CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 8

A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following needs to be added to allow the network management tool to interpret the new device and control it using SNMP?


Options are :

  • TRAP
  • MIB
  • GET
  • WALK

Answer :MIB

CompTIA 220-801 A+ Advanced Certification Practice Exam Set 7

You have been dispatched to investigate some sporadic network outages. After looking at the event logs for the network equipment, you found that the network equipment has been restarting at the same time every day. What should you implemented to correct this issue?


Options are :

  • Grounding bar
  • Surge protector
  • UPS
  • Air flow management

Answer :UPS

A company utilizes a patching server to regularly update its PCs. After the latest round of patching, all of the older PCs with non-gigabit Ethernet cards become disconnected from the network and now require a technician to fix the issue locally at each PC. What could be done to prevent this problem next time?


Options are :

  • Throttle the connection speed of the patching server to match older PCs
  • Require the patching server to update the oldest PCs off hours
  • Disable automatic driver updates to PCs on the patching server
  • Enable automatic rebooting of the PCs after patching is completed

Answer :Disable automatic driver updates to PCs on the patching server

(This is a simulated Performance-Based Question.) 

What type of cable would you use to connect to a console port?


Options are :

  • Crossover
  • Straight-through
  • Rollover
  • RG-6

Answer :Rollover

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Thomas has a server that streams media to the local network and the device is currently visible on the network. All of the workstations on the LAN can ping the device and all the firewalls are currently turned off. The goal is for the streaming media server to be able to allow different workstations to watch the stream if they choose to subscribe to it.The streaming device appears to be functioning properly, but the media won't stream when requested. Which of the following TCP/IP technologies is MOST likely not implemented properly?


Options are :

  • Broadcasts
  • Multicast
  • Anycast
  • Unicast

Answer :Multicast

A wireless networking technician has completed a survey of a wireless network and documented the detected signal strengths in various locations. This document is known as ______________.


Options are :

  • Network baseline
  • Bandwidth survey
  • Heat map
  • Logical Network map

Answer :Heat map

A technician is installing a network firewall and would like to block all WAN to LAN traffic that is using ports other than the default ports for Internet and email connectivity. What rule should the technician verify FIRST?


Options are :

  • All outbound traffic is blocked
  • All inbound traffic is blocked
  • An implicit deny is enabled
  • A DMZ has been created

Answer :An implicit deny is enabled

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 5

A network architect is designing a highly-redundant network with a distance vector routing protocol in order to prevent routing loops. The architect has configured the routers to advertise failed routes with the addition of an infinite metric. What method should the architect utilize?


Options are :

  • Split horizon
  • Spanning tree
  • Hold down timers
  • Route poisoning

Answer :Route poisoning

A company is experiencing accessibility issues reaching services on a cloud-based system. What monitoring tools should be used to locate possible outages?


Options are :

  • Packet analyzer
  • Network analyzer
  • Network sniffer
  • Protocol analyzer

Answer :Network analyzer

A technician is troubleshooting a newly-installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the technician check FIRST during troubleshooting?


Options are :

  • WAP placement
  • Bandwidth saturation
  • Encryption type
  • WAP SSID

Answer :WAP placement

CompTIA JK0-022 E2C Security+ Threats & Vulnerabilities Exam Set 7

A network administrator has set up a firewall and entered only three rules allowing network traffic over ports 21, 110, and 25 in an effort to minimize the attack surface and to better secure the network. Unfortunately, now the administrator is receiving complaints from users who are reporting that they cannot access any web pages using their URLs, such as DionTraining.com. Which of the following should the administrator do to correct this issue?


Options are :

  • Add a rule to the ACL to allow traffic on ports 143 and 22
  • Add a rule to the ACL to allow traffic on ports 445 and 173
  • Add a rule to the ACL to allow traffic on ports 80 and 53
  • Add a rule to the ACL to allow traffic on ports 137 and 66

Answer :Add a rule to the ACL to allow traffic on ports 80 and 53

Which of the following must be added to a VLAN with a gateway in order to add security to it?


Options are :

  • An ACL
  • 802.1d
  • A RADIUS server
  • 802.1w

Answer :An ACL

What is BEST used to perform a one-time temporary posture assessment in a NAC environment?


Options are :

  • Non-persistent agent
  • Intrusion prevention system
  • Host-based firewall
  • Antivirus

Answer :Non-persistent agent

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 20

An administrator’s router with multiple interfaces uses OSPF. When looking at the router’s status, it is discovered that one interface is not passing traffic. Given the information below, what would resolve this issue? Output: Fast Ethernet 0 is up, line protocol is down Int ip address is 10.20.130.5/25 MTU 1500 bytes, BW 10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set Keep alive 10 Full duplex, 100Mb/s, 100 Base Tx/Fx Received 1052993 broadcasts 0 input errors 0 packets output, 0 bytes 0 output errors, 0 collisions, 0 resets


Options are :

  • Enable the connecting port
  • Set the loopback address
  • Replace the line card
  • Set OSPF to area 0
  • Put the IP address in the right broadcast domain

Answer :Enable the connecting port

What is used to authenticate remote workers who connect from offsite?


Options are :

  • OSPF
  • VTP trunking
  • Virtual PBX
  • 802.1x

Answer :802.1x

Which of the following describes a design where traffic is shared between multiple network servers to provide greater throughput and reliability?


Options are :

  • Load balancing
  • VLAN tagging
  • Multiplexing
  • MPLS trunking

Answer :Load balancing

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 10

You are working as a network technician and need to create several Cat 5e network cables to run between different computers and the network jacks on the wall. The connections between the switch and the patch panel, and the patch panel and the wall jacks have already been installed and tested. Which of the following tools would NOT be necessary to complete this task?


Options are :

  • Cable crimper
  • RJ-45 connectors
  • Punchdown tool
  • Wire stripper

Answer :Punchdown tool

A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all the networking devices, which of the following should the technician do to prevent the password from being sniffed on the network again?


Options are :

  • Only allow administrators to access routers using port 22
  • Ensure the password is 10 characters, containing letters and numbers
  • Use SNMPv1 for all configurations involving the router
  • Copy all configurations to routers using TFTP for security

Answer :Only allow administrators to access routers using port 22

Your company is experiencing slow network speeds of about 54Mbps on their wireless network. You have been asked to perform an assessment on the existing wireless network and recommend a solution. You have recommended that the company upgrade to a 802.11n or 802.11ac wireless infrastructure to obtain higher network speeds. Which of the following technologies allows an 802.11n or 802.11ac network to achieve faster speeds?


Options are :

  • LWAPP
  • PoE
  • WPA2
  • MIMO

Answer :MIMO

CompTIA Project+ (PK0-004) 5 Practice Test 2019 Set 2

A network technician needs to identify active services that should be disabled on the network. What tool would BEST accomplish this?


Options are :

  • Content filter
  • Port scanner
  • Packet analyzer
  • Interface monitoring tool

Answer :Port scanner

You are troubleshooting your company's T-1 connection to your ISP. The ISP has asked you to place a loopback on the device which connects your T-1 line to their central office. Which of the following devices should you connect the loopback plug on?


Options are :

  • Digital subscriber line modem
  • Channel service unit
  • Channel remote module
  • Fiber optic modem

Answer :Channel service unit

You are assisting a member of your organization's security team during an incident response. The team member asks you to determine if there are any strange TCP connections occurring on a given workstation. You open the command prompt on the workstation. Which of the following tools would provide you with information on any TCP connections that currently exist on the workstation?


Options are :

  • arp
  • tracert
  • route
  • netstat

Answer :netstat

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 1

Your company hosts all of the company's virtual servers internally in your own datacenter. In the event of total failure or disaster, though, the server images can be restored on a cloud provider and accessed through a VPN. Which of the following types of cloud services is your company using in this scenario?


Options are :

  • Private SaaS
  • Public IaaS
  • Community PaaS
  • Hybrid SaaS

Answer :Public IaaS

A home user reports that a speed test website shows the following information: Download speed: 33.3Mbps
Upload speed: 10.2Mbps Which of the following is the best interpretation of the results?


Options are :

  • The website upload bandwidth is saturated and it does not match the download speed.
  • The website is downloading data to its server at 33.3 Mbps and uploading data from its server at 10.2 Mbps.
  • The home PC downloaded 33.3 MB of data to the website and uploaded 10.2 MB of data to the website.
  • The home PC is receiving data at 33.3 Mbps and sending data at 10.2 Mbps.

Answer :The home PC is receiving data at 33.3 Mbps and sending data at 10.2 Mbps.

Your supervisor has asked you to run a Cat 5e cable between two network switches in the server room. Which type of connector should be used with a Cat 6e cable?


Options are :

  • RJ-45
  • RJ-11
  • RS-232
  • DB-25

Answer :RJ-45

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

You are installing a Small Office/Home Office (SOHO) network consisting of a router with 2 ports, a switch with 8 ports, and a hub with 4 ports. The route has one port connected to a cable modem and one port connected to switch port #1. The hub's first port is connected to switch port #2. Based on the description provided, how many collision domains exist in this network?


Options are :

  • 9
  • 11
  • 8
  • 3

Answer :9

You are working as part of a network installation team. Your team has been asked to install Cat 5e cabling to some new offices on the second floor of the building. Currently, the office only has one network closet which is located on the first floor. Your team spent the morning running 48 new CAT 5e cables from a patch panel in the networking closet on the first floor to a new networking closet you are outfitting on the second floor. Your team terminated these cables in a new patch panel in the 2nd floor closet. You measured the distance from the switch in the 1st floor closet to the new second floor patch panel and determined it was 80 meters. The team then ran cables from this patch panel to each of the new offices. Some of the offices are working properly, but others are not. You suspect that some of the cable runs are exceeding the maximum length allowed by Cat 5e cabling. What is the BEST solution to this problem?


Options are :

  • Install a hub in the second floor networking closet to increase the signal
  • Install a small switch in each office to increase the signal
  • Install a switch in the second floor networking closet to increase the signal
  • Install a repeater between the patch panel and each office

Answer :Install a switch in the second floor networking closet to increase the signal

Which encryption type MOST likely is used for securing the key exchange during a client-to-server VPN connection?


Options are :

  • AES
  • TKIP
  • Kerberos
  • ISAKMP

Answer :ISAKMP

N10-006 CompTIA Network+ Certification Practice Test Set 6

You have been hired by a company to upgrade their aging network. The network currently uses static routing for the internal network, but the organization wants to reconfigure it to use a dynamic routing protocol. The new dynamic routing protocol must support IPv4 and VLSM, at a minimum. Based on the requirements provided, which of the following routing protocols should you enable and configure?


Options are :

  • OSPF
  • RIPv1
  • HSRP
  • VRRP

Answer :OSPF

Which of the following WAN connection types might an Amplitude Modulation (AM) radio station have a detrimental effect on and cause interference?


Options are :

  • DOCSIS
  • Metro-Ethernet
  • SONET
  • Frame relay

Answer :DOCSIS

You are conducting a port scan of an older server on your network to determine what services are being run on it. You find that port 80 and 443 are open, but port 20 and 21 are reported as closed. All other ports are reported as FILTERED. Based on this report, what can you determine about the server?


Options are :

  • The server is offline and not responding
  • The service is running a FTP server and it is denying any other service requests
  • The server is running as a web server and is denying any other service requests
  • The server is behind a firewall and is blocked from receiving any traffic

Answer :The server is running as a web server and is denying any other service requests

CompTIA JK0-018 Security+ E2C Certification Practice Exam Set 5

You are working for a brand new startup company who allows you to use your own laptop, tablet, or other devices while at work. The company does provide some rules and guidelines that you must follow based on their policy. Which of the following policies should you look at to ensure you understand these rules and guidelines?


Options are :

  • BYOD
  • MOU
  • NDA
  • SOP

Answer :BYOD

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue?


Options are :

  • WPA2 security key
  • CSMA/CA
  • RADIUS
  • SSL certificates

Answer :RADIUS

While installing new network equipment, a network administrator wants to add infrastructure to keep the cables organized in the environment. The administrator also needs cables to be easily removed or added due to the constantly changing environment. Which of the following should be added to the network's cable distribution plant to achieve this goal?


