JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 8

The IP address ranges below are summarized into a single route for redistribution into the network core: 192.168.0.0 /24  192.168.1.0 /24 192.168.2.0 /24 192.168.3.0 /24 Which IP summary address can provide the only listed network ranges? 


Options are :

  • 192.168.0.0 /16
  • 192.168.0.0 /22 (Correct)
  • 192.168.0.0 /21
  • 192.168.0.0 /23

Answer : 192.168.0.0 /22

BR0-003 CompTIA A+ 2009 Edition Bridge Practice Exam Set 8

If you are asked to reduce the multicast flooding on the layer2 switch, which protocol will you use? 


Options are :

  • IGMP (Correct)
  • ICMP
  • SNMP
  • ARP

Answer : IGMP

Tom is a junior network administrator. He configures a token ring network in a physical star, logical ring topology. He connects the end nodes into a 100BASE-TX network hub. Users report that they can't access network. Which device can replace the hub? 


Options are :

  • Bridge
  • Multistation Access Unit (MAU) (Correct)
  • Router
  • 10BASE-T hubMultistation Access

Answer : Multistation Access Unit (MAU)

Given that wireless Internet access is located in an open warehouse environment. And you discover that different locations have different signal strengths. How to increase the signal strengthconsistency?   


Options are :

  • Enable traffic shaping.
  • Change the antenna placement. (Correct)
  • Broadcast the SSID.
  • Change the encryption method.

Answer : Change the antenna placement.

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 5

IrDA uses ______. 


Options are :

  • infrared light beams (Correct)
  • the 2.5 radio frequency band
  • the 2.4 radio frequency band
  • the 5.0 radio frequency band

Answer : infrared light beams

Which command below will display the NETBIOS name of another workstation through its IP address? 


Options are :

  • ipconfig
  • nbtstat (Correct)
  • netstat
  • ping

Answer : nbtstat

As a network technician, you must know the following protocols well, can you tell me which one is applicable to email transmission? 


Options are :

  • SFTP
  • SCP
  • SMTP (Correct)
  • SNMP

Answer : SMTP

SY0-401 CompTIA Security+ Certification Practice Exam Set 4

In which situation would Omni antennas be BEST suited? (Choose Two.) A. To connect hosts to Wireless Access Points B. To enable roaming access for laptop users C. To bridge two Wireless Access Points D. Outdoors 


Options are :

  • A,C
  • A,B (Correct)
  • C,D
  • B,D

Answer : A,B

An access point in a wireless network receives link margin values from associated access points. A wireless access points beacon frame contains which data below?   


Options are :

  • hannel and WEP key
  • P and MAC address
  • SID and WEP key
  • SSID and MAC address (Correct)

Answer : SSID and MAC address

Refer to the following network components, which one is able to enlarge the range limitation of Ethernet networks? 


Options are :

  • Repeater (Correct)
  • IDS
  • Firewall
  • Load balancer

Answer : Repeater

Mock Test : CompTIA Network+ (N10-007)

Which of the following commands does a network administrator use to verify the mail server addresses for a remote domain? 


Options are :

  • netstat
  • nbtstat
  • nslookup/dig (Correct)
  • tracert/traceroute

Answer : nslookup/dig

Which statement best describes the routing convergence time? 


Options are :

  • Time required for an IDS to detect suspicious software
  • Time required by switch ports to update their link status and transition to the forwarding state
  • Time required by protocols to update their forwarding tables after changes have occurred (Correct)
  • Time required for a VPN connection to occur

Answer : Time required by protocols to update their forwarding tables after changes have occurred

Layer 2 is the data link layer of the OSI model. Observe the following items carefully, which one will be discovered in a layer2 switch? 


Options are :

  • VLAN settings (Correct)
  • Routing protocols
  • DNS zones
  • SSID settings

Answer : VLAN settings

CompTIA JK0-801 A+ Laptops Printers and Operational Exam Set 5

The MAC address F2-A1-23-BC-D3-41 consist of a manufacturer ID and a station ID. Which 3 bytes represents the station identifier?


Options are :

  • A1-23-BC
  • 23-BC-D3
  • F2-A1-23
  • BC-D3-41 (Correct)

Answer : BC-D3-41

Given that the IP address and default gateway are both on the 192.168.1.0/24. The computer can transmit files locally to other devices, but it can't use a wireless access point to connect to the Internet. Why?   


Options are :

  • The computer and the gateway are not on the same network.
  • The computer is not using a private IP address.
  • The computers gateway is not routing to a public IP address. (Correct)
  • The computer is using an invalid IP address.

Answer : The computers gateway is not routing to a public IP address.

If an authentication protocol is being implemented that uses a private key and a session key, the protocol is: 


Options are :

  • IPSec (Internet Protocol Security).
  • L2TP (Layer 2 Tunneling Protocol).
  • Kerberos (Correct)
  • PPTP (Point-to-Point Tunneling Protocol)

Answer : Kerberos

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 10

Which type of connector can connect a PC to a dial-up modem? 


Options are :

  • RS-232 (Correct)
  • ST
  • . RJ-45
  • RG-6

Answer : RS-232

Which of the following is a valid MAC address? 


Options are :

  • 00-04-23-D2-EE-H4
  • 00-04-23-D2-EE-F4 (Correct)
  • 192.168.1.32
  • 225.225.225.224

Answer : 00-04-23-D2-EE-F4

A technician just installed a new NIC (Network Interface Card) in a computer and attached a cable to connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioningcorrectly and the network is up, which of the following will the technician see on the NIC (Network Interface Card)?


Options are :

  • The amber light is flashing continually, the green light is lit steadily, and neither light will be on until data is transferred
  • The amber light is flashing occasionally and the green light is lit steadily (Correct)
  • The amber light is lit and steady and the green light is flashing continually
  • The amber light is flashing occasionally, the green light is lit steadily, and neither light will be on until data is transferred

Answer : The amber light is flashing occasionally and the green light is lit steadily

SK0-004 CompTIA Server+ Certification Practice Exam Set 9

In the process of troubleshooting network data transmission issue, which command can determine the location of the packet loss? 


Options are :

  • ipconfig
  • arp
  • traceroute (Correct)
  • ping

Answer : traceroute

At which layer of the OSI reference model does data encryption occur?   


Options are :

  • The Presentation Layer (Correct)
  • The Application Layer
  • The Session Layer
  • The Transport Layer

Answer : The Presentation Layer

What is the objective of IDS? 


Options are :

  • Monitors inbound and outbound network connections in order to prevent suspicious activity.
  • Monitors inbound and outbound network connections in order to identify suspicious activity. (Correct)
  • Controls inbound and outbound connections in a network device by command lines.
  • Controls inbound and outbound connections to prevent unauthorized access to the Internet.

Answer : Monitors inbound and outbound network connections in order to identify suspicious activity.

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 13

Comparing with static routing, dynamic routing has which advantage? 


Options are :

  • Improves network speed
  • Less network overhead
  • More secure
  • Scales to large networks (Correct)

Answer : Scales to large networks

Which of the following commands can display the number of server connections open on a client? 


Options are :

  • dig
  • netstat (Correct)
  • arp
  • nslookup

Answer : netstat

The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by:   


Options are :

  • double encrypting the data payload.
  • encapsulating the data payload (Correct)
  • adding a second password.
  • increasing encryption to a 128-bit cipher.

Answer : encapsulating the data payload

JK0-019 CompTIA E2C Network + Certification Exam Set 12

What protocol can be used for file transmission between two systems? (Select TWO). A. RIP B. SNMP C. FTP D. SCP 


Options are :

  • A,B
  • A,C
  • C,D (Correct)
  • B,D

Answer : C,D

The following presented route is found in the IP routing table when analyzing the contents of this table in a router: PrefixNext-Hop IPInterface 192.168.1.0 /24172.16.31.1Ethernet0 192.168.2.0 /24172.16.31.1Ethernet0 172.16.31.0 /24Directly ConnectedEthernet0 0.0.0.0/0172.16.31.2Ethernet0 When sending a packet from 192.168.1.4 to 192.168.3.4, what will happen? 


Options are :

  • An ICMP network unreachable message will be sent to 192.168.1.4
  • The packet will be dropped as there is no matching route in the IP routing table to reach the destination network
  • The packet will be forwarded to 172.16.31.1 since the source IP address is in the 192.168.1.0 /24 range
  • The packet will be forwarded to 172.16.31.2 (Correct)

Answer : The packet will be forwarded to 172.16.31.2

You have a small network with five computers, all of which are connected to a central switch and access shared file and print on a single server. However, one computer can't connect to the network, while the other four can connect properly. Why? 


Options are :

  • The computers OS needs to be updated.
  • The switch has failed.
  • The NIC has failed. (Correct)
  • The server has failed.

Answer : The NIC has failed.

SK0-004 CompTIA Server+ Certification Practice Exam Set 9

The command ping uses which of the following protocols? 


Options are :

  • TFTP
  • IGMP
  • ICMP (Correct)
  • SMTP

Answer : ICMP

Given the addressing scheme 10.2.10.x, with a subnet mask of 255.255.255.0, your company wants a secure and isolated sales system. You are asked to segregate network traffic due to securityrequirements. How to do? 


Options are :

  • Implementing a dedicated multicast network
  • Changing the IP scheme to class C addresses
  • Implementing a dedicated broadcast network
  • Creating a new subnet for this system (Correct)

Answer : Creating a new subnet for this system

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions