Notwork N+ CompTIA

19 Questions | Attempts: 324
Share

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Learn for life give test


Questions and Answers
  • 1. 

    Which statement is NOT TRUE about high performance Device Array?

    • A.

      Data is stored in different physical locations in drive array

    • B.

      Drive array is a group of separate disk that are configured to work as a unit

    • C.

      Multiple data request can be served at the same time using drive array

    • D.

      The drive array can be configured to use different RAID levels to provide fault tolerance

    Correct Answer
    A. Data is stored in different physical locations in drive array
  • 2. 

    Red infosystem is setting up a network for 100 computers to accommodate new receuits in its production department. The management wants the network to be efficient and has instructed the network administrator,Keith Turner, to ensure this, while setting up the network. In order to establish an efficient network, keith has decided to subnet the network. The network address allocated for this network is 194.168.10.0. keith has decidedto divide the network into four subnet. Determine the subnet mask for this network.

    • A.

      255.255.192.0

    • B.

      255.255.256.0

    • C.

      255.255.224.0

    • D.

      255.255.255.240

    Correct Answer
    D. 255.255.255.240
  • 3. 

    In case of fiber-optic cables, which transmission mode type is used for transmitting data over long distances?

    • A.

      Step index multi fiber

    • B.

      Craded index multimode fiber

    • C.

      Single-mode fiber

    • D.

      Step index single mode fiber

    Correct Answer
    B. Craded index multimode fiber
  • 4. 

    In which form of transmission(s), the signals are sent via pulses of electrom agnetic energy in the microwave region of the spectrum.

    • A.

      In both microwave and Radio Transmission

    • B.

      Radio Transmission

    • C.

      Infrarede Transmission

    • D.

      Microwave Transmission

    Correct Answer
    D. Microwave Transmission
  • 5. 

    Cyclic Redundancy check is used for--------------------------------------------------.

    • A.

      Error detection followed by Error correction

    • B.

      Error correction

    • C.

      Flow control

    • D.

      Error Detection

    Correct Answer
    D. Error Detection
  • 6. 

    Which of the following statement correctly describes disk driver categories of Netware Loadable Modules(NLMs)?

    • A.

      Disk drivers communicate with storage devices

    • B.

      Disk drivers communicate with network interface cards

    • C.

      Disk drivers enable Netware to store non-DOS file names

    • D.

      Disk drivers have a.DKS extension

    Correct Answer
    A. Disk drivers communicate with storage devices
  • 7. 

    William, the network administrator at earthenWare Systems, needs to set up a LAN of 30 computers based on Fast Ethernet technology having a speed of 100 MBps. Determine the type of IEEE specification he is most likely to implement?

    • A.

      802.3u

    • B.

      802.2

    • C.

      802.3z

    • D.

      802.3

    Correct Answer
    A. 802.3u
  • 8. 

    A controlled media access method in which a central devise contacts each node in turn to see whether it has data to transmit is called--------------------------------.

    • A.

      Time-division multiplexing

    • B.

      Polling

    • C.

      Frequency division muktiplexing

    • D.

      Token-based media access

    Correct Answer
    B. Polling
  • 9. 

    Consider the following statements. Statement A: PPP is a type of protocal that enables users to log on to a computer or network within an organisation from an external location. Statement B: PAP is an encrypted authentication method that enables connections from any encrypted authentication method the server requests. Which of the following options is correct with respect to the above statements?

    • A.

      Statement A is TRUE and statement B is FALSE.

    • B.

      Statement A is FALSE and statement B is TRUE.

    • C.

      Both, Statement A and statement B are TRUE.

    • D.

      Both, Statement A and statement B are fALSE.

    Correct Answer
    D. Both, Statement A and statement B are fALSE.
  • 10. 

    -----------------------------are aranged outside the autonomous system (AS) and are completely controlled by the AS adniministrator.

    • A.

      Exterior routers

    • B.

      Border routers

    • C.

      Interior routers

    • D.

      Internal routers

    Correct Answer
    A. Exterior routers
  • 11. 

    The first UNIX Shell developed by Steve Bourne at Bell laboratories, available in almost every UNIX System is called ___________________.

    • A.

      Kom Shell

    • B.

      Bourne Shell

    • C.

      Bell shell

    • D.

      C shell

    Correct Answer
    B. Bourne Shell
  • 12. 

    Convert the following IP address from binary to decimal format 11011010.11110010.11111000.11000000

    • A.

      218.242.248.192

    • B.

      109.242.124.10

    • C.

      198.148.5.10

    • D.

      121.256.124.27

    Correct Answer
    A. 218.242.248.192
  • 13. 

    Which statement is NOT TRUE about high performance Device Array?

    • A.

      Data is stored in different physical locations in drive array

    • B.

      Drive array is a group of separate disk that are configured to work as a unit

    • C.

      Multiple data request can be served at the same time using drive array

    • D.

      The drive array can be configured to use different RAID levels to provide fault tolerance

    Correct Answer
    A. Data is stored in different physical locations in drive array
  • 14. 

    Which of the following statements is TRUE about Trojan Horse attack?

    • A.

      It is any type of unauthorized efforts to discover a user’s valid password

    • B.

      It is an attack that is mounted for the propose of disabling systems that provide network services, rather than to steal data or inflict damage.

    • C.

      It is an attempt to gain unauthorized access through the use of a program, which masquerades as valid software.

    • D.

      It is a type of attack in which a device outside the network uses an internal network address to masquerade as a device inside the network

    Correct Answer
    C. It is an attempt to gain unauthorized access through the use of a program, which masquerades as valid software.
  • 15. 

    Global Systems Inc. is designing an enterprise wide IP network. In order to setup such network, the routing protocol needs to be scalable and usable in a complex enterprise environment. It should the available bandwidth optimally. Memory and CPU resources are not an issue. The protocol should also not suffer from the Count-to-infinity problem. Which of the following protocols is best suited for this situation?

    • A.

      Border Gateway Protocol

    • B.

      Routing Information Protocol

    • C.

      Open Shortest Path First

    • D.

      Internet Group Message Protocol

    Correct Answer
    C. Open Shortest Path First
  • 16. 

    Sovik a network administrator at NIIT Inc. is a administering a network where most of the users need access to the internet and e-mail networks. He is required to provide a solution to ensure that no unauthorized access to the network should be made once he connects his main server on the internet. Moreover he wants to restrict internal users from sending unsolicited data and access unauthorized web sites. Which solution should he implement?

    • A.

      He should implement a NAT based solution

    • B.

      He should implement a multi-factor authentication

    • C.

      He should implement a internet proxy server

    • D.

      He should implement a internet proxy server

    Correct Answer
    D. He should implement a internet proxy server
  • 17. 

    A Research and development institute has three branches spread over different cities. The network administrator of the institute wants to connect these branches over a WAN. He wants that the network bandwidth should be 200 Mbps and should be capable of simultaneous transfer of voice, video and data. The institute needs to transfer the data on a high priority basis as its operations are time-sensitive. The delivery of the data should also be guaranteed. Which type of network technology should be implemented in such a situation?

    • A.

      ISDN

    • B.

      ATM

    • C.

      Dial-up

    • D.

      DSL

    Correct Answer
    B. ATM
  • 18. 

    Bikash, the network administrator at Global Networks system, need to set up a security mechanism for the 802.11b wireless network of the organization. The primary security requirement for the organization is that all the users would need to provide fingerprint scan before connecting with the organization network. Which of the following security mechanisms best suites bikash’s requirement?

    • A.

      Key-based encryption system

    • B.

      Strong Passwords in password Policy

    • C.

      EAP with RADIUS

    • D.

      Kerberos

    Correct Answer
    C. EAP with RADIUS
  • 19. 

    Which TCP\IP utility shows the status of each active network connection. It also will display statistics for both TCP and UDP, including protocol, local address, foreign address, and the TCP connection state?

    • A.

      Net stat

    • B.

      Nbtstat utility

    • C.

      Nslookup

    • D.

      Tracert

    Correct Answer
    A. Net stat

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 03, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 04, 2009
    Quiz Created by
    Bijoy3
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.