If you are studying for your Network + certification and as a result looking for a resources to help you study, look no further as the quiz below is all you need. Take it up and all the best.
The ARP protocols can access files on a remote server.
The SIP protocols can access files on a remote server.
The FTP protocols can access files on a remote server.
The NTP protocols can access files on a remote server.
Rate this question:
You should make sure that WINS is configured.
You should make sure that DNS is configured.
You should make sure that MAC address is right.
You should make sure that IP address is right.
Rate this question:
Arp has a relationship between MAC address and the corresponding IP address.
Nslookup has a relationship between MAC address and the corresponding IP address.
IPconfig has a relationship between MAC address and the corresponding IP address.
Tracert has a relationship between MAC address and the corresponding IP address.
Rate this question:
He should consider using arp.
He should consider pinging.
He should consider digging.
He should consider using nbtstat.
Rate this question:
Netstat
Arp
Nbtstat
Tracert/traceroute
Rate this question:
You should consider using POP3.
You should consider using UDP.
You should consider using NTP.
You should consider using TCP.
Rate this question:
Ipconfig
Nbtstat
Arp
Tracert
Rate this question:
Ping was used.
Arp was used.
Nbtstat was used.
Netstat was used.
Rate this question:
Arp
Traceroute
Ping
Ipconfig
Rate this question:
You should consider using the DNS protocol.
You should consider using the WINS protocol.
You should consider using the IMAP4protocol.
You should consider using the FTP protocol.
Rate this question:
You should consider making use of the nslookup command line utility.
You should consider making use of the attrib command line utility
You should consider making use of the arp command line utility.
You should consider making use of the mode command line utility.
Rate this question:
You should have the Simple Mail Transfer Protocol (SMTP) protocol enabled.
You should have the Trivial File Transfer Protocol (TFTP) protocol enabled.
You should have the Dynamic Host Configuration Protocol (DHCP) enabled.
You should have the Secure Socket Layer (SSL) extensions enabled.
Rate this question:
The UDP can be class as a connection oriented protocol.
The SPX can be class as a connection oriented protocol.
The TCP can be class as a connection oriented protocol.
The IP can be class as a connection oriented protocol.
Rate this question:
The Transmission Control Protocol / Internet Protocol (TCP/IP) would make use of the protocol.
You should know that the IPSec protocol would make use of the File Transfer Protocol (FTP) protocol.
You should know that the Kerberos protocol also make use of the FTP protocol.
You should know that the Network Basic Extended User Interface (NetBEUI)
Rate this question:
He should consider using IMAP4.
He should consider using DHCP.
He should consider using DNS.
He should consider using Telnet.
Rate this question:
The Transmission Control Protocol / Internet Protocol (TCP/IP) makes use of DNS to find addresses.
The Trivial File Transfer Protocol (TFTP) protocol makes use of DNS to find addresses.
The Kerberos protocol makes use of DNS to find addresses.
The Internetwork Packet Exchange / Sequence Packet Exchange (IPX/SPX) protocol makes use of DNS to find addresses.
Rate this question:
You should consider using nslookup.
You should consider using the ping command.
You should consider using rarp.
You should consider using netstat.
Rate this question:
The netstat command.
The arp command.
The nbtstat command.
The ping command.
Rate this question:
The RARP protocol.
The DHCP protocol.
The NTP protocol.
The ARP protocol.
Rate this question:
He should consider using netstat.
He should consider using arp.
He should consider using rarp.
He should consider using nslookup.
Rate this question:
You should inform the trainee that the Internet Protocol Security (IPSec) protocol has the ability.
You should inform the trainee that the Internetwork Packet Exchange (IPX) protocol has the ability.
You should inform the trainee that the Kerberos protocol has the ability.
You should inform the trainee that the Transmission Control Protocol (TCP) protocol has the ability.
Rate this question:
The UDP forms part of the TCP/IP protocol suite.
The IPX forms part of the TCP/IP protocol suite.
The NetBEUI forms part of the TCP/IP protocol suite.
The SPX forms part of the TCP/IP protocol suite.
Rate this question:
NNTP
IRTF
SNMP
TFTP
Rate this question:
You should consider enabling WINS.
You should consider enabling NetBIOS.
You should consider enabling DNS.
You should consider enabling DHCP.
Rate this question:
You should consider configuring NAT correctly.
You should consider configuring DHCP correctly.
You should consider configuring WINS correctly.
You should consider configuring DNS correctly.
Rate this question:
You should inform the technician that he can use POP3.
You should inform the technician that he can use SNMP.
You should inform the technician that he can use SMTP.
You should inform the technician that he can use NTP.
You should inform the technician that he can use IMAP4.
You should consider using RADIUS.
You should consider using PAP.
You should consider using CHAP.
You should consider using Kerberos.
Rate this question:
You should consider making use of the mode command line utility.
You should consider making use of the traceroute command line utility.
You should consider making use of the attrib command line utility.
You should consider making use of the arp command line utility.
Rate this question:
The computer has been configured with a static address of 169.254.1.37.
The computer is set for DHCP, but no DHCP server is available on the network.
The computer received the address from a DHCP server on the network.
The computer received the address from a BootP server on the network.
Rate this question:
RIPv2 is used for the UDP ports.
HTTP is used for the UDP ports.
HTTPS is used for the UDP ports.
TFTP is used for the UDP ports.
Rate this question:
You should consider using SSH.
You should consider using RADIUS.
You should consider using PAP.
You should consider using CHAP.
Rate this question:
You should know that the IPSec protocol would use the UDP protocol.
You should know that the Trivial File Transfer Protocol (TFTP) would use the UDP protocol.
You should know that the Kerberos protocol would make use of the UDP protocol.
You should know that the File Transfer Protocol (FTP) protocol would use the UDP protocol.
Rate this question:
The Simple Mail Transfer Protocol (SMTP) protocol has the fastest file transfers.
The Password Authentication Protocol (PAP) protocol has the fastest file transfers.
The Secure File Transfer Protocol (SFTP) protocol has the fastest file transfers.
The Trivial File Transfer Protocol (TFTP) protocol has the fastest file transfers.
Rate this question:
UDP takes place at the application layer of the OSI model.
FTP takes place at the application layer of the OSI model.
TCP takes place at the application layer of the OSI model.
SPX takes place at the application layer of the OSI model.
Rate this question:
The outgoing connects of CompTIA.com is blocked by a firewall.
The computer at work does not have FTP client installed.
The computer at the sales representative's house does not have the FTP server installed.
The computer at home does not have a routable IP address across the Internet.
Rate this question:
The command line utility mode was used.
The command line utility attrib was used.
The command line utility nslookup was used.
The command line utility arp was used.
Rate this question:
You should consider using NNTP.
You should consider using NCP
You should consider using SMTP.
You should consider using IMAP4.
Rate this question:
You should consider using the LDAP protocol.
You should consider using the SMTP protocol.
You should consider using the TCP protocol.
You should consider using the UDP protocol.
Rate this question:
Ping
Traceroute
Find
Arp
Rate this question:
You should consider flushing the DNS Cache.
You should consider installing the NetBEUI.
You should consider releasing the IP address.
You should consider installing the TCP/IP protocol.
Rate this question:
You should make sure the server does not use a different address.
You should configure the DNS correctly.
You should make sure the server is not on a different VLAN.
You should make sure the DHCP is correctly configured.
Rate this question:
The host does not have a DNS entry
The host HTTP is down.
The host does not have a WINS entry.
The host is down.
Rate this question:
Arps was used.
Netstat a was used.
Arpa was used.
Netstat s was used.
Rate this question:
You should check if the computer has a DHCP leased IP address.
You should check if the host Hyper Text Transfer Protocol (HTTP) protocol is down.
You should check if the local DNS server is properly configured.
You should ensure that the host computer is down.
Rate this question:
He should consider adding a Kerberos server.
He should consider configuring traffic shaping.
He should consider configuring the WEP.
He should consider adding a second NIC.
Rate this question:
You should consider using ipconfig.
You should consider using arps.
You should consider using arpa.
You should consider using nbtstat R.
The command used is arp
The command used is arp f_addr
The command used is arp -d
The command used is arp -s
Rate this question:
The UDP protocol.
The HTTP protocol.
The TCP protocol.
The FTP protocol.
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.