Notwork N+ CompTIA

19 Questions | Attempts: 324
Share
Please wait...
Question 1 / 19
0 %
0/100
Score 0/100
1. Convert the following IP address from binary to decimal format 11011010.11110010.11111000.11000000
Submit
Please wait...
About This Quiz
Network Plus Quizzes & Trivia

Learn for life give test

Personalize your quiz and earn a certificate with your name on it!
2. In which form of transmission(s), the signals are sent via pulses of electrom agnetic energy in the microwave region of the spectrum.
Submit
3. Which statement is NOT TRUE about high performance Device Array?
Submit
4. Red infosystem is setting up a network for 100 computers to accommodate new receuits in its production department. The management wants the network to be efficient and has instructed the network administrator,Keith Turner, to ensure this, while setting up the network. In order to establish an efficient network, keith has decided to subnet the network. The network address allocated for this network is 194.168.10.0. keith has decidedto divide the network into four subnet. Determine the subnet mask for this network.
Submit
5. A controlled media access method in which a central devise contacts each node in turn to see whether it has data to transmit is called--------------------------------.
Submit
6. The first UNIX Shell developed by Steve Bourne at Bell laboratories, available in almost every UNIX System is called ___________________.
Submit
7. A Research and development institute has three branches spread over different cities. The network administrator of the institute wants to connect these branches over a WAN. He wants that the network bandwidth should be 200 Mbps and should be capable of simultaneous transfer of voice, video and data. The institute needs to transfer the data on a high priority basis as its operations are time-sensitive. The delivery of the data should also be guaranteed. Which type of network technology should be implemented in such a situation?
Submit
8. Cyclic Redundancy check is used for--------------------------------------------------.
Submit
9. Bikash, the network administrator at Global Networks system, need to set up a security mechanism for the 802.11b wireless network of the organization. The primary security requirement for the organization is that all the users would need to provide fingerprint scan before connecting with the organization network. Which of the following security mechanisms best suites bikash’s requirement?
Submit
10. Which statement is NOT TRUE about high performance Device Array?
Submit
11. Which of the following statements is TRUE about Trojan Horse attack?
Submit
12. Global Systems Inc. is designing an enterprise wide IP network. In order to setup such network, the routing protocol needs to be scalable and usable in a complex enterprise environment. It should the available bandwidth optimally. Memory and CPU resources are not an issue. The protocol should also not suffer from the Count-to-infinity problem. Which of the following protocols is best suited for this situation?
Submit
13. In case of fiber-optic cables, which transmission mode type is used for transmitting data over long distances?
Submit
14. Which of the following statement correctly describes disk driver categories of Netware Loadable Modules(NLMs)?
Submit
15. -----------------------------are aranged outside the autonomous system (AS) and are completely controlled by the AS adniministrator.
Submit
16. William, the network administrator at earthenWare Systems, needs to set up a LAN of 30 computers based on Fast Ethernet technology having a speed of 100 MBps. Determine the type of IEEE specification he is most likely to implement?
Submit
17. Which TCP\IP utility shows the status of each active network connection. It also will display statistics for both TCP and UDP, including protocol, local address, foreign address, and the TCP connection state?
Submit
18. Consider the following statements. Statement A: PPP is a type of protocal that enables users to log on to a computer or network within an organisation from an external location. Statement B: PAP is an encrypted authentication method that enables connections from any encrypted authentication method the server requests. Which of the following options is correct with respect to the above statements?
Submit
19. Sovik a network administrator at NIIT Inc. is a administering a network where most of the users need access to the internet and e-mail networks. He is required to provide a solution to ensure that no unauthorized access to the network should be made once he connects his main server on the internet. Moreover he wants to restrict internal users from sending unsolicited data and access unauthorized web sites. Which solution should he implement?
Submit
View My Results

Quiz Review Timeline (Updated): Jan 3, 2013 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 03, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 04, 2009
    Quiz Created by
    Bijoy3
Cancel
  • All
    All (19)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Convert the following IP address from binary to decimal format...
In which form of transmission(s), the signals are sent via pulses of...
Which statement is NOT TRUE about high performance Device Array?
Red infosystem is setting up a network for 100 computers to...
A controlled media access method in which a central devise contacts...
The first UNIX Shell developed by Steve Bourne at Bell laboratories,...
A Research and development institute has three branches spread over...
Cyclic Redundancy check is used...
Bikash, the network administrator at Global Networks system, need to...
Which statement is NOT TRUE about high performance Device Array?
Which of the following statements is TRUE about Trojan Horse attack?
Global Systems Inc. is designing an enterprise wide IP network. In...
In case of fiber-optic cables, which transmission mode type is used...
Which of the following statement correctly describes disk driver...
-----------------------------are aranged outside the autonomous system...
William, the network administrator at earthenWare Systems, needs to...
Which TCP\IP utility shows the status of each active network...
Consider the following statements. ...
Sovik a network administrator at NIIT Inc. is a administering a...
Alert!

Advertisement