Network+ 3

100 Questions | Attempts: 183
Share
SettingsSettings
Please wait...
  • 1/100 Questions

    The command line utility pictured is?

    • Nslookup
    • TracerT
    • Ping
    • Nbstat
    • Netstat
Please wait...
Network+ 3 - Quiz
About This Quiz

Network+ Practice Exam


Quiz Preview

  • 2. 

    Which connector is shown?

    • ST

    • BNC

    • FDDI

    • Molex

    • FC

    Correct Answer
    A. BNC
  • 3. 

    An area between a private network (Intranet) and a public network (extranet) such as the Internet is known as a __________.

    • DMZ

    • Screen Host

    • Bastion Host

    • Dead Zone

    Correct Answer
    A. DMZ
  • 4. 

    Which of the following protocols is used to assure accurate clock times on a network?

    • ICMP

    • NTP

    • SNMP

    • TFTP

    Correct Answer
    A. NTP
  • 5. 

    Which connector is pictured?

    • MU

    • DVI-D

    • FC

    • ST

    • DVI-I

    Correct Answer
    A. ST
  • 6. 

    Which connector is shown.

    • Berg

    • BNC

    • FC

    • FDDI

    • Molex

    Correct Answer
    A. Molex
  • 7. 

    Computers that stand outside the protected network and are exposed to an attack by using two network cards, one for the DMZ and one for the intranet with no communication between the cards.

    • Bastion Host

    • Dead Zone

    • DMZ

    • Screened Host

    Correct Answer
    A. Bastion Host
  • 8. 

    Which command line prompt is pictured?

    • Nslookup

    • TracerT

    • Ping

    • Nbstat

    • Netstat

    Correct Answer
    A. Netstat
  • 9. 

    Which connector is pictured?

    • SC

    • DVI-D

    • FC

    • DVI-I

    • ST

    Correct Answer
    A. DVI-I
  • 10. 

    Which commandline promt is shown?

    • Nslookup

    • TracerT

    • Ipconfig

    • Nbstat

    • Netstat

    Correct Answer
    A. Nbstat
  • 11. 

    You wish to segragate a sales team logically by the products they deal with. Product 1 must not reach product 2 and so on. Which would be ideal?

    • RMON Probe

    • Routing

    • SNMP

    • VLAN's

    Correct Answer
    A. VLAN's
  • 12. 

    The image represents which command line promt?

    • Nslookup

    • TracerT

    • Ping

    • Nbstat

    • Netstat

    Correct Answer
    A. TracerT
  • 13. 

    This Authentication method encapsulates PPP inside Eithernet frames and allows others to establish a secure connection from one computer to another. It is used to connect multiple users to the internet via high speed modems.

    • PPPoE

    • EAP

    • CHAP

    • Mutual Authentication

    Correct Answer
    A. PPPoE
  • 14. 

    If you were need to identify a NetBIOS name corresponding to an IP address, where would you look for it?

    • ARP Cache

    • DNS Cache

    • NetBIOS Name Cache

    • MAC address table of switch

    Correct Answer
    A. NetBIOS Name Cache
  • 15. 

    Which Command Prompt does this represent?

    • Nslookup

    • TracerT

    • Ping

    • Nbstat

    • Netstat

    Correct Answer
    A. Nslookup
  • 16. 

    A UNIX / Linux utility that combines the functionality ping and tracerout.

    • Mtr

    • Nbstat

    • Netstat

    • Nslookup

    Correct Answer
    A. Mtr
  • 17. 

    What type of networks are ST & SC connectors used to sonnect devices?

    • 10BaseT

    • 100BaseTX

    • 10Base2

    • 10Base5

    • 100BaseFX

    Correct Answer
    A. 100BaseFX
  • 18. 

    Use this utility with switches to remove or correct NetBIOS name cashe entries.

    • Mtr

    • Nbstat

    • Netstat

    • NSlookup

    Correct Answer
    A. Nbstat
  • 19. 

    If M flag =___ and O flag=___ there is no DHCPv6 server. A device uses the router advertisement to obtain non link local addresses of other methods like manual and is ok for smaill businesses or indivifuals.

    • M flag = 0 and O flag = 0

    • M flag = 0 and O flag = 1

    • M flag = 1 and O flag = 0

    • M flag = 1 and O flag = 1

    Correct Answer
    A. M flag = 0 and O flag = 0
  • 20. 

    This Cisco protocol was designed to include support for variable length subnet masks.

    • Path Vector Protocol

    • Interior Gateway Protocol

    • Open Shortest Path First

    • Enhanced Interior Gateway Routing Protocol

    Correct Answer
    A. Enhanced Interior Gateway Routing Protocol
  • 21. 

    This type of hub is yet to be defined but may include management features and support TCP/IP and SNMP.

    • Active

    • Intelligent

    • Switching

    • Transfer

    Correct Answer
    A. Intelligent
  • 22. 

    Which if the following connectors is used in a 10base2 Tapology?

    • BNC

    • SC

    • ST

    • RJ-11

    • RJ-45

    Correct Answer
    A. BNC
  • 23. 

    Which of the following Media Access schemes does the Token Ring network use?

    • CSMA / CA

    • CSMA / CD

    • Token Passing

    • None of these

    Correct Answer
    A. Token Passing
  • 24. 

    ____________ displays a list of a computers active incoming and outgoing connections.

    • Mtr

    • Nbstat

    • Netstat

    • Nslookup

    • TracerT

    Correct Answer
    A. Netstat
  • 25. 

    When traveling and unable to connect from a remote site, you check your IP address and it is 0.0.0.0 what is the likely problem?

    • NetBIOS over TCP/IP was disconnected

    • The DHCP server was not readable

    • The DNS server is down

    • The workstation was unplugged

    Correct Answer
    A. The DHCP server was not readable
  • 26. 

    Reports the IP address of an entered host name or the host name of an entered IP address.

    • Mtr

    • Nbstat

    • Netstat

    • Nslookup

    Correct Answer
    A. Nslookup
  • 27. 

    The current network uses host file for IP to host name resolution. You are planning to add a DNS server and move a few servers to a remote site with different IP addresses. Which is true?

    • Users will be able to connect if a DNS server is added to reflectnetwork segments.

    • Users will be able to connect if a DNS server is enabled and hosts file is deleted.

    • Users will be able to connect if a DNS server is added on the workstation.

    Correct Answer
    A. Users will be able to connect if a DNS server is enabled and hosts file is deleted.
  • 28. 

    Which file contains the boot phase of the start up process for Windows 2000 - Vista?

    • Ntbootdd.sys

    • Ntoskrnl.exe

    • NTLDR

    • System Registry Hive

    Correct Answer
    A. NTLDR
  • 29. 

    To which TCP/IP archetecture layer do the Media Access Methods Belong?

    • Application

    • Internet

    • Network Interface

    • Transport

    Correct Answer
    A. Network Interface
  • 30. 

    Which of the following directory services can active directory service be compaired with?

    • File directory services

    • Network directory services

    • NT directory services

    • None of these

    Correct Answer
    A. Network directory services
  • 31. 

    _________ is used to propogate VLAN information across a trunked link.

    • Spanning tree protocol

    • Static VLAN protocol

    • Virtual Trunk protocol

    • None of these

    Correct Answer
    A. Virtual Trunk protocol
  • 32. 

    Which of the following makes DNS environment a backbone of windows 2000 network?

    • ADNS

    • DDNS

    • DHCP

    • None of these

    Correct Answer
    A. DDNS
  • 33. 

    A ______ bridge can interconnect different types of networks, such as a Token Ring and Eithernet. It can link dissimilar MAC layer protocols.

    • Encapsulating

    • Heterogeneous / Translating

    • Learning / Transparent

    • Verticle

    Correct Answer
    A. Heterogeneous / Translating
  • 34. 

    Which connector is shown?

    • Molex

    • MT-RJ

    • MU

    • Opti - jack

    • Volition

    Correct Answer
    A. MT-RJ
  • 35. 

    Provide the broadcast address for the following:IP= 221.240.224.121Subnet= 255.255.255.248

    • 221.240.224.127

    • 221.240.224.255

    • 221.240.224.0

    • 221.240.224.126

    Correct Answer
    A. 221.240.224.127
  • 36. 

    Known as stateless DHCPv6 addressing when the DHCPv6 server isn't assigning stateful addresses to IPv6 hosts but is assigning stateless configuration settings.

    • M flag = 0 and O flag = 0

    • M flag = 0 and O flag = 1

    • M flag = 1 and O flag = 0

    • M flag = 1 and O flag = 1

    Correct Answer
    A. M flag = 0 and O flag = 1
  • 37. 

    What type of bridge links a local network accross a wide area segment and the output channel is usually of dramatically lower band width.

    • Encapsulating Bridge

    • Local Bridge

    • Remote Bridge

    • Transparent Bridge

    Correct Answer
    A. Remote Bridge
  • 38. 

    Known as DHCPv6 stateful addressing when, M flag =___ and O flaq =___ indicates that the devices should obtain both an IPv6 address and the other configuration parameters from a DHCPv6 server.

    • M flag = 0 and O flag = 0

    • M flag = 0 and O flag = 1

    • M flag = 1 and O flag = 0

    • M flag = 1 and O flag = 1

    Correct Answer
    A. M flag = 1 and O flag = 1
  • 39. 

    Which of the following access security does Windows 2000 server use on LAN's?

    • IPsec

    • Kerberos

    • L2TP

    • SSL

    Correct Answer
    A. Kerberos
  • 40. 

    Indicates the devices should obtain an IPv6 address from the DHCPv6 server but no other configuration parameters and is barley used.

    • M flag = 0 and O flag = 0

    • M flag = 1 and O flag = 0

    • M flag = 0 and O flag = 1

    • M flag = 1 and O flag = 1

    Correct Answer
    A. M flag = 1 and O flag = 0
  • 41. 

    Which type of connector is shown?

    • Molex

    • DVI-I

    • Berg

    • DVI-D

    Correct Answer
    A. DVI-D
  • 42. 

    A Windows client in your network replaced a bad NIC. The workstation no longer connects to the network> The NIC is configured correctly, what could be the problem?

    • Incorrect driver

    • Frame type of NIC is misconfigured

    • OS configuration problem

    • None of these

    Correct Answer
    A. Frame type of NIC is misconfigured
  • 43. 

    Which name resolution technique does a UNIX host use?

    • DHCP

    • DNS

    • Proxy

    • LMHOSTS

    Correct Answer
    A. DNS
  • 44. 

    You are configuring a dial-up network to a remote server. Which of the protocols must be configured to secure your authentication in terms of encryption? (Choose 2)

    • PPTP

    • SMTP

    • TCP / IP

    • TFTP

    Correct Answer(s)
    A. PPTP
    A. TCP / IP
  • 45. 

    RIP by default has ___ number of hops.

    • 6

    • 10

    • 12

    • 15

    • 16

    Correct Answer
    A. 15
  • 46. 

    Which of the following protocols does Network Attatched Storage (NAS) use? (Choose 2)

    • IPX

    • ATM

    • TCP/IP

    • Frame Relay

    Correct Answer(s)
    A. IPX
    A. TCP/IP
  • 47. 

    A standardized Tunneling protocol that generally combines the best features of PPTP and L2F to provide tunnelling over IP, X.25, fram relay and ATM networks.

    • IPsec

    • L2TP

    • PPTP

    • SSL / TLS

    • PPPoE

    Correct Answer
    A. L2TP
  • 48. 

    This iterm is broadly use to describe any combination of hardware and software devices that are used to connect otherwise non-compatable network environments.

    • Bridge

    • Hub

    • Gateway

    • Router

    • Switch

    Correct Answer
    A. Gateway
  • 49. 

    What L2 device is used toconnect dissimilar network segments while keeping their traffic seperate unless absolutely neseccary?

    • Bridge

    • Hub

    • Router

    • Repeater

    Correct Answer
    A. Bridge

Quiz Review Timeline (Updated): Jan 15, 2013 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 15, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • May 14, 2010
    Quiz Created by
    Rayandlisaj
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.