← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set II
CompTIA Network+ N10-007 - Set III
Congratulations - you have completed CompTIA Network+ N10-007 - Set III.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | iSCSI |
B | Fibre Channel |
C | InfiniBand |
D | NAS |
Question 2 |
A | Access point |
B | Range extender |
C | Router |
D | VoIP endpoint |
Question 3 |
A | Network map |
B | Syslog |
C | Placement map |
D | Environmental monitor |
Question 4 |
A | MIMO |
B | FIFO |
C | IPsec |
D | WPA |
E | 802.1x |
Question 5 |
A | Install a new electrical circuit |
B | Replace the switch uplink cable |
C | Install a UPS |
D | Install a new switch |
E | Install a power conditioner |
Question 6 |
A | Smurf attack |
B | NMAP |
C | Social engineering |
D | MITM |
E | Buffer overflow attack |
Question 7 |
A | Wireless access point |
B | Wireless bridge |
C | Wireless hub |
D | Wireless firewall |
Question 8 |
A | PVC Cat 5 |
B | PVC Cat 7 |
C | Plenum Cat 5e |
D | Plenum Cat 6a |
Question 9 |
A | STP convergence |
B | Power failure |
C | Excessive bandwidth usage |
D | Broadcast storm |
Question 10 |
A | STP blocking |
B | IP addresses |
C | MTU mismatch |
D | Switching loop |
Question 11 |
A | AES encryption |
B | MAC filtering |
C | Key rotation |
D | Strong RC4 encryption |
E | Shared secret keys |
Question 12 |
A | 44:98:3E:F8:33:23 |
B | 94:9E:FE:EE:8C:DF |
C | AA:CE:58:FD:90:08 |
D | 56:AD:BX:89:55:54 |
Question 13 |
A | Upgrade the firmware on the firewall. |
B | Issue a new self-signed certificate. |
C | Remove unnecessary testing accounts. |
D | Generate new SSH host keys. |
E | Disable the HTTP port in the host firewall. |
Question 14 |
A | Privilege escalation |
B | Spear phishing |
C | Whaling |
D | Impersonation |
Question 15 |
A | CSMA/CA |
B | MPLS |
C | OSPF |
D | CSMA/CD |
Question 16 |
A | 4, 8, 16 |
B | 2, 5, 10 |
C | 3, 13, 23 |
D | 1, 6, 11 |
Question 17 |
A | ping |
B | tcpdump |
C | tracert |
D | route |
E | nslookup |
F | pathping |
G | netstat |
Question 18 |
A | Change service port 636 to port 389 |
B | Restart the web server |
C | Verify the browser is using port 443 |
D | Check port 636 to see if it is being blocked |
Question 19 |
A | TLS |
B | Remote file access |
C | HTTPS |
D | Split tunneling |
Question 20 |
A | WEP is not well supported |
B | WEP uses plain text |
C | WEP uses RC4 which is easily accessible and not secure |
D | WEP’s IV is too small |
Question 21 |
A | Channel overlapping |
B | Interference |
C | Overcapacity |
D | DHCP exhaustion |
Question 22 |
A | The network administrator should install and configure a network sniffer |
B | The network administrator should install and configure a traffic analysis server |
C | The network administrator should install and configure a DMZ server |
D | The network administrator should install and configure a syslog server |
Question 23 |
A | UDP port 22 |
B | TCP port 22 |
C | UDP port 69 |
D | TCP port 25 |
E | UDP port 53 |
Question 24 |
A | Broadcast |
B | Unicast |
C | Subnetting |
D | Multicast |
Question 25 |
A | Add a layer 3 switch and create a VLAN. |
B | Add a router and enable OSPF. |
C | Add a firewall and implement proper ACL. |
D | Add a bridge between two switches. |
Question 26 |
IP address: 172.16.204.12
Subnet Mask: 255.255.0.0
Default Gateway: 172.15.204.254
DNS address: 172.16.204.1
Broadcast address: 172.16.255.255
A | DNS address |
B | IP address |
C | Broadcast address |
D | Default gateway |
E | Subnet mask |
Question 27 |
A | Install antivirus software and set an ACL on the servers |
B | Install a BPDU guard on switchports and enable STP |
C | Create a DMZ for public servers and secure a segment for the internal network |
D | Create a VLAN for the unused ports and create a honeyspot on the VLAN |
Question 28 |
A | Packet capturing |
B | Port scanning |
C | Log scanning |
D | Baseline review |
Question 29 |
A | Shared secret |
B | Private certificate |
C | HTTPS server |
D | Soft spoken |
Question 30 |
A | MT-RJ |
B | F-type |
C | BNC |
D | GBIC |
Question 31 |
A | 802.11ac |
B | Z-Wave |
C | 802.11b |
D | 802.11g |
E | 802.11n |
Question 32 |
A | Fiber |
B | CAT3 |
C | CAT6a |
D | CAT5e |
Question 33 |
A | LC |
B | MT-RJ |
C | ST |
D | SC |
Question 34 |
A | Cable tester |
B | Environmental monitor |
C | OTDR |
D | Punch down tool |
Question 35 |
A | BYOD policy |
B | DLP policy |
C | Incident response policy |
D | Remote access policy |
Question 36 |
| Cable | Test | Result |
|---|---|---|
| 1.2 | Open | 7ft |
| 3.6 | Short | 7ft |
| 4.5 | Open | 7ft |
| 7.8 | Open | 7ft |
A | Crimper |
B | Multimeter |
C | Protocol Analyzer |
D | OTDR |
E | Punch Down Tool |
F | Toner Probe |
G | Cable Certifier |
Question 37 |
A | Rogue access points |
B | DoS attacks |
C | Phishing |
D | Man-in-the-middle attacks |
Question 38 |
A | NTP |
B | Traffic shaping |
C | NAC |
D | SDN |
E | ACL |
Question 39 |
A | Used to verify known good patch cables. |
B | Used to determine which port a CAT6 cable is connected. |
C | Used to verify functionality after a NIC is installed. |
D | Used to correct open short on a cable. |
E | Used to terminate a cable at a 110 block. |
Question 40 |
A | The technician should add a route in each virtual machine to the default gateway. |
B | The technician should connect the machine to its own separate switch. |
C | The technician should configure a virtual switch. |
D | The technician should set up individual routes between the machines. |
Question 41 |
A | Blocking |
B | Forwarding |
C | Disabled |
D | Learning |
Question 42 |
A | Change management log |
B | Network baseline |
C | Physical diagram |
D | Logical diagram |
Question 43 |
A | DHCP snooping |
B | Flood guard |
C | BPDU guard |
D | Spanning tree |
Question 44 |
A | Increase the signal |
B | MIMO |
C | Disable SSID |
D | Channel bonding |
Question 45 |
A | The SET function pushes an alert to the MIB database |
B | The object identifier is modified and reported during the next monitoring cycle |
C | A response message is sent from the agent to the manager |
D | A trap message is sent via UDP to the monitoring workstation |
Question 46 |
A | SCTP |
B | Packet sniffer |
C | DCCP |
D | Simple Network Management Protocol (SNMP) |
E | SNMP |
Question 47 |
A | Managed switch |
B | IDS |
C | Router |
D | Bridge |
E | Firewall |
Question 48 |
A | IMAP |
B | SMTP |
C | NTP |
D | LDAP |
E | POP3 |
Question 49 |
A | IPsec |
B | APIPA |
C | MAC reservations |
D | IPv4 to IPv6 tunnel |
E | EUI-64 |
Question 50 |
A | The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem |
B | The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem |
C | The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router |
D | The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router |
Question 51 |
A | Channel expansion |
B | Channel bonding |
C | Gigabit wireless bandwidth |
D | Multipath support |
Question 52 |
A | Replace multimode with single-mode cable |
B | Fall back to the old switch |
C | Transpose the fiber pairs |
D | Replace SFP with a new one |
Question 53 |
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40
Which is true about the above configuration?
A | Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. |
B | An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
C | An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
D | Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client. |
Question 54 |
A | Fiber cable mismatch |
B | Bend radius exceeded |
C | Fiber type mismatch |
D | Bad fiber switch |
Question 55 |
A | MAC filtering |
B | Digital signatures |
C | CHAP |
D | MS-CHAP |
Question 56 |
A | CSU/DSU |
B | Switch |
C | IDF |
D | MDF |
Question 57 |
A | Absorption |
B | Security type mismatch |
C | Distance limitations |
D | Latency |
Question 58 |
A | Throughput decreases |
B | Connection speeds decrease |
C | Attenuation increases |
D | Cell size increases |
Question 59 |
A | PC to switch |
B | Switch to AP |
C | Router to switch |
D | PC to PC |
E | Router to modem |
Question 60 |
A | Motion detection |
B | Smart card reader |
C | Biometric locks |
D | Asset tracking tags |
Question 61 |
A | Baseline report |
B | Vulnerability report |
C | Business continuity plan |
D | Rollback plan |
Question 62 |
A | Those servers have host-based firewalls |
B | New servers are being provisioned in the cloud |
C | Part of the subnet is configured to use different VLANs |
D | Some of the servers are configured to use different gateways |
Question 63 |
A | SNMP |
B | SSH |
C | QoS |
D | L2TP |
Question 64 |
A | LC |
B | SC |
C | MT-RJ |
D | ST |
Question 65 |
A | Router |
B | Multiplayer switch |
C | Bridge |
D | Firewall |
Question 66 |
A | Protocol analyzer |
B | Ping |
C | Baseline analyzer |
D | Nessus |
Question 67 |
A | WAF |
B | IDS |
C | TPM |
D | WPA |
E | DLP |
Question 68 |
A | Out-of-band modem |
B | ACL allowing only HTTP |
C | ACL allowing only Telnet |
D | Out-of-band console router |
Question 69 |
A | 192.1.0.124/30 |
B | 192.168.0.192/24 |
C | 192.170.10.0/24 |
D | 172.16.20.0/30 |
E | 10.10.50.0/30 |
Question 70 |
A | Connect utilizing client-to-site VPN |
B | Allow RDP through an external firewall |
C | Utilize an SSH connection to the corporate server |
D | Use TFTP to transfer files to corporate resources |
Question 71 |
A | CASB |
B | PaaS |
C | SaaS |
D | IaaS |
Question 72 |
A | 61.23.168.192.in-addr.arpa |
B | 3ffe:1900:4545:3:200:f8ff:fe21:67cf |
C | 00:f3:82:99:a2:b8 |
D | 192.168.2.1 |
Question 73 |
A | The WAP transmitter light is dim |
B | The LWAPP image is installed on the WAP |
C | The WAP antenna is damaged |
D | The terminal emulation software is misconfigured |
Question 74 |
A | SLA |
B | AUP |
C | SOP |
D | NDA |
Question 75 |
A | ST |
B | LC |
C | MT-RJ |
D | SC |
Question 76 |
A | Smart card + PIN |
B | Username + password |
C | Fingerprint + retina scan |
D | Key fob + ID card |
Question 77 |
A | IDS |
B | Port scan |
C | Packet sniffer |
D | IPS |
Question 78 |
A | Change the channel on the access point to channel 11 |
B | Turn off as many lights in the executive’s office as possible to reduce interference |
C | Replace the 802.11n access point in the office with an 802.11a access point |
D | Turn off SSID broadcasting for the executive’s access point |
Question 79 |
A | RIP |
B | EIGRP |
C | BGP |
D | OSPF |
Question 80 |
A | Commonly used on IaaS |
B | MTU size greater than 1500 |
C | MTU size greater than 10000 |
D | Commonly used on SAN |
E | MTU size greater than 12000 |
Question 81 |
A | Packet loss |
B | Signal-to-noise ratio |
C | Attenuation |
D | Interference |
E | Reflection |
F | Latency |
Question 82 |
A | Network log files |
B | Logical diagrams |
C | Inventory management |
D | Change management records |
Question 83 |
A | White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown. Brown |
B | White/Orange, Orange, White/Brown, Blue, White/Blue, Green, White/Green, Brown |
C | White/Blue, Orange, White/Green, Blue, White/Orange, Green, White/Brown, Brown |
D | White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown |
E | White/Green, Green, White/Blue, Blue, White/Orange, Orange, White/Brown. Brown |
Question 84 |
A | Data link |
B | Transport |
C | Session |
D | Network |
