Skip to main content

Network+ Practice Test (V9)

Dive into practice questions

Question 1

Which of the following should a junior security administrator recommend implementing to mitigate malicious network activity?

A. IPS

B. Honeypot

C. SIEM

D. VPN

Question 2

Which of the following ports is a secure protocol?

A. 20

B. 23

C. 443

D. 445

Question 3

Which of the following antenna types would most likely be used in a network repeater that is housed in a central point in a home office?

A. Omnidirectional

B. Parabolic

C. High-gain

D. Patch

Question 4

A network engineer wants to improve network availability. Which of the following should the engineer install in the main closet?

A. An uninterruptible power supply

B. A gaseous fire suppression system

C. Lockable cabinets

D. A voltage monitor

Question 5

Which of the following refers to a weakness in a mechanism or technical process?

A. Vulnerability

B. Risk

C. Exploit

D. Threat

Question 6

While working in a coffee shop, an attacker watches a user log in to a corporate system and writes down the user's log-in credentials. Which of the following social engineering attacks is this an example of?

A. Shoulder surfing

B. Dumpster diving

C. Phishing

D. Tailgating

Question 7

Which of the following is the first step a network administrator should take in the troubleshooting methodology?

A. Establish a plan of action.

B. Document findings and outcomes.

C. Test the theory to determine cause.

D. Identify the problem.

Question 8

A technician is troubleshooting a user's connectivity issues and finds that the computer's IP address was changed to 169.254.0.1. Which of the following is the most likely reason?

A. Two or more computers have the same IP address in the ARP table.

B. The computer automatically set this address because the DHCP was not available.

C. The computer was set up to perform as an NTP server.

D. The computer is on a VPN and is the first to obtain a different IP address in that network.

Question 9

Which of the following cloud deployment models involves servers that are hosted at a company's property and are only used by that company?

A. Public

B. Private

C. Hybrid

D. Community

Question 10

Which of the following kinds of targeted attacks uses multiple computers or bots to request the same resource repeatedly?

A. On-path

B. DDoS

C. ARP spoofing

D. MAC flooding

Answer key

Question 1: A (IPS)

Question 2: C (443)
Question 3: A (Omnidirectional)
Question 4: A (An uninterruptible power supply)
Question 5: A (Vulnerability)
Question 6: A (Shoulder surfing)
Question 7: D (Identify the problem)
Question 8: B (The computer automatically set this address because the DHCP was not available)
Question 9: B (Private)

Question 10: B (DDoS)