CompTIA Network+ 6 Certification Practice Exams - 2019 Set 4

As part of unified communications services, QoS must be implemented. DSCP and CoS map to which of the following OSI layers? (Select TWO)


Options are :

  • Layer 5
  • Layer 3
  • Layer 1
  • Layer 2
  • Layer 4

Answer : Layer 3 Layer 2

Which of the following is a document that is used in cyber forensics that lists everywhere evidence has been?


Options are :

  • Legal document
  • Warrant
  • Forensic report
  • Documentation of the scene
  • Chain of custody

Answer : Chain of custody

Which of the following protocols is considered a hybrid routing protocol?


Options are :

  • IS-IS
  • EIGRP
  • OSPF
  • RIPv2
  • BGP

Answer : EIGRP

SY0-401 CompTIA Security+ Certification Practice Exam Set 7

A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC undera cubicle overnight.Which of the following steps of incident handling has been incorrectly performed?


Options are :

  • Forensics report
  • Document the scene
  • Chain of custody
  • Evidence collection

Answer : Chain of custody

A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and printers.Which of the following has happened to the user?


Options are :

  • The user is connected to the wrong RADIUS server.
  • The user is connected to the wrong SSID.
  • The user is connected using the wrong channel.
  • The user is experiencing an EMI issue

Answer : The user is connected to the wrong SSID.

A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency emanations.Which of the following standards should be consulted?


Options are :

  • DOCSIS
  • DWDM
  • MIMO
  • TEMPEST

Answer : TEMPEST

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 7

A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system.Which of the following should the technician perform?


Options are :

  • Add the system to the DMZ
  • Configure a VLAN on Layer 2 switch
  • Implicit deny all traffic on network
  • Disable the network based firewall

Answer : Add the system to the DMZ

An attack where the potential intruder tricks a user into providing sensitive information is known as which of the following?


Options are :

  • Evil Twin
  • Man-in-the-middle
  • Social engineering
  • Bluesnarfing

Answer : Social engineering

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.This is an example of which of the following attacks?


Options are :

  • Smurf attack
  • Blue snarfing
  • Spear phishing
  • VLAN hopping

Answer : VLAN hopping

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 23

While monitoring the network, a technician notices that the network traffic to one of the servers is extremely high.Which of the following should the technician use to verify if this is a concern?


Options are :

  • Real time monitor
  • Log management
  • Network diagram
  • Network baseline

Answer : Network baseline

Joe, a home user, would like to share music throughout the computers in his house using a USB drive connected to a router he purchased a year ago. Themanufacturer states that the router is capable of recognizing 4 TB, however, Joe is unable to get his 3TB drive to show up on the network.Which of the following should Joe perform in order to resolve this issue?


Options are :

  • Install the latest OS on his computers
  • Flash the latest firmware for his router
  • Download the latest playback software for his musicfiles
  • Load the latest hardware drivers for his USB drive

Answer : Flash the latest firmware for his router

A network technician must allow use of HTTP from the internet to an internal resource running HTTP.This is an example of which of the following?


Options are :

  • Virtual Private networking (VPN)
  • Dynamic DNS
  • Dynamic NAT
  • Port Forwarding

Answer : Port Forwarding

CompTIA Security+ SY0-501 Questions & Answers Set 4

Joe, the network manager, is leading a project to deploy a SAN. Joe is working with the vendor support technician to properly set up and configure the SAN on thenetwork. In order to begin SAN I/O optimization, which of the following would Joe need to provide the vendor support technician?


Options are :

  • Baseline documents
  • Access to the datacenter
  • Asset management document
  • Network diagrams

Answer : Network diagrams

A user reports slow computer performance. A technician troubleshooting the issue uses a performance monitoring tool and receives the following results:Avg % Processor Time =10%Avg Pages/Second = 0Avg Disk Queue Length = 3Based on the results, which of the following is causing a bottleneck?


Options are :

  • Hard drive
  • Memory
  • Processor
  • NIC

Answer : Hard drive

A network administrator is following best practices to implement firewalls, patch management and policies on the network.Which of the following should be performed to verify the security controls in place?


Options are :

  • Penetration testing
  • AAA authentication testing
  • Disaster recovery testing
  • Single point of failure testing

Answer : Penetration testing

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 14

Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the directory structure. To ensure the virus has not infectedthe .mp4 files in the directory, she views one of the files and believes it contains illegal material.Which of the following forensics actions should Ann perform?


Options are :

  • Stop and escalate to the proper authorities
  • Erase the files created by the virus
  • Copy the information to a network drive to preserve the evidence
  • Check the remaining directories for more .mp4 files

Answer : Stop and escalate to the proper authorities

A technician is tasked with connecting a router to a DWDM. The technician connects the router to the multiplexer and confirms that there is a good signal level.However, the interface on the router will not come up.Which of the following is the MOST likely cause?


Options are :

  • The SFP in the multiplexer is malfunctioning.
  • The wrong wavelength was demuxed from the multiplexer.
  • There is a dirty connector on the fiber optic cable.
  • The fiber optic cable is bent in the management tray.

Answer : The wrong wavelength was demuxed from the multiplexer.

Which of the following is a connectionless protocol? (Select TWO)


Options are :

  • UDP
  • ICMP
  • SSL
  • TCP
  • HTTP
  • SSH

Answer : UDP ICMP

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 4

A network technician has just received an email regarding a security issue detected on the company's standard web browser.Which of the following will MOST likely fix the issue?


Options are :

  • OS update
  • Driver update
  • Firmware update
  • Vulnerability patch

Answer : Vulnerability patch

A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team.This is an example of which of following threats?


Options are :

  • Rogue AP
  • Brute force
  • DDoS
  • Bluesnarfing

Answer : Rogue AP

Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as which of the following?


Options are :

  • Multiplexing
  • Smurfing
  • Zero-day attack
  • Blue jacking

Answer : Blue jacking

CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 3

Which of the following is considered a classless routing protocol?


Options are :

  • IS-IS
  • STP
  • IGRP
  • RIPv1

Answer : IS-IS

A network technician needs to set up two public facing web servers and wants to ensure that if they are compromised the intruder cannot access the intranet.Which of the following security techniques should be used?


Options are :

  • Place them in the demilitarized zone
  • Place them between two internal firewalls
  • Place them in a separate subnet
  • Place them behind honeypots

Answer : Place them in the demilitarized zone

Which of the following helps prevent routing loops?


Options are :

  • Route summarization
  • Split horizon
  • Default gateway
  • Routing table

Answer : Split horizon

N10-006 CompTIA Network+ Certification Practice Test Set 9

A company utilizes a patching server to regularly update their PC's. After the latest round of patching all of the older PCs with non-gigabit Ethernet cards becomedisconnected from the network and now require a technician to fix the issue locally at each PC.Which of the following should be done to prevent this issue in the future?


Options are :

  • Throttle the connection speed of the patching server to match older PCs
  • Enable automatic rebooting of the PCs after patching is completed
  • Require the patching server to update the oldest PCs off hours
  • Disable automatic driver updates to PCs on the patching server

Answer : Throttle the connection speed of the patching server to match older PCs

Joe, and administrator, is setting up three more switches in the test lab and is configuring the switches. He is verifying the connectivity but when he pings one of theswitches he receives "Destination Unreachable".Which of the following issues could this be?


Options are :

  • RADIUS authentication errors
  • Misconfigured DNS settings
  • Denial of service attack
  • Misconfigured Split Horizon

Answer : Misconfigured Split Horizon

Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence?


Options are :

  • Secure copy protocol
  • Legal hold
  • Financial responsibility
  • Chain of custody

Answer : Chain of custody

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 6

Which of the following is the BEST way to prevent various types of security threats throughout the network on a routine basis?


Options are :

  • User training and awareness
  • Disaster recovery planning
  • Penetration testing
  • Business continuity training

Answer : User training and awareness

A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the 192.168.0.0/24 network.Which of the following ACL should the technician configure? (Select TWO)


Options are :

  • PERMIT SRCIP:192.168.0.0/24 SPORT:80 DSTIP:ANY DPORT:80
  • PERMIT SRCIP:ANY SPORT:80 DSTIP:192.168.0.0/24 DPORT ANY
  • PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80
  • PERMIT SRCIP 192.168.0.0/24 SPORT:80 DSTIP:192.168.0.0/24 DPORT:80
  • PERMIT SRCIP: ANYSPORT:80 DSTIP:192.168.0.0/24 DPORT:80

Answer : PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80

A network technician needs to connect two switches. The technician needs a link between them which is capable of handling 10gb.Which of the following media would be optimal for this application?


Options are :

  • CAT5e cable
  • CAT6 cable
  • Coax cable
  • Fiber Optic cable

Answer : Fiber Optic cable

CompTIA JK0-022 E2C Security Data & Host Security Exam Set 8

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions