CompTIA Network+ 6 Certification Practice Exams - 2019 Set 16

Which of the following WAN technologies utilizes the concept of virtual circuits and point-multipoint connections?


Options are :

  • ISDN
  • Frame relay (Correct)
  • PRI
  • MPLS
  • Broadband cable

Answer : Frame relay

The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. Which of the following should the network team implement to fulfil the request?


Options are :

  • UTM appliance
  • Content filter
  • Proxy server
  • Load balancer (Correct)

Answer : Load balancer

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 3

To replace a defective UPS, the network administrator must take the switch offline. The administrator wants to be able to perform maintenance UPS in the future without affecting the availability of the attached switch. Which of the following would BEST allow this to happen?


Options are :

  • Add a second UPS into the rack
  • Add a redundant power supply to the switch (Correct)
  • Install a power converter for the switch
  • Implement stacking on the switches in the rack

Answer : Add a redundant power supply to the switch

Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch?


Options are :

  • 12
  • 1 (Correct)
  • 2
  • 6
  • 0

Answer : 1

A user is getting very weak signals while trying to connect to the wireless. Which of the following should the user do to help with signal strength?


Options are :

  • Install a hub to ensure there is a clear path for the cables to run.
  • Reinstall the operating system to the PC to ensure the newest patches are installed.
  • Move the wireless router to a better location where line of sight is obtained. (Correct)
  • Call the wireless provider and ask for a T3 circuit.

Answer : Move the wireless router to a better location where line of sight is obtained.

CompTIA Security+ SY0 401 Test Set 1

Which of the following is a vulnerable system designed to detect and log unauthorized access?


Options are :

  • Proxy server
  • Honeypot (Correct)
  • SIEM
  • DMZ

Answer : Honeypot

Which of the following datacenter security methodologies is MOST likely to remain usable during a network outage?


Options are :

  • motion detectors
  • video surveillance
  • biometric scanners
  • door locks (Correct)

Answer : door locks

Zach, a technician, discovers a switch is not communicating with the other switches in a stack.Which of the following is the MOST likely cause?


Options are :

  • The port is not trunked.
  • The cable is not a crossover. (Correct)
  • STP is disabled.
  • Both T568A and T568B standards are being used.

Answer : The cable is not a crossover.

JK0-802 CompTIA A+ Certification Exam Set 8

When enabling jumbo frames on a network device, which of the following parameters is being adjusted?


Options are :

  • MTU (Correct)
  • Speed
  • TTL
  • Duplex

Answer : MTU

Which of the following WAN technologies provides a guaranteed throughput rate?


Options are :

  • DSL
  • T-1 (Correct)
  • Dial-up
  • Cable broadband

Answer : T-1

A technician notices that network access is becoming increasingly slow. All of the activity lights, on the only network layer 2 switch, are blinking at steadilyincreasing rates. Which of the following is the MOST likely cause of the increased traffic?


Options are :

  • MTU mismatch
  • IP addresses
  • Switching loop (Correct)
  • STP blocking

Answer : Switching loop

CLO-001 CompTIA Cloud Essentials Certification Practice Test Set 6

Which of the following is the correct representation of an IPv6 address?


Options are :

  • 0:0:0:0:0:0:0:0:1
  • 2001::4860:800f::
  • 1:2:3:4:AB:CD:EF
  • :: (Correct)

Answer : ::

Which of the following physical security devices is used to detect unauthorized server room access?


Options are :

  • Smart card
  • Video surveillance (Correct)
  • Biometrics
  • Access badge

Answer : Video surveillance

Lisa, a consultant, is inspecting an office that reports frequent wireless issues. Upon scanning the network broadcasting in the vicinity of the office, seven SSIDs are found. The company's Wi-Fi network and three others all share channel six. Which of the following is MOST likely causing the issue?


Options are :

  • Standard mismatch
  • Frequency interference (Correct)
  • Low signal strength
  • Incorrect channel

Answer : Frequency interference

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 11

Which of the following devices are MOST often responsible for 802.1q tagging? (Choose two.)


Options are :

  • IDS
  • Switch (Correct)
  • IPS
  • Router (Correct)
  • Network tap
  • Hub

Answer : Switch Router

A technician is trying to configure a previously owned WAP. The technician successfully logs into the administrative console and attempts to input the IP address on the WAP. However, the WAP is not accepting the command. Which of the following is causing the problem?


Options are :

  • The LWAPP image is installed on the WAP
  • The WAP antenna is damaged
  • The WAP transmitter light is dim
  • The terminal emulation software is misconfigured (Correct)

Answer : The terminal emulation software is misconfigured

Which of the following is networking stand-alone hardware that will permit any WiFi-compliant device to connect to a wired network?


Options are :

  • Wireless access point (Correct)
  • Wireless firewall
  • Wireless hub
  • Wireless bridge

Answer : Wireless access point

CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 3

A user checks an IP address using an external website. The address is different than the one the user sees when opening a command prompt and typing in ipconfig/all. The user does not understand why the two tools show different IP addresses. This is BEST explained by the interworking of:


Options are :

  • public/private networks (Correct)
  • network devices
  • packet flow
  • traffic-routing protocols

Answer : public/private networks

Which of the following is the SHORTEST way to write 2001:0000:0d58:0000:0000:0095:7565:0001 in proper IPv6 shorthand?


Options are :

  • 2001:0:d58::95:7565:1 (Correct)
  • 2001::d58::95:7565:1
  • 2001:0:0d58::95:7565:1
  • 2001:0:d58:0:0:95:7565:1

Answer : 2001:0:d58::95:7565:1

Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?


Options are :

  • Sticky MAC (Correct)
  • NAC
  • 802.1x
  • ACL

Answer : Sticky MAC

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 6

Which of the following are characteristics of jumbo frames? (Choose two.)


Options are :

  • MTU size greater than 1500 (Correct)
  • MTU size greater than 10000
  • MTU size greater than 12000
  • Commonly used on IaaS
  • Commonly used on SAN (Correct)

Answer : MTU size greater than 1500 Commonly used on SAN

Client PCs are unable to receive addressing information from a newly configured interface on a router. Which of the following should be added to allow the clients to connect?


Options are :

  • DHCP lease me
  • DNS record type
  • IP helper (Correct)
  • TTL

Answer : IP helper

Which of the following technologies allows for redundant links within a Layer 2 segment?


Options are :

  • Spanning Tree (Correct)
  • Port Mirroring
  • RIP
  • OSPF

Answer : Spanning Tree

JK0-019 CompTIA E2C Network + Certification Exam Set 6

In which of the following ways does a DDoS attack differ from a spoofing attack?


Options are :

  • Spoofing attacks originate from a single host
  • DDoS attacks target multiple networks
  • DDoS attacks are launched from multiple hosts (Correct)
  • Spoofing attacks require physical presence

Answer : DDoS attacks are launched from multiple hosts

Which of the following is the correct port number for NTP?


Options are :

  • 69
  • 123 (Correct)
  • 25
  • 161

Answer : 123

A company has attempted to introduce a new major network segment to allow growth in capacity. On the core switch, a GBIC was used to interconnect with a newlyplaced downstream distribution switch for the first time. Soon after this implementation, a network flood and an outage occurred between the core and newdistribution network modules. Which of the following should the network administrator troubleshoot FIRST in order to rectify the issue?


Options are :

  • Check whether the GBIC was set to multi-mode instead of single-mode SFP.
  • Check whether an incorrect VLAN has been assigned to the new distribution switch.
  • Check for inconsistent or missing routes between the core and distribution switches.
  • Check for switching loops between core and distribution switches. (Correct)

Answer : Check for switching loops between core and distribution switches.

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

Which of the following BEST describes the BGP routing protocol?


Options are :

  • hybrid (Correct)
  • link state
  • distance vector
  • static

Answer : hybrid

Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?


Options are :

  • Static IP address
  • MAC address reservation (Correct)
  • IP address exclusion
  • Custom DNS server entry

Answer : MAC address reservation

A network technician is installing a simple SOHO router with wireless functionality. Which of the following wireless encryption standards would be BEST suited forthe HIGHEST level of security?


Options are :

  • WEP64
  • WPA
  • WEP128
  • WPA2 (Correct)

Answer : WPA2

JK0-802 CompTIA A+ Certification Exam Set 1

In which of the following scenarios should a technician use a cross-over cable to provide connectivity?


Options are :

  • Switch to AP
  • PC to PC (Correct)
  • Router to switch
  • Router to modem
  • PC to switch

Answer : PC to PC

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions