Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Network + 2023 Questions and answer - Part 20

Mary Smith

Thu, 16 Apr 2026

Comptia Network + 2023 Questions and answer - Part 20

1. A network administrator has a monitoring system in place that is currently polling hundreds of network devices at regular intervals. The continuous polling is causing high CPU utilization on the server. Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full monitoring capabilities?

A) A. Remove SNMP polling and configure SNMP traps on each network device
B) B. Remove SNMP polling and implement snmpwalk on each network device
C) C. Upgrade SNMP to the latest version to mitigate vulnerabilities
D) D. Modify SNMP polling to poll only during business hours



2. A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)(Select 2answers)

A) A. Point-to-multipoint
B) B. Bus
C) C. Point-to-point
D) D. Mesh
E) E. Peer-peer
F) F. Ring

3. A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of the primary data-center. The Chief Information Officer (CIO) is concerned because this contract does not include a long-term strategy for extended outages. Which of the following should the CIO complete?

A) A. Disaster recovery plan
B) B. Business continuity plan
C) C. Service level agreement
D) D. First responder training



4. The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

A) A. penetration testing
B) B. vulnerability scanning
C) C. reconnaissance
D) D. social engineering



5. A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee's computer. This type of attack is an example of:

A) A. ARP cache poisoning
B) B. IP spoofing
C) C. amplified DNS attack
D) D. evil twin



1. Right Answer: A
Explanation:

2. Right Answer: C,D
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: A
Explanation:

0 Comments

Leave a comment