CompTIA Network+ Practice Exam 1 (72 Questions)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Nevermore42
N
Nevermore42
Community Contributor
Quizzes Created: 23 | Total Attempts: 6,368
| Attempts: 2,138 | Questions: 72
Please wait...
Question 1 / 72
0 %
0/100
Score 0/100
1. What utility would you use to check the IP configuration on a Windows Vista system?

Explanation

The ipconfig utility can be used to view the TCP/IP configuration on a Windows 2000, Windows XP, Windows Vista, or Windows Server 2003 system. None of these operating systems support the graphical winipcfg utility (answer B). The netstat utility (answer A) is used to view protocol statistics information. The ping utility (answer C) is used to test the connectivity between two systems on a TCP/IP network.

Submit
Please wait...
About This Quiz
CompTIA Network+ Practice Exam 1 (72 Questions) - Quiz

This CompTIA Network+ Practice Exam assesses knowledge across various networking concepts and troubleshooting techniques. It covers topics like network devices, protocols, and performance issues, making it ideal for... see moreindividuals preparing for the CompTIA Network+ certification. see less

2. What type of physical topology is shown in this figure?

Explanation

The figure shows a star topology.

Submit
3. What is the basic purpose of a firewall system?

Explanation

The purpose of a firewall system is to protect one network from another. One of the most common places to use a firewall is to protect a private network from a public one such as the Internet. Answer A is incorrect because although a firewall can provide a single point of access, that is not its primary purpose. Answer B more accurately describes the function of a proxy server. Answer C describes the function of a DNS server.

Submit
4. A client on your network has had no problems accessing the wireless network in the past, but recently she moved to a new office.  Since the move, she has had only intermittent network access. Which of the following is most likely the cause of the problem?

Explanation

A wireless AP has a limited range in which it can send and receive data signals. When a client system moves out of this range, client network access will either fail or be inconsistent. Answers A and C are incorrect because a misconfigured SSID or incompatible WEP settings would prevent communication between the wireless AP and client. Answer D is incorrect because an omnidirectional antenna is the type of antenna that would be used in this setting.

Submit
5. Which of the following pieces of information is not likely to be supplied via DHCP?

Explanation

The NetBIOS computer name is not supplied to client systems by a DHCP server.

Submit
6. What is the default subnet mask for a Class B network?

Explanation

The default subnet mask for a Class B network is 255.255.0.0. Answer A is incorrect because it is not the default subnet mask for a Class B network. Answer B is not the default subnet mask for a Class B network; it is the default subnet mask for a Class C network. Answer C is the local loopback address.

Submit
7. Which of the following devices operates at the network layer of the OSI model?

Explanation

Of the devices listed, only a router operates at the network layer of the OSI model. Answers A and B are incorrect because an AP and a switch are both considered data link layer devices. Answer C is incorrect because a hub is considered a physical layer device.

Submit
8. E-mail and FTP work at which layer of the OSI model?

Explanation

Both email and FTP work at the application layer of the OSI model. Email and FTP are application-layer protocols, not session or presentation layer protocols. User (answer D) is not a layer of the OSI model.

Submit
9. Which of the following best describes the function of PoE??

Explanation

The purpose of Power over Ethernet (PoE) is to allow electrical power to be transmitted over twisted pair Ethernet cable. The power is transferred, along with data, to provide power to remote devices. These devices may include remote switches, wireless access points, Voice Over IP (VoIP) equipment, and more.

Submit
10. Which of the following is a configurable client identification setting used to differentiate one WLAN from another?

Explanation

The Service Set Identifier (SSID) is a unique identifier sent over the WLAN that acts as a simple password used when a client attempts to access an access point. The SSID is used to differentiate between networks; therefore, the client system and the AP must use the same SSID. WEP represents a form of wireless security, and the wireless channel is the band of frequency used for the wireless communication.

Submit
11. You are managing a network that uses both a UNIX server and a Windows 2000 server.  Which of the following protocols can you use to transfer files between the two servers?

Explanation

FTP can be used to transfer files between Windows and UNIX systems. FTP is part of the TCP/IP protocol suite and is platform-independent. The Telnet utility is used to open a virtual terminal session on a remote host (answer A). PPP (answer B) is used to establish communications over a serial link. PPTP (answer D) is used to establish a secure link over a public network such as the Internet.

Submit
12. You are working as a network administrator on a UNIX system.  The system uses dynamic name resolution.  What is used to dynamically resolve a hostname on a UNIX server?

Explanation

DNS is a platform-independent protocol used to resolve hostnames to IP addresses. TCP (answer A) is a network-layer connection-oriented protocol. ARP (answer B) resolves IP addresses to MAC addresses. The UDP protocol (answer D) is a connectionless protocol and is part of the TCP/IP protocol suite.

Submit
13. Which of the following utilities can be used to view the current protocol connections on a Windows system?

Explanation

The netstat -a command can be used to display the current connections and listening ports. The ping utility (answer A) is used to test connectivity between two devices on a TCP/IP network. Telnet (answer C) is an application-level protocol that allows a virtual terminal session on a remote host. The tracert utility (answer D) allows a path to be traced between two hosts.

Submit
14. During the night, one of your servers powers down.  Upon reboot, print services do not load.  Which of the following would be the first step in the troubleshooting process?

Explanation

In this scenario, your first step is to gather information by examining the server log files. When you have that information, you can proceed with the rest of the troubleshooting process. Rebooting the server (answer B) is unlikely to cure the problem. Before you reinstall the printer (answer C) or printer software (answer D), you should examine the log files to see if they report any problems.

Submit
15. Which of the following protocols is responsible for network addressing?

Explanation

IP is responsible for network addressing. SSH, HTTP, and TCP are not responsible for network addressing.

Submit
16. You are upgrading the antenna on your wireless network. You need to purchase an antenna that provides a 360-degree dispersed wave pattern. Which of the following antenna types would you select?

Explanation

In a typical configuration, a wireless antenna can be either omnidirectional or directional. An omnidirectional antenna provides a 360-degree dispersed wave pattern. This provides an even signal in all directions. Directional antennas are designed to focus the signal in a particular direction. Omni-dispersed and directional-dispersed are not valid types of antennas.

Submit
17. Which of the following technologies can be implemented on a switch to create multiple separate logical networks?

Explanation

A VLAN is implemented on a switch to create multiple separate networks. A proxy server (answer A) is used to control access to the Internet. Subnet masking (answer B) is not a valid method of creating separate networks. NAS (answer C) describes storage devices that are attached directly to the network medium.

Submit
18. A user complains that access to a web page is very slow.  What utility can you use to find the bottleneck?

Explanation

tracert is a Windows command that can be used to display the full path between two systems, including the number of hops between the systems. The ping utility (answer A) can be used to test connectivity between two devices, but it only reports the time taken for the round-trip; it does not give information about how long it takes to complete each hop in the route. The Telnet utility (answer B) is used to open a virtual terminal session on a remote host. The nbtstat command (answer D) is used to view statistical information about a system’s NetBIOS status.

Submit
19. Which of the following is a connectionless protocol?

Explanation

UDP is a connectionless protocol. TCP (answer A) is a connection-oriented protocol. IP (answer C) is also a connection-oriented protocol. THC (answer B) is not a valid protocol.

Submit
20. Which of the following networking standards specifies a maximum segment length of 100 meters?

Explanation

10Base-T has a maximum segment length of 100 meters. The maximum length of a 10Base2 segment (answer A) is 185 meters. The maximum length of a 10Base-FL segment (answer B) is 2,000 meters. Answer C is not a valid networking standard.

Submit
21. Which of the following connectors would you use when working with fiber-optic cable? (Choose the two best answers)

Explanation

Fiber-optic cable can use either SC- or ST-type connectors. RJ-11 connectors (answer A) are associated with telephone cable, RJ-45 connectors (answer C) are associated with UTP cable, and BNC connectors (answer E) are associated with thin coaxial cable.

Submit
22. What utility produces the output shown below?

Explanation

The netstat utility can be used to display protocol statistics and TCP/IP network connections. The nbtstat utility (answer B) shows statistical information about the NetBIOS over TCP/IP connections. The ping utility (answer C) is used to test the connectivity between two devices on a TCP/IP network. The tracert utility (answer D) traces the path between two hosts on a TCP/IP network.

Submit
23. While troubleshooting a network connectivity problem on a Windows Server system, you need to view a list of the IP addresses that have been resolved to MAC addresses.  What command would you use to do this?

Explanation

The arp -a command is used to display the IP addresses that have been resolved to MAC addresses. The nbtstat command (answer B) is used to view protocol statistics for NetBIOS connections. arp -d (answer C) is used to delete entries in the ARP cache. The arp -s command (answer D) allows you to add static entries to the ARP cache.

Submit
24. Which of the address types sends data to all systems on a subnet or network instead of single hosts?

Explanation

IPv4 broadcast addresses are IP address that can target all systems on a subnet or network instead of single hosts. In other words, a broadcast message goes to everyone on the network or to a specific network segment. Answer A, multicast, sends data to an entire identified group of network users. Answer B, unicast, sends data to a specific system. Answer D is incorrect because anycast is not a valid networking term.

Submit
25. Which of the following is a valid Class A IP address?

Explanation

Class A subnets use the range 1 to 126 for the value of the first octet. Answer B is the loopback address, which allows the IP stack functionality to be tested. Answers C and D are both addresses in the Class B range (128 to 191).

Submit
26. During a busy administrative week, you install a new virus suite in your network of 55 computers, a new RAID array in one of the servers, and a new office suite on 25 of the computer systems.  After all the updates, you are experiencing system errors through-out the entire network.  What should you do to help isolate the problem?

Explanation

Because the system errors are over the entire network, it is likely that the cause of the problem lies with the virus suite, because it is installed on all computers. To troubleshoot such a problem, it would be a good idea to check for patches or updates on the vendor’s website. A problem with a RAID array (answer A) would affect only the server on which it is installed, not the entire network. Because the office suite (answer B) was installed on only some of the systems, it can be eliminated as a problem, because all the systems are affected. The virus software (answer D) appears to be the cause of the problem, but reinstalling it is unlikely to help.

Submit
27. At which OSI layer does TCP operate?

Explanation

TCP operates at the transport layer of the OSI model. TCP does not operate at the network, session, or presentation layers.

Submit
28. Which of the following protocols are not part of the TCP/IP protocol suite?

Explanation

Of the protocols listed, only AFP (AppleTalk Filing Protocol) is not part of the TCP/IP protocol suite. Answers B, C, D, and E are all used in TCP/IP networks.

Submit
29. A remote user reports that she is having a problem connecting to the corporate network over her DSL connection.  She can connect to the Internet and browse web pages, but she can't connect to the corporate remote-access gateway.  Which troubleshooting step would you perform first?

Explanation

In this scenario, you would first check the remote-access gateway to see if it is running and operating correctly. Because the user can browse web pages, this is not a connectivity problem. Answer B is incorrect because, although rebooting the system might help, the system appears to be working correctly, so rebooting it is unlikely to cure the problem. The IP address configuration appears to be working, because the user can access web pages, so answer C is incorrect. The Internet connection appears to be working, so cycling the power on the DSL modem, as described in answer D, is unlikely to help.

Submit
30. You have installed a web-based database system on your PC so that you can enter troubleshooting information and retrieve it from any location on the network.  Your system's IP address is 192.168.1.164.  You are not overly concerned about security, but as a basic measure, you allocate the web server application a port number of 9191 rather than the default port of 80.  Assuming that you are working from another system on the network, what would you type into the address bar of a web browser to access the database?

Explanation

To specify a TCP/IP port other than the default of 80, simply append the port number to the end of the address, using a colon (:) to separate the two.

Submit
31. A user informs you that she can’t access the Internet from her system. When you visit her, you run the ipconfig /all utility and see the following information. What is the most likely reason the user is having problems accessing the Internet?

Explanation

The most likely cause of the problem is that the default gateway is not configured. Answer A is incorrect because from the output it appears that the DNS servers are on the same subnet as this system. Answer B does not apply because addressing is configured statically, so there is no DHCP service. This is not a problem, however. Answer C is incorrect because the subnet mask is the correct default subnet mask for a Class C network.

Submit
32. What command would generate the following output?

Explanation

The output displayed in this question is from the Windows tracert utility. The utilities in answers A, B, and C produce different output from what is shown.

Submit
33. You are attempting to configure a client’s email program. The user can receive mail but is unable to send any. In the mail server configuration screen of the mail application, you notice that the Type of Outgoing Mail Server field is blank. This explains why the client is unable to send mail. Which of the following protocols are you most likely to enter as a value in the Type of Outgoing Mail Server field?

Explanation

SMTP is used to send email and is a protocol within the TCP/IP protocol suite. Answer A is not a valid protocol. Answers B and D are incorrect because POP3 and IMAP are email retrieval protocols, not protocols for sending email.

Submit
34. Which of the following is not one of the private address ranges?

Explanation

Private address ranges are designed for use on private networks. The ranges are 10.x.x.x, 172.16.x.x to 172.32.x.x, and 192.168.x.x. Therefore, answers A, B, and C are all valid private IP address ranges.

Submit
35. Which of the following wireless security protocols uses TKIP?

Explanation

The WPA wireless security protocol uses TKIP (Temporal Key Integrity Protocol), which scrambles encryption keys using a hashing algorithm. Then the keys are issued an integrity check to verify that they have not been modified or tampered with during transit. Answers A and B are incorrect because TKIP encryption is not used with WEP. Answer D is not a valid encryption protocol.

Submit
36. What is the IPv6 equivalent of 127.0.0.1? (Choose two)

Explanation

The IPv4 address 127.0.0.1 is reserved as the loopback address. IPv6 has the same reservation. IPv6 address 0:0:0:0:0:0:0:1 is reserved as the loopback address. The address can also be shown using the :: notation with the 0s removed, resulting in ::1.

Submit
37. You have enabled HTTPS because of concerns about the security of your web server application, which runs on a web server system in the DMZ of your corporate network. However, remote users are now unable to connect to the application. Which of the following is the most likely reason for the problem?

Explanation

The most likely explanation is that port 443, the HTTPS default port, is being blocked by a corporate firewall. Port 80 (answer A) is used by HTTP. All modern web browsers support HTTPS automatically; therefore, answer C is incorrect. Port 110 (answer D) is used by POP3.

Submit
38. You are a network administrator managing a midsized network that uses a NetWare print server, a Windows application server, and a Linux firewall server.  One of your servers loses network connectivity.  You type ifconfig at the command line to determine whether the server has a valid IP address.  Which server has lost connectivity?

Explanation

The ifconfig command is used on a Linux system to determine the system’s IP configuration. Answer B is incorrect because with NetWare, you use the config command to obtain information about network addresses. Answer C is incorrect because on a Windows system, the ipconfig command is used to view the networking configuration, including the IP address. Answer D is incorrect because the ifconfig command can be used on UNIX/Linux platforms to view the networking configuration.

Submit
39. You are troubleshooting a server connectivity problem on your network.  A Windows Vista system is having trouble connecting to a Windows Server.  Which of the following commands would you use to display per-protocol statistics on the workstation system?

Explanation

The netstat -s command can be used to display per-protocol statistics. The arp command (answers A and B) is used to view a list of the IP address-to-MAC address resolutions performed by the system. The nbtstat utility (answers C and D) is used to view protocol statistics for the NetBIOS protocol.

Submit
40. Which of the following standards uses UTP cable?

Explanation

The 100Base-TX standard specifies twisted-pair UTP cable. Answer B is incorrect because 10Base-FL is a fiber standard and uses fiber-optic cable. There is no standard called 100Base-UX (answer C). 10Base2 (answer D) is an Ethernet networking standard that specifies thin coaxial cable.

Submit
41. Which copper-based medium offers speeds of up to 10Gbps and has a minimum of 250MHz of bandwidth?

Explanation

Category 6 high-performance UTP cable can transmit data up to 10Gbps. Category 6 has a minimum of 250MHz of bandwidth and specifies cable lengths of up to 100 meters, with 10/100/1000Mbps transfer, along with 10Gbps over shorter distances. Answers B and C are incorrect because they are not copper-based media, but fiber. Answer A is not a valid standard.

Submit
42. While you are troubleshooting a sporadic network connectivity problem on a Windows Vista system, a fellow technician suggests that you run the ping -t command.  What is the purpose of this command?

Explanation

The ping -t command is used to send continuous ping requests to a remote system. The ping request continues until it is stopped manually. The traceroute utility (answer A) shows the route taken by a packet to reach the destination host. The ping command (answer B) shows how long a packet takes to complete the round-trip from the host to the destination. Answer C is incorrect because the ping command with the -n switch allows the number of ping messages to be specified.

Submit
43. Which of the following is a Class B IP address?

Explanation

The first octet of a Class B address must be in the range 128 to 191. Answers B and C represent Class A addresses, which run from 1 to 126. Answer D is not a valid IP address; it is the subnet mask for a Class C network.

Submit
44. While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access your internal mail server.  Although it appears that the user's attempts were unsuccessful, you are very concerned about the possibility that your systems might be compromised.  Which of the following solutions are you most likely to implement?

Explanation

To prevent unauthorized access to a private network from the Internet, you can use a firewall server to restrict outside access. Implementing a more secure password policy (answer A) is a good idea, but it is not the best choice. Implementing a file-level encryption system (answer C) is a good idea, but it is not the best choice. Kerberos (answer D) is an authentication system, not a method to prevent unauthorized access to the system.

Submit
45. You are experiencing a problem with a workstation, and you want to ping the local loopback.  Which of the following are ways to check your local TCP/IP configuration? (Choose the two best answers)

Explanation

To verify the local IP configuration, you can either ping the localhost or use the IP address 127.0.0.1. The default hostname for a system is localhost, not host, which means that answer A is incorrect. Answer D is incorrect because this is the network address for the Class A loopback address, not a valid node loopback address.

Submit
46. Which of the following network devices operates at the physical layer of the OSI model?

Explanation

A network hub operates at the physical layer of the OSI model. A router operates at the network layer of the OSI model. A bridge operates at the data link layer of the OSI model. A NIC operates at the data link layer of the OSI model.

Submit
47. Which of the following IEEE specifications does CSMA/CD relate to?

Explanation

CSMA/CD relates to the IEEE specification 802.3. The 802.11b standard (answer A) describes wireless LAN networking. The 802.2 standard (answer B) defines the media access methods for various networking standards. The 802.5 standard (answer C) defines token ring networking.

Submit
48. Which of the following is a distance-vector routing protocol used on TCP/IP networks?

Explanation

RIP is a distance-vector routing protocol used on TCP/IP networks. Answer A is incorrect because ARP is a component of the TCP/IP protocol suite used to resolve MAC addresses to IP addresses. Answer B is incorrect because NLSP is a link-state routing protocol used on IPX networks. Answer C is incorrect because OSPF is a link-state routing protocol used on TCP/IP networks.

Submit
49. Which of the following is a valid MAC address?

Explanation

The MAC address is a 6-byte address expressed in six pairs of hexadecimal values. Because it is hexadecimal, only the letters A through F and numbers can be used. Answer B is incorrect because MAC addresses are expressed as six hexadecimal pairs. Answer C is an example of an IPv4 address. Answer D is an example of an IPv6 address. Answer E is incorrect because MAC addresses are expressed in hexadecimal; therefore, only the letters A through F and numbers can be used.

Submit
50. Your ISP account manager suggests that it might be appropriate for you to install a DNS server internally. Which of the following functions does the DNS server perform?

Explanation

DNS allows hostname resolutions to occur internally. In most cases, companies use a DNS server provided by the ISP. In some cases, however, it might be appropriate to have a DNS server on the internal network. Answer A is incorrect because NAT is normally a function of firewall or proxy servers. Answer B describes the purpose of a WINS server. Answer D describes the function of a proxy server.

Submit
51. Which of the following statements best describes RAID 5?

Explanation

A RAID 5 array consists of at least three hard disks, and it stripes parity information across all disks in the array. Answer A is incorrect because RAID 5 (disk striping with parity) requires at least three drives. Answer C is incorrect because the parity information is stored in a stripe across all three drives in the array, not on a single drive. RAID 5 requires only three drives, which makes answer D incorrect.

Submit
52. You have been called in to troubleshoot a problem with a newly installed e-mail application.  Internal users can communicate with each other via e-mail, but neither incoming nor outgoing Internet e-mail is working.  You suspect a problem with the port-blocking configuration of the firewall system that protects the Internet connection.  Which of the following ports would you allow to cure the problems with the email? (Choose the two best answers)

Explanation

TCP/IP port 25 is used by SMTP. TCP/IP port 110 is used by POP3. Because SMTP is used to send mail and POP3 is used to retrieve mail, ports 25 and 110 would need to be allowed for incoming and outgoing Internet email. TCP/IP port 20 (answer A) is used by FTP. TCP/IP port 80 (answer C) is used by HTTP. TCP/IP port 443 (answer E) is used by HTTPS.

Submit
53. Which of the following IEEE wireless standards uses the 5 GHz RF range?

Explanation

The IEEE 802.11a wireless standard specifies 5GHz as the RF transmission range. Answers A and D are incorrect because the IEEE wireless standards 802.11b/g both use the 2.4GHz RF range. Answer B, infrared wireless transmissions, also use the 2.4GHz RF.

Submit
54. Which of the following is not a commonly implemented feature of a firewall system?

Explanation

A firewall can provide several services to the network, including NAT, proxy services, and packet filtering. NAS is not a function of a firewall server; the acronym stands for network attached storage.

Submit
55. Which of the following is the IPv6 equivalent to IPv4 automatic 169.254.0.0 APIPA addressing?

Explanation

IPv6 link-local addresses are automatically configured on all interfaces in an IPv6-based network. This automatic configuration is equivalent to the 169.254.0.0 automatically assigned IPv4 addressing using APIPA. The prefix used for a link-local address is fe80::.

Submit
56. You are tasked with specifying a way to connect two buildings across a parking lot.  The distance between the two buildings is 78 meters.  An underground wiring duct exists between the two buildings, although there are concerns about using it because it also houses high-voltage electrical cables.  The budget for the project is very tight, but your manager still wants you to specify the most suitable solution.  Which of the following cable types would you recommend?

Explanation

Fiber-optic cable provides the most resistance to EMI and therefore is often used in environments that have a risk of interference. Although it is inexpensive, UTP cable (answer B) and thin coax (answer C) have very low resistance to EMI; therefore, they should not be run near high-voltage electric cables. STP (answer D) has a good level of resistance to EMI, but it is still not as resistant as fiber-optic. Not factoring in the cost, fiber-optic is the most suitable solution.

Submit
57. When a system running TCP/IP receives a data packet, which of the following does it use to determine which service to forward the packet to?

Explanation

The service for which a data packet is destined is determined by the port number to which it is sent.

Submit
58. While troubleshooting a network connectivity problem, you notice that the network card in your system is operating at 10Mbps in half-duplex mode.  At what speed is the network operating?

Explanation

Because the NIC is functioning at half-duplex 10Mbps, the transfer rate is 10Mbps.

Submit
59. Your manager asks you to procure a cable with a Type A connector on one end and a Type B connector on the other. What kind of interface are you most likely to be dealing with?

Explanation

USB interfaces have a number of connectors associated with them, but the most common are called Type A and Type B. FireWire interfaces use either a four-pin or six-pin connector; neither is referred to as Type A or Type B. RJ-11 is a type of connector associated with phone system wiring. Fiber-optic interfaces use a wide range of connectors, but none are called Type A or Type B.

Submit
60. Which of the following services or protocols use SSH technology to provide additional security to communications? (Choose two)

Explanation

Secure Shell (SSH) technology is used by both Secure Copy Protocol (SCP) and Secure File Transfer Protocol (SFTP). Answer C and D are incorrect because Simple Network Management Protocol (SNMP) and Simple Mail Transfer Protocol (SMTP) do not use SSH technology for additional security.

Submit
61. Which of the following IEEE standards has the highest maximum transmission speeds?

Explanation

The IEEE 802.3ae standard defines 10Gbps networking standards such as 10Gbase-LR and 10Gbase-SR. Answer B is incorrect because there is no IEEE 802.3xr standard. Answer C, 802.3z, defines gigabit Ethernet standards such as 1000Base-LX and 1000Base-SX. 802.3u (answer D) defines fast Ethernet standards such as 100Base-TX and 100Base-FX.

Submit
62. What protocol is used by systems within a multicast group to communicate registration information with each other?

Explanation

Internet Group Multicast Protocol (IGMP) is used by systems within the same multicast group to communicate registration information. Internet Control Message Protocol (ICMP) works with IP to provide error checking and reporting functionality on a network. Network News Transfer Protocol (NNTP) is used to access Internet newsgroups. Network Time Protocol (NTP) is used to synchronize system time with Internet servers.

Submit
63. Which layer of the OSI model is responsible for placing the signal on the network medium?

Explanation

The physical layer of the OSI seven-layer model is responsible for placing the signal on the network medium. The data link layer (answer B) is responsible for physical addressing and media access. MAC and LLC (answers C and D) are sublayers of the data link layer.

Submit
64. If you contacted IANA, what would you most likely be trying to do?

Explanation

The Internet Assigned Numbers Authority (IANA) is responsible for assigning IP addresses for systems on public networks—specifically, the Internet. Answer C is incorrect because domain names are administered by domain registry organizations. Answer D is incorrect because you don’t need to apply for a network address for use on a private network.

Submit
65. Which of the following is a valid IPv6 address?

Explanation

IPv6 uses a 128-bit address, which is expressed as eight octet pairs in hexadecimal format, separated by colons. Because it is hexadecimal, only numbers and the letters A through F can be used.

Submit
66. Which of the following wireless technologies provide limited transmission distance and are used primarily for personal area networking and cable replacement? (Choose two)

Explanation

Infrared (IrDA) and Bluetooth are wireless technologies commonly used to create personal area networks. They remove the need for peripheral cables. 802.11a is a wireless standard used for LAN-based networking and is not designed for attaching peripheral devices. Ethernet wireless is not a wireless standard.

Submit
67. Which of the following statements about the 10Mbps IEEE 802.3 network standards is incorrect?

Explanation

The various 10Mbps 802.3 networking standards have different maximum cable lengths. With 10Base-FL, a segment can be up to 2,000 meters. Using thin coaxial cabling, the 10Base2 standard specifies a maximum segment length of 185 meters. 10Mbps implementations of Ethernet on UTP are limited to 100 meters. All Ethernet standards use a Collision Sense Multiple Access/Collision Detection media access method. The 10Mbps 802.3 standards use a logical bus topology, although they can use physical star or physical bus topology.

Submit
68. Which of the following best describes 802.1x?

Explanation

802.1x is an IEEE standard specifying port-based network access control. Port-based network access control uses the physical characteristics of a switched local area network (LAN) infrastructure to authenticate devices attached to a LAN port and to prevent access to that port in cases where the authentication process fails.

Submit
69. You have been asked to implement a RAID solution on one of your company's servers.  You have two hard disks and two hard disk controllers.  Which of the following RAID levels could you implement?  (Choose the three best answers)

Explanation

With two hard disks and two controllers, you can implement RAID 0, RAID 1, and disk duplexing. RAID 5 (disk striping with parity; answer E) requires a minimum of three disks to be implemented. RAID 10 (answer D) is a combination of RAID 1 (disk mirroring) and RAID 0 (disk striping). RAID 10 requires a minimum of four disks.

Submit
70. Which of the following backup methods clear the archive bit? (Choose the two best answers)

Explanation

Both the full and incremental backup methods clear the archive bit to indicate which data does and does not need to be backed up. In a differential backup (answer A), the archive bit is not cleared. Sequential (answer B) is not a type of backup.

Submit
71. Which command produces the following output?


Explanation

The output shown is from the dig command. dig is used on UNIX and Linux systems to run manual DNS lookups. The nslookup command (answer A) also performs this function, but it produces different output. The nbtstat command (answer B) provides information on NetBIOS name resolutions. The netstat command (answer D) shows what TCP/IP protocol connections have been established on a system. These commands produce different output from dig.

Submit
72. You are the administrator for a network with two Windows 2000 Server systems and 40 Windows XP Professional systems. One morning, three users call to report that they are having problems accessing the Windows servers. Upon investigation, you determine that the DHCP server application running on one of the servers has crashed and that the three systems are using addresses assigned via APIPA. All other systems, which were started before the DHCP server application crashed, are functioning correctly. Which of the following statements about the situation are correct? (Choose two)

Explanation

Systems that have APIPA-assigned addresses can talk to each other (answer A), but not with any other systems (answer B). Systems with APIPA-assigned addresses cannot access the Internet (answer C), because the APIPA-assigned information does not include default gateway information. Therefore, communication is limited to the local network. Answer D is incorrect because the systems with APIPA addresses can talk to each other, even though they cannot communicate with any other systems.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 20, 2010
    Quiz Created by
    Nevermore42
Cancel
  • All
    All (72)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What utility would you use to check the IP configuration on a Windows...
What type of physical topology is shown in this figure?
What is the basic purpose of a firewall system?
A client on your network has had no problems accessing the wireless...
Which of the following pieces of information is not likely to be...
What is the default subnet mask for a Class B network?
Which of the following devices operates at the network layer of the...
E-mail and FTP work at which layer of the OSI model?
Which of the following best describes the function of PoE??
Which of the following is a configurable client identification setting...
You are managing a network that uses both a UNIX server and a Windows...
You are working as a network administrator on a UNIX system.  The...
Which of the following utilities can be used to view the current...
During the night, one of your servers powers down.  Upon reboot,...
Which of the following protocols is responsible for network...
You are upgrading the antenna on your wireless network. You need to...
Which of the following technologies can be implemented on a switch to...
A user complains that access to a web page is very slow.  What...
Which of the following is a connectionless protocol?
Which of the following networking standards specifies a maximum...
Which of the following connectors would you use when working with...
What utility produces the output shown below?
While troubleshooting a network connectivity problem on a Windows...
Which of the address types sends data to all systems on a subnet or...
Which of the following is a valid Class A IP address?
During a busy administrative week, you install a new virus suite in...
At which OSI layer does TCP operate?
Which of the following protocols are not part of the TCP/IP protocol...
A remote user reports that she is having a problem connecting to the...
You have installed a web-based database system on your PC so that you...
A user informs you that she can’t access the Internet from her...
What command would generate the following output?
You are attempting to configure a client’s email program. The user...
Which of the following is not one of the private address ranges?
Which of the following wireless security protocols uses TKIP?
What is the IPv6 equivalent of 127.0.0.1? (Choose two)
You have enabled HTTPS because of concerns about the security of your...
You are a network administrator managing a midsized network that uses...
You are troubleshooting a server connectivity problem on your...
Which of the following standards uses UTP cable?
Which copper-based medium offers speeds of up to 10Gbps and has a...
While you are troubleshooting a sporadic network connectivity problem...
Which of the following is a Class B IP address?
While reviewing the security logs for your server, you notice that a...
You are experiencing a problem with a workstation, and you want to...
Which of the following network devices operates at the physical layer...
Which of the following IEEE specifications does CSMA/CD relate to?
Which of the following is a distance-vector routing protocol used on...
Which of the following is a valid MAC address?
Your ISP account manager suggests that it might be appropriate for you...
Which of the following statements best describes RAID 5?
You have been called in to troubleshoot a problem with a newly...
Which of the following IEEE wireless standards uses the 5 GHz RF...
Which of the following is not a commonly implemented feature of a...
Which of the following is the IPv6 equivalent to IPv4 automatic...
You are tasked with specifying a way to connect two buildings across a...
When a system running TCP/IP receives a data packet, which of the...
While troubleshooting a network connectivity problem, you notice that...
Your manager asks you to procure a cable with a Type A connector on...
Which of the following services or protocols use SSH technology to...
Which of the following IEEE standards has the highest maximum...
What protocol is used by systems within a multicast group to...
Which layer of the OSI model is responsible for placing the signal on...
If you contacted IANA, what would you most likely be trying to do?
Which of the following is a valid IPv6 address?
Which of the following wireless technologies provide limited...
Which of the following statements about the 10Mbps IEEE 802.3 network...
Which of the following best describes 802.1x?
You have been asked to implement a RAID solution on one of your...
Which of the following backup methods clear the archive bit? (Choose...
Which command produces the following output?
You are the administrator for a network with two Windows 2000 Server...
Alert!

Advertisement