← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set II
CompTIA Network+ N10-007 - Set III
Congratulations - you have completed CompTIA Network+ N10-007 - Set III.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Incident response policy |
B | BYOD policy |
C | Remote access policy |
D | DLP policy |
Question 2 |
A | Smart card + PIN |
B | Fingerprint + retina scan |
C | Key fob + ID card |
D | Username + password |
Question 3 |
A | SCTP |
B | SNMP |
C | DCCP |
D | Simple Network Management Protocol (SNMP) |
E | Packet sniffer |
Question 4 |
A | Motion detection |
B | Asset tracking tags |
C | Smart card reader |
D | Biometric locks |
Question 5 |
A | WEP is not well supported |
B | WEP uses RC4 which is easily accessible and not secure |
C | WEP uses plain text |
D | WEP’s IV is too small |
Question 6 |
A | UDP port 69 |
B | UDP port 53 |
C | TCP port 22 |
D | TCP port 25 |
E | UDP port 22 |
Question 7 |
A | Transpose the fiber pairs |
B | Fall back to the old switch |
C | Replace multimode with single-mode cable |
D | Replace SFP with a new one |
Question 8 |
A | Remote file access |
B | HTTPS |
C | Split tunneling |
D | TLS |
Question 9 |
A | MT-RJ |
B | ST |
C | SC |
D | LC |
Question 10 |
A | Segments broadcast traffic |
B | Increases port speed |
C | Allows another connection to the router |
D | Decreases bandwidth on a network |
Question 11 |
A | Bus |
B | Star |
C | WLAN |
D | Ring |
Question 12 |
A | Time |
B | Ticket |
C | Token |
D | Certificate |
Question 13 |
A | Baseline review |
B | Packet capturing |
C | Port scanning |
D | Log scanning |
Question 14 |
A | Packet sniffer |
B | IPS |
C | IDS |
D | Port scan |
Question 15 |
A | CHAP |
B | NTLM |
C | Kerberos |
D | MS-CHAP |
Question 16 |
A | ARP protection |
B | Spanning tree |
C | DHCP snooping |
D | BPDU guard |
Question 17 |
A | route |
B | nmap |
C | nslookup |
D | pathping |
Question 18 |
A | Vulnerability report |
B | Baseline report |
C | Rollback plan |
D | Business continuity plan |
Question 19 |
A | Absorption |
B | Reflection |
C | Frequency mismatch |
D | Channel overlap |
Question 20 |
A | Connection speeds decrease |
B | Attenuation increases |
C | Throughput decreases |
D | Cell size increases |
Question 21 |
A | Reflective |
B | Ransomware |
C | DNS poisoning |
D | Man-in-the-middle |
E | ARP poisoning |
F | Evil twin |
Question 22 |
A | 3, 13, 23 |
B | 4, 8, 16 |
C | 1, 6, 11 |
D | 2, 5, 10 |
Question 23 |
A | DHCP exhaustion |
B | Channel overlapping |
C | Overcapacity |
D | Interference |
Question 24 |
A | Environmental monitor |
B | Punch down tool |
C | Cable tester |
D | OTDR |
Question 25 |
A | tracert |
B | tcpdump |
C | pathping |
D | route |
E | ping |
F | nslookup |
G | netstat |
Question 26 |
A | Hybrid |
B | Peer-to-peer |
C | Point-to-point |
D | Point-to-multipoint |
Question 27 |
A | Multimode |
B | Serial |
C | Coaxial |
D | UTP |
Question 28 |
A | Port scanning |
B | Log scanning |
C | Baseline review |
D | Packet capturing |
Question 29 |
A | Omnidirectional |
B | Yagi |
C | Unidirectional |
D | Parabolic |
Question 30 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Each department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where should the router be palced? Click on the image to enlarge.
A | C10 |
B | C6 |
C | C7 |
D | C8 |
E | C5 |
Question 31 |
A | White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown |
B | White/Blue, Orange, White/Green, Blue, White/Orange, Green, White/Brown, Brown |
C | White/Green, Green, White/Blue, Blue, White/Orange, Orange, White/Brown. Brown |
D | White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown. Brown |
E | White/Orange, Orange, White/Brown, Blue, White/Blue, Green, White/Green, Brown |
Question 32 |
A | Managed switch |
B | Bridge |
C | IDS |
D | Router |
E | Firewall |
Question 33 |
A | The channels are overlapping with other wireless networks and should be changed. |
B | The SSIDs are incompatible and should be renamed. |
C | The users have incompatible wireless network cards and should upgrade. |
D | The default idle period for logoff is too short and should be changed to a longer limit. |
Question 34 |
A | PKI should be turned off |
B | WAPs are transmitting on same channel |
C | WAP SSIDs are matching |
D | WPA should be enabled |
Question 35 |
A | STP blocking |
B | MTU mismatch |
C | IP addresses |
D | Switching loop |
Question 36 |
A | LC |
B | ST |
C | SC |
D | MT-RJ |
Question 37 |
A | WPA |
B | FIFO |
C | 802.1x |
D | IPsec |
E | MIMO |
Question 38 |
A | FF00::/8 |
B | FE80::/10 |
C | FEEF:/12 |
D | 2FFE::/16 |
Question 39 |
A | CAT3 |
B | CAT5e |
C | Fiber |
D | CAT6a |
Question 40 |
A | The object identifier is modified and reported during the next monitoring cycle |
B | A response message is sent from the agent to the manager |
C | A trap message is sent via UDP to the monitoring workstation |
D | The SET function pushes an alert to the MIB database |
Question 41 |
A | Switches packets between different subnets based on IP addresses |
B | Switches packets between same subnets based on IP addresses |
C | Switches packets within the same subnet based on MAC addresses |
D | Switches packets between different subnets based on MAC addresses |
Question 42 |
A | Static |
B | Distance vector |
C | Link state |
D | Hybrid |
Question 43 |
A | Layer 6 |
B | Layer 2 |
C | Layer 3 |
D | Layer 7 |
E | Layer 1 |
F | Layer 5 |
G | Layer 4 |
Question 44 |
A | 802.11g |
B | 802.11ac |
C | Z-Wave |
D | 802.11n |
E | 802.11b |
Question 45 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Eqach department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where would you place the Layer 2 and Layer 3 switches? Click on the image to enlarge.
A | Layer 2 at C10 and Layer 3 at C12 |
B | Layer 2 at C5 and Layer 3 at C6 |
C | Layer 2 at C6 and Layer 3 at C6 |
D | Layer 2 at C8 and Layer 3 at C6 |
E | Layer 2 at C7 and Layer 3 at C6 |
Question 46 |
A | MT-RJ |
B | SC |
C | ST |
D | LC |
Question 47 |
A | Hub |
B | Router |
C | Modem |
D | Switch |
Question 48 |
A | BGP |
B | RIP |
C | OSPF |
D | EIGRP |
Question 49 |
A | Hub and spoke |
B | Ring |
C | Partial mesh |
D | Bus |
E | Full mesh |
Question 50 |
A | IPv4 to IPv6 tunnel |
B | MAC reservations |
C | EUI-64 |
D | APIPA |
E | IPsec |
Question 51 |
A | Utilize an SSH connection to the corporate server |
B | Connect utilizing client-to-site VPN |
C | Allow RDP through an external firewall |
D | Use TFTP to transfer files to corporate resources |
Question 52 |
A | ICMP |
B | EIGRP |
C | UDP |
D | IPv6 |
Question 53 |
A | NTP |
B | RDP |
C | SMTP |
D | HTTP |
Question 54 |
A | The technician should set up individual routes between the machines. |
B | The technician should configure a virtual switch. |
C | The technician should add a route in each virtual machine to the default gateway. |
D | The technician should connect the machine to its own separate switch. |
Question 55 |
A | Some of the servers are configured to use different gateways |
B | New servers are being provisioned in the cloud |
C | Those servers have host-based firewalls |
D | Part of the subnet is configured to use different VLANs |
Question 56 |
A | Bend radius exceeded |
B | Bad fiber switch |
C | Fiber cable mismatch |
D | Fiber type mismatch |
Question 57 |
A | Privilege escalation |
B | Whaling |
C | Impersonation |
D | Spear phishing |
Question 58 |
A | Protocol analyzer |
B | Ping |
C | Nessus |
D | Baseline analyzer |
Question 59 |
A | Warm site |
B | Full backup |
C | Cold site |
D | Incremental backup |
E | Hot site |
F | Differential backup |
Question 60 |
A | CASB |
B | SaaS |
C | IaaS |
D | PaaS |
Question 61 |
A | Change the channel on the access point to channel 11 |
B | Turn off SSID broadcasting for the executive’s access point |
C | Replace the 802.11n access point in the office with an 802.11a access point |
D | Turn off as many lights in the executive’s office as possible to reduce interference |
Question 62 |
A | Frame relay |
B | PPP |
C | ATM |
D | MPLS |
Question 63 |
A | Placement map |
B | Network map |
C | Environmental monitor |
D | Syslog |
Question 64 |
A | Logical diagrams |
B | Inventory management |
C | Network log files |
D | Change management records |
Question 65 |
A | Install a new electrical circuit |
B | Install a power conditioner |
C | Install a new switch |
D | Install a UPS |
E | Replace the switch uplink cable |
Question 66 |
A | MX |
B | NS |
C | CNAME |
D | PTR |
E | SRV |
Question 67 |
A | SC |
B | MT-RJ |
C | LC |
D | ST |
Question 68 |
A | Packet loss |
B | Attenuation |
C | Reflection |
D | Latency |
E | Signal-to-noise ratio |
F | Interference |
Question 69 |
A | PVC Cat 5 |
B | Plenum Cat 5e |
C | Plenum Cat 6a |
D | PVC Cat 7 |
Question 70 |
A | Router ACL |
B | Out-of-band management |
C | HTTPS management URL |
D | Client-to-site VPN |
Question 71 |
A | MT-RJ |
B | BNC |
C | GBIC |
D | F-type |
Question 72 |
A | SSH |
B | L2TP |
C | QoS |
D | SNMP |
Question 73 |
A | Change service port 636 to port 389 |
B | Verify the browser is using port 443 |
C | Check port 636 to see if it is being blocked |
D | Restart the web server |
Question 74 |
A | Rogue access points |
B | Phishing |
C | Man-in-the-middle attacks |
D | DoS attacks |
Question 75 |
A | Physical diagram |
B | Change management log |
C | Network baseline |
D | Logical diagram |
Question 76 |
A | NTP |
B | ACL |
C | SDN |
D | Traffic shaping |
E | NAC |
Question 77 |
A | The network administrator should install and configure a DMZ server |
B | The network administrator should install and configure a syslog server |
C | The network administrator should install and configure a traffic analysis server |
D | The network administrator should install and configure a network sniffer |
Question 78 |
A | 256 bits |
B | 64 bits |
C | 128 bits |
D | 32 bits |
Question 79 |
A | 152.119.25.213 |
B | 162.17.43.22 |
C | 132.216.14.184 |
D | 172.23.226.34 |
Question 80 |
A | OSPF |
B | BGP |
C | EIGRP |
D | RIP |
Question 81 |
A | Commonly used on IaaS |
B | MTU size greater than 1500 |
C | MTU size greater than 10000 |
D | MTU size greater than 12000 |
E | Commonly used on SAN |
Question 82 |
A | 00:f3:82:99:a2:b8 |
B | 192.168.2.1 |
C | 3ffe:1900:4545:3:200:f8ff:fe21:67cf |
D | 61.23.168.192.in-addr.arpa |
Question 83 |
A | OC3 |
B | T3 |
C | E3 |
D | DS3 |
Question 84 |
Department-VLAN#-Subnet used
Marketing-20-192.168.20.0/28
Customer Service-25-192.168.20.64/28
Finance-30-192.168.30.0/28
WHSE-35-192.168.30.16/28
Sales-40-192.168.3.16/28
The users experiencing this issue need to be added to which of the following VLANs?
A | 35 |
B | 40 |
C | 25 |
D | 30 |
Question 85 |
A | Add a firewall and implement proper ACL. |
B | Add a bridge between two switches. |
C | Add a layer 3 switch and create a VLAN. |
D | Add a router and enable OSPF. |
Question 86 |
A | Virtual IP |
B | Loopback IP |
C | Public IP |
D | Reserved IP |
Question 87 |
A | Multipath support |
B | Channel expansion |
C | Gigabit wireless bandwidth |
D | Channel bonding |
Question 88 |
A | IPS |
B | Hub |
C | Switch |
D | IDS |
E | Network tap |
F | Router |
Question 89 |
A | Multicast |
B | Broadcast |
C | Unicast |
D | Subnetting |
Question 90 |
A | Out-of-band console router |
B | Out-of-band modem |
C | ACL allowing only HTTP |
D | ACL allowing only Telnet |
Question 91 |
A | Wireless bridge |
B | Wireless access point |
C | Wireless firewall |
D | Wireless hub |
Question 92 |
A | A network built with Star Topology |
B | A network built with Mesh Topology |
C | A network built with Bus Topology |
D | A network built with Logical Topology |
E | A network built with Ring Topology |
Question 93 |
IP address: 172.16.204.12
Subnet Mask: 255.255.0.0
Default Gateway: 172.15.204.254
DNS address: 172.16.204.1
Broadcast address: 172.16.255.255
A | IP address |
B | Subnet mask |
C | Default gateway |
D | Broadcast address |
E | DNS address |
Question 94 |
A | Router |
B | Access point |
C | Range extender |
D | VoIP endpoint |
Question 95 |
A | CDP |
B | IPSec |
C | VTP |
D | SNMPv3 |
Question 96 |
A | HTTPS server |
B | Private certificate |
C | Shared secret |
D | Soft spoken |
Question 97 |
A | MPLS |
B | OSPF |
C | CSMA/CA |
D | CSMA/CD |
Question 98 |
A | Limit the clients to 802.11g compatible laptops |
B | Use the 40MHz channels in the 2.4GHz band |
C | Enable wireless multimedia (WMM) for QoS |
D | Enable access point antenna isolation |
Question 99 |
A | InfiniBand |
B | iSCSI |
C | Fibre Channel |
D | NAS |
Question 100 |
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40
Which is true about the above configuration?
A | An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
B | An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
C | Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. |
D | Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client. |
Question 101 |
A | Blocking |
B | Disabled |
C | Forwarding |
D | Learning |
Question 102 |
SSID: SANUJA-WiFi
Signal: 5%
SNR: 2
A | Overcapacity |
B | Latency |
C | Channel overlap |
D | Incorrect antenna type |
Question 103 |
Cable | Test | Result |
---|---|---|
1.2 | Open | 7ft |
3.6 | Short | 7ft |
4.5 | Open | 7ft |
7.8 | Open | 7ft |
A | Toner Probe |
B | Protocol Analyzer |
C | OTDR |
D | Cable Certifier |
E | Crimper |
F | Punch Down Tool |
G | Multimeter |
Question 104 |
A | TFTP |
B | Datagram Transport Layer Security (DTLS) |
C | DTLS |
D | SNMP |
E | DNS |
Question 105 |
A | Spanning tree |
B | Flood guard |
C | BPDU guard |
D | DHCP snooping |
Question 106 |
A | Switch |
B | IDF |
C | CSU/DSU |
D | MDF |
Question 107 |
A | Key rotation |
B | AES encryption |
C | MAC filtering |
D | Strong RC4 encryption |
E | Shared secret keys |
Question 108 |
A | Absorption |
B | Distance |
C | Reflection |
D | Attenuation |
E | Refraction |
Question 109 |
A | Rack diagram |
B | IDF/MDF documentation |
C | Network performance baseline |
D | Logical and physical diagrams |
Question 110 |
A | Physical |
B | Network |
C | Session |
D | Transport |
E | Data link |
Question 111 |
A | CHAP |
B | MAC filtering |
C | MS-CHAP |
D | Digital signatures |
Question 112 |
A | The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem |
B | The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router |
C | The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router |
D | The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem |
Question 113 |
A | Used to determine which port a CAT6 cable is connected. |
B | Used to terminate a cable at a 110 block. |
C | Used to verify functionality after a NIC is installed. |
D | Used to correct open short on a cable. |
E | Used to verify known good patch cables. |
Question 114 |
A | The terminal emulation software is misconfigured |
B | The WAP antenna is damaged |
C | The WAP transmitter light is dim |
D | The LWAPP image is installed on the WAP |
Question 115 |
A | Block traffic from the wireless access point |
B | Allow traffic from the wireless access point |
C | Content filtering on the wireless access point |
D | Packet filtering on the wireless access point |
Question 116 |
A | Install a BPDU guard on switchports and enable STP |
B | Create a VLAN for the unused ports and create a honeyspot on the VLAN |
C | Install antivirus software and set an ACL on the servers |
D | Create a DMZ for public servers and secure a segment for the internal network |
Question 117 |
A | AUP |
B | NDA |
C | SLA |
D | SOP |
Question 118 |
A | 192.170.10.0/24 |
B | 192.1.0.124/30 |
C | 192.168.0.192/24 |
D | 10.10.50.0/30 |
E | 172.16.20.0/30 |
Question 119 |
A | Increase the signal |
B | Disable SSID |
C | MIMO |
D | Channel bonding |
Question 120 |
A | LDAP |
B | NTP |
C | SMTP |
D | POP3 |
E | IMAP |
Question 121 |
A | Social engineering |
B | MITM |
C | NMAP |
D | Smurf attack |
E | Buffer overflow attack |
Question 122 |
A | Bridge |
B | Firewall |
C | Router |
D | Multiplayer switch |
Question 123 |
A | Bus |
B | Mesh |
C | Ring |
D | Star |
Question 124 |
A | Security type mismatch |
B | Distance limitations |
C | Latency |
D | Absorption |
Question 125 |
A | Honeypots |
B | Signature-based IPS |
C | WPA2 |
D | DMZ |
E | Behavior-based IPS |
Question 126 |
A | lsenv |
B | env |
C | ls |
D | getargs |
E | lsshell |
Question 127 |
A | PC to switch |
B | Switch to AP |
C | Router to switch |
D | Router to modem |
E | PC to PC |
Question 128 |
A | CARP |
B | FTP |
C | PPTP |
D | L2TP |
E | ISAKMP |
Question 129 |
A | Social engineering |
B | Man-in-the-middle |
C | Logic bomb |
D | Insider threat |
Question 130 |
A | Allow UDP port 3389 outbound |
B | Allow UDP port 3389 inbound |
C | Allow TCP port 3389 outbound |
D | Allow TCP port 3389 inbound |
Question 131 |
A | Broadcast storm |
B | STP convergence |
C | Power failure |
D | Excessive bandwidth usage |
Question 132 |
A | DLP |
B | WAF |
C | WPA |
D | IDS |
E | TPM |
Question 133 |
A | A missing route on the alarm device |
B | Incorrect VLAN assignment on the router |
C | Incorrect speed/duplex setting on the alarm device |
D | A missing route on the network routers |
Question 134 |
A | AA:CE:58:FD:90:08 |
B | 44:98:3E:F8:33:23 |
C | 56:AD:BX:89:55:54 |
D | 94:9E:FE:EE:8C:DF |
Question 135 |
A | Issue a new self-signed certificate. |
B | Upgrade the firmware on the firewall. |
C | Remove unnecessary testing accounts. |
D | Disable the HTTP port in the host firewall. |
E | Generate new SSH host keys. |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.