MTA Networking Fundamentals (Exam 98-366) Part 1

Approved & Edited by ProProfs Editorial Team
At ProProfs Quizzes, our dedicated in-house team of experts takes pride in their work. With a sharp eye for detail, they meticulously review each quiz. This ensures that every quiz, taken by over 100 million users, meets our standards of accuracy, clarity, and engagement.
Learn about Our Editorial Process
| Written by Firezer
F
Firezer
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,623
Questions: 76 | Attempts: 535

SettingsSettingsSettings
Networking Quizzes & Trivia

Questions and Answers
  • 1. 

    What is an example of a Layer 3 device that connects multiple computers and networks?

    • A. 

      Packet

    • B. 

      Repeater

    • C. 

       Switch

    • D. 

      Router

    Correct Answer
    A. Packet
  • 2. 

    If a router cannot determine the next hop for a packet, the router will:

    • A. 

      Forward the packet to the default route.

    • B. 

      Send the packet back to the packet's source.

    • C. 

      Broadcast the packet.

    • D. 

      Store the packet in the memory buffer.

    Correct Answer
    A. Forward the packet to the default route.
    Explanation
    When a router cannot determine the next hop for a packet, it means that it does not have a specific route in its routing table for that packet's destination. In this case, the router will forward the packet to the default route. The default route is a pre-configured route that the router uses when it doesn't have a specific route for a destination. By forwarding the packet to the default route, the router ensures that the packet is not dropped and has a chance to reach its intended destination.

    Rate this question:

  • 3. 

    You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters. An interference exists along the path of each drop. You need to ensure that interference is reduced. Which cable type should you use?

    • A. 

      STP Cat5e

    • B. 

      UTPCat5e

    • C. 

      Cat3

    • D. 

      UTPCat6

    Correct Answer
    A. STP Cat5e
    Explanation
    STP Cat5e should be used because it is a shielded twisted pair cable that provides protection against interference. The shielding helps to reduce the impact of external electromagnetic interference, ensuring a more reliable and stable network connection over longer distances. This makes it the ideal choice for running Ethernet network drops in an environment where interference is present along the path.

    Rate this question:

  • 4. 

    One purpose of a perimeter network is to:

    • A. 

      Make resources available to the intranet.

    • B. 

      Link campus area networks (CANs).

    • C. 

      Link local area networks (LANs).

    • D. 

      Make resources available to the Internet.

    Correct Answer
    D. Make resources available to the Internet.
    Explanation
    A perimeter network, also known as a DMZ (demilitarized zone), is designed to provide a secure buffer zone between an organization's internal network (intranet) and the external public network (Internet). It allows the organization to make certain resources, such as web servers, email servers, or application servers, accessible to the Internet while protecting the internal network from direct exposure to potential threats. By placing these resources in the perimeter network, organizations can control and monitor incoming and outgoing traffic, ensuring that only authorized access is granted and minimizing the risk of unauthorized access to their internal network.

    Rate this question:

  • 5. 

    The protocol that maps IP addresses to a Media Access Control (MAC) address is:

    • A. 

      Internet Message Access Protocol (IMAP).

    • B. 

      Dynamic Host Configuration Protocol (DHCP).

    • C. 

      Routing Information Protocol (RIP).

    • D. 

      User Datagram Protocol (UDP).

    • E. 

      Address Resolution Protocol (ARP).

    Correct Answer
    E. Address Resolution Protocol (ARP).
    Explanation
    ARP is the protocol that maps IP addresses to MAC addresses. It is used to find the MAC address of a device on the same network when only its IP address is known. By sending an ARP request, the device can obtain the MAC address from the ARP table or by broadcasting the request to all devices on the network. Once the MAC address is obtained, it can be used to establish a direct communication link between devices. IMAP, DHCP, RIP, and UDP are all different protocols used for other purposes in computer networks.

    Rate this question:

  • 6. 

    Ou are home for vacation, and a family member wants your help to purchase and install network cable for a home office. The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement?

    • A. 

      Cat3

    • B. 

      CAT5

    • C. 

      Cat5e

    • D. 

      Cat6

    Correct Answer
    C. Cat5e
    Explanation
    Cat5e is the least expensive option that meets the requirement of supporting at least 300 Mbps. Cat3 and CAT5 are older and slower versions of Ethernet cables, while Cat6 is a higher performance and more expensive option. Cat5e provides a good balance between cost and performance, making it the most suitable choice in this scenario.

    Rate this question:

  • 7. 

    You work at a coffee shop. Your supervisor asks you to help set up a computer network. The network needs to have the following items: ? A public facing web server ? A Wi-Fi network for customers ? A private network for the point of sale terminals ? An office PC ? A file/print server ? A network printer You need to set up a perimeter network to protect the network. Which two items should you include in the perimeter network? (Choose two.)

    • A. 

      Network printer

    • B. 

      Web server

    • C. 

      File server

    • D. 

      Wi-Fi network

    • E. 

      Point of sale terminals

    Correct Answer(s)
    A. Network printer
    B. Web server
    Explanation
    The network printer and web server should be included in the perimeter network because they are public-facing items that need to be accessible from the internet. Placing them in the perimeter network helps to protect the internal network by creating a barrier between the internet and the internal devices. This ensures that any potential threats or attacks are isolated and do not directly impact the internal network.

    Rate this question:

  • 8. 

    What are three advantages of VLANs? (Choose three.)

    • A. 

      They can logically address packets by using IP.

    • B. 

      They require a router to connect to VLANs on another switch.

    • C. 

      They compartmentalize a network and isolate traffic.

    • D. 

      They are efficient because a single switch can implement only a single VLAN.

    • E. 

      They act as though they are on the same LAN regardless of physical location.

    Correct Answer(s)
    C. They compartmentalize a network and isolate traffic.
    D. They are efficient because a single switch can implement only a single VLAN.
    E. They act as though they are on the same LAN regardless of physical location.
    Explanation
    VLANs have several advantages. Firstly, they compartmentalize a network and isolate traffic, which enhances security and reduces the risk of unauthorized access. Secondly, they are efficient as a single switch can implement multiple VLANs, allowing for better network management and resource allocation. Lastly, VLANs act as though they are on the same LAN regardless of physical location, enabling seamless communication and connectivity between devices in different locations.

    Rate this question:

  • 9. 

    Which of the following uses pointer records and A records?ou like?

    • A. 

      IDS

    • B. 

      DNS Server

    • C. 

      NAT Server

    • D. 

      IPS

    Correct Answer
    B. DNS Server
    Explanation
    A DNS Server uses pointer records and A records. A pointer record (PTR) is used to map an IP address to a hostname, while an A record is used to map a hostname to an IP address. This allows the DNS server to translate domain names into IP addresses and vice versa, enabling the proper routing of network traffic on the internet.

    Rate this question:

  • 10. 

    Which of these addresses is a multicast address?

    • A. 

      127.0.0.1

    • B. 

      169.254.0.1

    • C. 

      192.168.0.1

    • D. 

      224.0.0.1

    Correct Answer
    D. 224.0.0.1
    Explanation
    224.0.0.1 is a multicast address. In IP networking, multicast addresses are used to send data packets to a group of hosts rather than a single host. The range of multicast addresses is from 224.0.0.0 to 239.255.255.255. 224.0.0.1 is a special multicast address known as the "all-hosts" multicast group, which is used to send packets to all hosts on a network segment.

    Rate this question:

  • 11. 

    What is the bit rate for a North American T3 circuit?

    • A. 

      6.312 Mbit/s

    • B. 

      44.736 Mbit/s

    • C. 

      274.176 Mbit/s

    • D. 

      400.352 Mbit/s

    Correct Answer
    B. 44.736 Mbit/s
    Explanation
    A North American T3 circuit has a bit rate of 44.736 Mbit/s.

    Rate this question:

  • 12. 

    Which of the following is a public IP address?

    • A. 

      10.156.89.1

    • B. 

      68.24.78.221

    • C. 

      172.16.152.48

    • D. 

      192.168.25.101

    Correct Answer
    B. 68.24.78.221
    Explanation
    The IP address 68.24.78.221 is a public IP address because it falls within the range of IP addresses that are assigned to devices connected to the internet. Public IP addresses are unique and can be accessed from anywhere on the internet. The other three IP addresses (10.156.89.1, 172.16.152.48, and 192.168.25.101) are private IP addresses, which are used for internal networks and cannot be directly accessed from the internet.

    Rate this question:

  • 13. 

    Which metric does Routing Information Protocol (RJP) use to determine the least costly route?

    • A. 

      Delay

    • B. 

      Host ID

    • C. 

      Hop count

    • D. 

      Interface

    Correct Answer
    A. Delay
    Explanation
    The metric used by Routing Information Protocol (RIP) to determine the least costly route is Delay. Delay refers to the amount of time it takes for a packet to travel from the source to the destination. RIP uses this metric to calculate the total delay along a particular route and chooses the route with the least delay as the preferred route. By selecting the route with the lowest delay, RIP aims to minimize the time it takes for packets to reach their destination, ensuring efficient and effective routing.

    Rate this question:

  • 14. 

    What is a similarity between Layer 2 and Layer 3 switches?

    • A. 

      Both provide a high level of security to the network.

    • B. 

      Both use logical addressing to forward transmissions.

    • C. 

      Both forward packets onto the network.

    • D. 

      Both allow the implementation of VLANs.

    Correct Answer
    C. Both forward packets onto the network.
    Explanation
    Both Layer 2 and Layer 3 switches forward packets onto the network. Layer 2 switches operate at the Data Link layer of the OSI model and forward packets based on MAC addresses, while Layer 3 switches operate at the Network layer and forward packets based on IP addresses. Regardless of the layer they operate on, both switches are responsible for forwarding packets to their intended destinations.

    Rate this question:

  • 15. 

    What are two characteristics of fiber optic cable? (Choose two.)

    • A. 

      Conducts electricity

    • B. 

      Requires metal conduit

    • C. 

      Supports splicing

    • D. 

      Requires a polish for end connectors

    Correct Answer(s)
    A. Conducts electricity
    C. Supports splicing
    Explanation
    Fiber optic cables do not conduct electricity as they use light to transmit data instead. However, they do support splicing, which is the process of joining two fiber optic cables together.

    Rate this question:

  • 16. 

    VPNs are implemented to provide:

    • A. 

       A secure connection within a private network.

    • B. 

      A secure connection through public networks.

    • C. 

      Additional encryption by using IPSec.

    • D. 

      Additional security for selected computers.

    Correct Answer
    B. A secure connection through public networks.
    Explanation
    VPNs are implemented to provide a secure connection through public networks. This is because public networks, such as the internet, are inherently insecure and can be susceptible to eavesdropping and data theft. By using a VPN, all data transmitted between the user's device and the destination server is encrypted, ensuring that it cannot be intercepted or accessed by unauthorized individuals. This allows users to safely access private network resources or browse the internet while maintaining their privacy and security.

    Rate this question:

  • 17. 

    What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point?

    • A. 

      The access point will transmit, but the node will be unable to receive.

    • B. 

      A connection will be established,

    • C. 

      Both the node and the access point will be unable to transmit.

    • D. 

      The node will transmit, but the access point will be unable to receive.

    Correct Answer
    B. A connection will be established,
    Explanation
    When an 802.11b node starts broadcasting within the range of an 802.llg access point, a connection will be established. This means that the node and the access point will be able to communicate with each other. The access point will transmit data to the node, and the node will be able to receive it. Similarly, the node will also be able to transmit data to the access point, and the access point will be able to receive it. This allows for communication between the node and the access point, establishing a connection between them.

    Rate this question:

  • 18. 

    This question requires that you evaluate the underlined text to determine if it is correct. According to the OSI model, encryption takes place on the transport layer. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

    • A. 

      Presentation

    • B. 

      Network

    • C. 

      Application

    • D. 

      No change is needed

    Correct Answer
    A. Presentation
    Explanation
    According to the OSI model, encryption takes place on the Presentation layer.

    Rate this question:

  • 19. 

    Connecting to a private network address from a public network requires:

    • A. 

      Network address translation (NAT).

    • B. 

      Dynamic Host Configuration Protocol (DHCP).

    • C. 

      Network Access Protection (NAP).

    • D. 

      Dynamic domain name system (DDNS).

    Correct Answer
    A. Network address translation (NAT).
    Explanation
    When connecting to a private network address from a public network, Network Address Translation (NAT) is required. NAT is a method that allows multiple devices on a private network to share a single public IP address. It translates the private IP addresses of devices on the private network into a single public IP address that can be recognized and communicated with on the public network. This enables communication between devices on the private network and the public network, ensuring secure and efficient connectivity.

    Rate this question:

  • 20. 

    What type of record does DNS use to find a mail service?

    • A. 

      Service (SRV) DNS record

    • B. 

      Canonical (CNAME) DNS record

    • C. 

      Mail Exchanger (MX) DNS record

    • D. 

      Host (A) DNS record

    Correct Answer
    C. Mail Exchanger (MX) DNS record
    Explanation
    DNS uses the Mail Exchanger (MX) DNS record to find a mail service. This record specifies the mail server responsible for accepting incoming email messages on behalf of a domain. When someone sends an email to a specific domain, the MX record is used to determine which mail server should receive the email. The MX record contains the hostname of the mail server and its priority, allowing multiple mail servers to be designated for redundancy or load balancing purposes.

    Rate this question:

  • 21. 

    In local area network (LAN) topologies, the primary media access methods are: (Choose two.)

    • A. 

      Contention

    • B. 

      Negotiation

    • C. 

      Kerberos

    • D. 

      Token passing

    Correct Answer(s)
    A. Contention
    D. Token passing
    Explanation
    In local area network (LAN) topologies, contention is a primary media access method where devices compete for access to the network by transmitting data whenever the network is available. Token passing is another primary media access method where a token is passed between devices, allowing them to take turns transmitting data. Both contention and token passing are commonly used in LANs to regulate access to the network and ensure fair transmission of data.

    Rate this question:

  • 22. 

    What are two differences between switches and hubs? (Choose two.)

    • A. 

      Switches are slower than hubs because of the extra addressing functions that switches perform.

    • B. 

      Switches send data to all of the computers that are connected to them for efficiency.

    • C. 

       Switches are capable of sending and receiving data at the same time.

    • D. 

       Switches identify the intended destination of the data that they receive.

    Correct Answer(s)
    B. Switches send data to all of the computers that are connected to them for efficiency.
    C.  Switches are capable of sending and receiving data at the same time.
    Explanation
    Switches send data to all of the computers that are connected to them for efficiency because they use a technique called "packet switching" to transmit data only to the intended recipient, reducing network congestion. Switches are also capable of sending and receiving data at the same time, which improves network performance and allows for simultaneous communication between devices.

    Rate this question:

  • 23. 

    This question requires that you evaluate the underlined text to determine if it is correct. Every router today is TCP/IP enabled, which is an industry-standard protocol that you use on the Internet and for local addressing. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

    • A. 

      HTTP

    • B. 

      FTP

    • C. 

      SNMP

    • D. 

      No change is needed

    Correct Answer
    D. No change is needed
    Explanation
    The underlined text correctly states that every router today is TCP/IP enabled, which is an industry-standard protocol used for both the Internet and local addressing. No change is needed because the underlined text makes the statement correct.

    Rate this question:

  • 24. 

    Which feature of Category 5e STP cable reduces external interference?

    • A. 

      Crosstalk

    • B. 

      Shielding

    • C. 

      Length

    • D. 

      Twisting

    Correct Answer
    C. Length
  • 25. 

    How many bits are there in an Internet Protocol version 6 (IPv6) address?

    • A. 

      32

    • B. 

      64

    • C. 

      128

    • D. 

      256

    Correct Answer
    C. 128
    Explanation
    An Internet Protocol version 6 (IPv6) address consists of 128 bits. IPv6 was developed to address the limitations of IPv4, which had a limited number of available addresses. The increased number of bits in IPv6 allows for a significantly larger address space, ensuring that there are enough unique addresses to accommodate the growing number of devices connected to the internet.

    Rate this question:

  • 26. 

    A Layer 2 device that connects multiple computers within a network is a:

    • A. 

       Repeater

    • B. 

      Switch

    • C. 

      Router

    • D. 

      Packet

    Correct Answer
    B. Switch
    Explanation
    A switch is a Layer 2 device that connects multiple computers within a network. It operates by receiving data packets, examining the destination MAC address, and forwarding the packets only to the appropriate port where the destination device is connected. This allows for efficient communication and prevents unnecessary traffic on the network. Switches are commonly used in local area networks (LANs) to provide fast and reliable connections between devices.

    Rate this question:

  • 27. 

    In addition to switching, multilayer switches also:

    • A. 

      Provide Layer 3 routing functions.

    • B. 

      Interface with CAT3, CATS, CAT5e, and fiber optics.

    • C. 

      Support 10 MB, 100 MB, and 1 GB local area network (LAN) ports.

    • D. 

      Operate by using only Layer 1 and 2 protocols.

    Correct Answer
    A. Provide Layer 3 routing functions.
    Explanation
    Multilayer switches are capable of providing Layer 3 routing functions, which means they can route traffic between different networks based on IP addresses. This allows them to make intelligent forwarding decisions based on network layer information. The other options mentioned in the question, such as interfacing with different types of cables and supporting different LAN port speeds, are also features of multilayer switches, but the most significant capability that sets them apart from regular switches is their ability to perform Layer 3 routing.

    Rate this question:

  • 28. 

    Which one do This question requires that you evaluate the underlined text to determine if it is correct. In a wireless network that requires an SSL certificate, WEP handles the SSL certificate. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.you like?

    • A. 

      802.1X

    • B. 

      WPA2-PSK

    • C. 

      WPA-PSK

    • D. 

      No change is needed

    Correct Answer
    A. 802.1X
  • 29. 

    Which of these cable types transmits data the greatest distance?

    • A. 

      Multi-mode fiber

    • B. 

       Single-mode fiber

    • C. 

      Cat5e

    • D. 

      Cat6

    Correct Answer
    B.  Single-mode fiber
    Explanation
    Single-mode fiber transmits data the greatest distance compared to the other cable types listed. This is because single-mode fiber has a smaller core size and uses a single beam of light to transmit data, allowing for less signal loss and higher bandwidth. In contrast, multi-mode fiber has a larger core size and uses multiple beams of light, resulting in more signal dispersion and limited distance. Cat5e and Cat6 cables are copper-based and have even shorter distance limitations compared to fiber optics.

    Rate this question:

  • 30. 

    What is the maximum cable length for a single Cat5 UTP cable run?

    • A. 

      285 feet/86.87 meters

    • B. 

      328 feet/99.97 meters

    • C. 

      432 feet/131.67 meters

    • D. 

      600 feet/182.88 meters

    Correct Answer
    B. 328 feet/99.97 meters
    Explanation
    The correct answer is 328 feet/99.97 meters. This is the maximum cable length for a single Cat5 UTP cable run. This length is determined by the limitations of the cable's signal strength and quality. Going beyond this length can result in signal degradation and loss of data transmission.

    Rate this question:

  • 31. 

    The default gateway address identifies the:

    • A. 

       Device that will connect the computer to the local network.

    • B. 

      Device that will connect the computer to a remote network.

    • C. 

      Server that will provide name services for the computer.

    • D. 

      Server that will authenticate the user of the computer.

    Correct Answer
    B. Device that will connect the computer to a remote network.
    Explanation
    The default gateway address identifies the device that will connect the computer to a remote network. This device acts as an intermediary between the computer and the remote network, allowing the computer to send and receive data to and from devices on that network. The default gateway is responsible for routing the network traffic between the computer and the remote network, enabling the computer to access resources and services on the remote network.

    Rate this question:

  • 32. 

    Which of the following are features of DHCP? (Choose two.)

    • A. 

      IP address resolution to canonical names

    • B. 

      Secure shell connections

    • C. 

      Address reservation

    • D. 

      Network file transfer

    • E. 

       IP address exclusion

    Correct Answer(s)
    A. IP address resolution to canonical names
    C. Address reservation
    E.  IP address exclusion
    Explanation
    DHCP, or Dynamic Host Configuration Protocol, is responsible for automatically assigning IP addresses to devices on a network. It simplifies network administration by eliminating the need for manual IP address configuration. Two features of DHCP are IP address resolution to canonical names, which allows devices to be identified by their hostnames rather than IP addresses, and address reservation, which assigns a specific IP address to a device based on its MAC address. IP address exclusion is another feature that allows certain IP addresses to be excluded from the DHCP pool, ensuring they are not assigned to any device.

    Rate this question:

  • 33. 

    Which command is used to verify that a server is connected to the network?

    • A. 

       IPCONFIG

    • B. 

      ROUTE

    • C. 

      PING

    • D. 

      CHECK

    Correct Answer
    C. PING
    Explanation
    The PING command is used to verify that a server is connected to the network. It sends a small packet of data to the server and waits for a response. If the server is connected and functioning properly, it will respond to the PING request. This command is commonly used to troubleshoot network connectivity issues and to check if a server is reachable over the network.

    Rate this question:

  • 34. 

    In which physical network topology is each computer connected to a central point?

    • A. 

      2.4 GHz.

    • B. 

      54 GHz.

    • C. 

      2.4 Mbps

    • D. 

      54 Mbps

    Correct Answer
    D. 54 Mbps
    Explanation
    The correct answer is 54 Mbps. This answer refers to the data transfer rate, not the physical network topology. The question is incomplete and does not provide any information about the physical network topology options. Therefore, an explanation for the correct answer cannot be provided.

    Rate this question:

  • 35. 

    In which physical network topology is each computer connected to a central point?

    • A. 

      Star

    • B. 

      Mesh

    • C. 

      Ring

    • D. 

      Bus

    Correct Answer
    A. Star
    Explanation
    In a star network topology, each computer is connected to a central point, typically a switch or hub. This central point acts as a communication hub, allowing all the computers in the network to send and receive data. This type of topology is commonly used in local area networks (LANs) as it provides a centralized and efficient way of managing network connections.

    Rate this question:

  • 36. 

    This question requires that you evaluate the underlined text to determine if it is correct. WEP wireless encryption is the most susceptible to interception and decryption. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct

    • A. 

      WPA-AES

    • B. 

      WPA2

    • C. 

      WPA-PSK

    • D. 

      No change is needed

    Correct Answer
    D. No change is needed
    Explanation
    The underlined text states that "WEP wireless encryption is the most susceptible to interception and decryption." This statement is correct because WEP (Wired Equivalent Privacy) is known to be the least secure encryption protocol for wireless networks. It has several vulnerabilities that make it relatively easy for attackers to intercept and decrypt the data being transmitted. Therefore, no change is needed in the underlined text.

    Rate this question:

  • 37. 

    This question requires that you evaluate the underlined text to determine if it is correct. When a client computer is unable to reach a DHCP server, it will automatically assign an IP address in the 10.0.0.0 -10.0.0.255 range. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

    • A. 

      127.0.0.0-127.0.0.255

    • B. 

      169.254.0.0-169.254.255.255

    • C. 

      192168.100.0 -192.168.100.255

    • D. 

      No change is needed

    Correct Answer
    B. 169.254.0.0-169.254.255.255
    Explanation
    When a client computer is unable to reach a DHCP server, it will automatically assign an IP address in the 169.254.0.0-169.254.255.255 range.

    Rate this question:

  • 38. 

    The type of connector used on a 100BaseT Ethernet cable is:

    • A. 

      RJ-11

    • B. 

      RJ-45.

    • C. 

      TNC.

    • D. 

      BNC.

    Correct Answer
    B. RJ-45.
    Explanation
    The correct answer is RJ-45. RJ-45 is the type of connector used on a 100BaseT Ethernet cable. RJ-45 connectors have 8 pins and are commonly used for Ethernet networking, including for 100BaseT connections. RJ-11 connectors, on the other hand, have 6 pins and are typically used for telephone connections. TNC and BNC connectors are used for different types of coaxial cables and are not commonly used for Ethernet connections.

    Rate this question:

  • 39. 

    At what layer in the OSI model are hardware addresses referenced?

    • A. 

      Network

    • B. 

      Application

    • C. 

      Data link

    • D. 

      Physical

    Correct Answer
    C. Data link
    Explanation
    Hardware addresses, also known as MAC addresses, are referenced at the data link layer of the OSI model. This layer is responsible for the reliable transmission of data between two directly connected nodes on a network. It defines the format of the data being transmitted and handles error detection and correction. The data link layer uses hardware addresses to uniquely identify devices on a local network, allowing for the proper delivery of data packets.

    Rate this question:

  • 40. 

    What are two characteristics of a mesh network topology? (Choose two.)

    • A. 

      It is fault tolerant because of redundant connections.

    • B. 

      Every node connects to every other node on the network.

    • C. 

      It works best for networks with a large number of nodes.

    • D. 

      It requires less cabling than either a star or ring topology.

    Correct Answer(s)
    A. It is fault tolerant because of redundant connections.
    C. It works best for networks with a large number of nodes.
    Explanation
    A mesh network topology is characterized by its fault tolerance due to redundant connections. This means that if one connection fails, there are alternative paths for data to flow, ensuring the network remains operational. Additionally, a mesh network works best for networks with a large number of nodes because every node connects to every other node. This allows for efficient communication and distribution of data across the network.

    Rate this question:

  • 41. 

    To protect a network when it is connected to the Internet, you should use a:

    • A. 

      Bridge

    • B. 

      Firewall

    • C. 

      Switch

    • D. 

      Router

    Correct Answer
    B. Firewall
    Explanation
    A firewall is used to protect a network when it is connected to the Internet. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access, blocks malicious traffic, and safeguards the network from potential threats and attacks. A firewall is an essential security measure to ensure the safety and integrity of a network when connected to the Internet.

    Rate this question:

  • 42. 

    This question requires that you evaluate the underlined text to determine if it is correct. The NTP value in a resource record indicates a length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.

    • A. 

      TTL

    • B. 

      GPS

    • C. 

      SOA RR

    • D. 

      No change is needed

    Correct Answer
    A. TTL
    Explanation
    The underlined text, "The NTP value," should be changed to "TTL" to make the statement correct. TTL stands for Time to Live and it indicates the length of time that other DNS servers should cache information for a record before expiring and discarding it. NTP, on the other hand, stands for Network Time Protocol and is used for synchronizing the time on computer systems.

    Rate this question:

  • 43. 

    This question requires that you evaluate the underlined text to determine if it is correct. The loopback address of your computer is 127.0.0.1. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

    • A. 

      10.0.1.1

    • B. 

      169.254.0.5

    • C. 

      192168.1.1

    • D. 

      No change is needed

    Correct Answer
    D. No change is needed
    Explanation
    The loopback address of a computer is indeed 127.0.0.1, so no change is needed.

    Rate this question:

  • 44. 

    A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97. You need to restore access to network resources.

    • A. 

      Flush the cache on the DNS server.

    • B. 

       Reset the user's password on the server.

    • C. 

      Check your router's current routing tables.

    • D. 

       Verify that the DHCP service is available.

    Correct Answer
    D.  Verify that the DHCP service is available.
    Explanation
    The correct answer is to verify that the DHCP service is available. The IP address 169.254.48.97 is an Automatic Private IP Address (APIPA) which is assigned when a device is unable to obtain an IP address from a DHCP server. This suggests that the user's computer is not receiving a valid IP address from the DHCP server. By verifying the availability of the DHCP service, any issues with the server can be identified and resolved, allowing the user to obtain a valid IP address and restore access to network resources.

    Rate this question:

  • 45. 

    This question requires that you evaluate the underlined text to determine if it is correct. The process of replicating a zone file to multiple DNS servers is called zone replication, Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

    • A. 

      Zone transfer

    • B. 

      Zone synchronization

    • C. 

      Start of authority

    • D. 

      No change is needed

    Correct Answer
    A. Zone transfer
    Explanation
    The underlined text "Zone transfer" makes the statement correct. Zone transfer refers to the process of replicating a zone file to multiple DNS servers, which aligns with the given statement. Therefore, no change is needed.

    Rate this question:

  • 46. 

    Which protocol can be used to encrypt packets on the Internet?

    • A. 

      SNMP

    • B. 

      HTTPS

    • C. 

      TFTP

    • D. 

       HTTP

    Correct Answer
    B. HTTPS
    Explanation
    HTTPS (Hypertext Transfer Protocol Secure) is the correct answer because it is a protocol that provides secure communication over a computer network. It uses encryption to protect the data transmitted between a web browser and a website, ensuring that the packets cannot be intercepted or tampered with by unauthorized parties. This is particularly important for sensitive information such as passwords, credit card numbers, and personal data, as it prevents potential attackers from accessing or manipulating the data while it is in transit.

    Rate this question:

  • 47. 

    A computer that has an IP address of 169.254.0.1 cannot access the network. Which of the following services should you confirm is available?

    • A. 

      WINS

    • B. 

      DNS

    • C. 

      DHCP

    • D. 

      TFTP

    Correct Answer
    C. DHCP
    Explanation
    If a computer with an IP address of 169.254.0.1 cannot access the network, it suggests that it is not receiving a valid IP address from a DHCP server. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. Therefore, to confirm network access, you should ensure that the DHCP service is available and functioning properly.

    Rate this question:

  • 48. 

    The service that resolves fully qualified domain names (FQDN) to IP addresses is:

    • A. 

      Windows Internet Name Service (WINS).

    • B. 

      Domain Name Service (DNS).

    • C. 

      Internet Service Provider (ISP).

    • D. 

      Address Resolution Protocol (ARP).

    Correct Answer
    B. Domain Name Service (DNS).
    Explanation
    The correct answer is Domain Name Service (DNS). DNS is responsible for resolving fully qualified domain names (FQDN) to IP addresses. It translates human-readable domain names into IP addresses that computers can understand and use to communicate with each other on the internet. DNS plays a crucial role in ensuring that users can access websites and other online resources by translating the domain names they enter into the corresponding IP addresses.

    Rate this question:

  • 49. 

    Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.)

    • A. 

      Establishing network speed parameters

    • B. 

      Verifying the client's patch level

    • C. 

      Negotiating algorithms to use

    • D. 

      Exchanging key information

    Correct Answer(s)
    A. Establishing network speed parameters
    B. Verifying the client's patch level
    Explanation
    IKE, or Internet Key Exchange, is a protocol used for establishing secure communication channels in IPsec VPNs. It is responsible for negotiating and establishing the security parameters and algorithms to be used for encryption and authentication. It also facilitates the exchange of key information between the communicating parties. However, IKE is not responsible for establishing network speed parameters or verifying the client's patch level. These functions are typically handled by other protocols or mechanisms.

    Rate this question:

  • 50. 

    What happens when an 802.11a node broadcasts within the range of an 802.11g access point?

    • A. 

      The access point transmits, but the node is unable to receive.

    • B. 

      A connection occurs.

    • C. 

      Both the node and the access point are unable to transmit.

    • D. 

      The node transmits, but the access point is unable to receive.

    Correct Answer
    C. Both the node and the access point are unable to transmit.
    Explanation
    When an 802.11a node broadcasts within the range of an 802.11g access point, both the node and the access point are unable to transmit. This is because 802.11a and 802.11g operate on different frequency bands and are not compatible with each other. The 802.11g access point will not be able to understand the signals sent by the 802.11a node, and vice versa. As a result, both the node and the access point will be unable to establish a connection and transmit data.

    Rate this question:

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.