Network + Practice Test 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Afiavison
A
Afiavison
Community Contributor
Quizzes Created: 3 | Total Attempts: 2,229
| Attempts: 2,016
SettingsSettings
Please wait...
  • 1/100 Questions

    A technician is called to a clients desktop for connection issues. Which of the following is the FIRST step the technician should take?

    • Check the LEDs on the NIC.
    • Re-install the OS.
    • Install a new NIC.
    • Reset the router.
Please wait...
Network Plus Quizzes & Trivia
About This Quiz

Before you get a network certification, you have to undertake tests and exams on different networking concepts, which are vital in the dispensation of the job. How good are you? Are you ready for the final exam? Find out below!


Quiz Preview

  • 2. 

    A technician wants to remotely log into an office computer using remote desktop. The technician needs to do this in a secure manner. Which of the following would accomplish this?

    • VPN

    • Telnet

    • VLAN

    • Tagged packets

    Correct Answer
    A. VPN
    Explanation
    A Virtual Private Network (VPN) would accomplish remote logging into an office computer in a secure manner. A VPN creates a secure and encrypted connection over a public network, such as the internet, allowing the technician to access the office computer securely from a remote location. This ensures that the data transmitted between the technician's device and the office computer is protected from unauthorized access or interception. Telnet, VLAN, and tagged packets do not provide the same level of security as a VPN.

    Rate this question:

  • 3. 

    A technician is creating a patch cable to connect two PCs for file sharing. Which of the following cables should the technician uses ?

    • Straight

    • Loopback

    • Crossover

    • Rollover

    Correct Answer
    A. Crossover
    Explanation
    A crossover cable should be used to connect two PCs for file sharing. Unlike a straight cable, which is used to connect a PC to a switch or router, a crossover cable allows the PCs to directly communicate with each other without the need for a network device. This is achieved by swapping the transmit and receive wires on one end of the cable, allowing the PCs to send and receive data effectively.

    Rate this question:

  • 4. 

    Which of the following utilities will produce the results printed below? Tracing route to 172.30.0.78 over a maximum of 30 hops 1 <1 ms <1 ms172.30.0.78

    • Arp

    • Tracert

    • Ping

    • Netstat

    Correct Answer
    A. Tracert
    Explanation
    The correct answer is tracert because tracert is a utility that is used to trace the route that packets take to reach a destination. In the given results, it shows the route to the IP address 172.30.0.78 over a maximum of 30 hops. The output also includes the latency (ms) for each hop in the route.

    Rate this question:

  • 5. 

    Which of the following tools will measure in Ohms?

    • Cable tester

    • Multimeter

    • TDR

    • Butt set

    Correct Answer
    A. Multimeter
    Explanation
    A multimeter is a versatile tool used to measure various electrical quantities, including resistance in Ohms. It typically has a dial or a setting specifically for measuring resistance, allowing users to accurately determine the resistance of a component or circuit. Cable testers are used to check the integrity and continuity of cables, TDR (Time Domain Reflectometer) is used to measure the length and impedance of transmission lines, and a butt set is a telephone line testing device. None of these tools are specifically designed to measure resistance in Ohms like a multimeter.

    Rate this question:

  • 6. 

    A Network address of 220.100.100.100 with a subnet mask of 255.255.255.0 can be rewritten in classlessinterdomain routing notation (CIDR) as which of the following?

    • 220.100.100.100 /24

    • 220.100.100.100 /16

    • 220.100.100.100 /8

    • 220.100.100.100 /32

    Correct Answer
    A. 220.100.100.100 /24
    Explanation
    The given network address 220.100.100.100 with a subnet mask of 255.255.255.0 can be rewritten in CIDR notation as 220.100.100.100 /24. The subnet mask of 255.255.255.0 has 24 bits set to 1, indicating that the first 24 bits of the IP address are used for the network portion, and the remaining 8 bits are used for the host portion. Therefore, the CIDR notation for this network address would include the IP address followed by the slash and the number of bits used for the network portion, which is 24 in this case.

    Rate this question:

  • 7. 

    Which of the following protocols provides a secure method to remotely administer a server?

    • HTTP

    • SFTP

    • SSH

    • Telnet

    Correct Answer
    A. SSH
    Explanation
    SSH (Secure Shell) is a protocol that provides a secure method to remotely administer a server. It encrypts the data transmitted over the network, ensuring confidentiality and integrity. Unlike Telnet, which transmits data in clear text, SSH encrypts the communication, making it resistant to eavesdropping and unauthorized access. Similarly, SFTP (Secure File Transfer Protocol) is a secure alternative to FTP, but it specifically deals with file transfers rather than remote administration. HTTP is a protocol used for web browsing and does not provide the necessary security measures for remote server administration.

    Rate this question:

  • 8. 

    Which of the following wireless security protocols supports the highest encryption standards?

    • 3DES

    • WPA2

    • WPA

    • WEP

    Correct Answer
    A. WPA2
    Explanation
    WPA2 supports the highest encryption standards among the given options. It uses the Advanced Encryption Standard (AES) algorithm, which is considered to be highly secure. WPA2 provides stronger protection against unauthorized access compared to WPA and WEP, which have known vulnerabilities. 3DES, although a strong encryption algorithm, is not a wireless security protocol. Therefore, WPA2 is the correct answer.

    Rate this question:

  • 9. 

    Which of the following is correct when converting 192 to binary?

    • 00110000

    • 00001100

    • 11000000

    • 00000011b printers

    Correct Answer
    A. 11000000
    Explanation
    The correct answer is 11000000. When converting 192 to binary, we start by dividing it by 2 repeatedly and noting the remainders. The remainders, from bottom to top, give us the binary representation of the number. In this case, 192 divided by 2 is 96 with a remainder of 0. Dividing 96 by 2 gives us 48 with a remainder of 0. Dividing 48 by 2 gives us 24 with a remainder of 0. Dividing 24 by 2 gives us 12 with a remainder of 0. Dividing 12 by 2 gives us 6 with a remainder of 0. Dividing 6 by 2 gives us 3 with a remainder of 0. Dividing 3 by 2 gives us 1 with a remainder of 1. Finally, dividing 1 by 2 gives us 0 with a remainder of 1. Putting all the remainders together, we get 11000000.

    Rate this question:

  • 10. 

    Which of the following is considered a connection-oriented protocol?

    • UDP

    • SPX

    • TCP

    • IP

    Correct Answer
    A. TCP
    Explanation
    TCP (Transmission Control Protocol) is considered a connection-oriented protocol because it establishes a reliable and ordered connection between two devices before data transmission. It ensures that all packets are received in the correct order and without errors by using acknowledgments and retransmissions. TCP also provides flow control and congestion control mechanisms to optimize data transfer. In contrast, UDP (User Datagram Protocol) is a connectionless protocol that does not establish a dedicated connection and does not guarantee reliable delivery of packets. SPX (Sequenced Packet Exchange) is a connection-oriented protocol used in Novell NetWare networks, but it is not as widely used as TCP. IP (Internet Protocol) is a connectionless protocol responsible for addressing and routing packets in the Internet Protocol Suite.

    Rate this question:

  • 11. 

    A technician is not able to ping a server by the FQDN but can by the IP. Which of the following should the technician check?

    • Ensure that WINS is configured

    • Ensure that the DNS is configured

    • Ensure the MAC address is correct

    • Ensure that the IP address is correct

    Correct Answer
    A. Ensure that the DNS is configured
    Explanation
    The technician should check if the DNS is configured correctly because the FQDN (Fully Qualified Domain Name) is used to resolve domain names to IP addresses. If the technician is unable to ping the server using the FQDN but can do so using the IP address, it suggests that there may be an issue with the DNS configuration. The DNS translates the FQDN into the corresponding IP address, so if it is not configured properly, the server cannot be reached using the FQDN.

    Rate this question:

  • 12. 

    Which of the following is the default port for POP3?

    • 21

    • 80

    • 110

    • 25

    Correct Answer
    A. 110
    Explanation
    The correct answer is 110. POP3 (Post Office Protocol version 3) is a protocol used for retrieving emails from a mail server. The default port for POP3 is 110. It is important to know the default port number when configuring email clients or troubleshooting email connectivity issues.

    Rate this question:

  • 13. 

    221.17.101.223/28 is an example of which kind of notation?

    • CIDR

    • DNS

    • Port Number

    • ARP

    Correct Answer
    A. CIDR
    Explanation
    221.17.101.223/28 is an example of CIDR (Classless Inter-Domain Routing) notation. CIDR notation is used to represent IP addresses and their associated network prefixes. In this notation, the IP address is followed by a forward slash and the number of significant bits in the network prefix. In this case, the network prefix is /28, indicating that the first 28 bits of the IP address are the network address, while the remaining 4 bits are used for host addresses.

    Rate this question:

  • 14. 

    A company is getting a new sales system that must remain secure and isolated. The network administrator needs to segregate network traffic for security reasons. Currently there is one addressing scheme 10.2.10.x, with a subnet mask of 255.255.255.0.Which of the following methods would BEST help in segregating the traffic?

    • Implementing a dedicated broadcast network

    • Implementing a dedicated multicast network

    • Changing the IP scheme to class C addresses

    • Creating a new subnet for this system

    Correct Answer
    A. Creating a new subnet for this system
    Explanation
    Creating a new subnet for this system would be the best method to segregate the network traffic. By creating a new subnet, the network administrator can separate the traffic for the new sales system from the rest of the network. This provides a higher level of security and isolation for the sales system, ensuring that it remains secure and protected.

    Rate this question:

  • 15. 

    Which of the following documentation would a network administrator need to update if they have just finished upgrading the firmware on all the switches within the LAN?

    • Wiring schematics

    • Logical network diagram

    • Physical network diagram

    • Baseline and configuration documentation

    Correct Answer
    A. Baseline and configuration documentation
    Explanation
    After upgrading the firmware on all the switches within the LAN, the network administrator would need to update the baseline and configuration documentation. This documentation contains the baseline configuration settings and any changes made to the network devices. By updating this documentation, the network administrator ensures that it accurately reflects the current state of the network after the firmware upgrade. This documentation is crucial for troubleshooting, future upgrades, and maintaining the network infrastructure.

    Rate this question:

  • 16. 

    A technician is sent to troubleshoot a connectivity issue on A company's web server. Which of the following is the NEXT step after verifying that one of the NICs has no LEDs flashing?

    • Re-install application.

    • Check for hardware conflicts or disabled devices.

    • Re-install drivers.

    • Check system properties for correct caching settings.

    Correct Answer
    A. Check for hardware conflicts or disabled devices.
    Explanation
    After verifying that one of the NICs has no LEDs flashing, the next step would be to check for hardware conflicts or disabled devices. This is important because it could indicate a problem with the network interface card or other hardware components that are causing the connectivity issue. By checking for hardware conflicts or disabled devices, the technician can identify any potential issues and resolve them to restore connectivity to the web server.

    Rate this question:

  • 17. 

    A technician wants to see how many server connections are open on a client machine. Which of the following is the command to see these connections?

    • Dig

    • Netstat

    • Nslookup

    • Arp

    Correct Answer
    A. Netstat
    Explanation
    Netstat is the correct command to see the open server connections on a client machine. Netstat (network statistics) is a command-line tool that displays active network connections, listening ports, and routing tables. It provides information about the network connections established by the computer, including the protocol used, local and remote IP addresses, and the state of the connection. By using the netstat command, the technician can easily view the open server connections on the client machine.

    Rate this question:

  • 18. 

    A scanner has determined the open ports on a network device. Assuming services are running on their default ports, which of the following ports will provide secure communications?

    • 69

    • 143

    • 67

    • 443

    Correct Answer
    A. 443
    Explanation
    Port 443 is the correct answer because it is the default port for secure HTTP (HTTPS) communication. This port is commonly used for secure online transactions, such as e-commerce websites, online banking, and secure email communication. It uses SSL/TLS protocols to encrypt the data transmitted between the client and the server, ensuring secure and private communication.

    Rate this question:

  • 19. 

    Which of the following network devices filters packets based on rules that have been configured for it?

    • Layer 2 switch

    • Firewall

    • Hub

    • Bridge

    Correct Answer
    A. Firewall
    Explanation
    A firewall is a network device that filters packets based on rules that have been configured for it. It acts as a barrier between a trusted internal network and an untrusted external network, controlling the incoming and outgoing network traffic. By examining the source and destination addresses, ports, and protocols of each packet, the firewall can enforce security policies and block or allow traffic accordingly. This filtering capability allows the firewall to protect the network from unauthorized access, malicious attacks, and unwanted traffic.

    Rate this question:

  • 20. 

    A user reports that when the phone rings in their house the wireless on their laptops becomes disconnected. Which of the following BEST describes the issue?

    • The cordless phones are 2.4Ghz which interferes with wireless

    • The cordless phones are plugged into the RJ-11 jack

    • The cordless phones are 5.8Ghz which interferes with wireless

    • The cordless phones are plugged into same outlet as the router

    Correct Answer
    A. The cordless phones are 2.4Ghz which interferes with wireless
    Explanation
    The 2.4Ghz frequency used by the cordless phones is causing interference with the wireless connection on the laptops.

    Rate this question:

  • 21. 

    Which of the following would limit the availability of the types of sites that users on a LAN have access to?

    • A DNS server

    • A proxy server

    • A DC server

    • A DHCP server

    Correct Answer
    A. A proxy server
    Explanation
    A proxy server can limit the availability of the types of sites that users on a LAN have access to by acting as an intermediary between the users and the internet. It can be configured to block certain websites or categories of websites, effectively restricting the access of users to those sites. By filtering and controlling the traffic that passes through it, a proxy server can enforce access policies and prevent users from accessing specific websites or content.

    Rate this question:

  • 22. 

    A network administrator is configuring a server to provide file sharing for offices across the company. Which of the following addresses would be acceptable to set on a device?

    • 255.255.255.255

    • 192.168.0.255

    • 192.168.0.25

    • 192.255.255.255

    Correct Answer
    A. 192.168.0.25
    Explanation
    The IP address 192.168.0.25 would be acceptable to set on a device because it falls within the range of private IP addresses (192.168.0.0 to 192.168.255.255) which are commonly used for local area networks (LANs). This address can be assigned to a device in the office network to provide file sharing services.

    Rate this question:

  • 23. 

    Which of the following is an example of a valid MAC address for a workstation?

    • 05:14:K9:07:B2:M4

    • FFFF.FFFF.FFFF

    • 00:08:38:05:B5:F4

    • 131.44.32.255

    Correct Answer
    A. 00:08:38:05:B5:F4
    Explanation
    The given MAC address, 00:08:38:05:B5:F4, is a valid MAC address for a workstation. MAC addresses are unique identifiers assigned to network interfaces, and they consist of six groups of two hexadecimal digits separated by colons. The given MAC address follows this format and contains valid hexadecimal digits (0-9 and A-F). Therefore, it is a valid MAC address for a workstation.

    Rate this question:

  • 24. 

    Which of the following is a function of a NIC?

    • It filters frame packets

    • It captures keystrokes

    • It sends data to NonVolatile RAM

    • It transceives digital data

    Correct Answer
    A. It transceives digital data
    Explanation
    A NIC (Network Interface Card) is responsible for connecting a computer to a network. One of its main functions is to transceive digital data, meaning it both sends and receives data between the computer and the network. This allows the computer to communicate with other devices on the network and access the internet. The other options listed, such as filtering frame packets, capturing keystrokes, and sending data to NonVolatile RAM, are not functions typically performed by a NIC.

    Rate this question:

  • 25. 

    Users are reporting that they can access Internet web pages but cannot access the internal company website. Which of the following is the MOST likely source of the problem?

    • The intranet server is down.

    • The intranet DNS entry isnonauthoritative.

    • The DNS address handed out by DHCP is incorrect.

    • The default gateway is incorrect.

    Correct Answer
    A. The intranet server is down.
    Explanation
    Based on the information provided, the most likely source of the problem is that the intranet server is down. This is because users are able to access Internet web pages, which suggests that their internet connection is working fine. However, they are unable to access the internal company website, indicating that the issue lies with the internal server.

    Rate this question:

  • 26. 

    Which of the following devices allows segregation of collision domains but not broadcasting domains?

    • NIC

    • SWITCH

    • Hub

    • Router

    Correct Answer
    A. SWITCH
    Explanation
    A switch allows segregation of collision domains but not broadcasting domains. A collision domain is a network segment where collisions can occur if multiple devices try to transmit data at the same time. A switch creates separate collision domains for each of its ports, reducing the likelihood of collisions. On the other hand, a broadcasting domain is a network segment where broadcast messages are sent to all connected devices. Switches do not limit the broadcasting domain, as they forward broadcast messages to all connected devices. Therefore, a switch allows for the separation of collision domains while still allowing broadcast messages to be sent to all devices.

    Rate this question:

  • 27. 

    A network technician is assigned the task of connecting two switches in two different wiring closets. Which of the following cable types is the appropriate choice?

    • Crossover

    • Loopback

    • 568A

    • Rollover

    Correct Answer
    A. Crossover
    Explanation
    A crossover cable is the appropriate choice for connecting two switches in two different wiring closets. This type of cable allows for direct communication between the switches without the need for a separate network device, such as a hub or a router. It is designed to connect similar devices, such as two switches or two computers, by crossing over the transmit and receive wires. This enables the switches to send and receive data effectively, creating a direct link between them.

    Rate this question:

  • 28. 

    A computer configured to use DHCP cannot locate a DHCP server. Automatic Private IP Address (APIPA)will assign which of the following addresses?

    • 172.16.1.25

    • 192.168.1.25

    • 169.254.1.25

    • 10.16.1.25

    Correct Answer
    A. 169.254.1.25
    Explanation
    When a computer configured to use DHCP cannot locate a DHCP server, it will assign an Automatic Private IP Address (APIPA). APIPA uses the range of 169.254.0.0 to 169.254.255.255 for assigning IP addresses. Therefore, the correct answer is 169.254.1.25.

    Rate this question:

  • 29. 

    Which of the following is found in a layer two switch?

    • SSID settings

    • Routing protocols

    • DNS zones

    • VLAN settings

    Correct Answer
    A. VLAN settings
    Explanation
    A layer two switch is responsible for forwarding data packets based on the MAC addresses. VLAN settings are typically found in a layer two switch. VLANs (Virtual Local Area Networks) allow for the segmentation and isolation of network traffic, improving network performance and security. By configuring VLAN settings on a layer two switch, network administrators can group devices into separate virtual networks, ensuring that traffic is only sent to intended recipients within the same VLAN. This helps to optimize network resources and enhance network management capabilities.

    Rate this question:

  • 30. 

    Which of the following uses pointer records and A records?

    • NAT server

    • IPS

    • DNS server

    • IDS

    Correct Answer
    A. DNS server
    Explanation
    A DNS server uses pointer records (PTR) and A records to map domain names to IP addresses and vice versa. A PTR record is used to map an IP address to a domain name, while an A record is used to map a domain name to an IP address. This allows the DNS server to translate human-readable domain names into machine-readable IP addresses, enabling communication between devices on a network.

    Rate this question:

  • 31. 

    Which of the following network protocols is needed to ensure that users can type in a FQDN instead of the IP address?

    • DNS

    • WINS

    • IMAP4

    • FTP

    Correct Answer
    A. DNS
    Explanation
    DNS (Domain Name System) is the correct answer. DNS is a network protocol that translates domain names (FQDN - Fully Qualified Domain Names) into IP addresses. It allows users to type in a FQDN instead of the IP address when accessing websites or other network resources. DNS maintains a database of domain names and their corresponding IP addresses, making it easier for users to navigate the internet. WINS (Windows Internet Name Service) is a similar protocol used in older Windows networks, but DNS is the more commonly used and widely supported protocol. IMAP4 and FTP are unrelated protocols used for email and file transfer respectively.

