Network+ (N10-004) Quiz E

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rich70
R
Rich70
Community Contributor
Quizzes Created: 8 | Total Attempts: 1,964
Questions: 50 | Attempts: 191

SettingsSettingsSettings
Network Quizzes & Trivia

Questions and Answers
  • 1. 

    QUESTION NO: 201 A technician can successfully remote into the company's server? However, the technician cannot connect to any of the other servers directories from the server itself, but can ping them via an IP address. Which of the following could be the problem?

    • A.

      The server is on a different physical network.

    • B.

      DNS is not correctly configured.

    • C.

      The server is on a different VLAN.

    • D.

      DHCP is not correctly configured

    Correct Answer
    B. DNS is not correctly configured.
    Explanation
    The technician is able to remote into the company's server, indicating that the network connection is functioning properly. However, they are unable to connect to any of the other servers directories from the server itself. This suggests that there may be an issue with the server's ability to resolve domain names to IP addresses, which is the function of the DNS (Domain Name System). Therefore, the problem is likely that DNS is not correctly configured.

    Rate this question:

  • 2. 

    QUESTION NO: 202 Which of the following characteristics BEST describe SMF? (Select TWO).

    • A.

      Can be used for distances exceeding 2 kilometers (1.24 miles).

    • B.

      Can be used for distances up to 2 kilometers (1.24 miles).

    • C.

      Uses laser light for transmission.

    • D.

      Uses LED light for transmission.

    • E.

      Costs less than MMF.

    Correct Answer(s)
    A. Can be used for distances exceeding 2 kilometers (1.24 miles).
    C. Uses laser light for transmission.
    Explanation
    SMF, or Single Mode Fiber, is a type of optical fiber that can be used for distances exceeding 2 kilometers (1.24 miles). It uses laser light for transmission, which allows for higher bandwidth and longer transmission distances compared to multimode fiber. SMF is typically more expensive than multimode fiber, but it offers better performance and is commonly used in long-distance telecommunications and data networking applications.

    Rate this question:

  • 3. 

    QUESTION NO: 203 A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network. Which of the following is a probable cause?

    • A.

      Switching loop is occurring on the switch.

    • B.

      Incorrect SNMP settings on the switch.

    • C.

      Wrong subnet mask on the switch.

    • D.

      Port is misconfigured on the switch.

    Correct Answer
    D. Port is misconfigured on the switch.
    Explanation
    A probable cause for the user being unable to connect to the network while all other users on the same switch can connect successfully is that the port on the switch that the user is connected to is misconfigured. This misconfiguration could be causing the port to be disabled or not properly configured to allow the user's device to connect to the network.

    Rate this question:

  • 4. 

    QUESTION NO: 204 Which of the following would be used to connect a vertical cross connect when using data connections?

    • A.

      110 blocks

    • B.

      Demarc extension

    • C.

      Patch panel

    • D.

      66 blocks

    Correct Answer
    C. Patch panel
    Explanation
    A patch panel would be used to connect a vertical cross connect when using data connections. A patch panel is a device that allows multiple data cables to be terminated and connected in a central location. It provides a convenient and organized way to manage and route data connections. Patch panels typically have ports that can be easily connected to and disconnected from, allowing for flexibility and easy maintenance of the network.

    Rate this question:

  • 5. 

    QUESTION NO: 205 Which of the following tools would be used to test the break in a fiber connection on the network?

    • A.

      Butt set

    • B.

      Multimeter

    • C.

      Toner probe

    • D.

      OTDR

    Correct Answer
    D. OTDR
    Explanation
    An OTDR (Optical Time Domain Reflectometer) is used to test the break in a fiber connection on the network. It works by sending a pulse of light into the fiber and measuring the time and strength of the reflections that come back. This allows it to pinpoint the location of any breaks or faults in the fiber connection.

    Rate this question:

  • 6. 

    QUESTION NO: 206 Which of the following network devices would be responsible for translating canonical names into IP addresses?

    • A.

      A router

    • B.

      A DHCP server

    • C.

      A DNS server

    • D.

      A fIrewall

    Correct Answer
    C. A DNS server
    Explanation
    A DNS server is responsible for translating canonical names into IP addresses. It acts as a directory that maps domain names to their corresponding IP addresses, allowing users to access websites and resources on the internet using easy-to-remember domain names instead of complex IP addresses. The DNS server receives requests for domain name resolution and responds with the corresponding IP address, enabling communication between devices on the network.

    Rate this question:

  • 7. 

    QUESTION NO: 207 When all routers in a network agree about the path from one point to another, the network is said to be which of the following?

    • A.

      Static

    • B.

      Converged

    • C.

      Secure

    • D.

      Dynamic

    Correct Answer
    B. Converged
    Explanation
    When all routers in a network agree about the path from one point to another, the network is said to be "converged". This means that all routers have reached a consensus on the best route to take, ensuring efficient and reliable communication between the points in the network.

    Rate this question:

  • 8. 

    QUESTION NO: 208 Which of the following would be used to relocate a Tl closer to the switch for connectivity?

    • A.

      Patch panel

    • B.

      25 pair cable

    • C.

      Demarc extension

    • D.

      Smart jack

    Correct Answer
    D. Smart jack
    Explanation
    A smart jack would be used to relocate a T1 closer to the switch for connectivity. A smart jack is a device that provides a termination point for a T1 line and can be located closer to the switch for improved connectivity. It allows for easy access and troubleshooting of the T1 line.

    Rate this question:

  • 9. 

    QUESTION NO: 209 An organization with 2,500 users has exhausted their Intemet bandwidth. After some investigation, the network administrator discovers that 95% of the traffic is coming from web browsing. Which off the following network devices could be added to BEST reduce the amount of Intemet bandwidth the company is using?

    • A.

      Content switch

    • B.

      Load balancer

    • C.

      Proxy server

    • D.

      An additional DNS server

    Correct Answer
    C. Proxy server
    Explanation
    A proxy server can be added to the network to reduce the amount of Internet bandwidth being used by the organization. A proxy server acts as an intermediary between the users and the Internet, caching web content and serving it to users from the cache instead of fetching it from the Internet every time. This reduces the amount of data that needs to be transferred over the Internet, thus reducing the bandwidth usage. By caching frequently accessed web content, the proxy server can also improve the browsing speed for users.

    Rate this question:

  • 10. 

    QUESTION NO: 210 Which of the following subnet masks will produce the smallest subnet size for a point-to-point network link?

    • A.

      255.255.255.248

    • B.

      255.255.255.128

    • C.

      255.255.255.252

    • D.

      255.255.255.0

    Correct Answer
    C. 255.255.255.252
    Explanation
    The subnet mask 255.255.255.252 will produce the smallest subnet size for a point-to-point network link. This subnet mask allows for only 2 usable IP addresses, which is the minimum required for a point-to-point link. The other subnet masks listed provide larger subnet sizes and more usable IP addresses.

    Rate this question:

  • 11. 

    QUESTION NO: 211 Which of the following documentation would a network administrator refer to discover a rogue WAP?

    • A.

      Wiring schematics

    • B.

      Policies

    • C.

      Baseline

    • D.

      Regulations

    Correct Answer
    C. Baseline
    Explanation
    A network administrator would refer to a baseline documentation to discover a rogue WAP. Baseline documentation typically includes information about the standard configuration and performance of the network. By comparing the baseline with the current state of the network, the administrator can identify any deviations, including the presence of a rogue WAP that is not part of the authorized network infrastructure.

    Rate this question:

  • 12. 

    QUESTION NO: 212 Which of the following Will allow an administrator to restrict communication between network devices?

    • A.

      DHCP

    • B.

      NAT

    • C.

      CIDR

    • D.

      ACL

    Correct Answer
    D. ACL
    Explanation
    ACL stands for Access Control List. It is a security feature that allows an administrator to control and restrict communication between network devices. By using ACLs, the administrator can specify which devices are allowed to communicate with each other and which devices are not. This helps in enhancing the security of the network by preventing unauthorized access and controlling the flow of network traffic. DHCP, NAT, and CIDR are not directly related to restricting communication between network devices.

    Rate this question:

  • 13. 

    QUESTION NO: 213 For an enterprise to use one of the reserved private IP address ranges, as best practice they should coordinate with:

    • A.

      Their IT department.

    • B.

      IANA.

    • C.

      IEEE

    • D.

      Their legal department.

