Network+ (N10-004) Quiz B

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rich70
R
Rich70
Community Contributor
Quizzes Created: 8 | Total Attempts: 1,964
Questions: 50 | Attempts: 316

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Questions and answers a from the N10-004 study guide


Questions and Answers
  • 1. 

    QUESTION NO: 51* When troubleshooting a network error, a technician using a laptop as a network sniffer can see all the communications on the network segment. Which off the following network devices is the laptop plugged into?

    • A.

      Gateway

    • B.

      Router

    • C.

      Hub

    • D.

      Basic switch

    Correct Answer
    C. Hub
    Explanation
    A hub is a network device that allows multiple devices to connect and communicate with each other. It operates at the physical layer of the network and does not perform any intelligent routing or filtering of network traffic. When a laptop is plugged into a hub, it can capture and analyze all the communications on the network segment because the hub broadcasts all incoming traffic to all connected devices. This makes it an effective tool for network troubleshooting as it allows the technician to monitor and analyze network traffic for any errors or issues.

    Rate this question:

  • 2. 

    -QUESTION NO: 52* Which of the following could be installed to improve network performance when accessing Internet websites?

    • A.

      Caching engine

    • B.

      Traffic shaping

    • C.

      Load balancing

    • D.

      Firewall

    Correct Answer
    A. Caching engine
    Explanation
    A caching engine could be installed to improve network performance when accessing Internet websites. A caching engine stores copies of frequently accessed web pages or files, allowing them to be served quickly to users without having to retrieve them from the original source each time. This reduces the amount of bandwidth required and improves response times for users accessing the websites.

    Rate this question:

  • 3. 

    QUESTION NO: 53 Which of the following WAN layer two protocols would be BEST suited for a full mesh topology?

    • A.

      PPP

    • B.

      ATM

    • C.

      MPLS

    • D.

      Frame-relay

    Correct Answer
    C. MPLS
    Explanation
    MPLS (Multiprotocol Label Switching) would be the best suited WAN layer two protocol for a full mesh topology. MPLS uses labels to efficiently route data packets across a network, allowing for a more flexible and scalable network architecture. In a full mesh topology, each network node is connected to every other node, and MPLS can easily handle the high volume of traffic and complex routing required in this type of setup. Additionally, MPLS provides traffic engineering capabilities, allowing for better control and optimization of network resources.

    Rate this question:

  • 4. 

    QUESTION NO: 54 A network administrator is configuring a network with a dynamic routing protocol. Which of the following would support equal cost load balancing and have all routers contain the same topology view?

    • A.

      OSPF

    • B.

      IGRP

    • C.

      RIP

    • D.

      BGP

    Correct Answer
    A. OSPF
    Explanation
    OSPF (Open Shortest Path First) is a dynamic routing protocol that supports equal cost load balancing and ensures that all routers in the network have the same topology view. OSPF calculates the shortest path to a destination using a metric called cost, and if there are multiple paths with the same cost, it can distribute the traffic evenly across those paths. This allows for efficient utilization of network resources and improves overall network performance. IGRP, RIP, and BGP do not support equal cost load balancing or guarantee the same topology view on all routers.

    Rate this question:

  • 5. 

    QUESTION NO: 55 Which of the following is the maximum amount of wires that fit into a RJ-l1 connector?

    • A.

      2

    • B.

      8

    • C.

      4

    • D.

      6

    Correct Answer
    C. 4
    Explanation
    The maximum amount of wires that fit into a RJ-11 connector is 4. This type of connector is commonly used for telephone connections and has 4 pins or contacts that correspond to the 4 wires inside the cable. Each wire is responsible for carrying a specific signal or electrical current, allowing for communication between devices. Therefore, the correct answer is 4.

    Rate this question:

  • 6. 

    QUESTION NO: 56 Which of the following components in a structured wiring system supports an Ethernet network?

    • A.

      110 block

    • B.

      66 block

    • C.

      25 pair cable

    • D.

      Smart jack

    Correct Answer
    A. 110 block
    Explanation
    The 110 block is a component in a structured wiring system that supports an Ethernet network. It is a type of punch-down block used to connect and terminate network cables. The 110 block provides a reliable and organized way to distribute Ethernet connections throughout a building or network infrastructure. It allows for easy installation and maintenance of Ethernet connections, making it a crucial component in a structured wiring system for supporting an Ethernet network.

    Rate this question:

  • 7. 

    QUESTION NO: 57 Which of the following is the maximum CAT3 length acceptable for a horizontal cross-connect?

    • A.

      100 meters (328 feet)

    • B.

      125 meters (410 feet)

    • C.

      256 meters (840 feet)

    • D.

      328 meters (1076 feet)

    Correct Answer
    A. 100 meters (328 feet)
    Explanation
    The maximum CAT3 length acceptable for a horizontal cross-connect is 100 meters (328 feet). This is the maximum distance that can be achieved without experiencing significant signal loss or degradation.

    Rate this question:

  • 8. 

    QUESTION NO: 58 A technician has gathered information on a network issue, and has determined the affected area. Which of the following would be the NEXT step in resolving tills issue?

    • A.

      The technician should test the best solution for the issue.

    • B.

      The technician should check to see if there have been any recent changes to this area of the network.

    • C.

      The technician should consider any negative impacts to the network that nlight be caused by a solution.

    • D.

      The technician should implement what the is the best solution for the issue.

    Correct Answer
    B. The technician should check to see if there have been any recent changes to this area of the network.
    Explanation
    The next step in resolving the network issue would be for the technician to check if there have been any recent changes to the affected area of the network. This is important because recent changes could potentially be the cause of the issue. By identifying any recent changes, the technician can narrow down the possible causes and focus on finding a solution that addresses those specific changes. This step helps in troubleshooting and resolving the issue effectively.

    Rate this question:

  • 9. 

    QUESTION NO: 59* A company's web selver is located in a climate controlled enviromllent, with multiple power supplies, and a UPS to provide the maximum uptime available. Which of the following would allow the company the BEST opportunity to increase network uptime for the web selver?

    • A.

      Upgrade all switches to Gigabit speed

    • B.

      Install an additional Router

    • C.

      Upgrade the outbound NIC to a gigabit card

    • D.

      Install additional NICs

    Correct Answer
    D. Install additional NICs
    Explanation
    Installing additional NICs would provide the company with the best opportunity to increase network uptime for the web server. By adding more network interface cards, the company can distribute the network traffic across multiple cards, reducing the load on each card and improving overall network performance and reliability. This would help to ensure that the web server remains accessible and operational, even during high traffic periods or in the event of a failure on one of the NICs.

    Rate this question:

  • 10. 

    QUESTION NO: 60* Which of the following devices will segment a network and help cut down on network congestion?

    • A.

      Switch

    • B.

      Repeater

    • C.

      Gateway

    • D.

      Hub

    Correct Answer
    A. Switch
    Explanation
    A switch is a device that operates at the data link layer of the OSI model and is used to connect multiple devices on a network. Unlike a hub, a switch can segment a network by creating separate collision domains for each connected device. This segmentation helps to reduce network congestion by preventing unnecessary traffic from being transmitted to all devices on the network. Therefore, a switch is the correct answer as it can effectively cut down on network congestion.

    Rate this question:

  • 11. 

    QUESTION NO: 61 Which of the following protocols is used in a ping command?

    • A.

      IGMP

    • B.

      ICMP

    • C.

      SMTP

    • D.

      TFTP

    Correct Answer
    B. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is used in a ping command. Ping is a network diagnostic tool used to test the reachability of a host on an IP network. It sends ICMP Echo Request messages to the destination host and waits for ICMP Echo Reply messages to be returned. ICMP is responsible for reporting errors and providing feedback about network problems, making it the appropriate protocol for the ping command.

    Rate this question:

  • 12. 

    QUESTION NO: 62 Which of the following would allow for encrypted login credentials to be sent over the network?

    • A.

      Telnet

    • B.

      FTP

    • C.

      SSH

    • D.

      HTTP

    Correct Answer
    C. SSH
    Explanation
    SSH (Secure Shell) is a network protocol that provides a secure way to access and manage remote devices over an unsecured network. It encrypts login credentials and other data transmitted between the client and the server, ensuring that sensitive information cannot be intercepted or accessed by unauthorized individuals. Telnet, FTP, and HTTP, on the other hand, do not provide encryption for login credentials, making them less secure options for transmitting sensitive information over a network.

    Rate this question:

  • 13. 

    QUESTION NO: 63* Which of the following is the maximum hop count for RIPv2?

    • A.

      18

    • B.

      10

    • C.

      16

    • D.

      17

    Correct Answer
    C. 16
    Explanation
    The maximum hop count for RIPv2 is 16. This means that a RIP packet can only be forwarded through a maximum of 16 routers before it is considered unreachable. Beyond this hop count, the packet is dropped. This hop count limit helps prevent routing loops and ensures efficient routing within a network.

    Rate this question:

  • 14. 

    QUESTION NO: 64 Which of the following is used to simplify the process of setting up a network and the administration of the network?

    • A.

      ZEROCONF

    • B.

      SNMP

    • C.

      WlNS

    • D.

      DNS

    Correct Answer
    A. ZEROCONF
    Explanation
    ZEROCONF, which stands for Zero Configuration Networking, is used to simplify the process of setting up a network and the administration of the network. It allows devices to automatically configure themselves and connect to a network without the need for manual configuration or the use of additional protocols. With ZEROCONF, devices can obtain IP addresses, discover services, and establish connections with other devices on the network without any user intervention. This greatly simplifies the network setup process and reduces the administrative burden of managing a network.

    Rate this question:

  • 15. 

    QUESTION NO: 65* When terminating a CAT5e cable a technician terminates the 568A end and the 568B end. The resulting cable IS:

    • A.

      Astraight-through cable.

    • B.

      Non-functional

    • C.

      A crossover cable.

    • D.

      Capable of 10GBaseT.

    Correct Answer
    C. A crossover cable.
    Explanation
    When terminating a CAT5e cable, the 568A and 568B standards are two different wiring schemes used for terminating the cable. The 568A standard uses a specific color code for each wire, while the 568B standard uses a different color code. When terminating one end of the cable using the 568A standard and the other end using the 568B standard, it creates a crossover cable. A crossover cable is used to connect two devices of the same type, such as two computers, without the need for a switch or hub.

    Rate this question:

  • 16. 

    QUESTION NO: 66 Which of the following is the maximum CAT5 length acceptable for a horizontal cross-connect?

    • A.

      500 feet (152 meters)

    • B.

      100 feet (30.5 meters)

    • C.

      336 feet (102 meters)

    • D.

      328 feet (100 meters)

    Correct Answer
    D. 328 feet (100 meters)
    Explanation
    The maximum CAT5 length acceptable for a horizontal cross-connect is 328 feet (100 meters). This is because CAT5 cables are designed to transmit data reliably up to a maximum distance of 100 meters. Beyond this distance, signal degradation and loss may occur, leading to poor network performance. Therefore, it is important to adhere to this maximum length to ensure optimal network connectivity and data transmission.

    Rate this question:

  • 17. 

    QUESTION NO: 67* Some users are unable to access the network. A teclmician determines that the computers that were unable to access the network have an IP address of 169.254.0.1. Which of the following network services should the technician check?

    • A.

      TFTP

    • B.

      DNS

    • C.

      BOOTP

    • D.

      DHCP

    Correct Answer
    D. DHCP
    Explanation
    The technician should check the DHCP (Dynamic Host Configuration Protocol) service. The IP address 169.254.0.1 is an Automatic Private IP Address (APIPA) that is assigned when a device is unable to obtain an IP address from a DHCP server. This suggests that the computers are not receiving the necessary network configuration information from the DHCP server, so checking the DHCP service would be the appropriate step to resolve the issue.

    Rate this question:

  • 18. 

    QUESTION NO: 68 A technician is troubleshooting a workstation that is connected to a star network. The technician determines that the workstation is unable to connect to the network resources. Which of the following should be checked FIRST?

    • A.

      The link lights on the server network card

    • B.

      The link lights on the network card

    • C.

      The link lights on the switch

    • D.

      The installed network drivers

    Correct Answer
    B. The link lights on the network card
    Explanation
    The link lights on the network card should be checked first because they indicate whether the workstation is physically connected to the network. If the link lights are not lit, it could indicate a loose or disconnected cable, a faulty network card, or a problem with the network port on the switch. Checking the link lights helps to identify any physical connectivity issues before troubleshooting other potential causes such as network drivers or server network card.

    Rate this question:

  • 19. 

    QUESTION NO: 69* An administrator is in charge of several remote servers in Japan. Users call and report they cannot connect to the company's resources located on those servers. Which of the following commands would allow the administrator to verify the servers are running?

    • A.

      Nbtstat

    • B.

      Ping

    • C.

      Telnet

    • D.

      Netstat

    Correct Answer
    B. Ping
    Explanation
    The correct answer is "ping". The ping command is used to test the connectivity between two devices over a network. By sending a ping request to the remote servers in Japan, the administrator can verify if the servers are running and if they are reachable from the users' locations. If the ping request is successful, it means that the servers are up and running.

    Rate this question:

  • 20. 

    QUESTION NO: 70 Which of the following does an administrator need to be aware of when installing a wireless network in a building with multiple floors?

    • A.

      Frequency configuration

    • B.

      SSID naming

    • C.

      Channel overlap

    • D.

      Encryption algorithm

    Correct Answer
    C. Channel overlap
    Explanation
    When installing a wireless network in a building with multiple floors, an administrator needs to be aware of channel overlap. Channel overlap refers to the interference that occurs when multiple wireless networks in close proximity use the same or overlapping channels. This can result in decreased performance and slower network speeds. To avoid channel overlap, the administrator should carefully select and configure the channels for each wireless network in the building, ensuring that they do not overlap with each other.

    Rate this question:

  • 21. 

    QUESTION NO: 71 A network technician is contacted about a system that is unable to connect to a file server. After investigating the problem thoroughly the technician is able to successfully test and resolve the issue. Which of the following is the NEXT step the technician should take?

    • A.

      Document the solution.

    • B.

      Create an action plan.

    • C.

      Reboot the selver.

    • D.

      Identify the problem.

    Correct Answer
    A. Document the solution.
    Explanation
    After successfully resolving the issue, the next step the technician should take is to document the solution. This is important for future reference and troubleshooting purposes. By documenting the solution, the technician can create a record of the problem and its resolution, which can be helpful if the issue reoccurs or if another technician needs to troubleshoot a similar problem in the future. Additionally, documenting the solution can also help in identifying any patterns or trends in network issues, allowing for proactive measures to be taken to prevent similar problems from happening again.

    Rate this question:

  • 22. 

    QUESTION NO: 72* Which of the following is implemented on multiple switches to allow altemate paths?

    • A.

      Spanning tree

    • B.

      VLAN

    • C.

      Port authentication

    • D.

      Port mirroring

    Correct Answer
    A. Spanning tree
    Explanation
    Spanning tree protocol is implemented on multiple switches to allow alternate paths. It is used to prevent loops in a network by creating a logical tree structure. Spanning tree protocol determines the most efficient path for data transmission and blocks redundant paths to avoid network congestion and broadcast storms. By allowing alternate paths, spanning tree protocol ensures network resilience and redundancy, enabling continuous network connectivity even if one path fails.

    Rate this question:

  • 23. 

    QUESTION NO: 73* A small  office home office (*SOHO)wireless user reports their new laptop is 802.11 band 802.11g capable but will not wirelessly connect faster than 11Mbps. Which of the following is the cause of the problem?

    • A.

      The laptop wireless card is running on a different frequency.

    • B.

      The wireless router needs a firmware update

    • C.

      The wireless router is 802.11b only

    • D.

      The wireless router is defective.

    Correct Answer
    C. The wireless router is 802.11b only
    Explanation
    The correct answer is that the wireless router is 802.11b only. This means that the router is only capable of supporting the slower 802.11b wireless standard, which has a maximum speed of 11Mbps. Since the laptop is 802.11g capable, which has a maximum speed of 54Mbps, it is not able to connect at its full potential because the router is limiting the speed.

    Rate this question:

  • 24. 

    QUESTION NO: 74 An automated application capable of infecting computers without user interaction would be described as which of the following?

    • A.

      A social engineering attack

    • B.

      A Trojan

    • C.

      A smurf attack

    • D.

      A worm

    Correct Answer
    D. A worm
    Explanation
    A worm is a type of malware that can self-replicate and spread across computer networks without any user interaction. Unlike viruses, worms do not need to attach themselves to a host file or program in order to spread. They can exploit vulnerabilities in operating systems or network protocols to infect computers and propagate themselves. Therefore, an automated application capable of infecting computers without user interaction would be described as a worm.

    Rate this question:

  • 25. 

    QUESTION NO: 75* Which of the following is a valid IP address in the public addressing scheme?

    • A.

      172.20.10.1

    • B.

      10.20.1.1

    • C.

      168.192.10.1

    • D.

      233.10.20.1

    Correct Answer
    C. 168.192.10.1
    Explanation
    The IP address 168.192.10.1 is a valid IP address in the public addressing scheme. It follows the standard format of four numbers separated by periods, with each number ranging from 0 to 255. This IP address falls within the range of valid public IP addresses and can be used to identify a device on a public network.

    Rate this question:

  • 26. 

    QUESTION NO: 76* A system administrator is troubleshooting an application that is terminating frequently. Which of the following utilities can be used to determine the problem?

    • A.

      Port scanner

    • B.

      History log

    • C.

      DNS log

    • D.

      Application log

    Correct Answer
    D. Application log
    Explanation
    The application log is the correct answer because it is a utility that records events and errors that occur within an application. By reviewing the application log, the system administrator can identify any patterns or specific errors that may be causing the application to terminate frequently. This log can provide valuable information for troubleshooting and resolving the issue.

    Rate this question:

  • 27. 

    QUESTION NO: 77 While analyzing the contents of the IP routing table in a router, the administrator notices the following routes in the table: PrefixNext-Hop IPlnterface 192.168.1.0 /24172.16.31.1 Ethernet0 192.168.2.0 /24172.16.31.1 Ethernet0 172.16.31.0 /24 Directly Connected Ethernet0 0.0.0.0/0172.16.31.2Ethernet0 Which of the following BEST describes what would occur if a packet from 192.168.1.4 were sent to 192.168.3.4?

    • A.

      The packet will be dropped as there is no matching route in the IP routing table to reach the destination network

    • B.

      An ICMP network unreachable message will be sent to 192.168.1.4

    • C.

      The packet will be forwarded to 172.16.31.2

    • D.

      The packet will be fOlwarded to 172.16.31.1 since the source IP address is in the 192.168.1.0/24 range

    Correct Answer
    C. The packet will be forwarded to 172.16.31.2
    Explanation
    The given IP routing table shows that there is no specific route for the destination network 192.168.3.0/24. However, there is a default route (0.0.0.0/0) pointing to the next-hop IP address 172.16.31.2. Therefore, if a packet from 192.168.1.4 is sent to 192.168.3.4, it will be forwarded to the default route and reach the destination through the next-hop IP address 172.16.31.2.

    Rate this question:

  • 28. 

    QUESTION NO: 78* Which of the following wireless standards allows for increased bandwidth by allowing channel bonding?

    • A.

      802.11g

    • B.

      802.11a

    • C.

      802.11b

    • D.

      802.11n

    Correct Answer
    D. 802.11n
    Explanation
    802.11n is the correct answer because it allows for increased bandwidth by allowing channel bonding. Channel bonding is a technique where multiple channels are combined to increase the overall bandwidth. This allows for faster data transfer rates and improved performance in wireless networks. In contrast, 802.11g, 802.11a, and 802.11b do not support channel bonding and therefore do not provide the same level of increased bandwidth as 802.11n.

    Rate this question:

  • 29. 

    QUESTION NO: 79 If static addressing is not configured and the DHCP server for a network is unavailable, which of the following will a PC use to configme its IP address?

    • A.

      APIPA

    • B.

      BOOTP

    • C.

      DNS

    • D.

      TFTP

    Correct Answer
    A. APIPA
    Explanation
    If static addressing is not configured and the DHCP server for a network is unavailable, a PC will use APIPA (Automatic Private IP Addressing) to configure its IP address. APIPA allows a device to automatically assign itself a unique IP address within the range of 169.254.0.1 to 169.254.255.254 when it cannot obtain an IP address from a DHCP server. This allows the device to still have network connectivity and communicate with other devices on the same network segment.

    Rate this question:

  • 30. 

    QUESTION NO: 80 A technician is creating a crossover cable to connect two devices. Which of the following pins would be different between connector A and connector B?

    • A.

      Pin4, Pin5, Pin7, Pin8

    • B.

      Pin6, Pin7, Pin8, Pin1

    • C.

      Pin4, Pin5, Pin1 , Pin2

    • D.

      Pin1 , Pin2, Pin3, Pin6

    Correct Answer
    D. Pin1 , Pin2, Pin3, Pin6
    Explanation
    The correct answer is Pin1, Pin2, Pin3, Pin6. In a crossover cable, the pins that are different between connector A and connector B are the transmit data (TX) and receive data (RX) pins. In connector A, Pin1 is TX, Pin2 is RX, Pin3 is not used, and Pin6 is not used. In connector B, Pin1 is RX, Pin2 is TX, Pin3 is not used, and Pin6 is not used. This configuration allows for the devices to transmit and receive data correctly when connected to each other.

    Rate this question:

  • 31. 

    QUESTION NO: 81 A network technician is troubleshooting a network issue that has just been reported. Which of the following troubleshooting steps should the technician take FIRST to help resolve this issue?

    • A.

      Record what steps should be taken to resolve the issue.

    • B.

      Ask the user who reported the issue what past documentation they have.

    • C.

      Ask the user who reported the issue to explain the symptoms in detail.

    • D.

      Record the solution in the appropriate logs for future use.

    Correct Answer
    C. Ask the user who reported the issue to explain the symptoms in detail.
    Explanation
    The first step in troubleshooting a network issue is to gather information about the problem. By asking the user who reported the issue to explain the symptoms in detail, the technician can gain a better understanding of the problem and potentially identify the cause. This information will be crucial in determining the appropriate steps to resolve the issue.

    Rate this question:

  • 32. 

    QUESTION NO: 82 * A user has been transferred from the accounting team to the human resources team. The user can only print to the accounting teams printer and cannot print to the human resources teams printer. Which of the following is the cause of the problem?

    • A.

      Wrong gateway

    • B.

      Wrong DNS

    • C.

      Wrong host file

    • D.

      WrongVLAN

    Correct Answer
    D. WrongVLAN
    Explanation
    The cause of the problem is that the user is on the wrong VLAN. VLANs are used to separate network traffic and restrict access to certain resources. In this case, the user's computer is still configured to be on the accounting team's VLAN, which is why they can only print to the accounting team's printer. To resolve the issue, the user's computer needs to be moved to the correct VLAN for the human resources team.

    Rate this question:

  • 33. 

    QUESTION NO: 83 Which of the following protocols allows secure access to a VPN?

    • A.

      PPP

    • B.

      SLIP

    • C.

      PPPoE

    • D.

      PPTP

    Correct Answer
    D. PPTP
    Explanation
    PPTP (Point-to-Point Tunneling Protocol) allows secure access to a VPN (Virtual Private Network). It is a protocol that enables the creation of secure tunnels over the internet, providing encrypted communication between the client and the server. PPTP is widely used as it is easy to set up and provides a good level of security for most applications. It is supported by various operating systems and devices, making it a popular choice for VPN connections.

    Rate this question:

  • 34. 

    QUESTION NO: 84* Which of the following devices uses the IEEE 1394 standard?

    • A.

      FireWire

    • B.

      USB 2.0

    • C.

      ISCSI

    • D.

      Parallel

    Correct Answer
    A. FireWire
    Explanation
    The correct answer is FireWire. FireWire is a high-speed serial bus interface that is used for connecting devices such as computers, digital cameras, and external hard drives. It is also known as IEEE 1394 or i.LINK. USB 2.0 is another type of interface, but it is not the same as FireWire. iSCSI is a network protocol used for storage area networks, and Parallel is a type of interface commonly used for connecting printers.

    Rate this question:

  • 35. 

    QUESTION NO: 85* Which of the following is the maximum segment distance ofa IOOBase-FX network?

    • A.

      100 meters (328 feet)

    • B.

      2,000 meters (6,561 feet)

    • C.

      1,024 meters (3 ,359 feet)

    • D.

      1,023 meters (3 ,356 feet)

    Correct Answer
    B. 2,000 meters (6,561 feet)
    Explanation
    The maximum segment distance of a 100Base-FX network is 2,000 meters (6,561 feet). This means that the network can span up to 2,000 meters without any signal loss or degradation. It is important to note that this distance refers to the maximum length of a single segment or cable in the network.

    Rate this question:

  • 36. 

    QUESTION NO: 86 Which of the following devices is used to extend the signal strength on a network segment?

    • A.

      Repeater

    • B.

      NIC

    • C.

      Transceiver

    • D.

      Modem

    Correct Answer
    A. Repeater
    Explanation
    A repeater is used to extend the signal strength on a network segment. It receives a weak signal, amplifies it, and then retransmits it, effectively extending the range of the network. A repeater is commonly used in situations where the distance between network devices is too large for the signal to reach without degradation. It is a simple device that operates at the physical layer of the network, boosting the signal to overcome attenuation and maintain signal integrity.

    Rate this question:

  • 37. 

    QUESTION NO: 87 Which of the following remote access solutions allows the LEAST connection overhead?

    • A.

      L2TPVPN

    • B.

      IPSecVPN

    • C.

      SSL VPN

    • D.

      PPTP VPN

    Correct Answer
    C. SSL VPN
    Explanation
    SSL VPN allows the least connection overhead compared to the other options listed. This is because SSL VPN uses the Secure Sockets Layer (SSL) protocol to establish a secure encrypted connection between the remote user and the network, without the need for additional protocols or encryption methods like L2TPVPN, IPSecVPN, or PPTP VPN. SSL VPNs are known for their simplicity and ease of use, making them a popular choice for remote access solutions.

    Rate this question:

  • 38. 

    QUESTION NO: 88 A technician is at a small facility that has five computers connected to a central switch and accessing a single server for file and print sharing. One computer becomes unable to connect to the network, while the other four are still connecting properly. Which of the following could be causing the computer to not connect to the network?

    • A.

      The server has failed.

    • B.

      The computers OS needs to be updated.

    • C.

      The switch has failed.

    • D.

      The NIC has failed.

    Correct Answer
    D. The NIC has failed.
    Explanation
    The most likely explanation for the computer's inability to connect to the network is that the NIC (Network Interface Card) has failed. The NIC is responsible for connecting the computer to the network, and if it is not functioning properly, the computer will not be able to establish a network connection. The fact that the other four computers are still connecting properly suggests that the issue is specific to the one computer, rather than a problem with the server or switch. Additionally, the question does not mention any need for OS updates, further supporting the likelihood of a failed NIC.

    Rate this question:

  • 39. 

    QUESTION NO: 89 After increasing the interface MTU of a branch router to 1600 bytes, a network administrator is no longer able to send packets with a size of 1501 bytes. Which of the following is the cause?

    • A.

      The WAN link does not supp011 frames over 1500 bytes in size.

    • B.

      The branch router cannot process frames larger than 1500 bytes.

    • C.

      The router at the other end of the WAN link is configured with an MTU of 1500.

    • D.

      The frames take too long to send causing collisions with other devices attempting to send traffic.

    Correct Answer
    C. The router at the other end of the WAN link is configured with an MTU of 1500.
    Explanation
    The cause of the issue is that the router at the other end of the WAN link is configured with an MTU of 1500. This means that the maximum size of packets that can be transmitted over the link is limited to 1500 bytes. Therefore, when the interface MTU of the branch router is increased to 1600 bytes, it is no longer able to send packets with a size of 1501 bytes because they exceed the maximum allowed size set by the router at the other end of the link.

    Rate this question:

  • 40. 

    QUESTION NO: 90 Users on the network can no longer access a custom application that uses TCP 8090 hosted on the DMZ. A technician has verified that the firewall is permitting the TCP port. Which of the following commands would verify the server is still accepting connections on TCP 8090?

    • A.

      Netstat

    • B.

      Ipconfig

    • C.

      Telnet

    • D.

      Nslookup

    Correct Answer
    A. Netstat
    Explanation
    The netstat command is used to display active network connections and listening ports on a server. By running netstat, the technician can check if the server is still accepting connections on TCP port 8090. This will help determine if the issue lies with the server or elsewhere in the network.

    Rate this question:

  • 41. 

    QUESTION NO: 91 Which of the following is commonly used to test fiber connectivity?

    • A.

      OTDR

    • B.

      Toner probe

    • C.

      Butt set

    • D.

      Multimeter

    Correct Answer
    A. OTDR
    Explanation
    OTDR (Optical Time Domain Reflectometer) is commonly used to test fiber connectivity. It is a device that sends a pulse of light into the fiber and measures the reflections and losses along the fiber. This allows technicians to identify any breaks, bends, or other issues in the fiber optic cable. OTDRs are specifically designed for testing and troubleshooting fiber optic networks, making them the most appropriate choice for testing fiber connectivity.

    Rate this question:

  • 42. 

    QUESTION NO: 92* Which of the following protocols transmits using UDP ports?

    • A.

      RIPv2

    • B.

      HTTP

    • C.

      HTTPS

    • D.

      TFTP

    Correct Answer
    D. TFTP
    Explanation
    TFTP (Trivial File Transfer Protocol) is the correct answer because it is a simple file transfer protocol that uses UDP (User Datagram Protocol) ports for transmission. UDP is a connectionless protocol that does not provide reliable delivery of data, making it suitable for applications like TFTP where speed is prioritized over reliability. RIPv2, HTTP, and HTTPS, on the other hand, use TCP (Transmission Control Protocol) ports for transmission, which provides reliable delivery of data.

    Rate this question:

  • 43. 

    QUESTION NO: 93 Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?

    • A.

      OSPF

    • B.

      IS-IS

    • C.

      BGP

    • D.

      EIGRP

    Correct Answer
    C. BGP
    Explanation
    BGP (Border Gateway Protocol) is the routing protocol that uses AS-Path as one of the methods to build the routing table. AS-Path is a path attribute in BGP that lists the autonomous systems (AS) through which a route has passed. By examining the AS-Path, BGP routers can determine the best path for routing traffic between autonomous systems. This allows BGP to make informed routing decisions and build an efficient routing table.

    Rate this question:

  • 44. 

    QUESTION NO: 94* A network technician wants a server to have fault tolerance. Which of the following would be the MOST cost effective solution?

    • A.

      Install two NICs for teaming.

    • B.

      Install two switches.

    • C.

      Install a single fiber NIC

    • D.

      Install a single router.

    Correct Answer
    A. Install two NICs for teaming.
    Explanation
    Installing two NICs for teaming would be the most cost-effective solution for achieving fault tolerance. By teaming the NICs, the server can have redundancy and load balancing, ensuring that if one NIC fails, the other can take over seamlessly. This solution does not require additional hardware like switches, fiber NICs, or routers, which can be more expensive.

    Rate this question:

  • 45. 

    QUESTION NO: 95 An employee is having issues accessing shared resources on a file server. Which of the following troubleshooting steps should the technician take FIRST?

    • A.

      Document the problem

    • B.

      Search the intemet for the problem

    • C.

      Test the results

    • D.

      Identify the symptoms

    Correct Answer
    D. Identify the symptoms
    Explanation
    The technician should first identify the symptoms of the issue the employee is experiencing. By understanding the specific symptoms, such as error messages or specific files that cannot be accessed, the technician can narrow down the potential causes of the problem and determine the appropriate troubleshooting steps to take. This initial step is important in order to gather necessary information and avoid wasting time on unnecessary troubleshooting actions.

    Rate this question:

  • 46. 

    QUESTION NO: 96 A user states that they have decreased signal strength on their wireless connection. They have been using the wireless network previously without problems and the network configuration has not been changed. Which of the following is MOST likely the cause of the degraded signal?

    • A.

      Incorrect encryption

    • B.

      Standards mismatch

    • C.

      Lncorrect SSID

    • D.

      Environmental factors

    Correct Answer
    D. Environmental factors
    Explanation
    Environmental factors are the most likely cause of the decreased signal strength. This could include physical obstructions such as walls or furniture blocking the signal, interference from other electronic devices, or distance from the wireless access point. Since the user states that the network configuration has not been changed and they have been using the network without problems before, it is unlikely that incorrect encryption, standards mismatch, or incorrect SSID are the cause.

    Rate this question:

  • 47. 

    QUESTION NO: 97* A user reports their wireless 802.IIg Intemet connection is intenllittently disrupted. Which of the following is the cause of the problem?

    • A.

      Infrared printer

    • B.

      Cordless phone

    • C.

      Cell phone

    • D.

      Incandescent light

    Correct Answer
    B. Cordless phone
    Explanation
    The cordless phone is the cause of the problem because it operates on the same frequency as the wireless 802.IIg Internet connection, causing interference and disruptions in the connection.

    Rate this question:

  • 48. 

    QUESTION NO: 98* Which of the following will list the destination MAC addresses?

    • A.

      Arp

    • B.

      Ping

    • C.

      Dig

    • D.

      Nbtstat

    Correct Answer
    A. Arp
    Explanation
    The correct answer is "arp". The "arp" command in networking is used to display or modify the Address Resolution Protocol (ARP) cache. The ARP cache contains information about the mapping between IP addresses and MAC addresses. By using the "arp" command, one can view the destination MAC addresses associated with specific IP addresses. Therefore, "arp" is the correct choice to list the destination MAC addresses.

    Rate this question:

  • 49. 

    QUESTION NO: 99 Which of the following cable types has the shortest maximum cable run length?

    • A.

      Single-mode fiber

    • B.

      Coaxial

    • C.

      Plenum

    • D.

      CAT3

    Correct Answer
    D. CAT3
    Explanation
    CAT3 has the shortest maximum cable run length compared to the other cable types listed. CAT3 cables are typically used for telephone and data transmission over short distances, usually up to 100 meters. This is because CAT3 cables have a lower bandwidth capacity and higher signal loss compared to other cable types like single-mode fiber, coaxial, and plenum cables. Single-mode fiber, coaxial, and plenum cables can support longer cable run lengths, making them suitable for longer distance transmissions.

    Rate this question:

  • 50. 

    QUESTION NO: 100* Which of the following is the MOST common pin-out configuration used when crimping RJ-45 connectors?

    • A.

      UTP

    • B.

      IEEE 802.5

    • C.

      T568A/B

    • D.

      STP

    Correct Answer
    C. T568A/B
    Explanation
    The T568A/B pin-out configuration is the most common one used when crimping RJ-45 connectors. This configuration specifies the arrangement of the eight wires inside the connector, ensuring that the correct signals are transmitted between devices. It is widely used in Ethernet networks for both residential and commercial applications. The UTP and STP options are types of cabling, while IEEE 802.5 is a networking standard.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 06, 2010
    Quiz Created by
    Rich70
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.