← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set II
CompTIA Network+ N10-007 - Set III
Congratulations - you have completed CompTIA Network+ N10-007 - Set III.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40
Which is true about the above configuration?
A | An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
B | Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client. |
C | An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
D | Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. |
Question 2 |
| Cable | Test | Result |
|---|---|---|
| 1.2 | Open | 7ft |
| 3.6 | Short | 7ft |
| 4.5 | Open | 7ft |
| 7.8 | Open | 7ft |
A | Toner Probe |
B | OTDR |
C | Cable Certifier |
D | Protocol Analyzer |
E | Crimper |
F | Punch Down Tool |
G | Multimeter |
Question 3 |
A | Used to verify known good patch cables. |
B | Used to verify functionality after a NIC is installed. |
C | Used to determine which port a CAT6 cable is connected. |
D | Used to correct open short on a cable. |
E | Used to terminate a cable at a 110 block. |
Question 4 |
A | White/Orange, Orange, White/Brown, Blue, White/Blue, Green, White/Green, Brown |
B | White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown |
C | White/Green, Green, White/Blue, Blue, White/Orange, Orange, White/Brown. Brown |
D | White/Blue, Orange, White/Green, Blue, White/Orange, Green, White/Brown, Brown |
E | White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown. Brown |
Question 5 |
A | Fall back to the old switch |
B | Replace multimode with single-mode cable |
C | Transpose the fiber pairs |
D | Replace SFP with a new one |
Question 6 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Eqach department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where would you place the Layer 2 and Layer 3 switches? Click on the image to enlarge.
A | Layer 2 at C7 and Layer 3 at C6 |
B | Layer 2 at C8 and Layer 3 at C6 |
C | Layer 2 at C6 and Layer 3 at C6 |
D | Layer 2 at C5 and Layer 3 at C6 |
E | Layer 2 at C10 and Layer 3 at C12 |
Question 7 |
A | AES encryption |
B | MAC filtering |
C | Key rotation |
D | Shared secret keys |
E | Strong RC4 encryption |
Question 8 |
A | PaaS |
B | IaaS |
C | CASB |
D | SaaS |
Question 9 |
A | FF00::/8 |
B | FE80::/10 |
C | FEEF:/12 |
D | 2FFE::/16 |
Question 10 |
Department-VLAN#-Subnet used
Marketing-20-192.168.20.0/28
Customer Service-25-192.168.20.64/28
Finance-30-192.168.30.0/28
WHSE-35-192.168.30.16/28
Sales-40-192.168.3.16/28
The users experiencing this issue need to be added to which of the following VLANs?
A | 40 |
B | 25 |
C | 35 |
D | 30 |
Question 11 |
A | NAS |
B | Fibre Channel |
C | iSCSI |
D | InfiniBand |
Question 12 |
A | 192.1.0.124/30 |
B | 192.170.10.0/24 |
C | 10.10.50.0/30 |
D | 192.168.0.192/24 |
E | 172.16.20.0/30 |
Question 13 |
A | Network |
B | Data link |
C | Transport |
D | Physical |
E | Session |
Question 14 |
A | Broadcast storm |
B | STP convergence |
C | Power failure |
D | Excessive bandwidth usage |
Question 15 |
A | SRV |
B | NS |
C | MX |
D | PTR |
E | CNAME |
Question 16 |
A | MPLS |
B | ATM |
C | PPP |
D | Frame relay |
Question 17 |
A | Absorption |
B | Latency |
C | Security type mismatch |
D | Distance limitations |
Question 18 |
A | Install a power conditioner |
B | Install a new electrical circuit |
C | Replace the switch uplink cable |
D | Install a new switch |
E | Install a UPS |
Question 19 |
A | Reserved IP |
B | Loopback IP |
C | Virtual IP |
D | Public IP |
Question 20 |
A | SNMP |
B | SSH |
C | L2TP |
D | QoS |
Question 21 |
A | Remote access policy |
B | DLP policy |
C | BYOD policy |
D | Incident response policy |
Question 22 |
A | DHCP snooping |
B | Flood guard |
C | BPDU guard |
D | Spanning tree |
Question 23 |
A | A network built with Ring Topology |
B | A network built with Bus Topology |
C | A network built with Star Topology |
D | A network built with Logical Topology |
E | A network built with Mesh Topology |
Question 24 |
A | Logical and physical diagrams |
B | Network performance baseline |
C | Rack diagram |
D | IDF/MDF documentation |
Question 25 |
A | Packet loss |
B | Reflection |
C | Signal-to-noise ratio |
D | Interference |
E | Attenuation |
F | Latency |
Question 26 |
A | Syslog |
B | Network map |
C | Placement map |
D | Environmental monitor |
Question 27 |
A | E3 |
B | OC3 |
C | DS3 |
D | T3 |
Question 28 |
A | Baseline analyzer |
B | Ping |
C | Nessus |
D | Protocol analyzer |
Question 29 |
A | HTTPS management URL |
B | Out-of-band management |
C | Client-to-site VPN |
D | Router ACL |
Question 30 |
A | EIGRP |
B | IPv6 |
C | UDP |
D | ICMP |
Question 31 |
A | 94:9E:FE:EE:8C:DF |
B | 44:98:3E:F8:33:23 |
C | AA:CE:58:FD:90:08 |
D | 56:AD:BX:89:55:54 |
Question 32 |
A | CHAP |
B | MS-CHAP |
C | MAC filtering |
D | Digital signatures |
Question 33 |
A | Insider threat |
B | Man-in-the-middle |
C | Logic bomb |
D | Social engineering |
Question 34 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Each department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where should the router be palced? Click on the image to enlarge.
A | C10 |
B | C5 |
C | C7 |
D | C6 |
E | C8 |
Question 35 |
A | SLA |
B | SOP |
C | AUP |
D | NDA |
Question 36 |
A | MTU size greater than 1500 |
B | MTU size greater than 12000 |
C | Commonly used on SAN |
D | MTU size greater than 10000 |
E | Commonly used on IaaS |
Question 37 |
A | Signature-based IPS |
B | WPA2 |
C | Honeypots |
D | DMZ |
E | Behavior-based IPS |
Question 38 |
A | Biometric locks |
B | Asset tracking tags |
C | Smart card reader |
D | Motion detection |
Question 39 |
A | ACL allowing only HTTP |
B | Out-of-band console router |
C | Out-of-band modem |
D | ACL allowing only Telnet |
Question 40 |
A | Channel expansion |
B | Channel bonding |
C | Multipath support |
D | Gigabit wireless bandwidth |
Question 41 |
A | tcpdump |
B | nslookup |
C | pathping |
D | ping |
E | route |
F | netstat |
G | tracert |
Question 42 |
A | Enable wireless multimedia (WMM) for QoS |
B | Use the 40MHz channels in the 2.4GHz band |
C | Limit the clients to 802.11g compatible laptops |
D | Enable access point antenna isolation |
Question 43 |
A | The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem |
B | The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem |
C | The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router |
D | The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router |
Question 44 |
A | Those servers have host-based firewalls |
B | Some of the servers are configured to use different gateways |
C | Part of the subnet is configured to use different VLANs |
D | New servers are being provisioned in the cloud |
Question 45 |
A | Use TFTP to transfer files to corporate resources |
B | Utilize an SSH connection to the corporate server |
C | Allow RDP through an external firewall |
D | Connect utilizing client-to-site VPN |
Question 46 |
A | Incorrect speed/duplex setting on the alarm device |
B | Incorrect VLAN assignment on the router |
C | A missing route on the network routers |
D | A missing route on the alarm device |
Question 47 |
A | Smart card + PIN |
B | Fingerprint + retina scan |
C | Username + password |
D | Key fob + ID card |
Question 48 |
A | Packet capturing |
B | Port scanning |
C | Baseline review |
D | Log scanning |
Question 49 |
A | 4, 8, 16 |
B | 1, 6, 11 |
C | 3, 13, 23 |
D | 2, 5, 10 |
Question 50 |
A | Switches packets between different subnets based on MAC addresses |
B | Switches packets between different subnets based on IP addresses |
C | Switches packets between same subnets based on IP addresses |
D | Switches packets within the same subnet based on MAC addresses |
Question 51 |
A | Layer 2 |
B | Layer 1 |
C | Layer 3 |
D | Layer 6 |
E | Layer 7 |
F | Layer 4 |
G | Layer 5 |
Question 52 |
A | Wireless bridge |
B | Wireless hub |
C | Wireless firewall |
D | Wireless access point |
Question 53 |
A | PKI should be turned off |
B | WPA should be enabled |
C | WAP SSIDs are matching |
D | WAPs are transmitting on same channel |
Question 54 |
A | NMAP |
B | Smurf attack |
C | MITM |
D | Buffer overflow attack |
E | Social engineering |
Question 55 |
A | RIP |
B | EIGRP |
C | BGP |
D | OSPF |
Question 56 |
A | MT-RJ |
B | LC |
C | ST |
D | SC |
Question 57 |
A | Verify the browser is using port 443 |
B | Restart the web server |
C | Change service port 636 to port 389 |
D | Check port 636 to see if it is being blocked |
Question 58 |
A | Allow TCP port 3389 outbound |
B | Allow TCP port 3389 inbound |
C | Allow UDP port 3389 outbound |
D | Allow UDP port 3389 inbound |
Question 59 |
A | Mesh |
B | Ring |
C | Star |
D | Bus |
Question 60 |
A | Overcapacity |
B | DHCP exhaustion |
C | Channel overlapping |
D | Interference |
Question 61 |
A | MT-RJ |
B | SC |
C | LC |
D | ST |
Question 62 |
A | NTP |
B | RDP |
C | HTTP |
D | SMTP |
Question 63 |
A | The technician should set up individual routes between the machines. |
B | The technician should add a route in each virtual machine to the default gateway. |
C | The technician should configure a virtual switch. |
D | The technician should connect the machine to its own separate switch. |
Question 64 |
A | ARP protection |
B | DHCP snooping |
C | BPDU guard |
D | Spanning tree |
Question 65 |
A | 802.1x |
B | MIMO |
C | IPsec |
D | WPA |
E | FIFO |
Question 66 |
IP address: 172.16.204.12
Subnet Mask: 255.255.0.0
Default Gateway: 172.15.204.254
DNS address: 172.16.204.1
Broadcast address: 172.16.255.255
A | IP address |
B | Broadcast address |
C | DNS address |
D | Default gateway |
E | Subnet mask |
Question 67 |
A | Plenum Cat 5e |
B | PVC Cat 5 |
C | PVC Cat 7 |
D | Plenum Cat 6a |
Question 68 |
A | IPsec |
B | EUI-64 |
C | APIPA |
D | MAC reservations |
E | IPv4 to IPv6 tunnel |
Question 69 |
A | Increase the signal |
B | Disable SSID |
C | Channel bonding |
D | MIMO |
Question 70 |
A | The LWAPP image is installed on the WAP |
B | The WAP transmitter light is dim |
C | The WAP antenna is damaged |
D | The terminal emulation software is misconfigured |
Question 71 |
A | IP addresses |
B | STP blocking |
C | MTU mismatch |
D | Switching loop |
Question 72 |
A | Bad fiber switch |
B | Fiber cable mismatch |
C | Fiber type mismatch |
D | Bend radius exceeded |
Question 73 |
A | UDP port 69 |
B | TCP port 22 |
C | UDP port 53 |
D | TCP port 25 |
E | UDP port 22 |
Question 74 |
A | Peer-to-peer |
B | Point-to-point |
C | Hybrid |
D | Point-to-multipoint |
Question 75 |
A | Content filtering on the wireless access point |
B | Packet filtering on the wireless access point |
C | Block traffic from the wireless access point |
D | Allow traffic from the wireless access point |
Question 76 |
A | SDN |
B | NAC |
C | NTP |
D | ACL |
E | Traffic shaping |
Question 77 |
SSID: SANUJA-WiFi
Signal: 5%
SNR: 2
A | Latency |
B | Incorrect antenna type |
C | Overcapacity |
D | Channel overlap |
Question 78 |
A | Subnetting |
B | Multicast |
C | Broadcast |
D | Unicast |
Question 79 |
A | Link state |
B | Static |
C | Hybrid |
D | Distance vector |
Question 80 |
A | Throughput decreases |
B | Cell size increases |
C | Connection speeds decrease |
D | Attenuation increases |
Question 81 |
A | HTTPS server |
B | Private certificate |
C | Shared secret |
D | Soft spoken |
Question 82 |
A | The object identifier is modified and reported during the next monitoring cycle |
B | A response message is sent from the agent to the manager |
C | The SET function pushes an alert to the MIB database |
D | A trap message is sent via UDP to the monitoring workstation |
Question 83 |
A | IDS |
B | WPA |
C | TPM |
D | WAF |
E | DLP |
Question 84 |
A | L2TP |
B | FTP |
C | CARP |
D | ISAKMP |
E | PPTP |
Question 85 |
A | EIGRP |
B | BGP |
C | OSPF |
D | RIP |
Question 86 |
A | IDS |
B | IPS |
C | Router |
D | Hub |
E | Network tap |
F | Switch |
Question 87 |
A | IDS |
B | Port scan |
C | IPS |
D | Packet sniffer |
Question 88 |
A | Differential backup |
B | Cold site |
C | Full backup |
D | Incremental backup |
E | Hot site |
F | Warm site |
Question 89 |
A | CSMA/CA |
B | OSPF |
C | CSMA/CD |
D | MPLS |
Question 90 |
A | Business continuity plan |
B | Rollback plan |
C | Baseline report |
D | Vulnerability report |
Question 91 |
A | Router |
B | Modem |
C | Hub |
D | Switch |
Question 92 |
A | WEP uses plain text |
B | WEP’s IV is too small |
C | WEP is not well supported |
D | WEP uses RC4 which is easily accessible and not secure |
Question 93 |
A | Full mesh |
B | Bus |
C | Ring |
D | Partial mesh |
E | Hub and spoke |
Question 94 |
A | Forwarding |
B | Disabled |
C | Blocking |
D | Learning |
Question 95 |
A | 162.17.43.22 |
B | 172.23.226.34 |
C | 152.119.25.213 |
D | 132.216.14.184 |
Question 96 |
A | IPSec |
B | CDP |
C | SNMPv3 |
D | VTP |
Question 97 |
A | Turn off as many lights in the executive’s office as possible to reduce interference |
B | Change the channel on the access point to channel 11 |
C | Turn off SSID broadcasting for the executive’s access point |
D | Replace the 802.11n access point in the office with an 802.11a access point |
Question 98 |
A | 61.23.168.192.in-addr.arpa |
B | 192.168.2.1 |
C | 3ffe:1900:4545:3:200:f8ff:fe21:67cf |
D | 00:f3:82:99:a2:b8 |
Question 99 |
A | Network baseline |
B | Change management log |
C | Logical diagram |
D | Physical diagram |
Question 100 |
A | pathping |
B | nmap |
C | nslookup |
D | route |
Question 101 |
A | PC to PC |
B | PC to switch |
C | Switch to AP |
D | Router to modem |
E | Router to switch |
Question 102 |
A | SMTP |
B | LDAP |
C | IMAP |
D | POP3 |
E | NTP |
Question 103 |
A | The channels are overlapping with other wireless networks and should be changed. |
B | The users have incompatible wireless network cards and should upgrade. |
C | The default idle period for logoff is too short and should be changed to a longer limit. |
D | The SSIDs are incompatible and should be renamed. |
Question 104 |
A | Ticket |
B | Certificate |
C | Token |
D | Time |
Question 105 |
A | Environmental monitor |
B | Punch down tool |
C | OTDR |
D | Cable tester |
Question 106 |
A | lsenv |
B | env |
C | lsshell |
D | ls |
E | getargs |
Question 107 |
A | SCTP |
B | Packet sniffer |
C | DCCP |
D | SNMP |
E | Simple Network Management Protocol (SNMP) |
Question 108 |
A | The network administrator should install and configure a network sniffer |
B | The network administrator should install and configure a syslog server |
C | The network administrator should install and configure a traffic analysis server |
D | The network administrator should install and configure a DMZ server |
Question 109 |
A | Yagi |
B | Parabolic |
C | Omnidirectional |
D | Unidirectional |
Question 110 |
A | Install antivirus software and set an ACL on the servers |
B | Create a DMZ for public servers and secure a segment for the internal network |
C | Create a VLAN for the unused ports and create a honeyspot on the VLAN |
D | Install a BPDU guard on switchports and enable STP |
Question 111 |
A | Channel overlap |
B | Frequency mismatch |
C | Reflection |
D | Absorption |
Question 112 |
A | Impersonation |
B | Whaling |
C | Spear phishing |
D | Privilege escalation |
Question 113 |
A | Change management records |
B | Logical diagrams |
C | Network log files |
D | Inventory management |
Question 114 |
A | Add a layer 3 switch and create a VLAN. |
B | Add a bridge between two switches. |
C | Add a firewall and implement proper ACL. |
D | Add a router and enable OSPF. |
Question 115 |
A | Multiplayer switch |
B | Bridge |
C | Firewall |
D | Router |
Question 116 |
A | Star |
B | Bus |
C | Ring |
D | WLAN |
Question 117 |
A | VoIP endpoint |
B | Access point |
C | Range extender |
D | Router |
Question 118 |
A | Reflection |
B | Distance |
C | Attenuation |
D | Refraction |
E | Absorption |
Question 119 |
A | Fiber |
B | CAT5e |
C | CAT3 |
D | CAT6a |
Question 120 |
A | MT-RJ |
B | SC |
C | ST |
D | LC |
Question 121 |
A | MT-RJ |
B | LC |
C | ST |
D | SC |
Question 122 |
A | Segments broadcast traffic |
B | Increases port speed |
C | Decreases bandwidth on a network |
D | Allows another connection to the router |
Question 123 |
A | GBIC |
B | MT-RJ |
C | BNC |
D | F-type |
Question 124 |
A | UTP |
B | Serial |
C | Multimode |
D | Coaxial |
Question 125 |
A | Managed switch |
B | Router |
C | IDS |
D | Bridge |
E | Firewall |
Question 126 |
A | HTTPS |
B | TLS |
C | Remote file access |
D | Split tunneling |
Question 127 |
A | CHAP |
B | Kerberos |
C | MS-CHAP |
D | NTLM |
Question 128 |
A | Port scanning |
B | Baseline review |
C | Log scanning |
D | Packet capturing |
Question 129 |
A | IDF |
B | MDF |
C | Switch |
D | CSU/DSU |
Question 130 |
A | SNMP |
B | DTLS |
C | Datagram Transport Layer Security (DTLS) |
D | DNS |
E | TFTP |
Question 131 |
A | Man-in-the-middle attacks |
B | Rogue access points |
C | Phishing |
D | DoS attacks |
Question 132 |
A | Upgrade the firmware on the firewall. |
B | Disable the HTTP port in the host firewall. |
C | Remove unnecessary testing accounts. |
D | Generate new SSH host keys. |
E | Issue a new self-signed certificate. |
Question 133 |
A | 802.11n |
B | Z-Wave |
C | 802.11g |
D | 802.11ac |
E | 802.11b |
Question 134 |
A | ARP poisoning |
B | DNS poisoning |
C | Evil twin |
D | Reflective |
E | Ransomware |
F | Man-in-the-middle |
Question 135 |
A | 128 bits |
B | 32 bits |
C | 256 bits |
D | 64 bits |
← |
List |
→ |
| 1 | 2 | 3 | 4 | 5 |
| 6 | 7 | 8 | 9 | 10 |
| 11 | 12 | 13 | 14 | 15 |
| 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 |
| 26 | 27 | 28 | 29 | 30 |
| 31 | 32 | 33 | 34 | 35 |
| 36 | 37 | 38 | 39 | 40 |
| 41 | 42 | 43 | 44 | 45 |
| 46 | 47 | 48 | 49 | 50 |
| 51 | 52 | 53 | 54 | 55 |
| 56 | 57 | 58 | 59 | 60 |
| 61 | 62 | 63 | 64 | 65 |
| 66 | 67 | 68 | 69 | 70 |
| 71 | 72 | 73 | 74 | 75 |
| 76 | 77 | 78 | 79 | 80 |
| 81 | 82 | 83 | 84 | 85 |
| 86 | 87 | 88 | 89 | 90 |
| 91 | 92 | 93 | 94 | 95 |
| 96 | 97 | 98 | 99 | 100 |
| 101 | 102 | 103 | 104 | 105 |
| 106 | 107 | 108 | 109 | 110 |
| 111 | 112 | 113 | 114 | 115 |
| 116 | 117 | 118 | 119 | 120 |
| 121 | 122 | 123 | 124 | 125 |
| 126 | 127 | 128 | 129 | 130 |
| 131 | 132 | 133 | 134 | 135 |
| End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.



