CompTIA Network+ Practice Test 10

CompTIA Network+

1 / 20

A company wants to mitigate SYN flood attacks. What should they implement?

2 / 20

Which DNS record type is used to map an IP address to a hostname for reverse lookups?

3 / 20

Which encryption standard is commonly used in WPA3 Wi-Fi security?

4 / 20

A remote user reports that their VPN connection drops whenever they switch between Wi-Fi and mobile data. What is the most likely reason?

5 / 20

A technician needs to determine if an ISP is performing traffic shaping on a company’s connection. Which test should they perform?

6 / 20

Which of the following is a benefit of using MPLS in a WAN environment?

7 / 20

A company wants to prevent unauthorized devices from connecting to its network. Which security measure should be implemented?

8 / 20

Which type of firewall inspects the entire data packet, including the payload, before making filtering decisions?

9 / 20

A company’s wireless network is experiencing severe interference, even after changing channels. What is the best solution?

10 / 20

An administrator needs to secure communications between two remote sites over the internet while maintaining authentication and encryption. Which protocol should they use?

11 / 20

A cybersecurity analyst detects a rogue DHCP server issuing incorrect IP addresses on a corporate network. What immediate action should be taken?

12 / 20

A technician is troubleshooting an intermittent issue where users lose network access for a few seconds multiple times per hour. Logs show frequent STP topology changes. What is the most likely cause?

13 / 20

A new switch is installed in a network but fails to forward traffic between VLANs. The administrator confirms that VLANs are correctly assigned. What additional setting must be configured?

14 / 20

A network technician is analyzing NetFlow logs and detects a large volume of UDP traffic on port 53 from multiple internal hosts. What is the most likely cause?

15 / 20

A company notices significant delays when accessing cloud-hosted applications. A network engineer suspects high latency between the local office and the cloud provider. Which tool would be most useful in diagnosing the issue?

16 / 20

Which of the following is a primary advantage of using BGP instead of OSPF for inter-network routing?

17 / 20

A security team detects unauthorized remote login attempts to a Linux server from multiple IP addresses worldwide. Which security measure would be most effective in mitigating this attack?

18 / 20

An administrator configures a network with a single DHCP server and multiple VLANs. However, clients on different VLANs fail to obtain IP addresses. What additional configuration is required?

19 / 20

A penetration tester is performing a reconnaissance attack and successfully gathers metadata from intercepted network traffic. Which attack method was likely used?

20 / 20

A network administrator is investigating an issue where only some devices in a subnet are failing to reach the internet. The affected devices can communicate with local resources but not external ones. The administrator finds that the devices have valid IP addresses and correct subnet masks. What is the most likely cause?

Your score is

The average score is 0%

0%