CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • CompTIA
          • A+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+ [N10-007]
          • Network+ [N10-008]
          • PenTest+
          • Project+
          • Security+
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Wireshark
          • WCNA
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • Python
          • PCEP
          • PCAP
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
        • Google
          • Cloud Architect
        • Microsoft
          • MTA Database
          • MTA Python
          • MTA Windows 10
          • MTA Server
          • MTA Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • ITIL
          • ITIL Foundations
        • Web Development
          • PhP Fundamentals
          • CSS Fundamentals
          • HTML Fundamentals
          • MySQL Fundamentals
          • Learn JavaScript
          • Python From Scratch
        • EC Council
          • Certified Ethical Hacker
        • ISC2
          • SSCP
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • CompTIA
          • A+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+ [N10-007]
          • Network+ [N10-008]
          • PenTest+
          • Project+
          • Security+
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Wireshark
          • WCNA
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • Python
          • PCEP
          • PCAP
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
        • Google
          • Cloud Architect
        • Microsoft
          • MTA Database
          • MTA Python
          • MTA Windows 10
          • MTA Server
          • MTA Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • ITIL
          • ITIL Foundations
        • Web Development
          • PhP Fundamentals
          • CSS Fundamentals
          • HTML Fundamentals
          • MySQL Fundamentals
          • Learn JavaScript
          • Python From Scratch
        • EC Council
          • Certified Ethical Hacker
        • ISC2
          • SSCP
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets

CompTIA Network+ Practice Test

Enjoy the free CompTIA Network+ practice test. You can take the video training course for the 007 and 008 exams here or read the 101 Labs – CompTIA Network+ labs book which is available on Amazon.

Back to book index.

loading

1. Load balancers also provides fault tolerance in situations in which a server from a server farm goes down.

Question 1 of 50

2. Load balancers can be deployed in the following three modes.

Question 2 of 50

3. In terms of DNS, this is useful if you want to perform a reverse lookup from an IP address in order to find the domain name.

Question 3 of 50

4. ______ overcomes this issue by allowing multiple private internal addresses to be associated with a single public address.

Question 4 of 50

5. Linux uses the tracert command.

Question 5 of 50

6. What is the first usable hosts on the second subnet of 172.16.0.0/17?

Question 6 of 50

7. 172.20.0.0 /18 generates how many subnets / hosts per subnet?

Question 7 of 50

8. In terms of structured cabling, the area above the fake ceiling is called a ____ if it offers air flow through it.

Question 8 of 50

9. RTP (Real-time Transport Protocol) is a VoIP signaling protocol that is used to build and terminate media calls.

Question 9 of 50

10. ____ is a protocol that translates names into IP addresses.

Question 10 of 50

11. Your boss gives you network 172.16.0.0 and tells you to apply VLSM so you create 64 subnets each with at least 1000 hosts. What subnet mask do you use?

Question 11 of 50

12. As opposed to the Windows utility, Linux pings do not send a limited amount of ping packets, so they must be stopped by pressing the Ctrl+C key combination.

Question 12 of 50

13. What is the broadcast address for subnet 192.168.1.88/30?

Question 13 of 50

14. The _____ record will return an IPv6 address based on a given domain name.

Question 14 of 50

15. In terms of CSMA/CD. If there is a collision, all stations involved in that collision will back off and wait for 20 milliseconds before retransmitting the signal.

Question 15 of 50

16. In terms of VTP, switches that should exchange VLAN information must be configured with which following identical parameters.

Question 16 of 50

17. When considering the SSID concept, its infrastructure can be built in two modes over three different categories, based on who participates in the WLAN. The three different categories are?

Question 17 of 50

18. Remote Desktop Protocol (RDP) is a well-known application that runs on _____ and allows users to remotely connect and manage a computer.

Question 18 of 50

19. What is the last usable host address on subnet 172.20.176.0/20?

Question 19 of 50

20. Virtualizing network components offers which two major advantages over using physical devices?

Question 20 of 50

21. The IPv6 multicast addresses comes from which range?

Question 21 of 50

22. ____ is a protocol used by network devices to synchronize time across the network infrastructure.

Question 22 of 50

23. You are told that your usable host range is 192.168.1.1 - 192.168.1.6 but the rest of the documentation is missing. What would the subnet mask be?

Question 23 of 50

24. The routing decisions are made by applying the Shortest Path First (SPF) or _____ algorithm to the information received from various sources.

Question 24 of 50

25. UDP port __ is used for normal DNS lookups and queries and TCP port __ is used for zone transfers between DNS servers.

Question 25 of 50

26. A proxy server is a server placed in the middle of the communication between a user and a server that offers a certain service.

Question 26 of 50

27. IPv6 uses ARP to map to MAC addresses.

Question 27 of 50

28. You have subnet 192.168.1.0/28 handed to you by the design team. How many subnets/hosts-per-subnet will it generate?

Question 28 of 50

29. Crimping is usually the first step in the cable installment process.

Question 29 of 50

30. With VPN, if an attacker captures the conversation between two endpoints, he will see unencrypted packets.

Question 30 of 50

31. What is the last host address you can use on subnet 172.16.8.0/22?

Question 31 of 50

32. Integrated Services for Digital Network (ISDN) comes in which two flavors?

Question 32 of 50

33. The images illustrates what type of cable?

14.6

Question 33 of 50

34. Fiber connections can operate based on which two technologies?

Question 34 of 50

35. _______, shown below, are extensions of MDFs and they are placed at strategic distribution points in the network infrastructure.

 

20.2

Question 35 of 50

36. The ___ is the (Layer 2) Frame Relay address.

Question 36 of 50

37. 127.0.0.1 IPv4 Loopback addresses are represented as what in IPv6?

Question 37 of 50

38. Ping uses _____ as the underlying protocol (Layer 3), so when trying to test the network using this tool, you must be sure that no devices between the source and the destination are filtering ____ traffic.

Question 38 of 50

39. Your boss asks you how many subnets would be generated with 10.0.0.0/9. What do you tell her?

Question 39 of 50

40. Non-Broadcast Multi-Access (NBMA) is employed by which type of WAN connection?

Question 40 of 50

41. 2001:0000:0000:0ABC:0000:0000:0000:0000/60 can be represented as 2001:0:0:ABC::/60.

Question 41 of 50

42. The default STP Bridge Priority value is ____.

Question 42 of 50

43. A _____ is a powerful tool that gathers packets directly from the network and presents them for analysis.

Question 43 of 50

44. In terms of DNS, this type of record represents an alias of an existing record.

Question 44 of 50

45. Crosstalk comes in multiple forms. Which are two common types?

Question 45 of 50

46. Tick the valid subnets created with 10.0.0.0/10.

Question 46 of 50

47. A _______ represents the maximum size an IP packet can be to traverse the network from one end to the other without the need to fragment it as it passes through different network devices.

Question 47 of 50

48. STP calculations are based on which two key concepts?

Question 48 of 50

49. Link aggregation can use any type of interfaces (e.g., 100Mbps, 1Gbps, and 10Gbps), but all the interfaces within a bundle must have the same capacity.

Question 49 of 50

50. Virtual LANs (VLANs) define broadcast domains in a Layer 3 network.

Question 50 of 50

Loading... Loading...

 

content-filler

ABOUT US

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

MOST POPULAR

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Members

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Newsletter

Secure Site

website security secure

Copyright Reality Press Ltd . / Paul Browning