Exam 10: CompTIA Network+

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A network technician is upgrading the software on a switch, but the switch will no longer boot after the upgrade. Which of the following should the network technician have verified before the upgrade?

(Multiple Choice)
4.7/5
(43)

A wireless administrator has configured a secure wireless network that can only be associated to specific domain accounts. This was done to help mitigate any ricks associated with the wireless signal propagating outside of the facility. Which of the following has no administrator implemented?

(Multiple Choice)
4.7/5
(27)

Which of the following allow for higher fault tolerance, availability, and performance across multiple systems? (Choose two.)

(Multiple Choice)
4.8/5
(36)

Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?

(Multiple Choice)
4.8/5
(42)

Company policy dictates that full backups are taken every Sunday evening, and incremental backups occur Monday through Saturday in the evening. If data loss were to occur on a Thursday before the backup window, which of the following is the number of backup sets that would be needed to retrieve the lost data come Friday morning?

(Multiple Choice)
4.7/5
(43)

A network administrator is setting up a wireless network with poor security for a computer science class to hack. Which of the following security methods would be MOST easily circumvented?

(Multiple Choice)
4.8/5
(36)

Branch users are experiencing issues with videoconferencing. Which of the following will the company MOST likely configure to improve performance for these applications?

(Multiple Choice)
4.7/5
(39)

As part of a transition from a static to a dynamic routing protocol on an organization's internal network, the routing protocol must support IPv4 and VLSM. Based on those requirements, which of the following should the network administrator use? (Choose two.)

(Multiple Choice)
4.9/5
(29)

The engineering department wants to bring a legacy computer online to test a failed component. When patching the device into the switch, there are no link lights or connectivity. The legacy computer can ping its loopback address successfully. Another device can connect to that same port without issues. Which of the following should the network technician check NEXT? (Choose two.)

(Multiple Choice)
4.9/5
(35)

A home user has contacted the help desk to transfer files from an old smartphone to a new one. The help desk analyst informs the home user this can be completed using Bluetooth. Which of the following types of topologies is this called?

(Multiple Choice)
4.9/5
(38)

The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the network?

(Multiple Choice)
4.8/5
(25)

A technician is surveying a college's network equipment rooms and connectivity. Which of the following types of documentation does the technician need to perform a detailed site survey? (Choose three.)

(Multiple Choice)
4.8/5
(42)

A company's web-based application has a database that is set up for high availability in case of a failure. Which of the following is necessary to achieve this type of setup?

(Multiple Choice)
4.8/5
(27)

A network technician needs to upgrade a production Windows server to the latest service pack. In which of the following should the work plan and recovery procedure be documented?

(Multiple Choice)
4.7/5
(28)

A network engineer wants to segment the network into multiple broadcast domains. Which of the following devices would allow for communication between the segments?

(Multiple Choice)
4.8/5
(31)

While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to prevent unauthorized access?

(Multiple Choice)
4.8/5
(40)

A network engineer is creating a method for customers to access the company's application in a web browser. Which of the following cloud models should the customers use to access the application?

(Multiple Choice)
4.7/5
(41)

A network administrator is configuring the 172.16.40.0/22 network for a new building. Which of the following is the number of hosts that will be supported on this network?

(Multiple Choice)
4.8/5
(29)

A network technician is installing a network printer in a factory setting. The connection from the switch contains an LC connector, yet the printer only supports an RJ45 connector. Which of the following should the technician use?

(Multiple Choice)
4.8/5
(38)

Which of the following BEST describe the differences between an IDS and an IPS? (Choose two.)

(Multiple Choice)
4.8/5
(25)
Showing 101 - 120 of 829
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)