JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 6

A workstation with a static IP address can print and authenticate to a server, but cannot browse to www.comptia.org. Which item is the FIRST to troubleshoot?   


Options are :

  • DNS server settings (Correct)
  • User account on server
  • The physical connection
  • WINS server settings

Answer : DNS server settings

SY0-401 CompTIA Security+ Certification Practice Exam Set 2

VoIP uses which two of the following protocols? (Select TWO). A. SIP B. SSH C. RDP D. RTP 


Options are :

  • B.D
  • A,B
  • A,D (Correct)
  • C,D

Answer : A,D

Which protocol can help you manage a remote server safely?   


Options are :

  • SSH (Correct)
  • HTTP
  • Telnet
  • SFTP

Answer : SSH

Which of the following uses on Bindery Services or Novell Directory Services (NDS) for name resolution? 


Options are :

  • IPX/SPX (Correct)
  • NetBEUI
  • AppleTalk
  • TCP/IP

Answer : IPX/SPX

JK0-019 CompTIA E2C Network + Certification Exam Set 9

In order to present the active routes on a workstation, which tool will be deployed?   


Options are :

  • arp ping
  • netstat -r (Correct)
  • arp -a
  • nbstat

Answer : netstat -r

Your customer complains about the disconnection to the network resources. Which tool will you use to solve this problem? 


Options are :

  • Cable tester (Correct)
  • Butt set
  • Certifier
  • TDR

Answer : Cable tester

Which network monitoring utility will be used by a network administrator to make sure that there are no major collisions occurring on the network? 


Options are :

  • Network access control software
  • Antivirus and anti-spyware software
  • Discovery and connectivity software
  • Interface counters (Correct)

Answer : Interface counters

CompTIA Security+ Certification (SY0-501): Sample

Alex is a network administrator of his company, he has not received any response from the workstation after attempting to ping the workstation via network name. This workstation is part of  the domain and can access the internet. What is the most likely source of this problem?   


Options are :

  • Faulty cable on the workstation
  • Incorrect IP address assigned to the workstation
  • Wrong WINS on the workstation
  • Wrong host name on the workstation (Correct)

Answer : Wrong host name on the workstation

A computer on the network is able to access file shares from other computers on the LAN (Local Area Network) but not on the LANs (Local Area Network) server. The computer can access other services on the server. What is the problem?   


Options are :

  • The computer has the wrong gateway
  • The computer has the wrong subnet mask.
  • The computer did not log on to the servers domain. (Correct)
  • The computer does not have DNS (Domain Name Service) installed

Answer : The computer did not log on to the servers domain.

Wired Equivalent Privacy (WEP) is a deprecated algorithm to secure IEEE 802.11 wireless networks. Dynamic Host Configuration Protocol (DHCP) is a network application protocol used by devices (DHCP clients) to obtain configuration information for operation in an Internet Protocol network. A wireless network is configured with WEP and DHCP. The client workstation is set the channel and SSID. Which action will be taken next to accomplish this configuration?   


Options are :

  • Change the SSID
  • Enter an IP address for the client.
  • Enter the username and password.
  • Enter the encryption key. (Correct)

Answer : Enter the encryption key.

SY0-401 CompTIA Security+ Certification Practice Exam Set 4

In computer networking, CSMA/CA belongs to a class of protocols called multiple access methods. CSMA/CA stands for: Carrier Sense Multiple Access With Collision Avoidance. Which IEEE standard uses CSMA / CA? 


Options are :

  • 802.3
  • 802.2
  • 802.11 (Correct)
  • 802.5

Answer : 802.11

You are working as a network technician at certways.com. The computer labs are still using a physical bus network. Which of the following could cause a complete network failure on the computer labs network? 


Options are :

  • A terminator has been installed on the end of the bus trunk cable.
  • One of the networked workstations is using the DLC (Data Link Protocol).
  • One of the networked workstations is powered Off
  • A terminator has been removed from the end of the bus trunk cable. (Correct)

Answer : A terminator has been removed from the end of the bus trunk cable.

10GBase-EW connection could transmit using a repeater at which maximumdistance? 


Options are :

  • 20,000 meters (65,616 feet)
  • 40,000 meters (131,233 feet)
  • 80,000 meters (262,467 feet) (Correct)
  • 10,000 meters (32,808 feet)

Answer : 80,000 meters (262,467 feet)

220-802 CompTIA A+ Certification Practice Exam Set 4

What is the most likely cause of the discontinuous disconnection of wireless 802.11g Internet? 


Options are :

  • nfrared printer
  • Cordless phone (Correct)
  • Incandescent light
  • Cell phone

Answer : Cordless phone

Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. What can vary the encryption key on a user's session after a set period of time? 


Options are :

  • WEP
  • RADIUS
  • AES
  • TKIP (Correct)

Answer : TKIP

An offsite user is trying to print a report. The report appears to print fine on the spooler, but the job never reaches the printer locally. Why?   


Options are :

  • A local printer is not installed.
  • The printer drivers need to be re-installed.
  • The connection speed is inadequate.
  • The job is printing at the default printer in the office. (Correct)

Answer : The job is printing at the default printer in the office.

SY0-401 CompTIA Security+ Certification Practice Exam Set 7

Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. Which type of traffic can't be filtered by a network layer firewall?   


Options are :

  • SMTP traffic
  • ICMP messages
  • Email sender verification (Correct)
  • HTTP traffic

Answer : Email sender verification

What is the objective of using UDP protocol? 


Options are :

  • Typical user LAN traffic
  • Server to server connections
  • Uploading files to a FTP server
  • Video conferencing (Correct)

Answer : Video conferencing

A workstation on a TCP / IP (Transmission Control Protocol / Internet Protocol) network cannot log on to a server located at another subnet. Which of the following tasks will help determine the cause of the problem? 


Options are :

  • Ping the server, replace the NIC (Network Interface Card) in the workstation, and runnbtstat at the command prompt
  • Ask a user on the same segment to try to connect, ask a user on a remote segment to try to connect, and ping the server (Correct)
  • Ask a user on the same segment to try to connect, ask a user on a remote segment to try to connect, and run nbtstat at the command prompt
  • Ask a user on a remote segment to try to connect, replace the NIC (Network Interface Card) in theworkstation, and run nbtstat at the command prompt

Answer : Ask a user on the same segment to try to connect, ask a user on a remote segment to try to connect, and ping the server

SK0-004 CompTIA Server+ Certification Practice Exam Set 3

Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. What can vary the encryption key on a user's session after a set period of time? 


Options are :

  • RADIUS
  • WEP
  • TKIP (Correct)
  • AES

Answer : TKIP

Refer to the following ports, which one can transfer configuration files from the switch? 


Options are :

  • TCP 69
  • UDP 69 (Correct)
  • UDP 67
  • TCP 110

Answer : UDP 69

In the process of troubleshooting the phone service at a site, the technician discovers that there is no dial tone present after testing one of the connections on the 66 block . Which tool is the best to test the connectivity at the boundary point? 


Options are :

  • Butt set (Correct)
  • Toner probe
  • Cable tester
  • Multimeter

Answer : Butt set

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 8

Wireless Application Protocol (commonly referred to as WAP) is an open international standard forapplication layer network communications in a wireless communication environment. Which of thefollowing would be installed on a workstation to connect to a WAP?   


Options are :

  • USB hub
  • Software firewall
  • Modem
  • Wireless NIC (Correct)

Answer : Wireless NIC

You are a senior network administrator at certways.com. A trainee wants to know which of the followingstatements that is correct, with regard to TCP and UDP.   


Options are :

  • TCP is connectionless, UDP is reliable.
  • TCP is connection-oriented, UDP is unreliable (Correct)
  • TCP is connectionless, UDP is unreliable.
  • TCP is connection-oriented, UDP is reliable.

Answer : TCP is connection-oriented, UDP is unreliable

An ICS (Internet Connection Sharing) network has been setup as follows:Clients 1 and 2 cannot access the Internet. What is the problem? 


Options are :

  • A second NIC (Network Interface Card) needs to be installed on the ICS (Internet Connection Sharing) host. (Correct)
  • Windows 98 Second Edition does not support ICS (Internet Connection Sharing)
  • A second NIC (Network Interface Card) needs to be installed on Clients 1 and 2 and the ICS (Internet Connection Sharing) host.
  • Windows 95B does not support ICS (Internet Connection Sharing)

Answer : A second NIC (Network Interface Card) needs to be installed on the ICS (Internet Connection Sharing) host.

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 8

All users are unable to access the network. In order to solve this issue, which action will you take first? 


Options are :

  • Use the routeadd command to see if static routes can be added.
  • Use thearp command to verify connections to the network.
  • Use the ping command to verify connection to the DHCP server. (Correct)
  • Use therarp command to check network settings.

Answer : Use the ping command to verify connection to the DHCP server.

You are reported that a user can't access any website, but he can access the network shares and their email. How to resolve this problem? 


Options are :

  • Perform theipconfig command to verify settings on that workstation are correct.
  • Use the ping command to see if the workstation can access the DHCP server
  • Use the routeadd command to add static routes to see if the routes are an issue.
  • Traceroute to any website to see where the disconnection is occurring. (Correct)

Answer : Traceroute to any website to see where the disconnection is occurring.

If you want to make a straight-through CAT5 cable, one end of the CAT5 cable is punched down on the basis of the 568B standard. Which standard will be used by the other end?   


Options are :

  • 568B (Correct)
  • RJ-11
  • 568A
  • RJ-45

Answer : 568B

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Dynamic Host Configuration Protocol (DHCP) is a network application protocol used by devices (DHCP clients) to obtain configuration information for operation in an Internet Protocol network. A new DHCP server has been implemented. A technician checks some computers' IP addresses and the IP addresses are not in the scope but they can reach network resources. The other computers can obtain the IP addresses issued by the DHCP server. Why?   


Options are :

  • The computers network cards need to be upgraded
  • The computers need to be restarted
  • The computers are still set with a static IP address (Correct)
  • The DHCP server needs to be restarted

Answer : The computers are still set with a static IP address

Your company wants to configure newsfeeds on the network to provide internal company information. Which port can allow newsfeeds to pass-through? 


Options are :

  • 119 (Correct)
  • 22
  • 25
  • 143

Answer : 119

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions