CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • CompTIA
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Wireshark
          • WCNA
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
          • Red Hat RHCSA
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • Python
          • PCEP
          • PCAP
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
        • Google
          • Cloud Architect
        • Microsoft
          • Microsoft SQL Server
          • Windows 10
          • Windows Server 2016
          • Microsoft Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • ITIL
          • ITIL Foundations
        • Coding Academy
          • PhP Fundamentals
          • MySQL Fundamentals
          • Web Development
          • Python For Beginners
        • EC Council
          • Certified Ethical Hacker
        • ISC2
          • SSCP
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
    • Free Labs
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
    • Meet the Trainers
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • CompTIA
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Wireshark
          • WCNA
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
          • Red Hat RHCSA
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • Python
          • PCEP
          • PCAP
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
        • Google
          • Cloud Architect
        • Microsoft
          • Microsoft SQL Server
          • Windows 10
          • Windows Server 2016
          • Microsoft Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • ITIL
          • ITIL Foundations
        • Coding Academy
          • PhP Fundamentals
          • MySQL Fundamentals
          • Web Development
          • Python For Beginners
        • EC Council
          • Certified Ethical Hacker
        • ISC2
          • SSCP
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
    • Free Labs
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
    • Meet the Trainers
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets

CompTIA Network+ Practice Test

Enjoy the free CompTIA Network+ practice test. You can take the video training course for the 007 and 008 exams here or read the 101 Labs – CompTIA Network+ labs book which is available on Amazon.

Back to book index.

loading

1. In terms of CSMA/CD. If there is a collision, all stations involved in that collision will back off and wait for 20 milliseconds before retransmitting the signal.

Question 1 of 50

2. In terms of DNS, this type of record represents an alias of an existing record.

Question 2 of 50

3. What is the first usable hosts on the second subnet of 172.16.0.0/17?

Question 3 of 50

4. What is the last usable host address on subnetĀ 172.20.176.0/20?

Question 4 of 50

5. ____ is a protocol used by network devices to synchronize time across the network infrastructure.

Question 5 of 50

6. The images illustrates what type of cable?

14.6

Question 6 of 50

7. The IPv6 multicast addresses comes from which range?

Question 7 of 50

8. Your boss asks you how many subnets would be generated with 10.0.0.0/9. What do you tell her?

Question 8 of 50

9. 127.0.0.1 IPv4 Loopback addresses are represented as what in IPv6?

Question 9 of 50

10. The routing decisions are made by applying the Shortest Path First (SPF) or _____ algorithm to the information received from various sources.

Question 10 of 50

11. Tick the valid subnets created with 10.0.0.0/10.

Question 11 of 50

12. You have subnet 192.168.1.0/28 handed to you by the design team. How many subnets/hosts-per-subnet will it generate?

Question 12 of 50

13. ____ is a protocol that translates names into IP addresses.

Question 13 of 50

14. 172.20.0.0 /18 generates how many subnets / hosts per subnet?

Question 14 of 50

15. _______, shown below, are extensions of MDFs and they are placed at strategic distribution points in the network infrastructure.

 

20.2

Question 15 of 50

16. Load balancers also provides fault tolerance in situations in which a server from a server farm goes down.

Question 16 of 50

17. Load balancers can be deployed in the following three modes.

Question 17 of 50

18. Remote Desktop Protocol (RDP) is a well-known application that runs on _____ and allows users to remotely connect and manage a computer.

Question 18 of 50

19. When considering the SSID concept, its infrastructure can be built in two modes over three different categories, based on who participates in the WLAN. The three different categories are?

Question 19 of 50

20. UDP port __ is used for normal DNS lookups and queries and TCP port __ is used for zone transfers between DNS servers.

Question 20 of 50

21. Linux uses the tracert command.

Question 21 of 50

22. Virtualizing network components offers which two major advantages over using physical devices?

Question 22 of 50

23. In terms of VTP, switches that should exchange VLAN information must be configured with which following identical parameters.

Question 23 of 50

24. Crimping is usually the first step in the cable installment process.

Question 24 of 50

25. You are told that your usable host range isĀ 192.168.1.1 - 192.168.1.6 but the rest of the documentation is missing. What would the subnet mask be?

Question 25 of 50

26. Link aggregation can use any type of interfaces (e.g., 100Mbps, 1Gbps, and 10Gbps), but all the interfaces within a bundle must have the same capacity.

Question 26 of 50

27. A _______ represents the maximum size an IP packet can be to traverse the network from one end to the other without the need to fragment it as it passes through different network devices.

Question 27 of 50

28. Ping uses _____ as the underlying protocol (Layer 3), so when trying to test the network using this tool, you must be sure that no devices between the source and the destination are filtering ____ traffic.

Question 28 of 50

29. IPv6 uses ARP to map to MAC addresses.

Question 29 of 50

30. Crosstalk comes in multiple forms. Which are two common types?

Question 30 of 50

31. Your boss gives you network 172.16.0.0 and tells you to apply VLSM so you create 64 subnets each with at least 1000 hosts. What subnet mask do you use?

Question 31 of 50

32. The default STPĀ Bridge Priority value is ____.

Question 32 of 50

33. What is the broadcast address for subnetĀ 192.168.1.88/30?

Question 33 of 50

34. As opposed to the Windows utility, Linux pings do not send a limited amount of ping packets, so they must be stopped by pressing the Ctrl+C key combination.

Question 34 of 50

35. 2001:0000:0000:0ABC:0000:0000:0000:0000/60 can be represented as 2001:0:0:ABC::/60.

Question 35 of 50

36. Fiber connections can operate based on which two technologies?

Question 36 of 50

37. What is the last host address you can use on subnetĀ 172.16.8.0/22?

Question 37 of 50

38. With VPN, if an attacker captures the conversation between two endpoints, he will see unencrypted packets.

Question 38 of 50

39. RTP (Real-time Transport Protocol) is a VoIP signaling protocol that is used to build and terminate media calls.

Question 39 of 50

40. A proxy server is a server placed in the middle of the communication between a user and a server that offers a certain service.

Question 40 of 50

41. In terms of DNS, this isĀ useful if you want to perform a reverse lookup from an IP address in order to find the domain name.

Question 41 of 50

42. STP calculations are based on which two key concepts?

Question 42 of 50

43. The ___ is the (Layer 2) Frame Relay address.

Question 43 of 50

44. The _____ record will return an IPv6 address based on a given domain name.

Question 44 of 50

45. In terms of structured cabling, theĀ area above the fake ceiling is called a ____ if it offers air flow through it.

Question 45 of 50

46. Virtual LANs (VLANs) define broadcast domains in a Layer 3 network.

Question 46 of 50

47. Non-Broadcast Multi-Access (NBMA) is employed by which type of WAN connection?

Question 47 of 50

48. Integrated Services for Digital Network (ISDN) comes in which two flavors?

Question 48 of 50

49. ______ overcomes this issue by allowing multiple private internal addresses to be associated with a single public address.

Question 49 of 50

50. A _____ is a powerful tool that gathers packets directly from the network and presents them for analysis.

Question 50 of 50

Loading... Loading...

 

content-filler

ABOUT US

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

MOST POPULAR

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Members

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Newsletter

Secure Site

website security secure

Copyright Reality Press Ltd . / Paul Browning

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.