Network + Practice Test 4

100 Questions  I  By Afiavison
Please take the quiz to rate it.

Network Plus Quizzes & Trivia
This is the part 4 of the practice test

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
  • 1. 
    A user is reporting that their inquiries to the database server keep timing out. Which of the following tools would be BEST suited to troubleshoot the issue?
    • A. 

      Cable tester

    • B. 

      Packet analyzer

    • C. 

      Tone probe

    • D. 

      Butt set


  • 2. 
    Which of the following connector types would a technician utilize with fiber lines by pushing it directly into the port without twisting?
    • A. 

      RJ-45

    • B. 

      ST

    • C. 

      SC

    • D. 

      BNC


  • 3. 
    A client is using a device that allows them to synchronize their wireless device to their computer, but the device must be within 3 feet (1 meter) in order for the synchronization to complete. Which of the following BEST describes the type of wireless device being used?
    • A. 

      WiFi

    • B. 

      Bluetooth

    • C. 

      Serial

    • D. 

      Infrared


  • 4. 
    A technician is building a new network. Which of the following components would be the FIRST installed for the network?
    • A. 

      MDF

    • B. 

      VPN

    • C. 

      EMI

    • D. 

      IDF


  • 5. 
    After a technician came out and installed a new wireless router, one of the wired workstations began having problems connecting to the file server. This is only an intermittent problem. Which of the following actions will the technician MOST likely perform to resolve this problem?
    • A. 

      Move the router's location.

    • B. 

      Check the cable ends.

    • C. 

      Check user permissions

    • D. 

      Change the router's SSID


  • 6. 
    A network device that is used to connect multiple devices without segmenting a network is a:
    • A. 

      Router

    • B. 

      Bridge.

    • C. 

      Hub

    • D. 

      Switch


  • 7. 
    A mail server was recently placed in the network. The users report email is slow. Upon closer inspection a technician notices that error counters on the interface are incrementing. Which of the following could be causing the problem?
    • A. 

      Wrong subnet mask

    • B. 

      Duplex mismatch

    • C. 

      Port speed mismatch

    • D. 

      Switch loop


  • 8. 
    A technician has just finished implementing a solution for a network issue. Which of the following steps in troubleshooting should the technician do NEXT?
    • A. 

      Document the issue and the solution that was implemented.

    • B. 

      Escalate the issue to another technician

    • C. 

      Test if the solution works and identify other effects it may have

    • D. 

      Gather information about the issue.


  • 9. 
    A technician notices that when trying to ping a workstation by network name the workstation does not reply back over the network. The workstation is part of the domain and is able to get to the Internet. Which of the following is the cause of the problem?
    • A. 

      Faulty cable on the workstation

    • B. 

      Wrong host name on the workstation

    • C. 

      Wrong WINS on the workstation

    • D. 

      Incorrect IP address assigned to the workstation


  • 10. 
    Which of the following network performance optimization methods slows or restricts traffic to increase the performance of other types of traffic? (Select TWO).
    • A. 

      Load balancing

    • B. 

      Traffic shaping

    • C. 

      High availability

    • D. 

      Caching engines

    • E. 

      QoS


  • 11. 
    A user has plugged a computer into a switch port and now is unable to access any server resources on the network.Which of the following are the MOST likely reasons for the access problem? (Select TWO).
    • A. 

      The spanning tree protocol has locked down the port

    • B. 

      The computer is connected to a port in the wrong VLAN

    • C. 

      The appropriate credentials have not been supplied for network access

    • D. 

      A port mirroring session was started and is interfering with the connection

    • E. 

      The computer is connected to an incorrect PoE port.


  • 12. 
    A company has just added a new conference room. The network administrator has decided to add six new data ports to this room. The administrator has verified that all the cabling is terminated and functioning correctly. Which of the following should the administrator do next?
    • A. 

      Update the network baseline

    • B. 

      Update the wiring diagrams

    • C. 

      Move some data across each port

    • D. 

      Check all of the cables with the OTDR.


  • 13. 
    A network technician wants to add fault tolerance to a file server. Which of the following should the technician do?
    • A. 

      Install the latest NIC driver

    • B. 

      Add an additional DNS server and modify the MX record

    • C. 

      Upgrade the NIC to a one Gigabit card

    • D. 

      Add an additional NIC and setup network teaming


  • 14. 
    Which of the following VPN protocols runs over port 1723 and allows encryption to be done at the data level
    • A. 

      SLIP

    • B. 

      PPPoE

    • C. 

      PPTP

    • D. 

      RAS


  • 15. 
    Which of the following network devices would an administrator have to configure channels on?
    • A. 

      Hub

    • B. 

      Unmanaged switch

    • C. 

      Firewall

    • D. 

      Wireless access point


  • 16. 
    A network technician is installing a series of three access points to cover the entire wing of a building. Only one access point has a wired connection. 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points?
    • A. 

      Channels 1-3-5

    • B. 

      Channels 6-6-6

    • C. 

      Channels 7-11-1

    • D. 

      Channels 5-5-5


  • 17. 
    Which of the following outlines the purpose of using a proxy server in an enterprise environment?
    • A. 

      Allows the administrator to block malicious attacks on the network

    • B. 

      Allows the user to access hard to find websites

    • C. 

      Allows the client to get a fixed IP address when added to the network

    • D. 

      Allows granular control over the traffic between the local LAN and the Internet


  • 18. 
    An administrator is using a packet analyzer across a single switch but is only receiving partial packet information. Which of the following would need to be implemented on the switch for the administrator?
    • A. 

      Port authentication

    • B. 

      Port mirroring

    • C. 

      Spanning tree

    • D. 

      VLAN


  • 19. 
    Which of the following cable types is typically used to connect a hub to a hub that does not support MDIX?
    • A. 

      Straight

    • B. 

      Loopback

    • C. 

      Crossover

    • D. 

      Rollover


  • 20. 
    Which of the following features from the switch eliminates a delay in acquiring an IP address?
    • A. 

      Update the SNMP strings

    • B. 

      Change the duplex mode tohalfduplex

    • C. 

      Enable spanning tree on the interface

    • D. 

      Enable trunking.


  • 21. 
    Which of the following is the component in a wiring system designed to support legacy phone systems?
    • A. 

      Fiber conduit

    • B. 

      66 block

    • C. 

      110 block

    • D. 

      Patch panels


  • 22. 
    Which of the following protocols allows usernames and passwords to be transmitted as clear-text?
    • A. 

      PAP

    • B. 

      RADIUS

    • C. 

      CHAP

    • D. 

      SSH


  • 23. 
    Which of the following will allow certain ports to be part of the same group while other ports within that switch are part of a different group?
    • A. 

      Trunking

    • B. 

      Port authentication

    • C. 

      Enabling VLANs

    • D. 

      Enabling VTP


  • 24. 
    When preparing to place a RJ-45 connector on a CAT5 cable, which of the following tools would BEST be used to prepare the cable?
    • A. 

      Polishing kit

    • B. 

      Pliers

    • C. 

      Razor knife

    • D. 

      Snips


  • 25. 
    Which of the following authentication protocols uses certificates to negotiate access to the network?
    • A. 

      EAP-TLS

    • B. 

      PAP

    • C. 

      CHAP

    • D. 

      Kerberos


  • 26. 
    Which of the following components allows a technician to use short Ethernet cables to connect cable drops to other devices?
    • A. 

      EDF

    • B. 

      MDF

    • C. 

      Demarc extension

    • D. 

      Patch panel


  • 27. 
    Which of the following is the strongest type of wireless encryption?
    • A. 

      AES

    • B. 

      RADIUS

    • C. 

      WEP

    • D. 

      TKIP


  • 28. 
    Which of the following wireless communication standards allows for communication at both 2.4GHz and 5GHz frequencies?
    • A. 

      802.11b

    • B. 

      802.11a

    • C. 

      802.11n

    • D. 

      802.11g


  • 29. 
    Which of the following network security devices prevents users from propagating viruses?
    • A. 

      IPS

    • B. 

      Firewall

    • C. 

      IDS

    • D. 

      Content engine


  • 30. 
    A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?
    • A. 

      RIPv2

    • B. 

      IGRP

    • C. 

      IS-IS

    • D. 

      BGP


  • 31. 
    Which of the following network devices operates on Layer 1 of the OSI model?
    • A. 

      Bridge

    • B. 

      Switch

    • C. 

      Hub

    • D. 

      Router


  • 32. 
    After reconfiguring a server to facilitate DNS requests, which of the following would help provide the highest level of fault tolerance?
    • A. 

      Adding a Kerberos server

    • B. 

      Configuring traffic shaping

    • C. 

      Configuring WEP

    • D. 

      Adding a second NIC


  • 33. 
    Which of the following devices controls traffic on a LAN?
    • A. 

      Switch

    • B. 

      Hub

    • C. 

      Repeater

    • D. 

      Bridge


  • 34. 
    Which of the following network media has the longest maximum segment length?
    • A. 

      CAT6

    • B. 

      Single Mode Fiber

    • C. 

      Coaxial cable

    • D. 

      Multimode Fiber


  • 35. 
    Which of the following are the IEEE designations for the spanning tree protocol? (Select TWO).
    • A. 

      802.1x

    • B. 

      802.1p

    • C. 

      802.1d

    • D. 

      802.1w

    • E. 

      802.1n


  • 36. 
    A network technician is trying to find out the NETBIOS name of another workstation using its IP address, which of the following commands would be used to find this information?
    • A. 

      Nbtstat

    • B. 

      Netstat

    • C. 

      Ipconfig

    • D. 

      Ping


  • 37. 
    Which of the following cable standards is used for Ethernet over fiber?
    • A. 

      1000Base-T

    • B. 

      1000Base-CX

    • C. 

      100Base-TX

    • D. 

      10Base-FL


  • 38. 
    An employee is receiving an access denied error message when they try to access a network resource. Which of the following troubleshooting steps should the technician perform FIRST?
    • A. 

      Identify what the employee cannot access

    • B. 

      Implement an action plan to resolve the issue

    • C. 

      Document the process

    • D. 

      Ask the employee what has changed since yesterday


  • 39. 
    A technician is installing a basic router for a SOHO network. After installing the router the PCs connected to it are not able to acquire an IP address. Which of the following did the technician fail to configure correctly?
    • A. 

      NAT

    • B. 

      DHCP

    • C. 

      WINS

    • D. 

      DNS


  • 40. 
    Internet connectivity for a company is mission critical. The technician must be notified if the Internet router has failed. Which of the following is the BEST method to monitor this device?
    • A. 

      SLIP

    • B. 

      SFTP

    • C. 

      SMTP

    • D. 

      SNMP


  • 41. 
    Which of the following Layer 2 devices is used to connect multiple nodes on a network?
    • A. 

      DHCP server

    • B. 

      Router

    • C. 

      Switch

    • D. 

      Bridge


  • 42. 
    A network technician is responsible for setting up four branch offices for a company. Each office will have 12 hosts, but needs the ability to expand to 16 hosts. Which of the following subnet masks should be chosen?
    • A. 

      255.255.255.224

    • B. 

      255.255.255.248

    • C. 

      255.255.255.16

    • D. 

      255.255.255.240


  • 43. 
    Which of the following is a secure method for file transfer to a network device?
    • A. 

      SNMPv2

    • B. 

      TFTP

    • C. 

      SCP

    • D. 

      FTP


  • 44. 
    Which of the following would accelerate repeated access requests for static web content?
    • A. 

      A caching engine

    • B. 

      A traffic shaper

    • C. 

      A load balancer

    • D. 

      A redundant switch


  • 45. 
    Which of the following tools should be used to physically attach an RJ-45 connector to a CAT5 cable?
    • A. 

      Snips

    • B. 

      Screwdrive

    • C. 

      Punch down tool

    • D. 

      Crimping tool


  • 46. 
    A wireless network is created for six computers. Five connect correctly? one machine sees the wireless network but will not connect. Which of the following should the technician do?
    • A. 

      Ensure the failed computer has the correct WEP key.

    • B. 

      Restart the wireless router

    • C. 

      Remove the WEP key from the router.

    • D. 

      Change the WEP key on the router


  • 47. 
    Which of the following IEEE standards describes the power output of a standard switch port?
    • A. 

      802.3ab

    • B. 

      802.3ae

    • C. 

      802.3af

    • D. 

      802.3aa


  • 48. 
    Which of the following can operate at both layers 2 and 3 of the OSI model?
    • A. 

      Bridge

    • B. 

      Switch

    • C. 

      Repeater

    • D. 

      Hub


  • 49. 
    Which of the following authentication methods allows for domain level authentication on a wireless network?
    • A. 

      WAP

    • B. 

      TKIP

    • C. 

      RADIUS

    • D. 

      WEP


  • 50. 
    Which of the following routing protocol uses a state algorithm?
    • A. 

      BGP

    • B. 

      RIP

    • C. 

      OSPF

    • D. 

      RIPv2


  • 51. 
    The data center power will not be restored for several hours. Which of the following can be implemented in the future to allow the data center to keep running?
    • A. 

      Connect all the switches to a battery backup.

    • B. 

      Connect all the switches to a generator

    • C. 

      Connect the data centers power to a generator

    • D. 

      Connect the data centers power to a UPS


  • 52. 
    Which of the following WAN technology types would MOST likely be used in a SOHO environment with a few network devices?
    • A. 

      Frame relay

    • B. 

      Cable modem

    • C. 

      ATM

    • D. 

      E1/T1


  • 53. 
    Which of the following protocols is used for transmitting email?
    • A. 

      SCP

    • B. 

      SFTP

    • C. 

      SMTP

    • D. 

      SNMP


  • 54. 
    According to the OSI model, which of the following layers is responsible for providing reliable communication?
    • A. 

      Data Link

    • B. 

      Transport

    • C. 

      Network

    • D. 

      Session


  • 55. 
    In a network constructed using star topology, all the devices are connecting to one central device known as the:
    • A. 

      Router

    • B. 

      Repeater

    • C. 

      Hub

    • D. 

      Gateway


  • 56. 
    When would a technician use plenum-rated cable?
    • A. 

      When installing cable in ceilings

    • B. 

      If transmission speeds greater than 100Mbps are required

    • C. 

      When installing cable in damp environments

    • D. 

      Where EMI may be an issue


  • 57. 
    Which of the following is part of the IP protocol suite and is used to monitor network managed devices?
    • A. 

      LDAP

    • B. 

      SMTP

    • C. 

      SNMP

    • D. 

      SMB


  • 58. 
    A user reports that they cannot access any network resources. Which of the following tools would a technician use to troubleshoot the problem?
    • A. 

      Cable tester

    • B. 

      TDR

    • C. 

      Certifier

    • D. 

      Butt set


  • 59. 
    Which of the following wireless technologies uses the 5GHz spectrum?
    • A. 

      802.11n

    • B. 

      801.11g

    • C. 

      802.11b

    • D. 

      802.11a


  • 60. 
    Users at a remote office connected to headquarters are using a dynamic routing protocol. There are several paths to headquarters in the event of a route failure. The network technician has noticed that when a failure occurs there is a time lag of several minutes until service is restored. Which of the following describes the time lag?
    • A. 

      Convergence

    • B. 

      Update algorithm

    • C. 

      Static routing

    • D. 

      Distancevector


  • 61. 
    A user can no longer access the network and all other users are having the same problem. Which of the following should the network administrator do FIRST in order to begin troubleshooting?
    • A. 

      Use the route add command to see if static routes can be added

    • B. 

      Use the ping command to verify connection to the DHCP server

    • C. 

      Use the arp command to verify connections to the network

    • D. 

      Use the rarp command to check network settings.


  • 62. 
    A client calls and reports that the office is unable to access the Internet. The error message displays, When attempting to connect, an error on port 53 has occurred. Which of the following is MOST likely not working?
    • A. 

      HTTPS

    • B. 

      DNS

    • C. 

      HTTP

    • D. 

      FTP


  • 63. 
    A network administrator is informed that a users workstation is unable to connect to the Internet but all other users can. After obtaining all the information about the users workstation, which of the following should be the NEXT step the network administrator should attempt?
    • A. 

      Ping the users workstation to verify network connectivity

    • B. 

      Go to the users workstation and do an ipconfig

    • C. 

      Perform a traceroute to that users workstation

    • D. 

      Replace the NIC in the users workstation


  • 64. 
    Which of the following protocols operates at the transport layer of the OSI model and has BEST effort delivery method?
    • A. 

      UDP

    • B. 

      HTTP

    • C. 

      TCP

    • D. 

      FTP


  • 65. 
    A technician needs to be able to hook three desktop computers to an existing network. There is only one network connection available. Which of the following would the technician use to accomplish this task?
    • A. 

      Modem

    • B. 

      Switch

    • C. 

      Repeater

    • D. 

      Smart jack


  • 66. 
    Which of the following network services is responsible for mapping names to IP addresses?
    • A. 

      IMAP4

    • B. 

      DHCP

    • C. 

      DNS

    • D. 

      Telnet


  • 67. 
    Which of the following are forms of gigabit Ethernet that require the use of fiber optic cables? (Select THREE).
    • A. 

      1000Base-T

    • B. 

      000Base-SX

    • C. 

      1000Base-LX

    • D. 

      10Base-T

    • E. 

      1000Base-CX


  • 68. 
    An administrator has just installed a VoIP system and has noticed during peak times that calls are dropped. Which of the following would an administrator implement to alleviate the problem?
    • A. 

      QoS

    • B. 

      SSL VPN

    • C. 

      Load balancing

    • D. 

      Fault tolerance


  • 69. 
    A corporate network has grown and manual monitoring of the network devices are no longerfeasible. Which of the following would provide central logging for all devices with message priority levels?
    • A. 

      Install a new server with remote terminals open to monitor equipment

    • B. 

      Install a syslog server and configure the network devices to send log messages to it

    • C. 

      Install a SNMP polling server to monitor and collect logs on equipment

    • D. 

      Install a protocol analyzer to monitor traffic logs.


  • 70. 
    An IDS is used for which of the following purpose?
    • A. 

      Controls inbound and outbound connections to prevent unauthorized access to the Internet.

    • B. 

      Controls inbound and outbound connections in a network device by command lines.

    • C. 

      Monitors inbound and outbound network connections in order to identify suspicious activity

    • D. 

      Monitors inbound and outbound network connections in order to prevent suspicious activity


  • 71. 
    Which of the following WAN technologies would a technician find dense wavelength division multiplexing (DWDM)?
    • A. 

      T1

    • B. 

      SONET

    • C. 

      ADSL

    • D. 

      ISDN


  • 72. 
    Everyday around lunch time there is network latency on the Windows proxyserver 10.1.1.7. Which of the following network utilities can a technician run in order to determine the severity of the latency?
    • A. 

      Arp-t 10.1.1.7

    • B. 

      Ping-t 10.1.1.7

    • C. 

      Nbtstat -t 10.1.1.7

    • D. 

      Tracert -t 10.1.1.7


  • 73. 
    A new laptop has been purchased with an 802.11n wireless card. The laptop will not connect to their existing 802.11a network. Which of the following is MOST likely the reason the laptop will not connect?
    • A. 

      The laptop is too far from the existing network

    • B. 

      Interference

    • C. 

      Wrong SSID is being used

    • D. 

      Standard mismatch


  • 74. 
    Which of the following network protocols is used to ensure consistent time across network devices on the domain?
    • A. 

      FTP

    • B. 

      IGMP

    • C. 

      NTP

    • D. 

      RTP


  • 75. 
    An RJ-11 connector is capable of having up to how many pins?
    • A. 

      8

    • B. 

      2

    • C. 

      4

    • D. 

      6


  • 76. 
    If a network administrator is asked to inspect network traffic, which of the following should be used?
    • A. 

      NWLink

    • B. 

      Nbtstat

    • C. 

      Tracert

    • D. 

      Network monitor


  • 77. 
    Which of the following is a demarcation device for T1 circuits with the ability to run diagnostics when remotely activated?
    • A. 

      66 block

    • B. 

      Demarcation extension

    • C. 

      Smart jack

    • D. 

      110 block


  • 78. 
    A technician is setting up a wireless network using WEP and DHCP. The technician has set the channel and SSID on the client workstation. Which of the following is the remaining step to complete the configuration?
    • A. 

      Enter the username and password

    • B. 

      Change the SSID

    • C. 

      Enter an IP address for the client.

    • D. 

      Enter the encryption key.


  • 79. 
    Which of the following masks the IP address of a device from outside the network?
    • A. 

      DHCP

    • B. 

      NAT

    • C. 

      WINS

    • D. 

      DNS


  • 80. 
    A network administrator is troubleshooting a connectivity problem between a PC and a remote site. An ICMP traceroute reveals that after several hops, addresses start repeating and TTLexceeded messages are returned. Which of the following problems is the cause?
    • A. 

      A switching loop

    • B. 

      An ARP problem

    • C. 

      A routing loop

    • D. 

      A DNS problem


  • 81. 
    Which of the following routing protocols is a link state and uses a backbone called area 0?
    • A. 

      IS-IS

    • B. 

      OSPF

    • C. 

      BGP

    • D. 

      EIGRP


  • 82. 
    A DHCP enabled computer on the network has been unplugged from the network for a week. In the mean time, several other computers were added to the network. When plugging the computer back into the network the computer is unable to reach network resources. Which of the following is the MOST likely cause?
    • A. 

      The IP address lease has expired on the DHCP server

    • B. 

      The DHCP scope needs to be redefined

    • C. 

      The DHCP pool limit has been reached

    • D. 

      The DHCP server needs to be restarted.


  • 83. 
    Convert the following binary string to its dotted decimal address: 11000000.10101000.01100011.00011010
    • A. 

      192.168.99.26

    • B. 

      192.168.101.26

    • C. 

      192.168.99.34

    • D. 

      192.168.101.34


  • 84. 
    A DHCP enabled computer on the network is changing IP addresses and the technician wants to have the same IP address assigned for that computer. Which of the following would be implemented?
    • A. 

      The technician needs to add the IP address to the host file

    • B. 

      The technician needs to restart the DHCP services

    • C. 

      The technician needs to add the computer to the reservation list

    • D. 

      The technician needs to add the MAC address to the host file


  • 85. 
    Which of the following is the difference between static and dynamic routing?
    • A. 

      Static routes are added automatically

    • B. 

      Static routing is best used in large scalable networks

    • C. 

      Dynamic routes are added automatically

    • D. 

      Dynamic routing is used by a WINS server.


  • 86. 
    Which of the following tools is used to show the active routes on a workstation?
    • A. 

      Arp ping

    • B. 

      Arp-a

    • C. 

      Netstat -r

    • D. 

      Nbstat


  • 87. 
    While reviewing a firewall policy, a network administrator notices a large block of addresses are denied without comment. Given that the blocked address range is from 224.0.0.0 to 239.255.255.255, which of the following group of addresses does this specify?
    • A. 

      Multicast addresses

    • B. 

      Unused private addresses

    • C. 

      RFC1918 private addresses

    • D. 

      Asia-pacific addresses


  • 88. 
    Which of the following protocols are used in VoIP? (Select TWO).
    • A. 

      RDP

    • B. 

      RTP

    • C. 

      SSH

    • D. 

      SMTP

    • E. 

      SIP


  • 89. 
    Which of the following monitoring software is used to view network traffic at the frame level?
    • A. 

      Connectivity

    • B. 

      Throughput testing

    • C. 

      Packet sniffer

    • D. 

      Load testing


  • 90. 
    Which of the following network component interfaces with a Telco T1 line at the demarcation point?
    • A. 

      ISDN adapter

    • B. 

      Modem

    • C. 

      NIC

    • D. 

      CSU / DSU


  • 91. 
    A trouble ticket has been generated, reporting a workstation has lost network connectivity. Which of the following should be the FIRST course of action taken?
    • A. 

      Check gateway.

    • B. 

      Gather information.

    • C. 

      Escalate the issue.

    • D. 

      Check switches.


  • 92. 
    A technician receives a request to move several established phones? the technician can perform this request at the termination block by moving the wire connection. Which of the following tools is required to reconnect wires to the termination block?
    • A. 

      Cable stripper

    • B. 

      Butt set

    • C. 

      Punch down tool

    • D. 

      Snips


  • 93. 
    Which of the following network topologies would BEST prevent downtime in a WAN environment?
    • A. 

      Ring

    • B. 

      Star

    • C. 

      Bus

    • D. 

      Mesh


  • 94. 
    A computer is not able to connect to the network. The link light on the NIC is not illuminated. Which of the following should the technician do FIRST?
    • A. 

      Reinstall NIC drivers with the most current drivers.

    • B. 

      Verify network cable connectivity

    • C. 

      Replace the NIC card with a known good NIC card

    • D. 

      Check to make sure that the port on the switch is working properly


  • 95. 
    All the workstations at a company have a static IP address. A newly deployed workstation is unable to connect to the company intranet server using an Internet browser. The technician can ping the intranet servers IP address. The MOST likely cause of this is an incorrect
    • A. 

      VLAN

    • B. 

      IP address on the new workstation

    • C. 

      DNS server setting on the client

    • D. 

      Gateway setting on the client


  • 96. 
    Which of the following devices would administer routing in a network?
    • A. 

      Multilayer switch

    • B. 

      Proxy server

    • C. 

      DNS server

    • D. 

      Load balancer


  • 97. 
    During testing, technician notices that a user has been given the wrong IP address from the DHCP server once they connect. Which of the following is the MOST likely problem?
    • A. 

      Incorrect subnet mask

    • B. 

      Incorrect duplex

    • C. 

      Incorrect trunk

    • D. 

      Incorrect VLAN


  • 98. 
    There are two networks sharing the same office space. One network already has an 802.11g access point. The second network acquires one as well. If known, which of the following would help keep the two networks from interfering with each other?
    • A. 

      Encryption type

    • B. 

      Pre-shared key

    • C. 

      Channel

    • D. 

      WEP key


  • 99. 
    Which of the following type of WAN technologies uses cell switching?
    • A. 

      PSTN

    • B. 

      ATM

    • C. 

      T1

    • D. 

      Frame relay


  • 100. 
    Which of the following equipment would allow for routing based on logical addresses?
    • A. 

      Layer 2 hub

    • B. 

      Layer 2 switch

    • C. 

      Layer 1 NIC

    • D. 

      Layer 3 switch


Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.