Network+ 3

100 Questions | Attempts: 183
Share

SettingsSettingsSettings
Network+ 3 - Quiz

Network+ Practice Exam


Questions and Answers
  • 1. 

    Which connector is shown?

    • A.

      ST

    • B.

      BNC

    • C.

      FDDI

    • D.

      Molex

    • E.

      FC

    Correct Answer
    B. BNC
  • 2. 

    To which TCP/IP archetecture layer do the Media Access Methods Belong?

    • A.

      Application

    • B.

      Internet

    • C.

      Network Interface

    • D.

      Transport

    Correct Answer
    C. Network Interface
  • 3. 

    _____________ are designed to interconnect autonomus domain networks, a single "speaker node" in each domain shares it's routing data with a speaker node in other domains.

    • A.

      IPsec

    • B.

      Enhanced Interior Gateway Protocol

    • C.

      Path Vector Protocols

    • D.

      Interior Gateway Protocol

    Correct Answer
    C. Path Vector Protocols
  • 4. 

    The image represents which command line promt?

    • A.

      Nslookup

    • B.

      TracerT

    • C.

      Ping

    • D.

      Nbstat

    • E.

      Netstat

    Correct Answer
    B. TracerT
  • 5. 

    An area between a private network (Intranet) and a public network (extranet) such as the Internet is known as a __________.

    • A.

      DMZ

    • B.

      Screen Host

    • C.

      Bastion Host

    • D.

      Dead Zone

    Correct Answer
    A. DMZ
  • 6. 

    Which device is responsible for verifiying that data is formatted correctly before it is sent onto a T1 line is?

    • A.

      CSU

    • B.

      NSP

    • C.

      DSU

    • D.

      NAP

    Correct Answer
    C. DSU
  • 7. 

    Which connector is pictured?

    • A.

      Molex

    • B.

      BNC

    • C.

      Berg

    • D.

      FDDI

    • E.

      FC

    Correct Answer
    C. Berg
  • 8. 

    If M flag =___ and O flag=___ there is no DHCPv6 server. A device uses the router advertisement to obtain non link local addresses of other methods like manual and is ok for smaill businesses or indivifuals.

    • A.

      M flag = 0 and O flag = 0

    • B.

      M flag = 0 and O flag = 1

    • C.

      M flag = 1 and O flag = 0

    • D.

      M flag = 1 and O flag = 1

    Correct Answer
    A. M flag = 0 and O flag = 0
  • 9. 

    This Kerberos component is a service that gives Ticket-Grating tickets to an authorized service or user.

    • A.

      Ticket-Granting Server

    • B.

      Principal

    • C.

      Authentication Server

    • D.

      Key Distribution Center

    Correct Answer
    C. Authentication Server
  • 10. 

    The command line utility pictured is?

    • A.

      Nslookup

    • B.

      TracerT

    • C.

      Ping

    • D.

      Nbstat

    • E.

      Netstat

    Correct Answer
    C. Ping
  • 11. 

    This Cisco protocol was designed to include support for variable length subnet masks.

    • A.

      Path Vector Protocol

    • B.

      Interior Gateway Protocol

    • C.

      Open Shortest Path First

    • D.

      Enhanced Interior Gateway Routing Protocol

    Correct Answer
    D. Enhanced Interior Gateway Routing Protocol
  • 12. 

    This Authentication method encapsulates PPP inside Eithernet frames and allows others to establish a secure connection from one computer to another. It is used to connect multiple users to the internet via high speed modems.

    • A.

      PPPoE

    • B.

      EAP

    • C.

      CHAP

    • D.

      Mutual Authentication

    Correct Answer
    A. PPPoE
  • 13. 

    Which type of connector is shown?

    • A.

      Molex

    • B.

      DVI-I

    • C.

      Berg

    • D.

      DVI-D

    Correct Answer
    D. DVI-D
  • 14. 

    Which of the following protocols does Network Attatched Storage (NAS) use? (Choose 2)

    • A.

      IPX

    • B.

      ATM

    • C.

      TCP/IP

    • D.

      Frame Relay

    Correct Answer(s)
    A. IPX
    C. TCP/IP
  • 15. 

    Which of the following are services of a proxy server? (Choose all that apply)

    • A.

      Cached e-mail

    • B.

      Cached Client Profiles

    • C.

      Cached Web pages

    • D.

      Cached DNS Information

    Correct Answer(s)
    A. Cached e-mail
    B. Cached Client Profiles
    C. Cached Web pages
  • 16. 

    Which Command Prompt does this represent?

    • A.

      Nslookup

    • B.

      TracerT

    • C.

      Ping

    • D.

      Nbstat

    • E.

      Netstat

    Correct Answer
    A. Nslookup
  • 17. 

    Which of the following is used to map Network layer protocol addresses to DLCI's?

    • A.

      RARP

    • B.

      Inverse ARP

    • C.

      ARP

    • D.

      None of these.

    Correct Answer
    B. Inverse ARP
  • 18. 

    You have just upgraded the Dial-Up server on the network. This server was used to share internet connections  to the entire network. Users are unable to connect to the Internet since the upgrade. What is the likely cause?

    • A.

      The DNS server could have failed to start the ricght process.

    • B.

      IP address of the dial up server changed

    • C.

      Need to add patches and fixes after upgrade

    • D.

      None of these

    Correct Answer
    A. The DNS server could have failed to start the ricght process.
  • 19. 

    Which connector is pictured?

    • A.

      MU

    • B.

      DVI-D

    • C.

      FC

    • D.

      ST

    • E.

      DVI-I

    Correct Answer
    D. ST
  • 20. 

    If you were need to identify a NetBIOS name corresponding to an IP address, where would you look for it?

    • A.

      ARP Cache

    • B.

      DNS Cache

    • C.

      NetBIOS Name Cache

    • D.

      MAC address table of switch

    Correct Answer
    C. NetBIOS Name Cache
  • 21. 

    A Windows client in your network replaced a bad NIC. The workstation no longer connects to the network> The NIC is configured correctly, what could be the problem?

    • A.

      Incorrect driver

    • B.

      Frame type of NIC is misconfigured

    • C.

      OS configuration problem

    • D.

      None of these

    Correct Answer
    B. Frame type of NIC is misconfigured
  • 22. 

    You are connecting a Windows workstation to a Netware 4.11 server. The workstation is unable to connect to the server but it was able to connect to the internet. Which 2 of the following are possible causes?

    • A.

      The server is not running on Net BEUI

    • B.

      The server is not running on AppleTalk

    • C.

      The Workstation is not running Net BEUI

    • D.

      The Workstation is not running IPX/SPX

    Correct Answer(s)
    A. The server is not running on Net BEUI
    D. The Workstation is not running IPX/SPX
  • 23. 

    Which command line prompt is pictured?

    • A.

      Nslookup

    • B.

      TracerT

    • C.

      Ping

    • D.

      Nbstat

    • E.

      Netstat

    Correct Answer
    E. Netstat
  • 24. 

    Which name resolution technique does a UNIX host use?

    • A.

      DHCP

    • B.

      DNS

    • C.

      Proxy

    • D.

      LMHOSTS

    Correct Answer
    B. DNS
  • 25. 

    Which of the following protocols is a secure version of RCP and employs SSH for authentication and secure file transfer?

    • A.

      SSL

    • B.

      TLS

    • C.

      WEP

    • D.

      SCP

    • E.

      Telnet

    Correct Answer
    D. SCP
  • 26. 

    This Kerberos component service provides an autorized service or user with a temporary session key and tickets.

    • A.

      Authentication Server

    • B.

      Key Distribution

    • C.

      Principal

    • D.

      Realm

    • E.

      Ticket Granting Server

    Correct Answer
    E. Ticket Granting Server
  • 27. 

    Which connector is pictured?

    • A.

      SC

    • B.

      DVI-D

    • C.

      FC

    • D.

      DVI-I

    • E.

      ST

    Correct Answer
    D. DVI-I
  • 28. 

    Which of the following makes DNS environment a backbone of windows 2000 network?

    • A.

      ADNS

    • B.

      DDNS

    • C.

      DHCP

    • D.

      None of these

    Correct Answer
    B. DDNS
  • 29. 

    Which if the following connectors is used in a 10base2 Tapology?

    • A.

      BNC

    • B.

      SC

    • C.

      ST

    • D.

      RJ-11

    • E.

      RJ-45

    Correct Answer
    A. BNC
  • 30. 

    ____________ displays a list of a computers active incoming and outgoing connections.

    • A.

      Mtr

    • B.

      Nbstat

    • C.

      Netstat

    • D.

      Nslookup

    • E.

      TracerT

    Correct Answer
    C. Netstat
  • 31. 

    Which commandline promt is shown?

    • A.

      Nslookup

    • B.

      TracerT

    • C.

      Ipconfig

    • D.

      Nbstat

    • E.

      Netstat

    Correct Answer
    D. Nbstat
  • 32. 

    A UNIX / Linux utility that combines the functionality ping and tracerout.

    • A.

      Mtr

    • B.

      Nbstat

    • C.

      Netstat

    • D.

      Nslookup

    Correct Answer
    A. Mtr
  • 33. 

    Known as DHCPv6 stateful addressing when, M flag =___ and O flaq =___ indicates that the devices should obtain both an IPv6 address and the other configuration parameters from a DHCPv6 server.

    • A.

      M flag = 0 and O flag = 0

    • B.

      M flag = 0 and O flag = 1

    • C.

      M flag = 1 and O flag = 0

    • D.

      M flag = 1 and O flag = 1

    Correct Answer
    D. M flag = 1 and O flag = 1
  • 34. 

    This Kerberos component is the server or client that Kerberos can assign Tickets to.

    • A.

      Authentication Server

    • B.

      Key Distribution Center

    • C.

      Principal

    • D.

      Realm

    • E.

      Ticket-Granting Server

    Correct Answer
    C. Principal
  • 35. 

    Which connector is pictured?

    • A.

      DVI-D

    • B.

      FC

    • C.

      FDDI

    • D.

      MU

    • E.

      LX-5

    Correct Answer
    C. FDDI
  • 36. 

    This authentication defines message formats rather than being an authentication method. There are more than fourty of these methods and are PPP extensions also used in wireless with multiple authentication methods.

    • A.

      CHAP

    • B.

      EAP

    • C.

      PPPoE

    • D.

      Mutual Authentication

    Correct Answer
    B. EAP
  • 37. 

    Reports the IP address of an entered host name or the host name of an entered IP address.

    • A.

      Mtr

    • B.

      Nbstat

    • C.

      Netstat

    • D.

      Nslookup

    Correct Answer
    D. Nslookup
  • 38. 

    Which type of Bridge can package frames of one format onto the format of another?

    • A.

      Encapsulating

    • B.

      Heterogeneous

    • C.

      Translating

    • D.

      Transparent

    Correct Answer
    A. Encapsulating
  • 39. 

    Which type of connector is pictured?

    • A.

      FC

    • B.

      LC

    • C.

      LX-5

    • D.

      MU

    • E.

      SC

    Correct Answer
    B. LC
  • 40. 

    A router is used to filter all traffic to the private internet but also to allow full access to the computer in the DMZ.

    • A.

      Bastion Host

    • B.

      Dead Zone

    • C.

      DMZ

    • D.

      Screened Host

    Correct Answer
    D. Screened Host
  • 41. 

    A standardized Tunneling protocol that generally combines the best features of PPTP and L2F to provide tunnelling over IP, X.25, fram relay and ATM networks.

    • A.

      IPsec

    • B.

      L2TP

    • C.

      PPTP

    • D.

      SSL / TLS

    • E.

      PPPoE

    Correct Answer
    B. L2TP
  • 42. 

    A ______ bridge can interconnect different types of networks, such as a Token Ring and Eithernet. It can link dissimilar MAC layer protocols.

    • A.

      Encapsulating

    • B.

      Heterogeneous / Translating

    • C.

      Learning / Transparent

    • D.

      Verticle

    Correct Answer
    B. Heterogeneous / Translating
  • 43. 

    Which Command Promt is shown?

    • A.

      LC

    • B.

      LX-5

    • C.

      MU

    • D.

      Opti Jack

    • E.

      ST

    Correct Answer
    B. LX-5
  • 44. 

    Known as stateless DHCPv6 addressing when the DHCPv6 server isn't assigning stateful addresses to IPv6 hosts but is assigning stateless configuration settings.

    • A.

      M flag = 0 and O flag = 0

    • B.

      M flag = 0 and O flag = 1

    • C.

      M flag = 1 and O flag = 0

    • D.

      M flag = 1 and O flag = 1

    Correct Answer
    B. M flag = 0 and O flag = 1
  • 45. 

    When public and private keys are related matmatically, the RCA cypher starts with two large prime numbers that make up the private key and multiplys them together to make a public key.

    • A.

      Asymetric Crytography

    • B.

      Asymetric Keys

    • C.

      Chryptography

    • D.

      Encryption

    Correct Answer
    B. Asymetric Keys
  • 46. 

    Is a network between two routers that uses another network protocol other than TCP/IP.

    • A.

      Bastion Host

    • B.

      Dead Zone

    • C.

      DMZ

    • D.

      Screened Host

    Correct Answer
    B. Dead Zone
  • 47. 

    Which of the choices provided supports various authentication methods including smart cards, certificates, Kerberos and one time passwords.

    • A.

      CHAP

    • B.

      EAP

    • C.

      MS-CHAP

    • D.

      PPP

    • E.

      SPAP

    Correct Answer
    B. EAP
  • 48. 

    This authentication method validates the remote clients identity, it is used by PPP at the communication session start or anytime during the session.

    • A.

      CHAP

    • B.

      EAP

    • C.

      Mutual Authentication

    • D.

      PPPoE

    Correct Answer
    A. CHAP
  • 49. 

    This involves securley making the certificate available with little difficulty, part of public key infistructure.

    • A.

      Certificate Dissemination

    • B.

      Certificate Generation

    • C.

      Key Pair Registration

    • D.

      Registration

    Correct Answer
    A. Certificate Dissemination
  • 50. 

    Which connector is shown.

    • A.

      Berg

    • B.

      BNC

    • C.

      FC

    • D.

      FDDI

    • E.

      Molex

    Correct Answer
    E. Molex

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 15, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • May 14, 2010
    Quiz Created by
    Rayandlisaj
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.