CompTIA Network+ Certification

85 Questions | Attempts: 172
Share
SettingsSettings
Please wait...
  • 1/85 Questions

    A user calls to report that he is experiencing periodic problems connecting to the network. Upon investigation, you find that the cable connecting the user’s PC to the switch is close to a fluorescent light fitting. What condition is most likely causing the problem?

    • Crosstalk
    • EMI
    • Attenuation
    • Faulty cable
Please wait...
CompTIA Network+ Certification - Quiz
About This Quiz

85 general CompTIA Network+ certification exam questions


Quiz Preview

  • 2. 

    Which of the following connectors is commonly used with fiber cabling?

    • RJ-45

    • BNC

    • SC

    • RJ-11

    Correct Answer
    A. SC
    Explanation
    SC connectors are used with fiber-optic cable. RJ-45 connectors are used with UTP cable, BNC is used for thin coax cable, and RJ-1 1 is used for regular phone connectors.

    Rate this question:

  • 3. 

    Which of the following describes the loss of signal strength as a signal travels through a particular medium?

    • Attenuation

    • Crosstalk

    • EMI

    • Chatter

    Correct Answer
    A. Attenuation
    Explanation
    The term used to describe the loss of signal strength for media is attenuation. Crosstalk refers to the interference between two cables, EMI is electromagnetic interference, and chatter is not a valid media interference concern.

    Rate this question:

  • 4. 

    Which of the following devices could be configured as a DHCP server?

    • Wireless router

    • Unmanaged switch

    • Hub

    • Repeater

    Correct Answer
    A. Wireless router
  • 5. 

    Which network topology offers the greatest level of redundancy but has the highest implementation cost?

    • Wireless mesh

    • Wired mesh

    • Hybrid star

    • Bus network

    Correct Answer
    A. Wired mesh
    Explanation
    The mesh topology requires each computer on the network to be individually connected to every other device. This configuration provides maximum reliability and redundancy for the network. However, it is very costly to implement due to the multiple wiring requirements.

    Rate this question:

  • 6. 

    Which of the following should be implemented to allow a user to securely connect to a network drive remotely?

    • Enable file and print share

    • FTP

    • VPN

    • Map a drive

    Correct Answer
    A. VPN
  • 7. 

    In a 100BaseTX network environment, what is the maximum distance between the device and the networking equipment, assuming that no repeaters are used?

    • 1,000 meters

    • 100 meters

    • 500 meters

    • 185 meters

    Correct Answer
    A. 100 meters
    Explanation
    100BaseT networks use UTP cabling, which has a maximum cable length of 100 meters. Answer A is incorrect because this distance could only be achieved with UTP cabling by using repeaters. Answer C specifies the maximum cable length for 10Base5 networks. Answer D specifies the maximum cable length for 10Base2 networks.

    Rate this question:

  • 8. 

    TCP is an example of what kind of transport protocol?

    • Connection-oriented

    • Connection-reliant

    • Connection-dependent

    • Connectionless

    Correct Answer
    A. Connection-oriented
    Explanation
    TCP is an example of a connection-oriented transport protocol. UDP is an example of a connectionless protocol. Connection-reliant and connection-dependent are not terms commonly associated with protocols.

    Rate this question:

  • 9. 

    As the network administrator, you decide to block port 80.  Which of the following services will be unavailable for network users?

    • DNS

    • POP3

    • FTP

    • HTTP

    Correct Answer
    A. HTTP
    Explanation
    The HTTP service uses port 80, so blocking port 80 prevents users from using the HTTP service. Answer A is incorrect because DNS uses port 53. Answer B is incorrect because POP3 uses port 110. Answer C is incorrect because FTP uses port 21.

    Rate this question:

  • 10. 

    Which of the following connectors would be used if the EIA/TIA 568 scheme is followed?

    • ST

    • RJ-11

    • RJ-45

    • MT-RJ

    Correct Answer
    A. RJ-45
  • 11. 

    At which OSI layer does a switch operate?

    • Layer 1

    • Layer 2

    • Layer 3

    • Layer 4

    Correct Answer
    A. Layer 2
    Explanation
    A switch uses the MAC addresses of connected devices to make its forwarding decisions. Therefore, it is called a data link, or Layer 2, network device. Devices or components that operate at Layer 1 typically are media-based, such as cables or connectors. An example of a Layer 3 device is a router. Layer 4 components typically are software-based, not hardware-based.

    Rate this question:

  • 12. 

    You ask your ISP to assign a public IP address for the external interface of your Windows 2000 server, which is running a proxy server application.  In the e-mail message you get that contains the information, the ISP tells you that you have been assigned the IP address 203.15.226.12/24.  When you fill out the subnet mask field on the IP configuration dialog box on your system, what subnet mask should you use?

    • 255.255.255.255

    • 255.255.255.0

    • 255.255.240.0

    • 255.255.255.240

    Correct Answer
    A. 255.255.255.0
    Explanation
    In CIDR terminology, the number of bits to be included in the subnet mask is expressed as a slash value. If the slash value is 24, the first three octets form the subnet mask, so the value is 255.255.255.0.

    Rate this question:

  • 13. 

    A user is unable to reach the Internet.  The technician asks the user to do an IPCONFIG /all.  The user reports that their IP address is 172.20.1.18, subnet mask is 255.255.255.0, and their default gateway is 172.16.1.18.  Which of the following is the cause of the problem?

    • Default gateway

    • Network cable

    • Subnet mask

    • CNAME record

    Correct Answer
    A. Default gateway
  • 14. 

    You have been asked to install a network that will give the network users the greatest amount of fault tolerance.  Which of the following network topologies would you choose?

    • Star

    • Ring

    • Mesh

    • Bus

    Correct Answer
    A. Mesh
    Explanation
    A mesh network uses a point-to-point connection to every device on the network. This creates multiple points for the data to be transmitted around the network and therefore creates a high degree of redundancy. The star, ring and bus topologies do not offer fault tolerance.

    Rate this question:

  • 15. 

    You have been tasked with temporarily disabling Telnet access for external users.  What is the best way to accomplish this?

    • Block port 53 on the corporate firewall

    • Block port 23 on the corporate firewall

    • Uninstall the Telnet service

    • Configure ICS to ignore client-initiated Telent requests

    Correct Answer
    A. Block port 23 on the corporate firewall
    Explanation
    By blocking port 23, you can disable the Telnet service. Answer A is incorrect because port 53 is used by DNS. Uninstalling the Telnet service is not a practical solution.

    Rate this question:

  • 16. 

    Assuming that the bridge priority is the same between four switches, identify which switch will become the root bridge in 802.1d if all four switches are interconnected.

    • Switch 1 (MAC Address = aa:aa:aa:aa:aa:aa

    • Switch 2 (MAC Address = bb:bb:bb:bb:bb:bb

    • Switch 3 (MAC Address = cc:cc:cc:cc:cc:cc

    • Switch 4 (MAC Address = dd:dd:dd:dd:dd:dd

    Correct Answer
    A. Switch 1 (MAC Address = aa:aa:aa:aa:aa:aa
  • 17. 

    Which of the following topologies allows for network expansion with the least amount of disruption for the current network users?

    • Bus

    • Ring

    • LAN

    • Star

    Correct Answer
    A. Star
    Explanation
    On a star network, each network device uses a separate cable to make a point-topoint connection to a centralized device such as a hub. With such a configuration, a new device can be added to the network by attaching the new device to the hub with its own cable. This process does not disrupt the users who are currently on the network. Answers A and B are incorrect because the addition of new network devices on a ring or bus network can cause a disruption in the network and cause network services to be unavailable during the installation of a new device.

    Rate this question:

  • 18. 

    Users are complaining that the network’s performance is unsatisfactory. It takes a long time to pull files from the server, and, under heavy loads, workstations can become disconnected from the server. The network is heavily used, and a new videoconferencing application is about to be installed. The network is a 100BaseT system created with Ethernet hubs. Which device are you most likely to install to alleviate the performance problems?

    • Switch

    • Router

    • Bridge

    • Gateway

    Correct Answer
    A. Switch
    Explanation
    Replacing Ethernet hubs with switches can yield significant performance improvements. Of the devices listed, switches are also the only ones that can be substituted for hubs. A router is used to separate networks, not as a connectivity point for workstations. A bridge could be used to segregate the network and therefore improve performance, but a switch is a more obvious choice in this example. A gateway is a device, system, or application that translates data from one format into another.

    Rate this question:

  • 19. 

    Which of the following devices would you find only on a token ring network?

    • Hub

    • Switch

    • MSAU

    • Router

    Correct Answer
    A. MSAU
    Explanation
    A Multistation Access Unit (MSAU) is used as the connectivity point on a token ring network. Switches and hubs are associated with Ethernet networks. Routers can be found on both token ring and Ethernet networks.

    Rate this question:

  • 20. 

    During a discussion with your ISP's technical support representative, he mentions that you might have been using the wrong FQDN.  Which TCP/IP-based network service is he referring to?

    • DHCP

    • WINS

    • SNMP

    • DNS

    Correct Answer
    A. DNS
    Explanation
    DNS is a system that resolves hostnames to IP addresses. The term FQDN is used to describe the entire hostname. None of the other services use FQDNs.

    Rate this question:

  • 21. 

    Under what circumstance would you change the default channel on an access point?

    • When channel overlap occurs between access points

    • To release and renew the SSID

    • To increase WEP security settings

    • To decrease WEP security settings

    Correct Answer
    A. When channel overlap occurs between access points
    Explanation
    Ordinarily the default channel used with a wireless device is adequate; however, you might need to change the channel if overlap occurs with another nearby access point. The channel should be changed to another, nonoverlapping channel. Changing the channel would not impact the WEP security settings.

    Rate this question:

  • 22. 

    Which of the following is not a type of fiber-optic connector used in network implementations?

    • MT-RJ

    • SC

    • BNC

    • LC

    Correct Answer
    A. BNC
    Explanation
    BNC is a connector type used with coaxial cabling. It is not used as a connector for fiber-optic cabling. MT-RJ, SC, and LC are all recognized types of fiber-optic connectors.

    Rate this question:

  • 23. 

    What is the function of NTP?

    • It provides a mechanism for the sharing of authentication information

    • It is used to access shared folders on a Linux system

    • It is used to communicate utilization information to a central manager

    • It is used to communicate time synchronization information between systems

    Correct Answer
    A. It is used to communicate time synchronization information between systems
    Explanation
    NTP is used to communicate time synchronization information between devices. NFS (Network File System) is a protocol typically associated with accessing shared folders on a Linux system. Utilization information is communicated to a central management system most commonly by using the SNMP protocol.

    Rate this question:

  • 24. 

    A client on your network has had no problems accessing the wireless network in the past, but recently she moved to a new office. Since the move she has been unable to access the network. Which of the following is most likely the cause of the problem?

    • The SSIDs on the client and the AP are different

    • The SSID has been erased

    • The client has incorrect WEP settings

    • The client system has moved too far from the access point

    Correct Answer
    A. The client system has moved too far from the access point
    Explanation
    An AP has a limited distance that it can send data transmissions. When a client system moves out of range, it can’t access the AP. Many strategies exist to increase transmission distances, including RF repeaters, amplifiers, and buying more powerful antennas. The problem is not likely related to the SSID or WEP settings, because the client had access to the network before, and no settings were changed.

    Rate this question:

  • 25. 

    A company is upgrading from DSL to a new T1.  When the ISP sends a technician out, the technician will terminate the T1 at which of the following locations in the building?

    • Patch panel

    • Firewall

    • Switch

    • Demarc

    Correct Answer
    A. Demarc
  • 26. 

    Which of the following devices forwards data packets to all connected ports?

    • Router

    • Switch

    • Bridge

    • Hub

    Correct Answer
    A. Hub
    Explanation
    Hubs are inefficient devices that send data packets to all connected devices. Many of today’s networks are upgrading to switches that pass data packets to the specific destination device. This method significantly increases network performance.

    Rate this question:

  • 27. 

    A technician is looking for an emergency connection solution not reliant on local data or power services.  Which of the following should the technician implement?

    • Satellite

    • ADSL

    • ISDN

    • OC-3

    Correct Answer
    A. Satellite
  • 28. 

    Which of the following is the MOST accurate description of a L2/L3 switch?

    • Performs switching and routing duties

    • A router that directly connects to a switch

    • A multi-purpose switch fabric used in full mesh environments

    • A switch that directly connects to a router

    Correct Answer
    A. Performs switching and routing duties
  • 29. 

    You have been asked to connect two office locations.  It has been specified that a wireless link be used.  Which of the following strategies would you use to connect the two offices?

    • Point-to-point

    • Wireless mesh

    • PtMP

    • Star bus hybrid

    Correct Answer
    A. Point-to-point
    Explanation
    In a point-to-point (PtP) wireless configuration, the communication link travels from one node directly to one other node. Wireless point-to-point systems are often used in wireless backbone systems such as microwave relay communications, or as a replacement for a single wired communication cable. The point-to-point link can be used to connect two locations to share data and resources.

    Rate this question:

  • 30. 

    You have been hired to establish a WAN connection between two offices - one in Vancouver and one in Seattle.  The transmission speed can be no less than 24 Mbps.  Which of the following technologies could you choose?

    • T1

    • PSTN

    • T3

    • ISDN

    Correct Answer
    A. T3
    Explanation
    The only possible answer that is capable of transfer speeds above 2Mbps is a T3 line. None of the other technologies listed can provide the transmission speed required.

    Rate this question:

  • 31. 

    Which of the following wireless protocols operate at 2.4 GHz? (Select two.)

    • 802.11a

    • 802.11b

    • 802.11g

    • 802.11t

    Correct Answer(s)
    A. 802.11b
    A. 802.11g
    Explanation
    Wireless standards specify an RF range on which communications are sent. The 802.11b and 802.11g standards use the 2.4GHz range. 802.11a uses the 5GHz range. 802.11t is not a valid standard.

    Rate this question:

  • 32. 

    Which of the following protocols offers guaranteed delivery?

    • FTP

    • IPX

    • IP

    • TCP

    Correct Answer
    A. TCP
    Explanation
    TCP is a connection-oriented protocol that guarantees delivery of data. FTP is a protocol used to transfer large blocks of data. IPX stands for Internetwork Packet Exchange. IP is a network layer protocol that’s responsible for tasks such as addressing and route discovery.

    Rate this question:

  • 33. 

    Which of the following statements are associated with a bus LAN network? (Choose all correct answers)

    • A single cable break can cause complete network disruption

    • All devices connect to a central device

    • It uses a single backbone to connect all network devices

    • It uses a dual-ring configuration

    Correct Answer(s)
    A. A single cable break can cause complete network disruption
    A. It uses a single backbone to connect all network devices
    Explanation
    In a bus network, a single break in the network cable can disrupt all the devices on that segment of the network, a significant shortcoming. A bus network also uses a single cable as a backbone to which all networking devices attach. A star network requires networked devices to connect to a centralized device such as a hub or MSAU. Therefore, answer B is incorrect.

    Rate this question:

  • 34. 

    You are the administrator for a network with two Windows Server systems and 65 Windows Vista systems.  At 10 A.M. three users call to report that they are experiencing network connectivity problems.  Upon investigation, you determine that the DHCP server has failed.  How can you tell that the DHCP server failure is the cause of the connectivity problems experienced by the three users?

    • When you check their systems, they have an IP address of 0.0.0.0

    • When you check their systems, they have an IP address in the 192.168.x.x. address range

    • When you check their systems, they have a default gateway value of 255.255.255.255

    • When you check their systems, they have an IP address from the 169.254.x.x range

    Correct Answer
    A. When you check their systems, they have an IP address from the 169.254.x.x range
    Explanation
    When a Windows XP Professional system that is configured to obtain an IP address via DHCP fails to obtain an address, it uses APIPA to assign itself an address from the 169.254.x.x address range. An address of 0.0.0.0 normally results from a system that does not support APIPA. APIPA does not use the 192.168.x.x address range. The IP address 255.255.255.255 is the broadcast address. A DHCP failure would not lead to a system assigning itself this address.

    Rate this question:

  • 35. 

    Which of the following is an advantage of ISDN over PSTN?

    • ISDN is more reliable

    • ISDN is cheaper

    • ISDN is faster

    • ISDN uses 53 kbps fixed-length packets

    Correct Answer
    A. ISDN is faster
    Explanation
    One clear advantage that ISDN has over the PSTN is its speed. ISDN can combine 64Kbps channels for faster transmission speeds than the PSTN can provide. ISDN is no more or less reliable than the PSTN. ISDN is more expensive than the PSTN. Answer D describes ATM.

    Rate this question:

  • 36. 

    Which of the following are considered link state protocols?

    • RIPv2 and EIGRP

    • EGP and IGP

    • OSPF and IS-IS

    • RIP and BGP

    Correct Answer
    A. OSPF and IS-IS
  • 37. 

    Which of the following statements best describes a VPN?

    • It is any protocol that allows remote clients to log in to a server over a network such as the Internet

    • It provides a system whereby only screen display and keyboard and mouse input travel across the link

    • It is a secure communication channel across a public network such as the Internet

    • It is a protocol used to encrypt user IDs and passwords

    Correct Answer
    A. It is a secure communication channel across a public network such as the Internet
    Explanation
    A VPN provides a secure communication path between devices over a public network such as the Internet.

    Rate this question:

  • 38. 

    Of the following routing methods, which is likely to require the most administration time in the long term?

    • Static

    • Link state

    • Distance vector

    • Dynamic

    Correct Answer
    A. Static
    Explanation
    Static routing takes more time to administer in the long term, because any changes to the network routing table must be entered manually. Distance vector and link state are both dynamic routing methods. Dynamic routing might take more time to configure initially, but in the long term, it requires less administration time. It can adapt to changes in the network layout automatically.

    Rate this question:

  • 39. 

    Which of the following are considered transport protocols? (Choose the two best answers)

    • TCP

    • IP

    • UDP

    • THC

    Correct Answer(s)
    A. TCP
    A. UDP
    Explanation
    Both TCP and UDP are transport protocols. IP is a network protocol, and THC is not a valid protocol.

    Rate this question:

  • 40. 

    Which of the following is a Class B address?

    • 129.16.12.200

    • 126.15.16.122

    • 211.244.212.5

    • 193.17.101.27

    Correct Answer
    A. 129.16.12.200
    Explanation
    Class B addresses fall into the range 128 to 191. Answer A is the only address listed that falls into that range. Answer B is a Class A address, and answers C and D are Class C IP addresses.

    Rate this question:

  • 41. 

    10GBase-T is backwards compatible with which of the following? (Select TWO)

    • 10GBase-SW

    • 100Base-FX

    • 10GBase-LW

    • 100Base-T

    • 10Base-T

    Correct Answer(s)
    A. 100Base-T
    A. 10Base-T
  • 42. 

    Your manager has asked you to specify a high-speed 10GbE link to provide connectivity between two buildings 3 kilometers from each other. Which of the following IEEE standards are you likely to recommend?

    • 10GBaseLR

    • 10GBaseSR

    • 10GBaseT4

    • 10GBaseFL

    Correct Answer
    A. 10GBaseLR
    Explanation
    10GBaseLR can be used over distances up to 10 km. 10GBaseSR can only be used up to a maximum distance of 300 meters. 10GBaseT4 and 10GBaseFL are not recognized 10 Gigabit Ethernet standards.

    Rate this question:

  • 43. 

    What kind of cable would you associate with an F-type connector?

    • Fiber-optic

    • UTP

    • Coaxial

    • STP

    Correct Answer
    A. Coaxial
    Explanation
    F-type connectors are used with coaxial cables. They are not used with fiber-optic,Unshielded Twisted Pair (UTP), or Shielded Twisted Pair (STP) cabling.

    Rate this question:

  • 44. 

    Which of the following devices passes data based on the MAC address?

    • Hub

    • Switch

    • MSAU

    • Router

    Correct Answer
    A. Switch
    Explanation
    When determining the destination for a data packet, the switch learns the MAC address of all devices attached to it and then matches the destination MAC address in the data it receives. None of the other devices listed passes data based solely on the MAC address.

    Rate this question:

  • 45. 

    What is the IPv6 equivalent of 127.0.0.1? (Choose two)

    • 0:0:0:0:0:0:0:1

    • 0:0:0:0:0:0:0:24

    • ::1

    • ::24

    Correct Answer(s)
    A. 0:0:0:0:0:0:0:1
    A. ::1
    Explanation
    The IPv4 address 127.0.0.1 is reserved as the loopback address, and IPv6 has the same reservation. IPv6 addresses 0:0:0:0:0:0:0:0 and 0:0:0:0:0:0:0:1 are reserved as the loopback addresses. The address 0:0:0:0:0:0:0:1 can be shown using the :: notation with the 0s removed, resulting in ::1.

    Rate this question:

  • 46. 

    Which of the following best describes the function of the default gateway?

    • It provides the route for destinations outside the local network

    • It enables a single Internet connection to be used by several users

    • It identifies the local subnet and formulates a routing table

    • It is used to communicate in a multiple-platform environment

    Correct Answer
    A. It provides the route for destinations outside the local network
    Explanation
    The default gateway enables systems on one local subnet to access those on another. Answer B describes Internet Connection Sharing (ICS). Answers C and D don’t describe the main function of a default gateway.

    Rate this question:

  • 47. 

    As a network administrator, you are called in to troubleshoot a problem on a token ring network.  The network uses two MSAUs connected using the ring-in ports on both devices. All network cards are set at the same speed.  What is the likely cause of the problem?

    • Bad network card

    • Faulty cabling

    • MSAU configuration

    • Network card configuration

    Correct Answer
    A. MSAU configuration
    Explanation
    To create the complete ring, the ring-in (RI) port on each MSAU is connected to the ring-out (RO) port on another MSAU. The last MSAU in the ring is then connected tot he first to complete the ring.

    Rate this question:

  • 48. 

    Which of the following fiber connectors uses a twist-type connection method?

    • ST

    • SC

    • BNC

    • SA

    Correct Answer
    A. ST
    Explanation
    ST fiber connectors use a twist-type connection method. SC connectors use a pushtype connection method. The other choices are not valid fiber connectors.

    Rate this question:

  • 49. 

    You decide to move your network from NetBEUI to TCP/IP.  For the external interfaces, you decide to obtain registered IP addresses from your ISP, but for the interal network, you choose to configure systems by using one of the private address ranges.  Of the following address ranges, which one would you NOT consider?

    • 192.168.0.0 to 192.168.255.255

    • 131.16.0.0 to 131.16.255.255

    • 10.0.0.0 to 10.255.255.255

    • 172.16.0.0 to 172.31.255.255

    Correct Answer
    A. 131.16.0.0 to 131.16.255.255
    Explanation
    The 131.16 range is from the Class B range and is not one of the recognized private IP address ranges. All the other address ranges are valid private IP address ranges.

    Rate this question:

Quiz Review Timeline (Updated): Jan 16, 2013 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 16, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 07, 2010
    Quiz Created by
    Nevermore42
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.