Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Professional Certification
Network+ 3
100 Questions
|
By Rayandlisaj | Updated: Jan 15, 2013
| Attempts: 183
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 100
0 %
0/100
Score
0/100
1.
The command line utility pictured is?
Nslookup
TracerT
Ping
Nbstat
Netstat
Submit
Start Quiz
About This Quiz
Network+ Practice Exam
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
Which connector is shown?
ST
BNC
FDDI
Molex
FC
Submit
3.
An area between a private network (Intranet) and a public network (extranet) such as the Internet is known as a __________.
DMZ
Screen Host
Bastion Host
Dead Zone
Submit
4.
Which of the following protocols is used to assure accurate clock times on a network?
ICMP
NTP
SNMP
TFTP
Submit
5.
Which connector is pictured?
MU
DVI-D
FC
ST
DVI-I
Submit
6.
Which connector is shown.
Berg
BNC
FC
FDDI
Molex
Submit
7.
Computers that stand outside the protected network and are exposed to an attack by using two network cards, one for the DMZ and one for the intranet with no communication between the cards.
Bastion Host
Dead Zone
DMZ
Screened Host
Submit
8.
Which command line prompt is pictured?
Nslookup
TracerT
Ping
Nbstat
Netstat
Submit
9.
Which connector is pictured?
SC
DVI-D
FC
DVI-I
ST
Submit
10.
Which commandline promt is shown?
Nslookup
TracerT
Ipconfig
Nbstat
Netstat
Submit
11.
You wish to segragate a sales team logically by the products they deal with. Product 1 must not reach product 2 and so on. Which would be ideal?
RMON Probe
Routing
SNMP
VLAN's
Submit
12.
The image represents which command line promt?
Nslookup
TracerT
Ping
Nbstat
Netstat
Submit
13.
This Authentication method encapsulates PPP inside Eithernet frames and allows others to establish a secure connection from one computer to another. It is used to connect multiple users to the internet via high speed modems.
PPPoE
EAP
CHAP
Mutual Authentication
Submit
14.
If you were need to identify a NetBIOS name corresponding to an IP address, where would you look for it?
ARP Cache
DNS Cache
NetBIOS Name Cache
MAC address table of switch
Submit
15.
Which Command Prompt does this represent?
Nslookup
TracerT
Ping
Nbstat
Netstat
Submit
16.
A UNIX / Linux utility that combines the functionality ping and tracerout.
Mtr
Nbstat
Netstat
Nslookup
Submit
17.
What type of networks are ST & SC connectors used to sonnect devices?
10BaseT
100BaseTX
10Base2
10Base5
100BaseFX
Submit
18.
Use this utility with switches to remove or correct NetBIOS name cashe entries.
Mtr
Nbstat
Netstat
NSlookup
Submit
19.
If M flag =___ and O flag=___ there is no DHCPv6 server. A device uses the router advertisement to obtain non link local addresses of other methods like manual and is ok for smaill businesses or indivifuals.
M flag = 0 and O flag = 0
M flag = 0 and O flag = 1
M flag = 1 and O flag = 0
M flag = 1 and O flag = 1
Submit
20.
This Cisco protocol was designed to include support for variable length subnet masks.
Path Vector Protocol
Interior Gateway Protocol
Open Shortest Path First
Enhanced Interior Gateway Routing Protocol
Submit
21.
This type of hub is yet to be defined but may include management features and support TCP/IP and SNMP.
Active
Intelligent
Switching
Transfer
Submit
22.
Which if the following connectors is used in a 10base2 Tapology?
BNC
SC
ST
RJ-11
RJ-45
Submit
23.
Which of the following Media Access schemes does the Token Ring network use?
CSMA / CA
CSMA / CD
Token Passing
None of these
Submit
24.
____________ displays a list of a computers active incoming and outgoing connections.
Mtr
Nbstat
Netstat
Nslookup
TracerT
Submit
25.
When traveling and unable to connect from a remote site, you check your IP address and it is 0.0.0.0 what is the likely problem?
NetBIOS over TCP/IP was disconnected
The DHCP server was not readable
The DNS server is down
The workstation was unplugged
Submit
26.
Reports the IP address of an entered host name or the host name of an entered IP address.
Mtr
Nbstat
Netstat
Nslookup
Submit
27.
The current network uses host file for IP to host name resolution. You are planning to add a DNS server and move a few servers to a remote site with different IP addresses. Which is true?
Users will be able to connect if a DNS server is added to reflectnetwork segments.
Users will be able to connect if a DNS server is enabled and hosts file is deleted.
Users will be able to connect if a DNS server is added on the workstation.
Submit
28.
Which file contains the boot phase of the start up process for Windows 2000 - Vista?
Ntbootdd.sys
Ntoskrnl.exe
NTLDR
System Registry Hive
Submit
29.
To which TCP/IP archetecture layer do the Media Access Methods Belong?
Application
Internet
Network Interface
Transport
Submit
30.
Which of the following directory services can active directory service be compaired with?
File directory services
Network directory services
NT directory services
None of these
Submit
31.
_________ is used to propogate VLAN information across a trunked link.
Spanning tree protocol
Static VLAN protocol
Virtual Trunk protocol
None of these
Submit
32.
Which of the following makes DNS environment a backbone of windows 2000 network?
ADNS
DDNS
DHCP
None of these
Submit
33.
A ______ bridge can interconnect different types of networks, such as a Token Ring and Eithernet. It can link dissimilar MAC layer protocols.
Encapsulating
Heterogeneous / Translating
Learning / Transparent
Verticle
Submit
34.
Which connector is shown?
Molex
MT-RJ
MU
Opti - jack
Volition
Submit
35.
Provide the broadcast address for the following:
IP= 221.240.224.121
Subnet= 255.255.255.248
221.240.224.127
221.240.224.255
221.240.224.0
221.240.224.126
Submit
36.
Known as stateless DHCPv6 addressing when the DHCPv6 server isn't assigning stateful addresses to IPv6 hosts but is assigning stateless configuration settings.
M flag = 0 and O flag = 0
M flag = 0 and O flag = 1
M flag = 1 and O flag = 0
M flag = 1 and O flag = 1
Submit
37.
What type of bridge links a local network accross a wide area segment and the output channel is usually of dramatically lower band width.
Encapsulating Bridge
Local Bridge
Remote Bridge
Transparent Bridge
Submit
38.
Known as DHCPv6 stateful addressing when, M flag =___ and O flaq =___ indicates that the devices should obtain both an IPv6 address and the other configuration parameters from a DHCPv6 server.
M flag = 0 and O flag = 0
M flag = 0 and O flag = 1
M flag = 1 and O flag = 0
M flag = 1 and O flag = 1
Submit
39.
Which of the following access security does Windows 2000 server use on LAN's?
IPsec
Kerberos
L2TP
SSL
Submit
40.
Indicates the devices should obtain an IPv6 address from the DHCPv6 server but no other configuration parameters and is barley used.
M flag = 0 and O flag = 0
M flag = 1 and O flag = 0
M flag = 0 and O flag = 1
M flag = 1 and O flag = 1
Submit
41.
Which type of connector is shown?
Molex
DVI-I
Berg
DVI-D
Submit
42.
A Windows client in your network replaced a bad NIC. The workstation no longer connects to the network> The NIC is configured correctly, what could be the problem?
Incorrect driver
Frame type of NIC is misconfigured
OS configuration problem
None of these
Submit
43.
Which name resolution technique does a UNIX host use?
DHCP
DNS
Proxy
LMHOSTS
Submit
44.
You are configuring a dial-up network to a remote server. Which of the protocols must be configured to secure your authentication in terms of encryption? (Choose 2)
PPTP
SMTP
TCP / IP
TFTP
Submit
45.
RIP by default has ___ number of hops.
6
10
12
15
16
Submit
46.
Which of the following protocols does Network Attatched Storage (NAS) use? (Choose 2)
IPX
ATM
TCP/IP
Frame Relay
Submit
47.
A standardized Tunneling protocol that generally combines the best features of PPTP and L2F to provide tunnelling over IP, X.25, fram relay and ATM networks.
IPsec
L2TP
PPTP
SSL / TLS
PPPoE
Submit
48.
This iterm is broadly use to describe any combination of hardware and software devices that are used to connect otherwise non-compatable network environments.
Bridge
Hub
Gateway
Router
Switch
Submit
49.
What L2 device is used toconnect dissimilar network segments while keeping their traffic seperate unless absolutely neseccary?
Bridge
Hub
Router
Repeater
Submit
50.
Which connector is shown?
LX-5
Opti-Jack
MU
SC
Vollition
Submit
51.
Which device is responsible for verifiying that data is formatted correctly before it is sent onto a T1 line is?
CSU
NSP
DSU
NAP
Submit
52.
This Kerberos component is a service that gives Ticket-Grating tickets to an authorized service or user.
Ticket-Granting Server
Principal
Authentication Server
Key Distribution Center
Submit
53.
Which connector is shown?
BNC
FC
Opti-Jack
SC
Volition
Submit
54.
The following interfaces would be used by the switch if it needs to connect to the router?
Auxillary Port
Fast Eithernet
NIC
Serial Interface
Submit
55.
Which type of Bridge can package frames of one format onto the format of another?
Encapsulating
Heterogeneous
Translating
Transparent
Submit
56.
This intrusion detection type monitors your network for activity that would indicate problems such as a virus.
Anomoly - Based
Bandwidth - Based
Behavior - Based
Signature - Based
Submit
57.
To subnet a network in such a way to arrive at 6 network ID's, how many bits do you need to borrow?
2
3
4
5
6
Submit
58.
Which connector is shown?
BNC
FC
SC
ST
Volition
Submit
59.
Which of the following is used to map Network layer protocol addresses to DLCI's?
RARP
Inverse ARP
ARP
None of these.
Submit
60.
Which connector is pictured?
DVI-D
FC
FDDI
MU
LX-5
Submit
61.
This authentication defines message formats rather than being an authentication method. There are more than fourty of these methods and are PPP extensions also used in wireless with multiple authentication methods.
CHAP
EAP
PPPoE
Mutual Authentication
Submit
62.
Which of the following is supported by Windows 2000 and above OS only?
Fat 16
Fat 32
NTFS 4
NTFS 5
Submit
63.
A switch examines the destination MAC address of an incoming frame, the destination is found to be off the same port that the frame came in on. What will the switch do?
Foreward the frame
Flood the frame
Filter the frame
Broadcast the frame
Submit
64.
You are connecting a Windows workstation to a Netware 4.11 server. The workstation is unable to connect to the server but it was able to connect to the internet. Which 2 of the following are possible causes?
The server is not running on Net BEUI
The server is not running on AppleTalk
The Workstation is not running Net BEUI
The Workstation is not running IPX/SPX
Submit
65.
This authentication method validates the remote clients identity, it is used by PPP at the communication session start or anytime during the session.
CHAP
EAP
Mutual Authentication
PPPoE
Submit
66.
What is the maximum length of a 10GBaseLR single mode fiber link?
300 Meters
2000 Meters
10 Kilometers
40 Kilometers
Submit
67.
Which of the following reduces broadcast traffic by default?
Hub
Repeater
Router
Switch
Submit
68.
_____________ are designed to interconnect autonomus domain networks, a single "speaker node" in each domain shares it's routing data with a speaker node in other domains.
IPsec
Enhanced Interior Gateway Protocol
Path Vector Protocols
Interior Gateway Protocol
Submit
69.
This Kerberos component service provides an autorized service or user with a temporary session key and tickets.
Authentication Server
Key Distribution
Principal
Realm
Ticket Granting Server
Submit
70.
When public and private keys are related matmatically, the RCA cypher starts with two large prime numbers that make up the private key and multiplys them together to make a public key.
Asymetric Crytography
Asymetric Keys
Chryptography
Encryption
Submit
71.
Which connector is shown?
LC
FDDI
MU
SC
Volition
Submit
72.
Which of the following is used to connect an external tranciever to an NIC?
AUI
BNC
RJ-45
SC
ST
Submit
73.
Which of the following protocols is a secure version of RCP and employs SSH for authentication and secure file transfer?
SSL
TLS
WEP
SCP
Telnet
Submit
74.
Which of the following file systems is used by UNIX?
FAT
Netware File System
Network File System
NTFS
Submit
75.
Which of the following allows fault tolerances for user authentication in a Windows 2000 network?
Bindery replication
Mirror servers
Multi master replication
None of these
Submit
76.
Which connector is pictured?
Molex
BNC
Berg
FDDI
FC
Submit
77.
This IPsec protocol ensures confidentiality by signing packets by encrypting the packet using a DES or tripple DES (3DES) Cypher
Authentication Header
ESP
Internet Exchange Key
IP Payload Compression Protocol
Submit
78.
Is a network between two routers that uses another network protocol other than TCP/IP.
Bastion Host
Dead Zone
DMZ
Screened Host
Submit
79.
Which of the following can be used to reduce broadcasts on the network by separating broadcast domains. (Select all that apply)
Bridges
Proxies
Routers
VLAN's
WINS
Submit
80.
You have just upgraded the Dial-Up server on the network. This server was used to share internet connections to the entire network. Users are unable to connect to the Internet since the upgrade. What is the likely cause?
The DNS server could have failed to start the ricght process.
IP address of the dial up server changed
Need to add patches and fixes after upgrade
None of these
Submit
81.
A router is used to filter all traffic to the private internet but also to allow full access to the computer in the DMZ.
Bastion Host
Dead Zone
DMZ
Screened Host
Submit
82.
What is the maximum distance between a 10BaseFL and a FOIRL Repeater?
1000 Meters
2000 Meters
10 Kilometers
50 Kilometers
Submit
83.
Which of the following are services of a proxy server? (Choose all that apply)
Cached e-mail
Cached Client Profiles
Cached Web pages
Cached DNS Information
Submit
84.
Which type of connector is pictured?
FC
LC
LX-5
MU
SC
Submit
85.
You just updated the static mapping on a WINS server and want to check the results immediatley on a Windows client. What utility should you use to purge and reload the remote cache name table?
IPconfig /flushdns
IPconfig /flushwins
Netstat -reload
Nbstat -R
Ping -t
Submit
86.
Which of the following protocols is Windows 2000 Server for the purpose of Dial-up?
(Choose 2)
IPX / SPX
PPP
SLIP
TCP / IP
Submit
87.
Which of the following is an open source OS?
Lennox
UNIX
Windows
Submit
88.
This binds an entities unique distinguished name and other identifying attributes to it's public key, and is always the responsibility of the CA. This discribes which public key initialization stage?
Public Key Incryption Stage 1 = Registration
Public Key Incryption Stage 2 = Key Pair Generation
Public Key Incryption Stage 3 = Certificate Generation
Public Key Incryption Stage 4 = Certificate Dissemination
Submit
89.
Which of the choices provided supports various authentication methods including smart cards, certificates, Kerberos and one time passwords.
CHAP
EAP
MS-CHAP
PPP
SPAP
Submit
90.
This Kerberos component is the server or client that Kerberos can assign Tickets to.
Authentication Server
Key Distribution Center
Principal
Realm
Ticket-Granting Server
Submit
91.
You are configuring a leased line for your network. You are testing for the loop. The modem doesn't detect a dial tone but responds to the off hook. What is the most likely cause fir the dial back up failure.
Cable
Modem
NIC
Router
Submit
92.
This involves securley making the certificate available with little difficulty, part of public key infistructure.
Certificate Dissemination
Certificate Generation
Key Pair Registration
Registration
Submit
93.
Which Command Promt is shown?
LC
LX-5
MU
Opti Jack
ST
Submit
94.
Which of the following employs the flat domain structure?
ADS
ATM
DHCP
NTDS
Submit
95.
At which layers of the OSI model do NIC's operate?
Physical
Data Link
Network
Transport
Submit
96.
On a bus segment you introduced a new workstation after which the entire segment colapsed. What is the probable cause? (Choose 2)
Faulty Cabling
Faulty NIC
Faulty Server
Faulty Termination
Submit
97.
This Kerberos item is a record that usually only lasts five minutes and can't be reused. It contains info to prove the session key was recently created and is known only to the client and server.
Authenticator
Credentials
Session Key
Ticket
Submit
98.
What are the valid data rates for a Token Ring Network? (Choose 2)
4 Mbps
10 Mbps
16 Mbps
100 Mbps
Submit
99.
Which connector is shown.
MT-RJ
MU
Opti-Jack
SC
ST
Submit
100.
Into which does the ADS store it's information? (Choose 2)
AD Data Base
AD Log Files
Shared System Files
None of these
Submit
View My Results
Related Quizzes
WSET (Wine & Spirit Education Test) Level 2 Practice Test
WSET (Wine & Spirit Education Test) Level 2 Practice Test
ADC/CASAC Alcohol And Drug Counselor Exam Practice Test!
ADC/CASAC Alcohol And Drug Counselor Exam Practice Test!
IAHCSMM: Certified Instrument Specialist Exam! Trivia Questions Quiz
IAHCSMM: Certified Instrument Specialist Exam! Trivia Questions Quiz
BCBA Exam Questions
BCBA Exam Questions
The Ultimate IAHCSMM Quiz: Questions & Answers
The Ultimate IAHCSMM Quiz: Questions & Answers
NSDC Certification Test
NSDC Certification Test
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (100)
Unanswered (
)
Answered (
)
The command line utility pictured is?
Which connector is shown?
An area between a private network (Intranet) and a public network...
Which of the following protocols is used to assure accurate clock...
Which connector is pictured?
Which connector is shown.
Computers that stand outside the protected network and are exposed to...
Which command line prompt is pictured?
Which connector is pictured?
Which commandline promt is shown?
You wish to segragate a sales team logically by the products they deal...
The image represents which command line promt?
This Authentication method encapsulates PPP inside Eithernet frames...
If you were need to identify a NetBIOS name corresponding to an IP...
Which Command Prompt does this represent?
A UNIX / Linux utility that combines the functionality ping and...
What type of networks are ST & SC connectors used to sonnect...
Use this utility with switches to remove or correct NetBIOS name cashe...
If M flag =___ and O flag=___ there is no DHCPv6 server. A device uses...
This Cisco protocol was designed to include support for variable...
This type of hub is yet to be defined but may include management...
Which if the following connectors is used in a 10base2 Tapology?
Which of the following Media Access schemes does the Token Ring...
____________ displays a list of a computers active incoming and...
When traveling and unable to connect from a remote site, you check...
Reports the IP address of an entered host name or the host name of an...
The current network uses host file for IP to host name resolution. You...
Which file contains the boot phase of the start up process for Windows...
To which TCP/IP archetecture layer do the Media Access Methods Belong?
Which of the following directory services can active directory service...
_________ is used to propogate VLAN information across a trunked link.
Which of the following makes DNS environment a backbone of windows...
A ______ bridge can interconnect different types of networks, such as...
Which connector is shown?
Provide the broadcast address for the following:IP=...
Known as stateless DHCPv6 addressing when the DHCPv6 server isn't...
What type of bridge links a local network accross a wide area segment...
Known as DHCPv6 stateful addressing when, M flag =___ and O flaq =___...
Which of the following access security does Windows 2000 server use on...
Indicates the devices should obtain an IPv6 address from the DHCPv6...
Which type of connector is shown?
A Windows client in your network replaced a bad NIC. The workstation...
Which name resolution technique does a UNIX host use?
You are configuring a dial-up network to a remote server. Which of the...
RIP by default has ___ number of hops.
Which of the following protocols does Network Attatched Storage (NAS)...
A standardized Tunneling protocol that generally combines the best...
This iterm is broadly use to describe any combination of hardware and...
What L2 device is used toconnect dissimilar network segments while...
Which connector is shown?
Which device is responsible for verifiying that data is formatted...
This Kerberos component is a service that gives Ticket-Grating tickets...
Which connector is shown?
The following interfaces would be used by the switch if it needs to...
Which type of Bridge can package frames of one format onto the format...
This intrusion detection type monitors your network for activity that...
To subnet a network in such a way to arrive at 6 network ID's, how...
Which connector is shown?
Which of the following is used to map Network layer protocol addresses...
Which connector is pictured?
This authentication defines message formats rather than being an...
Which of the following is supported by Windows 2000 and above OS only?
A switch examines the destination MAC address of an incoming frame,...
You are connecting a Windows workstation to a Netware 4.11 server. The...
This authentication method validates the remote clients identity, it...
What is the maximum length of a 10GBaseLR single mode fiber link?
Which of the following reduces broadcast traffic by default?
_____________ are designed to interconnect autonomus domain networks,...
This Kerberos component service provides an autorized service or user...
When public and private keys are related matmatically, the RCA cypher...
Which connector is shown?
Which of the following is used to connect an external tranciever to an...
Which of the following protocols is a secure version of RCP and...
Which of the following file systems is used by UNIX?
Which of the following allows fault tolerances for user authentication...
Which connector is pictured?
This IPsec protocol ensures confidentiality by signing packets by...
Is a network between two routers that uses another network protocol...
Which of the following can be used to reduce broadcasts on the network...
You have just upgraded the Dial-Up server on the network. This server...
A router is used to filter all traffic to the private internet but...
What is the maximum distance between a 10BaseFL and a FOIRL Repeater?
Which of the following are services of a proxy server? (Choose all...
Which type of connector is pictured?
You just updated the static mapping on a WINS server and want to check...
Which of the following protocols is Windows 2000 Server for the...
Which of the following is an open source OS?
This binds an entities unique distinguished name and other...
Which of the choices provided supports various authentication methods...
This Kerberos component is the server or client that Kerberos can...
You are configuring a leased line for your network. You are testing...
This involves securley making the certificate available with little...
Which Command Promt is shown?
Which of the following employs the flat domain structure?
At which layers of the OSI model do NIC's operate?
On a bus segment you introduced a new workstation after which the...
This Kerberos item is a record that usually only lasts five minutes...
What are the valid data rates for a Token Ring Network? (Choose 2)
Which connector is shown.
Into which does the ADS store it's information? (Choose 2)
X
OK
X
OK
Cancel
X
OK
Cancel
Back to top
Back to top
Advertisement