Can You Pass The Network+ Exam?

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Cycocool
C
Cycocool
Community Contributor
Quizzes Created: 2 | Total Attempts: 9,703
Questions: 10 | Attempts: 9,576

SettingsSettingsSettings
Can You Pass The Network+ Exam? - Quiz

A quiz to test your knowledge on the CompTia Network+ exam. To make the whole thing realistic, I have set the total to 100 points, pass rate 95% and time to a max of 3 minutes. Sample questions provided by Comptia. Org


Questions and Answers
  • 1. 

    Which of the following connectors is used on multimode cable and simply pushed into the jack?

    • A.

      LC

    • B.

      SC

    • C.

      ST

    • D.

      BNC

    Correct Answer
    B. SC
    Explanation
    The SC connector is used on multimode cables and is simply pushed into the jack. It is a popular connector for fiber optic cables due to its ease of use and reliable performance. The LC connector, on the other hand, requires a push-pull motion to connect and disconnect, making it less suitable for the given scenario. The ST connector is also not the correct answer as it requires a twist-on motion to connect. The BNC connector is commonly used for coaxial cables, not multimode cables. Therefore, the correct answer is SC.

    Rate this question:

  • 2. 

    To add increased network security without additional overhead on the network bandwidth, which of the following should be implemented in a wired network?

    • A.

      WEP

    • B.

      Port Filtering

    • C.

      WPA

    • D.

      Install additional swiches

    Correct Answer
    B. Port Filtering
    Explanation
    Port filtering should be implemented in a wired network to add increased network security without additional overhead on the network bandwidth. Port filtering allows the network administrator to control which network services are accessible from the outside network. By selectively allowing or blocking specific ports, the network can be protected from unauthorized access and potential security threats. This can be done without adding any extra burden on the network bandwidth, making it an efficient and effective security measure for a wired network.

    Rate this question:

  • 3. 

    Which of the following cable types is LEAST affected by EMI?

    • A.

      Coaxial

    • B.

      Fiber

    • C.

      Serial

    • D.

      Ethernet

    Correct Answer
    B. Fiber
    Explanation
    Fiber optic cables are least affected by electromagnetic interference (EMI) due to their design. Unlike coaxial cables, which use a conductive shield to protect the signal from EMI, fiber optic cables transmit data using light signals through thin strands of glass or plastic. This means that fiber optic cables are not susceptible to EMI caused by electrical interference or nearby electromagnetic fields. Serial and Ethernet cables, on the other hand, can be affected by EMI to varying degrees depending on their shielding and quality.

    Rate this question:

  • 4. 

    Which of the following is the default port for DNS?

    • A.

      21

    • B.

      69

    • C.

      53

    • D.

      80

    Correct Answer
    C. 53
    Explanation
    The default port for DNS is 53. DNS stands for Domain Name System, which is responsible for translating domain names into IP addresses. When a client sends a DNS query to a DNS server, it uses port 53 to establish a connection and exchange information. This allows the client to receive the IP address associated with the requested domain name.

    Rate this question:

  • 5. 

    Which of the following protocols is used for VoIP?

    • A.

      IMAP4

    • B.

      TELNET

    • C.

      SIP

    • D.

      SSH

    Correct Answer
    C. SIP
    Explanation
    SIP (Session Initiation Protocol) is used for VoIP (Voice over Internet Protocol) communication. It is a signaling protocol that sets up, modifies, and terminates multimedia sessions such as voice and video calls over IP networks. SIP is widely used for voice and video calling, instant messaging, presence information, and other applications in VoIP systems. It is responsible for establishing and managing communication sessions between participants, enabling features like call transfer, call hold, and conferencing. Therefore, SIP is the correct protocol for VoIP.

    Rate this question:

  • 6. 

    Which of the following is an example of a point-to-point physical network?

    • A.

      Two computers connected through a switch

    • B.

      Two computers connected to a hub

    • C.

      Two computers connected together via a serial cable

    • D.

      Two computers connected via a WAP

    Correct Answer
    C. Two computers connected together via a serial cable
    Explanation
    Two computers connected together via a serial cable is an example of a point-to-point physical network. In this type of network, there is a direct physical connection between two devices, with no other devices in between. The serial cable allows for a direct and dedicated connection between the two computers, enabling them to communicate with each other without interference from other devices.

    Rate this question:

  • 7. 

    Which of the following provides the MOST secure defense against packet sniffing?

    • A.

      Physical Security

    • B.

      Encryption Enabled

    • C.

      Antivirus Solution

    • D.

      The use of PAP

    Correct Answer
    B. Encryption Enabled
    Explanation
    Encryption is the most secure defense against packet sniffing because it ensures that the data being transmitted is scrambled and unreadable to anyone who does not have the encryption key. Packet sniffing involves intercepting and analyzing network traffic, but with encryption enabled, even if the packets are intercepted, the data within them will be encrypted and therefore useless to the attacker. Encryption adds an extra layer of security to protect sensitive information from being compromised.

    Rate this question:

  • 8. 

    Which of the following allows an administrator to filter outbound web traffic?

    • A.

      Proxy Server

    • B.

      DHCP Server

    • C.

      DNS Server

    • D.

      NAC

    Correct Answer
    A. Proxy Server
    Explanation
    A proxy server allows an administrator to filter outbound web traffic by acting as an intermediary between the client device and the internet. It receives the client's requests for web content and forwards them on behalf of the client. The proxy server can be configured to apply filtering rules and policies, allowing the administrator to control and restrict access to certain websites or types of content. This helps to enhance security, prevent unauthorized access, and optimize network performance.

    Rate this question:

  • 9. 

    Which of the following devices would a technician use to connect a 100Base-TX segment to a 100Base-FX segment?

    • A.

      Hub

    • B.

      Basic Switch

    • C.

      Modem

    • D.

      Media Converter

    Correct Answer
    D. Media Converter
    Explanation
    A technician would use a media converter to connect a 100Base-TX segment to a 100Base-FX segment. A media converter is a device that converts the electrical signals used in copper-based networks (like 100Base-TX) into optical signals used in fiber-based networks (like 100Base-FX). This allows for the seamless connection and communication between the two different types of network segments.

    Rate this question:

  • 10. 

    Which of the following objectives would a network administrator accomplish by implementing an IPS?

    • A.

      Examine network traffic to troubleshoot connectivity issues

    • B.

      Detect and automatically respond to attacks

    • C.

      Apply access control lists to prevent inbound network attacks

    • D.

      Protect servers from physical theft

    Correct Answer
    B. Detect and automatically respond to attacks
    Explanation
    By implementing an IPS (Intrusion Prevention System), a network administrator would be able to detect and automatically respond to attacks. An IPS is designed to monitor network traffic and identify any suspicious or malicious activity. Once an attack is detected, the IPS can take immediate action to block or mitigate the threat, preventing further damage to the network. This proactive approach helps in maintaining network security and minimizing the impact of attacks.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 12, 2009
    Quiz Created by
    Cycocool
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.