CompTIA Network+ 6 Certification Practice Exams - 2019 Set 11

A network technician is responsible for the basic security of the network. Management has asked if there is a way to improve the level of access users have to thecompany file server. Right now, any employee can upload and download files with basic system credentials.Which of the following would require additional credentials?


Options are :

  • MDS authentication
  • Multifactor authentication (Correct)
  • Single sign-on authentication
  • Kerberos authentication

Answer : Multifactor authentication

A network engineer is designing a wireless network that uses multiple access point for complete coverage.Which of the following channel selections would result in the LEAST amount of interference between each access point?


Options are :

  • Adjacent access points should be assigned channels 7 and 11 with a 40MHz channel width.
  • Adjacent access point should be assigned channels 1, 6, and 11 with a 20MHz channel width. (Correct)
  • Adjacent access points should be assigned channels 2,6, and 10 with a 20MHz channel width.
  • Adjacent access points should be assigned channels 8 and 11 with a 40MHz channel width.

Answer : Adjacent access point should be assigned channels 1, 6, and 11 with a 20MHz channel width.

In a home network, all clients are accessing the Internet via a single host.This is an example of which of the following?


Options are :

  • Hybrid
  • Point-to-multipoint (Correct)
  • Partial mesh
  • Peer-to-peer

Answer : Point-to-multipoint

A username provides which of the following?


Options are :

  • Authentication
  • Biometrics
  • Authorization
  • Identification (Correct)

Answer : Identification

Which of the following areas MUST all other OSPF areas connect to in a properly configured network?


Options are :

  • 0 (Correct)
  • 110
  • 255
  • 1

Answer : 0

A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access. Which of the following has MOST likely occurred?


Options are :

  • Port security is blocking all traffic.
  • An IDS is blocking all traffic.
  • SMTP is blocking all traffic.
  • Implicit deny is blocking all traffic. (Correct)

Answer : Implicit deny is blocking all traffic.

A network technician has received a report that workstations are unable to gain access to the network. During the troubleshooting process, the technician discoversthat the switch connecting these workstations has failed.Which of the following will be the QUICKEST option configure a new switch?


Options are :

  • Syslog
  • Image (Correct)
  • Archive
  • Baseline

Answer : Image

Which of the following uses types and codes rather than ports?


Options are :

  • EIGRP
  • UDP
  • ICMP (Correct)
  • IPv6

Answer : ICMP

Joe, a network administrator, has installed an SFTP server behind a load-balancing router. He opened port 21 but was unable to establish a connection.Which of the following ports should he have opened?


Options are :

  • Port 443
  • Port 162
  • Port 20
  • Port 22 (Correct)

Answer : Port 22

A technician has deployed a new VPN concentrator. The device needs to authenticate users based on a backend directory service.Which of the following services could be run on the VPN concentrator to perform this authentication?


Options are :

  • IPsec
  • RADIUS (Correct)
  • GRE
  • Kerberos

Answer : RADIUS

A technician is looking at an issue with a computer connecting to the network. The technician determines wire 3 of a UTP Ethernet cable run has a break in it. Thiscomputer was previously connected to the switch at 1Gbps throughput. This PC is a kiosk and does not need anything more than 50-60Mbps connection speed.Which of the following can the technician do to resolve the issue quickly?


Options are :

  • Rewire both ends to have the wire on pin 6 remapped to pin 3. Force the duplex and speed to 1000Mbps full duplex.
  • Rewire both ends to have the wire on pin 6 remapped to pin 3. Force the duplex and speed to 100Mbps full duplex.
  • Rewire both ends to have the wire on pin 7 remapped to pin 3. Force the duplex and speed to 1000Mbps full duplex. (Correct)
  • Rewire both ends to have the wire on pin 7 remapped to pin 3. Force the duplex and speed to 100Mbps full duplex.

Answer : Rewire both ends to have the wire on pin 7 remapped to pin 3. Force the duplex and speed to 1000Mbps full duplex.

After upgrading a fiber link from 1Gbps, a network technician ran a speed test of the link. The test shows the link is not operating at full speed and connectivity isintermittent. The two buildings are 1.476ft (450m) apart and are connected using CM4 fiber and 10G SR SFPs. The fiber runs through the electrical and boilerrooms of each building.Which of the following is the MOST likely reason for the connectivity issue?


Options are :

  • CM1 fiber should be used instead
  • The wrong SFPs are being used (Correct)
  • There is heat from the boiler room
  • There is interference from the electrical room.

Answer : The wrong SFPs are being used

An organization is required to implement a wireless network. The organization must implement wireless routers compatible with 802.11ac protocol that havemaximum possible range.Which of the following wireless router frequencies is a viable option?


Options are :

  • 6.0GHz
  • 2.4GHz (Correct)
  • 3.7GHz
  • 5.0GHz

Answer : 2.4GHz

A network technician is troubleshooting a WAN link that traverses a 100-foot span of RG6. The technician utilizes a Time Domain Reflectometer (TDR) to proof thecable during the troubleshooting process. The TDR returns a trace that drops off suddenly at 51 feet (15.54 meters).Which of the following is this indicative of?


Options are :

  • Short
  • TX/RX reverse
  • Open (Correct)
  • Crosstalk

Answer : Open

Use of group accounts should be minimized to ensure which of the following?


Options are :

  • Password security
  • Individual accountability (Correct)
  • Baseline management
  • Regular auditing

Answer : Individual accountability

Which of the following wireless standards is capable of ONLY operating on 5.8GHz?


Options are :

  • 802.11a (Correct)
  • 802.11g
  • 802.11n
  • 802.11b

Answer : 802.11a

A company technician has set up the network so that all external protections and internal protections across the network are segregated from any malicious attacksand there are firewalls configured on both sides of the DMZ. During the configuration review of the device installation, there is evidence of unauthorized networktraffic penetrating the internal network.Which of the following is either missing or incorrectly configured in the firewall settings?


Options are :

  • Stateless settings
  • UTM
  • ACL
  • Implicit deny
  • Stateful settings (Correct)

Answer : Stateful settings

A network technician has been tasked to provide a local office with wireless Internet access. The network technician had determined the users will need a wirelessrouter that provides a maximum of 54Mbps of bandwidth while operating in the 2.4Ghz band.Which of the following wireless standards will the network technician deploy?


Options are :

  • 802.11g (Correct)
  • 802.11a
  • 802.11n
  • 802.11b

Answer : 802.11g

Users report they are receiving an unusual amount of suspicious email from the network administrator.Which of the following is the cause of this security issue?


Options are :

  • Ping of death
  • DDoS attack
  • Jamming
  • Malware (Correct)

Answer : Malware

Which of the following provides the MOST protection against zero day attacks via email attachments?


Options are :

  • Anti-virus
  • Anti-spam (Correct)
  • Host-based firewalls
  • Patch management

Answer : Anti-spam

A network technician needs to address bandwidth issues on the wireless network. There are currently four 802.11n access points. The technician would like toincrease the bandwidth. Which of the following would be the BEST solution?


Options are :

  • Disable SSID
  • Increase the signal
  • MIMO
  • Channel bonding (Correct)

Answer : Channel bonding

A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines takenrecently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?


Options are :

  • Network sniffer (Correct)
  • Load balancing appliance
  • NIPS
  • Wire tap

Answer : Network sniffer

Which of the following ports does DHCP use? (Select TWO).


Options are :

  • 68 (Correct)
  • 69
  • 23
  • 22
  • 67 (Correct)

Answer : 68 67

Which of the following diagnostic commands relies on proper forwarding of ICMP ECHO packets?


Options are :

  • ping (Correct)
  • ipconfig
  • nbstat
  • route

Answer : ping

A network technician configures a firewall to block only certain IP addresses from accessing the Internet. All users are reporting that they are unable to access theInternet.Which of the following is the MOST likely reason?


Options are :

  • Implicit allow statement
  • All protocols are being allowed in
  • Incorrectly configured ACL (Correct)
  • SMTP requests are being denied

Answer : Incorrectly configured ACL

A company is having a new T1 line installed. Which of the following will the connection MOST likely terminate to?


Options are :

  • IDF
  • Core switch
  • Ethernet router
  • MDF (Correct)

Answer : MDF

Which of the following should be implemented in a networked environment carrying teleconferencing packets?


Options are :

  • SNMP
  • QoS (Correct)
  • L2TP
  • SSH

Answer : QoS

Which of the following security threats relies primarily on user deception and misinformation?


Options are :

  • Rogue access points
  • Man-in-the-middle attacks
  • DoS attacks
  • Phishing (Correct)

Answer : Phishing

Zach, a network administrator, needs to purchase a new switch to support VoIP phones and wireless access points in a new building. Which of the followingfeatures are the MOST important for the new switch to support?


Options are :

  • NAT and VTP
  • 802.1x and 802.11n
  • PoE and QoS (Correct)
  • LACP and OSPF

Answer : PoE and QoS

Which of the following protocols is used for remote management of devices?


Options are :

  • TFTP
  • SNMP (Correct)
  • SMTP
  • Syslog

Answer : SNMP

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions