CompTIA Practice Test #3

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By LaTasha Stamps
L
LaTasha Stamps
Community Contributor
Quizzes Created: 2 | Total Attempts: 160
Questions: 60 | Attempts: 91

SettingsSettingsSettings
CompTIA Practice Test #3 - Quiz


Questions and Answers
  • 1. 

    You have just installed a second and third hard drive into a Windows 8.1 workstation. Each drive is 500 GB. The user wants to combine her space into one 1 TB volume. What should you create to accomplish this and also give the user a disk read and write performance boost?  

    • A.

      A new simple volume

    • B.

      A new spanned volume

    • C.

       A new striped volume

    • D.

      A new mirrored volume

    Correct Answer
    C.  A new striped volume
    Explanation
    To combine both hard drives into one volume, you need to create a spanned, striped, or mirrored volume. A mirrored volume, like a RAID-1 array, will make one of the disks redundant, so in this case it would not give the user 1 TB of storage. A striped volume is like RAID-0 and will give you a slight performance boost.

    Rate this question:

  • 2. 

    For IPv6, which of the following statements are not true? (Choose two.)

    • A.

      Each IPv6 interface can have only one address.

    • B.

      Each IPv6 interface is required to have a link local address.

    • C.

      Pv6 addresses are incompatible with IPv4 networks.

    • D.

      IPv6 no longer uses broadcasts.

    Correct Answer(s)
    A. Each IPv6 interface can have only one address.
    C. Pv6 addresses are incompatible with IPv4 networks.
    Explanation
    Each IPv6 interface can and often does have multiple addresses assigned to it. IPv6 is backward compatible with IPv4.

    Rate this question:

  • 3. 

    You are installing two new RAM modules into a single channel of a dual-channel motherboard. Which of the following is true?

    • A.

      Both RAM modules need to have the same parameters.

    • B.

      The RAM modules can be different sizes but must be the same speed.

    • C.

      The RAM modules can be different speeds but must be the same size.

    • D.

      The RAM modules can have different speeds and sizes, as long as they are the same type.

    Correct Answer
    A. Both RAM modules need to have the same parameters.
    Explanation
    When installing dual-channel RAM, be sure that the RAM modules both have the same parameters. In some cases, you might even need to make sure they come from the same manufacturer.

    Rate this question:

  • 4. 

    You have a network installation that requires transmission speeds of 10 Gbps at a distance of 85 meters. Among the UTP standards listed, which one is the oldest one that meets the requirements for this network?

    • A.

      CAT5

    • B.

      CAT5e

    • C.

      CAT6

    • D.

      CAT7

    Correct Answer
    D. CAT7
    Explanation
    CAT7 UTP can handle 10 Gbps transmissions over 100 meters. CAT6 will transmit at 10 Gbps, but only for 55 meters, while CAT6A can handle the same transmission speed up to 100 meters. CAT5 has a maximum speed of 100 Mbps, and CAT5e has a maximum of 1 Gbps.

    Rate this question:

  • 5. 

    Identify the cable connector in the picture.

    • A.

      F-connector

    • B.

      BNC

    • C.

      SC

    • D.

      ST

    Correct Answer
    A. F-connector
    Explanation
    F-connectors are threaded and screw into place. The BNC connector locks by twisting one-quarter turn. SC and ST connectors are for fiber-optic cable.

    Rate this question:

  • 6. 

    A user reports the wireless Internet connection will randomly shut down in the afternoon. You check the Internet router by the window to find it still has power. What is the most likely cause of this problem?

    • A.

      Network overloaded

    • B.

      Printer queue full

    • C.

      Wireless router overheating

    • D.

      Workstation requires patching

    Correct Answer
    C. Wireless router overheating
    Explanation
    The most likely explanation is that the wireless router is overheating. If it randomly shuts down in the afternoon, being in the sun may contribute to overheating.

    Rate this question:

  • 7. 

    Data transfers for which wireless connection type will be interrupted if someone walks between the sending and receiving devices?

    • A.

       Bluetooth

    • B.

      Wi-Fi

    • C.

       RF

    • D.

      IR

    Correct Answer
    D. IR
    Explanation
    Infrared is a short-distance, line-of-sight wireless communication method. If line of sight is broken, the communication will end.

    Rate this question:

  • 8. 

    Which TCP/IP protocol is used to provide shared access to files and printers on the network?

    • A.

      FTP

    • B.

      SSH

    • C.

      SMB

    • D.

      SNMP

    Correct Answer
    C. SMB
    Explanation
    Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. In a way, it functions a bit like FTP, only with a few more options, such as the ability to connect to printers and more management commands.

    Rate this question:

  • 9. 

    What server is accessed each time it's necessary to challenge and validate a user's credentials in order for the user to access a network resource?

    • A.

      Syslog server

    • B.

       DNS server

    • C.

      Print server

    • D.

      Authentication server

    Correct Answer
    D. Authentication server
    Explanation
    The authentication server facilitates the challenge/response service for validating someone's credentials.

    Rate this question:

  • 10. 

    You have just installed a new HP LaserJet printer on your network. You've plugged it directly into a CAT6a network cable. You try to install the printer on a client using the printer's IP address, but you are unable to connect. The printer is in Ready state. What should you do next?

    • A.

      Double-check the printer's IP configuration information.

    • B.

      Stop and restart the spooler service.

    • C.

      Take the printer offline and bring it back online.

    • D.

      Turn the printer off and back on to save the IP configuration information.

    Correct Answer
    A. Double-check the printer's IP configuration information.
    Explanation
    For network-enabled laser printers, no connectivity can be a sign of improperly configured IP settings such as the IP address. While each printer is somewhat different, you can manually configure most laser printers’ IP settings through the LCD control panel.

    Rate this question:

  • 11. 

    You are troubleshooting a computer with a RAID-10 array using four disks. One of the disks fails. What can you do to recover the array?

    • A.

      Replace the failed disk and restore from backup.

    • B.

      Remove the failed disk and rebuild the array.

    • C.

      Rebuild the failed disk and restore from backup

    • D.

      Replace the failed disk and rebuild the array.

    Correct Answer
    D. Replace the failed disk and rebuild the array.
    Explanation
    RAID-10 is a mirrored striped set. As long as one drive in each mirrored pair is functional (just as in RAID-1), you shouldn't lose any data. Simply replace the failed disk and rebuild the array.

    Rate this question:

  • 12. 

    One of your friends complains that when he plays action games on his computer, the screen is slow to refresh and the motion is often jerky. What should he do to resolve this problem?

    • A.

      Buy a newer monitor.

    • B.

      Increase system RAM.

    • C.

      Increase video memory.

    • D.

      Lower the screen resolution.

    Correct Answer
    C. Increase video memory.
    Explanation
    Certain unacceptable video-quality issues (such as jerky refresh speeds or lags) can be remedied by adding memory to a video card. Doing so generally results in an increase in both quality and performance. If you can't add memory to the video card, you can upgrade to a new one.

    Rate this question:

  • 13. 

    Your client is now looking at improving control over all the user devices. Particularly, the client wants resource access controlled based on policy and the users meeting a few criteria. What device would you suggest?

    • A.

       End-point management server

    • B.

      Perimeter authentication server

    • C.

      RADIUS server

    • D.

      SFTP server

    Correct Answer
    A.  End-point management server
    Explanation
    The end-point management server can be a policy-based or directory-based technique toward controlling access to network resources.

    Rate this question:

  • 14. 

    Which type of laptop monitor technology uses a current of electricity to stimulate a sealed panel of inert gas?

    • A.

      OLED

    • B.

      LED

    • C.

      Plasma

    • D.

      LCD

    Correct Answer
    C. Plasma
    Explanation
    Plasma displays place electrodes in front of and behind sealed chambers full of inert gas (such as neon) and vaporized mercury. Current is run through the gas to ionize it and cause it to light up.

    Rate this question:

  • 15. 

    Which TCP/IP protocol is responsible for dynamically assigning IP addresses to client computers?

    • A.

      DNS

    • B.

      DHCP

    • C.

      RDP

    • D.

       LDAP

    Correct Answer
    B. DHCP
    Explanation
    Dynamic Host Configuration Protocol (DHCP) dynamically assigns IP addresses and other IP configuration information to network clients.

    Rate this question:

  • 16. 

    A user complains that sometimes his computer will not open files, and it happens in different programs. Which component is most likely to cause this problem?

    • A.

      RAM

    • B.

      CPU

    • C.

      HDD

    • D.

      Motherboard

    Correct Answer
    C. HDD
    Explanation
    Failure to open files means that the computer can't properly read those files. In most cases, this indicates an issue with the hard drive.

    Rate this question:

  • 17. 

    A user calls the help desk to report that she has no network connectivity. She had connectivity yesterday, but when she booted up her desktop computer this morning, she could not connect. She does not use the wireless network. No other users have reported issues. What is the first thing you should do?

    • A.

      Check to see whether the network card driver is responding.

    • B.

      Run ipconfig to see what her IP address is.

    • C.

      Use a loopback plug to test the network card.

    • D.

      Check to ensure that the network cable is plugged in.

    Correct Answer
    D. Check to ensure that the network cable is plugged in.
    Explanation
    Rule #1 of troubleshooting is to always check your connections first. The most common issue that prevents network connectivity on a wired network is a bad or unplugged patch cable.

    Rate this question:

  • 18. 

    What serial connection standard was first developed in 1960 and had been the standard for microsystems for a few decades?

    • A.

      DB-9

    • B.

      RS-232

    • C.

      Micro-USB

    • D.

      USB-C

    Correct Answer
    B. RS-232
    Explanation
    RS-232 was introduced in 1960 and was very common in 25-pin format for connecting printers and other peripherals as well as the 9-pin for connecting to network devices.

    Rate this question:

  • 19. 

    Which Wi-Fi encryption standard was the first to include the use of a 128-bit dynamic per-packet encryption key?

    • A.

      WEP

    • B.

      WPA

    • C.

      WPA2

    • D.

      AES

    Correct Answer
    B. WPA
    Explanation
    Wi-Fi Protected Access (WPA) was the first Wi-Fi encryption standard to implement the use of the Temporal Key Integrity Protocol (TKIP). Whereas WEP used a static 40- or 128-bit key, TKIP uses a 128-bit dynamic per-packet key. It generates a new key for each packet sent.

    Rate this question:

  • 20. 

    Which TCP/IP protocol, designed to download email, allows for multiple clients to be simultaneously connected to the same mailbox?

    • A.

      SMTP

    • B.

      POP3

    • C.

      IMAP

    • D.

      SMB

    Correct Answer
    C. IMAP
    Explanation
    Internet Message Access Protocol (IMAP) is a secure protocol designed to download email. It has several advantages over the older Post Office Protocol 3 (POP3). First, IMAP4 works in connected and disconnected modes. Second, it lets you store the email on the server, as opposed to POP3, which requires you to download it. Third, IMAP4 allows multiple clients to be simultaneously connected to the same inbox.

    Rate this question:

  • 21. 

    Your Windows 7 workstation is having intermittent video issues. The manufacturer's website suggests you install the latest driver. Which utility should you use to check the driver version installed on your computer?

    • A.

      Display Settings

    • B.

      Device Manager

    • C.

      Services

    • D.

      Computer Management

    Correct Answer
    B. Device Manager
    Explanation
    Device Manager has been present in every version of Windows since Windows 95. It allows you to manage all of your hardware devices, including updating drivers and disabling the device. It is found within the Computer Management console.

    Rate this question:

  • 22. 

    You have a user who needs recommendations for installing a home server PC. She wants her family to be able to share files and videos on their home network. She also wants her data to be protected in the event of a hard drive failure. Which two components do you recommend she include?

    • A.

      Dedicated print server

    • B.

       RAID array

    • C.

      Gigabit NIC

    • D.

      Dual processors

    Correct Answer(s)
    B.  RAID array
    C. Gigabit NIC
    Explanation
    A home server PC should be able to handle media streaming as well as file and printer sharing. A dedicated print server is not likely needed, though, as the operating system can function as a print server. A gigabit NIC will be helpful to manage the network traffic, and a RAID array can help protect against hard drive failure.

    Rate this question:

  • 23. 

    Which of the following wireless communication types has a maximum distance of about 4″?

    • A.

      NFC

    • B.

      Wi-Fi

    • C.

      IR

    • D.

      Bluetooth

    Correct Answer
    A. NFC
    Explanation
    The Near-field communication (NFC) is a wireless technology that uses radio frequency (RF) signals with limited range, about 4" (10 cm).

    Rate this question:

  • 24. 

    You have installed an internal RAID controller and configured a RAID-5 array on it with four hard disks. It has been operating normally. Today when you boot up, you receive an error message saying, “RAID not found.” Which component is likely causing this issue?

    • A.

      One of the four hard disks

    • B.

      The RAID controller

    • C.

      The system BIOS

    • D.

       The onboard hard drive controller

    Correct Answer
    B. The RAID controller
    Explanation
    If the system had been operating normally but now tells you RAID not found, it's likely something is wrong with the RAID controller. Double-check to ensure that the RAID controller BIOS is configured properly and everything is connected as it should be.

    Rate this question:

  • 25. 

    What type of network is most commonly associated with Bluetooth devices and covers a small area?

    • A.

       LAN

    • B.

      WAN

    • C.

      PAN

    • D.

      MAN

    Correct Answer
    C. PAN
    Explanation
    A personal area network (PAN) is a small-scale network designed around one person within a limited boundary area. The term generally refers to networks that use Bluetooth technology.

    Rate this question:

  • 26. 

    A senior administrator calls you and tells you that she is working from home and trying to use RDP, but it won't connect. What port do you need to ensure is open on the firewall to grant her access?

    • A.

       143

    • B.

      443

    • C.

      548

    • D.

      3389

    Correct Answer
    D. 3389
    Explanation
    The Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. It uses port 3389.

    Rate this question:

  • 27. 

    What 9-pin connector type was commonly used for keyboards, mice, or game controllers before USB became popular?

    • A.

      SCSI

    • B.

      PS/2

    • C.

      DB9

    • D.

      Lightning

    Correct Answer
    C. DB9
    Explanation
    DB9 was the “D” format, 9-pin connector type that was the standard format for keyboards, mice, and other small peripherals.

    Rate this question:

  • 28. 

    Which Wi-Fi encryption standard uses a static key, which is commonly 10, 26, or 58 characters long?

    • A.

      WPA

    • B.

      WPA2

    • C.

      TKIP

    • D.

      WEP

    Correct Answer
    D. WEP
    Explanation
    Wired Equivalent Privacy (WEP) was one of the first security standards for wireless devices. It uses a static key; the keys are commonly 10, 26, or 58 hexadecimal characters long.

    Rate this question:

  • 29. 

    You have been asked to design a new network that requires 10 Gbps transmission speeds. Which cable types will meet the minimum specifications? (Choose two.)

    • A.

      MMF

    • B.

      CAT5

    • C.

      CAT5e

    • D.

      CAT7

    Correct Answer(s)
    A. MMF
    D. CAT7
    Explanation
    Multimode fiber (MMF) and UTP CAT6 and newer support 10 Gbps transmission speeds.

    Rate this question:

  • 30. 

    You are connecting a laptop to a printer on the network using Wi-Fi. The user will need to use the printer frequently when they are in the office. What type of wireless connection will you establish with the printer?

    • A.

      Permanent

    • B.

      Ad hoc

    • C.

       On demand

    • D.

      Infrastructure

    Correct Answer
    D. Infrastructure
    Explanation
    Wi-Fi (802.11a, b, g, n, or ac) and Bluetooth can be used to connect a printer temporarily to a single computer (or mobile device), and the connection does not have permanent status. This type of configuration is known as an ad hoc network connection. When Wi-Fi is used to connect printers to a network on a more permanent basis, it is known as infrastructure mode.

    Rate this question:

  • 31. 

    Several Bluetooth devices are connected in an ad hoc network. Which acronym best describes this type of network?

    • A.

      LAN

    • B.

      WAN

    • C.

      PAN

    • D.

      MAN

    Correct Answer
    C. PAN
    Explanation
    A personal area network (PAN) is a small-scale network designed around one person within a limited boundary area. The term generally refers to networks that use Bluetooth technology.

    Rate this question:

  • 32. 

    Which TCP/IP Internet layer protocol is responsible for resolving physical MAC addresses to logical IP addresses?

    • A.

      IP

    • B.

      ICMP

    • C.

      ARP

    • D.

      RARP

    Correct Answer
    D. RARP
    Explanation
    At the Internet layer of TCP/IP, Address Resolution Protocol (ARP) resolves logical IP addresses to physical MAC addresses built into network cards. Reverse ARP (RARP) resolves MAC addresses to IP addresses.

    Rate this question:

  • 33. 

    Which type of DIMM has 184 pins?

    • A.

      DDR

    • B.

      DDR2

    • C.

      DDR3

    • D.

      SODIMM

    Correct Answer
    A. DDR
    Explanation
    DDR has 184 pins, DDR2 and DDR3 have 240 pins, and SODIMMs can have 72, 100, 144, 200, or 204 pins. DDR4 has 288 pins while DDR4 SODIMMs have 260 pins. Last, MicroDIMMs and MiniDIMMs at 240 pins.

    Rate this question:

  • 34. 

    A technician is recommending that his company use removable memory cards. Which of the following should he tell his manager?

    • A.

       MiniSD and microSD cards can work in a standard SD card slot.

    • B.

      MiniSD cards work in a standard SD slot, but microSD cards do not.

    • C.

      MicroSD cards work in a standard SD slot, but miniSD cards do not.

    • D.

      Neither miniSD nor microSD cards will work in a standard SD slot.

    Correct Answer
    A.  MiniSD and microSD cards can work in a standard SD card slot.
    Explanation
    MiniSD and microSD cards are smaller than standard SD memory cards. Adapters are available to allow them to work in standard SD slots.

    Rate this question:

  • 35. 

    Which type of flash memory is capable of being embedded on the circuit board of mobile devices?

    • A.

      XD

    • B.

      MiniSD

    • C.

      MicroSD

    • D.

      EMMC

    Correct Answer
    D. EMMC
    Explanation
    Embedded MultiMediaCard (eMMC) can be permanently embedded on the circuit board of a cheaper or smaller mobile device. All of the other flash memory standards, such as CompactFlash, xD, miniMMC, and microMMC, are designed to be removable.

    Rate this question:

  • 36. 

    A client needs to connect to the Internet using telephone lines. What type of expansion card should you configure in his computer?

    • A.

      USB

    • B.

       Cellular

    • C.

      Modem

    • D.

      NIC

    Correct Answer
    C. Modem
    Explanation
    A modem allows computers to connect to a remote network (such as an ISP) via telephone lines. Modems were the most common Internet connection method in the 1990s but are uncommon today. NICs are expansion cards for network connections. USB and cellular are not expansion cards. Other types of expansion cards include video cards, sound cards, storage cards, TV tuner cards, and riser cards.

    Rate this question:

  • 37. 

    Which network device comes in two types: active, which is powered, and passive, which is not?

    • A.

      Bridge

    • B.

      Router

    • C.

      Switch

    • D.

      Hub

    Correct Answer
    D. Hub
    Explanation
    Hubs can be either active or passive. Passive hubs connect all ports electrically but do not have their own power source. Active hubs use electronics to amplify and clean up the signal before it is broadcast to the other ports.

    Rate this question:

  • 38. 

    You are configuring hosts on a network running IPv4. Which elements are required for the computer to connect to the network?

    • A.

       IP address

    • B.

      IP address and subnet mask

    • C.

      IP address, subnet mask, and default gateway

    • D.

      IP address, subnet mask, default gateway, and DNS server address

    Correct Answer
    B. IP address and subnet mask
    Explanation
    To communicate on an IPv4 network, a host must be configured with a valid IP address and a subnet mask. A default gateway is needed only if the host will connect to a remote network. DNS servers are optional but useful, because they resolve hostnames to IP addresses.

    Rate this question:

  • 39. 

    Which of the following wireless communication methods are the least susceptible to hacking? (Choose two.)

    • A.

      Wi-Fi

    • B.

      IR

    • C.

      Bluetooth

    • D.

      NFC

    Correct Answer(s)
    B. IR
    D. NFC
    Explanation
    Of the wireless communication methods, infrared (IR) and near-field communication (NFC) are the hardest to hack. IR communication is limited to about 1 meter, with a viewing angle of about 30 degrees. You would know if someone was trying to intercept the signal. NFC is limited to about 4" (10 cm). It would be pretty obvious if someone were trying to intercept that signal.

    Rate this question:

  • 40. 

    What type of server can host files for easy access and fetching, similar to how a web server serves web pages?

    • A.

      FTP server

    • B.

      Proxy server

    • C.

       File server

    • D.

      Web server

    Correct Answer
    A. FTP server
    Explanation
    The File Transfer Protocol (FTP) server hosts files for easy access, allowing users who are able to browse it to transfer and upload the files.

    Rate this question:

  • 41. 

    On an IPv6 network, if you want to send a single message to a group of computers at the same time, what type of address class do you need to use?

    • A.

      Multicast

    • B.

      Anycast

    • C.

      Unicast

    • D.

       Broadcast

    Correct Answer
    A. Multicast
    Explanation
    There are three types of addresses in IPv6: unicast, anycast, and multicast. A unicast address identifies a single node on the network. An anycast address refers to one that has been assigned to multiple nodes. A multicast address is one used by multiple hosts. IPv6 does not use broadcasts.

    Rate this question:

  • 42. 

    Which type of coaxial cable connector locks by twisting the connector one-quarter turn?

    • A.

       F-connector

    • B.

      BNC

    • C.

      SC

    • D.

      ST

    Correct Answer
    B. BNC
    Explanation
    The BNC connector locks by twisting one-quarter turn. F-connectors are threaded and screw into place. SC and ST connectors are for fiber-optic cable.

    Rate this question:

  • 43. 

    Which TCP/IP host-to-host protocol makes its best effort to deliver data but does not guarantee it?

    • A.

      IP

    • B.

       TCP

    • C.

       UDP

    • D.

      ICMP

    Correct Answer
    C.  UDP
    Explanation
    The two host-to-host protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and UDP does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

    Rate this question:

  • 44. 

    Which of the following IPv6 addresses is equivalent to 127.0.0.1 in IPv4?

    • A.

      ::0

    • B.

      ::1

    • C.

      ::127

    • D.

      2000::/3

    Correct Answer
    B. ::1
    Explanation
    127.0.0.1 is the loopback address, used to ping the local network interface. The IPv6 equivalent is ::1.

    Rate this question:

  • 45. 

    You have a desktop computer with three PCI expansion slots. What will happen when you mix cards of different speeds on the same motherboard?

    • A.

      The cards will operate at their original speeds.

    • B.

      None of the cards will function.

    • C.

      The cards will all operate at the faster speed.

    • D.

      The cards will all operate at the slower speed.

    Correct Answer
    D. The cards will all operate at the slower speed.
    Explanation
    PCI is a shared-bus topology, so mixing 33 MHz and 66 MHz adapters in a 66 MHz system will slow all adapters to 33 MHz.

    Rate this question:

  • 46. 

    You have reason to believe that several network users are actively browsing prohibited content on unsecured sites on the Internet. Which port can you disable on the firewall to immediately stop access to these websites?

    • A.

      53

    • B.

      67

    • C.

      80

    • D.

      443

    Correct Answer
    C. 80
    Explanation
    Normal (unsecured) websites are accessed on port 80, which is the port that Hypertext Transfer Protocol (HTTP) uses. Shut it down, and no one will be able to access websites, except secure sites that use HTTPS, which is on port 443.

    Rate this question:

  • 47. 

    The AES security algorithm was introduced with which Wi-Fi encryption standard?

    • A.

      WEP

    • B.

      WPA

    • C.

      WPA2

    • D.

      TKIP

    Correct Answer
    C. WPA2
    Explanation
    Wi-Fi Protected Access 2 (WPA2) is a huge improvement over WEP and WPA. It uses Counter Mode CBC-MAC Protocol (CCMP), which is a protocol based on the Advanced Encryption Standard (AES) security algorithm. CCMP-AES was created to address the shortcomings of TKIP, so consequently it's much stronger than TKIP.

    Rate this question:

  • 48. 

    What is the maximum data rate for a USB 2.0 connection?

    • A.

      12 Mbps

    • B.

      480 Mbps

    • C.

       1 Gbps

    • D.

       5 Gbps

    Correct Answer
    B. 480 Mbps
    Explanation
    USB 1.0 supports 12 Mbps. In following standards, USB 2.0 supports 480 Mbps, USB 3.0 supports 5 Gbps and USB 3.1 Gen 2 supports 10 Gbps.

    Rate this question:

  • 49. 

    You are troubleshooting a laptop with an integrated wireless networking card. The user reports that the laptop will not connect to the Internet. When you look at the network card, the connection and activity lights alternate blinking, in a steady pattern. What is the most likely cause of the problem?

    • A.

      No network connection

    • B.

      Incorrect TCP/IP configuration

    • C.

       Failed network card

    • D.

      Unable to reach a DNS server

    Correct Answer
    A. No network connection
    Explanation
    Some wireless cards will have their connection and activity lights alternatively blink if there is no network connection. If the card had failed, there likely would be no lights on it at all.

    Rate this question:

  • 50. 

    Which of the following network connectivity devices operate at Layer 2 of the OSI model? (Choose two.)

    • A.

      Hub

    • B.

      Switch

    • C.

      Bridge

    • D.

      Router

    Correct Answer(s)
    B. Switch
    C. Bridge
    Explanation
    Switches and bridges work at Layer 2. Switches are multi-port bridges.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 29, 2020
    Quiz Created by
    LaTasha Stamps
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.