CompTIA Network+ Certification (N10-003) Part 15

30 Questions | Total Attempts: 104

SettingsSettingsSettings
Network Plus Quizzes & Trivia

30 CompTIA Network+ questions covering firewall configuration, VLANs, intranets, extranets, antivirus and fault tolerance


Questions and Answers
  • 1. 
    A firewall has been configured to block egress traffic on TCP ports 80. Which of the following services would be affected?
    • A. 

      Inbound HTTP traffic

    • B. 

      Outbound HTTP traffic

    • C. 

      Inbound HTTPS traffic

    • D. 

      Outbound HTTPS traffic

  • 2. 
    A firewall has been configured to permit traffic on only TCP ports 25 and 110.  Which of the following would be possible?
    • A. 

      File transfers via FTP

    • B. 

      Newsgroup access

    • C. 

      Internet browsing

    • D. 

      E-mail delivery

  • 3. 
    You have configured a filter on a network router. Now SMTP operations have stopped. What is the most probable cause of this problem?
    • A. 

      Port 25 is blocked

    • B. 

      Port 80 is blocked

    • C. 

      Port 110 is blocked

    • D. 

      Port 443 is blocked

  • 4. 
    Which of the following are required to transfer traffic between two VLANs (Virtual Local Area Network)?
    • A. 

      A router

    • B. 

      A firewall

    • C. 

      A switch

    • D. 

      A gateway

  • 5. 
    What is the purpose of a VLAN (Virtual Local Area Network)?
    • A. 

      To reduce broadcast traffic on a network

    • B. 

      To protect hosts on a private network from hosts on a public network

    • C. 

      To restrict network bandwidth usage

    • D. 

      To reduce the number of network segments

  • 6. 
    Which of the following properties cannot be used to define VLAN (Virtual Local Area Network) membership?
    • A. 

      Ports on a network switch

    • B. 

      MAC addresses of the hosts

    • C. 

      Network protocol used by the hosts

    • D. 

      Fully qualified domain name (FQDN) of the hosts

  • 7. 
    A VLAN (Virtual Local Area Network) can be used to ______.
    • A. 

      Reduce broadcast traffic on a network

    • B. 

      Protect hosts on a private network from hosts on a public network

    • C. 

      Restrict network bandwidth usage

    • D. 

      Reduce Internet traffic

  • 8. 
    Which of the following statements regarding VLANs (Virtual Local Area Networks) is true?
    • A. 

      A router is required to transfer data packets between two VLANs (Virtual Local Area Networks)

    • B. 

      A VLAN (Virtual Local Area Network) can be used protect hosts on a private network from hosts on a public network

    • C. 

      A VLAN can be defined by means of MAC address and TCP port number

    • D. 

      None of the above

  • 9. 
    Which of the following describes an internal Web page that accessible to users within the organization?
    • A. 

      An intranet

    • B. 

      An internet

    • C. 

      An extranet

    • D. 

      The Internet

  • 10. 
    Which of the following statements best describes an intranet?
    • A. 

      A public network that is available and accessible to the public

    • B. 

      A private network that supports Internet applications and that does not use the public telecommunications system to connect users

    • C. 

      A private network that supports Internet applications, uses the public telecommunications system, and has limited access to the public

    • D. 

      A network in which data packets sent over the Internet and are encapsulated in a protocol that provides for data encapsulation and encryption of the user data

  • 11. 
    Which of the following statements best describes an extranet?
    • A. 

      A public network that is available and accessible to the public

    • B. 

      A private network that supports Internet applications and that does not use the public telecommunications system to connect users

    • C. 

      A private network that supports Internet applications, uses the public telecommunications system, and has limited access to the public

    • D. 

      A network in which data packets sent over the Internet and are encapsulated in a protocol that provides for data encapsulation and encryption of the user data

  • 12. 
    Which of the following is an internal Web page that accessible to select users outside the organization?
    • A. 

      An intranet

    • B. 

      An internet

    • C. 

      An extranet

    • D. 

      An Internet

  • 13. 
    Which of the following statements describes an intranet?
    • A. 

      A network that is made up of all networks under a single administrative control and is accessible to internal users only

    • B. 

      A network is made up of a number of networks that are interconnected

    • C. 

      A network that is made up of all networks under a single administrative control and is accessible to internal users mainly but also to a few external users

    • D. 

      A network that spans the glob and is not under a single administrative control

  • 14. 
    Which of the following statements describes an extranet?
    • A. 

      A network that is made up of all networks under a single administrative control and is accessible to internal users only

    • B. 

      A network is made up of a number of networks that are interconnected

    • C. 

      A network that is made up of all networks under a single administrative control and is accessible to internal users mainly but also to a few external users

    • D. 

      A network that spans the glob and is not under a single administrative control

  • 15. 
    Which of the following allows data sharing only within the organization's network?
    • A. 

      The Internet

    • B. 

      An intranet

    • C. 

      An extranet

    • D. 

      All of the above

  • 16. 
    Your network allows casual Web browsers to access company information on its Web page but restricts access to information on the internal network. This is an example of ______.
    • A. 

      An intranet

    • B. 

      An extranet

    • C. 

      An internet

    • D. 

      A Virtual Private Network (VPN)

  • 17. 
    You work as a network administrator and you are instructed to provide certain customers with user accounts which they can use to access product information on the company's internal network. Which type of network do you need to configure?
    • A. 

      An intranet

    • B. 

      A private local area network

    • C. 

      An extranet

    • D. 

      A Virtual Private Network (VPN)

  • 18. 
    ______ allows data sharing with external but authorized users.
    • A. 

      The Internet

    • B. 

      An intranet

    • C. 

      An extranet

    • D. 

      All of the above

  • 19. 
    Which of the following would be the primary firewall to protect from e-mail viruses?
    • A. 

      E-mail servers

    • B. 

      Antivirus software

    • C. 

      SMTP

    • D. 

      IMAP4

  • 20. 
    Which of the following network attacks cannot result from e-mail usage?
    • A. 

      Dictionary attack

    • B. 

      Trojan Horse

    • C. 

      Phage Virus

    • D. 

      Polymorphic Virus

  • 21. 
    When should your Anti-Virus software scan an e-mail message for possible viruses?
    • A. 

      While receiving

    • B. 

      While opening

    • C. 

      While sending

    • D. 

      All of the above

  • 22. 
    On which of the following should Anti-Virus software be installed to provide optimum protection on a network?
    • A. 

      On all workstations connected to the Internet

    • B. 

      On all network servers

    • C. 

      On all workstations and servers

    • D. 

      On all terminals

  • 23. 
    Files with which of the following file extensions cannot be infected by a virus?
    • A. 

      .txt

    • B. 

      .com

    • C. 

      .dll

    • D. 

      .exe

  • 24. 
    Which of the following should be scanned for viruses?
    • A. 

      Plain text documents

    • B. 

      Microsoft Word documents

    • C. 

      Executable files

    • D. 

      All of the above

  • 25. 
    Anti-virus software cannot protect against ______.
    • A. 

      Trojans

    • B. 

      Macro viruses

    • C. 

      Unidentified viruses

    • D. 

      Boot sector viruses

  • 26. 
    Which of the following statements regarding anti-virus software is true?
    • A. 

      Anti-virus software only scans for viruses during low CPU usage or when instructed to

    • B. 

      Virus definitions must be downloaded regularly so that the anti-virus software can detect new viruses

    • C. 

      Anti-virus software is required on workstations only

    • D. 

      Anti-virus software can prevent brute force dictionary attacks

  • 27. 
    Which of the following fault tolerance implementations is the most expensive?
    • A. 

      A hot site

    • B. 

      A cold site

    • C. 

      A warm site

    • D. 

      Failover clusters

  • 28. 
    Which of the following statements best describes a hot site?
    • A. 

      A remote site that contains a redundant copy of every computer system and every bit of data that is in the active network

    • B. 

      A remote site rely that has no fault tolerance but relies on back ups for data recovery

    • C. 

      A remote site that contains a redundant copy of the critical system and data that is in the active network

    • D. 

      A redundant copy of a device that becomes active when the active device fails

  • 29. 
    Which one of the following disk fault tolerance mechanisms consists of two disks and a single controller?
    • A. 

      Disk duplexing

    • B. 

      Disk mirroring

    • C. 

      Disk striping

    • D. 

      Disk imaging

  • 30. 
    Which one of the following disk fault tolerance mechanisms consists of two disks and two controllers?
    • A. 

      Disk duplexing

    • B. 

      Disk mirroring

    • C. 

      Disk striping

    • D. 

      Disk imaging