Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Computing Technology Industry Association (CompTIA)
Exam 10: CompTIA Network+
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 301
Multiple Choice
A network technician has provisioned a new Linux instance in a public cloud provider's IaaS environment. The technician did not install a graphical user interface. The technician wants to connect to the server's public IP address securely to start a console session. Which of the following remote access methods should the technician use?
Question 302
Multiple Choice
A network administrator is responding to a help desk ticket, which states an unknown wireless access point is broadcasting in a specific area. Upon investigation, the administrator finds that a user brought a wireless access point from home and plugged it into the corporate network. This resulted in an attacker using the unsecured wireless LAN to gain access to the network. Which of the following should the network administrator have done to BEST prevent this problem?
Question 303
Multiple Choice
A network engineer wants to implement a technology that allows for an all-in-one approach to incoming and outgoing traffic from the Internet. This device should be able to filter content and scan for malicious information in each packet. Which of the following types of devices would be necessary?
Question 304
Multiple Choice
A network engineer wants to change how employees authenticate to the wireless network. Rather than providing a pre-shared key, the engineer wants employees to be able to authenticate with the same unique company user ID and password they use for accessing other services, such as email and document sharing. The engineer also wants to receive daily reports of login attempts on the wireless network. Which of the following should be installed to achieve this goal?
Question 305
Multiple Choice
A user claims to have no Internet access but can access local resources. A technician determines the issue is with a configuration because a ping to a working public website shows a response that starts with: Ping request could not find host Which of the following is the MOST likely misconfiguration?
Question 306
Multiple Choice
Which of the following should be performed on a regular basis to prevent unauthorized access to a company network? (Choose two.)
Question 307
Multiple Choice
Which of the following components can be used to manage network traffic to all nodes in a hypervisor?
Question 308
Multiple Choice
A network administrator is reviewing the following output from a switch:
Which of the following attacks has occurred on the switch?
Question 309
Multiple Choice
A network technician is working on a way to set up a new branch office securely. The network manager confirms the company does not have any plans to expand to any other new sites and wants to implement the most cost-effective solution. Which of the following would be the BEST type of VPN to implement?
Question 310
Multiple Choice
A user no longer has access to network resources after a recent office move, but all other users in the building are able to connect at 100MB connections. After further investigation, a network technician notices the following information:
Which of the following is causing the network connection issues?
Question 311
Multiple Choice
Which of the following technologies allows network traffic to come into the network on a certain port and go to a destination server with a different port?
Question 312
Multiple Choice
Which of the following provides information about how often some devices fail so the IT department can take proactive measures?
Question 313
Multiple Choice
A network technician receives a report that the company's intranet web server is not responding. The technician verifies successful connectivity to the server via the ping and tracert commands. The technician also verifies the routers and switches are online and operational, and then runs Telnet to port 80 and receives a response. Which of the following troubleshooting steps should the technician perform NEXT?
Question 314
Multiple Choice
A network technician is investigating reports of blocked downloads from a firewall. Which of the following should be used to determine which protocols are being blocked?
Question 315
Multiple Choice
A user has reported an issue with wireless VoIP phones dropping calls during business hours. When working late or in the evenings, the user does not experience call drops. When the network technician investigates the issue, all WAPs have balanced the number of connections evenly and are not dropping off the network. The network technician connects to the wireless network in the user's office and starts a continuous ping to an external server. The results show a drastic and varied response time for each packet. Which of the following is the MOST likely cause of the dropped calls?
Question 316
Multiple Choice
Multiple users are experiencing slow performance when downloading large files from a specific site. Which of the following should the technician do to check the connection to the external site?
Question 317
Multiple Choice
Which of the following ports are used for electronic mail protocols? (Choose three.)
Question 318
Multiple Choice
A developer has asked a network engineer for a small network segment of five computers connected via a Layer 1 device, configured in a star topology, and segregated from the corporate network. Which of the following would BEST fulfill the developer's request?
Question 319
Multiple Choice
First thing on Monday morning, after a maintenance weekend, the help desk receives many calls that no one can access the Internet. Which of the following types of documentation should the on-call network administrator consult FIRST?