Exam 10: CompTIA Network+
Exam 1: CompTIA A+ Certification Exam: Core 1471 Questions
Exam 2: CompTIA A+ Certification Exam: Core 2409 Questions
Exam 3: CompTIA Advanced Security Practitioner (CASP+) CAS-003442 Questions
Exam 4: CompTIA Advanced Security Practitioner (CASP+) CAS-004107 Questions
Exam 5: CompTIA Cloud Essentials+165 Questions
Exam 6: CompTIA CySA+ Certification Exam (CS0-002)294 Questions
Exam 7: CompTIA Cloud+ (CV0-002)48 Questions
Exam 8: CompTIA Cloud+67 Questions
Exam 9: CompTIA IT Fundamentals387 Questions
Exam 10: CompTIA Network+829 Questions
Exam 11: CompTIA Project+540 Questions
Exam 12: CompTIA PenTest+ Certification Exam165 Questions
Exam 13: CompTIA Server+66 Questions
Exam 14: CompTIA Server+ Certification Exam779 Questions
Exam 15: CompTIA Security+1 k+ Questions
Exam 16: CompTIA Security+ 2021129 Questions
Exam 17: CompTIA CTT+ Essentials378 Questions
Exam 18: CompTIA Linux+252 Questions
Select questions type
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
(Multiple Choice)
4.8/5
(45)
A technician is sent to a remote office to set up a device to connect to the Internet. The company standards document requires stateful inspection. Which of the following should the technician install?
(Multiple Choice)
4.9/5
(40)
A network technician needs to create separate networks for several classrooms and administrative offices. They have been provided with the network address 192.168.1.0/24. They will need five classrooms of 25 hosts, two classrooms of 14 hosts, six admin hosts on the network, and three subnets for router connections. Which of the following IP concepts would need to be deployed?
(Multiple Choice)
4.9/5
(30)
A user in the marketing department reports the email server is down. The user has not received email for more than 24 hours. Which of the following should the network technician do to investigate this issue?
(Multiple Choice)
4.8/5
(37)
Which of the following steps follows an implemented solution?
(Multiple Choice)
4.9/5
(42)
An administrator recently implemented new SOHO routers for a company's teleworking employees. Before deploying the routers, the administrator changed the default credentials and disabled unnecessary services. Within a few days of deployment, hackers gained access to the routers. Which of the following is the MOST important thing the administrator forgot to do?
(Multiple Choice)
4.8/5
(38)
A web server administrator has changed the domain registrar's A record for the company's website. External users can reach the website, but internal users are unable to do so. The web server is accessible by typing the internal IP into a web browser. Which of the following is the reason why the web server cannot be accessed?
(Multiple Choice)
4.8/5
(32)
A network technician needs to extend a Cat 6a connection. A device is being moved to another building that is too far away for the existing cable to reach. There is dark fiber between the buildings, and the devices must be directly connected to each other using RJ45 terminations. Which of the following is needed to ensure the connection?
(Multiple Choice)
4.9/5
(32)
Joe, a technician, is attempting to resolve an issue with an off-site router remotely. Joe needs to reset the WAN connection settings and wants to ensure he will have access to the router at all times to monitor the changes. Which of the following solutions would BEST meet this goal?
(Multiple Choice)
4.7/5
(39)
A network administrator notices that network utilization is extremely high around midnight and wonders if this is normal or if there might be a security issue. Which of the following types of documentation should the administrator consult FIRST?
(Multiple Choice)
4.8/5
(34)
Which of the following would a company place at the edge of its network if it wants to view and control which Internet applications are being used?
(Multiple Choice)
4.9/5
(39)
A network analyst is providing access to an FTP server that stores files that are needed by external contractors who are working on a project. In which of the following network locations should the FTP server be placed to achieve the MOST secure environment?
(Multiple Choice)
4.9/5
(33)
A network manager is concerned about visitors taking advantage of open cubicies at a company's facilities. Which of the following would mitigate this issue?
(Multiple Choice)
4.7/5
(36)
A network technician is responding to a user's trouble ticket. After replacing the network patch cable with a longer cable, the user is no longer connecting to the network. The network administrator tests the patch cable with a tester and confirms the cable is not faulty. Which of the following is the issue with the newly installed cable?
(Multiple Choice)
4.9/5
(30)
Which of the following operate only within the UDP protocol?
(Multiple Choice)
5.0/5
(34)
After several changes to the network, a technician needs to ensure a client is checking for new hostname and IP pairings. Which of the following commands should the technician use to force new lookups?
(Multiple Choice)
4.8/5
(30)
When connecting to a network device through a remote connection for configuration purposes, which of the following protocols is MOST secure?
(Multiple Choice)
4.7/5
(43)
A network administrator configures an email server to use secure protocols. When the upgrade is completed, which of the following ports on the firewall should be configured to allow for connectivity? (Choose three.)
(Multiple Choice)
4.9/5
(47)
Which of the following describes the function of Layer 3 of the OSI model?
(Multiple Choice)
4.8/5
(31)
A small town is attempting to attract tourists who visit larger nearby cities. A network engineer is asked to implement a network encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following is the network engineer being asked to implement?
(Multiple Choice)
4.8/5
(37)
Showing 741 - 760 of 829
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)