overlap |
B | Absorption |
C | Reflection |
D | Frequency mismatch |
Question 23 |
A | Change the channel on the access point to channel 11 |
B | Turn off as many lights in the executive’s office as possible to reduce interference |
C | Turn off SSID broadcasting for the executive’s access point |
D | Replace the 802.11n access point in the office with an 802.11a access point |
Question 24 |
A | HTTPS |
B | Remote file access |
C | TLS |
D | Split tunneling |
Question 25 |
A | EIGRP |
B | OSPF |
C | BGP |
D | RIP |
Question 26 |
A | MITM |
B | Social engineering |
C | Buffer overflow attack |
D | NMAP |
E | Smurf attack |
Question 27 |
A | DCCP |
B | Simple Network Management Protocol (SNMP) |
C | SCTP |
D | Packet sniffer |
E | SNMP |
Question 28 |
A | SNMP |
B | L2TP |
C | SSH |
D | QoS |
Question 29 |
A | The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router |
B | The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem |
C | The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router |
D | The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem |
Question 30 |
A | Smart card reader |
B | Motion detection |
C | Asset tracking tags |
D | Biometric locks |
Question 31 |
A | Parabolic |
B | Unidirectional |
C | Yagi |
D | Omnidirectional |
Question 32 |
A | Access point |
B | Range extender |
C | Router |
D | VoIP endpoint |
Question 33 |
A | lsenv |
B | getargs |
C | env |
D | lsshell |
E | ls |
Question 34 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Eqach department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where would you place the Layer 2 and Layer 3 switches? Click on the image to enlarge.
A | Layer 2 at C7 and Layer 3 at C6 |
B | Layer 2 at C10 and Layer 3 at C12 |
C | Layer 2 at C5 and Layer 3 at C6 |
D | Layer 2 at C8 and Layer 3 at C6 |
E | Layer 2 at C6 and Layer 3 at C6 |
Question 35 |
A | Attenuation increases |
B | Throughput decreases |
C | Connection speeds decrease |
D | Cell size increases |
Question 36 |
A | Port scanning |
B | Log scanning |
C | Baseline review |
D | Packet capturing |
Question 37 |
A | CHAP |
B | MAC filtering |
C | MS-CHAP |
D | Digital signatures |
Question 38 |
A | WPA2 |
B | Behavior-based IPS |
C | DMZ |
D | Signature-based IPS |
E | Honeypots |
Question 39 |
A | MPLS |
B | CSMA/CA |
C | OSPF |
D | CSMA/CD |
Question 40 |
SSID: SANUJA-WiFi
Signal: 5%
SNR: 2
A | Channel overlap |
B | Latency |
C | Overcapacity |
D | Incorrect antenna type |
Question 41 |
A | Inventory management |
B | Network log files |
C | Change management records |
D | Logical diagrams |
Question 42 |
A | White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown. Brown |
B | White/Green, Green, White/Blue, Blue, White/Orange, Orange, White/Brown. Brown |
C | White/Orange, Orange, White/Brown, Blue, White/Blue, Green, White/Green, Brown |
D | White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown |
E | White/Blue, Orange, White/Green, Blue, White/Orange, Green, White/Brown, Brown |
Question 43 |
A | Switch to AP |
B | PC to switch |
C | PC to PC |
D | Router to switch |
E | Router to modem |
Question 44 |
A | IDS |
B | IPS |
C | Network tap |
D | Hub |
E | Switch |
F | Router |
Question 45 |
A | IPv6 |
B | EIGRP |
C | ICMP |
D | UDP |
Question 46 |
A | Datagram Transport Layer Security (DTLS) |
B | TFTP |
C | DTLS |
D | SNMP |
E | DNS |
Question 47 |
A | Install a power conditioner |
B | Install a new electrical circuit |
C | Install a new switch |
D | Install a UPS |
E | Replace the switch uplink cable |
Question 48 |
A | Router |
B | Firewall |
C | Multiplayer switch |
D | Bridge |
Question 49 |
A | LC |
B | SC |
C | ST |
D | MT-RJ |
Question 50 |
A | Distance |
B | Absorption |
C | Attenuation |
D | Reflection |
E | Refraction |
Question 51 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Each department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where should the router be palced? Click on the image to enlarge.
A | C7 |
B | C5 |
C | C6 |
D | C8 |
E | C10 |
Question 52 |
A | Network performance baseline |
B | Logical and physical diagrams |
C | Rack diagram |
D | IDF/MDF documentation |
Question 53 |
A | Router |
B | Switch |
C | Modem |
D | Hub |
Question 54 |
A | EIGRP |
B | BGP |
C | OSPF |
D | RIP |
Question 55 |
A | TPM |
B | WAF |
C | WPA |
D | DLP |
E | IDS |
Question 56 |
A | MT-RJ |
B | ST |
C | SC |
D | LC |
Question 57 |
A | 256 bits |
B | 64 bits |
C | 128 bits |
D | 32 bits |
Question 58 |
A | 94:9E:FE:EE:8C:DF |
B | 44:98:3E:F8:33:23 |
C | 56:AD:BX:89:55:54 |
D | AA:CE:58:FD:90:08 |
Question 59 |
A | ATM |
B | PPP |
C | Frame relay |
D | MPLS |
Question 60 |
A | Logic bomb |
B | Insider threat |
C | Man-in-the-middle |
D | Social engineering |
Question 61 |
A | A missing route on the network routers |
B | Incorrect speed/duplex setting on the alarm device |
C | Incorrect VLAN assignment on the router |
D | A missing route on the alarm device |
Question 62 |
A | Packet loss |
B | Attenuation |
C | Latency |
D | Interference |
E | Signal-to-noise ratio |
F | Reflection |
Question 63 |
A | Public IP |
B | Reserved IP |
C | Virtual IP |
D | Loopback IP |
Question 64 |
A | CHAP |
B | MS-CHAP |
C | Kerberos |
D | NTLM |
Question 65 |
A | The LWAPP image is installed on the WAP |
B | The terminal emulation software is misconfigured |
C | The WAP transmitter light is dim |
D | The WAP antenna is damaged |
Question 66 |
A | Syslog |
B | Placement map |
C | Environmental monitor |
D | Network map |
Question 67 |
A | Those servers have host-based firewalls |
B | Some of the servers are configured to use different gateways |
C | New servers are being provisioned in the cloud |
D | Part of the subnet is configured to use different VLANs |
Question 68 |
A | Allow traffic from the wireless access point |
B | Packet filtering on the wireless access point |
C | Content filtering on the wireless access point |
D | Block traffic from the wireless access point |
Question 69 |
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40
Which is true about the above configuration?
A | Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. |
B | An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
C | An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
D | Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client. |
Question 70 |
A | Interference |
B | DHCP exhaustion |
C | Overcapacity |
D | Channel overlapping |
Question 71 |
A | Ticket |
B | Token |
C | Time |
D | Certificate |
Question 72 |
A | SaaS |
B | PaaS |
C | CASB |
D | IaaS |
Question 73 |
A | CAT5e |
B | Fiber |
C | CAT6a |
D | CAT3 |
Question 74 |
A | WEP is not well supported |
B | WEP’s IV is too small |
C | WEP uses RC4 which is easily accessible and not secure |
D | WEP uses plain text |
Question 75 |
A | MTU mismatch |
B | IP addresses |
C | Switching loop |
D | STP blocking |
Question 76 |
A | Broadcast storm |
B | Excessive bandwidth usage |
C | Power failure |
D | STP convergence |
Question 77 |
A | Shared secret keys |
B | AES encryption |
C | Key rotation |
D | MAC filtering |
E | Strong RC4 encryption |
Question 78 |
A | Multimode |
B | UTP |
C | Serial |
D | Coaxial |
Question 79 |
A | Username + password |
B | Key fob + ID card |
C | Fingerprint + retina scan |
D | Smart card + PIN |
Question 80 |
A | 192.168.0.192/24 |
B | 172.16.20.0/30 |
C | 192.1.0.124/30 |
D | 10.10.50.0/30 |
E | 192.170.10.0/24 |
Question 81 |
A | MT-RJ |
B | BNC |
C | F-type |
D | GBIC |
Question 82 |
A | Out-of-band management |
B | HTTPS management URL |
C | Router ACL |
D | Client-to-site VPN |
Question 83 |
A | FEEF:/12 |
B | FE80::/10 |
C | FF00::/8 |
D | 2FFE::/16 |
Question 84 |
A | ST |
B | SC |
C | MT-RJ |
D | LC |
Question 85 |
A | AUP |
B | NDA |
C | SOP |
D | SLA |
Question 86 |
A | Fall back to the old switch |
B | Transpose the fiber pairs |
C | Replace SFP with a new one |
D | Replace multimode with single-mode cable |
Question 87 |
IP address: 172.16.204.12
Subnet Mask: 255.255.0.0
Default Gateway: 172.15.204.254
DNS address: 172.16.204.1
Broadcast address: 172.16.255.255
A | DNS address |
B | Subnet mask |
C | Default gateway |
D | Broadcast address |
E | IP address |
Question 88 |
A | Enable access point antenna isolation |
B | Enable wireless multimedia (WMM) for QoS |
C | Limit the clients to 802.11g compatible laptops |
D | Use the 40MHz channels in the 2.4GHz band |
Question 89 |
A | MIMO |
B | 802.1x |
C | WPA |
D | IPsec |
E | FIFO |
Question 90 |
A | 61.23.168.192.in-addr.arpa |
B | 00:f3:82:99:a2:b8 |
C | 3ffe:1900:4545:3:200:f8ff:fe21:67cf |
D | 192.168.2.1 |
Question 91 |
A | Spear phishing |
B | Whaling |
C | Impersonation |
D | Privilege escalation |
Question 92 |
A | IDF |
B | CSU/DSU |
C | MDF |
D | Switch |
Question 93 |
A | Subnetting |
B | Unicast |
C | Broadcast |
D | Multicast |
Question 94 |
A | MTU size greater than 10000 |
B | Commonly used on SAN |
C | MTU size greater than 1500 |
D | MTU size greater than 12000 |
E | Commonly used on IaaS |
Question 95 |
A | tracert |
B | ping |
C | route |
D | tcpdump |
E | netstat |
F | nslookup |
G | pathping |
Question 96 |
Department-VLAN#-Subnet used
Marketing-20-192.168.20.0/28
Customer Service-25-192.168.20.64/28
Finance-30-192.168.30.0/28
WHSE-35-192.168.30.16/28
Sales-40-192.168.3.16/28
The users experiencing this issue need to be added to which of the following VLANs?
A | 25 |
B | 35 |
C | 40 |
D | 30 |
Question 97 |
A | Add a router and enable OSPF. |
B | Add a bridge between two switches. |
C | Add a layer 3 switch and create a VLAN. |
D | Add a firewall and implement proper ACL. |
Question 98 |
A | Allows another connection to the router |
B | Increases port speed |
C | Segments broadcast traffic |
D | Decreases bandwidth on a network |
Question 99 |
A | route |
B | pathping |
C | nslookup |
D | nmap |
Question 100 |
A | TCP port 22 |
B | TCP port 25 |
C | UDP port 69 |
D | UDP port 22 |
E | UDP port 53 |
Question 101 |
A | Used to determine which port a CAT6 cable is connected. |
B | Used to verify known good patch cables. |
C | Used to verify functionality after a NIC is installed. |
D | Used to correct open short on a cable. |
E | Used to terminate a cable at a 110 block. |
Question 102 |
A | Logical diagram |
B | Change management log |
C | Physical diagram |
D | Network baseline |
Question 103 |
A | Switches packets between different subnets based on IP addresses |
B | Switches packets within the same subnet based on MAC addresses |
C | Switches packets between different subnets based on MAC addresses |
D | Switches packets between same subnets based on IP addresses |
Question 104 |
A | The object identifier is modified and reported during the next monitoring cycle |
B | A trap message is sent via UDP to the monitoring workstation |
C | A response message is sent from the agent to the manager |
D | The SET function pushes an alert to the MIB database |
Question 105 |
A | IPS |
B | Port scan |
C | Packet sniffer |
D | IDS |
Question 106 |
A | Private certificate |
B | HTTPS server |
C | Shared secret |
D | Soft spoken |
Question 107 |
A | Use TFTP to transfer files to corporate resources |
B | Connect utilizing client-to-site VPN |
C | Allow RDP through an external firewall |
D | Utilize an SSH connection to the corporate server |
Question 108 |
A | NAS |
B | Fibre Channel |
C | iSCSI |
D | InfiniBand |
Question 109 |
A | SC |
B | MT-RJ |
C | ST |
D | LC |
Question 110 |
A | Full mesh |
