Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Computing Technology Industry Association (CompTIA)
Exam 10: CompTIA Network+
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
A network technician is connecting two switches together. Which of the following protocols should the technician use to increase speed and fault tolerance?
Question 42
Multiple Choice
A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee's computer. This type of attack is an example of:
Question 43
Multiple Choice
A company has a web-based application that is used by many different departments. The company has experienced some overload of resources on the database server. The network administrator implements a network device in between the servers and the database. Which of the following BEST describes the purpose of this device?
Question 44
Multiple Choice
A network technician is diagnosing a time-out issue generated from an end user's web browser. The web browser issues standard HTTP get and post commands to interact with the website. Given this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of the following tools would allow the technician to view the handshake?
Question 45
Multiple Choice
A customer cannot access a company's secure website. The company's network security is reviewing the firewall for the server and finds the following output:
Which of the following changes should be made to allow all customers to access the company's secure website?
Question 46
Multiple Choice
Which of the following is used to classify network data for the purpose of providing QoS?
Question 47
Multiple Choice
A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of the primary datacenter. The Chief Information Officer (CIO) is concerned because this contract does not include a long-term strategy for extended outages. Which of the following should the CIO complete?
Question 48
Multiple Choice
Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?
Question 49
Multiple Choice
A systems administrator has recently purchased and installed a large electronic signage screen for the company's parking garage. The screen's management software was installed on a server with a public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random, and inappropriate messages. Which of the following is MOST effective in resolving this issue?
Question 50
Multiple Choice
A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network. The management network is segregated from the production network and uses site-to-site VPN connections. Some of the equipment does not support encryption. Which of the following should the technician choose that all the equipment would support?
Question 51
Multiple Choice
A network technician has created a network that consists of a router, a firewall, a switch, and several PCs. Which of the following physical network topologies was created?
Question 52
Multiple Choice
A computer lab on a campus network was recently reconfigured using recycled network cables. One of the 24 computers in the lab is unable to connect to the network after the upgrade. A network technician successfully uses the cable in question to connect directly to another computer. Which of the following is MOST likely the issue with the cable?
Question 53
Multiple Choice
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
Question 54
Multiple Choice
A company recently upgraded all of its printers to networked multifunction devices. Users can print to the new devices, but they would also like the ability to scan and fax files from their computers. Which of the following should the technician update to allow this functionality?
Question 55
Multiple Choice
Which of the following protocols do MOST MITM attacks utilize?
Question 56
Multiple Choice
An administrator is moving to a new office. There will be several network runs through the ceiling area of the office. Which of the following is the BEST to utilize in these areas?
Question 57
Multiple Choice
Which of the following MUST be implemented to share metrics between routing protocols within the same router?
Question 58
Multiple Choice
An ISP technician gets a call from a business that just changed equipment but can no longer connect to the Internet. The technician checks the ARP table on the ISP switch, and there is no corresponding MAC address present. Instead, the entry is "Incomplete". Which of the following could cause this condition?
Question 59
Multiple Choice
A network technician receives a spool of Cat 6a cable and is asked to build several cables for a new set of Ethernet runs between devices. Which of the following tools are MOST likely needed to complete the task? (Choose three.)