The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
High-level I. T. Support questions for candidates.
Questions and Answers
1.
Which command will display the assigned IP address of a network adapter installed on a Windows system?
A.
Ipadapter/all
B.
WinIP
C.
Ipconfig
D.
Configip
Correct Answer C. Ipconfig
Explanation The command "Ipconfig" is used to display the assigned IP address of a network adapter installed on a Windows system. This command provides detailed information about the network configuration, including the IP address, subnet mask, default gateway, and DNS servers. It is commonly used by network administrators and users to troubleshoot network connectivity issues and verify network settings.
Rate this question:
2.
What does an assigned IP address 169.254.0.12 indicate?
A.
The computer is configured with a static IP address.
B.
The computer is using a dial-up modem.
C.
The computer is being used as an Internet shared connection host.
D.
The computer has been configured to work with a Linux system.
E.
The computer is configured for DHCP and cannot connect to the DHCP server.
Correct Answer E. The computer is configured for DHCP and cannot connect to the DHCP server.
Explanation The assigned IP address 169.254.0.12 indicates that the computer is configured for DHCP and cannot connect to the DHCP server. This IP address falls within the range of Automatic Private IP Addressing (APIPA), which is used when a device is unable to obtain an IP address from a DHCP server. The APIPA range is specifically reserved for this purpose, allowing devices to assign themselves a unique IP address to enable basic network connectivity even without a DHCP server.
Rate this question:
3.
Which two are examples of wireless encryption? (Select two answers)
A.
VPN
B.
PPP
C.
WEP
D.
WPA
E.
MAC
Correct Answer(s) C. WEP D. WPA
Explanation WEP and WPA are both examples of wireless encryption. WEP (Wired Equivalent Privacy) is an older encryption standard that was commonly used in early Wi-Fi networks. However, it is now considered to be relatively weak and easily hackable. WPA (Wi-Fi Protected Access) is a more secure encryption protocol that was introduced as a replacement for WEP. It provides stronger encryption and improved security features, making it a better choice for securing wireless networks.
Rate this question:
4.
Which item is an example of a physical network address?
Explanation A MAC address is an example of a physical network address because it is a unique identifier assigned to a network interface controller (NIC) by the manufacturer. It is used to identify devices within a local area network (LAN) and is embedded in the hardware of the device. Unlike an IP address, which can change and is used for routing data over a network, a MAC address remains constant and is used for communication within the immediate network. The other options, such as a website address (www.zombo.com) and an email address ([email protected]), are examples of logical network addresses that are used for communication over the internet.
Rate this question:
5.
Which are the default network settings for a Windows computer?
A.
DHCP and configured as part of a workgroup
B.
DHCP and configured as a part of a domain
C.
Static IP address and configured as part of a workgroup
D.
Static IP address and configured as part of a domain
E.
There are no default network settings for a Windows computer
Correct Answer A. DHCP and configured as part of a workgroup
Explanation The default network settings for a Windows computer are DHCP and configured as part of a workgroup. DHCP stands for Dynamic Host Configuration Protocol, which automatically assigns IP addresses to devices on a network. Configuring the computer as part of a workgroup means that it is not connected to a domain, but rather a smaller network of computers. This allows for easier file sharing and collaboration within the workgroup.
Rate this question:
6.
What does the term "Map Network Drive" mean?
A.
Divide the host HDD into memory locations
B.
Create a shortcut to a network location
C.
Trace the path to the local area network gateway
D.
Send instructions to a user to access the remote local area network
E.
A schematic drawing of all network adapter locations on the network system
Correct Answer B. Create a shortcut to a network location
Explanation The term "Map Network Drive" refers to creating a shortcut to a network location. This allows the user to easily access files and folders on a remote network location as if it were a local drive on their computer. This shortcut makes it convenient to navigate and work with files stored on a network share without having to manually browse to the location every time.
Rate this question:
7.
What is the best example of a strong / secure password?
A.
Mysecretpassword
B.
MySpecialPa$$w0rd
C.
Xyz
D.
Keep this place private
E.
Password12345
Correct Answer B. MySpecialPa$$w0rd
Explanation The best example of a strong/secure password is "MySpecialPa$$w0rd" because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it harder for hackers to guess or crack the password.
Rate this question:
8.
Which is used to provide a centralize authentication method from remote locations?
A.
HTTPS
B.
FTP
C.
RADIUS
D.
DNS
E.
DHCP
Correct Answer C. RADIUS
Explanation RADIUS (Remote Authentication Dial-In User Service) is used to provide a centralized authentication method from remote locations. It is a networking protocol that enables remote access servers to communicate with a central server to authenticate and authorize users. RADIUS allows users to authenticate using a single set of credentials, regardless of their physical location, making it an ideal choice for providing centralized authentication in remote locations.
Rate this question:
9.
What is the purpose of a DNS server?
A.
To resolve MAC addresses to NetBIOS names
B.
To resolve domain names to IP addresses
C.
To resolve host names to NetBeui names
D.
To resolve IP addresses to MAC address
Correct Answer B. To resolve domain names to IP addresses
Explanation The purpose of a DNS server is to resolve domain names to IP addresses. When a user types a domain name into their web browser, the DNS server translates that domain name into the corresponding IP address of the server hosting the website. This allows the user's device to establish a connection with the correct server and access the desired website.
Rate this question:
10.
What is another name for a wireless security key?
A.
Passphrase
B.
Wirelessphrase
C.
WAPphrase
D.
Hexphrase
Correct Answer A. Passphrase
Explanation A wireless security key is commonly referred to as a passphrase. It is a sequence of characters, such as letters, numbers, and symbols, used to secure a wireless network. The passphrase is entered on devices that want to connect to the network, ensuring that only authorized users can access it.
Rate this question:
11.
Which is an example of a MAC address?
A.
192.168.000.001
B.
2001:0:4137:9e50:1418:fe9b
C.
00-1F-E2-57-DD-A6
D.
00010001:01100110:11110000:01010000
Correct Answer C. 00-1F-E2-57-DD-A6
Explanation The MAC address is a unique identifier assigned to network interfaces for communications on a network. It is represented as a series of six pairs of hexadecimal digits, separated by hyphens or colons. The given answer "00-1F-E2-57-DD-A6" is an example of a MAC address as it follows the correct format and includes hexadecimal digits. The other options provided are not MAC addresses.
Rate this question:
12.
Which type or connecter is commonly used for CAT6 cable?
A.
RJ11
B.
RJ45
C.
BNC
D.
SC
Correct Answer B. RJ45
Explanation RJ45 is the correct answer for the type of connector commonly used for CAT6 cable. RJ45 connectors are used for Ethernet networking and are designed to connect twisted pair cables. They have 8 pins and are commonly used for connecting computers, routers, and switches to a network. RJ11 connectors, on the other hand, are typically used for telephone lines and have 6 pins. BNC and SC connectors are not commonly used for CAT6 cables.
Rate this question:
13.
In any Active Directory forest there are five Operations Masters roles that must be assigned to one or more domain controllers. Which of the following answers correctly depicts these roles?
A.
Infrastructure Master, PDC Emulator, Relative ID master, SYSVOL, Root Domain
Correct Answer B. Schema Master, Domain Naming Master, Infrastructure Master, PDC Emulator, Relative ID master.
Explanation The correct answer is Schema Master, Domain Naming Master, Infrastructure Master, PDC Emulator, Relative ID master. These roles are essential for the functioning of an Active Directory forest. The Schema Master is responsible for managing the schema and making changes to it. The Domain Naming Master controls the addition and removal of domains in the forest. The Infrastructure Master ensures that cross-domain object references are properly maintained. The PDC Emulator handles time synchronization and is the authoritative time source for the domain. The Relative ID master allocates unique identifiers for objects created in a domain.
Rate this question:
14.
A hierarchical structure made up of multiple domains that trust each other is called a(n) _______?
A.
Forest
B.
Schema
C.
Site
D.
Organizational Unit
E.
Tree
Correct Answer E. Tree
Explanation A hierarchical structure made up of multiple domains that trust each other is called a "tree." In this structure, domains are organized in a parent-child relationship, with a single root domain at the top. The tree structure allows for the efficient management and administration of multiple domains within a network. Trust relationships between domains within the tree enable users to access resources across different domains while maintaining security and control.
Rate this question:
15.
An employee is promoted from one department to another, and you need to update their permissions for what they can access and do on the network. Where would you make these changes?
A.
Active Directory Schema snap-in
B.
Active Directory Sites and Services console
C.
Active Directory Users and Computers console
D.
Group Policy
Correct Answer C. Active Directory Users and Computers console
Explanation To update an employee's permissions for what they can access and do on the network after being promoted to another department, you would make these changes in the Active Directory Users and Computers console. This console allows administrators to manage user accounts, groups, and organizational units within the Active Directory domain. By accessing this console, you can modify the employee's permissions, granting or revoking access to network resources based on their new role and responsibilities.
Rate this question:
16.
What is the standard port for HTTP?
A.
443
B.
80
C.
25
D.
143
Correct Answer B. 80
Explanation The standard port for HTTP is 80. This is because HTTP (Hypertext Transfer Protocol) is the protocol used for transmitting web pages and other web content, and port 80 is the default port for HTTP communication. When a user enters a website's URL in their browser, the browser automatically sends an HTTP request to the server on port 80, and the server responds with the requested web page.
Rate this question:
17.
What is the standard port for HTTPS?
A.
80
B.
443
C.
25
D.
143
Correct Answer B. 443
Explanation The standard port for HTTPS is 443. HTTPS is the secure version of HTTP, which is the protocol used for transmitting data over the internet. The use of port 443 ensures that the communication between the client and the server is encrypted and secure. This port is commonly used for secure online transactions, such as online banking or shopping, where the protection of sensitive information is crucial.
Rate this question:
18.
What is the standard port for SMTP?
A.
441
B.
255
C.
25
D.
143
Correct Answer C. 25
Explanation SMTP (Simple Mail Transfer Protocol) is a standard protocol used for sending email messages between servers. The standard port for SMTP is 25. This port is used by mail servers to listen for incoming email messages. When a client sends an email, it connects to the server on port 25 and sends the message. Therefore, the correct answer is 25.
Rate this question:
19.
You start getting reports from users reporting that they cannot make or receive external phone calls, although calling extension to extension works both inside the building, as well as with other sites. What step would you do first?
A.
Reroute the external phone calls to another site
B.
Verify and recreate the Issue
C.
Identify how many users are impacted
D.
Reset the telco equipment in the data center
E.
Take a break to ponder what the problem is
Correct Answer B. Verify and recreate the Issue
Explanation The first step to take in this situation is to verify and recreate the issue. This involves investigating and confirming the problem reported by the users, as well as trying to replicate the issue to understand its cause. By doing this, you can gather more information about the problem and potentially identify any patterns or common factors that may be contributing to the issue. This step is crucial in troubleshooting and resolving the problem effectively.
Rate this question:
20.
We're installing a new phone system in our main location, and the phone system technician asks you for the network details for how to connect it to the phone systems in the other locations. For redundancy purposes, we have two internet connections coming into the building, one with a VPN connection to other sites, and one with an MPLS connection to the other sites. Since phone traffic is highly susceptible to latency and bandwidth issues, you direct the technician to send the voice traffic over the VPN connection.
A.
True
B.
False
Correct Answer B. False
Explanation The explanation for the answer "False" is that the technician should be directed to send the voice traffic over the MPLS connection, not the VPN connection. Phone traffic is highly sensitive to latency and bandwidth issues, and MPLS connections are typically more reliable and provide better quality of service for voice traffic compared to VPN connections. Therefore, directing the technician to use the MPLS connection would be the appropriate choice for ensuring optimal voice quality.
Rate this question:
21.
You set up a new root Windows Domain of XYZ.COM that has several child domains. Six months after launching, senior leadership decides that we need to rename the domain to XYZINC.COM. What will happen if you rename the root domain?
A.
When you rename the root domain server you will only have to rebuild the user accounts since the root domain holds the authentication (SAM) database
B.
When you rename the root domain server you will simply rename the child domain also
C.
When you rename the root domain server you will lose the entire network orphaning the child domains
D.
When you rename the root domain server you will not need to do anything else since domain names are inherited the child domains will acquire the new domain name
Correct Answer C. When you rename the root domain server you will lose the entire network orphaning the child domains