Network Certification Quiz | IT Prep Test

  • 11th Grade,
  • 12th Grade
  • IEEE
  • ISO/IEC
  • CompTIA
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 8156 | Total Attempts: 9,588,805
| Attempts: 16 | Questions: 30 | Updated: Jan 27, 2026
Please wait...
Question 1 / 31
🏆 Rank #--
Score 0/100

1. Which of the following would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers?

Explanation

The logical network diagram shows information about a network, including VLAN configurations. Baselines, regulations, and wiring schematics do not specifically provide details about VLAN setups.

Submit
Please wait...
About This Quiz
Network Fundamentals Quizzes & Trivia

Challenge your knowledge with this skull anatomy exam quiz focused on cranial bones. This skull bones quiz covers frontal, parietal, temporal, sphenoid, ethmoid, occipital and sutures through cranial bones test MCQs. Perfect for medical students preparing for anatomy skull practice or skull labeling exam.

It includes foramina, landmarks and clinical relevance... see morewith detailed explanations. Strengthen identification and understanding of protective structures. Interactive format provides instant feedback to build confidence. Ideal for anatomy courses or board preparation. Start this quiz today and master skull anatomy exam! see less

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. To prevent unauthorized network devices from sending traffic across a network, a common technique used is port.

Explanation

Authentication is the process of verifying the identity of a network device or user before allowing them access to the network. This helps prevent unauthorized devices from sending traffic. Spanning, address translation, and mirroring are not directly related to preventing unauthorized devices from sending traffic.

Submit

3. When installing two 802.11g access points in the same building, which of the following channels will MOST likely be used to minimize interference?

Explanation

Wireless routers can broadcast on several different channels, such as 1, 6, and 11, to minimize interference. In the case of two 802.11g access points in the same building, using channels 1 and 6 is the most effective way to minimize interference.

Submit

4. Which of the following is the MOST likely cause of the network issue?

Explanation

Electromagnetic interference (EMI) is the most likely cause of the network issue in this scenario as it can disrupt wireless signals. A short or open pair in the cabling may cause connectivity issues, but considering the situation described, EMI from nearby power lines is the primary culprit.

Submit

5. Which of the following describes the location where an administrator would terminate a bundle of CAT5e cables?

Explanation

A patch panel separates the hardwiring of your network from your networking equipment. Each run of cable that goes throughout the house or building is punched down on the back of the patch panel.

Submit

6. Which of the following can be an STP cable?

Explanation

STP cable refers to Shielded Twisted Pair cable, which provides protection against electromagnetic interference. RG-6, RG-59 are coaxial cables, which do not offer the same level of protection. Fiber cables, on the other hand, do not utilize twisted pairs for signal transmission.

Submit

7. Which of the following is used to identify active hosts along with their network addresses?

Explanation

A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers). Ping sweeps are among the older and slower methods used to scan a network.

Submit

8. A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?

Explanation

Netstat is a command-line tool that displays network connections, routing tables, and network interface statistics. It can help determine the listening port of a web server. Route, Ifconfig, and Nslookup are not typically used for this purpose.

Submit

9. Which of the following is a multifunction device in a SOHO network?

Explanation

A wireless router in a SOHO (Small Office / Home Office) network serves multiple functions such as routing network traffic, providing wireless connectivity, acting as a firewall, and often including features like DHCP server, NAT, and VPN support. Bandwidth shaper, proxy server, and load balancer are also network devices/services but typically serve more specialized functions compared to the multifunction capabilities of a wireless router in a SOHO setting.

Submit

10. Which of the following is an EGP routing protocol?

Explanation

The Exterior Gateway Protocol (EGP) is a now obsolete routing protocol for the Internet. BGP was created to replace the Exterior Gateway Protocol (EGP) protocol.

Submit

11. Which of the following is the name of the routing update process involved when a change occurs in the routing environment?

Explanation

Convergence is part of the routing table update process. When a link fails or changes, updates are sent across the network that describe changes in the network topology. Each router then runs a routing algorithm to recompute routes and build new routing tables based on this information. Once all the routers in the network have updated their routing tables, convergence is complete. Convergence is a dynamic routing process as opposed to static routing. In static routing, an operator programs routes into routers. Static routing is appropriate for small networks or when dedicated links exist between networks.

Submit

12. Which of the following is MOST commonly powered using PoE?

Explanation

Access points are devices commonly powered using PoE as it simplifies installation and reduces the need for separate power sources in areas where power outlets may not be readily available. Routers, switches, and laptops are typically powered using traditional power sources.

Submit

13. Which of the following features should an administrator configure to allow an IDS to watch the traffic on a switch?

Explanation

Port Mirroring generally indicates the ability to copy the traffic from a single port to a mirror port but disallows any type of bidirectional traffic on the port. Spanning Port usually indicates the ability to copy traffic from all the ports to a single port but also typically disallows bidirectional traffic on the port.

Submit

14. Which of the following utilities would be used to display a NIC's cache of MAC addresses?

Explanation

Address Resolution Protocol (ARP) is used for resolution of network layer addresses into link layer addresses, which is crucial in network communication. While nslookup, dig, and netstat are useful utilities for DNS lookup and network statistics, they do not specifically display a NIC's cache of MAC addresses.

Submit

15. Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?

