← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set II
CompTIA Network+ N10-007 - Set III
Congratulations - you have completed CompTIA Network+ N10-007 - Set III.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Privilege escalation |
B | Spear phishing |
C | Impersonation |
D | Whaling |
Question 2 |
A | Switch |
B | MDF |
C | IDF |
D | CSU/DSU |
Question 3 |
A | Username + password |
B | Key fob + ID card |
C | Fingerprint + retina scan |
D | Smart card + PIN |
Question 4 |
A | CAT6a |
B | Fiber |
C | CAT5e |
D | CAT3 |
Question 5 |
A | 802.1x |
B | MIMO |
C | IPsec |
D | WPA |
E | FIFO |
Question 6 |
A | Block traffic from the wireless access point |
B | Content filtering on the wireless access point |
C | Allow traffic from the wireless access point |
D | Packet filtering on the wireless access point |
Question 7 |
A | Baseline report |
B | Vulnerability report |
C | Rollback plan |
D | Business continuity plan |
Question 8 |
A | 00:f3:82:99:a2:b8 |
B | 61.23.168.192.in-addr.arpa |
C | 192.168.2.1 |
D | 3ffe:1900:4545:3:200:f8ff:fe21:67cf |
Question 9 |
A | IDS |
B | IPS |
C | Port scan |
D | Packet sniffer |
Question 10 |
A | LC |
B | ST |
C | SC |
D | MT-RJ |
Question 11 |
A | SSH |
B | SNMP |
C | L2TP |
D | QoS |
Question 12 |
A | The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router |
B | The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router |
C | The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem |
D | The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem |
Question 13 |
A | Blocking |
B | Forwarding |
C | Learning |
D | Disabled |
Question 14 |
A | Shared secret |
B | HTTPS server |
C | Soft spoken |
D | Private certificate |
Question 15 |
A | Incremental backup |
B | Hot site |
C | Full backup |
D | Differential backup |
E | Cold site |
F | Warm site |
Question 16 |
A | FE80::/10 |
B | 2FFE::/16 |
C | FF00::/8 |
D | FEEF:/12 |
Question 17 |
A | Fibre Channel |
B | InfiniBand |
C | NAS |
D | iSCSI |
Question 18 |
A | Switch |
B | Modem |
C | Router |
D | Hub |
Question 19 |
A | DS3 |
B | E3 |
C | OC3 |
D | T3 |
Question 20 |
A | env |
B | ls |
C | lsenv |
D | lsshell |
E | getargs |
Question 21 |
A | ping |
B | tcpdump |
C | route |
D | nslookup |
E | pathping |
F | netstat |
G | tracert |
Question 22 |
A | Those servers have host-based firewalls |
B | Some of the servers are configured to use different gateways |
C | New servers are being provisioned in the cloud |
D | Part of the subnet is configured to use different VLANs |
Question 23 |
A | LC |
B | MT-RJ |
C | SC |
D | ST |
Question 24 |
A | OSPF |
B | CSMA/CA |
C | CSMA/CD |
D | MPLS |
Question 25 |
A | Distance vector |
B | Link state |
C | Hybrid |
D | Static |
Question 26 |
A | UDP port 69 |
B | TCP port 25 |
C | UDP port 22 |
D | TCP port 22 |
E | UDP port 53 |
Question 27 |
A | Packet sniffer |
B | SNMP |
C | DCCP |
D | SCTP |
E | Simple Network Management Protocol (SNMP) |
Question 28 |
A | Switch to AP |
B | Router to modem |
C | Router to switch |
D | PC to switch |
E | PC to PC |
Question 29 |
A | Smart card reader |
B | Motion detection |
C | Asset tracking tags |
D | Biometric locks |
Question 30 |
A | Mesh |
B | Bus |
C | Star |
D | Ring |
Question 31 |
A | Multimode |
B | Coaxial |
C | Serial |
D | UTP |
Question 32 |
A | A network built with Star Topology |
B | A network built with Bus Topology |
C | A network built with Logical Topology |
D | A network built with Ring Topology |
E | A network built with Mesh Topology |
Question 33 |
IP address: 172.16.204.12
Subnet Mask: 255.255.0.0
Default Gateway: 172.15.204.254
DNS address: 172.16.204.1
Broadcast address: 172.16.255.255
A | Subnet mask |
B | IP address |
C | Default gateway |
D | Broadcast address |
E | DNS address |
Question 34 |
A | Wireless bridge |
B | Wireless access point |
C | Wireless firewall |
D | Wireless hub |
Question 35 |
A | Unicast |
B | Subnetting |
C | Multicast |
D | Broadcast |
Question 36 |
A | Packet loss |
B | Interference |
C | Signal-to-noise ratio |
D | Latency |
E | Attenuation |
F | Reflection |
Question 37 |
A | Incorrect VLAN assignment on the router |
B | A missing route on the network routers |
C | A missing route on the alarm device |
D | Incorrect speed/duplex setting on the alarm device |
Question 38 |
A | Check port 636 to see if it is being blocked |
B | Verify the browser is using port 443 |
C | Change service port 636 to port 389 |
D | Restart the web server |
Question 39 |
A | Allows another connection to the router |
B | Segments broadcast traffic |
C | Increases port speed |
D | Decreases bandwidth on a network |
Question 40 |
A | WPA should be enabled |
B | PKI should be turned off |
C | WAPs are transmitting on same channel |
D | WAP SSIDs are matching |
Question 41 |
A | DoS attacks |
B | Phishing |
C | Man-in-the-middle attacks |
D | Rogue access points |
Question 42 |
A | Bus |
B | Hub and spoke |
C | Partial mesh |
D | Ring |
E | Full mesh |
Question 43 |
A | BNC |
B | F-type |
C | MT-RJ |
D | GBIC |
Question 44 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Eqach department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where would you place the Layer 2 and Layer 3 switches? Click on the image to enlarge.
A | Layer 2 at C5 and Layer 3 at C6 |
B | Layer 2 at C7 and Layer 3 at C6 |
C | Layer 2 at C10 and Layer 3 at C12 |
D | Layer 2 at C8 and Layer 3 at C6 |
E | Layer 2 at C6 and Layer 3 at C6 |
Question 45 |
A | MS-CHAP |
B | Digital signatures |
C | MAC filtering |
D | CHAP |
Question 46 |
A | Access point |
B | Router |
C | Range extender |
D | VoIP endpoint |
Question 47 |
A | PVC Cat 7 |
B | PVC Cat 5 |
C | Plenum Cat 5e |
D | Plenum Cat 6a |
Question 48 |
A | Allow TCP port 3389 inbound |
B | Allow TCP port 3389 outbound |
C | Allow UDP port 3389 outbound |
D | Allow UDP port 3389 inbound |
Question 49 |
A | 3, 13, 23 |
B | 4, 8, 16 |
C | 1, 6, 11 |
D | 2, 5, 10 |
Question 50 |
A | PPP |
B | MPLS |
C | Frame relay |
D | ATM |
Question 51 |
A | Overcapacity |
B | Channel overlapping |
C | Interference |
D | DHCP exhaustion |
Question 52 |
A | Reflection |
B | Channel overlap |
C | Frequency mismatch |
D | Absorption |
Question 53 |
A | Out-of-band management |
B | HTTPS management URL |
C | Client-to-site VPN |
D | Router ACL |
Question 54 |
A | Protocol analyzer |
B | Nessus |
C | Baseline analyzer |
D | Ping |
Question 55 |
A | Switches packets between different subnets based on IP addresses |
B | Switches packets within the same subnet based on MAC addresses |
C | Switches packets between same subnets based on IP addresses |
D | Switches packets between different subnets based on MAC addresses |
Question 56 |
A | 802.11b |
B | 802.11ac |
C | 802.11g |
D | 802.11n |
E | Z-Wave |
Question 57 |
A | AA:CE:58:FD:90:08 |
B | 94:9E:FE:EE:8C:DF |
C | 44:98:3E:F8:33:23 |
D | 56:AD:BX:89:55:54 |
Question 58 |
A | HTTP |
B | SMTP |
C | NTP |
D | RDP |
Question 59 |
A | ST |
B | LC |
C | MT-RJ |
D | SC |
Question 60 |
A | Logical and physical diagrams |
B | Rack diagram |
C | Network performance baseline |
D | IDF/MDF documentation |
Question 61 |
A | MTU mismatch |
B | Switching loop |
C | STP blocking |
D | IP addresses |
Question 62 |
A | MX |
B | NS |
C | PTR |
D | CNAME |
E | SRV |
Question 63 |
A | IPv6 |
B | EIGRP |
C | UDP |
D | ICMP |
Question 64 |
A | IDS |
B | Network tap |
C | Router |
D | IPS |
E | Switch |
F | Hub |
Question 65 |
A | BGP |
B | RIP |
C | OSPF |
D | EIGRP |
Question 66 |
A | Limit the clients to 802.11g compatible laptops |
B | Enable wireless multimedia (WMM) for QoS |
C | Use the 40MHz channels in the 2.4GHz band |
D | Enable access point antenna isolation |
Question 67 |
A | Baseline review |
B | Log scanning |
C | Packet capturing |
D | Port scanning |
Question 68 |
A | Multipath support |
B | Gigabit wireless bandwidth |
C | Channel bonding |
D | Channel expansion |
Question 69 |
A | SC |
B | MT-RJ |
C | ST |
D | LC |
Question 70 |
A | Power failure |
B | Excessive bandwidth usage |
C | Broadcast storm |
D | STP convergence |
Question 71 |
A | Latency |
B | Distance limitations |
C | Security type mismatch |
D | Absorption |
Question 72 |
A | Change the channel on the access point to channel 11 |
B | Turn off SSID broadcasting for the executive’s access point |
C | Turn off as many lights in the executive’s office as possible to reduce interference |
D | Replace the 802.11n access point in the office with an 802.11a access point |
Question 73 |
A | Signature-based IPS |
B | DMZ |
C | WPA2 |
D | Honeypots |
E | Behavior-based IPS |
Question 74 |
A | The network administrator should install and configure a syslog server |
B | The network administrator should install and configure a network sniffer |
C | The network administrator should install and configure a traffic analysis server |
D | The network administrator should install and configure a DMZ server |
Question 75 |
A | VTP |
B | CDP |
C | IPSec |
D | SNMPv3 |
Question 76 |
A | MS-CHAP |
B | CHAP |
C | Kerberos |
D | NTLM |
Question 77 |
A | The LWAPP image is installed on the WAP |
B | The WAP antenna is damaged |
C | The WAP transmitter light is dim |
D | The terminal emulation software is misconfigured |
Question 78 |
Department-VLAN#-Subnet used
Marketing-20-192.168.20.0/28
Customer Service-25-192.168.20.64/28
Finance-30-192.168.30.0/28
WHSE-35-192.168.30.16/28
Sales-40-192.168.3.16/28
The users experiencing this issue need to be added to which of the following VLANs?
A | 40 |
B | 35 |
C | 25 |
D | 30 |
Question 79 |
A | Physical diagram |
B | Network baseline |
C | Logical diagram |
D | Change management log |
Question 80 |
A | Yagi |
B | Omnidirectional |
C | Unidirectional |
D | Parabolic |
Question 81 |
A | Peer-to-peer |
B | Point-to-multipoint |
C | Hybrid |
D | Point-to-point |
Question 82 |
A | The technician should add a route in each virtual machine to the default gateway. |
B | The technician should set up individual routes between the machines. |
C | The technician should connect the machine to its own separate switch. |
D | The technician should configure a virtual switch. |
Question 83 |
Cable | Test | Result |
---|---|---|
1.2 | Open | 7ft |
3.6 | Short | 7ft |
4.5 | Open | 7ft |
7.8 | Open | 7ft |
A | Protocol Analyzer |
B | Multimeter |
C | OTDR |
D | Punch Down Tool |
E | Toner Probe |
F | Crimper |
G | Cable Certifier |
Question 84 |
A | ISAKMP |
B | CARP |
C | L2TP |
D | PPTP |
E | FTP |
Question 85 |
A | 32 bits |
B | 64 bits |
C | 128 bits |
D | 256 bits |
Question 86 |
A | WEP is not well supported |
B | WEP uses RC4 which is easily accessible and not secure |
C | WEP’s IV is too small |
D | WEP uses plain text |
Question 87 |
A | IaaS |
B | SaaS |
C | CASB |
D | PaaS |
Question 88 |
A | Social engineering |
B | Insider threat |
C | Logic bomb |
D | Man-in-the-middle |
Question 89 |
A | Used to determine which port a CAT6 cable is connected. |
B | Used to verify functionality after a NIC is installed. |
C | Used to correct open short on a cable. |
D | Used to verify known good patch cables. |
E | Used to terminate a cable at a 110 block. |
Question 90 |
SSID: SANUJA-WiFi
Signal: 5%
SNR: 2
A | Channel overlap |
B | Incorrect antenna type |
C | Latency |
D | Overcapacity |
Question 91 |
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40
Which is true about the above configuration?
A | An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
B | Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. |
C | Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client. |
D | An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
Question 92 |
A | Incident response policy |
B | BYOD policy |
C | Remote access policy |
D | DLP policy |
Question 93 |
A | Add a bridge between two switches. |
B | Add a router and enable OSPF. |
C | Add a firewall and implement proper ACL. |
D | Add a layer 3 switch and create a VLAN. |
Question 94 |
A | MIMO |
B | Channel bonding |
C | Disable SSID |
D | Increase the signal |
Question 95 |
A | MAC reservations |
B | IPsec |
C | EUI-64 |
D | IPv4 to IPv6 tunnel |
E | APIPA |
Question 96 |
A | Ticket |
B | Token |
C | Time |
D | Certificate |
Question 97 |
A | Allow RDP through an external firewall |
B | Connect utilizing client-to-site VPN |
C | Use TFTP to transfer files to corporate resources |
D | Utilize an SSH connection to the corporate server |
Question 98 |
A | Router |
B | Managed switch |
C | Bridge |
D | Firewall |
E | IDS |
Question 99 |
A | Strong RC4 encryption |
B | MAC filtering |
C | Key rotation |
D | Shared secret keys |
E | AES encryption |
Question 100 |
A | ACL allowing only Telnet |
B | Out-of-band modem |
C | ACL allowing only HTTP |
D | Out-of-band console router |
Question 101 |
A | Install a UPS |
B | Replace the switch uplink cable |
C | Install a power conditioner |
D | Install a new switch |
E | Install a new electrical circuit |
Question 102 |
A | Bridge |
B | Firewall |
C | Router |
D | Multiplayer switch |
Question 103 |
A | NTP |
B | NAC |
C | ACL |
D | SDN |
E | Traffic shaping |
Question 104 |
A | SLA |
B | NDA |
C | SOP |
D | AUP |
Question 105 |
A | 192.170.10.0/24 |
B | 192.168.0.192/24 |
C | 10.10.50.0/30 |
D | 192.1.0.124/30 |
E | 172.16.20.0/30 |
Question 106 |
A | Attenuation |
B | Absorption |
C | Refraction |
D | Reflection |
E | Distance |
Question 107 |
A | Virtual IP |
B | Loopback IP |
C | Reserved IP |
D | Public IP |
Question 108 |
A | DHCP snooping |
B | BPDU guard |
C | Flood guard |
D | Spanning tree |
Question 109 |
A | 132.216.14.184 |
B | 172.23.226.34 |
C | 152.119.25.213 |
D | 162.17.43.22 |
Question 110 |
A | Disable the HTTP port in the host firewall. |
B | Generate new SSH host keys. |
C | Upgrade the firmware on the firewall. |
D | Remove unnecessary testing accounts. |
E | Issue a new self-signed certificate. |
Question 111 |
A | Connection speeds decrease |
B | Throughput decreases |
C | Cell size increases |
D | Attenuation increases |
Question 112 |
A | Ransomware |
B | DNS poisoning |
C | Man-in-the-middle |
D | ARP poisoning |
E | Reflective |
F | Evil twin |
Question 113 |
A | MTU size greater than 10000 |
B | MTU size greater than 1500 |
C | Commonly used on SAN |
D | MTU size greater than 12000 |
E | Commonly used on IaaS |
Question 114 |
A | BPDU guard |
B | DHCP snooping |
C | Spanning tree |
D | ARP protection |
Question 115 |
A | White/Orange, Orange, White/Brown, Blue, White/Blue, Green, White/Green, Brown |
B | White/Green, Green, White/Blue, Blue, White/Orange, Orange, White/Brown. Brown |
C | White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown. Brown |
D | White/Blue, Orange, White/Green, Blue, White/Orange, Green, White/Brown, Brown |
E | White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown |
Question 116 |
A | Install a BPDU guard on switchports and enable STP |
B | Install antivirus software and set an ACL on the servers |
C | Create a DMZ for public servers and secure a segment for the internal network |
D | Create a VLAN for the unused ports and create a honeyspot on the VLAN |
Question 117 |
A | Smurf attack |
B | NMAP |
C | Buffer overflow attack |
D | Social engineering |
E | MITM |
Question 118 |
A | EIGRP |
B | OSPF |
C | RIP |
D | BGP |
Question 119 |
A | Baseline review |
B | Port scanning |
C | Packet capturing |
D | Log scanning |
Question 120 |
A | NTP |
B | SMTP |
C | LDAP |
D | IMAP |
E | POP3 |
Question 121 |
A | A response message is sent from the agent to the manager |
B | The SET function pushes an alert to the MIB database |
C | A trap message is sent via UDP to the monitoring workstation |
D | The object identifier is modified and reported during the next monitoring cycle |
Question 122 |
A | Data link |
B | Network |
C | Physical |
D | Session |
E | Transport |
Question 123 |
A | Fall back to the old switch |
B | Replace SFP with a new one |
C | Transpose the fiber pairs |
D | Replace multimode with single-mode cable |
Question 124 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Each department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where should the router be palced? Click on the image to enlarge.
A | C7 |
B | C5 |
C | C6 |
D | C10 |
E | C8 |
Question 125 |
A | nmap |
B | nslookup |
C | route |
D | pathping |
Question 126 |
A | SNMP |
B | Datagram Transport Layer Security (DTLS) |
C | DTLS |
D | DNS |
E | TFTP |
Question 127 |
A | The channels are overlapping with other wireless networks and should be changed. |
B | The users have incompatible wireless network cards and should upgrade. |
C | The SSIDs are incompatible and should be renamed. |
D | The default idle period for logoff is too short and should be changed to a longer limit. |
Question 128 |
A | Fiber type mismatch |
B | Bend radius exceeded |
C | Bad fiber switch |
D | Fiber cable mismatch |
Question 129 |
A | Logical diagrams |
B | Change management records |
C | Inventory management |
D | Network log files |
Question 130 |
A | HTTPS |
B | Split tunneling |
C | TLS |
D | Remote file access |
Question 131 |
A | Cable tester |
B | Environmental monitor |
C | Punch down tool |
D | OTDR |
Question 132 |
A | Layer 2 |
B | Layer 4 |
C | Layer 1 |
D | Layer 7 |
E | Layer 5 |
F | Layer 3 |
G | Layer 6 |
Question 133 |
A | WLAN |
B | Bus |
C | Star |
D | Ring |
Question 134 |
A | Placement map |
B | Syslog |
C | Network map |
D | Environmental monitor |
Question 135 |
A | DLP |
B | WPA |
C | WAF |
D | TPM |
E | IDS |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.