Dive into the depths of computer networking with this ultimate exam! Test your knowledge on wireless routers, spread-spectrum technologies, WLAN security threats, and more. Ideal for learners seeking to enhance their understanding of networking principles and security practices.
Multi
Long
Spread
Broad
Rate this question:
DSSS
OFDM
DFSS
FHSS
Rate this question:
802.11b
802.11n
802.11a
802.11g
Rate this question:
Warchalking
Wardialing
WEP and WPA security cracking
Rogue Acess Point
Rate this question:
Enabling SSID broadcast
Preshared Key
MAC address filtering
IEEE 802.1x
Rate this question:
WPA2
WAP
WPA
WEP
Rate this question:
Wire Equivelant Protocol WEP
SSID
Undirectional
Omnidirectional
WLAN
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
Redundant Network with no Single point of failure
Non-Redundant Network with A Single Point of Failure
Non-Redundant Network with no Single Point of Failure
Redundant Network with A Single Point of Failure
Rate this question:
Active-passive
Active-standby
Active-live
Active-active
Rate this question:
HSRP
Cisco-RP
LACP
CARP
Rate this question:
10 Mbps
1.544 Mbps
256 kbps
512 kbps
Rate this question:
Active-standby
Common address reduncacy protocl carp
Collective standby
Hot Standby Router Protocol (HSRP):
Active-active
Rate this question:
Common Address Redundancy Protocol (CARP)
Hot Standby Router Protocol (HSRP)
Collective standby
Active-standby
Active-active
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
Five out of every nine networks fail
Five out of every nine network administrators always available to take care of their network problem
five out of every user's computers is unavailable for access
Means the network should be up 99.999 percent of the time
The network has a maximum of 5 minutes of downtime per year
network has a maximum of 5 minutes of downtime per month
Rate this question:
True
False
Rate this question:
ARP
Pathping
MAC
Netstat
Rate this question:
Arp
Ipconfig
Nbtstat
Ping
Rate this question:
Ipstatus
Netstat
Ntstat
Networkstat
Rate this question:
Fqdnlookup
Nslookup
Iplookup
Ipstat
Rate this question:
Nbtstat
Netstat
Ipconfig
Ping
Rate this question:
Iproute
Route
Router
Netroute
Rate this question:
Tracert
Routertrace
Router
Route
Rate this question:
Route
Ipconfig
Ifconfig
Nbtstat
Rate this question:
Ipconfig
Tracert
Nbtstat
Traceroute
Rate this question:
Loopback plug
Toner probe
Protocol analyzer
Multimeter
Rate this question:
Traffic analyzer
Time domain reflectometer
Network sniffer
Packet tracer
Rate this question:
Time domain reflectometer
Toner probe
Punch down tool
Throughput tester
Rate this question:
Locate faults in a cable
Identifies which pair of wires connects back to an end users location
Prevents static discharge from damaging other components
Observes how a network performs under heavy load
Rate this question:
SNMP Application, SNMP manager, SNMP Router
SNMP manager, SNMP agent, Management Information Base
SNMP agent, MD5, CBC-DES56
Management Information Base, SNMPv3, NMS SNMP
Rate this question:
SNMP Message, SNMP Time, SNMP Date
SNMP GET, SNMP SET, SNMP GO
SNMP GET, SNMP SET, SNMP Trap
SNMP Transmit, SNMP Receive, SNMP Capture
Rate this question:
Syslog servers and Syslog clients
Syslog messengers and Syslog transmitters
Syslog time stamps and Syslog severity levels
Syslog transfers and Syslog captures
Rate this question:
A-Router, B-Syslog Server, C-Firewall, D-Switch
A-Syslog Server, B-Firewall, C-Router, D-Switch
A-Firewall, B-Syslog Server, C-Switch, D-Router
A-Switch, B-Router, C-Syslog Server, D-Firewall
Rate this question:
Information about successful and failed login attempts
Information about software running on the OS
Information about applying for a job
Information about events generated by the OS
Rate this question:
Reliability, classified, accessibility
Integrated, restricted, obtainable
Integrity, confidentiality, availability
Veracity, dependability, unrestricted
Rate this question:
Modifying the appearance of a corporate website
Modifying financial records that are stored electronically
Send improperly formatted data to a networked device, resulting in an unhandled exception error
Intercepting and altering an e-commerce transaction
Man-in-the-middle
Trojan horse
Salami attack
Data diddling
Rate this question:
Network admission controls
Access control lists
Firewalls
Point to point protocols
Rate this question:
IDS, IPS, and IRS based
Symmetric, asymmetric, and transparent based
NIDS, HIPS, and NIPS based
Signature, policy, and anomaly based
Rate this question:
RSA
Pretty Good Privacy (PGP
Advanced Encryption Standard (AES)
Triple Data encryption Standard (3DES)
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
TCP SYN Flood
Hijacking a session
Denial of Service
Botnet
Rate this question:
Problem Report
Problem Resolution
Problem Diagnosis
Option 4
Rate this question:
Quiz Review Timeline (Updated): Apr 25, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.