OD41

6 November 2025

CompTIA Network+: Network Topologies, Architectures, & Types


 

Question:

As the wireless administrator for your organization, you want to deploy a wireless solution that can transfer data up to 54Mbps in the 2.4GHz band and be compatible with 802.11b standards.

 

What 802.11 standard satisfies these conditions?

  • 802.11 g


Question

:

You want to create a private network structure between two nodes that is secure, fast, resists eavesdropping, and uses minimal hardware. 

 

Which topology fulfills these requirements?

Answer A.

  • Point-to-point

Question
:

Your work at your organization includes recommending cellular wireless solutions. The research and development department is developing a drone technology and they require a cellular solution that has the least amount of latency (delay) for the command and control function.

 

Which technology fulfills the research and development team’s requirement?

  • 5G


Question

:

What type of connector is used in fiber-optic cabling and has a flattened end that is angled at eight degrees to lessen the impact of reflected light on the transmitted signal?

  • APC (Angled Physical Contact) connector


Question

:

What attribute defines a hybrid network as being hybrid?

  • Combinations of different network topologies


Question

:

Which concept is an essential attribute of a mesh topology?

  • Every node is connected to every other node


Question

:

East-West traffic travels __________.

  • Among servers and virtual machines in the datacenter


Question

:

This network topology connects all nodes to a central hub and the failure of a single node does not affect other nodes.

  • Star


Question

:

As a network administrator, you have been tasked with finding a high-speed connection solution for the core network fabric in your organization. The solution should be fiber-optic and run a transmission protocol based on IEEE protocols and manage speeds up to 400 Gbps.

 

Which tranciever type matches these requirements?

  • Ethernet


Question

:

In a spine and leaf network architecture, Layer 3 protocols are used to eliminate Layer 2 loops which allows for complete utilization of redundant links.

 

Where in the spine and leaf architecture are Layer 3 protocols used?

  • From spine to WAN


Question

:

In a collapsed-core architecture, which layer has been collapsed into the core?

  • Distribution


Question

:

In the three-layer hierarchical model, where do the client workstations connect?

  • Access


Question

:

As an administrator for the communications network for your organization, you have been tasked with finding a high-speed wired connection for the data center. The solution will have to connect servers in the data center over short distances and must be copper wire based and economical but should perform at speeds that rival fiber optic technologies.

 

Which cabling solution satisfies your conditions and restraints?

  • Twinax



CompTIA Network+: Ports & Protocols

 

Question:

“Create Table” falls under which category of SQL statements?

  • DDL


Question

:

Which component of FTP provides the security of SFTP?

  • SSH (Secure Shell)


Question

:

Which type of transmission is associated with a Class D IP address?

  • Multicast


Question

:

Which other protocols are used to provide security with HTTPS?

  • SSL

  • TLS


Question

:

Which system in a DNS implementation is ultimately responsible for providing an IP address of a remote system back to a client device?

  • DNS resolver


Question

:

Which characteristic most notably distinguishes FTP from TFTP?

  • FTP uses TCP, TFTP uses UDP


Question

:

Which component of SNMP is responsible for gathering status information from a device?

  • Agent


Question

:

For which purposes is the Telnet protocol still commonly used?

  • Troubleshooting email servers

  • Configuring network devices


Question

:

Which type of information is exchanged between systems when using LDAP?

  • Directory information


Question

:

The Remote Desktop Protocol is most commonly used for which purposes?

  • Telecommuting
  • Remote management

Question
:

Which command initiates SSH services on a host so that it is ready to accept incoming connections?

  • sshd


Question

:

Which service in Microsoft Windows is based on the SMB protocol?

  • File and Printer Sharing for Microsoft Networks


Question

:

Which TCP port is the default for SMTP?

  • 25


Question

:

Which syslog condition is considered to be the most severe?

  • Emergency


Question

:

Which type of application or service is most likely to use the Session Information Protocol?

  • Voice over IP

  • Instant messaging


Question

:

Sequence the steps of the DHCP process in the correct order.

  • DHCP Discover DHCP Offer DHCP Request DHCP Acknowledgment (ACK)


Question

:

Which protocol is primarily used for tunneling traffic over unsupported types of networks?

  • Generic Routing Encapsulation (GRE)


Question

:

The Network Time Protocol is used for which primary purpose?

  • Synchronizing the time for systems in a network


Question

:

HTTP communicates using which object or method?

  • Messages



CompTIA Network+: Cloud Computing Concepts

 

Question:

How many instances of a software run as part of Software as a Service (SaaS)?

  • One


Question

:

When considering the public cloud models, which provides the customer with only the virtualized hardware infrastructure and an operating system?

  • Infrastructure as a Service (IaaS)


Question

:

You are working as a cloud administrator with your organization. You would like to outsource some of your organization’s workload to the cloud. You want to be able to choose the amount of computing power, choose your own network subnetting scheme, and configure your storage options.

 

Which cloud model meets these requirements?

  • IaaS


Question

:

The core technology that enables network functions virtualization (NFV) is the ___________.

Answer C.

  • Virtual machine

Question
:

In a private cloud, a number of technologies help keep a client’s computing resources separate from the computing resources of other clients. Which technology creates a private network over the top of a public network?

  • VPN


Question

:

Your company is considering moving some of its data operations to the cloud. One data application requires that large amounts of sensitive data be moved to and from the cloud on a daily basis. 

 

Which solution will provide a high bandwidth encrypted connection to the cloud provider that can also scale as traffic dramatically increases?

Answer B.

  • Private direct connection through an ISP

Question
:

Which cloud attribute describes the ability of the cloud software to automatically add and remove resources to and from the cloud instance based on the amount of load to which the instance is subjected?

  • Elasticity


Question

:

You are working as a cloud administrator with your company. You want to take advantage of the cloud benefits for an important database application but regulatory requirements mean that the data must be stored within the company headquarters building. 

 

Which solution will fulfill your requirements for this application?

  • Private cloud


Question

:

You are working as a cloud administrator with your organization and your programming team has a new project to develop. They aren’t really sure how much computing power they will need and it may change dramatically over the course of the project’s development cycle. They will be using only fictitious sample data in the application but will want to test the application’s effectiveness. They need the entire required development platform available in a matter of days.

 

Which technology will fulfill the development team’s requirements with the least lead time and in the most cost-effective manner?

  • PaaS


Question

:

You have been hired as a cloud administrator and have examined the organization’s applications. Some applications have regulatory requirements that demand that the data be hosted within the premises. Some applications are in the early stages of development and do not contain sensitive data. 

 

Which cloud solution will fulfill the requirements while making the most efficient use of the company's monetary resources?

  • Hybrid cloud


Question

:

You have been hired as a cloud administrator. You are creating a private cloud infrastructure and are using a private IP range for your virtual network. You need the devices on this network to be able to connect with systems on the Internet for software updates.

 

Which technology will translate the private IP addresses to IP addresses that can be routed through the Internet?

  • NAT


Question

:

You are an administrator of the virtual network infrastructure. You have been tasked with applying a common set of security rules to four virtual servers that exist on a subnet with other virtual servers. The requirement is that you create a single set of rules that will apply to only those servers.

 

Which technology will fulfill this requirement?

  • Network security group (NSG)


Question

:

Multitenancy is particularly applicable in Software as a Service (SaaS) environments. What makes this particular environment more susceptible to attacks from threat actors?

  • Multiple access points provide multiple attack portals


Question

:

Which attribute of cloud computing allows the cloud software to increase the capacity of the instance tens or even thousands of times?

  • Scalability



CompTIA Network+: Networking Appliances, Applications, & Functions

 

Question:

When comparing Layer 2 and Layer 3 switches, what part of the data does a Layer 3 switch use to direct traffic over multiple networks?

Answer C.

  • IP address

Question
:

You are working as a network technician in your organization and have been asked to attend a meeting with the Email Server Team. They’re concerned about particular information that may be transmitted in outgoing emails that may be considered sensitive and would like a firewall to prevent that.

 

Which type of firewall would best suit their needs?

  • Application-level


Question

:

You are currently employed as a network administrator for your corporation. The Web Team is complaining that the corporation’s web page, which is hosted on a server in California, is suffering from high latency when users from Europe try to access it. 

 

Which technology do you recommend investigating that will resolve this latency problem?

  • Content delivery network (CDN)


Question

:

You are currently employed as a technician in a corporation with an extensive Ethernet network. Your administrator has indicated that the router connected to the external network (Internet) requires a restart.

 

What is the name used to describe a router connected to an external network (Internet)?

  • Edge


Question

:

Which type of intrusion detection system is most likely to develop “false positives” when first enabled in a network?

  • Anomoly-based


Question

:

You are currently employed as a network administrator for your organization. The video editing team requires very high-speed access to a large storage repository that they can share. Additionally, they require low latency, high availability, and robust fault tolerance.

 

Which technology will fulfill their requirements?

  • Storage area network (SAN)


Question

:

In wireless networking, what is the SSID?

  • Network name


Question

:

Users in your company are complaining that, when using the video conferencing software, they experience pauses in the video stream and dropouts in the audio.

 

Which technology can be used to help improve the quality of the video conferencing experience?

  • QoS


Question

:

You are employed as a network administrator in your organization. The web server team are complaining that although they have multiple servers providing service to Internet users, it seems that one of them is handling most of the incoming requests.

 

What technology do you recommend to help alleviate this issue?

  • Load balancer



CompTIA Network+: The OSI Reference Model

 


Question:

At the Transport Layer of the OSI Model, a connection-oriented protocol is one that __________.

  • checks for and corrects errors


Question

:

Standards described at the Presentation Layer of the OSI Model indicate that scrambling the data so it cannot be read is a responsibility handled at this layer. This scrambling of data is known as __________.

  • Encryption


Question

:

What is the purpose of the OSI model?

  • Standardize the networking environment to allow interoperation among networks


Question

:

What is the name given to a block of data at the Data Link Layer of the OSI that has been encapsulated with the addressing information?

  • Frame


Question

:

This is a protocol operating at the Application Layer of the OSI Model and is used to transfer files.

  • FTP


Question

:

At the Session Layer of the OSI Model, the protocols should determine the level of dialog used for communication. 

 

Which level indicates that during a two-way data transfer only one node at a time can communicate over the medium?

  • Half Duplex


Question

:

OSI standards at the Physical Layer define the characteristics that should be considered for items such as ____.

  • Cable Connectors


Question

:

The concept of taking blocks of data that may be too large for transmission along the data path at the Network Layer of the OSI model and breaking them into smaller blocks is known by what term?

  • Fragmentation