Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Professional Certification
Comtia N+ Exam
12 Questions
|
By Bijoy3 | Updated: Jan 3, 2013
| Attempts: 277
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 12
0 %
0/100
Score
0/100
1.
Convert the following IP address from binary to decimal format 11011010.11110010.11111000.10100000
121.256.124.27
198.148.5.10
109.242.124.10
218.242.248.160
Submit
Start Quiz
About This Quiz
Learn for life give test
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
The first UNIX Shell developed by Steve Bourne at Bell laboratories, available in almost every UNIX System is called ___________________.
Kom Shell
Bourne Shell
Bell shell
C shell
Submit
3.
Simon Donnell is a network administrator at GlobalSoft Inc. Lately he is getting complaints of data and program corruption from the network users. Simon fined out that that this problem started after the installed some legitimate programs on his computer. Which security threat is he referring to?
Trojan horses
Virus
Tom cat
Worm
Submit
4.
Which statement is NOT TRUE about Parity bit?
This technique is used for error detection but not for detection and correction
Parity checking can be implemented as either even or parity
Parity bit does not add any overhead to the transmitted data.
One parity bit can check maximum one bit error in a word
Submit
5.
Which statement is NOT TRUE about high performance Device Array?
Data is stored in different physical locations in drive array
Drive array is a group of separate disk that are configured to work as a unit
Multiple data request can be served at the same time using drive array
The drive array can be configured to use different RAID levels to provide fault tolerance
Submit
6.
Consider the following statements: Statement A: A network resource is any device that is external to the client computer and is accessible by multiple users. Statement B: network browsing is the act of searching through an automated information system to locate or acquire resources without necessarily knowing the existence of those resources. Which of the following option is correct with respect to above statements?
Both, Statement A and Statement B are FALSE
Statement A is TRUE and statement B is FALSE
Both, Statement A and Statement B are TRUE
Statement A is FALSE and statement B is TRUE
Submit
7.
Which statement is NOT TRUE about Bridges?
Bridges examines the MAC address of each packet before deciding to forwarding\or not forwarding it
In bridge there is no need to configure the subnet addresses associated with each port.
A bridge is a networking device used to connect the drops in a physical star topology network into a logical...
A bridge is a networking device used to connect the drops in a physical star topology network into a logical bus topology.
If the packets are addressed to a node on its own segment, the bridge doesn’t forward the packet
Submit
8.
Which of the following is TRUE about Logical Bus Topologies?
A network topology in which network nodes are always arranged in a linear format
A network topology in which all nodes see the network signal at the same time, regardless of the physical wiring...
A network topology in which all nodes see the network signal at the same time, regardless of the physical wiring layout of the network.
A network topology in which network nodes are connected by central connectivity devices that provides separate connections to each device
A network topology in which is extremely reliable, because no node can ever be isolated from the network.
Submit
9.
You are working at the help desk and you get a call that a user can’t access the UNIX host at 150.150.32.157. you are on the same subnet as the user and the UNIX host and you can successfully ping both the UNIX host and the User’s workstation. When you ask the user to enter ping 150.150.32.157, all he gets is a series of Destination unreachable massages. What could be the possible cause of error?
On the user’s workstation there is a bad MAC address entry in the cache
Duplicate IP addresses in the network
Problem with router configuration table
On the server there is bad MAC address enters in the cache.
Submit
10.
-----------------------------are aranged inside the autonomous system (AS) and are completely controlled by the AS adniministrator
Border routers
Interior routers
Exterior routers
Internal routers
Submit
11.
Anand supports a user who has asked for help in creating a backup copy of some client information files he keeps on his workstation. The files are in a folder called “Annual Report” on the user’s windows server 2003 computer. John performs the backup using following steps in some order.
label the backup media to store a safe place.
Backup the “Annual Report” folder.
Review the log to verify the backup operation.
Verify the backup file exists.
Identify the correct sequence of steps for performining the same activity
2>>4>>3>>1
2>>3>>1>>4
1>>3>>4>>2
2>>3>>4>>1
Submit
12.
To implement a Remote Access solution, John, a network administrator plans to implement RADIUS for remote authentication. Identify the correct sequence of the following logical steps, to implement the same
identify the authentication methods supported by RRAS.
Reconfigure your RRAS server to use RADIUS authentication.
Install the internet Authentication Service.
Set up the RADIUS server.
1>>4>>2>>3
2>>4>>1>>3
1>>2>>4>>3
1>>4>>3>>2
Submit
View My Results
Related Quizzes
WSET (Wine & Spirit Education Test) Level 2 Practice Test
WSET (Wine & Spirit Education Test) Level 2 Practice Test
ADC/CASAC Alcohol And Drug Counselor Exam Practice Test!
ADC/CASAC Alcohol And Drug Counselor Exam Practice Test!
IAHCSMM: Certified Instrument Specialist Exam! Trivia Questions Quiz
IAHCSMM: Certified Instrument Specialist Exam! Trivia Questions Quiz
BCBA Exam Questions
BCBA Exam Questions
The Ultimate IAHCSMM Quiz: Questions & Answers
The Ultimate IAHCSMM Quiz: Questions & Answers
NSDC Certification Test
NSDC Certification Test
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (12)
Unanswered (
)
Answered (
)
Convert the following IP address from binary to decimal format...
The first UNIX Shell developed by Steve Bourne at Bell laboratories,...
Simon Donnell is a network administrator at GlobalSoft Inc. ...
Which statement is NOT TRUE about Parity bit?
Which statement is NOT TRUE about high performance Device Array?
Consider the following statements: ...
Which statement is NOT TRUE about Bridges?
Which of the following is TRUE about Logical Bus Topologies?
You are working at the help desk and you get a call that a user...
-----------------------------are aranged inside the autonomous system...
Anand supports a user who has asked for help in creating a backup...
To implement a Remote Access solution, John, a network administrator...
X
OK
X
OK
Cancel
X
OK
Cancel
Back to top
Back to top
Advertisement