CompTIA Network+ 6 Certification Practice Exams - 2019 Set 3

Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server?


Options are :

  • NTP (Correct)
  • ARP
  • TFTP
  • RTP

Answer : NTP

Which of the following cable types have a rated MAXIMUM bandwidth of 100Mbps?


Options are :

  • CAT5 (Correct)
  • CAT5e
  • CAT6
  • CAT3

Answer : CAT5

Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).


Options are :

  • 161 (Correct)
  • 143
  • 22
  • 23
  • 162 (Correct)
  • 8080

Answer : 161 162

Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can reach the Internet, but cannot accessany internal network resources.Which of the following is the MOST likely reason?


Options are :

  • Incorrect SSID
  • Incorrect subnet mask
  • Incorrect DNS (Correct)
  • Duplicate IP address

Answer : Incorrect DNS

Which of the following is used to provide hot standby capabilities using paired routers?


Options are :

  • L2TP
  • CARP (Correct)
  • ISAKMP
  • PPTP

Answer : CARP

A workstation on the network is configured as follows. A user reports that they are unable to print to a device located on a different subnet. Which of the following isthe MOST likely problem?IP address: 172.16.204.12 Subnet Mask: 255.255.0.0Default Gateway: 172.15.204.254DNS address: 172.16.204.1Broadcast address: 172.16.255.255


Options are :

  • Subnet mask
  • DNS address
  • IP address
  • Default gateway (Correct)
  • Broadcast address

Answer : Default gateway

Which of the following is true about tunneling and encryption?


Options are :

  • SSL VPN provides a secure tunnel. (Correct)
  • RAS is a secure way to create a tunnel.
  • SIP encrypts all data going through the tunnel.
  • PPTP creates a secure tunnel.

Answer : SSL VPN provides a secure tunnel.

Which of the following is an invalid MAC address?


Options are :

  • 44:98:3E:F8:33:23
  • 56:AD:BX:89:55:54 (Correct)
  • 94:9E:FE:EE:8C:DF
  • AA:CE:58:FD:90:08

Answer : 56:AD:BX:89:55:54

The software that allows a machine to run multiple operating systems at once is called the:


Options are :

  • Partition manager
  • Boot loader
  • Server manager
  • Hypervisor (Correct)

Answer : Hypervisor

Which of the following is the BEST way to mitigate security threats on a network?


Options are :

  • User training (Correct)
  • Incident response
  • Man-in-the- middle
  • Social engineering

Answer : User training

After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the technician MOST likely check to verify thatthe cable was crimped correctly?


Options are :

  • Toner probe
  • Cable certifier (Correct)
  • Loopback plug
  • Punch down tool

Answer : Cable certifier

Which of the following describes a DNS server?


Options are :

  • Caches commonly viewed web pages
  • Translates an IP address to a name (Correct)
  • Provides port security for a network
  • Assigns IP addresses to network devices

Answer : Translates an IP address to a name

Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that the network only allows 802.11n clients?


Options are :

  • Name the SSID on the 802.11n network only
  • Only use WPA encryption
  • Limit the DHCP address pool
  • Disable 802.11b and 802.11g (Correct)

Answer : Disable 802.11b and 802.11g

Which of the following default ports would need to be disabled to block TFTP traffic?


Options are :

  • 21
  • 123
  • 69 (Correct)
  • 20

Answer : 69

Jeff, a network engineer, is troubleshooting an issue where clients are not receiving IP addresses from a new, properly configured DHCP server on another subnet.Statically addressed clients can get onto the same network with no issues. Which of the following is causing the issue?


Options are :

  • Improper routing protocols
  • Missing helper addresses (Correct)
  • Incorrect VLAN tagging
  • Wrong default gateway

Answer : Missing helper addresses

Which of the following standards can operate at both the 2.4GHz and 5GHz frequencies?


Options are :

  • 802.11g
  • 802.11b
  • 802.11n (Correct)
  • 802.11a

Answer : 802.11n

Which of the following will allow multiple frequencies to be combined?


Options are :

  • MIMO
  • Channel bonding (Correct)
  • MPLS
  • WiMAX

Answer : Channel bonding

Which of the following DNS records would allow for a website to have more than one FQDN?


Options are :

  • MX
  • PTR
  • CNAME (Correct)
  • TXT

Answer : CNAME

Which of the following default services uses TCP/UDP port 88?


Options are :

  • HTTP
  • IGMP
  • Kerberos (Correct)
  • LDAP

Answer : Kerberos

Which of the following WAP security features offers the STRONGEST encryption?


Options are :

  • WPA
  • Hidden SSID
  • WPA2 (Correct)
  • WEP

Answer : WPA2

A NAC service has discovered a virus on a client laptop.In which of the following locations would the NAC service place the laptop?


Options are :

  • On the honeypot
  • On the DMZ network
  • On the sandbox network
  • On the quarantine network (Correct)

Answer : On the quarantine network

A company installs a new mail server. Which of the following DNS records need to be configured to allow the organization to receive email?


Options are :

  • PTR
  • CNAME
  • A
  • MX (Correct)

Answer : MX

A network administrator received the following email from a user:From: user@company.comTo: abuse@company.comSubject: Free smart phoneDear, user, please click the following link to get your free smart phone http://www.freesmartphone.it:8080/survey.phpWhich of of the following should the administrator do to prevent all employees from accessing the link in the above email, while still allowing Internet access to thefreesmartphone.it domain?


Options are :

  • Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list. (Correct)
  • Add DENY IP ANY ANY EQ 8080 to the intrusion detection system filter
  • Add http://www.freesmartphone.it:8080/survey.php to the load balancer
  • Add DENY TCP http://www.freesmartphone.it ANY EQ 8080 to the firewall ACL

Answer : Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list.

Which of the following protocols is used to encapsulate other network layer protocols such as multicast and IPX over WAN connections?


Options are :

  • MPLS
  • PPP
  • GRE (Correct)
  • ESP

Answer : GRE

A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building.Which of the following is the MOST common connector that will be used on the switch to connect the media converter?


Options are :

  • Fiber coupler
  • FDDI
  • ST (Correct)
  • MT-RJ

Answer : ST

Which of the following protocols is used to send mail to another server on the Internet?


Options are :

  • SNMP
  • SMTP (Correct)
  • RTP
  • POP

Answer : SMTP

A network topology in which all nodes have point to point connections to all other nodes is known as which of the following?


Options are :

  • Ring
  • Star
  • Mesh (Correct)
  • Bus

Answer : Mesh

Ann, an employee, has properly connected her personal wireless router to a network jack in her office. The router is unable to get a DHCP address though hercorporate laptop can get a DHCP address when connected to the same jack. Ann checks the router configuration to ensure it is configured to obtain a DCHPaddress.Which of the following is the MOST likely reason why the router is not receiving a DHCP address?


Options are :

  • The Administrator has implemented a feature that only allows white-listed MAC addresses (Correct)
  • The administrator is blocking DHCP requests that originate from access points
  • The administrator has enabled DHCP snooping on the network
  • The administrator is blocking the wireless router's MAC address using MAC filtering

Answer : The Administrator has implemented a feature that only allows white-listed MAC addresses

A facility would like to verify each individual's identity prior to allowing access to the datacenter. Additionally, the facility would like to ensure that users do not tailgatebehind other users.Which of the following would BEST meet these goals?


Options are :

  • Implement a biometric reader at the datacenter entrance and require passage through a mantrap (Correct)
  • Implement a security guard at the facility entrance and a keypad on the datacenter entrance
  • Implement a CCTV camera and a proximity reader on the datacenter entrance
  • Implement a biometric reader at the facility entrance and a proximity card at the datacenter entrance

Answer : Implement a biometric reader at the datacenter entrance and require passage through a mantrap

A network technician responds to a customer reporting that a workstation keeps losing its network connection. The user explains that it occurs randomly and ithappens several times throughout the day.Which of the following troubleshooting methods should the technician perform FIRST?


Options are :

  • Test the theory
  • Question the obvious
  • Gather information (Correct)
  • Establish a plan of action

Answer : Gather information

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions