Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
Network+ Practice Test 1
Home
Network+ Practice Test 1
Start your Network+ Practice Test 1
You want to use a protocol that can be multicast to multiple hosts. You want to use the multicasting for video streaming. Which of the protocol would work the best in this situation?
A.UDP
B.TCP
C.HTTPS
D.HTTP
None
You are comparing two types of networks: A network that creates a dedicated communication path between the communicating devices. This path is maintained until the communication ends. A network where data is grouped into packets that are sent individually over a network. Each packet is directed independently based on the addressing information found in its header. Which of the following comparisons are true? [Choose two that apply.]
A.(2) is more efficient and uses fewer network resources than (1)
B.(2) requires the initial establishment of a connection while (1) does not
C.(2) is more reliable than (1)
D.Delay between data units is uniform for (1) but not for (2)
When a newly connected user is presented with a captive portal, what do they see on their screen?
A. A Webpage
B. A command line interface
C. A NAC access control page
D. A dialog box
None
A smart card can be used to provide what kind of access to networking devices?
A. Physical access
B. Web Access
C. AAA access
D. CLI access
None
A SIP trunk can be used to connect which of the following systems to the PSTN?
A. SIP Answering service
B. IP-PBX
C. IP Phone
D. IP Camera
None
Which of the following are characteristics of a connection-oriented network communication mode? [Choose two that apply.]
A. Data is delivered in the same order it was sent
B. A communication session is created between two nodes
C. Data can be delivered over multiple paths and in a different order than it was sent
D. A message is sent from source to destination without prior arrangement
You have recently migrated your office network from work group to LDAP based Windows Active Directory. Your goal was to meet the following conditions with this migration: You want the user data to be centrally located. You are not concerned about the logic and relations between different user data. Users are restricted from updating, adding, or deleting their own user profile information User authentication and authorization is centralized using port 389. Which of the following goals have been met?
A. 1, 2, 3, and 4
B. 1, 2, and 4
C. 2, 3, and 4
D. 1, 3, and 4
E. 1, 2, and 3
None
You are asked to design a network cabling solution in a building that has strict fire code standards. You are installing UTP cabling within air circulation pathways of the building. Which of the following types of cabling would you use and why?
A. STP
B. UTP
C. Multi-mode fiber
D. PVC
E. Plenum
None
Which of the following is a risk that stems from the application of a BYOD policy?
A. MAC address depletion
B. IP address depletion
C. Data security
D. Network congestion
None
Which of the following two methods can help prevent a DNS poisoning attack? [Choose all that apply].
A. Setting short TTL times
B. Configure firewall to filter out traffic only from known DNS servers
C. Clearing the DNS caches of local systems and network devices
D. Configure DNS to fetch updates from known authoritative servers
Time's up