CompTIA Network+ Certification (N10-003) Part 12

30 Questions | Total Attempts: 87

SettingsSettingsSettings
Network Plus Quizzes & Trivia

30 CompTIA Network+ questions covering WAN technologies, remote access protocols, security Novel services.


Questions and Answers
  • 1. 
    Which of the following requires a splitter?
    • A. 

      An analog modem

    • B. 

      An ISDN modem

    • C. 

      A cable modem

    • D. 

      A T1 line

  • 2. 
    Which of the following requires a splitter? (choose all that apply)
    • A. 

      An analog modem

    • B. 

      An ISDN modem

    • C. 

      A cable modem

    • D. 

      A DSL modem

  • 3. 
    Which of the following WAN technologies use a ring topology?
    • A. 

      ISDN

    • B. 

      FDDI

    • C. 

      ATM

    • D. 

      Frame Relay

  • 4. 
    Which of the following WAN technologies use cell-switching?
    • A. 

      ISDN

    • B. 

      FDDI

    • C. 

      ATM

    • D. 

      Frame Relay

  • 5. 
    Which of the following WAN technologies use token passing?
    • A. 

      ISDN

    • B. 

      FDDI

    • C. 

      ATM

    • D. 

      Frame Relay

  • 6. 
    Which of the following statements regarding WAN technologies are true?  (select all that apply)
    • A. 

      A cable modem takes its signal off the co-axial cable on which television broadcasts are carried. It uses a splitter to connect to the cable modem

    • B. 

      Fiber Distributed Data Interface (FDDI) is a token passing technology that uses fiber-optic cable as its transmission medium and dual token rings to provide data delivery and fault tolerance

    • C. 

      ATM is a high-speed packet-switching WAN technology

    • D. 

      Frame Relay is a packet-switching WAN technology that uses permanent virtual circuits (PVCs)

  • 7. 
    Which of the following are connection-oriented services? (choose all that apply)
    • A. 

      DSL

    • B. 

      FDDI

    • C. 

      ATM

    • D. 

      Frame Relay

  • 8. 
    What is the maximum speed of a T1 connection?
    • A. 

      1.544 Mbps

    • B. 

      2.048 Mbps

    • C. 

      44.736 Mbps

    • D. 

      274.176 Mbps

  • 9. 
    What is the maximum speed of an E1 connection?
    • A. 

      1.544 Mbps

    • B. 

      2.048 Mbps

    • C. 

      44.736 Mbps

    • D. 

      274.176 Mbps

  • 10. 
    Which of the following are not remote access protocols?
    • A. 

      PPP

    • B. 

      ARP

    • C. 

      SLIP

    • D. 

      PPTP

  • 11. 
    Which of the following provide remote access over point-to-point links?
    • A. 

      RIP

    • B. 

      PPP

    • C. 

      ARP

    • D. 

      SLIP

  • 12. 
    Which of the following statements regarding remote access protocols are true?
    • A. 

      SLIP provides no error checking and packet addressing but can be used over point-to-point links

    • B. 

      Networks that use PPTP are vulnerable to attack from users on the Internet because PPTP uses the Internet as a WAN link

    • C. 

      Like SLIP, PPP provides no error checking but is easy to configure

    • D. 

      PPP supports authentication negotiation, as well as negotiation of encryption and compression between client and server

  • 13. 
    Which of the following provides secure connections between a web browser and a web server?
    • A. 

      SSL

    • B. 

      WEP

    • C. 

      IPSec

    • D. 

      L2TP

  • 14. 
    Which of the following provides basic security for wireless networks?
    • A. 

      SSL

    • B. 

      WEP

    • C. 

      IPSec

    • D. 

      L2TP

  • 15. 
    Which of the following protocols are used in Virtual Private Networks (VPNs)?
    • A. 

      SSL

    • B. 

      WEP

    • C. 

      IPSec

    • D. 

      L2TP

  • 16. 
    Which of the following provides authentication and encryption over the internet?
    • A. 

      SSL

    • B. 

      WEP

    • C. 

      IPSec

    • D. 

      L2TP

  • 17. 
    Which of the following operates at the Data Link Layer of the OSI model?
    • A. 

      SSL

    • B. 

      SSH

    • C. 

      IPSec

    • D. 

      L2TP

  • 18. 
    Which of the following operates at the Network Layer of the OSI model?
    • A. 

      SSL

    • B. 

      SSH

    • C. 

      IPSec

    • D. 

      L2TP

  • 19. 
    Which of the following operates at the Session Layer of the OSI model?
    • A. 

      SSL

    • B. 

      SSH

    • C. 

      IPSec

    • D. 

      L2TP

  • 20. 
    You are working as a senior network technician and you've been requested to setup a WLAN at a small office.  The WLAN will be configured with Wired Equivalent Privacy (WEP).  Which of the following is not a valid WEP key length that you could use?
    • A. 

      32-bit

    • B. 

      40-bit

    • C. 

      64-bit

    • D. 

      128-bit

  • 21. 
    Which of the following uses unencrypted user names and passwords?
    • A. 

      PAP

    • B. 

      CHAP

    • C. 

      RADIUS

    • D. 

      MS-CHAP

  • 22. 
    Which of the following uses encrypted username and passwords?
    • A. 

      PAP

    • B. 

      CHAP

    • C. 

      RADIUS

    • D. 

      MS-CHAP

  • 23. 
    Which of the following statements regarding authentication protocols is false?
    • A. 

      PAP is insecure because usernames and passwords are sent over the network in celar text

    • B. 

      CHAP is more secure than PAP because it encrypts usernames and passwords before they are sent over the network

    • C. 

      RADIUS is a client/server-based system that provides authentication, authorization and accounting services for remote dial-up access

    • D. 

      MS-CHAP version 1 is capable of mutual authentication of both the client and the server

  • 24. 
    Which of the following sequences is correct regarding the flow of the CHAP system?
    • A. 

      Logon request, encrypts value response, server, challenge, compare encrypts results, authorize or fail

    • B. 

      Logon request, challenge, encrypts value response, server, compare encrypted results, authorize or fail

    • C. 

      Logon request, challenge, server, encrypts value response, compare encrypted results, authorize or fail

    • D. 

      Logon request, server, encrypts value response, challenge, compare encrypted results

  • 25. 
    Which of the following statements is true regarding the CHAP authentication system?
    • A. 

      A certificate being handed from the server to the client once authentication has been established. If you have a pass, you can wander through the network. But limited access is allowed

    • B. 

      If your token does not grant you access to certain information, that information will either not be displayed or your access will be denied. The authentication system creates a token every time a user or a session begins. At the completion of a session, the token is destroyed

    • C. 

      The authentication process uses a Key Distribution Center (KDC) to orchestrate the entire process. The KDC authenticates the network. Principles can be users, programs or systems. The KDC provides a ticket to the network. Once this ticket is issued, it can be used to authenticate against other principles. This occurs authomatically when a request or service is performed by another network

    • D. 

      The initiator sends a logon request from the client to the server. The server sends a challenge back to the client. The challenge is encrypted and then sent back to the server. The server compares the value from the client and if the information matches, the server grants authorization. If the response fails, the session fails and the request phase starts over

  • 26. 
    Which permission does Mac OS X Server 10.3 use by default for shared files and folder permissions?
    • A. 

      No permissions

    • B. 

      NTFS permissions

    • C. 

      MAC OS permissions

    • D. 

      Standard UNIX permissions

  • 27. 
    Which of the following allows Windows workstations to access a NetWare server via a Windows NT server?
    • A. 

      Gateway Services for NetWare (GSNW)

    • B. 

      Client Services for NetWare (CSNW)

    • C. 

      File and Print Services for NetWare (FPNW)

    • D. 

      Client for Microsoft Networks (CMN)

  • 28. 
    You work as a network administrator for a company that has 25 Windows workstations and one NetWare server.  All users have accounts and permissions on the NetWare server.  What must you still do to allow users to access the NetWare server?
    • A. 

      Enable Gateway Services for NetWare (GSNW)

    • B. 

      Enable Client Services for NetWare (CSNW)

    • C. 

      Enable File and Print Services for NetWare (FPNW)

    • D. 

      Enable Client for Microsoft Networks (CMN)

    • E. 

      Do nothing. Users will be able to access the NetWare server

  • 29. 
    Which of the following allows Novel workstations to access files and printers hosted on a Windows NT server?
    • A. 

      Gateway Services for NetWare (GSNW)

    • B. 

      Client Services for NetWare (CSNW)

    • C. 

      File and Print Services for NetWare (FPNW)

    • D. 

      Client for Microsoft Networks (CMN)

  • 30. 
    When a file is shared on a Windows 2000 Professional computer, how many concurrent connections can be made to the share?
    • A. 

      1

    • B. 

      5

    • C. 

      10

    • D. 

      20