N10-004 Network+ (2009)

70 Questions | Attempts: 141
Share

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Practice Test Version 7.0 1-100


Questions and Answers
  • 1. 

    After adding a new cable segment to the network, the technician should:

    • A.

      Update the disaster recovery plan.

    • B.

      Document the changes in the business continuity plan.

    • C.

      Update the wiring schematics.

    • D.

      Create a new baseline document.

    Correct Answer
    C. Update the wiring schematics.
  • 2. 

    Which of the following devices can be used to breakup a broadcast domain?

    • A.

      Unmanaged switch

    • B.

      Router

    • C.

      DHCP server

    • D.

      Bridge

    Correct Answer
    B. Router
  • 3. 

    Which of the following is a secure way to transfer files from one device to another?

    • A.

      SFTP

    • B.

      SNMPv3

    • C.

      TFTP

    • D.

      FTP

    Correct Answer
    A. SFTP
  • 4. 

    An administrator has a networking closet on the first floor of a building with all of the network and communication equipment. However, the telephony provider installed the communications line in the basement. Which of the following needs to be extended to connect the line to the networking closet?

    • A.

      Smart jack

    • B.

      Demarcation point

    • C.

      Patch panel

    • D.

      Router

    Correct Answer
    C. Patch panel
  • 5. 

    Which of the following methods is used to provide access to a VPN?

    • A.

      IGP

    • B.

      PPTP

    • C.

      PPP

    • D.

      RAS

    Correct Answer
    B. PPTP
  • 6. 

    Two clients are directly connected via RJ-45 and CAT5e cables and communicating with IP. The first client sends data out of its RJ-45 on pins 1 and 2. On which of the following pins will the client expect to receive a response?

    • A.

      1 and 2

    • B.

      2 and 3

    • C.

      3 and 6

    • D.

      5 and 6

    Correct Answer
    C. 3 and 6
    Explanation
    The straight through RJ45 cable is commonly used to connect network cards with hubs on 10Base-T and 100Base-Tx networks. On network cards, pair 1-2 is the transmitter, and pair 3-6 is the receiver.

    Rate this question:

  • 7. 

    Which of the following network access security methods involves the analysis of a physical hardware addresses?

    • A.

      IP filtering

    • B.

      L2TP

    • C.

      MAC filtering

    • D.

      RAS

    Correct Answer
    C. MAC filtering
  • 8. 

    Which of the following is a direct advantage of having wireless standards?

    • A.

      Increased use of wireless spectrum

    • B.

      Greater device security

    • C.

      Interoperability between devices

    • D.

      Increased number of protocols can be used

    Correct Answer
    C. Interoperability between devices
  • 9. 

    Which of the following is a best practice when implementing a basic wireless network?

    • A.

      Disabling ESSID broadcast

    • B.

      Configuring encryption with a WEP key and labeling the key on the WAP

    • C.

      Adding two access points per area of service

    • D.

      Not configuring the ESSID point

    Correct Answer
    A. Disabling ESSID broadcast
  • 10. 

    Which of the following wiring standards would MOST likely be used to connect a single network node to a switch?

    • A.

      Loopback

    • B.

      Straight

    • C.

      Rollover

    • D.

      Crossover

    Correct Answer
    B. Straight
  • 11. 

    Which of the following is the maximum distance that CAT5 cable can run before experiencing db loss?

    • A.

      100 feet (30.5meters)

    • B.

      207 feet (63.1 meters)

    • C.

      328 feet (100 meters)

    • D.

      358 feet (109.12meters)

    Correct Answer
    C. 328 feet (100 meters)
  • 12. 

    A media converter is also known as a:

    • A.

      Transceiver.

    • B.

      Hub.

    • C.

      Modem.

    • D.

      Repeater.

    Correct Answer
    A. Transceiver.
  • 13. 

    An administrator installs a device that can detect and throttle peer-to-peer traffic. Which of the following device types is being installed?

    • A.

      Bandwidth shaper

    • B.

      Intrusion detection

    • C.

      Proxy server

    • D.

      Load balancer

    Correct Answer
    A. Bandwidth shaper
  • 14. 

    A technician arrives at a site and is troubleshooting an unfamiliar network. Which of the following steps should be done FIRST to diagnose the problem?

    • A.

      Escalate the problem to administrative technician.

    • B.

      Compare wiring schematics to industry standards.

    • C.

      Identify symptoms and draw a network diagram.

    • D.

      Use a port analyzer to determine network topology.

    Correct Answer
    C. Identify symptoms and draw a network diagram.
  • 15. 

    Which of the following commands can be used to find the MAC address of a connecting router?

    • A.

      Arp

    • B.

      Traceroute

    • C.

      Ping

    • D.

      Ping sweep

    Correct Answer
    A. Arp
  • 16. 

    Which of the following describes an email that is sent to users with web links that direct them to malicious websites?

    • A.

      Viruses

    • B.

      Phishing

    • C.

      Rogue access points

    • D.

      Man-in-the-middle

    Correct Answer
    B. Phishing
  • 17. 

