CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • CompTIA
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Wireshark
          • WCNA
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
          • Red Hat RHCSA
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • Python
          • PCEP
          • PCAP
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
          • CCST – Networking
        • Google
          • Cloud Architect
        • Microsoft
          • Microsoft SQL Server
          • Windows 10
          • Windows Server 2016
          • Microsoft Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • ITIL
          • ITIL Foundations
        • Coding Academy
          • PhP Fundamentals
          • MySQL Fundamentals
          • Web Development
          • Python For Beginners
        • EC Council
          • Certified Ethical Hacker
        • ISC2
          • SSCP
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
    • Free Labs
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
    • Meet the Trainers
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • CompTIA
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Wireshark
          • WCNA
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
          • Red Hat RHCSA
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • Python
          • PCEP
          • PCAP
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
          • CCST – Networking
        • Google
          • Cloud Architect
        • Microsoft
          • Microsoft SQL Server
          • Windows 10
          • Windows Server 2016
          • Microsoft Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • ITIL
          • ITIL Foundations
        • Coding Academy
          • PhP Fundamentals
          • MySQL Fundamentals
          • Web Development
          • Python For Beginners
        • EC Council
          • Certified Ethical Hacker
        • ISC2
          • SSCP
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
    • Free Labs
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
    • Meet the Trainers
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets

CompTIA Network+ Exam Walkthrough

CompTIA Network+ Practice Test

Take the Network+ course here.

Back to Exams

loading

Check out our CompTIA Network+ video and lab course by clicking on 'Courses' above.

Our book for the Network+ are all available on Amazon. Click the image to read more.

300

1.

Which of the following protocols is the best known protocol for secure remote login to a computer systems?

Question 1 of 90

2.

Regarding protocols and ports, click on the correct port for each protocol to select the correct answer (click again to unselect).

FTP
UDP/69

Unselect

TCP/21

Unselect

TCP/80

Unselect

TCP/443

Unselect

TCP/25

Unselect

UDP/123

Unselect

TCP/22

Unselect

UDP/53

Unselect

SSH
UDP/69

Unselect

TCP/21

Unselect

TCP/80

Unselect

TCP/443

Unselect

TCP/25

Unselect

UDP/123

Unselect

TCP/22

Unselect

UDP/53

Unselect

HTTP
UDP/69

Unselect

TCP/21

Unselect

TCP/80

Unselect

TCP/443

Unselect

TCP/25

Unselect

UDP/123

Unselect

TCP/22

Unselect

UDP/53

Unselect

HTTPS
UDP/69

Unselect

TCP/21

Unselect

TCP/80

Unselect

TCP/443

Unselect

TCP/25

Unselect

UDP/123

Unselect

TCP/22

Unselect

UDP/53

Unselect

DNS
UDP/69

Unselect

TCP/21

Unselect

TCP/80

Unselect

TCP/443

Unselect

TCP/25

Unselect

UDP/123

Unselect

TCP/22

Unselect

UDP/53

Unselect

NTP
UDP/69

Unselect

TCP/21

Unselect

TCP/80

Unselect

TCP/443

Unselect

TCP/25

Unselect

UDP/123

Unselect

TCP/22

Unselect

UDP/53

Unselect

SMTP
UDP/69

Unselect

TCP/21

Unselect

TCP/80

Unselect

TCP/443

Unselect

TCP/25

Unselect

UDP/123

Unselect

TCP/22

Unselect

UDP/53

Unselect

TFTP
UDP/69

Unselect

TCP/21

Unselect

TCP/80

Unselect

TCP/443

Unselect

TCP/25

Unselect

UDP/123

Unselect

TCP/22

Unselect

UDP/53

Unselect

Question 2 of 90

3.

Which of the following are UDP header fields?

Question 3 of 90

4.

Which of the following are characteristics of TCP protocol?

Question 4 of 90

5.

Put the following OSI layers in order from layer 7 to 1.

  • Transport
  • Network
  • Data Link
  • Session
  • Presentation
  • Physical
  • Application

Question 5 of 90

6.

Click on the correct PDU for each OSI model layer (click again to unselect).

Physical Layer
frame

Unselect

bit

Unselect

packet

Unselect

data

Unselect

segment

Unselect

Data Link Layer
frame

Unselect

bit

Unselect

packet

Unselect

data

Unselect

segment

Unselect

Network Layer
frame

Unselect

bit

Unselect

packet

Unselect

data

Unselect

segment

Unselect

Transport Layer
frame

Unselect

bit

Unselect

packet

Unselect

data

Unselect

segment

Unselect

Session Layer
frame

Unselect

bit

Unselect

packet

Unselect

data

Unselect

segment

Unselect

Question 6 of 90

7.

Which of the following statements provide Layer 5 protocols?

Question 7 of 90

8.

You need to increase the uplink capacity between two switches, where the uplink is dropping packets due to the high utilization. Which solution can be used to increase the uplink capacity?

Question 8 of 90

9.

You have some issue with a specific server and needs to analyze the traffic to identify what is causing the issue. What should you do in order to troubleshoot without any disruption?

Question 9 of 90

10.

You are the network administrator of a small company and you're also responsible by network security.
You need to make sure just employees are using the corporate network to protect your company data. Which security feature should you use?

Question 10 of 90

11.

Regarding Spanning-tree protocol (STP), which of the following statements are true?

Question 11 of 90

12.

You have the following scenario, where you need to define the subnets to be used in a new office.
The 192.168.123.0/24 prefix is available for this office and the transit VLAN was already configured during the initial setup.
Select the statement where the subnets were defined to fit the requirements as per the picture below.

pic1

Question 12 of 90

13.

You have defined the subnet 192.168.123.32/27 as the prefix to be used for VOICE devices. Which subnet mask you need to use on the L3 interface configuration?

Question 13 of 90

14.

Which of the following are private subnets, as per RFC1918 definition?

Question 14 of 90

15.

Considering the following physical LAN topology, which statements below provides its name and characteristics.

pic2

Question 15 of 90

16.

Which of the following statements are considered logical topologies?

Question 16 of 90

17.

You need to setup the wireless network for the company. You already bought the Wireless Controller and the access points for it.
Which type of wireless implementation you should use?

Question 17 of 90

18.

You want to connect your bluetooth headset to your phone to listen some music. Which type of network you will need to use?

Question 18 of 90

19.

Which statements are requirements to choose the number of APs needed for a new implementation and the best AP placement?

Question 19 of 90

20.

You are analyzing your client´s wireless network. Based on the following information, what can you describe about the network?
SSID: MyCorpSSID
Auth: WPA2-PSK
PSK: MyCorp123

Question 20 of 90

21.

Click on the correct example for each Cloud Service (click again to unselect).

NaaS
Microsoft Azure

Unselect

Office 365

Unselect

Amazon´s VPC

Unselect

Red Hat OpenShift

Unselect

IaaS
Microsoft Azure

Unselect

Office 365

Unselect

Amazon´s VPC

Unselect

Red Hat OpenShift

Unselect

SaaS
Microsoft Azure

Unselect

Office 365

Unselect

Amazon´s VPC

Unselect

Red Hat OpenShift

Unselect

PaaS
Microsoft Azure

Unselect

Office 365

Unselect

Amazon´s VPC

Unselect

Red Hat OpenShift

Unselect

Question 21 of 90

22.

Which of the following Cloud Connectivity technology has the lower cost and can be used through standard internet links to connect local resources to the Cloud environment?

Question 22 of 90

23.

Select the best description to each DNS record type:

stores a hostname and its corresponding IPv4 address
CNAME

Unselect

SRV

Unselect

PTR

Unselect

NS

Unselect

MX

Unselect

A

Unselect

TXT

Unselect

AAAA

Unselect

stores a hostname and its corresponding IPv6 address
CNAME

Unselect

SRV

Unselect

PTR

Unselect

NS

Unselect

MX

Unselect

A

Unselect

TXT

Unselect

AAAA

Unselect

used to alias a hostname to another hostname
CNAME

Unselect

SRV

Unselect

PTR

Unselect

NS

Unselect

MX

Unselect

A

Unselect

TXT

Unselect

AAAA

Unselect

specifies an SMTP email server
CNAME

Unselect

SRV

Unselect

PTR

Unselect

NS

Unselect

MX

Unselect

A

Unselect

TXT

Unselect

AAAA

Unselect

provides the address of the name server for the domain
CNAME

Unselect

SRV

Unselect

PTR

Unselect

NS

Unselect

MX

Unselect

A

Unselect

TXT

Unselect

AAAA

Unselect

reverse DNS lookup entry
CNAME

Unselect

SRV

Unselect

PTR

Unselect

NS

Unselect

MX

Unselect

A

Unselect

TXT

Unselect

AAAA

Unselect

service location record
CNAME

Unselect

SRV

Unselect

PTR

Unselect

NS

Unselect

MX

Unselect

A

Unselect

TXT

Unselect

AAAA

Unselect

carries machine-readable data such as opportunistic encryption
CNAME

Unselect

SRV

Unselect

PTR

Unselect

NS

Unselect

MX

Unselect

A

Unselect

TXT

Unselect

AAAA

Unselect

Question 23 of 90

24.

In order to provide dynamic IP address to the hosts on DATA, VOICE and WIRELESS subnets, you are setting up a DHCP server on the switch.
Which of the following options should you configure in the DHCP scope to be able to access the Internet and internal company servers?

Question 24 of 90

25.

Which of the following are twisted pair cable connectors?

Question 25 of 90

26.

You are designing the architecture of a Datacenter and must define the UTP cable category to be purchased to connect the servers to the switch via 10GBaseT UTP ports. Which of the following should you use?

Question 26 of 90

27.

You connect two switches using an UTP cable and the port didn´t come up. You already checked and both switch ports are not disabled. What can be the issue?

Question 27 of 90

28.

You have configured new VLANs for your office and the users which were migrated to this VLAN are complaining about the internet access, which is not working.
Your field analyst did the first analysis and the websites are being resolved by DNS server but the users are not able to connect to it. Internal resources, like printers and corporate servers, are working fine. Other users VLANs are connecting to internet with no issues.
Where can be the issue?

Question 28 of 90

29.

Which technology can be used to save company money and provide enhanced telephony services over the traditional PBX solution and which device can be used to accomplish this?

Question 29 of 90

30.

You need to extend the coverage of a corporate wireless network and there is no cabling where you need to provide wireless. Which device can be used?

Question 30 of 90

31.

You are setting up a new network, where you already configured the L3 switch and the router.
All the clients are using the internet access with no issues, but they are exposed since there is no filter on it.
What you should use to restrict the web access filtering undesired websites and contents, and log all client activities?

Question 31 of 90

32.

Due to the pandemia, all employees of a company must work from home and you need to provide network connectivity for them. Which device do you need to provide this connectivity?

Question 32 of 90

33. Your company grows in the last months and you need to grow the external connection capacity to your company system.
The infrastructure team ask you to use more servers in parallel to increase the capacity and provide a high availability to the application.
Which network device you need to use to use all the servers in parallel without changing the way the clients access your company application?

Question 33 of 90

34.

Which software abstracts guest machines and the operating system they run on?

Question 34 of 90

35.

Which of the following hypervisor can be considered as hosted hypervisor (or type-2)?

Question 35 of 90

36.

You need to allocate each virtual server to the proper VLAN on the same hypervisor. Which can be used to accomplish this?

Question 36 of 90

37.

You need to setup a SAN network and you have no budget to buy storage network devices.
How can you do this?

Question 37 of 90

38.

Which of the following technologies provides broadband internet connectivity through a traditional telephony structure using a modem?

Question 38 of 90

39.

Which technology encapsulates PPP frames within Ethernet frames to provide internet service?

Question 39 of 90

40.

You were requested to reduce the cost of wan link connectivity between the remote locations, head quarters and datacenters.
The current solution is MPLS.
Which solution could you use to generate the requested saving?

Question 40 of 90

41.

Refer to the exhibit.

pic3

Which type of document this picture represents?

Question 41 of 90

42.

Refer to the exhibit.

pic4

Which type of document this picture represents?

Question 42 of 90

43.

Which of the following document is important to reduce impact of a downtime or network issues after the maintenance window?

 

Question 43 of 90

44.

Which of the following document outlines how a business will continue operating during an unplanned disruption in service?

Question 44 of 90

45.

Which of the following can be considered in a Business Continuity Plan document?

Question 45 of 90

46.

What can be considered in a Business continuity plan to provide a redundant connectivity to physical servers?

Question 46 of 90

47.

Which of the following can be used in the Business Continuity Plan in order to reduce the power outage risk?

Question 47 of 90

48.

Which tools can be used to periodically test the network to verify that network security components are behaving as expected and to detect known vulnerabilities?

Question 48 of 90

49.

Which is the best definition of patching process?

Question 49 of 90

50.

Select the backup type associated to each description (click again to unselect).

Complete backup is the safest and most comprehensive
Snapshots

Unselect

Differential

Unselect

Full

Unselect

Incremental

Unselect

Backup only data changed since last backup
Snapshots

Unselect

Differential

Unselect

Full

Unselect

Incremental

Unselect

Only backups data since the last full backup
Snapshots

Unselect

Differential

Unselect

Full

Unselect

Incremental

Unselect

Read-only copy of data frozen in time (VMs)
Snapshots

Unselect

Differential

Unselect

Full

Unselect

Incremental

Unselect

Question 50 of 90

51.

The infrastructure team wants to access their Windows Servers from home, to be able to support after business hours.
Which solution should be used to provide remote access to these servers?

Question 51 of 90

52.

Your company needs to open a new office for a few number of employees (about 10). Which is the best solution to connect this new office to your DC?

Question 52 of 90

53.

Which solution provides access to network devices either when the network is down, being able to connect to the devices remotely?

Question 53 of 90

54.

Which document is part of corporate security policy, makes employees aware of their obligations and must be signed by them during their onboarding?

Question 54 of 90

55.

In the last years the number of remote workers increase a lot and with number of remote employees the risk of loss of data or the exfiltration increases also.
Which solution can help company´s data from loss and exfiltration?

Question 55 of 90

56.

Which of the following are examples of End-User Policies?

Question 56 of 90

57.

Which of the following are detection physical security devices?

Question 57 of 90

58.

Which of the following is a physical security device which provides authentication that is tied specifically to you as an individual?

Question 58 of 90

59.

Which of the following centralized authentication provides is an open standard and all-vendor supported?

Question 59 of 90

60.

Which of the following solution must be used in conjunction with SSL VPN to improve the security level of authentication?

Question 60 of 90

61.

Which solution can be used to improve wired network access security, asking users to login to allow to access the network before provide connectivity to their PC?

Question 61 of 90

62.

You need to configure a new SSID for employees where the security level will be the best as possible, to keep the network secure.
The authentication method must use AES as encryption method.
Which authentication must you use in this new SSID?

Question 62 of 90

63.

Which EAP method uses certificate to stablish the connection and is considered the most secure EAP method?

Question 63 of 90

64.

Which malware denies a user access to their files by encrypting the files and then displaying a message demanding a compensation for the decryption key?

Question 64 of 90

65.

Which attack attempts to manipulate individuals into performing actions or divulging confidential information?

Question 65 of 90

66.

Which action can be done to protect the company from social engineering attacks?

Question 66 of 90

67.

You need to install a new device in the network and must make sure all security best practices are being applied. Which of the following are good practices for network device hardening?

Question 67 of 90

68.

You are hardening the network devices and need to choose which protocol should be used for remote access to the devices. Select the most secure protocol to be used for CLI access to the network devices.

Question 68 of 90

69.

Which mitigation technique avoid an attacker from getting information about DTP, CDP and VTP protocols plugging some PC to an unconfigured switch port?

Question 69 of 90

70.

You need to configure a new server to publish WWW service to the internet, configuring the proper ACL and NAT. What must be taken into consideration on the design of this solution?

Question 70 of 90

71.

Which of the following is a mitigation technique used to attract cybercriminals to a server where there is a fake application, protecting the real systems from those attackers?

Question 71 of 90

72.

Which switch configuration can secure the network from DHCP spoofing?

Question 72 of 90

73.

Regarding the network troubleshooting methodology, put the troubleshooting steps in the correct order.

  • Test the theory to determine the cause
  • Establish a theory of Probable Cause
  • Implement the solution or escalate as necessary
  • Document findings, actions and outcomes
  • Establish a plan of action to resolve the problem and identify potential effects
  • Verify full system functionality and if applicable implement preventative measures
  • Identify the Problem

Question 73 of 90

74.

Some users are claiming about network issues and you need to identify what can be the issue. Which techniques can be used to identify it?

Question 74 of 90

75.

Regarding network troubleshooting, there are some traditional CLI tools which are used by all network experts as the first resource when troubleshooting some issue.
Which are they?

Question 75 of 90

76.

Users are claim about the network when doing a meeting in a specific meeting room. You notice that all the users connect to the meeting via wireless connection.
What tool can you use to identify what should be the issue in this case?

Question 76 of 90

77.

You are troubleshooting a specific application issue where the users lose the connection when they are working into it.
You already checked the reachability from layer 1 to 4, where you already did a telnet in the application port and the connection is closing as expected.
Which tool can be used to proceed with the troubleshooting?

Question 77 of 90

78.

You just install a new internet link with 1Gbps but the users are claiming about the connection speed.
Which tool can be used to troubleshoot this issue?

Question 78 of 90

79.

Refer to the exhibit.

pic5

The host is unable to access internet. Select the correct statement about this issue and the first step to identify it.

Question 79 of 90

80.

The network field analyst just install a new switch and you didn´t see the neighbor switch via LLDP.
You checked the interface and it seems the port is down.
The transceiver is being identified and it seems to be ok.
What can be done as the first step to troubleshoot this issue?

Question 80 of 90

81.

An user is complaining about the network performance.
The following output is from the port connected to the user´s PC.

pic7

What can be the issue in this case?

Question 81 of 90

82.

You are troubleshooting a wireless issue where the network becomes unstable in a small office during the lunch time.
During you visit for troubleshooting, you notice that the employees usually have lunch at the office and the microwaves is used to heat the food.
Which issue you think they have on the wireless network?

Question 82 of 90

83.

Regarding the issue where the microwaves interfere on wireless signaling, what can be done to solve this issue?

Question 83 of 90

84.

You are troubleshooting a wireless issue where some clients usually lost the connectivity to the wireless network.
Analyzing all the cases in detail you figure out that there is no specific area where the issue is happening, but all users which have issues are using the same laptop model.
What should you do to troubleshoot this issue?

Question 84 of 90

85.

Refer to the exhibit.

pic5 1

Which statement best describes the best way to start the troubleshooting and which tools should be used in the process?

Question 85 of 90

86.

Refer to the exhibit.

pic6

Users are complaining that they cannot access the internet.
The network field analyst did an initial check and the hosts can ping either the gateway and the public IP 8.8.8.8.
What can be the issue?

Question 86 of 90

87.

Refer to the exhibit.

pic6

Users are complaining that they cannot access the internet.
The network field analyst did an initial check and the hosts can ping either the gateway and the public IP 8.8.8.8.
You checked if the the host can ping www.google.com and it is responding.
You tried to telnet the 443 and 80 port for www.google.com and none of them connect.
What can be the issue now?

Question 87 of 90

88.

You have being asked to check some weird behavior in the network.
Users are getting IPs from subnet 10.0.0.0/24 where the corporate network configured and where there is a DHCP server is 192.168.10.0/24.
What can be the issue?

Question 88 of 90

89.

You need to segment the network in different broadast domains, to avoid a great number of broadcast in the network.
Which network device should be used?

Question 89 of 90

90.

Which device should be used to implement DMVPN in a Cloud environement?

Question 90 of 90

Loading... Loading...

 

content-filler

ABOUT US

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

MOST POPULAR

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Members

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Newsletter

Subscription Form

Secure Site

website security secure

Copyright Reality Press Ltd . / Paul Browning

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.