Network+ Test, Short, Work In Progress

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Pickra
P
Pickra
Community Contributor
Quizzes Created: 2 | Total Attempts: 903
Questions: 25 | Attempts: 556

SettingsSettingsSettings
Network+ Test, Short, Work In Progress - Quiz

Questions for the network+ cert


Questions and Answers
  • 1. 

    You've had your computer for a while, and you begin to notice changes. They were small @ first; a different desktop pic, some peach fuzz on the monitor, colored text on your word documents, a deeper voice tells you “you've got mail”. Suddenly your baby fresh pc has changed into a punked out teenager. You suspect outside influence. What utility can you run to see if someone is connected (via tcp/ip) to your pc?

    • A.

      Tracert

    • B.

      Nbtstat

    • C.

      Netstat

    • D.

      Ipconfig

    • E.

      Arp

    Correct Answer
    C. Netstat
    Explanation
    Netstat is a utility that can be used to see if someone is connected to your computer via TCP/IP. It displays active network connections, listening ports, and other network statistics. By running netstat, you can identify any suspicious connections or unauthorized access to your computer.

    Rate this question:

  • 2. 

    You run winipcfg on your XP OS. What happens?

    • A.

      The PC blows up.

    • B.

      Nothing.

    • C.

      Sasquatch comes to pay u a visit.

    • D.

      You see a list of all current TCP/IP network configuration values.

    • E.

      You see how many hops the packet requires to reach the host and how long each hop takes.

    Correct Answer
    B. Nothing.
    Explanation
    Running winipcfg on XP OS does not cause any explosion or any physical damage to the PC. Instead, it opens a graphical user interface that displays the current TCP/IP network configuration values, such as IP address, subnet mask, default gateway, and DNS servers. It does not provide information about packet hops or visit from sasquatch.

    Rate this question:

  • 3. 

    Nestat -r command does what?

    • A.

      Displays the routing table, plus the current active connections.

    • B.

      Displays detailed network traffic statistics for IP, IPV6, ICMP, ICMPV6, TCP, TCPV6, UDP, UDPV6. The -p option may be used to spcify a subset of the default.

    • C.

      Tells netstat to show u the status of all open sockets.

    • D.

      Gives a quick view of how ur system is resolving and registering names

    • E.

      Used to release + refresh NETBIOS names on resource servers in WINS database.

    Correct Answer
    A. Displays the routing table, plus the current active connections.
    Explanation
    The nestat -r command displays the routing table, which contains information about how network traffic is directed between different networks. It also shows the current active connections, providing information about the network connections that are currently established on the system. This command is useful for troubleshooting network connectivity and understanding how network traffic is being routed.

    Rate this question:

  • 4. 

    What command Displays a list of the computer's currently active NETBIOS settings(identifying remote computers by name), their current status, and the amount of data transmitted to and received from each system?

    • A.

      Nbtstat -a

    • B.

      Nbtstat -c

    • C.

      Nbtstat -n

    • D.

      Nbtstat -r

    • E.

      Nbtstat -s

    Correct Answer
    E. Nbtstat -s
    Explanation
    The correct answer is nbtstat -s. This command displays a list of the computer's currently active NETBIOS settings, including the names of remote computers, their current status, and the amount of data transmitted to and received from each system.

    Rate this question:

  • 5. 

    You are a network guy for a medium sized buisness. Your boss has octuplets, and decides to dump them on you one day when the nanny calls in sick; your boss just thinks you play on the internet all day and wants to get their money's worth. The 8 babies r swinging from the hanging lamps, chewing cables, throwing poop @ monitors; it's a mad house. You finally manage to corral them all into a baby safe environment(the closet) and begin cleaning up the mess. Your boss comes back from lunch and demands to know what happened to the internet. What command will tell you where there is a loose connection?

    • A.

      Ipconfig

    • B.

      Tracert

    • C.

      Arp

    • D.

      Netstat

    • E.

      Route

    Correct Answer
    B. Tracert
  • 6. 

    What port does RDP(remote desktop protocol) use?

    • A.

      22

    • B.

      110

    • C.

      1293

    • D.

      3389

    • E.

      8080

    Correct Answer
    D. 3389
    Explanation
    RDP (Remote Desktop Protocol) uses port 3389. This is the standard port that allows users to remotely access and control a computer or server over a network. By using this port, RDP establishes a secure and encrypted connection between the client and the host machine, enabling users to interact with the remote desktop as if they were physically present at the machine.

    Rate this question:

  • 7. 

    ____# designates the # assigned to the 1st Byte of data in the current message. Used to identify the initial _____# thats gonna be used in the upcoming data transfer.

    • A.

      SEQ#

    • B.

      ACK#

    • C.

      CHECKSUM#

    • D.

      SOURCE PORT#

    • E.

      DESTINATION PORT#

    Correct Answer
    A. SEQ#
  • 8. 

    You need to send an e-valentine to your half sister in Utah. It's been uncomfortable because you hooked up the last time you saw her. You don't want to give your half sister the wrong impression, but you don't wanna let on to your mother that the relationship has gone beyond “i'll show you mine if you show me yours”. You want to use something that might fail, but at least shows that you made the effort. What protocol is NOT guaranteed to get the message there?

    • A.

      IP

    • B.

      TCP

    • C.

      UDP

    • D.

      NDS

    • E.

      DNS

    Correct Answer
    C. UDP
    Explanation
    UDP (User Datagram Protocol) is not guaranteed to get the message there because it is a connectionless protocol that does not provide reliability or error checking. It does not guarantee that the message will reach its destination or that it will be received in the correct order. In contrast, IP (Internet Protocol), TCP (Transmission Control Protocol), NDS (Novell Directory Services), and DNS (Domain Name System) provide mechanisms for reliable and ordered delivery of data.

    Rate this question:

  • 9. 

    What is the IRQ# for the keyboard?

    • A.

      1

    • B.

      5

    • C.

      8

    • D.

      13

    • E.

      3

    Correct Answer
    A. 1
    Explanation
    The IRQ# for the keyboard is 1. IRQ stands for Interrupt Request and it is a signal sent to the processor by hardware devices to request attention. In the case of the keyboard, IRQ 1 is commonly used. This means that when a key is pressed on the keyboard, an interrupt signal is sent to the processor on IRQ 1 to notify it that input is available.

    Rate this question:

  • 10. 

    What is the IRQ# for the math co-processor?

    • A.

      4

    • B.

      9

    • C.

      10

    • D.

      13

    • E.

      1

    Correct Answer
    D. 13
    Explanation
    The IRQ# for the math co-processor is 13.

    Rate this question:

  • 11. 

    Your mother calls you every morning for a month to tell u that it's a bad idea to start your own business; what with the econonmy the way it is. But you decide to anyway, cuz you just can't live in her basement anymore. And since you've begun a daily coffee clatch, a Java Hut sounds right up your alley. Of course all your buddies can't hang out without the internet, what would they do all day, talk to each other? No no no, you need the internet; but you're concerned that all your equipment will be on the same frequency as your WLAN. What IEEE standard will this not be a problem for?

    • A.

      802.11a

    • B.

      802.11b

    • C.

      802.11g

    • D.

      802.1x

    Correct Answer
    A. 802.11a
    Explanation
    The correct answer is 802.11a. This standard operates on a different frequency band than WLAN, specifically the 5 GHz band, which reduces the likelihood of interference between the equipment and the WLAN.

    Rate this question:

  • 12. 

    You live on a hundred acres of property. You want to build a shed 400 meters away from the house, so you can watch porno in peace; and you don't want your wife to know. What kind of cable can you use that will have a max of 100Mbps?

    • A.

      100BASE-T4

    • B.

      100BASE-VG

    • C.

      100BASE-FX

    • D.

      100BASE-TX

    Correct Answer
    C. 100BASE-FX
    Explanation
    The correct answer is 100BASE-FX. This type of cable is a fiber optic cable that can support a maximum speed of 100Mbps. It is suitable for long-distance communication, making it ideal for connecting the shed that is 400 meters away from the house. Fiber optic cables are also known for their high bandwidth and resistance to interference, which would help ensure a stable and reliable connection for watching content in peace.

    Rate this question:

  • 13. 

    The first 6 hexadecimal digits from a mac address come from ________

    • A.

      The manufacturer

    • B.

      The serial # of the NIC

    Correct Answer
    A. The manufacturer
    Explanation
    The first 6 hexadecimal digits from a MAC address are known as the OUI (Organizationally Unique Identifier) and they are assigned to the manufacturer of the network interface card (NIC). This identifier helps in identifying the manufacturer or vendor of the device based on its MAC address. It allows for the differentiation of devices from different manufacturers in a network.

    Rate this question:

  • 14. 

    You've been receiving weird emails; something about somone sniffing your old shoes. You track down the IP address, but the shoe sniffer has been using an internet cafe to masquerade his identity. What protocol is capable of this?

    • A.

      SNMP

    • B.

      ICMP

    • C.

      NAT

    • D.

      IGMP

    Correct Answer
    C. NAT
    Explanation
    NAT (Network Address Translation) is the protocol capable of masquerading the identity of the shoe sniffer by hiding their actual IP address behind the IP address of the internet cafe. NAT allows multiple devices on a local network to share a single public IP address, thereby providing a layer of anonymity and security for the individual devices.

    Rate this question:

  • 15. 

    ______Encrypts data btwn web browsers and web servers, also uses public key infrastructure(PKI)

    • A.

      IPSec

    • B.

      MAU

    • C.

      SSL

    • D.

      PPP

    • E.

      PPTP

    Correct Answer
    C. SSL
    Explanation
    SSL (Secure Sockets Layer) is a cryptographic protocol that encrypts data between web browsers and web servers. It ensures secure communication by using public key infrastructure (PKI) to authenticate the identity of the server and establish an encrypted connection. SSL is widely used to secure online transactions, sensitive information, and communications over the internet.

    Rate this question:

  • 16. 

    SLIP offers link configuration, testing, error detection, and compression.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because SLIP (Serial Line Internet Protocol) does not offer link configuration, testing, error detection, or compression. SLIP is a simple protocol used for transmitting IP packets over serial connections, but it does not provide any of the mentioned features.

    Rate this question:

  • 17. 

    Everyday around lunch (at work) your wireless goes out on your laptop. you know it's because Suzy from accounting insists on using her old microwave for an hour everyday! You've tried explaining it to her nicely, that it's knocking everyone (who uses wireless) off the internet, but she doesn't believe you, and you don't have the power to make her stop. what tool could you use to prove to her boss that her microwave is causing problems for the office?

    • A.

      Protocol analyzer

    • B.

      Continuity tester

    • C.

      Time domain reflector

    • D.

      Spectrum analyzer

    Correct Answer
    D. Spectrum analyzer
    Explanation
    A spectrum analyzer is a tool that can be used to analyze and measure the frequency spectrum of signals. In this scenario, the spectrum analyzer can be used to detect and analyze the interference caused by Suzy's microwave on the wireless network. By using the spectrum analyzer, you can provide visual evidence to Suzy's boss, showing the spikes or disturbances in the frequency spectrum that coincide with the time when Suzy uses her microwave. This evidence can help convince her boss that the microwave is indeed causing problems for the office's wireless network.

    Rate this question:

  • 18. 

    _____is a link state routing protocol and NOT usually used in large enterprise networks

    • A.

      RIP

    • B.

      OSPF

    • C.

      SSH

    • D.

      SSL

    • E.

      None of the above

    Correct Answer
    E. None of the above
    Explanation
    RIP is a dynamic routing protocol used in local area networks; it can be used for WANs but it doesn't work well.
    OSPF is a link state routing protocol generally used for large enterprise networks.
    SSH is A suite of protocols used to log into another computer on the network, xecute commands, and secure transfer of files.
    SSL encrypts data btwn web rowsers and webs servers.

    Rate this question:

  • 19. 

    ________is a transparent public key encryption technology that works in conjunction with NTFS permissions to grant and deny users access to files and folders in Windows NT (excluding NT4), 2000 and XP (excluding XP Home Edition) operating systems.

    • A.

      NFS

    • B.

      EFS

    • C.

      MS-CHAP

    • D.

      IGMP

    • E.

      EAP

    Correct Answer
    B. EFS
    Explanation
    EFS (Encrypting File System) is a transparent public key encryption technology that works in conjunction with NTFS permissions to grant and deny users access to files and folders in Windows NT, 2000, and XP operating systems. It provides an additional layer of security by encrypting files and folders, ensuring that only authorized users with the correct encryption key can access the data. This helps protect sensitive information from unauthorized access or theft.

    Rate this question:

  • 20. 

    What kind of connector is this?

    • A.

      St fiber connector

    • B.

      Sc twisted pair connector

    • C.

      Mt-rj fiber connector

    • D.

      Rj-45 coax connector

    • E.

      None of the above

    Correct Answer
    C. Mt-rj fiber connector
    Explanation
    The correct answer is mt-rj fiber connector. MT-RJ stands for Mechanical Transfer Registered Jack, which is a type of fiber optic connector that is used for both single-mode and multi-mode fiber optic cables. It is smaller in size compared to other fiber optic connectors and has a duplex configuration, meaning it can transmit and receive signals simultaneously. The MT-RJ connector is commonly used in telecommunications and data communication applications.

    Rate this question:

  • 21. 

    Which protocol works w/ping and tracert; and is used for error reporting, error control, and info packets for IP protocol/IP maintenance traffic.

    • A.

      ICMP

    • B.

      IGMP

    • C.

      LDAP

    • D.

      NONE OF THE ABOVE

    • E.

      YO MAMA

    Correct Answer
    A. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is the correct answer. ICMP is a protocol that works with ping and tracert commands. It is primarily used for error reporting, error control, and sending informational packets for IP protocol and IP maintenance traffic. ICMP allows network devices to send error messages and control messages to indicate issues or provide additional information about the network. It is an integral part of the Internet Protocol Suite and is used by network administrators for troubleshooting network connectivity issues.

    Rate this question:

  • 22. 

    In an inebriated haze of misjudgment, you allowed some very naughty pictures to be taken of you; with a donkey...and cheetos...at the washington monument. anyway, u need to retrieve them from a unix computer( you have a windows pc) before they are uploaded to the internet for your whole family to see; yes even granma can use the internet. will SAMBA, using SMB, allow you to delete these files from the UNIX directory, or will you forever hold your head in shame?

    • A.

      Yes

    • B.

      No

    • C.

      Please let this be a bad dream

    Correct Answer
    A. Yes
    Explanation
    The given answer "yes" suggests that SAMBA, using SMB, will allow you to delete the files from the UNIX directory. SAMBA is a software suite that allows Windows systems to access UNIX directories and files using the SMB (Server Message Block) protocol. Therefore, with SAMBA and SMB, you should be able to access the UNIX computer from your Windows PC and delete the files before they are uploaded to the internet.

    Rate this question:

  • 23. 

    What Is an open standard for authenticating users who r dialing up to a network and provides verification.

    • A.

      TACACS+

    • B.

      RADIUS

    • C.

      VPN

    • D.

      CHAP

    • E.

      ICUP

    Correct Answer
    B. RADIUS
    Explanation
    RADIUS (Remote Authentication Dial-In User Service) is an open standard used for authenticating users who are dialing up to a network and provides verification. It is a client/server protocol that allows remote access servers to communicate with a central authentication server to verify user credentials. RADIUS is commonly used in network access control systems to manage user authentication, authorization, and accounting. It provides a secure and reliable method for users to connect to a network and ensures that only authorized users are granted access.

    Rate this question:

  • 24. 

    What allows an organization to present itself to the Internet with far fewer IP addresses than there are nodes on its internal network. (choose all that apply)

    • A.

      NAT

    • B.

      Proxy server

    • C.

      Firewall

    • D.

      RAS

    • E.

      RDP

    Correct Answer(s)
    A. NAT
    B. Proxy server
    C. Firewall
    Explanation
    NAT (Network Address Translation) allows an organization to present itself to the Internet with fewer IP addresses by translating internal private IP addresses to a single public IP address. This allows multiple devices on the internal network to share the same public IP address. A proxy server acts as an intermediary between clients and the Internet, allowing the organization to present itself with a single IP address while handling requests on behalf of the clients. A firewall filters network traffic and can also be used to hide internal IP addresses from the Internet. RAS (Remote Access Service) and RDP (Remote Desktop Protocol) are not directly related to presenting an organization to the Internet with fewer IP addresses.

    Rate this question:

  • 25. 

    What exposes properties from both circuit switched and small packet switched networking?

    • A.

      FRAME RELAY

    • B.

      RAS

    • C.

      ATM

    • D.

      SMDS

    • E.

      BS

    Correct Answer
    C. ATM
    Explanation
    ATM (Asynchronous Transfer Mode) is the correct answer because it combines properties from both circuit switched and small packet switched networking. ATM is a cell-based switching technology that provides both connection-oriented (circuit switched) and connectionless (packet switched) services. It uses fixed-size cells to transmit data, allowing for efficient use of network resources and providing both guaranteed bandwidth (circuit switched) and flexibility in data transmission (packet switched). ATM is commonly used in telecommunications networks and is known for its ability to support a wide range of applications with different quality of service requirements.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 16, 2009
    Quiz Created by
    Pickra
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.