Joe's Network+ Study Exam

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Puppetbat
P
Puppetbat
Community Contributor
Quizzes Created: 1 | Total Attempts: 157
Questions: 34 | Attempts: 157

SettingsSettingsSettings
Network Plus Quizzes & Trivia

This is my Network+ Study Exam


Questions and Answers
  • 1. 

    The MAC Address is associated with which Layer?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    B. 2
    Explanation
    The MAC Address is associated with Layer 2 of the OSI model. Layer 2, also known as the Data Link Layer, is responsible for the physical addressing of devices on the network. MAC addresses are unique identifiers assigned to network interfaces at the hardware level, allowing devices to communicate with each other at the local network level. This layer handles the framing and transmission of data packets between devices on the same network.

    Rate this question:

  • 2. 

    Data is placed into packets at which Layer?

    • A.

      Network

    • B.

      Data Link

    • C.

      Transportation

    • D.

      Session

    Correct Answer
    A. Network
    Explanation
    Data is placed into packets at the Network layer. This layer is responsible for addressing and routing packets across different networks. It takes the data from the upper layers and encapsulates it into packets, adding necessary network information such as source and destination IP addresses. The Network layer ensures that packets are properly delivered to their intended destinations by selecting the best path and handling any necessary routing protocols.

    Rate this question:

  • 3. 

    10GBaseSR has a maximum cable length of ____ meters?

    • A.

      100

    • B.

      300

    • C.

      500

    • D.

      1000

    Correct Answer
    B. 300
    Explanation
    The correct answer is 300. 10GBaseSR is a type of Ethernet standard that uses multimode fiber optic cables. It has a maximum cable length of 300 meters, which means that the cable cannot exceed this length for optimal performance. This limitation is due to the attenuation or loss of signal strength that occurs over longer distances in multimode fiber optic cables.

    Rate this question:

  • 4. 

    True or False: DNS uses both TCP and UDP.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    DNS (Domain Name System) uses both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). TCP is used when the size of the DNS response exceeds the maximum limit for a UDP packet, or when the DNS query requires a reliable and ordered delivery. UDP is used for most DNS queries as it is faster and more efficient for simple queries that can fit within a single packet. Therefore, the statement "DNS uses both TCP and UDP" is true.

    Rate this question:

  • 5. 

    DNS runs on which port:

    • A.

      TCP 40

    • B.

      UDP 40

    • C.

      TCP 53

    • D.

      UDP 53

    Correct Answer(s)
    C. TCP 53
    D. UDP 53
    Explanation
    DNS (Domain Name System) is a protocol used to translate domain names into IP addresses. It operates on both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). TCP is a connection-oriented protocol that ensures reliable data transmission, while UDP is a connectionless protocol that provides faster and more efficient communication. Port 53 is the standard port used by DNS for both TCP and UDP communication. Therefore, the correct answer is TCP 53 and UDP 53.

    Rate this question:

  • 6. 

    True or False: Token Ring uses CSMA/CD.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Token Ring does not use CSMA/CD (Carrier Sense Multiple Access with Collision Detection). Instead, it uses a different access method called Token Passing. In Token Ring, a token is passed around the network, and only the device holding the token is allowed to transmit data. This eliminates the need for collision detection since only one device can transmit at a time. Therefore, the statement that Token Ring uses CSMA/CD is false.

    Rate this question:

  • 7. 

    The topology of a 10BaseT is usually in a form of a ______.

    • A.

      Mesh

    • B.

      Star

    • C.

      Bus

    • D.

      Ring

    Correct Answer
    B. Star
    Explanation
    The correct answer is "Star" because in a 10BaseT topology, all devices are connected to a central hub or switch. This central hub acts as a central point of connection, allowing each device to communicate with one another. This type of topology is called a star because the devices are connected to the central hub in a radial manner, resembling the shape of a star.

    Rate this question:

  • 8. 

    ______-grade cabling provides the most protection from the elements, including fire.

    • A.

      Padded

    • B.

      Shielded

    • C.

      Fiber Optic

    • D.

      Plenum

    Correct Answer
    D. Plenum
    Explanation
    Plenum-grade cabling provides the most protection from the elements, including fire. Plenum cables are made with special materials that have low smoke and low flame characteristics, making them ideal for use in air handling spaces such as plenum areas. These cables are designed to prevent the spread of fire and emit minimal smoke in case of a fire. Therefore, plenum-grade cabling is the best option for protecting against fire hazards in environments where fire safety is a concern.

    Rate this question:

  • 9. 

    ________ routing requires the most administrative overhead.

    • A.

      Static

    • B.

      Dynamic

    Correct Answer
    A. Static
    Explanation
    Static routing requires the most administrative overhead because it involves manually configuring and maintaining the routing tables on each router in the network. This requires the network administrator to have detailed knowledge of the network topology and manually update the routing tables whenever there are changes in the network. In contrast, dynamic routing protocols automatically exchange routing information between routers, reducing the administrative overhead as the routers can dynamically update their routing tables based on the information received from neighboring routers.

    Rate this question:

  • 10. 

    True or False: TCP and UDP offer the same services over Port 21.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    TCP and UDP do not offer the same services over Port 21. Port 21 is specifically reserved for FTP (File Transfer Protocol) services. TCP is a connection-oriented protocol that ensures reliable and ordered delivery of data, making it suitable for applications like FTP that require error-free transmission. UDP, on the other hand, is a connectionless protocol that does not guarantee reliable delivery of data, making it unsuitable for FTP services. Therefore, the correct answer is False.

    Rate this question:

  • 11. 

    Which of the following devices may have a Loopback test? (Select 2)

    • A.

      Modem

    • B.

      NIC

    • C.

      RJ-45 Connector

    • D.

      Patch Panel

    Correct Answer(s)
    A. Modem
    B. NIC
    Explanation
    A loopback test is a method used to test the functionality of a device by sending data out of the device and then immediately receiving it back. In this case, both a modem and a NIC (Network Interface Card) may have a loopback test. A modem is used to connect to the internet and a NIC is used to connect a computer to a network. By performing a loopback test on these devices, it can be determined if they are functioning properly and able to send and receive data effectively. The other two options, RJ-45 Connector and Patch Panel, are not devices that typically have loopback tests as they are used for physical connections rather than data transmission.

    Rate this question:

  • 12. 

    An ISDN BRI connection has two _____ Kbps "B" channels for a total connection speed of ______ Kbps?

    • A.

      1.5, 3

    • B.

      16, 32

    • C.

      32, 64

    • D.

      64, 128

    Correct Answer
    D. 64, 128
    Explanation
    An ISDN BRI connection has two "B" channels, each with a speed of 64 Kbps. Therefore, the total connection speed is 128 Kbps.

    Rate this question:

  • 13. 

    RAID ____ provides disk striping with parity.

    • A.

      0

    • B.

      1

    • C.

      3

    • D.

      5

    Correct Answer
    D. 5
    Explanation
    RAID 5 provides disk striping with parity. In RAID 5, data is striped across multiple disks, with parity information distributed across all the disks. This allows for increased performance and fault tolerance. In the event of a disk failure, the parity information can be used to reconstruct the data on the failed disk. RAID 0 does not provide parity, RAID 1 is mirroring, and RAID 3 uses dedicated parity disk.

    Rate this question:

  • 14. 

    Kerberos is a security suite that utilizes ________ for authentication.

    • A.

      Tickets

    • B.

      Passes

    • C.

      Tokens

    • D.

      Handshakes

    Correct Answer
    A. Tickets
    Explanation
    Kerberos is a security suite that utilizes tickets for authentication. In the Kerberos authentication process, a client requests a ticket from the Kerberos server, which is then used to authenticate the client to other services in the network. The ticket contains encrypted information that verifies the client's identity and allows them to access the requested resources without having to provide their credentials repeatedly. Therefore, the use of tickets in Kerberos ensures secure and efficient authentication within a network environment.

    Rate this question:

  • 15. 

    Microsoft's Active Directory can be said to be similar to _______.

    • A.

      IGMP

    • B.

      RIP

    • C.

      LDAP

    • D.

      Kerberos

    Correct Answer
    C. LDAP
    Explanation
    Microsoft's Active Directory is a directory service that stores information about network resources and enables administrators to manage user accounts, groups, and permissions. LDAP (Lightweight Directory Access Protocol) is a protocol used for accessing and managing directory information. Active Directory uses LDAP as its primary means of communication, making LDAP the most similar option among the given choices. IGMP (Internet Group Management Protocol) is used for managing multicast group memberships, RIP (Routing Information Protocol) is used for routing data between networks, and Kerberos is a network authentication protocol.

    Rate this question:

  • 16. 

    100BaseFX uses which cable type?

    • A.

      Shielded UTP

    • B.

      Coaxial

    • C.

      Unshielded UTP

    • D.

      Fiber

    Correct Answer
    D. Fiber
    Explanation
    100BaseFX is a type of Ethernet technology that uses fiber optic cables to transmit data. Fiber optic cables are made of glass or plastic fibers that transmit data using light signals. They offer high bandwidth and are immune to electromagnetic interference, making them ideal for long-distance and high-speed data transmission. Shielded UTP, coaxial, and unshielded UTP cables are not used for 100BaseFX, as they are typically used for other types of Ethernet technologies.

    Rate this question:

  • 17. 

    HTTP runs on which Layer of the OSI model?

    • A.

      8

    • B.

      7

    • C.

      5

    • D.

      3

    • E.

      2

    Correct Answer
    B. 7
    Explanation
    HTTP runs on Layer 7 of the OSI model, which is the Application layer. This layer is responsible for providing network services to user applications. HTTP is a protocol that enables communication between web browsers and web servers, allowing the retrieval and display of web pages. As an application layer protocol, HTTP operates on top of the transport layer (Layer 4) and uses the services provided by lower layers to establish and maintain connections between clients and servers.

    Rate this question:

  • 18. 

    VoIP is defined by which IEEE standard?

    Correct Answer
    802.9
  • 19. 

    SSH uses which port?

    • A.

      TCP 20

    • B.

      TCP 21

    • C.

      TCP 22

    • D.

      TCP 23

    Correct Answer
    C. TCP 22
    Explanation
    SSH (Secure Shell) uses TCP port 22 for secure remote administration and secure file transfers. It is a network protocol that provides a secure channel over an unsecured network. SSH is commonly used for remote login to a server or computer system, allowing users to securely access and manage the system remotely. By using TCP port 22, SSH ensures that the communication between the client and the server is encrypted and protected from unauthorized access or tampering.

    Rate this question:

  • 20. 

    A host on with the IP address of 128.12.0.15 belongs to which Class?

    • A.

      A

    • B.

      B

    • C.

      C

    Correct Answer
    B. B
    Explanation
    The IP address 128.12.0.15 belongs to Class B. Class B IP addresses range from 128.0.0.0 to 191.255.255.255. These addresses have the first two octets reserved for the network portion and the last two octets for the host portion. In this case, the first octet is 128, which falls within the range for Class B addresses.

    Rate this question:

  • 21. 

    Which protocol contains tools to troubleshoot networks like PING and TRACERT?

    • A.

      RIP

    • B.

      TCP

    • C.

      ICMP

    • D.

      SMTP

    Correct Answer
    C. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) contains tools like PING and TRACERT to troubleshoot networks. PING is used to test the connectivity between two devices by sending an ICMP Echo Request message and receiving an Echo Reply message. TRACERT is used to trace the route taken by packets from the source to the destination by sending a series of ICMP Echo Request messages with increasing TTL (Time-To-Live) values. ICMP is responsible for reporting errors and providing diagnostic information in IP networks.

    Rate this question:

  • 22. 

    Which network topology is also called a "peer-to-peer" topology?

    • A.

      Star

    • B.

      Ring

    • C.

      Mesh

    • D.

      Bus

    Correct Answer
    C. Mesh
    Explanation
    A network topology that is also called a "peer-to-peer" topology is a mesh topology. In a mesh topology, each device in the network is connected to every other device directly. This allows for direct communication between any two devices without the need for a central server. Each device in the network acts as both a client and a server, hence the term "peer-to-peer". This type of topology is commonly used in small networks or for connecting devices in a decentralized manner.

    Rate this question:

  • 23. 

    Crossover cables are similar to patch cables, but the following pins are swapped:

    • A.

      1, 2 & 3, 6

    • B.

      2, 3 & 4, 5

    • C.

      1, 3 & 2, 4

    • D.

      1, 5 & 6, 3

    Correct Answer
    A. 1, 2 & 3, 6
    Explanation
    Crossover cables are designed to connect two devices of the same type, such as two computers or two switches, without the need for a hub or switch. The pins that are swapped in a crossover cable are 1 and 2, and 3 and 6. This swapping allows the transmit signal from one device to be correctly received by the other device, and vice versa. By swapping these pins, the crossover cable ensures that the transmit and receive signals are correctly aligned between the two devices, enabling communication between them.

    Rate this question:

  • 24. 

    Which Layer 1 device can strengthen a signal?

    • A.

      Managed Switch

    • B.

      Router

    • C.

      Active hub

    • D.

      Passive hub

    Correct Answer
    C. Active hub
    Explanation
    An active hub is a Layer 1 device that can strengthen a signal. Unlike passive hubs, which simply pass along the signal without any amplification, active hubs actively regenerate and amplify the signal, allowing it to travel further distances without degradation. This makes active hubs useful in extending the reach of a network by boosting the signal strength.

    Rate this question:

  • 25. 

    A subnet mask of 255.255.255.128 creates ___ subnetworks?

    • A.

      2

    • B.

      8

    • C.

      16

    • D.

      32

    Correct Answer
    A. 2
    Explanation
    A subnet mask of 255.255.255.128 creates 2 subnetworks because the last octet of the subnet mask has a binary value of 10000000, which means that the first bit is fixed and cannot be changed. This leaves only one bit that can be used to create subnetworks, resulting in 2 possible subnetworks.

    Rate this question:

  • 26. 

    Which of the following protocols is connection-oriented?

    • A.

      TCP

    • B.

      UDP

    • C.

      IP

    Correct Answer
    A. TCP
    Explanation
    TCP (Transmission Control Protocol) is a connection-oriented protocol. It establishes a reliable and ordered connection between two devices before data transmission occurs. TCP ensures that all packets are received in the correct order and retransmits any lost packets. It also performs flow control and congestion control to prevent network congestion. In contrast, UDP (User Datagram Protocol) is connectionless and does not establish a connection before data transmission. IP (Internet Protocol) is a network layer protocol responsible for addressing and routing packets, but it is also connectionless.

    Rate this question:

  • 27. 

    IPv4 addresses are ____ bit addresses?

    • A.

      8

    • B.

      16

    • C.

      32

    • D.

      128

    Correct Answer
    C. 32
    Explanation
    IPv4 addresses are 32-bit addresses. This means that they consist of 32 binary digits or bits, which are used to identify and locate devices on a network. The 32-bit address space allows for a total of 4,294,967,296 unique addresses, which are divided into different classes and ranges to allocate them efficiently. IPv4 addresses are represented in decimal format, with each 8 bits separated by a dot, such as 192.168.0.1. However, due to the limited number of addresses available in IPv4, the world has transitioned to IPv6, which uses 128-bit addresses.

    Rate this question:

  • 28. 

    A private IP address is only used within a _____?

    • A.

      WAN

    • B.

      Subnetwork

    • C.

      Domain

    • D.

      LAN

    Correct Answer
    D. LAN
    Explanation
    A private IP address is only used within a LAN (Local Area Network). A LAN is a network that is confined to a small geographic area, such as a home, office, or building. Private IP addresses are reserved for internal use within a LAN and are not routable over the internet. They are used to identify devices within the network and allow them to communicate with each other. Therefore, a private IP address is not used within a WAN (Wide Area Network), subnetwork, or domain.

    Rate this question:

  • 29. 

    A tool used to find kinks or breaks in media is called a ________.

    • A.

      Reflectometer

    • B.

      Punch-down Tool

    • C.

      Crimper

    • D.

      Tone generator

    Correct Answer
    A. Reflectometer
    Explanation
    A reflectometer is a tool used to find kinks or breaks in media. It measures the amount of light reflected from a surface, allowing it to detect any irregularities or disruptions in the media. By analyzing the reflected light, a reflectometer can identify kinks or breaks in cables, fibers, or other types of media, making it a useful tool for troubleshooting and maintenance in various industries such as telecommunications and networking.

    Rate this question:

  • 30. 

    Spanning a disk drive across multiple physical or logical disks for increased performance is called what?

    • A.

      Disk spanning

    • B.

      Disk striping

    • C.

      Disk mirroring

    • D.

      Disk redundancy

    Correct Answer
    B. Disk striping
    Explanation
    Disk striping is the correct answer because it refers to the process of dividing data across multiple physical or logical disks in order to enhance performance. By striping the data, the workload is distributed among multiple disks, allowing for faster read and write operations. This technique is commonly used in RAID (Redundant Array of Independent Disks) systems to improve disk performance and data availability.

    Rate this question:

  • 31. 

    IPsec is a standardized framework for securing IP communications by encrypting and/or authenticating each ________ in a data stream.

    • A.

      Frame

    • B.

      Packet

    • C.

      Protocol

    • D.

      Datagram

    Correct Answer
    B. Packet
    Explanation
    IPsec is a standardized framework for securing IP communications by encrypting and/or authenticating each packet in a data stream. This means that IPsec can provide confidentiality and integrity to individual packets of data being transmitted over an IP network. By encrypting and authenticating each packet, IPsec ensures that the data remains secure and protected from unauthorized access or tampering.

    Rate this question:

  • 32. 

    ______ is a tunneling version of PPP?

    Correct Answer
    PPTP
    Point to point tunneling protocol
    point-to-point tunneling protocol
    Explanation
    PPTP stands for Point-to-Point Tunneling Protocol. It is a tunneling version of PPP (Point-to-Point Protocol) that allows the secure transmission of data over a network. PPTP creates a virtual private network (VPN) connection, enabling users to connect to a private network remotely. It encapsulates PPP packets within IP packets, providing encryption and authentication for secure communication. Therefore, PPTP is the correct answer for the question.

    Rate this question:

  • 33. 

    10Base2 cable uses which kind of connector?

    • A.

      RJ45

    • B.

      Coaxial

    • C.

      BNC

    • D.

      SC

    Correct Answer
    C. BNC
    Explanation
    The correct answer is BNC. 10Base2 cable, also known as thinnet or coaxial cable, uses BNC connectors. These connectors are used to connect the cable to devices such as computers, routers, or switches. BNC connectors are commonly used in older Ethernet networks and are known for their durability and reliability in transmitting data over short distances. RJ45 connectors, on the other hand, are used for twisted pair Ethernet cables, not coaxial cables. SC connectors are used for fiber optic cables.

    Rate this question:

  • 34. 

    The 10Base___ cable type has a max length of 2000 meters?

    Correct Answer
    FL

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 14, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 13, 2009
    Quiz Created by
    Puppetbat
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.