Network+ 3

100 Questions | Attempts: 183
Share
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1.
The command line utility pictured is?
Submit
Please wait...
About This Quiz
Network+ 3 - Quiz

Network+ Practice Exam

Tell us your name to personalize your report, certificate & get on the leaderboard!
2.
Which connector is shown?
Submit
3. An area between a private network (Intranet) and a public network (extranet) such as the Internet is known as a __________.
Submit
4. Which of the following protocols is used to assure accurate clock times on a network?
Submit
5.
Which connector is pictured?
Submit
6.
Which connector is shown.
Submit
7. Computers that stand outside the protected network and are exposed to an attack by using two network cards, one for the DMZ and one for the intranet with no communication between the cards.
Submit
8.
Which command line prompt is pictured?
Submit
9.
Which connector is pictured?
Submit
10.
Which commandline promt is shown?
Submit
11. You wish to segragate a sales team logically by the products they deal with. Product 1 must not reach product 2 and so on. Which would be ideal?
Submit
12.
The image represents which command line promt?
Submit
13. This Authentication method encapsulates PPP inside Eithernet frames and allows others to establish a secure connection from one computer to another. It is used to connect multiple users to the internet via high speed modems.
Submit
14. If you were need to identify a NetBIOS name corresponding to an IP address, where would you look for it?
Submit
15.
Which Command Prompt does this represent?
Submit
16. A UNIX / Linux utility that combines the functionality ping and tracerout.
Submit
17. What type of networks are ST & SC connectors used to sonnect devices?
Submit
18. Use this utility with switches to remove or correct NetBIOS name cashe entries.
Submit
19. If M flag =___ and O flag=___ there is no DHCPv6 server. A device uses the router advertisement to obtain non link local addresses of other methods like manual and is ok for smaill businesses or indivifuals.
Submit
20. This Cisco protocol was designed to include support for variable length subnet masks.
Submit
21. This type of hub is yet to be defined but may include management features and support TCP/IP and SNMP.
Submit
22. Which if the following connectors is used in a 10base2 Tapology?
Submit
23. Which of the following Media Access schemes does the Token Ring network use?
Submit
24. ____________ displays a list of a computers active incoming and outgoing connections.
Submit
25. When traveling and unable to connect from a remote site, you check your IP address and it is 0.0.0.0 what is the likely problem?
Submit
26. Reports the IP address of an entered host name or the host name of an entered IP address.
Submit
27. The current network uses host file for IP to host name resolution. You are planning to add a DNS server and move a few servers to a remote site with different IP addresses. Which is true?
Submit
28. Which file contains the boot phase of the start up process for Windows 2000 - Vista?
Submit
29. To which TCP/IP archetecture layer do the Media Access Methods Belong?
Submit
30. Which of the following directory services can active directory service be compaired with?
Submit
31. _________ is used to propogate VLAN information across a trunked link.
Submit
32. Which of the following makes DNS environment a backbone of windows 2000 network?
Submit
33. A ______ bridge can interconnect different types of networks, such as a Token Ring and Eithernet. It can link dissimilar MAC layer protocols.
Submit
34.
Which connector is shown?
Submit
35. Provide the broadcast address for the following:
IP= 221.240.224.121
Subnet= 255.255.255.248
Submit
36. Known as stateless DHCPv6 addressing when the DHCPv6 server isn't assigning stateful addresses to IPv6 hosts but is assigning stateless configuration settings.
Submit
37. What type of bridge links a local network accross a wide area segment and the output channel is usually of dramatically lower band width.
Submit
38. Known as DHCPv6 stateful addressing when, M flag =___ and O flaq =___ indicates that the devices should obtain both an IPv6 address and the other configuration parameters from a DHCPv6 server.
Submit
39. Which of the following access security does Windows 2000 server use on LAN's?
Submit
40. Indicates the devices should obtain an IPv6 address from the DHCPv6 server but no other configuration parameters and is barley used.
Submit
41.
Which type of connector is shown?
Submit
42. A Windows client in your network replaced a bad NIC. The workstation no longer connects to the network> The NIC is configured correctly, what could be the problem?
Submit
43. Which name resolution technique does a UNIX host use?
Submit
44. You are configuring a dial-up network to a remote server. Which of the protocols must be configured to secure your authentication in terms of encryption? (Choose 2)
Submit
45. RIP by default has ___ number of hops.
Submit
46. Which of the following protocols does Network Attatched Storage (NAS) use? (Choose 2)
Submit
47. A standardized Tunneling protocol that generally combines the best features of PPTP and L2F to provide tunnelling over IP, X.25, fram relay and ATM networks.
Submit
48. This iterm is broadly use to describe any combination of hardware and software devices that are used to connect otherwise non-compatable network environments.
Submit
49. What L2 device is used toconnect dissimilar network segments while keeping their traffic seperate unless absolutely neseccary?
Submit
50.
Which connector is shown?
Submit
51. Which device is responsible for verifiying that data is formatted correctly before it is sent onto a T1 line is?
Submit
52. This Kerberos component is a service that gives Ticket-Grating tickets to an authorized service or user.
Submit
53.
Which connector is shown?
Submit
54. The following interfaces would be used by the switch if it needs to connect to the router?
Submit
55. Which type of Bridge can package frames of one format onto the format of another?
Submit
56. This intrusion detection type monitors your network for activity that would indicate problems such as a virus.
Submit
57. To subnet a network in such a way to arrive at 6 network ID's, how many bits do you need to borrow?
Submit
58.
Which connector is shown?
Submit
59. Which of the following is used to map Network layer protocol addresses to DLCI's?
Submit
60.
Which connector is pictured?
Submit
61. This authentication defines message formats rather than being an authentication method. There are more than fourty of these methods and are PPP extensions also used in wireless with multiple authentication methods.
Submit
62. Which of the following is supported by Windows 2000 and above OS only?
Submit
63. A switch examines the destination MAC address of an incoming frame, the destination is found to be off the same port that the frame came in on. What will the switch do?
Submit
64. You are connecting a Windows workstation to a Netware 4.11 server. The workstation is unable to connect to the server but it was able to connect to the internet. Which 2 of the following are possible causes?
Submit
65. This authentication method validates the remote clients identity, it is used by PPP at the communication session start or anytime during the session.
Submit
66. What is the maximum length of a 10GBaseLR single mode fiber link?
Submit
67. Which of the following reduces broadcast traffic by default?
Submit
68. _____________ are designed to interconnect autonomus domain networks, a single "speaker node" in each domain shares it's routing data with a speaker node in other domains.
Submit
69. This Kerberos component service provides an autorized service or user with a temporary session key and tickets.
Submit
70. When public and private keys are related matmatically, the RCA cypher starts with two large prime numbers that make up the private key and multiplys them together to make a public key.
Submit
71.
Which connector is shown?
Submit
72. Which of the following is used to connect an external tranciever to an NIC?
Submit
73. Which of the following protocols is a secure version of RCP and employs SSH for authentication and secure file transfer?
Submit
74. Which of the following file systems is used by UNIX?
Submit
75. Which of the following allows fault tolerances for user authentication in a Windows 2000 network?
Submit
76.
Which connector is pictured?
Submit
77. This IPsec protocol ensures confidentiality by signing packets by encrypting the packet using a DES or tripple DES (3DES) Cypher
Submit
78. Is a network between two routers that uses another network protocol other than TCP/IP.
Submit
79. Which of the following can be used to reduce broadcasts on the network by separating broadcast domains. (Select all that apply)
Submit
80. You have just upgraded the Dial-Up server on the network. This server was used to share internet connections  to the entire network. Users are unable to connect to the Internet since the upgrade. What is the likely cause?
Submit
81. A router is used to filter all traffic to the private internet but also to allow full access to the computer in the DMZ.
Submit
82. What is the maximum distance between a 10BaseFL and a FOIRL Repeater?
Submit
83. Which of the following are services of a proxy server? (Choose all that apply)
Submit
84.
Which type of connector is pictured?
Submit
85. You just updated the static mapping on a WINS server and want to check the results immediatley on a Windows client. What utility should you use to purge and reload the remote cache name table?
Submit
86. Which of the following protocols is Windows 2000 Server for the purpose of Dial-up?
(Choose 2)
Submit
87. Which of the following is an open source OS?
Submit
88. This binds an entities unique distinguished name and other identifying attributes to it's public key, and is always the responsibility of the CA. This discribes which public key initialization stage?
Submit
89. Which of the choices provided supports various authentication methods including smart cards, certificates, Kerberos and one time passwords.
Submit
90. This Kerberos component is the server or client that Kerberos can assign Tickets to.
Submit
91. You are configuring a leased line for your network. You are testing for the loop. The modem doesn't detect a dial tone but responds to the off hook. What is the most likely cause fir the dial back up failure.
Submit
92. This involves securley making the certificate available with little difficulty, part of public key infistructure.
Submit
93.
Which Command Promt is shown?
Submit
94. Which of the following employs the flat domain structure?
Submit
95. At which layers of the OSI model do NIC's operate?
Submit
96. On a bus segment you introduced a new workstation after which the entire segment colapsed. What is the probable cause? (Choose 2)
Submit
97. This Kerberos item is a record that usually only lasts five minutes and can't be reused. It contains info to prove the session key was recently created and is known only to the client and server.
Submit
98. What are the valid data rates for a Token Ring Network? (Choose 2)
Submit
99.
Which connector is shown.
Submit
100. Into which does the ADS store it's information? (Choose 2)
Submit
View My Results

Quiz Review Timeline (Updated): Jan 15, 2013 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 15, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • May 14, 2010
    Quiz Created by
    Rayandlisaj
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The command line utility pictured is?
Which connector is shown?
An area between a private network (Intranet) and a public network...
Which of the following protocols is used to assure accurate clock...
Which connector is pictured?
Which connector is shown.
Computers that stand outside the protected network and are exposed to...
Which command line prompt is pictured?
Which connector is pictured?
Which commandline promt is shown?
You wish to segragate a sales team logically by the products they deal...
The image represents which command line promt?
This Authentication method encapsulates PPP inside Eithernet frames...
If you were need to identify a NetBIOS name corresponding to an IP...
Which Command Prompt does this represent?
A UNIX / Linux utility that combines the functionality ping and...
What type of networks are ST & SC connectors used to sonnect...
Use this utility with switches to remove or correct NetBIOS name cashe...
If M flag =___ and O flag=___ there is no DHCPv6 server. A device uses...
This Cisco protocol was designed to include support for variable...
This type of hub is yet to be defined but may include management...
Which if the following connectors is used in a 10base2 Tapology?
Which of the following Media Access schemes does the Token Ring...
____________ displays a list of a computers active incoming and...
When traveling and unable to connect from a remote site, you check...
Reports the IP address of an entered host name or the host name of an...
The current network uses host file for IP to host name resolution. You...
Which file contains the boot phase of the start up process for Windows...
To which TCP/IP archetecture layer do the Media Access Methods Belong?
Which of the following directory services can active directory service...
_________ is used to propogate VLAN information across a trunked link.
Which of the following makes DNS environment a backbone of windows...
A ______ bridge can interconnect different types of networks, such as...
Which connector is shown?
Provide the broadcast address for the following:IP=...
Known as stateless DHCPv6 addressing when the DHCPv6 server isn't...
What type of bridge links a local network accross a wide area segment...
Known as DHCPv6 stateful addressing when, M flag =___ and O flaq =___...
Which of the following access security does Windows 2000 server use on...
Indicates the devices should obtain an IPv6 address from the DHCPv6...
Which type of connector is shown?
A Windows client in your network replaced a bad NIC. The workstation...
Which name resolution technique does a UNIX host use?
You are configuring a dial-up network to a remote server. Which of the...
RIP by default has ___ number of hops.
Which of the following protocols does Network Attatched Storage (NAS)...
A standardized Tunneling protocol that generally combines the best...
This iterm is broadly use to describe any combination of hardware and...
What L2 device is used toconnect dissimilar network segments while...
Which connector is shown?
Which device is responsible for verifiying that data is formatted...
This Kerberos component is a service that gives Ticket-Grating tickets...
Which connector is shown?
The following interfaces would be used by the switch if it needs to...
Which type of Bridge can package frames of one format onto the format...
This intrusion detection type monitors your network for activity that...
To subnet a network in such a way to arrive at 6 network ID's, how...
Which connector is shown?
Which of the following is used to map Network layer protocol addresses...
Which connector is pictured?
This authentication defines message formats rather than being an...
Which of the following is supported by Windows 2000 and above OS only?
A switch examines the destination MAC address of an incoming frame,...
You are connecting a Windows workstation to a Netware 4.11 server. The...
This authentication method validates the remote clients identity, it...
What is the maximum length of a 10GBaseLR single mode fiber link?
Which of the following reduces broadcast traffic by default?
_____________ are designed to interconnect autonomus domain networks,...
This Kerberos component service provides an autorized service or user...
When public and private keys are related matmatically, the RCA cypher...
Which connector is shown?
Which of the following is used to connect an external tranciever to an...
Which of the following protocols is a secure version of RCP and...
Which of the following file systems is used by UNIX?
Which of the following allows fault tolerances for user authentication...
Which connector is pictured?
This IPsec protocol ensures confidentiality by signing packets by...
Is a network between two routers that uses another network protocol...
Which of the following can be used to reduce broadcasts on the network...
You have just upgraded the Dial-Up server on the network. This server...
A router is used to filter all traffic to the private internet but...
What is the maximum distance between a 10BaseFL and a FOIRL Repeater?
Which of the following are services of a proxy server? (Choose all...
Which type of connector is pictured?
You just updated the static mapping on a WINS server and want to check...
Which of the following protocols is Windows 2000 Server for the...
Which of the following is an open source OS?
This binds an entities unique distinguished name and other...
Which of the choices provided supports various authentication methods...
This Kerberos component is the server or client that Kerberos can...
You are configuring a leased line for your network. You are testing...
This involves securley making the certificate available with little...
Which Command Promt is shown?
Which of the following employs the flat domain structure?
At which layers of the OSI model do NIC's operate?
On a bus segment you introduced a new workstation after which the...
This Kerberos item is a record that usually only lasts five minutes...
What are the valid data rates for a Token Ring Network? (Choose 2)
Which connector is shown.
Into which does the ADS store it's information? (Choose 2)
Alert!

Advertisement