Comtia N+ Exam

12 Questions | Total Attempts: 276

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Learn for life give test


Questions and Answers
  • 1. 
    Which statement is NOT TRUE about Parity bit?
    • A. 

      This technique is used for error detection but not for detection and correction

    • B. 

      Parity checking can be implemented as either even or parity

    • C. 

      Parity bit does not add any overhead to the transmitted data.

    • D. 

      One parity bit can check maximum one bit error in a word

  • 2. 
    Which of the following is TRUE about Logical Bus Topologies?
    • A. 

      A network topology in which network nodes are always arranged in a linear format

    • B. 

      A network topology in which all nodes see the network signal at the same time, regardless of the physical wiring layout of the network.

    • C. 

      A network topology in which network nodes are connected by central connectivity devices that provides separate connections to each device

    • D. 

      A network topology in which is extremely reliable, because no node can ever be isolated from the network.

  • 3. 
    Which statement is NOT TRUE about high performance Device Array?
    • A. 

      Data is stored in different physical locations in drive array

    • B. 

      Drive array is a group of separate disk that are configured to work as a unit

    • C. 

      Multiple data request can be served at the same time using drive array

    • D. 

      The drive array can be configured to use different RAID levels to provide fault tolerance

  • 4. 
    Which statement is NOT TRUE about Bridges?
    • A. 

      Bridges examines the MAC address of each packet before deciding to forwarding\or not forwarding it

    • B. 

      In bridge there is no need to configure the subnet addresses associated with each port.

    • C. 

      A bridge is a networking device used to connect the drops in a physical star topology network into a logical bus topology.

    • D. 

      If the packets are addressed to a node on its own segment, the bridge doesn’t forward the packet

  • 5. 
    Simon Donnell is a network administrator at GlobalSoft Inc.  Lately he is getting complaints of data and program corruption from the network users. Simon fined out that that this problem started after the installed some legitimate programs on his computer. Which security threat is he referring to?
    • A. 

      Trojan horses

    • B. 

      Virus

    • C. 

      Tom cat

    • D. 

      Worm

  • 6. 
    Consider the following statements: Statement A: A network resource is any device that is external to the client computer and is accessible by multiple users. Statement B: network browsing is the act of searching through an automated information system to locate or acquire resources without necessarily knowing the existence of those resources. Which of the following option is correct with respect to above statements?
    • A. 

      Both, Statement A and Statement B are FALSE

    • B. 

      Statement A is TRUE and statement B is FALSE

    • C. 

      Both, Statement A and Statement B are TRUE

    • D. 

      Statement A is FALSE and statement B is TRUE

  • 7. 
    You are working at the help desk and you get a call that a user can’t access the UNIX host at 150.150.32.157. you are on the same subnet as the user and the UNIX host and you can successfully ping both the UNIX host and the User’s workstation. When you ask the user to enter ping 150.150.32.157, all he gets is a series of Destination unreachable massages. What could be the possible cause of error?
    • A. 

      On the user’s workstation there is a bad MAC address entry in the cache

    • B. 

      Duplicate IP addresses in the network

    • C. 

      Problem with router configuration table

    • D. 

      On the server there is bad MAC address enters in the cache.

  • 8. 
    To implement a Remote Access solution, John, a network administrator plans to implement RADIUS for remote authentication. Identify the correct sequence of the following logical steps, to implement the same
    1. identify the authentication methods supported by RRAS.
    2. Reconfigure your RRAS server to use RADIUS authentication.
    3. Install the internet Authentication Service.
    4. Set up the RADIUS server.
  • A. 

    1>>4>>2>>3

  • B. 

    2>>4>>1>>3

  • C. 

    1>>2>>4>>3

  • D. 

    1>>4>>3>>2

  • 9. 
      Anand supports a user who has asked for help in creating a backup copy of some client information files he keeps on his workstation. The files are in a folder called “Annual Report” on the user’s windows server 2003 computer. John performs the backup using following steps in some order.
    1. label the backup media to store a safe place.
    2. Backup the “Annual Report” folder.
    3. Review the log to verify the backup operation.
    4. Verify the backup file exists.
  •  
      Identify the correct sequence of steps for performining the same activity 
    • A. 

      2>>4>>3>>1

    • B. 

      2>>3>>1>>4

    • C. 

      1>>3>>4>>2

    • D. 

      2>>3>>4>>1

  • 10. 
    Convert the following IP address from binary to decimal format 11011010.11110010.11111000.10100000
    • A. 

      121.256.124.27

    • B. 

      198.148.5.10

    • C. 

      109.242.124.10

    • D. 

      218.242.248.160

  • 11. 
    The first UNIX Shell developed by Steve Bourne at Bell laboratories, available in almost every UNIX System is called ___________________.
    • A. 

      Kom Shell

    • B. 

      Bourne Shell

    • C. 

      Bell shell

    • D. 

      C shell

  • 12. 
    -----------------------------are aranged inside the autonomous system (AS) and are completely controlled by the AS adniministrator
    • A. 

      Border routers

    • B. 

      Interior routers

    • C. 

      Exterior routers

    • D. 

      Internal routers