B | Bus |
C | Ring |
D | Partial mesh |
E | Hub and spoke |
Question 111 |
A | ACL allowing only Telnet |
B | Out-of-band console router |
C | Out-of-band modem |
D | ACL allowing only HTTP |
Question 112 |
A | Restart the web server |
B | Change service port 636 to port 389 |
C | Verify the browser is using port 443 |
D | Check port 636 to see if it is being blocked |
Question 113 |
A | Differential backup |
B | Hot site |
C | Full backup |
D | Cold site |
E | Incremental backup |
F | Warm site |
Question 114 |
A | MX |
B | CNAME |
C | NS |
D | SRV |
E | PTR |
Question 115 |
A | Security type mismatch |
B | Distance limitations |
C | Latency |
D | Absorption |
Question 116 |
A | A network built with Logical Topology |
B | A network built with Bus Topology |
C | A network built with Ring Topology |
D | A network built with Mesh Topology |
E | A network built with Star Topology |
Question 117 |
A | PVC Cat 5 |
B | Plenum Cat 6a |
C | PVC Cat 7 |
D | Plenum Cat 5e |
Question 118 |
A | The users have incompatible wireless network cards and should upgrade. |
B | The default idle period for logoff is too short and should be changed to a longer limit. |
C | The SSIDs are incompatible and should be renamed. |
D | The channels are overlapping with other wireless networks and should be changed. |
Question 119 |
A | Channel bonding |
B | Gigabit wireless bandwidth |
C | Channel expansion |
D | Multipath support |
Question 120 |
A | BYOD policy |
B | Remote access policy |
C | DLP policy |
D | Incident response policy |
Question 121 |
A | Ping |
B | Protocol analyzer |
C | Nessus |
D | Baseline analyzer |
Question 122 |
A | The network administrator should install and configure a syslog server |
B | The network administrator should install and configure a network sniffer |
C | The network administrator should install and configure a DMZ server |
D | The network administrator should install and configure a traffic analysis server |
Question 123 |
A | Blocking |
B | Forwarding |
C | Disabled |
D | Learning |
Question 124 |
A | 2, 5, 10 |
B | 4, 8, 16 |
C | 3, 13, 23 |
D | 1, 6, 11 |
Question 125 |
A | Upgrade the firmware on the firewall. |
B | Remove unnecessary testing accounts. |
C | Issue a new self-signed certificate. |
D | Disable the HTTP port in the host firewall. |
E | Generate new SSH host keys. |
Question 126 |
A | Point-to-point |
B | Point-to-multipoint |
C | Hybrid |
D | Peer-to-peer |
Question 127 |
A | CDP |
B | IPSec |
C | SNMPv3 |
D | VTP |
Question 128 |
A | The technician should connect the machine to its own separate switch. |
B | The technician should add a route in each virtual machine to the default gateway. |
C | The technician should configure a virtual switch. |
D | The technician should set up individual routes between the machines. |
Question 129 |
A | SMTP |
B | IMAP |
C | LDAP |
D | NTP |
E | POP3 |
Question 130 |
A | OTDR |
B | Punch down tool |
C | Environmental monitor |
D | Cable tester |
Question 131 |
A | T3 |
B | DS3 |
C | E3 |
D | OC3 |
Question 132 |
Cable | Test | Result |
---|---|---|
1.2 | Open | 7ft |
3.6 | Short | 7ft |
4.5 | Open | 7ft |
7.8 | Open | 7ft |
A | Toner Probe |
B | Protocol Analyzer |
C | Multimeter |
D | Punch Down Tool |
E | OTDR |
F | Cable Certifier |
G | Crimper |
Question 133 |
A | Flood guard |
B | BPDU guard |
C | DHCP snooping |
D | Spanning tree |
Question 134 |
A | Allow UDP port 3389 outbound |
B | Allow UDP port 3389 inbound |
C | Allow TCP port 3389 outbound |
D | Allow TCP port 3389 inbound |
Question 135 |
A | PKI should be turned off |
B | WPA should be enabled |
C | WAPs are transmitting on same channel |
D | WAP SSIDs are matching |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.