Network + 1 - 50

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Pocho
P
Pocho
Community Contributor
Quizzes Created: 2 | Total Attempts: 980
Questions: 49 | Attempts: 255

SettingsSettingsSettings
Network Plus Quizzes & Trivia

If you are studying for your Network + certification and as a result looking for a resources to help you study, look no further as the quiz below is all you need. Take it up and all the best.


Questions and Answers
  • 1. 

    You work as the network administrator at CompTIA.com. The CompTIA.com management wants you to connect the clients to a news server with a suitable protocol. What should you do?

    • A.

      You should consider using NNTP.

    • B.

      You should consider using NCP

    • C.

      You should consider using SMTP.

    • D.

      You should consider using IMAP4.

    Correct Answer
    A. You should consider using NNTP.
    Explanation
    NNTP (Network News Transfer Protocol) is a suitable protocol for connecting clients to a news server. NNTP is specifically designed for distributing, querying, and retrieving news articles and is commonly used for accessing Usenet newsgroups. SMTP (Simple Mail Transfer Protocol) is used for sending and receiving emails. NCP (NetWare Core Protocol) is a protocol used in Novell NetWare networks for communication between clients and servers. IMAP4 (Internet Message Access Protocol version 4) is used for retrieving emails from a mail server. Therefore, NNTP is the most appropriate protocol for connecting clients to a news server in this scenario.

    Rate this question:

  • 2. 

    You work as the network administrator at CompTIA.com. You have received instruction to make use of a protocol to transmit usernames and passwords as clear text. What should you do?

    • A.

      You should consider using SSH.

    • B.

      You should consider using RADIUS.

    • C.

      You should consider using PAP.

    • D.

      You should consider using CHAP.

    Correct Answer
    C. You should consider using PAP.
    Explanation
    PAP (Password Authentication Protocol) is a protocol that transmits usernames and passwords as clear text. It is an older and less secure authentication method compared to others like CHAP (Challenge Handshake Authentication Protocol) or SSH (Secure Shell). However, if the instruction specifically asks for clear text transmission, PAP would be the appropriate choice.

    Rate this question:

  • 3. 

    You work as the network administrator at CompTIA.com. A new CompTIA.com technician wants to know which protocols are needed for E-mail traffic. What should you tell him? (Choose THREE)

    • A.

      You should inform the technician that he can use POP3.

    • B.

      You should inform the technician that he can use SNMP.

    • C.

      You should inform the technician that he can use SMTP.

    • D.

      You should inform the technician that he can use NTP.

    • E.

      You should inform the technician that he can use IMAP4.

    Correct Answer(s)
    A. You should inform the technician that he can use POP3.
    C. You should inform the technician that he can use SMTP.
    E. You should inform the technician that he can use IMAP4.
  • 4. 

    You work as the network administrator at CompTIA.com. CompTIA.com uses different operating systems in the company. You have given the instruction to use a protocol to authenticate resources which will include computers, users and printers. What should you do?

    • A.

      You should consider using the LDAP protocol.

    • B.

      You should consider using the SMTP protocol.

    • C.

      You should consider using the TCP protocol.

    • D.

      You should consider using the UDP protocol.

    Correct Answer
    A. You should consider using the LDAP protocol.
    Explanation
    LDAP stands for Lightweight Directory Access Protocol. It is a protocol used for accessing and maintaining distributed directory information services over an IP network. In this scenario, the network administrator at CompTIA.com needs a protocol to authenticate resources such as computers, users, and printers. LDAP is commonly used for authentication and authorization purposes in network environments. It provides a centralized directory service that allows for efficient and secure authentication of users and devices. Therefore, using the LDAP protocol would be a suitable choice in this situation.

    Rate this question:

  • 5. 

    You work as the network administrator at CompTIA.com. A new CompTIA.com technician wants to know which authentication protocols can be uses to transmit plain text passwords over the internet. What should you reply?

    • A.

      You should consider using RADIUS.

    • B.

      You should consider using PAP.

    • C.

      You should consider using CHAP.

    • D.

      You should consider using Kerberos.

    Correct Answer
    B. You should consider using PAP.
    Explanation
    PAP (Password Authentication Protocol) is an authentication protocol that can be used to transmit plain text passwords over the internet. It is a simple and insecure authentication method that sends the password in clear text format, making it vulnerable to interception and unauthorized access. Despite its lack of security, PAP is still used in some legacy systems or situations where security is not a major concern.

    Rate this question:

  • 6. 

    You work as the network administrator at CompTIA.com. A new CompTIA.com technician wants to know which of the following a  connection oriented protocol is. What should you reply?

    • A.

      The UDP can be class as a connection oriented protocol.

    • B.

      The SPX can be class as a connection oriented protocol.

    • C.

      The TCP can be class as a connection oriented protocol.

    • D.

      The IP can be class as a connection oriented protocol.

    Correct Answer
    C. The TCP can be class as a connection oriented protocol.
    Explanation
    The TCP (Transmission Control Protocol) can be classified as a connection-oriented protocol. This is because TCP establishes a connection between the sender and receiver before transmitting data, ensuring reliable and ordered delivery. It provides features such as error checking, flow control, and congestion control to ensure data integrity and efficient transmission. UDP (User Datagram Protocol) is a connectionless protocol, while SPX (Sequenced Packet Exchange) and IP (Internet Protocol) are also connectionless protocols.

    Rate this question:

  • 7. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know which network protocol has the ability to recover from lost/corrupted network packets during transmission. What would your reply be?

    • A.

      You should inform the trainee that the Internet Protocol Security (IPSec) protocol has the ability.

    • B.

      You should inform the trainee that the Internetwork Packet Exchange (IPX) protocol has the ability.

    • C.

      You should inform the trainee that the Kerberos protocol has the ability.

    • D.

      You should inform the trainee that the Transmission Control Protocol (TCP) protocol has the ability.

    Correct Answer
    D. You should inform the trainee that the Transmission Control Protocol (TCP) protocol has the ability.
    Explanation
    The correct answer is that the Transmission Control Protocol (TCP) protocol has the ability to recover from lost/corrupted network packets during transmission. TCP uses a system of acknowledgments and retransmissions to ensure that all packets are successfully delivered. If a packet is lost or corrupted, TCP will request for it to be resent, ensuring reliable data transmission.

    Rate this question:

  • 8. 

    You work as a network technician at CompTIA.com. A CompTIA.com sales representative uses his operating system at home which is connected to the Internet 24/7. During a meeting at work, he contacted you because he was unable to connect to his computer at home that has an IP address of 192.168.1.125. What could be the cause?

    • A.

      The outgoing connects of CompTIA.com is blocked by a firewall.

    • B.

      The computer at work does not have FTP client installed.

    • C.

      The computer at the sales representative's house does not have the FTP server installed.

    • D.

      The computer at home does not have a routable IP address across the Internet.

    Correct Answer
    D. The computer at home does not have a routable IP address across the Internet.
    Explanation
    The sales representative is unable to connect to his computer at home because the computer does not have a routable IP address across the Internet. This means that the IP address assigned to the computer is not recognized or accessible outside of the local network. This could be due to various reasons such as the router at home not properly configured for port forwarding or the ISP not providing a public IP address. As a result, the computer cannot establish a connection from outside the local network.

    Rate this question:

  • 9. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know takes place at the application layer of the OSI model. What should you reply?

    • A.

      UDP takes place at the application layer of the OSI model.

    • B.

      FTP takes place at the application layer of the OSI model.

    • C.

      TCP takes place at the application layer of the OSI model.

    • D.

      SPX takes place at the application layer of the OSI model.

    Correct Answer
    B. FTP takes place at the application layer of the OSI model.
    Explanation
    FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. It operates at the application layer of the OSI model, which is responsible for providing network services to user applications. FTP allows users to authenticate themselves with a username and password, browse directories, and transfer files between the client and server. Other protocols mentioned, such as UDP, TCP, and SPX, operate at lower layers of the OSI model and are not specifically designed for file transfer.

    Rate this question:

  • 10. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know which protocol has the ability to access files on a remote server. What should you reply?

    • A.

      The ARP protocols can access files on a remote server.

    • B.

      The SIP protocols can access files on a remote server.

    • C.

      The FTP protocols can access files on a remote server.

    • D.

      The NTP protocols can access files on a remote server.

    Correct Answer
    C. The FTP protocols can access files on a remote server.
    Explanation
    FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. It allows users to access and manipulate files on a remote server. Therefore, the correct answer is that the FTP protocols can access files on a remote server.

    Rate this question:

  • 11. 

    Which of the following statements is TRUE regarding the network protocol which makes use of the File Transfer Protocol (FTP) protocol?

    • A.

      The Transmission Control Protocol / Internet Protocol (TCP/IP) would make use of the protocol.

    • B.

      You should know that the IPSec protocol would make use of the File Transfer Protocol (FTP) protocol.

    • C.

      You should know that the Kerberos protocol also make use of the FTP protocol.

    • D.

      You should know that the Network Basic Extended User Interface (NetBEUI)

    Correct Answer
    A. The Transmission Control Protocol / Internet Protocol (TCP/IP) would make use of the protocol.
    Explanation
    The correct answer is that the Transmission Control Protocol / Internet Protocol (TCP/IP) would make use of the protocol. This means that TCP/IP, which is the standard protocol suite for internet communication, utilizes the File Transfer Protocol (FTP) protocol. FTP is commonly used for transferring files over a network, and TCP/IP is responsible for ensuring reliable and efficient communication between devices on the internet.

    Rate this question:

  • 12. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know which protocol at the transport layer of the OSI model is the best choice for a delivery method. What should you reply?

    • A.

      The UDP protocol.

    • B.

      The HTTP protocol.

    • C.

      The TCP protocol.

    • D.

      The FTP protocol.

    Correct Answer
    A. The UDP protocol.
    Explanation
    The UDP (User Datagram Protocol) is the best choice for a delivery method at the transport layer of the OSI model because it is a connectionless protocol that provides fast and efficient delivery of data packets. It is commonly used for applications that require real-time communication or where speed is more important than reliability, such as streaming media or online gaming. Unlike TCP, UDP does not provide error checking or retransmission of lost packets, making it a lighter-weight option for certain types of applications.

    Rate this question:

  • 13. 

    You work as a network technician at CompTIA.com. You have been given the instruction to use a connectionless state protocol that does not use acknowledgements. What should you do?

    • A.

      You should consider using POP3.

    • B.

      You should consider using UDP.

    • C.

      You should consider using NTP.

    • D.

      You should consider using TCP.

    Correct Answer
    B. You should consider using UDP.
    Explanation
    UDP (User Datagram Protocol) is a connectionless state protocol that does not use acknowledgements. It is commonly used for applications that require fast and efficient communication, such as streaming media, online gaming, and VoIP. Unlike TCP, UDP does not establish a connection before sending data and does not guarantee delivery or order of packets. This makes UDP a suitable choice when real-time communication is more important than reliability. Therefore, considering the given requirements, using UDP would be the appropriate choice.

    Rate this question:

  • 14. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know which transfer methods transfer files with the use of User Datagram Protocol (UDP). What would your reply be?

    • A.

      You should know that the IPSec protocol would use the UDP protocol.

    • B.

      You should know that the Trivial File Transfer Protocol (TFTP) would use the UDP protocol.

    • C.

      You should know that the Kerberos protocol would make use of the UDP protocol.

    • D.

      You should know that the File Transfer Protocol (FTP) protocol would use the UDP protocol.

    Correct Answer
    B. You should know that the Trivial File Transfer Protocol (TFTP) would use the UDP protocol.
    Explanation
    The correct answer is that the Trivial File Transfer Protocol (TFTP) uses the UDP protocol. TFTP is a simple file transfer protocol that is often used for booting operating systems or transferring configuration files in network devices. UDP is a connectionless protocol that provides fast and lightweight communication, making it suitable for applications like TFTP where speed is more important than reliability.

    Rate this question:

  • 15. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know which of the following forms part of the TCP/IP protocol suite. What should you reply?

    • A.

      The UDP forms part of the TCP/IP protocol suite.

    • B.

      The IPX forms part of the TCP/IP protocol suite.

    • C.

      The NetBEUI forms part of the TCP/IP protocol suite.

    • D.

      The SPX forms part of the TCP/IP protocol suite.

    Correct Answer
    A. The UDP forms part of the TCP/IP protocol suite.
    Explanation
    UDP (User Datagram Protocol) is indeed a part of the TCP/IP protocol suite. TCP/IP is a set of protocols that allows communication between devices over a network. UDP is a connectionless protocol that is used for sending datagrams (packets) of data without the need for establishing a connection. It is commonly used for applications that require fast and efficient communication, such as streaming media or online gaming.

    Rate this question:

  • 16. 

    You work as a network technician at CompTIA.com. A CompTIA.com user named Mia Hamm has the following complain. She has pinged the following: 127.0.0.1 and received the following message: Unable to contact IP driver, error code 2. What should you do?

    • A.

      You should consider flushing the DNS Cache.

    • B.

      You should consider installing the NetBEUI.

    • C.

      You should consider releasing the IP address.

    • D.

      You should consider installing the TCP/IP protocol.

    Correct Answer
    D. You should consider installing the TCP/IP protocol.
    Explanation
    The user received the message "Unable to contact IP driver, error code 2" when pinging the loopback address (127.0.0.1). This indicates that the TCP/IP protocol is not installed or functioning properly on the user's system. Therefore, the correct action to take is to consider installing the TCP/IP protocol.

    Rate this question:

  • 17. 

    Which of the following statements describes the TCP/IP configuration of a Windows XP Professional computer that has a TCP/IP address of 169.254.1.37?

    • A.

      The computer has been configured with a static address of 169.254.1.37.

    • B.

      The computer is set for DHCP, but no DHCP server is available on the network.

    • C.

      The computer received the address from a DHCP server on the network.

    • D.

      The computer received the address from a BootP server on the network.

    Correct Answer
    B. The computer is set for DHCP, but no DHCP server is available on the network.
    Explanation
    The given TCP/IP address of 169.254.1.37 falls within the range of APIPA (Automatic Private IP Addressing) addresses, which are assigned automatically by Windows when a DHCP server is unavailable. This indicates that the computer is set for DHCP but cannot obtain an IP address from a DHCP server on the network. Therefore, the correct answer is "The computer is set for DHCP, but no DHCP server is available on the network."

    Rate this question:

  • 18. 

    You work as a network technician at CompTIA.com. You have just completed the installation of a basic router for the SOHO network. However, the computer connected to the router is unable to get an IP address. What should you do?

    • A.

      You should consider configuring NAT correctly.

    • B.

      You should consider configuring DHCP correctly.

    • C.

      You should consider configuring WINS correctly.

    • D.

      You should consider configuring DNS correctly.

    Correct Answer
    B. You should consider configuring DHCP correctly.
    Explanation
    The computer connected to the router is unable to get an IP address, indicating that the issue lies with the allocation of IP addresses. DHCP (Dynamic Host Configuration Protocol) is responsible for automatically assigning IP addresses to devices on a network. Therefore, configuring DHCP correctly would resolve the problem by ensuring that the computer receives a valid IP address. NAT (Network Address Translation) is used for translating IP addresses between different networks, WINS (Windows Internet Naming Service) is used for resolving NetBIOS names to IP addresses, and DNS (Domain Name System) is used for resolving domain names to IP addresses. While these services are important for network functionality, they are not directly related to the computer's inability to obtain an IP address.

    Rate this question:

  • 19. 

    Which of the following statements is TRUE regarding a small remote office network unable to access the home office network which requires the clients to obtain IP addresses by selecting the protocol which should be enabled?

    • A.

      You should have the Simple Mail Transfer Protocol (SMTP) protocol enabled.

    • B.

      You should have the Trivial File Transfer Protocol (TFTP) protocol enabled.

    • C.

      You should have the Dynamic Host Configuration Protocol (DHCP) enabled.

    • D.

      You should have the Secure Socket Layer (SSL) extensions enabled.

    Correct Answer
    C. You should have the Dynamic Host Configuration Protocol (DHCP) enabled.
    Explanation
    The small remote office network is unable to access the home office network because the clients are not obtaining IP addresses. Enabling the Dynamic Host Configuration Protocol (DHCP) will allow the clients to automatically obtain IP addresses, which will enable them to connect to the home office network.

    Rate this question:

  • 20. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know which protocol is used by the UDP ports. What should you reply?

    • A.

      RIPv2 is used for the UDP ports.

    • B.

      HTTP is used for the UDP ports.

    • C.

      HTTPS is used for the UDP ports.

    • D.

      TFTP is used for the UDP ports.

    Correct Answer
    D. TFTP is used for the UDP ports.
    Explanation
    TFTP (Trivial File Transfer Protocol) is a protocol that uses UDP (User Datagram Protocol) for communication. UDP is a connectionless protocol that does not require a handshake or error checking, making it faster but less reliable than TCP. TFTP is commonly used for transferring small files, such as firmware updates or configuration files, over a network. Therefore, the correct answer is TFTP is used for the UDP ports.

    Rate this question:

  • 21. 

    You work as a network technician at CompTIA.com. The CompTIA.com user wants to know which protocol/protocols has the fastest file transfers. What would your reply be?

    • A.

      The Simple Mail Transfer Protocol (SMTP) protocol has the fastest file transfers.

    • B.

      The Password Authentication Protocol (PAP) protocol has the fastest file transfers.

    • C.

      The Secure File Transfer Protocol (SFTP) protocol has the fastest file transfers.

    • D.

      The Trivial File Transfer Protocol (TFTP) protocol has the fastest file transfers.

    Correct Answer
    D. The Trivial File Transfer Protocol (TFTP) protocol has the fastest file transfers.
    Explanation
    The Trivial File Transfer Protocol (TFTP) protocol has the fastest file transfers. TFTP is a lightweight protocol that is designed for simple and fast file transfers. It does not have the advanced features and security measures of other protocols like SMTP, PAP, and SFTP, but it is optimized for speed and efficiency. TFTP is commonly used for booting devices over a network or transferring small files in environments where speed is prioritized over security or reliability.

    Rate this question:

  • 22. 

    You have a network that is connected to the Internet for only maintenance purposes. You place a firewall between your network and they Internet. You configure the firewall to permit only UDP traffic. Which network file transfer protocol will be able to pass through the firewall?

    • A.

      NNTP

    • B.

      IRTF

    • C.

      SNMP

    • D.

      TFTP

    Correct Answer
    D. TFTP
    Explanation
    TFTP (Trivial File Transfer Protocol) will be able to pass through the firewall because it uses UDP (User Datagram Protocol) for communication. The firewall is configured to permit only UDP traffic, so TFTP, which is a UDP-based protocol, will be allowed to pass through. NNTP (Network News Transfer Protocol), IRTF (Internet Research Task Force), and SNMP (Simple Network Management Protocol) use TCP (Transmission Control Protocol) for communication, so they will not be able to pass through the firewall.

    Rate this question:

  • 23. 

    You work as a network technician at CompTIA.com. You have received numerous complaints from the users at CompTIA.com. The complaints state that they cannot connect to the server. The server is using FQDN. What should you do?

    • A.

      You should consider enabling WINS.

    • B.

      You should consider enabling NetBIOS.

    • C.

      You should consider enabling DNS.

    • D.

      You should consider enabling DHCP.

    Correct Answer
    C. You should consider enabling DNS.
    Explanation
    Enabling DNS (Domain Name System) would be the appropriate solution in this scenario. DNS is responsible for translating domain names into IP addresses, allowing users to connect to the server using its FQDN (Fully Qualified Domain Name). If the users are unable to connect to the server, it suggests that the DNS resolution is not functioning correctly. By enabling DNS, the server will be able to resolve the FQDN and establish the connection with the users.

    Rate this question:

  • 24. 

    You work as a network technician at CompTIA.com. You have received instruction from management to allow the users to use a FQDN as a replacement for the IP address. What should you do?

    • A.

      You should consider using the DNS protocol.

    • B.

      You should consider using the WINS protocol.

    • C.

      You should consider using the IMAP4protocol.

    • D.

      You should consider using the FTP protocol.

    Correct Answer
    A. You should consider using the DNS protocol.
    Explanation
    The DNS (Domain Name System) protocol is used to translate domain names into IP addresses. By allowing users to use a Fully Qualified Domain Name (FQDN) as a replacement for the IP address, the DNS protocol can be utilized to resolve the domain name to its corresponding IP address. This allows for easier and more user-friendly access to network resources without the need to remember and input complex IP addresses. Therefore, using the DNS protocol is the appropriate solution in this scenario.

    Rate this question:

  • 25. 

    You work as a network technician at CompTIA.com. A CompTIA.com user has complaint that she cannot ping the server by the FQDN, but she can ping the server by using the IP address. What should you do?

    • A.

      You should make sure that WINS is configured.

    • B.

      You should make sure that DNS is configured.

    • C.

      You should make sure that MAC address is right.

    • D.

      You should make sure that IP address is right.

    Correct Answer
    B. You should make sure that DNS is configured.
    Explanation
    The user's complaint suggests that there is an issue with resolving the server's FQDN (Fully Qualified Domain Name) to its IP address. This indicates a problem with the DNS (Domain Name System) configuration, as DNS is responsible for translating domain names to IP addresses. Therefore, the correct action would be to ensure that DNS is properly configured.

    Rate this question:

  • 26. 

    You work as a network technician at CompTIA.com. Management complained that they can connect to the company server via remote, but they cannot access the directories of thee other server from that server. However, they can ping the other servers by using the IP address. What should you do?

    • A.

      You should make sure the server does not use a different address.

    • B.

      You should configure the DNS correctly.

    • C.

      You should make sure the server is not on a different VLAN.

    • D.

      You should make sure the DHCP is correctly configured.

    Correct Answer
    B. You should configure the DNS correctly.
    Explanation
    The correct answer is to configure the DNS correctly. This is because the management is able to connect to the company server via remote, indicating that the network connectivity is functioning properly. However, they cannot access the directories of the other server, which suggests that there may be an issue with resolving the server names to their corresponding IP addresses. By configuring the DNS correctly, the server names will be properly resolved, allowing access to the directories on the other server.

    Rate this question:

  • 27. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know the highest level of fault tolerance after reconfiguring a server to facilitate DNS requests. What should you reply?

    • A.

      He should consider adding a Kerberos server.

    • B.

      He should consider configuring traffic shaping.

    • C.

      He should consider configuring the WEP.

    • D.

      He should consider adding a second NIC.

    Correct Answer
    D. He should consider adding a second NIC.
    Explanation
    Adding a second NIC (Network Interface Card) would provide the highest level of fault tolerance after reconfiguring a server to facilitate DNS requests. By having two NICs, the server can have redundant network connections, ensuring that if one NIC fails, the other can still handle the DNS requests. This increases the server's reliability and minimizes the risk of downtime or service disruption.

    Rate this question:

  • 28. 

    You work as a network technician at CompTIA.com. You have received instruction from management to map the names to IP address. What should you do?

    • A.

      He should consider using IMAP4.

    • B.

      He should consider using DHCP.

    • C.

      He should consider using DNS.

    • D.

      He should consider using Telnet.

    Correct Answer
    C. He should consider using DNS.
    Explanation
    The network technician should consider using DNS (Domain Name System) to map names to IP addresses. DNS is a system that translates domain names (such as www.example.com) into IP addresses (such as 192.168.1.1) so that computers can communicate with each other over the internet. By using DNS, the technician can easily manage and update the mapping of names to IP addresses, ensuring that the network operates smoothly and efficiently. IMAP4 is a protocol used for email retrieval, DHCP is used for assigning IP addresses dynamically, and Telnet is a protocol used for remote access to devices, none of which are directly related to mapping names to IP addresses.

    Rate this question:

  • 29. 

    Which of the following statements is TRUE regarding the protocol which makes use of Domain Name Resolution (DNS) to find addresses?

    • A.

      The Transmission Control Protocol / Internet Protocol (TCP/IP) makes use of DNS to find addresses.

    • B.

      The Trivial File Transfer Protocol (TFTP) protocol makes use of DNS to find addresses.

    • C.

      The Kerberos protocol makes use of DNS to find addresses.

    • D.

      The Internetwork Packet Exchange / Sequence Packet Exchange (IPX/SPX) protocol makes use of DNS to find addresses.

    Correct Answer
    A. The Transmission Control Protocol / Internet Protocol (TCP/IP) makes use of DNS to find addresses.
    Explanation
    The correct answer is that the Transmission Control Protocol / Internet Protocol (TCP/IP) makes use of DNS to find addresses. DNS is a protocol used to translate domain names into IP addresses, allowing devices to locate and communicate with each other on a network. TCP/IP is the foundational protocol suite for the internet and relies on DNS to resolve domain names to IP addresses for successful communication.

    Rate this question:

  • 30. 

    You cannot reach a web site on a host computer but you can ping the host name and Telnet to the host name. What is the source of the problem?

    • A.

      The host does not have a DNS entry

    • B.

      The host HTTP is down.

    • C.

      The host does not have a WINS entry.

    • D.

      The host is down.

    Correct Answer
    B. The host HTTP is down.
    Explanation
    The given scenario suggests that the host computer is not accessible through a web browser, but it can still be reached using ping and Telnet commands. This indicates that the host's HTTP service is not functioning properly or is down. The other options (lack of DNS entry, lack of WINS entry, and the host being down) can be ruled out since the host name can be pinged and Telnet can establish a connection, indicating that the host is reachable. Therefore, the most likely source of the problem is that the host's HTTP service is down.

    Rate this question:

  • 31. 

    Which of the following statements is TRUE regarding network users who are unable to access a web site on a host computer but are capable of pinging the hostname and Telnet to the host name?

    • A.

      You should check if the computer has a DHCP leased IP address.

    • B.

      You should check if the host Hyper Text Transfer Protocol (HTTP) protocol is down.

    • C.

      You should check if the local DNS server is properly configured.

    • D.

      You should ensure that the host computer is down.

    Correct Answer
    B. You should check if the host Hyper Text Transfer Protocol (HTTP) protocol is down.
    Explanation
    If network users are able to ping the hostname and Telnet to the host name but unable to access the website, it suggests that the network connectivity is fine and the issue lies with the HTTP protocol. This means that the web server or the HTTP service on the host computer may be down or not functioning properly. Therefore, checking if the host Hyper Text Transfer Protocol (HTTP) protocol is down would be the appropriate step to identify and resolve the issue.

    Rate this question:

  • 32. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know which of the following will be able to list the MAC addresses. What should you reply?

    • A.

      He should consider using arp.

    • B.

      He should consider pinging.

    • C.

      He should consider digging.

    • D.

      He should consider using nbtstat.

    Correct Answer
    A. He should consider using arp.
    Explanation
    The correct answer is "He should consider using arp." The Address Resolution Protocol (ARP) is used to map an IP address to a MAC address in a local network. By using ARP, the trainee will be able to list the MAC addresses associated with the IP addresses in the network. Pinging, digging, and using nbtstat are not directly related to listing MAC addresses.

    Rate this question:

  • 33. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know what can be used to translate the IP address to its physical network address. What should you reply?

    • A.

      He should consider using netstat.

    • B.

      He should consider using arp.

    • C.

      He should consider using rarp.

    • D.

      He should consider using nslookup.

    Correct Answer
    B. He should consider using arp.
    Explanation
    ARP (Address Resolution Protocol) is used to translate an IP address to its physical network address, such as a MAC address. It is a protocol used in computer networks to map an IP address to a physical machine address. By using ARP, a device can determine the MAC address of another device on the same network, allowing for communication between them. Therefore, in order to translate an IP address to its physical network address, the trainee should consider using ARP.

    Rate this question:

  • 34. 

    You work as a network technician at CompTIA.com. You have received complaints from the CompTIA.com users that they have difficulty accessing the Internet. However, they can connect to the E-mail server. You need to use a command to display the MAC address. What should you do?

    • A.

      You should consider using ipconfig.

    • B.

      You should consider using arps.

    • C.

      You should consider using arpa.

    • D.

      You should consider using nbtstat R.

    Correct Answer
    C. You should consider using arpa.
  • 35. 

    You work as a network technician at CompTIA.com. You have received instruction from management to translate a physical network address to its IP address. What should you do?

    • A.

      You should consider using nslookup.

    • B.

      You should consider using the ping command.

    • C.

      You should consider using rarp.

    • D.

      You should consider using netstat.

    Correct Answer
    C. You should consider using rarp.
    Explanation
    RARP (Reverse Address Resolution Protocol) is used to translate a physical network address to its IP address. It is commonly used in legacy systems where a device needs to obtain its IP address based on its MAC address. Nslookup is used to query DNS servers for information about domain names, ping command is used to test network connectivity, and netstat is used to display network statistics and active connections. However, in this scenario, the management specifically instructed to translate a physical network address to its IP address, which is the purpose of RARP.

    Rate this question:

  • 36. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee has received the following output:   Interface: 172.30.0.102 0x2 Internet Address                                                Physical Address        Type 172.30.0.5 0                                              0304882728c              dynamic   The newly appointed CompTIA.com trainee wants to know which command and switch combination was used. What should you reply?

    • A.

      Arps was used.

    • B.

      Netstat a was used.

    • C.

      Arpa was used.

    • D.

      Netstat s was used.

    Correct Answer
    C. Arpa was used.
    Explanation
    The correct answer is "arpa was used." The output provided includes the Internet Address and Physical Address, which are typically associated with the Address Resolution Protocol (ARP). ARP is used to map an IP address to a physical (MAC) address on a network. The "0x2" in the interface line suggests that the ARP protocol was used. Therefore, the command and switch combination used to obtain this output was likely "arp -a" or something similar.

    Rate this question:

  • 37. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know which of the following maps an IP address to a MAC address. What should you reply?

    • A.

      The RARP protocol.

    • B.

      The DHCP protocol.

    • C.

      The NTP protocol.

    • D.

      The ARP protocol.

    Correct Answer
    D. The ARP protocol.
    Explanation
    The ARP (Address Resolution Protocol) protocol is used to map an IP address to a MAC address. It allows devices on a local network to discover and communicate with each other by resolving the IP address to the corresponding MAC address. RARP (Reverse Address Resolution Protocol) is used for the opposite purpose, mapping a MAC address to an IP address. DHCP (Dynamic Host Configuration Protocol) is used for automatic IP address assignment, while NTP (Network Time Protocol) is used for time synchronization.

    Rate this question:

  • 38. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know which of the following is related to the MAC address and the corresponding IP address. What should you reply?

    • A.

      Arp has a relationship between MAC address and the corresponding IP address.

    • B.

      Nslookup has a relationship between MAC address and the corresponding IP address.

    • C.

      IPconfig has a relationship between MAC address and the corresponding IP address.

    • D.

      Tracert has a relationship between MAC address and the corresponding IP address.

    Correct Answer
    A. Arp has a relationship between MAC address and the corresponding IP address.
    Explanation
    Arp (Address Resolution Protocol) is a network protocol that is used to map an IP address to its corresponding MAC address. It is responsible for resolving IP addresses to MAC addresses in order to facilitate communication between devices on a local network. Therefore, Arp is the correct answer as it directly relates to the relationship between MAC address and the corresponding IP address.

    Rate this question:

  • 39. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know which can be used to display the IP to a Physical address table. What should you reply?

    • A.

      The netstat command.

    • B.

      The arp command.

    • C.

      The nbtstat command.

    • D.

      The ping command.

    Correct Answer
    B. The arp command.
    Explanation
    The ARP command can be used to display the IP to a Physical address table. ARP (Address Resolution Protocol) is a protocol used to map an IP address to a physical (MAC) address on a local network. By using the ARP command, you can view the ARP cache, which contains the mapping of IP addresses to MAC addresses. This can be useful for troubleshooting network connectivity issues or for identifying devices on the network. The other options mentioned (netstat, nbtstat, and ping) do not provide this specific functionality.

    Rate this question:

  • 40. 

    You work as a network technician at CompTIA.com. You needs to find out the NICs MAC address of a known IP address of a NIC. What should you do?

    • A.

      You should consider using the ping command.

    • B.

      You should consider using the netstat command.

    • C.

      You should consider using the nbtstat command.

    • D.

      You should consider using the arp command.

    Correct Answer
    D. You should consider using the arp command.
    Explanation
    To find out the NICs MAC address of a known IP address, you should consider using the arp command. The Address Resolution Protocol (ARP) is used to map an IP address to a MAC address. By using the arp command, you can view the ARP cache table which contains the mappings of IP addresses to MAC addresses on the local network. This will allow you to find the MAC address associated with the known IP address of the NIC you are looking for.

    Rate this question:

  • 41. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee has received the following output:   Interface: 172.30.0.104 0x2 Internet Address                    Physical Address                  Type 172.30.0.50                  0304882728c              dynamic 172.30.0.254                00304882650e            dynamic   The newly appointed CompTIA.com trainee wants to know which command was used. What should you reply?

    • A.

      Ping was used.

    • B.

      Arp was used.

    • C.

      Nbtstat was used.

    • D.

      Netstat was used.

    Correct Answer
    B. Arp was used.
    Explanation
    The correct answer is "arp was used." This can be determined from the output provided, which shows the Internet Address and Physical Address of different interfaces. The "arp" command is used to view and manipulate the Address Resolution Protocol (ARP) cache, which maps IP addresses to physical addresses on a network. The output indicates that dynamic ARP entries were retrieved, suggesting that the "arp" command was used to obtain this information.

    Rate this question:

  • 42. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know which command line utility displays the arp table. What would your reply be?

    • A.

      The command used is arp

    • B.

      The command used is arp f_addr

    • C.

      The command used is arp -d

    • D.

      The command used is arp -s

    Correct Answer
    A. The command used is arp
    Explanation
    The correct answer is arp. The arp command is used to display and manipulate the Address Resolution Protocol (ARP) cache, which is a table that maps IP addresses to MAC addresses on a local network. By using the arp command, the trainee will be able to view the contents of the ARP table on their computer.

    Rate this question:

  • 43. 

    You work as a network administrator at CompTIA.com. You notice suspicious IP traffic on the local subnet. After successfully pinging the source, which utility can you use to find the associated MAC address?

    • A.

      Ipconfig

    • B.

      Nbtstat

    • C.

      Arp

    • D.

      Tracert

    Correct Answer
    C. Arp
    Explanation
    After successfully pinging the source, the utility that can be used to find the associated MAC address is "arp". The Address Resolution Protocol (ARP) is used to map an IP address to a MAC address on a local network. By using the ARP utility, the network administrator can view the ARP cache table, which contains the IP-MAC address mappings for devices on the local subnet. This allows the administrator to identify the MAC address associated with the suspicious IP traffic.

    Rate this question:

  • 44. 

    Which of the following commands can be used to check for duplicate IP address on a network?

    • A.

      Ping

    • B.

      Traceroute

    • C.

      Find

    • D.

      Arp

    Correct Answer
    D. Arp
    Explanation
    The arp command can be used to check for duplicate IP addresses on a network. ARP stands for Address Resolution Protocol, and it is used to map an IP address to a physical (MAC) address. By using the arp command, one can view the ARP cache and check if there are any duplicate IP addresses present. This can be helpful in identifying and resolving IP address conflicts on a network.

    Rate this question:

  • 45. 

    Which of the following statements is TRUE regarding the command which should be used when booting a computer and receiving an error message stating a duplicate IP address is in use on the network?

    • A.

      You should consider making use of the mode command line utility.

    • B.

      You should consider making use of the traceroute command line utility.

    • C.

      You should consider making use of the attrib command line utility.

    • D.

      You should consider making use of the arp command line utility.

    Correct Answer
    D. You should consider making use of the arp command line utility.
    Explanation
    The ARP (Address Resolution Protocol) command line utility is used to view and manipulate the ARP cache, which contains IP to MAC address mappings. In the given scenario, if a computer is receiving an error message stating a duplicate IP address is in use on the network, using the arp command can help identify the conflicting device by checking its MAC address. This can help in resolving the duplicate IP address issue by either reconfiguring the IP address of the conflicting device or updating the IP address of the current device.

    Rate this question:

  • 46. 

    You work as a network technician at CompTIA.com. The newly appointed CompTIA.com trainee wants to know when discovering suspicious IP activity and pinging the source which utility should be used to find the associated Media Access Control (MAC) address. What would your reply be?

    • A.

      You should consider making use of the nslookup command line utility.

    • B.

      You should consider making use of the attrib command line utility

    • C.

      You should consider making use of the arp command line utility.

    • D.

      You should consider making use of the mode command line utility.

    Correct Answer
    C. You should consider making use of the arp command line utility.
    Explanation
    The ARP (Address Resolution Protocol) command line utility is used to find the associated Media Access Control (MAC) address when discovering suspicious IP activity and pinging the source. ARP is responsible for mapping an IP address to a MAC address in a local network. By using the ARP command line utility, the network technician can obtain the MAC address associated with a specific IP address, which can help in identifying and investigating suspicious activity on the network.

    Rate this question:

  • 47. 

    Which of the following statements is TRUE regarding the command line utility used for producing the output:   CompTIA.com (192.168.12.22) at 08:00:20:0b:4a:71 us.CompTIA.com (192.168.12.32) at 08:00:20:0e:aa:40 uk.CompTIA.com (192.168.12.42) at 00:00:93:e0:80:b1?

    • A.

      The command line utility mode was used.

    • B.

      The command line utility attrib was used.

    • C.

      The command line utility nslookup was used.

    • D.

      The command line utility arp was used.

    Correct Answer
    D. The command line utility arp was used.
    Explanation
    The given output shows the MAC addresses and corresponding IP addresses of three different websites. The command line utility "arp" is used to display and manipulate the Address Resolution Protocol (ARP) cache, which maps IP addresses to MAC addresses. Therefore, the correct answer is that the command line utility "arp" was used to produce the output.

    Rate this question:

  • 48. 

    Identify the utility being used given the output:   Interface: 206.212.36.18 on Interface 1 Internet Address                             Physical Address                  Type 206.212.36.9                         00-00-21-64-91-12                Dynamic 206.212.36.12                       00-00-21-1b-4a-a7                Dynamic

    • A.

      Netstat

    • B.

      Arp

    • C.

      Nbtstat

    • D.

      Tracert/traceroute

    Correct Answer
    B. Arp
    Explanation
    The correct answer is "arp". The output provided shows the IP addresses and physical addresses of devices on the network. ARP (Address Resolution Protocol) is a protocol used to map an IP address to a physical (MAC) address. In this case, the output displays the IP addresses and corresponding physical addresses, indicating that the ARP utility is being used to retrieve this information.

    Rate this question:

  • 49. 

    Given the following output, which utility was used?   Interface 10.10.10.1 on Interface 0x1000004 Internet Address                             Physical Address                  Type 10.10.10.5                                       00-e0-29-62-0d-de                dynamic 10.10.10.11                           00-00-08-fd-97-fa                  static

    • A.

      Arp

    • B.

      Traceroute

    • C.

      Ping

    • D.

      Ipconfig

    Correct Answer
    A. Arp
    Explanation
    The correct answer is "arp". This is because the given output displays the Internet Address and Physical Address of different interfaces. The "arp" utility is used to view and manage the Address Resolution Protocol (ARP) cache, which maps IP addresses to physical addresses (MAC addresses) on a local network. The output shows the dynamic and static mappings of IP addresses to MAC addresses, which is a function of the ARP protocol.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 20, 2010
    Quiz Created by
    Pocho
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.