Network+ CompTIA Bm

39 Questions | Attempts: 411
Share

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Lear for life


Questions and Answers
  • 1. 

    Wiiliam, the network administrator at Earthware System, needs to set up a LAN of 15 computers based on tye bus topology using co-axial cables. Determine the the type of connector that will be used to connect the computers.

    • A.

      DB-9

    • B.

      RJ-45

    • C.

      T-Connection

    • D.

      DB-25

    Correct Answer
    C. T-Connection
  • 2. 

    What is not true regarding the OSI Layer 6

    • A.

      The Presentation Layer establishes a context between Application Layer entities, in which the higher-layer entities can use different syntax and semantics, as long as the Presentation Service understands both and the mapping between them.

    • B.

      The presentation service data units are then encapsulated into Session Protocol Data Units, and moved down the stack

    • C.

      The original presentation structure used the Basic Encoding Rules of Abstract Syntax Notation One (ASN.1), with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or serializing objects and other data structures into and out of XML. ASN.1 has a set of cryptographic encoding rules that allows end-to-end encryption between application entities.

    • D.

      Provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The Transport Layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are state and connection oriented. This means that the Transport Layer can keep track of the segments and retransmit those that fail.

    Correct Answer
    D. Provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The Transport Layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are state and connection oriented. This means that the Transport Layer can keep track of the segments and retransmit those that fail.
  • 3. 

    A portion of a network that shares a common network address is called a……………..

    • A.

      Segment

    • B.

      Backbone

    • C.

      Subnet

    • D.

      Peer Node

    Correct Answer
    C. Subnet
  • 4. 

    Sam, a network administrator wants to implement a network routing technology Over the network of ManTech Inc. He wants that the route discover operations are  performed automatically and the routing tables are updated with an accurate picture of the network  as it changes. Which type of IP routing should he implement?

    • A.

      Dynamic Routing

    • B.

      Switch Routing

    • C.

      Bridge Routing

    • D.

      Static Routing

    Correct Answer
    A. Dynamic Routing
  • 5. 

    How many nodes can be connect with the IP address 192.200.123.0 192.200.123.255  

    • A.

      256

    • B.

      254

    • C.

      255

    • D.

      162

    Correct Answer
    B. 254
  • 6. 

     Don Allen is a security expert at Mastery Mechanics Inc. the management of the company has asked him to prepare a detailed report starting the security status of the organization. For this, Don needs to track the activities of users and processes by--------------------------.

    • A.

      Auditing

    • B.

      Authentication

    • C.

      Access control

    • D.

      Securing server

    Correct Answer
    A. Auditing
  • 7. 

    Rahul is a expert at tta inc. the managemet of the company has asked him prepare to detail report stating the securty status of the organization.For this rahul needs track the activities of user and processes........................... 

    • A.

      Auditing

    • B.

      Securing Server

    • C.

      Access server

    • D.

      Authentication

    Correct Answer
    A. Auditing
  • 8. 

    Consider a scenario in which two computers are sending and receiving datagram’s over a network. After some time, the buffer space of one of the computers becomes full and it is not able to receive datagram’s. Which type of massage needs to be transmitted to the other computer so that it slow bown the rate of data transfer?

    • A.

      Parameter Problem

    • B.

      Time Exceeded

    • C.

      Destination Unreachable

    • D.

      Source Quench

    Correct Answer
    D. Source Quench
  • 9. 

     Consider a sceario in which two computer are sending and receving datagram over a network. After some time, the buffer space of one of the computer becomes full and it not able to receive datagram.Whis type of message needs to transmitted to the other computer so that it slow down the rate of data transfer.

    • A.

      Parmeter problem

    • B.

      Time Exceeded

    • C.

      Destination unreachable

    • D.

      Source Quench

    Correct Answer
    D. Source Quench
  • 10. 

    Mr SP performs backup using following steps in some order.1)label the backup media to store in safe place.2)Back up The annul report backup.3)Review The log to verify the Backup Operation.4)Verify The backup file Exists.Indify the correct Sequence?

    • A.

      2--1--3--4

    • B.

      1--2--4--3

    • C.

      2--4--3--1

    • D.

      1--2--3--4

    Correct Answer
    D. 1--2--3--4
  • 11. 

    To configure windows RRAS as a Dial-up Server following steps given: 1)      Check Remote Access server on general Tab and click Ok. 2)      Choose StartàAdministrative ToolsàRouting And Remote Access. 3)      Click Yes, to restart the router. 4)      Select your computer and choose Action àproperties. 2.Which of the following options depicts the correct sequence of steps?  

    • A.

      2-- >1 -- >4-- >3

    • B.

      2-- >3 -- >4-- >1

    • C.

      1-- >2-- >3-- >4

    • D.

      2-- >4-- >1-- >3

    Correct Answer
    D. 2-- >4-- >1-- >3
  • 12. 

    The Domain Name System (DNS) can be best described as:

    • A.

      The Domain Name System (DNS) is a TCP/IP name resolution service that translates FQDNs into IP addresses.

    • B.

      The Domain Name System (DNS) is a TCP/IP name resolution service that translates MAC address into IP addresses.

    • C.

      DNS is a network service that provide automatic assignment of IP addresses and other TCP/IP configuration information on network nodes.

    • D.

      The Domain Name System (DNS) is a TCP/IP name resolution service that translates FQDNs into MAC addresses.

    Correct Answer
    A. The Domain Name System (DNS) is a TCP/IP name resolution service that translates FQDNs into IP addresses.
  • 13. 

    According to the cat rating of utp which of the following category is used for data transmission at 100 mbps?

    • A.

      Cat 1

    • B.

      Cat 5

    • C.

      Cat 6

    • D.

      Cat 5e

    Correct Answer
    B. Cat 5
  • 14. 

                    3.William, the network administrator at EarthenWare Systems, needs to set up a LAN of 15 computers based on the bus topology using coaxial cables. Determine the type of connector that will be used to connect the computer.

    • A.

      DB-9

    • B.

      RJ-45

    • C.

      DB-25

    • D.

      T-connectors

    Correct Answer
    D. T-connectors
  • 15. 

      According to the CAT ratings of UTP, which of the following category is used for data transmission at 100 Mbps?

    • A.

      Category 3

    • B.

      Category 1

    • C.

      Category 5

    • D.

      Category 5e

    Correct Answer
    C. Category 5
  • 16. 

    Consider the following statement:   Statement A: PPP is a type of protocol that enables user to log on to the a computer or network within an organization from an external location.   Statement B: PAP is an encrypted authentication method that enables connections for any encrypted authentication method the server request. Which of the following option is correct with respect to the above statements?  

    • A.

      Both, statements A and statements B are TRUE

    • B.

      Statement A is FALSE and statement B is TRUE

    • C.

      Statement A is TRUE and statement B is FALSE

    • D.

      Both, statements A and statements B are FALSE

    Correct Answer
    D. Both, statements A and statements B are FALSE
  • 17. 

    Global System Inc. is designing an enterprise wide IP network. In order to setup such a network, routing protocol needs to be scalable and usable in a complex enterprise environment. It should use the available bandwidth optimally. Memory and CPU resources are not an issue. The protocol should  also not suffer from the count-to-infinity problem. Which of the following protocol is best suited for this situation?

    • A.

      Border Gateway Protocol

    • B.

      Routing Information Protocol

    • C.

      Internet Group Massage Protocol

    • D.

      Open Shortest Path First

    Correct Answer
    D. Open Shortest Path First
  • 18. 

    Which is not a component of a critical software inventory in a disaster recovery plan?

    • A.

      Server and work station

    • B.

      Maintenance utilities

    • C.

      Backup documentations

    • D.

      Productivity and application software

    Correct Answer
    A. Server and work station
  • 19. 

    ABC financial Inc. a financial firm, has branch offices in New York and New Jersey. The head office is located in California. They have a LAN setup in each location. They want to implement VPN among their offices. What type of VAN can be implemented here?

    • A.

      Extranet VPN

    • B.

      Intranet VPN

    • C.

      Internet VPN

    • D.

      Remote Access VPA

    Correct Answer
    B. Intranet VPN
  • 20. 

    Danzal Jackson is network administrator at ABC Inc. he suspect that some intruder has attacked the organization’s network. He has observed that somebody is sending loads of junk data over the network. As a result, the target computers are inaccessible for some time because all routers to reach the computers are blocked. Which type of attack is Danzal talking about?

    • A.

      Man-in-the-middle

    • B.

      Sniffing

    • C.

      Denial-of-service

    • D.

      Spoofing

    Correct Answer
    C. Denial-of-service
  • 21. 

    To configure windows RRAS as a Dial-up server fllowing steps given:1) check remort access server on general Tab and click OK.2)Choose Start --Administrator Tools -- Routing And remort Access.3)Click Yeas to restart router.4)Select your computer and choose Action--properties.Depicts the sequence of Steps

    • A.

      2--3--1--4

    • B.

      2--4--1--3

    • C.

      2--1--4--3

    • D.

      1--2--3--4

    • E.

      3--2-4--1

    Correct Answer
    B. 2--4--1--3
  • 22. 

    Which of the following statements best describes Active/Active clustering?

    • A.

      A cluster in which nodes shares common hardware resources such as processors, memory, and disks

    • B.

      Latency time is minimum in this clustering scheme in case of failover

    • C.

      A cluster that has all nodes online, constantly providing services

    • D.

      A cluster that at least one node in active mode while at least one node acts as backup node

    Correct Answer
    C. A cluster that has all nodes online, constantly providing services
  • 23. 

    Which mode of communication  Telephone System use?

    • A.

      Full simplex

    • B.

      Full duplex

    • C.

      Half duplex

    • D.

      Simplex

    Correct Answer
    B. Full duplex
  • 24. 

    Which of the following is correct description of IEEE?

    • A.

      An organization dedicated to advancing theory and technology in the electrical sciences.

    • B.

      An organization that develops and maintains Internet standards and contribute to the evolution and smooth operation of the Internet

    • C.

      An American institute that facilitates that formation of a variety of national standards, as well as promoting those standards internationally

    • D.

      An organization that develops and issues standards for telecommunications and electronics

    Correct Answer
    A. An organization dedicated to advancing theory and technology in the electrical sciences.
  • 25. 

    Which of the following is NOT the feature of Mac OS X Server?

    • A.

      Integrated support for window, and Unix clients in workgroup and clients

    • B.

      Integrated E-mail service

    • C.

      DNS, DHCP, NAT and firewall services

    • D.

      Mac OS X supports three type of Accounts e.g. Administrator, Standard User, Guest User

    Correct Answer
    B. Integrated E-mail service
  • 26. 

    You need an extra length of patch cable to attach a client computer to the network. You do not have cable assembled, but you do have some cable wire and loose connectors. This can be performed by following steps in some order. 1)      Use the cable tester to taste your cable. 2)      Strip the cable jacket back about 3/4 of an inch. 3)      Slip the wire into the connector. Insert the cable/connector assembly into the crimping tool and crimp it. 4)      Place the inner pair of the wire in color order. What is correct activity sequence to do it?  

    • A.

      1->2->4->3

    • B.

      2->3->4->1

    • C.

      2->1->3->4

    • D.

      2->4->3->1

    Correct Answer
    D. 2->4->3->1
  • 27. 

    Willian, the network administrator at EarthenWare Systems, need to set up a LAN of 30 computers based on 10 Gigabit Ethernet technology having a speed of 10 GBps. Determine the type of IEEE standard for the media he will select?

    • A.

      10GBaseSR

    • B.

      100Basetx

    • C.

      100Baset

    • D.

      10Base2

    Correct Answer
    A. 10GBaseSR
  • 28. 

    . David Bernard is a renowned scientist studying the field of ISDN technology. A summit is being conducted on the prospects of expansion of wireless and mobile networks and David Bernard has been invited as the guest of honor. He will also conduct a session about the latest developments in the field. This lecture is being broadcast at a transmission rate 64 Kbps over the Internet to many universities all over North America. Which type of system will be used to carry out the session?

    • A.

      Synchronous Optical NETwork

    • B.

      T-carrier systems

    • C.

      E-carrier systems

    • D.

      Synchronous Digital Hierarchy

    Correct Answer
    B. T-carrier systems
  • 29. 

    An----------------------- is a self-contained network or group of networks connected to the Internet that deploys a single protocol and a single administration.

    • A.

      Computer System

    • B.

      Autonomous System

    • C.

      Docking System

    • D.

      Dependent System

    Correct Answer
    B. Autonomous System
  • 30. 

    Consider the following statements:   Statements A: Microsoft’s implementation of Remote Access Services server called Remot Access Services. Statement B: in remote access networking, a remote node uses a remote connection to attach to a network.

    • A.

      Both, statements A and statements B are TRUE

    • B.

      Statement A is FALSE and statement B is TRUE

    • C.

      Both, statements A and statements B are FALSE

    • D.

      Statement A is TRUE and statement B is FALSE

    Correct Answer
    C. Both, statements A and statements B are FALSE
  • 31. 

    In which form of transmission(s), the signals are sent via pulses of electromagnetic enerav in the microwave region of the spectrum.

    • A.

      In both Microwave and Radio Transmission

    • B.

      Radio Transmission

    • C.

      Infrared Transmission

    • D.

      Microwave Transmission

    Correct Answer
    D. Microwave Transmission
  • 32. 

    User of small company is experiencing a number of dropped packets and slow response time on their routed private network. As a network administrator you suspect there may be failed device or a routing loop and you would like to look more closely at packet transmissions through network. How can you examine the path of the transmission?

    • A.

      Use Netstat to check the statistics to see if connection is good by examine no of bytes in the sand and receive queue

    • B.

      Using Ping command between various source and destination to find out a routing loop or the point at which route falls

    • C.

      Use Tracert command to trace the route of packets between various source and destination to find out a routing loop or the point at which route fails

    • D.

      Use Nslookup to verify the DNS server configuration and examine weather server is responding to request.

    Correct Answer
    C. Use Tracert command to trace the route of packets between various source and destination to find out a routing loop or the point at which route fails
  • 33. 

    Which TCP/IP utility shows the statues of each network connection. It also will display statistics for both TCP and UDP, including protocol, local address, foreign address, and the TCP connection states?

    • A.

      Tracert

    • B.

      Netstat

    • C.

      Nslookup

    Correct Answer
    B. Netstat
  • 34. 

    Any network device that can connect to the network and can generate, process, or transfer network data is-------------------------.

    • A.

      A segment

    • B.

      A node

    • C.

      A redistribution point

    • D.

      An endpoint

    Correct Answer
    B. A node
  • 35. 

    Red Info systems are setting up a network for 100 computers to accommodate new recruits in its production department. The management wants the network to be efficient and has instructed the network Administrator, Keith Turner, to ensure this, while setting up the network. In order to establish an efficient network, Keith has decided to Subnet the network. The network address allocated for this network is 194.168.10.0. Keith has decided to divide the network into four subnet. Determine the subnet mask for this network.

    • A.

      255.255.192.0

    • B.

      255.255.256.0

    • C.

      255.255.255.240

    • D.

      255.255.224.0

    Correct Answer
    C. 255.255.255.240
  • 36. 

    The PPP protocol is used for-------------------.

    • A.

      Transporting data packets across point-to-point links

    • B.

      Transporting data packets across point-to-point links

    • C.

      Transporting data packets across point-to-point links

    • D.

      Transporting data packets across point-to-point links

    Correct Answer(s)
    A. Transporting data packets across point-to-point links
    B. Transporting data packets across point-to-point links
    C. Transporting data packets across point-to-point links
    D. Transporting data packets across point-to-point links
  • 37. 

    Which of the following is NOT TRUE about Bridges?

    • A.

      If the packet is addressed to a node on its own segment, the bridge does not forward the packet.

    • B.

      Bridge examine the MAC address of each packet before deciding to forwarding/or not forwarding it.

    • C.

      In bridge this is no need to configure the subnet addresses associated with each port.

    • D.

      A bridge is a networking device used to connect the drops in a physical stat topology.

    Correct Answer
    D. A bridge is a networking device used to connect the drops in a physical stat topology.
  • 38. 

    Smith is designing a Wireless LAN for his office to support Internet access in all the conference rooms. His company has a well structured LAN infrastructure back bone which supports all the user. What should smith use to facilitate this?

    • A.

      He should use Wireless Access Point Transceiver

    • B.

      Switch with Radio transmitter

    • C.

      He should use a Bridge point device

    • D.

      He should use a Router and Switch device

    Correct Answer
    A. He should use Wireless Access Point Transceiver
  • 39. 

    What is Unauthorized Access?

    • A.

      It is an attempt to gain unauthorized access through the use of a program, which masquerades as valid software.

    • B.

      It any type of unauthorized effort to discover a user’s valid password

    • C.

      It is a type of attack. In which a device outside the network uses an internal network address to masquerades as a device inside the network.

    • D.

      It is any type of network or data access that is not explicitly approved by the organization.

    Correct Answer
    D. It is any type of network or data access that is not explicitly approved by the organization.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 14, 2012
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 07, 2008
    Quiz Created by
    Bijoy3
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.