Answer The Following Questions About Networking Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6820 | Total Attempts: 9,511,256
| Questions: 30
Please wait...
Question 1 / 30
0 %
0/100
Score 0/100
1. Which of the following would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers?

Explanation

The logical network diagram shows information about a network, including VLAN configurations. Baselines, regulations, and wiring schematics do not specifically provide details about VLAN setups.

Submit
Please wait...
About This Quiz
Computer Networking Quizzes & Trivia

Dive into the essentials of computer networking with this focused quiz. Assess your understanding of network structures, communication protocols, and troubleshooting techniques. Ideal for IT professionals and students,... see moreit enhances practical knowledge and prepares for industry certifications. see less

2. Keyword and blacklist filtering would be handled at which level in a network?
Submit
3. To prevent unauthorized network devices from sending traffic across a network, a common technique used is port.

Explanation

Authentication is the process of verifying the identity of a network device or user before allowing them access to the network. This helps prevent unauthorized devices from sending traffic. Spanning, address translation, and mirroring are not directly related to preventing unauthorized devices from sending traffic.

Submit
4. When installing two 802.11g access points in the same building, which of the following channels will MOST likely be used to minimize interference?

Explanation

Wireless routers can broadcast on several different channels, such as 1, 6, and 11, to minimize interference. In the case of two 802.11g access points in the same building, using channels 1 and 6 is the most effective way to minimize interference.

Submit
5. QUESTION NO: 5 Which of the following devices transmits timed broadcasts onto an active network?

Explanation

When a DHCP-configured client connects to a network, it sends a broadcast query to a DHCP server for necessary information such as IP address and configuration parameters. This process does not involve bridges, unmanaged switches, or firewalls.

Submit
6. Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?

Explanation

Electromagnetic interference (EMI) is the most likely cause of the network issue in this scenario as it can disrupt wireless signals. A short or open pair in the cabling may cause connectivity issues, but considering the situation described, EMI from nearby power lines is the primary culprit.

Submit
7. Which of the following describes the location where an administrator would terminate a bundle of CAT5e cables?

Explanation

A patch panel separates the hardwiring of your network from your networking equipment. Each run of cable that goes throughout the house or building is punched down on the back of the patch panel.

Submit
8. Which of the following can be an STP cable?

Explanation

STP cable refers to Shielded Twisted Pair cable, which provides protection against electromagnetic interference. RG-6, RG-59 are coaxial cables, which do not offer the same level of protection. Fiber cables, on the other hand, do not utilize twisted pairs for signal transmission.

Submit
9. Which of the following is used to identify active hosts along with their network addresses?

Explanation

A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers). Ping sweeps are among the older and slower methods used to scan a network.

Submit
10. QUESTION NO: 10 A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?

Explanation

In this scenario, after creating an action plan and solution, the next logical step for the administrator would be to implement and test the solution to ensure that it resolves the intermittent connectivity problems.

Submit
11. A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?

Explanation

Netstat is a command-line tool that displays network connections, routing tables, and network interface statistics. It can help determine the listening port of a web server. Route, Ifconfig, and Nslookup are not typically used for this purpose.

Submit
12. Which of the following utilities can be used to list the routing table?

Explanation

The correct answer is netstat, as the command-line tool netstat lists routing tables. The other options are incorrect as they do not display routing tables.

Submit
13. Which of the following is a multifunction device in a SOHO network?

Explanation

A wireless router in a SOHO (Small Office / Home Office) network serves multiple functions such as routing network traffic, providing wireless connectivity, acting as a firewall, and often including features like DHCP server, NAT, and VPN support. Bandwidth shaper, proxy server, and load balancer are also network devices/services but typically serve more specialized functions compared to the multifunction capabilities of a wireless router in a SOHO setting.

Submit
14. At which of the following layers does the TFTP protocol operate?

Explanation

In TCP/IP, the application layer contains all protocols and methods that fall into the realm of process-to-process communications across an Internet Protocol (IP) network. Application layer methods use the underlying transport layer protocols to establish host-to-host connections. TFTP, which stands for Trivial File Transfer Protocol, operates at the Application Layer (Layer 7) of the OSI Model.

Submit
15. Which of the following is an EGP routing protocol?

Explanation

The Exterior Gateway Protocol (EGP) is a now obsolete routing protocol for the Internet. BGP was created to replace the Exterior Gateway Protocol (EGP) protocol.

Submit
16. Which of the following is used by RADIUS to encrypt messages between the server and the client?

Explanation

A shared secret is a text string that serves as a password between a RADIUS client and RADIUS server.

Submit
17. Which of the following is the name of the routing update process involved when a change occurs in the routing environment?

Explanation

Convergence is part of the routing table update process. When a link fails or changes, updates are sent across the network that describe changes in the network topology. Each router then runs a routing algorithm to recompute routes and build new routing tables based on this information. Once all the routers in the network have updated their routing tables, convergence is complete. Convergence is a dynamic routing process as opposed to static routing. In static routing, an operator programs routes into routers. Static routing is appropriate for small networks or when dedicated links exist between networks.

Submit
18. Which of the following is MOST commonly powered using PoE?

Explanation

Access points are devices commonly powered using PoE as it simplifies installation and reduces the need for separate power sources in areas where power outlets may not be readily available. Routers, switches, and laptops are typically powered using traditional power sources.

Submit
19. Which of the following should an administrator do after running a command from the console on the perimeter router?

Explanation

After making any changes after logging into the router you should always note the changes by updating the configuration logs.

Submit
20. Which of the following features should an administrator configure to allow an IDS to watch the traffic on a switch?

Explanation

Port Mirroring generally indicates the ability to copy the traffic from a single port to a mirror port but disallows any type of bidirectional traffic on the port. Spanning Port usually indicates the ability to copy traffic from all the ports to a single port but also typically disallows bidirectional traffic on the port.

Submit
21. Which of the following utilities would be used to display a NIC's cache of MAC addresses?

Explanation

Address Resolution Protocol (ARP) is used for resolution of network layer addresses into link layer addresses, which is crucial in network communication. While nslookup, dig, and netstat are useful utilities for DNS lookup and network statistics, they do not specifically display a NIC's cache of MAC addresses.

Submit
22. QUESTION NO: 22Which of the following WAN technologies uses a telephone cable?

Explanation

Short for plain old telephone service, which refers to the standard telephone service that most homes use. In contrast, telephone services based on high-speed, digital communications lines, such as ISDN and FDDI, are not POTS. The main distinctions between POTS and non-POTS services are speed and bandwidth. POTS is generally restricted to about 52 Kbps (52,000 bits per second). The POTS network is also called the public switched telephone network (PSTN).

Submit
23. Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?

Explanation

A network bridge connects multiple network segments at the data link layer (Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a device that behaves according to the IEEE 802.1D standard. A bridge and a switch are very much alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is often used interchangeably with bridge.

Submit
24. Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?

Explanation

Intrusion prevention systems are considered extensions of intrusion detection systems because they both monitor network traffic and/or system activities for malicious activity. The main differences are, unlike intrusion detection systems, intrusion prevention systems are placed in-line and are able to actively prevent/block intrusions that are detected. NIPS stands for Network Intrusion Prevention System.

Submit
25. At which of the following layers does the ICMP protocol operate?

Explanation

The ICMP protocol operates at Layer 3 of the OSI model, which is the network layer responsible for packet forwarding and routing.

Submit
26. A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?

Explanation

The most likely cause of the issue is the client being too far from the Access Point (AP), resulting in a weak or intermittent connection. This distance affects the signal strength and speed of the wireless connection.

Submit
27. Which of the following are common VPN transports? (Select TWO)

Explanation

Common VPN transports include Remote Desktop Protocol (RDP) and Secure Socket Layer (SSL). Virtual Network Computing (VNC), Point-to-Point Tunneling Protocol (PPTP), and Remote Access Service (RAS) are not commonly used for VPN connections.

Submit
28. Which of the following interfaces is typically used to connect analog devices to the Internet?

Explanation

POTS (Plain Old Telephone Service) is commonly used to connect analog devices such as telephones to the Internet. The other options are not typically used for connecting analog devices.

Submit
29. Which of the following would contain information regarding network device alerts using SNMP?

Explanation

Syslog is a standard for computer data logging and contains information regarding network device alerts using SNMP. Audit log, History log, and Ping sweep reports do not specifically contain SNMP information.

Submit
30. A network technician arrives to work and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documents should the technician use to attempt to discover the problem?

Explanation

Change management documentation is essential to track any changes made to the network or server environment, including upgrades. This documentation can provide insight into what changes were made, when they were made, and potential issues that arose during the upgrade process.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 4, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 04, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 04, 2025
    Quiz Created by
    Thames
Cancel
  • All
    All (30)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following would help a new administrator quickly...
Keyword and blacklist filtering would be handled at which level in a...
To prevent unauthorized network devices from sending traffic across a...
When installing two 802.11g access points in the same building, which...
QUESTION NO: 5 Which of the following devices transmits timed...
Users are unable to stay connected to the company's wireless network....
Which of the following describes the location where an administrator...
Which of the following can be an STP cable?
Which of the following is used to identify active hosts along with...
QUESTION NO: 10 A section of the building has been having intermittent...
A web server is running correctly but sending a RST packet to any...
Which of the following utilities can be used to list the routing...
Which of the following is a multifunction device in a SOHO network?
At which of the following layers does the TFTP protocol operate?
Which of the following is an EGP routing protocol?
Which of the following is used by RADIUS to encrypt messages between...
Which of the following is the name of the routing update process...
Which of the following is MOST commonly powered using PoE?
Which of the following should an administrator do after running a...
Which of the following features should an administrator configure to...
Which of the following utilities would be used to display a NIC's...
QUESTION NO: 22Which of the following WAN technologies uses a...
Which of the following is an intelligent repeater that is aware of the...
Which of the following security devices would MOST likely be used on a...
At which of the following layers does the ICMP protocol operate?
A user reports sporadic connectivity with their wireless connection. A...
Which of the following are common VPN transports? (Select TWO)
Which of the following interfaces is typically used to connect analog...
Which of the following would contain information regarding network...
A network technician arrives to work and discovers users are having a...
Alert!

Advertisement