CompTIA Network+ 6 Certification Practice Exams - 2019 Set 14

Keeping an authoritative and timely record of network devices and their settings is a key activity of which of the following?

Options are :

  • Quality of service
  • Configuration management
  • Bandwidth shaping
  • Project management

Answer : Configuration management

Which of the following protocols uses port 3389?

Options are :

  • DHCP
  • SSH
  • RDP
  • IMAP

Answer : RDP

Which of the following technologies allows more than two transceivers with an access point?

Options are :

  • WPA
  • FIFO
  • MIMO
  • 802.1x

Answer : MIMO

220-902 CompTIA A+ Certification Practice Exam Set 7

Jeff, a business owner, has discovered that several of the nearby businesses have wireless networks. Jeff wants to implement a unique wireless network inside thebusiness. Which of the following should be configured on the wireless access point to reduce interference from the other wireless networks?

Options are :

  • PPPoE authentication
  • MAC filtering
  • WPA encryption
  • Wireless channel

Answer : Wireless channel

In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?

Options are :

  • 23
  • 20
  • 21
  • 25

Answer : 25

Which of the following would Kim, a technician, do to monitor remote traffic through an access point?

Options are :

  • Enable network mapping
  • Select WPA2
  • Set monitoring SSID
  • Enable an SNMP agent

Answer : Enable an SNMP agent

CompTIA N10-004 Network+ Certification Practice Test Set 12

Which of the following devices is used to distribute network traffic equally over multiple links?

Options are :

  • Load balancer
  • Content filter
  • DNS server
  • Proxy server

Answer : Load balancer

An organization wants to perform maintenance on any of its web servers without affecting the service availability during a scheduled change window. Which of thefollowing network devices would be required to provide this functionality?

Options are :

  • Load balancer
  • Router
  • Forward proxy
  • Firewall

Answer : Load balancer

A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user's NIC. Which of the following would be usedto verify the wiring back to the patch panel?

Options are :

  • Toner probe
  • Snips
  • Cable certifier
  • Butt set

Answer : Cable certifier

CompTIA JK0-022 Security Cryptography Certification Exam Set 7

Which of the following protocols is used to allow multiple hosts to share a common IP address?

Options are :

  • ARP
  • NAT
  • CARP

Answer : NAT

The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the network?

Options are :

  • Overcapacity
  • Distance limitations
  • Channel overlap
  • Power levels

Answer : Power levels

SK0-004 CompTIA Server+ Certification Practice Exam Set 2

A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target device, and access is allowed from all subnets. The technician discovers a critical step was missed. Which of the following would allow SSH to function properly?

Options are :

  • Perform file hashing
  • Generate new keys
  • Change default credentials
  • Update firmware

Answer : Generate new keys

A technician is sent to a remote office to set up a device to connect to the Internet. The company standards document requires stateful inspection. Which of the following should the technician install?

Options are :

  • Multiplayer switch
  • Firewall
  • Router
  • Bridge

Answer : Firewall

Which of the following devices, if implemented, would result in decreased administration time of an 802.11 network running centralized authentication services?(Choose two.)

Options are :

  • Proxy server
  • Wireless controller
  • VPN concentrator
  • RADIUS server
  • Multilayer switch

Answer : Wireless controller RADIUS server

FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 9

Kim, a user, cannot access the network using wireless.Which of the following is MOST likely the cause?

Options are :

  • Faulty crossover cable
  • A short in the cable pairs
  • TXRX is reversed
  • Incorrect WEP key

Answer : Incorrect WEP key

Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO).

Options are :

  • SNMP
  • RDP
  • SSH
  • FTP
  • Telnet

Answer : SSH Telnet

Users are reporting Internet connectivity issues. The network administrator wants to determine if the issues are internal to the company network or if there is an issue with the ISP. Which of the following tools should be used to BEST determine where the outage is occurring?

Options are :

  • netstat
  • traceroute
  • ping
  • nslookup

Answer : traceroute

CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 2

Which of the following DNS records needs to be configured for SMTP traffic?

Options are :

  • MX
  • PTR
  • AAAA

Answer : MX

Which of the following would be the MOST efficient subnet mask for a point-to-point link?

Options are :

  • /32
  • /29
  • /31
  • /28

Answer : /31

Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?

Options are :

  • Loss of full control over data resources
  • Incompatibility with the current network
  • Decreased performance of internal network
  • Increased malware exposure

Answer : Loss of full control over data resources

SK0-004 CompTIA Server+ Certification Practice Exam Set 6

A network administrator wants to monitor traffic by deploying MIBs. Which of the follow network monitoring resources would be used?

Options are :

  • SNMP
  • SCTP
  • DCCP
  • Packet sniffer

Answer : SNMP

A user reports a network failure on a computer. The technician determines that the computer and NIC are operating properly. Which of the following tools can thetechnician use to trace the network cabling back to the punch down block?

Options are :

  • Multimeter
  • Punch down tool
  • Toner probe
  • Protocol analyzer

Answer : Toner probe

Which of the following VPN protocols establishes a secure session that can be initiated using a browser?

Options are :

  • PPTP
  • PTP
  • IPSec

Answer : SSL VPN

220-701 A+ Essentials Certification Practice Exam Set 10

When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement?

Options are :

  • iSCSI
  • Fibre Channel
  • DAS
  • NAS

Answer : NAS

A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter?

Options are :

  • Firewall
  • Throughput tester
  • OC3
  • VPN

Answer : Firewall

Under which of the following layers of the OSI model do ATM cells operate?

Options are :

  • Presentation
  • Network
  • Session
  • Data link
  • Transport

Answer : Data link

220-902 CompTIA A+ Certification Practice Exam Set 3

Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?

Options are :

  • DSL
  • T1
  • POTS

Answer : T1 is an IP address which would MOST likely come from which of the following ?

Options are :

  • DNS
  • CIDR
  • DHCP

Answer : APIPA

Kim, a technician, is installing a switch that does not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (SelectTWO).

Options are :

  • IP addressing
  • IPv6 addressing
  • MAC addressing
  • Duplex
  • Port speed

Answer : Duplex Port speed

BR0-001 CompTIA Bridge Security+ Certification Practice Exam Set 3

Which of the following is a system of notation that uses base 16 rather than base 10?

Options are :

  • Hex
  • Binary
  • CIDR
  • Octal

Answer : Hex

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions