CompTIA Network+ Certification (N10-003) Part 12

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Nevermore42
N
Nevermore42
Community Contributor
Quizzes Created: 23 | Total Attempts: 6,369
| Attempts: 122 | Questions: 30
Please wait...
Question 1 / 30
0 %
0/100
Score 0/100
1. Which of the following provides basic security for wireless networks?

Explanation

Wired Equivalent Privacy (WEP) is used to encrypt data transitions over a wireless 802.11b network.

Submit
Please wait...
About This Quiz
CompTIA Network+ Certification (N10-003) Part 12 - Quiz

30 CompTIA Network+ questions covering WAN technologies, remote access protocols, security Novel services.

Personalize your quiz and earn a certificate with your name on it!
2. Which of the following are not remote access protocols?

Explanation

Address Resolution Protocol (ARP) provides host name to MAC address resolution, not remote access.

Submit
3. What is the maximum speed of a T1 connection?

Explanation

A T1 line operates at 1.544 Mbps.

Submit
4. Which of the following provide remote access over point-to-point links?

Explanation

Point-to-Point Protocol (PPP) establishes a connection over point-to-point links and is commonly used for remote connections to ISPs and LANs.

Submit
5. Which of the following provides secure connections between a web browser and a web server?

Explanation

Secure Socket Layer (SSL) is used to provide secure Session Layer connections between a web browser and a web server.

Submit
6. Which of the following requires a splitter?

Explanation

A cable modem takes its signal off the co-axial cable on which television broadcasts are carried. It uses a splitter to connect to the cable modem.

Submit
7. Which of the following WAN technologies use a ring topology?

Explanation

The Fiber Distibuted Data Interface (FDDI) uses fiber-optic cable as its transmission medium and dual token rings to provide data delivery and fault tolerance.

Submit
8. Which of the following WAN technologies use token passing?

Explanation

Fiber Distributed Data Interface (FDDI) is a token passing technology that uses fiber-optic cable as its transmission medium and dual token rings to provide data delivery and fault tolerance.

Submit
9. Which of the following statements is true regarding the CHAP authentication system?

Explanation

The initiator sends a logon request from the client to the server. The server sends a challenge back to the client. The challenge is encrypted and then sent back to the server. The server compares the value from the client and if the information matches, the server grants authorization. If the response fails, the session fails and the request phase starts over.

Submit
10. Which of the following operates at the Network Layer of the OSI model?

Explanation

IP Security (IPSec) is a Network Layer protocol used to provide authentication and encryption over the Internet.

Submit
11. Which of the following sequences is correct regarding the flow of the CHAP system?

Explanation

The initiator sends a logon request from the client to the server. The server sends a challenge back to the client. The challenge is encrypted and then sent back to the server. The server compares the value from the client and if the information matches, the server grants authorization. If the response fails, the session fails and the request phase starts over.

Submit
12. What is the maximum speed of an E1 connection?

Explanation

An E1 line operates at 2.048 Mbps

Submit
13. Which of the following statements regarding authentication protocols is false?

Explanation

MS-CHAP version 2 is capable of mutual authentication but MS-CHAP version 1 is not capable of mutual authentication

Submit
14. Which of the following uses unencrypted user names and passwords?

Explanation

Password Authentication Protocol (PAP) uses username and password combinations but transmitts the username and password in clear text.

Submit
15. Which of the following operates at the Data Link Layer of the OSI model?

Explanation

Layer 2 Tunneling Protocol (L2TP) operates at the Data Link Layer

Submit
16. Which permission does Mac OS X Server 10.3 use by default for shared files and folder permissions?

Explanation

Mac OS X is based on the UNIX kernel. As such, it uses UNIX file and folder permissions.

Submit
17. Which of the following statements regarding remote access protocols are true?

Explanation

The Link Control Protocol (LCP) allows Point-to-Point Protocol (PPP) to support authentication negotiation, as well as negotiation of encryption and compression between client and server, using compression control protocols (CCPs) and encryption control protocols (ECPs).

Submit
18. You work as a network administrator for a company that has 25 Windows workstations and one NetWare server.  All users have accounts and permissions on the NetWare server.  What must you still do to allow users to access the NetWare server?

Explanation

Cilent Services for NetWare (CSNW) allows a Windows workstation to access NetWare servers without the need for a Windows NT server. However, all users who want to access NetWare resources need user accounts and rights on the NetWare servers they access.

Submit
19. When a file is shared on a Windows 2000 Professional computer, how many concurrent connections can be made to the share?

Explanation

Windows 2000 Professional can have a maximum of 10 simultaneous connections.

Submit
20. Which of the following WAN technologies use cell-switching?

Explanation

ATM is a high-speed cell-switching WAN that does not depend on any specific LAN topology. It uses cell-switching, which is similar to packet-switching, except that an ATM cell is always fixed in length.

Submit
21. You are working as a senior network technician and you've been requested to setup a WLAN at a small office.  The WLAN will be configured with Wired Equivalent Privacy (WEP).  Which of the following is not a valid WEP key length that you could use?

Explanation

WEP keys can be 40, 64 or 128 bits long.

Submit
22. Which of the following provides authentication and encryption over the internet?

Explanation

IP Security (IPSec) is used to provide authentication and encryption over the internet.

Submit
23. Which of the following uses encrypted username and passwords?

Explanation

Remote Authentication Dial-In User Services (RADIUS) is an authentication and accounting service that uses username and password combinations but transmits the username and password in encrypted form.

Submit
24. Which of the following allows Novel workstations to access files and printers hosted on a Windows NT server?

Explanation

File and Print Services for NetWare (FPNW) allows Novell clients to access file and printers hosted on a Windows NT server.

Submit
25. Which of the following requires a splitter? (choose all that apply)

Explanation

A cable modem takes its signal off the co-axial cable on which television broadcasts are carried. It uses a splitter to connect to the cable modem. A DSL modem works on a single phone line without losing voice call capability by using a splitter on the telephone line. The splitter enables the use of multiple frequencies on the telephone line.

Submit
26. Which of the following protocols are used in Virtual Private Networks (VPNs)?

Explanation

Layer 2 Tunneling Protocol (L2TP) is used in virtual private networks (VPNs).

Submit
27. Which of the following operates at the Session Layer of the OSI model?

Explanation

Secure Sockets Layer (SSL) operates at the Session Layer and is used to provide secure Session layer connections between a web browser and web server.

Submit
28. Which of the following allows Windows workstations to access a NetWare server via a Windows NT server?

Explanation

Gateway Services for NetWare (GSNW) allows multiple Windows NT clients to connect through a Windows NT server to NetWare servers.

Submit
29. Which of the following statements regarding WAN technologies are true?  (select all that apply)

Explanation

All of these statements are true.

Submit
30. Which of the following are connection-oriented services? (choose all that apply)

Explanation

ATM and Frame Relay are connection-oriented services while DSL and FDDI are best-effort services.

Submit
View My Results

Quiz Review Timeline (Updated): Apr 16, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 16, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 18, 2010
    Quiz Created by
    Nevermore42
Cancel
  • All
    All (30)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following provides basic security for wireless networks?
Which of the following are not remote access protocols?
What is the maximum speed of a T1 connection?
Which of the following provide remote access over point-to-point...
Which of the following provides secure connections between a web...
Which of the following requires a splitter?
Which of the following WAN technologies use a ring topology?
Which of the following WAN technologies use token passing?
Which of the following statements is true regarding the CHAP...
Which of the following operates at the Network Layer of the OSI model?
Which of the following sequences is correct regarding the flow of the...
What is the maximum speed of an E1 connection?
Which of the following statements regarding authentication protocols...
Which of the following uses unencrypted user names and passwords?
Which of the following operates at the Data Link Layer of the OSI...
Which permission does Mac OS X Server 10.3 use by default for shared...
Which of the following statements regarding remote access protocols...
You work as a network administrator for a company that has 25 Windows...
When a file is shared on a Windows 2000 Professional computer, how...
Which of the following WAN technologies use cell-switching?
You are working as a senior network technician and you've been...
Which of the following provides authentication and encryption over the...
Which of the following uses encrypted username and passwords?
Which of the following allows Novel workstations to access files and...
Which of the following requires a splitter? (choose all that apply)
Which of the following protocols are used in Virtual Private Networks...
Which of the following operates at the Session Layer of the OSI model?
Which of the following allows Windows workstations to access a NetWare...
Which of the following statements regarding WAN technologies are...
Which of the following are connection-oriented services? (choose all...
Alert!

Advertisement