Our experts have gathered these Comptia Network + MCQs through research, and we hope that you will be able to see how much knowledge base you have for the subject of Comptia Network + by answering these 30 multiple-choice questions.
Get started now by scrolling down!
A. Challenge Handshake Authentication Protocol
B. The NIC (Network Interface Card) is bad.
C. 53
D. Periodically (randomly) blinking
A. 3.1
B. Central Processing unit
C. 1000BASE-LX and10 GBASE-LR
D. In a locked room in an offsite location
A. Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
B. 443
C. Post Office Protocol
D. Two or more connected computers that can share resources
A. 25
B. It is an address assigned to a NIC (Network Interface Card).
C. Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
D. Simple Network Management Protocol
A. LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
B. Challenge Handshake Authentication Protocol
C. User Datagram Protocol
D. There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
A. Hypertext transfer protocol over secure sockets layer.
B. Firewall
C. It is an address assigned to a NIC (Network Interface Card).
D. Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
A. Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
B. A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
C. MT-RJ (Mechanical Transfer-Registered Jack)
D. Rlogin
A. Netstat and ping
B. The device ID (Identification)
C. Basic Rate Interface
D. Internet Protocol
A. A. 18 -000 feet (5 -486.4 meters)
B. Handles e-mail functions
C. Wireless Fidelity
D. Netstat
A. Port Address Translator
B. 1000BASE-LX and10 GBASE-LR
C. 514
D. 20 & 21
A. The analyzer is functioning properly.
B. 40 bit - 128 bit - 64 bit
C. 1000BASE-CX
D. Network Time Protocol
A. Select the most probable cause
B. Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
C. Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
D. Internetwork Packet Exchange/Sequenced Packet Exchange
A. Network Interface Card
B. Multipurpose Internet Mail Extension
C. They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
D. Initial installation cost may be higher - One central single point of failure (the hub or other device)
A. 40 bit - 128 bit - 64 bit
B. 443
C. 23
D. Central Processing unit
A. Post Office Protocol
B. User Datagram Protocol. This protocol is connectionless and routable.
C. Direct Current
D. Hypertext transfer protocol
A. Industry Standards Organization
B. Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
C. Internet Protocol
D. Internet Information Services
A. Lightweight Directory Access Protocol
B. Check the connection from the WAP (Wireless Access Point) to the network
C. Manages network applications
D. Integrated Services digital Network
A. T1 (T-Carrier Level 1).
B. Internet Protocol
C. 802.11a.
D. Transmission Control Protocol/Internet Protocol
A. Public Switched Telephone Network
B. 53
C. Point-to-Point Tunneling Protocol
D. 2.4 GHz (Gigahertz).
A. 1433
B. Internet connection
C. Trivial File Transfer Protocol
D. WINS (Windows Internet Name Service)
A. 6
B. 10 GBASE-LR
C. Application
D. Presentation
A. Hypertext transfer protocol over secure sockets layer.
B. BootP (Boot Protocol)
C. A long length of antenna extension cable
D. Digital Subscriber Line
A. Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
B. MAC (Media Access Control) address
C. The analyzer is functioning properly.
D. Time domain reflectometer
A. The NIC (Network Interface Card) is bad.
B. Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
C. Provides remote users with access to the network through modems and an IP connection
D. Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
A. ICMP (Internet Control Message Protocol)
B. 10 GBASE-LR
C. 53
D. 80
A. 389
B. The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
C. Remote Desktop Protocol
D. A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
A. 10 GBASE-LR
B. Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
C. Intrusion Detection System
D. 802.11a.
A. Remote Desktop Protocol
B. Quality of Service
C. Router
D. Trivial File Transfer Protocol
A. The NIC (Network Interface Card) is bad.
B. A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
C. BootP (Boot Protocol)
D. Public Key Infrastructure
A. Wired Equivalent Privacy
B. Bayonet-Neill-Concelman or British Naval Connector
C. All workstations except Workstation 3 can communicate to each other.
D. All hosts can communicate.