Network+ Exam Practice Questions

  1. Which of the following media access methods is utilized in 802.11b wireless networks?

    Answer B is correct. 802.11b-based networks use the Collision Detection Multiple Access/Collision Avoidance (CDMA/CA) media access method.

  2. Which of the following statements associated with bus topology networks are correct? Select two answers.

    Answers B and E are correct. Bus networks use a single cable to connect all computers. A break in cable can bring down the entire network segment.

  3. You have been asked to install a small network consisting of eight computers. Your manager wants the best possible fault tolerance. Which of the following topologies would you choose?

    Answer D is correct. The mesh topology provides the best fault tolerance. Every computer in a mesh network is connected to every other computer, thus providing multiple redundant paths.

  4. Which of the following networks can be easily expanded without interrupting the other network devices and users? Select two answers.

    Answers C and D are correct. Star and mesh networks can be expanded without affecting the current network devices or the users.

  5. Which of the following networks is configured in dual rings to provide fault tolerance?

    Answer C is correct. The Fiber Distributed Data Interface (FDDI) standard-based networks are configured in dual ring topology to provide fault tolerance. If one of the rings fails, the other ring takes over.

  6. Which of the following connectors cannot be attached with a fiber optic cable? Select two answers.

    Answers A and E are correct. The RJ-45 and BNC connectors are used with twisted pair and coaxial cables respectively. They cannot be used with fiber optic cables.

  7. What is the maximum length of a UTP cable segment in a 10BaseT star network?

    Answer A is correct. The maximum length of a UTP cable segment in a 10BaseT star network is 100 meters.

  8. Which if the following terms correctly describes the loss of signal while it travels down a particular medium?

    Answer C is correct. Loss of signal as it travels to larger distances is known as attenuation.

  9. Which of the following affects the performance of an 802.11b network?

    Answer B is correct. 802.11b is a wireless network standard. Wireless signals travel though radio waves, which can be affected by electromagnetic interference (EMI).

  10. Identify the hardware associated with a network wired with coaxial cable. Select two answers.

    Answers A and B are correct. Coaxial cables use BNC connectors and 50-Ohm terminators. The BNC T-connectors are used to attach computers, while the terminators are used at the ends of the cable.

  11. One of the following network devices forwards the data it receives on a port to all other connected ports. Identify the device from the following:

    Answer C is correct. A hub forwards the data it receives on one port to all other connected ports.

  12. Which of the following devices is used in Token Ring networks as the central device?

    Answer D is correct. An MSAU is the central device in Token Ring networks that connects to all devices.

  13. Which of the following statements correctly describes the function of a router? Select two answers.

    Answers B and D are correct. A router is used to segment a large network into smaller segments. It forwards the data based on the IP address of the destination.

  14. Which of the following methods to build and maintain routing tables takes maximum administrative efforts and time in a large network?

    Answer A is correct. Static routing tables are created and maintained manually by administrators. In large networks, it is not possible to use this method because it takes significant administrative time and effort and is prone to typing errors.

  15. Which of the following addresses is an invalid MAC address?

    Answer B is correct. A MAC address can have numbers from 0 through 9, and letters from A to F.

  16. Which of the following protocols uses a MAC address as part of the host address?

    Answer B is correct. The IPX/SPX suite of protocols uses a MAC address as part of the host address.

  17. Which of the following protocols does not depend on addresses or numbers to identify computers on a network?

    Answer A is correct. In older Windows networks, the NetBEUI protocol uses computer names to identify computers. The NetBEUI protocol does not use any addressing scheme for networks or network hosts.

  18. Which of the following are two constituent layers of the Data Link layer in the OSI networking model? Select two answers.

    Answers B and D are correct. The two constituent layers of the Data Link layer are MAC and LLC.

  19. Which of the following protocol suites includes the Routing Table Maintenance Protocol (RTMP)?

    Answer A is correct. The RTMP is included in the AppleTalk protocol suite. It is used to build and maintain routing tables.

  20. At which of the following layers of the OSI network model does a network adapter work?

    Answer B is correct. A network adapter (network interface card) works at the layer 2 (the Data Link layer) of the OSI networking model.

  21. Which of the following is a class C address?

    Answer D is correct. 193.10.160.45 is a class C address. The class C IP address range is from 192 to 223.

  22. One of the network administrators in your company has asked you to block port 23 on the router. Which of the following services is he asking you to block?

    Answer B is correct. TCP/IP port number 23 is used by the Telnet service.

  23. Which of the following is a function of a WINS server? Select two answers.

    Answers C and E are correct. The function of a WINS server is to resolve NetBIOS names to IP addresses. This helps reduce broadcast traffic because network clients send NetBIOS name resolution queries to the WINS server.

  24. Which of the following protocols is used to secure HTTP transactions on the Internet?

    Answer C is correct. The Secure Socket Layer (SSL) protocol is used to secure the HyperText Transfer Protocol (HTTP) transactions on the Internet. The addresses of web sites using the SSL protocol start with https://.

  25. Which of the following statements correctly describes the function of a subnet mask?

    Answer A is correct. The subnet mask enables network devices to identify the network address and the host address from an IP address.

  26. Which of the following protocols can be used to secure remote access connections when they are established through the Internet?

    Answer B is correct. The Point-to-Point Tunneling Protocol (PPTP) is used to establish a secure remote connection though the Internet.

  27. Which of the following is a correct URL of a web site using the SSL protocol?

    Answer D is correct. The URL of a web site using SSL protocol for security starts with https://.

  28. What is the total bandwidth of an ISDN BRI connection when both data channels are used?

    Answer B is correct. The total bandwidth of an ISDN BRI connection is 128 Kbps. Each channel of an ISDN BRI connection provides a bandwidth of 64 Kbps.

  29. You need to allow only secure Internet traffic in and out of your company network. Which of the following ports would you open on the firewall?

    Answer D is correct. Secure Internet sites use the Secure Socket Layer protocol. Since SSL uses port number 443, you will need to open port 443 on the firewall.

  30. Which of the following advantages are associated with using a firewall?

    Answer B is correct. A firewall is used to block undesired external access to internal network resources.

  31. Which of the following is not a benefit of implementing a proxy server for Internet access?

    Answer D is correct. A proxy server does not help resolve external host names internally. External DNS servers must resolve hostnames that are external to the network.

  32. Which of the following backup methods reset the archive bit? Select two answers.

    Answers A and C are correct. The full and incremental backups reset the archive bit after taking the backup. The copy backup and differential backup do not change the archive bit.

  33. You are using five 80 GB hard disks in your file server to configure RAID-5. What will be the maximum capacity of the RAID be after the configuration is complete?

    Answer C is correct. In a RAID-5 configuration, space equal to one full disk is utilized for writing parity information. This means that space equal to four hard disks (320 GB) will actually be available for data storage.

  34. Which of the following terms is associated with a power outage for a long period of time?

    Answer B is correct. If the power remains out for a long period of time, it is known as power blackout.

  35. You have been asked to make a plan to back up all critical servers in the office. Where should you keep the backup tapes after the backup is complete?

    Answer C is correct. Backup tapes should be stored at a secure offsite location to prevent accidental damage. This helps with data recovery in the event of a disaster.

  36. One of the users in your office complains that he is not able to connect to the network or the Internet. Which of the following steps should you take first in order to troubleshoot the connectivity problem?

    Answer A is correct. The first step in troubleshooting a connectivity problem in a TCP/IP host is to ping the loopback address 127.0.0.1.

  37. Which of the following utilities would you use when a Windows XP user is not able to connect using computer names?

    Answer B is correct. The nbtstat utility is used in a Windows network to resolve connectivity problems. nbtstat displays the current NetBIOS over TCP/IP statistics and the currently active connections.

  38. Which of the following utilities is used on a Linux system to verify TCP/IP configuration?

    Answer D is correct. The ifconfig utility is used on Unix and Linux systems to verify the TCP/IP configuration of the local host.

  39. A new network administrator has configured some new wireless clients. None of these clients is able to connect to the network. Other clients already on the same access point do not have any connectivity problem. Which of the following is the possible reason for the problem?

    Answer A is correct. The connectivity problem is most probably caused by incorrect SSID settings on the new wireless clients.

  40. One of the users has reported problems with his desktop. He is somewhat unclear about the problem's symptoms and you need to visit his desk to rectify the problem. What should be your first step to resolve the problem?

    Answer D is correct. The first step to resolve a network problem is to gather as much information as possible from the user.