← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set II
CompTIA Network+ N10-007 - Set III
Congratulations - you have completed CompTIA Network+ N10-007 - Set III.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | LC |
B | SC |
C | MT-RJ |
D | ST |
Question 2 |
A | Parabolic |
B | Yagi |
C | Omnidirectional |
D | Unidirectional |
Question 3 |
A | Latency |
B | Distance limitations |
C | Absorption |
D | Security type mismatch |
Question 4 |
A | Plenum Cat 5e |
B | PVC Cat 5 |
C | PVC Cat 7 |
D | Plenum Cat 6a |
Question 5 |
A | Used to verify functionality after a NIC is installed. |
B | Used to terminate a cable at a 110 block. |
C | Used to verify known good patch cables. |
D | Used to correct open short on a cable. |
E | Used to determine which port a CAT6 cable is connected. |
Question 6 |
A | Overcapacity |
B | Channel overlapping |
C | DHCP exhaustion |
D | Interference |
Question 7 |
A | Switches packets between different subnets based on MAC addresses |
B | Switches packets between same subnets based on IP addresses |
C | Switches packets within the same subnet based on MAC addresses |
D | Switches packets between different subnets based on IP addresses |
Question 8 |
A | SC |
B | ST |
C | MT-RJ |
D | LC |
Question 9 |
A | APIPA |
B | MAC reservations |
C | IPsec |
D | EUI-64 |
E | IPv4 to IPv6 tunnel |
Question 10 |
A | WEP’s IV is too small |
B | WEP uses plain text |
C | WEP uses RC4 which is easily accessible and not secure |
D | WEP is not well supported |
Question 11 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Eqach department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where would you place the Layer 2 and Layer 3 switches? Click on the image to enlarge.
A | Layer 2 at C10 and Layer 3 at C12 |
B | Layer 2 at C6 and Layer 3 at C6 |
C | Layer 2 at C7 and Layer 3 at C6 |
D | Layer 2 at C5 and Layer 3 at C6 |
E | Layer 2 at C8 and Layer 3 at C6 |
Question 12 |
A | Network baseline |
B | Logical diagram |
C | Change management log |
D | Physical diagram |
Question 13 |
A | Layer 3 |
B | Layer 2 |
C | Layer 1 |
D | Layer 4 |
E | Layer 7 |
F | Layer 5 |
G | Layer 6 |
Question 14 |
A | CHAP |
B | MS-CHAP |
C | NTLM |
D | Kerberos |
Question 15 |
A | HTTPS |
B | TLS |
C | Remote file access |
D | Split tunneling |
Question 16 |
A | Access point |
B | VoIP endpoint |
C | Range extender |
D | Router |
Question 17 |
A | Log scanning |
B | Packet capturing |
C | Baseline review |
D | Port scanning |
Question 18 |
A | HTTPS management URL |
B | Client-to-site VPN |
C | Router ACL |
D | Out-of-band management |
Question 19 |
A | Username + password |
B | Fingerprint + retina scan |
C | Key fob + ID card |
D | Smart card + PIN |
Question 20 |
Cable | Test | Result |
---|---|---|
1.2 | Open | 7ft |
3.6 | Short | 7ft |
4.5 | Open | 7ft |
7.8 | Open | 7ft |
A | Multimeter |
B | Punch Down Tool |
C | Crimper |
D | Toner Probe |
E | Cable Certifier |
F | OTDR |
G | Protocol Analyzer |
Question 21 |
A | STP blocking |
B | IP addresses |
C | MTU mismatch |
D | Switching loop |
Question 22 |
A | MT-RJ |
B | GBIC |
C | F-type |
D | BNC |
Question 23 |
A | Out-of-band console router |
B | Out-of-band modem |
C | ACL allowing only HTTP |
D | ACL allowing only Telnet |
Question 24 |
A | Nessus |
B | Protocol analyzer |
C | Ping |
D | Baseline analyzer |
Question 25 |
A | Switch |
B | Router |
C | IPS |
D | IDS |
E | Hub |
F | Network tap |
Question 26 |
A | 192.168.0.192/24 |
B | 192.1.0.124/30 |
C | 172.16.20.0/30 |
D | 10.10.50.0/30 |
E | 192.170.10.0/24 |
Question 27 |
A | Switch to AP |
B | Router to modem |
C | PC to switch |
D | Router to switch |
E | PC to PC |
Question 28 |
A | Connection speeds decrease |
B | Cell size increases |
C | Attenuation increases |
D | Throughput decreases |
Question 29 |
A | The technician should connect the machine to its own separate switch. |
B | The technician should set up individual routes between the machines. |
C | The technician should configure a virtual switch. |
D | The technician should add a route in each virtual machine to the default gateway. |
Question 30 |
A | 802.11n |
B | Z-Wave |
C | 802.11ac |
D | 802.11b |
E | 802.11g |
Question 31 |
A | Environmental monitor |
B | Syslog |
C | Placement map |
D | Network map |
Question 32 |
A | Wireless hub |
B | Wireless firewall |
C | Wireless access point |
D | Wireless bridge |
Question 33 |
A | Fiber cable mismatch |
B | Bad fiber switch |
C | Bend radius exceeded |
D | Fiber type mismatch |
Question 34 |
A | DHCP snooping |
B | Spanning tree |
C | BPDU guard |
D | ARP protection |
Question 35 |
IP address: 172.16.204.12
Subnet Mask: 255.255.0.0
Default Gateway: 172.15.204.254
DNS address: 172.16.204.1
Broadcast address: 172.16.255.255
A | Subnet mask |
B | DNS address |
C | Broadcast address |
D | IP address |
E | Default gateway |
Question 36 |
A | Block traffic from the wireless access point |
B | Packet filtering on the wireless access point |
C | Content filtering on the wireless access point |
D | Allow traffic from the wireless access point |
Question 37 |
A | pathping |
B | netstat |
C | route |
D | tcpdump |
E | tracert |
F | ping |
G | nslookup |
Question 38 |
A | Router |
B | Firewall |
C | Multiplayer switch |
D | Bridge |
Question 39 |
A | Channel expansion |
B | Multipath support |
C | Gigabit wireless bandwidth |
D | Channel bonding |
Question 40 |
A | Shared secret keys |
B | AES encryption |
C | Key rotation |
D | Strong RC4 encryption |
E | MAC filtering |
Question 41 |
A | Increase the signal |
B | Channel bonding |
C | MIMO |
D | Disable SSID |
Question 42 |
A | Reserved IP |
B | Loopback IP |
C | Public IP |
D | Virtual IP |
Question 43 |
A | Punch down tool |
B | OTDR |
C | Cable tester |
D | Environmental monitor |
Question 44 |
A | A missing route on the network routers |
B | A missing route on the alarm device |
C | Incorrect speed/duplex setting on the alarm device |
D | Incorrect VLAN assignment on the router |
Question 45 |
A | MT-RJ |
B | LC |
C | ST |
D | SC |
Question 46 |
A | Shared secret |
B | Private certificate |
C | Soft spoken |
D | HTTPS server |
Question 47 |
A | CARP |
B | PPTP |
C | L2TP |
D | FTP |
E | ISAKMP |
Question 48 |
A | Network log files |
B | Logical diagrams |
C | Inventory management |
D | Change management records |
Question 49 |
A | Managed switch |
B | Bridge |
C | Firewall |
D | IDS |
E | Router |
Question 50 |
A | DoS attacks |
B | Man-in-the-middle attacks |
C | Phishing |
D | Rogue access points |
Question 51 |
A | Bus |
B | Full mesh |
C | Partial mesh |
D | Hub and spoke |
E | Ring |
Question 52 |
A | NAS |
B | InfiniBand |
C | Fibre Channel |
D | iSCSI |
Question 53 |
A | Ransomware |
B | Reflective |
C | Evil twin |
D | ARP poisoning |
E | DNS poisoning |
F | Man-in-the-middle |
Question 54 |
A | Packet sniffer |
B | SNMP |
C | DCCP |
D | Simple Network Management Protocol (SNMP) |
E | SCTP |
Question 55 |
A | BGP |
B | RIP |
C | OSPF |
D | EIGRP |
Question 56 |
A | IDS |
B | Port scan |
C | Packet sniffer |
D | IPS |
Question 57 |
A | PKI should be turned off |
B | WAPs are transmitting on same channel |
C | WPA should be enabled |
D | WAP SSIDs are matching |
Question 58 |
A | Channel overlap |
B | Frequency mismatch |
C | Reflection |
D | Absorption |
Question 59 |
A | Absorption |
B | Distance |
C | Reflection |
D | Refraction |
E | Attenuation |
Question 60 |
A | Hybrid |
B | Peer-to-peer |
C | Point-to-point |
D | Point-to-multipoint |
Question 61 |
A | Router |
B | Switch |
C | Hub |
D | Modem |
Question 62 |
A | nmap |
B | route |
C | nslookup |
D | pathping |
Question 63 |
A | Privilege escalation |
B | Whaling |
C | Impersonation |
D | Spear phishing |
Question 64 |
A | Learning |
B | Disabled |
C | Forwarding |
D | Blocking |
Question 65 |
A | MPLS |
B | PPP |
C | Frame relay |
D | ATM |
Question 66 |
A | UDP port 22 |
B | UDP port 53 |
C | TCP port 22 |
D | UDP port 69 |
E | TCP port 25 |
Question 67 |
A | T3 |
B | E3 |
C | OC3 |
D | DS3 |
Question 68 |
A | Signature-based IPS |
B | Behavior-based IPS |
C | Honeypots |
D | DMZ |
E | WPA2 |
Question 69 |
A | MAC filtering |
B | Digital signatures |
C | CHAP |
D | MS-CHAP |
Question 70 |
A | Mesh |
B | Bus |
C | Star |
D | Ring |
Question 71 |
A | FF00::/8 |
B | FE80::/10 |
C | 2FFE::/16 |
D | FEEF:/12 |
Question 72 |
A | 162.17.43.22 |
B | 152.119.25.213 |
C | 132.216.14.184 |
D | 172.23.226.34 |
Question 73 |
A | Power failure |
B | Broadcast storm |
C | STP convergence |
D | Excessive bandwidth usage |
Question 74 |
A | 00:f3:82:99:a2:b8 |
B | 3ffe:1900:4545:3:200:f8ff:fe21:67cf |
C | 61.23.168.192.in-addr.arpa |
D | 192.168.2.1 |
Question 75 |
A | Time |
B | Certificate |
C | Ticket |
D | Token |
Question 76 |
A | Smart card reader |
B | Asset tracking tags |
C | Motion detection |
D | Biometric locks |
Question 77 |
Department-VLAN#-Subnet used
Marketing-20-192.168.20.0/28
Customer Service-25-192.168.20.64/28
Finance-30-192.168.30.0/28
WHSE-35-192.168.30.16/28
Sales-40-192.168.3.16/28
The users experiencing this issue need to be added to which of the following VLANs?
A | 35 |
B | 30 |
C | 40 |
D | 25 |
Question 78 |
A | NTP |
B | SMTP |
C | HTTP |
D | RDP |
Question 79 |
A | env |
B | getargs |
C | ls |
D | lsenv |
E | lsshell |
Question 80 |
A | Latency |
B | Signal-to-noise ratio |
C | Attenuation |
D | Interference |
E | Packet loss |
F | Reflection |
Question 81 |
A | CAT5e |
B | CAT6a |
C | CAT3 |
D | Fiber |
Question 82 |
A | CASB |
B | PaaS |
C | SaaS |
D | IaaS |
Question 83 |
A | CSU/DSU |
B | Switch |
C | MDF |
D | IDF |
Question 84 |
A | Coaxial |
B | Serial |
C | UTP |
D | Multimode |
Question 85 |
A | Multicast |
B | Broadcast |
C | Unicast |
D | Subnetting |
Question 86 |
A | OSPF |
B | CSMA/CD |
C | CSMA/CA |
D | MPLS |
Question 87 |
A | The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router |
B | The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router |
C | The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem |
D | The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem |
Question 88 |
A | Install a UPS |
B | Replace the switch uplink cable |
C | Install a new electrical circuit |
D | Install a new switch |
E | Install a power conditioner |
Question 89 |
A | A network built with Bus Topology |
B | A network built with Ring Topology |
C | A network built with Star Topology |
D | A network built with Logical Topology |
E | A network built with Mesh Topology |
Question 90 |
A | Create a VLAN for the unused ports and create a honeyspot on the VLAN |
B | Install a BPDU guard on switchports and enable STP |
C | Install antivirus software and set an ACL on the servers |
D | Create a DMZ for public servers and secure a segment for the internal network |
Question 91 |
A | Star |
B | Bus |
C | WLAN |
D | Ring |
Question 92 |
A | 94:9E:FE:EE:8C:DF |
B | AA:CE:58:FD:90:08 |
C | 56:AD:BX:89:55:54 |
D | 44:98:3E:F8:33:23 |
Question 93 |
A | IPSec |
B | VTP |
C | SNMPv3 |
D | CDP |
Question 94 |
A | Smurf attack |
B | Buffer overflow attack |
C | NMAP |
D | Social engineering |
E | MITM |
Question 95 |
A | Social engineering |
B | Insider threat |
C | Logic bomb |
D | Man-in-the-middle |
Question 96 |
A | Verify the browser is using port 443 |
B | Check port 636 to see if it is being blocked |
C | Change service port 636 to port 389 |
D | Restart the web server |
Question 97 |
A | BGP |
B | RIP |
C | EIGRP |
D | OSPF |
Question 98 |
A | WAF |
B | IDS |
C | DLP |
D | TPM |
E | WPA |
Question 99 |
A | Allow TCP port 3389 inbound |
B | Allow UDP port 3389 outbound |
C | Allow UDP port 3389 inbound |
D | Allow TCP port 3389 outbound |
Question 100 |
A | 128 bits |
B | 64 bits |
C | 256 bits |
D | 32 bits |
Question 101 |
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40
Which is true about the above configuration?
A | Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. |
B | An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
C | Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client. |
D | An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
Question 102 |
A | Link state |
B | Hybrid |
C | Distance vector |
D | Static |
Question 103 |
SSID: SANUJA-WiFi
Signal: 5%
SNR: 2
A | Incorrect antenna type |
B | Channel overlap |
C | Overcapacity |
D | Latency |
Question 104 |
A | Logical and physical diagrams |
B | IDF/MDF documentation |
C | Network performance baseline |
D | Rack diagram |
Question 105 |
A | EIGRP |
B | UDP |
C | IPv6 |
D | ICMP |
Question 106 |
A | Flood guard |
B | BPDU guard |
C | Spanning tree |
D | DHCP snooping |
Question 107 |
A | Part of the subnet is configured to use different VLANs |
B | Some of the servers are configured to use different gateways |
C | Those servers have host-based firewalls |
D | New servers are being provisioned in the cloud |
Question 108 |
A | Differential backup |
B | Full backup |
C | Hot site |
D | Warm site |
E | Incremental backup |
F | Cold site |
Question 109 |
A | Baseline report |
B | Vulnerability report |
C | Business continuity plan |
D | Rollback plan |
Question 110 |
A | Enable access point antenna isolation |
B | Enable wireless multimedia (WMM) for QoS |
C | Use the 40MHz channels in the 2.4GHz band |
D | Limit the clients to 802.11g compatible laptops |
Question 111 |
A | Allow RDP through an external firewall |
B | Connect utilizing client-to-site VPN |
C | Utilize an SSH connection to the corporate server |
D | Use TFTP to transfer files to corporate resources |
Question 112 |
A | 1, 6, 11 |
B | 2, 5, 10 |
C | 4, 8, 16 |
D | 3, 13, 23 |
Question 113 |
A | White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown |
B | White/Green, Green, White/Blue, Blue, White/Orange, Orange, White/Brown. Brown |
C | White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown. Brown |
D | White/Blue, Orange, White/Green, Blue, White/Orange, Green, White/Brown, Brown |
E | White/Orange, Orange, White/Brown, Blue, White/Blue, Green, White/Green, Brown |
Question 114 |
A | NTP |
B | SDN |
C | NAC |
D | Traffic shaping |
E | ACL |
Question 115 |
A | The LWAPP image is installed on the WAP |
B | The terminal emulation software is misconfigured |
C | The WAP antenna is damaged |
D | The WAP transmitter light is dim |
Question 116 |
A | LC |
B | ST |
C | MT-RJ |
D | SC |
Question 117 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Each department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where should the router be palced? Click on the image to enlarge.
A | C8 |
B | C7 |
C | C6 |
D | C10 |
E | C5 |
Question 118 |
A | Remove unnecessary testing accounts. |
B | Disable the HTTP port in the host firewall. |
C | Upgrade the firmware on the firewall. |
D | Generate new SSH host keys. |
E | Issue a new self-signed certificate. |
Question 119 |
A | PTR |
B | MX |
C | NS |
D | CNAME |
E | SRV |
Question 120 |
A | Log scanning |
B | Baseline review |
C | Port scanning |
D | Packet capturing |
Question 121 |
A | DTLS |
B | Datagram Transport Layer Security (DTLS) |
C | DNS |
D | SNMP |
E | TFTP |
Question 122 |
A | The SSIDs are incompatible and should be renamed. |
B | The channels are overlapping with other wireless networks and should be changed. |
C | The users have incompatible wireless network cards and should upgrade. |
D | The default idle period for logoff is too short and should be changed to a longer limit. |
Question 123 |
A | The network administrator should install and configure a network sniffer |
B | The network administrator should install and configure a DMZ server |
C | The network administrator should install and configure a traffic analysis server |
D | The network administrator should install and configure a syslog server |
Question 124 |
A | NDA |
B | AUP |
C | SLA |
D | SOP |
Question 125 |
A | Data link |
B | Transport |
C | Network |
D | Physical |
E | Session |
Question 126 |
A | Replace multimode with single-mode cable |
B | Transpose the fiber pairs |
C | Fall back to the old switch |
D | Replace SFP with a new one |
Question 127 |
A | IPsec |
B | 802.1x |
C | FIFO |
D | MIMO |
E | WPA |
Question 128 |
A | MTU size greater than 1500 |
B | MTU size greater than 10000 |
C | Commonly used on IaaS |
D | Commonly used on SAN |
E | MTU size greater than 12000 |
Question 129 |
A | Decreases bandwidth on a network |
B | Increases port speed |
C | Allows another connection to the router |
D | Segments broadcast traffic |
Question 130 |
A | Add a router and enable OSPF. |
B | Add a firewall and implement proper ACL. |
C | Add a layer 3 switch and create a VLAN. |
D | Add a bridge between two switches. |
Question 131 |
A | NTP |
B | LDAP |
C | POP3 |
D | IMAP |
E | SMTP |
Question 132 |
A | Turn off as many lights in the executive’s office as possible to reduce interference |
B | Change the channel on the access point to channel 11 |
C | Replace the 802.11n access point in the office with an 802.11a access point |
D | Turn off SSID broadcasting for the executive’s access point |
Question 133 |
A | The SET function pushes an alert to the MIB database |
B | A response message is sent from the agent to the manager |
C | A trap message is sent via UDP to the monitoring workstation |
D | The object identifier is modified and reported during the next monitoring cycle |
Question 134 |
A | SNMP |
B | QoS |
C | L2TP |
D | SSH |
Question 135 |
A | Incident response policy |
B | DLP policy |
C | BYOD policy |
D | Remote access policy |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.