CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 3

Which of the following is used to proxy client requests for IP configurations across different network segments?

Options are :

  • DHCP relay
  • Teredo tunneling
  • Reverse proxy

Answer :DHCP relay

CompTIA IT Fundamentals (Exam FC0-U61) Practice Tests Set 4

A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and only 3 of the 5 packets respond. When the technician tests the connection from a wired connection, it responds with 5 of 5 packets. What tool should the network technician use next?

Options are :

  • Port scanner tool
  • Interface monitoring tool
  • Packet capture tool
  • Spectrum Analyzer tool

Answer :Spectrum Analyzer tool

A network technician is connecting three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up and the network technician can ping devices in all office trailers, however, connectivity is sporadic. What is the cause of this issue?

Options are :

  • Latency
  • Throttling
  • Interference
  • Split horizon

Answer :Interference

You are troubleshooting the network connectivity between a remote server and your workstation. Which of the following tools should you use to determine the connection path between your workstation and the remote server?

Options are :

  • pathping
  • tcpdump
  • netstat
  • ping

Answer :pathping

Practice : CompTIA A+ Certification 220-902

In what type of attack does the potential intruder trick a user into providing sensitive information?

Options are :

  • Social engineering
  • Bluesnarfing
  • Man-in-the-middle
  • Evil Twin

Answer :Social engineering

Which of the following network protocols is used to send email from one server to another server?

Options are :

  • RTP
  • SNMP
  • POP
  • SMTP

Answer :SMTP

A network administrator is tasked with building a wireless network in a new building located right next door. The wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the buildings while maintaining a constant connection to the LAN. How should he configure the new wireless network in the new building?

Options are :

  • Use the same SSIDs on different channels and AP isolation
  • Use different SSIDs on different channels and VLANs
  • Use different SSIDs on the same channels with VLANs
  • Use the same SSIDs on same channels with AP isolation

Answer :Use the same SSIDs on different channels and AP isolation

SY0-401 CompTIA Security+ Certification Practice Exam Set 1

At which of the following OSI layer does QoS operate?

Options are :

  • Layer 1
  • Layer 3
  • Layer 5
  • Layer 7

Answer :Layer 3

You are trying to connect to a router using SSH to check its configuration. Your attempts to connect to the device over SSH keep failing. You ask another technician to verify that SSH is properly configured, enabled on the router, and is allowing access from all subnets. She attempts to connect to the router over SSH from her workstation and confirms all the settings are correct. Which of the following steps might you have missed in setting up your SSH client that is preventing you from connecting to the router?

Options are :

  • Change default credentials
  • Perform file hashing
  • Generate a new SSH key
  • Update firmware

Answer :Generate a new SSH key

Your network relies on the use of ATM cells. At which layer of the OSI model do ATM cells operate?

Options are :

  • Network
  • Session
  • Transport
  • Data link

Answer :Data link

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 25

A technician is concerned about security and is asked to set up a network management protocol. Which network management protocol will provide the best security?

Options are :

  • SLIP
  • SNMPv3
  • TKIP
  • SNMPv2

Answer :SNMPv3

The UPS that provides backup power to your server is malfunction because its internal battery has died. To replace the battery, you must shutdown the server, unplug it from the UPS, and unplug the UPS from its power source (the wall outlet). You perform these actions but think that there has to be a better way to increase the availability of the server in the future. Which of the following recommendations would BEST increase the availability of the server based on your experience with the UPS battery replacement?

Options are :

  • Install a second UPS in the rack
  • Install a surge protector instead
  • Add a redundant power supply to the server
  • Replace the UPS with a generator

Answer :Add a redundant power supply to the server

What tool would a network technician use to troubleshoot a span of single-mode fiber cable?

Options are :

  • Punchdown tool
  • Spectrum analyzer
  • Ethernet tester
  • OTDR

Answer :OTDR

Comptia Linux+ LX0-103 Certification Exam Practice Test Set 3

An offsite backup service is involved in an investigation currently. Because of this, they are not recycling the outdated tapes. Which of the following is the MOST likely reason for this?

Options are :

  • The process of discovery
  • A chain of custody breach
  • A data transport request
  • A notice of a legal hold

Answer :A notice of a legal hold

Your company has decided to upgrade its legacy phone system to use VoIP devices instead. The new phones will download the configurations from a server each time they boot up. Which of the following ports needs to be opened on the firewall to ensure the phones can communicate with the TFTP server?

Options are :

  • 21
  • 53
  • 69
  • 161

Answer :69

Which of the following network concepts is prevented by using a split horizon?

Options are :

  • Large routing tables
  • Duplicate addresses
  • Collisions
  • Loops

Answer :Loops

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 9

Susan is a network administrator who is in the process of preparing and cleaning network switches for resale. She splashes the cleaning agent in her eye and needs to know the procedure to do in order to cleanse her eye. Where should she look to find the right procedure?

Options are :

  • EULA
  • MSDS
  • SLA
  • MOU

Answer :MSDS

When installing a network cable with multiple strands, a network technician pulled the cable past a sharp edge and exposes the copper conductor on several of the wire strands. These exposed wires come into contact with each other forming an electrical connection. Which of the following conditions was created?

Options are :

  • Short
  • Open
  • Electrostatic discharge
  • Crosstalk

Answer :Short

Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?

Options are :

  • Tagging
  • Encapsulation
  • Tunneling
  • De-encapsulation

Answer :De-encapsulation

Ethical Hacking and CompTIA PenTest+ with 2 Practice Tests Set 2

A network administrator was told by the Chief Information Officer (CIO) to set up a new office with a network that has redundancy. What topology would BEST meet the CIO's requirement?

Options are :

  • Hybrid
  • Bus
  • Mesh
  • Star

Answer :Mesh

An administrator arrives at work and is told that network users are unable to access the file server. The administrator logs into the server and sees the updates were automatically installed last night and the network connection shows "limited" with no availability. What rollback action should the technician perform?

Options are :

  • Browser on the server
  • Server's NIC drivers
  • Server's IP address
  • Antivirus updates

Answer :Server's NIC drivers

Jason is the network manager and is leading a project to deploy a SAN. He is working with the vendor's support technician to properly set up and configure the SAN on the network. To begin SAN I/O optimization, what should Jason need to provide to the vendor support technician?

Options are :

  • Network diagrams
  • Baseline documents
  • Asset management document
  • Access to the data center

Answer :Network diagrams

CompTIA Advanced Security Practitioner(CASP+) Practice Exams Set 2

You have been asked to create a network where visitors can access the Internet without disrupting the office's own intranet. Which of the following types of networks should you created?

Options are :

  • Guest network
  • VLAN network
  • Security network
  • DMZ network

Answer :Guest network

An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web server. What is the MOST likely mitigation for this reported item?

Options are :

  • Ensure patches are deployed
  • Install an IDS on the network
  • Configure the firewall to block traffic on port 443
  • Implement a VPN for employees

Answer :Ensure patches are deployed

A network technician is working with a junior technician when the network technician is called away for a more urgent issue. The junior technician orders an SC 80/125 fiber cable instead of an ST 80/125. Which of the following will MOST likely be an issue with the new cable?

Options are :

  • Wavelength mismatch
  • Distance limitations
  • Connector mismatch
  • Attenuation/DB loss

Answer :Connector mismatch

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 2

Which of the following is a document that is used in cyber forensics that lists everywhere evidence has been?

Options are :

  • Warrant
  • Legal document
  • Chain of custody
  • Forensic report

Answer :Chain of custody

A company has just installed a VoIP system on their network. Prior to the installation, all of the switches were upgraded to layer 3 capable in order to more adequately route packets. What network segmentation technique is this an example of?

Options are :

  • Compliance implementation
  • Separate public/private networking
  • Honeypot implementation
  • Performance optimization

Answer :Performance optimization

A network technician needs to connect two switches. The technician needs a link between them that is capable of handling 10 Gbps of throughput. Which of the following media would BEST meet this requirement?

Options are :

  • CAT5e cable
  • Coax cable
  • Fiber Optic cable
  • CAT3 cable

Answer :Fiber Optic cable

Mock : CompTIA A+ Certification 220-902

What is an example of a signaling protocol used in VoIP telephony?

Options are :

  • VRRP
  • H.323
  • RTSP
  • SIP

Answer :SIP

What is considered a classless routing protocol?

Options are :

  • IGRP
  • IS-IS
  • RIPv1
  • STP

Answer :IS-IS

An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device, and when the device was reassigned. Which of the following BEST describes these actions?

Options are :

  • Network map
  • Asset management
  • Change management
  • Baselines

Answer :Asset management

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 3

A company is having a new T1 line installed. Which of the following does this connection MOST likely terminate to?

Options are :

  • Firewall
  • MDF
  • Ethernet router
  • IDF

Answer :MDF

A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the network. Which of the following ACLs should the technician implement?

Options are :



Tim is a network administrator who is setting up three additional switches in his test lab. While configuring the switches, he is verifying the connectivity but finds that when he pings one of the switches using its IP address, he receives "Destination Unreachable". What kind of issue is this?

Options are :

  • Denial of service attack
  • Misconfigured DNS settings
  • Misconfigured Split Horizon
  • RADIUS authentication errors

Answer :Misconfigured Split Horizon

220-902 CompTIA A+ Certification Practice Exam Set 5

Which of the following protocols must be implemented in order for two switches to share VLAN information?

Options are :

  • VTP
  • MPLS
  • STP
  • PPTP

Answer :VTP

A network technician has just run a new point-to-point fiber link between two local routers. After the fiber has been plugged in on both ends, the interface will not come up. The network technician has double-checked the interface configuration on both routers, both SFPs have been hard-looped to confirm they are functioning, connectors on both ends of the links have been cleaned, and there is sufficient power. What is the cause of the problem?

Options are :

  • Wavelength mismatch
  • Duplex mismatch
  • Distance limitations
  • Wrong IP address

Answer :Wavelength mismatch

Which media access control technology will listen to a cable to ensure there is no traffic being transmitted before sending its traffic, but will implement a back-off timer if a collision does occur?

Options are :

  • Token
  • Demand priority

Answer :CSMA/CD

CompTIA Security+ Cert. (SY0-501) Practice Tests Set 6

Which of the following network infrastructure implementations would be used to connect two remote sales machines back to the main campus for all of their data and voice network traffic?

Options are :

  • Crossover cable
  • Single mode fiber
  • Satellite
  • MPLS

Answer :Single mode fiber

Which of the following threats can policies, procedures, and end-user training help to effectively mitigate?

Options are :

  • Zero-day attacks
  • Attempted DDoS attacks
  • Man-in-the-middle attacks
  • Social engineering attempts

Answer :Social engineering attempts

Your company has just gotten a new OC-12 installed to support your server room. The telecommunications provider has installed the connection from their main offices to your demarcation point. When the installers test the connection from the provider's offices to your demarcation point, everything works properly. You connect the OC-12 to your network, but you are noticing a large amount of dropped packets and errors. You suspect this may be a layer 1 issue. Which of the following should you attempt FIRST to identify the source of the issue?

Options are :

  • Determine if any devices may be causing EMI on the cable
  • Use a pinout tester to validate the cable's integrity
  • Use an OTDR to validate the cable's integrity
  • Use a multimeter to validate the cable's integrity

Answer :Use an OTDR to validate the cable's integrity

CompTIA Security+ SY0-501 Exam Preparation (Latest Version) Set 3

You are working as a network administrator and are worried about the possibility of an insider threat. You want to enable a security feature that would remember the Layer 2 address that is first connected to a particular switch port in order to prevent someone from unplugging a workstation from the switch port and connecting their own laptop to that same switch port. Which of the following security features would BEST accomplish this goal?

Options are :

  • NAC
  • Sticky MAC
  • 802.1x
  • ACL

Answer :Sticky MAC

You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage is occurring. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if the issue is occurring due to a problem with your ISP?

Options are :

  • netstat
  • nslookup
  • ping
  • tracert

Answer :tracert

What happens when convergence on a routed network occurs?

Options are :

  • All routers are using hop count as the metric
  • All routers have the same routing table
  • All routers learn the route to all connected networks
  • All routers use route summarization

Answer :All routers learn the route to all connected networks

N10-006 CompTIA Network+ Certification Practice Test Set 10

The accounting department has been relocated to a new area of the building which is more than 70 meters away from the closest IDF. In order to comply with a SLA which requires that 10Gb speeds be provided, what type of media should be installed?

Options are :

  • CAT6a
  • CAT5e
  • 802.11n
  • 802.11ac

Answer :CAT6a

A network administrator receives a call asking for assistance with connecting to the network. The person on the phone asks for the IP address, subnet mask, and VLAN required to access the network. What type of attack might this be?

Options are :

  • Social engineering
  • Spoofing
  • Zero-day attack
  • VLAN hopping

Answer :Social engineering

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions