Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Network + 2023 Questions and answer - Part 75

Mary Smith

Tue, 21 Apr 2026

Comptia Network + 2023 Questions and answer - Part 75

1. Which of the following BEST describes the characteristics of a differential backup solution?

A) A. Backs up files with the creation or modified date as the current date.
B) B. Backs up all files and sets the archive bit.
C) C. Backs up files with a date earlier than today's date with a clear archive bit.
D) D. Backs up files with the archive bit set but does not clear the bit.



2. A network technician has deployed a new 802.11ac network and discovers some of the legacy POS equipment only supports WPA and 802.11a. Which of the following is the MOST secure method of connecting all devices while avoiding a performance impact to modern wireless devices?

A) A. Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility.
B) B. Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices.
C) C. Connect the legacy devices with a PSK while the modern devices should use the more secure EAP.
D) D. Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption.



3. A network technician is setting up the wireless network for a company's new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to set up the WAPs?

A) A. Channel 6
B) B. Channel 7
C) C. Channel 9
D) D. Channel 10



4. Log files show the admin user has logged into a public-facing device on several occasions in the evening. None of the technicians admit to doing any after-hours work, and the password has been changed several times but failed to prevent the logins. Which of the following should be the NEXT step to attempt to harden the device?

A) A. Disable unused ports.
B) B. Reset the two-factor token.
C) C. Disable virtual ports.
D) D. Upgrade the firmware.



5. A human resources manager notifies the IT manager the night before an employee will be terminated so the employee's access rights can be removed. Which of the following policies is being exercised?

A) A. Privileged user agreement
B) B. AUP
C) C. Non-disclosure agreement
D) D. Offboarding



1. Right Answer: A
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: D
Explanation:

0 Comments

Leave a comment