    Which of the following tools would an administrator MOST likely use to determine the RJ-45 jack in a cubicle corresponds to a given RJ-45 jack in a patch panel?

    • A.

      Punch-down tool

    • B.

      Spectrum analyzer

    • C.

      Toner probe

    • D.

      Multimeter

    Correct Answer
    D. Multimeter
  • 18. 

    Which of the following network types is suitable for a 10 gigabyte core network using 10 meter (33 feet) fiber runs?

    • A.

      100Base-FX

    • B.

      10GBase-SR

    • C.

      10GBase-ER

    • D.

      10GBase-SW

    Correct Answer
    B. 10GBase-SR
  • 19. 

    An administrator is troubleshooting network connectivity and would like to view the path that packets are taking from workstation A to server 1. Which of the following command line tools is MOST appropriate to use?

    • A.

      Nslookup

    • B.

      Route

    • C.

      Traceroute

    • D.

      Ping

    Correct Answer
    C. Traceroute
  • 20. 

    Which of the following is the MOST appropriate policy for updating physical network diagrams?

    • A.

      Update whenever a connection is changed.

    • B.

      Update after new personnel are hired.

    • C.

      Update before regularly scheduled network audits.

    • D.

      Update after weekly network support team review.

    Correct Answer
    A. Update whenever a connection is changed.
  • 21. 

    After accepting a request packet on port 80, the firewall automatically allows the reply packet to pass. Which of the following terms BEST describes this firewall behavior?

    • A.

      Stateful inspection

    • B.

      Intrusion detection

    • C.

      Content filtering

    • D.

      Passive fingerprinting

    Correct Answer
    A. Stateful inspection
  • 22. 

    Which of the following connectivity issues is the MOST likely to result from bundling network cables tightly together?

    • A.

      Collision

    • B.

      Attenuation

    • C.

      Crosstalk

    • D.

      Open circuit

    Correct Answer
    C. Crosstalk
  • 23. 

    Which of the following ports does IPSec use, by default?

    • A.

      53

    • B.

      500

    • C.

      3389

    • D.

      8080

    Correct Answer
    B. 500
  • 24. 

    Which of the following can be used to find the location of a cable short?

    • A.

      Multimeter

    • B.

      CSU/DSU

    • C.

      Protocol analyzer

    • D.

      TDR

    Correct Answer
    D. TDR
    Explanation
    A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables).

    Rate this question:

  • 25. 

    Which of the following authentication mechanisms on a wireless network uses a separate network authentication server?

    • A.

      Kerberos

    • B.

      TKIP

    • C.

      RADIUS

    • D.

      WEP

    Correct Answer
    C. RADIUS
  • 26. 

    Which of the following physical connections allows for the BEST performance when connecting to a VPN server for a remote user?

    • A.

      Baseband

    • B.

      Broadband

    • C.

      Satellite

    • D.

      POTS

    Correct Answer
    B. Broadband
  • 27. 

    A company needs to perform stateful packet filtering on the core network. Which of the following network devices would BEST be suited to match this equipment?

    • A.

      Firewall

    • B.

      Proxy

    • C.

      Router ACLs

    • D.

      DHCP server

    Correct Answer
    A. Firewall
  • 28. 

    Which of the following are more secure file transfer alternatives to using FTP? (Select TWO).

    • A.

      SFTP

    • B.

      HTTP

    • C.

      SNTP

    • D.

      RCP

    • E.

      SCP

    Correct Answer
    A. SFTP
  • 29. 

    Two network switches need to be cabled together via copper cabling. These switches do not support MDI-X. Which of the following cabling will need to be used?

    • A.

      Straight

    • B.

      Rollover

    • C.

      Crossover

    • D.

      Loopback

    Correct Answer
    C. Crossover
  • 30. 

    A technician wishes to implement network authentication at the switch port level. Which of the following standards is designed to accomplish this?

    • A.

      802.1ad

    • B.

      TKIP

    • C.

      WPA2

    • D.

      802.1x

    Correct Answer
    D. 802.1x
  • 31. 

    Which of the following is a commonly used protocol for VoIP network communication?

    • A.

      SNMP

    • B.

      SSH

    • C.

      DNS

    • D.

      RTP

    Correct Answer
    D. RTP
  • 32. 

    Which of the following protocols uses port 143 by default?

    • A.

      NTP

    • B.

      SNMP

    • C.

      SSH

    • D.

      IMAP4

    Correct Answer
    D. IMAP4
  • 33. 

    A user calls network support and reports that email is not working. Which of the following should the technician do FIRST? Attempt to send a test email message to a known account at a remote facility and scan logs to see if it is sent.

    • A.

      Ask the user what operation was performed, what the expected result was, and what the actual result was, and what the actual result was.

    • B.

      Scan a list of open ports on the mail hub to scan for excessive traffic and escalate to network administrator if needed.

    • C.

      Attempt to send a test email message to a known account at a remote facility and scan logs to see if it is sent.

    • D.

      Determine which mail hub the user was connected to and perform a graceful restart.

