CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 4

What would be used in an IP-based video conferencing deployment?


Options are :

  • RS-232
  • 56k modem
  • Bluetooth
  • Codec

Answer :Codec

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 11

A network administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-step change. The network manager decides to initiate a rollback. Which describes what the network administrator should do next?


Options are :

  • Return the system to step four since this was the last working step
  • Request additional time since the change is near completion
  • Leave the change as is and inform users of a workaround
  • Return the system back to the original state before the change

Answer :Return the system back to the original state before the change

A technician is called to investigate a connectivity issue to a remote office that is connected by fiber optic cable. Using a light meter, it is determined that the Db loss is excessive. The installation has been working for several years. The switch was recently moved to the other side of the room and a new patch cable installed. Which of the following is most likely the reason for this problem?


Options are :

  • Distance limitations
  • Wavelength mismatch
  • Bend radius limitation
  • Dirty connectors

Answer :Dirty connectors

A user is unable to connect to a server in another building and discovers the following while troubleshooting the issue: 1) Client PC 1 has an IP address if 172.16.10.25/25 2) PC 1 can successfully ping its gateway of 172.16.10.1/25, which is an interface of router A 3) Server A is named "BLDGRILFESVR01' and has an IP address of 172.16.10.145/25 4) PC 2 with an IP address of 172.16.10.200/25 can successfully ping server A However, when PC 1 pings Server A, it gets an error of destination host unreachable. Which of the following might be the issue?


Options are :

  • Link from SERVER A to PC 1 are on different subnets
  • Link from ROUTER A to SERVER A is down
  • Link from PC 1 to ROUTER A has duplex issues
  • Link from SERVER A to PC 2 is down

Answer :Link from SERVER A to PC 1 are on different subnets

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 10

An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. Which of the following might be the result of this?


Options are :

  • The OSPF not-so-stubby area is misconfigured
  • Reduced wireless network coverage
  • Spanning tree ports in flooding mode
  • BGP routing issues

Answer :BGP routing issues

An administrator is upgrading the switches in the server room to support 10 Gbps of throughput. The switch will need to take advantage of the existing CAT6a lines that run to each server. Which of the following Ethernet standards should be used to meet this requirement?


Options are :

  • 10GBaseT
  • 10GBaseFX
  • 10GBaseSR
  • 10GBaseSW

Answer :10GBaseT

While troubleshooting, a technician notices that some clients using FTP still work and that pings to the local routers and servers are working. The technician tries to ping all known nodes on the network and they reply positively, except for one of the servers. The technician notices that ping works only when the host name is used but not when FQDN is used. What server is MOST likely offline?


Options are :

  • WINS server
  • Domain controller
  • DHCP server
  • DNS server

Answer :DNS server

CompTIA N10-004 Network+ Certification Practice Test Set 11

Your physical security manager, Janice, wants to ensure she can detect any unauthorized access to the datacenter. Which technology should be used to meet her requirement?


Options are :

  • Smart card
  • Biometric access
  • Video surveillance
  • Access badge reader

Answer :Video surveillance

Which of the following is a logical host on the network where unauthorized users are placed in which they still believe they're on the production network?


Options are :

  • Virtual server
  • VLAN
  • Honeypot
  • Virtual Terminal

Answer :Honeypot

When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation?


Options are :

  • Data transport
  • First responder
  • eDiscovery
  • Encryption

Answer :eDiscovery

FC0-TS1 CompTIA Strata IT for Sales Practice Exam Set 2

You have been asked to install a media converter that connects a newly-installed multimode cable to an existing CAT5e infrastructure. Which type of media converter should you use?


Options are :

  • Ethernet to coaxial
  • Fiber to Ethernet
  • Fiber to coaxial
  • Multimode to single mode

Answer :Fiber to Ethernet

A project manager is tasked with the planning of a new network installation. The customer requires that everything discussed in the meetings will be installed and configured when a network engineer arrives onsite. Which document should the project manager provide the customer?


Options are :

  • Acceptable Use Policy
  • Service Level Agreement
  • Statement of Work
  • Security Policy

Answer :Statement of Work

A network engineer is designing a campus-wide wireless network. Wireless access points will be distributed across the campus for maximum availability. The network is to be designed to handle a large number of roaming wireless devices. What feature should he employ?


Options are :

  • VLAN pooling
  • Subnetting
  • WPA2
  • LWAPP

Answer :LWAPP

CompTIA CA1-001 Advanced Security Practitioner Practice Exam Set 6

Which protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser?


Options are :

  • PPP
  • PPTP
  • SSL
  • IPSec

Answer :SSL

What Ethernet feature will allow increased FCoE network throughput as long as all network devices recognize its specific size?


Options are :

  • Frame relay
  • TCP offloading
  • Jumbo frame
  • Quality of service

Answer :Jumbo frame

(This is a simulated Performance-Based Question. On the real certification exam, you will be asked to click on the appropriate device to see and modify its configuration.) 

Wireless network users recently began experiencing speed and performance issues on your network after Access Point 2 (AP2) was replaced due to a recent hardware failure. The original wireless network was installed according to a wireless consultant's specifications and has always worked properly without any issues in the past. 

You have been asked to evaluate the situation and resolve any issues you find in order to improve both the performance and connectivity of the network. The client has instructed you to adjust the least amount of settings/configurations possible while you attempt to fix the issue. Before arriving on site, you have been giving the following floor plan of the office with a very basic network diagram drawn on top of it. 

Based on the information provided to your so far, which network device would you log into first to begin your troubleshooting efforts?


Options are :

  • AP1
  • AP2
  • AP3
  • SW1

Answer :AP2

CompTIA JK0-801 A+ Certification Certified Practice Exam Set 6

(This is a simulated Performance-Based Question. On the real certification exam, you would have to click on each device on the network diagram to open it and view/edit its configuration.) 

Wireless network users recently began experiencing speed and performance issues on your network after Access Point 2 (AP2) was replaced due to a recent hardware failure. The original wireless network was installed according to a wireless consultant's specifications and has always worked properly without any issues in the past.  Now that you are at the client's office, you logged into each of the devices and see the following configuration settings.

Based on the configurations shown, which of the following should you change to bring the wireless network back to optimal performance? (Please select any or all options that apply)


Options are :

  • Change AP2's Channel from 1 to 6
  • Change AP1's Channel from 1 to 6
  • Change AP2's Mode from B to G
  • Change AP1's and AP3's Mode from G to B
  • Change AP2 from Auto/Auto to 100/Full

Answer :Change AP2's Channel from 1 to 6 Change AP2's Mode from B to G Change AP2 from Auto/Auto to 100/Full

(This is a simulated Performance-Based Question.) 

The company’s corporate headquarters provided your branch office a portion of their Class C subnet to use at a new office location. You must allocate the minimum number of addresses using CIDR notation in order to accommodate each department’s needs. What is the correct CIDR notation for the Human Resources (HR) department's subnet which requires 25 devices?


Options are :

  • /25
  • /26
  • /27
  • /28
  • /29
  • /30

Answer :/27

(This is a simulated Performance-Based Question.) What ports do HTTPS and RDP utilize?


Options are :

  • 443, 25
  • 443, 161
  • 443, 3389
  • 443, 445

Answer :443, 3389

CompTIA CySA+ Set 8

(This is a simulated Performance-Based Question.) 

What type of cable would you use to connect a router to a switch?


Options are :

  • Crossover
  • RG-6
  • Rollover
  • RS-232
  • Straight-through

Answer :Straight-through

During what period should all scheduled work on production network equipment be conducted?


Options are :

  • Maintenance window
  • Development life cycle
  • Down time
  • Business hours

Answer :Maintenance window

You want to ensure that only one person can enter or leave the server room at a time. Which of the following physical security devices would BEST help you meet this requirement?


Options are :

  • Cipher lock
  • Thumbprint reader
  • Video monitoring
  • Mantrap

Answer :Mantrap

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 1

The network technician has received a large number of complaints from users that there is poor network performance. The network technician suspects a user may have created a malicious flood on the network with a large number of ping requests. What should the technician do?


Options are :

  • Block all ICMP request
  • Update all antivirus software
  • Remove all suspected users from the network
  • Upgrade firmware on all network cards

Answer :Block all ICMP request

A network technician is responsible for the basic security of the network. Management has asked if there is a way to improve the level of access users have to the company file server. Right now, any employee can upload and download files with basic system authentication (username and password). What should he configure to increase security?


Options are :

  • Kerberos authentication
  • MDS authentication
  • Multi-factor authentication
  • Single sign-on authentication

Answer :Multi-factor authentication

John is investigating a performance issue on a server and has begun by gathering the server's utilization statistics. John notices that the statistics are outside of the normal acceptable ranges. What should John do next?


Options are :

  • Archive the logs
  • Conduct a vulnerability scan
  • Conduct a baseline review
  • Conduct a port scan

Answer :Conduct a baseline review

CompTIA JK0-801 A+ Laptops Printers and Operational Exam Set 6

After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which system should be used?


Options are :

  • Event log
  • Syslog
  • SIEM
  • SNMP

Answer :SIEM

Your company has installed a guest wireless network in the break room. According to company policy, employees may only connect to the network and use it while on their lunch break. Which of the following policies should you have each employee sign to show they understand and accept the conditions of use for this guest network?


Options are :

  • MOU
  • AUP
  • SLA
  • NDA

Answer :AUP

You need to connect to a Linux server to conduct some maintenance. The server is located in a remote office about 50 miles from your own. You decide to connect the server remotely instead of driving to the location to save some time, but you want to ensure you do this securely. The Linux server has VNC installed, but it isn't configured to provide an encrypted connection. Which of the following should you use to secure the VNC connection to the remote server?


Options are :

  • HTTPS
  • SSH in tunnel mode
  • RDP
  • WPA2

Answer :SSH in tunnel mode

JK0-019 CompTIA E2C Network + Certification Exam Set 11

A project lead is reviewing the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organization’s internal and external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The statement of work specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop logical diagrams indicating weaknesses in the infrastructure. The scope of activity as described in the statement of work is an example of:


Options are :

  • Session hijacking
  • Vulnerability scanning
  • Social engineering
  • Penetration testing

Answer :Penetration testing

You just arrived at school today, pulled your laptop out of your backup, and tried to connect your laptop to the Wi-Fi network. It worked fine yesterday, but today it won't connect automatically or display any available networks. You haven't done anything to the laptop since you left class yesterday. You ask your classmates if they are able to connect to the Wifi and everyone of them is connected without any issues. What should you check FIRST in your attempt to connect your laptop to the Wifi?


Options are :

  • Wireless controller configuration
  • IP address issued by the DHCP server
  • Wireless switch on your laptop
  • The configuration of the WAP

Answer :Wireless switch on your laptop

Dion Training is considering moving its headquarters and data center to Florida, but they are worried about hurricanes disrupting their business operations. To mitigate this risk, Dion Training has signed a contract with a vendor located in a different state to provide hardware, software, and the procedures necessary for the company to recover quickly in the case of a catastrophic event, like a hurricane causing a power loss for up to 10 days. Jason, as the owner, is a little concerned that this contract isn't sufficient to mitigate enough of the risk since it only provides a solution for the first 10 days. Jason wonders, "what will we do if a major outage occurs and our offices are not able to be used for 6-12 months?" Jason has hired you on to help develop Dion Training's long-term strategy for recovering from such an event. What type of plan should you create?


Options are :

  • Incident response plan
  • Disaster recovery plan
  • Business continuity plan
  • Risk management plan

Answer :Business continuity plan

CompTIA Security+ (SY0-501) Practice Exams with Simulations Set 3

A technician is attempting to resolve an issue with users on the network not being able to access websites. The technician pings the default gateway and DNS servers successfully. Pinging a website by URL is unsuccessful but using a known IP address is successful. What would resolve the issue?


Options are :

  • Update the HOST file with the URLs for all websites
  • Use NSLOOKUP to resolve URLs
  • Ensure ICMP messages can pass through the firewall
  • Enable port 53 on the firewall

Answer :Enable port 53 on the firewall

A network technician responds to a customer reporting that a workstation continually loses the connection to the network. The user explains that it occurs randomly and it happens several times throughout the day. Which step of the troubleshooting method should the technician perform first?


Options are :

  • Test the theory
  • Establish a plan of action
  • Gather information
  • Question the obvious

Answer :Gather information

The Chief Security Officer is concerned with the possible theft of corporate data from the network. He wants to ensure that any sensitive data cannot be exfiltrated from the network. Which of the following should be implemented to BEST mitigate this threat?


Options are :

  • AUP
  • DLP
  • NDA
  • MOU

Answer :DLP

CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 1

A network administrator recently set up a network computer lab and discovered some connectivity issues. The administrator is able to ping the fiber uplink interface, but none of the new PCs plugged into the switch respond to ICMP requests. What should the technician do next?


Options are :

  • Check if there are link lights on the ports
  • Check the ports on the switch for full duplex
  • Check to see if port security is enabled
  • Check to see if the uplink interface is configured correctly

Answer :Check if there are link lights on the ports

Which of the following cloud infrastructures includes on-premise servers utilizing a centralized syslog server that is hosted at a third-party organization in order to review the logs?


Options are :

  • Hybrid
  • Public
  • Community
  • Private

Answer :Hybrid

You have been asked to configure a router. Which of the following protocols should you enable to allow the router to determine the path to another network?


Options are :

  • BGP
  • RTP
  • NTP
  • STP

Answer :BGP

CT0-101 Convergence+ Certification Practice Exam Set 4

Which of the following ports should be allowed to provide access to certain VoIP applications?


Options are :

  • 110
  • 139
  • 1720
  • 5060

Answer :5060

IPv4 addresses are written using Base 10 numbers while IPv6 addresses are written in Base 16 numbers. What type of notation does Base16 utilize?


Options are :

  • Octet
  • Binary
  • Hexadecimal
  • Decimal

Answer :Hexadecimal

A switch technician is being tasked to centrally manage the switches and to segment the switches by broadcast domains. The corporate network is currently using VLAN 1 for all of its devices and is using a single private IP address range with a 24-bit mask. The supervisor wants VLAN 100 to be the management subnet and all switches to share the VLAN information. What option would be best to use?


Options are :

  • Use VLSM on the IP address range, with STP and 802.1q on the inter switch connections with native VLAN 100
  • Use VLSM on the IP address range with VTP and 802.1x on all inter switch connections with native VLAN 100
  • Use VLSM on VLAN1, with VTP and 802.1w on the inter switch connections with native VLAN 100
  • Use VLSM on the IP address range with VTP and 802.1q on the inter switch connections with native VLAN 100

Answer :Use VLSM on the IP address range with VTP and 802.1q on the inter switch connections with native VLAN 100

Mock : CompTIA Cloud+ Certification

An administrator has a physical server with a single NIC. The administrator intends to deploy two virtual machines onto a single physical server. Each virtual machine needs two NICs, one that connects to the network, and a second that is a server to server heartbeat connection between the two virtual machines. After deploying the virtual machines, which of the following should the administrator do to meet the requirements?


Options are :

  • The administrator should create a virtual switch for each guest; each switch should be configured for inter-switch links and the primary NIC should have a NAT to the corporate network
  • The administrator should create a virtual switch that is bridged to the corporate network, and a second virtual switch that carries intra-VM communication only
  • The administrator should create a virtual switch to bridge all of the connections to the network; the virtual heartbeat NICs should be set to addresses in an unused range
  • The administrator should install a second physical NIC onto the host, and then connect each guest machine's NICs to a dedicated physical NIC

Answer :The administrator should create a virtual switch to bridge all of the connections to the network; the virtual heartbeat NICs should be set to addresses in an unused range

A network engineer has been tasked with designing a network for a new branch office with approximately 50 network devices. This branch office will connect to the other offices via a MAN. Many of the other branch offices use off-the-shelf SOHO equipment. It is a requirement that the routing protocol chosen use the least amount of overhead. Additionally, all the computers on the network will be part of a single VLAN. The connection between these computers should produce the highest throughput possible in the most cost effective manner. What devices would be MOST appropriate?


Options are :

  • A router should be used as a gateway device, with RIPv2 as the routing protocol. The computers should be connected to one another with a Gigabit Layer 2 switch.
  • A UTM should be used as a gateway device, with BGP as the routing protocol. The computers should be connected to one another using 1Gb Fibre Channel.
  • A router should be used as a gateway device, with EIGRP as the routing protocol. The computers should be connected to one another using a single 802.11N MIMO access point.
  • A router should be used as a gateway device, with OSPF as the routing protocol. The computers should be connected to one another using a Gigabit Layer 3 switch.

Answer :A router should be used as a gateway device, with RIPv2 as the routing protocol. The computers should be connected to one another with a Gigabit Layer 2 switch.

A network administrator wants to increase the speed and fault tolerance of a connection between two network switches. To achieve this, which protocol should the administrator use?


Options are :

  • LACP
  • LLDP
  • L2TP
  • LDAP

Answer :LACP

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 6

You are currently troubleshooting a network connection error. When you ping the default gateway, you receive no reply. You checked the default gateway and it is functioning properly, but the gateway cannot connect to any of the workstations on the network. At which layer of the OSI model do you believe the issue is occurring?


Options are :

  • Presentation
  • Transport
  • Session
  • Physical

Answer :Physical

You are working for a brand new startup company who recently moved into an old office building because the CEO liked the "charm" of the place. You have been tasked with converting a small janitorial closet into an IDF to support the new office network. You measure the closet and determine that you can install a two-post rack inside of it, and all your necessary networking equipment will fit in the two-post rack. You test the power outlet that was installed in the closet, and it is sufficient for your needs. What is the NEXT thing you should be concerned with to ensure this closet can be used as your IDF?


Options are :

  • Is there redundant power available?
  • Can I install a UPS in this closet?
  • Is there adequate air flow and cooling in the closet?
  • How will I label the cables during installation?

Answer :Is there adequate air flow and cooling in the closet?

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions