Network+ 3

100 Questions | Total Attempts: 179

SettingsSettingsSettings
Network+ 3

Network+ Practice Exam


Questions and Answers
  • 1. 
    Which connector is shown?
    • A. 

      ST

    • B. 

      BNC

    • C. 

      FDDI

    • D. 

      Molex

    • E. 

      FC

  • 2. 
    To which TCP/IP archetecture layer do the Media Access Methods Belong?
    • A. 

      Application

    • B. 

      Internet

    • C. 

      Network Interface

    • D. 

      Transport

  • 3. 
    _____________ are designed to interconnect autonomus domain networks, a single "speaker node" in each domain shares it's routing data with a speaker node in other domains.
    • A. 

      IPsec

    • B. 

      Enhanced Interior Gateway Protocol

    • C. 

      Path Vector Protocols

    • D. 

      Interior Gateway Protocol

  • 4. 
    The image represents which command line promt?
    • A. 

      Nslookup

    • B. 

      TracerT

    • C. 

      Ping

    • D. 

      Nbstat

    • E. 

      Netstat

  • 5. 
    An area between a private network (Intranet) and a public network (extranet) such as the Internet is known as a __________.
    • A. 

      DMZ

    • B. 

      Screen Host

    • C. 

      Bastion Host

    • D. 

      Dead Zone

  • 6. 
    Which device is responsible for verifiying that data is formatted correctly before it is sent onto a T1 line is?
    • A. 

      CSU

    • B. 

      NSP

    • C. 

      DSU

    • D. 

      NAP

  • 7. 
    Which connector is pictured?
    • A. 

      Molex

    • B. 

      BNC

    • C. 

      Berg

    • D. 

      FDDI

    • E. 

      FC

  • 8. 
    If M flag =___ and O flag=___ there is no DHCPv6 server. A device uses the router advertisement to obtain non link local addresses of other methods like manual and is ok for smaill businesses or indivifuals.
    • A. 

      M flag = 0 and O flag = 0

    • B. 

      M flag = 0 and O flag = 1

    • C. 

      M flag = 1 and O flag = 0

    • D. 

      M flag = 1 and O flag = 1

  • 9. 
    This Kerberos component is a service that gives Ticket-Grating tickets to an authorized service or user.
    • A. 

      Ticket-Granting Server

    • B. 

      Principal

    • C. 

      Authentication Server

    • D. 

      Key Distribution Center

  • 10. 
    The command line utility pictured is?
    • A. 

      Nslookup

    • B. 

      TracerT

    • C. 

      Ping

    • D. 

      Nbstat

    • E. 

      Netstat

  • 11. 
    This Cisco protocol was designed to include support for variable length subnet masks.
    • A. 

      Path Vector Protocol

    • B. 

      Interior Gateway Protocol

    • C. 

      Open Shortest Path First

    • D. 

      Enhanced Interior Gateway Routing Protocol

  • 12. 
    This Authentication method encapsulates PPP inside Eithernet frames and allows others to establish a secure connection from one computer to another. It is used to connect multiple users to the internet via high speed modems.
    • A. 

      PPPoE

    • B. 

      EAP

    • C. 

      CHAP

    • D. 

      Mutual Authentication

  • 13. 
    Which type of connector is shown?
    • A. 

      Molex

    • B. 

      DVI-I

    • C. 

      Berg

    • D. 

      DVI-D

  • 14. 
    Which of the following protocols does Network Attatched Storage (NAS) use? (Choose 2)
    • A. 

      IPX

    • B. 

      ATM

    • C. 

      TCP/IP

    • D. 

      Frame Relay

  • 15. 
    Which of the following are services of a proxy server? (Choose all that apply)
    • A. 

      Cached e-mail

    • B. 

      Cached Client Profiles

    • C. 

      Cached Web pages

    • D. 

      Cached DNS Information

  • 16. 
    Which Command Prompt does this represent?
    • A. 

      Nslookup

    • B. 

      TracerT

    • C. 

      Ping

    • D. 

      Nbstat

    • E. 

      Netstat

  • 17. 
    Which of the following is used to map Network layer protocol addresses to DLCI's?
    • A. 

      RARP

    • B. 

      Inverse ARP

    • C. 

      ARP

    • D. 

      None of these.

  • 18. 
    • A. 

      The DNS server could have failed to start the ricght process.

    • B. 

      IP address of the dial up server changed

    • C. 

      Need to add patches and fixes after upgrade

    • D. 

      None of these

  • 19. 
    Which connector is pictured?
    • A. 

      MU

    • B. 

      DVI-D

    • C. 

      FC

    • D. 

      ST

    • E. 

      DVI-I

  • 20. 
    If you were need to identify a NetBIOS name corresponding to an IP address, where would you look for it?
    • A. 

      ARP Cache

    • B. 

      DNS Cache

    • C. 

      NetBIOS Name Cache

    • D. 

      MAC address table of switch

  • 21. 
    A Windows client in your network replaced a bad NIC. The workstation no longer connects to the network> The NIC is configured correctly, what could be the problem?
    • A. 

      Incorrect driver

    • B. 

      Frame type of NIC is misconfigured

    • C. 

      OS configuration problem

    • D. 

      None of these

  • 22. 
    You are connecting a Windows workstation to a Netware 4.11 server. The workstation is unable to connect to the server but it was able to connect to the internet. Which 2 of the following are possible causes?
    • A. 

      The server is not running on Net BEUI

    • B. 

      The server is not running on AppleTalk

    • C. 

      The Workstation is not running Net BEUI

    • D. 

      The Workstation is not running IPX/SPX

  • 23. 
    Which command line prompt is pictured?
    • A. 

      Nslookup

    • B. 

      TracerT

    • C. 

      Ping

    • D. 

      Nbstat

    • E. 

      Netstat

  • 24. 
    Which name resolution technique does a UNIX host use?
    • A. 

      DHCP

    • B. 

      DNS

    • C. 

      Proxy

    • D. 

      LMHOSTS

  • 25. 
    Which of the following protocols is a secure version of RCP and employs SSH for authentication and secure file transfer?
    • A. 

      SSL

    • B. 

      TLS

    • C. 

      WEP

    • D. 

      SCP

    • E. 

      Telnet

  • 26. 
    This Kerberos component service provides an autorized service or user with a temporary session key and tickets.
    • A. 

      Authentication Server

    • B. 

      Key Distribution

    • C. 

      Principal

    • D. 

      Realm

    • E. 

      Ticket Granting Server

  • 27. 
    Which connector is pictured?
    • A. 

      SC

    • B. 

      DVI-D

    • C. 

      FC

    • D. 

      DVI-I

    • E. 

      ST

  • 28. 
    Which of the following makes DNS environment a backbone of windows 2000 network?
    • A. 

      ADNS

    • B. 

      DDNS

    • C. 

      DHCP

    • D. 

      None of these

  • 29. 
    Which if the following connectors is used in a 10base2 Tapology?
    • A. 

      BNC

    • B. 

      SC

    • C. 

      ST

    • D. 

      RJ-11

    • E. 

      RJ-45

  • 30. 
    ____________ displays a list of a computers active incoming and outgoing connections.
    • A. 

      Mtr

    • B. 

      Nbstat

    • C. 

      Netstat

    • D. 

      Nslookup

    • E. 

      TracerT

  • 31. 
    Which commandline promt is shown?
    • A. 

      Nslookup

    • B. 

      TracerT

    • C. 

      Ipconfig

    • D. 

      Nbstat

    • E. 

      Netstat

  • 32. 
    A UNIX / Linux utility that combines the functionality ping and tracerout.
    • A. 

      Mtr

    • B. 

      Nbstat

    • C. 

      Netstat

    • D. 

      Nslookup

  • 33. 
    Known as DHCPv6 stateful addressing when, M flag =___ and O flaq =___ indicates that the devices should obtain both an IPv6 address and the other configuration parameters from a DHCPv6 server.
    • A. 

      M flag = 0 and O flag = 0

    • B. 

      M flag = 0 and O flag = 1

    • C. 

      M flag = 1 and O flag = 0

    • D. 

      M flag = 1 and O flag = 1

  • 34. 
    This Kerberos component is the server or client that Kerberos can assign Tickets to.
    • A. 

      Authentication Server

    • B. 

      Key Distribution Center

    • C. 

      Principal

    • D. 

      Realm

    • E. 

      Ticket-Granting Server

  • 35. 
    Which connector is pictured?
    • A. 

      DVI-D

    • B. 

      FC

    • C. 

      FDDI

    • D. 

      MU

    • E. 

      LX-5

  • 36. 
    This authentication defines message formats rather than being an authentication method. There are more than fourty of these methods and are PPP extensions also used in wireless with multiple authentication methods.
    • A. 

      CHAP

    • B. 

      EAP

    • C. 

      PPPoE

    • D. 

      Mutual Authentication

  • 37. 
    Reports the IP address of an entered host name or the host name of an entered IP address.
    • A. 

      Mtr

    • B. 

      Nbstat

    • C. 

      Netstat

    • D. 

      Nslookup

  • 38. 
    Which type of Bridge can package frames of one format onto the format of another?
    • A. 

      Encapsulating

    • B. 

      Heterogeneous

    • C. 

      Translating

    • D. 

      Transparent

  • 39. 
    Which type of connector is pictured?
    • A. 

      FC

    • B. 

      LC

    • C. 

      LX-5

    • D. 

      MU

    • E. 

      SC

  • 40. 
    A router is used to filter all traffic to the private internet but also to allow full access to the computer in the DMZ.
    • A. 

      Bastion Host

    • B. 

      Dead Zone

    • C. 

      DMZ

    • D. 

      Screened Host

  • 41. 
    A standardized Tunneling protocol that generally combines the best features of PPTP and L2F to provide tunnelling over IP, X.25, fram relay and ATM networks.
    • A. 

      IPsec

    • B. 

      L2TP

    • C. 

      PPTP

    • D. 

      SSL / TLS

    • E. 

      PPPoE

  • 42. 
    A ______ bridge can interconnect different types of networks, such as a Token Ring and Eithernet. It can link dissimilar MAC layer protocols.
    • A. 

      Encapsulating

    • B. 

      Heterogeneous / Translating

    • C. 

      Learning / Transparent

    • D. 

      Verticle

  • 43. 
    Which Command Promt is shown?
    • A. 

      LC

    • B. 

      LX-5

    • C. 

      MU

    • D. 

      Opti Jack

    • E. 

      ST

  • 44. 
    Known as stateless DHCPv6 addressing when the DHCPv6 server isn't assigning stateful addresses to IPv6 hosts but is assigning stateless configuration settings.
    • A. 

      M flag = 0 and O flag = 0

    • B. 

      M flag = 0 and O flag = 1

    • C. 

      M flag = 1 and O flag = 0

    • D. 

      M flag = 1 and O flag = 1

  • 45. 
    When public and private keys are related matmatically, the RCA cypher starts with two large prime numbers that make up the private key and multiplys them together to make a public key.
    • A. 

      Asymetric Crytography

    • B. 

      Asymetric Keys

    • C. 

      Chryptography

    • D. 

      Encryption

  • 46. 
    Is a network between two routers that uses another network protocol other than TCP/IP.
    • A. 

      Bastion Host

    • B. 

      Dead Zone

    • C. 

      DMZ

    • D. 

      Screened Host

  • 47. 
    Which of the choices provided supports various authentication methods including smart cards, certificates, Kerberos and one time passwords.
    • A. 

      CHAP

    • B. 

      EAP

    • C. 

      MS-CHAP

    • D. 

      PPP

    • E. 

      SPAP

  • 48. 
    This authentication method validates the remote clients identity, it is used by PPP at the communication session start or anytime during the session.
    • A. 

      CHAP

    • B. 

      EAP

    • C. 

      Mutual Authentication

    • D. 

      PPPoE

  • 49. 
    This involves securley making the certificate available with little difficulty, part of public key infistructure.
    • A. 

      Certificate Dissemination

    • B. 

      Certificate Generation

    • C. 

      Key Pair Registration

    • D. 

      Registration

  • 50. 
    Which connector is shown.
    • A. 

      Berg

    • B. 

      BNC

    • C. 

      FC

    • D. 

      FDDI

    • E. 

      Molex

  • 51. 
    Computers that stand outside the protected network and are exposed to an attack by using two network cards, one for the DMZ and one for the intranet with no communication between the cards.
    • A. 

      Bastion Host

    • B. 

      Dead Zone

    • C. 

      DMZ

    • D. 

      Screened Host

  • 52. 
    This intrusion detection type monitors your network for activity that would indicate problems such as a virus.
    • A. 

      Anomoly - Based

    • B. 

      Bandwidth - Based

    • C. 

      Behavior - Based

    • D. 

      Signature - Based

  • 53. 
    What type of bridge links a local network accross a wide area segment and the output channel is usually of dramatically lower band width.
    • A. 

      Encapsulating Bridge

    • B. 

      Local Bridge

    • C. 

      Remote Bridge

    • D. 

      Transparent Bridge

  • 54. 
    This IPsec protocol ensures confidentiality by signing packets by encrypting the packet using a DES or tripple DES (3DES) Cypher
    • A. 

      Authentication Header

    • B. 

      ESP

    • C. 

      Internet Exchange Key

    • D. 

      IP Payload Compression Protocol

  • 55. 
    This binds an entities unique distinguished name and other identifying attributes to it's public key, and is always the responsibility of the CA. This discribes which public key initialization stage?
    • A. 

      Public Key Incryption Stage 1 = Registration

    • B. 

      Public Key Incryption Stage 2 = Key Pair Generation

    • C. 

      Public Key Incryption Stage 3 = Certificate Generation

    • D. 

      Public Key Incryption Stage 4 = Certificate Dissemination

  • 56. 
    Which connector is shown?
    • A. 

      Molex

    • B. 

      MT-RJ

    • C. 

      MU

    • D. 

      Opti - jack

    • E. 

      Volition

  • 57. 
    This Kerberos item is a record that usually only lasts five minutes and can't be reused. It contains info to prove the session key was recently created and is known only to the client and server.
    • A. 

      Authenticator

    • B. 

      Credentials

    • C. 

      Session Key

    • D. 

      Ticket

  • 58. 
    Which of the following directory services can active directory service be compaired with?
    • A. 

      File directory services

    • B. 

      Network directory services

    • C. 

      NT directory services

    • D. 

      None of these

  • 59. 
    Use this utility with switches to remove or correct NetBIOS name cashe entries.
    • A. 

      Mtr

    • B. 

      Nbstat

    • C. 

      Netstat

    • D. 

      NSlookup

  • 60. 
    Which connector is shown.
    • A. 

      MT-RJ

    • B. 

      MU

    • C. 

      Opti-Jack

    • D. 

      SC

    • E. 

      ST

  • 61. 
    You just updated the static mapping on a WINS server and want to check the results immediatley on a Windows client. What utility should you use to purge and reload the remote cache name table?
    • A. 

      IPconfig /flushdns

    • B. 

      IPconfig /flushwins

    • C. 

      Netstat -reload

    • D. 

      Nbstat -R

    • E. 

      Ping -t

  • 62. 
    What is the maximum length of a 10GBaseLR single mode fiber link?
    • A. 

      300 Meters

    • B. 

      2000 Meters

    • C. 

      10 Kilometers

    • D. 

      40 Kilometers

  • 63. 
    What is the maximum distance between a 10BaseFL and a FOIRL Repeater?
    • A. 

      1000 Meters

    • B. 

      2000 Meters

    • C. 

      10 Kilometers

    • D. 

      50 Kilometers

  • 64. 
    Which of the following can be used to reduce broadcasts on the network by separating broadcast domains. (Select all that apply)
    • A. 

      Bridges

    • B. 

      Proxies

    • C. 

      Routers

    • D. 

      VLAN's

    • E. 

      WINS

  • 65. 
    Which of the following employs the flat domain structure?
    • A. 

      ADS

    • B. 

      ATM

    • C. 

      DHCP

    • D. 

      NTDS

  • 66. 
    Which connector is shown?
    • A. 

      BNC

    • B. 

      FC

    • C. 

      Opti-Jack

    • D. 

      SC

    • E. 

      Volition

  • 67. 
    Which of the following protocols is Windows 2000 Server for the purpose of Dial-up? (Choose 2)
    • A. 

      IPX / SPX

    • B. 

      PPP

    • C. 

      SLIP

    • D. 

      TCP / IP

  • 68. 
    You are configuring a dial-up network to a remote server. Which of the protocols must be configured to secure your authentication in terms of encryption? (Choose 2)
    • A. 

      PPTP

    • B. 

      SMTP

    • C. 

      TCP / IP

    • D. 

      TFTP

  • 69. 
    Into which does the ADS store it's information? (Choose 2)
    • A. 

      AD Data Base

    • B. 

      AD Log Files

    • C. 

      Shared System Files

    • D. 

      None of these

  • 70. 
    Which of the following Media Access schemes does the Token Ring network use?
    • A. 

      CSMA / CA

    • B. 

      CSMA / CD

    • C. 

      Token Passing

    • D. 

      None of these

  • 71. 
    To subnet a network in such a way to arrive at 6 network ID's, how many bits do you need to borrow?
    • A. 

      2

    • B. 

      3

    • C. 

      4

    • D. 

      5

    • E. 

      6

  • 72. 
    Which of the following file systems is used by UNIX?
    • A. 

      FAT

    • B. 

      Netware File System

    • C. 

      Network File System

    • D. 

      NTFS

  • 73. 
    Which connector is shown?
    • A. 

      LC

    • B. 

      FDDI

    • C. 

      MU

    • D. 

      SC

    • E. 

      Volition

  • 74. 
    You are configuring a leased line for your network. You are testing for the loop. The modem doesn't detect a dial tone but responds to the off hook. What is the most likely cause fir the dial back up failure.
    • A. 

      Cable

    • B. 

      Modem

    • C. 

      NIC

    • D. 

      Router

  • 75. 
    Provide the broadcast address for the following:IP= 221.240.224.121Subnet= 255.255.255.248
    • A. 

      221.240.224.127

    • B. 

      221.240.224.255

    • C. 

      221.240.224.0

    • D. 

      221.240.224.126

  • 76. 
    Which of the following is supported by Windows 2000 and above OS only?
    • A. 

      Fat 16

    • B. 

      Fat 32

    • C. 

      NTFS 4

    • D. 

      NTFS 5

  • 77. 
    Which of the following allows fault tolerances for user authentication in a Windows 2000 network?
    • A. 

      Bindery replication

    • B. 

      Mirror servers

    • C. 

      Multi master replication

    • D. 

      None of these

  • 78. 
    The current network uses host file for IP to host name resolution. You are planning to add a DNS server and move a few servers to a remote site with different IP addresses. Which is true?
    • A. 

      Users will be able to connect if a DNS server is added to reflectnetwork segments.

    • B. 

      Users will be able to connect if a DNS server is enabled and hosts file is deleted.

    • C. 

      Users will be able to connect if a DNS server is added on the workstation.

  • 79. 
    _________ is used to propogate VLAN information across a trunked link.
    • A. 

      Spanning tree protocol

    • B. 

      Static VLAN protocol

    • C. 

      Virtual Trunk protocol

    • D. 

      None of these

  • 80. 
    Which connector is shown?
    • A. 

      BNC

    • B. 

      FC

    • C. 

      SC

    • D. 

      ST

    • E. 

      Volition

  • 81. 
    This iterm is broadly use to describe any combination of hardware and software devices that are used to connect otherwise non-compatable network environments.
    • A. 

      Bridge

    • B. 

      Hub

    • C. 

      Gateway

    • D. 

      Router

    • E. 

      Switch

  • 82. 
    When traveling and unable to connect from a remote site, you check your IP address and it is 0.0.0.0 what is the likely problem?
    • A. 

      NetBIOS over TCP/IP was disconnected

    • B. 

      The DHCP server was not readable

    • C. 

      The DNS server is down

    • D. 

      The workstation was unplugged

  • 83. 
    Which of the following access security does Windows 2000 server use on LAN's?
    • A. 

      IPsec

    • B. 

      Kerberos

    • C. 

      L2TP

    • D. 

      SSL

  • 84. 
    What L2 device is used toconnect dissimilar network segments while keeping their traffic seperate unless absolutely neseccary?
    • A. 

      Bridge

    • B. 

      Hub

    • C. 

      Router

    • D. 

      Repeater

  • 85. 
    RIP by default has ___ number of hops.
    • A. 

      6

    • B. 

      10

    • C. 

      12

    • D. 

      15

    • E. 

      16

  • 86. 
    On a bus segment you introduced a new workstation after which the entire segment colapsed. What is the probable cause? (Choose 2)
    • A. 

      Faulty Cabling

    • B. 

      Faulty NIC

    • C. 

      Faulty Server

    • D. 

      Faulty Termination

  • 87. 
    Which of the following is an open source OS?
    • A. 

      Lennox

    • B. 

      UNIX

    • C. 

      Windows

  • 88. 
    Which connector is shown?
    • A. 

      LX-5

    • B. 

      Opti-Jack

    • C. 

      MU

    • D. 

      SC

    • E. 

      Vollition

  • 89. 
    Which of the following reduces broadcast traffic by default?
    • A. 

      Hub

    • B. 

      Repeater

    • C. 

      Router

    • D. 

      Switch

  • 90. 
    A switch examines the destination MAC address of an incoming frame, the destination is found to be off the same port that the frame came in on. What will the switch do?
    • A. 

      Foreward the frame

    • B. 

      Flood the frame

    • C. 

      Filter the frame

    • D. 

      Broadcast the frame

  • 91. 
    Which of the following is used to connect an external tranciever to an NIC?
    • A. 

      AUI

    • B. 

      BNC

    • C. 

      RJ-45

    • D. 

      SC

    • E. 

      ST

  • 92. 
    You wish to segragate a sales team logically by the products they deal with. Product 1 must not reach product 2 and so on. Which would be ideal?
    • A. 

      RMON Probe

    • B. 

      Routing

    • C. 

      SNMP

    • D. 

      VLAN's

  • 93. 
    The following interfaces would be used by the switch if it needs to connect to the router?
    • A. 

      Auxillary Port

    • B. 

      Fast Eithernet

    • C. 

      NIC

    • D. 

      Serial Interface

  • 94. 
    Which file contains the boot phase of the start up process for Windows 2000 - Vista?
    • A. 

      Ntbootdd.sys

    • B. 

      Ntoskrnl.exe

    • C. 

      NTLDR

    • D. 

      System Registry Hive

  • 95. 
    What are the valid data rates for a Token Ring Network? (Choose 2)
    • A. 

      4 Mbps

    • B. 

      10 Mbps

    • C. 

      16 Mbps

    • D. 

      100 Mbps

  • 96. 
    At which layers of the OSI model do NIC's operate?
    • A. 

      Physical

    • B. 

      Data Link

    • C. 

      Network

    • D. 

      Transport

  • 97. 
    Which of the following protocols is used to assure accurate clock times on a network?
    • A. 

      ICMP

    • B. 

      NTP

    • C. 

      SNMP

    • D. 

      TFTP

  • 98. 
    What type of networks are ST & SC connectors used to sonnect devices?
    • A. 

      10BaseT

    • B. 

      100BaseTX

    • C. 

      10Base2

    • D. 

      10Base5

    • E. 

      100BaseFX

  • 99. 
    Indicates the devices should obtain an IPv6 address from the DHCPv6 server but no other configuration parameters and is barley used.
    • A. 

      M flag = 0 and O flag = 0

    • B. 

      M flag = 1 and O flag = 0

    • C. 

      M flag = 0 and O flag = 1

    • D. 

      M flag = 1 and O flag = 1

  • 100. 
    This type of hub is yet to be defined but may include management features and support TCP/IP and SNMP.
    • A. 

      Active

    • B. 

      Intelligent

    • C. 

      Switching

    • D. 

      Transfer