Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Network + 2023 Questions and answer - Part 26

Mary Smith

Fri, 17 Apr 2026

Comptia Network + 2023 Questions and answer - Part 26

1. An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization's network. As part of the attack, the analyst launches a fake access point matching the SSID of the organization's guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and exploitation. Which of the following attacks has the analyst successfully performed in this scenario?

A) A. Bluesnarfing
B) B. Session hijacking
C) C. MAC spoofing
D) D. VLAN hopping
E) E. Man-in-the-middle


2. Which of the following BEST describes the differences between VLAN hopping and session hijacking?

A) A. VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user's web connection to execute commands
B) B. VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection
C) C. VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges
D) D. VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation



3. Which of the following protocols can be both connection-oriented and connectionless?

A) A. 20 FTP
B) B. 53 DNS
C) C. 67 DHCP
D) D. 80 HTTP



4. An employee wishes to use a personal cell phone for work-related purposes, including storage of sensitive company data, during long business trips. Which of the following is needed to protect BOTH the employee and the company?

A) A. An NDA ensuring work data stored on the personal phone remains confidential
B) B. An AUP covering how a personal phone may be used for work matters
C) C. A consent to monitoring policy covering company audits of the personal phone
D) D. Real-time remote monitoring of the phone's activity and usage



5. A small town is attempting to attract tourists who visit larger nearby cities. A network engineer is asked to implement a network encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following is the network engineer being asked to implement?

A) A. LAN
B) B. PAN
C) C. MAN
D) D. WAN



1. Right Answer: E
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment