CompTIA Network+ Certification

85 Questions | Attempts: 172
Share
Please wait...
Question 1 / 85
0 %
0/100
Score 0/100
1. A user calls to report that he is experiencing periodic problems connecting to the network. Upon investigation, you find that the cable connecting the user’s PC to the switch is close to a fluorescent light fitting. What condition is most likely causing the problem?

Explanation

EMI is a type of interference that is often seen when cables run too close to electrical devices. Crosstalk is when two cables interfere with each other. Attenuation is a
loss of signal strength. Answer D is incorrect also. It may be that a faulty cable is causing the problem. However, the question asked for the most likely cause. Because the cable is running near fluorescent lights, the problem is more likely associated with EMI.

Submit
Please wait...
About This Quiz
CompTIA Network+ Certification - Quiz

85 general CompTIA Network+ certification exam questions

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Which of the following connectors is commonly used with fiber cabling?

Explanation

SC connectors are used with fiber-optic cable. RJ-45 connectors are used with UTP cable, BNC is used for thin coax cable, and RJ-1 1 is used for regular phone connectors.

Submit
3. Which of the following describes the loss of signal strength as a signal travels through a particular medium?

Explanation

The term used to describe the loss of signal strength for media is attenuation. Crosstalk refers to the interference between two cables, EMI is electromagnetic interference, and chatter is not a valid media interference concern.

Submit
4. Which of the following devices could be configured as a DHCP server?
Submit
5. Which network topology offers the greatest level of redundancy but has the highest implementation cost?

Explanation

The mesh topology requires each computer on the network to be individually connected to every other device. This configuration provides maximum reliability and redundancy for the network. However, it is very costly to implement due to the multiple wiring requirements.

Submit
6. Which of the following should be implemented to allow a user to securely connect to a network drive remotely?
Submit
7. In a 100BaseTX network environment, what is the maximum distance between the device and the networking equipment, assuming that no repeaters are used?

Explanation

100BaseT networks use UTP cabling, which has a maximum cable length of 100 meters. Answer A is incorrect because this distance could only be achieved with UTP cabling by using repeaters. Answer C specifies the maximum cable length for 10Base5 networks. Answer D specifies the maximum cable length for 10Base2 networks.

Submit
8. TCP is an example of what kind of transport protocol?

Explanation

TCP is an example of a connection-oriented transport protocol. UDP is an example of a connectionless protocol. Connection-reliant and connection-dependent are not terms commonly associated with protocols.

Submit
9. As the network administrator, you decide to block port 80.  Which of the following services will be unavailable for network users?

Explanation

The HTTP service uses port 80, so blocking port 80 prevents users from using the HTTP service. Answer A is incorrect because DNS uses port 53. Answer B is incorrect because POP3 uses port 110. Answer C is incorrect because FTP uses port 21.

Submit
10. Which of the following connectors would be used if the EIA/TIA 568 scheme is followed?
Submit
11. At which OSI layer does a switch operate?

Explanation

A switch uses the MAC addresses of connected devices to make its forwarding decisions. Therefore, it is called a data link, or Layer 2, network device. Devices or components that operate at Layer 1 typically are media-based, such as cables or connectors. An example of a Layer 3 device is a router. Layer 4 components typically are software-based, not hardware-based.

Submit
12. You ask your ISP to assign a public IP address for the external interface of your Windows 2000 server, which is running a proxy server application.  In the e-mail message you get that contains the information, the ISP tells you that you have been assigned the IP address 203.15.226.12/24.  When you fill out the subnet mask field on the IP configuration dialog box on your system, what subnet mask should you use?

Explanation

In CIDR terminology, the number of bits to be included in the subnet mask is expressed as a slash value. If the slash value is 24, the first three octets form the subnet mask, so the value is 255.255.255.0.

Submit
13. A user is unable to reach the Internet.  The technician asks the user to do an IPCONFIG /all.  The user reports that their IP address is 172.20.1.18, subnet mask is 255.255.255.0, and their default gateway is 172.16.1.18.  Which of the following is the cause of the problem?
Submit
14. You have been asked to install a network that will give the network users the greatest amount of fault tolerance.  Which of the following network topologies would you choose?

Explanation

A mesh network uses a point-to-point connection to every device on the network. This creates multiple points for the data to be transmitted around the network and therefore creates a high degree of redundancy. The star, ring and bus topologies do not offer fault tolerance.

Submit
15. You have been tasked with temporarily disabling Telnet access for external users.  What is the best way to accomplish this?

Explanation

By blocking port 23, you can disable the Telnet service. Answer A is incorrect because port 53 is used by DNS. Uninstalling the Telnet service is not a practical solution.

Submit
16. Assuming that the bridge priority is the same between four switches, identify which switch will become the root bridge in 802.1d if all four switches are interconnected.
Submit
17. Which of the following topologies allows for network expansion with the least amount of disruption for the current network users?

Explanation

On a star network, each network device uses a separate cable to make a point-topoint connection to a centralized device such as a hub. With such a configuration, a new device can be added to the network by attaching the new device to the hub with its own cable. This process does not disrupt the users who are currently on the network. Answers A and B are incorrect because the addition of new network devices on a ring or bus network can cause a disruption in the network and cause network services to be unavailable during the installation of a new device.

Submit
18. Users are complaining that the network’s performance is unsatisfactory. It takes a long time to pull files from the server, and, under heavy loads, workstations can become disconnected from the server. The network is heavily used, and a new videoconferencing application is about to be installed. The network is a 100BaseT system created with Ethernet hubs. Which device are you most likely to install to alleviate the performance problems?

Explanation

Replacing Ethernet hubs with switches can yield significant performance improvements. Of the devices listed, switches are also the only ones that can be substituted for hubs. A router is used to separate networks, not as a connectivity point for workstations. A bridge could be used to segregate the network and therefore improve performance, but a switch is a more obvious choice in this example. A gateway is a device, system, or application that translates data from one format into another.

Submit
19. Which of the following devices would you find only on a token ring network?

Explanation

A Multistation Access Unit (MSAU) is used as the connectivity point on a token ring network. Switches and hubs are associated with Ethernet networks. Routers can be found on both token ring and Ethernet networks.

Submit
20. During a discussion with your ISP's technical support representative, he mentions that you might have been using the wrong FQDN.  Which TCP/IP-based network service is he referring to?

Explanation

DNS is a system that resolves hostnames to IP addresses. The term FQDN is used to describe the entire hostname. None of the other services use FQDNs.

Submit
21. Under what circumstance would you change the default channel on an access point?

Explanation

Ordinarily the default channel used with a wireless device is adequate; however, you might need to change the channel if overlap occurs with another nearby access point. The channel should be changed to another, nonoverlapping channel. Changing the channel would not impact the WEP security settings.

Submit
22. Which of the following is not a type of fiber-optic connector used in network implementations?

Explanation

BNC is a connector type used with coaxial cabling. It is not used as a connector for fiber-optic cabling. MT-RJ, SC, and LC are all recognized types of fiber-optic connectors.

Submit
23. What is the function of NTP?

Explanation

NTP is used to communicate time synchronization information between devices. NFS (Network File System) is a protocol typically associated with accessing shared folders on a Linux system. Utilization information is communicated to a central management system most commonly by using the SNMP protocol.

Submit
24. A client on your network has had no problems accessing the wireless network in the past, but recently she moved to a new office. Since the move she has been unable to access the network. Which of the following is most likely the cause of the problem?

Explanation

An AP has a limited distance that it can send data transmissions. When a client system moves out of range, it can’t access the AP. Many strategies exist to increase transmission distances, including RF repeaters, amplifiers, and buying more powerful antennas. The problem is not likely related to the SSID or WEP settings, because the client had access to the network before, and no settings were changed.

Submit
25. A company is upgrading from DSL to a new T1.  When the ISP sends a technician out, the technician will terminate the T1 at which of the following locations in the building?
Submit
26. Which of the following devices forwards data packets to all connected ports?

Explanation

Hubs are inefficient devices that send data packets to all connected devices. Many of today’s networks are upgrading to switches that pass data packets to the specific destination device. This method significantly increases network performance.

Submit
27. A technician is looking for an emergency connection solution not reliant on local data or power services.  Which of the following should the technician implement?
Submit
28. Which of the following is the MOST accurate description of a L2/L3 switch?
Submit
29. You have been asked to connect two office locations.  It has been specified that a wireless link be used.  Which of the following strategies would you use to connect the two offices?

Explanation

In a point-to-point (PtP) wireless configuration, the communication link travels from one node directly to one other node. Wireless point-to-point systems are often used in wireless backbone systems such as microwave relay communications, or as a replacement for a single wired communication cable. The point-to-point link can be used to connect two locations to share data and resources.

Submit
30. You have been hired to establish a WAN connection between two offices - one in Vancouver and one in Seattle.  The transmission speed can be no less than 24 Mbps.  Which of the following technologies could you choose?

Explanation

The only possible answer that is capable of transfer speeds above 2Mbps is a T3 line. None of the other technologies listed can provide the transmission speed required.

Submit
31. Which of the following wireless protocols operate at 2.4 GHz? (Select two.)

Explanation

Wireless standards specify an RF range on which communications are sent. The 802.11b and 802.11g standards use the 2.4GHz range. 802.11a uses the 5GHz range. 802.11t is not a valid standard.

Submit
32. Which of the following protocols offers guaranteed delivery?

Explanation

TCP is a connection-oriented protocol that guarantees delivery of data. FTP is a protocol used to transfer large blocks of data. IPX stands for Internetwork Packet Exchange. IP is a network layer protocol that’s responsible for tasks such as addressing and route discovery.

Submit
33. Which of the following statements are associated with a bus LAN network? (Choose all correct answers)

Explanation

In a bus network, a single break in the network cable can disrupt all the devices on that segment of the network, a significant shortcoming. A bus network also uses a single cable as a backbone to which all networking devices attach. A star network requires networked devices to connect to a centralized device such as a hub or MSAU. Therefore, answer B is incorrect.

Submit
34. You are the administrator for a network with two Windows Server systems and 65 Windows Vista systems.  At 10 A.M. three users call to report that they are experiencing network connectivity problems.  Upon investigation, you determine that the DHCP server has failed.  How can you tell that the DHCP server failure is the cause of the connectivity problems experienced by the three users?

Explanation

When a Windows XP Professional system that is configured to obtain an IP address via DHCP fails to obtain an address, it uses APIPA to assign itself an address from the 169.254.x.x address range. An address of 0.0.0.0 normally results from a system that does not support APIPA. APIPA does not use the 192.168.x.x address range. The IP address 255.255.255.255 is the broadcast address. A DHCP failure would not lead to a system assigning itself this address.

Submit
35. Which of the following is an advantage of ISDN over PSTN?

Explanation

One clear advantage that ISDN has over the PSTN is its speed. ISDN can combine 64Kbps channels for faster transmission speeds than the PSTN can provide. ISDN is no more or less reliable than the PSTN. ISDN is more expensive than the PSTN. Answer D describes ATM.

Submit
36. Which of the following are considered link state protocols?
Submit
37. Which of the following statements best describes a VPN?

Explanation

A VPN provides a secure communication path between devices over a public network such as the Internet.

Submit
38. Of the following routing methods, which is likely to require the most administration time in the long term?

Explanation

Static routing takes more time to administer in the long term, because any changes to the network routing table must be entered manually. Distance vector and link state are both dynamic routing methods. Dynamic routing might take more time to configure initially, but in the long term, it requires less administration time. It can adapt to changes in the network layout automatically.

Submit
39. Which of the following are considered transport protocols? (Choose the two best answers)

Explanation

Both TCP and UDP are transport protocols. IP is a network protocol, and THC is not a valid protocol.

Submit
40. Which of the following is a Class B address?

Explanation

Class B addresses fall into the range 128 to 191. Answer A is the only address listed that falls into that range. Answer B is a Class A address, and answers C and D are Class C IP addresses.

Submit
41. 10GBase-T is backwards compatible with which of the following? (Select TWO)
Submit
42. Your manager has asked you to specify a high-speed 10GbE link to provide connectivity between two buildings 3 kilometers from each other. Which of the following IEEE standards are you likely to recommend?

Explanation

10GBaseLR can be used over distances up to 10 km. 10GBaseSR can only be used up to a maximum distance of 300 meters. 10GBaseT4 and 10GBaseFL are not recognized 10 Gigabit Ethernet standards.

Submit
43. What kind of cable would you associate with an F-type connector?

Explanation

F-type connectors are used with coaxial cables. They are not used with fiber-optic,Unshielded Twisted Pair (UTP), or Shielded Twisted Pair (STP) cabling.

Submit
44. Which of the following devices passes data based on the MAC address?

Explanation

When determining the destination for a data packet, the switch learns the MAC address of all devices attached to it and then matches the destination MAC address in the data it receives. None of the other devices listed passes data based solely on the MAC address.

Submit
45. What is the IPv6 equivalent of 127.0.0.1? (Choose two)

Explanation

The IPv4 address 127.0.0.1 is reserved as the loopback address, and IPv6 has the same reservation. IPv6 addresses 0:0:0:0:0:0:0:0 and 0:0:0:0:0:0:0:1 are reserved as the loopback addresses. The address 0:0:0:0:0:0:0:1 can be shown using the :: notation with the 0s removed, resulting in ::1.

Submit
46. Which of the following best describes the function of the default gateway?

Explanation

The default gateway enables systems on one local subnet to access those on another. Answer B describes Internet Connection Sharing (ICS). Answers C and D don’t describe the main function of a default gateway.

Submit
47. As a network administrator, you are called in to troubleshoot a problem on a token ring network.  The network uses two MSAUs connected using the ring-in ports on both devices. All network cards are set at the same speed.  What is the likely cause of the problem?

Explanation

To create the complete ring, the ring-in (RI) port on each MSAU is connected to the ring-out (RO) port on another MSAU. The last MSAU in the ring is then connected tot he first to complete the ring.

Submit
48. Which of the following fiber connectors uses a twist-type connection method?

Explanation

ST fiber connectors use a twist-type connection method. SC connectors use a pushtype connection method. The other choices are not valid fiber connectors.

Submit
49. You decide to move your network from NetBEUI to TCP/IP.  For the external interfaces, you decide to obtain registered IP addresses from your ISP, but for the interal network, you choose to configure systems by using one of the private address ranges.  Of the following address ranges, which one would you NOT consider?

Explanation

The 131.16 range is from the Class B range and is not one of the recognized private IP address ranges. All the other address ranges are valid private IP address ranges.

Submit
50. Which of the following technologies require dialup access? (Choose the two best answers)

Explanation

Both the PSTN and ISDN require dialup connections to establish communication sessions.

Submit
51. You are installing a wireless network solution, and you require a standard that can operate using either 2.4 GHz or 5 GHz frequencies. Which of the following standards would you choose?

Explanation

The IEEE standard 802.11n can use either the 2.4GHz or 5GHz radio frequencies. 802.11a uses 5GHz, and 802.11b and 802.11g use 2.4GHz.

Submit
52. A company has installed a new 802.11g point-to-point connection between two buildings and is experiencing low throughput across the link.  The current setup involves a wireless bridge on the roof with an omni-directional antenna.  Which of the following would BEST improve the link performance?
Submit
53. You purchase a new wireless access point that uses no WEP security by default. You change the security settings to use 128-bit encryption. How must the client systems be configured?

Explanation

On a wireless connection between an access point and the client, each system must be configured to use the same WEP security settings. In this case, they must both be configured to use 128-bit encryption.

Submit
54. A technician would use a physical network diagram to determine:
Submit
55. What is the function of ARP?

Explanation

ARP resolves IP addresses to MAC addresses. Answer A describes the function of RARP, Answer B describes the process of WINS, and Answer D describes the process of DNS resolution.

Submit
56. All of the following will interfere with a 2.4 GHz wireless phone EXCEPT:
Submit
57. You are installing a wireless network solution that uses a feature known as MIMO. Which wireless networking standard are you using?

Explanation

MIMO is used by the 802.11n standard and takes advantage of multiplexing to increase the range and speed of wireless networking. Multiplexing is a technique that combines multiple signals for transmission over a single line or medium. MIMO enables the transmission of multiple data streams traveling on different antennas in the same channel at the same time. A receiver reconstructs the streams, which have multiple antennas.

Submit
58. Which of the following 10 Gigabit Ethernet standards has the greatest maximum transmission distance?

Explanation

The 10GBaseER standard specifies a maximum transmission distance of 40,000 meters. The 1 0GBaseSR standard specifies a maximum transmission distance of 300 meters, whereas 10GBaseLR specifies a maximum transmission distance of 10,000 meters. 1 0GBaseXR is not a recognized 10 Gigabit Ethernet standard.

Submit
59. Which of the following are valid ways to assign computers to a VLAN? (select THREE)

Explanation

VLANs can be created by using protocol assignments, by defining the ports on a device as belonging to a VLAN or by using MAC addresses. VLANs cannot be created by using the NetBIOS computer name.

Submit
60. Which of the following are required to establish a VPN connection? (Choose all correct answers)

Explanation

Many elements are involved in establishing a VPN connection. This includes the VPN client to initiate the session, the VPN server to answer the client requests, and the VPN protocols to secure and establish the connection.

Submit
61. Which of the following best describes the process of creating a dedicated circuit between two communication endpoints and directing traffic between those two points?

Explanation

Circuit switching is the process of creating a dedicated circuit between two communications endpoints and directing traffic between those two points. None of the other answers are valid types of switching.

Submit
62. Which of the following are sublayers of the data link layer? (Choose two)

Explanation

The data link layer is broken into two distinct sublayers—Media Access Control (MAC) and Logical Link Control (LLC). LCL is not a valid term. Session is another of the OSI model layers.

Submit
63. What topology is represented in the following figure?

Explanation

The infrastructure wireless topology is commonly used to extend a wired LAN to include wireless devices. Wireless devices communicate with the wired LAN through a base station known as an access point (AP) or wireless access point. The AP forms a bridge between a wireless and wired LAN, and all transmissions between wireless stations or between a system and a wired network client go through the AP.

Submit
64. Your company currently uses a standard PSTN communication link to transfer files between LANs.  Until now, the transfer speeds have been sufficient for the amount of data that needs to be transferred.  Recently, a new application was purchased that requires a minimum transmission speed of 1.5 Mpbs.  You have been given the task of finding the most cost-effective solution to accomodate the new application.  Which of the following technologies would you use?

Explanation

A T1 line has a transmission capability of 1.544Mbps and is considerably cheaper than a T3 line. X.25 and BRI ISDN cannot provide the required transmission speed.

Submit
65. After a technician came out and installed a new wireless router, one of the wired workstations began having problems connecting to the file server.  This is only an intermittent problem.  Which of the following actions will the technician MOST likely perform to resolve this problem?
Submit
66. Several users on your network are downloading from peer-to-peer networks, tying up bandwidth during peak hours. Which of the following is used to manage network bandwidth?

Explanation

The term bandwidth shaping describes the mechanisms used to control bandwidth usage on the network. With this, administrators have complete control over who uses bandwidth, for what purpose, and the time of day bandwidth an be used. Bandwidth shaping establishes priorities for data traveling to and from the Internet and within the network.

Submit
67. Which of the following technologies requires a logical connection between the sending and receiving devices?

Explanation

When virtual-circuit switching is used, a logical connection is established between the source and the destination device.

Submit
68. Which of the following best describes 802.1X?

Explanation

802.1X is an IEEE standard specifying port-based network access control. Port-based network access control uses the physical characteristics of a switched local area network (LAN) infrastructure to authenticate devices attached to a LAN port and to prevent access to that port in cases where the authentication process fails.

Submit
69. Which of the following circuit-switching strategies does ATM use? (Choose the two best answers)

Explanation

ATM uses two types of circuit switching—PVC and SVC. VCD and PCV are not the names of switching methods.

Submit
70. Which of the following IP addresses is not from a private address range?

Explanation

The 127.x.x.x network range is reserved for the loopback function. It is not one of the recognized private address ranges. The private address ranges as defined in RFC 1918 are 10.x.x.x, 172.16.x.x to 172.31.x.x, and 192.168.x.x.

Submit
71. What is the speed of the 16550 UART chip?

Explanation

1 15,200 Kbps is the speed of the 1 6550 UART chip. Answer A is incorrect because 921,600 Kbps is the speed of the 16750 and 16950 UART chips. Answer B is incorrect because 430,800 Kbps is the speed of the 16650 UART chip. Answer D is incorrect because 9600 Kbps is the speed of the 8250 UART chip.

Submit
72. At which OSI layer does an AP operate?

Explanation

A wireless access point (AP) operates at the data link layer of the OSI model. An example of a network layer device is a router. An example of a physical layer device is a hub. Session layer components normally are software, not hardware.

Submit
73. You have a thin coaxial-based Ethernet network and are experiencing performance problems on the network. By using a network performance-monitoring tool, you determine that the network has a large number of collisions. In an effort to reduce the collisions, you decide to install a network bridge. What kind of bridge are you most likely to implement?

Explanation

A transparent bridge can be used to segment a network, reducing the number of collisions and overall network traffic. It is called transparent because the other devices
on the network do not need to be aware of the device and, in fact, operate as if it weren’t there. A translational bridge is used in environments where it is necessary to
translate one data format into another. Such a conversion is unnecessary in this scenario. There is no such thing as a collision bridge or a visible bridge.

Submit
74. Your manager asks you to look into some upgrades for your network. The current network is a 10Base2 system, and you have been experiencing numerous cable problems that have been hard to track down. As a result, you have decided to upgrade to a 10BaseT system.

On the networking vendor’s price list are both active and passive hubs. The passive hubs are considerably cheaper than the active ones, and you are tempted to opt for them so that you come in under budget. A colleague advises against the purchase of passive hubs.

What is the primary difference between an active hub and a passive hub?

Explanation

An active hub regenerates the data signal before forwarding it; a passive hub does not. A hub’s management capabilities have nothing to do with its active/passive aspect. Hubs cannot operate in full-duplex mode. Only network switches can perform this function in this context. Answer D describes the function of a switch, not a hub.

Submit
75. Which of the following address types are associated with IPv6? (Choose three)

Explanation

A key difference between IPv4 and IPv6 is in the address types. IPv6 addressing has three main types of addresses: unicast, multicast, and anycast. IPv4 uses broadcast addressing, but IPv6 doesn’t.

Submit
76. Which of the following statements are true of ISDN? (Choose the best two answers)

Explanation

BRI ISDN uses two B+1 D channels, which are two 64Kbps data channels, and PRI-ISDN uses 23 B+1 D channels. The D channel is 16Kbps for BRI and 64Kbps for PRI.

Submit
77. You are troubleshooting a network using 1000BaseCX cable and you suspect that the maximum length has been exceeded.  What is the maximum length of 1000BaseCX cable?

Explanation

The 1000BaseCX standard specifies Gigabit Ethernet transfer over Category 5 UTP cable. It uses STP twisted-pair cable and has a 25-meter length restriction.

Submit
78. You are asked to configure the security settings for a new wireless network. You want the setting that offers the greatest level of security. Which of the following would you choose?

Explanation

Both WEP-Open and WEP-Shared are forms of wireless security. WEP-Open is the simpler of the two authentication methods because it does not perform any type of client verification. It is a very weak form of authentication, because no proof of identity is required. WEP-Shared requires that a WEP key be configured on both the client system and the access point. This makes authentication with WEP-Shared mandatory and therefore more secure for wireless transmission.

Submit
79. In the 802.1X security framework, which of the following best describes the role of the supplicant?

Explanation

The 802.1X security framework has three main components. The supplicant is the system or node requesting access and authentication to a network resource. The authenticator usually is a switch or AP that acts as a control mechanism, allowing or denying traffic that wants to pass through a port. Finally, the authentication server validates the credentials of the supplicant that is trying to access the network or resource.

Submit
80. On an ISDN connection, what is the purpose of the D channel?

Explanation

The D channel on an ISDN link carries signaling information, whereas the B, or bearer, channels carry the data.

Submit
81. Which of the following uses PKI?
Submit
82. You configure a wireless connection using the Bluetooth standard. At what speed does Bluetooth operate?

Explanation

Bluetooth is a wireless standard commonly used to interconnect peripheral devices to the computer system. Bluetooth operates at 720Kbps.

Submit
83. Which of the following statements best describes a gateway?

Explanation

A gateway can be a device, system, or application that translates data from one format into another. Answers A and B more closely describe a router. Answer D describes
a bridge. A bridge is a device that is used to segregate a network. It makes forwarding or blocking decisions based on the MAC address embedded in the packet.

Submit
84. Due to recent cutbacks, your boss approaches you, demanding an alternative to the company's costly dedicated T1 line.  Only small amounts of data will require transfer over the line.  Which of the following are you likely to recommend?

Explanation

When very little traffic will be sent over a line, the PSTN is the most cost-effective solution, although it is limited to 56Kbps. All the other WAN connectivity methods accommodate large amounts of data and are expensive compared to the PSTN.

Submit
85. Which of the following OSI layers is responsible for establishing connections between two devices?

Explanation

The transport layer is responsible for establishing a connection between networked devices. The network layer is most commonly associated with route discovery and datagram delivery. Protocols at the session layer synchronize the data exchange between applications on separate devices. Protocols at the data link layer perform error detection and handling for the transmitted signals and define the method by which the medium is accessed.

Submit
View My Results

Quiz Review Timeline (Updated): Jan 16, 2013 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 16, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 07, 2010
    Quiz Created by
    Nevermore42
Cancel
  • All
    All (85)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A user calls to report that he is experiencing periodic problems...
Which of the following connectors is commonly used with fiber cabling?
Which of the following describes the loss of signal strength as a...
Which of the following devices could be configured as a DHCP server?
Which network topology offers the greatest level of redundancy but has...
Which of the following should be implemented to allow a user to...
In a 100BaseTX network environment, what is the maximum distance...
TCP is an example of what kind of transport protocol?
As the network administrator, you decide to block port 80.  Which...
Which of the following connectors would be used if the EIA/TIA 568...
At which OSI layer does a switch operate?
You ask your ISP to assign a public IP address for the external...
A user is unable to reach the Internet.  The technician asks the...
You have been asked to install a network that will give the network...
You have been tasked with temporarily disabling Telnet access for...
Assuming that the bridge priority is the same between four switches,...
Which of the following topologies allows for network expansion with...
Users are complaining that the network’s performance is...
Which of the following devices would you find only on a token ring...
During a discussion with your ISP's technical support representative,...
Under what circumstance would you change the default channel on an...
Which of the following is not a type of fiber-optic connector used in...
What is the function of NTP?
A client on your network has had no problems accessing the wireless...
A company is upgrading from DSL to a new T1.  When the ISP sends...
Which of the following devices forwards data packets to all connected...
A technician is looking for an emergency connection solution not...
Which of the following is the MOST accurate description of a L2/L3...
You have been asked to connect two office locations.  It has been...
You have been hired to establish a WAN connection between two offices...
Which of the following wireless protocols operate at 2.4 GHz? (Select...
Which of the following protocols offers guaranteed delivery?
Which of the following statements are associated with a bus LAN...
You are the administrator for a network with two Windows Server...
Which of the following is an advantage of ISDN over PSTN?
Which of the following are considered link state protocols?
Which of the following statements best describes a VPN?
Of the following routing methods, which is likely to require the most...
Which of the following are considered transport protocols? (Choose the...
Which of the following is a Class B address?
10GBase-T is backwards compatible with which of the following? (Select...
Your manager has asked you to specify a high-speed 10GbE link to...
What kind of cable would you associate with an F-type connector?
Which of the following devices passes data based on the MAC address?
What is the IPv6 equivalent of 127.0.0.1? (Choose two)
Which of the following best describes the function of the default...
As a network administrator, you are called in to troubleshoot a...
Which of the following fiber connectors uses a twist-type connection...
You decide to move your network from NetBEUI to TCP/IP.  For the...
Which of the following technologies require dialup access? (Choose the...
You are installing a wireless network solution, and you require a...
A company has installed a new 802.11g point-to-point connection...
You purchase a new wireless access point that uses no WEP security by...
A technician would use a physical network diagram to determine:
What is the function of ARP?
All of the following will interfere with a 2.4 GHz wireless phone...
You are installing a wireless network solution that uses a feature...
Which of the following 10 Gigabit Ethernet standards has the greatest...
Which of the following are valid ways to assign computers to a VLAN?...
Which of the following are required to establish a VPN connection?...
Which of the following best describes the process of creating a...
Which of the following are sublayers of the data link layer? (Choose...
What topology is represented in the following figure?
Your company currently uses a standard PSTN communication link to...
After a technician came out and installed a new wireless router, one...
Several users on your network are downloading from peer-to-peer...
Which of the following technologies requires a logical connection...
Which of the following best describes 802.1X?
Which of the following circuit-switching strategies does ATM use?...
Which of the following IP addresses is not from a private address...
What is the speed of the 16550 UART chip?
At which OSI layer does an AP operate?
You have a thin coaxial-based Ethernet network and are experiencing...
Your manager asks you to look into some upgrades for your network. The...
Which of the following address types are associated with IPv6? (Choose...
Which of the following statements are true of ISDN? (Choose the best...
You are troubleshooting a network using 1000BaseCX cable and you...
You are asked to configure the security settings for a new wireless...
In the 802.1X security framework, which of the following best...
On an ISDN connection, what is the purpose of the D channel?
Which of the following uses PKI?
You configure a wireless connection using the Bluetooth standard. At...
Which of the following statements best describes a gateway?
Due to recent cutbacks, your boss approaches you, demanding an...
Which of the following OSI layers is responsible for establishing...
Alert!

Advertisement