CompTIA A+ Core 2 Question I-89

A technician needs to ping a client’s machine that the technician is working on, to ensure that the network card is functioning correctly. Which of the following IP addresses should be used?

A. 10.76.0.1
B. 127.0.0.1
C. 192.168.0.1
D. 255.255.255.0

Correct Answer: B

CompTIA A+ Core 2 Question I-85

A technician is called into an office where multiple users are reporting duplicate IP address errors. Upon arrival, the technician skims notes from the previous technician who serviced the office and finds that DHCP functionality was disabled on the internal router. Which of the following explanations is MOST likely the issue?

A. The previous technician turned off DHCP to free up resources for QoS functionality.
B. The previous technician decided to use DNS instead of DHCP for handling IP addresses.
C. The previous technician moved the office to a mismanaged static IP address setup.
D. The previous technician did not setup DHCP reservations properly and therefore the router is giving multiple users the same IP.

Correct Answer: C

CompTIA A+ Core 2 Question I-52

A technician, Peter, has a wired switch in a conference room for guests. In which of the following ways could Peter restrict the network to only six devices at a time, with minimum management effort? (Select TWO).

A. Disable the extra Ethernet ports on the switch
B. Configure DHCP for six addresses maximum
C. Enable Spanning Tree protocol
D. Create an access control list for each new PC
E. Configure DNS to only resolve six IP addresses F: Add each guest to the MAC filter list

Correct Answer: AB

CompTIA A+ Core 2 Question I-43

Which of the following is the correct path to determine the IP address on an iOS device?

A. General> Settings> Wi-Fi> SSID Name> Network> IP address
B. Wi-Fi> SSID Name> Network> IP address
C. Settings> General> Network> Wi-Fi> SSID Name> IP address
D. Location Services> Settings> Wi-Fi> SSID Name> Network> IP address

CompTIA A+ Core 2 Question I-40

A SOHO has had several issues with various unauthorized devices consuming the network’s bandwidth. There are only four network devices that are authorized to access the Internet as well as the local LAN’s resources. Which of the following security implementations would MOST likely help disable network access to the unauthorized devices?

A. Using complex passwords
B. Disabling the use of static IP addresses
C. Disabling ports
D. MAC filtering

Correct Answer: D

CompTIA A+ Core 2 Question H-22

A technician has a list of IP addresses that the technicians manager needs the network names for. Which of the following commands would be used?

A. NBTSTAT – A
B. PING – t
C. NETSTAT
D. NBTSTAT – a

Correct Answer: A

CompTIA A+ Core 2 Question G-66

A technician installs a new SOHO wireless router to replace a failed router and users report connectivity issues and IP errors. Which of the following is the MOST likely cause?

A. Their server has gone down
B. There are too many static IP addresses on the network
C. The new routers firewall is malfunctioning
D. Users need to refresh their IP configuration

Correct Answer: D