Network+ 3

100 Questions | Attempts: 183
Please wait...
Question 1 / 101
🏆 Rank #--
Score 0/100

1.
The command line utility pictured is?

Submit
Please wait...
About This Quiz
Network+ 3 - Quiz

Network+ Practice Exam

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2.
Which connector is shown?

Submit

3. An area between a private network (Intranet) and a public network (extranet) such as the Internet is known as a __________.

Submit

4. Which of the following protocols is used to assure accurate clock times on a network?

Submit

5.
Which connector is pictured?

Submit

6.
Which connector is shown.

Submit

7. Computers that stand outside the protected network and are exposed to an attack by using two network cards, one for the DMZ and one for the intranet with no communication between the cards.

Submit

8.
Which command line prompt is pictured?

Submit

9.
Which connector is pictured?

Submit

10.
Which commandline promt is shown?

Submit

11. You wish to segragate a sales team logically by the products they deal with. Product 1 must not reach product 2 and so on. Which would be ideal?

Submit

12.
The image represents which command line promt?

Submit

13. This Authentication method encapsulates PPP inside Eithernet frames and allows others to establish a secure connection from one computer to another. It is used to connect multiple users to the internet via high speed modems.

Submit

14. If you were need to identify a NetBIOS name corresponding to an IP address, where would you look for it?

Submit

15.
Which Command Prompt does this represent?

Submit

16. A UNIX / Linux utility that combines the functionality ping and tracerout.

Submit

17. What type of networks are ST & SC connectors used to sonnect devices?

Submit

18. Use this utility with switches to remove or correct NetBIOS name cashe entries.

Submit

19. If M flag =___ and O flag=___ there is no DHCPv6 server. A device uses the router advertisement to obtain non link local addresses of other methods like manual and is ok for smaill businesses or indivifuals.

Submit

20. This Cisco protocol was designed to include support for variable length subnet masks.

Submit

21. This type of hub is yet to be defined but may include management features and support TCP/IP and SNMP.

Submit

22. Which if the following connectors is used in a 10base2 Tapology?

Submit

23. Which of the following Media Access schemes does the Token Ring network use?

Submit

24. ____________ displays a list of a computers active incoming and outgoing connections.

Submit

25. When traveling and unable to connect from a remote site, you check your IP address and it is 0.0.0.0 what is the likely problem?

Submit

26. Reports the IP address of an entered host name or the host name of an entered IP address.

Submit

27. The current network uses host file for IP to host name resolution. You are planning to add a DNS server and move a few servers to a remote site with different IP addresses. Which is true?

Submit

28. Which file contains the boot phase of the start up process for Windows 2000 - Vista?

Submit

29. To which TCP/IP archetecture layer do the Media Access Methods Belong?

Submit

30. Which of the following directory services can active directory service be compaired with?

Submit

31. _________ is used to propogate VLAN information across a trunked link.

Submit

32. Which of the following makes DNS environment a backbone of windows 2000 network?

Submit

33. A ______ bridge can interconnect different types of networks, such as a Token Ring and Eithernet. It can link dissimilar MAC layer protocols.

Submit

34.
Which connector is shown?

Submit

35. Provide the broadcast address for the following:
IP= 221.240.224.121
Subnet= 255.255.255.248

Submit

36. Known as stateless DHCPv6 addressing when the DHCPv6 server isn't assigning stateful addresses to IPv6 hosts but is assigning stateless configuration settings.

Submit

37. What type of bridge links a local network accross a wide area segment and the output channel is usually of dramatically lower band width.

Submit

38. Known as DHCPv6 stateful addressing when, M flag =___ and O flaq =___ indicates that the devices should obtain both an IPv6 address and the other configuration parameters from a DHCPv6 server.

Submit

39. Which of the following access security does Windows 2000 server use on LAN's?

Submit

40. Indicates the devices should obtain an IPv6 address from the DHCPv6 server but no other configuration parameters and is barley used.

Submit

41.
Which type of connector is shown?

Submit

42. A Windows client in your network replaced a bad NIC. The workstation no longer connects to the network> The NIC is configured correctly, what could be the problem?

Submit

43. Which name resolution technique does a UNIX host use?

Submit

44. You are configuring a dial-up network to a remote server. Which of the protocols must be configured to secure your authentication in terms of encryption? (Choose 2)

Submit

45. RIP by default has ___ number of hops.

Submit

46. Which of the following protocols does Network Attatched Storage (NAS) use? (Choose 2)

Submit

47. A standardized Tunneling protocol that generally combines the best features of PPTP and L2F to provide tunnelling over IP, X.25, fram relay and ATM networks.

Submit

48. This iterm is broadly use to describe any combination of hardware and software devices that are used to connect otherwise non-compatable network environments.

Submit

49. What L2 device is used toconnect dissimilar network segments while keeping their traffic seperate unless absolutely neseccary?

Submit

50.
Which connector is shown?

Submit

51. Which device is responsible for verifiying that data is formatted correctly before it is sent onto a T1 line is?

Submit

52. This Kerberos component is a service that gives Ticket-Grating tickets to an authorized service or user.

Submit

53.
Which connector is shown?

Submit

54. The following interfaces would be used by the switch if it needs to connect to the router?

Submit

55. Which type of Bridge can package frames of one format onto the format of another?

Submit

56. This intrusion detection type monitors your network for activity that would indicate problems such as a virus.

Submit

57. To subnet a network in such a way to arrive at 6 network ID's, how many bits do you need to borrow?

Submit

58.
Which connector is shown?

Submit

59. Which of the following is used to map Network layer protocol addresses to DLCI's?

Submit

60.
Which connector is pictured?

Submit

61. This authentication defines message formats rather than being an authentication method. There are more than fourty of these methods and are PPP extensions also used in wireless with multiple authentication methods.

Submit

62. Which of the following is supported by Windows 2000 and above OS only?

Submit

63. A switch examines the destination MAC address of an incoming frame, the destination is found to be off the same port that the frame came in on. What will the switch do?

Submit

64. You are connecting a Windows workstation to a Netware 4.11 server. The workstation is unable to connect to the server but it was able to connect to the internet. Which 2 of the following are possible causes?

Submit

65. This authentication method validates the remote clients identity, it is used by PPP at the communication session start or anytime during the session.

Submit

66. What is the maximum length of a 10GBaseLR single mode fiber link?

Submit

67. Which of the following reduces broadcast traffic by default?

Submit

68. _____________ are designed to interconnect autonomus domain networks, a single "speaker node" in each domain shares it's routing data with a speaker node in other domains.

Submit

69. This Kerberos component service provides an autorized service or user with a temporary session key and tickets.

Submit

70. When public and private keys are related matmatically, the RCA cypher starts with two large prime numbers that make up the private key and multiplys them together to make a public key.

Submit

71.
Which connector is shown?

Submit

72. Which of the following is used to connect an external tranciever to an NIC?

Submit

73. Which of the following protocols is a secure version of RCP and employs SSH for authentication and secure file transfer?

Submit

74. Which of the following file systems is used by UNIX?

Submit

75. Which of the following allows fault tolerances for user authentication in a Windows 2000 network?

Submit

76.
Which connector is pictured?

Submit

77. This IPsec protocol ensures confidentiality by signing packets by encrypting the packet using a DES or tripple DES (3DES) Cypher

Submit

78. Is a network between two routers that uses another network protocol other than TCP/IP.

Submit

79. Which of the following can be used to reduce broadcasts on the network by separating broadcast domains. (Select all that apply)

Submit

80. You have just upgraded the Dial-Up server on the network. This server was used to share internet connections  to the entire network. Users are unable to connect to the Internet since the upgrade. What is the likely cause?

Submit

81. A router is used to filter all traffic to the private internet but also to allow full access to the computer in the DMZ.

Submit

82. What is the maximum distance between a 10BaseFL and a FOIRL Repeater?

Submit

83. Which of the following are services of a proxy server? (Choose all that apply)

Submit

84.
Which type of connector is pictured?

Submit

85. You just updated the static mapping on a WINS server and want to check the results immediatley on a Windows client. What utility should you use to purge and reload the remote cache name table?

Submit

86. Which of the following protocols is Windows 2000 Server for the purpose of Dial-up?
(Choose 2)

Submit

87. Which of the following is an open source OS?

Submit

88. This binds an entities unique distinguished name and other identifying attributes to it's public key, and is always the responsibility of the CA. This discribes which public key initialization stage?

Submit

89. Which of the choices provided supports various authentication methods including smart cards, certificates, Kerberos and one time passwords.

Submit

90. This Kerberos component is the server or client that Kerberos can assign Tickets to.

Submit

91. You are configuring a leased line for your network. You are testing for the loop. The modem doesn't detect a dial tone but responds to the off hook. What is the most likely cause fir the dial back up failure.

Submit

92. This involves securley making the certificate available with little difficulty, part of public key infistructure.

Submit

93.
Which Command Promt is shown?

Submit

94. Which of the following employs the flat domain structure?

Submit

95. At which layers of the OSI model do NIC's operate?

Submit

96. On a bus segment you introduced a new workstation after which the entire segment colapsed. What is the probable cause? (Choose 2)

Submit

97. This Kerberos item is a record that usually only lasts five minutes and can't be reused. It contains info to prove the session key was recently created and is known only to the client and server.

Submit

98. What are the valid data rates for a Token Ring Network? (Choose 2)

Submit

99.
Which connector is shown.

Submit

100. Into which does the ADS store it's information? (Choose 2)

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The command line utility pictured is?
Which connector is shown?
An area between a private network (Intranet) and a public network...
Which of the following protocols is used to assure accurate clock...
Which connector is pictured?
Which connector is shown.
Computers that stand outside the protected network and are exposed to...
Which command line prompt is pictured?
Which connector is pictured?
Which commandline promt is shown?
You wish to segragate a sales team logically by the products they deal...
The image represents which command line promt?
This Authentication method encapsulates PPP inside Eithernet frames...
If you were need to identify a NetBIOS name corresponding to an IP...
Which Command Prompt does this represent?
A UNIX / Linux utility that combines the functionality ping and...
What type of networks are ST & SC connectors used to sonnect...
Use this utility with switches to remove or correct NetBIOS name cashe...
If M flag =___ and O flag=___ there is no DHCPv6 server. A device uses...
This Cisco protocol was designed to include support for variable...
This type of hub is yet to be defined but may include management...
Which if the following connectors is used in a 10base2 Tapology?
Which of the following Media Access schemes does the Token Ring...
____________ displays a list of a computers active incoming and...
When traveling and unable to connect from a remote site, you check...
Reports the IP address of an entered host name or the host name of an...
The current network uses host file for IP to host name resolution. You...
Which file contains the boot phase of the start up process for Windows...
To which TCP/IP archetecture layer do the Media Access Methods Belong?
Which of the following directory services can active directory service...
_________ is used to propogate VLAN information across a trunked link.
Which of the following makes DNS environment a backbone of windows...
A ______ bridge can interconnect different types of networks, such as...
Which connector is shown?
Provide the broadcast address for the following:IP=...
Known as stateless DHCPv6 addressing when the DHCPv6 server isn't...
What type of bridge links a local network accross a wide area segment...
Known as DHCPv6 stateful addressing when, M flag =___ and O flaq =___...
Which of the following access security does Windows 2000 server use on...
Indicates the devices should obtain an IPv6 address from the DHCPv6...
Which type of connector is shown?
A Windows client in your network replaced a bad NIC. The workstation...
Which name resolution technique does a UNIX host use?
You are configuring a dial-up network to a remote server. Which of the...
RIP by default has ___ number of hops.
Which of the following protocols does Network Attatched Storage (NAS)...
A standardized Tunneling protocol that generally combines the best...
This iterm is broadly use to describe any combination of hardware and...
What L2 device is used toconnect dissimilar network segments while...
Which connector is shown?
Which device is responsible for verifiying that data is formatted...
This Kerberos component is a service that gives Ticket-Grating tickets...
Which connector is shown?
The following interfaces would be used by the switch if it needs to...
Which type of Bridge can package frames of one format onto the format...
This intrusion detection type monitors your network for activity that...
To subnet a network in such a way to arrive at 6 network ID's, how...
Which connector is shown?
Which of the following is used to map Network layer protocol addresses...
Which connector is pictured?
This authentication defines message formats rather than being an...
Which of the following is supported by Windows 2000 and above OS only?
A switch examines the destination MAC address of an incoming frame,...
You are connecting a Windows workstation to a Netware 4.11 server. The...
This authentication method validates the remote clients identity, it...
What is the maximum length of a 10GBaseLR single mode fiber link?
Which of the following reduces broadcast traffic by default?
_____________ are designed to interconnect autonomus domain networks,...
This Kerberos component service provides an autorized service or user...
When public and private keys are related matmatically, the RCA cypher...
Which connector is shown?
Which of the following is used to connect an external tranciever to an...
Which of the following protocols is a secure version of RCP and...
Which of the following file systems is used by UNIX?
Which of the following allows fault tolerances for user authentication...
Which connector is pictured?
This IPsec protocol ensures confidentiality by signing packets by...
Is a network between two routers that uses another network protocol...
Which of the following can be used to reduce broadcasts on the network...
You have just upgraded the Dial-Up server on the network. This server...
A router is used to filter all traffic to the private internet but...
What is the maximum distance between a 10BaseFL and a FOIRL Repeater?
Which of the following are services of a proxy server? (Choose all...
Which type of connector is pictured?
You just updated the static mapping on a WINS server and want to check...
Which of the following protocols is Windows 2000 Server for the...
Which of the following is an open source OS?
This binds an entities unique distinguished name and other...
Which of the choices provided supports various authentication methods...
This Kerberos component is the server or client that Kerberos can...
You are configuring a leased line for your network. You are testing...
This involves securley making the certificate available with little...
Which Command Promt is shown?
Which of the following employs the flat domain structure?
At which layers of the OSI model do NIC's operate?
On a bus segment you introduced a new workstation after which the...
This Kerberos item is a record that usually only lasts five minutes...
What are the valid data rates for a Token Ring Network? (Choose 2)
Which connector is shown.
Into which does the ADS store it's information? (Choose 2)
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!