CompTIA Network+ Certification

85 Questions | Total Attempts: 167

SettingsSettingsSettings
CompTIA Network+ Certification

85 general CompTIA Network+ certification exam questions


Questions and Answers
  • 1. 
    Which of the following are considered link state protocols?
    • A. 

      RIPv2 and EIGRP

    • B. 

      EGP and IGP

    • C. 

      OSPF and IS-IS

    • D. 

      RIP and BGP

  • 2. 
    A user is unable to reach the Internet.  The technician asks the user to do an IPCONFIG /all.  The user reports that their IP address is 172.20.1.18, subnet mask is 255.255.255.0, and their default gateway is 172.16.1.18.  Which of the following is the cause of the problem?
    • A. 

      Default gateway

    • B. 

      Network cable

    • C. 

      Subnet mask

    • D. 

      CNAME record

  • 3. 
    A company has installed a new 802.11g point-to-point connection between two buildings and is experiencing low throughput across the link.  The current setup involves a wireless bridge on the roof with an omni-directional antenna.  Which of the following would BEST improve the link performance?
    • A. 

      Replace the wireless bridges with wireless access points

    • B. 

      Install bi-directional amplifiers at both sites

    • C. 

      Configure channel hopping on both wireless bridges

    • D. 

      Replace the omni-directional antennas with Yagi antennas

  • 4. 
    Which of the following should be implemented to allow a user to securely connect to a network drive remotely?
    • A. 

      Enable file and print share

    • B. 

      FTP

    • C. 

      VPN

    • D. 

      Map a drive

  • 5. 
    A company is upgrading from DSL to a new T1.  When the ISP sends a technician out, the technician will terminate the T1 at which of the following locations in the building?
    • A. 

      Patch panel

    • B. 

      Firewall

    • C. 

      Switch

    • D. 

      Demarc

  • 6. 
    Assuming that the bridge priority is the same between four switches, identify which switch will become the root bridge in 802.1d if all four switches are interconnected.
    • A. 

      Switch 1 (MAC Address = aa:aa:aa:aa:aa:aa

    • B. 

      Switch 2 (MAC Address = bb:bb:bb:bb:bb:bb

    • C. 

      Switch 3 (MAC Address = cc:cc:cc:cc:cc:cc

    • D. 

      Switch 4 (MAC Address = dd:dd:dd:dd:dd:dd

  • 7. 
    Which of the following connectors would be used if the EIA/TIA 568 scheme is followed?
    • A. 

      ST

    • B. 

      RJ-11

    • C. 

      RJ-45

    • D. 

      MT-RJ

  • 8. 
    Which of the following devices could be configured as a DHCP server?
    • A. 

      Wireless router

    • B. 

      Unmanaged switch

    • C. 

      Hub

    • D. 

      Repeater

  • 9. 
    After a technician came out and installed a new wireless router, one of the wired workstations began having problems connecting to the file server.  This is only an intermittent problem.  Which of the following actions will the technician MOST likely perform to resolve this problem?
    • A. 

      Change the router's SSID

    • B. 

      Move the router's location

    • C. 

      Check user permissions

    • D. 

      Check the cable ends

  • 10. 
    All of the following will interfere with a 2.4 GHz wireless phone EXCEPT:
    • A. 

      Bluetooth

    • B. 

      802.11a

    • C. 

      802.11b

    • D. 

      802.11g

  • 11. 
    A technician is looking for an emergency connection solution not reliant on local data or power services.  Which of the following should the technician implement?
    • A. 

      Satellite

    • B. 

      ADSL

    • C. 

      ISDN

    • D. 

      OC-3

  • 12. 
    Which of the following uses PKI?
    • A. 

      Blowfish

    • B. 

      AES

    • C. 

      PGP

    • D. 

      3DES

  • 13. 
    10GBase-T is backwards compatible with which of the following? (Select TWO)
    • A. 

      10GBase-SW

    • B. 

      100Base-FX

    • C. 

      10GBase-LW

    • D. 

      100Base-T

    • E. 

      10Base-T

  • 14. 
    A technician would use a physical network diagram to determine:
    • A. 

      The cause of routing errors

    • B. 

      The number of switches on the network

    • C. 

      The number of users on the network

    • D. 

      Where network latency will occur

  • 15. 
    Which of the following is the MOST accurate description of a L2/L3 switch?
    • A. 

      Performs switching and routing duties

    • B. 

      A router that directly connects to a switch

    • C. 

      A multi-purpose switch fabric used in full mesh environments

    • D. 

      A switch that directly connects to a router

  • 16. 
    Which of the following statements best describes a VPN?
    • A. 

      It is any protocol that allows remote clients to log in to a server over a network such as the Internet

    • B. 

      It provides a system whereby only screen display and keyboard and mouse input travel across the link

    • C. 

      It is a secure communication channel across a public network such as the Internet

    • D. 

      It is a protocol used to encrypt user IDs and passwords

  • 17. 
    Which of the following are valid ways to assign computers to a VLAN? (select THREE)
    • A. 

      Protocol assignment

    • B. 

      Port-based assignment

    • C. 

      NetBIOS computer name

    • D. 

      MAC address

  • 18. 
    You have been asked to install a network that will give the network users the greatest amount of fault tolerance.  Which of the following network topologies would you choose?
    • A. 

      Star

    • B. 

      Ring

    • C. 

      Mesh

    • D. 

      Bus

  • 19. 
    You have been asked to connect two office locations.  It has been specified that a wireless link be used.  Which of the following strategies would you use to connect the two offices?
    • A. 

      Point-to-point

    • B. 

      Wireless mesh

    • C. 

      PtMP

    • D. 

      Star bus hybrid

  • 20. 
    • A. 

      Bus

    • B. 

      Ring

    • C. 

      LAN

    • D. 

      Star

  • 21. 
    • A. 

      Star topology

    • B. 

      Star bus

    • C. 

      Ad hoc

    • D. 

      Infrastructure

  • 22. 
    Which of the following statements are associated with a bus LAN network? (Choose all correct answers)
    • A. 

      A single cable break can cause complete network disruption

    • B. 

      All devices connect to a central device

    • C. 

      It uses a single backbone to connect all network devices

    • D. 

      It uses a dual-ring configuration

  • 23. 
    Which of the following are required to establish a VPN connection? (Choose all correct answers)
    • A. 

      VPN server

    • B. 

      VPN client

    • C. 

      VPN protocols

    • D. 

      VPN MAC identification

  • 24. 
    Which network topology offers the greatest level of redundancy but has the highest implementation cost?
    • A. 

      Wireless mesh

    • B. 

      Wired mesh

    • C. 

      Hybrid star

    • D. 

      Bus network

  • 25. 
    As a network administrator, you are called in to troubleshoot a problem on a token ring network.  The network uses two MSAUs connected using the ring-in ports on both devices. All network cards are set at the same speed.  What is the likely cause of the problem?
    • A. 

      Bad network card

    • B. 

      Faulty cabling

    • C. 

      MSAU configuration

    • D. 

      Network card configuration

  • 26. 
    You are troubleshooting a network using 1000BaseCX cable and you suspect that the maximum length has been exceeded.  What is the maximum length of 1000BaseCX cable?
    • A. 

      1,000 meters

    • B. 

      100 meters

    • C. 

      25 meters

    • D. 

      10,000 meters

  • 27. 
    Which of the following 10 Gigabit Ethernet standards has the greatest maximum transmission distance?
    • A. 

      10GBaseSR

    • B. 

      10GBaseER

    • C. 

      10GBaseLR

    • D. 

      10GBaseXR

  • 28. 
    Your manager has asked you to specify a high-speed 10GbE link to provide connectivity between two buildings 3 kilometers from each other. Which of the following IEEE standards are you likely to recommend?
    • A. 

      10GBaseLR

    • B. 

      10GBaseSR

    • C. 

      10GBaseT4

    • D. 

      10GBaseFL

  • 29. 
    Which of the following connectors is commonly used with fiber cabling?
    • A. 

      RJ-45

    • B. 

      BNC

    • C. 

      SC

    • D. 

      RJ-11

  • 30. 
    Which of the following describes the loss of signal strength as a signal travels through a particular medium?
    • A. 

      Attenuation

    • B. 

      Crosstalk

    • C. 

      EMI

    • D. 

      Chatter

  • 31. 
    What kind of cable would you associate with an F-type connector?
    • A. 

      Fiber-optic

    • B. 

      UTP

    • C. 

      Coaxial

    • D. 

      STP

  • 32. 
    In a 100BaseTX network environment, what is the maximum distance between the device and the networking equipment, assuming that no repeaters are used?
    • A. 

      1,000 meters

    • B. 

      100 meters

    • C. 

      500 meters

    • D. 

      185 meters

  • 33. 
    A user calls to report that he is experiencing periodic problems connecting to the network. Upon investigation, you find that the cable connecting the user’s PC to the switch is close to a fluorescent light fitting. What condition is most likely causing the problem?
    • A. 

      Crosstalk

    • B. 

      EMI

    • C. 

      Attenuation

    • D. 

      Faulty cable

  • 34. 
    Which of the following is not a type of fiber-optic connector used in network implementations?
    • A. 

      MT-RJ

    • B. 

      SC

    • C. 

      BNC

    • D. 

      LC

  • 35. 
    Which of the following fiber connectors uses a twist-type connection method?
    • A. 

      ST

    • B. 

      SC

    • C. 

      BNC

    • D. 

      SA

  • 36. 
    Users are complaining that the network’s performance is unsatisfactory. It takes a long time to pull files from the server, and, under heavy loads, workstations can become disconnected from the server. The network is heavily used, and a new videoconferencing application is about to be installed. The network is a 100BaseT system created with Ethernet hubs. Which device are you most likely to install to alleviate the performance problems?
    • A. 

      Switch

    • B. 

      Router

    • C. 

      Bridge

    • D. 

      Gateway

  • 37. 
    Which of the following devices forwards data packets to all connected ports?
    • A. 

      Router

    • B. 

      Switch

    • C. 

      Bridge

    • D. 

      Hub

  • 38. 
    Of the following routing methods, which is likely to require the most administration time in the long term?
    • A. 

      Static

    • B. 

      Link state

    • C. 

      Distance vector

    • D. 

      Dynamic

  • 39. 
    Your manager asks you to look into some upgrades for your network. The current network is a 10Base2 system, and you have been experiencing numerous cable problems that have been hard to track down. As a result, you have decided to upgrade to a 10BaseT system.On the networking vendor’s price list are both active and passive hubs. The passive hubs are considerably cheaper than the active ones, and you are tempted to opt for them so that you come in under budget. A colleague advises against the purchase of passive hubs.What is the primary difference between an active hub and a passive hub?
    • A. 

      Passive hubs do not offer any management capabilities

    • B. 

      Passive hubs cannot be used in full-duplex mode

    • C. 

      Passive hubs do not regenerate the data signal

    • D. 

      Passive hubs forward data to all ports on the hub, not just the one for which they are intended

  • 40. 
    Which of the following statements best describes a gateway?
    • A. 

      It is a device that enables data to be routed from one network to another

    • B. 

      It refers to any device that resides at the entrance of a network

    • C. 

      It is a device, system or application that translates data from one format into another

    • D. 

      It is a network device that can forward or block data based on the MAC address embedded in the packet

  • 41. 
    You have a thin coaxial-based Ethernet network and are experiencing performance problems on the network. By using a network performance-monitoring tool, you determine that the network has a large number of collisions. In an effort to reduce the collisions, you decide to install a network bridge. What kind of bridge are you most likely to implement?
    • A. 

      Collision bridge

    • B. 

      Transparent bridge

    • C. 

      Visible bridge

    • D. 

      Translational bridge

  • 42. 
    Several users on your network are downloading from peer-to-peer networks, tying up bandwidth during peak hours. Which of the following is used to manage network bandwidth?
    • A. 

      Load balancer

    • B. 

      Load toner

    • C. 

      Bandwidth toner

    • D. 

      Bandwidth shaper

  • 43. 
    Which of the following devices passes data based on the MAC address?
    • A. 

      Hub

    • B. 

      Switch

    • C. 

      MSAU

    • D. 

      Router

  • 44. 
    What is the speed of the 16550 UART chip?
    • A. 

      921,600 Kbps

    • B. 

      430,800 Kbps

    • C. 

      115,200 Kbps

    • D. 

      9,600 Kbps

  • 45. 
    Which of the following devices would you find only on a token ring network?
    • A. 

      Hub

    • B. 

      Switch

    • C. 

      MSAU

    • D. 

      Router

  • 46. 
    TCP is an example of what kind of transport protocol?
    • A. 

      Connection-oriented

    • B. 

      Connection-reliant

    • C. 

      Connection-dependent

    • D. 

      Connectionless

  • 47. 
    Which of the following are considered transport protocols? (Choose the two best answers)
    • A. 

      TCP

    • B. 

      IP

    • C. 

      UDP

    • D. 

      THC

  • 48. 
    At which OSI layer does an AP operate?
    • A. 

      Network

    • B. 

      Physical

    • C. 

      Data link

    • D. 

      Session

  • 49. 
    Which of the following are sublayers of the data link layer? (Choose two)
    • A. 

      MAC

    • B. 

      LCL

    • C. 

      Session

    • D. 

      LLC

  • 50. 
    What is the function of ARP?
    • A. 

      It resolves MAC addresses to IP addresses

    • B. 

      It resolves NetBIOS names to IP addresses

    • C. 

      It resolves IP addresses to MAC addresses

    • D. 

      It resolves hostnames to IP addresses

  • 51. 
    What is the function of NTP?
    • A. 

      It provides a mechanism for the sharing of authentication information

    • B. 

      It is used to access shared folders on a Linux system

    • C. 

      It is used to communicate utilization information to a central manager

    • D. 

      It is used to communicate time synchronization information between systems

  • 52. 
    Which of the following OSI layers is responsible for establishing connections between two devices?
    • A. 

      Network

    • B. 

      Transport

    • C. 

      Session

    • D. 

      Data link

  • 53. 
    During a discussion with your ISP's technical support representative, he mentions that you might have been using the wrong FQDN.  Which TCP/IP-based network service is he referring to?
    • A. 

      DHCP

    • B. 

      WINS

    • C. 

      SNMP

    • D. 

      DNS

  • 54. 
    Which of the following protocols offers guaranteed delivery?
    • A. 

      FTP

    • B. 

      IPX

    • C. 

      IP

    • D. 

      TCP

  • 55. 
    At which OSI layer does a switch operate?
    • A. 

      Layer 1

    • B. 

      Layer 2

    • C. 

      Layer 3

    • D. 

      Layer 4

  • 56. 
    What is the IPv6 equivalent of 127.0.0.1? (Choose two)
    • A. 

      0:0:0:0:0:0:0:1

    • B. 

      0:0:0:0:0:0:0:24

    • C. 

      ::1

    • D. 

      ::24

  • 57. 
    As the network administrator, you decide to block port 80.  Which of the following services will be unavailable for network users?
    • A. 

      DNS

    • B. 

      POP3

    • C. 

      FTP

    • D. 

      HTTP

  • 58. 
    Which of the following is a Class B address?
    • A. 

      129.16.12.200

    • B. 

      126.15.16.122

    • C. 

      211.244.212.5

    • D. 

      193.17.101.27

  • 59. 
    You are the administrator for a network with two Windows Server systems and 65 Windows Vista systems.  At 10 A.M. three users call to report that they are experiencing network connectivity problems.  Upon investigation, you determine that the DHCP server has failed.  How can you tell that the DHCP server failure is the cause of the connectivity problems experienced by the three users?
    • A. 

      When you check their systems, they have an IP address of 0.0.0.0

    • B. 

      When you check their systems, they have an IP address in the 192.168.x.x. address range

    • C. 

      When you check their systems, they have a default gateway value of 255.255.255.255

    • D. 

      When you check their systems, they have an IP address from the 169.254.x.x range

  • 60. 
    Which of the following address types are associated with IPv6? (Choose three)
    • A. 

      Broadcast

    • B. 

      Multicast

    • C. 

      Unicast

    • D. 

      Anycast

  • 61. 
    Which of the following IP addresses is not from a private address range?
    • A. 

      192.168.200.117

    • B. 

      172.16.3.204

    • C. 

      127.45.112.16

    • D. 

      10.27.100.143

  • 62. 
    You have been tasked with temporarily disabling Telnet access for external users.  What is the best way to accomplish this?
    • A. 

      Block port 53 on the corporate firewall

    • B. 

      Block port 23 on the corporate firewall

    • C. 

      Uninstall the Telnet service

    • D. 

      Configure ICS to ignore client-initiated Telent requests

  • 63. 
    You decide to move your network from NetBEUI to TCP/IP.  For the external interfaces, you decide to obtain registered IP addresses from your ISP, but for the interal network, you choose to configure systems by using one of the private address ranges.  Of the following address ranges, which one would you NOT consider?
    • A. 

      192.168.0.0 to 192.168.255.255

    • B. 

      131.16.0.0 to 131.16.255.255

    • C. 

      10.0.0.0 to 10.255.255.255

    • D. 

      172.16.0.0 to 172.31.255.255

  • 64. 
    You ask your ISP to assign a public IP address for the external interface of your Windows 2000 server, which is running a proxy server application.  In the e-mail message you get that contains the information, the ISP tells you that you have been assigned the IP address 203.15.226.12/24.  When you fill out the subnet mask field on the IP configuration dialog box on your system, what subnet mask should you use?
    • A. 

      255.255.255.255

    • B. 

      255.255.255.0

    • C. 

      255.255.240.0

    • D. 

      255.255.255.240

  • 65. 
    Which of the following best describes the function of the default gateway?
    • A. 

      It provides the route for destinations outside the local network

    • B. 

      It enables a single Internet connection to be used by several users

    • C. 

      It identifies the local subnet and formulates a routing table

    • D. 

      It is used to communicate in a multiple-platform environment

  • 66. 
    Your company currently uses a standard PSTN communication link to transfer files between LANs.  Until now, the transfer speeds have been sufficient for the amount of data that needs to be transferred.  Recently, a new application was purchased that requires a minimum transmission speed of 1.5 Mpbs.  You have been given the task of finding the most cost-effective solution to accomodate the new application.  Which of the following technologies would you use?
    • A. 

      T3

    • B. 

      X.25

    • C. 

      T1

    • D. 

      BRI ISDN

  • 67. 
    Which of the following best describes the process of creating a dedicated circuit between two communication endpoints and directing traffic between those two points?
    • A. 

      Multiplexing

    • B. 

      Directional addressing

    • C. 

      Addressing

    • D. 

      Circuit switching

  • 68. 
    Which of the following statements are true of ISDN? (Choose the best two answers)
    • A. 

      BRI ISDN uses two B+1 D channels

    • B. 

      BRI ISDN uses 23 B+1 D channels

    • C. 

      PRI ISDN uses two B+1 D channels

    • D. 

      PRI ISDN uses 23 B+1 D channels

  • 69. 
    You have been hired to establish a WAN connection between two offices - one in Vancouver and one in Seattle.  The transmission speed can be no less than 24 Mbps.  Which of the following technologies could you choose?
    • A. 

      T1

    • B. 

      PSTN

    • C. 

      T3

    • D. 

      ISDN

  • 70. 
    On an ISDN connection, what is the purpose of the D channel?
    • A. 

      It carries the data signals

    • B. 

      It carries signaling information

    • C. 

      It allows multiple channels to be combined, to provide greater bandwidth

    • D. 

      It provides a temporary overflow capacity for the other channels

  • 71. 
    Which of the following circuit-switching strategies does ATM use? (Choose the two best answers)
    • A. 

      SVC

    • B. 

      VCD

    • C. 

      PVC

    • D. 

      PCV

  • 72. 
    Due to recent cutbacks, your boss approaches you, demanding an alternative to the company's costly dedicated T1 line.  Only small amounts of data will require transfer over the line.  Which of the following are you likely to recommend?
    • A. 

      ISDN

    • B. 

      FDDI

    • C. 

      The PSTN

    • D. 

      X.25

  • 73. 
    Which of the following technologies requires a logical connection between the sending and receiving devices?
    • A. 

      Circuit switching

    • B. 

      Virtual-circuit packet switching

    • C. 

      Message switching

    • D. 

      High-density circuit switching

  • 74. 
    Which of the following technologies require dialup access? (Choose the two best answers)
    • A. 

      FDDI

    • B. 

      ISDN

    • C. 

      Packet switching

    • D. 

      The PSTN

  • 75. 
    Which of the following is an advantage of ISDN over PSTN?
    • A. 

      ISDN is more reliable

    • B. 

      ISDN is cheaper

    • C. 

      ISDN is faster

    • D. 

      ISDN uses 53 kbps fixed-length packets

  • 76. 
    Which of the following wireless protocols operate at 2.4 GHz? (Select two.)
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11t

  • 77. 
    Under what circumstance would you change the default channel on an access point?
    • A. 

      When channel overlap occurs between access points

    • B. 

      To release and renew the SSID

    • C. 

      To increase WEP security settings

    • D. 

      To decrease WEP security settings

  • 78. 
    A client on your network has had no problems accessing the wireless network in the past, but recently she moved to a new office. Since the move she has been unable to access the network. Which of the following is most likely the cause of the problem?
    • A. 

      The SSIDs on the client and the AP are different

    • B. 

      The SSID has been erased

    • C. 

      The client has incorrect WEP settings

    • D. 

      The client system has moved too far from the access point

  • 79. 
    You configure a wireless connection using the Bluetooth standard. At what speed does Bluetooth operate?
    • A. 

      350 Mbps

    • B. 

      720 Kbps

    • C. 

      200 Kbps

    • D. 

      11 Mbps

  • 80. 
    You purchase a new wireless access point that uses no WEP security by default. You change the security settings to use 128-bit encryption. How must the client systems be configured?
    • A. 

      All client systems must be set to 128-bit encryption

    • B. 

      The client system inherits security settings from the AP

    • C. 

      WEP does not support 128-bit encryption

    • D. 

      The client WEP settings have to be set to autodetect

  • 81. 
    You are asked to configure the security settings for a new wireless network. You want the setting that offers the greatest level of security. Which of the following would you choose?
    • A. 

      WEP-Open

    • B. 

      WEP-Closed

    • C. 

      WEP-Shared

    • D. 

      WEP-Unshared

  • 82. 
    Which of the following best describes 802.1X?
    • A. 

      A port-based access control

    • B. 

      A wireless standard specifying 11Mbps data transfer

    • C. 

      A wireless standard specifying 54Mbps data transfer

    • D. 

      An integrity-based access control

  • 83. 
    You are installing a wireless network solution, and you require a standard that can operate using either 2.4 GHz or 5 GHz frequencies. Which of the following standards would you choose?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11n

  • 84. 
    You are installing a wireless network solution that uses a feature known as MIMO. Which wireless networking standard are you using?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11n

  • 85. 
    In the 802.1X security framework, which of the following best describes the role of the supplicant?
    • A. 

      Authenticating user names and passwords

    • B. 

      Encrypting usernames and passwords

    • C. 

      The system or node requesting access and authentication to a network resource

    • D. 

      A control mechanism that allows or denies traffic that wants to pass through a port