CompTIA Network+ Certification Exam Practice Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Catherine Halcomb
C
Catherine Halcomb
Community Contributor
Quizzes Created: 1428 | Total Attempts: 5,897,934
Questions: 80 | Attempts: 67,406

SettingsSettingsSettings
CompTIA Network+ Certification Exam Practice Quiz - Quiz

This Network+ test has up to 80 rigorous questions for learners who are preparing for the CompTIA Network+ Certification. Go through this quiz to get a holistic understanding of the Network+ Certification exam. Happy Learning!


Questions and Answers
  • 1. 

    You are connecting a Windows workstation to a NetWare 4.11 server. The workstation is unable to connect to the server, but it is able to connect to the Internet. Which two are possible problems? (Choose two.)

    • A.

      The server is not running NetBEUI

    • B.

      The server is not running AppleTalk

    • C.

      The workstation is not running IPX/SPX

    • D.

      The workstation is not running NetBEUI

    Correct Answer(s)
    A. The server is not running NetBEUI
    C. The workstation is not running IPX/SPX
    Explanation
    The possible problems could be that the server is not running NetBEUI, which is required for the Windows workstation to connect to it. Additionally, the workstation may not be running IPX/SPX, which is the protocol used by NetWare servers for communication.

    Rate this question:

  • 2. 

    Provide the broadcast address for the following: IP Address: 221.240.224.121 Subnet mask: 255.255.255.248.

    • A.

      221.240.224.127

    • B.

      221.240.224.255

    • C.

      221.240.224.0

    • D.

      221.240.224.126

    Correct Answer
    A. 221.240.224.127
    Explanation
    The given IP address is 221.240.224.121 and the subnet mask is 255.255.255.248. To find the broadcast address, we need to perform a bitwise OR operation between the IP address and the inverted subnet mask. The inverted subnet mask is 0.0.0.7. When we perform the bitwise OR operation, we get 221.240.224.127 as the broadcast address.

    Rate this question:

  • 3. 

    Bridges operate at the physical layer. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    False. Bridges operate at the data link layer, which is the second layer in the OSI model. The physical layer is responsible for the transmission of raw data over a physical medium, while the data link layer is responsible for the reliable transmission of data between adjacent nodes on a network. Bridges are used to connect two or more network segments at the data link layer, making them operate at this layer rather than the physical layer.

    Rate this question:

  • 4. 

    After building a small network and connecting it to your ISP you notice that the clients are unable to browse the Internet. You call your ISP and he asks for the information configured on your router. You present the required information to him. He says the information is as it should be. You browse the net from the computer directly connected to your DSL modem and you are able to do so. What could the problem be?

    • A.

      Incorrect IP configuration

    • B.

      DNS not configured on the workstations

    • C.

      DNS server not set on the DHCP server

    • D.

      Default gateway not set on the workstations

    Correct Answer
    D. Default gateway not set on the workstations
    Explanation
    The problem could be that the default gateway is not set on the workstations. The default gateway is the IP address of the router that connects the local network to the internet. Without a default gateway, the workstations do not know how to route their network traffic to the internet. This would explain why they are unable to browse the internet even though the router's configuration and the ISP's information are correct.

    Rate this question:

  • 5. 

    Which of the following are used for increasing fault toleranace? Choose three

    • A.

      Tape backup

    • B.

      Mirrored servers

    • C.

      RAID disk storage

    • D.

      Off-site data archive

    Correct Answer(s)
    A. Tape backup
    B. Mirrored servers
    C. RAID disk storage
    Explanation
    Tape backup, mirrored servers, and RAID disk storage are all used for increasing fault tolerance. Tape backup involves regularly backing up data onto tape cartridges, providing a reliable and easily recoverable copy in case of data loss or system failure. Mirrored servers involve creating an identical copy of a server's data and configuration on another server, allowing for seamless failover in case of server failure. RAID disk storage utilizes multiple hard drives to create redundancy and improve data reliability and availability. Off-site data archive, although mentioned in the options, is not typically used for increasing fault tolerance as it primarily serves as a backup in case of disaster or loss at the primary site.

    Rate this question:

  • 6. 

    You just installed an application onto your Win2k workstation from the network and restarted it. It is no longer able to connect to the network, how will you roll back to the old setup before installing the software?

    • A.

      Uninstall the software

    • B.

      Use safe mode to boot up

    • C.

      Use last known good configuration

    • D.

      None of the above

    Correct Answer
    A. Uninstall the software
    Explanation
    To roll back to the old setup before installing the software, you need to uninstall the software that was just installed. Uninstalling the software will remove any changes it made to the system, including any settings that might be causing the network connection issue. This will allow you to revert back to the previous state of the system where it was able to connect to the network. Using safe mode or last known good configuration might help in some cases, but the most direct and effective solution is to uninstall the software.

    Rate this question:

  • 7. 

    Into which of the following does the ADS store its information? Select all that apply

    • A.

      AD database

    • B.

      AD log files

    • C.

      Shared system volume

    • D.

      None of the above

    Correct Answer(s)
    A. AD database
    B. AD log files
    C. Shared system volume
    Explanation
    The ADS (Active Directory Service) stores its information in the AD database, AD log files, and the shared system volume. The AD database is where all the objects, attributes, and configurations of the Active Directory are stored. The AD log files keep a record of all the changes and events that occur within the Active Directory. The shared system volume is a shared folder on the domain controller that stores system files and scripts used by the Active Directory. Therefore, all the given options are correct.

    Rate this question:

  • 8. 

    The ADS employs the flat domain structure. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given answer is false because the ADS (Active Directory Services) does not employ a flat domain structure. Instead, it uses a hierarchical structure known as a domain tree, where domains are organized in a logical tree-like structure with a single root domain at the top. This allows for better organization, management, and delegation of administrative tasks within the network.

    Rate this question:

  • 9. 

    Which of the following is a non-routable protocol?

    • A.

      Apple talk

    • B.

      TCP/IP

    • C.

      IPX/SPX

    • D.

      NetBEUI

    Correct Answer
    D. NetBEUI
    Explanation
    NetBEUI is a non-routable protocol because it does not have the capability to be routed across different networks. It is designed for small local area networks (LANs) and cannot be used to communicate between different LANs or over the internet. In contrast, protocols like TCP/IP, IPX/SPX, and AppleTalk are routable protocols that can be used for communication across multiple networks.

    Rate this question:

  • 10. 

    Static routing needs manual intervention to configure a routing entry to the destination. T/F ?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Static routing requires manual intervention to configure a routing entry to the destination. This means that network administrators have to manually enter the specific routes into the routing table of each router in the network. This is in contrast to dynamic routing, where routers automatically exchange routing information and update their routing tables based on network changes. Therefore, the statement "Static routing needs manual intervention to configure a routing entry to the destination" is true.

    Rate this question:

  • 11. 

    Which of the following commands will help to create a static route from a router Router A to destination network 172.12.0.0?

    • A.

      Ip static 172.12.7.0 255.255.0.0 0.0.0.0

    • B.

      Ip route 172.12.0.0 255.255.0.0 172.12.8.1

    • C.

      Ip static 172.12.7.0 255.255.255.0 any

    • D.

      Ip route 172.14.7.0 255.255.0.0 172.14.8.2

    Correct Answer
    B. Ip route 172.12.0.0 255.255.0.0 172.12.8.1
    Explanation
    The correct answer is "ip route 172.12.0.0 255.255.0.0 172.12.8.1". This command will create a static route from Router A to the destination network 172.12.0.0 with a subnet mask of 255.255.0.0 and the next hop IP address of 172.12.8.1. This means that any traffic destined for the 172.12.0.0 network will be forwarded to the next hop IP address specified in the command.

    Rate this question:

  • 12. 

    Which networking topology is the easiest to reconfigure?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Mesh

    Correct Answer
    C. Star
    Explanation
    The star topology is the easiest to reconfigure because it uses a central hub or switch to connect all devices in the network. Adding or removing devices only requires making changes at the central hub, without affecting the rest of the network. This makes it a flexible and convenient option for reconfiguration.

    Rate this question:

  • 13. 

    Which of the following devices is required to complete a VLAN set up successfully?

    • A.

      Hub

    • B.

      Router

    • C.

      Modem

    • D.

      LAN

    Correct Answer
    B. Router
    Explanation
    A router is required to complete a VLAN (Virtual Local Area Network) set up successfully. A VLAN is a logical network created within a physical network to separate traffic and improve network efficiency. A router is responsible for routing traffic between different VLANs, allowing them to communicate with each other. It helps in directing network traffic based on IP addresses and VLAN tags, ensuring that data is sent to the appropriate VLAN. Therefore, a router is essential for establishing and managing VLANs effectively.

    Rate this question:

  • 14. 

    Your present network uses HOSTS file for IP to host name resolution. You are planning on adding a DNS server and moving a few servers to a remote site with different IP address. Which of the following will hold true?

    • A.

      Users will be able to connect if a DNS server is added to the affected network segments.

    • B.

      Users will be able to connect if a WINS server is added to the affected network segments.

    • C.

      Users will be able to connect if a DNS server is enabled and the HOSTS file is deleted.

    • D.

      Users will be able to connect if a DNS is enabled on the workstation and the HOSTS file is deleted.

    Correct Answer
    C. Users will be able to connect if a DNS server is enabled and the HOSTS file is deleted.
    Explanation
    If a DNS server is added and the HOSTS file is deleted, users will be able to connect. This is because the HOSTS file is used for IP to host name resolution in the present network. By enabling the DNS server, the network will now use DNS for IP to host name resolution instead. Deleting the HOSTS file ensures that the network does not continue to use it for resolution, allowing the DNS server to handle the task effectively.

    Rate this question:

  • 15. 

    You have just upgraded your Dial-up server on the network. This server was used to share internet connections to the entire network. Users are unable to connect to the Internet now. What could be the likely cause of the problem?

    • A.

      IP address of the Dial-up server might have changed.

    • B.

      The DNS server could have failed to start right services.

    • C.

      You probably needed to ally some patches and fixes after the upgrade, which hasn't been done.

    • D.

      None of the above.

    Correct Answer
    B. The DNS server could have failed to start right services.
    Explanation
    The likely cause of the problem is that the DNS server failed to start the right services. DNS (Domain Name System) is responsible for translating domain names into IP addresses. If the DNS server is not functioning properly, it will prevent users from connecting to the internet as they won't be able to resolve domain names to their corresponding IP addresses. This can happen after an upgrade if the DNS server configuration was not properly updated or if there was an issue with the DNS server software.

    Rate this question:

  • 16. 

    Which of the following directory services can the Active Directory Service be compared with?

    • A.

      Netware Directory Services

    • B.

      File directory services

    • C.

      NT Directory services

    • D.

      None of the above.

    Correct Answer
    A. Netware Directory Services
    Explanation
    The Active Directory Service can be compared with Netware Directory Services because both are directory services that provide a centralized database for managing and organizing resources in a network. They both allow for the creation and management of user accounts, groups, and permissions. Additionally, they both support a hierarchical structure that enables efficient and secure access to network resources.

    Rate this question:

  • 17. 

    Which of the following are required when logging on to a Windows NT Server? (Choose two.)

    • A.

      Password

    • B.

      Username

    • C.

      IP address

    • D.

      MAC address

    Correct Answer(s)
    A. Password
    B. Username
    Explanation
    When logging on to a Windows NT Server, two things are required: a password and a username. The password is necessary to authenticate the user and ensure their identity, while the username is used to identify the specific user account that is being accessed. The IP address and MAC address are not required for logging on to a Windows NT Server as they are related to network connectivity and hardware identification, respectively.

    Rate this question:

  • 18. 

    If you were asked to subnet a network in such a way as to arrive at 6 network Ids you would need to borrow 2 bits. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    To subnet a network and arrive at 6 network IDs, you would actually need to borrow 3 bits, not 2. Borrowing 2 bits would only allow for a maximum of 4 network IDs (2^2 = 4). Borrowing 3 bits would give you 8 possible network IDs (2^3 = 8), which is more than the required 6. Therefore, the correct answer is False.

    Rate this question:

  • 19. 

    The SMB (server message block) protocol runs on the Windows server and allows UNIX and Linux servers to see the Windows server as one of the UNIX/LINUX based servers. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 20. 

    Which of the following file systems are not supported by Windows NT 4.0? Select 2

    • A.

      NTFS 4

    • B.

      NTFS 5

    • C.

      FAT 16

    • D.

      FAT 32

    Correct Answer(s)
    B. NTFS 5
    D. FAT 32
    Explanation
    Windows NT 4.0 does not support NTFS 5 and FAT 32 file systems. NTFS 5 is not supported because it was introduced in Windows 2000, which is a newer version of the operating system. FAT 32 is not supported because it was introduced in Windows 95 OSR2 and Windows 98, which are also newer versions of the operating system. Windows NT 4.0 only supports NTFS 4 and FAT 16 file systems.

    Rate this question:

  • 21. 

    You have introduced a fully configured workstation into your network. Your network is IP based and uses static IP addressing. Everytime the new workstation connects to the network, another existing computer generates an error message and stops connecting. What could the problem be?

    • A.

      DNS servers have not been assigned.

    • B.

      WINS servers have not been assigned.

    • C.

      Duplicate gateways have not been assigned.

    • D.

      Duplicate IP addresses have been assigned.

    Correct Answer
    D. Duplicate IP addresses have been assigned.
    Explanation
    The problem could be that duplicate IP addresses have been assigned. When the new workstation connects to the network, it is using an IP address that is already in use by another computer. This causes a conflict and triggers an error message on the existing computer, which then stops connecting to the network. To resolve this issue, the duplicate IP addresses need to be identified and changed to unique addresses.

    Rate this question:

  • 22. 

    Which of the following allows fault tolerance for user authentication in a Windows 2000 network?

    • A.

      Multi master replication

    • B.

      Bindery replication

    • C.

      Mirror servers

    • D.

      None of the above

    Correct Answer
    A. Multi master replication
    Explanation
    Multi master replication allows fault tolerance for user authentication in a Windows 2000 network. In this system, multiple domain controllers are able to authenticate users and store user account information. If one domain controller fails, another can step in and continue the authentication process. This ensures that user authentication remains available even in the event of a failure, providing fault tolerance for the network.

    Rate this question:

  • 23. 

    Which of the following makes the DNS environment a backbone of the Windows 2000 network?

    • A.

      DHCP

    • B.

      DDNS

    • C.

      ADNS

    • D.

      None of the above.

    Correct Answer
    B. DDNS
    Explanation
    DDNS (Dynamic DNS) makes the DNS environment a backbone of the Windows 2000 network. DDNS allows for automatic updating of DNS records, which is particularly useful in dynamic IP addressing environments. It enables devices with changing IP addresses to be easily and automatically registered and updated in the DNS system. This ensures that the domain names associated with these devices are always up to date and can be resolved correctly, making DDNS an essential component of the Windows 2000 network.

    Rate this question:

  • 24. 

    _________________ is used to propagate VLAN information across a trunked link.

    • A.

      Spanning Tree Protocol`

    • B.

      Virtual Trunk Protocol`

    • C.

      Static VLAN Protocol`

    • D.

      None of the above

    Correct Answer
    B. Virtual Trunk Protocol`
    Explanation
    The Virtual Trunk Protocol is used to propagate VLAN information across a trunked link. Trunking is a method of carrying multiple VLANs over a single link between switches. The Virtual Trunk Protocol allows switches to communicate and synchronize VLAN information, ensuring that all switches in the network have the same VLAN configuration. This allows for the efficient and effective distribution of VLAN traffic across the network.

    Rate this question:

  • 25. 

    Which of the following is not a network operating system?

    • A.

      Windows NT

    • B.

      Windows 2000

    • C.

      Windows for Workgroups

    • D.

      Linux

    Correct Answer
    C. Windows for Workgroups
    Explanation
    Windows for Workgroups is not a network operating system because it is a version of the Windows operating system that was primarily designed for small peer-to-peer networks and does not have the advanced networking capabilities found in true network operating systems. Windows NT, Windows 2000, and Linux, on the other hand, are all examples of network operating systems that are specifically designed to manage and control network resources and provide advanced networking features.

    Rate this question:

  • 26. 

    Which name resolution technique does a UNIX host use?

    • A.

      DNS

    • B.

      DHCP

    • C.

      Proxy

    • D.

      LMHOSTS

    Correct Answer
    A. DNS
    Explanation
    A UNIX host uses the DNS (Domain Name System) name resolution technique. DNS is a system that translates domain names into IP addresses, allowing computers to communicate with each other over the internet. It is responsible for mapping human-readable domain names to their corresponding IP addresses, making it easier for users to access websites and services. DHCP (Dynamic Host Configuration Protocol) is used for assigning IP addresses to devices on a network, Proxy is a server that acts as an intermediary between clients and other servers, and LMHOSTS is a file used by Microsoft Windows for NetBIOS name resolution.

    Rate this question:

  • 27. 

    If you were to identify a NetBIOS name corresponding to an IP address, where would you look for it?

    • A.

      Arp cache

    • B.

      MAC address table of switch

    • C.

      DNS cache

    • D.

      NetBIOS name cache

    Correct Answer
    D. NetBIOS name cache
    Explanation
    The NetBIOS name cache is the most likely place to find a NetBIOS name corresponding to an IP address. NetBIOS is an older networking protocol that maps computer names to IP addresses. The NetBIOS name cache stores this mapping information for quick retrieval. The other options, such as the ARP cache, MAC address table of a switch, and DNS cache, are not specifically designed to store NetBIOS name information.

    Rate this question:

  • 28. 

    You are configuring a dial-up connection for your network to connect with a remote server. Which of the following protocols must you configure to secure your authentication in terms of encryption? (Choose two.)

    • A.

      SMTP (Simple Mail Transfer Protocol)

    • B.

      TFTP (Trivial File Transfer Protocol)

    • C.

      PPTP (Point-to-point Tunneling Protocol)

    • D.

      TCP/IP (Transmission Control Protocol and Internet Protocol)

    Correct Answer(s)
    C. PPTP (Point-to-point Tunneling Protocol)
    D. TCP/IP (Transmission Control Protocol and Internet Protocol)
  • 29. 

    You are a traveling user who connects to the remote site from your laptop whenever you visit that site. Today when you connect your laptop to the network, you are unable to login. You check your IP configuration and your IP address is 0.0.0.0. What is the likely cause for the problem?

    • A.

      The DNS server is down.

    • B.

      The DHCP server is not reachable.

    • C.

      The NetBIOS over TCP/IP has been disconnected.

    • D.

      The workstation has become unplugged from the network.

    Correct Answer
    B. The DHCP server is not reachable.
    Explanation
    The likely cause for the problem is that the DHCP server is not reachable. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. If the DHCP server is not reachable, the laptop is unable to obtain an IP address, resulting in the IP address being displayed as 0.0.0.0.

    Rate this question:

  • 30. 

    Which of the following is an ideal location for storing a tape into which you have just finished backing up?

    • A.

      In the server room

    • B.

      In the Network administrator's desk

    • C.

      In the communication room

    • D.

      In a locked safe at on offsite location

    Correct Answer
    D. In a locked safe at on offsite location
    Explanation
    An ideal location for storing a tape after backing up is in a locked safe at an offsite location. This ensures that the backup data is protected from potential physical damage, theft, or disasters that may occur in the primary location. Storing the tape offsite also provides an additional layer of security in case of any incidents that may affect the primary location, such as fire or flooding. By keeping the tape in a locked safe, access to the data is restricted only to authorized personnel, further enhancing its security.

    Rate this question:

  • 31. 

    In a Windows 2000 network, it is imperative that you must be physically connected to the printer into which you wish to fire a printout. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    In a Windows 2000 network, it is not necessary to be physically connected to the printer in order to print. Windows 2000 supports network printing, which allows users to send print jobs to printers that are connected to the network, regardless of their physical location. Users can connect to network printers using TCP/IP or other network protocols, allowing for printing from any device connected to the network. Therefore, the statement that it is imperative to be physically connected to the printer in order to print in a Windows 2000 network is false.

    Rate this question:

  • 32. 

    Metro is a small company that is using static IP addressing scheme in its network. After a merger with a larger company Cosmo, which uses dynamic IP addressing and DNS for name resolution, the servers of Metro were moved to the server farm of Cosmo and their addressing schemes and resolutions were changed accordingly. After this change in the network structure the servers that were moved to the server farm are no longer reachable. What should you do to correct the problem?

    • A.

      Delete the HOSTS file

    • B.

      Correct the LMHOSTS file

    • C.

      Correct the NETWORKS file

    • D.

      Create the static NETSTAT entries

    Correct Answer
    A. Delete the HOSTS file
    Explanation
    Deleting the HOSTS file would be the correct action to take in order to correct the problem. The HOSTS file is a local file on a computer that maps hostnames to IP addresses. By deleting the HOSTS file, the computer will no longer use this file for name resolution and will rely on the dynamic IP addressing and DNS used by the larger company Cosmo. This will allow the servers that were moved to the server farm to be reachable again.

    Rate this question:

  • 33. 

    On a bus segment, you have introduced a new workstation after which the entire segment collapses. What could be the possible cause/causes for the problem? Select 2

    • A.

      Faulty NIC

    • B.

      Faulty termination

    • C.

      Faulty cabling

    • D.

      Faulty server

    Correct Answer(s)
    A. Faulty NIC
    B. Faulty termination
    Explanation
    The collapse of the entire bus segment after introducing a new workstation suggests that there may be an issue with the network interface card (NIC) in the new workstation. A faulty NIC can cause disruptions in the network communication, leading to the collapse of the segment. Additionally, a faulty termination, such as a loose or improperly connected cable, can also result in network issues and segment collapse. Faulty cabling can further contribute to connectivity problems and segment failure. However, a faulty server alone would not cause the collapse of the entire segment, so it is not a possible cause in this scenario.

    Rate this question:

  • 34. 

    Routing Information Protocol (RIP) by default has_____________ number of hops.

    • A.

      15

    • B.

      16

    • C.

      10

    • D.

      12

    Correct Answer
    A. 15
    Explanation
    RIP (Routing Information Protocol) by default has a maximum limit of 15 hops. This means that RIP can only handle routing information for networks that are within 15 hops (or routers) away. If a network is further than 15 hops away, RIP will not be able to route traffic to that network.

    Rate this question:

  • 35. 

    Which of the following access security does Windows 2000 Server use on LANs?

    • A.

      SSL

    • B.

      L2TP

    • C.

      IPsec

    • D.

      Kerberos

    Correct Answer
    D. Kerberos
    Explanation
    Windows 2000 Server uses Kerberos as the access security on LANs. Kerberos is a network authentication protocol that provides secure communication over a non-secure network. It uses tickets to verify the identity of users and allows them to securely access network resources. Kerberos is widely used in Windows environments as it provides strong authentication and helps prevent unauthorized access to sensitive information.

    Rate this question:

  • 36. 

    Which of the following protocols is supported by Windows 2000 Server for the purpose of dial-up? Choose two

    • A.

      PPP

    • B.

      SLIP

    • C.

      TCP/IP

    • D.

      IPX/SPX

    Correct Answer(s)
    A. PPP
    B. SLIP
    Explanation
    Windows 2000 Server supports the PPP (Point-to-Point Protocol) and SLIP (Serial Line Internet Protocol) protocols for dial-up purposes. PPP is widely used for establishing a connection between a computer and an internet service provider (ISP) over a telephone line. SLIP, on the other hand, is an older protocol that allows data transmission over serial connections, typically used for dial-up connections. TCP/IP and IPX/SPX are network protocols, but they are not specifically designed for dial-up connections.

    Rate this question:

  • 37. 

    Which of the interfaces on the router would be used by the switch, if the switch needs to connect to the router?

    • A.

      Serial Interface

    • B.

      Auxiliary port

    • C.

      Fast Ethernet

    • D.

      Ethernet

    Correct Answer
    C. Fast Ethernet
    Explanation
    The switch would use the Fast Ethernet interface on the router to connect to it. Fast Ethernet is a standard for Ethernet networks that provides higher data transfer speeds compared to regular Ethernet. It is commonly used for connecting local area networks (LANs) and devices that require fast and reliable network connectivity.

    Rate this question:

  • 38. 

    Which of the following are services of a proxy server? (Choose three.)

    • A.

      Cached e-mail

    • B.

      Cached client files

    • C.

      Cached web pages

    • D.

      Cached DNS information

    Correct Answer(s)
    A. Cached e-mail
    B. Cached client files
    C. Cached web pages
    Explanation
    A proxy server is a server that acts as an intermediary between a client device and the internet. It can provide various services, including caching. Cached e-mail refers to storing copies of emails on the proxy server, allowing faster access and reducing the load on the email server. Cached client files involve storing frequently accessed files on the proxy server, improving file retrieval speed. Cached web pages are copies of frequently visited web pages stored on the proxy server, enabling quicker access for users. Therefore, the correct answer includes Cached e-mail, Cached client files, and Cached web pages as services provided by a proxy server.

    Rate this question:

  • 39. 

    Which of the following is the correct connection for cascading MAus?

    • A.

      Connect a single cable to port 1 on each MAU.

    • B.

      Connect the uplink ports to each other on the MAU.

    • C.

      Connect the ring in port to the ring out port on each MAU.

    • D.

      Connect the ring in port to the ring in port and ring out port to ring out port in each MAU.

    Correct Answer
    C. Connect the ring in port to the ring out port on each MAU.
  • 40. 

    Kerberos is ideally meant for_____________.

    • A.

      Authenticating LAN users

    • B.

      Authenticating WAN users

    • C.

      Encrypting database

    • D.

      Encrypting user names.

    Correct Answer
    A. Authenticating LAN users
    Explanation
    Kerberos is a network authentication protocol that is primarily designed for authenticating LAN users. It provides a secure way for users to prove their identity to network services and ensures that only authorized users can access resources on the network. By using a system of tickets and encryption, Kerberos verifies the identity of users and protects against unauthorized access and tampering of data. Therefore, it is suitable for authenticating LAN users rather than WAN users or encrypting databases or user names.

    Rate this question:

  • 41. 

    Which of the following devices is used to connect multiple computers on a network segment?

    • A.

      Hub

    • B.

      NIC

    • C.

      Router

    • D.

      Bridge

    Correct Answer
    A. Hub
    Explanation
    A hub is a device used to connect multiple computers on a network segment. It acts as a central connection point, allowing data to be transmitted between the connected devices. Unlike a router or a bridge, a hub does not analyze or direct the data traffic. Instead, it simply broadcasts the data to all connected devices, which means that all devices on the network segment receive the data.

    Rate this question:

  • 42. 

    Which of the following are some commonalities between Windows NT and Windows 2000?

    • A.

      They are both based on NT kernel.

    • B.

      They are both meant for Internetworking

    • C.

      They both require DNS for basic operation.

    • D.

      None of the above.

    Correct Answer
    A. They are both based on NT kernel.
    Explanation
    Both Windows NT and Windows 2000 are based on the NT kernel. This means that they share the same foundational software that manages system resources, such as memory, processes, and input/output. This commonality between the two operating systems suggests that they have similar underlying architectures and capabilities.

    Rate this question:

  • 43. 

    Which of the following functions is a firewall capable of? Choose two

    • A.

      Block traffic

    • B.

      Permit traffic

    • C.

      Verify company policies

    • D.

      Authenticate internal users

    Correct Answer(s)
    A. Block traffic
    B. Permit traffic
    Explanation
    A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. One of the main functions of a firewall is to block or permit traffic based on these rules. By blocking traffic, the firewall can prevent unauthorized access and potential threats from entering the network. On the other hand, by permitting traffic, the firewall allows legitimate and authorized traffic to pass through. Additionally, firewalls can also verify company policies to ensure compliance and authenticate internal users to control access to the network.

    Rate this question:

  • 44. 

    Which of the following media access scheme does the token ring network use?

    • A.

      Token passing

    • B.

      CSMA/CD.

    • C.

      CSMA/CA.

    • D.

      None of the above

    Correct Answer
    A. Token passing
    Explanation
    Token passing is the correct answer because the token ring network uses a token passing media access scheme. In this scheme, a token is passed around the network, and only the device holding the token is allowed to transmit data. This ensures that there are no collisions and guarantees fair access to the network for all devices. CSMA/CD and CSMA/CA are different media access schemes used in other types of networks, not in token ring networks.

    Rate this question:

  • 45. 

    How many maximum subnet IDs are possible in this situation? Class C network 221.222.162.0 255.255.255.0, subnet by borrowing 5 bits,

    • A.

      30 subnet IDs

    • B.

      20 subnet IDs

    • C.

      22 subnet IDs

    • D.

      32 subnets

    Correct Answer
    A. 30 subnet IDs
    Explanation
    By borrowing 5 bits, we can create 2^5 = 32 subnets. However, since the question asks for the maximum subnet IDs, we need to subtract 2 from the total number of subnets. This is because the first subnet ID (all 0s) is reserved as the network address, and the last subnet ID (all 1s) is reserved as the broadcast address. Therefore, the maximum number of subnet IDs possible in this situation is 32 - 2 = 30 subnet IDs.

    Rate this question:

  • 46. 

    Plug and play technology allows you to add devices to the computer without having to turn it off. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Plug and play technology enables users to connect and use devices with a computer without needing to shut down or restart the system. This feature automatically detects and configures newly connected hardware, facilitating seamless integration and usability without the need for manual intervention or system restarts.

    Rate this question:

  • 47. 

    Which of the following permissions would be appropriate for Unix/Linux file system? (Choose three)

    • A.

      Read (r)

    • B.

      Write (w)

    • C.

      Change (c)

    • D.

      Execute (x)

    Correct Answer(s)
    A. Read (r)
    B. Write (w)
    D. Execute (x)
    Explanation
    The appropriate permissions for Unix/Linux file system are Read (r), Write (w), and Execute (x). These permissions allow a user to read the contents of a file, modify the contents of a file, and execute a file as a program, respectively. Change (c) is not a valid permission in Unix/Linux file systems.

    Rate this question:

  • 48. 

    You have just connected a brand new dial-up modem that does not require drivers. You have configured the modem and shared it for your Peer-to-Peer network as per the instructions in the manual. Your system just refuses to recognize this PCI modem. What must you do next? Select 2

    • A.

      Change the slot.

    • B.

      Return the modem.

    • C.

      Try restarting your computer.

    • D.

      None of the above.

    Correct Answer(s)
    A. Change the slot.
    C. Try restarting your computer.
    Explanation
    If the system refuses to recognize the PCI modem that has been configured and shared for the Peer-to-Peer network, the first step would be to try restarting the computer. This can help refresh the system and potentially resolve any temporary issues that may be causing the recognition problem. If restarting the computer does not work, the next step would be to change the slot where the modem is connected. This can help troubleshoot any potential issues with the current slot and ensure proper recognition of the modem by the system.

    Rate this question:

  • 49. 

    You wish to segregate your sales department logically in terms of the products that they deal with. There are 3 such groups. The data intended for Product 1 must not reach Product 2 and 3 and so on. Which of the following would be an ideal solution for this situation?

    • A.

      SNMP

    • B.

      VLANs

    • C.

      Routing

    • D.

      RMON probe

    Correct Answer
    B. VLANs
    Explanation
    VLANs (Virtual Local Area Networks) would be an ideal solution for segregating the sales department logically in terms of the products they deal with. VLANs allow for the creation of separate virtual networks within a physical network, enabling the isolation of traffic between different groups or departments. By assigning each product group to a different VLAN, the data intended for one product group will not reach the other groups, ensuring logical segregation and enhancing network security.

    Rate this question:

  • 50. 

    Which of the following is true regarding this representation of IP address?204.202.10.32/29

    • A.

      29 bits of the 32 bits are reserved for host ID.

    • B.

      3 bits of the 32 bits are reserved for the network ID.

    • C.

      29 bits of the 32 bits are reserved for the network ID.

    • D.

      None of the above

    Correct Answer
    C. 29 bits of the 32 bits are reserved for the network ID.
    Explanation
    In this representation of the IP address 204.202.10.32/29, the "/29" indicates that the first 29 bits of the 32-bit IP address are reserved for the network ID. This means that only the remaining 3 bits are available for the host ID. Therefore, the correct answer is that 29 bits of the 32 bits are reserved for the network ID.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 25, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 08, 2014
    Quiz Created by
    Catherine Halcomb
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.