CompTIA Network+ Practice Exam 1 (72 Questions)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Nevermore42
N
Nevermore42
Community Contributor
Quizzes Created: 23 | Total Attempts: 6,341
| Attempts: 2,130
SettingsSettings
Please wait...
  • 1/72 Questions

    What utility would you use to check the IP configuration on a Windows Vista system?

    • Netstat
    • Winipcfg
    • Ping
    • Ipconfig
Please wait...
CompTIA Network+ Practice Exam 1 (72 Questions) - Quiz
About This Quiz

This CompTIA Network+ Practice Exam assesses knowledge across various networking concepts and troubleshooting techniques. It covers topics like network devices, protocols, and performance issues, making it ideal for individuals preparing for the CompTIA Network+ certification.


Quiz Preview

  • 2. 

    What type of physical topology is shown in this figure?

    • Star

    • Ring

    • Bus

    • Mesh

    Correct Answer
    A. Star
    Explanation
    The figure shows a star topology.

    Rate this question:

  • 3. 

    What is the basic purpose of a firewall system?

    • It provides a single point of access to the Internet

    • It caches commonly used web pages, thereby reducing the bandwidth demands on an Internet connection

    • It allows hostnames to be resolved to IP addresses

    • It protects one network from another by acting as an intermediary system

    Correct Answer
    A. It protects one network from another by acting as an intermediary system
    Explanation
    The purpose of a firewall system is to protect one network from another. One of the most common places to use a firewall is to protect a private network from a public one such as the Internet. Answer A is incorrect because although a firewall can provide a single point of access, that is not its primary purpose. Answer B more accurately describes the function of a proxy server. Answer C describes the function of a DNS server.

    Rate this question:

  • 4. 

    A client on your network has had no problems accessing the wireless network in the past, but recently she moved to a new office.  Since the move, she has had only intermittent network access. Which of the following is most likely the cause of the problem?

    • The SSID on the client is misconfigured

    • The client system has moved too far from the access point

    • The WEP settings are incorrect

    • The access point is using an omnidirectional antenna

    Correct Answer
    A. The client system has moved too far from the access point
    Explanation
    A wireless AP has a limited range in which it can send and receive data signals. When a client system moves out of this range, client network access will either fail or be inconsistent. Answers A and C are incorrect because a misconfigured SSID or incompatible WEP settings would prevent communication between the wireless AP and client. Answer D is incorrect because an omnidirectional antenna is the type of antenna that would be used in this setting.

    Rate this question:

  • 5. 

    Which of the following pieces of information is not likely to be supplied via DHCP?

    • IP address

    • NetBIOS computer name

    • Subnet mask

    • Default gateway

    Correct Answer
    A. NetBIOS computer name
    Explanation
    The NetBIOS computer name is not supplied to client systems by a DHCP server.

    Rate this question:

  • 6. 

    What is the default subnet mask for a Class B network?

    • 255.255.255.224

    • 255.255.255.0

    • 127.0.0.1

    • 255.255.0.0

    Correct Answer
    A. 255.255.0.0
    Explanation
    The default subnet mask for a Class B network is 255.255.0.0. Answer A is incorrect because it is not the default subnet mask for a Class B network. Answer B is not the default subnet mask for a Class B network; it is the default subnet mask for a Class C network. Answer C is the local loopback address.

    Rate this question:

  • 7. 

    Which of the following devices operates at the network layer of the OSI model?

    • Access Point

    • Switch

    • Hub

    • Router

    Correct Answer
    A. Router
    Explanation
    Of the devices listed, only a router operates at the network layer of the OSI model. Answers A and B are incorrect because an AP and a switch are both considered data link layer devices. Answer C is incorrect because a hub is considered a physical layer device.

    Rate this question:

  • 8. 

    E-mail and FTP work at which layer of the OSI model?

    • Application

    • Session

    • Presentation

    • User

    Correct Answer
    A. Application
    Explanation
    Both email and FTP work at the application layer of the OSI model. Email and FTP are application-layer protocols, not session or presentation layer protocols. User (answer D) is not a layer of the OSI model.

