30 CompTIA Network+ questions covering firewall configuration, VLANs, intranets, extranets, antivirus and fault tolerance
Inbound HTTP traffic
Outbound HTTP traffic
Inbound HTTPS traffic
Outbound HTTPS traffic
Rate this question:
File transfers via FTP
Newsgroup access
Internet browsing
E-mail delivery
Rate this question:
Port 25 is blocked
Port 80 is blocked
Port 110 is blocked
Port 443 is blocked
Rate this question:
A router
A firewall
A switch
A gateway
Rate this question:
To reduce broadcast traffic on a network
To protect hosts on a private network from hosts on a public network
To restrict network bandwidth usage
To reduce the number of network segments
Rate this question:
Ports on a network switch
MAC addresses of the hosts
Network protocol used by the hosts
Fully qualified domain name (FQDN) of the hosts
Rate this question:
Reduce broadcast traffic on a network
Protect hosts on a private network from hosts on a public network
Restrict network bandwidth usage
Reduce Internet traffic
Rate this question:
A router is required to transfer data packets between two VLANs (Virtual Local Area Networks)
A VLAN (Virtual Local Area Network) can be used protect hosts on a private network from hosts on a public network
A VLAN can be defined by means of MAC address and TCP port number
None of the above
Rate this question:
An intranet
An internet
An extranet
The Internet
Rate this question:
A public network that is available and accessible to the public
A private network that supports Internet applications and that does not use the public telecommunications system to connect users
A private network that supports Internet applications, uses the public telecommunications system, and has limited access to the public
A network in which data packets sent over the Internet and are encapsulated in a protocol that provides for data encapsulation and encryption of the user data
Rate this question:
A public network that is available and accessible to the public
A private network that supports Internet applications and that does not use the public telecommunications system to connect users
A private network that supports Internet applications, uses the public telecommunications system, and has limited access to the public
A network in which data packets sent over the Internet and are encapsulated in a protocol that provides for data encapsulation and encryption of the user data
Rate this question:
An intranet
An internet
An extranet
An Internet
Rate this question:
A network that is made up of all networks under a single administrative control and is accessible to internal users only
A network is made up of a number of networks that are interconnected
A network that is made up of all networks under a single administrative control and is accessible to internal users mainly but also to a few external users
A network that spans the glob and is not under a single administrative control
Rate this question:
A network that is made up of all networks under a single administrative control and is accessible to internal users only
A network is made up of a number of networks that are interconnected
A network that is made up of all networks under a single administrative control and is accessible to internal users mainly but also to a few external users
A network that spans the glob and is not under a single administrative control
Rate this question:
The Internet
An intranet
An extranet
All of the above
Rate this question:
An intranet
An extranet
An internet
A Virtual Private Network (VPN)
Rate this question:
An intranet
A private local area network
An extranet
A Virtual Private Network (VPN)
Rate this question:
The Internet
An intranet
An extranet
All of the above
Rate this question:
E-mail servers
Antivirus software
SMTP
IMAP4
Rate this question:
Dictionary attack
Trojan Horse
Phage Virus
Polymorphic Virus
Rate this question:
While receiving
While opening
While sending
All of the above
Rate this question:
On all workstations connected to the Internet
On all network servers
On all workstations and servers
On all terminals
Rate this question:
.txt
.com
.dll
.exe
Rate this question:
Plain text documents
Microsoft Word documents
Executable files
All of the above
Rate this question:
Trojans
Macro viruses
Unidentified viruses
Boot sector viruses
Rate this question:
Anti-virus software only scans for viruses during low CPU usage or when instructed to
Virus definitions must be downloaded regularly so that the anti-virus software can detect new viruses
Anti-virus software is required on workstations only
Anti-virus software can prevent brute force dictionary attacks
Rate this question:
A hot site
A cold site
A warm site
Failover clusters
Rate this question:
A remote site that contains a redundant copy of every computer system and every bit of data that is in the active network
A remote site rely that has no fault tolerance but relies on back ups for data recovery
A remote site that contains a redundant copy of the critical system and data that is in the active network
A redundant copy of a device that becomes active when the active device fails
Rate this question:
Disk duplexing
Disk mirroring
Disk striping
Disk imaging
Rate this question:
Disk duplexing
Disk mirroring
Disk striping
Disk imaging
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.