Explanation

A network bridge connects multiple network segments at the data link layer (Layer 2) of the OSI model. In Ethernet networks, the term bridge formally means a device that behaves according to the IEEE 802.1D standard. A bridge and a switch are very much alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is often used interchangeably with bridge.

Submit

16. Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?

Explanation

Intrusion prevention systems are considered extensions of intrusion detection systems because they both monitor network traffic and/or system activities for malicious activity. The main differences are, unlike intrusion detection systems, intrusion prevention systems are placed in-line and are able to actively prevent/block intrusions that are detected. NIPS stands for Network Intrusion Prevention System.

Submit

17. At which of the following layers does the ICMP protocol operate?

Explanation

The ICMP protocol operates at Layer 3 of the OSI model, which is the network layer responsible for packet forwarding and routing.

Submit

18. A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?

Explanation

The most likely cause of the issue is the client being too far from the Access Point (AP), resulting in a weak or intermittent connection. This distance affects the signal strength and speed of the wireless connection.

Submit

19. Which of the following would contain information regarding network device alerts using SNMP?

Explanation

Syslog is a standard for computer data logging and contains information regarding network device alerts using SNMP. Audit log, History log, and Ping sweep reports do not specifically contain SNMP information.

Submit

20. Keyword and blacklist filtering would be handled at which level in a network?

Submit

21. Which of the following steps would an administrator perform next?

Explanation

In this scenario, after creating an action plan and solution, the next logical step for the administrator would be to implement and test the solution to ensure that it resolves the intermittent connectivity problems.

Submit

22. Which of the following utilities can be used to list the routing table?

Explanation

The correct answer is netstat, as the command-line tool netstat lists routing tables. The other options are incorrect as they do not display routing tables.

Submit

23. At which of the following layers does the TFTP protocol operate?

Explanation

In TCP/IP, the application layer contains all protocols and methods that fall into the realm of process-to-process communications across an Internet Protocol (IP) network. Application layer methods use the underlying transport layer protocols to establish host-to-host connections. TFTP, which stands for Trivial File Transfer Protocol, operates at the Application Layer (Layer 7) of the OSI Model.

Submit

24. Which of the following is used by RADIUS to encrypt messages between the server and the client?

Explanation

A shared secret is a text string that serves as a password between a RADIUS client and RADIUS server.

Submit

25. Which of the following WAN technologies uses a telephone cable?

Explanation

Short for plain old telephone service, which refers to the standard telephone service that most homes use. In contrast, telephone services based on high-speed, digital communications lines, such as ISDN and FDDI, are not POTS. The main distinctions between POTS and non-POTS services are speed and bandwidth. POTS is generally restricted to about 52 Kbps (52,000 bits per second). The POTS network is also called the public switched telephone network (PSTN).

Submit

26. Which of the following interfaces is typically used to connect analog devices to the Internet?

Explanation

POTS (Plain Old Telephone Service) is commonly used to connect analog devices such as telephones to the Internet. The other options are not typically used for connecting analog devices.

Submit

27. Which of the following documents should the technician use to attempt to discover the problem?

Explanation

Change management documentation is essential to track any changes made to the network or server environment, including upgrades. This documentation can provide insight into what changes were made, when they were made, and potential issues that arose during the upgrade process.

Submit

28. Which of the following are common VPN transports?

Explanation

Common VPN transports include Remote Desktop Protocol (RDP) and Secure Socket Layer (SSL). Virtual Network Computing (VNC), Point-to-Point Tunneling Protocol (PPTP), and Remote Access Service (RAS) are not commonly used for VPN connections.

Submit

29. Which of the following devices transmits timed broadcasts onto an active network?

Explanation

When a DHCP-configured client connects to a network, it sends a broadcast query to a DHCP server for necessary information such as IP address and configuration parameters. This process does not involve bridges, unmanaged switches, or firewalls.

Submit

30. Which of the following should an administrator do after running a command from the console on the perimeter router?

Explanation

After making any changes after logging into the router you should always note the changes by updating the configuration logs.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (30)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following would help a new administrator quickly...
To prevent unauthorized network devices from sending traffic across a...
When installing two 802.11g access points in the same building, which...
Which of the following is the MOST likely cause of the network issue?
Which of the following describes the location where an administrator...
Which of the following can be an STP cable?
Which of the following is used to identify active hosts along with...
A web server is running correctly but sending a RST packet to any...
Which of the following is a multifunction device in a SOHO network?
Which of the following is an EGP routing protocol?
Which of the following is the name of the routing update process...
Which of the following is MOST commonly powered using PoE?
Which of the following features should an administrator configure to...
Which of the following utilities would be used to display a NIC's...
Which of the following is an intelligent repeater that is aware of the...
Which of the following security devices would MOST likely be used on a...
At which of the following layers does the ICMP protocol operate?
A user reports sporadic connectivity with their wireless connection. A...
Which of the following would contain information regarding network...
Keyword and blacklist filtering would be handled at which level in a...
Which of the following steps would an administrator perform next?
Which of the following utilities can be used to list the routing...
At which of the following layers does the TFTP protocol operate?
Which of the following is used by RADIUS to encrypt messages between...
Which of the following WAN technologies uses a telephone cable?
Which of the following interfaces is typically used to connect analog...
Which of the following documents should the technician use to attempt...
Which of the following are common VPN transports?
Which of the following devices transmits timed broadcasts onto an...
Which of the following should an administrator do after running a...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!