CompTIA Network+ certification 試験
Question No : 1
A technician troubleshooting an area that is having difficulty connecting to a WAP.
After identifying the symptoms, which of the following should the technician do NEXT?
Question No : 2
A company is setting up a brand new datacenter and would like to keep the cabling infrastructure out of sight but still accessible to the network administrators. Infrastructure cost is not an issue.
Which of the following should be installed to meet the requirements?
Question No : 3
A network engineer is designing a campus-wide wireless network. Wireless access points will be distributed across the campus for maximum availability. The network is to be designed to handle a large number of roaming wireless devices.
Which of the following features should the engineer use in order to dynamically limit the number of devices in each broadcast domain?
Question No : 4
A network architect is designing a highly redundant network with a distance vector routing protocol in order to prevent routing loops, the architect has configured the routers to advertise failed routes with the addition of an infinite metric.
Which of the following methods has the architect chosen?
https://books.google.co.za/books?id=C5G6DAAAQBAJ&pg=PT1507&lpg=PT1507&dq=advertise+ failed+routes+with+the+addition+of+an+infinite+metric&source=bl&ots=hPhUeuDuis&sig=d2zmlLr jHOSadqWLfeFEPjfNJjU&hl=en&sa=X&ved=0ahUKEwi_z9Gr5vXQAhUhJMAKHRFHCeQQ6AEI GjAA#v=onepage&q=advertise%20failed%20routes%20with%20the%20addition%20of%20an%20 infinite%20metric&f=false
Question No : 5
When a criminal or government investigation is underway, which of the following describes the identification, recovery or exchange of electronic information relevant to that investigation?
Question No : 6
Policies, procedures and end-user training are effective ways to mitigate:
Question No : 7
Which of the following is the number of bits there are in 1024 bytes?
Question No : 8
A network administrator is troubleshooting an issue with unstable wireless connections in a residence hall. Students on the first and second floors are reporting the hall’s SSID is not visible in the evenings. The network administrator has verified the wireless system is operating normally.
Which of the following is the MOST likely cause for the problem reported by students?
Question No : 9
Which of the following is an example of a signaling protocol used in VoIP telephony?
Question No : 10
A network administrator has determined the ingress and egress traffic of a router’s interface are not being correctly reported to the monitoring server.
Which of the following can be used to determine if the router interface uses 64b vs 32b counters?
Question No : 11
Ann, a technician, connects a pair of switches using redundant links. When she checks the status of the links, one of them is not active, even when she changes ports.
Which of the following MOST likely disabled the redundant connection to the other switch?
A, Spanning tree
B. IGRP routing
C. SSID mismatch
D. Port mirroring
Question No : 12
Several users at an adjacent office building report connectivity issues after a new building was built in between the two offices. The network technician has determined the adjacent office building is connected to the main office building via an 802.11ac bridge. The network technician logs into the AP and confirms the SSID, encryption and channels are all correct.
Which of the following is MOST likely the cause of this issue?
Question No : 13
After upgrading a fiber link from 1Gbps, a network technician ran a speed test of the link. The test shows the link is not operating at full speed and connectivity is intermittent. The two buildings are 1.476ft (450m) apart and are connected using CM4 fiber and 10G SR SFPs. The fiber runs through the electrical and boiler rooms of each building.
Which of the following is the MOST likely reason for the connectivity issue?
Question No : 14
A network administrator wants to implement a centralized monitoring solution that utilizes push alerts sent from the client to a server.
Which of the following types of monitoring should be put in place?
Question No : 15
Which of the following ports does SIP use?