Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Network + 2023 Questions and answer - Part 22

Mary Smith

Fri, 17 Apr 2026

Comptia Network + 2023 Questions and answer - Part 22

1. The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager notices the hostnames all appear to be randomly generated characters. Which of the following would BEST assist the security manager identifying systems involved in security incidents?

A) A. Enforce port security to require system authentication
B) B. Implement a standardized UNC
C) C. Label existing systems with current hostnames
D) D. Forward the DHCP logs to the security manager every day



2. A network technician has just configured NAC for connections using Cat 6 cables. However, none of the Windows clients can connect to the network.Which of the following components should the technician check on the Windows workstations? (Choose two.)(Select 2answers)

A) A. Start the Wired AutoConfig service in the Services console
B) B. Enable IEEE 802.1q Authentication in Network Interface Card Properties
C) C. Enable IEEE 802.1x Authentication in Network Interface Card Properties
D) D. Start the Wireless AutoConfig service in the Services console
E) E. Enable IEEE 802.3 Ethernet IPv6 in Network Interface Card Properties


3. The IT manager at a small firm is in the process of renegotiating an SLA with the organization's ISP. As part of the agreement, the organization will agree to a dynamic bandwidth plan to provide 150Mbps of bandwidth. However, if the ISP determines that a host on the organization's internal network produces malicious traffic, the ISP reserves the right to reduce available bandwidth to 1.5 Mbps. Which of the following policies is being agreed to in the SLA?

A) A. Session hijacking
B) B. Blocking
C) C. Throttling
D) D. Data usage limits
E) E. Bandwidth quotas


4. A network administrator would like to collect information from several networking devices using SNMP. Which of the following SNMP options should a network administrator use to ensure the data transferred is confidential?

A) A. authpriv
B) B. SHA
C) C. MD5
D) D. Authentication passphrase



5. Which of the following is a system of notation that uses base 16 rather than base 10?

A) A. Hex
B) B. Octal
C) C. Binary
D) D. CIDR



1. Right Answer: B
Explanation:

2. Right Answer: A,C
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: A
Explanation:

0 Comments

Leave a comment