CompTIA Network+ Practice Questions Flashcards
Which layer of the OSI model is responsible for routing?
A. Data Link
B. Transport
C. Network
D. Physical
C. Network
What is the primary purpose of a subnet mask?
A. Identify the network portion of an IP address
B. Identify the host portion of an IP address
C. Route data between networks
D. Translate IP addresses
A. Identify the network portion of an IP address
Which protocol is commonly used for email transmission?
A. FTP
B. SMTP
C. SNMP
D. HTTP
B. SMTP
What is the default port for HTTP?
A. 443
B. 110
C. 21
D. 80
D. 80
What is a MAC address used for?
A. IP configuration
B. Routing on the Internet
C. Layer 2 device addressing
D. Encryption of data
C. Layer 2 device addressing
What does DHCP stand for?
A. Dynamic Host Control Protocol
B. Domain Host Configuration Protocol
C. Dynamic Host Configuration Protocol
D. Domain Handler Configuration Protocol
C. Dynamic Host Configuration Protocol
Which protocol is used for secure remote logins?
A. FTP
B. SSH
C. Telnet
D. SMTP
B. SSH
Which layer of the OSI model does TCP operate on?
A. Network
B. Data Link
C. Transport
D. Application
C. Transport
What is the primary purpose of DNS?
A. Encrypt data transmission
B. Translate IP addresses to domain names
C. Control network access
D. Assign IP addresses
B. Translate IP addresses to domain names
Which protocol is used for web browsing?
A. SNMP
B. FTP
C. HTTP
D. DHCP
C. HTTP
Which protocol provides IP address configuration to devices on a network?
A. DNS
B. FTP
C. DHCP
D. TCP
C. DHCP
What is the primary purpose of the ARP protocol?
A. Translate IP addresses to MAC addresses
B. Encrypt data for secure transmission
C. Convert MAC addresses to IP addresses
D. Determine network speed
A. Translate IP addresses to MAC addresses
Which address format is used in IPv6 addressing?
A. Binary
B. Dotted decimal
C. Hexadecimal
D. Octal
C. Hexadecimal
What type of IP address is 192.168.0.1?
A. Public
B. Private
C. Multicast
D. Broadcast
B. Private
Which of the following protocols operates at the application layer of the OSI model?
A. HTTP
B. ICMP
C. ARP
D. IP
A. HTTP
Which protocol allows automated IP address allocation and lease renewal?
A. DHCP
B. DNS
C. ICMP
D. TCP
A. DHCP
What does the DMZ in a network environment provide?
A. Encryption for all internal data
B. An isolated segment accessible from external networks
C. A firewall for internet-bound traffic
D. An extension for local networks
B. An isolated segment accessible from external networks
What type of device aggregates multiple network connections into a single connection to increase bandwidth?
A. Switch
B. Load balancer
C. Hub
D. Bridge
B. Load balancer
What network component is often used to extend Wi-Fi signal coverage?
A. Firewall
B. Router
C. Access point
D. Hub
C. Access point
Which network topology uses a single central cable to which all devices connect?
A. Star
B. Ring
C. Bus
D. Mesh
C. Bus
Which of the following tools would provide details on the latency and path of packets?
A. ipconfig
B. ping
C. netstat
D. tracert
D. tracert
What is the purpose of using SYSLOG in a network environment?
A. To detect network intrusions
B. To monitor system events and logs
C. To store backups
D. To manage IP leases
B. To monitor system events and logs
What is SNMP used for in a network?
A. Managing devices
B. Sending files
C. Encrypting data
D. Routing
A. Managing devices
Which of the following is typically used for device authentication in a network?
A. NAT
B. DNS
C. RADIUS
D. RIP
C. RADIUS
Which command displays active TCP connections and listening ports?
A. ipconfig
B. netstat
C. tracert
D. nslookup
B. netstat
Which type of malware restricts access to data and demands a ransom?
A. Virus
B. Worm
C. Ransomware
D. Spyware
C. Ransomware
What is the primary purpose of a VPN?
A. Network speed increase
B. Encrypted communication over a public network
C. Public internet access
D. Antivirus protection
B. Encrypted communication over a public network
Which protocol provides secure communication over an untrusted network?
A. HTTP
B. SSL/TLS
C. DNS
D. DHCP
B. SSL/TLS
What does IDS stand for in network security?
A. Intrusion Defense System
B. Internet Detection System
C. Intrusion Detection System
D. Internet Defense System
C. Intrusion Detection System
What is the primary role of a proxy server?
A. Directly connecting devices to the internet
B. Caching and filtering client requests
C. Encrypting data
D. Managing IP addresses
B. Caching and filtering client requests
Which command provides details on IP address configuration?
A. ipconfig (Windows) or ifconfig (Linux)
B. ping
C. tracert
D. nslookup
A. ipconfig (Windows) or ifconfig (Linux)
What tool can be used to identify open ports on a remote system?
A. ping
B. netstat
C. nmap
D. nslookup
C. nmap
What tool is commonly used to diagnose DNS issues?
A. ipconfig
B. nslookup
C. tracert
D. ping
B. nslookup
Which tool displays the MAC address associated with a local IP address?
A. ipconfig
B. tracert
C. ping
D. arp
D. arp
What command can be used to release and renew an IP address in Windows?
A. ping
B. ipconfig /renew
C. nslookup
D. tracert
B. ipconfig /renew
What kind of network connection uses coaxial cables?
A. DSL
B. Fiber
C. Cable internet
D. Satellite
C. Cable internet
Which type of cabling is immune to electromagnetic interference?
A. Copper
B. UTP
C. Fiber-optic
D. Coaxial
C. Fiber-optic
What is the typical use of a punch-down tool?
A. Terminating cables on patch panels
B. Securing network switches
C. Installing Wi-Fi access points
D. Configuring routers
A. Terminating cables on patch panels
Which technology can provide data and power over Ethernet cabling?
A. Wi-Fi
B. PoE
C. VPN
D. DHCP
B. PoE
What kind of antenna provides 360-degree coverage?
A. Parabolic
B. Yagi
C. Omnidirectional
D. Directional
C. Omnidirectional
What is the primary difference between a router and a switch?
A. Routers operate at Layer 3, and switches operate at Layer 2
B. Switches operate at Layer 3, and routers operate at Layer 2
C. Routers connect devices within a LAN, while switches connect different LANs
D. Routers and switches function at the same OSI layer
A. Routers operate at Layer 3, and switches operate at Layer 2
Which of the following tools is used to monitor real-time traffic on a network?
A. Traceroute
B. Ping
C. Packet sniffer
D. IP scanner
C. Packet sniffer
What is the primary function of a firewall?
A. To route packets to external networks
B. To encrypt data sent across a network
C. To filter traffic based on a set of rules
D. To create network backups
C. To filter traffic based on a set of rules
Which command would you use to test if a local computer can reach a website?
A. tracert
B. ping
C. ipconfig
D. route
B. ping
What is the maximum length of a Category 6 Ethernet cable for it to operate effectively?
A. 100 meters
B. 50 meters
C. 500 meters
D. 1,000 meters
A. 100 meters