    Rate this question:

  • 32. 

    Which of the following layers of the OSI model does a network router perform traffic routing at?

    • Layer 3

    • Layer 4

    • Layer 2

    • Layer 5

    Correct Answer
    A. Layer 3
    Explanation
    A network router performs traffic routing at Layer 3 of the OSI model. Layer 3, also known as the network layer, is responsible for logical addressing and routing of data packets between different networks. Routers use IP addresses to determine the best path for forwarding packets to their destination. By examining the IP header, routers are able to make decisions on how to direct traffic based on network conditions and routing tables. Therefore, Layer 3 is the correct answer for this question.

    Rate this question:

  • 33. 

    A technician needs to trace a wire that is in the wall. Which of the following is the BEST way for the technician to identify the wires location?

    • Media Tester

    • Continuity Tester

    • Tone Generator

    • Multimeter

    Correct Answer
    A. Tone Generator
    Explanation
    A tone generator is the best way for a technician to identify the location of a wire in the wall. A tone generator is a device that can send a signal through the wire, producing an audible tone that can be detected using a tone probe. This allows the technician to follow the tone and trace the wire's path, even if it is hidden inside the wall. A media tester, continuity tester, and multimeter may have other uses in troubleshooting electrical systems, but they are not specifically designed for locating wires in walls.

    Rate this question:

  • 34. 

    A user is trying to establish an FTP connection to a computer at home. The home computer is turned on and has Internet connectivity? however, they are unable to connect from the PC at work. The IP address that the user is trying to connect to is 192.168.1.125.Which of the following is the MOST likely problem?

    • The firewall at the office is blocking the outgoing connection.

    • FTP client is not installed in the work computer.

    • FTP server is not installed on the home computer.

    • The IP address of the home computer is not routable across the Internet.

    Correct Answer
    A. The IP address of the home computer is not routable across the Internet.
    Explanation
    The IP address 192.168.1.125 is a private IP address, which means it is not routable across the Internet. Private IP addresses are meant for local networks and cannot be directly accessed from the Internet. Therefore, the user is unable to establish an FTP connection to the home computer because the IP address is not routable.

    Rate this question:

  • 35. 

    Which of the following is a utility that translates the IP address to its physical network address?

    • Netstat

    • Arp

    • Rarp

    • Nslookup

    Correct Answer
    A. Arp
    Explanation
    The Address Resolution Protocol (ARP) is a utility that translates the IP address to its physical network address. It is used to map an IP address to a physical address (MAC address) on a local network. ARP is responsible for finding the MAC address of a device through its IP address, allowing communication between devices on the same network.

    Rate this question:

  • 36. 

    Which of the following routing protocols uses the next hop metric in deciding how to route traffic?

    • RIP

    • BGP

    • IGP

    • IS-IS

    Correct Answer
    A. RIP
    Explanation
    RIP (Routing Information Protocol) uses the next hop metric in deciding how to route traffic. RIP is a distance-vector routing protocol that uses hop count as its metric. Each router in the network maintains a routing table with the number of hops required to reach each destination network. When a router receives an update from a neighboring router, it compares the hop count metric and chooses the route with the lowest metric as the next hop for routing traffic. Therefore, RIP uses the next hop metric to determine the best path for routing traffic.

    Rate this question:

  • 37. 

    Which of the following protocols operates at the transport layer of the OSI model and is responsible for providing reliable, connection-oriented communication between applications?

    • ICMP

    • DHCP

    • TCP 

    • ARP

    Correct Answer
    A. TCP 
    Explanation
    TCP (Transmission Control Protocol) is a core protocol of the internet protocol suite. It ensures reliable data delivery through mechanisms like sequencing, acknowledgments, and flow control. This makes it suitable for applications that require guaranteed delivery of data, such as web browsing and file transfer.

    Rate this question:

  • 38. 

    A network technician has been asked to retrieve device statistics, information, and errors. Which of the following tools would the technician likely use?

    • TFTP

    • Packet sniffer

    • SNMP

    • SMTP

    Correct Answer
    A. SNMP
    Explanation
    The network technician would likely use SNMP (Simple Network Management Protocol) to retrieve device statistics, information, and errors. SNMP is a protocol used for managing and monitoring network devices. It allows the technician to gather information from devices such as routers, switches, and servers, including performance data, error logs, and configuration details. By using SNMP, the technician can efficiently monitor and troubleshoot the network infrastructure.

    Rate this question:

  • 39. 

    On a Windows network, users are reporting that they cannot access any network resources. The userscan ping the IP address and connect to the network resource using the IP address. Which of the following is the cause of the problem?

    • The domain controller is not responding.

    • The DNS server is not resolving correctly.

    • The DHCP server is not assigning correct IP addresses.

    • The file server is offline.

    Correct Answer
    A. The DNS server is not resolving correctly.
    Explanation
    The given answer is correct because the users are able to ping the IP address and connect to the network resource using the IP address, which indicates that the network connection is functioning properly. However, they are unable to access network resources by their hostname, suggesting a DNS resolution issue. DNS is responsible for resolving domain names to IP addresses, so if the DNS server is not resolving correctly, it would prevent users from accessing network resources by their hostname.

    Rate this question:

  • 40. 

    A technician is dispatched to a remote office to install a new NIC in a client computer. After successfully installing and configuring the operating system to recognize the device, the computer still cannot access the network. Which of the following would MOST likely be the problem?

    • The CAT5 cable is defective

    • The NIC is disabled in BIOS

    • The NIC is disabled in Device Manager

    • The RJ-11 jack is defective

    Correct Answer
    A. The CAT5 cable is defective
    Explanation
    The most likely problem is that the CAT5 cable is defective. Even though the NIC has been successfully installed and configured, if the cable connecting the computer to the network is defective, it will prevent the computer from accessing the network. The other options - NIC disabled in BIOS, NIC disabled in Device Manager, and defective RJ-11 jack - would not prevent the computer from accessing the network if the cable is functioning properly.

    Rate this question:

  • 41. 

    Which of the following is the MOST likely cause of a wireless connection dropoff in a wireless G network?

    • Cellular interference

    • AM Radio

    • Cordless phones

    • FM Radio

    Correct Answer
    A. Cordless phones
    Explanation
    Cordless phones are the most likely cause of a wireless connection dropoff in a wireless G network. Cordless phones operate on similar frequencies as wireless networks, and their signals can interfere with the Wi-Fi signal, causing the connection to drop. This interference can disrupt the communication between the wireless router and the connected devices, resulting in a dropoff in the wireless connection.

    Rate this question:

  • 42. 

    After deploying three large additional servers in a rack there are reports of network instability and other issues across all servers in the rack. It has been verified that there is sufficient power resources and network bandwidth. Which of the following should the technician check NEXT?

    • Cable tester

    • Certifier

    • Temperature monitor

    • Multimeter

    Correct Answer
    A. Temperature monitor
    Explanation
    The technician should check the temperature monitor next. The deployment of three large additional servers in the rack may have caused an increase in heat generation, leading to network instability and other issues. Monitoring the temperature will help identify if the servers are overheating, which can affect their performance and stability.

    Rate this question:

  • 43. 

    Which of the following cables has a solid Kevlar center to restrict it from making a 90 degree bend?

    • CAT6

    • CAT5

    • CAT5e

    • CAT3

    Correct Answer
    A. CAT6
    Explanation
    CAT6 cables have a solid Kevlar center to restrict them from making a 90-degree bend. Kevlar is a strong and durable material that helps to maintain the shape and integrity of the cable, preventing it from bending too much. This is important because excessive bending can cause signal loss or damage to the cable. CAT6 cables are designed for high-speed data transmission and require more stringent specifications compared to CAT5, CAT5e, and CAT3 cables.

    Rate this question:

  • 44. 

    Which of the following are features of a DHCP server? (Select TWO)

    • Transferring files over the network

    • Dynamic IP addressing

    • Static IP address reservations

    • Resolving IP addresses to canonical names

    • Secure shell connections

    Correct Answer(s)
    A. Dynamic IP addressing
    A. Static IP address reservations
    Explanation
    A DHCP server is responsible for assigning IP addresses dynamically to devices on a network. This allows devices to obtain an IP address automatically without manual configuration. It also ensures efficient use of IP addresses by leasing them for a specific period of time and reclaiming them when they are no longer needed. Additionally, a DHCP server can provide static IP address reservations, which allow specific devices to always receive the same IP address. This is useful for devices that require a consistent IP address for services such as port forwarding or network printing.

    Rate this question:

  • 45. 

    Which of the following is a disadvantage of static routing?

    • Unresponsive to changes.

    • High network utilization due to updates.

    • RIP updates will need to be transmitted via TCP.

    • Packet destination cannot be controlled.

    Correct Answer
    A. Unresponsive to changes.
    Explanation
    Static routing is a method of network routing where the routes are manually configured by the network administrator. The disadvantage of static routing is that it is unresponsive to changes. This means that if there is a change in the network topology or a link failure, the static routes will not automatically update and the network will not be able to adapt to the new conditions. This can lead to suboptimal routing and network connectivity issues.

    Rate this question:

  • 46. 

    Which of the following tools would be used to establish a connection on a wall jack to connect to the desktop?

    • Multimeter

    • Snips

    • Punch down tool

    • Cable stripper

    Correct Answer
    A. Punch down tool
    Explanation
    A punch down tool is used to establish a connection on a wall jack to connect to the desktop. This tool is specifically designed to terminate or connect wires to a punch down block or keystone jack. It allows for quick and efficient installation of network cables by securely seating the wires into the appropriate slots or terminals. The punch down tool ensures a reliable and stable connection between the wall jack and the desktop, enabling data transmission and network connectivity.

    Rate this question:

  • 47. 

    A company guest is requesting to use their personal laptop on the company wireless network. DHCP is configured correctly for wireless and a temporary WEP key is assigned. The laptop cannot connect to the network because:

    • This laptop is enabled for both 802.11b and 802.11g.

    • DNS server is not working properly.

    • The network is out of wireless connections.

    • MAC filtering is enabled on the WAP.

    Correct Answer
    A. MAC filtering is enabled on the WAP.
    Explanation
    The laptop cannot connect to the network because MAC filtering is enabled on the WAP. MAC filtering is a security feature that only allows devices with specific MAC addresses to connect to the wireless network. Since the laptop's MAC address is not included in the list of allowed devices, it is unable to connect.

    Rate this question:

  • 48. 

    DNS services are in a failed state on a network. Some users require FQDN to access specific services. A temporary solution would be to:

    • Create a local host file on the PC.

    • Release and renew DHCP.

    • Change the IP address of the specific services needed.

    • Change all domain relationships to WINS.

    Correct Answer
    A. Create a local host file on the PC.
    Explanation
    When DNS services are in a failed state on a network, creating a local host file on the PC can provide a temporary solution. A host file contains mappings of IP addresses to domain names, allowing the PC to resolve domain names locally without relying on DNS. By adding the necessary mappings to the host file, users can access specific services using their FQDNs even when DNS services are not functioning properly. This bypasses the need for DNS resolution and allows the PC to directly resolve the domain names using the information in the host file.

    Rate this question:

  • 49. 

    Which of the following is port 123 commonly used for?

    • IMAP4

    • HTTPS

    • NTP

    • DNS

    Correct Answer
    A. NTP
    Explanation
    Port 123 is commonly used for NTP (Network Time Protocol). NTP is a protocol used for synchronizing the time on network devices. It allows devices to accurately maintain the same time by synchronizing with a time server. Port 123 is used for NTP communication between the client and the server.

    Rate this question:

Quiz Review Timeline (Updated): Dec 23, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 23, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 22, 2010
    Quiz Created by
    Afiavison
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.