Notwork N+ CompTIA

19 Questions | Total Attempts: 319

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Learn for life give test


Questions and Answers
  • 1. 
    Which statement is NOT TRUE about high performance Device Array?
    • A. 

      Data is stored in different physical locations in drive array

    • B. 

      Drive array is a group of separate disk that are configured to work as a unit

    • C. 

      Multiple data request can be served at the same time using drive array

    • D. 

      The drive array can be configured to use different RAID levels to provide fault tolerance

  • 2. 
    Red infosystem is setting up a network for 100 computers to accommodate new receuits in its production department. The management wants the network to be efficient and has instructed the network administrator,Keith Turner, to ensure this, while setting up the network. In order to establish an efficient network, keith has decided to subnet the network. The network address allocated for this network is 194.168.10.0. keith has decidedto divide the network into four subnet. Determine the subnet mask for this network.
    • A. 

      255.255.192.0

    • B. 

      255.255.256.0

    • C. 

      255.255.224.0

    • D. 

      255.255.255.240

  • 3. 
    In case of fiber-optic cables, which transmission mode type is used for transmitting data over long distances?
    • A. 

      Step index multi fiber

    • B. 

      Craded index multimode fiber

    • C. 

      Single-mode fiber

    • D. 

      Step index single mode fiber

  • 4. 
    In which form of transmission(s), the signals are sent via pulses of electrom agnetic energy in the microwave region of the spectrum.
    • A. 

      In both microwave and Radio Transmission

    • B. 

      Radio Transmission

    • C. 

      Infrarede Transmission

    • D. 

      Microwave Transmission

  • 5. 
    Cyclic Redundancy check is used for--------------------------------------------------.
    • A. 

      Error detection followed by Error correction

    • B. 

      Error correction

    • C. 

      Flow control

    • D. 

      Error Detection

  • 6. 
    Which of the following statement correctly describes disk driver categories of Netware Loadable Modules(NLMs)?
    • A. 

      Disk drivers communicate with storage devices

    • B. 

      Disk drivers communicate with network interface cards

    • C. 

      Disk drivers enable Netware to store non-DOS file names

    • D. 

      Disk drivers have a.DKS extension

  • 7. 
    William, the network administrator at earthenWare Systems, needs to set up a LAN of 30 computers based on Fast Ethernet technology having a speed of 100 MBps. Determine the type of IEEE specification he is most likely to implement?
    • A. 

      802.3u

    • B. 

      802.2

    • C. 

      802.3z

    • D. 

      802.3

  • 8. 
    A controlled media access method in which a central devise contacts each node in turn to see whether it has data to transmit is called--------------------------------.
    • A. 

      Time-division multiplexing

    • B. 

      Polling

    • C. 

      Frequency division muktiplexing

    • D. 

      Token-based media access

  • 9. 
    Consider the following statements. Statement A: PPP is a type of protocal that enables users to log on to a computer or network within an organisation from an external location. Statement B: PAP is an encrypted authentication method that enables connections from any encrypted authentication method the server requests. Which of the following options is correct with respect to the above statements?
    • A. 

      Statement A is TRUE and statement B is FALSE.

    • B. 

      Statement A is FALSE and statement B is TRUE.

    • C. 

      Both, Statement A and statement B are TRUE.

    • D. 

      Both, Statement A and statement B are fALSE.

  • 10. 
    -----------------------------are aranged outside the autonomous system (AS) and are completely controlled by the AS adniministrator.
    • A. 

      Exterior routers

    • B. 

      Border routers

    • C. 

      Interior routers

    • D. 

      Internal routers

  • 11. 
    The first UNIX Shell developed by Steve Bourne at Bell laboratories, available in almost every UNIX System is called ___________________.
    • A. 

      Kom Shell

    • B. 

      Bourne Shell

    • C. 

      Bell shell

    • D. 

      C shell

  • 12. 
    Convert the following IP address from binary to decimal format 11011010.11110010.11111000.11000000
    • A. 

      218.242.248.192

    • B. 

      109.242.124.10

    • C. 

      198.148.5.10

    • D. 

      121.256.124.27

  • 13. 
    Which statement is NOT TRUE about high performance Device Array?
    • A. 

      Data is stored in different physical locations in drive array

    • B. 

      Drive array is a group of separate disk that are configured to work as a unit

    • C. 

      Multiple data request can be served at the same time using drive array

    • D. 

      The drive array can be configured to use different RAID levels to provide fault tolerance

  • 14. 
    Which of the following statements is TRUE about Trojan Horse attack?
    • A. 

      It is any type of unauthorized efforts to discover a user’s valid password

    • B. 

      It is an attack that is mounted for the propose of disabling systems that provide network services, rather than to steal data or inflict damage.

    • C. 

      It is an attempt to gain unauthorized access through the use of a program, which masquerades as valid software.

    • D. 

      It is a type of attack in which a device outside the network uses an internal network address to masquerade as a device inside the network

  • 15. 
    Global Systems Inc. is designing an enterprise wide IP network. In order to setup such network, the routing protocol needs to be scalable and usable in a complex enterprise environment. It should the available bandwidth optimally. Memory and CPU resources are not an issue. The protocol should also not suffer from the Count-to-infinity problem. Which of the following protocols is best suited for this situation?
    • A. 

      Border Gateway Protocol

    • B. 

      Routing Information Protocol

    • C. 

      Open Shortest Path First

    • D. 

      Internet Group Message Protocol

  • 16. 
    Sovik a network administrator at NIIT Inc. is a administering a network where most of the users need access to the internet and e-mail networks. He is required to provide a solution to ensure that no unauthorized access to the network should be made once he connects his main server on the internet. Moreover he wants to restrict internal users from sending unsolicited data and access unauthorized web sites. Which solution should he implement?
    • A. 

      He should implement a NAT based solution

    • B. 

      He should implement a multi-factor authentication

    • C. 

      He should implement a internet proxy server

    • D. 

      He should implement a internet proxy server

  • 17. 
    A Research and development institute has three branches spread over different cities. The network administrator of the institute wants to connect these branches over a WAN. He wants that the network bandwidth should be 200 Mbps and should be capable of simultaneous transfer of voice, video and data. The institute needs to transfer the data on a high priority basis as its operations are time-sensitive. The delivery of the data should also be guaranteed. Which type of network technology should be implemented in such a situation?
    • A. 

      ISDN

    • B. 

      ATM

    • C. 

      Dial-up

    • D. 

      DSL

  • 18. 
    Bikash, the network administrator at Global Networks system, need to set up a security mechanism for the 802.11b wireless network of the organization. The primary security requirement for the organization is that all the users would need to provide fingerprint scan before connecting with the organization network. Which of the following security mechanisms best suites bikash’s requirement?
    • A. 

      Key-based encryption system

    • B. 

      Strong Passwords in password Policy

    • C. 

      EAP with RADIUS

    • D. 

      Kerberos

  • 19. 
    Which TCP\IP utility shows the status of each active network connection. It also will display statistics for both TCP and UDP, including protocol, local address, foreign address, and the TCP connection state?
    • A. 

      Net stat

    • B. 

      Nbtstat utility

    • C. 

      Nslookup

    • D. 

      Tracert