Network+ Exam - 191269124248
Network+ Exam - 191269124248
Network+ Exam - 191269124248
1. Which of the following provides the media (wired or wireless) to facilitate the
transfer of data?
a) Server
b) LAN
c) Client
d) Router
4. Which of the following physical LAN topologies requires the most cabling?
a) Bus
b) Ring
c) Star
d) WLAN
5. What type of wireless topology features the use of access points to facilitate
network communications?
a) Ad hoc
b) Mesh
c) Infrastructure
d) Ring
6. What network type would help facilitate communications when large video or
audio files need to be housed and transferred through the network?
a) WLAN
b) CAN
c) PAN
d) SAN
11. Which protocol supports a secure connection to a remote host via terminal
emulation software?
a) Telnet
b) SSH
c) FTP
d) SFTP
13. Which of the following is a VoIP signaling protocol used to set up, maintain, and
tear down VoIP phone calls?
a) MX
b) RJ-45
c) SIP
d) IMAP
14. A router operating at Layer 3 primarily makes its forwarding decisions based on
what address?
a) Destination MAC address
b) Source IP address
c) Source MAC address
d) Destination IP address
15. A router has 12 ports. How many broadcast domains does the router have?
a) None
b) 1
c) 2
d) 12
16. A switch has 12 ports. How many collision domains does the switch have?
a) None
b) 1
c) 2
d) 12
17. What is the first DHCP message sent by a client attempting to obtain IP address
information from a DHCP server?
a) DHCPOFFER
b) DHCPACK
c) DHCPDISCOVER
d) DHCPREQUEST
19. What name is given to a VLAN on an IEEE 802.1Q trunk whose frames are not
tagged?
a) Native VLAN
b) Default VLAN
c) Management VLAN
d) VLAN 0
21. What is the maximum amount of power a switch is allowed to provide per port
according to the IEEE 802.3af standard?
a) 7.7W
b) 15.4W
c) 26.4W
d) 32.4W
27. What protocol is used to request a MAC address that corresponds to a known IPv4
address on the local network?
a) IGMP
b) TTL
c) ICMP
d) ARP
28. What is the network address and subnet mask of a default route?
a) 255.255.255.255/32
b) 0.0.0.0/32
c) 255.255.255.255/0
d) 0.0.0.0/0
30. Which IEEE 802.11 variant supports a maximum speed of 54Mbps and uses the
2.4GHz band?
a) 802.11a
b) 802.11b
c) 802.11g
d) 802.11n
31. Which of the following is used by IEEE 802.11n to achieve high throughput using
multiple antennas for transmission and reception?
a) MIMO
b) DSSS
c) FHSS
d) LACP
32. Which of the following Windows commands enables you to display NetBIOS over
TCP/IP information?
a) Route
b) Nbtstat
c) Dig
d) Netstat
34. You must send commands to a remote router and you are communicating over an
unsecure channel. What protocol should you use?
a) Telnet
b) FTP
c) HTTP
d) SSH
35. In what type of attack does the attacker compromise multiple systems and then
instruct those compromised systems, called zombies, to simultaneously flood a
target system with traffic?
a) DoS
b) TCP SYN flood
c) Buffer overflow
d) DDoS
37. What Ethernet switch feature allows a port to automatically determine which of its
leads are used for transmitting data and which of its leads are used for receiving
data?
a) MDIX
b) STP
c) LAPD
d) UTP
38. If you successfully ping from host A to host B, what can you conclude about host
A?
a) Its OSI Layers 1–4 are functional.
b) Its OSI Layers 1–3 are functional.
c) Its OSI Layers 1–7 are functional.
d) You can only conclude that ICMP traffic can reach host B.
40. Which of the following is a value measuring the power of a wireless signal?
a) RSSI
b) SSID
c) RFI
d) CSMA/CA