CompTIA Network+ Certification (N10-003) Part 15

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Nevermore42
N
Nevermore42
Community Contributor
Quizzes Created: 23 | Total Attempts: 6,369
| Attempts: 184 | Questions: 30
Please wait...
Question 1 / 30
0 %
0/100
Score 0/100
1. Which of the following describes an internal Web page that accessible to users within the organization?

Explanation

An intranet is made up of all networks under a single administrative control and can be thought of as an internal internetwork. Thus resources made available to intranet users are only available to users on that network.

Submit
Please wait...
About This Quiz
Network Plus Quizzes & Trivia

30 CompTIA Network+ questions covering firewall configuration, VLANs, intranets, extranets, antivirus and fault tolerance

Personalize your quiz and earn a certificate with your name on it!
2. Which of the following statements regarding anti-virus software is true?

Explanation

Anti-Virus software uses virus definitions and signatures to detect viruses. New, unidentified or unknown viruses will not be detected. For this reason, virus definitions should be downloaded regularly from the vendor's Web site.

Submit
3. A firewall has been configured to permit traffic on only TCP ports 25 and 110.  Which of the following would be possible?

Explanation

Only ports 25 and 110 are open. All other ports are blocked. Port 25 is used by SMTP, which is required for e-mail delivery and port 110 is used by POP3, which is used for e-mail retrieval.

Submit
4. Which of the following is an internal Web page that accessible to select users outside the organization?

Explanation

An extranet is similar to an intranet, which is made up of all networks under a single administrative control. The exception is that an extranet is an expansion of the intranet to include a few external or outside networks.

Submit
5. ______ allows data sharing with external but authorized users.

Explanation

An extranet allows for limited access and data sharing with authorized users outside of the organizations.

Submit
6. Which of the following allows data sharing only within the organization's network?

Explanation

An intranet would not be accessible from outside the organization and thus would not allow data sharing outside of the organization.

Submit
7. Which of the following statements describes an extranet?

Explanation

An extranet is similar to an intranet, which is made up of all networks under a single administrative control. The exception is that an extranet is an expansion of the intranet to include a few external or outside networks.

Submit
8. You have configured a filter on a network router. Now SMTP operations have stopped. What is the most probable cause of this problem?

Explanation

Port 25 is used by SMTP for e-mail delivery. Since SMTP has stopped, it is possible that port 25 has been blocked.

Submit
9. Which of the following statements best describes an intranet?

Explanation

An intranet may use Internet applications, such as e-mail and may be connected to the Internet. However, an intranet would not be accessible from outside the organization and thus would not allow access via the public telecommunications system.

Submit
10. Which of the following statements describes an intranet?

Explanation

An intranet is made up of all networks under a single administrative control and can be thought of as an internal internetwork. Thus resources made available to intranet users are only available to users on that network.

Submit
11. Which one of the following disk fault tolerance mechanisms consists of two disks and a single controller?

Explanation

Disk mirroring is the process of writing the data simultaneously to two disks so that the two are exact copies of one another. The two drives are attached to a single disk controller.

Submit
12. Anti-virus software cannot protect against ______.

Explanation

Anti-Virus software uses virus definitions and signatures to detect viruses. New, unidentified or unknown viruses will not be detected.

Submit
13. A VLAN (Virtual Local Area Network) can be used to ______.

Explanation

VLANs allow you to configure virtual subnets on the switch itself, rather than requiring separate routers and other network equipment. Separate network segments reduce broadcast traffic as broadcast traffic is not transmitted to the other segments.

Submit
14. Which of the following fault tolerance implementations is the most expensive?

Explanation

In a hot site, every computer system and every bit of information has a redundant copy. This provides 100% fault tolerance for systems that must be up 100% of the time. Hot sites are strictly fault-tolerant implementations, not disaster recovery implementations. Budgets for this type of fault tolerant implementation are typically large because each computer system must have a redundant copy.

Submit
15. What is the purpose of a VLAN (Virtual Local Area Network)?

Explanation

VLANs allow you to configure virtual subnets on the switch itself, rather than requiring separate routers and other network equipment. Separate network segments reduce broadcast traffic as broadcast traffic is not transmitted to the other segments.

Submit
16. Which of the following are required to transfer traffic between two VLANs (Virtual Local Area Network)?

Explanation

VLAN-capable switches use the switch management software to segment a network within the switch itself. This saves you the expense of additional network hardware or recabling. However, each VLAN corresponds to a different IP subnet. Therefore a router is required to change the packets between VLANs, even though the destination host is connected to the same switch.

Submit
17. Which of the following statements regarding VLANs (Virtual Local Area Networks) is true?

Explanation

VLAN-capable switches use the switch management software to segment a network within the switch itself. This saves you the expense of additional network hardware or recabling. However, each VLAN corresponds to a different IP subnet. Therefore a router is required to change the packets between VLANs, even though the destination host is connected to the same switch.

Submit
18. Which of the following statements best describes a hot site?

Explanation

In a hot site, every computer system and every bit of information has a redundant copy. This provides 100% fault tolerance for systems that must be up 100% of the time. Hot sites are strictly fault-tolerant implementations, not disaster recovery implementations. Budgets for this type of fault tolerant implementation are typically large because each computer system must have a redundant copy.

Submit
19. Which of the following network attacks cannot result from e-mail usage?

Explanation

A Dictionary attack involves guessing possible passwords for entering as another user. The attacker must have access to the network.

Submit
20. On which of the following should Anti-Virus software be installed to provide optimum protection on a network?

Explanation

To provide optimum protection on the network, you should ensure that all systems, workstations and servers included, have Anti-Virus software installed on them.

Submit
21. Files with which of the following file extensions cannot be infected by a virus?

Explanation

Plain text documents cannot be infected by viruses.

Submit
22. Which of the following statements best describes an extranet?

Explanation

A network that allows limited access to users outside of the organizations is called an extranet.

Submit
23. A firewall has been configured to block egress traffic on TCP ports 80. Which of the following services would be affected?

Explanation

TCP port 80 is used by HTTP. The firewall has been configured to block egress traffic, therefore outbound HTTP traffic will be blocked.

Submit
24. Which of the following properties cannot be used to define VLAN (Virtual Local Area Network) membership?

Explanation

VLAN membership is not defined by FQDN.

Submit
25. Which of the following would be the primary firewall to protect from e-mail viruses?

Explanation

E-mail servers detect the viruses in the messages received from various sources and send warnings to the recipient to warn him/her of the risky mail. This server has the necessary means to reject infected mail content. E-mail servers have their own virus scanners to filter all the incoming mail before it reaches the server. An e-mail server is a middle man in the delivery of the message.

Submit
26. You work as a network administrator and you are instructed to provide certain customers with user accounts which they can use to access product information on the company's internal network. Which type of network do you need to configure?

Explanation

An extranet allows for limited access and data sharing with authorized users outside of the organizations.

Submit
27. Which of the following should be scanned for viruses?

Explanation

Microsoft Word documents can be infected by macro viruses while executable files can also contain viruses.

Submit
28. Which one of the following disk fault tolerance mechanisms consists of two disks and two controllers?

Explanation

Disk duplexing uses mirroring to write data to two disks so that the two are exact copies of one another but each drive is attached to its own disk controller.

Submit
29. When should your Anti-Virus software scan an e-mail message for possible viruses?

Explanation

Your antivirus software should scan all your incoming mail before you can even read it.

Submit
30. Your network allows casual Web browsers to access company information on its Web page but restricts access to information on the internal network. This is an example of ______.

Explanation

An intranet would not be accessible from outside the organization and thus would not allow data sharing outside of the organization.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 25, 2010
    Quiz Created by
    Nevermore42
Cancel
  • All
    All (30)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following describes an internal Web page that accessible...
Which of the following statements regarding anti-virus software is...
A firewall has been configured to permit traffic on only TCP ports 25...
Which of the following is an internal Web page that accessible to...
______ allows data sharing with external but authorized users.
Which of the following allows data sharing only within the...
Which of the following statements describes an extranet?
You have configured a filter on a network router. Now SMTP operations...
Which of the following statements best describes an intranet?
Which of the following statements describes an intranet?
Which one of the following disk fault tolerance mechanisms consists of...
Anti-virus software cannot protect against ______.
A VLAN (Virtual Local Area Network) can be used to ______.
Which of the following fault tolerance implementations is the most...
What is the purpose of a VLAN (Virtual Local Area Network)?
Which of the following are required to transfer traffic between two...
Which of the following statements regarding VLANs (Virtual Local Area...
Which of the following statements best describes a hot site?
Which of the following network attacks cannot result from e-mail...
On which of the following should Anti-Virus software be installed to...
Files with which of the following file extensions cannot be...
Which of the following statements best describes an extranet?
A firewall has been configured to block egress traffic on TCP ports...
Which of the following properties cannot be used to define VLAN...
Which of the following would be the primary firewall to protect from...
You work as a network administrator and you are instructed to...
Which of the following should be scanned for viruses?
Which one of the following disk fault tolerance mechanisms consists of...
When should your Anti-Virus software scan an e-mail message for...
Your network allows casual Web browsers to access company information...
Alert!

Advertisement