Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Professional Certification
Network+ CompTIA Bm
39 Questions
|
By Bijoy3 | Updated: Dec 14, 2012
| Attempts: 411
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 39
0 %
0/100
Score
0/100
1.
3.William, the network administrator at EarthenWare Systems, needs to set up a LAN of 15 computers based on the bus topology using coaxial cables. Determine the type of connector that will be used to connect the computer.
DB-9
RJ-45
DB-25
T-connectors
Submit
Start Quiz
About This Quiz
Lear for life
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
Consider a sceario in which two computer are sending and receving datagram over a network. After some time, the buffer space of one of the computer becomes full and it not able to receive datagram.Whis type of message needs to transmitted to the other computer so that it slow down the rate of data transfer.
Parmeter problem
Time Exceeded
Destination unreachable
Source Quench
Submit
3.
According to the CAT ratings of UTP, which of the following category is used for data transmission at 100 Mbps?
Category 3
Category 1
Category 5
Category 5e
Submit
4.
Wiiliam, the network administrator at Earthware System, needs to set up a LAN of 15 computers based on tye bus topology using co-axial cables. Determine the the type of connector that will be used to connect the computers.
DB-9
RJ-45
T-Connection
DB-25
Submit
5.
How many nodes can be connect with the IP address 192.200.123.0 192.200.123.255
256
254
255
162
Submit
6.
Rahul is a expert at tta inc. the managemet of the company has asked him prepare to detail report stating the securty status of the organization.For this rahul needs track the activities of user and processes...........................
Auditing
Securing Server
Access server
Authentication
Submit
7.
Which TCP/IP utility shows the statues of each network connection. It also will display statistics for both TCP and UDP, including protocol, local address, foreign address, and the TCP connection states?
Tracert
Netstat
Nslookup
Submit
8.
Which mode of communication Telephone System use?
Full simplex
Full duplex
Half duplex
Simplex
Submit
9.
A portion of a network that shares a common network address is called a……………..
Segment
Backbone
Subnet
Peer Node
Submit
10.
Sam, a network administrator wants to implement a network routing technology Over the network of ManTech Inc. He wants that the route discover operations are performed automatically and the routing tables are updated with an accurate picture of the network as it changes. Which type of IP routing should he implement?
Dynamic Routing
Switch Routing
Bridge Routing
Static Routing
Submit
11.
According to the cat rating of utp which of the following category is used for data transmission at 100 mbps?
Cat 1
Cat 5
Cat 6
Cat 5e
Submit
12.
An----------------------- is a self-contained network or group of networks connected to the Internet that deploys a single protocol and a single administration.
Computer System
Autonomous System
Docking System
Dependent System
Submit
13.
Any network device that can connect to the network and can generate, process, or transfer network data is-------------------------.
A segment
A node
A redistribution point
An endpoint
Submit
14.
Don Allen is a security expert at Mastery Mechanics Inc. the management of the company has asked him to prepare a detailed report starting the security status of the organization. For this, Don needs to track the activities of users and processes by--------------------------.
Auditing
Authentication
Access control
Securing server
Submit
15.
In which form of transmission(s), the signals are sent via pulses of electromagnetic enerav in the microwave region of the spectrum.
In both Microwave and Radio Transmission
Radio Transmission
Infrared Transmission
Microwave Transmission
Submit
16.
Red Info systems are setting up a network for 100 computers to accommodate new recruits in its production department. The management wants the network to be efficient and has instructed the network Administrator, Keith Turner, to ensure this, while setting up the network. In order to establish an efficient network, Keith has decided to Subnet the network. The network address allocated for this network is 194.168.10.0. Keith has decided to divide the network into four subnet. Determine the subnet mask for this network.
255.255.192.0
255.255.256.0
255.255.255.240
255.255.224.0
Submit
17.
Consider a scenario in which two computers are sending and receiving datagram’s over a network. After some time, the buffer space of one of the computers becomes full and it is not able to receive datagram’s. Which type of massage needs to be transmitted to the other computer so that it slow bown the rate of data transfer?
Parameter Problem
Time Exceeded
Destination Unreachable
Source Quench
Submit
18.
Willian, the network administrator at EarthenWare Systems, need to set up a LAN of 30 computers based on 10 Gigabit Ethernet technology having a speed of 10 GBps. Determine the type of IEEE standard for the media he will select?
10GBaseSR
100Basetx
100Baset
10Base2
Submit
19.
The Domain Name System (DNS) can be best described as:
The Domain Name System (DNS) is a TCP/IP name resolution service that translates FQDNs intoIP addresses.
The Domain Name System (DNS) is a TCP/IP name resolution service that translates MAC address into IP addresses.
DNS is a network service that provide automatic assignment of IP addresses and other TCP/IPconfiguration information on...
DNS is a network service that provide automatic assignment of IP addresses and other TCP/IPconfiguration information on network nodes.
The Domain Name System (DNS) is a TCP/IP name resolution service that translates FQDNs intoMAC addresses.
Submit
20.
Smith is designing a Wireless LAN for his office to support Internet access in all the conference rooms. His company has a well structured LAN infrastructure back bone which supports all the user. What should smith use to facilitate this?
He should use Wireless Access Point Transceiver
Switch with Radio transmitter
He should use a Bridge point device
He should use a Router and Switch device
Submit
21.
Danzal Jackson is network administrator at ABC Inc. he suspect that some intruder has attacked the organization’s network. He has observed that somebody is sending loads of junk data over the network. As a result, the target computers are inaccessible for some time because all routers to reach the computers are blocked. Which type of attack is Danzal talking about?
Man-in-the-middle
Sniffing
Denial-of-service
Spoofing
Submit
22.
To configure windows RRAS as a Dial-up server fllowing steps given:
1) check remort access server on general Tab and click OK.
2)Choose Start --Administrator Tools -- Routing And remort Access.
3)Click Yeas to restart router.
4)Select your computer and choose Action--properties.
Depicts the sequence of Steps
2--3--1--4
2--4--1--3
2--1--4--3
1--2--3--4
3--2-4--1
Submit
23.
ABC financial Inc. a financial firm, has branch offices in New York and New Jersey. The head office is located in California. They have a LAN setup in each location. They want to implement VPN among their offices. What type of VAN can be implemented here?
Extranet VPN
Intranet VPN
Internet VPN
Remote Access VPA
Submit
24.
User of small company is experiencing a number of dropped packets and slow response time on their routed private network. As a network administrator you suspect there may be failed device or a routing loop and you would like to look more closely at packet transmissions through network. How can you examine the path of the transmission?
Use Netstat to check the statistics to see if connection is good by examine no of bytes in the...
Use Netstat to check the statistics to see if connection is good by examine no of bytes in the sand and receive queue
Using Ping command between various source and destination to find out a routing loop or the point at which route...
Using Ping command between various source and destination to find out a routing loop or the point at which route falls
Use Tracert command to trace the route of packets between various source and destination to find out a routing loop...
Use Tracert command to trace the route of packets between various source and destination to find out a routing loop or the point at which route fails
Use Nslookup to verify the DNS server configuration and examine weather server is responding to request.
Submit
25.
Which of the following statements best describes Active/Active clustering?
A cluster in which nodes shares common hardware resources such as processors,memory, and disks
Latency time is minimum in this clustering scheme in case of failover
A cluster that has all nodes online, constantly providing services
A cluster that at least one node in active mode while at least one node acts as backup node
Submit
26.
What is not true regarding the OSI Layer 6
The Presentation Layer establishes a context between Application Layer entities, in which the higher-layer entities can use different syntax and...
The Presentation Layer establishes a context between Application Layer entities, in which the higher-layer entities can use different syntax and semantics, as long as the Presentation Service understands both and the mapping between them.
The presentation service data units are then encapsulated into Session Protocol Data Units, and moved down the stack
The original presentation structure used the Basic Encoding Rules of Abstract Syntax Notation One (ASN.1), with capabilities such as converting...
The original presentation structure used the Basic Encoding Rules of Abstract Syntax Notation One (ASN.1), with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or serializing objects and other data structures into and out of XML. ASN.1 has a set of cryptographic encoding rules that allows end-to-end encryption between application entities.
Provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The Transport Layer...
Provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The Transport Layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are state and connection oriented. This means that the Transport Layer can keep track of the segments and retransmit those that fail.
Submit
27.
Global System Inc. is designing an enterprise wide IP network. In order to setup such a network, routing protocol needs to be scalable and usable in a complex enterprise environment. It should use the available bandwidth optimally. Memory and CPU resources are not an issue. The protocol should also not suffer from the count-to-infinity problem. Which of the following protocol is best suited for this situation?
Border Gateway Protocol
Routing Information Protocol
Internet Group Massage Protocol
Open Shortest Path First
Submit
28.
Which is not a component of a critical software inventory in a disaster recovery plan?
Server and work station
Maintenance utilities
Backup documentations
Productivity and application software
Submit
29.
. David Bernard is a renowned scientist studying the field of ISDN technology. A summit is being conducted on the prospects of expansion of wireless and mobile networks and David Bernard has been invited as the guest of honor. He will also conduct a session about the latest developments in the field. This lecture is being broadcast at a transmission rate 64 Kbps over the Internet to many universities all over North America. Which type of system will be used to carry out the session?
Synchronous Optical NETwork
T-carrier systems
E-carrier systems
Synchronous Digital Hierarchy
Submit
30.
Which of the following is correct description of IEEE?
An organization dedicated to advancing theory and technology in the electrical sciences.
An organization that develops and maintains Internet standards and contribute to the evolution and smooth operation of the Internet
An American institute that facilitates that formation of a variety of national standards, as well as promoting those standards internationally
An organization that develops and issues standards for telecommunications and electronics
Submit
31.
To configure windows RRAS as a Dial-up Server following steps given: 1) Check Remote Access server on general Tab and click Ok. 2) Choose StartàAdministrative ToolsàRouting And Remote Access. 3) Click Yes, to restart the router. 4) Select your computer and choose Action àproperties. 2.Which of the following options depicts the correct sequence of steps?
2-- >1 -- >4-- >3
2-- >3 -- >4-- >1
1-- >2-- >3-- >4
2-- >4-- >1-- >3
Submit
32.
Which of the following is NOT TRUE about Bridges?
If the packet is addressed to a node on its own segment, the bridge does not forward the packet.
Bridge examine the MAC address of each packet before deciding to forwarding/or not forwarding it.
In bridge this is no need to configure the subnet addresses associated with each port.
A bridge is a networking device used to connect the drops in a physical stat topology.
Submit
33.
Mr SP performs backup using following steps in some order.
1)label the backup media to store in safe place.
2)Back up The annul report backup.
3)Review The log to verify the Backup Operation.
4)Verify The backup file Exists.
Indify the correct Sequence?
2--1--3--4
1--2--4--3
2--4--3--1
1--2--3--4
Submit
34.
What is Unauthorized Access?
It is an attempt to gain unauthorized access through the use of a program, which masquerades as valid software.
It any type of unauthorized effort to discover a user’s valid password
It is a type of attack. In which a device outside the network uses an internal network address to masquerades...
It is a type of attack. In which a device outside the network uses an internal network address to masquerades as a device inside the network.
It is any type of network or data access that is not explicitly approved by the organization.
Submit
35.
Consider the following statement: Statement A: PPP is a type of protocol that enables user to log on to the a computer or network within an organization from an external location. Statement B: PAP is an encrypted authentication method that enables connections for any encrypted authentication method the server request. Which of the following option is correct with respect to the above statements?
Both, statements A and statements B are TRUE
Statement A is FALSE and statement B is TRUE
Statement A is TRUE and statement B is FALSE
Both, statements A and statements B are FALSE
Submit
36.
Which of the following is NOT the feature of Mac OS X Server?
Integrated support for window, and Unix clients in workgroup and clients
Integrated E-mail service
DNS, DHCP, NAT and firewall services
Mac OS X supports three type of Accounts e.g. Administrator, Standard User, Guest User
Submit
37.
You need an extra length of patch cable to attach a client computer to the network. You do not have cable assembled, but you do have some cable wire and loose connectors. This can be performed by following steps in some order.
1) Use the cable tester to taste your cable. 2) Strip the cable jacket back about 3/4 of an inch. 3) Slip the wire into the connector. Insert the cable/connector assembly into the crimping tool and crimp it. 4) Place the inner pair of the wire in color order. What is correct activity sequence to do it?
1->2->4->3
2->3->4->1
2->1->3->4
2->4->3->1
Submit
38.
The PPP protocol is used for-------------------.
Transporting data packets across point-to-point links
Transporting data packets across point-to-point links
Transporting data packets across point-to-point links
Transporting data packets across point-to-point links
Submit
39.
Consider the following statements: Statements A: Microsoft’s implementation of Remote Access Services server called Remot Access Services. Statement B: in remote access networking, a remote node uses a remote connection to attach to a network.
Both, statements A and statements B are TRUE
Statement A is FALSE and statement B is TRUE
Both, statements A and statements B are FALSE
Statement A is TRUE and statement B is FALSE
Submit
View My Results
Related Quizzes
WSET (Wine & Spirit Education Test) Level 2 Practice Test
WSET (Wine & Spirit Education Test) Level 2 Practice Test
ADC/CASAC Alcohol And Drug Counselor Exam Practice Test!
ADC/CASAC Alcohol And Drug Counselor Exam Practice Test!
IAHCSMM: Certified Instrument Specialist Exam! Trivia Questions Quiz
IAHCSMM: Certified Instrument Specialist Exam! Trivia Questions Quiz
BCBA Exam Questions
BCBA Exam Questions
The Ultimate IAHCSMM Quiz: Questions & Answers
The Ultimate IAHCSMM Quiz: Questions & Answers
NSDC Certification Test
NSDC Certification Test
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (39)
Unanswered (
)
Answered (
)
...
Consider a sceario in which two computer are sending and...
...
Wiiliam, the network administrator at Earthware System, needs to set...
How many nodes can be connect with the IP address ...
Rahul is a expert at tta inc. the managemet of the company has asked...
Which TCP/IP utility shows the statues of each network connection. It...
Which mode of communication Telephone System use?
A portion of a network that shares a common network address is called...
Sam, a network administrator wants to implement a network routing...
According to the cat rating of utp which of the following category is...
An----------------------- is a self-contained network or group of...
Any network device that can connect to the network and can generate,...
Don Allen is a security expert at Mastery Mechanics Inc. the...
In which form of transmission(s), the signals are sent via pulses of...
Red Info systems are setting up a network for 100 computers to...
Consider a scenario in which two computers are sending and receiving...
Willian, the network administrator at EarthenWare Systems, need to set...
The Domain Name System (DNS) can be best described as:
Smith is designing a Wireless LAN for his office to support Internet...
Danzal Jackson is network administrator at ABC Inc. he suspect that...
To configure windows RRAS as a Dial-up server fllowing steps given:1)...
ABC financial Inc. a financial firm, has branch offices in New York...
User of small company is experiencing a number of dropped packets and...
Which of the following statements best describes Active/Active...
What is not true regarding the OSI Layer 6
Global System Inc. is designing an enterprise wide IP network. In...
Which is not a component of a critical software inventory in a...
. David Bernard is a renowned scientist studying the field of ISDN...
Which of the following is correct description of IEEE?
To configure windows RRAS as a Dial-up Server following steps given: ...
Which of the following is NOT TRUE about Bridges?
Mr SP performs backup using following steps in some order.1)label the...
What is Unauthorized Access?
Consider the following statement: ...
Which of the following is NOT the feature of Mac OS X Server?
You need an extra length of patch cable to attach a client computer to...
The PPP protocol is used for-------------------.
Consider the following statements: ...
X
OK
X
OK
Cancel
X
OK
Cancel
Back to top
Back to top
Advertisement