Network+ Certification Preparation Exam Solutions - 599 Verified Questions

Page 1


Network+ Certification Preparation Exam Solutions

Course Introduction

This course is designed to prepare students for the CompTIA Network+ certification exam by providing a comprehensive overview of fundamental networking concepts. Topics include network architecture, protocols, standards, and topologies; IP addressing and subnetting; network hardware such as switches, routers, and cabling; wireless networking; network security fundamentals; and troubleshooting methodologies. Emphasis is placed on hands-on labs and real-world scenarios to ensure students gain practical skills in configuring, managing, and troubleshooting wired and wireless networks. Upon completion, students will be well-equipped to take the Network+ certification exam and pursue entry-level roles in network administration and support.

Recommended Textbook

Network+ Guide to Networks 7th Edition by Jill West

Available Study Resources on Quizplus

12 Chapters

599 Verified Questions

599 Flashcards

Source URL: https://quizplus.com/study-set/2166 Page 2

Chapter 1: Introduction to Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43224

Sample Questions

Q1) The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

A)Toxic Chemical Safety Procedure (TCSP)

B)Dangerous and Hazardous Waste Disposal Sheet (DHWDS)

C)Environmental Chemical Hazard Sheet (ECHS)

D)Material Safety Data Sheet (MSDS)

Answer: D

Q2) Select the layer of the OSI model that is responsible for reformatting,compressing,and/or encrypting data in a way that the application on the receiving end can read:

A)Application

B)Presentation

C)Session

D)Transport

Answer: B

Q3) ___________ is an unsecured client server application / protocol that transfers files between two computers.

Answer: FTP

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: How Computers Find Each Other on Networks

Available Study Resources on Quizplus for this Chatper

49 Verified Questions

49 Flashcards

Source URL: https://quizplus.com/quiz/43225

Sample Questions

Q1) A protocolthat runs in the Session and Transport layers of the OSImodel and associates NetBIOS names with workstations.

A)A (Address)record

B)AAAA (Address) record

C)Automatic Private IP Addressing (APIPA)

D)device ID

E)Dynamic Network Address Translation (DNAT)

F)Internet Corporation for Assigned Names and Numbers (ICANN)

G)NetBIOS

H)packet analyzer

I)PTR (Pointer)record

J)Static Network Address Translation (SNAT)

Answer: G

Q2) How many clusters of root servers exist?

A)8

B)10

C)13

D)15

Answer: C

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: How Data Is Transported Over Networks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43226

Sample Questions

Q1) What protocol replaces ARP,IGMP,and ICMPv4 on IPv6 based networks?

A)ARPng

B)BGPv6

C)IGMPv6

D)ICMPv6

Answer: D

Q2) What IPv4 protocol handles multicasting for tasks such as videoconferencing or teleconferencing?

A)ICMP

B)ARP

C)TCP

D)IGMP

Answer: D

Q3) Which of the following is not a task handled by a router?

A)A router forwards broadcasts over the network.

B)A router can reroute traffic if the path of first choice is down but a second path is available.

C)A router can interpret Layer 3 and often Layer 4 addressing.

D)A router can connect dissimilar networks.

Answer: A

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Structured Cabling and Networking Elements

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43227

Sample Questions

Q1) A specialized storagedevice or group of storage devices that provides centralizedfault-tolerant data storage for a network.

A)airflow

B)alternating current (AC)

C)collision domain

D)direct current (DC)

E)FCS (frame check sequence)

F)inverter

G)NAS (Network attached storage)

H)power converter

I)rack unit (RU)

J)voltage regulator

Q2) The TIA/EIA standard for wall jacks in a work area require that at least one outlet be provided for data and one for voice.

A)True

B)False

Q3) To ensure that any _____________ are detected,frames are made large enough to fill the entire cable during transmission.

Q4) Describe the differences between a brownout and a blackout.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Network Cabling

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43228

Sample Questions

Q1) A form of transmission that allows multiplesignals to travel simultaneously over one medium.

A)1000Base-LX

B)1000Base-TX

C)ASCII

D)Cat (category)

E)DWDM (Dense Wavelength Division Multiplexing)

F)far end cross-talk (FEXT)

G)multiplexing

H)short circuit

I)throughput

J)wavelength

Q2) Explain what a TDR is,and describe how it is used.

Q3) Frequencies used to convey speech over telephone lines fall between what two frequencies below?

A)100 Hz

B)300 Hz

C)3.3 KHz

D)5.5 KHz

Q4) Describe two ways in which analog and digital signals are boosted.

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Wireless Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43229

Sample Questions

Q1) What two terms describe a wireless network topology in which access points work as peer devices on the same network?

A)mesh WLAN

B)infrastructure WLAN

C)wireless gateway

D)wireless mesh network (WMN)

Q2) What two frequencies are used for most wireless networks?

A)900 MHz

B)2.4 GHz

C)4.9 GHz

D)5 GHz

Q3) What is the maximum theoretical throughput of 802.11n?

A)54 Mbps

B)65 Mbps

C)600 Mbps

D)1.3 Gbps

Q4) Provide information on fading,and describe the different effects that fading can have on wireless transmissions.

Q5) Describe the hidden node problem,and explain how it can be mitigated.

Q6) Access points that include routing functions are also called _______________.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Cloud Computing and Remote Access

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43230

Sample Questions

Q1) Describe the three way handshake process as used by CHAP.

Q2) How often should administrators and network users be required to change their password?

A)60 days

B)90 days

C)120 days

D)180 days

Q3) When PPP is used over an Ethernet network,it is known as ________________.

Q4) What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?

A)Kerberos

B)TKIP

C)AES

D)EAP

Q5) What authentication protocol sends authentication information in cleartext without encryption?

A)PAP

B)MS-CHAP

C)MS-CHAPv2

D)EAP

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Network Risk Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43231

Sample Questions

Q1) What feature on some network switches can be used to detect faked arp messages?

A)DHCP snooping

B)session monitoring

C)dynamic packet inspection

D)dynamic ARP inspection

Q2) At what layer of the OSI model do firewalls operate?

A)Transport

B)Data link

C)Network

D)Application

Q3) An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?

A)buffer overflow

B)session hijacking attack

C)man-in-the-middle attack

D)banner-grabbing attack

Q4) The ________________ utility is a Windows console that is used to control what users do and how the system can be used.

Q5) Describe a boot sector virus.

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Unified Communications and Network Performance Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43232

Sample Questions

Q1) What percentage of Internet traffic,as estimated by Cisco Systems,will be devoted to video traffic by 2018?

A)20%

B)65%

C)79%

D)93%

Q2) ________________ are frames that are not actually data frames,but aberrations caused by a device misinterpreting stray voltage on the wire.

Q3) The SNMP version 3 protocol introduces authentication,validation,and encryption for messages exchanged between devices and the network management console.

A)True B)False

Q4) TCP is preferred over UDP for real time services. A)True B)False

Q5) Describe the Communications Assistance for Law Enforcement Act (CALEA).

Q6) Provide detail on the three different versions of SNMP.

Q7) What is the Health Insurance Portability and Accountability Act (HIPAA)?

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Network Segmentation and Virtualization

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43233

Sample Questions

Q1) What is the difference between a default VLAN and a native VLAN?

Q2) A software configuration that can be used todisable STP on specific ports,such as the port leading to thenetwork's demarc.It prevents access to networklinks that should not be considered when plotting STP pathsin a network.

A)access port

B)BPDU filter

C)CIDR block

D)HSRP (Hot Standby Routing Protocol)

E)native VLAN

F)software defined networking (SDN)

G)trunk port

H)virtual server

I)VLAN hopping attack

J)VRRP (Virtual Router Redundancy Protocol)

Q3) A _________________ occurs when an attacker generates transmissions that appear,to the switch,to belong to a protected VLAN.

Q4) A switch is typically preconfigured with one _______________ that includes all its ports.

Q5) What are some reasons to use VLANs?

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Wide Area Networks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43234

Sample Questions

Q1) A connectivity devicelocated at a telecommunications carrier's office that aggregatesmultiple DSL subscriber lines and connects them to alarger carrier or to the Internet backbone.

A)ATM (Asynchronous Transfer Mode)

B)BRI (Basic Rate Interface)

C)CIR (committed information rate)

D)DSLAM (DSL access multiplexer)

E)geostationary orbit

F)LTE (Long Term Evolution)

G)Metro Ethernet

H)ring topology WAN

I)smart jack

J)transponder

Q2) What protocol is commonly used to aggregate / bond T-1 / T-3 lines?

A)STP

B)MLPPP

C)MPLS

D)PPTP

Q3) List some of the advantages provided by Metro Ethernet.

Q4) List and describe the four different generations of cellular technology.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Industrial and Enterprise Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43235

Sample Questions

Q1) Which team role is the person on call who first notices or is alerted to a problem?

A)manager

B)dispatcher

C)technical support specialist

D)public relations specialist

Q2) A supervisory computer orserver in an ICS or SCADA system that controls thephysical system.Also called the control server or theSCADA server.

A)acquisitions server

B)biorecognition access

C)degausser

D)Faraday cage

E)human-machine interfaces (HMI)

F)master terminal unit (MTU)

G)prox card

H)smart card

I)SOW (statement of work)

J)telemetry

Q3) What should be in a disaster recovery plan that relates to computers?

Q4) The goal of a disaster recovery plan is to ensure ______________.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

Create a flipbook
Network+ Certification Preparation Exam Solutions - 599 Verified Questions by Quizplus - Issuu