CompTIA Network+ Certification Exam 試験
Question No : 1
A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP.
Which of the following features of the firewall is responsible for blocking RDP?
Question No : 2
A technician needs to make a web server with a private IP address reachable from the Internet.
Which of the following should the technician implement on the company firewall?
Question No : 3
A technician is troubleshooting a network issue and needs to view network traffic on a switch in real-time.
Which of the following would allow the technician to view network traffic on a switch?
Question No : 4
A firewall that detects and prevents attacks from outside the network based on learned data patterns can BEST be described as which of the following?
Question No : 5
A network administrator wants to perform a test to see if any systems are passing clear text through the network.
Which of the following would be used?
Question No : 6
A technician needs to install a new wireless encryption system. They are evaluating the feasibility of implementing WPA.
WPA increases protection over WEP by implementing which of the following?
A. Strong RC4 encryption
B. Shared secret keys
C. AES encryption
D. Key rotation
Question No : 7
An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances.
Which of the following tools would MOST likely accomplish this?
Question No : 8
A network technician is doing a wireless audit and finds an SSID that does not match the company’s SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default.
Which of the following threats did the network technician find?
Question No : 9
A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain username and password.
Which of the following would a network administrator deploy to implement these requirements? (Select TWO).
Question No : 10
A company is experiencing a denial of service attack and wants to identify the source IP address of the attacker in real time.
Which method is the BEST way to accomplish this?
Question No : 11
Which of the following should be mitigated by employing proper coding techniques when developing software?
Question No : 12
A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with the assigned IP 192.168.0.15 from the Internet.
Which of the following is the correct firewall rule?
Question No : 13
A security appliance is blocking a DDoS attack on the network.
Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?
Question No : 14
Malicious users have used multiple workstations to target a single server with the intent of preventing legitimate users from accessing the server.
This server suffered which of the following types of attack?
Question No : 15
Many of the corporate users work from a coffee shop during their lunch breaks. The coffee shop only has an open wireless network.
Which of the following should the administrator recommend to users to secure their wireless communications at the coffee shop?