Exam 10: CompTIA Network+
Exam 1: CompTIA A+ Certification Exam: Core 1471 Questions
Exam 2: CompTIA A+ Certification Exam: Core 2409 Questions
Exam 3: CompTIA Advanced Security Practitioner (CASP+) CAS-003442 Questions
Exam 4: CompTIA Advanced Security Practitioner (CASP+) CAS-004107 Questions
Exam 5: CompTIA Cloud Essentials+165 Questions
Exam 6: CompTIA CySA+ Certification Exam (CS0-002)294 Questions
Exam 7: CompTIA Cloud+ (CV0-002)48 Questions
Exam 8: CompTIA Cloud+67 Questions
Exam 9: CompTIA IT Fundamentals387 Questions
Exam 10: CompTIA Network+829 Questions
Exam 11: CompTIA Project+540 Questions
Exam 12: CompTIA PenTest+ Certification Exam165 Questions
Exam 13: CompTIA Server+66 Questions
Exam 14: CompTIA Server+ Certification Exam779 Questions
Exam 15: CompTIA Security+1 k+ Questions
Exam 16: CompTIA Security+ 2021129 Questions
Exam 17: CompTIA CTT+ Essentials378 Questions
Exam 18: CompTIA Linux+252 Questions
Select questions type
A technician is configuring a new server with an IP address of 10.35.113.47 on the 10.35.112.0 subnet to allow for the maximum number of hosts. When configuring network settings, which of the following is the correct subnet mask?
(Multiple Choice)
4.9/5
(30)
An organization has migrated the internal network from a static IP addressing scheme to use DHCP. After fully deploying the DHCP solution, users within the web deployment team are unable to access the web server that is hosted in the DMZ. After reviewing the logs, the network technician sees multiple deny entries from the internal network to the DMZ. Which of the following is the MOST likely cause?
(Multiple Choice)
4.8/5
(38)
A network technician is diagnosing a time-out issue generated from an end user's web browser. The web browser issues standard HTTP get and post commands to interact with the website. Given this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of the following tools would allow the technician to view the handshake?
(Multiple Choice)
4.9/5
(32)
A technician has replaced a customer's desktop with a known-good model from storage. However, the replacement desktop will not connect to network resources. The technician suspects the desktop has not been kept up to date with security patches. Which of the following is MOST likely in place?
(Multiple Choice)
4.7/5
(23)
Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company's guest wireless Internet?
(Multiple Choice)
4.9/5
(37)
A Chief Information Officer (CIO) is concentrated about an attacker gaining administrative access to the company's network devices. Which of the following is the MOST secure way to prevent this?
(Multiple Choice)
4.8/5
(40)
A vulnerability that would allow an unauthenticated, remote attacker to originate a DoS attack was found in a DHCP client implementation of a switch. Which of the following would BEST resolve the issue?
(Multiple Choice)
4.7/5
(38)
A network technician has recently installed new VoIP phones at all employee's desks to support a new SIP cloud VoIP solution. However, the technician is unable to make a call from the device after testing. Which of the following should the technician verify? (Choose two.)
(Multiple Choice)
4.8/5
(39)
A senior technician is reconfiguring the company's firewall because a number of additional devices have been added to the network. The company has acquired a new VoIP phone system, and a group of junior technicians has set up an experimental lab with access to the Internet. Management has given the team latitude for research and development, but would like the company network to be secure and the performance to remain consistent with existing baselines. Which of the following would be the BEST method to reconfigure the network?
(Multiple Choice)
4.8/5
(27)
A network technician is installing a new wireless network for a client. The client has experienced issues with other building tenants connecting to the wireless network and utilizing the bandwidth. The client wants to prevent this from happening by using certificate-based authentication. Which of the following technologies should the network administrator implement?
(Multiple Choice)
4.8/5
(37)
A network technician is required to install a network device to provide service to an office area. The office area has 23 users and two printers that must be able to connect to the file server in a different building. Which of the following network devices should the technician use?
(Multiple Choice)
4.9/5
(40)
A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?
(Multiple Choice)
4.8/5
(39)
A network technician does not have access to the GUI of a server and needs to adjust some network properties. Given the command: route add 0.0.0.0 mask 0.0.0.0 192.169.1.222 metric 1 Which of the following is the technician attempting to alter?
(Multiple Choice)
4.9/5
(35)
Management asks a network technician to install a new connection between two main locations. Management requests that the connection be the fastest possible for data replication. Which of the following would be the MOST appropriate type?
(Multiple Choice)
4.9/5
(36)
Users are reporting their network is extremely slow. The technician discovers pings to external host have excessive response times. However, internal pings to printers and other PCs have acceptable response times. Which of the following steps should the technician take NEXT?
(Multiple Choice)
4.8/5
(30)
Which of the following protocols can be both connection-oriented and connectionless?
(Multiple Choice)
4.8/5
(42)
A security team needs to restrict access to a wireless network in a certain area. Which of the following would be used to enforce this restriction?
(Multiple Choice)
4.8/5
(40)
Several open conference rooms have active wired network connections. To discourage unauthorized users, a network technician wants to require users in the conference rooms to authenticate to the network before gaining access. Which of the following would be the BEST network technology to use?
(Multiple Choice)
4.9/5
(36)
A network technician needs a secure way to access a router in another country. Which of the following methods would meet this requirement?
(Multiple Choice)
4.8/5
(37)
A network manager notices several outages have occurred due to modifications that were made without being properly tested. Which of the following will the network manager MOST likely implement to prevent future occurrences?
(Multiple Choice)
4.8/5
(28)
Showing 481 - 500 of 829
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)