    Rate this question:

  • 9. 

    Which of the following best describes the function of PoE??

    • Routes data to PPP ports

    • Provides power over twisted pair cable

    • Increases speeds of twisted pair cable

    • Trunks switch ports

    Correct Answer
    A. Provides power over twisted pair cable
    Explanation
    The purpose of Power over Ethernet (PoE) is to allow electrical power to be transmitted over twisted pair Ethernet cable. The power is transferred, along with data, to provide power to remote devices. These devices may include remote switches, wireless access points, Voice Over IP (VoIP) equipment, and more.

    Rate this question:

  • 10. 

    Which of the following is a configurable client identification setting used to differentiate one WLAN from another?

    • SID

    • WEP

    • SSID

    • Wireless channel

    Correct Answer
    A. SSID
    Explanation
    The Service Set Identifier (SSID) is a unique identifier sent over the WLAN that acts as a simple password used when a client attempts to access an access point. The SSID is used to differentiate between networks; therefore, the client system and the AP must use the same SSID. WEP represents a form of wireless security, and the wireless channel is the band of frequency used for the wireless communication.

    Rate this question:

  • 11. 

    You are managing a network that uses both a UNIX server and a Windows 2000 server.  Which of the following protocols can you use to transfer files between the two servers?

    • Telnet

    • PPP

    • FTP

    • PPTP

    Correct Answer
    A. FTP
    Explanation
    FTP can be used to transfer files between Windows and UNIX systems. FTP is part of the TCP/IP protocol suite and is platform-independent. The Telnet utility is used to open a virtual terminal session on a remote host (answer A). PPP (answer B) is used to establish communications over a serial link. PPTP (answer D) is used to establish a secure link over a public network such as the Internet.

    Rate this question:

  • 12. 

    You are working as a network administrator on a UNIX system.  The system uses dynamic name resolution.  What is used to dynamically resolve a hostname on a UNIX server?

    • TCP

    • ARP

    • DNS

    • UDP

    Correct Answer
    A. DNS
    Explanation
    DNS is a platform-independent protocol used to resolve hostnames to IP addresses. TCP (answer A) is a network-layer connection-oriented protocol. ARP (answer B) resolves IP addresses to MAC addresses. The UDP protocol (answer D) is a connectionless protocol and is part of the TCP/IP protocol suite.

    Rate this question:

  • 13. 

    Which of the following utilities can be used to view the current protocol connections on a Windows system?

    • Ping

    • Netstat

    • Telnet

    • Tracert

    Correct Answer
    A. Netstat
    Explanation
    The netstat -a command can be used to display the current connections and listening ports. The ping utility (answer A) is used to test connectivity between two devices on a TCP/IP network. Telnet (answer C) is an application-level protocol that allows a virtual terminal session on a remote host. The tracert utility (answer D) allows a path to be traced between two hosts.

    Rate this question:

  • 14. 

    During the night, one of your servers powers down.  Upon reboot, print services do not load.  Which of the following would be the first step in the troubleshooting process?

    • Examine the server log files

    • Reboot the server

    • Reinstall the printer

    • Reinstall the printer software

    Correct Answer
    A. Examine the server log files
    Explanation
    In this scenario, your first step is to gather information by examining the server log files. When you have that information, you can proceed with the rest of the troubleshooting process. Rebooting the server (answer B) is unlikely to cure the problem. Before you reinstall the printer (answer C) or printer software (answer D), you should examine the log files to see if they report any problems.

    Rate this question:

  • 15. 

    Which of the following protocols is responsible for network addressing?

    • IP

    • HTTP

    • SSH

    • TCP

    Correct Answer
    A. IP
    Explanation
    IP is responsible for network addressing. SSH, HTTP, and TCP are not responsible for network addressing.

    Rate this question:

  • 16. 

    You are upgrading the antenna on your wireless network. You need to purchase an antenna that provides a 360-degree dispersed wave pattern. Which of the following antenna types would you select?

    • Omni-dispersed antenna

    • Directional-dispersed antenna

    • Directional antenna

    • Omnidirectional antenna

    Correct Answer
    A. Omnidirectional antenna
    Explanation
    In a typical configuration, a wireless antenna can be either omnidirectional or directional. An omnidirectional antenna provides a 360-degree dispersed wave pattern. This provides an even signal in all directions. Directional antennas are designed to focus the signal in a particular direction. Omni-dispersed and directional-dispersed are not valid types of antennas.

    Rate this question:

  • 17. 

    Which of the following technologies can be implemented on a switch to create multiple separate logical networks?

    • Proxy

    • Subnet masking

    • NAS

    • VLAN

    Correct Answer
    A. VLAN
    Explanation
    A VLAN is implemented on a switch to create multiple separate networks. A proxy server (answer A) is used to control access to the Internet. Subnet masking (answer B) is not a valid method of creating separate networks. NAS (answer C) describes storage devices that are attached directly to the network medium.

    Rate this question:

  • 18. 

    A user complains that access to a web page is very slow.  What utility can you use to find the bottleneck?

    • Ping

    • Telnet

    • Tracert

    • Nbtstat

    Correct Answer
    A. Tracert
    Explanation
    tracert is a Windows command that can be used to display the full path between two systems, including the number of hops between the systems. The ping utility (answer A) can be used to test connectivity between two devices, but it only reports the time taken for the round-trip; it does not give information about how long it takes to complete each hop in the route. The Telnet utility (answer B) is used to open a virtual terminal session on a remote host. The nbtstat command (answer D) is used to view statistical information about a system’s NetBIOS status.

    Rate this question:

  • 19. 

    Which of the following is a connectionless protocol?

    • TCP

    • THC

    • IP

    • UDP

    Correct Answer
    A. UDP
    Explanation
    UDP is a connectionless protocol. TCP (answer A) is a connection-oriented protocol. IP (answer C) is also a connection-oriented protocol. THC (answer B) is not a valid protocol.

    Rate this question:

  • 20. 

    Which of the following networking standards specifies a maximum segment length of 100 meters?

    • 10Base2

    • 10Base-FL

    • 10Base-YX

    • 10Base-T

    Correct Answer
    A. 10Base-T
    Explanation
    10Base-T has a maximum segment length of 100 meters. The maximum length of a 10Base2 segment (answer A) is 185 meters. The maximum length of a 10Base-FL segment (answer B) is 2,000 meters. Answer C is not a valid networking standard.

    Rate this question:

  • 21. 

    What utility produces the output shown below?

    • Netstat

    • Nbtstat

    • Ping

    • Tracert - R

    Correct Answer
    A. Netstat
    Explanation
    The netstat utility can be used to display protocol statistics and TCP/IP network connections. The nbtstat utility (answer B) shows statistical information about the NetBIOS over TCP/IP connections. The ping utility (answer C) is used to test the connectivity between two devices on a TCP/IP network. The tracert utility (answer D) traces the path between two hosts on a TCP/IP network.

    Rate this question:

  • 22. 

    While troubleshooting a network connectivity problem on a Windows Server system, you need to view a list of the IP addresses that have been resolved to MAC addresses.  What command would you use to do this?

    • Arp -a

    • Nbtstat -a

    • Arp -d

    • Arp -s

    Correct Answer
    A. Arp -a
    Explanation
    The arp -a command is used to display the IP addresses that have been resolved to MAC addresses. The nbtstat command (answer B) is used to view protocol statistics for NetBIOS connections. arp -d (answer C) is used to delete entries in the ARP cache. The arp -s command (answer D) allows you to add static entries to the ARP cache.

    Rate this question:

  • 23. 

    Which of the address types sends data to all systems on a subnet or network instead of single hosts?

    • Multicast

    • Unicast

    • Broadcast

    • Anycast

    Correct Answer
    A. Broadcast
    Explanation
    IPv4 broadcast addresses are IP address that can target all systems on a subnet or network instead of single hosts. In other words, a broadcast message goes to everyone on the network or to a specific network segment. Answer A, multicast, sends data to an entire identified group of network users. Answer B, unicast, sends data to a specific system. Answer D is incorrect because anycast is not a valid networking term.

    Rate this question:

  • 24. 

    Which of the following connectors would you use when working with fiber-optic cable? (Choose the two best answers)

    • RJ-11

    • SC

    • RJ-45

    • ST

    • BNC

    Correct Answer(s)
    A. SC
    A. ST
    Explanation
    Fiber-optic cable can use either SC- or ST-type connectors. RJ-11 connectors (answer A) are associated with telephone cable, RJ-45 connectors (answer C) are associated with UTP cable, and BNC connectors (answer E) are associated with thin coaxial cable.

    Rate this question:

  • 25. 

    Which of the following is a valid Class A IP address?

    • 124.254.254.254

    • 127.0.0.1

    • 128.16.200.12

    • 131.17.25.200

    Correct Answer
    A. 124.254.254.254
    Explanation
    Class A subnets use the range 1 to 126 for the value of the first octet. Answer B is the loopback address, which allows the IP stack functionality to be tested. Answers C and D are both addresses in the Class B range (128 to 191).

    Rate this question:

  • 26. 

    During a busy administrative week, you install a new virus suite in your network of 55 computers, a new RAID array in one of the servers, and a new office suite on 25 of the computer systems.  After all the updates, you are experiencing system errors through-out the entire network.  What should you do to help isolate the problem?

    • Disable the RAID array

    • Uninstall the office suite

    • Check the virus suite vendor's website for system patches or service packs

    • Reinstall the virus software

    Correct Answer
    A. Check the virus suite vendor's website for system patches or service packs
    Explanation
    Because the system errors are over the entire network, it is likely that the cause of the problem lies with the virus suite, because it is installed on all computers. To troubleshoot such a problem, it would be a good idea to check for patches or updates on the vendor’s website. A problem with a RAID array (answer A) would affect only the server on which it is installed, not the entire network. Because the office suite (answer B) was installed on only some of the systems, it can be eliminated as a problem, because all the systems are affected. The virus software (answer D) appears to be the cause of the problem, but reinstalling it is unlikely to help.

    Rate this question:

  • 27. 

    At which OSI layer does TCP operate?

    • Network

    • Transport

    • Session

    • Presentation

    Correct Answer
    A. Transport
    Explanation
    TCP operates at the transport layer of the OSI model. TCP does not operate at the network, session, or presentation layers.

    Rate this question:

  • 28. 

    Which of the following protocols are not part of the TCP/IP protocol suite?

    • AFP

    • FTP

    • DHCP

    • HTTP

    • DNS

    Correct Answer
    A. AFP
    Explanation
    Of the protocols listed, only AFP (AppleTalk Filing Protocol) is not part of the TCP/IP protocol suite. Answers B, C, D, and E are all used in TCP/IP networks.

    Rate this question:

  • 29. 

    A remote user reports that she is having a problem connecting to the corporate network over her DSL connection.  She can connect to the Internet and browse web pages, but she can't connect to the corporate remote-access gateway.  Which troubleshooting step would you perform first?

    • Check the corporate remote-access gateway to see if it is running and operating correctly

    • Have the user reboot her system

    • Have the user reconfigure the IP address on her system to one of the address ranges used on the internal corporate network, and then try again

    • Have the user power-cycle the DSL modem and try again

    Correct Answer
    A. Check the corporate remote-access gateway to see if it is running and operating correctly
    Explanation
    In this scenario, you would first check the remote-access gateway to see if it is running and operating correctly. Because the user can browse web pages, this is not a connectivity problem. Answer B is incorrect because, although rebooting the system might help, the system appears to be working correctly, so rebooting it is unlikely to cure the problem. The IP address configuration appears to be working, because the user can access web pages, so answer C is incorrect. The Internet connection appears to be working, so cycling the power on the DSL modem, as described in answer D, is unlikely to help.

    Rate this question:

  • 30. 

    You have installed a web-based database system on your PC so that you can enter troubleshooting information and retrieve it from any location on the network.  Your system's IP address is 192.168.1.164.  You are not overly concerned about security, but as a basic measure, you allocate the web server application a port number of 9191 rather than the default port of 80.  Assuming that you are working from another system on the network, what would you type into the address bar of a web browser to access the database?

    • Http://192.168.1.164.9191

    • Http://192.168.1.164/9191

    • Http://192.168.1.164//9191

    • Http://192.168.1.164:9191

    Correct Answer
    A. Http://192.168.1.164:9191
    Explanation
    To specify a TCP/IP port other than the default of 80, simply append the port number to the end of the address, using a colon (:) to separate the two.

    Rate this question:

  • 31. 

    A user informs you that she can’t access the Internet from her system. When you visit her, you run the ipconfig /all utility and see the following information. What is the most likely reason the user is having problems accessing the Internet?

    • The system is on a different subnet than the DNS servers

    • DHCP is not enabled

    • The subnet is incorrect

    • The default gateway setting is not configured

    Correct Answer
    A. The default gateway setting is not configured
    Explanation
    The most likely cause of the problem is that the default gateway is not configured. Answer A is incorrect because from the output it appears that the DNS servers are on the same subnet as this system. Answer B does not apply because addressing is configured statically, so there is no DHCP service. This is not a problem, however. Answer C is incorrect because the subnet mask is the correct default subnet mask for a Class C network.

    Rate this question:

  • 32. 

    What command would generate the following output?

    • Ipconfig

    • Netstat

    • Ping

    • Tracert

    Correct Answer
    A. Tracert
    Explanation
    The output displayed in this question is from the Windows tracert utility. The utilities in answers A, B, and C produce different output from what is shown.

    Rate this question:

  • 33. 

    You are attempting to configure a client’s email program. The user can receive mail but is unable to send any. In the mail server configuration screen of the mail application, you notice that the Type of Outgoing Mail Server field is blank. This explains why the client is unable to send mail. Which of the following protocols are you most likely to enter as a value in the Type of Outgoing Mail Server field?

    • NMP

    • POP3

    • SMTP

    • IMAP

    Correct Answer
    A. SMTP
    Explanation
    SMTP is used to send email and is a protocol within the TCP/IP protocol suite. Answer A is not a valid protocol. Answers B and D are incorrect because POP3 and IMAP are email retrieval protocols, not protocols for sending email.

    Rate this question:

  • 34. 

    Which of the following is not one of the private address ranges?

    • 192.168.x.x

    • 10.x.x.x

    • 172.16.x.x

    • 224.181.x.x

    Correct Answer
    A. 224.181.x.x
    Explanation
    Private address ranges are designed for use on private networks. The ranges are 10.x.x.x, 172.16.x.x to 172.32.x.x, and 192.168.x.x. Therefore, answers A, B, and C are all valid private IP address ranges.

    Rate this question:

  • 35. 

    Which of the following wireless security protocols uses TKIP?

    • WEP-open

    • WEP-shared

    • WPA

    • WAP-shared

    Correct Answer
    A. WPA
    Explanation
    The WPA wireless security protocol uses TKIP (Temporal Key Integrity Protocol), which scrambles encryption keys using a hashing algorithm. Then the keys are issued an integrity check to verify that they have not been modified or tampered with during transit. Answers A and B are incorrect because TKIP encryption is not used with WEP. Answer D is not a valid encryption protocol.

    Rate this question:

  • 36. 

    What is the IPv6 equivalent of 127.0.0.1? (Choose two)

    • 0:0:0:0:0:0:0:1

    • 0:0:0:0:0:0:0:24

    • ::1

    • ::24

    Correct Answer(s)
    A. 0:0:0:0:0:0:0:1
    A. ::1
    Explanation
    The IPv4 address 127.0.0.1 is reserved as the loopback address. IPv6 has the same reservation. IPv6 address 0:0:0:0:0:0:0:1 is reserved as the loopback address. The address can also be shown using the :: notation with the 0s removed, resulting in ::1.

    Rate this question:

  • 37. 

    You have enabled HTTPS because of concerns about the security of your web server application, which runs on a web server system in the DMZ of your corporate network. However, remote users are now unable to connect to the application. Which of the following is the most likely reason for the problem?

    • Port 80 is being blocked on the corporate firewall

    • Port 443 is being blocked on the corporate firewall

    • Remote users need to enable HTTPS support in their web browsers

    • Port 110 is being blocked on the corporate firewall

    Correct Answer
    A. Port 443 is being blocked on the corporate firewall
    Explanation
    The most likely explanation is that port 443, the HTTPS default port, is being blocked by a corporate firewall. Port 80 (answer A) is used by HTTP. All modern web browsers support HTTPS automatically; therefore, answer C is incorrect. Port 110 (answer D) is used by POP3.

    Rate this question:

  • 38. 

    You are a network administrator managing a midsized network that uses a NetWare print server, a Windows application server, and a Linux firewall server.  One of your servers loses network connectivity.  You type ifconfig at the command line to determine whether the server has a valid IP address.  Which server has lost connectivity?

    • The firewall server

    • The print server

    • The application server

    • Ifconfig is not a valid command on any of these platforms

    Correct Answer
    A. The firewall server
    Explanation
    The ifconfig command is used on a Linux system to determine the system’s IP configuration. Answer B is incorrect because with NetWare, you use the config command to obtain information about network addresses. Answer C is incorrect because on a Windows system, the ipconfig command is used to view the networking configuration, including the IP address. Answer D is incorrect because the ifconfig command can be used on UNIX/Linux platforms to view the networking configuration.

    Rate this question:

  • 39. 

    You are troubleshooting a server connectivity problem on your network.  A Windows Vista system is having trouble connecting to a Windows Server.  Which of the following commands would you use to display per-protocol statistics on the workstation system?

    • Arp -a

    • Arp -A

    • Nbtstat -s

    • Nbtstat -S

    • Netstat -s

    Correct Answer
    A. Netstat -s
    Explanation
    The netstat -s command can be used to display per-protocol statistics. The arp command (answers A and B) is used to view a list of the IP address-to-MAC address resolutions performed by the system. The nbtstat utility (answers C and D) is used to view protocol statistics for the NetBIOS protocol.

    Rate this question:

  • 40. 

    While you are troubleshooting a sporadic network connectivity problem on a Windows Vista system, a fellow technician suggests that you run the ping -t command.  What is the purpose of this command?

    • It shows the route taken by a packet to reach the destination host

    • It shows how long, in seconds, the packet takes to reach the destination

    • It allows the number of ping messages to be specified

    • It pings the remote host continually until it is stopped

    Correct Answer
    A. It pings the remote host continually until it is stopped
    Explanation
    The ping -t command is used to send continuous ping requests to a remote system. The ping request continues until it is stopped manually. The traceroute utility (answer A) shows the route taken by a packet to reach the destination host. The ping command (answer B) shows how long a packet takes to complete the round-trip from the host to the destination. Answer C is incorrect because the ping command with the -n switch allows the number of ping messages to be specified.

    Rate this question:

  • 41. 

    Which of the following standards uses UTP cable?

    • 100Base-TX

    • 10Base-FL

    • 100Base-UX

    • 10Base2

    Correct Answer
    A. 100Base-TX
    Explanation
    The 100Base-TX standard specifies twisted-pair UTP cable. Answer B is incorrect because 10Base-FL is a fiber standard and uses fiber-optic cable. There is no standard called 100Base-UX (answer C). 10Base2 (answer D) is an Ethernet networking standard that specifies thin coaxial cable.

    Rate this question:

  • 42. 

    Which copper-based medium offers speeds of up to 10Gbps and has a minimum of 250MHz of bandwidth?

    • Category 6b

    • Single-mode fiber

    • Multimode fiber

    • Category 6

    Correct Answer
    A. Category 6
    Explanation
    Category 6 high-performance UTP cable can transmit data up to 10Gbps. Category 6 has a minimum of 250MHz of bandwidth and specifies cable lengths of up to 100 meters, with 10/100/1000Mbps transfer, along with 10Gbps over shorter distances. Answers B and C are incorrect because they are not copper-based media, but fiber. Answer A is not a valid standard.

    Rate this question:

  • 43. 

    Which of the following is a Class B IP address?

    • 191.23.21.54

    • 125.123.123.2

    • 24.67.118.67

    • 255.255.255.0

    Correct Answer
    A. 191.23.21.54
    Explanation
    The first octet of a Class B address must be in the range 128 to 191. Answers B and C represent Class A addresses, which run from 1 to 126. Answer D is not a valid IP address; it is the subnet mask for a Class C network.

    Rate this question:

  • 44. 

    While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access your internal mail server.  Although it appears that the user's attempts were unsuccessful, you are very concerned about the possibility that your systems might be compromised.  Which of the following solutions are you most likely to implement?

    • A more secure password policy

    • A firewall system at the connection point to the Internet

    • File-level encryption

    • Kerberos authentication

    Correct Answer
    A. A firewall system at the connection point to the Internet
    Explanation
    To prevent unauthorized access to a private network from the Internet, you can use a firewall server to restrict outside access. Implementing a more secure password policy (answer A) is a good idea, but it is not the best choice. Implementing a file-level encryption system (answer C) is a good idea, but it is not the best choice. Kerberos (answer D) is an authentication system, not a method to prevent unauthorized access to the system.

    Rate this question:

  • 45. 

    You are experiencing a problem with a workstation, and you want to ping the local loopback.  Which of the following are ways to check your local TCP/IP configuration? (Choose the two best answers)

    • Ping host

    • Ping localhost

    • Ping 127.0.0.1

    • Ping 127.0.0.0

    Correct Answer(s)
    A. Ping localhost
    A. Ping 127.0.0.1
    Explanation
    To verify the local IP configuration, you can either ping the localhost or use the IP address 127.0.0.1. The default hostname for a system is localhost, not host, which means that answer A is incorrect. Answer D is incorrect because this is the network address for the Class A loopback address, not a valid node loopback address.

    Rate this question:

  • 46. 

    Which of the following network devices operates at the physical layer of the OSI model?

    • Router

    • Hub

    • Bridge

    • NIC

    Correct Answer
    A. Hub
    Explanation
    A network hub operates at the physical layer of the OSI model. A router operates at the network layer of the OSI model. A bridge operates at the data link layer of the OSI model. A NIC operates at the data link layer of the OSI model.

    Rate this question:

  • 47. 

    Which of the following IEEE specifications does CSMA/CD relate to?

    • 802.11b

    • 802.2

    • 802.5

    • 802.3

    Correct Answer
    A. 802.3
    Explanation
    CSMA/CD relates to the IEEE specification 802.3. The 802.11b standard (answer A) describes wireless LAN networking. The 802.2 standard (answer B) defines the media access methods for various networking standards. The 802.5 standard (answer C) defines token ring networking.

    Rate this question:

  • 48. 

    Which of the following is a distance-vector routing protocol used on TCP/IP networks?

    • ARP

    • NLSP

    • OSPF

    • RIP

    Correct Answer
    A. RIP
    Explanation
    RIP is a distance-vector routing protocol used on TCP/IP networks. Answer A is incorrect because ARP is a component of the TCP/IP protocol suite used to resolve MAC addresses to IP addresses. Answer B is incorrect because NLSP is a link-state routing protocol used on IPX networks. Answer C is incorrect because OSPF is a link-state routing protocol used on TCP/IP networks.

    Rate this question:

  • 49. 

    Which of the following is a valid MAC address?

    • 00:D0:59:09:07:51

    • 00:D0:59

    • 00FE:56FE:230F:CDA2:00EB:32EC

    • 00:DG:59:09:07:51

    Correct Answer
    A. 00:D0:59:09:07:51
    Explanation
    The MAC address is a 6-byte address expressed in six pairs of hexadecimal values. Because it is hexadecimal, only the letters A through F and numbers can be used. Answer B is incorrect because MAC addresses are expressed as six hexadecimal pairs. Answer C is an example of an IPv4 address. Answer D is an example of an IPv6 address. Answer E is incorrect because MAC addresses are expressed in hexadecimal; therefore, only the letters A through F and numbers can be used.

    Rate this question:

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 20, 2010
    Quiz Created by
    Nevermore42
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.