FlashGenius Logo FlashGenius
Login Sign Up

CompTIA Network+ Practice Questions: Network Security Domain

Test your CompTIA Network+ knowledge with 10 practice questions from the Network Security domain. Includes detailed explanations and answers.

CompTIA Network+ Practice Questions

Master the Network Security Domain

Test your knowledge in the Network Security domain with these 10 practice questions. Each question is designed to help you prepare for the CompTIA Network+ certification exam with detailed explanations to reinforce your learning.

Question 1

A network administrator notices unusual traffic patterns on the network and suspects a possible ARP spoofing attack. Which tool would be most effective in detecting and confirming this type of attack?

A) Wireshark

B) Nmap

C) Netstat

D) Tracert

Show Answer & Explanation

Correct Answer: A

Explanation: Wireshark is a network protocol analyzer that can capture and analyze network packets. It allows the administrator to inspect ARP packets for anomalies, such as duplicate IP addresses with different MAC addresses, which is indicative of ARP spoofing.

Question 2

Your network uses WPA3 for wireless security. A user reports they cannot connect to the Wi-Fi network. Which of the following is the most likely reason for this issue?

A) The user's device does not support WPA3.

B) The user's device is using a static IP address.

C) The user's device is out of range of the access point.

D) The user's device has an outdated antivirus software.

Show Answer & Explanation

Correct Answer: A

Explanation: WPA3 is a newer wireless security protocol that may not be supported by older devices. If the user's device does not support WPA3, they will be unable to connect to the network until they either update their device or the network is configured to support an older protocol like WPA2.

Question 3

An administrator needs to ensure that only authorized devices can connect to the corporate network. Which network security measure should be implemented?

A) Enable MAC address filtering.

B) Deploy a VPN for remote access.

C) Use a firewall to block unauthorized traffic.

D) Implement a DMZ for web services.

Show Answer & Explanation

Correct Answer: A

Explanation: MAC address filtering allows the network administrator to specify which devices are allowed to connect to the network based on their unique MAC addresses. This helps prevent unauthorized devices from gaining access.

Question 4

Which of the following is a common method to protect against ARP spoofing attacks?

A) Use static ARP entries

B) Enable port mirroring

C) Implement VLANs

D) Disable unused ports

Show Answer & Explanation

Correct Answer: A

Explanation: Using static ARP entries can help protect against ARP spoofing attacks by ensuring that only legitimate IP-to-MAC address mappings are used. This prevents attackers from sending false ARP messages to redirect traffic.

Question 5

A company is setting up a wireless network and wants to ensure that only authorized devices can connect. Which security protocol should they implement to achieve this?

A) WEP

B) WPA2 with pre-shared key

C) WPA2 with 802.1X authentication

D) Open network with MAC filtering

Show Answer & Explanation

Correct Answer: C

Explanation: WPA2 with 802.1X authentication provides strong security by requiring devices to authenticate using a RADIUS server before they can connect to the network, ensuring that only authorized devices gain access.

Question 6

An organization is experiencing a DDoS attack. Which of the following techniques can help mitigate the impact of the attack?

A) Implementing MAC filtering on all network devices.

B) Configuring rate limiting on the network firewall.

C) Disabling unused network services.

D) Enabling port mirroring on the switches.

Show Answer & Explanation

Correct Answer: B

Explanation: Rate limiting can help mitigate a DDoS attack by controlling the amount of incoming traffic and preventing the network from being overwhelmed by excessive requests.

Question 7

An organization wants to prevent unauthorized access to its internal network by implementing network segmentation. Which of the following methods would be most effective?

A) Using a firewall to block all incoming traffic

B) Implementing VLANs to separate network segments

C) Using NAT to hide internal IP addresses

D) Deploying a proxy server for outbound traffic

Show Answer & Explanation

Correct Answer: B

Explanation: Implementing VLANs allows for logical segmentation of the network, creating separate broadcast domains and enhancing security by isolating sensitive data and devices from unauthorized access.

Question 8

During a security audit, you discover that several devices on the network are using Telnet instead of SSH for remote management. What is the primary security risk associated with this configuration?

A) Telnet does not support IPv6.

B) Telnet is not compatible with modern operating systems.

C) Telnet transmits data, including passwords, in plaintext.

D) Telnet cannot be used over wireless networks.

Show Answer & Explanation

Correct Answer: C

Explanation: Telnet transmits all data, including login credentials, in plaintext, which makes it susceptible to interception and eavesdropping by attackers. SSH, on the other hand, encrypts the data, making it a more secure option for remote management.

Question 9

During a security audit, it was found that several network devices have default passwords. Which of the following is the best course of action to mitigate this risk?

A) Implement a password policy requiring complex passwords.

B) Disable remote access to the devices.

C) Change the default passwords immediately.

D) Enable two-factor authentication on the devices.

Show Answer & Explanation

Correct Answer: C

Explanation: Changing the default passwords immediately is crucial as default passwords are well-known and can be easily exploited by attackers. This should be done as a priority to secure the devices.

Question 10

A network administrator notices unusual inbound traffic on TCP port 3389. Which of the following actions should be taken to mitigate a potential security risk?

A) Block the port at the firewall.

B) Change the RDP port to a non-standard port.

C) Implement a VPN for remote access.

D) Enable port forwarding for port 3389.

Show Answer & Explanation

Correct Answer: C

Explanation: Port 3389 is used by Remote Desktop Protocol (RDP). Implementing a VPN for remote access adds a layer of security by encrypting the traffic and requiring authentication before accessing the network, reducing exposure to direct attacks.

Ready to Accelerate Your CompTIA Network+ Preparation?

Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.

  • ✅ Unlimited practice questions across all CompTIA Network+ domains
  • ✅ Full-length exam simulations with real-time scoring
  • ✅ AI-powered performance tracking and weak area identification
  • ✅ Personalized study plans with adaptive learning
  • ✅ Mobile-friendly platform for studying anywhere, anytime
  • ✅ Expert explanations and study resources
Start Free Practice Now

Already have an account? Sign in here

About CompTIA Network+ Certification

The CompTIA Network+ certification validates your expertise in network security and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.