CompTIA Network+ 6 Certification Practice Exams - 2019 Set 2

Which of the following is based ENTIRELY on using ICMP packets?


Options are :

  • Smurf attack (Correct)
  • NMAP
  • Buffer overflow attack
  • Social engineering

Answer : Smurf attack

Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?


Options are :

  • Router
  • Switch (Correct)
  • VPN Concetnrator
  • Proxy Server

Answer : Switch

Which of the following devices exist as either hardware or software to assist in routing traffic? (Select TWO).


Options are :

  • Layer 2 switch
  • Cable modern
  • Layer 3 switch (Correct)
  • NIDS
  • Router (Correct)

Answer : Layer 3 switch Router

Something you have, something you are, and something you know are the three tenets of:


Options are :

  • Remote access
  • Social engineering
  • Access control (Correct)
  • Change management

Answer : Access control

A technician is troubleshooting a problem with a network printer. The technician thinks the network printer is out of paper and ink. Which of the following should thetechnician do NEXT?


Options are :

  • Test the theory (Correct)
  • Question users
  • Implement the solution
  • Escalate the problem

Answer : Test the theory

Which of the following technologies is required to allow all ports of a single private IP to be publically accessible via a single public IP?


Options are :

  • ACL
  • RIP
  • PAT (Correct)
  • NAT

Answer : PAT

Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and .30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff sees the following information in the switch configuration:interface VLAN 105IP address 192.168.105.5 255.255.255.0Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem?


Options are :

  • A routing loop has occurred.
  • Jeff used a crossover cable to connect the switch to the gateway.
  • The subnet mask is incorrect.
  • The server is missing default-gateway information. (Correct)

Answer : The server is missing default-gateway information.

Which of the following could be used to stop unknown threats?


Options are :

  • Signature based IPS
  • Honeypots
  • DMZ
  • Behavior based IPS (Correct)

Answer : Behavior based IPS

Which of the following allows a central point to simultaneously address other points without addressing all of them?


Options are :

  • Broadcast
  • Multicast (Correct)
  • Subnetting
  • Unicast

Answer : Multicast

Which of the following BEST describes how a layer 2 switch functions?


Options are :

  • Switches packets between different subnets based on MAC addresses
  • Switches packets between different subnets based on MAC addresses
  • Switches packets between different subnets based on IP addresses
  • Switches packets within the same subnet based on MAC addresses (Correct)

Answer : Switches packets within the same subnet based on MAC addresses

Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?


Options are :

  • 20
  • 22 (Correct)
  • 21
  • 23

Answer : 22

The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?


Options are :

  • 3
  • 1
  • 5
  • 4 (Correct)

Answer : 4

Which of the following uses certificates as a form of security?


Options are :

  • LDAP
  • CHAP
  • Kerberos
  • PKI (Correct)

Answer : PKI

A company has installed an access point and configured it to broadcast at 802.11n only. Some users are stating that they cannot connect to this access point.Which of the following is the MOST likely reason some users cannot connect?


Options are :

  • Incorrect SSID
  • Incorrect channel
  • Weak encryption
  • Incompatible NICs (Correct)

Answer : Incompatible NICs

Tenants access multiple wireless networks in a building. Users report intermittent connectivity. Which of the following is the MOST likely cause of the problem?


Options are :

  • The channels are overlapping with other wireless networks and should be changed. (Correct)
  • The users have incompatible wireless network cards and should upgrade.
  • The default idle period for logoff is too short and should be changed to a longer limit.
  • The SSIDs are incompatible and should be renamed.

Answer : The channels are overlapping with other wireless networks and should be changed.

Which of the following are network topologies? (Select TWO).


Options are :

  • Duplex
  • Star (Correct)
  • Circular
  • Bus (Correct)
  • Ethernet

Answer : Star Bus

Which of the following cables will MOST likely be used to connect to a satellite dish?


Options are :

  • CAT6
  • CAT5e
  • RG-6 (Correct)
  • Fiber

Answer : RG-6

A technician discovers that a malware infection has damaged part of the Windows TCP/IP stack. Which of the following commands can help repair the damage?


Options are :

  • netsh lan
  • netsh wlan
  • netsh winsock (Correct)
  • netsh interface

Answer : netsh winsock

A company has a large number of employees that need VPN access from home. Which of the following is the BEST solution for deploying and managing theremote access?


Options are :

  • Host-based firewall
  • Network-based firewall
  • Site-to-site VPN
  • SSL VPN (Correct)

Answer : SSL VPN

Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name?


Options are :

  • SSID (Correct)
  • WPA
  • WEP
  • Channel

Answer : SSID

Which of the following is the default subnet mask for a Class B address?


Options are :

  • 255.0.0.0
  • 255.255.255.255
  • 255.255.0.0 (Correct)
  • 255.255.255.0

Answer : 255.255.0.0

A VoIP line will MOST likely have which of the following connectors?


Options are :

  • DB-25
  • RJ-45 (Correct)
  • BNC
  • RJ-11

Answer : RJ-45

Which of the following is a routed protocol that functions at layer 3 of the OSI model?


Options are :

  • ADSL
  • IP (Correct)
  • PPP
  • Frame relay

Answer : IP

Which of the following is a proprietary routing protocol?


Options are :

  • OSPF
  • EIGRP (Correct)
  • RIP
  • BGP

Answer : EIGRP

Which of the following allows a technician to gather information about the operating system?


Options are :

  • Domain services
  • Fingerprinting (Correct)
  • Countermeasures
  • Reconnaissance

Answer : Fingerprinting

Which of the following ports is the default telnet port?


Options are :

  • 21
  • 20
  • 22
  • 23 (Correct)

Answer : 23

A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were set to redirect all traffic through anunknown proxy. This type of attack is known as which of the following?


Options are :

  • Shoulder surfing
  • Man-in-the-middle (Correct)
  • Phishing
  • Social engineering

Answer : Man-in-the-middle

Which of the following is indicative of an FTP bounce?


Options are :

  • File Transfer Success
  • Same Port Number
  • Reverse DNS lookups
  • Arbitrary IP address (Correct)

Answer : Arbitrary IP address

Which of the following cables has the MOST twists per inch?


Options are :

  • CAT3
  • CAT6 (Correct)
  • CAY5e
  • CAT5

Answer : CAT6

A firewall that operates at Layer 7 of the OSI model is known as a(n):


Options are :

  • Redundant firewall
  • Circuit gateway
  • Application level (Correct)
  • Packet filter

Answer : Application level

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions