Basic CompTIA Network+ Practice Test! Trivia Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Kannan23
K
Kannan23
Community Contributor
Quizzes Created: 2 | Total Attempts: 5,906
Questions: 10 | Attempts: 1,824

SettingsSettingsSettings
Network Plus Quizzes & Trivia

This CompTIA Network+ Practice test has been made to check whether you are fully ready for the real test. It will help you know the syllabus and the structure of the CompTIA+ Network test. The questions are related to Networking. Read the questions carefully and answer. Let's begin. All the best!


Questions and Answers
  • 1. 

    Which of the following is an invalid MAC address?

    • A.

      5f-00-AD-2E-E4-34

    • B.

      00-12-ED-AG-K7-0E

    • C.

      00-0C-B8-AC-F3

    • D.

      5A-7D-00-E5-AC-F3

    • E.

      MM:00:48::F5:12349102

    Correct Answer(s)
    B. 00-12-ED-AG-K7-0E
    E. MM:00:48::F5:12349102
  • 2. 

    What of the following is Class C address?

    • A.

      128.10.54.120

    • B.

      92.200.138.24

    • C.

      168.25.10.165

    • D.

      193.10.160.45

    • E.

      192.10.259.45

    Correct Answer
    D. 193.10.160.45
    Explanation
    The given IP address 193.10.160.45 belongs to Class C. Class C addresses have the first three octets (192-223) as the network portion and the last octet as the host portion. In this case, the first three octets (193.10.160) fall within the range of Class C addresses, making it the correct answer.

    Rate this question:

  • 3. 

    What is the correct URL of a website using the SSL protocol?

    • A.

      Http://www.google.com

    • B.

      Https://www.google.com

    • C.

      Httpssl://www.google.com

    • D.

      Httpsocket://www.google.com

    • E.

      Http://www.google.com/ss

    Correct Answer
    B. Https://www.google.com
    Explanation
    The correct URL of a website using the SSL protocol is "https://www.google.com". The "https" protocol indicates that the website is using SSL (Secure Sockets Layer) encryption to establish a secure connection between the web server and the user's browser. This ensures that any data transmitted between the two is encrypted and cannot be intercepted or tampered with by malicious actors. The "www.google.com" portion of the URL specifies the specific website or domain.

    Rate this question:

  • 4. 

    The subnet mask is ..........

    • A.

      It is used to forward data to remove network segments

    • B.

      To block undesired traffic

    • C.

      To enable computers to communicate in different OS

    • D.

      It is used to separate the network the network address from the host address within an IP address

    • E.

      Both A and B

    Correct Answer
    D. It is used to separate the network the network address from the host address within an IP address
    Explanation
    The subnet mask is used to separate the network address from the host address within an IP address. This allows for efficient routing of data by identifying the network segment that the host belongs to. It does not directly forward data or block undesired traffic, but it plays a crucial role in enabling computers to communicate in different operating systems. Therefore, the correct answer is that the subnet mask is used to separate the network address from the host address within an IP address.

    Rate this question:

  • 5. 

    Linux system uses which of the following command to verify TCP/IP configuration.

    • A.

      Ipconfig

    • B.

      Dig

    • C.

      Arp

    • D.

      Rarp

    • E.

      Ifconfig

    Correct Answer
    E. Ifconfig
    Explanation
    The correct answer is ifconfig. Ifconfig is a command-line tool used in Linux systems to verify and configure TCP/IP network interfaces. It displays the current configuration of all active network interfaces, including IP addresses, netmasks, and other relevant information. By using ifconfig, users can easily check and manage their TCP/IP configuration settings in a Linux environment.

    Rate this question:

  • 6. 

    Which of the following uses a MAC address as part of the host address

    • A.

      TCP/IP

    • B.

      IPX/SPX

    • C.

      NetBEUI

    • D.

      Apple talk

    • E.

      Windows talk

    Correct Answer
    B. IPX/SPX
    Explanation
    IPX/SPX is the correct answer because it is a networking protocol that uses a MAC address as part of the host address. MAC addresses are unique identifiers assigned to network devices, and they are used by IPX/SPX to identify and communicate with hosts on a network. TCP/IP, NetBEUI, AppleTalk, and Windows Talk do not use MAC addresses in the same way as IPX/SPX.

    Rate this question:

  • 7. 

    You need to allow only secure Internet traffic in and out of your company network. Which of the following ports would you open on the firewall?

    • A.

      22

    • B.

      87

    • C.

      80

    • D.

      443

    • E.

      344

    Correct Answer
    D. 443
    Explanation
    Port 443 is the correct answer because it is the default port for secure HTTP (HTTPS) traffic. By opening port 443 on the firewall, you would allow secure internet traffic to pass through, ensuring that any data transmitted between your company network and external servers is encrypted and protected. This port is commonly used for secure online transactions, secure web browsing, and other secure internet communication protocols.

    Rate this question:

  • 8. 

    Acronym for RAID

    • A.

      Redundant Array of Independent Disk

    • B.

      Ready Array of Inexpensive Data

    • C.

      Redundant Array of Independent Data

    • D.

      Redundant Area of Independent Disk

    • E.

      None of the above

    Correct Answer
    A. Redundant Array of Independent Disk
    Explanation
    RAID stands for Redundant Array of Independent Disk. This acronym refers to a data storage technology that combines multiple physical disk drives into a single logical unit for improved performance, data redundancy, and/or increased storage capacity. The term "independent" refers to the fact that the drives in a RAID array are separate and can function independently, while "redundant" implies that data is duplicated across multiple drives to ensure data availability in case of a drive failure. The use of RAID can enhance data reliability and system performance in various applications.

    Rate this question:

  • 9. 

    Which of the following is associated with a power outage for a long time?

    • A.

      Sag

    • B.

      Black

    • C.

      Brownout

    • D.

      Blackout

    • E.

      Spike

    Correct Answer
    D. Blackout
    Explanation
    A blackout is associated with a power outage for a long time. During a blackout, there is a complete loss of electrical power in a specific area or even a whole region. This can be caused by various factors such as severe weather conditions, equipment failure, or a deliberate action. Unlike other options such as sag, spike, or brownout, a blackout refers to a total loss of power, resulting in a prolonged period without electricity.

    Rate this question:

  • 10. 

     Windowing is provided at what layer of the OSI reference model?

    • A.

      Data link layer

    • B.

      Network layer

    • C.

       Physical layer

    • D.

      Transport layer

    Correct Answer
    D. Transport layer
    Explanation
    Windowing is a flow control mechanism that allows the sender to transmit a certain number of packets without waiting for an acknowledgment from the receiver. This mechanism is provided at the Transport layer of the OSI reference model. At this layer, the sender and receiver negotiate the size of the window, which determines the number of packets that can be sent before an acknowledgment is required. This helps in optimizing the transmission process and ensuring efficient delivery of data.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 30, 2008
    Quiz Created by
    Kannan23
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.