    Correct Answer
    A. Ask the user what operation was performed, what the expected result was, and what the actual result was, and what the actual result was.
  • 34. 

    Which of the following can be used to set options such as TFTP server addresses, DNS search lists, and broadcast addresses on network clients and workstations?

    • A.

      Networkbridge

    • B.

      Layer 2 switch

    • C.

      DHCP server

    • D.

      Smart jack

    Correct Answer
    C. DHCP server
  • 35. 

    Which of the following exchanges routing information between two autonomous systems?

    • A.

      EGP

    • B.

      OSPF

    • C.

      IGP

    • D.

      EIGRP

    Correct Answer
    A. EGP
  • 36. 

    Which of the following is the GREATEST concern when using an orbital satellite WAN link?

    • A.

      Collisions

    • B.

      Latency

    • C.

      Duplex

    • D.

      Cable length

    Correct Answer
    B. Latency
  • 37. 

    An administrator needs to connect a fiber cable to a PC that only has a RJ-45 jack. Which of the following could be used to accomplish this connection?

    • A.

      Smart jack

    • B.

      Optical media

    • C.

      Token ring

    • D.

      Media converter

    Correct Answer
    D. Media converter
  • 38. 

    VLANs occur at which of the following layers of the OSI model?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    B. 2
  • 39. 

    Which of the following is the metric used for OSPF?

    • A.

      Latency

    • B.

      Cost

    • C.

      Bandwidth

    • D.

      Next hop

    Correct Answer
    C. Bandwidth
  • 40. 

    A computer is unable to access the corporate web server, which has an IP address of 172.30.0.100 and MAC address of 00-15-5d-22-43-8f. A command is run on the computer. Based on the output below, which of the following is the MOST likely cause of this problem? Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic 172.30.0.100 00-15-5d-22-44-8d dynamic 172.30.0.101 00-15-5d-72-7a-be dynamic

    • A.

      Reverse ARP failure

    • B.

      IP address conflict

    • C.

      MAC spoofing

    • D.

      Static ARP entries

    Correct Answer
    C. MAC spoofing
  • 41. 

    Two networks in different offices have been using DHCP set up for 192.168.0.0/24. After consolidating the officer's networks, they have run out of IP addresses. Which of the following is the MOST cost-effective solution?

    • A.

      Request another class C IP scope from the ISP.

    • B.

      Switch to static IP addressing.

    • C.

      Change the subnet mask to 255.255.254.0.

    • D.

      Add a router to connect both networks.

    Correct Answer
    C. Change the subnet mask to 255.255.254.0.
  • 42. 

    An administrator suspects that packets to an IP address are being dropped over the internet. Which of the following tools would be the BEST to determine the hop that is dropping the packets?

    • A.

      Ping

    • B.

      Nslookup

    • C.

      Traceroute

    • D.

      Netstat

    Correct Answer
    C. Traceroute
  • 43. 

    A workstation on the network can ping hosts on the network but it cannot ping any addresses on the internet. Other hosts on the same network can connect to the internet. Which of the following should the technician check?

    • A.

      The DNS server entries

    • B.

      The network card

    • C.

      The default gateway

    • D.

      The hosts file

    Correct Answer
    C. The default gateway
  • 44. 

    Which of the following commands would MOST likely be used to list the status of all established TCP connections on port 80?

    • A.

      Netstat -at

    • B.

      Netstat -aupn

    • C.

      Netstat -r

    • D.

      Netstat -v

    • E.

      Netstat -p tcp

    Correct Answer
    E. Netstat -p tcp
  • 45. 

    An administrator would like to evaluate network traffic. Which of the following tools should the administrator use?

    • A.

      OTDR

    • B.

      Protocol analyzer

    • C.

      Certifier

    • D.

      Toner probe

    Correct Answer
    B. Protocol analyzer
  • 46. 

    Which of the following ports would be commonly used for FTP traffic?

    • A.

      20

    • B.

      22

    • C.

      23

    • D.

      25

    Correct Answer
    A. 20
  • 47. 

    Which of the following device can connect multiple workstations, support VLANs, and function as a router?

    • A.

      Repeater

    • B.

      Switch

    • C.

      Hub

    • D.

      Multilayer switch

    Correct Answer
    D. Multilayer switch
  • 48. 

    Which of the following classes is the address 208.177.23.1?

    • A.

      Class A

    • B.

      Class B

    • C.

      Class C

    • D.

      Class D

    Correct Answer
    C. Class C
  • 49. 

    Which of the following specifications of 802.11 can operate simultaneously at 2.4GHz and 5GHz?

    • A.

      802.11a

    • B.

      802.11b

    • C.

      802.11g

    • D.

      802.11n

    Correct Answer
    D. 802.11n
  • 50. 

    Which of the following protocols could be used in a peer-to-peer topology?

    • A.

      NetBIOS

    • B.

      IGMP

    • C.

      RADIUS

    • D.

      TACACS+

    Correct Answer
    B. IGMP

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 24, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 28, 2011
    Quiz Created by
    GSrob88
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.