https://www.youtube.com/channel/UCQECTKWf3phX5McZIyPM0Mw/videos
Following are some Network+ sample questions:
Following are some Network+ sample questions:
- You install File and Printer
Sharing for Microsoft Networks.You share a folder and leave the password option blank.Who can
gain access to the folder
- Anyone who can
gain access to your network and has a Microsoft redirector such as the
Client for Microsoft Networks installed.
- Windows 98 will
not allow a blank password in this field.
- Anyone with
Internet Explorer installed.
- Only users that
are members of the same workgroup as you.
Answer: A
- The figure below
shows a typical Home Network Setup.Identify the network components marked
in red.
Answer:
A: Cable/DSL
Modem
B: CAT 5 Ethernet cable
C: Wireless Signal
E: Wirelss Router
B: CAT 5 Ethernet cable
C: Wireless Signal
E: Wirelss Router
- Some protocols
are considered to be technically non-routable.Which of the following
statements best describes the most common reason why a protocol would be
considered non-routable
- It does not
contain the appropriate Data Link layer
information required by routers.
- It uses
advanced Transport layer services to move across the Internet and avoids
the routing overhead required by the more primitive networking protocols.
- It defines
Physical layer network addresses for internal routing.
- It does not
specify the Network layer addresses required by routers.
Answer: D
- What is the
binary network ID of the loopback IP address
- 1
- 10101010
- 0
- 1111111
Answer: D
- You are the LAN
administrator for your company.You have couple Windows 2000 Professional
clients that dial in via PPP to the company network’s RAS server.You want
the remote clients to be assigned dynamic IP addresses.You reserve a pool
of class B addresses for these clients.Upon connecting, you find that the
Windows 2000 computers are using a subnet mask of all 255s.What should you
do
- Run ipconfig
with the /release and /renew switch on the client
- Run ipconfig
with the /renew_all switch on the client
- Run winipcfg on
the client
- Do nothing.This
is normal
Answer: D
- You are
configuring a router.According to the manual, you will need a transceiver
to connect to the LAN ports of the router.What kind of physical interface
does the router have
- MSAU
- RJ-11
- AUI
- BNC
Answer: C
- Which of the
following are connectionless protocols.(Choose the three best answers.)
- IP
- SPX
- IPX
- UDP
Answer: A, C, D
- How can Jim
Herr, a client on an NT TCP/IP network see which remote hosts are
currently connected using NBT
- Use NBTSTAT
- Use NETSTAT
- Use NSLOOKUP
- Use IPCONFIG
Answer: A
- You are setting
up a new Windows 98 workstation
on your network, and your DHCP server provides all of the normal TCP/IP
configuration information.What must you do to configure the IP address on
the workstation after you add the TCP/IP protocol
- The DHCP option is enabled
automatically, and the server will auto-configure everything.
- Find out what
the subnet mask on your network is, and add this information only.
- Manually enter
an IP address that is not in use on the network.
- Put the address
of the router in the default gateway, and put all 0s in the IP field.
Answer: A
- Which of the
following is considered a Network Attached Storage device
- A 60 GB DAT
tape drive attached to the Network Server
- A file server
with special software that is at a
separate location from the departmental file server
- In a Windows NT
environment, it would be the Backup Domain Controller
- A high speed
specialized sub-network attached to the enterprise
Answer: B
11. Credit card size, designed for notebooks, self-configuring, and
non-OS dependent describes which PC bus architecture.
- PCI
- ISA
- EISA
- PCMCIA
Answer: D
- What protocol is
used between E-Mail servers
- HTTP
- POP3
- SNMP
- SMTP
Answer: D
- When installing a manually
configured adapter, what information must you know to avoid resource
conflicts
- IRQ
- Number of bits
- Base I/O port
address
- Base Memory
address
Answer: A, C & D
- Which of the
following OSI layers is responsible for identifying communications
partners
- Application
- Session
- Network
- Presentation
Answer: A
- A broadcast message is an
example of which dialog control method
- Half duplex
- Baseband
- Broadband
- Simplex
Answer: D
- Which of the
following are used to resolve Windows NetBIOS names to IP addresses
- DNS
- WINS
- LMhosts file
- Hosts file
Answer: B,C
- What is a router
- A hardware
device that connects dissimilar networks, such as Cat
5 cabling and
FDDI
- A network
host that
reads the source and destination addresses in the packet header and makes
decisions about where to forward the packet
- A network host that can
forward LAN-based email messages onto the Internet, after repackaging
them into the SMTP format
- A software system that can
translate between dissimilar networks such as Ethernet and Token Ring
Answer: B
- Which of the
following is Class C IP address?
- 10.10.14.118
- 135.23.112.57
- 191.200.199.199
- 204.67.118.54
Answer: D
- A Windows 95
user complains that she cannot connect to any other computers on her local
subnet even when using the IP address to communicate.However, she can ping
127.0.0.1 and receive a reply.Other users on her subnet do not report
having any trouble.All client computers on the network are WINS-enabled.What
is the most probable cause of the problem?
- The TCP/IP
stack is not installed properly
- The subnet mask
is not correct, check whether the subnet mask is configured correctly.
- The default
gateway is not configured properly.
- The computer is
not configured to use LMHOSTS
Answer: B
- WINS or ___ may
be used for NetBIOS name resolution?
- HOSTS
- DNS
- LMHOSTS
Answer: C
- You have set up
a server that connects to an Internet
services provider ( ISP) over ISDNline.How should
the default gateway address be configured so that windows 95 users on the
local network can access the Internet through the RAS server.The RAS server is located on
the same subnet as that of the WIN95 machines.
- The default
Gateway address on WINS95 must specify the IP address of the remote ISP
- The default
Gateway on WN95 must specify the IP address of the RAS server on the local
network.
- The HOSTS file
in WIN95 machines must be configured with the host name of the RAS Server.
- The HOSTS file
in WIN 95 machines must be configured with the host name of the ISP
Answer: B
- Which of the
following is the standard adopted for Ethernet CSMA/CD by IEEE Committee?
- 802.2
- 802.1d
- 802.3
- 802.5
Answer: C
- Disk Striping
with Parity corresponds to which RAID level?
- RAID 0
- RAID 1
- RAID 3
- RAID 5
Answer: D.
- Which of the
following media types is most susceptible to EMI?
- Fiber Optic
- STP
- Co-axial
- UTP
Answer: D
- Which type of
connector does a 10BaseT Ethernet cable use?
- BNC
- RJ-45
- RJ-11
- MSAU
Answer: B
- Which of the
following is suitable for mission critical and time sensitive
applications?
- 10BaseT
- 10Base2
- Token Ring
- Mesh
Answer: C
- What is the
default subnet mask for Class C network?
- 255.0.0.0
- 255.255.0.0
- 255.255.255.0
- 255.0.255.0
Answer: C
- Which of the
following network topologies have each computer connected to a central
point?
- Bus
- Ring
- Star
- Mesh
Answer: C
- Which of the
following network topologies is the most fault tolerant?
- Bus
- Mesh
- Star
- Ring
Answer: B
- A Bus network topology
is best described as which of the following?
- All computers
are attached to a single cable in a chain style
- All computers
are connected to a central point
- All computers
are connected to every other computer or resource in the network
- Fault Tolerant
Answer: A
- Which connector
is often used with Thinnet cable?
- RJ-11
- AUI
- DIX
- BNC
Answer:D
- Which of the
following media connectors are used in conjunction with telephones?
- RJ-45
- RJ-11
- RJ-T
- None of the
above are correct
Answer:B
- 10BaseT Ethernet
networks, most commonly use which of the following types of cable?
- Fiber
- Coax
- STP
- UTP
Answer:D
- A Gateway is
able to connect network
environments that are dissimilar.
- True
- False
Answer:A
- AUI connectors
are commonly associated with which of the following items?
- A Vampire Tap
- Fiber
Optic Cable
- 10Base2
- Wireless
Networks
Answer:A
- A hub works in
conjunction with which of the following network topologies?
- Ring
- Star
- Bus
- Mesh
Answer:B
- Which of the
following is a correct MAC
address?
- 190.168.80.1
- www.certyourself.com
- 08:34:FE:4C:F2:54
- G2:G3:23:87:GG
Answer:C
- A Hub operates
at which of the following layers of the OSI model?
- Physical
- Session
- Transport
- Application
Answer:A
- Which of the
following devices operate at the Data Link layer of the OSI
model?
- A Hub
- A NIC
- A Switch
- A Router
Answer:C
- A Router
operates in which layer of the OSI model?
- The Physical
Layer
- The Data
Link Layer
- The Transport
Layer
- The Network
Layer
Answer:D
- A Network
Interface Card operates at the Network Layer of
the OSI model.
- True
- False
Answer:B
- Which of the
following is the correct order of the OSI model from bottom to top?
- Application, Presentation,
Session, Transport, Network, Data Link,
Physical
- Physical,
Network, Data Link,
Session, Transport, Application,
Presentation
- Physical, Data Link,
Network, Transport, Session, Presentation, Application
- Application,
Session, Presentation, Transport, Network, Data Link,
Physical
Answer:C
- What is the
maximum speed of 10Base5 Ethernet cable?
- 100 Mbps
- 500 Mbps
- 50 Mbps
- 10 Mbps
Answer:D
- 100Base-FX uses
which of the following types of cable?
- Fiber Optic
- Unshielded
Twisted Pair
- Coax
- Shielded
Twisted Pair
Answer:A
- Which of the
following TCP/IP protocols is used to communicate between a Web Browser
and a Web Server?
- SMTP
- HTTP
- UDP
- POP3
Answer:B
- Which of the
following layers of the OSI model does a Bridge operate in?
- The Data Link Layer
- The Network
Layer
- The Transport
Layer
- The Session
Layer
Answer:A
- While reviewing
the security logs for your server, you
notice that a user on the Internet has attempted to access your internal mail
server.Although
it appears that the user's attempts were unsuccessful, you are still very
concerned about the possibility that your systems may be compromised.Which
of the following solutions are you most likely to implement?
- A firewall
system at the connection point to the
Internet
- A more secure
password policy
- File-level
encryption
- Kerberos
authentication
Answer: A
- A server has two NIC
cards installed.The first one uses IRQ 10 and I/O range of B800-B81F.The
second uses IRQ 10 and I/O range of D700-D80A.What action, if any, should
be taken?
- No action is
required.
- Locate any
available IRQ to resolve the IRQ conflict.
- Locate any
available I/O range to resolve the I/O conflict.
- Change the I/O
of the second NIC to B800-B81F.
Answer: B
- Which of the
following IEEE 802 standards pertain to token ring?
- IEEE 802.5
- IEEE 802.3
- IEEE 802.2
- IEEE 802.11
Answer: A
- Protocol that is
often used to facilitate communications with an IBM mainframe?
- NetBEUI
- RIP
- DLC
Answer: C
- Which of these
protocols provide fast connectionless communications that relies on upper
layers of the OSI model for error correction?
- TCP
(Transmission Control Protocol)
- UDP (User
Datagram Protocol)
- SPX
Answer: B
- Can be used to
reduce traffic bottlenecks in a
NetBEUI network?
- bridge
- router
- gateway
Answer: A
- You have just
finished the installation of two computers
on a 28 computer network using Novell's IPX/SPX.Both computers initialize
with no error messages yet they cannot contact other computers on the
network.All other computers are functioning normally.You probably have an
___?
- incorrect IRQ
- incorrect frame
type
- invalid IP
setting
Answer: B
- Uses amplifiers
to regenerate analog signals?
- baseband
- broadband
- fiber-optic
Answer: B
- Uses single
frequency digital signals?
- baseband
- broadband
- multiband
Answer: A
- You are hired to
investigate a slow performing network server for a
client.Using the performance monitor you obtain the
following readings: CPU usage= 25%, Disk time= 25%, Page faults/sec=
25.What one change will increase the performance of this network server the most?
- buy another CPU
- add another
hard drive
- increase RAM
Answer: C
- Which of the
following should you check if you can connect using the IP
address but NOT with the host name?
- DNS
- WINS
- DHCP
Answer: A
- The fastest
method of transporting data with a switch?
- store and
forward
- cut through
- loop back
Answer: B
- Although NOT
fault tolerant this RAID level is often used when one wants the highest
level of performance?
- RAID 0
- RAID 1
- RAID 5
Answer: A
- Four _____ are
used in the 5-4-3 rule of 10Base2 networking?
- repeaters
- segments
- routers
Answer: A
- You have just
finished installing an Ethernet PCI
NIC (network interface card) in a client's
computer.The computer initializes successfully and has no apparent
hardware problems.The computer
however is not able to communicate with other computers on this NetBEUI
network.All other client computers are able to communicate.What is the
most likely cause of this problem?
- IRQ conflict
- incorrect
transceiver setting
- incorrect frame
type
Answer: B
- The two key
components of a digital signature include the secure hash algorithm and a
___ ?
- blowfish value
- certificate
authority
- IPSec
Answer: B
- The Microsoft
version of Novell's IPX/SPX protocol?
- ODI
- NWLink
- DLC
Answer: B
- Utility used to
run applications on a computer at a remote location?
- ODI
- Telnet
- ARP (Address
Resolution Protocol)
Answer: B
- Topology that
offers the highest level of redundancy, is easy to troubleshoot but is expensive
to install.It is the
topology of the internet?
- star
- ring
- mesh
Answer: C
- Ordinary
telephone wire has a thickness of AWG 22.Of the following which is the
thickest wire?
- AWG 14
- AWG 28
- AWG 32
Answer: A
- Backup method
which clears the archive bit and is the shortest to perform but takes the
longest to restore?
- full
- incremental
- differential
Answer: B
- Which of the
following protocols map a logical address to a MAC (Media Access Control)
address?
- DNS
- WINS
- ARP
Answer: C
- The major
limiting factor for how long a cable can be in a segment is ___?
- collisions
- EMI
- attenuation
Answer: C
- Backing
up the system state in Win 2000 Prof will backup
the ___?
- registry
- boot files
- all of the
above
Answer: C
- Equipment that
is designed to help identify breaks and shorts in cables?
- TDR
- performance
monitor
- SNMP
Answer: A
- Which company
developed the Unix Operating System?
- Sun
- Microsoft
- ATT
Answer: C
- To start a Win
2000 Prof computer in the safe mode press ___ at startup?
- F8
- Ctl and Esc
- F1
Answer: A
- A bridge filters
traffic using which type of address?
- IP address
- MAC
address
- TCP address
Answer: B
- A large network
with 500 users notice that at specific times in the morning and afternoon
network congestion ties up their computers.What is the most likely cause?
- power
fluctuations
- a terminator is
not grounded
- many users are
logging on or off
Answer: C
- A ___ is created
when a unique IP address and port
number are
used to connect two computers?
- SAP
- media transfer
coefficient
- socket
Answer: C
- During disaster
recovery of a Win 2000 Prof computer if you
"Enable Boot Logging" the file ___ is saved to
the C:\winnt folder for analysis?
- setuplog.txt
- bootlog.txt
ntbtlog.txt
Answer: C
- Which of these
WAN (Wide Area Network) protocols is
the fastest?
- Frame Relay
- ATM
- X.25
Answer: B
- The only files
on a Win 2000 Prof Emergency Repair Disk (ERD) are autoexec.nt, config.nt,
and setup.log?
- True
- False
Answer: A
- OSI layer
responsible for mail and file transfers?
- transport
- data
link
- application
Answer: C
- A protocol that
functions at the network layer of the OSI model?
- TCP
- IP
- SPX
Answer: B
- A major advantage of ___ in an NT
network is centralized security and administration?
- user-level
security
- share-level
security
- RAID 5
Answer: A
- OC-1 has a
transmission rate that is close to ___ ?
- T-1
- T-3
- ISDN
Answer: B
- The maximum
number of populated segments allowed in an Ethernet network?
- 3
- 4
- 5
Answer: A
- Using the TCP/IP
protocol if the destination of the packet is outside the subnet then the
packet is sent to the ___?
- switch
- bridge
- default gateway
Answer: C
- Entry in DNS to
identify your mail server?
- IDC
- TU
- MX
Answer: C
- Toplology which
is the least expensive to install?
- ring
- star
- bus
Answer: C
- Utility which
can be used to identify bottlenecks in the network?
- PING
- WINIPCFG
- TRACERT
Answer: C
- What is the
first octet range for a class A IP address?
- 1- 126
- 1- 128
- 1- 191
Answer: A
- After you setup
the IP address and subnet mask your FIRST test should be with ___?
- tracert to a
known good server
- ping 127.0.0.1
- ping another computer on your segment
Answer: B
- NetBIOS computer names can have
up to ___ characters?
- 256
- 15
- 20
Answer: B
- Refers to the
part of the network that is separated by routers, bridges, or
switches?
- partition
- node
- segment
Answer: C
- Data is
organized into FRAMES for transmission at this OSI level?
- physical
- data-link
- network
Answer: B
- 10Base2 coaxial has a limit of
___ computers per segment?
- 2
- 30
- 100
Answer: B
- Cable used for
ArcNet networks?
- RG-58
- RG-59
- RG-62
Answer: C
- A Class A IP
address uses the last ___ octet(s) for the host ID.The host ID is the
unique part and identifies the individual user and part of the reason 50%
of all IP addresses are Class A?
- one
- two
- three
Answer: C
- Of the three (3)
RAID levels used by a Win 2000 server choose the
one(s) that is/are fault tolerant?
- 0, 1, and 5
- 1 and 5
- 5
Answer: B
- The best
method to
restore the latest copy of the registry in a Win 2000 Server is to select the
___?
- Emergency Repair
Disk (ERD)
- Recovery
Console
- Last Known Good
Configuration
Answer: C
- What routing
protocol counts hops to the destination along multiple paths to determine
the most efficient route?
- ARP
- DLC
- RIP
Answer: C
- The source and
destination addresses are stored in the ___ of a packet?
- data
- trailer
- header
Answer: C
- Most commonly
used type of modem?
- synchronous
- asynchronous
- external
Answer: B
- Operates at the
network layer of the OSI model?
- bridge
- gateway
- router
Answer: C
- Disk duplexing
(RAID 1) requires a minimum of ___?
- 2 hard
drives and
1 controller
- 3 hard drives and 2
controllers
- 2 hard drives and 2
controllers
Answer: C
- Organization
responsible for the OSI model?
- ANSI
- IEEE
- ISO
Answer: C
- Which topology
uses the least amount of cabling?
- star
- bus
- ring
Answer: B
- According to RFC
1918 this range of Class A IP addresses are reserved for private intranetsand are not
supposed to be used on the internet (where x is any number from 1 to 254)?
- 10.x.x.x
- 20.x.x.x
- 30.x.x.x
Answer: A
- Cable
classification for 10Base5 thicknet coaxial?
- RG-8
- RG-10
- RG-58
Answer: A
- Dial-up protocol
that uses a virtual private network (VPN)?
- SLIP (Serial
Line Internet Protocol)
- PPTP
(Point-to-Point Tunneling Protocol)
- PPP (Point to
Point Protocol)
Answer: B
- Type 9 ___ rated coaxial
cable should
be installed in drop ceilings to conform to
fire code regulations?
- SPF
- PVC
- plenum
Answer: C
- Processes data using
applications stored on its hard drive and sends the results back to the
client.Saving the client the extra hard drive space he would need for the
application as well as the CPU processing
time?
- file server
- print server
- application server
Answer: C
- The static HOSTS
text file used on UNIX systems that requires manual entries by the
administrator was the precursor of ___.Today the HOSTS file system finds
use mainly in maximum security operations which don't want anything
changed automatically?
- WINS
- LMHOSTS
- DNS
Answer: C
- The minimum
category of UTP cable that will meet the 10BaseT standard?
- cat2
- cat3
- cat5
Answer: B
- The easiest
protocol to setup?
- NetBEUI
- NWLink
- TCP/IP
Answer: A
- Displays data on
hardware components such as memory, CPU, and the hard drive in a chart or
graph which describes how these devices are operating?
- protocol
analyzer
- performance monitor
- network
monitor
Answer: B
- The OSI layer
responsible for name recognition, security logins, and synchronization of
the connection?
- presentation
- application
- session
Answer: C
- Has twenty-four
64 Kbps channels for a total of 1.544 Mbps throughput?
- T3
- T1
- X.25
Answer: B
- Microsoft
recommends that the %CPU usage should not be above 90% for a single CPU or
above __% for multiple processors for any extended period?
- 50
- 70
- 90
Answer: A
- Your customer's
computer is loaded with peripherals and is using COM1, COM2, LPT5, and
LPT7.You install the NIC on IRQ3
and have a conflict.Which of the following is the NIC conflicting with?
- the printer
- COM1
- COM2
Answer: C
- The most widely
used protocol?
- NetBEUI
- NWLink
- TCP/IP
Answer: C
No comments:
Post a Comment