CompTIA N+`

25 Questions | Attempts: 328
Share

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Learn for life comptia N+


Questions and Answers
  • 1. 

    What does PKI stand for?

    • A.

      Private key Instruction

    • B.

      Public key Infrastructure

    • C.

      Public Key instruction

    • D.

      Private Key infrastructure

    Correct Answer
    B. Public key Infrastructure
  • 2. 

    Which statement about subnet mask is NOT TRUE?

    • A.

      A subnet mask is a 32-bit number that is assigned to each host

    • B.

      Default subnet net mask for class C Addresses is 255.255.0.0

    • C.

      A subnet mask uses the binary AND operation to remove the node ID from the IP address, leaving just the network portion

    • D.

      A subnet mask is a 22-bit number that is assigned to each host

    Correct Answer
    B. Default subnet net mask for class C Addresses is 255.255.0.0
  • 3. 

    ----------------supports the internet protocol by resolving IP addresses to MAC addresses

    • A.

      RARP

    • B.

      SMTP

    • C.

      ARP

    • D.

      ICMP

    Correct Answer
    C. ARP
  • 4. 

    Which statement is NOT TRUE regarding fault Tolerance

    • A.

      Link redundancy is fault Tolarance method which provides a separate network connection for use if the main connection goes down

    • B.

      Fault Tolerance is method to ensure continues access to recourses and network services in event of routine maishap or predictable failure

    • C.

      Fault Tolerance protect personal data and resources and restore system functioning in the event of unforeseeable catastropic failure

    • D.

      UPS provide fault Tolarance against power loss or power surges

    Correct Answer
    C. Fault Tolerance protect personal data and resources and restore system functioning in the event of unforeseeable catastropic failure
  • 5. 

    1. Jack Pen is a network administrator at Blue Soft inc. his organisation has open a new branch that needs to be connected to other branch over WAN. Jack needs to suggest a WAN standard keeping certain fctor in mind. The connection medium is fiber optices. The standard so implemented should suppord for data transfer speeds up to 2.48 Gbps. It should also be able to recover from network faults without much intervention. Which of the following WAN standared would best fulfill Jack’s requirement?

    • A.

      Integrted service digital network

    • B.

      Asynchronous transfer mode

    • C.

      Synchronous digital hierarchy

    • D.

      Synchronous optical network

    Correct Answer
    D. Synchronous optical network
  • 6. 

    Which one of the following statement is TRUE about Brute Force ttack?

    • A.

      It is a method of guessing passwords by using software that systematically generates combinanions untill a valid one is found.

    • B.

      It is a type of attack in which a device outside the network uses an internal network address to masquerade as a device inside the network.

    • C.

      It is an attack that is mounted for the purpose of disabling systems that provide network services, rathe than to steal data or inflict damage.

    • D.

      It is an attempt to gain unauthorized access through the use of a program, which masquerades as valid software.

    Correct Answer
    A. It is a method of guessing passwords by using software that systematically generates combinanions untill a valid one is found.
  • 7. 

    Determine the binary format for the IP address 121.138.42.10

    • A.

      11110000.11001100.10101011.11111000

    • B.

      00000100.11111110.10011001.10100000

    • C.

      11100000.01010010.11001001.11100010

    • D.

      01111001.10001010.00101010.00001010

    Correct Answer
    D. 01111001.10001010.00101010.00001010
  • 8. 

    Convert the following IP address from binary to dicimal format: 11011010.11110010.11111000.10100000

    • A.

      198.148.5.10

    • B.

      218.242.248.160

    • C.

      212.256.124.27

    • D.

      109.242.124.10

    Correct Answer
    B. 218.242.248.160
  • 9. 

    A window’s Active Directory Component, which is group of one or more trees that can have disjunct naming structure but share a common directory scheme is known as _ _ _ _ _ _ _ _ _

    • A.

      Forest

    • B.

      Organizational Unit

    • C.

      Domain

    • D.

      Domain Controller

    Correct Answer
    A. Forest
  • 10. 

    A Nibble consists of _ _ _ _ _ bits.

    • A.

      4

    • B.

      8

    • C.

      2

    • D.

      6

    Correct Answer
    A. 4
  • 11. 

    In which form of transmission(s), the signals are sent via pulses of electromagnetic energy in the microwave region of the spectrum.

    • A.

      Infrared Transmission

    • B.

      In both Microwave and Radio Transmission

    • C.

      Microwave Transmission

    • D.

      Radio Transmission

    Correct Answer
    C. Microwave Transmission
  • 12. 

    Which statement is NOT TRUE about Parity bit?

    • A.

      One parity bit can check maximum one bit in a word.

    • B.

      This technique is used for error detection but not for detection and correction. Parity checking can be implemented as either even or odd parity

    • C.

      Parity bit dose not add any overhead to the transmitted data.

    • D.

      Parity checking can be implemented as either even or odd parity

    Correct Answer
    C. Parity bit dose not add any overhead to the transmitted data.
  • 13. 

    Willy, the network administrator at Global Inc., needs to set up a network that uses the TCP/IP protocols suite for communication. Willy has decided to use protocols that enable fast connectivity and data transfer between network nodes. For this, he is ready to compromise on guarantee of data deliver. Identify the protocol within the TCP/IP protocol suite that meets this requirement

    • A.

      NetBEUI

    • B.

      HTTP

    • C.

      User Datagram Protocol

    • D.

      TCP

    Correct Answer
    C. User Datagram Protocol
  • 14. 

    Info data international want to implement a fault tolerance configuration for on multiple disk system to recover data in case one or more disk fails. Which strategy is best suited for their needs?

    • A.

      Spread data across multiple drives using striping techniques

    • B.

      Any disk containing large database, sensitive company data, or mission- critical files should be deployed in RAID configurations.

    • C.

      All this data must be backed up using a standard backup rotation method

    • D.

      Any disk containing large database, sensitive company data, or mission-critical files should be partitioned in to different primary partitions

    Correct Answer
    B. Any disk containing large database, sensitive company data, or mission- critical files should be deployed in RAID configurations.
  • 15. 

    Consider the following statement:
      Statement A: Microsoft’s thin client application server is called Terminal Server.
      Statement B: the latest version of the Terminal Services client software in windows is called Remote Desktop Connection.
      Which of the following option is correct with respect to the above statements?

    • A.

      Statement A us TRUE and statement B is FALSE

    • B.

      Statement A is FALSE and statement B is FALSE

    • C.

      Both, statement A and statement B are TRUE

    • D.

      Both, statement A and statement B are FALSE

    Correct Answer
    C. Both, statement A and statement B are TRUE
  • 16. 

    Which of the following statement is TRUE about the Transport Layer of OSI model?

    • A.

      It provides service and utilities that enable application programs to access a network and it resources.

    • B.

      It established a connection between network devices, maintaining that connection and then terminating it when appropriate

    • C.

      It ensures reliable data transmission by breaking up big data blocks into smaller packets that can be sent more efficiently on the network

    • D.

      It translates data so that it can be moved on the network.

    Correct Answer
    C. It ensures reliable data transmission by breaking up big data blocks into smaller packets that can be sent more efficiently on the network
  • 17. 

    An _ _ _ _ _ _ _ _ _ _ _ is a self-contained network or group of networks connected to the internet that deploys a single protocol and has a single administrator.

    • A.

      Computer System

    • B.

      Autonomous System

    • C.

      Dependent System

    • D.

      Docking System

    Correct Answer
    B. Autonomous System
  • 18. 

    Red info systems is setting up a network for 100 computers to accommodate new recruits in its production department. The management wants the network to be efficient and has instructed the network administrator, Keith Turner, to ensure this, while setting up the network. In order to establish an efficient network, Keith has decided to subnet the network. The network address allocated for this network is 194.168.10.0. Keith has decided to divide the network into four subnets. Determine the subnet mask for this network.

    • A.

      225.225.224.0

    • B.

      255.255.192.0

    • C.

      255.255.256.0

    • D.

      255.255.255.240

    Correct Answer
    D. 255.255.255.240
  • 19. 

    A network security measure in which a computer user or some other network component proves its identity in order to gain access to network resources is ------------------

    • A.

      Authentication

    • B.

      Compression

    • C.

      Encryption followed by compression

    • D.

      Encryption

    Correct Answer
    A. Authentication
  • 20. 

    You are supposed to take and record baseline performance measurements for key system on our network. The next system you are scheduled to baseline is a corporate file server. Because this system does not run any special services, which steps will, you follow to baseline the default performance measurements for windows server 2003?

    • A.

      Measure network activity with the log >> set up the performance log >> Examine the log data

    • B.

      Set up the performance log >> Measure network activity with the log >> Examine the log data

    • C.

      Measure network activity with the log >> Examine the log data >> set up the performance log

    • D.

      Set up the performance log >> Examine the log data >> Measure network activity with the log

    Correct Answer
    B. Set up the performance log >> Measure network activity with the log >> Examine the log data
  • 21. 

    Consider the following statement:
      Statement A: a topology comprises the physical topology, which describes the network’s physical wiring layout or shape, and the logical topology, which describe the paths through which the data moves. 
      Statement B: the physical and logical topologies do not have to be the same. 
      Which of the following option is correct with respect to the above statements? 

    • A.

      Statement A is TRUE and statement B is FALSE

    • B.

      Both, statement A and statement B are TRUE

    • C.

      Statement A is FALSE and statement B is FALSE

    • D.

      Both, statement A and statement B are FALSE

    Correct Answer
    B. Both, statement A and statement B are TRUE
  • 22. 

    The _____________ bytes of MAC address uniquely identify the manufacturer

    • A.

      Last two

    • B.

      First two

    • C.

      First three

    • D.

      Last three

    Correct Answer
    C. First three
  • 23. 

    Blue moon computers have several branches spread over California, New York, New Jersey, and Detroit. All the branches of the organisation are networked using cables. Recentaly, amny users have complained of frequent loss of data packets while transmitting data. Which of the following should the company implement to minimize this data loss?

    • A.

      Router

    • B.

      Bridge

    • C.

      Terminal

    • D.

      Repeaters

    Correct Answer
    D. Repeaters
  • 24. 

    Consider the following statement: 
      Statement A: in circuit switching networks, a single path from one endpoint to another is built when a connection is needed.
      Statement B: cell switching networks move data through the network packet to packet. 
      Which of the following option is correct with respect to the above statements?

    • A.

      Statement A is TRUE and statement B is FALSE

    • B.

      Both, statement A and statement B are TRUE

    • C.

      Statement A is FALSE and statement B is FALSE

    • D.

      Both, statement A and statement B are FALSE

    Correct Answer
    A. Statement A is TRUE and statement B is FALSE
  • 25. 

    Faruki rajeev and bibison’s company has implemented an Active Directory domain structure on its network. amit has a domain administrative account, and he needs to use it toamit his new windows Server computer to the domain using following step some order. 1). Log on as a domain administrator. 2). Examine the domain groups that have been added to the local groups 3). Verify domain membership 4). Join the domain  Identify the correct sequence of steps for performing the same activity? 

    • A.

      4 >> 3 >>1 >> 2

    • B.

      4 >> 1 >> 3 >> 2

    • C.

      1 >>4 >> 3 >> 2

    • D.

      1 >>2 >> 4 >> 3

    Correct Answer
    B. 4 >> 1 >> 3 >> 2

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 11, 2017
    Quiz Edited by
    ProProfs Editorial Team
  • May 10, 2010
    Quiz Created by
    Bijoy3
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.