CompTIA Network+ Certification Exam Questions and Answers
Which of the following is a characteristic of the application layer?
Which of the following attacks would most likely cause duplicate IP addresses in a network?
Which of the following network devices converts wireless signals to electronic signals?
A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?
While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host's TCP/IP stack first. Which of the following commands should the network administrator run?
A network technician is troubleshooting network latency and has determined the issue to be occuring two network switches( Switch10 and Switch11). Symptoms reported included poor video performance and slow file copying. Given the following informtion:
Which of the following should the technician most likely do to resolve the issue?
Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?
Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.
Which of the following is the next step to take after successfully testing a root cause theory?
Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help identify the issue?
Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?
After running a Cat 8 cable using passthrough plugs, an electrician notices that connected cables are experiencing a lot of cross talk. Which of the following troubleshooting steps should the electrician take first?
An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?
A Chief Executive Officer (CEO) of a company purchases a new phone that will be used while traveling to different countries. The CEO needs to be able to place outgoing calls and receive incoming calls on the phone using a SIM card. Which of the following cellular technologies does the CEO's phone need?
A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface’s indicator lights are not blinking on either the computer or the switch. Which of the following Is the most likely cause?
A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as Which of the following records should the administrator use?
Which of the following network topologies contains a direct connection between every node in the network?
Which of the following should be configured so users can authenticate to a wireless network using company credentials?
Which of the following are the best device-hardening techniques for network security? (Select two).
Which of the following does a full-tunnel VPN provide?
A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?
A customer needs six usable IP addresses. Which of the following best meets this requirement?
A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?
A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels. Which of the following would be the best choice?
Which of the following devices can operate in multiple layers of the OSI model?
Which of the following describes the best reason for using BGP?
Which of the following is the most secure way to provide site-to-site connectivity?
Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?
A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?
A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?
A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?
Following a fire in a data center, the cabling was replaced. Soon after, an administrator notices network issues. Which of the following are the most likely causes of the network issues? (Select two).
Which of the following can also provide a security feature when implemented?
Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?
Which of the following disaster recovery concepts is calculated by dividing the total hours of operation by the total number of units?
Which of the following most likely determines the size of a rack for installation? (Select two).
A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?
Which of the following IP transmission types encrypts all of the transmitted data?
A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?
A network administrator needs to change where the outside DNS records are hosted. Which of the following records should the administrator change the registrar to accomplish this task?
Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output:
1 3ms 2ms 3ms 192.168.25.234
2 2ms 3ms 1ms 192.168.3.100
3 4ms 5ms 2ms 10.249.3.1
4 *
5 ’
6 *
7 •
Which of the following command-line tools is the network administrator using?
Which of the following facilities is the best example of a warm site in the event of information system disruption?
Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?
Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?
Which of the following protocols provides remote access utilizing port 22?
A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?
A virtual machine has the following configuration:
•IPv4 address: 169.254.10.10
•Subnet mask: 255.255.0.0
The virtual machine can reach colocated systems but cannot reach external addresses on the Internet. Which of the following Is most likely the root cause?