0% found this document useful (0 votes)
625 views16 pages

Comp+Network Q

The document provides sample questions that could appear on the Network+ certification exam. It tests knowledge of networking concepts like protocols, IP addressing, hardware components, network topologies and media. Some questions require identifying the best answer from multiple choice options, while others include diagrams to label network elements.

Uploaded by

abcarun
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
625 views16 pages

Comp+Network Q

The document provides sample questions that could appear on the Network+ certification exam. It tests knowledge of networking concepts like protocols, IP addressing, hardware components, network topologies and media. Some questions require identifying the best answer from multiple choice options, while others include diagrams to label network elements.

Uploaded by

abcarun
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Network+ is a certification that measures the technical knowledge of networking professionals.

Earning the Network+ certification means that the candidate possesses the knowledge needed to
configure and operate a variety of networking products.

The Network+ test is available throughout the world in a variety of languages including English,
German, French and Japanese.

Following are some Network+ sample questions:

1. You install File and Printer Sharing for Microsoft Networks.You share a folder and
leave the password option blank.Who can gain access to the folder
A. Anyone who can gain access to your network and has a Microsoft redirector such
as the Client for Microsoft Networks installed.
B. Windows 98 will not allow a blank password in this field.
C. Anyone with Internet Explorer installed.
D. Only users that are members of the same workgroup as you.

Answer: A

2. The figure below shows a typical Home Network Setup.Identify the network
components marked in red.
1. Answer:A: Cable/DSL Modem
B: CAT 5 Ethernet cable
C: Wireless Signal
E: Wirelss Router
2. Some protocols are considered to be technically non-routable.Which of the following
statements best describes the most common reason why a protocol would be
considered non-routable
A. It does not contain the appropriate Data Link layer information required by
routers.
B. It uses advanced Transport layer services to move across the Internet and avoids
the routing overhead required by the more primitive networking protocols.
C. It defines Physical layer network addresses for internal routing.
D. It does not specify the Network layer addresses required by routers.

Answer: D

3. What is the binary network ID of the loopback IP address


A. 1
B. 10101010
C. 0
D. 1111111

Answer: D

4. You are the LAN administrator for your company.You have couple Windows 2000
Professional clients that dial in via PPP to the company network’s RAS server.You
want the remote clients to be assigned dynamic IP addresses.You reserve a pool of
class B addresses for these clients.Upon connecting, you find that the Windows 2000
computers are using a subnet mask of all 255s.What should you do
A. Run ipconfig with the /release and /renew switch on the client
B. Run ipconfig with the /renew_all switch on the client
C. Run winipcfg on the client
D. Do nothing.This is normal

Answer: D

5. You are configuring a router.According to the manual, you will need a transceiver
to connect to the LAN ports of the router.What kind of physical interface does the
router have
A. MSAU
B. RJ-11
C. AUI
D. BNC

Answer: C
6. Which of the following are connectionless protocols.(Choose the three best answers.)
A. IP
B. SPX
C. IPX
D. UDP

Answer: A, C, D

7. How can Jim Herr, a client on an NT TCP/IP network see which remote hosts are
currently connected using NBT
A. Use NBTSTAT
B. Use NETSTAT
C. Use NSLOOKUP
D. Use IPCONFIG

Answer: A

8. You are setting up a new Windows 98 workstation on your network, and your
DHCP server provides all of the normal TCP/IP configuration information.What
must you do to configure the IP address on the workstation after you add the
TCP/IP protocol
A. The DHCP option is enabled automatically, and the server will auto-configure
everything.
B. Find out what the subnet mask on your network is, and add this information only.
C. Manually enter an IP address that is not in use on the network.
D. Put the address of the router in the default gateway, and put all 0s in the IP field.

Answer: A

9. Which of the following is considered a Network Attached Storage device


A. A 60 GB DAT tape drive attached to the Network Server
B. A file server with special software that is at a separate location from the
departmental file server
C. In a Windows NT environment, it would be the Backup Domain Controller
D. A high speed specialized sub-network attached to the enterprise

Answer: B

1. Credit card size, designed for notebooks, self-configuring, and non-OS dependent
describes which PC bus architecture
A. PCI
B. ISA
C. EISA
D. PCMCIA

Answer: D
2. What protocol is used between E-Mail servers
A. HTTP
B. POP3
C. SNMP
D. SMTP

Answer: D

3. When installing a manually configured adapter, what information must you know
to avoid resource conflicts
A. IRQ
B. Number of bits
C. Base I/O port address
D. Base Memory address

Answer: A, C & D

4. Which of the following OSI layers is responsible for identifying communications


partners
A. Application
B. Session
C. Network
D. Presentation

Answer: A

5. A broadcast message is an example of which dialog control method


A. Half duplex
B. Baseband
C. Broadband
D. Simplex

Answer: D

6. Which of the following are used to resolve Windows NetBIOS names to IP addresses
A. DNS
B. WINS
C. LMhosts file
D. Hosts file

Answer: B,C

7. What is a router
A. A hardware device that connects dissimilar networks, such as Cat 5 cabling and
FDDI
B. A network host that reads the source and destination addresses in the packet
header and makes decisions about where to forward the packet
C. A network host that can forward LAN-based email messages onto the Internet,
after repackaging them into the SMTP format
D. A software system that can translate between dissimilar networks such as Ethernet
and Token Ring

Answer: B

8. Which of the following is Class C IP address?


A. 10.10.14.118
B. 135.23.112.57
C. 191.200.199.199
D. 204.67.118.54

Answer: D

9. A Windows 95 user complains that she cannot connect to any other computers on
her local subnet even when using the IP address to communicate.However, she can
ping 127.0.0.1 and receive a reply.Other users on her subnet do not report having
any trouble.All client computers on the network are WINS-enabled.What is the
most probable cause of the problem?
A. The TCP/IP stack is not installed properly
B. The subnet mask is not correct, check whether the subnet mask is configured
correctly.
C. The default gateway is not configured properly.
D. The computer is not configured to use LMHOSTS

Answer: B

10. WINS or ___ may be used for NetBIOS name resolution?


A. HOSTS
B. DNS
C. LMHOSTS

Answer: C

1. You have set up a server that connects to an Internet services provider ( ISP) over
ISDN line.How should the default gateway address be configured so that windows
95 users on the local network can access the Internet through the RAS server.The
RAS server is located on the same subnet as that of the WIN95 machines.
A. The default Gateway address on WINS95 must specify the IP address of the
remote ISP
B. The default Gateway on WN95 must specify the IP address of the RAS server on
the local network.
C. The HOSTS file in WIN95 machines must be configured with the host name of
the RAS Server.
D. The HOSTS file in WIN 95 machines must be configured with the host name of
the ISP

Answer: B

2. Which of the following is the standard adopted for Ethernet CSMA/CD by IEEE
Committee?
A. 802.2
B. 802.1d
C. 802.3
D. 802.5

Answer: C

3. Disk Striping with Parity corresponds to which RAID level?


A. RAID 0
B. RAID 1
C. RAID 3
D. RAID 5

Answer: D.

4. Which of the following media types is most susceptible to EMI?


A. Fiber Optic
B. STP
C. Co-axial
D. UTP

Answer: D

5. Which type of connector does a 10BaseT Ethernet cable use?


A. BNC
B. RJ-45
C. RJ-11
D. MSAU

Answer: B

6. Which of the following is suitable for mission critical and time sensitive
applications?
A. 10BaseT
B. 10Base2
C. Token Ring
D. Mesh
Answer: C

7. What is the default subnet mask for Class C network?


A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.0.255.0

Answer: C

8. Which of the following network topologies have each computer connected to a


central point?
A. Bus
B. Ring
C. Star
D. Mesh

Answer: C

9. Which of the following network topologies is the most fault tolerant?


A. Bus
B. Mesh
C. Star
D. Ring

Answer: B

10. A Bus network topology is best described as which of the following?


A. All computers are attached to a single cable in a chain style
B. All computers are connected to a central point
C. All computers are connected to every other computer or resource in the network
D. Fault Tolerant

Answer: A

1. A Ring network topology provides two links from each computer.A link in and a
link out.
A. True
B. False

Answer:A

2. Which connector is often used with Thinnet cable?


A. RJ-11
B. AUI
C. DIX
D. BNC

Answer:D

3. Which of the following media connectors are used in conjunction with telephones?
A. RJ-45
B. RJ-11
C. RJ-T
D. None of the above are correct

Answer:B

4. 10BaseT Ethernet networks, most commonly use which of the following types of
cable?
A. Fiber
B. Coax
C. STP
D. UTP

Answer:D

5. A Gateway is able to connect network environments that are dissimilar.


A. True
B. False

Answer:A

6. AUI connectors are commonly associated with which of the following items?
A. A Vampire Tap
B. Fiber Optic Cable
C. 10Base2
D. Wireless Networks

Answer:A

7. A hub works in conjunction with which of the following network topologies?


A. Ring
B. Star
C. Bus
D. Mesh

Answer:B

8. Which of the following is a correct MAC address?


A. 190.168.80.1
B. www.certyourself.com
C. 08:34:FE:4C:F2:54
D. G2:G3:23:87:GG

Answer:C

9. A Hub operates at which of the following layers of the OSI model?


A. Physical
B. Session
C. Transport
D. Application

Answer:A

10. Which of the following devices operate at the Data Link layer of the OSI model?
A. A Hub
B. A NIC
C. A Switch
D. A Router

Answer:C

1. A Router operates in which layer of the OSI model?


A. The Physical Layer
B. The Data Link Layer
C. The Transport Layer
D. The Network Layer

Answer:D

2. A Network Interface Card operates at the Network Layer of the OSI model.
A. True
B. False

Answer:B

3. Which of the following is the correct order of the OSI model from bottom to top?
A. Application, Presentation, Session, Transport, Network, Data Link, Physical
B. Physical, Network, Data Link, Session, Transport, Application, Presentation
C. Physical, Data Link, Network, Transport, Session, Presentation, Application
D. Application, Session, Presentation, Transport, Network, Data Link, Physical

Answer:C

4. What is the maximum speed of 10Base5 Ethernet cable?


A. 100 Mbps
B. 500 Mbps
C. 50 Mbps
D. 10 Mbps

Answer:D

5. 100Base-FX uses which of the following types of cable?


A. Fiber Optic
B. Unshielded Twisted Pair
C. Coax
D. Shielded Twisted Pair

Answer:A

6. Which of the following TCP/IP protocols is used to communicate between a Web


Browser and a Web Server?
A. SMTP
B. HTTP
C. UDP
D. POP3

Answer:B

7. Which of the following layers of the OSI model does a Bridge operate in?
A. The Data Link Layer
B. The Network Layer
C. The Transport Layer
D. The Session Layer

Answer:A

8. While reviewing the security logs for your server, you notice that a user on the
Internet has attempted to access your internal mail server.Although it appears that
the user’s attempts were unsuccessful, you are still very concerned about the
possibility that your systems may be compromised.Which of the following solutions
are you most likely to implement?
A. A firewall system at the connection point to the Internet
B. A more secure password policy
C. File-level encryption
D. Kerberos authentication

Answer: A

9. A server has two NIC cards installed.The first one uses IRQ 10 and I/O range of
B800-B81F.The second uses IRQ 10 and I/O range of D700-D80A.What action, if
any, should be taken?
A. No action is required.
B. Locate any available IRQ to resolve the IRQ conflict.
C. Locate any available I/O range to resolve the I/O conflict.
D. Change the I/O of the second NIC to B800-B81F.

Answer: B

10. Which of the following IEEE 802 standards pertain to token ring?
A. IEEE 802.5
B. IEEE 802.3
C. IEEE 802.2
D. IEEE 802.11

Answer: A

1. Protocol that is often used to facilitate communications with an IBM mainframe?


A. NetBEUI
B. RIP
C. DLC

Answer: C

2. Which of these protocols provide fast connectionless communications that relies on


upper layers of the OSI model for error correction?
A. TCP (Transmission Control Protocol)
B. UDP (User Datagram Protocol)
C. SPX

Answer: B

3. Can be used to reduce traffic bottlenecks in a NetBEUI network?


A. bridge
B. router
C. gateway

Answer: A

4. You have just finished the installation of two computers on a 28 computer network
using Novell’s IPX/SPX.Both computers initialize with no error messages yet they
cannot contact other computers on the network.All other computers are functioning
normally.You probably have an ___?
A. incorrect IRQ
B. incorrect frame type
C. invalid IP setting

Answer: B
5. Uses amplifiers to regenerate analog signals?
A. baseband
B. broadband
C. fiber-optic

Answer: B

6. Uses single frequency digital signals?


A. baseband
B. broadband
C. multiband

Answer: A

7. You are hired to investigate a slow performing network server for a client.Using the
performance monitor you obtain the following readings: CPU usage= 25%, Disk
time= 25%, Page faults/sec= 25.What one change will increase the performance of
this network server the most?
A. buy another CPU
B. add another hard drive
C. increase RAM

Answer: C

8. Which of the following should you check if you can connect using the IP address but
NOT with the host name?
A. DNS
B. WINS
C. DHCP

Answer: A

9. The fastest method of transporting data with a switch?


A. store and forward
B. cut through
C. loop back

Answer: B

10. Although NOT fault tolerant this RAID level is often used when one wants the
highest level of performance?
A. RAID 0
B. RAID 1
C. RAID 5

Answer: A
1. Four _____ are used in the 5-4-3 rule of 10Base2 networking?
A. repeaters
B. segments
C. routers

Answer: A

2. You have just finished installing an Ethernet PCI NIC (network interface card) in a
client’s computer.The computer initializes successfully and has no apparent
hardware problems.The computer however is not able to communicate with other
computers on this NetBEUI network.All other client computers are able to
communicate.What is the most likely cause of this problem?
A. IRQ conflict
B. incorrect transceiver setting
C. incorrect frame type

Answer: B

3. The two key components of a digital signature include the secure hash algorithm
and a ___ ?
A. blowfish value
B. certificate authority
C. IPSec

Answer: B

4. The Microsoft version of Novell’s IPX/SPX protocol?


A. ODI
B. NWLink
C. DLC

Answer: B

5. Utility used to run applications on a computer at a remote location?


A. ODI
B. Telnet
C. ARP (Address Resolution Protocol)

Answer: B

6. Topology that offers the highest level of redundancy, is easy to troubleshoot but is
expensive to install.It is the topology of the internet?
A. star
B. ring
C. mesh
Answer: C

7. Ordinary telephone wire has a thickness of AWG 22.Of the following which is the
thickest wire?
A. AWG 14
B. AWG 28
C. AWG 32

Answer: A

8. Backup method which clears the archive bit and is the shortest to perform but takes
the longest to restore?
A. full
B. incremental
C. differential

Answer: B

9. Which of the following protocols map a logical address to a MAC (Media Access
Control) address?
A. DNS
B. WINS
C. ARP

Answer: C

10. The major limiting factor for how long a cable can be in a segment is ___?
A. collisions
B. EMI
C. attenuation

Answer: C

1. Backing up the system state in Win 2000 Prof will backup the ___?
A. registry
B. boot files
C. all of the above

Answer: C

2. Equipment that is designed to help identify breaks and shorts in cables?


A. TDR
B. performance monitor
C. SNMP

Answer: A
3. Which company developed the Unix Operating System?
A. Sun
B. Microsoft
C. ATT

Answer: C

4. To start a Win 2000 Prof computer in the safe mode press ___ at startup?
A. F8
B. Ctl and Esc
C. F1

Answer: A

5. A bridge filters traffic using which type of address?


A. IP address
B. MAC address
C. TCP address

Answer: B

6. A large network with 500 users notice that at specific times in the morning and
afternoon network congestion ties up their computers.What is the most likely cause?
A. power fluctuations
B. a terminator is not grounded
C. many users are logging on or off

Answer: C

7. A ___ is created when a unique IP address and port number are used to connect two
computers?
A. SAP
B. media transfer coefficient
C. socket

Answer: C

8. During disaster recovery of a Win 2000 Prof computer if you “Enable Boot
Logging” the file ___ is saved to the C:\winnt folder for analysis?
A. setuplog.txt
B. bootlog.txt ntbtlog.txt

Answer: C

9. Which of these WAN (Wide Area Network) protocols is the fastest?


A. Frame Relay
B. ATM
C. X.25

Answer: B

10. The only files on a Win 2000 Prof Emergency Repair Disk (ERD) are autoexec.nt,
config.nt, and setup.log?
A. True
B. False

Answer: A

You might also like