CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 9

A company-wide audit revealed employees are using company laptops and desktops for personal use. To prevent this from occurring, in which document should the company incorporate the phrase ďCompany-owned IT assets are to be used to perform authorized company business only"?

Options are :

  • AUP (Correct)
  • SLA
  • MSA
  • MOU

Answer :AUP

SK0-004 CompTIA Server+ Certification Practice Exam Set 8

Which of the following devices does a CSU/DSU connect?

Options are :

  • A cable modem to a wireless router
  • An analog line to a network router
  • A T1 line to a network router (Correct)
  • A local network to a VPN

Answer :A T1 line to a network router

You have been asked to run a cable between a drop ceiling and a standard ceiling and ensure it meets the fire safety requirements for your local government. The cable will be used to support a 10GBaseT network connection for up to 100 meters. Which of the following cables should you use to meet these requirements?

Options are :

  • PVC Cat 5e
  • Plenum Cat 5e
  • Plenum Cat 6a (Correct)
  • PVC Cat 6a

Answer :Plenum Cat 6a

(This is a simulated Performance-Based Question. On the real certification exam, you would be asked to drag-and-drop the correct encryption onto the APs.) 

Your company has purchased a new building down the street for its executive suites. You have been asked to choose the BEST encryption for AP1, AP2, and AP3 in order to establish a wireless connection inside the main building for visitors to use. Your boss has stated that the internal wireless network in the main building is for visitors' use only and MUST NOT require the visitors to setup any special configuration on their devices in order to connect. 

Which of the following is the BEST encryption to use from the options below to meet your manager's requirements for the new visitors' Wireless Network?

Options are :

  • Open (Correct)
  • WPA
  • WEP

Answer :Open

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 2

A network technician has received reports of an Internet-based application that has stopped functioning. Employees reported that after updating the Internet browsers, the application began to fail. Many users rolled back the update, but this did not correct the issue. Which of the following should the company do to reduce this type of action from causing network problems in the future?

Options are :

  • Verify the update hashes match those on the vendorís website
  • Coordinate the Internet Server update to coincide with the usersí updates
  • Implement a disaster recovery plan with a hot site to allow users to continue working
  • Segment the network and create a test lab for all updates before deployment (Correct)

Answer :Segment the network and create a test lab for all updates before deployment

Which network device operates at Layer 2?

Options are :

  • Repeater
  • Firewall
  • Router
  • Switch (Correct)

Answer :Switch

Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as what?

Options are :

  • Bluejacking (Correct)
  • Zero-day attack
  • Smurfing
  • Multiplexing

Answer :Bluejacking

CompTIA JK0-801 A+ Laptops Printers and Operational Exam Set 4

What anti-malware solution should be implemented to deter attackers from loading custom files onto a distributed target platform?

Options are :

  • Host-based anti-malware
  • Signature-based anti-malware
  • Network-based anti-malware (Correct)
  • Cloud-based anti-malware

Answer :Network-based anti-malware

A small real estate office has about 15 workstation and would like to use DHCP to assign classful IP addresses to each workstation. The subnet only has one octet for the host portion of each device. Which of the following IP addresses could be assigned as the default gateway?

Options are :

  • (Correct)

Answer :

Which of the following should be implemented to allow wireless network access for clients in the lobby using a password key?

Options are :

  • Firewall
  • WPA2 (Correct)
  • IPSec

Answer :WPA2

CompTIA Security+ SY0-501 Exam Preparation (Latest Version) Set 6

A network engineer is conducting an assessment for a customer who wants to implement an 802.11ac wireless network. Before the engineer can estimate the number of WAPs needed, it is important to reference the _______________.

Options are :

  • Site survey (Correct)
  • PoE requirements
  • Network topology
  • Network diagram

Answer :Site survey

You are about to perform a major configuration upgrade to a network device. What should you have prepared in case the upgrade fails?

Options are :

  • Rollback plan (Correct)
  • Baseline report
  • Vulnerability report
  • Business continuity plan

Answer :Rollback plan

What should be considered when troubleshooting the coverage and signal strength of a 802.11n WLAN?

Options are :

  • Malware
  • Temperature
  • Building materials in the area (Correct)
  • Humidity

Answer :Building materials in the area

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 3

A network technician receives the following alert from a network device: "High utilizations threshold exceeded on gi1/0/24 : current value 8463257.54" What is being monitored to trigger the alarm?

Options are :

  • Network device memory
  • Interface link status (Correct)
  • Speed and duplex mismatch
  • Network device CPU

Answer :Interface link status

A network technician is asked to redesign an Ethernet network before some new monitoring software is added to each workstation on the network. The new software will broadcast statistics from each host to a monitoring server for each of the five departments in the company. The added network traffic is a concern of management that must be addressed. How should the technician design the new network?

Options are :

  • Add a router and create a segment for all the monitoring host stations
  • Place each department in a separate VLAN (Correct)
  • Increase the collision domains to compensate for the added broadcasts
  • Increase the number of switches on the network to reduce broadcasts

Answer :Place each department in a separate VLAN

(This is a simulated Performance-Based Question.)

The companyís corporate headquarters provided your branch office a portion of their Class C subnet to use at a new office location. You must allocate the minimum number of addresses using CIDR notation in order to accommodate each departmentís needs. You have finished providing the minimum number of addresses using CIDR notation to each of the departments listed. Calculate the number of leftover IP addresses. What is the correct CIDR notation to use to represent the available number of leftover IP addresses?

Options are :

  • /25
  • /26 (Correct)
  • /27
  • /28
  • /29
  • /30

Answer :/26

CompTIA N10-004 Network+ Certification Practice Test Set 6

(This is a simulated Performance-Based Question.) After some recent changes to the network, several users are complaining that they are unable to access the servers. You have been provided with the Internet Protocol Version 4 (IPv4) Properties for PC1, PC2, PC3, and PC4.

Which of the following actions should you perform to fix the issue and ensure the computers can communicate with the servers again?

Options are :

  • Change PC3's IP address to
  • Change PC4's subnet mask to
  • Change PC3's subnet mask to (Correct)
  • Change the DNS server on PC1, PC2, PC3, and PC4 to Google DNS (

Answer :Change PC3's subnet mask to

(This is a simulated Performance-Based Question.) 

Which of the following is the correct order of the following Fiber Connectors shown?

Options are :

  • FC, LC (single), LC (duplex), SC, ST
  • SC, ST, FC, LC (single), LC (duplex)
  • ST, SC, LC (single), LC (duplex), FC (Correct)
  • LC (single), LC (duplex), FC, ST, SC

Answer :ST, SC, LC (single), LC (duplex), FC

(This is a simulated Performance-Based Question.)

What type of cable would you use to connect a computer to a computer?

Options are :

  • Crossover (Correct)
  • RG-6
  • Rollover
  • RS-232
  • Straight-through

Answer :Crossover

CompTIA JK0-801 A Laptop Printer and Operating certify Exam Set 1

(This is a simulated Performance-Based Question.) What ports do SMTP and SNMP utilize?

Options are :

  • 23, 25
  • 161, 443
  • 445, 3389
  • 25, 161 (Correct)

Answer :25, 161

Last night, your company's system administrators conducted a server upgrade. This morning, several users are having issues accessing the company's share drive on the network. You have been asked to troubleshoot the problem. What document should you look at first to create a probable theory for the cause of the issue?

Options are :

  • Change management documentation (Correct)
  • Release notes for the server software
  • Physical network diagram
  • Cable management plan

Answer :Change management documentation

Dion Training Solutions is launching their brand new website. The website needs to be continually accessible to our students and reachable 24x7. Which networking concept would BEST ensure that the website remains up at all times?

Options are :

  • Snapshots
  • Warm site
  • Cold site
  • High availability (Correct)

Answer :High availability

JK0-019 CompTIA E2C Network + Certification Exam Set 5

Which of the following concepts is the MOST important for a company's long-term health in the event of a disaster?

Options are :

  • Vulnerability scanning
  • Implementing acceptable use policy
  • Offsite backups (Correct)
  • Uninterruptible power supplies

Answer :Offsite backups

You work for a small company that wants to add a share drive to their network. They are looking for a simple solution that will easily integrate into the existing network, will be easy to configure, and can share files with all the network clients over TCP/IP. Which of the following is the BEST recommended storage solution for this network?

Options are :

  • Fibre Channel
  • NAS (Correct)
  • iSCSI
  • FCOE

Answer :NAS

After an employee connected one of the switch ports on a SOHO router to the wall jack in the office, other employees in the building started losing network connectivity. Which of the following could be implemented on the companyís switch to prevent this type of loss of connection?

Options are :

  • Loop prevention (Correct)
  • ARP inspections
  • DHCP snooping
  • MAC address filtering

Answer :Loop prevention

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

During a recent penetration test, it was discovered that your company's wireless network can be reached from the parking lot. The Chief Security Officer has submitted a change request to your network engineering team to solve this issue because he wants to ensure that the wireless network is only accessible from within the building. Based on these requirements, which of the following settings should be changed to ensure the wireless signal doesn't extend beyond the interior of your building while maintaining a high level of availability to your users?

Options are :

  • Power level (Correct)
  • Channel
  • Frequency
  • Encryption

Answer :Power level

A technician wants to implement a network for testing remote devices before allowing them to connect to the corporate network. What could the technician implement to meet this requirement?

Options are :

  • High availability
  • MAN network
  • Quarantine (Correct)
  • Honeynet

Answer :Quarantine

A company is setting up a brand new server room and would like to keep the cabling infrastructure out of sight but still accessible to the network administrators. Infrastructure cost is not an issue. Which of the following should be installed to meet the requirements?

Options are :

  • Conduit
  • Cable trays
  • Patch panels
  • Raised floor (Correct)

Answer :Raised floor

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

Company policies require that all network infrastructure devices send system level information to a centralized server. Which of the following should be implemented to ensure the network administrator can review device error information from one central location?

Options are :

  • TACACS+ server
  • Single sign-on
  • Syslog server (Correct)
  • Wifi analyzer

Answer :Syslog server

A common technique used by malicious individuals to perform a man-in-the-middle attack on a wireless network is:

Options are :

  • ARP cache poisoning
  • Amplified DNS attacks
  • Sessions hijacking
  • Creating an evil twin (Correct)

Answer :Creating an evil twin

A network administrator is following the best practices to implement firewalls, patch management, and policies on his network. Which of the following should be performed to verify that the security controls are in place?

Options are :

  • Penetration testing (Correct)
  • AAA authentication testing
  • Disaster recovery testing
  • Single point of failure testing

Answer :Penetration testing

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 8

Dion Training has just installed a new web server and created an A record for When users try entering, though, they get an error. You tell their network administrator that the problem is because he forgot to add the appropriate DNS record to create an alias for www to the root of the domain. Which type of DNS record should be added to fix this issue?

Options are :

  • PTR
  • NS
  • CNAME (Correct)
  • AAAA

Answer :CNAME

You typed IPCONFIG at the command prompt and find out your IP is You then go to and search for "what is my IP", and it returns a value of How do you explain the different values for the IP addresses?

Options are :

  • This is caused by the way traffic is routed over the internet
  • This is caused by how a switch handles IP addresses
  • This is caused because of the way routers handle IP addresses
  • This occurs because your network uses a private IP address internal but a public IP address over the internet (Correct)

Answer :This occurs because your network uses a private IP address internal but a public IP address over the internet

An administrator is told they need to set up a space in the breakroom where employees can relax. So, the administrator sets up several televisions with interconnected video game systems in the breakroom. What type of network did the administrator setup?

Options are :

  • CAN
  • MAN
  • WAN
  • LAN (Correct)

Answer :LAN

SY0-401 CompTIA Security+ Certification Practice Exam Set 7

Which of the following is used to connect Cat5e or above networks in an MDF or IDF?

Options are :

  • 66 block
  • 110 block (Correct)
  • F-connector
  • RJ-11

Answer :110 block

Which network device operates at Layer 1?

Options are :

  • Hub (Correct)
  • Bridge
  • Router
  • Firewall

Answer :Hub

You have been asked to connect a laptop directly to a router in order to gain access to the internet. Unfortunately, this router is old and doesn't support MDIX on its ports. What type of cable should you use to connect the computer to the router?

Options are :

  • Console
  • Rollover
  • Crossover (Correct)
  • Patch

Answer :Crossover

JK0-802 CompTIA A+ Certification Exam Set 11

Which of the following communication technologies are used by video conferencing systems to synchronize video streams and reduce bandwidth being sent by a central location to subscribed devices?

Options are :

  • Anycast
  • Unicast
  • CoS
  • Multicast (Correct)

Answer :Multicast

There are two switches connected using both a CAT6 cable and a CAT5e cable. Which type of problem might occur with this setup?

Options are :

  • Missing route
  • Auto sensing ports
  • Improper cable types
  • Switching loop (Correct)

Answer :Switching loop

A client reports that half of the marketing department is unable to access network resources. The technician determines that the switch has failed and needs replacement. What would be the MOST helpful in regaining connectivity?

Options are :

  • VLAN configuration
  • Network Diagram
  • Configuration backup (Correct)
  • Router image

Answer :Configuration backup

Mock : CompTIA CySA+ (CS0-001)

Which type of antenna broadcasts an RF signal in a specific direction with a narrow path?

Options are :

  • Omni-directional
  • Unidirectional (Correct)
  • Patch
  • Bi-directional

Answer :Unidirectional

A technician has been troubleshooting a network problem, has determined the most likely cause of the issue, and implemented a solution. What is the NEXT step to be taken?

Options are :

  • Document the findings, actions, and outcomes
  • Duplicate the problem if possible
  • Verify system functionality (Correct)
  • Make an archival backup

Answer :Verify system functionality

The service desk has received a large number of calls this morning complaining about how slow the network is responding when trying to connect to the internet. You are currently at one of the user's workstations and conducted a ping to, but the results showed that the response time was too slow and their was too much latency in the route between the workstation and You then attempted to ping some of the network printers and other local servers on the network. The results showed acceptable response times. What should you try to do NEXT?

Options are :

  • Reboot the email server
  • Scan the user's workstation for malware
  • Replace the cable between the user's workstation and the wall jack
  • Check the change control system to determine if any networking equipment was recently replaced (Correct)

Answer :Check the change control system to determine if any networking equipment was recently replaced

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 6

Various hypervisor guests are configured to use different VLANs in the same virtualization environment through what device?

Options are :

  • Virtual router
  • Virtual firewall
  • NIC teaming
  • Virtual switch (Correct)

Answer :Virtual switch

It has been determined by network operations that there is a severe bottleneck on the company's mesh topology network. The field technician has chosen to use log management and found that one router is making routing decisions slower than the others on the network. What is this an example of?

Options are :

  • Network device power issues
  • Network device CPU issues (Correct)
  • Storage area network issues
  • Delayed responses from RADIUS

Answer :Network device CPU issues

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions