IT Level 3 Support Engineer

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Ken Trevena
Ken Trevena, IT
Ken specializes in IT Design, Implementation, and Support, with a focus on Virtualization, Data Center Management, and WAN Bonding, particularly in marine and remote locations using LTE and Starlink technology.
Quizzes Created: 1 | Total Attempts: 71
Questions: 17 | Attempts: 71

SettingsSettingsSettings
IT Level 3 Support Engineer - Quiz

A series of 15 Questions developed by Ken Trevena VCP, CEH, LPT


Questions and Answers
  • 1. 

    Identify the potential area of security concern with this network

  • 2. 

    What Port does Microsoft RDP use

    Correct Answer
    3389
    Explanation
    Microsoft RDP (Remote Desktop Protocol) uses port number 3389. This port is the default port for RDP communication and is commonly used for remote desktop connections to Windows-based systems. By using this port, users can remotely access and control a computer or server running a Windows operating system. It allows users to interact with the remote system as if they were physically present, enabling tasks such as file transfers, software installations, and troubleshooting.

    Rate this question:

  • 3. 

    What Port does SMTP use

    Correct Answer
    25
    Explanation
    SMTP (Simple Mail Transfer Protocol) is a communication protocol used for sending email messages between servers. It operates on port 25, which is the designated port for SMTP. This port is used by mail transfer agents to establish a connection and transfer email data. By using port 25, SMTP ensures that email messages are properly routed and delivered to the intended recipients.

    Rate this question:

  • 4. 

    The Internet does not work but you can ping external IP addresses, what might be causing this?

    • A.

      DNS record issue

    • B.

      DHCP configuration issue

    • C.

      DNS server issue

    • D.

      Internet Service Provider issue

    Correct Answer
    C. DNS server issue
    Explanation
    If the Internet is not working but you can still ping external IP addresses, it suggests that there might be a problem with the DNS server. DNS (Domain Name System) is responsible for translating domain names into IP addresses. If the DNS server is not functioning properly, it would prevent your device from resolving domain names, resulting in the inability to access websites or services through their domain names. However, you can still ping external IP addresses directly as it bypasses the need for DNS resolution.

    Rate this question:

  • 5. 

    Select 3 OSI Layer 2 Components

    • A.

      SWITCH

    • B.

      HUBS

    • C.

      ETHERNET

    • D.

      FIBRE

    • E.

      IP

    • F.

      BRIDGE

    Correct Answer(s)
    A. SWITCH
    C. ETHERNET
    F. BRIDGE
    Explanation
    The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. Layer 2 of the OSI model is the Data Link Layer, responsible for the reliable transmission of data between adjacent network nodes. In this context, the correct answer options are SWITCH, ETHERNET, and BRIDGE. These components operate at Layer 2, facilitating the connection and communication between devices within a local area network (LAN). HUBS, FIBRE, and IP are not Layer 2 components, as hubs operate at Layer 1 (Physical Layer), fiber refers to the physical medium used for transmission, and IP is a Layer 3 (Network Layer) protocol.

    Rate this question:

  • 6. 

    Which OSI Layer deals with TCP and UDP protocols

    • A.

      Session Layer

    • B.

      Data Link Layer

    • C.

      Transport Layer

    • D.

      Presentation Layer

    Correct Answer
    C. Transport Layer
    Explanation
    The Transport Layer is responsible for handling TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in the OSI model. TCP provides reliable, connection-oriented communication between devices, ensuring data integrity and flow control. UDP, on the other hand, offers connectionless, unreliable communication, suitable for applications that prioritize speed over reliability, such as streaming or gaming. Therefore, the Transport Layer is the correct answer as it specifically deals with these protocols.

    Rate this question:

  • 7. 

    Select 3 Authentication Algorithms used in VPN Tunnel Phases

    • A.

      SHA1

    • B.

      MDA5

    • C.

      SHA2

    • D.

      SHA3

    • E.

      MD5

    Correct Answer(s)
    A. SHA1
    C. SHA2
    E. MD5
    Explanation
    The three authentication algorithms used in VPN tunnel phases are SHA1, SHA2, and MD5. SHA1 is a widely used algorithm that generates a 160-bit hash value. SHA2 is a family of cryptographic hash functions that includes SHA-224, SHA-256, SHA-384, and SHA-512. MD5 is a commonly used algorithm that produces a 128-bit hash value. These algorithms ensure the integrity and authenticity of the data transmitted over the VPN tunnel by generating unique hash values that can be used for verification purposes.

    Rate this question:

  • 8. 

    Which is the most secure encryption Algorithm

    • A.

      DES

    • B.

      3DES

    • C.

      AES

    • D.

      3AES

    Correct Answer
    C. AES
    Explanation
    AES (Advanced Encryption Standard) is considered the most secure encryption algorithm among the given options. It is widely used and trusted by organizations and governments worldwide. AES supports key sizes of 128, 192, and 256 bits, which makes it highly resistant to brute-force attacks. It has been extensively studied and analyzed by experts, and no significant vulnerabilities have been found. AES is also efficient and provides fast encryption and decryption processes. Overall, AES is the preferred choice for ensuring data confidentiality and security in various applications and industries.

    Rate this question:

  • 9. 

    VPN negotiations typically consist of two phases

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    VPN negotiations typically consist of two phases: the establishment phase and the authentication phase. In the establishment phase, the VPN client and server negotiate the parameters for the VPN connection, such as encryption algorithms and key exchange methods. Once the parameters are agreed upon, the authentication phase begins, where the client and server authenticate each other's identities using digital certificates or pre-shared keys. These two phases ensure a secure and reliable VPN connection.

    Rate this question:

  • 10. 

    What port is used for snmp

    Correct Answer
    161
    Explanation
    SNMP (Simple Network Management Protocol) uses port number 161 for communication. It is a protocol used to manage and monitor network devices. SNMP allows network administrators to collect and organize information about devices on a network, such as routers, switches, and servers. By using port 161, SNMP can send and receive data packets between the management system and the managed devices, enabling monitoring, configuration, and troubleshooting of network devices.

    Rate this question:

  • 11. 

    Protect your File Servers from Hackers by

    • A.

      Blocking unused Ports

    • B.

      Deleting large files

    • C.

      Regularly patching OS and applications

    • D.

      Running regular Backups

    • E.

      Use SSH Shared Keys instead of Passwords

    Correct Answer(s)
    A. Blocking unused Ports
    C. Regularly patching OS and applications
    E. Use SSH Shared Keys instead of Passwords
    Explanation
    To protect file servers from hackers, it is important to block unused ports to prevent unauthorized access. Regularly patching the operating system and applications is necessary to fix any security vulnerabilities. Using SSH shared keys instead of passwords adds an extra layer of security as it eliminates the risk of password-based attacks. Deleting large files may help in managing storage space but it is not directly related to protecting file servers from hackers. Running regular backups is important for data recovery but it does not directly protect against hackers.

    Rate this question:

  • 12. 

    In SAN storage disk provisioning tick the benefits of Thin Provisioning

    • A.

      Provides unlimited disk resource allocation

    • B.

      Allows overallocation of available disk space

    • C.

      More physical space available to fit disks in the enclosure

    • D.

      Optimizes the utilisation of shared storage

    • E.

      Is more cost effective than Thick provisioning

    Correct Answer(s)
    B. Allows overallocation of available disk space
    D. Optimizes the utilisation of shared storage
    E. Is more cost effective than Thick provisioning
    Explanation
    Thin provisioning in SAN storage allows for overallocation of available disk space, meaning that more virtual disks can be created than there is physical storage capacity. This helps to optimize the utilization of shared storage resources, as it allows for better allocation of available disk space. Additionally, thin provisioning is more cost-effective than thick provisioning, as it allows for more efficient use of storage resources without the need for upfront allocation of physical disk space.

    Rate this question:

  • 13. 

    Connecting to a SQL System DSN or a MySQL Database can be achieved by 

    • A.

      Using phpMyAdmin to connect to the DB

    • B.

      Using the ODBC Data Source Administrator

    • C.

      Entering the DSN as a URL in a web browser

    • D.

      Adding DSN to the ODBC table

    Correct Answer(s)
    A. Using pHpMyAdmin to connect to the DB
    B. Using the ODBC Data Source Administrator
  • 14. 

    A Fileserver has a disk failure (DISK 00) indicated by a flashing amber light. The server is running and the failed disk is on the 2 disk OS system array configured as RAID 1. What is the best course of action?

    • A.

      Remove disk 01, Determine the disk size and spindle speed, source a replacement disk, rebuild the disk and replace it in the server.

    • B.

      Determine the disk size and spindle speed, source a replacement disk, remove disk 00 and replace it with the new disk, wait for the RAID controller to rebuild the array

    • C.

      Do nothing as the system is still running properly with the existing disk, replace the failed disk when you can source one.

    • D.

      Remove disk 00 as soon as possible and replace with any suitable disk regardless of the size

    • E.

      Remove disk 00 as soon as possible and replace with any suitable disk larger than the failed disk.

    Correct Answer
    D. Remove disk 00 as soon as possible and replace with any suitable disk regardless of the size
    Explanation
    The best course of action is to remove disk 00 as soon as possible and replace it with any suitable disk regardless of the size. This is because the disk failure is indicated by a flashing amber light, indicating that the disk is not functioning properly. By removing and replacing the failed disk, the system can continue running without any interruptions. It is not necessary to determine the disk size and spindle speed or wait for the RAID controller to rebuild the array in this scenario.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 16, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 27, 2020
    Quiz Created by
    Ken Trevena
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.