CompTIA Practice Test #2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By LaTasha Stamps
L
LaTasha Stamps
Community Contributor
Quizzes Created: 2 | Total Attempts: 175
Questions: 60 | Attempts: 78

SettingsSettingsSettings
CompTIA Practice Test #2 - Quiz


Questions and Answers
  • 1. 

    You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to troubleshoot the network adapter?

    • A.

      Multimeter

    • B.

      Tone generator and probe

    • C.

      Loopback plug

    • D.

      Cable tester

    Correct Answer
    C. Loopback plug
    Explanation
    A loopback plug is for testing the ability of a network adapter to send and receive. The plug gets plugged into the NIC, and then a loopback test is performed using troubleshooting software. You can then tell whether the card is working properly.

    Rate this question:

  • 2. 

    You have a desktop computer that is about five years old, with a single-channel memory architecture. You want to upgrade the memory. After checking the documentation, you purchase a higher-capacity RAM module that runs at the required bus speed. After you install it, the new RAM is not recognized, but the old RAM is. The computer store tests the RAM and it's fine. What should you try next?

    • A.

       Flash the BIOS

    • B.

      Purchase a second memory module of the same type, and install them as a pair.

    • C.

      Return the memory module and purchase a lower-capacity one.

    • D.

      Replace the motherboard.

    Correct Answer
    A.  Flash the BIOS
    Explanation
    You Answered Correctly!
    That capacity of module might not have been in existence when the motherboard's chipset was released. Sometimes flashing the BIOS is all that is required.

    Rate this question:

  • 3. 

    Which of the following statements accurately explains what happens during the exposing step in the laser printer printing process?

    • A.

      A laser reduces areas of the drum from a strong negative charge to a slight positive charge.

    • B.

      A laser reduces areas of the drum from a strong negative charge to a slight negative charge.

    • C.

      A laser increases areas of the drum from a slight negative charge to a strong negative charge.

    • D.

      A laser increases areas of the drum from a slight positive charge to a strong positive charge.

    Correct Answer
    B. A laser reduces areas of the drum from a strong negative charge to a slight negative charge.
    Explanation
    In the exposing step, the image is written to the photosensitive imaging drum. Wherever the laser beam touches, the photosensitive drum's charge is severely reduced from –600 VDC to a slight negative charge (around –100 VDC). As the drum rotates, a pattern of exposed areas is formed, representing the image to be printed.

    Rate this question:

  • 4. 

    You have a laser printer that is displaying the message “Perform user maintenance.” What should you do to resolve this situation?

    • A.

      Apply a maintenance kit and clear the message.

    • B.

      Use compressed air to blow out the inside of the printer and clear the message.

    • C.

      Turn the printer off and back on again to clear the message.

    • D.

      Replace the toner cartridge and clear the message.4

    Correct Answer
    A. Apply a maintenance kit and clear the message.
    Explanation
    When a laser printer requests maintenance, it's because it has reached a certain page count. Apply a proper maintenance kit (one recommended by the manufacturer) and then clear the service message.

    Rate this question:

  • 5. 

    When setting up a small office, home office (SOHO) network, how do the end-user devices known how to connect?

    • A.

      Network switch broadcasts configuration settings.

    • B.

      Devices utilize service location protocol.

    • C.

      NIC set with static address or be DHCP-served.

    • D.

      End users configure as needed.

    Correct Answer
    C. NIC set with static address or be DHCP-served.
    Explanation
    The end-user devices are configured to at least request a DHCP-assigned IP address or be preconfigured with a static IP, gateway and DNS information.

    Rate this question:

  • 6. 

    Your business employs four graphic designers who need new computers. These designers create graphical content such as advertisements, posters, and full-color brochures. Which of the following components is the least important to enhance in their custom-configured machines?

    • A.

      Hard drive

    • B.

      Processor

    • C.

      Video card

    • D.

      RAM

    Correct Answer
    A. Hard drive
    Explanation
    Graphic design (or CAD/CAM) workstations require solid CPU power, RAM, and a high-end video card. Hard drive storage is the least important upgrade for these types of users.

    Rate this question:

  • 7. 

    A technician needs to purchase a new laptop for a manager. The manager has had several laptops fail and wants her new one to have as few components as possible to reduce the risk of failure. Which type of light source technology does not require an inverter and therefore is a better choice?

    • A.

      OLED

    • B.

      Plasma

    • C.

      Fluorescent

    • D.

      LED

    Correct Answer
    D. LED
    Explanation
    There is no need for laptops with LED displays to convert the DC power coming into the laptop to the AC needed to power traditional fluorescent backlights because LEDs operate on DC power just like the rest of the laptop. Therefore, systems with LED backlights have no inverter board.

    Rate this question:

  • 8. 

    You are consulting with a small field office that needs a dedicated, digital point-to-point network connection to its parent office. Which Internet connection type will meet this requirement?

    • A.

      Dial-up

    • B.

      Cable

    • C.

      DSL

    • D.

       ISDN

    Correct Answer
    D.  ISDN
    Explanation
    Integrated Services Digital Network (ISDN) is a digital, point-to-point network capable of maximum transmission speeds of about 2 Mbps, although speeds of 128 Kbps are more common.

    Rate this question:

  • 9. 

    A technician is looking to buy a new LCD monitor. Which type of LCD monitor has faster response times and is less expensive than others?

    • A.

      TN

    • B.

      IPS

    • C.

      LED

    • D.

      Plasma

    Correct Answer
    A. TN
    Explanation
    The TN will have the fastest response time for this list. The IPS is quick enough for someone interested in gaming, but the LED and plasma monitors would show significant blur or lag when pushed to their limits by fast-moving gameplay.

    Rate this question:

  • 10. 

    You are installing UTP network cable for a client. The client's policies require that network cables do not produce poisonous gas when burned. What type of cable do you need to install?

    • A.

      Plenum

    • B.

      PVC

    • C.

      STP

    • D.

      CAT5e or higher

    Correct Answer
    A. Plenum
    Explanation
    Most network cables are coated with a plastic PVC coating, which produces toxic gas when burned. Plenum-rated cables are coated with a Teflon-like material that is not poisonous when burned.

    Rate this question:

  • 11. 

    What type of server can host files for easy access and fetching, similar to how a web server serves web pages?

    • A.

       FTP server

    • B.

      Proxy server

    • C.

      File server

    • D.

      Web server

    Correct Answer
    A.  FTP server
    Explanation
    The File Transfer Protocol (FTP) server hosts files for easy access, allowing users who are able to browse it to transfer and upload the files.

    Rate this question:

  • 12. 

    What type of front- or top-panel connector uses a standard 3.5 mm jack to make connections?

    • A.

      USB

    • B.

      Audio

    • C.

       FireWire

    • D.

      Thunderbolt

    Correct Answer
    B. Audio
    Explanation
    The audio connector on the front or top panel will use a round, 3.5 mm connector. You can plug speakers into it. Alternatively, you could plug a headset with a boom microphone into it for additional privacy.

    Rate this question:

  • 13. 

    You are installing network cable that will support digital cable television signals. What type of cable should you install?

    • A.

      RG-6

    • B.

      RG-8

    • C.

      RG-58 A/U

    • D.

      RG-59

    Correct Answer
    A. RG-6
    Explanation
    Cable television installations typically use either RG-6 or RG-59 cable. RG-6 is slightly thicker, can run longer distances, and supports digital signals. RG-59 is suited only for analog TV signals.

    Rate this question:

  • 14. 

    You are setting up a small network in your neighbor's house. She is concerned about wireless security, so she doesn't want to use wireless networking at all. She needs to connect two computers to each other, but it will be impossible to run a network cable between them. Which technology can help her network these computers?

    • A.

      Ethernet over power

    • B.

      Power over Ethernet

    • C.

      Firewall

    • D.

      Access point

    Correct Answer
    A. Ethernet over power
    Explanation
    Ethernet over power can make Ethernet connections by using electrical outlets. For it to work, both devices must be on the same electrical circuit.

    Rate this question:

  • 15. 

    You are configuring a wireless 802.11n router for a small network. When setting it up, which security option should you choose?

    • A.

      WPA2

    • B.

      WPA

    • C.

      WEP

    • D.

      SSID

    Correct Answer
    A. WPA2
    Explanation
    Of the wireless encryption methods listed, WPA2 is the newest and most secure. Some routers offer WPA2 Enterprise, which is a great choice as well.

    Rate this question:

  • 16. 

    Which CPU technology allows for the assignment of two logical cores for every physical core present?

    • A.

      Multicore

    • B.

      32-bit vs. 64-bit

    • C.

      Integrated GPU

    • D.

      Hyperthreading

    Correct Answer
    D. Hyperthreading
    Explanation
    Hyperthreading-capable processors appear to the operating system to be two processors. As a result, the operating system can schedule two processes at the same time on each physical core.

    Rate this question:

  • 17. 

    Which type of printing technology uses a heating element to make images on waxy paper?

    • A.

      Laser

    • B.

       Ink-jet

    • C.

      Thermal

    • D.

      Dye sublimation

    Correct Answer
    C. Thermal
    Explanation
    Thermal printers use a heating element. It heats up spots on special waxy, heat-sensitive paper to form the image.

    Rate this question:

  • 18. 

    Which of the following statements regarding IPv4 configuration is true?

    • A.

      All hosts on a network must have a unique subnet mask.

    • B.

      All hosts on a network must have their network ID set to all 1s.

    • C.

       All hosts on a network must have a default gateway.

    • D.

      All hosts on a network must have a unique host address.

    Correct Answer
    A. All hosts on a network must have a unique subnet mask.
    Explanation
    All hosts on a network must have a unique IP address. The subnet mask should be the same for all computers on a local network. The network ID can't be set to all 1s; otherwise, it replicates the subnet mask. Default gateways, or router addresses, are needed only if hosts will communicate with hosts outside their local network.

    Rate this question:

  • 19. 

    Which of the following IP addresses is not a private address and therefore is routable on the Internet?

    • A.

      10.1.2.3

    • B.

      172.18.31.54

    • C.

      172.168.38.155

    • D.

      192.168.38.155

    Correct Answer
    C. 172.168.38.155
    Explanation
    The private IP address ranges are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. The address 172.168.38.155 is outside the private IP address range and is a public address.

    Rate this question:

  • 20. 

    Which of the following connectors transmit analog signals? (Choose two.)

    • A.

      VGA

    • B.

      RJ-45

    • C.

      RJ-11

    • D.

      HDMI

    Correct Answer(s)
    A. VGA
    C. RJ-11
    Explanation
    VGA is an analog video connector, and RJ-11 connectors are used with modems. Modems receive a digital signal from the computer but then modulate that signal to analog to transmit over common phone lines.

    Rate this question:

  • 21. 

    Which of the following printer types are considered impact printers? (Choose two.)

    • A.

      Laser

    • B.

      Daisy-wheel

    • C.

      Dot-matrix

    • D.

      Thermal

    Correct Answer(s)
    B. Daisy-wheel
    C. Dot-matrix
    Explanation
    Daisy-wheel and dot-matrix printers use print heads that strike an ink ribbon, which presses up against the paper to make an image. Therefore, they are impact printers. Laser printers use a drum to create the image, and thermal printers use heat.

    Rate this question:

  • 22. 

    Which step immediately follows the fusing step in the laser printer imaging process?

    • A.

      Processing

    • B.

      Transferring

    • C.

      Exposing

    • D.

      Cleaning

    Correct Answer
    D. Cleaning
    Explanation
    The order of steps is processing, charging, exposing, developing, transferring, fusing, and cleaning.

    Rate this question:

  • 23. 

    What server is accessed each time it's necessary to challenge and validate a user's credentials in order for the user to access a network resource?

    • A.

      Syslog server

    • B.

      Syslog server

    • C.

      Print server

    • D.

      Authentication server

    Correct Answer
    D. Authentication server
    Explanation
    The authentication server facilitates the challenge/response service for validating someone's credentials.

    Rate this question:

  • 24. 

    Which of the following TCP/IP protocols is connection oriented and attempts to guarantee packet delivery?

    • A.

      IP

    • B.

      TCP

    • C.

      UDP

    • D.

      ICMP

    Correct Answer
    B. TCP
    Explanation
    Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

    Rate this question:

  • 25. 

    What form factor for solid-state hard drives has dimensions that mirror the older, platter-type drives?

    • A.

      M.2

    • B.

      PCIe

    • C.

      RPM

    • D.

      2.5"

    Correct Answer
    D. 2.5"
    Explanation
    Solid-state drives (SSDs) come in multiple form factors, such as, for example, a “stick” resembling a memory module or a 2.5″ box housed in metal. SSDs also come in 3.5″ form factor.

    Rate this question:

  • 26. 

    Which type of storage device is composed of a conventional hard drive and a substantial amount of solid-state storage?

    • A.

      SSD

    • B.

      HDD

    • C.

      Mesh

    • D.

      Hybrid

    Correct Answer
    D. Hybrid
    Explanation
    A hybrid hard drive is a combination of a conventional magnetic hard disk drive and solid-state storage. The goal is to increase access speed for commonly accessed data while still providing larger capacity similar to a conventional HDD.

    Rate this question:

  • 27. 

    Which TCP/IP port will an email client use to push email to its email server?

    • A.

      23

    • B.

      25

    • C.

      110

    • D.

      143

    Correct Answer
    B. 25
    Explanation
    Email is pushed from clients to servers using the Simple Mail Transfer Protocol (SMTP). SMTP uses port 25.

    Rate this question:

  • 28. 

    Which motherboard form factor measures 6.7″ × 6.7″?

    • A.

       Mini-ITX

    • B.

      Nano-ITX

    • C.

      Pico-ITX

    • D.

      Mobile-ITX

    Correct Answer
    A.  Mini-ITX
    Explanation
    A mini-ITX motherboard is a 6.7″ square. Nano-ITX motherboards are 4.7″ square, pico-ITX motherboards are 3.9″ × 2.8″, and mobile-ITX motherboards are 2.4″ square.

    Rate this question:

  • 29. 

    Identify the connectors shown here, from left to right.

    • A.

      ST and SC

    • B.

      SC and ST

    • C.

      RJ-49 and RJ-11

    • D.

       RJ-11 and RJ-45

    Correct Answer
    D.  RJ-11 and RJ-45
    Explanation
    The connectors are a four-pin RJ-11, typically used for telephone installations, and an eight-pin RJ-45 connector, used on UTP and STP for network transmissions.

    Rate this question:

  • 30. 

    Which TCP/IP protocol is designed to help resolve hostnames to IP addresses?

    • A.

      ARP

    • B.

      RARP

    • C.

      DHCP

    • D.

      DNS

    Correct Answer
    D. DNS
    Explanation
    The Domain Name System (DNS) is responsible for resolving hostnames to IP addresses. This is used millions of times daily on the Internet; when someone types in a website name, such as www.sybex.com, DNS will resolve that to an IP address to enable communication.

    Rate this question:

  • 31. 

    You need to configure a wireless router for an office network. The office manager wants new devices to be able to automatically join the network and announce their presence to other networked devices. Which service should you enable to allow this?

    • A.

      DHCP

    • B.

      NAT

    • C.

      NAT

    • D.

      UPnP

    Correct Answer
    D. UPnP
    Explanation
    Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and to enable those devices to automatically announce their presence to other devices on the network.

    Rate this question:

  • 32. 

    You are installing network cabling in a drop ceiling of an office space. The ceiling area is used to circulate breathable air. What type of cable do you need to install?

    • A.

      Coaxial

    • B.

      UTP

    • C.

      Fiber-optic

    • D.

      Plenum

    Correct Answer
    D. Plenum
    Explanation
    The cable can be any of the three major types, coaxial, twisted pair, or fiber, but it needs to be plenum rated. Normal cables have a PVC coating, which produces a poisonous gas when burned. Plenum-rated cables have a Teflon coating, which is not toxic when burned.

    Rate this question:

  • 33. 

    If you are connecting to a website that encrypts its connection using TLS, what port does that traffic travel on?

    • A.

      21

    • B.

      80

    • C.

      143

    • D.

      443

    Correct Answer
    D. 443
    Explanation
    To encrypt traffic between a web server and client securely, Hypertext Transfer Protocol Secure (HTTPS) can be used. HTTPS connections are secured using either Secure Sockets Layer (SSL) or Transport Layer Security (TLS). HTTPS uses port 443.

    Rate this question:

  • 34. 

    What 9-pin connector type was commonly used for keyboards, mice, or game controllers before USB became popular?

    • A.

      SCSI

    • B.

      PS/2

    • C.

      DB9

    • D.

      Lightning

    Correct Answer
    C. DB9
    Explanation
    DB9 was the “D” format, 9-pin connector type that was the standard format for keyboards, mice, and other small peripherals.

    Rate this question:

  • 35. 

    Which of the following statements are not true regarding CPUs and operating systems? (Choose two.)

    • A.

      A 32-bit OS can run only on a 32-bit CPU.

    • B.

       A 64-bit OS can run only on a 64-bit CPU.

    • C.

      A 64-bit OS can run on a 32-bit CPU or a 64-bit CPU.

    • D.

      A 32-bit OS can run on a 32-bit CPU or a 64-bit CPU.

    Correct Answer(s)
    A. A 32-bit OS can run only on a 32-bit CPU.
    C. A 64-bit OS can run on a 32-bit CPU or a 64-bit CPU.
    Explanation
    A 32-bit OS can run on either a 32-bit or 64-bit processor, although you will not be able to fully utilize the 64-bit processor's capabilities with a 32-bit OS. A 64-bit OS will run only on a 64-bit processor.

    Rate this question:

  • 36. 

    A senior administrator calls you and tells you that she is working from home and trying to use RDP, but it won't connect. What port do you need to ensure is open on the firewall to grant her access?

    • A.

      143

    • B.

      443

    • C.

      548

    • D.

      3389

    Correct Answer
    D. 3389
    Explanation
    The Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. It uses port 3389.

    Rate this question:

  • 37. 

    What is the role of the server responsible for publishing information about the company's values, purpose, and available products or services to the public?

    • A.

      FTP server

    • B.

      Proxy server

    • C.

      File server

    • D.

      Web server

    Correct Answer
    D. Web server
    Explanation
    The web server hosts and serves information available to the public (or internally as an intranet web server). Originally, files on the web server would be primarily HTML files, but today's web servers would also serve style sheets, scripts, and various media files.

    Rate this question:

  • 38. 

    What is the maximum data rate for a USB 2.0 connection?

    • A.

      12 Mbps

    • B.

      480 Mbps

    • C.

      1 Gbps

    • D.

      5 Gbps

    Correct Answer
    B. 480 Mbps
    Explanation
    USB 1.0 supports 12 Mbps. In following standards, USB 2.0 supports 480 Mbps, USB 3.0 supports 5 Gbps and USB 3.1 Gen 2 supports 10 Gbps.

    Rate this question:

  • 39. 

    Which networking device is capable of reading IP addresses and forwarding packets based on the destination IP address?

    • A.

      Hub

    • B.

      Switch

    • C.

      Bridge

    • D.

       Router

    Correct Answer
    D.  Router
    Explanation
    Routers operate at the Network layer (Layer 3) of the OSI model. Because of this, they make their decisions on what to do with traffic based on logical addresses, such as an IP address.

    Rate this question:

  • 40. 

    Identify the type of cable connector shown here.

    • A.

      F-connector

    • B.

      BNC

    • C.

      SC

    • D.

      ST

    Correct Answer
    B. BNC
    Explanation
    The connector pictured is a BNC connector. They are identifiable by their groove-and-notch fastening mechanism that locks by twisting one-quarter turn. F-connectors are easily identifiable because they are threaded. SC and ST connectors are for fiber-optic cable.

    Rate this question:

  • 41. 

    Which CPU architecture term describes a CPU with multiple physical processor dies in the same package?

    • A.

      Multicore

    • B.

      64-bit

    • C.

      Integrated GPU

    • D.

      Hyperthreading

    Correct Answer
    A. Multicore
    Explanation
    A processor that exhibits a multicore architecture has multiple completely separate processor dies in the same package. The operating system and applications see multiple processors in the same way that they see multiple processors in separate sockets.

    Rate this question:

  • 42. 

    Your manager is excited because he just purchased a fast USB 3.0 external hard drive for his work team. He wants to set it in the middle of the cubicles and let everyone have access to it. Some of the cubicles are about 15 feet away from each other. What is the recommended maximum cable length for this type of device?

    • A.

      3 meters

    • B.

      5 meters

    • C.

      10 meters

    • D.

      15 meters

    Correct Answer
    A. 3 meters
    Explanation
    USB 3.0 has a cable length limitation of 3 meters. USB 2.0 cables can be up to 5 meters in length.

    Rate this question:

  • 43. 

    When printing, which component is responsible for converting the data being printed into the format that the printer can understand?

    • A.

      PDL

    • B.

      Printer driver

    • C.

      Print feeder

    • D.

      Print spooler

    Correct Answer
    B. Printer driver
    Explanation
    The printer driver uses a page-description language (PDL) to convert the data being printed into the format that the printer can understand. The driver also ensures that the printer is ready to print.

    Rate this question:

  • 44. 

    Which component in a laser printer is responsible for heating up and melting the toner into the paper to create a permanent image?

    • A.

      Transfer corona assembly

    • B.

      Pickup rollers

    • C.

      Exit assembly

    • D.

      Fuser assembly

    Correct Answer
    D. Fuser assembly
    Explanation
    Laser printers incorporate a fuser assembly, which uses two rollers that apply pressure and heat to fuse the plastic toner particles to the paper.

    Rate this question:

  • 45. 

    What connectivity technique can ensure that your network traffic is encrypted from endpoint to endpoint?

    • A.

      VPN

    • B.

      VLAN

    • C.

      BGP

    • D.

      EIGRP

    Correct Answer
    A. VPN
    Explanation
    A virtual private network (VPN) can encrypt your network traffic, keeping your data confidential along the wire.

    Rate this question:

  • 46. 

    You are installing network cabling in a highly secure facility. The cables need to be immune to electronic eavesdropping. What type of cable should you use?

    • A.

      Fiber-optic

    • B.

      UTP

    • C.

      STP

    • D.

      Coaxial

    Correct Answer
    A. Fiber-optic
    Explanation
    Fiber-optic cabling uses pulses of light instead of electric voltages to transmit data, so it is immune to electrical interference and to wiretapping.

    Rate this question:

  • 47. 

    Which TCP/IP host-to-host protocol makes its best effort to deliver data but does not guarantee it?

    • A.

      IP

    • B.

      TCP

    • C.

      UDP

    • D.

      ICMP

    Correct Answer
    C. UDP
    Explanation
    The two host-to-host protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and UDP does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

    Rate this question:

  • 48. 

    You wish to protect your system from someone not authorized to start the OS. What is your best option?

    • A.

      Password protect the locked screen.

    • B.

      Password protect in the BIOS/UEFI settings.

    • C.

       Encrypt the hard drive.

    • D.

      Use a 12-character login password.

    Correct Answer
    B. Password protect in the BIOS/UEFI settings.
    Explanation
    The system BIOS/UEFI settings include password protection to not allow system bootup unless someone enters a password. This would prohibit the OS from loading upon boot.

    Rate this question:

  • 49. 

    Which of the following network devices receives network traffic and makes a decision on whether to send it on based on the destination hardware address?

    • A.

      Hub

    • B.

      Bridge

    • C.

      Access point

    • D.

      Repeater

    Correct Answer
    B. Bridge
    Explanation
    Because bridges work at the Data Link layer, they are aware of only hardware (MAC) addresses. They are not aware of and do not deal with IP addresses. Bridges are more intelligent than repeaters, but they are unable to move data across multiple networks simultaneously.

    Rate this question:

  • 50. 

    A technician installed a UTP splitter on one of your network segments that has CAT6e cable. What is the maximum speed supported by this connection?

    • A.

      10 Mbps

    • B.

      100 Mbps

    • C.

      1 Gbps

    • D.

      10 Gbps

    Correct Answer
    B. 100 Mbps
    Explanation
    An Ethernet splitter will take the incoming signal on two pairs and then split it, so on the output end it produces two sets of signals using two pairs each. Because of this, Ethernet splitters are limited to 100 Mbps connections. It is not recommended that you use Ethernet splitters on a network. If you need to connect multiple computers using UTP, use a hub or a switch.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 21, 2020
    Quiz Created by
    LaTasha Stamps
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.