Options are :

  • Cable ties
  • Raised floor
  • Hook and loop straps
  • Ladder trays

Answer :Ladder trays

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 27

Which of the following network topologies requires that all nodes have a point-to-point connection with each and every other node in the network?


Options are :

  • Mesh
  • Star
  • Bus
  • Ring

Answer :Mesh

Which WAN technology relies on virtual circuits and point-to-multipoint connections?


Options are :

  • PRI
  • ISDN
  • MPLS
  • Frame relay

Answer :Frame relay

Your co-worker has just installed an unmanaged 24-port switch. He is concerned with the amount of broadcast traffic that may exist when using this device. How many broadcast domains are created when using this single 24-port switch?


Options are :

  • 24
  • 2
  • 0
  • 1

Answer :1

Practice : CompTIA CySA+ (CS0-001)

A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation within the network?


Options are :

  • Port mirroring
  • VLAN
  • Spanning tree
  • ARP inspection

Answer :Spanning tree

A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. What would be required to resolve the exploit?


Options are :

  • Install recommended updates
  • Utilize an FTP service
  • Configure the firewall to block port 22
  • Send all log files through SMTP

Answer :Install recommended updates

On which type of cable is an F-connector is used?


Options are :

  • Cat 5
  • SMF
  • RG6
  • MMF

Answer :RG6

CompTIA JK0-801 A+ Certification Practical Exam Set 8

A technician wants to update the organization's disaster recovery plans. Which of the following would allow network devices to be replaced quickly in the event of a device failure?


Options are :

  • Proper asset tagging and labeling
  • Vendor documentation
  • Network Baseline
  • Archives/backups

Answer :Archives/backups

Over the past week, the users of your network have reported that the network has been operating slowly. You have made some changes to the network to attempt to increase its speed and responsiveness, but your supervisor is requesting that you provide some proof that the network is actually faster and doesn't just "feel" faster. Which of the following should you use to prove that the current configuration has improved the speed of the network?


Options are :

  • Present him with a physical network diagram that shows the changes you made
  • Present him with a logical network diagram showing the configuration changes
  • Provide him a copy of the approved change request for your configuration changes
  • Show him the results of a new performance baseline assessment

Answer :Show him the results of a new performance baseline assessment

A technician is configuring a computer lab at a school. The computers need to be able to communicate with each other, but students using the computers should not be able to access the Internet. What rule on the firewall should the technician configure to prevent student access to the Internet?


Options are :

  • Block all LAN to LAN traffic
  • Block all WAN to LAN traffic
  • Block all WLAN to WAN traffic
  • Block all LAN to WAN traffic

Answer :Block all LAN to WAN traffic

BR0-001 CompTIA Bridge Security+ Certification Practice Exam Set 4

(This is a simulated Performance-Based Question.) A customer's email service is not sending emails anymore. What is the correct order that you should follow to perform the troubleshooting steps?


Options are :

  • Determine if any recent changes have been made to the server; Establish a theory of probable cause; Test the theory to determine cause; Establish a plan of action to resolve the problem; Implement the solution; Verify full system functionality; Implement preventative measures; Document findings, actions, and outcomes
  • Implement the solution; Verify full system functionality; Establish a theory of probable cause; Determine if any recent changes have been made to the server; Document findings, actions, and outcomes; Establish a plan of action to resolve the problem; Test the theory to determine cause; Implement preventative measures
  • Determine if any recent changes have been made to the server; Document findings, actions, and outcomes; Establish a plan of action to resolve the problem; Test the theory to determine cause; Implement preventative measures; Implement the solution; Verify full system functionality; Establish a theory of probable cause

Answer :Determine if any recent changes have been made to the server; Establish a theory of probable cause; Test the theory to determine cause; Establish a plan of action to resolve the problem; Implement the solution; Verify full system functionality; Implement preventative measures; Document findings, actions, and outcomes

A network technician needs to protect IP-based servers in the network DMZ from an intruder trying to discover them. What should the network technician do to protect the network from ping sweeps?


Options are :

  • Block echo replies inbound to the DMZ
  • Disable UDP on the servers
  • Block ICMP at the firewall
  • Disable TCP/IP on the server

Answer :Block ICMP at the firewall

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions