JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 8

The IP address ranges below are summarized into a single route for redistribution into the network core: /24 /24 /24 /24 Which IP summary address can provide the only listed network ranges? 

Options are :

  • /16
  • /22
  • /21
  • /23

Answer : /22

CompTIA IT Fundamentals (Exam FC0-U61) Practice Tests Set 1

If you are asked to reduce the multicast flooding on the layer2 switch, which protocol will you use? 

Options are :

  • IGMP
  • ICMP
  • SNMP
  • ARP

Answer : IGMP

Tom is a junior network administrator. He configures a token ring network in a physical star, logical ring topology. He connects the end nodes into a 100BASE-TX network hub. Users report that they can't access network. Which device can replace the hub? 

Options are :

  • Bridge
  • Multistation Access Unit (MAU)
  • Router
  • 10BASE-T hubMultistation Access

Answer : Multistation Access Unit (MAU)

Given that wireless Internet access is located in an open warehouse environment. And you discover that different locations have different signal strengths. How to increase the signal strengthconsistency?   

Options are :

  • Enable traffic shaping.
  • Change the antenna placement.
  • Broadcast the SSID.
  • Change the encryption method.

Answer : Change the antenna placement.

CompTIA JK0-022 E2C Security Data & Host Security Exam Set 6

IrDA uses ______. 

Options are :

  • infrared light beams
  • the 2.5 radio frequency band
  • the 2.4 radio frequency band
  • the 5.0 radio frequency band

Answer : infrared light beams

Which command below will display the NETBIOS name of another workstation through its IP address? 

Options are :

  • ipconfig
  • nbtstat
  • netstat
  • ping

Answer : nbtstat

As a network technician, you must know the following protocols well, can you tell me which one is applicable to email transmission? 

Options are :

  • SFTP
  • SCP
  • SMTP
  • SNMP

Answer : SMTP

BR0-003 CompTIA A+ 2009 Edition Bridge Practice Exam Set 3

In which situation would Omni antennas be BEST suited? (Choose Two.) A. To connect hosts to Wireless Access Points B. To enable roaming access for laptop users C. To bridge two Wireless Access Points D. Outdoors 

Options are :

  • A,C
  • A,B
  • C,D
  • B,D

Answer : A,B

An access point in a wireless network receives link margin values from associated access points. A wireless access points beacon frame contains which data below?   

Options are :

  • hannel and WEP key
  • P and MAC address
  • SID and WEP key
  • SSID and MAC address

Answer : SSID and MAC address

Refer to the following network components, which one is able to enlarge the range limitation of Ethernet networks? 

Options are :

  • Repeater
  • IDS
  • Firewall
  • Load balancer

Answer : Repeater

JK0-019 CompTIA E2C Network + Certification Exam Set 1

Which of the following commands does a network administrator use to verify the mail server addresses for a remote domain? 

Options are :

  • netstat
  • nbtstat
  • nslookup/dig
  • tracert/traceroute

Answer : nslookup/dig

Which statement best describes the routing convergence time? 

Options are :

  • Time required for an IDS to detect suspicious software
  • Time required by switch ports to update their link status and transition to the forwarding state
  • Time required by protocols to update their forwarding tables after changes have occurred
  • Time required for a VPN connection to occur

Answer : Time required by protocols to update their forwarding tables after changes have occurred

Layer 2 is the data link layer of the OSI model. Observe the following items carefully, which one will be discovered in a layer2 switch? 

Options are :

  • VLAN settings
  • Routing protocols
  • DNS zones
  • SSID settings

Answer : VLAN settings

CompTIA CySA+ (CS0-001) 5 Practice Certification Exams Set 7

The MAC address F2-A1-23-BC-D3-41 consist of a manufacturer ID and a station ID. Which 3 bytes represents the station identifier?

Options are :

  • A1-23-BC
  • 23-BC-D3
  • F2-A1-23
  • BC-D3-41

Answer : BC-D3-41

Given that the IP address and default gateway are both on the The computer can transmit files locally to other devices, but it can't use a wireless access point to connect to the Internet. Why?   

Options are :

  • The computer and the gateway are not on the same network.
  • The computer is not using a private IP address.
  • The computers gateway is not routing to a public IP address.
  • The computer is using an invalid IP address.

Answer : The computers gateway is not routing to a public IP address.

If an authentication protocol is being implemented that uses a private key and a session key, the protocol is: 

Options are :

  • IPSec (Internet Protocol Security).
  • L2TP (Layer 2 Tunneling Protocol).
  • Kerberos
  • PPTP (Point-to-Point Tunneling Protocol)

Answer : Kerberos

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 9

Which type of connector can connect a PC to a dial-up modem? 

Options are :

  • RS-232
  • ST
  • . RJ-45
  • RG-6

Answer : RS-232

Which of the following is a valid MAC address? 

Options are :

  • 00-04-23-D2-EE-H4
  • 00-04-23-D2-EE-F4

Answer : 00-04-23-D2-EE-F4

A technician just installed a new NIC (Network Interface Card) in a computer and attached a cable to connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioningcorrectly and the network is up, which of the following will the technician see on the NIC (Network Interface Card)?

Options are :

  • The amber light is flashing continually, the green light is lit steadily, and neither light will be on until data is transferred
  • The amber light is flashing occasionally and the green light is lit steadily
  • The amber light is lit and steady and the green light is flashing continually
  • The amber light is flashing occasionally, the green light is lit steadily, and neither light will be on until data is transferred

Answer : The amber light is flashing occasionally and the green light is lit steadily

CompTIA JK0-801 A+ Certification Practical Exam Set 4

In the process of troubleshooting network data transmission issue, which command can determine the location of the packet loss? 

Options are :

  • ipconfig
  • arp
  • traceroute
  • ping

Answer : traceroute

At which layer of the OSI reference model does data encryption occur?   

Options are :

  • The Presentation Layer
  • The Application Layer
  • The Session Layer
  • The Transport Layer

Answer : The Presentation Layer

What is the objective of IDS? 

Options are :

  • Monitors inbound and outbound network connections in order to prevent suspicious activity.
  • Monitors inbound and outbound network connections in order to identify suspicious activity.
  • Controls inbound and outbound connections in a network device by command lines.
  • Controls inbound and outbound connections to prevent unauthorized access to the Internet.

Answer : Monitors inbound and outbound network connections in order to identify suspicious activity.

CompTIA A+ 220 901

Comparing with static routing, dynamic routing has which advantage? 

Options are :

  • Improves network speed
  • Less network overhead
  • More secure
  • Scales to large networks

Answer : Scales to large networks

Which of the following commands can display the number of server connections open on a client? 

Options are :

  • dig
  • netstat
  • arp
  • nslookup

Answer : netstat

The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by:   

Options are :

  • double encrypting the data payload.
  • encapsulating the data payload
  • adding a second password.
  • increasing encryption to a 128-bit cipher.

Answer : encapsulating the data payload

CompTIA LX0-102 Linux Part 2 Certification Practice Exam Set 1

What protocol can be used for file transmission between two systems? (Select TWO). A. RIP B. SNMP C. FTP D. SCP 

Options are :

  • A,B
  • A,C
  • C,D
  • B,D

Answer : C,D

The following presented route is found in the IP routing table when analyzing the contents of this table in a router: PrefixNext-Hop IPInterface /24172.16.31.1Ethernet0 /24172.16.31.1Ethernet0 /24Directly ConnectedEthernet0 When sending a packet from to, what will happen? 

Options are :

  • An ICMP network unreachable message will be sent to
  • The packet will be dropped as there is no matching route in the IP routing table to reach the destination network
  • The packet will be forwarded to since the source IP address is in the /24 range
  • The packet will be forwarded to

Answer : The packet will be forwarded to

You have a small network with five computers, all of which are connected to a central switch and access shared file and print on a single server. However, one computer can't connect to the network, while the other four can connect properly. Why? 

Options are :

  • The computers OS needs to be updated.
  • The switch has failed.
  • The NIC has failed.
  • The server has failed.

Answer : The NIC has failed.

CompTIA N10-004 Network+ Certification Practice Test Set 4

The command ping uses which of the following protocols? 

Options are :

  • TFTP
  • IGMP
  • ICMP
  • SMTP

Answer : ICMP

Given the addressing scheme 10.2.10.x, with a subnet mask of, your company wants a secure and isolated sales system. You are asked to segregate network traffic due to securityrequirements. How to do? 

Options are :

  • Implementing a dedicated multicast network
  • Changing the IP scheme to class C addresses
  • Implementing a dedicated broadcast network
  • Creating a new subnet for this system

Answer : Creating a new subnet for this system

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions