Network+ Practice Exam

80 Questions  I  By Catherinehalcombe
Please take the quiz to rate it.

 Network+ Practice Exam
This Network+ test has rigorous questions for learners who are preparing for the CompTIA Network+ Certification. Go through these 80 questions to get a wholistic understanding of the Network+ practice exam. Instructions: In this test you will get 80 questions. A comprehensive score report with pass/fail grade & explanations will be at the end of test. The test is timed to reflect the real test.

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
  • 1. 
    You are connecting an Windows workstation to a NetWare 4.11 server. The workstation is unable to connect to the server, but it is able to connect to the Internet. Which two are possible problems? (Choose two.)
    • A. 

      The server is not running NetBEUI

    • B. 

      The server is not running AppleTalk

    • C. 

      The workstation is not running IPX/SPX

    • D. 

      The workstation is not running NetBEUI


  • 2. 
    Provide the broadcast address for the following:IP Address: 221.240.224.121Subnet mask: 255.255.255.248.
    • A. 

      221.240.224.127

    • B. 

      221.240.224.255

    • C. 

      221.240.224.0

    • D. 

      221.240.224.126


  • 3. 
    Bridges operate at physical layer . T/F?
    • A. 

      True

    • B. 

      False


  • 4. 
    After building a small network and connecting it to your ISP you notice that the clients are unable to browse the Internet. You call your ISP and he asks for the information configured on your router. You present the required information to him. He says the information is as it should be. You browse the net from the computer directly connected to your DSL modem and you are able to do so. What could the problem be?
    • A. 

      Incorrect IP configuration

    • B. 

      DNS not configured on the workstations

    • C. 

      DNS server not set on the DHCP server

    • D. 

      Default gateway not set on the workstations


  • 5. 
    Which of the following are used for increasing fault toleranace? Choose three
    • A. 

      Tape backup

    • B. 

      Mirrored servers

    • C. 

      RAID disk storage

    • D. 

      Off-site data archive


  • 6. 
    You just installed an application onto your Win2k workstation from the network and restarted it. It is no longer able to connect to the network, how will you roll back to the old setup before installing the software?
    • A. 

      Uninstall the software

    • B. 

      Use safe mode to boot up

    • C. 

      Use last known good configuration

    • D. 

      None of the above


  • 7. 
    Into which of the following does the ADS store its information? Select all that apply
    • A. 

      AD database

    • B. 

      AD log files

    • C. 

      Shared system volume

    • D. 

      None of the above


  • 8. 
    The ADS employs the flat domain structure. T/F?
    • A. 

      True

    • B. 

      False


  • 9. 
    Which of the following is a non-routable protocol?
    • A. 

      Apple talk

    • B. 

      TCP/IP

    • C. 

      IPX/SPX

    • D. 

      NetBEUI


  • 10. 
    Static routing needs manual intervention to configure a routing entry to the destination. T/F ?
    • A. 

      True

    • B. 

      False


  • 11. 
    Which of the following commands will help to create a static route from a router Router A to destination network 172.12.0.0?
    • A. 

      Ip static 172.12.7.0 255.255.0.0 0.0.0.0

    • B. 

      Ip route 172.12.0.0 255.255.0.0 172.12.8.1

    • C. 

      Ip static 172.12.7.0 255.255.255.0 any

    • D. 

      Ip route 172.14.7.0 255.255.0.0 172.14.8.2


  • 12. 
    Which networking topology is the easiest to reconfigure?
    • A. 

      Bus

    • B. 

      Ring

    • C. 

      Star

    • D. 

      Mesh


  • 13. 
    Which of the following devices is required to complete a VLAN set up successfully?
    • A. 

      Hub

    • B. 

      Router

    • C. 

      Modem

    • D. 

      LAN


  • 14. 
    Your present network uses HOSTS file for IP to host name resolution. You are planning on adding a DNS server and moving a few servers to a remote site with different IP address. Which of the following will hold true?
    • A. 

      Users will be able to connect if a DNS server is added to the affected network segments.

    • B. 

      Users will be able to connect if a WINS server is added to the affected network segments.

    • C. 

      Users will be able to connect if a DNS server is enabled and the HOSTS file is deleted.

    • D. 

      Users will be able to connect if a DNS is enabled on the workstation and the HOSTS file is deleted.


  • 15. 
    You have just upgraded your Dial-up server on the network. This server was used to share internet connections to the entire network. Users are unable to connect to the Internet now. What could be the likely cause of the problem?
    • A. 

      IP address of the Dial-up server might have changed.

    • B. 

      The DNS server could have failed to start right services.

    • C. 

      You probably needed to ally some patches and fixes after the upgrade, which hasn't been done.

    • D. 

      None of the above.


  • 16. 
    Which of the following directory services can the Active Directory Service be compared with?
    • A. 

      Netware Directory Services

    • B. 

      File directory services

    • C. 

      NT Directory services

    • D. 

      None of the above.


  • 17. 
    Which of the following are required when logging on to a Windows NT Server? (Choose two.)
    • A. 

      Password

    • B. 

      Username

    • C. 

      IP address

    • D. 

      MAC address


  • 18. 
    If you were asked to subnet a network in such a way as to arrive at 6 network Ids you would need to borrow 2 bits. T/F?
    • A. 

      True

    • B. 

      False


  • 19. 
    The SMB (server message block) protocol runs on the Windows server and allows UNIX and Linux servers to see the Windows server as one of the UNIX/LINUX based servers. T/F?
    • A. 

      True

    • B. 

      False


  • 20. 
    Which of the following file systems are not supported by Windows NT 4.0? Select 2
    • A. 

      NTFS 4

    • B. 

      NTFS 5

    • C. 

      FAT 16

    • D. 

      FAT 32


  • 21. 
    You have introduced a fully configured workstation into your network. Your network is IP based and uses static IP addressing. Everytime the new workstation connects to the network, another existing computer generates an error message and stops connecting. What could the problem be?
    • A. 

      DNS servers have not been assigned.

    • B. 

      WINS servers have not been assigned.

    • C. 

      Duplicate gateways have not been assigned.

    • D. 

      Duplicate IP addresses have been assigned.


  • 22. 
    Which of the following allows fault tolerance for user authentication in a Windows 2000 network?
    • A. 

      Multi master replication

    • B. 

      Bindery replication

    • C. 

      Mirror servers

    • D. 

      None of the above


  • 23. 
    Which of the following makes the DNS environment a backbone of the Windows 2000 network?
    • A. 

      DHCP

    • B. 

      DDNS

    • C. 

      ADNS

    • D. 

      None of the above.


  • 24. 
    _________________ is used to propagate VLAN information across a trunked link.
    • A. 

      Spanning Tree Protocol`

    • B. 

      Virtual Trunk Protocol`

    • C. 

      Static VLAN Protocol`

    • D. 

      None of the above


  • 25. 
    Which of the following is not a network operating system?
    • A. 

      Windows NT

    • B. 

      Windows 2000

    • C. 

      Windows for Workgroups

    • D. 

      Linux


  • 26. 
    Which name resolution technique does a UNIX host use?
    • A. 

      DNS

    • B. 

      DHCP

    • C. 

      Proxy

    • D. 

      LMHOSTS


  • 27. 
    If you were to identify a NetBIOS name corresponding to an IP address, where would you look for it?
    • A. 

      Arp cache

    • B. 

      MAC address table of switch

    • C. 

      DNS cache

    • D. 

      NetBIOS name cache


  • 28. 
    You are configuring a dial-up connection for your network to connect with a remote server. Which of the following protocols must you configure to secure your authentication in terms of encryption? (Choose two.)
    • A. 

      SMTP (Simple Mail Transfer Protocol)

    • B. 

      TFTP (Trivial File Transfer Protocol)

    • C. 

      PPTP (Point-to-point Tunneling Protocol)

    • D. 

      TCP/IP (Transmission Control Protocol and Internet Protocol)


  • 29. 
    You are a traveling user who connects to the remote site from your laptop whenever you visit that site. Today when you connect your laptop to the network, you are unable to login. You check your IP configuration and your IP address is 0.0.0.0. What is the likely cause for the problem?
    • A. 

      The DNS server is down.

    • B. 

      The DHCP server is not reachable.

    • C. 

      The NetBIOS over TCP/IP has been disconnected.

    • D. 

      The workstation has become unplugged from the network.


  • 30. 
    Which of the following is an ideal location for storing a tape into which you have just finished backing up?
    • A. 

      In the server room

    • B. 

      In the Network administrator's desk

    • C. 

      In the communication room

    • D. 

      In a locked safe at on offsite location


  • 31. 
    In a Windows 2000 network, it is imperative that you must be physically connected to the printer into which you wish to fire a printout. T/F?
    • A. 

      True

    • B. 

      False


  • 32. 
    Metro is a small company that is using static IP addressing scheme in its network. After a merger with a larger company Cosmo, which uses dynamic IP addressing and DNS for name resolution, the servers of Metro were moved to the server farm of Cosmo and their addressing schemes and resolutions were changed accordingly. After this change in the network structure the servers that were moved to the server farm are no longer reachable. What should you do to correct the problem?
    • A. 

      Delete the HOSTS file

    • B. 

      Correct the LMHOSTS file

    • C. 

      Correct the NETWORKS file

    • D. 

      Create the static NETSTAT entries


  • 33. 
    On a bus segment, you have introduced a new workstation after which the entire segment collapses. What could be the possible cause/causes for the problem? Select 2
    • A. 

      Faulty NIC

    • B. 

      Faulty termination

    • C. 

      Faulty cabling

    • D. 

      Faulty server


  • 34. 
    Routing Information Protocol (RIP) by default has_____________ number of hops.
    • A. 

      15

    • B. 

      16

    • C. 

      10

    • D. 

      12


  • 35. 
    Which of the following access security does Windows 2000 Server use on LANs?
    • A. 

      SSL

    • B. 

      L2TP

    • C. 

      IPsec

    • D. 

      Kerberos


  • 36. 
    Which of the following protocols is supported by Windows 2000 Server for the purpose of dial-up? Choose two
    • A. 

      PPP

    • B. 

      SLIP

    • C. 

      TCP/IP

    • D. 

      IPX/SPX


  • 37. 
    Which of the interfaces on the router would be used by the switch, if the switch needs to connect to the router?
    • A. 

      Serial Interface

    • B. 

      Auxiliary port

    • C. 

      Fast Ethernet

    • D. 

      Ethernet


  • 38. 
    Which of the following are services of a proxy server? (Choose three.)
    • A. 

      Cached e-mail

    • B. 

      Cached client files

    • C. 

      Cached web pages

    • D. 

      Cached DNS information


  • 39. 
    Which of the following is the correct connection for cascading MAus?
    • A. 

      Connect a single cable to port 1 on each MAU.

    • B. 

      Connect the uplink ports to each other on the MAU.

    • C. 

      Connect the ring in port to the ring out port on each MAU.

    • D. 

      Connect the ring in port to the ring in port and ring out port to ring out port in each MAU.


  • 40. 
    Kerberos is ideally meant for_____________.
    • A. 

      Authenticating LAN users

    • B. 

      Authenticating WAN users

    • C. 

      Encrypting database

    • D. 

      Encrypting user names.


  • 41. 
    Which of the following devices is used to connect multiple computers on a network segment?
    • A. 

      Hub

    • B. 

      NIC

    • C. 

      Router

    • D. 

      Bridge


  • 42. 
    Which of the following are some commonalities between Windows NT and Windows 2000?
    • A. 

      They are both based on NT kernel.

    • B. 

      They are both meant for Internetworking

    • C. 

      They both require DNS for basic operation.

    • D. 

      None of the above.


  • 43. 
    Which of the following functions is a firewall capable of? Choose two
    • A. 

      Block traffic

    • B. 

      Permit traffic

    • C. 

      Verify company policies

    • D. 

      Authenticate internal users


  • 44. 
    Which of the following media access scheme does the token ring network use?
    • A. 

      Token passing

    • B. 

      CSMA/CD.

    • C. 

      CSMA/CA.

    • D. 

      None of the above


  • 45. 
    How many maximum subnet IDs are possible in this situation? Class C network 221.222.162.0 255.255.255.0, subnet by borrowing 5 bits,
    • A. 

      30 subnet IDs

    • B. 

      20 subnet IDs

    • C. 

      22 subnet IDs

    • D. 

      32 subnets


  • 46. 
    Plug and play technology allows you to add devices to the computer without having to turn it off. T/F?
    • A. 

      True

    • B. 

      False


  • 47. 
    Which of the following permissions would be appropriate for Unix/Linux file system? (Choose three)
    • A. 

      Read (r)

    • B. 

      Write (w)

    • C. 

      Change (c)

    • D. 

      Execute (x)


  • 48. 
    You have just connected a brand new dial-up modem that does not require drivers. You have configured the modem and shared it for your Peer-to-Peer network as per the instructions in the manual. Your system just refuses to recognize this PCI modem. What must you do next? Select 2
    • A. 

      Change the slot.

    • B. 

      Return the modem.

    • C. 

      Try restarting your computer.

    • D. 

      None of the above.


  • 49. 
    You wish to segregate your sales department logically in terms of the products that they deal with. There are 3 such groups. The data intended for Product 1 must not reach Product 2 and 3 and so on. Which of the following would be an ideal solution for this situation?
    • A. 

      SNMP

    • B. 

      VLANs

    • C. 

      Routing

    • D. 

      RMON probe


  • 50. 
    Which of the following is true regarding this representation of IP address?204.202.10.32/29
    • A. 

      29 bits of the 32 bits are reserved for host ID.

    • B. 

      3 bits of the 32 bits are reserved for the network ID.

    • C. 

      29 bits of the 32 bits are reserved for the network ID.

    • D. 

      None of the above


  • 51. 
    PPTP is a protocol that is ideally meant for _____.
    • A. 

      Dial-up

    • B. 

      LAN connections

    • C. 

      VPNs

    • D. 

      None of the above.


  • 52. 
    Which of the following is/are default Ethernet frame types for Netware versions above 3.12?
    • A. 

      Ethernet 802.3

    • B. 

      Ethernet 802.2

    • C. 

      Ethernet_II

    • D. 

      Ethernet_SNAP


  • 53. 
    Which IEEE standard describes the specifications for a ring topology?
    • A. 

      802.1

    • B. 

      802.2

    • C. 

      802.3

    • D. 

      802.4

    • E. 

      802.5


  • 54. 
    Which of the following is the least fault tolerant of all networking topologies?
    • A. 

      Bus

    • B. 

      Ring

    • C. 

      Star

    • D. 

      Mesh


  • 55. 
    Which of the following can be used to check for the transmission and reception ports on a NIC?
    • A. 

      Network Analyzer

    • B. 

      Multimeter

    • C. 

      Crossover cable

    • D. 

      Hardware loopback


  • 56. 
    Which of the following protocols does Network Attached Storage (NAS) use? (Choose two.)
    • A. 

      IPX

    • B. 

      ATM

    • C. 

      TCP/IP

    • D. 

      Frame Relay


  • 57. 
    You are configuring a leased line for your network with the help of your service provider. You are now testing for the loop. The modem does not detect a dial tone but responds to the off-hook. What is a possible cause for this dial back-up failure?
    • A. 

      Router

    • B. 

      Cable

    • C. 

      Modem

    • D. 

      LAN


  • 58. 
    IPX routing is enabled by default in all Cisco routers. T/F?
    • A. 

      True

    • B. 

      False


  • 59. 
    Linux is a __________ operating system.
    • A. 

      32 bit

    • B. 

      48 bit

    • C. 

      64 bit

    • D. 

      128 bit


  • 60. 
    Which of the following file systems is used by UNIX?
    • A. 

      Netware File system

    • B. 

      Network file system

    • C. 

      FAT

    • D. 

      NTFS


  • 61. 
    It is required that you block UDP ports on your firewall for security reasons. Which of the following services may be affected?
    • A. 

      FTP

    • B. 

      NTP

    • C. 

      HTTP

    • D. 

      SMTP


  • 62. 
    You have been successfully connecting to the Internet through your network till you installed a firewall. Now although you are unable to connect to your usual website, you are able to ping them using IP address. What's wrong?
    • A. 

      Your DNS server has crashed.

    • B. 

      You have inadvertently blocked the DNS server..

    • C. 

      You firewall is not functioning.

    • D. 

      Your router is not functioning.


  • 63. 
    You have interlinked two of your offices using a router. Though your network uses IP addresses, the users prefer using host names to numbers as it is easy to remember. You have to configure the network such that the users of either side can access resources on either side using the host names. Which of the following needs to be configured for this network? (Choose two.)
    • A. 

      DNS

    • B. 

      WINS

    • C. 

      SNMP

    • D. 

      TCP/IP


  • 64. 
    Which of the following connector is used in a 10BASE2 Bus topology?
    • A. 

      SC

    • B. 

      ST

    • C. 

      BNC

    • D. 

      RJ-11

    • E. 

      RJ-45


  • 65. 
    You are configuring a small home network. The main system has workgroup name 'elle' and the client has workgroup name 'ELLE' will the connection work?
    • A. 

      Yes

    • B. 

      No

    • C. 

      Maybe

    • D. 

      None of the above.


  • 66. 

    Exhibit Identify the command that yields the output displayed in the exhibit: 
    • A. 

      Nbtstat

    • B. 

      Network

    • C. 

      Netstat -a

    • D. 

      Network -a


  • 67. 
    You have just performed a backup on one of the most critical servers on your network. This server is accessed most frequently and hosts maximum amount of network data. Which of the following must you do now?
    • A. 

      Dispatch it immediately to be stored in an offsite location.

    • B. 

      Keep it onsite for as long as it takes to verify the backup.

    • C. 

      Store it onsite permanently, incase you may need to restore it in the near future.

    • D. 

      Verify the backup on a test server immediately and then dispatch the tape to be stored in an offsite location.


  • 68. 
    A Windows client in your Netware network had a faulty NIC which got replaced. The workstation no longer connects to the network, even though the configuration of the NIC is completed successfully. What could the problem be?
    • A. 

      Frame type of the NIC is misconfigured

    • B. 

      Incorrect driver version

    • C. 

      OS configuration problem

    • D. 

      None of the above


  • 69. 
    Administrative authority is delegated to Administrators in Windows 2000 networks. T/F?
    • A. 

      True

    • B. 

      False


  • 70. 
    Which of the following is used to map Network-layer protocol address to DLCIs?
    • A. 

      RARP

    • B. 

      Inverse ARP

    • C. 

      ARP

    • D. 

      None of the above


  • 71. 
    Which of the following statements about bridges is true?
    • A. 

      Bridges are useful for network layer routing.

    • B. 

      Bridges are more efficient than repeaters.

    • C. 

      Bridges are firmware devices.

    • D. 

      Bridges reduce network efficiency.


  • 72. 
    Which of the following file systems is supported by Windows 2000 & above OS only?
    • A. 

      NTFS 4

    • B. 

      NTFS 5

    • C. 

      FAT 16

    • D. 

      FAT 32


  • 73. 
    Windows 2000 does not support plug and play devices and so every device will have to be manually configured. T/F?
    • A. 

      True

    • B. 

      False


  • 74. 
    UNIX is an open source Operating System. T/F?
    • A. 

      True

    • B. 

      False


  • 75. 
    You have just added a computer to you network. The new computer can connect to the server only if any one of the existing computers gets shutdown. What could the problem be?
    • A. 

      The DHCP server has run out of IP addresses for the network.

    • B. 

      This computer uses static IP when the rest take it from DHCP.

    • C. 

      The computers' NIC is bad.

    • D. 

      None of the following.


  • 76. 
    You have just created an internal network that has address 172.16.0.0/16. Which of the following will be the subnet mask you assign for this network?
    • A. 

      255.0.0.0

    • B. 

      172.16.0.0

    • C. 

      255.0.0.0

    • D. 

      255.255.0.0

    • E. 

      255.255.255.0


  • 77. 
    Your routing network has been experiencing severe congestion lately. You suspect the oldest 2 routers to be causing the problem. How would you verify this?
    • A. 

      Use tracert

    • B. 

      Use network analyzer

    • C. 

      Use ping

    • D. 

      Use IPConfig


  • 78. 
    Which of the following is true regarding this representation of IP address?204.202.10.32/29
    • A. 

      29 bits of the 32 bits are reserved for host ID.

    • B. 

      3 bits of the 32 bits are reserved for the network ID.

    • C. 

      29 bits of the 32 bits are reserved for the network ID.

    • D. 

      None of the above


  • 79. 
    You have heard that HTTPS is the most secure way to access a web server. You have decided to upgrade your web server's HTTP service to HTTPS. Although your intranet users are still able to access this web server, it is no longer accessible to the rest. You know it is the upgrade that caused this situation. But what of the following could be the specific cause?
    • A. 

      Your DNS server is down.

    • B. 

      Your Web server address has changed.

    • C. 

      Your firewall is blocking HTTP service port .

    • D. 

      Your firewall is blocking HTTPS service port.


  • 80. 
    A backbone is a trunk cable that________________.
    • A. 

      Connects nodes and helps communication between them.

    • B. 

      Connects segments and helps communication between them.

    • C. 

      Connects networks and helps communication between them.

    • D. 

      All of the above.


Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.