Lear for life
Parmeter problem
Time Exceeded
Destination unreachable
Source Quench
Category 3
Category 1
Category 5
Category 5e
DB-9
RJ-45
T-Connection
DB-25
256
254
255
162
Auditing
Securing Server
Access server
Authentication
Tracert
Netstat
Nslookup
Full simplex
Full duplex
Half duplex
Simplex
Segment
Backbone
Subnet
Peer Node
Dynamic Routing
Switch Routing
Bridge Routing
Static Routing
Cat 1
Cat 5
Cat 6
Cat 5e
Computer System
Autonomous System
Docking System
Dependent System
A segment
A node
A redistribution point
An endpoint
Auditing
Authentication
Access control
Securing server
In both Microwave and Radio Transmission
Radio Transmission
Infrared Transmission
Microwave Transmission
255.255.192.0
255.255.256.0
255.255.255.240
255.255.224.0
Parameter Problem
Time Exceeded
Destination Unreachable
Source Quench
10GBaseSR
100Basetx
100Baset
10Base2
The Domain Name System (DNS) is a TCP/IP name resolution service that translates FQDNs into IP addresses.
The Domain Name System (DNS) is a TCP/IP name resolution service that translates MAC address into IP addresses.
DNS is a network service that provide automatic assignment of IP addresses and other TCP/IP configuration information on network nodes.
The Domain Name System (DNS) is a TCP/IP name resolution service that translates FQDNs into MAC addresses.
He should use Wireless Access Point Transceiver
Switch with Radio transmitter
He should use a Bridge point device
He should use a Router and Switch device
Man-in-the-middle
Sniffing
Denial-of-service
Spoofing
2--3--1--4
2--4--1--3
2--1--4--3
1--2--3--4
3--2-4--1
Extranet VPN
Intranet VPN
Internet VPN
Remote Access VPA
Use Netstat to check the statistics to see if connection is good by examine no of bytes in the sand and receive queue
Using Ping command between various source and destination to find out a routing loop or the point at which route falls
Use Tracert command to trace the route of packets between various source and destination to find out a routing loop or the point at which route fails
Use Nslookup to verify the DNS server configuration and examine weather server is responding to request.
A cluster in which nodes shares common hardware resources such as processors, memory, and disks
Latency time is minimum in this clustering scheme in case of failover
A cluster that has all nodes online, constantly providing services
A cluster that at least one node in active mode while at least one node acts as backup node
The Presentation Layer establishes a context between Application Layer entities, in which the higher-layer entities can use different syntax and semantics, as long as the Presentation Service understands both and the mapping between them.
The presentation service data units are then encapsulated into Session Protocol Data Units, and moved down the stack
The original presentation structure used the Basic Encoding Rules of Abstract Syntax Notation One (ASN.1), with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or serializing objects and other data structures into and out of XML. ASN.1 has a set of cryptographic encoding rules that allows end-to-end encryption between application entities.
Provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The Transport Layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are state and connection oriented. This means that the Transport Layer can keep track of the segments and retransmit those that fail.
Border Gateway Protocol
Routing Information Protocol
Internet Group Massage Protocol
Open Shortest Path First
Server and work station
Maintenance utilities
Backup documentations
Productivity and application software
Synchronous Optical NETwork
T-carrier systems
E-carrier systems
Synchronous Digital Hierarchy
An organization dedicated to advancing theory and technology in the electrical sciences.
An organization that develops and maintains Internet standards and contribute to the evolution and smooth operation of the Internet
An American institute that facilitates that formation of a variety of national standards, as well as promoting those standards internationally
An organization that develops and issues standards for telecommunications and electronics
2-- >1 -- >4-- >3
2-- >3 -- >4-- >1
1-- >2-- >3-- >4
2-- >4-- >1-- >3
If the packet is addressed to a node on its own segment, the bridge does not forward the packet.
Bridge examine the MAC address of each packet before deciding to forwarding/or not forwarding it.
In bridge this is no need to configure the subnet addresses associated with each port.
A bridge is a networking device used to connect the drops in a physical stat topology.
2--1--3--4
1--2--4--3
2--4--3--1
1--2--3--4
It is an attempt to gain unauthorized access through the use of a program, which masquerades as valid software.
It any type of unauthorized effort to discover a user’s valid password
It is a type of attack. In which a device outside the network uses an internal network address to masquerades as a device inside the network.
It is any type of network or data access that is not explicitly approved by the organization.
Both, statements A and statements B are TRUE
Statement A is FALSE and statement B is TRUE
Statement A is TRUE and statement B is FALSE
Both, statements A and statements B are FALSE
Integrated support for window, and Unix clients in workgroup and clients
Integrated E-mail service
DNS, DHCP, NAT and firewall services
Mac OS X supports three type of Accounts e.g. Administrator, Standard User, Guest User
1->2->4->3
2->3->4->1
2->1->3->4
2->4->3->1
Transporting data packets across point-to-point links
Transporting data packets across point-to-point links
Transporting data packets across point-to-point links
Transporting data packets across point-to-point links
Both, statements A and statements B are TRUE
Statement A is FALSE and statement B is TRUE
Both, statements A and statements B are FALSE
Statement A is TRUE and statement B is FALSE
Quiz Review Timeline (Updated): Dec 14, 2012 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Network+ Computer Ports Quiz
The Network+ Computer Ports Quiz assesses knowledge of key network port numbers essential for IT professionals. It covers ports for SSH, FTP, HTTPS, Telnet, DHCP, and HTTP,...
Questions:
39 |
Attempts:
602 |
Last updated:
Mar 21, 2023
|
Common Network+ Port / Terms
Acronyms - It'll help you remember what the letters actually mean
Terms - It isn't enough to just know what each acronym means, know the definition
Ports - Have to be...
Questions:
43 |
Attempts:
493 |
Last updated:
Mar 21, 2023
|
Exam Cram 1: CompTIA Network+ N10-005
Exam Cram Part 1
Network+ N10-005
4th edition
by Mike Harwood
Questions:
100 |
Attempts:
261 |
Last updated:
Mar 21, 2023
|
Network+ Chapter 2 Quiz
The Network+ Chapter 2 Quiz assesses knowledge across various networking layers including the application, physical, network, presentation, session, and data link layers. It...
Questions:
30 |
Attempts:
687 |
Last updated:
Mar 22, 2023
|
CompTIA Network Plus Certification Quiz! Trivia
CompTIA Network Plus Certification Practice Quiz. Computer networks are essential in helping computers to share data with each other. By taking up to study CompTIA, one is...
Questions:
20 |
Attempts:
251 |
Last updated:
Mar 21, 2023
|
CompTIA Network+ Certification! Hardest Trivia Quiz
Challenge your knowledge with the 'CompTIA Network+ Certification! Hardest Trivia Quiz.' This quiz tests your understanding of network protocols, security, and troubleshooting,...
Questions:
100 |
Attempts:
382 |
Last updated:
Aug 30, 2024
|
Wait!
Here's an interesting quiz for you.