CompTIA Network+ 6 Certification Practice Exams - 2019 Set 9

A network administrator wants to implement a centralized monitoring solution that utilizes push alerts sent from the client to a server.Which of the following types of monitoring should be put in place?


Options are :

  • SMTP
  • NIDS
  • SNMP
  • SMS

Answer : SNMP

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 11

An outside technician notices that a SOHO employee who is logged into the company VPN has an unexpected source IP address. Which of the following is the employee MOST likely using?


Options are :

  • VPN concentrator
  • Proxy server
  • IPv6
  • Least-cost routing

Answer : Proxy server

Which of the following ports does SIP use?


Options are :

  • 2427/27/27
  • 5060/5061
  • 1720
  • 5004/5005
  • 443

Answer : 5060/5061

Which of the following would BEST mitigate the risk of social engineering?


Options are :

  • Man traps
  • Penetration testing
  • End-user training
  • Business continuity planning

Answer : End-user training

CompTIA Cloud Essentials Cert Exam Prep CL0-002 Set 1

A technician is installing a network firewall and would like to block all WAN to LAN traffic that is using ports other than the default ports for Internet and emailconnectivity.Which of the following rules should the technician verify FIRST?


Options are :

  • All outbound traffic is blocked
  • An implicit deny is enables
  • All inbound traffic is blocked
  • A DMZ has been created

Answer : An implicit deny is enables

When querying a DNS server for an AAAA record, which of the following is an appropriate response?


Options are :

  • 00:f3:82:99:a2:b8
  • 61.23.168.192.in-addr.arpa
  • 192.168.2.1
  • 3ffe:1900:4545:3:200:f8ff:fe21:67cf

Answer : 3ffe:1900:4545:3:200:f8ff:fe21:67cf

A company is building a new 10Gb Ethernet top of rack network.Which of the following media is MOST cost-effective for this implementation?


Options are :

  • CAT5e
  • Single mode fiber
  • Multimode fiber
  • Fibre channel

Answer : Multimode fiber

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 4

A technician is configuring mobile devices for new employees.Which of the following documents should be updated to show that the new employees are receiving these mobile devices?


Options are :

  • Standard operating procedure
  • Asset management
  • Change management
  • Network diagram
  • Organizational chart

Answer : Asset management

A company is moving into a larger office space. A site survey is performed, a network layout is created, and access points are placed throughout the building.Which of the following steps should the network technician take NEXT to ensure blanket wireless coverage?


Options are :

  • Replace all antennas with omni-directional types.
  • Broadcast the SSID to connect all devices.
  • Configure 5GHz dual channel broadcasting.
  • Create a heat map and adjust access points.

Answer : Broadcast the SSID to connect all devices.

A network engineer has been tasked with designing a network for a new branch office with approximately 50 network devices. This branch office will connect to the other offices via a MAN. Many of the other branch offices use off-the-shelf SOHO equipment. It is a requirement that the routing protocol chosen use the leastamount of overhead. Additionally, all computers on the network will be part of a single VLAN. The connection between these computers should produce the highestthroughput possible, in the most cost effective manner.Which of the following devices would be MOST appropriate?


Options are :

  • A router should be used as a gateway device, with RIPv2 as the routing protocol. The computers should be connected to one another with a Gb Layer 2 switch.
  • A UTM should be used as a gateway device, with BGP as the routing protocol. The computers should be connected to one another using 1Gb Fibre Channel.
  • A router should be used as a gateway device, with OSPF as the routing protocol. The computers should be connected to one another using a Gb Layer 3 switch.
  • A router should be used as a gateway device, with EIGRP as the routing protocol. The computers should be connected to one another using a single 802.11N MIMO access point.

Answer : A router should be used as a gateway device, with RIPv2 as the routing protocol. The computers should be connected to one another with a Gb Layer 2 switch.

220-701 A+ Essentials Certification Practice Exam Set 1

Which of the following is characterized by an attacker attempting to map out an organization's staff hierarchy in order to send targeted emails?


Options are :

  • Impersonation
  • Privilege escalation
  • Spear phishing
  • Whaling

Answer : Whaling

Which of the following commands will display the associated IP address of a network adapter in Windows and Linux environments? (Select TWO).


Options are :

  • ipconfig
  • nslookup
  • dig
  • nbstat
  • ifconfig

Answer : ipconfig ifconfig

In a network that requires multilayer switches to use authentication via RADIUS/TACACS+, which of the following access control models will the switches need toutilize?


Options are :

  • 802.3af
  • PKI
  • 802.1q
  • 802.1x

Answer : 802.1x

220-701 A+ Essentials Certification Practice Exam Set 8

A network administrator was told by the Chef Information Officer (CIO) to set up a new office with a network that has redundancy.Which of the following topologies would the network administrator need to administer?


Options are :

  • Hybrid
  • Bus
  • Partial mesh
  • Mesh
  • Star

Answer : Mesh

A user reports slow performance. A technician troubleshooting the issue users a performance monitoring tool and receives the following results:Avg. % Processor Time = 15%Avg. Pages/Second = 5Avg. Disk Queue Length = 1Based on these results, which of the following is causing a bottleneck?


Options are :

  • Memory
  • Processor
  • NIC
  • Hard drive

Answer : Memory

Which of the following anti-malware solutions should be implemented to deter attackers from loading custom files onto a distributed target platform?


Options are :

  • Network-based anti-malware
  • Cloud-based anti-malware
  • Host-based anti-malware
  • Signature-based anti-malware

Answer : Host-based anti-malware

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 7

A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Whichof the following network troubleshooting methodology steps should Joe have performed FIRST?


Options are :

  • Implement the solution or escalate as necessary
  • Once a theory is confirmed determine the next step is to resolve the problem
  • Determine if anything has changed
  • Question the obvious

Answer : Determine if anything has changed

Policies, procedures and end-user training are effective ways to mitigate:


Options are :

  • attempted DDoS attacks
  • zero-day attacks
  • social engineering attempts
  • man-in-the-middle attacks

Answer : zero-day attacks

Which of the following network devices restricts traffic based on words, signatures, and URLs?


Options are :

  • Content filter
  • Layer 2 switch
  • Load balancer
  • Traffic analyzer

Answer : Content filter

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 11

Which of the following defines an IP address that is NOT routed on the Internet?


Options are :

  • Multicast
  • Private
  • Classful
  • Public

Answer : Private

A network administrator need to install a border device on the network that will help ensure FTP commands are not being sent in traffic communicating on port 25.Which of the following devices will allow for deep packet inspection?


Options are :

  • Layer 3 switch
  • Protocol analyzer
  • Web proxy
  • Layer 7 firewall

Answer : Web proxy

Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?


Options are :

  • XSS
  • Directory traversal
  • Packet sniffing
  • SQL injection

Answer : Packet sniffing

CT0-101 Convergence+ Certification Practice Exam Set 2

Which of the following network infrastructure implementations would be used to connect two remote sales back to the main campus for all data and voice traffic?


Options are :

  • Satellite
  • Multimode fiber
  • Crossover cable
  • MPLS

Answer : Multimode fiber

A network technician needs to implement an Ethernet network in a factory environment. Existing shielded twisted pair wiring does not provide enough protectionfrom the interference of the factory equipment.Which of the following copper wired Ethernet networks should be used?


Options are :

  • 100BaseT
  • 10Base2
  • 100BaseF
  • 10GBaseSR

Answer : 100BaseT

A technician has replaced the Internet gateway router, and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISP'srouter IP address. Which of the following is the MOST likely problem?


Options are :

  • Outside interface shutdown
  • Faulty crossover cable
  • DNS server is down
  • Switching loop

Answer : Outside interface shutdown

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 4

Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt seesnormal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?


Options are :

  • Web application firewall
  • Protocol analyzer
  • Load balancer
  • Spam filter

Answer : Protocol analyzer

A network engineer is designing a campus-wide wireless network. Wireless access points will be distributed across the campus for maximum availability. Thenetwork is to be designed to handle a large number of roaming wireless devices.Which of the following features should the engineer use in order to dynamically limit the number of devices in each broadcast domain?


Options are :

  • Subnetting
  • VLAN pooling
  • WPA2
  • LWAPP

Answer : LWAPP

Which of the following protocols are used to connect devices in a secure manner? (Select TWO).


Options are :

  • TELNET
  • SSH
  • HTTP
  • FTP
  • RDP
  • DNS

Answer : SSH RDP

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 7

Which of the following is an advantage of utilizing a Layer 2 switch rather than a hub?


Options are :

  • A switch increases broadcast domains
  • A switch increases collision domains
  • A switch avoids broadcast storms
  • A switch detects frame collisions

Answer : A switch detects frame collisions

A company would like to offer free wireless Internet to visiting customers without compromising security on their internal network.Which of the following firewall rules should a technician configure to accomplish this?


Options are :

  • Block all LAN to WLAN traffic
  • Block all WLAN to LAN traffic
  • Block all LAN to LAN traffic
  • Block all WAN to LAN traffic

Answer : Block all WLAN to LAN traffic

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions