CompTIA Network+ Certification Exam Practice Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1443 | Total Attempts: 6,713,877
| Attempts: 68,913 | Questions: 80
Please wait...
Question 1 / 80
0 %
0/100
Score 0/100
1. Which of the following are required when logging on to a Windows NT Server? (Choose two.)

Explanation

When logging on to a Windows NT Server, two things are required: a password and a username. The password is necessary to authenticate the user and ensure their identity, while the username is used to identify the specific user account that is being accessed. The IP address and MAC address are not required for logging on to a Windows NT Server as they are related to network connectivity and hardware identification, respectively.

Submit
Please wait...
About This Quiz
CompTIA Network+ Certification Exam Practice Quiz - Quiz

This Network+ test has up to 80 rigorous questions for learners who are preparing for the CompTIA Network+ Certification. Go through this quiz to get a holistic understanding... see moreof the Network+ Certification exam. Happy Learning! see less

2. Static routing needs manual intervention to configure a routing entry to the destination. T/F ?

Explanation

Static routing requires manual intervention to configure a routing entry to the destination. This means that network administrators have to manually enter the specific routes into the routing table of each router in the network. This is in contrast to dynamic routing, where routers automatically exchange routing information and update their routing tables based on network changes. Therefore, the statement "Static routing needs manual intervention to configure a routing entry to the destination" is true.

Submit
3. You have introduced a fully configured workstation into your network. Your network is IP based and uses static IP addressing. Everytime the new workstation connects to the network, another existing computer generates an error message and stops connecting. What could the problem be?

Explanation

The problem could be that duplicate IP addresses have been assigned. When the new workstation connects to the network, it is using an IP address that is already in use by another computer. This causes a conflict and triggers an error message on the existing computer, which then stops connecting to the network. To resolve this issue, the duplicate IP addresses need to be identified and changed to unique addresses.

Submit
4. Which of the following functions is a firewall capable of? Choose two

Explanation

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. One of the main functions of a firewall is to block or permit traffic based on these rules. By blocking traffic, the firewall can prevent unauthorized access and potential threats from entering the network. On the other hand, by permitting traffic, the firewall allows legitimate and authorized traffic to pass through. Additionally, firewalls can also verify company policies to ensure compliance and authenticate internal users to control access to the network.

Submit
5. Which of the following is an ideal location for storing a tape into which you have just finished backing up?

Explanation

An ideal location for storing a tape after backing up is in a locked safe at an offsite location. This ensures that the backup data is protected from potential physical damage, theft, or disasters that may occur in the primary location. Storing the tape offsite also provides an additional layer of security in case of any incidents that may affect the primary location, such as fire or flooding. By keeping the tape in a locked safe, access to the data is restricted only to authorized personnel, further enhancing its security.

Submit
6. Which of the following is true regarding this representation of IP address?
204.202.10.32/29

Explanation

The given IP address representation "204.202.10.32/29" indicates that the first 29 bits of the 32-bit address are reserved for the network ID. This is because the "/29" notation represents the subnet mask, where the number after the slash indicates the number of bits in the network ID. In this case, since it is "/29", it means that the first 29 bits are reserved for the network ID, leaving only 3 bits for the host ID. Therefore, the correct answer is that 29 bits of the 32 bits are reserved for the network ID.

Submit
7. You have been successfully connecting to the Internet through your network till you installed a firewall. Now although you are unable to connect to your usual website, you are able to ping them using IP address. What's wrong?

Explanation

The correct answer is that you have inadvertently blocked the DNS server. This means that the firewall you installed is blocking the communication between your computer and the DNS server, preventing your computer from resolving domain names to IP addresses. As a result, you are unable to connect to your usual website by typing in the domain name, but you are still able to ping them using their IP address directly.

Submit
8. You wish to segregate your sales department logically in terms of the products that they deal with. There are 3 such groups. The data intended for Product 1 must not reach Product 2 and 3 and so on. Which of the following would be an ideal solution for this situation?

Explanation

VLANs (Virtual Local Area Networks) would be an ideal solution for segregating the sales department logically in terms of the products they deal with. VLANs allow for the creation of separate virtual networks within a physical network, enabling the isolation of traffic between different groups or departments. By assigning each product group to a different VLAN, the data intended for one product group will not reach the other groups, ensuring logical segregation and enhancing network security.

Submit
9. You have just added a computer to you network. The new computer can connect to the server only if any one of the existing computers gets shutdown. What could the problem be?

Explanation

The problem could be that the DHCP server has run out of IP addresses for the network. This means that there are no more available IP addresses for the new computer to be assigned when it tries to connect to the server. As a result, the new computer can only connect if one of the existing computers is shut down, freeing up an IP address for it to use.

Submit
10. You have just created an internal network that has address 172.16.0.0/16. Which of the following will be the subnet mask you assign for this network?

Explanation

The correct subnet mask to assign for the network with address 172.16.0.0/16 is 255.255.0.0. This is because the /16 subnet mask indicates that the first 16 bits of the IP address are the network portion, and the remaining 16 bits are the host portion. A subnet mask of 255.255.0.0 allows for 16 bits in the network portion, which matches the given network address.

Submit
11. You have just performed a backup on one of the most critical servers on your network. This server is accessed most frequently and hosts maximum amount of network data. Which of the following must you do now?

Explanation

After performing a backup on the critical server, it is important to verify the backup on a test server immediately. This step ensures that the backup was successful and all the necessary data has been properly backed up. Once the backup is verified, the tape should be dispatched to an offsite location for storage. Storing the backup offsite provides an extra layer of protection in case of any onsite disasters or data loss events.

Submit
12. In a Windows 2000 network, it is imperative that you must be physically connected to the printer into which you wish to fire a printout. T/F?

Explanation

In a Windows 2000 network, it is not necessary to be physically connected to the printer in order to print. Windows 2000 supports network printing, which allows users to send print jobs to printers that are connected to the network, regardless of their physical location. Users can connect to network printers using TCP/IP or other network protocols, allowing for printing from any device connected to the network. Therefore, the statement that it is imperative to be physically connected to the printer in order to print in a Windows 2000 network is false.

Submit
13. UNIX is an open source Operating System. T/F?

Explanation

UNIX is indeed an open source operating system. It was developed in the 1960s and 1970s at Bell Labs and has since been widely adopted and modified by various organizations. Being open source means that the source code of UNIX is freely available for anyone to view, modify, and distribute. This has allowed for the development of different versions of UNIX, such as Linux, which is one of the most popular open source operating systems today.

Submit
14. Identify the command that displays the output shown in the exhibit:

Explanation

The command "netstat -a" is used to display all active network connections and listening ports on a computer. It provides detailed information about network connections, including protocol, local and foreign addresses, and state. This command aligns with the exhibited output, making it the correct choice.

Submit
15. You have just connected a brand new dial-up modem that does not require drivers. You have configured the modem and shared it for your Peer-to-Peer network as per the instructions in the manual. Your system just refuses to recognize this PCI modem. What must you do next? Select 2

Explanation

If the system refuses to recognize the PCI modem that has been configured and shared for the Peer-to-Peer network, the first step would be to try restarting the computer. This can help refresh the system and potentially resolve any temporary issues that may be causing the recognition problem. If restarting the computer does not work, the next step would be to change the slot where the modem is connected. This can help troubleshoot any potential issues with the current slot and ensure proper recognition of the modem by the system.

Submit
16. Which of the following is not a network operating system?

Explanation

Windows for Workgroups is not a network operating system because it is a version of the Windows operating system that was primarily designed for small peer-to-peer networks and does not have the advanced networking capabilities found in true network operating systems. Windows NT, Windows 2000, and Linux, on the other hand, are all examples of network operating systems that are specifically designed to manage and control network resources and provide advanced networking features.

Submit
17. Which of the following devices is required to complete a VLAN set up successfully?

Explanation

A router is required to complete a VLAN (Virtual Local Area Network) set up successfully. A VLAN is a logical network created within a physical network to separate traffic and improve network efficiency. A router is responsible for routing traffic between different VLANs, allowing them to communicate with each other. It helps in directing network traffic based on IP addresses and VLAN tags, ensuring that data is sent to the appropriate VLAN. Therefore, a router is essential for establishing and managing VLANs effectively.

Submit
18. You have heard that HTTPS is the most secure way to access a web server. You have decided to upgrade your web server's HTTP service to HTTPS. Although your intranet users are still able to access this web server, it is no longer accessible to the rest. You know it is the upgrade that caused this situation. But what of the following could be the specific cause?

Explanation

The specific cause for the web server being inaccessible to the rest of the users after upgrading to HTTPS is that the firewall is blocking the HTTPS service port. This means that the firewall is preventing incoming connections to the web server on the HTTPS port, thereby restricting access to it.

Submit
19. Which of the following media access scheme does the token ring network use?

Explanation

Token passing is the correct answer because the token ring network uses a token passing media access scheme. In this scheme, a token is passed around the network, and only the device holding the token is allowed to transmit data. This ensures that there are no collisions and guarantees fair access to the network for all devices. CSMA/CD and CSMA/CA are different media access schemes used in other types of networks, not in token ring networks.

Submit
20. Metro is a small company that is using static IP addressing scheme in its network. After a merger with a larger company Cosmo, which uses dynamic IP addressing and DNS for name resolution, the servers of Metro were moved to the server farm of Cosmo and their addressing schemes and resolutions were changed accordingly. After this change in the network structure the servers that were moved to the server farm are no longer reachable. What should you do to correct the problem?

Explanation

Deleting the HOSTS file would be the correct action to take in order to correct the problem. The HOSTS file is a local file on a computer that maps hostnames to IP addresses. By deleting the HOSTS file, the computer will no longer use this file for name resolution and will rely on the dynamic IP addressing and DNS used by the larger company Cosmo. This will allow the servers that were moved to the server farm to be reachable again.

Submit
21. Windows 2000 does not support plug and play devices and so every device will have to be manually configured. T/F?

Explanation

False. Windows 2000 does support plug and play devices, which means that these devices can be automatically detected and configured by the operating system without the need for manual intervention.

Submit
22. Which of the following permissions would be appropriate for Unix/Linux file system? (Choose three)

Explanation

The appropriate permissions for Unix/Linux file system are Read (r), Write (w), and Execute (x). These permissions allow a user to read the contents of a file, modify the contents of a file, and execute a file as a program, respectively. Change (c) is not a valid permission in Unix/Linux file systems.

Submit
23. Kerberos is ideally meant for_____________.

Explanation

Kerberos is a network authentication protocol that is primarily designed for authenticating LAN users. It provides a secure way for users to prove their identity to network services and ensures that only authorized users can access resources on the network. By using a system of tickets and encryption, Kerberos verifies the identity of users and protects against unauthorized access and tampering of data. Therefore, it is suitable for authenticating LAN users rather than WAN users or encrypting databases or user names.

Submit
24. Which of the following devices is used to connect multiple computers on a network segment?

Explanation

A hub is a device used to connect multiple computers on a network segment. It acts as a central connection point, allowing data to be transmitted between the connected devices. Unlike a router or a bridge, a hub does not analyze or direct the data traffic. Instead, it simply broadcasts the data to all connected devices, which means that all devices on the network segment receive the data.

Submit
25. Bridges operate at the physical layer. T/F?

Explanation

False. Bridges operate at the data link layer, which is the second layer in the OSI model. The physical layer is responsible for the transmission of raw data over a physical medium, while the data link layer is responsible for the reliable transmission of data between adjacent nodes on a network. Bridges are used to connect two or more network segments at the data link layer, making them operate at this layer rather than the physical layer.

Submit
26. If you were asked to subnet a network in such a way as to arrive at 6 network Ids you would need to borrow 2 bits. T/F?

Explanation

To subnet a network and arrive at 6 network IDs, you would actually need to borrow 3 bits, not 2. Borrowing 2 bits would only allow for a maximum of 4 network IDs (2^2 = 4). Borrowing 3 bits would give you 8 possible network IDs (2^3 = 8), which is more than the required 6. Therefore, the correct answer is False.

Submit
27. Which of the following commands will help to create a static route from a router Router A to destination network 172.12.0.0?

Explanation

The correct answer is "ip route 172.12.0.0 255.255.0.0 172.12.8.1". This command will create a static route from Router A to the destination network 172.12.0.0 with a subnet mask of 255.255.0.0 and the next hop IP address of 172.12.8.1. This means that any traffic destined for the 172.12.0.0 network will be forwarded to the next hop IP address specified in the command.

Submit
28. You are configuring a dial-up connection for your network to connect with a remote server. Which of the following protocols must you configure to secure your authentication in terms of encryption? (Choose two.)

Explanation

not-available-via-ai

Submit
29. You are a traveling user who connects to the remote site from your laptop whenever you visit that site. Today when you connect your laptop to the network, you are unable to login. You check your IP configuration and your IP address is 0.0.0.0. What is the likely cause for the problem?

Explanation

The likely cause for the problem is that the DHCP server is not reachable. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. If the DHCP server is not reachable, the laptop is unable to obtain an IP address, resulting in the IP address being displayed as 0.0.0.0.

Submit
30. After building a small network and connecting it to your ISP you notice that the clients are unable to browse the Internet. You call your ISP and he asks for the information configured on your router. You present the required information to him. He says the information is as it should be. You browse the net from the computer directly connected to your DSL modem and you are able to do so. What could the problem be?

Explanation

The problem could be that the default gateway is not set on the workstations. The default gateway is the IP address of the router that connects the local network to the internet. Without a default gateway, the workstations do not know how to route their network traffic to the internet. This would explain why they are unable to browse the internet even though the router's configuration and the ISP's information are correct.

Submit
31. Which of the following are some commonalities between Windows NT and Windows 2000?

Explanation

Both Windows NT and Windows 2000 are based on the NT kernel. This means that they share the same foundational software that manages system resources, such as memory, processes, and input/output. This commonality between the two operating systems suggests that they have similar underlying architectures and capabilities.

Submit
32. The ADS employs the flat domain structure. T/F?

Explanation

The given answer is false because the ADS (Active Directory Services) does not employ a flat domain structure. Instead, it uses a hierarchical structure known as a domain tree, where domains are organized in a logical tree-like structure with a single root domain at the top. This allows for better organization, management, and delegation of administrative tasks within the network.

Submit
33. _________________ is used to propagate VLAN information across a trunked link.

Explanation

The Virtual Trunk Protocol is used to propagate VLAN information across a trunked link. Trunking is a method of carrying multiple VLANs over a single link between switches. The Virtual Trunk Protocol allows switches to communicate and synchronize VLAN information, ensuring that all switches in the network have the same VLAN configuration. This allows for the efficient and effective distribution of VLAN traffic across the network.

Submit
34. If you were to identify a NetBIOS name corresponding to an IP address, where would you look for it?

Explanation

The NetBIOS name cache is the most likely place to find a NetBIOS name corresponding to an IP address. NetBIOS is an older networking protocol that maps computer names to IP addresses. The NetBIOS name cache stores this mapping information for quick retrieval. The other options, such as the ARP cache, MAC address table of a switch, and DNS cache, are not specifically designed to store NetBIOS name information.

Submit
35. You are configuring a small home network. The main system has workgroup name 'elle' and the client has workgroup name 'ELLE' will the connection work?

Explanation

The connection will not work because workgroup names are case-sensitive. The main system has a workgroup name 'elle' while the client has a workgroup name 'ELLE'. Since the names do not match exactly, the connection will not be established.

Submit
36. Linux is a __________ operating system.

Explanation

Linux is a 32-bit operating system because it is designed to work on systems with a 32-bit processor. A 32-bit operating system can handle a maximum of 4GB of RAM and can execute 32-bit software. This means that Linux can efficiently run on older hardware or systems with limited resources.

Submit
37. IPX routing is enabled by default in all Cisco routers. T/F?

Explanation

False. IPX routing is not enabled by default in all Cisco routers. IPX (Internetwork Packet Exchange) is a network layer protocol used in Novell NetWare networks. Cisco routers typically have IP (Internet Protocol) routing enabled by default, but not IPX routing.

Submit
38. Which of the following is the least fault tolerant of all networking topologies?

Explanation

A bus topology is the least fault tolerant of all networking topologies because it relies on a single communication line that connects all devices in a linear fashion. If the main communication line breaks or a device fails, the entire network can be disrupted. In contrast, other topologies like ring, star, and mesh have redundant paths or multiple connections, allowing for better fault tolerance as they can continue functioning even if one part of the network fails.

Submit
39. Provide the broadcast address for the following:
IP Address: 221.240.224.121
Subnet mask: 255.255.255.248.

Explanation

The given IP address is 221.240.224.121 and the subnet mask is 255.255.255.248. To find the broadcast address, we need to perform a bitwise OR operation between the IP address and the inverted subnet mask. The inverted subnet mask is 0.0.0.7. When we perform the bitwise OR operation, we get 221.240.224.127 as the broadcast address.

Submit
40. Which of the following is true regarding this representation of IP address?
204.202.10.32/29

Explanation

In this representation of the IP address 204.202.10.32/29, the "/29" indicates that the first 29 bits of the 32-bit IP address are reserved for the network ID. This means that only the remaining 3 bits are available for the host ID. Therefore, the correct answer is that 29 bits of the 32 bits are reserved for the network ID.

Submit
41. Which networking topology is the easiest to reconfigure?

Explanation

The star topology is the easiest to reconfigure because it uses a central hub or switch to connect all devices in the network. Adding or removing devices only requires making changes at the central hub, without affecting the rest of the network. This makes it a flexible and convenient option for reconfiguration.

Submit
42. Which of the following is a non-routable protocol?

Explanation

NetBEUI is a non-routable protocol because it does not have the capability to be routed across different networks. It is designed for small local area networks (LANs) and cannot be used to communicate between different LANs or over the internet. In contrast, protocols like TCP/IP, IPX/SPX, and AppleTalk are routable protocols that can be used for communication across multiple networks.

Submit
43. Your routing network has been experiencing severe congestion lately. You suspect the oldest 2 routers to be causing the problem. How would you verify this?

Explanation

To verify if the oldest 2 routers are causing the congestion, using tracert would be the most appropriate option. Tracert (traceroute) is a network diagnostic tool that traces the route taken by packets across an IP network. By using tracert, you can identify the path and measure the response time of each hop (router) along the way. This will allow you to determine if there are any delays or bottlenecks occurring at the suspected routers, confirming if they are indeed causing the congestion.

Submit
44. PPTP is a protocol that is ideally meant for _____.

Explanation

PPTP (Point-to-Point Tunneling Protocol) is a protocol that is ideally meant for VPNs (Virtual Private Networks). PPTP is commonly used to create a secure and encrypted connection between remote users and a private network over the internet. It allows for the secure transmission of data and ensures privacy and confidentiality.

Submit
45. Which of the interfaces on the router would be used by the switch, if the switch needs to connect to the router?

Explanation

The switch would use the Fast Ethernet interface on the router to connect to it. Fast Ethernet is a standard for Ethernet networks that provides higher data transfer speeds compared to regular Ethernet. It is commonly used for connecting local area networks (LANs) and devices that require fast and reliable network connectivity.

Submit
46. Which of the following connector is used in a 10BASE2 Bus topology?

Explanation

The correct answer is BNC. BNC connectors are used in a 10BASE2 Bus topology. This type of connector is commonly used in coaxial cables to connect devices in a network. It provides a secure and reliable connection, making it suitable for bus topology where multiple devices are connected to a single cable. BNC connectors are easy to install and remove, making it convenient for troubleshooting and maintenance purposes.

Submit
47. The SMB (server message block) protocol runs on the Windows server and allows UNIX and Linux servers to see the Windows server as one of the UNIX/LINUX based servers. T/F?

Explanation

not-available-via-ai

Submit
48. Which of the following can be used to check for the transmission and reception ports on a NIC?

Explanation

A hardware loopback can be used to check for the transmission and reception ports on a NIC. A hardware loopback is a device that allows signals to be sent from the transmission port of a NIC and looped back to the reception port, effectively testing the functionality of both ports. By using a hardware loopback, one can verify if the NIC is able to transmit and receive data properly, ensuring that the network connection is working correctly.

Submit
49. Routing Information Protocol (RIP) by default has_____________ number of hops.

Explanation

RIP (Routing Information Protocol) by default has a maximum limit of 15 hops. This means that RIP can only handle routing information for networks that are within 15 hops (or routers) away. If a network is further than 15 hops away, RIP will not be able to route traffic to that network.

Submit
50. You have interlinked two of your offices using a router. Though your network uses IP addresses, the users prefer using host names to numbers as it is easy to remember. You have to configure the network such that the users of either side can access resources on either side using the host names. Which of the following needs to be configured for this network? (Choose two.)

Explanation

To enable users to access resources on either side of the interlinked offices using host names, DNS (Domain Name System) needs to be configured. DNS is responsible for translating host names into IP addresses, allowing users to access resources using familiar names instead of numbers. Additionally, TCP/IP (Transmission Control Protocol/Internet Protocol) also needs to be configured as it is the underlying protocol that enables communication between devices on the network.

Submit
51. Which of the following statements about bridges is true?

Explanation

Bridges are more efficient than repeaters because they operate at the data link layer of the OSI model, allowing them to filter and forward data packets based on their destination MAC addresses. This allows bridges to selectively transmit data only to the intended recipient, reducing unnecessary network traffic and improving overall network efficiency. Repeaters, on the other hand, operate at the physical layer and simply amplify and regenerate signals, without any filtering or forwarding capabilities.

Submit
52. Which of the following file systems is supported by Windows 2000 & above OS only?

Explanation

NTFS 5 is the correct answer because it is the file system that is supported by Windows 2000 and above operating systems only. NTFS 5, also known as New Technology File System, is the default file system for Windows NT and its successors. It offers advanced features such as file and folder permissions, encryption, compression, and support for larger file sizes and volumes. Windows 2000 and above operating systems do not support NTFS 4, FAT 16, or FAT 32 file systems.

Submit
53. Which of the following access security does Windows 2000 Server use on LANs?

Explanation

Windows 2000 Server uses Kerberos as the access security on LANs. Kerberos is a network authentication protocol that provides secure communication over a non-secure network. It uses tickets to verify the identity of users and allows them to securely access network resources. Kerberos is widely used in Windows environments as it provides strong authentication and helps prevent unauthorized access to sensitive information.

Submit
54. A backbone is a trunk cable that________________.

Explanation

A backbone is a trunk cable that connects nodes, segments, and networks, facilitating communication between them. It serves as a central pathway for data transmission, allowing for efficient and reliable connectivity within a network infrastructure. By connecting various components of a network, including individual devices, local segments, and larger networks, a backbone ensures seamless communication and data transfer across the entire system.

Submit
55. Which of the following makes the DNS environment a backbone of the Windows 2000 network?

Explanation

DDNS (Dynamic DNS) makes the DNS environment a backbone of the Windows 2000 network. DDNS allows for automatic updating of DNS records, which is particularly useful in dynamic IP addressing environments. It enables devices with changing IP addresses to be easily and automatically registered and updated in the DNS system. This ensures that the domain names associated with these devices are always up to date and can be resolved correctly, making DDNS an essential component of the Windows 2000 network.

Submit
56. Your present network uses HOSTS file for IP to host name resolution. You are planning on adding a DNS server and moving a few servers to a remote site with different IP address. Which of the following will hold true?

Explanation

If a DNS server is added and the HOSTS file is deleted, users will be able to connect. This is because the HOSTS file is used for IP to host name resolution in the present network. By enabling the DNS server, the network will now use DNS for IP to host name resolution instead. Deleting the HOSTS file ensures that the network does not continue to use it for resolution, allowing the DNS server to handle the task effectively.

Submit
57. Which of the following are used for increasing fault toleranace? Choose three

Explanation

Tape backup, mirrored servers, and RAID disk storage are all used for increasing fault tolerance. Tape backup involves regularly backing up data onto tape cartridges, providing a reliable and easily recoverable copy in case of data loss or system failure. Mirrored servers involve creating an identical copy of a server's data and configuration on another server, allowing for seamless failover in case of server failure. RAID disk storage utilizes multiple hard drives to create redundancy and improve data reliability and availability. Off-site data archive, although mentioned in the options, is not typically used for increasing fault tolerance as it primarily serves as a backup in case of disaster or loss at the primary site.

Submit
58. Which of the following protocols does Network Attached Storage (NAS) use? (Choose two.)

Explanation

Network Attached Storage (NAS) uses the protocols IPX and TCP/IP. IPX is a protocol used for communication between network devices, while TCP/IP is the standard protocol suite used for internet communication. NAS devices use these protocols to connect to the network and access files over a local area network (LAN) or wide area network (WAN).

Submit
59. Which of the following directory services can the Active Directory Service be compared with?

Explanation

The Active Directory Service can be compared with Netware Directory Services because both are directory services that provide a centralized database for managing and organizing resources in a network. They both allow for the creation and management of user accounts, groups, and permissions. Additionally, they both support a hierarchical structure that enables efficient and secure access to network resources.

Submit
60. You just installed an application onto your Win2k workstation from the network and restarted it. It is no longer able to connect to the network, how will you roll back to the old setup before installing the software?

Explanation

To roll back to the old setup before installing the software, you need to uninstall the software that was just installed. Uninstalling the software will remove any changes it made to the system, including any settings that might be causing the network connection issue. This will allow you to revert back to the previous state of the system where it was able to connect to the network. Using safe mode or last known good configuration might help in some cases, but the most direct and effective solution is to uninstall the software.

Submit
61. How many maximum subnet IDs are possible in this situation? Class C network 221.222.162.0 255.255.255.0, subnet by borrowing 5 bits,

Explanation

By borrowing 5 bits, we can create 2^5 = 32 subnets. However, since the question asks for the maximum subnet IDs, we need to subtract 2 from the total number of subnets. This is because the first subnet ID (all 0s) is reserved as the network address, and the last subnet ID (all 1s) is reserved as the broadcast address. Therefore, the maximum number of subnet IDs possible in this situation is 32 - 2 = 30 subnet IDs.

Submit
62. You are connecting a Windows workstation to a NetWare 4.11 server. The workstation is unable to connect to the server, but it is able to connect to the Internet. Which two are possible problems? (Choose two.)

Explanation

The possible problems could be that the server is not running NetBEUI, which is required for the Windows workstation to connect to it. Additionally, the workstation may not be running IPX/SPX, which is the protocol used by NetWare servers for communication.

Submit
63. A Windows client in your Netware network had a faulty NIC which got replaced. The workstation no longer connects to the network, even though the configuration of the NIC is completed successfully. What could the problem be?

Explanation

The problem could be that the frame type of the NIC is misconfigured. The frame type determines how data is formatted and transmitted on the network. If the frame type is not properly configured, the workstation will not be able to communicate with the network. This can result in the workstation being unable to connect to the network, even if the NIC configuration itself is completed successfully.

Submit
64. Which name resolution technique does a UNIX host use?

Explanation

A UNIX host uses the DNS (Domain Name System) name resolution technique. DNS is a system that translates domain names into IP addresses, allowing computers to communicate with each other over the internet. It is responsible for mapping human-readable domain names to their corresponding IP addresses, making it easier for users to access websites and services. DHCP (Dynamic Host Configuration Protocol) is used for assigning IP addresses to devices on a network, Proxy is a server that acts as an intermediary between clients and other servers, and LMHOSTS is a file used by Microsoft Windows for NetBIOS name resolution.

Submit
65. Which of the following is the correct connection for cascading MAus?

Explanation

not-available-via-ai

Submit
66. Which of the following allows fault tolerance for user authentication in a Windows 2000 network?

Explanation

Multi master replication allows fault tolerance for user authentication in a Windows 2000 network. In this system, multiple domain controllers are able to authenticate users and store user account information. If one domain controller fails, another can step in and continue the authentication process. This ensures that user authentication remains available even in the event of a failure, providing fault tolerance for the network.

Submit
67. It is required that you block UDP ports on your firewall for security reasons. Which of the following services may be affected?

Explanation

Blocking UDP ports on a firewall for security reasons may affect the NTP (Network Time Protocol) service. NTP is a protocol used for time synchronization between computer systems. It relies on UDP for communication, so blocking UDP ports would prevent NTP from functioning properly. Other services like FTP (File Transfer Protocol), HTTP (Hypertext Transfer Protocol), and SMTP (Simple Mail Transfer Protocol) do not exclusively rely on UDP for communication, so they would not be affected by blocking UDP ports.

Submit
68. Which of the following is/are default Ethernet frame types for Netware versions above 3.12?

Explanation

Ethernet 802.2 is a default Ethernet frame type for Netware versions above 3.12. This frame type is used for connecting Netware devices and supports the Novell Netware protocol. It provides a logical link control (LLC) layer that allows for reliable and error-free communication between devices. Ethernet 802.2 frames include a source and destination address, control information, and data. This frame type is commonly used in Netware networks for transmitting data packets.

Submit
69. You have just upgraded your Dial-up server on the network. This server was used to share internet connections to the entire network. Users are unable to connect to the Internet now. What could be the likely cause of the problem?

Explanation

The likely cause of the problem is that the DNS server failed to start the right services. DNS (Domain Name System) is responsible for translating domain names into IP addresses. If the DNS server is not functioning properly, it will prevent users from connecting to the internet as they won't be able to resolve domain names to their corresponding IP addresses. This can happen after an upgrade if the DNS server configuration was not properly updated or if there was an issue with the DNS server software.

Submit
70. Plug and play technology allows you to add devices to the computer without having to turn it off. T/F?

Explanation

Plug and play technology enables users to connect and use devices with a computer without needing to shut down or restart the system. This feature automatically detects and configures newly connected hardware, facilitating seamless integration and usability without the need for manual intervention or system restarts.

Submit
71. Into which of the following does the ADS store its information? Select all that apply

Explanation

The ADS (Active Directory Service) stores its information in the AD database, AD log files, and the shared system volume. The AD database is where all the objects, attributes, and configurations of the Active Directory are stored. The AD log files keep a record of all the changes and events that occur within the Active Directory. The shared system volume is a shared folder on the domain controller that stores system files and scripts used by the Active Directory. Therefore, all the given options are correct.

Submit
72. Which of the following file systems is used by UNIX?

Explanation

The correct answer is Network file system. UNIX uses the Network File System (NFS) as its file system. NFS allows files to be accessed and shared across different machines on a network. It provides a way for multiple users to access files simultaneously and is commonly used in UNIX-based systems for file sharing and remote file access.

Submit
73. Which of the following are services of a proxy server? (Choose three.)

Explanation

A proxy server can perform several services, including caching web pages and DNS information to improve access speed and reduce bandwidth usage. Cached web pages allow faster access to frequently visited sites, while cached DNS information reduces the time it takes to resolve domain names. Cached e-mail and cached client files are not typical functions of a proxy server, as these are usually managed by other specialized systems like email servers or file servers.

Submit
74. Which of the following file systems are not supported by Windows NT 4.0? Select 2

Explanation

Windows NT 4.0 does not support NTFS 5 and FAT 32 file systems. NTFS 5 is not supported because it was introduced in Windows 2000, which is a newer version of the operating system. FAT 32 is not supported because it was introduced in Windows 95 OSR2 and Windows 98, which are also newer versions of the operating system. Windows NT 4.0 only supports NTFS 4 and FAT 16 file systems.

Submit
75. On a bus segment, you have introduced a new workstation after which the entire segment collapses. What could be the possible cause/causes for the problem? Select 2

Explanation

The collapse of the entire bus segment after introducing a new workstation suggests that there may be an issue with the network interface card (NIC) in the new workstation. A faulty NIC can cause disruptions in the network communication, leading to the collapse of the segment. Additionally, a faulty termination, such as a loose or improperly connected cable, can also result in network issues and segment collapse. Faulty cabling can further contribute to connectivity problems and segment failure. However, a faulty server alone would not cause the collapse of the entire segment, so it is not a possible cause in this scenario.

Submit
76. Administrative authority is delegated to Administrators in Windows 2000 networks. T/F?

Explanation

In Windows 2000 networks, administrative authority is delegated to Domain Administrators, not just Administrators. Therefore, the statement that administrative authority is delegated to Administrators is false.

Submit
77. You are configuring a leased line for your network with the help of your service provider. You are now testing for the loop. The modem does not detect a dial tone but responds to the off-hook. What is a possible cause for this dial back-up failure?

Explanation

In the scenario described, if the modem does not detect a dial tone but responds to the off-hook condition, the most likely cause of the dial backup failure is a problem with the cable. A faulty or improperly connected cable between the modem and the telephone line could prevent the modem from detecting the dial tone, leading to the failure of the dial backup process. The router, modem, or LAN would not typically cause this specific issue, as they are more related to data transmission rather than the initial detection of a dial tone.

Submit
78. Which IEEE standard describes the specifications for a ring topology?

Explanation

IEEE standard 802.5 describes the specifications for a ring topology. This standard, also known as Token Ring, defines the physical and data link layer protocols for a local area network (LAN) using a ring topology. In a ring network, data travels in a circular path, with each device on the network receiving and forwarding the data to the next device. The 802.5 standard specifies the token passing access method, frame format, and other requirements for devices to communicate in a ring network.

Submit
79. Which of the following is used to map Network-layer protocol address to DLCIs?

Explanation

Inverse ARP is used to map Network-layer protocol addresses to DLCIs. Inverse ARP is a protocol used in Frame Relay networks to dynamically map DLCIs to Network-layer protocol addresses, such as IP addresses. It allows a device to discover the DLCI associated with a specific destination IP address. This mapping is necessary for proper communication between devices in a Frame Relay network.

Submit
80. Which of the following protocols is supported by Windows 2000 Server for the purpose of dial-up? Choose two

Explanation

Windows 2000 Server supports the PPP (Point-to-Point Protocol) and SLIP (Serial Line Internet Protocol) protocols for dial-up purposes. PPP is widely used for establishing a connection between a computer and an internet service provider (ISP) over a telephone line. SLIP, on the other hand, is an older protocol that allows data transmission over serial connections, typically used for dial-up connections. TCP/IP and IPX/SPX are network protocols, but they are not specifically designed for dial-up connections.

Submit
View My Results

Quiz Review Timeline (Updated): Jul 8, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 08, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 08, 2014
    Quiz Created by
    Catherine Halcomb
Cancel
  • All
    All (80)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following are required when logging on to a Windows NT...
Static routing needs manual intervention to configure a routing entry...
You have introduced a fully configured workstation into your network....
Which of the following functions is a firewall capable of? Choose two
Which of the following is an ideal location for storing a tape into...
Which of the following is true regarding this representation of IP...
You have been successfully connecting to the Internet through your...
You wish to segregate your sales department logically in terms of the...
You have just added a computer to you network. The new computer can...
You have just created an internal network that has address...
You have just performed a backup on one of the most critical servers...
In a Windows 2000 network, it is imperative that you must be...
UNIX is an open source Operating System. T/F?
Identify the command that displays the output shown in the exhibit:
You have just connected a brand new dial-up modem that does not...
Which of the following is not a network operating system?
Which of the following devices is required to complete a VLAN set up...
You have heard that HTTPS is the most secure way to access a web...
Which of the following media access scheme does the token ring network...
Metro is a small company that is using static IP addressing scheme in...
Windows 2000 does not support plug and play devices and so every...
Which of the following permissions would be appropriate for Unix/Linux...
Kerberos is ideally meant for_____________.
Which of the following devices is used to connect multiple computers...
Bridges operate at the physical layer. T/F?
If you were asked to subnet a network in such a way as to arrive at 6...
Which of the following commands will help to create a static route...
You are configuring a dial-up connection for your network to connect...
You are a traveling user who connects to the remote site from your...
After building a small network and connecting it to your ISP you...
Which of the following are some commonalities between Windows NT and...
The ADS employs the flat domain structure. T/F?
_________________ is used to propagate VLAN information across a...
If you were to identify a NetBIOS name corresponding to an IP address,...
You are configuring a small home network. The main system has...
Linux is a __________ operating system.
IPX routing is enabled by default in all Cisco routers. T/F?
Which of the following is the least fault tolerant of all networking...
Provide the broadcast address for the following:...
Which of the following is true regarding this representation of IP...
Which networking topology is the easiest to reconfigure?
Which of the following is a non-routable protocol?
Your routing network has been experiencing severe congestion lately....
PPTP is a protocol that is ideally meant for _____.
Which of the interfaces on the router would be used by the switch, if...
Which of the following connector is used in a 10BASE2 Bus topology?
The SMB (server message block) protocol runs on the Windows server and...
Which of the following can be used to check for the transmission and...
Routing Information Protocol (RIP) by default has_____________ number...
You have interlinked two of your offices using a router. Though your...
Which of the following statements about bridges is true?
Which of the following file systems is supported by Windows 2000 &...
Which of the following access security does Windows 2000 Server use on...
A backbone is a trunk cable that________________.
Which of the following makes the DNS environment a backbone of the...
Your present network uses HOSTS file for IP to host name resolution....
Which of the following are used for increasing fault toleranace?...
Which of the following protocols does Network Attached Storage (NAS)...
Which of the following directory services can the Active Directory...
You just installed an application onto your Win2k workstation from the...
How many maximum subnet IDs are possible in this situation? Class C...
You are connecting a Windows workstation to a NetWare 4.11 server. The...
A Windows client in your Netware network had a faulty NIC which got...
Which name resolution technique does a UNIX host use?
Which of the following is the correct connection for cascading MAus?
Which of the following allows fault tolerance for user authentication...
It is required that you block UDP ports on your firewall for security...
Which of the following is/are default Ethernet frame types for Netware...
You have just upgraded your Dial-up server on the network. This server...
Plug and play technology allows you to add devices to the computer...
Into which of the following does the ADS store its information? Select...
Which of the following file systems is used by UNIX?
Which of the following are services of a proxy server? (Choose three.)
Which of the following file systems are not supported by Windows NT...
On a bus segment, you have introduced a new workstation after which...
Administrative authority is delegated to Administrators in Windows...
You are configuring a leased line for your network with the help of...
Which IEEE standard describes the specifications for a ring topology?
Which of the following is used to map Network-layer protocol address...
Which of the following protocols is supported by Windows 2000 Server...
Alert!

Advertisement