Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Network + 2023 Questions and answer - Part 36

Mary Smith

Fri, 17 Apr 2026

Comptia Network + 2023 Questions and answer - Part 36

1. A disgruntled employee decides to leak critical information about a company's new product. The employee places keyloggers on the department's computers, allowing the information to be sent out to the Internet. Which of the following attacks is occurring?

A) A. Man-in-the-middle
B) B. Logic bomb
C) C. Insider threat
D) D. Social engineering



2. A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from the vendor's website. Before installing the firmware update, which of the following steps should the technician perform to ensure file integrity?

A) A. Perform antivirus and anti-malware scans of the file.
B) B. Perform a hash on the file for comparison with the vendor's hash.
C) C. Download the file a second time and compare the version numbers.
D) D. Compare the hash of the file to the previous firmware update.



3. Management has requested that services be available within 72 hours of a disaster. Budget is a major concern. A contract is signed with a company that has plenty of space, and the technician will have the option of putting infrastructure equipment in place. Which of the following BEST describes this business continuity strategy?

A) A. Cold site
B) B. Differential backup
C) C. Hot site
D) D. Incremental backup
E) E. Warm site
F) F. Full backup

4. A network administrator is assigned to run and connect a Cat 6e Ethernet cable between two nodes in a datacenter. Which of the following connector types should the network administrator use to terminate this cable?

A) A. DB-9
B) B. RS-232
C) C. DB-25
D) D. RJ-45



5. A technician is setting up a wireless access point in a coffee shop. The shop is not concerned with security but only wants to allow customers to have access.Which of the following configurations should the technician deploy?

A) A. Use a pre-shared key.
B) B. Set up EAP.
C) C. Configure RADIUS.
D) D. Configure MAC filtering.



1. Right Answer: C
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: A
Explanation:

0 Comments

Leave a comment