Exam Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the exam before. Hence you can not start it again.
Exam is loading…
You must sign in or sign up to start the exam.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
-
Need More Help?
PocketPrep is our recommended provider for CompTIA Network+ prep courses. Make sure you pass your exam the first time around.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
What fiber type would you use if the requirements to be met included an SMF media type, 1Gbps bandwidth capacity, and a distance limitation of 5 km?
CorrectIncorrect -
Question 2 of 10
2. Question
What practice allows you to use different subnet masks in a network schema to maximize the efficiency of the number of devices to be accommodated in each network?
CorrectIncorrect -
Question 3 of 10
3. Question
Which of the following best describes a private cloud?
CorrectIncorrect -
Question 4 of 10
4. Question
The thermostat in a building has been configured to relay temperature and humidity information back to the HVAC controller and a data server via an Ethernet connection.
What kind of network device is this thermostat?
CorrectIncorrect -
Question 5 of 10
5. Question
Which routing protocol controls routing loops by limiting one of its metrics to the destination by imposing a maximum hop count of 15?
CorrectIncorrect -
Question 6 of 10
6. Question
The network administrator has received an alert regarding excessive bandwidth using a MIB number for a switch. Which application port number was used to deliver this alert?
CorrectIncorrect -
Question 7 of 10
7. Question
Which type of physical authentication is a credit-card-sized device that stores information about the user to gain access to either a workstation or a secured area?
CorrectIncorrect -
Question 8 of 10
8. Question
What aspect of modern cyber security ensures that data is not manipulated in transit?
CorrectIncorrect -
Question 9 of 10
9. Question
Reynaldo has responded to a trouble ticket in which the user has a network connectivity problem. Upon investigation, Reynaldo has determined that the user’s computer has an APIPA address.
What is the best method for Reynaldo to resolve this issue?
CorrectIncorrect -
Question 10 of 10
10. Question
Rena reports that she cannot send or receive emails. You are assigned her case. In step 1 of the troubleshooting process, you ask Rena questions and receive the following responses:
- Q: When was the last time you received an email?
- A: Five minutes ago.
- Q: Can you a22ess www.google.com through your web browser?
- A: No.
You also inspect the computer and confirm these answers, and you determine that the cabling is properly connecting the computer to the network and that the IP address is properly configured.
You establish and verify a theory of probable cause that the network card is not functioning properly.
Which of the following information should be included in your plan to resolve the problem?
CorrectIncorrect