CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 1

(This is a simulated Performance-Based Question. On the real certification exam, you would be asked to drag-and-drop the correct encryption onto the APs.) 

Your company has purchased a new building down the street for its executive suites. You have been asked to choose the best encryption for AP4 and AP5 in order to establish a secure wireless connection between the main building and the executive suites. 

Which of the following is the BEST encryption from the options below to maximize network security between AP4 and AP5?


Options are :

  • Open
  • WEP
  • WPA
  • WPA2-CCMP
  • WPA2-TKIP

Answer :WPA2-CCMP

CompTIA JK0-801 A Laptop Printer and Operating certify Exam Set 6

(This is a simulated Performance-Based Question.) 

The company's corporate headquarters provided your branch office a portion of their Class C subnet to use at a new office location. You must allocate the minimum number of addresses using CIDR notation in order to accommodate each department's needs. 

What is the correct CIDR notation for the Marketing department's subnet which requires 11 devices?


Options are :

  • /25
  • /26
  • /27
  • /28
  • /29
  • /30

Answer :/28

(This is a simulated Performance-Based Question.) What is the correct color scheme for Pin 1 to Pin 8 for a T-568B connector?


Options are :

  • blue, white/blue, orange, white/brown, brown , white/green, green, orange/white
  • white/green, green, orange/white, blue, white/blue, orange, white/brown, brown
  • white/orange, orange, white/green, blue, white/blue, green, white/brown, brown
  • white/green, green , white/orange, orange, blue, white/blue, white/brown, brown

Answer :white/orange, orange, white/green, blue, white/blue, green, white/brown, brown

(This is a simulated Performance-Based Question.) What ports do FTP and SFTP utilize?


Options are :

  • 20, 21
  • 21, 22
  • 22, 23
  • 21, 23

Answer :21, 22

LX0-104 CompTIA Linux+ [Powered by LPI] Exam Set 2

(This is a simulated Performance-Based Question.) 

You are testing a cable you found in your network closet. You connect a cable tester to both sides of the cable to verify the pinout of the Ethernet cable. After testing each pin, your cable tester gives you the following output:

Based on this output, what kind of cable is it?


Options are :

  • Patch cable
  • Crossover cable
  • Rollover cable
  • RG-6 cable

Answer :Patch cable

Which type of network geography is used to connect various circuits between remote locations?


Options are :

  • WAN
  • PAN
  • WLAN
  • LAN

Answer :WAN

A network administrator wants to implement a centralized monitoring solution that utilizes push alerts sent from the client to a server. Which of the following should be implemented within the network?


Options are :

  • SNMP
  • SMTP
  • NIDS
  • SMS

Answer :SNMP

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 3

Which of the following wireless technologies use MIMO on non-overlapping channels to increase the bandwidth of the wireless network?


Options are :

  • 802.11a
  • 802.11b
  • 802.11g
  • 802.11n

Answer :802.11n

You have been asked by your supervisor, Martha, to ensure that you enable 802.3af on a managed switch. Which of the following features does Martha want you to enable?


Options are :

  • PoE
  • Port bonding
  • VLAN
  • Trunking

Answer :PoE

What can be issued from the command line to find the layer 3 hops to a remote destination?


Options are :

  • traceroute
  • nslookup
  • ping
  • netstat

Answer :traceroute

SY0-401 CompTIA Security+ Certification Practice Exam Set 4

A network technician is troubleshooting connectivity problems between switches but suspects the ports are not properly labeled. What option will help to quickly identify the switches connected to each port?


Options are :

  • Configure TACACs+ on each network device
  • Enable a discovery protocol on the network devices.
  • Configure each uplink to send LACP discovery units.
  • Enable a packet sniffer on each network device's uplink port.

Answer :Enable a discovery protocol on the network devices.

Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently only one student can log in at a time. What should be done to fix this issue?


Options are :

  • Increase installed memory and install a larger flash module
  • Increase the number of VLANs configured on the switch
  • Decrease the number of VLANs configured on the switch
  • Increase the number of virtual terminals available

Answer :Increase the number of virtual terminals available

Which of the following is an example of a valid IPv4 address?


Options are :

  • 192:168:1:55
  • 192.168.1.254
  • 00:AB:FA:B1:07:34
  • ::1

Answer :192.168.1.254

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 4

A user has installed a new wireless printer on the network. The user cannot get it connected to the Internet, but can print locally. All other office users can reach the Internet, but cannot connect to the new wireless printer. All users are wireless in this part of the office. What MOST likely has occurred?


Options are :

  • They installed the printer in infrastructure mode
  • They installed the printer in the wrong subnet
  • They misconfigured the gateway on the wireless printer
  • They installed the printer in ad-hoc mode

Answer :They installed the printer in ad-hoc mode

The Chief Information Officer (CIO) in your company has been trying to convince the Chief Security Officer (CSO) that the company should move its data to a SaaS solution in order to some money in the budget. The CSO is hesitant to move all of the company's data because she is concerned with the risk involved in moving the corporation's sensitive data to a SaaS solution. The CSO has been asked for a reason behind her fears. Which of the following might be her response?


Options are :

  • The SaaS solution is incompatible with our current network
  • Migrating all of our data to a SaaS solution will result in a loss of full control over our data and resources
  • Migrating our data to a SaaS solution will result in decreased performance in our internal network
  • Migrating to a SaaS solution will put us at a higher risk of exposure to malware and hackers

Answer :Migrating all of our data to a SaaS solution will result in a loss of full control over our data and resources

Jason just got into his car and paired his smartphone to his car's stereo. Which of the following types of networks was just created?


Options are :

  • LAN
  • PAN
  • WAN
  • MAN

Answer :PAN

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 3

You have been asked by the server administrators to open the default port on the firewall for their new DNS server. Which of the following ports should you set as ALLOW in the ACL?


Options are :

  • 53
  • 67
  • 110
  • 3389

Answer :53

A college needs to provide wireless connectivity in a cafeteria with a minimal number of WAPs. What type of antenna will provide the BEST coverage?


Options are :

  • High gain
  • Bidirectional
  • Dipole
  • Omni-directional

Answer :High gain

Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues are occurring and remember that each time it occurs that the lights also become dimmer momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the power cycling of the router. What should you (a network technician) do to solve this problem?


Options are :

  • Install an upgraded router
  • Install a surge protector
  • Install a UPS
  • Install a new electrical outlet

Answer :Install a UPS

CompTIA CA1-001 Advanced Security Practitioner Practice Exam Set 3

An end user receives a new computer and now is unable to connect to a database using ODBC. Other users are able to connect successfully, and the network technician is able to successfully ping the database server but still is unable to connect. What might have caused this issue?


Options are :

  • Missing IP routes on router
  • Wrong default gateway address
  • Software firewall is blocking ports
  • Failing network interface card

Answer :Software firewall is blocking ports

A network's design includes gateways connecting an assembly-line network. The assembly-line network uses specialized cabling and interfaces to allow the assembly-line robots to communicate with one another. Which type of network would you classify this design as?


Options are :

  • CSU/DSU
  • SCADA/ICS
  • IS-IS
  • LAN

Answer :SCADA/ICS

You have just upgrade a small office LAN switch. When you finish, a user states they can no longer access the network. You check the user's workstation, but do not see any LED lights lit on their NIC. What should you check next?


Options are :

  • Verify the switch is connected to the router
  • Verify the device is using the correct cable type
  • Verify the NIC is operating properly
  • Verify the network cable is attached to the new switch

Answer :Verify the network cable is attached to the new switch

CompTIA Project+ (PK0-004) 5 Practice Test 2019 Set 1

Several users at an adjacent office building report connectivity issues after a new building was built in-between the two offices. The network technician has determined the adjacent office building is connected to the main office building via an 802.11ac bridge. The network technician logs into the AP and confirms the SSID, encryption, and channels are all correct. Which of the following is MOST likely the cause of this issue?


Options are :

  • Device saturation
  • Antenna type
  • Bandwidth saturation
  • Interference

Answer :Interference

You are configuring a network to utilize SNMPv3 to send information from your network devices back to a SNMP manager. Which of the following SNMP options should you enable to ensure the data is transferred confidentially?


Options are :

  • authPriv
  • authNoPriv
  • authProtect
  • authEncrypt

Answer :authPriv

You are working as a wireless networking technician and running a wireless controller to aid in the administration of the network. You supervisor has requested that you implement a centralized authentication service. Which of the following devices should you install and configure if you want to decrease the amount of time spent administering the network while still providing a centralized authentication service for your users?


Options are :

  • Layer 3 switch
  • Proxy server
  • RADIUS server
  • VPN concentrator

Answer :RADIUS server

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 11

A new network administrator is hired to replace a consultant that has been running the network for several months and whose contract was just cancelled. After a month of working on the network, the new network administrator realized there are some network issues and configuration changes in the server settings. The log files on the servers do not contain any error messages related to the issues or changes. What could be the problem?


Options are :

  • TACACS+\RADIUS misconfiguration is causing logs to be erased
  • ICMP ping of death is resetting DHCP and DNS on the server
  • A backdoor has been installed to access the network
  • The last ACL on the router is set to Deny All

Answer :A backdoor has been installed to access the network

Lynne is a home user who would like to share music throughout the computers in her house using an external USB hard drive connected to a router that she purchased over a year ago. The manufacturer states that the router is capable of recognizing drives up to 4TB in size, but she cannot get her 3TB drive to show up on the network. What should Lynne do to fix this problem?


Options are :

  • Load the latest hardware drivers for her USB drive
  • Install the latest OS on her computers
  • Download the latest playback software for her music files
  • Flash the latest firmware for her router

Answer :Flash the latest firmware for her router

Which device actively defends the network by detecting threats and shutting down ports or changing configurations to prevent attacks?


Options are :

  • Honeypot
  • IPS
  • Firewall
  • IDS

Answer :IPS

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 10

Which of the following ports are used to provide secure remote connection sessions over the Internet?


Options are :

  • 22
  • 25
  • 80
  • 23

Answer :22

Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router is unable to get a DHCP address even though her corporate laptop can get a DHCP address when connected to the same jack. Barbara checked the router's configuration to ensure it is setup to obtain a DHCP address. Which of the following is the MOST likely reason that the router is not getting a DHCP address?


Options are :

  • The administrator has enabled DHCP snooping on the network
  • The administrator is blocking DHCP requests that originate from access points
  • The administrator is blocking the wireless router's MAC address using MAC filtering
  • The Administrator has implemented a feature that only allows whitelist MAC addresses to connect to the network

Answer :The Administrator has implemented a feature that only allows whitelist MAC addresses to connect to the network

A network technician needs to monitor the network to find a user that is browsing websites that are against the company policy. What should the technician use to view the website and find the user browsing it?


Options are :

  • SNMP GET
  • Top listener tool
  • Intrusion detection system
  • Packet sniffer

Answer :Packet sniffer

CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 1

You are trying to increase the security of your network by implementing a system of two-factor authentication (2FA). Which of the following authentication factors should you choose to meet this requirement?


Options are :

  • Smartcard and PIN
  • Facial scan and fingerprint
  • Key fob and smartcard
  • Username and password

Answer :Smartcard and PIN

A new piece of malware is attempting to exfiltrate user data through hiding the traffic and sending it over a TLS-encrypted outbound traffic over random ports. What technology would be able to detect and block this type of traffic?


Options are :

  • Intrusion detection system
  • Application aware firewall
  • Stateful packet inspection
  • Stateless packet inspection

Answer :Application aware firewall

A network administrator needs to install a centrally-located firewall that needs to block specific incoming and outgoing IP addresses without denying legitimate return traffic. Which type of firewall should the administrator install?


Options are :

  • A host-based firewall
  • A stateful network-based firewall
  • A host-based stateful firewall
  • A stateless network-based firewall

Answer :A stateful network-based firewall

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 16

A client has combined the voice-data circuit from a provider and is getting a maximum download and upload speeds of 2.0Mbps. Which type of service is MOST likely being used by the client?


Options are :

  • ADSL
  • T1
  • E1
  • VDSL

Answer :E1

What allows a telecommunication company to remotely test circuits of customers?


Options are :

  • VLAN configuration
  • Toner Probe
  • RDP
  • Smart Jack

Answer :Smart Jack

You have been asked to add an entry to your DNS records to allow SMTP traffic to be sent out using your domain name. Which type of record should you add to your DNS record?


Options are :

  • CNAME
  • A
  • MX
  • AAAA

Answer :MX

CompTIA SY0-401 Security Certification Practice Exam Set 5

Your company has just installed a new web server that will allow inbound connections over port 80 from the internet while not being able to accept any connections from the internal network. You have been asked where to place the web server in the network architecture and how to configure the ACL rule to support the requirements. The current network architecture is segmented using a firewall to create the following three zones: ZONE INTERFACE IP address PUBLIC eth0 66.13.24.16/30 DMZ eth1 172.16.1.1/24 PRIVATE eth2 192.168.1.1/24 Based on the requirements and current network architecture above, what is the BEST recommendation?


Options are :

  • Put the server in the DMZ with an inbound rule from eth1 to eth0 that allows port 80 traffic to the server's IP
  • Put the server in the PUBLIC zone with an inbound rule from eth0 to eth1 that allows port 80 traffic to the server's IP
  • Put the server in the DMZ with an inbound rule from eth0 to eth1 that allows port 80 traffic to the server's IP
  • Put the server in the PRIVATE zone with an inbound rule from eth0 to eth1 that allows port 80 traffic to the server's IP

Answer :Put the server in the DMZ with an inbound rule from eth0 to eth1 that allows port 80 traffic to the server's IP

You have been asked to connect three 802.11a devices to an 802.11g access point that is configured with WEP. The devices are within 20 feet of the access point, but they are still unable to associate with the access point. Which of the following is the MOST likely cause of the devices being unable to associate with the WAP?


Options are :

  • Interference
  • Frequency mismatch
  • Signal loss
  • Mismatched encryption

Answer :Frequency mismatch

One of the routers in your network just failed. You have been asked to replace it with the same model router from the spare inventory closet as part of an emergency change request. You find the new router in the closet and notice it was signed into inventory 13 months ago. You install the router and attempt to enable HTTPS in the configuration to allow for remote access. The failed router had this capability, but this spare does not even though they are the exact same model and were purchased at the same time. What should you do to enable the HTTPS access for this router?


Options are :

  • Perform a factory reset
  • Update the firmware
  • Enable HTTP instead
  • Reboot the router

Answer :Update the firmware

CompTIA Security+ (SY0-501) Complete Course & Practice Exam Set 2

A common technique used by malicious individuals to perform a man-in-the-middle attack on a wireless network is:


Options are :

  • ARP cache poisoning
  • Amplified DNS attacks
  • Session hijacking
  • Creating an evil twin

Answer :Creating an evil twin

A technician needs to add new features to existing hardware devices. Which of the following should be performed to add the new features?


Options are :

  • Firmware updates
  • Changing to IPv6
  • Cloning
  • Vulnerability patching

Answer :Firmware updates

Rick is upset that he was passed over for a promotion. He decides to take revenge on his nemesis, Mary, who got the job instead of him. Rick sets up a man-in-the-middle attack against Mary's computer by redirecting any layer 2 traffic destined for the gateway to his own computer first. Rick is careful to only affect the traffic associated with Mary's computer and not the entire network. Which type of man-in-the-middle attack is Rick conducting against Mary?


Options are :

  • IP spoofing
  • MAC spoofing
  • ARP cache poisoning
  • Evil twin

Answer :ARP cache poisoning

CompTIA JK0-022 E2C Security Data & Host Security Exam Set 4

A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown devices are connected to the access point. What is MOST likely the cause?


Options are :

  • An evil twin has been implemented
  • A successful WPS attack has occurred
  • The user is experiencing ARP poisoning
  • The user is connected to a botnet

Answer :A successful WPS attack has occurred

A network administrator needs to allow employees to upload files to a remote server securely. What port should be allowed through the firewall?


Options are :

  • 21
  • 22
  • 25
  • 161

Answer :22

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions