← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set II
CompTIA Network+ N10-007 - Set III
Congratulations - you have completed CompTIA Network+ N10-007 - Set III.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Simple Network Management Protocol (SNMP) |
B | Packet sniffer |
C | SNMP |
D | DCCP |
E | SCTP |
Question 2 |
A | VTP |
B | SNMPv3 |
C | IPSec |
D | CDP |
Question 3 |
A | MIMO |
B | 802.1x |
C | WPA |
D | FIFO |
E | IPsec |
Question 4 |
A | L2TP |
B | ISAKMP |
C | FTP |
D | PPTP |
E | CARP |
Question 5 |
A | The default idle period for logoff is too short and should be changed to a longer limit. |
B | The channels are overlapping with other wireless networks and should be changed. |
C | The users have incompatible wireless network cards and should upgrade. |
D | The SSIDs are incompatible and should be renamed. |
Question 6 |
A | MTU size greater than 10000 |
B | MTU size greater than 12000 |
C | Commonly used on IaaS |
D | MTU size greater than 1500 |
E | Commonly used on SAN |
Question 7 |
A | Connect utilizing client-to-site VPN |
B | Utilize an SSH connection to the corporate server |
C | Allow RDP through an external firewall |
D | Use TFTP to transfer files to corporate resources |
Question 8 |
A | Switches packets between different subnets based on MAC addresses |
B | Switches packets between same subnets based on IP addresses |
C | Switches packets between different subnets based on IP addresses |
D | Switches packets within the same subnet based on MAC addresses |
Question 9 |
A | UDP |
B | ICMP |
C | EIGRP |
D | IPv6 |
Question 10 |
A | Fibre Channel |
B | iSCSI |
C | InfiniBand |
D | NAS |
Question 11 |
A | Allow UDP port 3389 inbound |
B | Allow TCP port 3389 inbound |
C | Allow UDP port 3389 outbound |
D | Allow TCP port 3389 outbound |
Question 12 |
A | Decreases bandwidth on a network |
B | Allows another connection to the router |
C | Segments broadcast traffic |
D | Increases port speed |
Question 13 |
A | QoS |
B | SNMP |
C | SSH |
D | L2TP |
Question 14 |
A | Hub |
B | IDS |
C | IPS |
D | Router |
E | Switch |
F | Network tap |
Question 15 |
A | 192.1.0.124/30 |
B | 192.168.0.192/24 |
C | 172.16.20.0/30 |
D | 192.170.10.0/24 |
E | 10.10.50.0/30 |
Question 16 |
A | FEEF:/12 |
B | FE80::/10 |
C | FF00::/8 |
D | 2FFE::/16 |
Question 17 |
A | Broadcast |
B | Unicast |
C | Multicast |
D | Subnetting |
Question 18 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Eqach department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where would you place the Layer 2 and Layer 3 switches? Click on the image to enlarge.
A | Layer 2 at C6 and Layer 3 at C6 |
B | Layer 2 at C5 and Layer 3 at C6 |
C | Layer 2 at C7 and Layer 3 at C6 |
D | Layer 2 at C10 and Layer 3 at C12 |
E | Layer 2 at C8 and Layer 3 at C6 |
Question 19 |
A | Inventory management |
B | Change management records |
C | Network log files |
D | Logical diagrams |
Question 20 |
A | IMAP |
B | SMTP |
C | LDAP |
D | NTP |
E | POP3 |
Question 21 |
A | White/Green, Green, White/Blue, Blue, White/Orange, Orange, White/Brown. Brown |
B | White/Orange, Orange, White/Brown, Blue, White/Blue, Green, White/Green, Brown |
C | White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown. Brown |
D | White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown |
E | White/Blue, Orange, White/Green, Blue, White/Orange, Green, White/Brown, Brown |
Question 22 |
A | OSPF |
B | MPLS |
C | CSMA/CA |
D | CSMA/CD |
Question 23 |
A | Channel overlapping |
B | Overcapacity |
C | Interference |
D | DHCP exhaustion |
Question 24 |
A | PPP |
B | ATM |
C | MPLS |
D | Frame relay |
Question 25 |
A | Hybrid |
B | Point-to-multipoint |
C | Point-to-point |
D | Peer-to-peer |
Question 26 |
A | Wireless hub |
B | Wireless bridge |
C | Wireless firewall |
D | Wireless access point |
Question 27 |
A | Full mesh |
B | Bus |
C | Hub and spoke |
D | Ring |
E | Partial mesh |
Question 28 |
A | Gigabit wireless bandwidth |
B | Channel expansion |
C | Multipath support |
D | Channel bonding |
Question 29 |
A | AA:CE:58:FD:90:08 |
B | 56:AD:BX:89:55:54 |
C | 44:98:3E:F8:33:23 |
D | 94:9E:FE:EE:8C:DF |
Question 30 |
A | Link state |
B | Hybrid |
C | Distance vector |
D | Static |
Question 31 |
A | Used to verify known good patch cables. |
B | Used to determine which port a CAT6 cable is connected. |
C | Used to terminate a cable at a 110 block. |
D | Used to correct open short on a cable. |
E | Used to verify functionality after a NIC is installed. |
Question 32 |
A | env |
B | lsenv |
C | getargs |
D | lsshell |
E | ls |
Question 33 |
A | LC |
B | MT-RJ |
C | SC |
D | ST |
Question 34 |
A | Packet capturing |
B | Baseline review |
C | Port scanning |
D | Log scanning |
Question 35 |
A | Reserved IP |
B | Virtual IP |
C | Loopback IP |
D | Public IP |
Question 36 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Each department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where should the router be palced? Click on the image to enlarge.
A | C10 |
B | C6 |
C | C7 |
D | C5 |
E | C8 |
Question 37 |
A | The network administrator should install and configure a network sniffer |
B | The network administrator should install and configure a traffic analysis server |
C | The network administrator should install and configure a DMZ server |
D | The network administrator should install and configure a syslog server |
Question 38 |
A | Check port 636 to see if it is being blocked |
B | Verify the browser is using port 443 |
C | Restart the web server |
D | Change service port 636 to port 389 |
Question 39 |
A | Out-of-band console router |
B | Out-of-band modem |
C | ACL allowing only Telnet |
D | ACL allowing only HTTP |
Question 40 |
A | Forwarding |
B | Blocking |
C | Learning |
D | Disabled |
Question 41 |
A | RIP |
B | BGP |
C | OSPF |
D | EIGRP |
Question 42 |
A | Create a VLAN for the unused ports and create a honeyspot on the VLAN |
B | Install antivirus software and set an ACL on the servers |
C | Create a DMZ for public servers and secure a segment for the internal network |
D | Install a BPDU guard on switchports and enable STP |
Question 43 |
A | 152.119.25.213 |
B | 172.23.226.34 |
C | 162.17.43.22 |
D | 132.216.14.184 |
Question 44 |
A | Coaxial |
B | Serial |
C | Multimode |
D | UTP |
Question 45 |
A | TCP port 25 |
B | UDP port 22 |
C | UDP port 53 |
D | TCP port 22 |
E | UDP port 69 |
Question 46 |
A | Turn off as many lights in the executive’s office as possible to reduce interference |
B | Replace the 802.11n access point in the office with an 802.11a access point |
C | Turn off SSID broadcasting for the executive’s access point |
D | Change the channel on the access point to channel 11 |
Question 47 |
A | NTP |
B | HTTP |
C | RDP |
D | SMTP |
Question 48 |
A | OC3 |
B | DS3 |
C | T3 |
D | E3 |
Question 49 |
SSID: SANUJA-WiFi
Signal: 5%
SNR: 2
A | Latency |
B | Incorrect antenna type |
C | Overcapacity |
D | Channel overlap |
Question 50 |
A | Interference |
B | Reflection |
C | Packet loss |
D | Signal-to-noise ratio |
E | Attenuation |
F | Latency |
Question 51 |
A | Router |
B | Managed switch |
C | IDS |
D | Firewall |
E | Bridge |
Question 52 |
A | Bus |
B | Ring |
C | WLAN |
D | Star |
Question 53 |
A | Time |
B | Certificate |
C | Token |
D | Ticket |
Question 54 |
A | Rogue access points |
B | Phishing |
C | DoS attacks |
D | Man-in-the-middle attacks |
Question 55 |
A | Add a bridge between two switches. |
B | Add a router and enable OSPF. |
C | Add a layer 3 switch and create a VLAN. |
D | Add a firewall and implement proper ACL. |
Question 56 |
A | BPDU guard |
B | Spanning tree |
C | Flood guard |
D | DHCP snooping |
Question 57 |
A | Switch |
B | CSU/DSU |
C | IDF |
D | MDF |
Question 58 |
A | The WAP transmitter light is dim |
B | The LWAPP image is installed on the WAP |
C | The terminal emulation software is misconfigured |
D | The WAP antenna is damaged |
Question 59 |
A | STP blocking |
B | Switching loop |
C | IP addresses |
D | MTU mismatch |
Question 60 |
A | Log scanning |
B | Baseline review |
C | Port scanning |
D | Packet capturing |
Question 61 |
A | The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router |
B | The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router |
C | The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem |
D | The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem |
Question 62 |
A | The technician should connect the machine to its own separate switch. |
B | The technician should add a route in each virtual machine to the default gateway. |
C | The technician should configure a virtual switch. |
D | The technician should set up individual routes between the machines. |
Question 63 |
IP address: 172.16.204.12
Subnet Mask: 255.255.0.0
Default Gateway: 172.15.204.254
DNS address: 172.16.204.1
Broadcast address: 172.16.255.255
A | DNS address |
B | Broadcast address |
C | Default gateway |
D | IP address |
E | Subnet mask |
Question 64 |
A | ARP protection |
B | BPDU guard |
C | Spanning tree |
D | DHCP snooping |
Question 65 |
A | Man-in-the-middle |
B | Ransomware |
C | Evil twin |
D | DNS poisoning |
E | ARP poisoning |
F | Reflective |
Question 66 |
A | Business continuity plan |
B | Vulnerability report |
C | Baseline report |
D | Rollback plan |
Question 67 |
A | Access point |
B | Router |
C | VoIP endpoint |
D | Range extender |
Question 68 |
A | TLS |
B | Split tunneling |
C | HTTPS |
D | Remote file access |
Question 69 |
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40
Which is true about the above configuration?
A | An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
B | Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. |
C | An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
D | Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client. |
Question 70 |
A | SaaS |
B | PaaS |
C | IaaS |
D | CASB |
Question 71 |
A | Fall back to the old switch |
B | Transpose the fiber pairs |
C | Replace multimode with single-mode cable |
D | Replace SFP with a new one |
Question 72 |
A | Differential backup |
B | Hot site |
C | Incremental backup |
D | Warm site |
E | Cold site |
F | Full backup |
Question 73 |
A | Star |
B | Bus |
C | Mesh |
D | Ring |
Question 74 |
A | Modem |
B | Router |
C | Hub |
D | Switch |
Question 75 |
A | WAPs are transmitting on same channel |
B | PKI should be turned off |
C | WAP SSIDs are matching |
D | WPA should be enabled |
Question 76 |
A | Yagi |
B | Parabolic |
C | Unidirectional |
D | Omnidirectional |
Question 77 |
A | A response message is sent from the agent to the manager |
B | The SET function pushes an alert to the MIB database |
C | A trap message is sent via UDP to the monitoring workstation |
D | The object identifier is modified and reported during the next monitoring cycle |
Question 78 |
A | Enable wireless multimedia (WMM) for QoS |
B | Limit the clients to 802.11g compatible laptops |
C | Enable access point antenna isolation |
D | Use the 40MHz channels in the 2.4GHz band |
Question 79 |
A | AUP |
B | NDA |
C | SOP |
D | SLA |
Question 80 |
A | IPS |
B | IDS |
C | Packet sniffer |
D | Port scan |
Question 81 |
A | Connection speeds decrease |
B | Attenuation increases |
C | Cell size increases |
D | Throughput decreases |
Question 82 |
A | ST |
B | SC |
C | LC |
D | MT-RJ |
Question 83 |
A | A network built with Logical Topology |
B | A network built with Mesh Topology |
C | A network built with Ring Topology |
D | A network built with Star Topology |
E | A network built with Bus Topology |
Question 84 |
A | 2, 5, 10 |
B | 3, 13, 23 |
C | 4, 8, 16 |
D | 1, 6, 11 |
Question 85 |
A | Digital signatures |
B | CHAP |
C | MS-CHAP |
D | MAC filtering |
Question 86 |
A | MS-CHAP |
B | CHAP |
C | Kerberos |
D | NTLM |
Question 87 |
A | Layer 1 |
B | Layer 6 |
C | Layer 7 |
D | Layer 4 |
E | Layer 5 |
F | Layer 3 |
G | Layer 2 |
Question 88 |
A | Physical diagram |
B | Change management log |
C | Logical diagram |
D | Network baseline |
Question 89 |
A | Remove unnecessary testing accounts. |
B | Disable the HTTP port in the host firewall. |
C | Issue a new self-signed certificate. |
D | Upgrade the firmware on the firewall. |
E | Generate new SSH host keys. |
Question 90 |
A | WEP’s IV is too small |
B | WEP is not well supported |
C | WEP uses RC4 which is easily accessible and not secure |
D | WEP uses plain text |
Question 91 |
A | Reflection |
B | Distance |
C | Refraction |
D | Absorption |
E | Attenuation |
Question 92 |
A | IPv4 to IPv6 tunnel |
B | IPsec |
C | MAC reservations |
D | EUI-64 |
E | APIPA |
Question 93 |
A | Multiplayer switch |
B | Bridge |
C | Router |
D | Firewall |
Question 94 |
A | Man-in-the-middle |
B | Social engineering |
C | Logic bomb |
D | Insider threat |
Question 95 |
A | Content filtering on the wireless access point |
B | Packet filtering on the wireless access point |
C | Allow traffic from the wireless access point |
D | Block traffic from the wireless access point |
Question 96 |
A | Honeypots |
B | Behavior-based IPS |
C | WPA2 |
D | DMZ |
E | Signature-based IPS |
Question 97 |
A | NAC |
B | SDN |
C | ACL |
D | NTP |
E | Traffic shaping |
Question 98 |
A | IDS |
B | WPA |
C | DLP |
D | WAF |
E | TPM |
Question 99 |
A | Punch down tool |
B | Environmental monitor |
C | Cable tester |
D | OTDR |
Question 100 |
A | 32 bits |
B | 128 bits |
C | 64 bits |
D | 256 bits |
Question 101 |
A | Channel overlap |
B | Reflection |
C | Frequency mismatch |
D | Absorption |
Question 102 |
A | Syslog |
B | Placement map |
C | Network map |
D | Environmental monitor |
Question 103 |
A | Data link |
B | Network |
C | Session |
D | Transport |
E | Physical |
Question 104 |
A | Smart card reader |
B | Motion detection |
C | Biometric locks |
D | Asset tracking tags |
Question 105 |
A | Client-to-site VPN |
B | HTTPS management URL |
C | Router ACL |
D | Out-of-band management |
Question 106 |
A | AES encryption |
B | Strong RC4 encryption |
C | Shared secret keys |
D | Key rotation |
E | MAC filtering |
Question 107 |
A | MT-RJ |
B | SC |
C | LC |
D | ST |
Question 108 |
Cable | Test | Result |
---|---|---|
1.2 | Open | 7ft |
3.6 | Short | 7ft |
4.5 | Open | 7ft |
7.8 | Open | 7ft |
A | Protocol Analyzer |
B | Punch Down Tool |
C | Cable Certifier |
D | Multimeter |
E | OTDR |
F | Toner Probe |
G | Crimper |
Question 109 |
A | Soft spoken |
B | Shared secret |
C | HTTPS server |
D | Private certificate |
Question 110 |
A | GBIC |
B | BNC |
C | MT-RJ |
D | F-type |
Question 111 |
A | IDF/MDF documentation |
B | Rack diagram |
C | Network performance baseline |
D | Logical and physical diagrams |
Question 112 |
A | Whaling |
B | Spear phishing |
C | Impersonation |
D | Privilege escalation |
Question 113 |
A | Baseline analyzer |
B | Protocol analyzer |
C | Ping |
D | Nessus |
Question 114 |
A | Key fob + ID card |
B | Smart card + PIN |
C | Fingerprint + retina scan |
D | Username + password |
Question 115 |
A | Router to modem |
B | PC to switch |
C | Router to switch |
D | Switch to AP |
E | PC to PC |
Question 116 |
A | Those servers have host-based firewalls |
B | New servers are being provisioned in the cloud |
C | Some of the servers are configured to use different gateways |
D | Part of the subnet is configured to use different VLANs |
Question 117 |
A | ST |
B | SC |
C | LC |
D | MT-RJ |
Question 118 |
A | BYOD policy |
B | Remote access policy |
C | Incident response policy |
D | DLP policy |
Question 119 |
A | pathping |
B | route |
C | tcpdump |
D | nslookup |
E | ping |
F | netstat |
G | tracert |
Question 120 |
A | Security type mismatch |
B | Distance limitations |
C | Latency |
D | Absorption |
Question 121 |
A | CAT3 |
B | CAT5e |
C | CAT6a |
D | Fiber |
Question 122 |
A | MITM |
B | Smurf attack |
C | NMAP |
D | Social engineering |
E | Buffer overflow attack |
Question 123 |
Department-VLAN#-Subnet used
Marketing-20-192.168.20.0/28
Customer Service-25-192.168.20.64/28
Finance-30-192.168.30.0/28
WHSE-35-192.168.30.16/28
Sales-40-192.168.3.16/28
The users experiencing this issue need to be added to which of the following VLANs?
A | 30 |
B | 40 |
C | 35 |
D | 25 |
Question 124 |
A | Bend radius exceeded |
B | Fiber cable mismatch |
C | Fiber type mismatch |
D | Bad fiber switch |
Question 125 |
A | 61.23.168.192.in-addr.arpa |
B | 00:f3:82:99:a2:b8 |
C | 3ffe:1900:4545:3:200:f8ff:fe21:67cf |
D | 192.168.2.1 |
Question 126 |
A | Datagram Transport Layer Security (DTLS) |
B | DNS |
C | TFTP |
D | SNMP |
E | DTLS |
Question 127 |
A | SRV |
B | MX |
C | CNAME |
D | NS |
E | PTR |
Question 128 |
A | nslookup |
B | route |
C | pathping |
D | nmap |
Question 129 |
A | 802.11ac |
B | 802.11b |
C | 802.11g |
D | Z-Wave |
E | 802.11n |
Question 130 |
A | Excessive bandwidth usage |
B | Broadcast storm |
C | STP convergence |
D | Power failure |
Question 131 |
A | Plenum Cat 6a |
B | Plenum Cat 5e |
C | PVC Cat 7 |
D | PVC Cat 5 |
Question 132 |
A | MIMO |
B | Channel bonding |
C | Increase the signal |
D | Disable SSID |
Question 133 |
A | A missing route on the network routers |
B | Incorrect VLAN assignment on the router |
C | A missing route on the alarm device |
D | Incorrect speed/duplex setting on the alarm device |
Question 134 |
A | OSPF |
B | EIGRP |
C | BGP |
D | RIP |
Question 135 |
A | Replace the switch uplink cable |
B | Install a new switch |
C | Install a new electrical circuit |
D | Install a power conditioner |
E | Install a UPS |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.