Exam 10: CompTIA Network+

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following DNS record types is an alias?

(Multiple Choice)
4.7/5
(23)

Which of the following OSI layers contains the LLC function?

(Multiple Choice)
4.9/5
(28)

At which of the following layers of the OSI model does compression occur?

(Multiple Choice)
4.9/5
(34)

The length of an IPv6 address is:

(Multiple Choice)
4.7/5
(36)

A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network. The management network is segregated from the production network and uses site-to-site VPN connections. Some of the equipment does not support encryption. Which of the following should the technician choose that all the equipment would support?

(Multiple Choice)
4.8/5
(34)

A network administrator received a ticket about intermittent poor performance of a manufacturing device. The engineer who submitted the ticket states the issue occurs when the device is sending or receiving larger volumes of network traffic. The physical copper path between the device and the switch tests successfully. Which of the following should the network administrator do NEXT?

(Multiple Choice)
5.0/5
(28)

A network administrator is concerned about clients being able to access the local Internet while connected to the corporate VPN. Which of the following should be disabled on the client to prevent this?

(Multiple Choice)
4.9/5
(41)

Which of the following should current network performance be compared against to determine network anomalies?

(Multiple Choice)
4.8/5
(36)

Which of the following is the physical topology for an Ethernet LAN?

(Multiple Choice)
4.8/5
(37)

A customer is reporting difficulty connecting some devices after replacing a wireless router with a new wireless 802.11ac router. The SSID, encryption and password are the same as the previous router. A technician goes on-site and notices the devices that are no longer connecting appear to be several years ago. Which of the following is MOST likely the problem?

(Multiple Choice)
4.9/5
(33)

A forensic first responder arrives at the scene where an employee is suspected to have committed a computer-based crime. Which of the following should the first responder do FIRST?

(Multiple Choice)
4.7/5
(36)

An entire enterprise cannot access a specific website. The network technician knows the website was accessible last week. The technician can also ping the website. Which of the following is the technician MOST likely to find upon investigation?

(Multiple Choice)
4.8/5
(39)

A technician needs to order cable that meets 10GBaseT and fire safety requirements for an installation between a drop ceiling and a standard ceiling. Which of the following should the technician order to ensure compliance with the requirements?

(Multiple Choice)
5.0/5
(36)

In which of the following scenarios should a technician use a cross-over cable to provide connectivity?

(Multiple Choice)
4.7/5
(37)

A network technician wants to address PCs on a subnet with IPv6 in addition to IPv4. The subnet currently uses a DHCP server that only supports IPv4. Which of the following should the technician use to assign IPv6 addresses automatically without DHCP?

(Multiple Choice)
4.8/5
(41)

A company has multiple site-to-site VPN connections using a pre-shared key. The Chief Information Security Officer (CISO) is concerned about the long-term security of the tunnels and has asked the network technicians to develop a plan to ensure the best security of the tunnels. Which of the following should the network technicians implement?

(Multiple Choice)
4.9/5
(35)

A network manager has received reports that some employees have been using the company's WiFi to log onto their social media accounts from their personal devices. The network manager is looking for a solution to prevent this type of activity. The Chief Information Officer (CIO) wants to continue using a pre-shared key and add an additional layer of security to allow only authorized users to authenticate to the WiFi. Which of the following solutions would address this request? (Choose two.)

(Multiple Choice)
4.8/5
(31)

Which of the following can be used to enable and translate the communication between legacy non-IP phone systems with solutions for voice communications that can run over the Internet?

(Multiple Choice)
4.8/5
(31)

A network administrator is configuring a server to be placed on the network. The end users will be accessing an application via a web browser that requires them to log into the application. Which of the following protocols would allow a secure connection?

(Multiple Choice)
4.8/5
(33)

A network technician is assisting a user who has relocated to a newly constructed office space. The user has no network connectivity. A cable tester was used on the port and is reporting that the pairs are open. Which of the following should be used to remedy this problem?

(Multiple Choice)
4.9/5
(32)
Showing 761 - 780 of 829
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)