Certiport IC3-3 Exam (page: 1)
Certiport Internet and Computing Core Certification
Updated on: 25-Sep-2025

Viewing Page 1 of 29

Mark works as a Network Administrator for Company Inc. The company has a Windows-based network. The California branch of Company has been divided into two buildings in the same campus. The company wants to interconnect these two buildings for proper communication among all the departments.
Which of the following network types should Mark use to accomplish the task?

  1. MAN
  2. WAN
  3. LAN
  4. CAN

Answer(s): D

Explanation:

A campus area network (CAN) is a computer network that interconnects local area networks throughout a limited geographical area, such as a university campus, a corporate campus, or a military base. It could be considered a metropolitan area network that is specific to a campus setting.
A campus area network is, therefore, larger than a local area network but smaller than a wide area network. The term is sometimes used to refer to university campuses, while the term corporate area network is used to refer to corporate campuses instead. Although not considered a wide area network, a CAN extends the reach of each local area network within the campus area of an organization. In a CAN, the buildings of a university or corporate campus are interconnected using the same types of hardware and networking technologies that one would use in a LAN. In addition, all of the components, including switches, routers, and cabling, as well as wireless connection points, are owned and maintained by the organization.
Answer option C is incorrect. Local Area Network (LAN) represents a network that covers a very close geographic area, such as a floor of a building, a building itself, or a campus environment. LAN is a high-speed network that connects computers, printers, and other network devices together. The media types used in LANs include Ethernet, Fast Ethernet (FE), Gigabit Ethernet (GE), Token Ring, and FDDI.
A LAN may include servers, workstations, hubs, bridges, switches, routers, gateways, firewalls, etc.
Answer option A is incorrect.
A Metropolitan Area Network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large Local Area Network (LAN) but smaller than the area covered by a Wide Area Network (WAN). The term is applied to the interconnection of networks in a city into a single larger network (which may then also offer efficient connection to a wide area network). It is also used to mean the interconnection of several local area networks by bridging them with backbone lines. The latter usage is also sometimes referred to as a campus network.
A MAN usually interconnects a number of local area networks (LANs) using a high- capacity backbone technology, such as fiber-optical links, and provides up-link services to wide area networks and the Internet. Examples of metropolitan area networks of various sizes can be found in the metropolitan areas of London, England; Lodz, Poland; and Geneva, Switzerland. Large universities also sometimes use the term to describe their networks.
A recent trend is the installation of wireless MANs.
Answer option B is incorrect.
A wide area network (WAN) is a geographically dispersed telecommunications network. The term distinguishes a broader telecommunication structure from a local area network (LAN).
A wide area network may be privately owned or rented, but the term usually connotes the inclusion of public (shared user) networks. An intermediate form of network in terms of geography is a metropolitan area network (MAN).
A wide area network is also defined as a network of networks, as it interconnects LANs over a wide geographical area.



Which of the following organizations offers technical assistance to the developing countries in the field of telecommunications and regulates international radio and telecommunications?

  1. ISO
  2. ANSI
  3. ITU-T
  4. IEEE
  5. W3C

Answer(s): C

Explanation:

The International Telecommunication Union (ITU) is an organization established to standardize and regulate international radio and telecommunications. Its main tasks include standardization, allocation of the radio spectrum, and organizing interconnection arrangements between different countries to allow international phone calls. ITU sets standards for global telecom networks. The ITU's telecommunications division (ITU-T) produces more than 200 standard recommendations each year in the converging areas of telecommunications, information technology, consumer electronics, broadcasting and multimedia communications. ITU was streamlined into the following three sectors:
ITU-D (Telecommunication Development)
ITU-R (Radio communication)
ITU-T (Telecommunication Standardization)
Answer option B is incorrect. ANSI (American National Standards Institute) is the primary organization for fostering the development of technology standards in the United States. ANSI works with industry groups and is the U.S. member of the International Organization for Standardization (ISO) and the International Electro-technical Commission (IEC). Long-established computer standards from ANSI include the American Standard Code for Information Interchange (ASCII) and the Small Computer System Interface (SCSI).
Answer option D is incorrect. The Institute of Electrical and Electronic Engineers (IEEE) is a society of technical professionals. It promotes the development and application of electro-technology and allied sciences. IEEE develops communications and network standards, among other activities. The organization publishes number of journals, has many local chapters, and societies in specialized areas.
Answer option A is incorrect. The International Organization for Standardization, widely known as ISO, is an international-standard-setting body composed of representatives from various national standards organizations. Founded on 23 February 1947, the organization promulgates worldwide proprietary industrial and commercial standards. It has its headquarters in Geneva, Switzerland.
While ISO defines itself as a non- governmental organization, its ability to set standards that often become law, either through treaties or national standards, makes it more powerful than most non-governmental organizations. In practice, ISO acts as a consortium with strong links to governments.
Answer option E is incorrect.

The World Wide Web Consortium (W3C) is an international industry consortium that develops common standards for the World Wide Web to promote its evolution and interoperability. It was founded in October 1994 by Tim Berners-Lee, the inventor of the Web, at the Massachusetts Institute of Technology, Laboratory for Computer Science [MIT/LCS] in collaboration with CERN, where the Web had originated , with support from DARPA and the European Commission.



Which of the following is used to publish frequently updated works such as blog entries, news headlines, audio, and video on the Web sites?

  1. Podcast
  2. ActiveX
  3. RSS
  4. Digital certificate

Answer(s): C

Explanation:

RSS (most commonly translated as "Really Simple Syndication" but sometimes "Rich Site Summary") is a family of Web feed formats used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardized format.An RSS document (which is called a "feed", "Web feed", or "channel") includes full or summarized text, plus metadata such as publishing dates and authorship. Web feeds benefit publishers by letting them syndicate content automatically. They benefit readers who want to subscribe to timely updates from favored Web sites or to aggregate feeds from many sites into one place. RSS feeds can be read using software called an "RSS reader", "feed reader", or "aggregator", which can be Web-based, desktop-based, or mobile-device-based.
A standardized XML file format allows the information to be published once and viewed by many different programs. The user subscribes to a feed by entering into the reader the feed's URI - often referred to informally as a "URL" (Uniform Resource Locator), although technically the two terms are not exactly synonymous - or by clicking an RSS icon in a browser that initiates the subscription process. The RSS reader checks the user's subscribed feeds regularly for new work, downloads any updates that it finds, and provides a user interface to monitor and read the feeds.
Answer option A is incorrect.
A podcast (or netcast) is a series of digital media files (either audio or video) that are released episodically and often downloaded through web syndication. The mode of delivery differentiates podcasting from other means of accessing media files over the Internet, such as direct download, or streamed webcasting.
Answer option B is incorrect. ActiveX is a framework for defining reusable software components that perform a particular function or a set of functions in Microsoft Windows in a way that is independent of the programming language used to implement them.
A software application can then be composed from one or more of these components in order to provide its functionality. Many Microsoft Windows applications - including many of those from Microsoft itself, such as Internet Explorer, Microsoft Office, Microsoft Visual Studio, and Windows Media Player use ActiveX controls to build their feature-set and also encapsulate their own functionality as ActiveX controls which can then be embedded into other applications. Internet Explorer also allows embedding ActiveX controls onto web pages.
Answer option D is incorrect.
A digital certificate is an electronic 'credit card' that establishes an individual's credentials when doing.

business or other transactions on the Web. It is issued by a certification authority (CA). It contains the name, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real. Some digital certificates conform to a standard, X.509. Digital certificates can be kept in registries so that authenticating users can look up other users' public keys.



You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based network. The employees use Internet Explorer for Internet surfing. You want to block access to the vulnerable sites from the internal network of the company. To accomplish the task, you need to configure some security settings for Internet Explorer.
Which of the following features of Internet Explorer do you need to configure?

  1. Pop-up blocker
  2. InPrivate Browsing
  3. Content Advisor
  4. Internet Explorer Compatibility Evaluator

Answer(s): C

Explanation:

Content Advisor is a feature of Internet Explorer that allows an administrator to control the Internet contents that can be viewed on a single computer. Before configuring the Content Advisor, it needs to be enabled.
When it is enabled, Internet Explorer first checks whether the website meets the specified criteria or not.
A user can adjust the content rating settings to reflect the appropriate level of content in the areas of language, sex, nudity, and violence. He can also create a list of websites that are always viewable or never viewable regardless of the contents.
Answer option D is incorrect. The Internet Explorer Compatibility Evaluator (IECE) allows a user to determine whether a Web site or Web application will run properly in a new version of Internet Explorer such as Windows Internet Explorer 7. IECE works by enabling compatibility logging in Internet Explorer, parsing logged issues, and creating a log file for uploading to the ACT Log Processing Service.
A user can view the compatibility issues located by IECE as a report with the help of the Application Compatibility Manager.
Answer option B is incorrect. InPrivate Browsing is a feature of Internet Explorer 8.
When this feature is active, Internet Explorer does not store history, cookies, temporary Internet files, or other data, thus protecting privacy of the user while using Internet Explorer 8. InPrivate Browsing can be activated by pressing Ctrl+Shift+P. This feature is quite helpful when a user does not want to leave any trace of his Web browsing activity such as, e-mailing at an Internet cafe or shopping for a gift.
Answer option A is incorrect. Pop-up blocker is a feature of Internet Explorer (IE) 7+. It enables users to block most pop-ups while they are surfing the Internet on their computers. Users can choose the level of blocking. They can either block all pop-up windows or allow pop-ups they want to see. By default, the pop-up blocker is enabled in IE 7+.
While the pop-up blocker is enabled, a user can see the blocked pop-ups by clicking the IE 7+ information bar.



Which of the following devices is used to convert digital signals to analog signals for transmission across a network?

  1. Gateway
  2. Brouter
  3. Firewall
  4. Modem

Answer(s): D

Explanation:

Modem stands for Modulator-Demodulator. It is a device that enables a computer to transmit information over standard telephone lines. Since a computer stores information digitally and a telephone line is analog, a modem converts digital signals to analog and vice-versa. The conversion of a digital signal to an analog signal is known as modulation and that of an analog signal to a digital signal is known as demodulation.
Answer option A is incorrect.
A gateway is a network point that acts as an entrance to another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within a company's network or at a local Internet service provider (ISP) are gateway nodes.In the network for an enterprise, a computer server acting as a gateway node is often also acting as a proxy server and a firewall server.
A gateway is often associated with both a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet.
Answer option B is incorrect.
A brouter is a network bridge and a router combined in a single product.
A bridge is a device that connects one local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or Token Ring). If a data unit on one LAN is intended for a destination on an interconnected LAN, the bridge forwards the data unit to that LAN; otherwise, it passes it along on the same LAN.
A bridge usually offers only one path to a given interconnected LAN.
A router connects a network to one or more other networks that are usually part of a wide area network (WAN) and may offer a number of paths out to destinations on those networks.
A router therefore needs to have more information than a bridge about the interconnected networks. It consults a routing table for this information. Since a given outgoing data unit or packet from a computer may be intended for an address on the local network, on an interconnected LAN, or the wide area network, it makes sense to have a single unit that examines all data units and forwards them appropriately.
Answer option C is incorrect.
A firewall is a tool to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. An administrator can configure the following settings for a firewall:
Open and Closed Ports: Through this setting firewall determines which data packet to be allowed or drop during communication.

Program Filters: Through program filters, firewall determines which program to be allowed or disallow for communication.
A firewall can be a standalone system, a software application, or a hardware device that blocks/permits traffic. It can also be used to secure the network from malicious activities.



Viewing Page 1 of 29



Share your comments for Certiport IC3-3 exam with other users:

abuti 7/21/2023 6:24:00 PM

cool very helpfull
Anonymous


Krishneel 3/17/2023 10:34:00 AM

i just passed. this exam dumps is the same one from prepaway and examcollection. it has all the real test questions.
INDIA


Regor 12/4/2023 2:01:00 PM

is this a valid prince2 practitioner dumps?
UNITED KINGDOM


asl 9/14/2023 3:59:00 PM

all are relatable questions
CANADA


Siyya 1/19/2024 8:30:00 PM

might help me to prepare for the exam
Anonymous


Ted 6/21/2023 11:11:00 PM

just paid and downlaod the 2 exams using the 50% sale discount. so far i was able to download the pdf and the test engine. all looks good.
GERMANY


Paul K 11/27/2023 2:28:00 AM

i think it should be a,c. option d goes against the principle of building anything custom unless there are no work arounds available
INDIA


ph 6/16/2023 12:41:00 AM

very legible
Anonymous


sephs2001 7/31/2023 10:42:00 PM

is this exam accurate or helpful?
Anonymous


ash 7/11/2023 3:00:00 AM

please upload dump, i have exam in 2 days
INDIA


Sneha 8/17/2023 6:29:00 PM

this is useful
CANADA


sachin 12/27/2023 2:45:00 PM

question 232 answer should be perimeter not netowrk layer. wrong answer selected
Anonymous


tomAws 7/18/2023 5:05:00 AM

nice questions
BRAZIL


Rahul 6/11/2023 2:07:00 AM

hi team, could you please provide this dump ?
INDIA


TeamOraTech 12/5/2023 9:49:00 AM

very helpful to clear the exam and understand the concept.
Anonymous


Curtis 7/12/2023 8:20:00 PM

i think it is great that you are helping people when they need it. thanks.
UNITED STATES


sam 7/17/2023 6:22:00 PM

cannot evaluate yet
Anonymous


nutz 7/20/2023 1:54:00 AM

a laptops wireless antenna is most likely located in the bezel of the lid
UNITED STATES


rajesh soni 1/17/2024 6:53:00 AM

good examplae to learn basic
INDIA


Tanya 10/25/2023 7:07:00 AM

this is useful information
Anonymous


Nasir Mahmood 12/11/2023 7:32:00 AM

looks usefull
Anonymous


Jason 9/30/2023 1:07:00 PM

question 81 should be c.
CANADA


TestPD1 8/10/2023 12:22:00 PM

question 18 : response isnt a ?
EUROPEAN UNION


ally 8/19/2023 5:31:00 PM

plaese add questions
TURKEY


DIA 10/7/2023 5:59:00 AM

is dumps still valid ?
FRANCE


Annie 7/7/2023 8:33:00 AM

thanks for this
EUROPEAN UNION


arnie 9/17/2023 6:38:00 AM

please upload questions
Anonymous


Tanuj Rana 7/22/2023 2:33:00 AM

please upload the question dump for professional machinelearning
Anonymous


Future practitioner 8/10/2023 1:26:00 PM

question 4 answer is c. this site shows the correct answer as b. "adopt a consumption model" is clearly a cost optimization design principle. looks like im done using this site to study!!!
Anonymous


Ace 8/3/2023 10:37:00 AM

number 52 answer is d
UNITED STATES


Nathan 12/17/2023 12:04:00 PM

just started preparing for my exam , and this site is so much help
Anonymous


Corey 12/29/2023 5:06:00 PM

question 35 is incorrect, the correct answer is c, it even states so: explanation: when a vm is infected with ransomware, you should not restore the vm to the infected vm. this is because the ransomware will still be present on the vm, and it will encrypt the files again. you should also not restore the vm to any vm within the companys subscription. this is because the ransomware could spread to other vms in the subscription. the best way to restore a vm that is infected with ransomware is to restore it to a new azure vm. this will ensure that the ransomware is not present on the new vm.
Anonymous


Rajender 10/18/2023 3:54:00 AM

i would like to take psm1 exam.
Anonymous


Blessious Phiri 8/14/2023 9:53:00 AM

cbd and pdb are key to the database
SOUTH AFRICA