Tech industry association CompTIA’s popular Network+ certification is that organization’s second-most popular vendor-neutral certification. CompTIA recently updated the single exam you must pass to earn this credential. It consists of 90 questions (to be answered within 90 minutes) and the minimum passing score is 720 (on a scale from 100 to 900).
The Network+ exam is divided into five domains and weighted as such:
1. Networking Concepts — 23 percent
2. Infrastructure — 18 percent
3. Network Operations — 17 percent
4. Network Security — 20 percent
5. Network Troubleshooting and Tools — 22 percent
What follows is a self-test of 25 questions based on the topics appearing beneath the first two of these domains (next month, we will focus on the remaining three). Are you ready to tackle the new exam, N10-007 that debuts on March 1? Let’s find out!
The answers appear at the end of the questions. In all cases, pick the best answer(s) to each question. Good luck!
1. Which physical topology is illustrated in the figure below?
a. Star
b. Mesh
c. Ring
d. Bus
2. Dustin is designing a new office building and wants to use a Z-Wave network to have all the heating and cooling devices communicate with each other. How many devices can be on a Z-Wave network?
a. 64
b. 128
c. 232
d. 256
3. Which of the following statements is true regarding 802.11n ?
a. 802.11n and 802.11ac are identical in every way and the naming is dependent on the vendor
b. While 802.11n can transmit more than one spatial stream at the same time, the streams are directed to a single address.
c. 802.11n allows for MUMIMO to let an AP send multiple frames to multiple clients at the exact same time
d. ANT+ requires 802.11n to be present
4. At which layer of the OSI model does STP operate?
a. Data link
b. Session
c. Presentation
d. Transport
5. Which of the following commands is used within FTP to change the working directory on the local host?
a. cd
b. mgo
c. rcd
d. lcd
6. Which of the following are the default ports used by LDAP and LDAPS respectively?
a. 22; 23
b. 5060; 5061
c. 80; 443
d. 389; 636
7. Which of the following DNS record types is used to store information for IPv6 (128-bit) addresses?
a. A
b. AAAA
c. TXT
d. MX
8. What is the decimal conversion for the binary octet 11001101?
a. 193
b. 205
c. 223
d. 225
9. Which technology makes it possible to use a different subnet mask for the same network number on different subnets?
a. EIGRP
b. VLSM
c. IS-IS
d. OSPF
10. Which of the following is the most likely IPv4 address currently shown as the series of question marks in the figure below?
a. 192.168.1.2
b. 192.168.1.255
c. 192.168.2.0
d. 60.4.7.6
11. Which of the following values is equal to the IPv6 address of 2001:0000:0000:0000:3cde:37d1:3f57:fe93?
a. 2001::3cde:37d1:3f57:fe93
b. 2001::fe93
c. fe93
d. 2001:3×00:3cde:37d1:3f57:fe93
12. Which command has been run in the figure below (portions of which have been obscured)?
a. arp
b. ping
c. tracert -6
d. route
13. Within the display given by the route print command, which number is a measurement of the directness of a route?
a. interface
b. metric
c. route
d. pace
14. To fix the problem with routing, you determine you need to add a persistent route to the routing table. Which of the following commands can be used to make this happen?
a. route -p 10.0.0.0 mask 255.0.0.0
b. route add -p 10.0.0.0 mask 255.0.0.0
c. route add 10.0.0.0 mask 255.0.0.0
d. add route 10.0.0.0 mask 255.0.0.0
15. Which of the following network devices can protect internal networks from public networks and control access between specific network segments?
a. Router
b. Switch
c. Bridge
d. Firewall
Please visit GoCertify to attempt the remaining 10 questions of this quiz.
ANSWERS
1. D — The image shows a physical bus topology which uses a trunk or backbone to connect all the computers on the network. (Domain: 1.0 Networking Concepts / Subobjective: 1.5 Compare and contrast the characteristics of network topologies, types and technologies)
2. C — Up to 232 devices can be on a Z-Wave network, and each new device has to be paired (or “included”) for it to be recognized by the controller. (Domain: 1.0 Networking Concepts / Subobjective: 1.5 Compare and contrast the characteristics of network topologies, types and technologies)
3. B — While 802.11n can transmit more than one spatial stream at the same time, the streams are directed to a single address (MIMO). 802.11ac allows for MUMIMO to let an AP send multiple frames to multiple clients at the exact same time (thus allowing the AP to act like a switch instead of just a hub). (Domain: 1.0 Networking Concepts / Subobjective: 1.5 Compare and contrast the characteristics of network topologies, types and technologies)
4. A — Protocols and technologies such as Spanning Tree Protocol (STP) operate at the data link layer. (Domain: 1.0 Networking Concepts / Subobjective: 1.2 Explain devices, applications, protocols, and services at their appropriate OSI layers)
5. D — The command lcd is used within FTP to change the working directory on the local host (cd does it on the remote host). The other command options given are not existent in FTP. (Domain: 1.0 Networking Concepts / Subobjective: 1.1 Explain the purposes and uses of ports and protocols)
6. D — LDAP uses port 389, and LDAPS (secure LDAP) uses port 636. (Domain: 1.0 Networking Concepts / Subobjective: 1.1 Explain the purposes and uses of ports and protocols)
7. B — AAAA records store information for IPv6 (128-bit) addresses. It is most commonly used to map hostnames to an IP address for a host. (Domain: 1.0 Networking Concepts / Subobjective: 1.8 Explain the functions of network services)
8. B — The binary octet value 11001101 converts to a decimal value of 205. (Domain: 1.0 Networking Concepts / Subobjective: 1.4 Given a scenario, configure the appropriate IP addressing components)
9. B — With Variable Length Subnet Masking (VLSM), it is possible to use a different subnet mask for the same network number on different subnets. (Domain: 1.0 Networking Concepts / Subobjective: 1.4 Given a scenario, configure the appropriate IP addressing components)
10. D — The gateway needs an address on the public network (outside the private network) and the most likely value of those given would be 60.4.7.6. (Domain: 1.0 Networking Concepts / Subobjective: 1.4 Given a scenario, configure the appropriate IP addressing components)
11. A — The IPv6 address of 2001:0000:0000:0000:3cde:37d1:3f57:fe93 can be compressed by removing the 0’s to a value of 2001::3cde:37d1:3f57:fe93. (Domain: 1.0 Networking Concepts / Subobjective: 1.4 Given a scenario, configure the appropriate IP addressing components)
12. D — In addition to the tracert command in IPv4, you can get similar functionality in IPv6 with tracert -6 (shown in the figure), traceroute6, and traceroute -6. (Domain: 1.0 Networking Concepts / Subobjective: 1.3 Explain the concepts and characteristics of routing and switching)
13. B — Metric is a measurement of the directness of a route. The lower the metric, the faster the route. If multiple routes exist for data to travel, the one with the lowest metric is chosen. (Domain: 1.0 Networking Concepts / Subobjective: 1.3 Explain the concepts and characteristics of routing and switching)
14. B — The route add command adds a static route to the routing table. The route add command with the -p switch makes the static route persistent. (Domain: 1.0 Networking Concepts / Subobjective: 1.3 Explain the concepts and characteristics of routing and switching)
15. D — A firewall can protect internal networks from public networks and control access between specific network segments. (Domain: 2.0 Infrastructure / Subobjective: 2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them)
Important Update: We have updated our Privacy Policy to comply with the California Consumer Privacy Act (CCPA)