Network+ Exam - 191269124248

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Network+ Exam

1. Which of the following provides the media (wired or wireless) to facilitate the
transfer of data?
a) Server
b) LAN
c) Client
d) Router

2. Which device makes traffic-forwarding decisions based on MAC addresses?


a) Hub
b) Router
c) Switch
d) Multiplexer

3. A network formed by interconnecting a PC to a digital camera via a USB cable is


considered what type of network?
a) WAN
b) CAN
c) PAN
d) MAN

4. Which of the following physical LAN topologies requires the most cabling?
a) Bus
b) Ring
c) Star
d) WLAN

5. What type of wireless topology features the use of access points to facilitate
network communications?
a) Ad hoc
b) Mesh
c) Infrastructure
d) Ring
6. What network type would help facilitate communications when large video or
audio files need to be housed and transferred through the network?
a) WLAN
b) CAN
c) PAN
d) SAN

7. Which approach to bandwidth usage consumes all the available frequencies on a


medium to transmit data?
a) Broadband
b) Baseband
c) Time-division multiplexing
d) Simplex

8. Windowing is provided at what layer of the OSI reference model?


a) Data link layer
b) Network layer
c) Transport layer
d) Physical layer

9. Which of the following is a connectionless transport layer protocol?


a) IP
b) TCP
c) UDP
d) H.323

10. What is the range of well-known TCP and UDP ports?


a) Below 2048
b) Below 1024
c) 16,384–32,768
d) Above 8192

11. Which protocol supports a secure connection to a remote host via terminal
emulation software?
a) Telnet
b) SSH
c) FTP
d) SFTP

12. Identify the well-known UDP port number for NTP.


a) 53
b) 69
c) 123
d) 143

13. Which of the following is a VoIP signaling protocol used to set up, maintain, and
tear down VoIP phone calls?
a) MX
b) RJ-45
c) SIP
d) IMAP

14. A router operating at Layer 3 primarily makes its forwarding decisions based on
what address?
a) Destination MAC address
b) Source IP address
c) Source MAC address
d) Destination IP address

15. A router has 12 ports. How many broadcast domains does the router have?
a) None
b) 1
c) 2
d) 12

16. A switch has 12 ports. How many collision domains does the switch have?
a) None
b) 1
c) 2
d) 12
17. What is the first DHCP message sent by a client attempting to obtain IP address
information from a DHCP server?
a) DHCPOFFER
b) DHCPACK
c) DHCPDISCOVER
d) DHCPREQUEST

18. Identify the distance limitation of a 1000BASE-T Ethernet network.


a) 100 m
b) 185 m
c) 500 m
d) 2 km

19. What name is given to a VLAN on an IEEE 802.1Q trunk whose frames are not
tagged?
a) Native VLAN
b) Default VLAN
c) Management VLAN
d) VLAN 0

20. What is the IEEE standard for link aggregation?


a) 802.1Q
b) 802.3ad
c) 802.1d
d) 802.3af

21. What is the maximum amount of power a switch is allowed to provide per port
according to the IEEE 802.3af standard?
a) 7.7W
b) 15.4W
c) 26.4W
d) 32.4W

22. What is the binary representation of the decimal number 117?


a) 10110101
b) 01110101
c) 10110110
d) 01101001

23. The binary number 10110100 has what decimal equivalent?


a) 114
b) 190
c) 172
d) 180

24. What is the class of IP address 10.1.2.3/24?


a) Class A
b) Class B
c) Class C
d) Class D

25. What type of IPv4 address is 239.1.2.3?


a) Unicast
b) Experimental
c) Private use only
d) Multicast

26. How many assignable IP addresses exist in the 172.16.1.10/27 network?


a) 30
b) 32
c) 14
d) 64

27. What protocol is used to request a MAC address that corresponds to a known IPv4
address on the local network?
a) IGMP
b) TTL
c) ICMP
d) ARP

28. What is the network address and subnet mask of a default route?
a) 255.255.255.255/32
b) 0.0.0.0/32
c) 255.255.255.255/0
d) 0.0.0.0/0

29. Which of the following is a distance-vector routing protocol with a maximum


usable hop count of 15?
a) BGP
b) IS-IS
c) RIP
d) OSPF

30. Which IEEE 802.11 variant supports a maximum speed of 54Mbps and uses the
2.4GHz band?
a) 802.11a
b) 802.11b
c) 802.11g
d) 802.11n

31. Which of the following is used by IEEE 802.11n to achieve high throughput using
multiple antennas for transmission and reception?
a) MIMO
b) DSSS
c) FHSS
d) LACP

32. Which of the following Windows commands enables you to display NetBIOS over
TCP/IP information?
a) Route
b) Nbtstat
c) Dig
d) Netstat

33. What protocol is used by the ping command?


a) IGMP
b) PIM
c) ICMP
d) RTP

34. You must send commands to a remote router and you are communicating over an
unsecure channel. What protocol should you use?
a) Telnet
b) FTP
c) HTTP
d) SSH

35. In what type of attack does the attacker compromise multiple systems and then
instruct those compromised systems, called zombies, to simultaneously flood a
target system with traffic?
a) DoS
b) TCP SYN flood
c) Buffer overflow
d) DDoS

36. Which is not a typical best practice found in a password policy?


a) Password expiration
b) Use of uppercase and lowercase letters only
c) Password uniqueness
d) No usage of proper names

37. What Ethernet switch feature allows a port to automatically determine which of its
leads are used for transmitting data and which of its leads are used for receiving
data?
a) MDIX
b) STP
c) LAPD
d) UTP

38. If you successfully ping from host A to host B, what can you conclude about host
A?
a) Its OSI Layers 1–4 are functional.
b) Its OSI Layers 1–3 are functional.
c) Its OSI Layers 1–7 are functional.
d) You can only conclude that ICMP traffic can reach host B.

39. To what subnet does a host with an IP address of 172.16.155.10/18 belong?


a) 172.16.0.0 /18
b) 172.16.96.0 /18
c) 172.16.128.0 /18
d) 172.16.154.0 /18

40. Which of the following is a value measuring the power of a wireless signal?
a) RSSI
b) SSID
c) RFI
d) CSMA/CA

You might also like