CompTIA Network+ Certification Exam Practice Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1443 | Total Attempts: 6,677,819
| Attempts: 68,860
SettingsSettings
Please wait...
  • 1/80 Questions

    Which of the following are required when logging on to a Windows NT Server? (Choose two.)

    • Password
    • Username
    • IP address
    • MAC address
Please wait...
About This Quiz

This Network+ test has up to 80 rigorous questions for learners who are preparing for the CompTIA Network+ Certification. Go through this quiz to get a holistic understanding of the Network+ Certification exam. Happy Learning!

CompTIA Network+ Certification Exam Practice Quiz - Quiz

Quiz Preview

  • 2. 

    Static routing needs manual intervention to configure a routing entry to the destination. T/F ?

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Static routing requires manual intervention to configure a routing entry to the destination. This means that network administrators have to manually enter the specific routes into the routing table of each router in the network. This is in contrast to dynamic routing, where routers automatically exchange routing information and update their routing tables based on network changes. Therefore, the statement "Static routing needs manual intervention to configure a routing entry to the destination" is true.

    Rate this question:

  • 3. 

    You have introduced a fully configured workstation into your network. Your network is IP based and uses static IP addressing. Everytime the new workstation connects to the network, another existing computer generates an error message and stops connecting. What could the problem be?

    • DNS servers have not been assigned.

    • WINS servers have not been assigned.

    • Duplicate gateways have not been assigned.

    • Duplicate IP addresses have been assigned.

    Correct Answer
    A. Duplicate IP addresses have been assigned.
    Explanation
    The problem could be that duplicate IP addresses have been assigned. When the new workstation connects to the network, it is using an IP address that is already in use by another computer. This causes a conflict and triggers an error message on the existing computer, which then stops connecting to the network. To resolve this issue, the duplicate IP addresses need to be identified and changed to unique addresses.

    Rate this question:

  • 4. 

    Which of the following functions is a firewall capable of? Choose two

    • Block traffic

    • Permit traffic

    • Verify company policies

    • Authenticate internal users

    Correct Answer(s)
    A. Block traffic
    A. Permit traffic
    Explanation
    A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. One of the main functions of a firewall is to block or permit traffic based on these rules. By blocking traffic, the firewall can prevent unauthorized access and potential threats from entering the network. On the other hand, by permitting traffic, the firewall allows legitimate and authorized traffic to pass through. Additionally, firewalls can also verify company policies to ensure compliance and authenticate internal users to control access to the network.

    Rate this question:

  • 5. 

    Which of the following is an ideal location for storing a tape into which you have just finished backing up?

    • In the server room

    • In the Network administrator's desk

    • In the communication room

    • In a locked safe at on offsite location

    Correct Answer
    A. In a locked safe at on offsite location
    Explanation
    An ideal location for storing a tape after backing up is in a locked safe at an offsite location. This ensures that the backup data is protected from potential physical damage, theft, or disasters that may occur in the primary location. Storing the tape offsite also provides an additional layer of security in case of any incidents that may affect the primary location, such as fire or flooding. By keeping the tape in a locked safe, access to the data is restricted only to authorized personnel, further enhancing its security.

    Rate this question:

  • 6. 

    Which of the following is true regarding this representation of IP address?204.202.10.32/29

    • 29 bits of the 32 bits are reserved for host ID.

    • 3 bits of the 32 bits are reserved for the network ID.

    • 29 bits of the 32 bits are reserved for the network ID.

    • None of the above

    Correct Answer
    A. 29 bits of the 32 bits are reserved for the network ID.
    Explanation
    The given IP address representation "204.202.10.32/29" indicates that the first 29 bits of the 32-bit address are reserved for the network ID. This is because the "/29" notation represents the subnet mask, where the number after the slash indicates the number of bits in the network ID. In this case, since it is "/29", it means that the first 29 bits are reserved for the network ID, leaving only 3 bits for the host ID. Therefore, the correct answer is that 29 bits of the 32 bits are reserved for the network ID.

    Rate this question:

  • 7. 

    You have been successfully connecting to the Internet through your network till you installed a firewall. Now although you are unable to connect to your usual website, you are able to ping them using IP address. What's wrong?

    • Your DNS server has crashed.

    • You have inadvertently blocked the DNS server..

    • You firewall is not functioning.

    • Your router is not functioning.

    Correct Answer
    A. You have inadvertently blocked the DNS server..
    Explanation
    The correct answer is that you have inadvertently blocked the DNS server. This means that the firewall you installed is blocking the communication between your computer and the DNS server, preventing your computer from resolving domain names to IP addresses. As a result, you are unable to connect to your usual website by typing in the domain name, but you are still able to ping them using their IP address directly.

    Rate this question:

  • 8. 

    You wish to segregate your sales department logically in terms of the products that they deal with. There are 3 such groups. The data intended for Product 1 must not reach Product 2 and 3 and so on. Which of the following would be an ideal solution for this situation?

    • SNMP

    • VLANs

    • Routing

    • RMON probe

    Correct Answer
    A. VLANs
    Explanation
    VLANs (Virtual Local Area Networks) would be an ideal solution for segregating the sales department logically in terms of the products they deal with. VLANs allow for the creation of separate virtual networks within a physical network, enabling the isolation of traffic between different groups or departments. By assigning each product group to a different VLAN, the data intended for one product group will not reach the other groups, ensuring logical segregation and enhancing network security.

    Rate this question:

  • 9. 

    You have just added a computer to you network. The new computer can connect to the server only if any one of the existing computers gets shutdown. What could the problem be?

    • The DHCP server has run out of IP addresses for the network.

    • This computer uses static IP when the rest take it from DHCP.

    • The computers' NIC is bad.

    • None of the following.

    Correct Answer
    A. The DHCP server has run out of IP addresses for the network.
    Explanation
    The problem could be that the DHCP server has run out of IP addresses for the network. This means that there are no more available IP addresses for the new computer to be assigned when it tries to connect to the server. As a result, the new computer can only connect if one of the existing computers is shut down, freeing up an IP address for it to use.

    Rate this question:

  • 10. 

    In a Windows 2000 network, it is imperative that you must be physically connected to the printer into which you wish to fire a printout. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    In a Windows 2000 network, it is not necessary to be physically connected to the printer in order to print. Windows 2000 supports network printing, which allows users to send print jobs to printers that are connected to the network, regardless of their physical location. Users can connect to network printers using TCP/IP or other network protocols, allowing for printing from any device connected to the network. Therefore, the statement that it is imperative to be physically connected to the printer in order to print in a Windows 2000 network is false.

    Rate this question:

  • 11. 

    You have just performed a backup on one of the most critical servers on your network. This server is accessed most frequently and hosts maximum amount of network data. Which of the following must you do now?

    • Dispatch it immediately to be stored in an offsite location.

    • Keep it onsite for as long as it takes to verify the backup.

    • Store it onsite permanently, incase you may need to restore it in the near future.

    • Verify the backup on a test server immediately and then dispatch the tape to be stored in an offsite location.

    Correct Answer
    A. Verify the backup on a test server immediately and then dispatch the tape to be stored in an offsite location.
    Explanation
    After performing a backup on the critical server, it is important to verify the backup on a test server immediately. This step ensures that the backup was successful and all the necessary data has been properly backed up. Once the backup is verified, the tape should be dispatched to an offsite location for storage. Storing the backup offsite provides an extra layer of protection in case of any onsite disasters or data loss events.

    Rate this question:

  • 12. 

    You have just created an internal network that has address 172.16.0.0/16. Which of the following will be the subnet mask you assign for this network?

    • 255.0.0.0

    • 172.16.0.0

    • 255.0.0.0

    • 255.255.0.0

    • 255.255.255.0

    Correct Answer
    A. 255.255.0.0
    Explanation
    The correct subnet mask to assign for the network with address 172.16.0.0/16 is 255.255.0.0. This is because the /16 subnet mask indicates that the first 16 bits of the IP address are the network portion, and the remaining 16 bits are the host portion. A subnet mask of 255.255.0.0 allows for 16 bits in the network portion, which matches the given network address.

    Rate this question:

  • 13. 

    Identify the command that displays the output shown in the exhibit:

    • Nbtstat

    • Netstat -a

    • Ipconfig /all

    • Network -a

    Correct Answer
    A. Ipconfig /all
    Explanation
    The command "netstat -a" is used to display all active network connections and listening ports on a computer. It provides detailed information about network connections, including protocol, local and foreign addresses, and state. This command aligns with the exhibited output, making it the correct choice.

    Rate this question:

  • 14. 

    UNIX is an open source Operating System. T/F?

    • True

    • False

    Correct Answer
    A. True
    Explanation
    UNIX is indeed an open source operating system. It was developed in the 1960s and 1970s at Bell Labs and has since been widely adopted and modified by various organizations. Being open source means that the source code of UNIX is freely available for anyone to view, modify, and distribute. This has allowed for the development of different versions of UNIX, such as Linux, which is one of the most popular open source operating systems today.

    Rate this question:

  • 15. 

    Which of the following is not a network operating system?

    • Windows NT

    • Windows 2000

    • Windows for Workgroups

    • Linux

    Correct Answer
    A. Windows for Workgroups
    Explanation
    Windows for Workgroups is not a network operating system because it is a version of the Windows operating system that was primarily designed for small peer-to-peer networks and does not have the advanced networking capabilities found in true network operating systems. Windows NT, Windows 2000, and Linux, on the other hand, are all examples of network operating systems that are specifically designed to manage and control network resources and provide advanced networking features.

    Rate this question:

  • 16. 

    You have just connected a brand new dial-up modem that does not require drivers. You have configured the modem and shared it for your Peer-to-Peer network as per the instructions in the manual. Your system just refuses to recognize this PCI modem. What must you do next? Select 2

    • Change the slot.

    • Return the modem.

    • Try restarting your computer.

    • None of the above.

    Correct Answer(s)
    A. Change the slot.
    A. Try restarting your computer.
    Explanation
    If the system refuses to recognize the PCI modem that has been configured and shared for the Peer-to-Peer network, the first step would be to try restarting the computer. This can help refresh the system and potentially resolve any temporary issues that may be causing the recognition problem. If restarting the computer does not work, the next step would be to change the slot where the modem is connected. This can help troubleshoot any potential issues with the current slot and ensure proper recognition of the modem by the system.

    Rate this question:

  • 17. 

    Which of the following devices is required to complete a VLAN set up successfully?

    • Hub

    • Router

    • Modem

    • LAN

    Correct Answer
    A. Router
    Explanation
    A router is required to complete a VLAN (Virtual Local Area Network) set up successfully. A VLAN is a logical network created within a physical network to separate traffic and improve network efficiency. A router is responsible for routing traffic between different VLANs, allowing them to communicate with each other. It helps in directing network traffic based on IP addresses and VLAN tags, ensuring that data is sent to the appropriate VLAN. Therefore, a router is essential for establishing and managing VLANs effectively.

    Rate this question:

  • 18. 

    You have heard that HTTPS is the most secure way to access a web server. You have decided to upgrade your web server's HTTP service to HTTPS. Although your intranet users are still able to access this web server, it is no longer accessible to the rest. You know it is the upgrade that caused this situation. But what of the following could be the specific cause?

    • Your DNS server is down.

    • Your Web server address has changed.

    • Your firewall is blocking HTTP service port .

    • Your firewall is blocking HTTPS service port.

    Correct Answer
    A. Your firewall is blocking HTTPS service port.
    Explanation
    The specific cause for the web server being inaccessible to the rest of the users after upgrading to HTTPS is that the firewall is blocking the HTTPS service port. This means that the firewall is preventing incoming connections to the web server on the HTTPS port, thereby restricting access to it.

    Rate this question:

  • 19. 

    Which of the following media access scheme does the token ring network use?

    • Token passing

    • CSMA/CD.

    • CSMA/CA.

    • None of the above

    Correct Answer
    A. Token passing
    Explanation
    Token passing is the correct answer because the token ring network uses a token passing media access scheme. In this scheme, a token is passed around the network, and only the device holding the token is allowed to transmit data. This ensures that there are no collisions and guarantees fair access to the network for all devices. CSMA/CD and CSMA/CA are different media access schemes used in other types of networks, not in token ring networks.

    Rate this question:

  • 20. 

    Metro is a small company that is using static IP addressing scheme in its network. After a merger with a larger company Cosmo, which uses dynamic IP addressing and DNS for name resolution, the servers of Metro were moved to the server farm of Cosmo and their addressing schemes and resolutions were changed accordingly. After this change in the network structure the servers that were moved to the server farm are no longer reachable. What should you do to correct the problem?

    • Delete the HOSTS file

    • Correct the LMHOSTS file

    • Correct the NETWORKS file

    • Create the static NETSTAT entries

    Correct Answer
    A. Delete the HOSTS file
    Explanation
    Deleting the HOSTS file would be the correct action to take in order to correct the problem. The HOSTS file is a local file on a computer that maps hostnames to IP addresses. By deleting the HOSTS file, the computer will no longer use this file for name resolution and will rely on the dynamic IP addressing and DNS used by the larger company Cosmo. This will allow the servers that were moved to the server farm to be reachable again.

    Rate this question:

  • 21. 

    Which of the following permissions would be appropriate for Unix/Linux file system? (Choose three)

    • Read (r)

    • Write (w)

    • Change (c)

    • Execute (x)

    Correct Answer(s)
    A. Read (r)
    A. Write (w)
    A. Execute (x)
    Explanation
    The appropriate permissions for Unix/Linux file system are Read (r), Write (w), and Execute (x). These permissions allow a user to read the contents of a file, modify the contents of a file, and execute a file as a program, respectively. Change (c) is not a valid permission in Unix/Linux file systems.

    Rate this question:

  • 22. 

    Windows 2000 does not support plug and play devices and so every device will have to be manually configured. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    False. Windows 2000 does support plug and play devices, which means that these devices can be automatically detected and configured by the operating system without the need for manual intervention.

    Rate this question:

  • 23. 

    Kerberos is ideally meant for_____________.

    • Authenticating LAN users

    • Authenticating WAN users

    • Encrypting database

    • Encrypting user names.

    Correct Answer
    A. Authenticating LAN users
    Explanation
    Kerberos is a network authentication protocol that is primarily designed for authenticating LAN users. It provides a secure way for users to prove their identity to network services and ensures that only authorized users can access resources on the network. By using a system of tickets and encryption, Kerberos verifies the identity of users and protects against unauthorized access and tampering of data. Therefore, it is suitable for authenticating LAN users rather than WAN users or encrypting databases or user names.

    Rate this question:

  • 24. 

    Which of the following devices is used to connect multiple computers on a network segment?

    • Hub

    • NIC

    • Router

    • Bridge

    Correct Answer
    A. Hub
    Explanation
    A hub is a device used to connect multiple computers on a network segment. It acts as a central connection point, allowing data to be transmitted between the connected devices. Unlike a router or a bridge, a hub does not analyze or direct the data traffic. Instead, it simply broadcasts the data to all connected devices, which means that all devices on the network segment receive the data.

    Rate this question:

  • 25. 

    Bridges operate at the physical layer. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    False. Bridges operate at the data link layer, which is the second layer in the OSI model. The physical layer is responsible for the transmission of raw data over a physical medium, while the data link layer is responsible for the reliable transmission of data between adjacent nodes on a network. Bridges are used to connect two or more network segments at the data link layer, making them operate at this layer rather than the physical layer.

    Rate this question:

  • 26. 

    If you were asked to subnet a network in such a way as to arrive at 6 network Ids you would need to borrow 2 bits. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    To subnet a network and arrive at 6 network IDs, you would actually need to borrow 3 bits, not 2. Borrowing 2 bits would only allow for a maximum of 4 network IDs (2^2 = 4). Borrowing 3 bits would give you 8 possible network IDs (2^3 = 8), which is more than the required 6. Therefore, the correct answer is False.

    Rate this question:

  • 27. 

    Which of the following commands will help to create a static route from a router Router A to destination network 172.12.0.0?

    • Ip static 172.12.7.0 255.255.0.0 0.0.0.0

    • Ip route 172.12.0.0 255.255.0.0 172.12.8.1

    • Ip static 172.12.7.0 255.255.255.0 any

    • Ip route 172.14.7.0 255.255.0.0 172.14.8.2

    Correct Answer
    A. Ip route 172.12.0.0 255.255.0.0 172.12.8.1
    Explanation
    The correct answer is "ip route 172.12.0.0 255.255.0.0 172.12.8.1". This command will create a static route from Router A to the destination network 172.12.0.0 with a subnet mask of 255.255.0.0 and the next hop IP address of 172.12.8.1. This means that any traffic destined for the 172.12.0.0 network will be forwarded to the next hop IP address specified in the command.

    Rate this question:

  • 28. 

    You are configuring a dial-up connection for your network to connect with a remote server. Which of the following protocols must you configure to secure your authentication in terms of encryption? (Choose two.)

    • SMTP (Simple Mail Transfer Protocol)

    • TFTP (Trivial File Transfer Protocol)

    • PPTP (Point-to-point Tunneling Protocol)

    • TCP/IP (Transmission Control Protocol and Internet Protocol)

    Correct Answer(s)
    A. PPTP (Point-to-point Tunneling Protocol)
    A. TCP/IP (Transmission Control Protocol and Internet Protocol)
  • 29. 

    You are a traveling user who connects to the remote site from your laptop whenever you visit that site. Today when you connect your laptop to the network, you are unable to login. You check your IP configuration and your IP address is 0.0.0.0. What is the likely cause for the problem?

    • The DNS server is down.

    • The DHCP server is not reachable.

    • The NetBIOS over TCP/IP has been disconnected.

    • The workstation has become unplugged from the network.

    Correct Answer
    A. The DHCP server is not reachable.
    Explanation
    The likely cause for the problem is that the DHCP server is not reachable. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. If the DHCP server is not reachable, the laptop is unable to obtain an IP address, resulting in the IP address being displayed as 0.0.0.0.

    Rate this question:

  • 30. 

    After building a small network and connecting it to your ISP you notice that the clients are unable to browse the Internet. You call your ISP and he asks for the information configured on your router. You present the required information to him. He says the information is as it should be. You browse the net from the computer directly connected to your DSL modem and you are able to do so. What could the problem be?

    • Incorrect IP configuration

    • DNS not configured on the workstations

    • DNS server not set on the DHCP server

    • Default gateway not set on the workstations

    Correct Answer
    A. Default gateway not set on the workstations
    Explanation
    The problem could be that the default gateway is not set on the workstations. The default gateway is the IP address of the router that connects the local network to the internet. Without a default gateway, the workstations do not know how to route their network traffic to the internet. This would explain why they are unable to browse the internet even though the router's configuration and the ISP's information are correct.

    Rate this question:

  • 31. 

    Which of the following are some commonalities between Windows NT and Windows 2000?

    • They are both based on NT kernel.

    • They are both meant for Internetworking

    • They both require DNS for basic operation.

    • None of the above.

    Correct Answer
    A. They are both based on NT kernel.
    Explanation
    Both Windows NT and Windows 2000 are based on the NT kernel. This means that they share the same foundational software that manages system resources, such as memory, processes, and input/output. This commonality between the two operating systems suggests that they have similar underlying architectures and capabilities.

    Rate this question:

  • 32. 

    The ADS employs the flat domain structure. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    The given answer is false because the ADS (Active Directory Services) does not employ a flat domain structure. Instead, it uses a hierarchical structure known as a domain tree, where domains are organized in a logical tree-like structure with a single root domain at the top. This allows for better organization, management, and delegation of administrative tasks within the network.

    Rate this question:

  • 33. 

    _________________ is used to propagate VLAN information across a trunked link.

    • Spanning Tree Protocol`

    • Virtual Trunk Protocol`

    • Static VLAN Protocol`

    • None of the above

    Correct Answer
    A. Virtual Trunk Protocol`
    Explanation
    The Virtual Trunk Protocol is used to propagate VLAN information across a trunked link. Trunking is a method of carrying multiple VLANs over a single link between switches. The Virtual Trunk Protocol allows switches to communicate and synchronize VLAN information, ensuring that all switches in the network have the same VLAN configuration. This allows for the efficient and effective distribution of VLAN traffic across the network.

    Rate this question:

  • 34. 

    If you were to identify a NetBIOS name corresponding to an IP address, where would you look for it?

    • Arp cache

    • MAC address table of switch

    • DNS cache

    • NetBIOS name cache

    Correct Answer
    A. NetBIOS name cache
    Explanation
    The NetBIOS name cache is the most likely place to find a NetBIOS name corresponding to an IP address. NetBIOS is an older networking protocol that maps computer names to IP addresses. The NetBIOS name cache stores this mapping information for quick retrieval. The other options, such as the ARP cache, MAC address table of a switch, and DNS cache, are not specifically designed to store NetBIOS name information.

    Rate this question:

  • 35. 

    Linux is a __________ operating system.

    • 32 bit

    • 48 bit

    • 64 bit

    • 128 bit

    Correct Answer
    A. 32 bit
    Explanation
    Linux is a 32-bit operating system because it is designed to work on systems with a 32-bit processor. A 32-bit operating system can handle a maximum of 4GB of RAM and can execute 32-bit software. This means that Linux can efficiently run on older hardware or systems with limited resources.

    Rate this question:

  • 36. 

    You are configuring a small home network. The main system has workgroup name 'elle' and the client has workgroup name 'ELLE' will the connection work?

    • Yes

    • No

    • Maybe

    • None of the above.

    Correct Answer
    A. No
    Explanation
    The connection will not work because workgroup names are case-sensitive. The main system has a workgroup name 'elle' while the client has a workgroup name 'ELLE'. Since the names do not match exactly, the connection will not be established.

    Rate this question:

  • 37. 

    Provide the broadcast address for the following: IP Address: 221.240.224.121 Subnet mask: 255.255.255.248.

    • 221.240.224.127

    • 221.240.224.255

    • 221.240.224.0

    • 221.240.224.126

    Correct Answer
    A. 221.240.224.127
    Explanation
    The given IP address is 221.240.224.121 and the subnet mask is 255.255.255.248. To find the broadcast address, we need to perform a bitwise OR operation between the IP address and the inverted subnet mask. The inverted subnet mask is 0.0.0.7. When we perform the bitwise OR operation, we get 221.240.224.127 as the broadcast address.

    Rate this question:

  • 38. 

    Which of the following is true regarding this representation of IP address?204.202.10.32/29

    • 29 bits of the 32 bits are reserved for host ID.

    • 3 bits of the 32 bits are reserved for the network ID.

    • 29 bits of the 32 bits are reserved for the network ID.

    • None of the above

    Correct Answer
    A. 29 bits of the 32 bits are reserved for the network ID.
    Explanation
    In this representation of the IP address 204.202.10.32/29, the "/29" indicates that the first 29 bits of the 32-bit IP address are reserved for the network ID. This means that only the remaining 3 bits are available for the host ID. Therefore, the correct answer is that 29 bits of the 32 bits are reserved for the network ID.

    Rate this question:

  • 39. 

    Which of the following is the least fault tolerant of all networking topologies?

    • Bus

    • Ring

    • Star

    • Mesh

    Correct Answer
    A. Bus
    Explanation
    A bus topology is the least fault tolerant of all networking topologies because it relies on a single communication line that connects all devices in a linear fashion. If the main communication line breaks or a device fails, the entire network can be disrupted. In contrast, other topologies like ring, star, and mesh have redundant paths or multiple connections, allowing for better fault tolerance as they can continue functioning even if one part of the network fails.

    Rate this question:

  • 40. 

    IPX routing is enabled by default in all Cisco routers. T/F?

    • True

    • False

    Correct Answer
    A. False
    Explanation
    False. IPX routing is not enabled by default in all Cisco routers. IPX (Internetwork Packet Exchange) is a network layer protocol used in Novell NetWare networks. Cisco routers typically have IP (Internet Protocol) routing enabled by default, but not IPX routing.

    Rate this question:

  • 41. 

    Which networking topology is the easiest to reconfigure?

    • Bus

    • Ring

    • Star

    • Mesh

    Correct Answer
    A. Star
    Explanation
    The star topology is the easiest to reconfigure because it uses a central hub or switch to connect all devices in the network. Adding or removing devices only requires making changes at the central hub, without affecting the rest of the network. This makes it a flexible and convenient option for reconfiguration.

    Rate this question:

  • 42. 

    Which of the following is a non-routable protocol?

    • Apple talk

    • TCP/IP

    • IPX/SPX

    • NetBEUI

    Correct Answer
    A. NetBEUI
    Explanation
    NetBEUI is a non-routable protocol because it does not have the capability to be routed across different networks. It is designed for small local area networks (LANs) and cannot be used to communicate between different LANs or over the internet. In contrast, protocols like TCP/IP, IPX/SPX, and AppleTalk are routable protocols that can be used for communication across multiple networks.

    Rate this question:

  • 43. 

    Which of the interfaces on the router would be used by the switch, if the switch needs to connect to the router?

    • Serial Interface

    • Auxiliary port

    • Fast Ethernet

    • Ethernet

    Correct Answer
    A. Fast Ethernet
    Explanation
    The switch would use the Fast Ethernet interface on the router to connect to it. Fast Ethernet is a standard for Ethernet networks that provides higher data transfer speeds compared to regular Ethernet. It is commonly used for connecting local area networks (LANs) and devices that require fast and reliable network connectivity.

    Rate this question:

  • 44. 

    PPTP is a protocol that is ideally meant for _____.

    • Dial-up

    • LAN connections

    • VPNs

    • None of the above.

    Correct Answer
    A. VPNs
    Explanation
    PPTP (Point-to-Point Tunneling Protocol) is a protocol that is ideally meant for VPNs (Virtual Private Networks). PPTP is commonly used to create a secure and encrypted connection between remote users and a private network over the internet. It allows for the secure transmission of data and ensures privacy and confidentiality.

    Rate this question:

  • 45. 

    Your routing network has been experiencing severe congestion lately. You suspect the oldest 2 routers to be causing the problem. How would you verify this?

    • Use tracert

    • Use network analyzer

    • Use ping

    • Use IPConfig

    Correct Answer
    A. Use tracert
    Explanation
    To verify if the oldest 2 routers are causing the congestion, using tracert would be the most appropriate option. Tracert (traceroute) is a network diagnostic tool that traces the route taken by packets across an IP network. By using tracert, you can identify the path and measure the response time of each hop (router) along the way. This will allow you to determine if there are any delays or bottlenecks occurring at the suspected routers, confirming if they are indeed causing the congestion.

    Rate this question:

  • 46. 

    Which of the following connector is used in a 10BASE2 Bus topology?

    • SC

    • ST

    • BNC

    • RJ-11

    • RJ-45

    Correct Answer
    A. BNC
    Explanation
    The correct answer is BNC. BNC connectors are used in a 10BASE2 Bus topology. This type of connector is commonly used in coaxial cables to connect devices in a network. It provides a secure and reliable connection, making it suitable for bus topology where multiple devices are connected to a single cable. BNC connectors are easy to install and remove, making it convenient for troubleshooting and maintenance purposes.

    Rate this question:

  • 47. 

    The SMB (server message block) protocol runs on the Windows server and allows UNIX and Linux servers to see the Windows server as one of the UNIX/LINUX based servers. T/F?

    • True

    • False

    Correct Answer
    A. False
  • 48. 

    Routing Information Protocol (RIP) by default has_____________ number of hops.

    • 15

    • 16

    • 10

    • 12

    Correct Answer
    A. 15
    Explanation
    RIP (Routing Information Protocol) by default has a maximum limit of 15 hops. This means that RIP can only handle routing information for networks that are within 15 hops (or routers) away. If a network is further than 15 hops away, RIP will not be able to route traffic to that network.

    Rate this question:

  • 49. 

    Which of the following can be used to check for the transmission and reception ports on a NIC?

    • Network Analyzer

    • Multimeter

    • Crossover cable

    • Hardware loopback

    Correct Answer
    A. Hardware loopback
    Explanation
    A hardware loopback can be used to check for the transmission and reception ports on a NIC. A hardware loopback is a device that allows signals to be sent from the transmission port of a NIC and looped back to the reception port, effectively testing the functionality of both ports. By using a hardware loopback, one can verify if the NIC is able to transmit and receive data properly, ensuring that the network connection is working correctly.

    Rate this question:

Quiz Review Timeline (Updated): Sep 2, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 02, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 08, 2014
    Quiz Created by
    Catherine Halcomb
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.