Advancing the Global IT Industry
Main Members Communities

CompTIA Network+ Answers to Practice Questions

Question 1
(corresponding objective: 2.2)

 Which of the following connectors is used on multimode cable and simply pushed into the jack?

A. SC
B. LC
C. ST
D. BNC


Question 2
(corresponding objective: 4.5)

To add increased network security without additional overhead on the network bandwidth, which of the following should be implemented in a wired network?

A. WEP
B. Port filtering
C. WPA
D. Install additional switches


Question 3
(corresponding objective: 2.1)

Which of the following cable types is least affected by EMI?

A. Coaxial
B. Fiber
C. Serial
D. Ethernet


Question 4
(corresponding objective: 1.1)

Which of the following is the default port for DNS?

A. 22
B. 53
C. 69
D. 80


Question 5
(corresponding objective: 2.1)

Which of the following protocols is used for VoIP?

A. IMAP4
B. TELNET
C. SIP
D. SSH


Question 6
(corresponding objective: 2.3)

Which of the following is an example of a point-to-point physical network?

A. Two computers connected through a switch
B. Two computers connected to a hub
C. Two computers connected together via serial cable
D. Two computers connected via a WAP


Question 7
(corresponding objective: 5.2)

Which of the following provides the most secure defense against packet sniffing?

A. Physical security
B. Encryption enabled
C. Antivirus solution
D. The use of PAP


Question 8
(corresponding objective: 3.2)

Which of the following allows an administrator to filter outbound web traffic?

A. Proxy server
B. DHCP server
C. DNS server
D. NAC server


Question 9
(corresponding objective: 3.1)

Which of the following devices would a technician use to connect a 100Base-TX segment to a 100Base-FX segment?

A. Hub
B. Basic switch
C. Modem
D. Media converter


Question 10
(corresponding objective: 5.2)

Which of the following objectives would a network administrator accomplish by implementing an IPS?

A. Examine network traffic to troubleshoot connectivity issues
B. Detect and automatically respond to attacks
C. Apply access control lists to prevent inbound network attacks
D. Protect servers from physical theft


envelope Request More Information