E | Physical |
Question 85 |
A | Hybrid |
B | Link state |
C | Static |
D | Distance vector |
Question 86 |
A | IDF/MDF documentation |
B | Rack diagram |
C | Logical and physical diagrams |
D | Network performance baseline |
Question 87 |
A | Partial mesh |
B | Ring |
C | Full mesh |
D | Hub and spoke |
E | Bus |
Question 88 |
SSID: SANUJA-WiFi
Signal: 5%
SNR: 2
A | Channel overlap |
B | Overcapacity |
C | Incorrect antenna type |
D | Latency |
Question 89 |
A | Yagi |
B | Parabolic |
C | Omnidirectional |
D | Unidirectional |
Question 90 |
A | Spanning tree |
B | ARP protection |
C | DHCP snooping |
D | BPDU guard |
Question 91 |
A | Full backup |
B | Warm site |
C | Hot site |
D | Incremental backup |
E | Differential backup |
F | Cold site |
Question 92 |
A | T3 |
B | E3 |
C | OC3 |
D | DS3 |
Question 93 |
A | Point-to-multipoint |
B | Peer-to-peer |
C | Hybrid |
D | Point-to-point |
Question 94 |
A | Frame relay |
B | MPLS |
C | ATM |
D | PPP |
Question 95 |
A | IPSec |
B | VTP |
C | CDP |
D | SNMPv3 |
Question 96 |
A | 162.17.43.22 |
B | 132.216.14.184 |
C | 172.23.226.34 |
D | 152.119.25.213 |
Question 97 |
A | Router |
B | Switch |
C | Modem |
D | Hub |
Question 98 |
Department-VLAN#-Subnet used
Marketing-20-192.168.20.0/28
Customer Service-25-192.168.20.64/28
Finance-30-192.168.30.0/28
WHSE-35-192.168.30.16/28
Sales-40-192.168.3.16/28
The users experiencing this issue need to be added to which of the following VLANs?
A | 35 |
B | 40 |
C | 25 |
D | 30 |
Question 99 |
A | SC |
B | ST |
C | MT-RJ |
D | LC |
Question 100 |
A | DNS poisoning |
B | Reflective |
C | Evil twin |
D | Ransomware |
E | Man-in-the-middle |
F | ARP poisoning |
Question 101 |
A | WAP SSIDs are matching |
B | PKI should be turned off |
C | WAPs are transmitting on same channel |
D | WPA should be enabled |
Question 102 |
A | Social engineering |
B | Logic bomb |
C | Man-in-the-middle |
D | Insider threat |
Question 103 |
A | Allow TCP port 3389 inbound |
B | Allow UDP port 3389 inbound |
C | Allow TCP port 3389 outbound |
D | Allow UDP port 3389 outbound |
Question 104 |
A | Baseline review |
B | Port scanning |
C | Packet capturing |
D | Log scanning |
Question 105 |
A | RIP |
B | OSPF |
C | BGP |
D | EIGRP |
Question 106 |
A | CARP |
B | ISAKMP |
C | PPTP |
D | FTP |
E | L2TP |
Question 107 |
A | MX |
B | SRV |
C | PTR |
D | CNAME |
E | NS |
Question 108 |
A | Reserved IP |
B | Loopback IP |
C | Virtual IP |
D | Public IP |
Question 109 |
A | Attenuation |
B | Refraction |
C | Reflection |
D | Absorption |
E | Distance |
Question 110 |
A | IPv6 |
B | ICMP |
C | EIGRP |
D | UDP |
Question 111 |
A | Kerberos |
B | CHAP |
C | MS-CHAP |
D | NTLM |
Question 112 |
A | Layer 3 |
B | Layer 4 |
C | Layer 7 |
D | Layer 1 |
E | Layer 6 |
F | Layer 2 |
G | Layer 5 |
Question 113 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Each department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where should the router be palced? Click on the image to enlarge.
A | C10 |
B | C7 |
C | C8 |
D | C5 |
E | C6 |
Question 114 |
A | Out-of-band management |
B | Client-to-site VPN |
C | HTTPS management URL |
D | Router ACL |
Question 115 |
A | Ticket |
B | Token |
C | Time |
D | Certificate |
Question 116 |
A | Ring |
B | Star |
C | WLAN |
D | Bus |
Question 117 |
A | A network built with Logical Topology |
B | A network built with Bus Topology |
C | A network built with Ring Topology |
D | A network built with Mesh Topology |
E | A network built with Star Topology |
Question 118 |
A | A missing route on the network routers |
B | Incorrect VLAN assignment on the router |
C | Incorrect speed/duplex setting on the alarm device |
D | A missing route on the alarm device |
Question 119 |
A | 256 bits |
B | 32 bits |
C | 64 bits |
D | 128 bits |
Question 120 |
A | Multimode |
B | Coaxial |
C | UTP |
D | Serial |
Question 121 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Eqach department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where would you place the Layer 2 and Layer 3 switches? Click on the image to enlarge.
A | Layer 2 at C6 and Layer 3 at C6 |
B | Layer 2 at C5 and Layer 3 at C6 |
C | Layer 2 at C10 and Layer 3 at C12 |
D | Layer 2 at C7 and Layer 3 at C6 |
E | Layer 2 at C8 and Layer 3 at C6 |
Question 122 |
A | Switch |
B | Hub |
C | Router |
D | IPS |
E | IDS |
F | Network tap |
Question 123 |
A | route |
B | pathping |
C | nmap |
D | nslookup |
Question 124 |
A | TFTP |
B | Datagram Transport Layer Security (DTLS) |
C | SNMP |
D | DTLS |
E | DNS |
Question 125 |
A | lsenv |
B | ls |
C | lsshell |
D | getargs |
E | env |
Question 126 |
A | The channels are overlapping with other wireless networks and should be changed. |
B | The default idle period for logoff is too short and should be changed to a longer limit. |
C | The SSIDs are incompatible and should be renamed. |
D | The users have incompatible wireless network cards and should upgrade. |
Question 127 |
A | FEEF:/12 |
B | FE80::/10 |
C | FF00::/8 |
D | 2FFE::/16 |
Question 128 |
A | Allow traffic from the wireless access point |
B | Block traffic from the wireless access point |
C | Packet filtering on the wireless access point |
D | Content filtering on the wireless access point |
Question 129 |
A | Enable wireless multimedia (WMM) for QoS |
B | Use the 40MHz channels in the 2.4GHz band |
C | Enable access point antenna isolation |
D | Limit the clients to 802.11g compatible laptops |
Question 130 |
A | Absorption |
B | Reflection |
C | Frequency mismatch |
D | Channel overlap |
Question 131 |
A | Switches packets within the same subnet based on MAC addresses |
B | Switches packets between different subnets based on MAC addresses |
C | Switches packets between same subnets based on IP addresses |
D | Switches packets between different subnets based on IP addresses |
Question 132 |
A | DMZ |
B | Honeypots |
C | WPA2 |
D | Behavior-based IPS |
E | Signature-based IPS |
Question 133 |
A | RDP |
B | NTP |
C | HTTP |
D | SMTP |
Question 134 |
A | Bus |
B | Ring |
C | Star |
D | Mesh |
Question 135 |
A | Decreases bandwidth on a network |
B | Increases port speed |
C | Allows another connection to the router |
D | Segments broadcast traffic |
← |
List |
→ |
| 1 | 2 | 3 | 4 | 5 |
| 6 | 7 | 8 | 9 | 10 |
| 11 | 12 | 13 | 14 | 15 |
| 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 |
| 26 | 27 | 28 | 29 | 30 |
| 31 | 32 | 33 | 34 | 35 |
| 36 | 37 | 38 | 39 | 40 |
| 41 | 42 | 43 | 44 | 45 |
| 46 | 47 | 48 | 49 | 50 |
| 51 | 52 | 53 | 54 | 55 |
| 56 | 57 | 58 | 59 | 60 |
| 61 | 62 | 63 | 64 | 65 |
| 66 | 67 | 68 | 69 | 70 |
| 71 | 72 | 73 | 74 | 75 |
| 76 | 77 | 78 | 79 | 80 |
| 81 | 82 | 83 | 84 | 85 |
| 86 | 87 | 88 | 89 | 90 |
| 91 | 92 | 93 | 94 | 95 |
| 96 | 97 | 98 | 99 | 100 |
| 101 | 102 | 103 | 104 | 105 |
| 106 | 107 | 108 | 109 | 110 |
| 111 | 112 | 113 | 114 | 115 |
| 116 | 117 | 118 | 119 | 120 |
| 121 | 122 | 123 | 124 | 125 |
| 126 | 127 | 128 | 129 | 130 |
| 131 | 132 | 133 | 134 | 135 |
| End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.



