Comptia Network +

Dear All,

I’m asking if there is any PDF file to read about Comptia Netwrok + for jason dion

Best regards
Osamah

I am looking for the same

  1. Company policy dictates that full backups are taken every Sunday evening, and incremental backups occur Monday through Saturday in the evening. If data loss were to occur on a Thursday before the backup window, which of the following is the number of backup sets that would be needed to retrieve the lost data come.
    Friday morning?
  • A. 1
  • B. 2
  • C. 3
  • D. 4
  • E. 5
  1. A network engineer has connected the storefront with the maintenance shed on the other side of a golf course using 802.11 wireless bridges and omnidirectional antennas. However, the signal strength is too weak. Which of the following is the MOST efficient and cost-effective solution to solve the issue?
  • A. Replace the omnidirectional antennas with unidirectional antennas.
  • B. Put protective enclosures around the omnidirectional antennas to prevent damage from golf balls.
  • C. Replace the 802.11 wireless standards and use GSM instead.
  • D. Replace the wireless bridges with wireless routers.
  1. A network administrator is attempting to limit the installation of malware on company workstations. The administrator wants to remove root access from the user accounts. Which of the following is this an example of?
    • A. Changing default credentials
    • B. Limiting spoofing
    • C. Role separation
    • D. Port security

  2. A technician is trying to configure a previously owned WAP. The technician successfully logs into the administrative console and attempts to input the IP address on the WAP. However, the WAP is not accepting the command. Which of the following is causing the problem?
    • A. The WAP antenna is damaged
    • B. The WAP transmitter light is dim
    • C. The terminal emulation software is misconfigured
    • D. The LWAPP image is installed on the WAP

  3. A vendor is installing an Ethernet network in a new hospital wing. The cabling is primarily run above the celling grid near air conditioning ducts and sprinkler pipes.
    Which of the following cable types is required for this installation?
    • A. Plenum
    • B. PVC
    • C. Single-mode
    • D. Cat 7

  4. A company needs to create a new website for the delivery of secure content to and from specific customers. The Chief Information Officer (CIO) states as a requirement the creation of a secure connection between the client’s machine and the website every time the content is accessed. This should be accomplished without requiring the installation of any client software. Which of the following should be used in this scenario?
    • A. Site-to-site VPN
    • B. GRE
    • C. MPLS
    • D. SSL

  5. A company requires a network storage solution that allows for the use of OS-specific credentials and permissions. The company purchases a SOHO solution, which includes support for SMB, iSCSI, FTP, Telnet, and NFS natively out of the box. Which of the following should be done FIRST?
    • A. Verify user credentials.
    • B. Generate new keys and certificates.
    • C. Disable unnecessary services.
    • D. Hash files that will be stored.

  6. The network team at a university, which has on–campus residences, recently expanded the WiFi offerings to the dormitories. Each dormitory houses approximately 75 students, who each have multiple wireless devices. The WLAN utilizes an intelligent wireless controller for configuration and management. While the WiFi in academic buildings continues to receive few to no complaints, dormitory complaints are on the rise. Which of the following is MOST likely causing the complaints?

A. Frequency mismatch

B. Crosstalk

C. Interference

D. Channel overlap

  1. A wireless network is set up in a mesh configuration that has experienced recent growth. Some of the access points are four hops away in the mesh network.
    Users at these access points are reporting slow download speeds despite being the sole users on the access point. Which of the following would BEST resolve this issue?
    • A. Add more access points to the mesh network.
    • B. Increase transmit power levels on the access points.
    • C. Physically connect more access points.
    • D. Change the antenna type on the WAPs.

  2. As part of a new datacenter upgrade project, the security manager has asked for additional physical security to prevent asset theft. Which of the following technologies should be implemented?
    • A. Video surveillance
    • B. Motion detection alarms
    • C. Asset tracking tags
    • D. Locks on devices

  3. Which of the following protocols operates at the data link layer of the OSI model?
    • A. IGRP
    • B. BGP
    • C. PPP
    • D. FTP

  4. A technician is required to install a new DOCSIS-based Internet connection. Which of the following medium types does this use?
    • A. Cat6a
    • B. RG-6
    • C. UTP
    • D. Multimode
    • E. Single mode

  5. A network administrator is reviewing the following output from a switch:

Which of the following attacks has occurred on the switch?
IP Address MAC Address
10.10.20.1 07:b9:56:14:ab:17
10.10.20.2 aa:aa:aa:aa:aa:aa
10.10.20.3 bb:bb:bb:bb:bb:bb
10.10.20.4 07:b9:56:22:ae:01

• A. DNS poisoning
• B. ARP poisoning
• C. VLAN hopping
• D. MAC address spoofing

  1. Which of the following components should be used to provide interconnectivity between virtual machines in distinct broadcast domains inside the hypervisor’s environment?
    • A. Virtual router
    • B. Virtual switch
    • C. Virtual NIC
    • D. Virtual SAN

  2. Which of the following are reasons for enabling jumbo frames? (Choose two.)
    • A. To increase payload size
    • B. To increase bandwidth
    • C. To provide additional SANs storage capacity
    • D. To implement larger SQL queries
    • E. To reduce CPU overhead

  3. A network technician is investigating why a user cannot print to the network printer. The technician wants to determine if anything has changed. Which of the following actions would be the BEST example of this troubleshooting step?
    • A. Attempt to log in from another computer with the user’s credentials.
    • B. Log into the switch and reconfigure the printer port.
    • C. Review the maintenance logs from the night before.
    • D. Reinstall print drivers on the user’s machine.

  4. A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off one end of the cable. Which of the following should the technician do to make a crossover cable before crimping the new plug?
    • A. Reverse the wires leading to pins 1 and 2
    • B. Reverse the wires leading to pins 1 and 3
    • C. Reverse the wires leading to pins 2 and 3
    • D. Reverse the wires leading to pins 2 and 4

  5. A new technician is connecting an access switch to a distribution switch uplink in a datacenter using fiber cables. Which of the following are transceivers the technician should use to perform this job? (Choose two.)
    • A. RJ45
    • B. DB-9
    • C. LC
    • D. SFP
    • E. GBIC
    • F. SC

  6. An ISP technician frequently needs to administer a router remotely in the event of a configuration error or WAN outage. Which of the following technologies would facilitate the required connectivity?
    • A. Remote access VPN
    • B. Remote file access
    • C. Out-of-band
    • D. Secure Shell

  7. A company will be hosting a large workshop for local business leaders, and management wants to provide an easy-to-connect-to guest wireless network for them to access while on site. The network will be disabled after the workshop. The current wireless network has the option to enable a segmented guest network that has not been implemented. Which of the following authentication methods should be used to make the network EASIEST for guests to access?
    • A. Pre-shared key
    • B. Open
    • C. EAP-TLS
    • D. WPA2

  8. A user reports a laptop wireless connection is working at the user’s desk but not in a recent building addition. A network administrator logs into the wireless controller, searches for the user’s MAC address, and receives the following results:
    Timestamp MAC Address RSSI
    10:30 AM 01-B3-DD-09-64-FF -48dB
    3:00 PM 01-B3-DD-09-64-FF -110dB

Which of the following describes the reason for the issue?
A. Frequency mismatch
B. Distance limitation
C. Channel overlap
D. Wrong SSID

Could someone help? I need the answers for the above questions, please?
Thanks in advance.

Is it some kind of exam you are giving? Where did you get these questions from?

I’m preparing for the CompTIA Network+ exam. So, I have been working on many Network+ materials from different websites.

For some questions, the answers were different.

One website says option A is right, another website says Option B is right for the same question.

Even I got confused, which is why I have posted nearly 23 questions to know the right answer.

If anyone could help me, that would be great.

Thank you.

Use Jason Dion’s + Professor Messer’s , Total Seminars practice exams. And don’t use exam brain dumps. If you use the practice exams of the 3 above and get an average of 85 to 90% of the questions right, you are all set for the real exam. Don’t remember the questions. The idea is that you really understand what the questions are about. On the real exam, the questions are all different from the practice exams. Good Luck!