لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A network technician needs to ensure the company's external mail server can pass reverse lookup checks. Which of the following records would the technician MOST likely configure? (Choose Correct option and give explanation directly from CompTIA Network+ Study guide or documents)
A. PTR
B. AAAA
C. SPF
D. CNAME
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Which of the following OSI model layers would allow a user to access and download flies from a remote computer?
A. Session
B. Presentation
C. Network
D. Application
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which of the following compromises internet-connected devices and makes them vulnerable to becoming part of a botnet? (Select TWO)
A. Deauthentication attack
B. Malware infection
C. IP spoofing
D. Firmware corruption
E. Use of default credentials
F. Dictionary attack
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Which of the following security devices would be BEST to use to provide mechanical access control to the MDF/IDF?
A. A smart card
B. A key fob
C. An employee badge
D. A door lock
عرض الإجابة
اجابة صحيحة: C
السؤال #5
A small, family-run business uses a single SOHO router to provide Internet and WiFi to its employees At the start of a new week, employees come in and find their usual WiFi network is no longer available, and there is a new wireless network to which they cannot connect. Given that information, which of the following should have been done to avoid this situation'
A. The device firmware should have been kept current
B. Unsecure protocols should have been disabled
C. Parental controls should have been enabled
D. The default credentials should have been changed
عرض الإجابة
اجابة صحيحة: A
السؤال #6
A network technician is having issues connecting an loT sensor to the internet The WLAN settings were enabled via a custom command line, and a proper IP address assignment was received on the wireless interlace. However, when trying to connect to the internet, only HTTP redirections are being received when data Is requested. Which of the following will point to the root cause of the Issue?
A. Verifying if an encryption protocol mismatch exists
B. Verifying If a captive portal is active for the WLAN
C. Verifying the minimum RSSI for operation in the device's documentation
D. Verifying EIRP power settings on the access point
عرض الإجابة
اجابة صحيحة: A
السؤال #7
A technician removes an old PC from the network and replaces it with a new PC that is unable to connect to the LAN. Which of the Mowing is MOST likely the cause of the issue?
A. Port security
B. Port tagging
C. Port aggregation
D. Port mirroring
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A technician is troubleshooting a client's report about poor wireless performance. Using a client monitor, the technician notes the following information: Which of the following is MOST likely the cause of the issue?
A. Channel overlap
B. Poor signal
C. Incorrect power settings
D. Wrong antenna type
عرض الإجابة
اجابة صحيحة: D
السؤال #9
A user in a branch office reports that access to all files has been lost after receiving a new PC. All other users in the branch can access fileshares. The IT engineer who is troubleshooting this incident is able to ping the workstation from the branch router, but the machine cannot ping the router. Which of the following is MOST likely the cause of the incident?
A. Incorrect subnet mask
B. Incorrect DNS server
C. Incorrect IP class
D. Incorrect TCP port
عرض الإجابة
اجابة صحيحة: A
السؤال #10
A network administrator is configuring a database server and would like to ensure the database engine is listening on a certain port. Which of the following commands should the administrator use to accomplish this goal?
A. nslookup
B. netstat -a
C. ipconfig /a
D. arp -a
عرض الإجابة
اجابة صحيحة: B
السؤال #11
A network technician receives a report from the server team that a server's network connection is not working correctly. The server team confirms the server is operating correctly except for the network connection. The technician checks the switchport connected to the server and reviews the following data; Which of the following should the network technician perform to correct the issue?
A. Replace the Cat 5 patch cable with a Cat 6 cable
B. Install a crossover cable between the server and the switch
C. Reset the switchport configuration
D. Use NetFlow data from the switch to isolate the issue
E. Disable MDIX on the switchport and reboot the server
عرض الإجابة
اجابة صحيحة: D
السؤال #12
Which of the following protocol types describes secure communication on port 443?
A. ICMP
B. UDP
C. TCP
D. IP
عرض الإجابة
اجابة صحيحة: A
السؤال #13
A new office space is being designed. The network switches are up. but no services are running yet A network engineer plugs in a laptop configured as a DHCP client to a switch Which ol the following IP addresses should be assigned to the laptop?
A. 10
B. 169
C. 172 16 128 128
D. 192 168
عرض الإجابة
اجابة صحيحة: A
السؤال #14
A systems administrator wants to use the least amount of equipment to segment two departments that nave cables terminating in the same room. Which of the following would allow this to occur?
A. A load balancer
B. A proxy server
C. A Layer 3 switch
D. A hub
E. A Layer 7 firewall
F. The RSSI was not strong enough on the link
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Due to space constraints in an IDF, a network administrator can only a do a single switch to accommodate three data networks. The administrator needs a configuration that will allow each device to access its expected network without additional connections. The configuration must also allow each device to access the rest of the network. Which of the following should the administrator do to meet these requirements? (Select TWO).
A. Untag the three VLANs across the uplink
B. Tag an individual VLAN across the uplink
C. Untag an individual VLAN per device port
D. Tag an individual VLAN per device port
E. Tag the three VLANs across the uplink
F. Tag the three VLANs per device port
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Which of the following VPN configurations should be used to separate Internet and corporate traffic?
A. Split-tunnel
B. Remote desktop gateway
C. Site-to-site
D. Out-of-band management
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: