Network Fundamentals CompTIA Network+

Network Fundamentals CompTIA Network+

University

15 Qs

quiz-placeholder

Similar activities

Understand network protocols

Understand network protocols

University

10 Qs

Network Architecture

Network Architecture

University

14 Qs

Network devices

Network devices

University

10 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Network Security

Network Security

University

10 Qs

Chapter 3: Network Topology

Chapter 3: Network Topology

12th Grade - University

15 Qs

Network

Network

6th Grade - University

15 Qs

Computer Network

Computer Network

University

10 Qs

Network Fundamentals CompTIA Network+

Network Fundamentals CompTIA Network+

Assessment

Quiz

Computers

University

Hard

Created by

Satrio Pradono

Used 20+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Several OSI model layers provide error detection services, but only one that provides error correction as well. At which layer of the OSI model is there a protocol that provides both end-to-end error detection and correction?

Physical Layer

Data Link Layer

Network Layer

Transport Layer

Answer explanation

D is correct because TCP, a connection-oriented transport layer protocol, performs its own error detection, but it also includes a packet acknowledgment service. The segments transmitted during a TCP connection are numbered, so the acknowledgment messages generated by the receiver can specify the number of the last packet received correctly. The sender processes these messages and automatically retransmits any unacknowledged packets.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following OSI model layers specifies the address of each packet’s sender and its ultimate recipient?

Data Link Layer

Network Layer

Transport Layer

Session Layer

Answer explanation

B is correct because IP, at the network layer, is the protocol responsible for end-to-end transmissions between the packet’s sender and its ultimate recipient. The IP header therefore contains IP addresses that identify the two end systems.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Ralph is consulting at a site with mixed networking technologies accumulated over many years. An assistant electrician working in the drop ceiling has informed Ralph that he accidentally severed one of the network cables running through the ceiling space. The electrician didn’t know what kind of network cable it was, which concerned Ralph because the site had installations using coaxial, fiber optic, and twisted pairs. The use of various topologies at the site meant that the effect of a single cable break could vary.

With which topology would the severed cable cause the greatest amount of disturbance to the network?

Mesh

Logical Ring

Bus

Star

Answer explanation

C. is correct because a severed cable in a bus topology would split the network into two halves. This would prevent the nodes on one side of the break from communicating with those on the other side. Both halves of the network would also have one cable end without a terminator, which could inhibit communication among the computers on the same side of the break.

4.

MULTIPLE SELECT QUESTION

2 mins • 2 pts

Ralph is planning on a career in IT, and he wants to build a home LAN for learning purposes. Ralph has purchased three used PCs, and he has installed an Ethernet network interface adapter in each. He has also purchased three CAT 6 UTP patch cables. Ralph wants to use the star topology for his network, but he is unsure about what device to purchase for his cabling nexus, the center of the star.

Which of the following components will result in a LAN when Ralph plugs his three computers into it? (Select all correct answers.)

Hub

MAU

Switch

Router

Answer explanation

A is correct because a hub can function as the cabling nexus at the center of an Ethernet star topology. Each of the devices on the network is plugged into the hub, resulting in a LAN.

C is correct because a switch can function as the cabling nexus at the center of an Ethernet star topology. Each of the devices on the network is plugged into the switch, resulting in a LAN.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your company has just purchased an office building that stands 300 meters away from the current building, and the IT director has assigned you the task of joining together the networks in the two buildings. The connection must support at least Gigabit Ethernet speed and be resistant to the electromagnetic interference generated by manufacturing equipment in the area.

The director also wants the solution to be as inexpensive as possible. Which of the following cable types should you use to connect the buildings?

RG-58 coaxial cable

CAT 6 unshielded twisted pair (UTP)

CAT 8 shielded twisted pair (STP)

Multimode fiber-optic

Single-mode

fiber-optic

Answer explanation

D is correct because multimode fiber-optic cable can support both the 300 meter distance and the Gigabit Ethernet speed and is the most inexpensive option that meets both requirements.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following IEEE twisted pair cable categories calls for shielded twisted pair (STP) instead of unshielded twisted pair (UTP) cable?

CAT 5e

CAT 6

CAT 6a

CAT 8

Answer explanation

D is correct because achieving the extremely high transmission speeds of 40GBase-T, even over short distances, required shielding around the individual wire pairs and around the whole bundle, to provide additional protection against crosstalk and other types of interference.

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Alice has been directed by her supervisor to take a Class B network address and devise a plan to subnet it by creating 60 subnets supporting up to 1,000 hosts on each one. Alice has calculated that she needs 6 address bits to support 60 subnets and 10 bits to support 1,000 hosts, but she is unsure about how to go about allocating the bits.

Which of the following best describes how Alice should manipulate the address she has been given to create a subnet identifier?

Extend the network identifier by 6 bits and the host identifier by 10 bits.

Borrow 6 bits from the existing host identifier.

Borrow 6 bits from the existing network identifier.

Borrow 6 bits from the existing network identifier and 10 bits from the host identifier.

Practice Question

Answer explanation

B is correct because borrowing 6 bits from the network identifier for a subnet identifier allows the creation of up to 64 subnets and leaves 10 bits for a host identifier, which can support up to 1,024 hosts.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?