← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set I | Set II
CompTIA Network+ N10-007 - Set III
Congratulations - you have completed CompTIA Network+ N10-007 - Set III.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Switch |
B | CSU/DSU |
C | IDF |
D | MDF |
Question 2 |
A | ISAKMP |
B | FTP |
C | PPTP |
D | L2TP |
E | CARP |
Question 3 |
A | Fiber |
B | CAT6a |
C | CAT5e |
D | CAT3 |
Question 4 |
A | The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem |
B | The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem |
C | The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router |
D | The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router |
Question 5 |
A | Replace the 802.11n access point in the office with an 802.11a access point |
B | Change the channel on the access point to channel 11 |
C | Turn off SSID broadcasting for the executive’s access point |
D | Turn off as many lights in the executive’s office as possible to reduce interference |
Question 6 |
A | Baseline report |
B | Rollback plan |
C | Business continuity plan |
D | Vulnerability report |
Question 7 |
A | Increases port speed |
B | Decreases bandwidth on a network |
C | Allows another connection to the router |
D | Segments broadcast traffic |
Question 8 |
A | 802.1x |
B | WPA |
C | MIMO |
D | IPsec |
E | FIFO |
Question 9 |
A | Change management records |
B | Network log files |
C | Logical diagrams |
D | Inventory management |
Question 10 |
A | CHAP |
B | MS-CHAP |
C | Digital signatures |
D | MAC filtering |
Question 11 |
A | SDN |
B | NAC |
C | Traffic shaping |
D | NTP |
E | ACL |
Question 12 |
A | WAP SSIDs are matching |
B | WAPs are transmitting on same channel |
C | PKI should be turned off |
D | WPA should be enabled |
Question 13 |
A | Multimode |
B | UTP |
C | Serial |
D | Coaxial |
Question 14 |
A | Social engineering |
B | Smurf attack |
C | NMAP |
D | Buffer overflow attack |
E | MITM |
Question 15 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Each department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where should the router be palced? Click on the image to enlarge.
A | C10 |
B | C6 |
C | C7 |
D | C5 |
E | C8 |
Question 16 |
A | DNS poisoning |
B | Ransomware |
C | Evil twin |
D | Man-in-the-middle |
E | Reflective |
F | ARP poisoning |
Question 17 |
A | Multipath support |
B | Channel expansion |
C | Gigabit wireless bandwidth |
D | Channel bonding |
Question 18 |
A | EIGRP |
B | RIP |
C | BGP |
D | OSPF |
Question 19 |
A | Loopback IP |
B | Reserved IP |
C | Virtual IP |
D | Public IP |
Question 20 |
A | Phishing |
B | Rogue access points |
C | Man-in-the-middle attacks |
D | DoS attacks |
Question 21 |
A | Ticket |
B | Token |
C | Time |
D | Certificate |
Question 22 |
A | Logical diagram |
B | Network baseline |
C | Physical diagram |
D | Change management log |
Question 23 |
Department-VLAN#-Subnet used
Marketing-20-192.168.20.0/28
Customer Service-25-192.168.20.64/28
Finance-30-192.168.30.0/28
WHSE-35-192.168.30.16/28
Sales-40-192.168.3.16/28
The users experiencing this issue need to be added to which of the following VLANs?
A | 35 |
B | 40 |
C | 25 |
D | 30 |
Question 24 |
A | Router to switch |
B | Router to modem |
C | PC to switch |
D | PC to PC |
E | Switch to AP |
Question 25 |
A | Rack diagram |
B | Logical and physical diagrams |
C | Network performance baseline |
D | IDF/MDF documentation |
Question 26 |
A | Channel overlapping |
B | Interference |
C | Overcapacity |
D | DHCP exhaustion |
Question 27 |
A | Hub |
B | Switch |
C | IDS |
D | Router |
E | Network tap |
F | IPS |
Question 28 |
A | Hot site |
B | Incremental backup |
C | Differential backup |
D | Full backup |
E | Warm site |
F | Cold site |
Question 29 |
A | PTR |
B | NS |
C | SRV |
D | MX |
E | CNAME |
Question 30 |
A | White/Orange, Orange, White/Brown, Blue, White/Blue, Green, White/Green, Brown |
B | White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown |
C | White/Green, Green, White/Blue, Blue, White/Orange, Orange, White/Brown. Brown |
D | White/Blue, Orange, White/Green, Blue, White/Orange, Green, White/Brown, Brown |
E | White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown. Brown |
Question 31 |
A | HTTP |
B | NTP |
C | RDP |
D | SMTP |
Question 32 |
A | WPA2 |
B | DMZ |
C | Honeypots |
D | Signature-based IPS |
E | Behavior-based IPS |
Question 33 |
A | Wireless firewall |
B | Wireless hub |
C | Wireless access point |
D | Wireless bridge |
Question 34 |
A | OC3 |
B | DS3 |
C | E3 |
D | T3 |
Question 35 |
A | Asset tracking tags |
B | Smart card reader |
C | Motion detection |
D | Biometric locks |
Question 36 |
A | Used to determine which port a CAT6 cable is connected. |
B | Used to terminate a cable at a 110 block. |
C | Used to correct open short on a cable. |
D | Used to verify known good patch cables. |
E | Used to verify functionality after a NIC is installed. |
Question 37 |
A | ACL allowing only Telnet |
B | Out-of-band modem |
C | ACL allowing only HTTP |
D | Out-of-band console router |
Question 38 |
A | Packet filtering on the wireless access point |
B | Content filtering on the wireless access point |
C | Block traffic from the wireless access point |
D | Allow traffic from the wireless access point |
Question 39 |
A | Some of the servers are configured to use different gateways |
B | Those servers have host-based firewalls |
C | New servers are being provisioned in the cloud |
D | Part of the subnet is configured to use different VLANs |
Question 40 |
A | Incorrect VLAN assignment on the router |
B | A missing route on the alarm device |
C | Incorrect speed/duplex setting on the alarm device |
D | A missing route on the network routers |
Question 41 |
A | 802.11g |
B | Z-Wave |
C | 802.11b |
D | 802.11n |
E | 802.11ac |
Question 42 |
A | TLS |
B | HTTPS |
C | Split tunneling |
D | Remote file access |
Question 43 |
A | MT-RJ |
B | SC |
C | LC |
D | ST |
Question 44 |
A | WEP uses plain text |
B | WEP uses RC4 which is easily accessible and not secure |
C | WEP’s IV is too small |
D | WEP is not well supported |
Question 45 |
A | PVC Cat 5 |
B | Plenum Cat 5e |
C | Plenum Cat 6a |
D | PVC Cat 7 |
Question 46 |
Requirements:
– The remote Sales Team must be able to connect to the corporate network.
– Each department must have ONLY two PCs and a server.
– Eqach department must be segmented from each other.
– The following VLANs have been designed:
— VLAN 2 Finance
— VLAN 12 Sales
— VLAN 22 Human Resources (HR)
– Routing for VLAN 12 is implemented on the router. Routing for VLAN 2 and VLAN 22 is on the switch.
According to the following network diagram for Company A, where would you place the Layer 2 and Layer 3 switches? Click on the image to enlarge.
A | Layer 2 at C7 and Layer 3 at C6 |
B | Layer 2 at C8 and Layer 3 at C6 |
C | Layer 2 at C10 and Layer 3 at C12 |
D | Layer 2 at C5 and Layer 3 at C6 |
E | Layer 2 at C6 and Layer 3 at C6 |
Question 47 |
A | Create a VLAN for the unused ports and create a honeyspot on the VLAN |
B | Install a BPDU guard on switchports and enable STP |
C | Install antivirus software and set an ACL on the servers |
D | Create a DMZ for public servers and secure a segment for the internal network |
Question 48 |
A | Environmental monitor |
B | Cable tester |
C | OTDR |
D | Punch down tool |
Question 49 |
A | Fiber cable mismatch |
B | Fiber type mismatch |
C | Bad fiber switch |
D | Bend radius exceeded |
Question 50 |
A | SC |
B | LC |
C | ST |
D | MT-RJ |
Question 51 |
A | 192.168.2.1 |
B | 3ffe:1900:4545:3:200:f8ff:fe21:67cf |
C | 00:f3:82:99:a2:b8 |
D | 61.23.168.192.in-addr.arpa |
Question 52 |
A | Smart card + PIN |
B | Key fob + ID card |
C | Username + password |
D | Fingerprint + retina scan |
Question 53 |
A | Peer-to-peer |
B | Point-to-multipoint |
C | Hybrid |
D | Point-to-point |
Question 54 |
A | DHCP snooping |
B | BPDU guard |
C | ARP protection |
D | Spanning tree |
Question 55 |
A | Bus |
B | WLAN |
C | Star |
D | Ring |
Question 56 |
A | tracert |
B | pathping |
C | nslookup |
D | tcpdump |
E | ping |
F | netstat |
G | route |
Question 57 |
Cable | Test | Result |
---|---|---|
1.2 | Open | 7ft |
3.6 | Short | 7ft |
4.5 | Open | 7ft |
7.8 | Open | 7ft |
A | Multimeter |
B | Toner Probe |
C | OTDR |
D | Protocol Analyzer |
E | Crimper |
F | Cable Certifier |
G | Punch Down Tool |
Question 58 |
A | The LWAPP image is installed on the WAP |
B | The WAP transmitter light is dim |
C | The WAP antenna is damaged |
D | The terminal emulation software is misconfigured |
Question 59 |
A | IPv4 to IPv6 tunnel |
B | IPsec |
C | APIPA |
D | EUI-64 |
E | MAC reservations |
Question 60 |
A | Excessive bandwidth usage |
B | Broadcast storm |
C | STP convergence |
D | Power failure |
Question 61 |
A | Broadcast |
B | Unicast |
C | Multicast |
D | Subnetting |
Question 62 |
A | OSPF |
B | EIGRP |
C | BGP |
D | RIP |
Question 63 |
A | Spear phishing |
B | Impersonation |
C | Privilege escalation |
D | Whaling |
Question 64 |
A | SNMP |
B | SSH |
C | L2TP |
D | QoS |
Question 65 |
A | getargs |
B | env |
C | ls |
D | lsshell |
E | lsenv |
Question 66 |
A | The technician should set up individual routes between the machines. |
B | The technician should connect the machine to its own separate switch. |
C | The technician should add a route in each virtual machine to the default gateway. |
D | The technician should configure a virtual switch. |
Question 67 |
A | IDS |
B | Managed switch |
C | Bridge |
D | Router |
E | Firewall |
Question 68 |
A | Cell size increases |
B | Throughput decreases |
C | Connection speeds decrease |
D | Attenuation increases |
Question 69 |
A | Allow UDP port 3389 inbound |
B | Allow UDP port 3389 outbound |
C | Allow TCP port 3389 outbound |
D | Allow TCP port 3389 inbound |
Question 70 |
A | Incident response policy |
B | BYOD policy |
C | DLP policy |
D | Remote access policy |
Question 71 |
A | Baseline review |
B | Port scanning |
C | Log scanning |
D | Packet capturing |
Question 72 |
A | CSMA/CA |
B | MPLS |
C | OSPF |
D | CSMA/CD |
Question 73 |
A | A network built with Logical Topology |
B | A network built with Star Topology |
C | A network built with Mesh Topology |
D | A network built with Bus Topology |
E | A network built with Ring Topology |
Question 74 |
A | Signal-to-noise ratio |
B | Interference |
C | Reflection |
D | Attenuation |
E | Latency |
F | Packet loss |
Question 75 |
A | route |
B | nmap |
C | pathping |
D | nslookup |
Question 76 |
A | SC |
B | MT-RJ |
C | ST |
D | LC |
Question 77 |
A | Private certificate |
B | HTTPS server |
C | Shared secret |
D | Soft spoken |
Question 78 |
A | Issue a new self-signed certificate. |
B | Upgrade the firmware on the firewall. |
C | Disable the HTTP port in the host firewall. |
D | Generate new SSH host keys. |
E | Remove unnecessary testing accounts. |
Question 79 |
A | Partial mesh |
B | Hub and spoke |
C | Full mesh |
D | Bus |
E | Ring |
Question 80 |
A | Commonly used on IaaS |
B | MTU size greater than 10000 |
C | MTU size greater than 12000 |
D | Commonly used on SAN |
E | MTU size greater than 1500 |
Question 81 |
A | SC |
B | LC |
C | MT-RJ |
D | ST |
Question 82 |
A | Layer 1 |
B | Layer 5 |
C | Layer 4 |
D | Layer 7 |
E | Layer 6 |
F | Layer 3 |
G | Layer 2 |
Question 83 |
A | Add a firewall and implement proper ACL. |
B | Add a router and enable OSPF. |
C | Add a bridge between two switches. |
D | Add a layer 3 switch and create a VLAN. |
Question 84 |
A | ICMP |
B | EIGRP |
C | UDP |
D | IPv6 |
Question 85 |
A | 192.170.10.0/24 |
B | 10.10.50.0/30 |
C | 192.1.0.124/30 |
D | 192.168.0.192/24 |
E | 172.16.20.0/30 |
Question 86 |
A | Limit the clients to 802.11g compatible laptops |
B | Use the 40MHz channels in the 2.4GHz band |
C | Enable access point antenna isolation |
D | Enable wireless multimedia (WMM) for QoS |
Question 87 |
A | The network administrator should install and configure a syslog server |
B | The network administrator should install and configure a traffic analysis server |
C | The network administrator should install and configure a DMZ server |
D | The network administrator should install and configure a network sniffer |
Question 88 |
A | Attenuation |
B | Distance |
C | Absorption |
D | Refraction |
E | Reflection |
Question 89 |
A | Syslog |
B | Environmental monitor |
C | Placement map |
D | Network map |
Question 90 |
A | Packet sniffer |
B | IDS |
C | Port scan |
D | IPS |
Question 91 |
A | IPSec |
B | VTP |
C | CDP |
D | SNMPv3 |
Question 92 |
A | DNS |
B | DTLS |
C | TFTP |
D | Datagram Transport Layer Security (DTLS) |
E | SNMP |
Question 93 |
A | Router |
B | Range extender |
C | Access point |
D | VoIP endpoint |
Question 94 |
A | Replace multimode with single-mode cable |
B | Transpose the fiber pairs |
C | Replace SFP with a new one |
D | Fall back to the old switch |
Question 95 |
A | The channels are overlapping with other wireless networks and should be changed. |
B | The default idle period for logoff is too short and should be changed to a longer limit. |
C | The SSIDs are incompatible and should be renamed. |
D | The users have incompatible wireless network cards and should upgrade. |
Question 96 |
A | Star |
B | Mesh |
C | Bus |
D | Ring |
Question 97 |
A | FE80::/10 |
B | FF00::/8 |
C | FEEF:/12 |
D | 2FFE::/16 |
Question 98 |
A | DCCP |
B | Packet sniffer |
C | SCTP |
D | SNMP |
E | Simple Network Management Protocol (SNMP) |
Question 99 |
A | Modem |
B | Hub |
C | Router |
D | Switch |
Question 100 |
A | Client-to-site VPN |
B | Router ACL |
C | Out-of-band management |
D | HTTPS management URL |
Question 101 |
A | Firewall |
B | Router |
C | Bridge |
D | Multiplayer switch |
Question 102 |
A | Fibre Channel |
B | iSCSI |
C | NAS |
D | InfiniBand |
Question 103 |
A | 2, 5, 10 |
B | 4, 8, 16 |
C | 3, 13, 23 |
D | 1, 6, 11 |
Question 104 |
A | Connect utilizing client-to-site VPN |
B | Utilize an SSH connection to the corporate server |
C | Allow RDP through an external firewall |
D | Use TFTP to transfer files to corporate resources |
Question 105 |
A | Ping |
B | Nessus |
C | Baseline analyzer |
D | Protocol analyzer |
Question 106 |
A | Packet capturing |
B | Baseline review |
C | Log scanning |
D | Port scanning |
Question 107 |
A | A trap message is sent via UDP to the monitoring workstation |
B | The object identifier is modified and reported during the next monitoring cycle |
C | The SET function pushes an alert to the MIB database |
D | A response message is sent from the agent to the manager |
Question 108 |
A | Strong RC4 encryption |
B | Shared secret keys |
C | AES encryption |
D | MAC filtering |
E | Key rotation |
Question 109 |
A | 32 bits |
B | 64 bits |
C | 128 bits |
D | 256 bits |
Question 110 |
A | Kerberos |
B | NTLM |
C | MS-CHAP |
D | CHAP |
Question 111 |
A | Switches packets between different subnets based on MAC addresses |
B | Switches packets within the same subnet based on MAC addresses |
C | Switches packets between same subnets based on IP addresses |
D | Switches packets between different subnets based on IP addresses |
Question 112 |
A | Logic bomb |
B | Man-in-the-middle |
C | Insider threat |
D | Social engineering |
Question 113 |
A | Frame relay |
B | PPP |
C | ATM |
D | MPLS |
Question 114 |
A | POP3 |
B | SMTP |
C | IMAP |
D | LDAP |
E | NTP |
Question 115 |
A | Install a new switch |
B | Replace the switch uplink cable |
C | Install a UPS |
D | Install a power conditioner |
E | Install a new electrical circuit |
Question 116 |
A | AUP |
B | SOP |
C | NDA |
D | SLA |
Question 117 |
A | MIMO |
B | Disable SSID |
C | Channel bonding |
D | Increase the signal |
Question 118 |
A | Blocking |
B | Forwarding |
C | Disabled |
D | Learning |
Question 119 |
A | Absorption |
B | Channel overlap |
C | Frequency mismatch |
D | Reflection |
Question 120 |
A | MTU mismatch |
B | STP blocking |
C | IP addresses |
D | Switching loop |
Question 121 |
A | Latency |
B | Distance limitations |
C | Security type mismatch |
D | Absorption |
Question 122 |
A | DLP |
B | WPA |
C | IDS |
D | WAF |
E | TPM |
Question 123 |
SSID: SANUJA-WiFi
Signal: 5%
SNR: 2
A | Overcapacity |
B | Latency |
C | Channel overlap |
D | Incorrect antenna type |
Question 124 |
A | CASB |
B | PaaS |
C | SaaS |
D | IaaS |
Question 125 |
IP address: 172.16.204.12
Subnet Mask: 255.255.0.0
Default Gateway: 172.15.204.254
DNS address: 172.16.204.1
Broadcast address: 172.16.255.255
A | Subnet mask |
B | Default gateway |
C | Broadcast address |
D | DNS address |
E | IP address |
Question 126 |
A | Yagi |
B | Parabolic |
C | Unidirectional |
D | Omnidirectional |
Question 127 |
A | Hybrid |
B | Link state |
C | Distance vector |
D | Static |
Question 128 |
A | TCP port 25 |
B | TCP port 22 |
C | UDP port 22 |
D | UDP port 53 |
E | UDP port 69 |
Question 129 |
A | Session |
B | Physical |
C | Transport |
D | Data link |
E | Network |
Question 130 |
A | BPDU guard |
B | Spanning tree |
C | DHCP snooping |
D | Flood guard |
Question 131 |
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40
Which is true about the above configuration?
A | An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
B | Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. |
C | An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client. |
D | Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client. |
Question 132 |
A | BNC |
B | MT-RJ |
C | GBIC |
D | F-type |
Question 133 |
A | Verify the browser is using port 443 |
B | Change service port 636 to port 389 |
C | Restart the web server |
D | Check port 636 to see if it is being blocked |
Question 134 |
A | 162.17.43.22 |
B | 132.216.14.184 |
C | 152.119.25.213 |
D | 172.23.226.34 |
Question 135 |
A | 94:9E:FE:EE:8C:DF |
B | 56:AD:BX:89:55:54 |
C | 44:98:3E:F8:33:23 |
D | AA:CE:58:FD:90:08 |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.