Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
Network+ Practice Test 10
Home
Network+ Practice Test 10
Start your Network+ Practice Test 10
A user complains that a specific Webpage of a Website is not accessible from the user’s workstation. However, the user can browse the remaining Webpage on the Website. Which of the following troubleshooting approaches is the best suited for this type of problem?
A.Random layer approach
B.Bottom up approach
C.Divide and conquer approach
D.Top down approach
None
In general, what kinds of speeds can be expected from modern Satellite Internet access services?
A.Several tens of kbps
B.Several Mbps
C.Several Gbps
D.Several tens of Mbps
None
During the troubleshooting procedure of a networking problem, after the plan of action has been implemented, which of the following should be done?
A.Nothing, the troubleshooting procedure has ended.
B.Verify full system functionality
C.Re-run the troubleshooting procedure to double-check the results
D.Review the action plan procedure.
None
Where would you place a wireless access point to provide the best Wi-Fi service to users?
A.As high as possible
B.As close as possible to the telecom closet
C.As far away as possible from walls and other obstacles
D.As close as possible to the users
None
Whenever portfast is enabled on a switch port, which of the following should also be enabled to mitigate switch spoofing attacks?
A.Root guard
B.STP guard
C.Flood guard
D.BPDU guard
None
You are asked to determine which Ethernet deployment standard should be used to interconnect a telecom closet on the 10th floor of a building to the data center found on the first floor. Maximum speeds required are 1000 Mbps while multi-mode fiber is used for this link with a total cable length of no more than 450 meters. What would be the best choice?
A.1000BASE-TX
B.1000BASE-SX
C.100BASE-LX
D.1000BASE-LX
None
When designing network security, you need to ensure some level of physical security. Which of the following is one of the most basic physical security devices that should always be used to control access to restricted areas?
A.AAA access procedures
B.Console access
C.Locks
D.Smart cards
E.Physical access control
None
Flood guard can protect a switch port from which of the following? [Choose two that apply.]
A.DDoS attack
B.Illegal VLAN access
C.DoS attack
D.Unauthorized SSH access
None
Which of the following describes a characteristic of an amplified DoS attack?
A.Replies to spoofed IP address form several computers
B.Reduced response times of service
C.Involves traffic from a very large number of computers
D.Magnification of traffic on target system
None
Your organization recently had a security breach. You decide, after management approval, to implement a technology that will help you collate and analyze security logs. You want to be able to perform real-time analysis of security alerts. Which of the following will help you achieve this goal?
A.SNMP
B.Event logs
C.Syslog
D.SIEM
None
Time's up