CompTIA Network+ Practice Test 7

CompTIA Network+

1 / 20

A company wants to improve the efficiency of web browsing by caching frequently accessed web pages. What solution should they implement?

2 / 20

A network administrator is implementing a public key infrastructure (PKI) for secure email communication. What protocol should they use?

3 / 20

A technician needs to verify that all switches and routers in a network are synchronized to the same time. What protocol should they check?

4 / 20

A company wants to protect sensitive data transmitted between two remote sites. What encryption protocol should they use?

5 / 20

A user reports that they are unable to connect to a specific website. The technician finds that other websites work fine. What tool should they use to troubleshoot?

6 / 20

A technician needs to allow external users to access an internal web server. What should they configure?

7 / 20

A security team needs to restrict access to network resources based on user roles. What type of access control should they implement?

8 / 20

A network administrator needs to configure a switch to prevent loops while allowing redundant connections. What protocol should they enable?

9 / 20

A company needs to provide secure, encrypted remote access to internal resources for employees working from home. What is the best solution?

10 / 20

A network technician needs to install a redundant internet connection that will automatically switch over if the primary link fails. What should they implement?

11 / 20

A network administrator needs to prioritize web browsing traffic over file downloads. What networking feature should they configure?

12 / 20

A company wants to provide secure access to cloud applications using multi-factor authentication (MFA). What technology should they use?

13 / 20

A technician is setting up a WAN link and needs to ensure data remains encrypted across the public internet. What protocol should they use?

14 / 20

A security team wants to detect unauthorized access to a company's internal network in real time. What solution should they implement?

15 / 20

A network technician notices that multiple devices on a network are experiencing duplicate IP address conflicts. What is the most likely cause?

16 / 20

A company is concerned about employees using unauthorized personal devices on the network. What security solution should they implement?

17 / 20

A network technician is troubleshooting a VoIP phone that intermittently drops calls. What metric should they monitor to diagnose the issue?

18 / 20

A company needs to protect against DNS spoofing attacks. What security measure should they implement?

19 / 20

A network administrator wants to isolate a group of IoT devices on a separate logical network while still using the same physical switch. What technology should they use?

20 / 20

A technician needs to set up a new wireless network that requires authentication with a username and password instead of just a shared key. Which security protocol should they implement?

Your score is

The average score is 0%

0%