CompTIA Network+ Certification (N10-003) Part 15

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Nevermore42
N
Nevermore42
Community Contributor
Quizzes Created: 23 | Total Attempts: 6,213
Questions: 30 | Attempts: 179

SettingsSettingsSettings
Network Plus Quizzes & Trivia

30 CompTIA Network+ questions covering firewall configuration, VLANs, intranets, extranets, antivirus and fault tolerance


Questions and Answers
  • 1. 

    A firewall has been configured to block egress traffic on TCP ports 80. Which of the following services would be affected?

    • A.

      Inbound HTTP traffic

    • B.

      Outbound HTTP traffic

    • C.

      Inbound HTTPS traffic

    • D.

      Outbound HTTPS traffic

    Correct Answer
    B. Outbound HTTP traffic
    Explanation
    TCP port 80 is used by HTTP. The firewall has been configured to block egress traffic, therefore outbound HTTP traffic will be blocked.

    Rate this question:

  • 2. 

    A firewall has been configured to permit traffic on only TCP ports 25 and 110.  Which of the following would be possible?

    • A.

      File transfers via FTP

    • B.

      Newsgroup access

    • C.

      Internet browsing

    • D.

      E-mail delivery

    Correct Answer
    D. E-mail delivery
    Explanation
    Only ports 25 and 110 are open. All other ports are blocked. Port 25 is used by SMTP, which is required for e-mail delivery and port 110 is used by POP3, which is used for e-mail retrieval.

    Rate this question:

  • 3. 

    You have configured a filter on a network router. Now SMTP operations have stopped. What is the most probable cause of this problem?

    • A.

      Port 25 is blocked

    • B.

      Port 80 is blocked

    • C.

      Port 110 is blocked

    • D.

      Port 443 is blocked

    Correct Answer
    A. Port 25 is blocked
    Explanation
    Port 25 is used by SMTP for e-mail delivery. Since SMTP has stopped, it is possible that port 25 has been blocked.

    Rate this question:

  • 4. 

    Which of the following are required to transfer traffic between two VLANs (Virtual Local Area Network)?

    • A.

      A router

    • B.

      A firewall

    • C.

      A switch

    • D.

      A gateway

    Correct Answer
    A. A router
    Explanation
    VLAN-capable switches use the switch management software to segment a network within the switch itself. This saves you the expense of additional network hardware or recabling. However, each VLAN corresponds to a different IP subnet. Therefore a router is required to change the packets between VLANs, even though the destination host is connected to the same switch.

    Rate this question:

  • 5. 

    What is the purpose of a VLAN (Virtual Local Area Network)?

    • A.

      To reduce broadcast traffic on a network

    • B.

      To protect hosts on a private network from hosts on a public network

    • C.

      To restrict network bandwidth usage

    • D.

      To reduce the number of network segments

    Correct Answer
    A. To reduce broadcast traffic on a network
    Explanation
    VLANs allow you to configure virtual subnets on the switch itself, rather than requiring separate routers and other network equipment. Separate network segments reduce broadcast traffic as broadcast traffic is not transmitted to the other segments.

    Rate this question:

  • 6. 

    Which of the following properties cannot be used to define VLAN (Virtual Local Area Network) membership?

    • A.

      Ports on a network switch

    • B.

      MAC addresses of the hosts

    • C.

      Network protocol used by the hosts

    • D.

      Fully qualified domain name (FQDN) of the hosts

    Correct Answer
    D. Fully qualified domain name (FQDN) of the hosts
    Explanation
    VLAN membership is not defined by FQDN.

    Rate this question:

  • 7. 

    A VLAN (Virtual Local Area Network) can be used to ______.

    • A.

      Reduce broadcast traffic on a network

    • B.

      Protect hosts on a private network from hosts on a public network

    • C.

      Restrict network bandwidth usage

    • D.

      Reduce Internet traffic

    Correct Answer
    A. Reduce broadcast traffic on a network
    Explanation
    VLANs allow you to configure virtual subnets on the switch itself, rather than requiring separate routers and other network equipment. Separate network segments reduce broadcast traffic as broadcast traffic is not transmitted to the other segments.

    Rate this question:

  • 8. 

    Which of the following statements regarding VLANs (Virtual Local Area Networks) is true?

    • A.

      A router is required to transfer data packets between two VLANs (Virtual Local Area Networks)

    • B.

      A VLAN (Virtual Local Area Network) can be used protect hosts on a private network from hosts on a public network

    • C.

      A VLAN can be defined by means of MAC address and TCP port number

    • D.

      None of the above

    Correct Answer
    A. A router is required to transfer data packets between two VLANs (Virtual Local Area Networks)
    Explanation
    VLAN-capable switches use the switch management software to segment a network within the switch itself. This saves you the expense of additional network hardware or recabling. However, each VLAN corresponds to a different IP subnet. Therefore a router is required to change the packets between VLANs, even though the destination host is connected to the same switch.

    Rate this question:

  • 9. 

    Which of the following describes an internal Web page that accessible to users within the organization?

    • A.

      An intranet

    • B.

      An internet

    • C.

      An extranet

    • D.

      The Internet

    Correct Answer
    A. An intranet
    Explanation
    An intranet is made up of all networks under a single administrative control and can be thought of as an internal internetwork. Thus resources made available to intranet users are only available to users on that network.

    Rate this question:

  • 10. 

    Which of the following statements best describes an intranet?

    • A.

      A public network that is available and accessible to the public

    • B.

      A private network that supports Internet applications and that does not use the public telecommunications system to connect users

    • C.

      A private network that supports Internet applications, uses the public telecommunications system, and has limited access to the public

    • D.

      A network in which data packets sent over the Internet and are encapsulated in a protocol that provides for data encapsulation and encryption of the user data

    Correct Answer
    B. A private network that supports Internet applications and that does not use the public telecommunications system to connect users
    Explanation
    An intranet may use Internet applications, such as e-mail and may be connected to the Internet. However, an intranet would not be accessible from outside the organization and thus would not allow access via the public telecommunications system.

    Rate this question:

  • 11. 

    Which of the following statements best describes an extranet?

    • A.

      A public network that is available and accessible to the public

    • B.

      A private network that supports Internet applications and that does not use the public telecommunications system to connect users

    • C.

      A private network that supports Internet applications, uses the public telecommunications system, and has limited access to the public

    • D.

      A network in which data packets sent over the Internet and are encapsulated in a protocol that provides for data encapsulation and encryption of the user data

    Correct Answer
    C. A private network that supports Internet applications, uses the public telecommunications system, and has limited access to the public
    Explanation
    A network that allows limited access to users outside of the organizations is called an extranet.

    Rate this question:

  • 12. 

    Which of the following is an internal Web page that accessible to select users outside the organization?

    • A.

      An intranet

    • B.

      An internet

    • C.

      An extranet

    • D.

      An Internet

    Correct Answer
    C. An extranet
    Explanation
    An extranet is similar to an intranet, which is made up of all networks under a single administrative control. The exception is that an extranet is an expansion of the intranet to include a few external or outside networks.

    Rate this question:

  • 13. 

    Which of the following statements describes an intranet?

    • A.

      A network that is made up of all networks under a single administrative control and is accessible to internal users only

    • B.

      A network is made up of a number of networks that are interconnected

    • C.

      A network that is made up of all networks under a single administrative control and is accessible to internal users mainly but also to a few external users

    • D.

      A network that spans the glob and is not under a single administrative control

    Correct Answer
    A. A network that is made up of all networks under a single administrative control and is accessible to internal users only
    Explanation
    An intranet is made up of all networks under a single administrative control and can be thought of as an internal internetwork. Thus resources made available to intranet users are only available to users on that network.

    Rate this question:

  • 14. 

    Which of the following statements describes an extranet?

    • A.

      A network that is made up of all networks under a single administrative control and is accessible to internal users only

    • B.

      A network is made up of a number of networks that are interconnected

    • C.

      A network that is made up of all networks under a single administrative control and is accessible to internal users mainly but also to a few external users

    • D.

      A network that spans the glob and is not under a single administrative control

    Correct Answer
    C. A network that is made up of all networks under a single administrative control and is accessible to internal users mainly but also to a few external users
    Explanation
    An extranet is similar to an intranet, which is made up of all networks under a single administrative control. The exception is that an extranet is an expansion of the intranet to include a few external or outside networks.

    Rate this question:

  • 15. 

    Which of the following allows data sharing only within the organization's network?

    • A.

      The Internet

    • B.

      An intranet

    • C.

      An extranet

    • D.

      All of the above

    Correct Answer
    B. An intranet
    Explanation
    An intranet would not be accessible from outside the organization and thus would not allow data sharing outside of the organization.

    Rate this question:

  • 16. 

    Your network allows casual Web browsers to access company information on its Web page but restricts access to information on the internal network. This is an example of ______.

    • A.

      An intranet

    • B.

      An extranet

    • C.

      An internet

    • D.

      A Virtual Private Network (VPN)

    Correct Answer
    A. An intranet
    Explanation
    An intranet would not be accessible from outside the organization and thus would not allow data sharing outside of the organization.

    Rate this question:

  • 17. 

    You work as a network administrator and you are instructed to provide certain customers with user accounts which they can use to access product information on the company's internal network. Which type of network do you need to configure?

    • A.

      An intranet

    • B.

      A private local area network

    • C.

      An extranet

    • D.

      A Virtual Private Network (VPN)

    Correct Answer
    C. An extranet
    Explanation
    An extranet allows for limited access and data sharing with authorized users outside of the organizations.

    Rate this question:

  • 18. 

    ______ allows data sharing with external but authorized users.

    • A.

      The Internet

    • B.

      An intranet

    • C.

      An extranet

    • D.

      All of the above

    Correct Answer
    C. An extranet
    Explanation
    An extranet allows for limited access and data sharing with authorized users outside of the organizations.

    Rate this question:

  • 19. 

    Which of the following would be the primary firewall to protect from e-mail viruses?

    • A.

      E-mail servers

    • B.

      Antivirus software

    • C.

      SMTP

    • D.

      IMAP4

    Correct Answer
    A. E-mail servers
    Explanation
    E-mail servers detect the viruses in the messages received from various sources and send warnings to the recipient to warn him/her of the risky mail. This server has the necessary means to reject infected mail content. E-mail servers have their own virus scanners to filter all the incoming mail before it reaches the server. An e-mail server is a middle man in the delivery of the message.

    Rate this question:

  • 20. 

    Which of the following network attacks cannot result from e-mail usage?

    • A.

      Dictionary attack

    • B.

      Trojan Horse

    • C.

      Phage Virus

    • D.

      Polymorphic Virus

    Correct Answer
    A. Dictionary attack
    Explanation
    A Dictionary attack involves guessing possible passwords for entering as another user. The attacker must have access to the network.

    Rate this question:

  • 21. 

    When should your Anti-Virus software scan an e-mail message for possible viruses?

    • A.

      While receiving

    • B.

      While opening

    • C.

      While sending

    • D.

      All of the above

    Correct Answer
    A. While receiving
    Explanation
    Your antivirus software should scan all your incoming mail before you can even read it.

    Rate this question:

  • 22. 

    On which of the following should Anti-Virus software be installed to provide optimum protection on a network?

    • A.

      On all workstations connected to the Internet

    • B.

      On all network servers

    • C.

      On all workstations and servers

    • D.

      On all terminals

    Correct Answer
    C. On all workstations and servers
    Explanation
    To provide optimum protection on the network, you should ensure that all systems, workstations and servers included, have Anti-Virus software installed on them.

    Rate this question:

  • 23. 

    Files with which of the following file extensions cannot be infected by a virus?

    • A.

      .txt

    • B.

      .com

    • C.

      .dll

    • D.

      .exe

    Correct Answer
    A. .txt
    Explanation
    Plain text documents cannot be infected by viruses.

    Rate this question:

  • 24. 

    Which of the following should be scanned for viruses?

    • A.

      Plain text documents

    • B.

      Microsoft Word documents

    • C.

      Executable files

    • D.

      All of the above

    Correct Answer(s)
    B. Microsoft Word documents
    C. Executable files
    Explanation
    Microsoft Word documents can be infected by macro viruses while executable files can also contain viruses.

    Rate this question:

  • 25. 

    Anti-virus software cannot protect against ______.

    • A.

      Trojans

    • B.

      Macro viruses

    • C.

      Unidentified viruses

    • D.

      Boot sector viruses

    Correct Answer
    C. Unidentified viruses
    Explanation
    Anti-Virus software uses virus definitions and signatures to detect viruses. New, unidentified or unknown viruses will not be detected.

    Rate this question:

  • 26. 

    Which of the following statements regarding anti-virus software is true?

    • A.

      Anti-virus software only scans for viruses during low CPU usage or when instructed to

    • B.

      Virus definitions must be downloaded regularly so that the anti-virus software can detect new viruses

    • C.

      Anti-virus software is required on workstations only

    • D.

      Anti-virus software can prevent brute force dictionary attacks

    Correct Answer
    B. Virus definitions must be downloaded regularly so that the anti-virus software can detect new viruses
    Explanation
    Anti-Virus software uses virus definitions and signatures to detect viruses. New, unidentified or unknown viruses will not be detected. For this reason, virus definitions should be downloaded regularly from the vendor's Web site.

    Rate this question:

  • 27. 

    Which of the following fault tolerance implementations is the most expensive?

    • A.

      A hot site

    • B.

      A cold site

    • C.

      A warm site

    • D.

      Failover clusters

    Correct Answer
    A. A hot site
    Explanation
    In a hot site, every computer system and every bit of information has a redundant copy. This provides 100% fault tolerance for systems that must be up 100% of the time. Hot sites are strictly fault-tolerant implementations, not disaster recovery implementations. Budgets for this type of fault tolerant implementation are typically large because each computer system must have a redundant copy.

    Rate this question:

  • 28. 

    Which of the following statements best describes a hot site?

    • A.

      A remote site that contains a redundant copy of every computer system and every bit of data that is in the active network

    • B.

      A remote site rely that has no fault tolerance but relies on back ups for data recovery

    • C.

      A remote site that contains a redundant copy of the critical system and data that is in the active network

    • D.

      A redundant copy of a device that becomes active when the active device fails

    Correct Answer
    A. A remote site that contains a redundant copy of every computer system and every bit of data that is in the active network
    Explanation
    In a hot site, every computer system and every bit of information has a redundant copy. This provides 100% fault tolerance for systems that must be up 100% of the time. Hot sites are strictly fault-tolerant implementations, not disaster recovery implementations. Budgets for this type of fault tolerant implementation are typically large because each computer system must have a redundant copy.

    Rate this question:

  • 29. 

    Which one of the following disk fault tolerance mechanisms consists of two disks and a single controller?

    • A.

      Disk duplexing

    • B.

      Disk mirroring

    • C.

      Disk striping

    • D.

      Disk imaging

    Correct Answer
    B. Disk mirroring
    Explanation
    Disk mirroring is the process of writing the data simultaneously to two disks so that the two are exact copies of one another. The two drives are attached to a single disk controller.

    Rate this question:

  • 30. 

    Which one of the following disk fault tolerance mechanisms consists of two disks and two controllers?

    • A.

      Disk duplexing

    • B.

      Disk mirroring

    • C.

      Disk striping

    • D.

      Disk imaging

    Correct Answer
    A. Disk duplexing
    Explanation
    Disk duplexing uses mirroring to write data to two disks so that the two are exact copies of one another but each drive is attached to its own disk controller.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 25, 2010
    Quiz Created by
    Nevermore42
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.