CompTIA Network+ Practice Test 11

CompTIA Network+

1 / 20

A network technician is troubleshooting a slow internet connection and suspects an issue with the DNS resolution process. Which tool can be used to diagnose DNS problems?

2 / 20

A network administrator is tasked with preventing unauthorized devices from connecting to the network by verifying device compliance before granting access. Which security technology should be used?

3 / 20

A technician needs to verify that a web server is listening for HTTP requests on the correct port. Which command should be used?

4 / 20

A network team is deploying IPv6 and needs to ensure that devices automatically generate their own IP addresses without using a DHCP server. Which IPv6 feature enables this functionality?

5 / 20

A network administrator is configuring a firewall to allow traffic from a remote office while blocking all other inbound connections. Which firewall rule should be implemented?

6 / 20

A user reports that they can access local resources but cannot reach any websites. Which command should be used first to verify external network connectivity?

7 / 20

A company needs to ensure that only authorized devices can connect to the corporate wired network. Which security feature should be implemented?

8 / 20

A technician is troubleshooting a network issue and suspects a device is sending excessive traffic, causing network congestion. Which tool should be used to analyze packet-level data?

9 / 20

A network administrator needs to configure a wireless network with the highest level of security while allowing employees to authenticate using their domain credentials. Which authentication method should be used?

10 / 20

A company wants to implement a solution that will allow employees to securely connect to the corporate network from remote locations while ensuring all traffic is encrypted. Which solution should be used?

11 / 20

A network engineer needs to configure multiple switches to support VLANs and allow VLAN traffic to pass between them. Which protocol should be enabled to achieve this?

12 / 20

Which routing protocol uses hop count as its metric and is considered a distance-vector protocol?

13 / 20

In network security, what is the primary function of a honeypot?

14 / 20

Which command-line tool is used to display the current TCP/IP network configuration values and refresh DHCP settings on a Windows machine?

15 / 20

What is the primary purpose of implementing a Demilitarized Zone (DMZ) in a network architecture?

16 / 20

Which wireless standard operates exclusively in the 5 GHz frequency band and supports data rates up to 1.3 Gbps?

17 / 20

A company wants to ensure that internal DNS queries do not traverse the internet. Which type of DNS server should they implement?

18 / 20

Which protocol operates at the Network layer (Layer 3) of the OSI model and is responsible for logical addressing and routing?

19 / 20

In a cloud environment, which service model provides the highest level of control over the operating system and applications?

20 / 20

A network administrator needs to implement a solution that allows for the segmentation of network traffic without using traditional VLANs. Which technology should be considered?

Your score is

The average score is 0%

0%