CISCO Quiz 5.1 V2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Michal
M
Michal
Community Contributor
Quizzes Created: 1 | Total Attempts: 330
| Attempts: 330
SettingsSettings
Please wait...
Please wait...
About This Quiz

CISCO QUIZ 5.1 V2 tests knowledge on data link layer functions, communication tools, network device roles, router operations, and port numbers.

CISCO Quiz 5.1 V2 - Quiz

Quiz Preview

  • 2. 

    98. Launch PT – Hide and Save PT. Open the PT activity. Perform the tasks in the activity instructions and then fill in the blank. The Server0 message isb .........

    Explanation
    The correct answer is "winner" because the phrase "The Server0 message is" indicates that the sentence is incomplete and requires additional information to make sense. The word "winner" fills in the blank and completes the sentence, suggesting that the Server0 message is a winner.

    Rate this question:

  • 3. 

    147. Fill in the blank. Use a number. IPv4 multicast addresses are directly mapped to IEEE 802 (Ethernet) MAC addresses using the last .......... of the 28 available bits in the IPv4 multicast group address.

    Explanation
    IPv4 multicast addresses are directly mapped to IEEE 802 (Ethernet) MAC addresses using the last 4 bits of the 28 available bits in the IPv4 multicast group address.

    Rate this question:

  • 4. 

    139. Question: (image) It will give 4 options about ping, the correct one is: The PC2 will be able to ping: ...................

    Explanation
    PC2 will be able to ping the IP address 192.168.1.1.

    Rate this question:

  • 5. 

    7. ISOC, IANA, EIA, and IEEE represent ............... organizations which help to promote and maintain an open Internet.

    Explanation
    ISOC (Internet Society), IANA (Internet Assigned Numbers Authority), EIA (Electronic Industries Alliance), and IEEE (Institute of Electrical and Electronics Engineers) are all organizations that play a significant role in promoting and maintaining an open Internet. These organizations develop and establish standards that ensure interoperability and compatibility among different devices, networks, and technologies. By setting these standards, they contribute to the seamless functioning of the Internet and enable the exchange of information and communication on a global scale.

    Rate this question:

  • 6. 

    30. What happens when part of an Internet VoIP transmission is not delivered to the destination?

    • A delivery failure message is sent to the source host.

    • The part of the VoIP transmission that was lost is re-sent.

    • The entire transmission is re-sent.

    • The transmission continues without the missing portion.

    Correct Answer
    A. The transmission continues without the missing portion.
    Explanation
    When part of an Internet VoIP transmission is not delivered to the destination, the transmission continues without the missing portion. This means that the missing part is not re-sent or replaced, but the transmission carries on with the remaining data. This is because VoIP technology is designed to prioritize real-time communication, so it is more important to maintain the flow of the conversation rather than waiting for missing data to be re-sent.

    Rate this question:

  • 7. 

    54. Which keys act as a hot key combination that is used to interrupt an IOS process?

    • Ctrl-Shift-X

    • Ctrl-Shift-6

    • Ctrl-Z

    • Ctrl-C

    Correct Answer
    A. Ctrl-Shift-6
    Explanation
    Ctrl-Shift-6 is the correct answer because it is the hot key combination used to interrupt an IOS process. This combination sends a break signal to the device, allowing the user to stop the current process and regain control of the device. Ctrl-Shift-X, Ctrl-Z, and Ctrl-C are not the correct hot key combinations for interrupting an IOS process.

    Rate this question:

  • 8. 

    67. What happens when part of an Internet radio transmission is not delivered to the destination?

    • A delivery failure message is sent to the source host.

    • The part of the radio transmission that was lost is re-sent.

    • The entire transmission is re-sent.

    • The transmission continues without the missing portion.

    Correct Answer
    A. The transmission continues without the missing portion.
    Explanation
    When part of an Internet radio transmission is not delivered to the destination, the transmission continues without the missing portion. This means that the missing part of the transmission is not re-sent or replaced, but the rest of the transmission continues to be received and played.

    Rate this question:

  • 9. 

    Which one do you like?

    • Tylko popatrz ja kto wyglÄ…da. to dobre

    • To zÅ‚e.

    Correct Answer
    A. Tylko popatrz ja kto wyglÄ…da. to dobre
    Explanation
    The given answer "tylko popatrz ja kto wyglÄ…da. to dobre" translates to "just look at who looks. it's good" in English. This suggests that the speaker is expressing their preference for something based on its appearance or looks. They are implying that the thing they like is good because of how it looks.

    Rate this question:

  • 10. 

    132. Network devices come in two physical configurations. Devices that have expansion slots that provide the flexibility to add new modules have a Modular ..........

    Correct Answer
    configuration
    Explanation
    Network devices come in two physical configurations. Devices that have expansion slots that provide the flexibility to add new modules have a modular configuration. This means that these devices can be customized and upgraded by adding or removing modules as needed. This allows for greater flexibility and scalability in the network infrastructure.

    Rate this question:

  • 11. 

    150. What is the metric value that is used to reach the 10.1.1.0 network in the following routing table entry? D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0

    • 24

    • 90

    • 05

    • 2170112

    Correct Answer
    A. 2170112
    Explanation
    The metric value used to reach the 10.1.1.0 network in the given routing table entry is 2170112.

    Rate this question:

  • 12. 

    2. Which communication tool allows real-time collaboration?

    • Wiki

    • E-mail

    • Weblog

    • Instant messaging

    Correct Answer
    A. Instant messaging
    Explanation
    Instant messaging allows real-time collaboration because it allows individuals to send and receive messages instantly, facilitating quick and direct communication. Unlike other communication tools such as email or a weblog, instant messaging enables users to have real-time conversations, share files, and even engage in video or audio calls, promoting efficient and interactive collaboration among individuals or teams.

    Rate this question:

  • 13. 

    6. Port numbers ranging from 0 to 1023 are considered to be ............... ports

    Correct Answer
    well known
    Explanation
    Port numbers ranging from 0 to 1023 are considered to be "well known" ports. These ports are assigned by the Internet Assigned Numbers Authority (IANA) and are commonly used by well-known protocols such as HTTP (port 80), HTTPS (port 443), FTP (port 21), and SMTP (port 25). These ports are widely recognized and standardized, making them easily identifiable and commonly used by various network applications and services.

    Rate this question:

  • 14. 

    58. Which device should be used for enabling a host to communicate with another host on a different network?

    • Switch

    • Hub

    • Router

    • Host

    Correct Answer
    A. Router
    Explanation
    A router should be used for enabling a host to communicate with another host on a different network. A router is a networking device that forwards data packets between computer networks. It determines the best path for the data to travel from the source host to the destination host, even if they are on different networks. Routers use routing tables to make these decisions and ensure efficient and secure communication between hosts on different networks.

    Rate this question:

  • 15. 

    9. A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?

    • LAN

    • MAN

    • WAN

    • WLAN

    Correct Answer
    A. WAN
    Explanation
    A company expanding its business to other countries requires a Wide Area Network (WAN) to support the requirement of keeping all branch offices connected to the corporate headquarters at all times. LAN (Local Area Network) is limited to a small geographical area, MAN (Metropolitan Area Network) covers a larger area but is still not suitable for connecting branch offices in different countries, and WLAN (Wireless Local Area Network) is a wireless network primarily used for local connectivity within a limited area.

    Rate this question:

  • 16. 

    48. The prefix-length for the range of addresses is .....

    Correct Answer
    60
    Explanation
    The prefix-length for the range of addresses is 60. A prefix-length is used in IP addressing to determine the network portion of an IP address. It specifies the number of bits in the network portion of the address. In this case, a prefix-length of 60 indicates that the first 60 bits of the address are used to identify the network, while the remaining bits are used to identify the host within that network.

    Rate this question:

  • 17. 

    69. Refer to the exhibit. What is the maximum TTL value that is used to reach the destination www.cisco.com??

    • 11

    • 12

    • 13

    • 14

    Correct Answer
    A. 13
    Explanation
    The maximum TTL value that is used to reach the destination www.cisco.com is 13.

    Rate this question:

  • 18. 

    110. To prevent faulty network devices from carrying dangerous voltage levels, equipment must be ........... correctly

    Correct Answer
    grounded
    Explanation
    To prevent faulty network devices from carrying dangerous voltage levels, it is necessary to ensure that the equipment is grounded correctly. Grounding helps to create a safe path for electrical currents to flow into the earth, reducing the risk of electric shock or damage to the devices. By grounding the equipment, any excess electrical energy can be safely dissipated, preventing potential hazards and ensuring the proper functioning of the network devices.

    Rate this question:

  • 19. 

    113. What needs to be checked when testing a UTP network cable?

    • Capacitance

    • Wire map

    • Inductance

    • Flexibility

    Correct Answer
    A. Wire map
    Explanation
    When testing a UTP network cable, one needs to check the wire map. This refers to the arrangement and connectivity of the individual wires within the cable. By verifying the wire map, one can ensure that the correct wires are properly connected to the corresponding pins on both ends of the cable. This is crucial for the cable to transmit data accurately and efficiently. Capacitance, inductance, and flexibility are not directly related to checking the functionality and integrity of the UTP network cable.

    Rate this question:

  • 20. 

    161.(z pdfa nie ma nr., jest pod 132) Refer to the exhibit. What is the maximum TIL value that is used to reach the destination www.cisco.com?

    • 11

    • 12

    • 13

    • 14

    Correct Answer
    A. 13
    Explanation
    The maximum TIL value that is used to reach the destination www.cisco.com is 13.

    Rate this question:

  • 21. 

    138. How many bits would need to be borrowed if a network admin were given the IP addressing scheme of 172.16.0.0/16 and needed no more than 16 subnet with equal number of hosts?

    • 10

    • 12

    • 2

    • 4

    • 8

    Correct Answer
    A. 4
    Explanation
    To create 16 subnets with an equal number of hosts, the network admin would need to borrow 4 bits from the host portion of the IP address. This is because 2^4 (16) is the number of subnets required. Borrowing 4 bits would create 16 subnets, each with the same number of hosts.

    Rate this question:

  • 22. 

    97. Which type of wireless security makes use of dynamic encryption keys each time a client associates with an AP?

    • EAP

    • PSK

    • WEP

    • WPA

    Correct Answer
    A. WPA
    Explanation
    WPA (Wi-Fi Protected Access) is the correct answer because it is a wireless security protocol that uses dynamic encryption keys. Each time a client associates with an Access Point (AP), WPA generates a new encryption key to ensure security. This dynamic key feature enhances the security of the wireless network by preventing unauthorized access and protecting the data transmitted over the network. EAP (Extensible Authentication Protocol) is an authentication framework, PSK (Pre-Shared Key) is a type of authentication method, and WEP (Wired Equivalent Privacy) is an older and less secure wireless security protocol.

    Rate this question:

  • 23. 

    116. What does a router use to determine where to send data it receives from the network?

    • An ARP table

    • A routing table

    • The destination PC physical address

    • A switching table

    Correct Answer
    A. A routing table
    Explanation
    A router uses a routing table to determine where to send data it receives from the network. The routing table contains information about the network topology and the best path to reach different networks. It helps the router make decisions on how to forward packets based on their destination IP addresses. By consulting the routing table, the router can determine the next hop or interface to send the data to, ensuring that it reaches its intended destination efficiently.

    Rate this question:

  • 24. 

    10. A network administrator is upgrading a small business network to give high priority to real-time applications traffic. What two types of network services is the network administrator trying to accommodate? (Choose two.)

    • SNMP

    • Instant messaging

    • Voice

    • FTP

    • Video

    Correct Answer(s)
    A. Voice
    A. Video
    Explanation
    The network administrator is trying to accommodate the traffic for real-time applications. Real-time applications require high priority to ensure smooth and uninterrupted communication. Voice and video are examples of real-time applications that require high priority to maintain the quality of the communication. SNMP, instant messaging, and FTP are not real-time applications and do not require high priority for traffic.

    Rate this question:

  • 25. 

    90. What happens when part of an Internet television transmission is not delivered to the destination?

    • A delivery failure message is sent to the source host.

    • The part of the television transmission that was lost is re-sent.

    • The entire transmission is re-sent.

    • The transmission continues without the missing portion.

    Correct Answer
    A. The transmission continues without the missing portion.
    Explanation
    When part of an Internet television transmission is not delivered to the destination, the transmission continues without the missing portion. This means that the missing part is not re-sent or replaced, but the transmission continues to play without it.

    Rate this question:

  • 26. 

    130. Given the binary address of 11101100 00010001 00001100 00001010, which address does this represent in dotted decimal format?

    • 234.17.10.9

    • 234.16.12.10

    • 236.17.12.6

    • 236.17.12.10

    Correct Answer
    A. 236.17.12.10
    Explanation
    The given binary address 11101100 00010001 00001100 00001010 represents the dotted decimal address 236.17.12.10.

    Rate this question:

  • 27. 

    131. A particular telnet site does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

    • Ipconfig /all

    • Arp -a

    • Ipconfig /displaydns

    • Nslookup

    Correct Answer
    A. Ipconfig /displaydns
    Explanation
    The command "ipconfig /displaydns" can be used by the technician to show any cached DNS entries for the web page. This command will display the contents of the DNS resolver cache, which includes any previously resolved DNS entries. This can help the technician determine if there is a DNS issue causing the telnet site to not respond.

    Rate this question:

  • 28. 

    8. Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?

    • The entire command, configure terminal, must be used.

    • The administrator is already in global configuration mode.

    • The administrator must first enter privileged EXEC mode before issuing the command.

    • The administrator must connect via the console port to access global configuration mode.

    Correct Answer
    A. The administrator must first enter privileged EXEC mode before issuing the command.
    Explanation
    The error message suggests that the administrator needs to enter privileged EXEC mode before issuing the command. This means that the administrator is currently in user EXEC mode, which has limited privileges. To access global configuration mode and configure the switch, the administrator must first enter privileged EXEC mode by using the "enable" command.

    Rate this question:

  • 29. 

    61. What are two features of a physical, star network topology? (Choose two.)

    • It is straightforward to troubleshoot.

    • End devices are connected together by a bus.

    • It is easy to add and remove end devices.

    • All end devices are connected in a chain to each other.

    • Each end system is connected to its respective neighbor.

    Correct Answer(s)
    A. It is straightforward to troubleshoot.
    A. It is easy to add and remove end devices.
    Explanation
    A physical star network topology is characterized by each end system being connected to its respective neighbor, making it easy to troubleshoot as any issues can be isolated to a specific connection. Additionally, this topology allows for easy addition and removal of end devices without disrupting the network.

    Rate this question:

  • 30. 

    154. What type of communication medium is used with a wireless LAN connection?

    • Radio waves

    • Fiber

    • Microwave

    • UTP

    Correct Answer
    A. Radio waves
    Explanation
    A wireless LAN connection uses radio waves as the communication medium. Radio waves are electromagnetic waves that can transmit data wirelessly through the air. This type of communication allows devices to connect to the network without the need for physical cables, providing flexibility and mobility.

    Rate this question:

  • 31. 

    159. Which command can an administrator issue on a Cisco router to send debug messages to the vty lines?

    • Terminal monitor

    • Logging console

    • Logging buffered

    • Logging synchronous

    Correct Answer
    A. Terminal monitor
    Explanation
    The command "terminal monitor" is used by an administrator on a Cisco router to send debug messages to the vty lines. When this command is issued, the debug messages will be displayed on the terminal or console session that is currently active. This allows the administrator to monitor and troubleshoot any issues or errors that may be occurring on the router in real-time.

    Rate this question:

  • 32. 

    49. Match the phases to their correct stage in the router bootup process. (Not all options are used.)

    • DomyÅ›l siÄ™

    • Nie domyÅ›laj siÄ™

    Correct Answer
    A. Domyśl się
  • 33. 

    57. What is the correct order for PDU encapsulation?

    • Option 1

    • Option 2

    • Option 3

    • Option 4

    Correct Answer
    A. Option 1
  • 34. 

    72. Which protocol supports rapid delivery of streaming media?

    • Transmission Control Protocol

    • Real-Time Transport Protocol

    • Secure File Transfer Protocol

    • Video over Internet Protocol

    Correct Answer
    A. Real-Time Transport Protocol
    Explanation
    Real-Time Transport Protocol (RTP) is a protocol that supports rapid delivery of streaming media. RTP is specifically designed for real-time communication and streaming applications, providing efficient and timely delivery of audio and video data over IP networks. It is widely used in applications such as video conferencing, online gaming, and live streaming, where real-time delivery and synchronization of media content are crucial. RTP works in conjunction with other protocols such as the Real-Time Control Protocol (RTCP) to provide quality of service features and ensure smooth streaming of media content.

    Rate this question:

  • 35. 

    82. A network administrator is making changes to the configuration of a router. After making the changes and verifying the results, the administrator issues the copy running-config startup-config command. What will happen after this command executes?

    • The configuration will be copied to flash.

    • The configuration will load when the router is restarted.

    • The new configuration file will replace the IOS file.

    • The changes will be lost when the router restarts.

    Correct Answer
    A. The configuration will load when the router is restarted.
    Explanation
    After executing the "copy running-config startup-config" command, the configuration changes made by the network administrator will be saved to the startup-config file in the router's non-volatile memory (NVRAM). This means that the configuration will persist even after a router restart. When the router is restarted, it will load the saved configuration from the startup-config file, ensuring that the changes made by the administrator are applied. The command does not affect the IOS file or cause any loss of configuration changes upon restart.

    Rate this question:

  • 36. 

    111. What is a possible hazard that can be caused by network cables in a fire?

    • The cable insulation could be flammable.

    • Users could be exposed to excessive voltage.

    • Network cables could be exposed to water.

    • The network cable could explode.

    Correct Answer
    A. The cable insulation could be flammable.
    Explanation
    The possible hazard that can be caused by network cables in a fire is that the cable insulation could be flammable. In the event of a fire, the flammable insulation can catch fire and contribute to the spread of the fire, potentially causing more damage and posing a greater risk to individuals in the vicinity. It is important to ensure that network cables are made with non-flammable insulation materials to minimize this hazard.

    Rate this question:

  • 37. 

    22. Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port?

    • Just PC0 and PC1 MAC addresses

    • Just the PC0 MAC address

    • PC0, PC1, and PC2 MAC addresses

    • Just the PC1 MAC address

    • Just the PC2 MAC address?

    Correct Answer
    A. Just PC0 and PC1 MAC addresses
    Explanation
    When a ping is issued from PC0, PC1, and PC2 in that order, the MAC addresses of PC0 and PC1 will be learned by the switch S1 on its Fa0/1 port. The switch will update its MAC address table with the MAC addresses of the devices that are directly connected to it. Since the ping from PC2 is issued after PC1, the switch will not have learned the MAC address of PC2 yet. Therefore, only the MAC addresses of PC0 and PC1 will be contained in the S1 MAC address table associated with the Fa0/1 port.

    Rate this question:

  • 38. 

    51. When is a dial-up connection used to connect to an ISP?

    • When a cellular telephone provides the service

    • When a high-speed connection is provided over a cable TV network

    • When a satellite dish is used

    • When a regular telephone line is used

    Correct Answer
    A. When a regular telephone line is used
    Explanation
    A dial-up connection is used to connect to an ISP when a regular telephone line is used. This is because dial-up connections use the existing telephone infrastructure to establish a connection to the internet. The user's computer dials a specific phone number provided by the ISP, and the modem on the computer establishes a connection with the ISP's modem through the telephone line. The data is then transmitted over the telephone line to access the internet. Dial-up connections are slower compared to other types of connections like cable or fiber-optic, but they can be used in areas where high-speed connections are not available.

    Rate this question:

  • 39. 

    56. A technician uses the ping 127.0.0.1 command. What is the technician testing?

    • The TCP/IP stack on a network host

    • Connectivity between two adjacent Cisco devices

    • Connectivity between a PC and the default gateway

    • Connectivity between two PCs on the same network

    • Physical connectivity of a particular PC and the network

    Correct Answer
    A. The TCP/IP stack on a network host
    Explanation
    The technician is testing the TCP/IP stack on a network host by using the ping 127.0.0.1 command. The IP address 127.0.0.1 is the loopback address, which means it refers to the local host or the device itself. By pinging this address, the technician can determine if the TCP/IP stack is functioning properly on the network host.

    Rate this question:

  • 40. 

    76. Point-to-point communications where both devices can transmit and receive on the medium at the same time are known as ..........

    Correct Answer
    full-duplex
    Explanation
    Full-duplex communications refer to a type of point-to-point communication where both devices involved can transmit and receive data simultaneously on the same medium. This means that both devices can send and receive information at the same time without any interference or interruption. Full-duplex communication allows for faster and more efficient data transmission, as it eliminates the need for devices to take turns transmitting and receiving.

    Rate this question:

  • 41. 

    114. Refer to the exhibit. A ping to PC2 is issued from PC0, PC1, and PC3 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port?

    • Just PC0 and PC1 MAC addresses

    • Just the PC0 MAC address

    • PC0, PC1, and PC2 MAC addresses

    • Just the PC1 MAC address

    • Just the PC2 MAC address

    Correct Answer
    A. Just PC0 and PC1 MAC addresses
    Explanation
    When a ping is issued from PC0, PC1, and PC3 to PC2 in that order, the MAC addresses of PC0 and PC1 will be contained in the S1 MAC address table associated with the Fa0/1 port. This is because the MAC address table records the MAC addresses of the source devices that send traffic through a specific port. Since PC0 and PC1 are the only devices that send traffic to PC2, their MAC addresses will be recorded in the MAC address table for the Fa0/1 port.

    Rate this question:

  • 42. 

    143. There was also a question about if you activated service password encryption in the past and you prompt “no service password encryption” what password are modified ?

    • No password at all;

    • Password of the lines are in clear;

    • Login password;

    • ?

    Correct Answer
    A. No password at all;
    Explanation
    If you have previously activated service password encryption and you enter the command "no service password encryption" without specifying a password, it means that no password will be modified. This means that the encryption feature will be turned off, but it will not change or remove any existing passwords.

    Rate this question:

  • 43. 

    145. What is the primary reason to subnet IPv6 prefixes?

    • To conserve IPv6 addresses

    • To avoid wasting IPv6 addresses

    • To conserve IPv6 prefixes

    • To create a hierarchical Layer 3 network design

    Correct Answer
    A. To create a hierarchical Layer 3 network design
    Explanation
    Subnetting IPv6 prefixes is primarily done to create a hierarchical Layer 3 network design. By dividing a large IPv6 network into smaller subnets, it allows for better organization and management of network resources. This hierarchical design enables efficient routing and reduces network congestion by limiting the scope of broadcast domains. It also provides improved security and scalability. The options mentioning conserving or avoiding wasting IPv6 addresses or prefixes are not the primary reasons for subnetting, although they may be secondary benefits.

    Rate this question:

  • 44. 

    155. Which method of IPv6 prefix assignment relies on the prefix contained in RA messages?

    • EUI-64

    • Static

    • SLAAC

    • Stateful DHCPv6

    Correct Answer
    A. SLAAC
    Explanation
    SLAAC (Stateless Address Autoconfiguration) is a method of IPv6 prefix assignment that relies on the prefix contained in RA (Router Advertisement) messages. With SLAAC, routers on the network advertise the network prefix, and devices can use this information to generate their own unique IPv6 addresses. This method does not require a central server or DHCPv6, making it efficient and easy to implement.

    Rate this question:

  • 45. 

    16. Which address on a PC does not change, even if the PC is moved to a different network?

    • IP address

    • Default gateway address

    • MAC address

    • Logical address

    Correct Answer
    A. MAC address
    Explanation
    The MAC address is a unique identifier assigned to the network interface card (NIC) of a device. It remains constant regardless of the network the PC is connected to. The MAC address is used for communication within the local network, while the IP address is used for communication over the internet. The default gateway address and logical address can vary depending on the network configuration, making the MAC address the only option that does not change when the PC is moved to a different network.

    Rate this question:

  • 46. 

    45. Which type of wireless security generates dynamic encryption keys each time a client associates with an AP?

    • EAP

    • PSK

    • WEP

    • WPA

    Correct Answer
    A. WPA
    Explanation
    WPA (Wi-Fi Protected Access) is a type of wireless security that generates dynamic encryption keys each time a client associates with an Access Point (AP). This ensures that the encryption keys are constantly changing, making it more difficult for unauthorized users to intercept and decrypt the wireless network traffic. EAP (Extensible Authentication Protocol) is a framework for authentication, but it does not specifically generate dynamic encryption keys. PSK (Pre-Shared Key) is a method that uses a single key for all devices on the network, so it does not generate dynamic keys. WEP (Wired Equivalent Privacy) is an older and less secure wireless security protocol that also does not generate dynamic keys.

    Rate this question:

  • 47. 

    112. What device is commonly used to verify a UTP cable?

    • A multimeter

    • An Optical Time Domain Reflectometer

    • A cable tester

    • An ohmmeter

    Correct Answer
    A. A cable tester
    Explanation
    A cable tester is commonly used to verify a UTP cable. This device is specifically designed to test the integrity and functionality of cables, including UTP cables. It can detect any faults or issues in the cable, such as open circuits, short circuits, or incorrect wiring. By using a cable tester, technicians can ensure that the UTP cable is properly installed and functioning correctly, which is crucial for reliable network connectivity.

    Rate this question:

  • 48. 

    14. Which two protocols function at the internet layer? (Choose two)

    • ARP

    • BOOTP

    • ICMP

    • IP

    • PPP

    Correct Answer(s)
    A. ICMP
    A. IP
    Explanation
    ICMP (Internet Control Message Protocol) and IP (Internet Protocol) function at the internet layer. ICMP is responsible for sending error messages and operational information about network conditions. IP is responsible for routing packets across different networks. Both protocols work together to ensure proper communication between devices on the internet.

    Rate this question:

  • 49. 

    21. What is contained in the trailer of a data-link frame?

    • Logical address

    • Physical address

    • Data

    • Error detection

    Correct Answer
    A. Error detection
    Explanation
    The trailer of a data-link frame contains error detection information. This is important for ensuring the integrity of the data being transmitted. By including error detection in the trailer, the receiver can check if any errors occurred during transmission and take appropriate action, such as requesting retransmission of the data. This helps to maintain the reliability and accuracy of the data being transmitted over the data-link layer.

    Rate this question:

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 19, 2019
    Quiz Created by
    Michal
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.