Learn for life comptia N+
RARP
SMTP
ARP
ICMP
Authentication
Compression
Encryption followed by compression
Encryption
A subnet mask is a 32-bit number that is assigned to each host
Default subnet net mask for class C Addresses is 255.255.0.0
A subnet mask uses the binary AND operation to remove the node ID from the IP address, leaving just the network portion
A subnet mask is a 22-bit number that is assigned to each host
Forest
Organizational Unit
Domain
Domain Controller
Private key Instruction
Public key Infrastructure
Public Key instruction
Private Key infrastructure
4
8
2
6
198.148.5.10
218.242.248.160
212.256.124.27
109.242.124.10
11110000.11001100.10101011.11111000
00000100.11111110.10011001.10100000
11100000.01010010.11001001.11100010
01111001.10001010.00101010.00001010
225.225.224.0
255.255.192.0
255.255.256.0
255.255.255.240
Computer System
Autonomous System
Dependent System
Docking System
Integrted service digital network
Asynchronous transfer mode
Synchronous digital hierarchy
Synchronous optical network
Last two
First two
First three
Last three
Router
Bridge
Terminal
Repeaters
It provides service and utilities that enable application programs to access a network and it resources.
It established a connection between network devices, maintaining that connection and then terminating it when appropriate
It ensures reliable data transmission by breaking up big data blocks into smaller packets that can be sent more efficiently on the network
It translates data so that it can be moved on the network.
Link redundancy is fault Tolarance method which provides a separate network connection for use if the main connection goes down
Fault Tolerance is method to ensure continues access to recourses and network services in event of routine maishap or predictable failure
Fault Tolerance protect personal data and resources and restore system functioning in the event of unforeseeable catastropic failure
UPS provide fault Tolarance against power loss or power surges
One parity bit can check maximum one bit in a word.
This technique is used for error detection but not for detection and correction. Parity checking can be implemented as either even or odd parity
Parity bit dose not add any overhead to the transmitted data.
Parity checking can be implemented as either even or odd parity
Statement A us TRUE and statement B is FALSE
Statement A is FALSE and statement B is FALSE
Both, statement A and statement B are TRUE
Both, statement A and statement B are FALSE
It is a method of guessing passwords by using software that systematically generates combinanions untill a valid one is found.
It is a type of attack in which a device outside the network uses an internal network address to masquerade as a device inside the network.
It is an attack that is mounted for the purpose of disabling systems that provide network services, rathe than to steal data or inflict damage.
It is an attempt to gain unauthorized access through the use of a program, which masquerades as valid software.
Statement A is TRUE and statement B is FALSE
Both, statement A and statement B are TRUE
Statement A is FALSE and statement B is FALSE
Both, statement A and statement B are FALSE
Spread data across multiple drives using striping techniques
Any disk containing large database, sensitive company data, or mission- critical files should be deployed in RAID configurations.
All this data must be backed up using a standard backup rotation method
Any disk containing large database, sensitive company data, or mission-critical files should be partitioned in to different primary partitions
Measure network activity with the log >> set up the performance log >> Examine the log data
Set up the performance log >> Measure network activity with the log >> Examine the log data
Measure network activity with the log >> Examine the log data >> set up the performance log
Set up the performance log >> Examine the log data >> Measure network activity with the log
NetBEUI
HTTP
User Datagram Protocol
TCP
4 >> 3 >>1 >> 2
4 >> 1 >> 3 >> 2
1 >>4 >> 3 >> 2
1 >>2 >> 4 >> 3
Statement A is TRUE and statement B is FALSE
Both, statement A and statement B are TRUE
Statement A is FALSE and statement B is FALSE
Both, statement A and statement B are FALSE
Quiz Review Timeline (Updated): Sep 11, 2017 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Network+ Computer Ports Quiz
The Network+ Computer Ports Quiz assesses knowledge of key network port numbers essential for IT professionals. It covers ports for SSH, FTP, HTTPS, Telnet, DHCP, and HTTP,...
Questions:
39 |
Attempts:
591 |
Last updated:
Mar 21, 2023
|
Common Network+ Port / Terms
Acronyms - It'll help you remember what the letters actually mean
Terms - It isn't enough to just know what each acronym means, know the definition
Ports - Have to be...
Questions:
43 |
Attempts:
493 |
Last updated:
Mar 21, 2023
|
Exam Cram 1: CompTIA Network+ N10-005
Exam Cram Part 1
Network+ N10-005
4th edition
by Mike Harwood
Questions:
100 |
Attempts:
261 |
Last updated:
Mar 21, 2023
|
Network+ Chapter 2 Quiz
The Network+ Chapter 2 Quiz assesses knowledge across various networking layers including the application, physical, network, presentation, session, and data link layers. It...
Questions:
30 |
Attempts:
687 |
Last updated:
Mar 22, 2023
|
CompTIA Network Plus Certification Quiz! Trivia
CompTIA Network Plus Certification Practice Quiz. Computer networks are essential in helping computers to share data with each other. By taking up to study CompTIA, one is...
Questions:
20 |
Attempts:
250 |
Last updated:
Mar 21, 2023
|
CompTIA Network+ Certification! Hardest Trivia Quiz
Challenge your knowledge with the 'CompTIA Network+ Certification! Hardest Trivia Quiz.' This quiz tests your understanding of network protocols, security, and troubleshooting,...
Questions:
100 |
Attempts:
382 |
Last updated:
Aug 30, 2024
|
Wait!
Here's an interesting quiz for you.