CompTIA Network+ 6 Certification Practice Exams - 2019 Set 15

Which of the following wireless connection types utilize MIMO on non-overlapping channels? (Choose two.)

Options are :

  • 802.11n
  • 802.11ac
  • 802.11b
  • 802.11a
  • 802.11g

Answer : 802.11n 802.11ac

Which of the following is used to create a secure connection between a client and a host?

Options are :

  • VPN
  • VLAN
  • IIS server
  • Proxy server

Answer : VPN

CompTIA Network+ (N10-007) : 6 Practice Exams - 2019 Set 5

A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off one end of the cable. Which of the following should the technician do to make a crossover cable before crimping the new plug?

Options are :

  • Reverse the wires leading to pins 2 and 4
  • Reverse the wires leading to pins 1 and 3
  • Reverse the wires leading to pins 1 and 2
  • Reverse the wires leading to pins 2 and 3

Answer : Reverse the wires leading to pins 2 and 4

A technician is troubleshooting network connectivity issues with a remote host. Which of the following tools would BEST inform the technician of nodes between the client and the remote host? (Choose two.)

Options are :

  • tcpdump
  • pathping
  • ping
  • tracert
  • netstat
  • nslookup

Answer : pathping tracert

Which of the following storage network technologies inherently leverages block-level storage?

Options are :

  • NAS
  • iSCSI
  • FTP
  • SAN
  • FCoE

Answer : NAS

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 5

Which of the following would allow a network technician to access files on a remote system? (Choose two.)

Options are :

  • FTP
  • SMTP
  • IMAP
  • SIP
  • VLSM
  • TFTP

Answer : FTP TFTP

A technician replaces a failed router with a spare that has been in inventory for some time. After attempting to enable HTTPS on the spare router, the technician discovers the feature is unavailable. The support office was able to connect to the previous router. Which of the following actions should the technician perform toenable HTTPS access for the support team?

Options are :

  • Enable HTTP on the router
  • Reboot the router
  • Update the firmware of the spare router
  • Perform a factory reset on the router

Answer : Update the firmware of the spare router

A technician is setting up a public guest network for visitors to access the Internet that must be separate from the corporate network. Which of the following are the BEST steps for the technician to take with minimum overhead configuration? (Choose two.)

Options are :

  • Configure visitor devices to use static IP addresses
  • Configure the access point to use WPA2-AES encryption
  • Enable two-factor authentication on visitor devices
  • Enable SSID broadcasting to identify the guest network
  • Ensure the access point is not running in mixed mode

Answer : Configure visitor devices to use static IP addresses Enable SSID broadcasting to identify the guest network

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 5

A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should thetechnician use to reveal the location of the fault?

Options are :

  • Tone generator
  • OTDR
  • Light meter

Answer : OTDR

Users have been experiencing slow network response times, and management has asked the network technician to provide evidence of network improvement. After optimizing the network, which of the following would be required?

Options are :

  • Physical diagram
  • Change management
  • IDF/MDF documentation
  • Performance baseline

Answer : Performance baseline

Which of the following is used to classify network data for the purpose of providing QoS?

Options are :

  • SIP
  • VLANs
  • STP
  • DSCP

Answer : DSCP

220-802 CompTIA A+ Certification Practice Exam Set 12

Which of the following communication media can carry many voice, data, and video channels simultaneously over multiple frequencies?

Options are :

  • Analog modem
  • Broadband
  • CSMA
  • Baseband

Answer : Broadband

Management has requested that services be available within 72 hours of a disaster. Budget is a major concern. A contract is signed with a company that has plenty of space, and the technician will have the option of putting infrastructure equipment in place. Which of the following BEST describes this business continuity strategy?

Options are :

  • Warm site
  • Cold site
  • Incremental backup
  • Hot site
  • Differential backup
  • Full backup

Answer : Cold site

A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)

Options are :

  • Bus
  • Ring
  • Point-to-point
  • Point-to-multipoint
  • Mesh
  • Peer-peer

Answer : Point-to-point Mesh

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 8

Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the following policies requires employee adherence?

Options are :

  • NDA
  • MOU
  • AUP
  • SLA

Answer : AUP

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

Options are :

  • social engineering
  • vulnerability scanning
  • penetration testing
  • reconnaissance

Answer : penetration testing

Which of the following devices should a network administrator configure on the outermost part of the network?

Options are :

  • Firewall
  • Modem
  • Media converter
  • Switch

Answer : Firewall

CompTIA Security+ SY0 401 Test Set 2

Based on networks and, which of the following is the BEST summarized CIDR notation?

Options are :


Answer :

Which of the following provides two-factor authentication?

Options are :

  • Username + password
  • Smart card + PIN
  • Fingerprint + retina scan
  • Key fob + ID card

Answer : Smart card + PIN

Several users from the same building are reporting connectivity issues. The SFP at that building's IDF switch is showing a link light, but there is no link light to thecorresponding switch's SFP at the MDF. Which of the following is the MOST likely cause?

Options are :

  • A crossover cable is being used.
  • Only TX or RX strand is working.
  • DB loss is too high on all strands.
  • TX and RX are reversed.

Answer : Only TX or RX strand is working.

220-802 CompTIA A+ Certification Practice Exam Set 12

The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager notices the hostnames all appear to be randomly generated characters. Which of the following would BEST assist the security manager identifying systems involved insecurity incidents?

Options are :

  • Forward the DHCP logs to the security manager every day
  • Enforce port security to require system authentication
  • Label existing systems with current hostnames
  • Implement a standardized UNC

Answer : Implement a standardized UNC

Which of the following should current network performance be compared against to determine network anomalies?

Options are :

  • Traffic analysis
  • Logs
  • Packet capture
  • Baseline

Answer : Baseline

Which of the following should be performed to verify that unnecessary services are disabled on all switches in an environment?

Options are :

  • Port scanning
  • Packet capturing
  • Baseline review
  • Log scanning

Answer : Port scanning

FC0-TS1 CompTIA Strata IT for Sales Practice Exam Set 3

Which of the following will listen on the line to ensure there is no traffic transmitting and implement a back-off timer if a collision occurs?

Options are :

  • OSPF
  • MPLS

Answer : CSMA/CD

A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?

Options are :

  • Port security
  • Access control lists
  • WPA2
  • Captive portal

Answer : Port security

A technician is upgrading the firmware on an older KVM switch. The specifications call for a serial port to connect to the computer on one side, and an Ethernet jack to connect to the switch on the other side. Which of the following connectors does the technician need for this cable? (Choose two.)

Options are :

  • RJ-45
  • DB-9
  • DB-25
  • BNC
  • RG-9
  • RJ-11

Answer : RJ-45 DB-9

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 13

A technician is responsible for configuring a new firewall. The hardware team has already installed, powered, and connected the system. Which of the following types of documentation should the technician utilize to complete the task?

Options are :

  • Network performance baseline
  • Rack diagram
  • IDF/MDF documentation
  • Logical and physical diagrams

Answer : Logical and physical diagrams

A technician is setting up a branch office on a point-to-point connection. Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?

Options are :

  • /30
  • /24
  • /32
  • /25

Answer : /30

A technician needs to order cable that meets 10GBaseT and fire safety requirements for an installation between a drop ceiling and a standard ceiling. Which of the following should the technician order to ensure compliance with the requirements?

Options are :

  • Plenum Cat 5e
  • Plenum Cat 6a
  • PVC Cat 5
  • PVC Cat 7

Answer : Plenum Cat 6a

N10-006 CompTIA Network+ Certification Practice Test Set 7

Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?

Options are :

  • Network map
  • Syslog
  • Placement map
  • Environmental monitor

Answer : Syslog

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions