Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Professional Certification
CompTIA N+`
25 Questions
|
By Bijoy3 | Updated: Sep 11, 2017
| Attempts: 328
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 25
0 %
0/100
Score
0/100
1.
In which form of transmission(s), the signals are sent via pulses of electromagnetic energy in the microwave region of the spectrum.
Infrared Transmission
In both Microwave and Radio Transmission
Microwave Transmission
Radio Transmission
Submit
Start Quiz
About This Quiz
Learn for life comptia N+
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
----------------supports the internet protocol by resolving IP addresses to MAC addresses
RARP
SMTP
ARP
ICMP
Submit
3.
Which statement about subnet mask is NOT TRUE?
A subnet mask is a 32-bit number that is assigned to each host
Default subnet net mask for class C Addresses is 255.255.0.0
A subnet mask uses the binary AND operation to remove the node ID from the IP address, leaving just the...
A subnet mask uses the binary AND operation to remove the node ID from the IP address, leaving just the network portion
A subnet mask is a 22-bit number that is assigned to each host
Submit
4.
A network security measure in which a computer user or some other network component proves its identity in order to gain access to network resources is ------------------
Authentication
Compression
Encryption followed by compression
Encryption
Submit
5.
A window’s Active Directory Component, which is group of one or more trees that can have disjunct naming structure but share a common directory scheme is known as _ _ _ _ _ _ _ _ _
Forest
Organizational Unit
Domain
Domain Controller
Submit
6.
What does PKI stand for?
Private key Instruction
Public key Infrastructure
Public Key instruction
Private Key infrastructure
Submit
7.
A Nibble consists of _ _ _ _ _ bits.
4
8
2
6
Submit
8.
Convert the following IP address from binary to dicimal format: 11011010.11110010.11111000.10100000
198.148.5.10
218.242.248.160
212.256.124.27
109.242.124.10
Submit
9.
Determine the binary format for the IP address 121.138.42.10
11110000.11001100.10101011.11111000
00000100.11111110.10011001.10100000
11100000.01010010.11001001.11100010
01111001.10001010.00101010.00001010
Submit
10.
Red info systems is setting up a network for 100 computers to accommodate new recruits in its production department. The management wants the network to be efficient and has instructed the network administrator, Keith Turner, to ensure this, while setting up the network. In order to establish an efficient network, Keith has decided to subnet the network. The network address allocated for this network is 194.168.10.0. Keith has decided to divide the network into four subnets. Determine the subnet mask for this network.
225.225.224.0
255.255.192.0
255.255.256.0
255.255.255.240
Submit
11.
An _ _ _ _ _ _ _ _ _ _ _ is a self-contained network or group of networks connected to the internet that deploys a single protocol and has a single administrator.
Computer System
Autonomous System
Dependent System
Docking System
Submit
12.
Jack Pen is a network administrator at Blue Soft inc. his organisation has open a new branch that needs to be connected to other branch over WAN. Jack needs to suggest a WAN standard keeping certain fctor in mind. The connection medium is fiber optices. The standard so implemented should suppord for data transfer speeds up to 2.48 Gbps. It should also be able to recover from network faults without much intervention. Which of the following WAN standared would best fulfill Jack’s requirement?
Integrted service digital network
Asynchronous transfer mode
Synchronous digital hierarchy
Synchronous optical network
Submit
13.
The _____________ bytes of MAC address uniquely identify the manufacturer
Last two
First two
First three
Last three
Submit
14.
Blue moon computers have several branches spread over California, New York, New Jersey, and Detroit. All the branches of the organisation are networked using cables. Recentaly, amny users have complained of frequent loss of data packets while transmitting data. Which of the following should the company implement to minimize this data loss?
Router
Bridge
Terminal
Repeaters
Submit
15.
Which of the following statement is TRUE about the Transport Layer of OSI model?
It provides service and utilities that enable application programs to access a network and it resources.
It established a connection between network devices, maintaining that connection and then terminating it when appropriate
It ensures reliable data transmission by breaking up big data blocks into smaller packets that can be sent more efficiently...
It ensures reliable data transmission by breaking up big data blocks into smaller packets that can be sent more efficiently on the network
It translates data so that it can be moved on the network.
Submit
16.
Which statement is NOT TRUE regarding fault Tolerance
Link redundancy is fault Tolarance method which provides a separate network connection for use if the main connection goes down
Fault Tolerance is method to ensure continues access to recourses and network services in event of routine maishap or predictable...
Fault Tolerance is method to ensure continues access to recourses and network services in event of routine maishap or predictable failure
Fault Tolerance protect personal data and resources and restore system functioning in the event of unforeseeable catastropic failure
UPS provide fault Tolarance against power loss or power surges
Submit
17.
Which statement is NOT TRUE about Parity bit?
One parity bit can check maximum one bit in a word.
This technique is used for error detection but not for detection and correction.Parity checking can be implemented as either even...
This technique is used for error detection but not for detection and correction.Parity checking can be implemented as either even or odd parity
Parity bit dose not add any overhead to the transmitted data.
Parity checking can be implemented as either even or odd parity
Submit
18.
Consider the following statement:
Statement A: Microsoft’s thin client application server is called Terminal Server.
Statement B: the latest version of the Terminal Services client software in windows is called Remote Desktop Connection.
Which of the following option is correct with respect to the above statements?
Statement A us TRUE and statement B is FALSE
Statement A is FALSE and statement B is FALSE
Both, statement A and statement B are TRUE
Both, statement A and statement B are FALSE
Submit
19.
Which one of the following statement is TRUE about Brute Force ttack?
It is a method of guessing passwords by using software that systematically generates combinanions untill a valid one is...
It is a method of guessing passwords by using software that systematically generates combinanions untill a valid one is found.
It is a type of attack in which a device outside the network uses an internal network address to masquerade...
It is a type of attack in which a device outside the network uses an internal network address to masquerade as a device inside the network.
It is an attack that is mounted for the purpose of disabling systems that provide network services, rathe than to...
It is an attack that is mounted for the purpose of disabling systems that provide network services, rathe than to steal data or inflict damage.
It is an attempt to gain unauthorized access through the use of a program, which masquerades as valid software.
Submit
20.
Consider the following statement:
Statement A: a topology comprises the physical topology, which describes the network’s physical wiring layout or shape, and the logical topology, which describe the paths through which the data moves.
Statement B: the physical and logical topologies do not have to be the same.
Which of the following option is correct with respect to the above statements?
Statement A is TRUE and statement B is FALSE
Both, statement A and statement B are TRUE
Statement A is FALSE and statement B is FALSE
Both, statement A and statement B are FALSE
Submit
21.
Info data international want to implement a fault tolerance configuration for on multiple disk system to recover data in case one or more disk fails. Which strategy is best suited for their needs?
Spread data across multiple drives using striping techniques
Any disk containing large database, sensitive company data, or mission- critical files should be deployed in RAID configurations.
All this data must be backed up using a standard backup rotation method
Any disk containing large database, sensitive company data, or mission-critical files should be partitioned in to different primary partitions
Submit
22.
You are supposed to take and record baseline performance measurements for key system on our network. The next system you are scheduled to baseline is a corporate file server. Because this system does not run any special services, which steps will, you follow to baseline the default performance measurements for windows server 2003?
Measure network activity with the log >> set up the performance log >> Examine the log data
Set up the performance log >> Measure network activity with the log >> Examine the log data
Measure network activity with the log >> Examine the log data >> set up the performance log
Set up the performance log >> Examine the log data >> Measure network activity with the log
Submit
23.
Willy, the network administrator at Global Inc., needs to set up a network that uses the TCP/IP protocols suite for communication. Willy has decided to use protocols that enable fast connectivity and data transfer between network nodes. For this, he is ready to compromise on guarantee of data deliver. Identify the protocol within the TCP/IP protocol suite that meets this requirement
NetBEUI
HTTP
User Datagram Protocol
TCP
Submit
24.
Faruki rajeev and bibison’s company has implemented an Active Directory domain structure on its network. amit has a domain administrative account, and he needs to use it toamit his new windows Server computer to the domain using following step some order. 1). Log on as a domain administrator. 2). Examine the domain groups that have been added to the local groups 3). Verify domain membership 4). Join the domain
Identify the correct sequence of steps for performing the same activity?
4 >> 3 >>1 >> 2
4 >> 1 >> 3 >> 2
1 >>4 >> 3 >> 2
1 >>2 >> 4 >> 3
Submit
25.
Consider the following statement:
Statement A: in circuit switching networks, a single path from one endpoint to another is built when a connection is needed.
Statement B: cell switching networks move data through the network packet to packet.
Which of the following option is correct with respect to the above statements?
Statement A is TRUE and statement B is FALSE
Both, statement A and statement B are TRUE
Statement A is FALSE and statement B is FALSE
Both, statement A and statement B are FALSE
Submit
View My Results
Related Quizzes
WSET (Wine & Spirit Education Test) Level 2 Practice Test
WSET (Wine & Spirit Education Test) Level 2 Practice Test
ADC/CASAC Alcohol And Drug Counselor Exam Practice Test!
ADC/CASAC Alcohol And Drug Counselor Exam Practice Test!
IAHCSMM: Certified Instrument Specialist Exam! Trivia Questions Quiz
IAHCSMM: Certified Instrument Specialist Exam! Trivia Questions Quiz
BCBA Exam Questions
BCBA Exam Questions
The Ultimate IAHCSMM Quiz: Questions & Answers
The Ultimate IAHCSMM Quiz: Questions & Answers
NSDC Certification Test
NSDC Certification Test
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (25)
Unanswered (
)
Answered (
)
In which form of transmission(s), the signals are sent via pulses of...
----------------supports the internet protocol by resolving IP...
Which statement about subnet mask is NOT TRUE?
A network security measure in which a computer user or some other...
A window’s Active Directory Component, which is group of one or more...
What does PKI stand for?
A Nibble consists of _ _ _ _ _ bits.
Convert the following IP address from binary to dicimal format:...
Determine the binary format for the IP address 121.138.42.10
Red info systems is setting up a network for 100 computers to...
An _ _ _ _ _ _ _ _ _ _ _ is a self-contained network or group of...
Jack Pen is a network administrator at Blue Soft inc. his organisation...
The _____________ bytes of MAC address uniquely identify the...
Blue moon computers have several branches spread over California, New...
Which of the following statement is TRUE about the Transport Layer of...
Which statement is NOT TRUE regarding fault Tolerance
Which statement is NOT TRUE about Parity bit?
Consider the following statement: ...
Which one of the following statement is TRUE about Brute Force ttack?
Consider the following statement: ...
Info data international want to implement a fault tolerance...
You are supposed to take and record baseline performance measurements...
Willy, the network administrator at Global Inc., needs to set up a...
Faruki rajeev and bibison’s company has implemented an Active...
Consider the following statement: ...
X
OK
X
OK
Cancel
X
OK
Cancel
Back to top
Back to top
Advertisement