    Correct Answer
    A. Their IT department.
    Explanation
    When an enterprise wants to use one of the reserved private IP address ranges, it is best practice for them to coordinate with their IT department. The IT department is responsible for managing the network infrastructure and ensuring that the IP address ranges are properly assigned and utilized within the organization. They have the technical knowledge and expertise to handle IP address allocation and can ensure that there are no conflicts or issues with the existing network. Coordinating with the IT department also helps in maintaining proper documentation and tracking of IP address usage within the organization.

    Rate this question:

  • 14. 

    QUESTION NO: 214 Which of the following is the maximum transmission distance of l0GBase-LR?

    • A.

      6 miles (9.7 kilometers)

    • B.

      25 miles (40 kilometers)

    • C.

      512 miles (824 kilometers)

    • D.

      1,024 miles (1 648 kilometers)

    Correct Answer
    A. 6 miles (9.7 kilometers)
    Explanation
    The maximum transmission distance of l0GBase-LR is 6 miles (9.7 kilometers).

    Rate this question:

  • 15. 

    QUESTION NO: 215 A company has many traveling sales employees that need secure access to corporate resources from non-trusted devices (e.g. computers at client sites and/or public computers). Which VPN solution is MOST appropriate for this company?

    • A.

      SSL

    • B.

      PPTP

    • C.

      IPSec

    • D.

      L2TP

    Correct Answer
    A. SSL
    Explanation
    SSL (Secure Sockets Layer) is the most appropriate VPN solution for a company with traveling sales employees who need secure access to corporate resources from non-trusted devices. SSL VPN allows users to establish a secure connection to the corporate network through a web browser, without the need for additional software or client configuration. This makes it ideal for accessing resources from public computers or client sites where installing VPN client software may not be feasible or allowed. SSL VPNs also provide strong encryption and authentication, ensuring the security of the connection and protecting sensitive corporate data.

    Rate this question:

  • 16. 

    QUESTION NO: 216 Which of the following commands would provide the following output? DNS request timed out. timeout was 2 seconds. *** Cant find server name for address 172.30.0.5: Timed out *** Default servers are not available Server: UnKnown Address: 172.30.0.5 DNS request timed out. timeout was 2 seconds. *** Request to UnKnown timed-out

    • A.

      Winipcfg

    • B.

      Nslookup

    • C.

      Ipconfig

    • D.

      Netstat

    Correct Answer
    B. Nslookup
    Explanation
    The correct answer is nslookup because the output provided is typical of the nslookup command. Nslookup is a command-line tool used for querying the Domain Name System (DNS) to obtain domain name or IP address information. The output shown indicates that a DNS request timed out, the default servers are not available, and it provides information about the server being used for the lookup.

    Rate this question:

  • 17. 

    QUESTION NO: 217 A technician is troubleshooting a switch and has identified the symptoms. Which of the following steps should the technician take NEXT?

    • A.

      Escalate the issue.

    • B.

      Determine the scope of the problem.

    • C.

      Implement and test the solution on the switch.

    • D.

      Create an action plan for reconfiguring the switch.

    Correct Answer
    B. Determine the scope of the problem.
    Explanation
    The technician should determine the scope of the problem next because this will help in understanding the extent of the issue and what areas are affected. By determining the scope, the technician can narrow down the possible causes and determine the appropriate solution. This step is crucial in troubleshooting as it provides a clear understanding of the problem before moving forward with implementing and testing the solution.

    Rate this question:

  • 18. 

    QUESTION NO: 218 Which of the following transfers data at a maximum rate of 44. 7Mbps?

    • A.

      T3

    • B.

      T2

    • C.

      T5

    • D.

      T1

    Correct Answer
    A. T3
    Explanation
    T3 is the correct answer because it is a high-speed digital transmission line that can transfer data at a maximum rate of 44.7Mbps. T2, T5, and T1 are not capable of transferring data at this speed.

    Rate this question:

  • 19. 

    QUESTION NO: 219 A technician is asked to re-terminate a wall jack that has become loose. Upon looking at the wiring, the technician notices that it was Originally wired as 568A. The company implemented a policy stating that all cable terminations should adhere to the 568B standard. With this in mind the technician should:

    • A.

      Re-terminate both ends of the cable to the 568B standard.

    • B.

      Run a new cable and terminate both ends to the 568B standard.

    • C.

      Re-terminate the non-loose end of the cable to the 568B standard.

    • D.

      Re-terminate the loose end of the cable to the 568B standard.

    Correct Answer
    A. Re-terminate both ends of the cable to the 568B standard.
    Explanation
    The technician should re-terminate both ends of the cable to the 568B standard because the company implemented a policy stating that all cable terminations should adhere to the 568B standard. This means that both ends of the cable should be re-terminated to ensure compliance with the company's policy.

    Rate this question:

  • 20. 

    QUESTION NO: 220 When using the ping utility, which switch pings a network device until stopped?

    • A.

      Ping-t

    • B.

      Ping-s 3

    • C.

      Ping-a

    • D.

      Ping-r 3

    Correct Answer
    A. Ping-t
    Explanation
    The correct answer is "ping -t". This switch is used with the ping utility to continuously ping a network device until it is manually stopped. It is commonly used to test the stability and connectivity of a network device or to troubleshoot network issues.

    Rate this question:

  • 21. 

    QUESTION NO: 221 Which of the following cables would a technician make in order to identify a physical interface problem?

    • A.

      Serial

    • B.

      Rollover

    • C.

      Console

    • D.

      Loopback

    Correct Answer
    D. Loopback
    Explanation
    A technician would use a loopback cable to identify a physical interface problem. A loopback cable is a special type of cable that connects a device back to itself, allowing the technician to test the integrity of the device's interface. By using a loopback cable, the technician can determine if the problem lies within the physical interface of the device, rather than with external factors such as cables or network connections.

    Rate this question:

  • 22. 

    QUESTION NO: 222 A client is able to ping its default gateway, but is unable to communicate with a remote host. Which of the following utilities would the technician use to determine where the fault is?

    • A.

      Arp

    • B.

      Ping-t

    • C.

      Traceroute

    • D.

      Nbstat

    Correct Answer
    C. Traceroute
    Explanation
    The technician would use the traceroute utility to determine where the fault is. Traceroute is a network diagnostic tool that shows the path a packet takes from the client to the remote host, highlighting each hop along the way. By examining the output of traceroute, the technician can identify any network devices or connections that may be causing the communication issue between the client and the remote host.

    Rate this question:

  • 23. 

    QUESTION NO: 223 Which of the following is an example of secure tunneling?

    • A.

      PPPoE

    • B.

      SSL VPN

    • C.

      PPP

    • D.

      PAP

    Correct Answer
    B. SSL VPN
    Explanation
    SSL VPN is an example of secure tunneling because it allows for secure remote access to a private network by encrypting the data transmitted between the user's device and the network. This ensures that the data remains confidential and protected from unauthorized access or interception. SSL VPN uses the SSL/TLS protocol to establish a secure connection, providing authentication and encryption to ensure the privacy and integrity of the data being transmitted.

    Rate this question:

  • 24. 

    QUESTION NO: 224 Which of the following cable types is used in a l00Base-FX network?

    • A.

      UTP

    • B.

      Coaxial

    • C.

      STP

    • D.

      Fiber

    Correct Answer
    D. Fiber
    Explanation
    Fiber optic cables are used in a 100Base-FX network. Fiber optic cables use light to transmit data, allowing for faster and more reliable communication compared to other cable types such as UTP, coaxial, and STP. Fiber optic cables are also capable of transmitting data over longer distances without signal degradation.

    Rate this question:

  • 25. 

    QUESTION NO: 225 A technician receives a call on monday morning that several computers will not connect to the network. The technician determines that the computers left on over the weekend are functional and those that were turned off over the weekend are not functioning. Which of the following is the MOST likely source of the problem?

    • A.

      WINS needs to be restarted.

    • B.

      DNS is not functioning.

    • C.

      LDAP is not functioning.

    • D.

      DHCP is not functioning.

    Correct Answer
    D. DHCP is not functioning.
    Explanation
    The most likely source of the problem is that DHCP is not functioning. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to computers on a network. If DHCP is not functioning, the computers that were turned off over the weekend would not have been able to obtain an IP address, resulting in their inability to connect to the network. The fact that the computers left on over the weekend are functional suggests that the network itself is functioning properly, but the issue lies with the DHCP server.

    Rate this question:

  • 26. 

    QUESTION NO: 226 To forward traffic from a host with the IP address of 10.0.0.100/25 to l0.0.0.200/25 which of the following devices will be required?

    • A.

      A router

    • B.

      A layer 2 switch

    • C.

      A hub

    • D.

      A DNS server

    Correct Answer
    A. A router
    Explanation
    To forward traffic from one network to another network, a router is required. A router is a networking device that connects multiple networks together and forwards data packets between them. In this scenario, the host with the IP address of 10.0.0.100/25 needs to communicate with the host at 10.0.0.200/25, which are on different networks. Therefore, a router is needed to route the traffic between these two networks. A layer 2 switch, a hub, and a DNS server do not have the capability to perform this routing function.

    Rate this question:

  • 27. 

    QUESTION NO: 227 Which of the following technologies do the 802.11 networks utilize to prevent packet collisions?

    • A.

      FDDI

    • B.

      CSMA/CD

    • C.

      Token ring

    • D.

      CSMA/CA

    Correct Answer
    D. CSMA/CA
    Explanation
    802.11 networks utilize the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) technology to prevent packet collisions. CSMA/CA is a protocol that allows devices to check the wireless medium for other transmissions before sending data. If the medium is clear, the device can transmit its data. If the medium is busy, the device waits for a random amount of time before attempting to transmit again. This helps to avoid collisions and ensures efficient use of the wireless network.

    Rate this question:

  • 28. 

    QUESTION NO: 228 Which of the following protocols uses port 22 by default?

    • A.

      FTP

    • B.

      DNS

    • C.

      Telnet

    • D.

      SSH

    Correct Answer
    D. SSH
    Explanation
    SSH (Secure Shell) is the correct answer because it is a network protocol that provides a secure way to access and manage remote devices. It uses port 22 by default for communication between the client and the server. FTP (File Transfer Protocol) uses port 21, DNS (Domain Name System) uses port 53, and Telnet uses port 23 for communication.

    Rate this question:

  • 29. 

    QUESTION NO: 229 Which of the following protocols permits secure polling of network devices?

    • A.

      SNMPv2

    • B.

      SCP

    • C.

      SNMPv3

    • D.

      SSH

    Correct Answer
    C. SNMPv3
    Explanation
    SNMPv3 is the correct answer because it is an updated version of SNMP (Simple Network Management Protocol) that includes security features. SNMPv3 provides authentication and encryption, allowing for secure polling of network devices. This ensures that the data transmitted between the devices and the management system is protected from unauthorized access and tampering. SCP (Secure Copy Protocol) and SSH (Secure Shell) are also secure protocols, but they are not specifically designed for polling network devices like SNMPv3. SNMPv2, on the other hand, lacks the security features provided by SNMPv3.

    Rate this question:

  • 30. 

    QUESTION NO: 230 Which of the following commands is used to provide the output below in a Windows environment? 1 *** Request timed out. 2 *** Request timed out. 3 *** Request timed out.

    • A.

      Nbtstat

    • B.

      Netstat

    • C.

      Tracert

    • D.

      Ping

    Correct Answer
    C. Tracert
    Explanation
    The correct answer is "tracert". Tracert is a command used in Windows environment to trace the route that packets take to reach a destination. It provides the output shown in the question, which includes the number of timed out requests along the route.

    Rate this question:

  • 31. 

    QUESTION NO: 231 Which of the following traffic types would a network layer firewall be unable to filter?

    • A.

      SMTP traffic

    • B.

      HTTP traffic

    • C.

      ICMP messages

    • D.

      Email sender verification

    Correct Answer
    D. Email sender verification
    Explanation
    A network layer firewall is unable to filter email sender verification because it operates at the network layer of the OSI model, which primarily focuses on filtering based on IP addresses, ports, and protocols. Email sender verification involves checking the authenticity of the sender's email address, which requires application layer inspection and processing. Therefore, a network layer firewall lacks the capability to analyze the content of email messages and perform sender verification.

    Rate this question:

  • 32. 

    QUESTION NO: 232 Which of the following protocols would a multilayer switch use to learn the IP address of a directly connected device?

    • A.

      ARP

    • B.

      BOOTP

    • C.

      DNS

    • D.

      DHCP

    Correct Answer
    A. ARP
    Explanation
    A multilayer switch would use the Address Resolution Protocol (ARP) to learn the IP address of a directly connected device. ARP is used to map an IP address to a MAC address in order to facilitate communication between devices on a local network. By sending out an ARP request, the switch can determine the MAC address of the device and associate it with its IP address. This information is then used to forward network traffic to the correct destination.

    Rate this question:

  • 33. 

    QUESTION NO: 233 Two servers and five workstations are connected using a lOOBASE-T network. Which of the following physical topologies is used?

    • A.

      FDDI

    • B.

      Bus

    • C.

      Ring

    • D.

      Star

    Correct Answer
    D. Star
    Explanation
    The correct answer is "Star". In a star topology, all devices are connected to a central hub or switch. In this case, the two servers and five workstations are connected to a central hub or switch using a lOOBASE-T network. This topology allows for easy management and troubleshooting, as each device has its own connection to the central hub. It also provides better performance and scalability compared to other topologies like bus or ring.

    Rate this question:

  • 34. 

    QUESTION NO: 234 A company's network is wired in a bus topology and one of the computers is unable to access the network. Which of the following is the FIRST step in the troubleshooting process?

    • A.

      Reinstall the NIC driver.

    • B.

      Replace the cable.

    • C.

      Check the cable connections.

    • D.

      Replace the NIC

    Correct Answer
    C. Check the cable connections.
    Explanation
    The first step in the troubleshooting process for a computer unable to access the network in a bus topology is to check the cable connections. This is because a loose or disconnected cable could be causing the issue, and it is a simple and easy step to take before moving on to more complex troubleshooting steps such as reinstalling the NIC driver or replacing the cable or NIC. By checking the cable connections, it can be determined if there is a physical issue with the connection that needs to be addressed.

    Rate this question:

  • 35. 

    QUESTION NO: 235 Which of the following network segments is located outside the firewall?

    • A.

      SPAP

    • B.

      VPN

    • C.

      DMZ

    • D.

      PPTP

    Correct Answer
    C. DMZ
    Explanation
    A DMZ (Demilitarized Zone) is a network segment that is located outside the firewall. It is a separate network that sits between the internal network and the external network (usually the internet). The purpose of a DMZ is to provide an additional layer of security by placing servers or services that need to be accessed from the internet in this separate network segment. This helps to protect the internal network from potential attacks or compromises.

    Rate this question:

  • 36. 

    QUESTION NO: 236 To support roaming across a wireless 802.11g network, each access point should be configured to use which of the following?

    • A.

      The same channel

    • B.

      The same frequency

    • C.

      The same SSID

    • D.

      CSMA/CD

    Correct Answer
    C. The same SSID
    Explanation
    To support roaming across a wireless 802.11g network, each access point should be configured to use the same SSID. The SSID (Service Set Identifier) is a unique identifier that allows devices to connect to a specific wireless network. By configuring all access points with the same SSID, devices can seamlessly roam between access points without losing connectivity. This ensures a smooth and uninterrupted wireless experience for users as they move throughout the network coverage area.

    Rate this question:

  • 37. 

    QUESTION NO: 237 Which of the following would a technician use a punch down tool on?

    • A.

      RJ-45 connector

    • B.

      ST connector

    • C.

      110 block

    • D.

      Smart jack

    Correct Answer
    C. 110 block
    Explanation
    A technician would use a punch down tool on a 110 block. A 110 block is a type of punch down block used in telecommunications and networking to terminate and connect wires. The punch down tool is used to insert the wires into the appropriate slots on the 110 block, ensuring a secure and reliable connection.

    Rate this question:

  • 38. 

    QUESTION NO: 238 Two small companies sharing a switch would MOST likely benefit from which of the following advanced switch features?

    • A.

      Spanning tree

    • B.

      Trunking

    • C.

      PoE

    • D.

      VLAN

    Correct Answer
    D. VLAN
    Explanation
    Two small companies sharing a switch would most likely benefit from VLAN (Virtual Local Area Network) because it allows them to segment their network into multiple virtual networks, providing increased security and efficiency. Each company can have its own VLAN, ensuring that their network traffic is isolated from each other. VLANs also allow for easier management and troubleshooting of the network, as changes and updates can be made to specific VLANs without affecting the entire network.

    Rate this question:

  • 39. 

    QUESTION NO: 239 Which of the following is the maximum speed available from a full T1 line?

    • A.

      1.544Mbps

    • B.

      5.23Mbps

    • C.

      765Kpbs

    • D.

      10.73Mbps

    Correct Answer
    A. 1.544Mbps
    Explanation
    A full T1 line has a maximum speed of 1.544Mbps.

    Rate this question:

  • 40. 

    QUESTION NO: 240 A technician is connecting two buildings located approximately 1969 feet (600 meters) apart on the same campus. Primary objectives are to create a secure link that that is capable of transmitting at 1Gbps. Which of the following would be the BEST way to connect these two buildings?

    • A.

      Fiber optic cable

    • B.

      Point-ta-point wireless link

    • C.

      CAT6 cable

    • D.

      RG-58 cable

    Correct Answer
    A. Fiber optic cable
    Explanation
    Fiber optic cable would be the best way to connect the two buildings located 1969 feet apart on the same campus. Fiber optic cables are capable of transmitting data at high speeds, such as 1Gbps, and they provide a secure and reliable connection. They are also immune to electromagnetic interference and have a higher bandwidth capacity compared to other types of cables like CAT6 or RG-58. Therefore, using fiber optic cable would ensure a fast and secure link between the two buildings.

    Rate this question:

  • 41. 

    QUESTION NO: 241 An Ethernet LAN has several trunk links passing near heavy machinery resulting in EMI. Which of the following Ethernet media types should be used to avoid interference?

    • A.

      I0Base5

    • B.

      I00Base-T

    • C.

      I0Base2

    • D.

      I00Base-FX

    Correct Answer
    D. I00Base-FX
    Explanation
    I00Base-FX should be used to avoid interference in an Ethernet LAN that has trunk links passing near heavy machinery resulting in EMI. I00Base-FX uses fiber optic cables, which are immune to electromagnetic interference. This makes it a suitable choice for environments with high levels of EMI, such as areas near heavy machinery. I0Base5 and I0Base2 use coaxial cables, which are more susceptible to EMI. I00Base-T uses twisted-pair copper cables, which can also be affected by EMI.

    Rate this question:

  • 42. 

    QUESTION NO: 242 Which of the following software types would BEST be used for identifying an attack?

    • A.

      IDS

    • B.

      IPS

    • C.

      Packet sniffer

    • D.

      Port scanner

    Correct Answer
    A. IDS
    Explanation
    An IDS (Intrusion Detection System) is a software type that is specifically designed to identify and monitor for potential attacks or unauthorized access attempts on a network. It analyzes network traffic and system logs to detect any suspicious or malicious activity and alerts the system administrator. Unlike a packet sniffer, which simply captures and analyzes network packets, an IDS is proactive in identifying and responding to potential threats. Similarly, an IPS (Intrusion Prevention System) is also designed to identify and prevent attacks, but it actively blocks or mitigates the threats instead of just alerting the administrator. A port scanner, on the other hand, is used to identify open ports on a network, but it does not have the capability to detect attacks.

    Rate this question:

  • 43. 

    QUESTION NO: 243 A packet sniffer has been placed on a network and shows client A is sending TCP SYN packets to server B. Which of the following packets should be sent from server B in response?

    • A.

      SYN-NAK

    • B.

      SYN-ACK

    • C.

      ACK

    • D.

      NAK

    Correct Answer
    B. SYN-ACK
    Explanation
    When a client sends a TCP SYN packet to a server, it is initiating a connection request. In response to this, the server should send a SYN-ACK packet. This packet confirms the receipt of the client's SYN packet and also includes a SYN flag to establish a connection. The client will then respond with an ACK packet to acknowledge the server's SYN-ACK packet, completing the three-way handshake process and establishing a TCP connection between the client and the server.

    Rate this question:

  • 44. 

    QUESTION NO: 244 Which of the following Ethemet technologies has the shortest transmission distance?

    • A.

      I0Base-T

    • B.

      I0GBase-T

    • C.

      I00Base-T

    • D.

      I0GBase-SR

    Correct Answer
    B. I0GBase-T
    Explanation
    The correct answer is I0GBase-T. I0GBase-T is an Ethernet technology that supports data transmission at a rate of 10 gigabits per second (Gbps) over twisted-pair copper cables. However, it has a shorter transmission distance compared to other Ethernet technologies like I0GBase-SR, which supports transmission over fiber optic cables.

    Rate this question:

  • 45. 

    QUESTION NO: 245 A network technician is implementing new wireless access points in an existing wireless infrastructure. The security is the WPA 2 standard. Which of the following encryption methods may not be compatible with the previously installed access points?

    • A.

      TKIP

    • B.

      3DES

    • C.

      AES

    • D.

      CHAP

    Correct Answer
    C. AES
    Explanation
    AES (Advanced Encryption Standard) is a symmetric encryption method that is commonly used in wireless networks. It provides a high level of security and is compatible with most wireless access points. TKIP (Temporal Key Integrity Protocol) is an older encryption method that is not as secure as AES and may not be compatible with newer access points. 3DES (Triple Data Encryption Standard) is a symmetric encryption algorithm that is also compatible with most access points. CHAP (Challenge-Handshake Authentication Protocol) is an authentication protocol and is not directly related to encryption compatibility.

    Rate this question:

  • 46. 

    QUESTION NO: 246 In a Class C subnet, a network ID may occupy a maximum of:

    • A.

      24bits.

    • B.

      16bits.

    • C.

      31 bits.

    • D.

      32bits.

    Correct Answer
    A. 24bits.
    Explanation
    In a Class C subnet, the network ID may occupy a maximum of 24 bits. This is because a Class C subnet uses a default subnet mask of 255.255.255.0, which means that the first 24 bits are reserved for the network ID and the remaining 8 bits are used for host addresses. This allows for a maximum of 2^24 or 16,777,216 possible network IDs in a Class C subnet.

    Rate this question:

  • 47. 

    QUESTION NO: 247 A 100 pair cable is typically used to connect:

    • A.

      Telephony distribution.

    • B.

      Computer labs with more than 20 computers.

    • C.

      Security cameras.

    • D.

      Businesses with more than 75 computers.

    Correct Answer
    A. Telephony distribution.
    Explanation
    A 100 pair cable is typically used to connect telephony distribution. This type of cable is designed to handle a large number of telephone lines, which is necessary for telephony distribution. It is not typically used for connecting computer labs with more than 20 computers, security cameras, or businesses with more than 75 computers.

    Rate this question:

  • 48. 

    QUESTION NO: 248 Which of the following utilities will produce the results printed below? TCP Celrts03 : 1072 172.3 1.0.78:3389 Established

    • A.

      Netstat

    • B.

      Arp

    • C.

      Ping

    • D.

      TraceIi

    Correct Answer
    A. Netstat
    Explanation
    The correct answer is netstat. Netstat is a utility that displays active network connections and listening ports on a computer. It provides information about the protocol used, local and remote IP addresses, and the status of the connection. In this case, netstat would display the TCP connection established with the destination IP address 1.0.78:3389.

    Rate this question:

  • 49. 

    QUESTION NO: 249 A technician is asked to place wireless Internet access in an open warehouse environment. After installing the equipment the technician notices varying signal strengths at different locations. Which of the following should the technician consider to increase the consistency of the signal strength?

    • A.

      Enable traffic shaping.

    • B.

      Change the antenna placement.

    • C.

      Change the encryption method.

    • D.

      Broadcast the SSID.

    Correct Answer
    B. Change the antenna placement.
    Explanation
    To increase the consistency of the signal strength in an open warehouse environment, the technician should consider changing the antenna placement. By adjusting the position and orientation of the antennas, the technician can optimize the signal coverage and minimize signal interference or dead zones. This can help ensure a more consistent and reliable wireless Internet access throughout the warehouse.

    Rate this question:

  • 50. 

    QUESTION NO: 250 Which of the following actions should the administrator do FIRST to help access a gigabit connection?

    • A.

      Change the CAT5 cable to a CAT3 cable.

    • B.

      Change the CAT3 cable to RG-58 cable.

    • C.

      Change the CAT5 cable to a CAT6 cable.

    • D.

      Change the CAT5 cable to a CAT5 Crossover cable.

    Correct Answer
    C. Change the CAT5 cable to a CAT6 cable.
    Explanation
    The administrator should change the CAT5 cable to a CAT6 cable in order to help access a gigabit connection. CAT6 cables are designed to support higher data transfer speeds and have better performance compared to CAT5 cables. Upgrading to a CAT6 cable will ensure that the network can handle the increased bandwidth required for a gigabit connection.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 20, 2010
    Quiz Created by
    Rich70
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.