CompTIA Network+ Certification (N10-003) Part 14

30 Questions | Total Attempts: 288

SettingsSettingsSettings
Network Plus Quizzes & Trivia

30 CompTIA Network+ questions covering network tools, modem connectivity protocols, proxy servers and firewalls.


Questions and Answers
  • 1. 
    A wire crimper is used to do what?
    • A. 

      Test continuity in a CAT5 patch cable

    • B. 

      Attach connectors to a co-axial cable

    • C. 

      Terminate a UTP cable in a wiring closet

    • D. 

      Detect breaks in a UTP patch cable

    • E. 

      Attach RJ-45 and BNC connectors to a cable

  • 2. 
    What is the purpose of a multimeter?
    • A. 

      Test continuity in a UTP patch cable

    • B. 

      Attach connectors to a co-axial cable

    • C. 

      Terminate a UTP cable in a wiring closet

    • D. 

      Locate a break in a UTP patch cable

  • 3. 
    Which of the following can be performed using a wire crimper?
    • A. 

      Test continuity of the copper wires in a UTP patch cable

    • B. 

      Attach an RJ-45 connector to a UTP patch cable

    • C. 

      To terminate a UTP cable in a wiring closet

    • D. 

      To locate a break in a UTP patch cable

  • 4. 
    You work as a network technician.  One of your users is experiencing problems with network connectivity.  You suspect that there is a break in the cable that connects the user's workstation to the 100Base-T switch.  Which of the following would you use to check for a break in the cable?
    • A. 

      A voltmeter

    • B. 

      A wire crimper

    • C. 

      An optical tester

    • D. 

      A Time Domain Reflectometer (TDR)

  • 5. 
    You work as a network technician.  The CAT5 UTP cable that connects a user's workstation to the 100Base-TX switch has a break in it.  Which of the following would you use to pinpoint the break?
    • A. 

      A voltmeter

    • B. 

      A wire crimper

    • C. 

      An optical tester

    • D. 

      A Time Domain Reflectometer (TDR)

  • 6. 
    Which of the following is called a "fox and hound"?
    • A. 

      A wire map tester

    • B. 

      A tone generator and locator

    • C. 

      An optical tester

    • D. 

      A Time Domain Reflectometer (TDR)

  • 7. 
    You work as a network technician.  You have just assembled a UTP patch cable.  What would you use to verify that you wired both RJ-45 connectors correctly?
    • A. 

      A wire crimper

    • B. 

      A wire map tester

    • C. 

      A tone generator and locator

    • D. 

      A Time Domain Reflectometer (TDR)

  • 8. 
    You work as a network technician.  You need to determine if a UTP patch cable is a straight-through or crossover cable.  Which of the following would you use?
    • A. 

      A wire crimper

    • B. 

      A wire map tester

    • C. 

      A tone generator and locator

    • D. 

      A Time Domain Reflectometer (TDR)

  • 9. 
    A wire map tester can be used to _______ in a UTP patch cable.
    • A. 

      Test voltages and resistance

    • B. 

      Detect transposed wires, breaks and shorts

    • C. 

      Eavesdrop communication

    • D. 

      Locate a break

  • 10. 
    Which of the following statements is true?
    • A. 

      Serial LIne Internet Protocol (SLIP) can be used for remote access connections to a Windows 2000 Server

    • B. 

      To use Serial Line Internet Protocol (SLIP), a user only requires a SLIP account on the remote server

    • C. 

      Point-to-Point Tunneling Protocol (PPTP) requires an existing Point-to-Point Protocol (PPP) connection between the workstation and a remote server

    • D. 

      Windows Remote Access Services (RAS) allows a workstation to access a remote network through dial up access to a Windows server

  • 11. 
    Which of the following cannot be used to access a remote Windows 2000 Server?
    • A. 

      Serial Line Internet Protocol (SLIP)

    • B. 

      Point-to-Point Protocol (PPP)

    • C. 

      Point-to-Point Tunneling Protocol (PPTP)

    • D. 

      Windows Remote Access Services (RAS)

  • 12. 
    Which of the following protocols do DSL modems use?
    • A. 

      Serial Line Internet Protocol (SLIP)

    • B. 

      Point-to-Point Protocol (PPP)

    • C. 

      Point-to-Point Tunneling Protocol (PPTP)

    • D. 

      Point-to-Point Protocol over Ethernet (PPPoE)

  • 13. 
    You need to implement a broadband remote access connection using the Public Switched Telephone Network (PSTN) and the Point-to-Point Protocol over Ethernet (PPPoE) protocol.;  Which of the following would you use?
    • A. 

      Analog modem

    • B. 

      Cable modem

    • C. 

      DSL modem

    • D. 

      None of the above

  • 14. 
    Which of the following remote access connections do not use the Public Switched Telephone Network (PSTN)?
    • A. 

      Analog modem

    • B. 

      Cable modem

    • C. 

      DSL modem

    • D. 

      ISDN modem

  • 15. 
    Which of the following can be used to initiate and maintain a remote access connection to a Windows Server? (choose all that apply)
    • A. 

      Serial Line Internet Protocol (SLIP)

    • B. 

      Point-to-Point Protocol (PPP)

    • C. 

      Point-to-Point Tunneling Protocol (PPTP)

    • D. 

      Internet Packet eXchange (IPX)

  • 16. 
    Which of the following statements is false?
    • A. 

      Serial Line Internet Protocol (SLIP) cannot be used for remote access connections to a Windows 2000 server

    • B. 

      To use Serial Line Internet Protocol (SLIP) a user requires a SLIP account on the remote server and a means to log in on the remote server

    • C. 

      Point-to-Point Tunneling Protocol (PPTP) requires an existing Point-to-Point Protocol (PPP) connection between the workstation and a remote server

    • D. 

      When using Windows Remote Access Services (RAS) a user can access a remote Windows 2000 server but not a remote network

  • 17. 
    Which of the following statements regarding a firewall is true?
    • A. 

      A firewall protects hosts on a private network from attackers on a public network

    • B. 

      A firewall protects hosts on a public network from attackers on a private network

    • C. 

      A firewall protects hosts on a private network from virus attacks

    • D. 

      A firewall provides authentication services

  • 18. 
    Which of the following statements best describes a demilitarized zone (DMZ)?
    • A. 

      A DMZ is a separate network segment that contains Internet accessible servers and is separated from the Internet and the rest of the private network by means of a firewall

    • B. 

      A DMZ is a separate DNS namespace reserved for Internet accessible servers and is protected by means of a firewall

    • C. 

      A DMZ is another term used to describe a private network that is protected by a firewall from attackers on a public network

    • D. 

      A DMZ is a bank of remote access servers that is protected by a firewall from attackers on a public network

  • 19. 
    Which of the following are not features of a firewall?  (choose all that apply)
    • A. 

      Access control lists

    • B. 

      Dynamic packet filtering

    • C. 

      Virus protection

    • D. 

      Authentication

  • 20. 
    A firewall is used to do what?
    • A. 

      Filter packets based on protocol, port or source address

    • B. 

      Protect hosts from malicious code

    • C. 

      Protect hosts from virus attacks

    • D. 

      Provide authentication services

  • 21. 
    A firewall is usually located between what?
    • A. 

      The private network and the Internet

    • B. 

      Departments within an organization

    • C. 

      Client systems and the servers on the internal network

    • D. 

      A wired network and a wireless network segment

  • 22. 
    Which of the following best describes the primary purpose of a firewall?
    • A. 

      It prevents attackers on the Internet from accessing a network

    • B. 

      It prevents network users from accessing inappropriate sites on the Internet

    • C. 

      It protects network users from malicious code

    • D. 

      It protects network users from virus attacks

  • 23. 
    Which of the following caches web pages for future retrieval?
    • A. 

      A router

    • B. 

      Web server

    • C. 

      A firewall

    • D. 

      A proxy server

  • 24. 
    Which of the following can provide Network Address Translation?
    • A. 

      A hub

    • B. 

      Web server

    • C. 

      A firewall

    • D. 

      A proxy server

  • 25. 
    Which of the following statements regarding a proxy server are true?  (choose all that apply)
    • A. 

      A proxy server is a type of firewall that completely separates packets from internal hosts and from external hosts

    • B. 

      A proxy server connects two dissimilar networks by providing Network Address Translation

    • C. 

      A proxy server operates at the lower layers of the OSI model

    • D. 

      A proxy server can cache frequently accessed web pages and can increase network security by filtering out web content that is considered insecure, such as executables, scripts or viruses

Related Topics
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.