Free Certification Practice Questions

COMPTIA-NETWORK

Loading…
Which of the following should a junior security administrator recommend implementing to mitigate malicious network activity?
#421
A company uses a solution to rotate the password that engineers use to connect to critical systems. Which of the following best describes this solution?
#422
Which of the following is the best way to keep devices on during a loss of power?
#423
A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?
#424
A server administrator needs to add a record to the company’s DNS server to verify ownership of a web domain. The administrator has the record's name and value. Which of the following record types should the administrator use to add the record to the DNS server?
#425
A network technician is troubleshooting the connection to the company website. The traceroute command produces the following output:Which of the following should the technician do to identify the path to the server?
#426
A major natural disaster strikes a company's headquarters, causing significant destruction and data loss. The company needs to quickly recover and resume operations. Which of the following will a network administrator need to do first?
#427
After installing a new wireless access point, an engineer tests the device and sees that it is not performing at the rated speeds. Which of the following should the engineer do to troubleshoot the issue?
#428
After a recent corporate merger, a network administrator needs to build reference documentation on multivendor infrastructure. Which of the following protocols will provide the information?
#429
Which of the following steps of the troubleshooting methodology is most likely to involve talking to a user who opens a ticket?
#430
Which of the following is the most cost-effective way for a network administrator to establish a persistent, secure connection between two facilities?
#431
A network technician sets up a computer on the accounting department floor for a user from the marketing department. The user reports that they cannot access the marketing department's shared drives but can access the internet. Which of the following is the most likely cause of this issue?
#432
A network administrator is hosting a local application on a Type 2 hypervisor, but the application only has accessibility to the host machine. Which of the following address types would the administrator most likely visit to access the application?
#433
A network manager connects two switches together and uses two connecting links. Which of the following configurations will prevent Layer 2 loops?
#434
Which of the following remote connectivity methods is used when data and management traffic use the same network infrastructure?
#435
Which of the following steps of the troubleshooting methodology would most likely involve comparing current throughput tests to a baseline?
#436
Which of the following uses the longest prefix match to determine an exit interface?
#437
A network administrator needs to securely connect to an Ubuntu server for management purposes. Which of the following protocols will most likely address this requirement?
#438
Which of the following allows for interactive, secure remote management of a network infrastructure device?
#439
After a recent security awareness phishing campaign, the cybersecurity team discovers that additional security measures need to be set up when users access potentially malicious websites. Which of the following security measures will best address this concern?
#440
During a security audit, a consulting firm notices inconsistencies between the documentation and the environment. Which of the following can keep a record of who made the changes and what the changes are?
#441
Which of the following describes a malicious application that takes advantage of a software flaw?
#442
Which of the following allows a standard user to log in to multiple resources with one account?
#443
Which of the following describes the capability of a cloud service to adjust resources on demand?
#444
A company’s Chief Information Security Officer requires that servers and firewalls have accurate time stamps when creating log files so that security analysts can correlate events during incident investigations. Which of the following should be implemented?
#445
Which of the following connector types is most commonly associated with Wi-Fi antennas?
#446
An organization recently connected a new computer to the LAN. The user is unable to ping the default gateway. The technician examines the configuration and sees a self-assigned IP address. Which of the following is the most likely cause?
#447
A network administrator is troubleshooting a connectivity issue between two devices on two different subnets. The administrator verifies that both devices can successfully ping other devices on the same subnet. Which of the following is the most likely cause of the connectivity issue?
#448
A network technician is attempting to harden a commercial switch that was recently purchased. Which of the following hardening techniques best mitigates the use of publicly available information?
#449
A new backup system takes too long to copy files to the new SAN each night. A network administrator makes a simple change to the network and the devices to decrease backup times. Which of the following does the network administrator change? E. TTL
#450