CompTIA Network+ Practice Test 14

CompTIA Network+

1 / 20

A technician needs to replace a fiber-optic connector. Which type of connector is commonly used in high-speed networks?

2 / 20

Which attack involves an attacker intercepting and modifying communication between two parties without their knowledge?

3 / 20

A company wants to prevent employees from accessing social media websites during work hours. What technology should be implemented?

4 / 20

A technician needs to configure a router to dynamically assign IP addresses to clients. What service should be enabled?

5 / 20

What is the primary purpose of a honeypot in network security?

6 / 20

A network administrator wants to prevent unauthorized devices from connecting to a switch. What feature should be enabled?

7 / 20

A technician suspects a DNS issue is preventing a workstation from accessing a website. What command should they use to test DNS resolution?

8 / 20

A company wants to separate guest Wi-Fi traffic from corporate traffic using a single physical access point. What technology should they implement?

9 / 20

Which network device operates at Layer 2 and can learn MAC addresses to forward traffic efficiently?

10 / 20

A network administrator is troubleshooting a connectivity issue and suspects a faulty cable. What tool should they use?

11 / 20

A company wants to implement a solution that can detect and block network intrusions in real time. What should they use?

12 / 20

A technician needs to identify open ports on a remote server for security auditing. What tool should they use?

13 / 20

What is the primary purpose of a network access control (NAC) system?

14 / 20

Which wireless security protocol should never be used due to vulnerabilities?

15 / 20

A network engineer needs to configure a router to send all traffic destined for unknown networks to a specific next-hop address. What type of route should be configured?

16 / 20

Which type of attack exploits vulnerabilities in unpatched network services?

17 / 20

A company is experiencing excessive broadcast traffic on their network. What should they implement to reduce this?

18 / 20

A technician needs to configure a new switch remotely. Which protocol provides secure remote access?

19 / 20

A network administrator needs to restrict unauthorized DHCP servers from operating on the network. What security feature should be enabled?

20 / 20

A company wants to implement link redundancy between switches to prevent a single point of failure. Which protocol should be used?

Your score is

The average score is 0%

0%