Comptia Network+ Study Guide Pdf
20 community-sourced questions and answers. Free — no login.
Which of the following physical security devices is used to detect unauthorized server room access? A. Access badge B. Biometrics C. Smart card D. Video surveillance
D. Video surveillance
Ann, a new employee within a department, cannot print to any of the printers in the department or access any of the resources that others can. However, she can access the Internet. The network engineer has confirmed that Ann's account has been set up the same as the others. There are no access lists restricting Ann's access. Which of the following could be the issue for this lack of access? A. Duplex/speed mismatch B. VLAN mismatch C. DNS server issue D. DHCP server issue E. Spanning tree blocked ports
B. VLAN mismatch
Which of the following devices, if implemented, would result in decreased administration time of an 802.11 network running centralized authentication services? (Choose two.) A. VPN concentrator B. Proxy server C. Wireless controller D. RADIUS server E. Multilayer switch
C. Wireless controller D. RADIUS server
A technician is troubleshooting a workstation's network connectivity and wants to confirm which switchport corresponds to the wall jack the PC is using. Which of the following concepts would BEST help the technician? A. Consistent labeling B. Change management C. Standard work instructions D. Inventory management E. Network baseline
A. Consistent labeling
A junior network technician receives a help desk ticket stating that an employee will be taking time off but will still be required to work from home. Before granting this request, which of the following policies must the end user review? A. Acceptable use policy B. Mobile use policy C. Non-disclosure agreement D. Remote access policy
D. Remote access policy
Which of the following provides two-factor authentication? A. Username + password B. Smart card + PIN C. Fingerprint + retina scan D. Key fob + ID card
B. Smart card + PIN
A network technician needs to install a new access switch. After installing the new switch, the technician begins to move connections from the old switch to the new switch. The old switch used a GBIC with SC connectors, and the new switch uses an SFP with LC connectors. After connecting the SC connector to the SC-to-LC adapter and plugging it into the switch, the link does not come up as expected. Which of the following should a network technician perform NEXT? A. Replace SFP with a new one. B. Fall back to the old switch. C. Transpose the fiber pairs. D. Replace multimode with single-mode cable.
C. Transpose the fiber pairs.
Which of the following provides the ability to deploy consistent access point configurations from a central location? A. Wireless controller B. AAA server C. WiFi-protected setup D. Proxy server E. VPN concentrator
A. Wireless controller
A security guard notices an authorized individual, who is dressed like a lab technician, has entered a secure area of the hospital with a large group. Which of the following security attacks is taking place? A. Evil twin B. Social engineering C. Insider threat D. Phishing
B. Social engineering
A technician is replacing a failed SOHO router for a customer who has an existing switch, cable modem, and static IP address. The user has a web server that faces the Internet so users can visit and leave comments. Which of the following BEST describes the correct configuration for this customer's requirements? A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router. B. The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem. C. The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router. D. The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem.
A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.
A technician is troubleshooting network connectivity issues with a remote host. Which of the following tools would BEST inform the technician of nodes between the client and the remote host? (Choose two.) A. tracert B. ping C. tcpdump D. pathping E. netstat F. nslookup G. route
A. tracert D. pathping
Which of the following can be done to implement network device hardening? (Choose two.) A. Implement spanning tree B. Perform VLAN hopping C. Patch and update D. Perform backups E. Enable port mirroring F. Change default admin password
C. Patch and update F. Change default admin password
A web application is unable to authenticate customers so they can access their bills. The server administrator has tested the LDAP query but is not receiving results. Which of the following is the NEXT step the server administrator should take to correct the problem? A. Check port 636 to see if it is being blocked. B. Change service port 636 to port 389. C. Restart the web server. D. Verify the browser is using port 443.
A. Check port 636 to see if it is being blocked.
A junior network technician is working in the field and needs to connect to the company's remote server, however, doing so will require the junior technician to use the public Internet. Because security is a concern, which of the following is the BEST method to use? A. Telnet B. SSH C. SFTP D. VNC
B. SSH
Which of the following processes would inform administrators of potential security issues that might affect equipment? A. Port scanning B. Vulnerability scanning C. Log reviewing D. Anti-malware scanning
D. Anti-malware scanning
Greater bandwidth and availability are required between two switches. Each switch has multiple 100Mb Ethernet ports available. Which of the following should a technician implement to help achieve these requirements? A. Spanning tree B. Clustering C. Power management D. Port aggregation
D. Port aggregation
A company decides to deploy customer-facing, touch-screen kiosks. The kiosks appear to have several open source service ports that could potentially become compromised. Which of the following is the MOST effective way to protect the kiosks? A. Install an IDS to monitor all traffic to and from the kiosks. B. Install honeypots on the network to detect and analyze potential kiosk attacks before they occur. C. Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks. D. Create a new network segment with ACLs, limiting kiosks' traffic with the internal network.
D. Create a new network segment with ACLs, limiting kiosks' traffic with the internal network.
A network administrator is redesigning network security after an attack. During the attack, an attacker used open cubicle locations to attach devices to the network. The administrator wants to be able to monitor future attacks in a safe environment and determine the method of attack. Which of the following should the administrator do to BEST meet this requirement? A. Create a VLAN for the unused ports and create a honeyspot on the VLAN. B. Install a BPDU guard on switchports and enable STP. C. Create a DMZ for public servers and secure a segment for the internal network. D. Install antivirus software and set an ACL on the servers.
A. Create a VLAN for the unused ports and create a honeyspot on the VLAN.
Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the following policies requires employee adherence? A. AUP B. SLA C. NDA D. MOU
A. AUP
A technician is trying to determine the IP address of a customer's router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer's router? A. 192.168.0.55 B. 192.168.1.0 C. 192.168.1.1 D. 192.168.5.5 E. 255.255.255.0
C. 192.168.1.1
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials