CompTIA Network+ Certification (N10-003) Part 14

30 Questions | Total Attempts: 268

SettingsSettingsSettings
Network Plus Quizzes & Trivia

30 CompTIA Network+ questions covering network tools, modem connectivity protocols, proxy servers and firewalls.


Questions and Answers
  • 1. 
    A wire crimper is used to do what?
    • A. 

      Test continuity in a CAT5 patch cable

    • B. 

      Attach connectors to a co-axial cable

    • C. 

      Terminate a UTP cable in a wiring closet

    • D. 

      Detect breaks in a UTP patch cable

    • E. 

      Attach RJ-45 and BNC connectors to a cable

  • 2. 
    What is the purpose of a multimeter?
    • A. 

      Test continuity in a UTP patch cable

    • B. 

      Attach connectors to a co-axial cable

    • C. 

      Terminate a UTP cable in a wiring closet

    • D. 

      Locate a break in a UTP patch cable

  • 3. 
    Which of the following can be performed using a wire crimper?
    • A. 

      Test continuity of the copper wires in a UTP patch cable

    • B. 

      Attach an RJ-45 connector to a UTP patch cable

    • C. 

      To terminate a UTP cable in a wiring closet

    • D. 

      To locate a break in a UTP patch cable

  • 4. 
    You work as a network technician.  One of your users is experiencing problems with network connectivity.  You suspect that there is a break in the cable that connects the user's workstation to the 100Base-T switch.  Which of the following would you use to check for a break in the cable?
    • A. 

      A voltmeter

    • B. 

      A wire crimper

    • C. 

      An optical tester

    • D. 

      A Time Domain Reflectometer (TDR)

  • 5. 
    You work as a network technician.  The CAT5 UTP cable that connects a user's workstation to the 100Base-TX switch has a break in it.  Which of the following would you use to pinpoint the break?
    • A. 

      A voltmeter

    • B. 

      A wire crimper

    • C. 

      An optical tester

    • D. 

      A Time Domain Reflectometer (TDR)

  • 6. 
    Which of the following is called a "fox and hound"?
    • A. 

      A wire map tester

    • B. 

      A tone generator and locator

    • C. 

      An optical tester

    • D. 

      A Time Domain Reflectometer (TDR)

  • 7. 
    You work as a network technician.  You have just assembled a UTP patch cable.  What would you use to verify that you wired both RJ-45 connectors correctly?
    • A. 

      A wire crimper

    • B. 

      A wire map tester

    • C. 

      A tone generator and locator

    • D. 

      A Time Domain Reflectometer (TDR)

  • 8. 
    You work as a network technician.  You need to determine if a UTP patch cable is a straight-through or crossover cable.  Which of the following would you use?
    • A. 

      A wire crimper

    • B. 

      A wire map tester

    • C. 

      A tone generator and locator

    • D. 

      A Time Domain Reflectometer (TDR)

  • 9. 
    A wire map tester can be used to _______ in a UTP patch cable.
    • A. 

      Test voltages and resistance

    • B. 

      Detect transposed wires, breaks and shorts

    • C. 

      Eavesdrop communication

    • D. 

      Locate a break

  • 10. 
    Which of the following statements is true?
    • A. 

      Serial LIne Internet Protocol (SLIP) can be used for remote access connections to a Windows 2000 Server

    • B. 

      To use Serial Line Internet Protocol (SLIP), a user only requires a SLIP account on the remote server

    • C. 

      Point-to-Point Tunneling Protocol (PPTP) requires an existing Point-to-Point Protocol (PPP) connection between the workstation and a remote server

    • D. 

      Windows Remote Access Services (RAS) allows a workstation to access a remote network through dial up access to a Windows server

  • 11. 
    Which of the following cannot be used to access a remote Windows 2000 Server?
    • A. 

      Serial Line Internet Protocol (SLIP)

    • B. 

      Point-to-Point Protocol (PPP)

    • C. 

      Point-to-Point Tunneling Protocol (PPTP)

    • D. 

      Windows Remote Access Services (RAS)

  • 12. 
    Which of the following protocols do DSL modems use?
    • A. 

      Serial Line Internet Protocol (SLIP)

    • B. 

      Point-to-Point Protocol (PPP)

    • C. 

      Point-to-Point Tunneling Protocol (PPTP)

    • D. 

      Point-to-Point Protocol over Ethernet (PPPoE)

  • 13. 
    You need to implement a broadband remote access connection using the Public Switched Telephone Network (PSTN) and the Point-to-Point Protocol over Ethernet (PPPoE) protocol.;  Which of the following would you use?
    • A. 

      Analog modem

    • B. 

      Cable modem

    • C. 

      DSL modem

    • D. 

      None of the above

  • 14. 
    Which of the following remote access connections do not use the Public Switched Telephone Network (PSTN)?
    • A. 

      Analog modem

    • B. 

      Cable modem

    • C. 

      DSL modem

    • D. 

      ISDN modem

  • 15. 
    Which of the following can be used to initiate and maintain a remote access connection to a Windows Server? (choose all that apply)
    • A. 

      Serial Line Internet Protocol (SLIP)

    • B. 

      Point-to-Point Protocol (PPP)

    • C. 

      Point-to-Point Tunneling Protocol (PPTP)

    • D. 

      Internet Packet eXchange (IPX)

  • 16. 
    Which of the following statements is false?
    • A. 

      Serial Line Internet Protocol (SLIP) cannot be used for remote access connections to a Windows 2000 server

    • B. 

      To use Serial Line Internet Protocol (SLIP) a user requires a SLIP account on the remote server and a means to log in on the remote server

    • C. 

      Point-to-Point Tunneling Protocol (PPTP) requires an existing Point-to-Point Protocol (PPP) connection between the workstation and a remote server

    • D. 

      When using Windows Remote Access Services (RAS) a user can access a remote Windows 2000 server but not a remote network

  • 17. 
    Which of the following statements regarding a firewall is true?
    • A. 

      A firewall protects hosts on a private network from attackers on a public network

    • B. 

      A firewall protects hosts on a public network from attackers on a private network

    • C. 

      A firewall protects hosts on a private network from virus attacks

    • D. 

      A firewall provides authentication services

  • 18. 
    Which of the following statements best describes a demilitarized zone (DMZ)?
    • A. 

      A DMZ is a separate network segment that contains Internet accessible servers and is separated from the Internet and the rest of the private network by means of a firewall

    • B. 

      A DMZ is a separate DNS namespace reserved for Internet accessible servers and is protected by means of a firewall

    • C. 

      A DMZ is another term used to describe a private network that is protected by a firewall from attackers on a public network

    • D. 

      A DMZ is a bank of remote access servers that is protected by a firewall from attackers on a public network

  • 19. 
    Which of the following are not features of a firewall?  (choose all that apply)
    • A. 

      Access control lists

    • B. 

      Dynamic packet filtering

    • C. 

      Virus protection

    • D. 

      Authentication

  • 20. 
    A firewall is used to do what?
    • A. 

      Filter packets based on protocol, port or source address

    • B. 

      Protect hosts from malicious code

    • C. 

      Protect hosts from virus attacks

    • D. 

      Provide authentication services

  • 21. 
    A firewall is usually located between what?
    • A. 

      The private network and the Internet

    • B. 

      Departments within an organization

    • C. 

      Client systems and the servers on the internal network

    • D. 

      A wired network and a wireless network segment

  • 22. 
    Which of the following best describes the primary purpose of a firewall?
    • A. 

      It prevents attackers on the Internet from accessing a network

    • B. 

      It prevents network users from accessing inappropriate sites on the Internet

    • C. 

      It protects network users from malicious code

    • D. 

      It protects network users from virus attacks

  • 23. 
    Which of the following caches web pages for future retrieval?
    • A. 

      A router

    • B. 

      Web server

    • C. 

      A firewall

    • D. 

      A proxy server

  • 24. 
    Which of the following can provide Network Address Translation?
    • A. 

      A hub

    • B. 

      Web server

    • C. 

      A firewall

    • D. 

      A proxy server

  • 25. 
    Which of the following statements regarding a proxy server are true?  (choose all that apply)
    • A. 

      A proxy server is a type of firewall that completely separates packets from internal hosts and from external hosts

    • B. 

      A proxy server connects two dissimilar networks by providing Network Address Translation

    • C. 

      A proxy server operates at the lower layers of the OSI model

    • D. 

      A proxy server can cache frequently accessed web pages and can increase network security by filtering out web content that is considered insecure, such as executables, scripts or viruses

Related Topics
Back to Top Back to top