Network+ CompTIA Bm

39 Questions | Attempts: 411
Share
Please wait...
Question 1 / 39
0 %
0/100
Score 0/100
1.                 3.William, the network administrator at EarthenWare Systems, needs to set up a LAN of 15 computers based on the bus topology using coaxial cables. Determine the type of connector that will be used to connect the computer.
Submit
Please wait...
About This Quiz
Network Plus Quizzes & Trivia

Lear for life

Personalize your quiz and earn a certificate with your name on it!
2.  Consider a sceario in which two computer are sending and receving datagram over a network. After some time, the buffer space of one of the computer becomes full and it not able to receive datagram.Whis type of message needs to transmitted to the other computer so that it slow down the rate of data transfer.
Submit
3.   According to the CAT ratings of UTP, which of the following category is used for data transmission at 100 Mbps?
Submit
4. Wiiliam, the network administrator at Earthware System, needs to set up a LAN of 15 computers based on tye bus topology using co-axial cables. Determine the the type of connector that will be used to connect the computers.
Submit
5. How many nodes can be connect with the IP address 192.200.123.0 192.200.123.255  
Submit
6. Rahul is a expert at tta inc. the managemet of the company has asked him prepare to detail report stating the securty status of the organization.For this rahul needs track the activities of user and processes........................... 
Submit
7. Which TCP/IP utility shows the statues of each network connection. It also will display statistics for both TCP and UDP, including protocol, local address, foreign address, and the TCP connection states?
Submit
8. Which mode of communication  Telephone System use?
Submit
9. A portion of a network that shares a common network address is called a……………..
Submit
10. Sam, a network administrator wants to implement a network routing technology Over the network of ManTech Inc. He wants that the route discover operations are  performed automatically and the routing tables are updated with an accurate picture of the network  as it changes. Which type of IP routing should he implement?
Submit
11. According to the cat rating of utp which of the following category is used for data transmission at 100 mbps?
Submit
12. An----------------------- is a self-contained network or group of networks connected to the Internet that deploys a single protocol and a single administration.
Submit
13. Any network device that can connect to the network and can generate, process, or transfer network data is-------------------------.
Submit
14.  Don Allen is a security expert at Mastery Mechanics Inc. the management of the company has asked him to prepare a detailed report starting the security status of the organization. For this, Don needs to track the activities of users and processes by--------------------------.
Submit
15. In which form of transmission(s), the signals are sent via pulses of electromagnetic enerav in the microwave region of the spectrum.
Submit
16. Red Info systems are setting up a network for 100 computers to accommodate new recruits in its production department. The management wants the network to be efficient and has instructed the network Administrator, Keith Turner, to ensure this, while setting up the network. In order to establish an efficient network, Keith has decided to Subnet the network. The network address allocated for this network is 194.168.10.0. Keith has decided to divide the network into four subnet. Determine the subnet mask for this network.
Submit
17. Consider a scenario in which two computers are sending and receiving datagram’s over a network. After some time, the buffer space of one of the computers becomes full and it is not able to receive datagram’s. Which type of massage needs to be transmitted to the other computer so that it slow bown the rate of data transfer?
Submit
18. Willian, the network administrator at EarthenWare Systems, need to set up a LAN of 30 computers based on 10 Gigabit Ethernet technology having a speed of 10 GBps. Determine the type of IEEE standard for the media he will select?
Submit
19. The Domain Name System (DNS) can be best described as:
Submit
20. Smith is designing a Wireless LAN for his office to support Internet access in all the conference rooms. His company has a well structured LAN infrastructure back bone which supports all the user. What should smith use to facilitate this?
Submit
21. Danzal Jackson is network administrator at ABC Inc. he suspect that some intruder has attacked the organization’s network. He has observed that somebody is sending loads of junk data over the network. As a result, the target computers are inaccessible for some time because all routers to reach the computers are blocked. Which type of attack is Danzal talking about?
Submit
22. To configure windows RRAS as a Dial-up server fllowing steps given:
1) check remort access server on general Tab and click OK.
2)Choose Start --Administrator Tools -- Routing And remort Access.
3)Click Yeas to restart router.
4)Select your computer and choose Action--properties.
Depicts the sequence of Steps
Submit
23. ABC financial Inc. a financial firm, has branch offices in New York and New Jersey. The head office is located in California. They have a LAN setup in each location. They want to implement VPN among their offices. What type of VAN can be implemented here?
Submit
24. User of small company is experiencing a number of dropped packets and slow response time on their routed private network. As a network administrator you suspect there may be failed device or a routing loop and you would like to look more closely at packet transmissions through network. How can you examine the path of the transmission?
Submit
25. Which of the following statements best describes Active/Active clustering?
Submit
26. What is not true regarding the OSI Layer 6
Submit
27. Global System Inc. is designing an enterprise wide IP network. In order to setup such a network, routing protocol needs to be scalable and usable in a complex enterprise environment. It should use the available bandwidth optimally. Memory and CPU resources are not an issue. The protocol should  also not suffer from the count-to-infinity problem. Which of the following protocol is best suited for this situation?
Submit
28. Which is not a component of a critical software inventory in a disaster recovery plan?
Submit
29. . David Bernard is a renowned scientist studying the field of ISDN technology. A summit is being conducted on the prospects of expansion of wireless and mobile networks and David Bernard has been invited as the guest of honor. He will also conduct a session about the latest developments in the field. This lecture is being broadcast at a transmission rate 64 Kbps over the Internet to many universities all over North America. Which type of system will be used to carry out the session?
Submit
30. Which of the following is correct description of IEEE?
Submit
31. To configure windows RRAS as a Dial-up Server following steps given: 1)      Check Remote Access server on general Tab and click Ok. 2)      Choose StartàAdministrative ToolsàRouting And Remote Access. 3)      Click Yes, to restart the router. 4)      Select your computer and choose Action àproperties. 2.Which of the following options depicts the correct sequence of steps?  
Submit
32. Which of the following is NOT TRUE about Bridges?
Submit
33. Mr SP performs backup using following steps in some order.
1)label the backup media to store in safe place.
2)Back up The annul report backup.
3)Review The log to verify the Backup Operation.
4)Verify The backup file Exists.
Indify the correct Sequence?
Submit
34. What is Unauthorized Access?
Submit
35. Consider the following statement:   Statement A: PPP is a type of protocol that enables user to log on to the a computer or network within an organization from an external location.   Statement B: PAP is an encrypted authentication method that enables connections for any encrypted authentication method the server request. Which of the following option is correct with respect to the above statements?  
Submit
36. Which of the following is NOT the feature of Mac OS X Server?
Submit
37. You need an extra length of patch cable to attach a client computer to the network. You do not have cable assembled, but you do have some cable wire and loose connectors. This can be performed by following steps in some order.
1)      Use the cable tester to taste your cable. 2)      Strip the cable jacket back about 3/4 of an inch. 3)      Slip the wire into the connector. Insert the cable/connector assembly into the crimping tool and crimp it. 4)      Place the inner pair of the wire in color order. What is correct activity sequence to do it?  
Submit
38. The PPP protocol is used for-------------------.
Submit
39. Consider the following statements:   Statements A: Microsoft’s implementation of Remote Access Services server called Remot Access Services. Statement B: in remote access networking, a remote node uses a remote connection to attach to a network.
Submit
View My Results

Quiz Review Timeline (Updated): Dec 14, 2012 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 14, 2012
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 07, 2008
    Quiz Created by
    Bijoy3
Cancel
  • All
    All (39)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
               ...
 Consider a sceario in which two computer are sending and...
  ...
Wiiliam, the network administrator at Earthware System, needs to set...
How many nodes can be connect with the IP address ...
Rahul is a expert at tta inc. the managemet of the company has asked...
Which TCP/IP utility shows the statues of each network connection. It...
Which mode of communication  Telephone System use?
A portion of a network that shares a common network address is called...
Sam, a network administrator wants to implement a network routing...
According to the cat rating of utp which of the following category is...
An----------------------- is a self-contained network or group of...
Any network device that can connect to the network and can generate,...
 Don Allen is a security expert at Mastery Mechanics Inc. the...
In which form of transmission(s), the signals are sent via pulses of...
Red Info systems are setting up a network for 100 computers to...
Consider a scenario in which two computers are sending and receiving...
Willian, the network administrator at EarthenWare Systems, need to set...
The Domain Name System (DNS) can be best described as:
Smith is designing a Wireless LAN for his office to support Internet...
Danzal Jackson is network administrator at ABC Inc. he suspect that...
To configure windows RRAS as a Dial-up server fllowing steps given:1)...
ABC financial Inc. a financial firm, has branch offices in New York...
User of small company is experiencing a number of dropped packets and...
Which of the following statements best describes Active/Active...
What is not true regarding the OSI Layer 6
Global System Inc. is designing an enterprise wide IP network. In...
Which is not a component of a critical software inventory in a...
. David Bernard is a renowned scientist studying the field of ISDN...
Which of the following is correct description of IEEE?
To configure windows RRAS as a Dial-up Server following steps given: ...
Which of the following is NOT TRUE about Bridges?
Mr SP performs backup using following steps in some order.1)label the...
What is Unauthorized Access?
Consider the following statement: ...
Which of the following is NOT the feature of Mac OS X Server?
You need an extra length of patch cable to attach a client computer to...
The PPP protocol is used for-------------------.
Consider the following statements: ...
Alert!

Advertisement