Time limit: 0
Quiz Summary
0 of 70 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 70 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the practice exam, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the practice exam successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 70
1. Question
What is the host ID associated with the network located at 2.8.0.0/24?
CorrectIncorrect -
Question 2 of 70
2. Question
Which layer of the Open Systems Interconnection (OSI) model is responsible for transmitting signals over the network medium and defines electrical and physical specifications for devices?
CorrectIncorrect -
Question 3 of 70
3. Question
Nick is a network engineer who is planning to design an organization’s network. The servers (Web, Email, File) should receive static public IP addresses 5.5.5.1, 5.5.5.2, and 5.5.5.3 respectively. The hosts inside the organization should receive IP addresses automatically using DHCP from the range 172.16.0.0 to 172.16.255.255 without being able to access the internet or any service outside of that network. Which of the following IP addressing schema SHOULD be configured for the hosts inside the organization?
CorrectIncorrect -
Question 4 of 70
4. Question
You are developing an application using the ASP.NET framework for the back-end and need to connect the app to your Structured Query Language (SQL) database server. Which of the following TCP ports SHOULD you open to allow the application to store, delete, update and retrieve data from the database?
CorrectIncorrect -
Question 5 of 70
5. Question
Drag and drop the connector types into their respective fields.
Sort elements
- RJ-45
- RJ-11
- F-type
- Local Connector
CorrectIncorrect -
Question 6 of 70
6. Question
Drag and drop the ports into their respective fields.
Sort elements
- 22
- 25
- 53
- 110
-
Secure Shell (SSH)
-
Simple Mail Transfer Protocol (SMTP)
-
Domain Name System (DNS)
-
Post Office Protocol v3 (POP3)
CorrectIncorrect -
Question 7 of 70
7. Question
Which of the following layers in a Software-Defined Network (SDN) architecture comprises physical switches in the network?
CorrectIncorrect -
Question 8 of 70
8. Question
Drag and drop the wired topology terms into their respective fields.
Sort elements
- Bus Topology
- Ring Topology
- Star Topology
- Mesh Topology
-
There is a main cable and all the devices are connected to this main cable through drop lines.
-
Εach device is connected with the two devices on either side of it.
-
Each device in the network is connected to a central device called hub.
-
Each device is connected to every other device on the network through a dedicated point-to-point link.
CorrectIncorrect -
Question 9 of 70
9. Question
Drag and drop the DNS record types into their respective fields.
Sort elements
- A
- CNAME
- NS
- MX
-
Used to map hostnames to an IPv4 address of the host
-
Used to point a domain or subdomain to another hostname
-
Indicates which DNS server is authoritative for that domain
-
Used to help route email according to the domain owners preference
CorrectIncorrect -
Question 10 of 70
10. Question
Two purposes of using Virtual Local Area Networks (VLANs) are to: (Select TWO)
CorrectIncorrect -
Question 11 of 70
11. Question
Which of the following ports does DHCP use? (Select TWO)
CorrectIncorrect -
Question 12 of 70
12. Question
Drag and drop the fiber connector types into their respective fields.
Sort elements
- MTRJ
- SC
- ST
- LC
CorrectIncorrect -
Question 13 of 70
13. Question
A software architect has been tasked to develop a web-based application that provides guaranteed delivery of data between hosts. Which layer of the Open Systems Interconnection (OSI) model is responsible for providing guaranteed delivery of data?
CorrectIncorrect -
Question 14 of 70
14. Question
What information can you extract having the IP address 172.16.99.45? (Select TWO.)
CorrectIncorrect -
Question 15 of 70
15. Question
How many bits are allocated to the host bits in an IPv4 address on the network with IP 42.172.0.0/20?
CorrectIncorrect -
Question 16 of 70
16. Question
A network technician is tasked with deploying a VoIP solution that provides a direct connection between private or local telephone systems and the public telephone network without the need for a legacy telephone line. Which of the following protocols SHOULD be used to deploy the VoIP solution?
CorrectIncorrect -
Question 17 of 70
17. Question
A network security expert is called to troubleshoot the firewall configuration issues within an organization. Hosts aren’t able to access any website using their domain, such as examsdigest.com or google.com. Which of the following is causing the issue?
CorrectIncorrect -
Question 18 of 70
18. Question
A network technician has been notified that an available wireless device is using 5 GHz and has been asked to install a new 2.4 GHz wireless device on the existing network to prevent interference. Which of the following 802.11 standards should the technician install to provide a 2.4 GHz wireless network?
CorrectIncorrect -
Question 19 of 70
19. Question
Complete the network by dragging the required devices into their respective fields.
Sort elements
-
Device A
-
Device B
-
Device C
CorrectIncorrect -
Question 20 of 70
20. Question
Which type of network device operates at layer 2 of the OSI model?
CorrectIncorrect -
Question 21 of 70
21. Question
A network engineer is tasked with providing a solution for the wireless speed connectivity issues within an organization. The wireless network should provide a maximum of 7 Gbps link rate. Which of the following network types does the technician need to install to meet the requirements?
CorrectIncorrect -
Question 22 of 70
22. Question
A network engineer is connecting to a Cisco router to modify the IP routing configuration. Manually-configured routing entries are missing from the configuration which causes inconsistent routing tables. Which of the following does the engineer need to configure to fix the routing tables?
CorrectIncorrect -
Question 23 of 70
23. Question
A network administrator uses NetFlow Traffic Analyzer (NTA) to identify network congestion issues. Upon inspection of the NTA report, it is discovered that the network suffers from network congestion and packets are dropped. Which of the following should be enabled to avoid packet loss in case of network congestion?
CorrectIncorrect -
Question 24 of 70
24. Question
One purpose of Link aggregation Control Protocol (LACP) is to:
CorrectIncorrect -
Question 25 of 70
25. Question
Which of the following network devices should be placed between the internet and the internal network?
CorrectIncorrect -
Question 26 of 70
26. Question
Which of the following values is the default administrative distance of OSPF?
CorrectIncorrect -
Question 27 of 70
27. Question
Which of the following devices combines the functionality of a switch and a router?
CorrectIncorrect -
Question 28 of 70
28. Question
Drag and drop the types of backup sites into their respective fields.
Sort elements
- Hot Site
- Cold Site
- Warm Site
-
A backup facility that represents a mirrored copy of the primary production center.
-
A backup facility with little or no hardware equipment installed.
-
A backup facility that has the network connectivity and the necessary hardware equipment already pre-installed but cannot perform on the same level as the production center.
CorrectIncorrect -
Question 29 of 70
29. Question
Which of the following terms describes the period of time in which an enterprise’s operations must be restored following a disruptive event such as a cyberattack?
CorrectIncorrect -
Question 30 of 70
30. Question
Which of the following protocols would BEST increase the availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork?
CorrectIncorrect -
Question 31 of 70
31. Question
Which of the following policies is a written document containing the guidelines for connecting to an organization’s network from outside the office?
CorrectIncorrect -
Question 32 of 70
32. Question
Which of the following SNMP features should be enabled to alert the administrator whenever switches suffer from overheating?
CorrectIncorrect -
Question 33 of 70
33. Question
Which of the following network device logs is shown in the figure below?
CorrectIncorrect -
Question 34 of 70
34. Question
A network administrator is called to monitor daily network performance and measure trends in network performance over a certain period of time. Which of the following methods does the administrator need to establish to analyze the network performance?
CorrectIncorrect -
Question 35 of 70
35. Question
Drag and drop the types of agreements into their respective fields.
Sort elements
- NDA
- SLA
- MOU
-
A contract between a service provider and its customers that documents what services the provider is obligated to meet.
-
A contract between at least two parties that outlines confidential information that the parties wish to share with one another for certain purposes.
-
A document describing a bilateral agreement between parties indicating an intended common line of action.
CorrectIncorrect -
Question 36 of 70
36. Question
A technician is called to develop a set of procedures to prepare an organization for how to respond in case of network interruptions during natural or manmade catastrophes. Which of the following does the technician need to consider before preparing a network disaster recovery plan? (Select TWO)
CorrectIncorrect -
Question 37 of 70
37. Question
Which of the following network applications is MOST likely to be negatively impacted by jitter?
CorrectIncorrect -
Question 38 of 70
38. Question
Which of the following servers is used in 802.1X-based networks to authenticate users?
CorrectIncorrect -
Question 39 of 70
39. Question
One purpose of a brute-force attack is to:
CorrectIncorrect -
Question 40 of 70
40. Question
Which of the following attacks doesn’t require the use of technology in order to get access to sensitive data?
CorrectIncorrect -
Question 41 of 70
41. Question
Which of the following represents an authorized simulated attack on a system with the purpose of identifying weak spots that attackers could take advantage of?
CorrectIncorrect -
Question 42 of 70
42. Question
Which of the following security concepts is a dictionary that provides definitions for publicly disclosed cybersecurity vulnerabilities and exposures?
CorrectIncorrect -
Question 43 of 70
43. Question
A network security engineer is tasked with implementing a solution to allow users from untrusted networks to access the Web Server and the Mail Server while keeping the private network secured and inaccessible. Which of the following does the engineer need to implement to complete the task?
CorrectIncorrect -
Question 44 of 70
44. Question
In which of the following API attacks does the attacker intercept communications between an API endpoint and a client in order to steal and/or alter the confidential data that is passed between them?
CorrectIncorrect -
Question 45 of 70
45. Question
A security expert is tasked with implementing a solution to prevent Rogue DHCP servers from offering IP addresses to end-users within an organization. Which of the following security technology does the expert need to implement to meet the requirement?
CorrectIncorrect -
Question 46 of 70
46. Question
An attacker breaks into a password-protected computer by systematically entering every word in a dictionary as a password. What type of attack does the attacker carry out?
CorrectIncorrect -
Question 47 of 70
47. Question
A technician is tasked with improving the wired network security within an organization by limiting the number of MAC addresses on a given port. Packets that have a matching MAC address should be considered secure packets and should be forwarded; all other packets (unsecured packets) should be restricted. Which of the following features does the technician need to implement to complete the task?
CorrectIncorrect -
Question 48 of 70
48. Question
A network administrator is tasked with accessing a remote computer to handle some administrative tasks over an unsecured network in a secure way. Which of the following protocols does the administrator need to use to connect to the device?
CorrectIncorrect -
Question 49 of 70
49. Question
An administrator is tasked with implementing a solution that will provide limited capabilities (such as browsing) to guest Wi-Fi users while keeping the rest of the user roles untouched. Which of the following technologies does the administrator need to implement?
CorrectIncorrect -
Question 50 of 70
50. Question
Drag and drop the social engineering attacks into their respective fields.
Sort elements
- Phishing
- Tailgating
- Shoulder surfing
-
An attack that uses masquerade email as a means of taking advantage of users
-
A type of attack in which someone without the proper authentication follows an authenticated employee into a restricted area
-
A type of data theft where cybercriminals steal personal information or confidential information by peering over the target’s shoulders
CorrectIncorrect -
Question 51 of 70
51. Question
Which of the following describes the loss of signal strength as a signal travels through a particular medium?
CorrectIncorrect -
Question 52 of 70
52. Question
Sort the steps that need to be done to troubleshoot faulty networks according to CompTIA troubleshooting methodology.
-
Document findings, actions, and outcomes
-
Establish a plan of action to resolve the problem and identify potential effects
-
Verify full system functionality and, if applicable, implement preventive measures
-
Identify the problem
-
Establish a theory of probable cause
-
Test the theory to determine the cause
-
Implement the solution or escalate as necessary
View Answers:
CorrectIncorrect -
-
Question 53 of 70
53. Question
Users complain they can’t reach the site www.examsdigest.com but they can reach other sites. You try to access the site and discover you can’t connect either, but you can ping the site with its IP address. Which of the following is the most possible cause?
CorrectIncorrect -
Question 54 of 70
54. Question
A network technician is tasked with labeling the cables in a wiring closet. Which of the following tools does the technician need to locate the physical ends of the cable?
CorrectIncorrect -
Question 55 of 70
55. Question
You are receiving calls from different users stating they are getting an error message concerning duplicate IP addresses being detected on their systems, as in the image below.
These users aren’t able to connect to the internet or access any file which resides outside of their network. Which of the following servers should you check first in order to troubleshoot this issue?
CorrectIncorrect -
Question 56 of 70
56. Question
Your close friend Peter is facing an issue with his browser. Each time he types www.google.com on Google Chrome, the URL redirects him to www.malware.com. He cannot find out what’s happening, as the rest of the URLs work fine. Which of the following does Peter need to do to fix the issue?
CorrectIncorrect -
Question 57 of 70
57. Question
The accounting department is complaining they aren’t able to connect to the internet. You connect your laptop to the accounting department’s network and open the command prompt to type the command
ipconfig/all
. The command provides your IPv4 address which is 192.168.1.10, your subnet mask 255.255.255.0, and your default gateway 192.168.1.1. Next, you run the commandping 145.3.5.87
but you don’t get any successful reply, you just get the message “Request timed out”. Next, you ping the workstation on the same network by typing the commandping 192.168.1.11
and you receive four successful replies. Which of the following is MOST likely the issue in the accounting department?CorrectIncorrect -
Question 58 of 70
58. Question
Which of the following is the FIRST step of the CompTIA troubleshooting methodology process?
CorrectIncorrect -
Question 59 of 70
59. Question
Which of the following is the SECOND step of the CompTIA troubleshooting methodology?
CorrectIncorrect -
Question 60 of 70
60. Question
Which of the following tools does a technician need to fix a faulty fiber optic connection?
CorrectIncorrect -
Question 61 of 70
61. Question
You have been tasked with configuring a static route on a Windows workstation. The destination network has an IP of 192.168.60.0 with a subnet mask 255.255.255.0, and the gateway IP is 192.168.0.1. Type the command to complete the task.
-
C:\ExamsDigest\Student_1>
CorrectIncorrect -
-
Question 62 of 70
62. Question
A technician is called to troubleshoot a client PC that is not connecting to the network. Upon investigation, the technician realized that he needs to request a new IP Address from the DHCP server. Which of the following commands does the technician need to type? (Select TWO)
CorrectIncorrect -
Question 63 of 70
63. Question
A network technician is tasked with installing three 802.11n (2.4 GHz) wireless access points in a single room. Which of the following channels does the technician need to select to avoid Wi-Fi interference?
CorrectIncorrect -
Question 64 of 70
64. Question
A network administrator is tasked with identifying what causes unusual application network loads within an organization. Which of the following tools does the administrator need to use to pinpoint the issue?
CorrectIncorrect -
Question 65 of 70
65. Question
A hacker introduces corrupt Domain Name System (DNS) data into a DNS resolver’s cache to redirect users either to the wrong websites or to his own computer. What type of DNS attack does the hacker implement in this scenario?
CorrectIncorrect -
Question 66 of 70
66. Question
A network engineer is tasked with designing the Classless (variable-length subnet mask) IP scheme for a new campus network. Which of the following number of subnet bits is required to create 200 subnets?
CorrectIncorrect -
Question 67 of 70
67. Question
A network technician is tasked with implementing a solution to increase the local area network security within an organization. All of the company’s external-facing servers (Web server, FTP server) should be placed in a separate area in order to be accessible from the internet, and the rest servers (Mail server, Storage server) of the internal LAN to be unreachable. Which of the following techniques does the technician need to implement to meet the requirement?
CorrectIncorrect -
Question 68 of 70
68. Question
A network technician has been notified that an available wireless device is using 2.4 GHz and has been asked to install a new 5 GHz wireless device on the existing network to prevent interference. Which of the following 802.11 standards should the technician install to provide a 5 GHz wireless network?
CorrectIncorrect -
Question 69 of 70
69. Question
What is the broadcast address associated with the host located at 40.20.3.2/30?
CorrectIncorrect -
Question 70 of 70
70. Question
A network technician is connecting two separate networks by configuring the interface of the routers. The new network has an IP of 30.40.50.4/30. Which of the following IPs does the technician need to assign to the routers?
CorrectIncorrect