CompTIA Network+ #2

100 Questions | Attempts: 150
Share

SettingsSettingsSettings
CompTIA Network+ #2 - Quiz

CompTIA Network+ #2


Questions and Answers
  • 1. 

    Data information is sent onto the network cable using which of the following?

    • A.

      Communication protocol

    • B.

      Data Packets

    • C.

      Media access Method

    • D.

      Packages

    Correct Answer
    C. Media access Method
  • 2. 

    To which TCP/IP architecture layer do TCP and UDP belong?

    • A.

      Application

    • B.

      Internet

    • C.

      Network Interface

    • D.

      Transport

    Correct Answer
    D. Transport
  • 3. 

    Which IEEE standard defines the communication protocol for Wireless?

    • A.

      802.3

    • B.

      802.5

    • C.

      802.11

    • D.

      802.15

    • E.

      802.16

    Correct Answer
    C. 802.11
  • 4. 

    Which protocol is used to convert logical IP addresses to physical MAC addresses?

    • A.

      IMAP4 Internet Message Access Protocol 4

    • B.

      DNS Domain Name Service

    • C.

      ARP Address Resolution Protocol

    • D.

      RIP Routing Internet Protocol

    Correct Answer
    C. ARP Address Resolution Protocol
  • 5. 

    224.106.27.170 is a Class _____ IP Address.

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    • E.

      E

    Correct Answer
    D. D
  • 6. 

    What type of attack sends a lot of 1/2 open TCP connections which prevent users from being able to access the server?

    • A.

      DOS

    • B.

      Synflood

    • C.

      Ping of Death

    • D.

      Smurf Attack

    • E.

      DDOS

    Correct Answer
    B. Synflood
  • 7. 

    This authentication defines message formats rather than being an authentication mechanism. There are more than 40 of these methods now. They are PPP extensions also used in wireless with multiple authentication methods.

    • A.

      CHAP (Challenge Handshake Protocol)

    • B.

      EAP (Extensible Authentication Protocol)

    • C.

      PPPoE (Point to Point over Eithernet Protocol)

    • D.

      Mutual Authentication

    Correct Answer
    B. EAP (Extensible Authentication Protocol)
  • 8. 

    The users in a subset of Kerbos are refered to as a __________.

    • A.

      Principal

    • B.

      Authentication Server (AS)

    • C.

      Ticket-Granting Server (TGS)

    • D.

      Key Distribution Center (KDC)

    • E.

      Realm

    Correct Answer
    E. Realm
  • 9. 

    This Kerbos item is a record used by a client to authenticate to a server. It contains the clients identity, session key, timestamp and checksum. The recods is secured by the resource servers secret key.

    • A.

      Credentials

    • B.

      Session Key

    • C.

      Authenticator

    • D.

      Ticket

    • E.

      Ticket-Granting Ticket (TGT)

    Correct Answer
    D. Ticket
  • 10. 

    The Ping utility is the most common use of which protocol?

    • A.

      ARP Adress Resolution Protocol

    • B.

      ICMP / ICMPv6 Internet Control Message Protocol

    • C.

      IGMP Internet Group Message Protocol

    • D.

      RIP Routing Internet Protocol

    Correct Answer
    B. ICMP / ICMPv6 Internet Control Message Protocol
  • 11. 

    The NIDS reaction option (Network Intrusion Detection System) where the NIDS sends a TCP packet to the victim host which terminates all sessions and haults the attack in progress.

    • A.

      TCP reset (an active reaction)

    • B.

      IP session logging (a passive reaction)

    • C.

      Shunning (an active reaction)

    • D.

      Alerts (a passive reaction)

    • E.

      Antivirus scanning and cleaning (an active reaction)

    Correct Answer
    A. TCP reset (an active reaction)
  • 12. 

    What port is used by SSH (Secure Shell)?

    • A.

      UDP 67 / UDP68

    • B.

      TCP161 / UDP161

    • C.

      TCP143 / UDP143

    • D.

      TCP22 / UDP22

    • E.

      NTP123

    Correct Answer
    D. TCP22 / UDP22
  • 13. 

    Which Command Line Utility is shown?

    • A.

      TracerT

    • B.

      Ping

    • C.

      IPconfig

    • D.

      NetStat

    • E.

      Nbstat

    Correct Answer
    A. TracerT
  • 14. 

    Which protocol is responsible for the logical addressing of each packet created by the Transport Layer?

    • A.

      IP

    • B.

      RIP

    • C.

      TCP

    • D.

      UDP

    • E.

      IDP

    Correct Answer
    A. IP
  • 15. 

    To which TCP/IP architecture layer do the media access methods belong?

    • A.

      Application

    • B.

      Internet

    • C.

      Network Interface

    • D.

      Transport

    Correct Answer
    C. Network Interface
  • 16. 

    124.6.102.87 is a Class _____ IP Address.

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    • E.

      E

    Correct Answer
    A. A
  • 17. 

    What port is used by TFTP (Trivial File Transfer Protocol)?

    • A.

      UDP 67 / UDP68

    • B.

      TCP161 / UDP161

    • C.

      UDP69

    • D.

      TCP119

    • E.

      TCP110

    Correct Answer
    C. UDP69
  • 18. 

    An IPv6 subnet ID is how many bits long?

    • A.

      8

    • B.

      16

    • C.

      32

    • D.

      64

    • E.

      128

    Correct Answer
    B. 16
  • 19. 

    This NIDS reaction option (Network Intrusion Detection System) logs some or all of the traffic between the attacker and the victim for later forensic investigations.

    • A.

      TCP reset (an active reaction)

    • B.

      IP session logging (a passive reaction)

    • C.

      Shunning (an active reaction)

    • D.

      Alerts (a passive reaction)

    • E.

      Antivirus scanning and cleaning (an active reaction)

    Correct Answer
    B. IP session logging (a passive reaction)
  • 20. 

    Which type of attack overwhelms a host by flooding it with ICMP packets?

    • A.

      DOS

    • B.

      Synflood

    • C.

      Ping of Death

    • D.

      Smurf Attack

    • E.

      DDOS

    Correct Answer
    D. Smurf Attack
  • 21. 

    Of the four components to security on a wireless network, to which one does a RADIUS server belong?

    • A.

      Access Controll

    • B.

      Authentication

    • C.

      Encryption

    • D.

      Isolation

    Correct Answer
    B. Authentication
  • 22. 

    This Kerbos item  is a record that usually lasts for 5 minutes and can not be reused. It contains information to prove the session key was recently created and is known only to the client and server.

    • A.

      Credentials

    • B.

      Session Key

    • C.

      Authenticator

    • D.

      Ticket

    • E.

      Ticket-Granting Ticket (TGT)

    Correct Answer
    C. Authenticator
  • 23. 

    What port is used by SNMP (Simple Network Management Protocol)?

    • A.

      UDP 67 / UDP68

    • B.

      TCP22 / UDP22

    • C.

      TCP161 / UDP161

    • D.

      UDP123

    • E.

      TCP110

    Correct Answer
    C. TCP161 / UDP161
  • 24. 

    During a certificates 10 stage life cycle which of these are the first stage?

    • A.

      Matching public and private keys are created.

    • B.

      The user approaches the CA with a specific request for authority.

    • C.

      The CA (Certificate Authority) binds the requestors identifying attributes to its public key.

    • D.

      A certificate is cancelled before its expiration date.

    Correct Answer
    C. The CA (Certificate Authority) binds the requestors identifying attributes to its public key.
  • 25. 

    The IPsec protocol suite is made up of 4 separate protocols, which is discribed here:Ensures authentisity by signing packet data with MD5 or SHA-1 hashes and a shared secret key.

    • A.

      Authentication Header (AH)

    • B.

      Encapsulating Security Payload (ESP)

    • C.

      IP Payload Compression Protocol (IPComp)

    • D.

      Internet Key Exchange (IKE)

    Correct Answer
    A. Authentication Header (AH)
  • 26. 

    To which TCP/IP architecture layer do email and web browser protocols belong to?

    • A.

      Application

    • B.

      Internet

    • C.

      Network Interface

    • D.

      Transport

    Correct Answer
    A. Application
  • 27. 

    243.16.2.117 is a Class _____ IP Address.

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    • E.

      E

    Correct Answer
    E. E
  • 28. 

    Which IEEE standard defines the communication protocol for Token Ring?

    • A.

      802.3

    • B.

      802.5

    • C.

      802.11

    • D.

      802.15

    • E.

      802.16

    Correct Answer
    B. 802.5
  • 29. 

    This NIDS reaction option (Network Intrusion Detection System) is also called blocking, it involes automatically stopping packets from the attacker. Typically NIDS will connect to the firewall and create a temporary rule stopping all packets comming from the attacker.

    • A.

      TCP reset (an active reaction)

    • B.

      IP session logging (a passive reaction)

    • C.

      Shunning (an active reaction)

    • D.

      Alerts (a passive reaction)

    • E.

      Antivirus scanning and cleaning (an active reaction)

    Correct Answer
    C. Shunning (an active reaction)
  • 30. 

    What was introduced to make IPv4 Internet routing more efficient.

    • A.

      Subnet masks

    • B.

      Switches

    • C.

      DHCP

    • D.

      CIDR

    Correct Answer
    D. CIDR
  • 31. 

    _________ is when an attacker passivly records data passing between hosts to gather sensitive information usernames and passwords.

    • A.

      Information Theft

    • B.

      Man In The Middle Attack

    • C.

      Smurf Attack

    • D.

      Web Spoofing

    • E.

      DDOS

    Correct Answer
    A. Information Theft
  • 32. 

    Which of the following are client options that can be set at the scope level? (Choose all that apply)

    • A.

      WINS

    • B.

      MAC Address

    • C.

      Router

    • D.

      Switches

    • E.

      DNS

    Correct Answer(s)
    A. WINS
    C. Router
    E. DNS
  • 33. 

    After installing the DHCP server on a domain member server, what must be done in active directory before it begins delivering leased IP addresses?

    • A.

      Authorize it

    • B.

      Reinstal Active Directory

    • C.

      Activate it

    • D.

      Modify the Firewall

    Correct Answer
    A. Authorize it
  • 34. 

    This Kerbos component service provides an authorized service or user with temporary session keys and tickets.

    • A.

      Principal

    • B.

      Authentication Server (AS)

    • C.

      Ticket-Granting Server (TGS)

    • D.

      Key Distribution Center (KDC)

    • E.

      Realm

    Correct Answer
    C. Ticket-Granting Server (TGS)
  • 35. 

    Which Command Line Utility is shown?

    • A.

      IPconfig

    • B.

      TracerT

    • C.

      NSlookup

    • D.

      Ping

    • E.

      Nbstat

    Correct Answer
    D. Ping
  • 36. 

    A standardized network protocol that encrypts data at the Network (OSI Layer 3) Layer of the protocol stack. Can supply security for both TCP and UDP traffic.

    • A.

      PPTP (Perr to Peer Tunneling Protocol)

    • B.

      LT2P (Layer 2 Tunneling Protocol)

    • C.

      IPsec (IP security)

    • D.

      SSL/TLS (Secure Socket Layer / Transport Layer Security)

    Correct Answer
    C. IPsec (IP security)
  • 37. 

    What port is used by NTP (Network Time Protocol)?

    • A.

      TCP22

    • B.

      UDP123

    • C.

      TCP119

    • D.

      TCP110

    • E.

      TCP161 / UDP161

    Correct Answer
    B. UDP123
  • 38. 

    This authentication method requires both the client and the server to authenticate to each other instead of just the client authenticating to the server. Also known as two way authentication.

    • A.

      CHAP (Challenge Handshake Protocol)

    • B.

      EAP (Extensible Authentication Protocol)

    • C.

      PPPoE (Point to Point over Eithernet Protocol)

    • D.

      Mutual Authentication

    Correct Answer
    D. Mutual Authentication
  • 39. 

    To which TCP/IP architecture layer do routing protocols belong?

    • A.

      Application

    • B.

      Internet

    • C.

      Network Interface

    • D.

      Transport

    Correct Answer
    B. Internet
  • 40. 

    Of the NIDS (Network intrusion detection system) reaction options listed which TWO are considered Passive reaction options?

    • A.

      Shunning

    • B.

      Antivirus scanning and cleaning

    • C.

      Alerts

    • D.

      TCP reset

    • E.

      IP session logging

    Correct Answer(s)
    C. Alerts
    E. IP session logging
  • 41. 

    Which type of attack sent an oversized fragmented packet that when reassembled would cause the buffer to overflow and the system to crash?

    • A.

      DOS

    • B.

      Man In The Middle Attack

    • C.

      Ping of Death

    • D.

      Smurf Attack

    • E.

      DDOS

    Correct Answer
    C. Ping of Death
  • 42. 

    This Kerbos item is a ticket for the resource server along with the session key.

    • A.

      Credentials

    • B.

      Session Key

    • C.

      Authenticator

    • D.

      Ticket

    • E.

      Ticket-Granting Ticket (TGT)

    Correct Answer
    A. Credentials
  • 43. 

    ______ contains performance statistics for computers and other devices in the network, you record a devices ______ performance when adding it to the network to hev the data for copairison purposes later. 

    • A.

      Logical Network Diagram

    • B.

      Baseline

    • C.

      Regulations

    • D.

      Physical Network Diagram

    Correct Answer
    B. Baseline
  • 44. 

    Which of the 3 main VPN security models are 3rd party private networks protected by various means. Clients and servers connect to this network rather than connect to an LAN via a public network.

    • A.

      Authentication before connection

    • B.

      Trusted delivery network

    • C.

      Secure VPN's

    Correct Answer
    B. Trusted delivery network
  • 45. 

    Which IEEE standard defines the communication protocol for Air Cards?

    • A.

      802.3

    • B.

      802.5

    • C.

      802.11

    • D.

      802.15

    • E.

      802.16

    Correct Answer
    E. 802.16
  • 46. 

    What port is used by NNTP (Network NewsTransfer Protocol)?

    • A.

      UDP69

    • B.

      TCP161 / UDP161

    • C.

      TCP110

    • D.

      TCP22

    • E.

      TCP119

    Correct Answer
    E. TCP119
  • 47. 

    In a ______ attack the attacker places himself between the two hosts and listens in on the session, yet the hosts are unaware they are communicating to the hacker.

    • A.

      DOS

    • B.

      Man In The Middle Attack

    • C.

      Ping of Death

    • D.

      Smurf Attack

    • E.

      DDOS

    Correct Answer
    B. Man In The Middle Attack
  • 48. 

    The IPsec protocol suite is made up of 4 separate protocols, which is discribed here:Negotiates the shared secret keys.

    • A.

      Authentication Header (AH)

    • B.

      Encapsulating Security Payload (ESP)

    • C.

      IP Payload Compression Protocol (IPComp)

    • D.

      Internet Key Exchange (IKE)

    Correct Answer
    D. Internet Key Exchange (IKE)
  • 49. 

    This component is the server or client that Kerbos can assign tickets to.

    • A.

      Principal

    • B.

      Authentication Server (AS)

    • C.

      Ticket-Granting Server (TGS)

    • D.

      Key Distribution Center (KDC)

    • E.

      Realm

    Correct Answer
    A. Principal
  • 50. 

     Which command line utility is shown?

    • A.

      IPconfig

    • B.

      TracerT

    • C.

      Netstat

    • D.

      Nslookup

    • E.

      Nbstat

    Correct Answer
    E. Nbstat

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 10, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 03, 2010
    Quiz Created by
    Rayandlisaj
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.