CompTIA Network+

Currently seeing questions 1 - 5 out of 620
Currently on page 1 out of 124

Question 1Topic 1

A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use
2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?

A. 802.11ac

B. 802.11ax

C. 802.11g

D. 802.11n

Question 2Topic 1

Which of the following would be BEST to use to detect a MAC spoofing attack?

A. Internet Control Message Protocol

B. Reverse Address Resolution Protocol

C. Dynamic Host Configuration Protocol

D. Internet Message Access Protocol

Question 3Topic 1

A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?

A. NetFlow analyzer

B. Bandwidth analyzer

C. Protocol analyzer

D. Spectrum analyzer

Question 4Topic 1

Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?

A. Verify the session time-out configuration on the captive portal settings

B. Check for encryption protocol mismatch on the client's wireless settings

C. Confirm that a valid passphrase is being used during the web authentication

D. Investigate for a client's disassociation caused by an evil twin AP

Question 5Topic 1

A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?

A. Evil twin

B. Tailgating

C. Piggybacking

D. Shoulder surfing