Network + Practice Test 3

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Afiavison
A
Afiavison
Community Contributor
Quizzes Created: 3 | Total Attempts: 2,238
| Attempts: 108
SettingsSettings
Please wait...
  • 1/100 Questions

    Which of the following actions should the administrator do FIRST to help access a gigabit connection?

    • Change the CAT5 cable to a CAT3 cable.
    • Change the CAT3 cable to RG-58 cable.
    • Change the CAT5 cable to a CAT6 cable.
    • Change the CAT5 cable to a CAT5 Crossover cable.
Please wait...
About This Quiz

Network + Practice Test 3 evaluates essential networking skills, focusing on troubleshooting connectivity issues, understanding server configurations, and utilizing network tools. This quiz prepares learners for practical challenges in network administration, enhancing their problem-solving abilities in real-world scenarios.

Network + Practice  Test 3 - Quiz

Quiz Preview

  • 2. 

    When using the ping utility, which switch pings a network device until stopped?

    • Ping-t

    • Ping-s 3

    • Ping-a

    • Ping-r 3

    Correct Answer
    A. Ping-t
    Explanation
    The correct answer is "ping -t". When using the ping utility, the "-t" switch is used to continuously ping a network device until it is manually stopped. This is useful for monitoring the network connection and checking for any interruptions or delays in communication.

    Rate this question:

  • 3. 

    Which of the following is the maximum speed available from a full T1 line?

    • 1.544Mbps

    • 5.23Mbps

    • 765Kpbs

    • 10.73Mbps

    Correct Answer
    A. 1.544Mbps
    Explanation
    A full T1 line has a maximum speed of 1.544Mbps. This is a standard data transmission rate for digital telecommunication services.

    Rate this question:

  • 4. 

    Which of the following tools would be used to test the break in a fiber connection on the network?

    • Butt set

    • Multimeter

    • Toner probe

    • OTDR

    Correct Answer
    A. OTDR
    Explanation
    An OTDR (Optical Time-Domain Reflectometer) is a tool used to test the break in a fiber connection on a network. It sends a laser pulse into the fiber and measures the reflections to determine the location and severity of any breaks or faults. This allows technicians to accurately locate and troubleshoot issues in the fiber optic network. A butt set is used for testing telephone lines, a multimeter is used to measure electrical properties, and a toner probe is used to trace and identify cables.

    Rate this question:

  • 5. 

    A client is able to ping its default gateway, but is unable to communicate with a remote host. Which of the following utilities would the technicianuse to determine where the fault is?

    • Arp

    • Ping-t

    • Traceroute

    • Nbstat

    Correct Answer
    A. Traceroute
    Explanation
    The technician would use the traceroute utility to determine where the fault is. Traceroute is used to trace the route that packets take from the client to the remote host, showing each hop along the way. By analyzing the output of traceroute, the technician can identify any network devices or connections that may be causing the communication issue.

    Rate this question:

  • 6. 

    Which of the following is an example of secure tunneling?

    • PPPoE

    • SSL VPN

    • PPP

    • PAP

    Correct Answer
    A. SSL VPN
    Explanation
    SSL VPN is an example of secure tunneling because it uses Secure Sockets Layer (SSL) encryption to create a secure and encrypted connection between the client and the VPN server. This ensures that the data transmitted between the client and the server is protected from unauthorized access and eavesdropping. SSL VPNs are commonly used to provide remote access to corporate networks and to secure communication over public networks such as the internet.

    Rate this question:

  • 7. 

    A technician is asked to place wireless Internet access in an open warehouse environment. After installing the equipment the technician notices varying signal strengths at different locations. Which of the following should the technician consider to increase the consistency of the signal strength?

    • Enable traffic shaping

    • Change the antenna placement

    • Change the encryption method

    • Broadcast the SSID

    Correct Answer
    A. Change the antenna placement
    Explanation
    To increase the consistency of the signal strength in an open warehouse environment, the technician should consider changing the antenna placement. This is because the varying signal strengths at different locations indicate that the current antenna placement may not be optimal for providing a consistent signal throughout the warehouse. By strategically relocating the antennas, the technician can potentially improve the coverage and signal strength in areas that are currently experiencing weak or inconsistent signals.

    Rate this question:

  • 8. 

    Which of the following cable types are the MOST widely used in a corporate gigabit network scheme?

    • CAT5

    • CAT1

    • CAT3

    • CAT6

    Correct Answer
    A. CAT6
    Explanation
    CAT6 cables are the most widely used in a corporate gigabit network scheme because they offer higher bandwidth and faster data transmission compared to CAT5, CAT1, and CAT3 cables. CAT6 cables are designed to support gigabit Ethernet and can handle higher frequencies, reducing crosstalk and improving overall network performance. They are also backward compatible with previous cable types, making them a popular choice for corporate networks that require high-speed and reliable connectivity.

    Rate this question:

  • 9. 

    Which of the following cable types is used in a 100Base-FX network?

    • UTP

    • Coaxial

    • STP

    • Fiber

    Correct Answer
    A. Fiber
    Explanation
    Fiber optic cable is used in a 100Base-FX network. This type of cable is specifically designed for high-speed data transmission over long distances. It uses light signals to transmit data, which allows for faster and more reliable communication compared to other cable types like UTP, coaxial, or STP. Fiber optic cables are also immune to electromagnetic interference, making them ideal for use in networking environments.

    Rate this question:

  • 10. 

    A technician is connecting two buildings located approximately 1969 feet (600 meters) apart on the same campus. Primary objectives are to create a secure link that that is capable of transmitting at 1Gbps. Which of the following would be the BEST way to connect these two buildings?

    • Fiber optic cable

    • Point-to-point wireless link

    • CAT6 cable

    • RG-58 cable

    Correct Answer
    A. Fiber optic cable
    Explanation
    Fiber optic cable would be the best way to connect the two buildings located 1969 feet apart on the same campus because it can provide a secure and high-speed connection capable of transmitting at 1Gbps. Fiber optic cables use light signals to transmit data, which allows for faster and more reliable communication compared to other options like point-to-point wireless link, CAT6 cable, or RG-58 cable. Additionally, fiber optic cables are less susceptible to interference and can support longer distances without signal degradation.

    Rate this question:

  • 11. 

    Which of the following is a utility that translates the physical network address to its IP address?

    • Nslookup

    • Ping

    • Rarp

    • Netstat

    Correct Answer
    A. Rarp
    Explanation
    RARP (Reverse Address Resolution Protocol) is a utility that translates the physical network address to its IP address. It is used in situations where a device needs to find its IP address but only knows its physical address. By sending a RARP request, the device can obtain its IP address from a RARP server. This is particularly useful in diskless workstations or devices that do not have permanent storage for storing IP addresses.

    Rate this question:

  • 12. 

    Which of the following documentations would a network technician find ports that a company has blocked?

    • Policies, procedures and configurations

    • Baseline reports

    • Network wiring schematics

    • RFC

    Correct Answer
    A. Policies, procedures and configurations
    Explanation
    A network technician would find the ports that a company has blocked in the documentation of policies, procedures, and configurations. This documentation typically outlines the specific rules and restrictions that are in place for the company's network. By referring to this documentation, the technician can identify the ports that have been blocked and understand the reasons behind these restrictions. This information is crucial for troubleshooting network issues and ensuring the security and efficiency of the network.

    Rate this question:

  • 13. 

    Which of the following cables would a technician make in order to identify a physical interface problem?

    • Serial

    • Rollover

    • Console

    • Loopback

    Correct Answer
    A. Loopback
    Explanation
    A loopback cable is used to test the functionality of a physical interface by creating a loop within the device itself. When the loopback cable is connected, the device sends signals to itself, allowing the technician to determine if the physical interface is functioning properly. This helps in identifying any physical interface problems such as faulty connectors, cables, or ports.

    Rate this question:

  • 14. 

    In a Class C subnet, a network ID may occupy a maximum of:

    • 24bits

    • 16bits

    • 31bits

    • 32bits

    Correct Answer
    A. 24bits
    Explanation
    In a Class C subnet, the network ID may occupy a maximum of 24 bits. This means that the first 24 bits of the IP address are used to identify the network, while the remaining 8 bits are used to identify the hosts within that network. This allows for a maximum of 256 (2^8) hosts in a Class C subnet.

    Rate this question:

  • 15. 

    Which of the following IEEE standards has a maximum bandwidth of 54Mbps operating at 5GHz?

    • 802.11g

    • 802.11a

    • 802.11b

    • 802.11

    Correct Answer
    A. 802.11a
    Explanation
    IEEE standard 802.11a has a maximum bandwidth of 54Mbps operating at 5GHz. This standard was introduced as an enhancement to the 802.11 standard and operates on the 5GHz frequency band. It offers higher data rates compared to the 802.11b standard, which operates on the 2.4GHz frequency band. The 802.11a standard provides faster and more reliable wireless connections, making it suitable for applications that require high-speed data transfer, such as video streaming and online gaming.

    Rate this question:

  • 16. 

    Which of the following logical topologies uses centralized authentication?

    • Peer-to-peer

    • Client/server

    • VPN

    • VLAN

    Correct Answer
    A. Client/server
    Explanation
    Client/server topology uses centralized authentication because in this type of network, there is a central server that controls and authenticates user access to resources. This server acts as a central authority for authentication, allowing users to log in and access resources based on their credentials. In a client/server network, clients (individual computers) connect to the server to request services or access data, and the server verifies their identity before granting access. This centralized authentication ensures security and control over user access within the network.

    Rate this question:

  • 17. 

    Which of the following features of a switch will allow two switches to pass network information?

    • Disabling the routing protocols

    • Port speeds

    • Trunking

    • PoE

    Correct Answer
    A. Trunking
    Explanation
    Trunking is a feature of a switch that allows two switches to pass network information. Trunking enables the switches to carry multiple VLANs (Virtual Local Area Networks) over a single physical link. By using trunking, the switches can exchange network traffic and share information about different VLANs, allowing for efficient communication and better network management. Disabling routing protocols, port speeds, and PoE (Power over Ethernet) are not directly related to the ability of switches to pass network information.

    Rate this question:

  • 18. 

    The network administrator needs to use an IP addressing method that will not require manual updating. Which of the following should be used?

    • Static

    • Dynamic

    • TCP

    • Multiple

    Correct Answer
    A. Dynamic
    Explanation
    Dynamic IP addressing should be used in this scenario. Dynamic IP addressing allows the network administrator to assign IP addresses to devices automatically using a DHCP (Dynamic Host Configuration Protocol) server. This eliminates the need for manual updating as the IP addresses are assigned dynamically and can be changed as needed. This method is more efficient and scalable, especially in large networks where manual IP address assignment would be time-consuming and prone to errors.

    Rate this question:

  • 19. 

    Which of the following network devices would be responsible for translating canonical names into IP addresses?

    • A router

    • A DHCP server

    • A DNS server

    • A firewall

    Correct Answer
    A. A DNS server
    Explanation
    A DNS server is responsible for translating canonical names into IP addresses. DNS stands for Domain Name System, and it is a system that translates domain names (such as www.example.com) into IP addresses (such as 192.168.1.1) that computers can understand. When a user types a domain name into a web browser, the DNS server is responsible for finding the corresponding IP address and directing the user to the correct website.

    Rate this question:

  • 20. 

    A second network card in a server that activates if the primary card fails is an example of which of the following network performance optimization?

    • Fault tolerance

    • High availability

    • QoS

    • Load balancing

    Correct Answer
    A. Fault tolerance
    Explanation
    A second network card in a server that activates if the primary card fails is an example of fault tolerance. Fault tolerance refers to the ability of a system or network to continue functioning even if there is a failure or error in one of its components. In this case, the presence of a backup network card ensures that there is redundancy in case the primary card fails, allowing for uninterrupted network connectivity and preventing any downtime or disruption in service.

    Rate this question:

  • 21. 

    Which of the following technologies do the 802.11 networks utilize to prevent packet collisions?

    • FDDI

    • CSMA/CD

    • Token ring

    • CSMA/CA

    Correct Answer
    A. CSMA/CA
    Explanation
    802.11 networks utilize CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) to prevent packet collisions. This technology allows devices to sense the wireless medium before transmitting data, and if it is busy, they wait for a random period of time before attempting to transmit again. This helps to avoid collisions and ensures that data is transmitted successfully in a shared network environment.

    Rate this question:

  • 22. 

    When all routers in a network agree about the path from one point to another, the network is said to be which of the following?

    • Static

    • Converged

    • Secure

    • Dynamic

    Correct Answer
    A. Converged
    Explanation
    When all routers in a network agree about the path from one point to another, the network is said to be "converged". This means that all routers have reached a consensus on the best route to take, ensuring efficient and reliable communication between the two points.

    Rate this question:

  • 23. 

    A technician receives a call on monday morning that several computers will not connect to the network. The technician determines that the computers left on over the weekend are functional and those that were turned off over the weekend are not functioning. Which of the following is the MOST likely source of the problem?

    • WINS needs to be restarted.

    • DNS is not functioning.

    • LDAP is not functioning.

    • DHCP is not functioning.

    Correct Answer
    A. DHCP is not functioning.
    Explanation
    The fact that the computers left on over the weekend are functional while those that were turned off are not functioning suggests that the issue lies with the dynamic host configuration protocol (DHCP). DHCP is responsible for assigning IP addresses to computers on a network. If DHCP is not functioning, the computers that were turned off over the weekend would not have been able to obtain an IP address and therefore cannot connect to the network. Restarting WINS, fixing DNS, or LDAP would not address this specific issue.

    Rate this question:

  • 24. 

    Which of the following network segments is located outside the firewall?

    • SPAP

    • VPN

    • DMZ

    • PPTP

    Correct Answer
    A. DMZ
    Explanation
    A DMZ (Demilitarized Zone) is a network segment that is located outside the firewall. It acts as a buffer zone between the internal network and the external network, providing an additional layer of security. The DMZ is used to host servers that need to be accessible from the internet, such as web servers or email servers. By placing these servers in the DMZ, it reduces the risk of unauthorized access to the internal network if the server is compromised. Therefore, the correct answer is DMZ.

    Rate this question:

  • 25. 

    Which of the following frequency ranges does 802.11a operate at?

    • 4.9GHz

    • 5GHz

    • 54GHz

    • 2.4GHz

    Correct Answer
    A. 5GHz
    Explanation
    802.11a operates at the frequency range of 5GHz. This frequency range allows for higher data transfer rates and less interference compared to the 2.4GHz frequency range used by other Wi-Fi standards like 802.11b and 802.11g. By operating at 5GHz, 802.11a can provide faster and more reliable wireless connections, making it suitable for applications that require high bandwidth such as streaming videos or online gaming.

    Rate this question:

  • 26. 

    A technician needs to connect a laptop via the small office, home office (SOHO)wireless access point. When the technician does a site survey using the laptop the wireless network is not discovered. Computers previously on the wireless network were connected, and the wireless card appears to be working. Which of the following could be causing the issue?

    • The SSID is set to not broadcast.

    • The wireless router does not have adequate AC power.

    • The WEP key is not correct.

    • The laptop is running on Windows Service Pack 1.

    Correct Answer
    A. The SSID is set to not broadcast.
    Explanation
    The reason the wireless network is not being discovered is because the SSID is set to not broadcast. When the SSID is not broadcasted, the network does not appear in the list of available networks on the laptop during the site survey. This is a security measure to prevent unauthorized users from easily identifying and connecting to the network. However, devices that were previously connected to the network will still be able to connect as long as they have the correct SSID and security key.

    Rate this question:

  • 27. 

    A users workstation is able to resolve IP addresses of any host, and can ping other workstations on the local subnet, but is unable to ping addresses on other subnets. Which of the following is the MOST likely cause of the problem?

    • The workstation is configured with an incorrect subnet mask.

    • The workstation is configured with the incorrect default gateway.

    • The workstations NIC is configured for a different port speed than the switch.

    • The workstation is assigned to the incorrect VLAN.

    Correct Answer
    A. The workstation is configured with the incorrect default gateway.
    Explanation
    The most likely cause of the problem is that the workstation is configured with the incorrect default gateway. The default gateway is responsible for routing traffic between different subnets. If the workstation has the wrong default gateway configured, it will not be able to send traffic to other subnets, resulting in the inability to ping addresses on other subnets.

    Rate this question:

  • 28. 

    A technician is troubleshooting a printer problem in a SOHO environment. The printer is connected to the network and the computers can print using TCP/IP directly. The computers were able to print the day before, but now they cannot. Which of the following setups would aid in preventing this problem?

    • Set up the printer on a public IP address.

    • Configure the printer to use an APIPA.

    • Change the printer setting to use multicast.

    • Place the printer on a static IP address.

    Correct Answer
    A. Place the printer on a static IP address.
    Explanation
    Placing the printer on a static IP address would aid in preventing the problem. In a SOHO environment, using a static IP address ensures that the printer's IP address remains consistent and does not change. This allows the computers to always locate and connect to the printer without any issues. If the printer is set to use a dynamic IP address (such as APIPA or multicast), its IP address may change over time, causing the computers to lose connection and be unable to print.

    Rate this question:

  • 29. 

    Which of the following is the recommended maximum distance CAT6 cable should be run?

    • 246 feet (75 meters)

    • 100 feet (30.5 meters)

    • 328 feet (100 meters)

    • 292 feet (89 meters)

    Correct Answer
    A. 328 feet (100 meters)
    Explanation
    The recommended maximum distance that a CAT6 cable should be run is 328 feet (100 meters). This is because CAT6 cables are designed to support higher bandwidths and faster data transmission rates compared to previous versions of Ethernet cables. Beyond this distance, there may be a significant loss in signal quality and an increase in data errors. Therefore, it is recommended to stay within the specified maximum distance to ensure optimal performance of the CAT6 cable.

    Rate this question:

  • 30. 

    To forward traffic from a host with the IP address of 10.0.0.100/25 to10.0.0.200/25 which of the following devices will be required?

    • A router

    • A layer 2 switch

    • A hub

    • A DNS server

    Correct Answer
    A. A router
    Explanation
    To forward traffic from one IP address to another IP address, a router is required. A router is a networking device that connects different networks and forwards data packets between them. It examines the destination IP address of incoming packets and determines the best path to forward them to the intended destination. In this scenario, to forward traffic from the host with the IP address 10.0.0.100/25 to 10.0.0.200/25, a router would be needed to route the packets between the two hosts. A layer 2 switch and a hub are not designed to perform routing functions, and a DNS server is used for domain name resolution, not for forwarding traffic between IP addresses.

    Rate this question:

  • 31. 

    A company's network is wired in a bus topology and one of the computers is unable to access the network. Which of the following is the FIRST step in the troubleshooting process?

    • Reinstall the NIC driver.

    • Replace the cable.

    • Check the cable connections.

    • Replace the NIC.

    Correct Answer
    A. Check the cable connections.
    Explanation
    The first step in troubleshooting a network issue in a bus topology is to check the cable connections. This is because a loose or faulty cable connection can often cause connectivity problems. By checking the cable connections, you can ensure that all the devices are properly connected and that there are no loose or damaged cables. If the cable connections are found to be fine, then further troubleshooting steps can be taken, such as checking the NIC driver or replacing the cable.

    Rate this question:

  • 32. 

    A packet sniffer has been placed on a network and shows client A is sending TCP SYN packets to server B. Which of the following packets should be sent from server B in response?

    • SYN-NAK

    • SYN-ACK

    • ACK

    • NAK

    Correct Answer
    A. SYN-ACK
    Explanation
    When client A sends TCP SYN packets to server B, it is initiating a connection request. In response, server B should send a SYN-ACK packet. This packet acknowledges the receipt of the SYN packet and also includes its own SYN flag to establish a connection. This is part of the TCP three-way handshake process, where the client sends a SYN packet, the server responds with a SYN-ACK packet, and finally, the client sends an ACK packet to complete the connection establishment.

    Rate this question:

  • 33. 

    Which of the following tools can send a signal down a cable and measure how long it takes to comeback?

    • Multimeter

    • Voltage event recorder

    • TDR

    • Toner probe

    Correct Answer
    A. TDR
    Explanation
    A Time Domain Reflectometer (TDR) is a tool that can send a signal down a cable and measure how long it takes to comeback. It is commonly used in the field of telecommunications to locate faults or breaks in cables. By analyzing the time it takes for the signal to return, the TDR can determine the distance to the fault or break. This makes it a valuable tool for troubleshooting and maintenance of cable systems.

    Rate this question:

  • 34. 

    Enabling MAC address filtering on a switch can be used to mitigate which of the following security threats?

    • Rogue access points

    • Viruses

    • Social engineering

    • Worms

    Correct Answer
    A. Rogue access points
    Explanation
    Enabling MAC address filtering on a switch can be used to mitigate the security threat of rogue access points. MAC address filtering allows the switch to only allow connections from devices with specific MAC addresses. By configuring the switch to only accept connections from authorized devices, it can prevent unauthorized devices, such as rogue access points, from gaining access to the network. This helps to ensure that only trusted devices are able to connect to the network and reduces the risk of unauthorized access and potential security breaches.

    Rate this question:

  • 35. 

    A 100 pair cable is typically used to connect:

    • Telephony distribution.

    • Computer labs with more than 20 computers.

    • Security cameras.

    • Businesses with more than 75 computers.

    Correct Answer
    A. Telephony distribution.
    Explanation
    A 100 pair cable is typically used to connect telephony distribution because telephony distribution systems often require a large number of connections. A 100 pair cable has 100 individual pairs of wires, which allows for a high number of connections to be made. This is necessary in telephony distribution systems where multiple telephone lines need to be connected and distributed to various locations.

    Rate this question:

  • 36. 

    Which of the following utilities will produce the results printed below?TCP Certs03:1072 172.31.0.78:3389 Established

    • Netstat

    • Arp

    • Ping

    • Tracert

    Correct Answer
    A. Netstat
    Explanation
    Netstat is the correct answer because it is a utility that displays active network connections and listening ports on a computer. It provides information about the protocol, local and remote IP addresses, and the state of the connection. In this case, the output "TCP Certs03:1072 172.31.0.78:3389 Established" indicates an established TCP connection between the local host Certs03 on port 1072 and the remote IP address 172.31.0.78 on port 3389.

    Rate this question:

  • 37. 

    Which of the following devices is used to connect a WAN to a LAN?

    • Basic router

    • Repeater

    • Bridge

    • Basic switch

    Correct Answer
    A. Basic router
    Explanation
    A basic router is used to connect a Wide Area Network (WAN) to a Local Area Network (LAN). A router is a networking device that forwards data packets between computer networks. It determines the best path for data to travel from the LAN to the WAN and vice versa. It also performs network address translation (NAT) to allow multiple devices on the LAN to share a single public IP address. Therefore, a basic router is the correct device for connecting a WAN to a LAN.

    Rate this question:

  • 38. 

    A user reports that the wireless network is slow and is able to see and access shared folders that are unknown to the user. Which of the following is the cause of the problem?

    • The wireless NIC is defective.

    • Wireless router is improperly configured.

    • The user is connecting to the wrong SSID.

    • The SSID broadcast is disabled.

    Correct Answer
    A. The user is connecting to the wrong SSID.
    Explanation
    The user is connecting to the wrong SSID because they are able to see and access shared folders that are unknown to them. This suggests that they are connected to a different wireless network than they intended to, which is causing the slow network speed.

    Rate this question:

  • 39. 

    A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network. Which of the following is a probable cause?

    • Switching loop is occurring on the switch.

    • Incorrect SNMP settings on the switch.

    • Wrong subnet mask on the switch.

    • Port is misconfigured on the switch.

    Correct Answer
    A. Port is misconfigured on the switch.
    Explanation
    The probable cause for the user being unable to connect to the network while others on the same switch can connect successfully is a misconfiguration of the port on the switch. This means that the specific port that the user is connected to may have incorrect settings or configurations that are preventing a successful connection.

    Rate this question:

  • 40. 

    Which of the following Will allow an administrator to restrict communication between network devices?

    • DHCP

    • NAT

    • CIDR

    • ACL

    Correct Answer
    A. ACL
    Explanation
    ACL stands for Access Control List. It is a security feature that allows an administrator to restrict communication between network devices. ACLs can be used to control network traffic by specifying which packets are allowed to pass through a network interface and which are denied. By configuring ACLs, administrators can define rules and policies to filter and control the flow of data within a network, enhancing security and preventing unauthorized access.

    Rate this question:

  • 41. 

    For an enterprise to use one of the reserved private IP address ranges, as best practice they should coordinate with:

    • Their IT department.

    • IANA.

    • IEEE.

    • Their legal department.

    Correct Answer
    A. Their IT department.
    Explanation
    When an enterprise wants to use one of the reserved private IP address ranges, it is best practice to coordinate with their IT department. The IT department is responsible for managing and maintaining the organization's network infrastructure, including IP address allocation. They have the knowledge and expertise to ensure that the chosen IP address range does not conflict with existing network resources and can provide guidance on best practices for IP address management within the organization. Coordinating with the IT department helps to maintain the integrity and stability of the network.

    Rate this question:

  • 42. 

    At which of the following layers of the OSI model would a repeater operate?

    • Layer 7

    • Layer 5

    • Layer 3

    • Layer 1

    Correct Answer
    A. Layer 1
    Explanation
    A repeater operates at Layer 1 of the OSI model, which is the Physical layer. This layer is responsible for the transmission and reception of raw data bits over a physical medium. A repeater amplifies and regenerates signals that have weakened over long distances, allowing them to be transmitted further without loss of quality. It does not interpret or manipulate the data in any way, making it the appropriate layer for a repeater to operate.

    Rate this question:

  • 43. 

    An organization with 2,500 users has exhausted their Internet bandwidth. After some investigation, the network administrator discovers that 95%of the traffic is coming from web browsing. Which of the following network devices could be added to BEST reduce the amount of Internet bandwidth the company is using?

    • Content switch

    • Load balancer

    • Proxy server

    • An additional DNS server

    Correct Answer
    A. Proxy server
    Explanation
    A proxy server can be added to the network to reduce the amount of Internet bandwidth being used. A proxy server acts as an intermediary between the users and the Internet. It can cache frequently accessed web pages and files, reducing the need for multiple users to download the same content from the Internet. This can help to conserve bandwidth and improve network performance. By routing web browsing traffic through the proxy server, the organization can effectively reduce the amount of Internet bandwidth being consumed by web browsing activities.

    Rate this question:

  • 44. 

    Which of the following subnet masks will produce the smallest subnet size for a pointtopoint network link?

    • 255.255.255.248

    • 255.255.255.128

    • 255.255.255.252

    • 255.255.255.0

    Correct Answer
    A. 255.255.255.252
    Explanation
    The subnet mask 255.255.255.252 will produce the smallest subnet size for a point-to-point network link. This is because a subnet mask of 255.255.255.252 allows for only 2 usable IP addresses in the subnet, which is the minimum number required for a point-to-point link. The other subnet masks listed allow for larger subnet sizes and more usable IP addresses.

    Rate this question:

  • 45. 

    Two servers and five workstations are connected using a 100BASE-T network. Which of the following physical topologies is used?

    • FDDI

    • Bus

    • Ring

    • Star

    Correct Answer
    A. Star
    Explanation
    A star topology is used in this scenario where two servers and five workstations are connected using a 100BASE-T network. In a star topology, all devices are connected to a central hub or switch. This central hub acts as a central point of communication, allowing each device to communicate directly with the hub. This topology provides a high level of reliability and scalability as each device has its own dedicated connection to the central hub, minimizing network downtime and allowing for easy addition or removal of devices.

    Rate this question:

  • 46. 

    Which of the following would a technician use a punch down tool on?

    • RJ-45 connector

    • ST connector

    • 110 block

    • Smart jack

    Correct Answer
    A. 110 block
    Explanation
    A technician would use a punch down tool on a 110 block. A 110 block is a type of punch down block used to connect and terminate network cables. The punch down tool is used to insert the individual wires into the corresponding slots on the 110 block, creating a secure and reliable connection. The RJ-45 connector is typically used for Ethernet connections, the ST connector is used for fiber optic connections, and the smart jack is a type of network interface device.

    Rate this question:

  • 47. 

    Which of the following is the point when local exchange carrier responsibility ends?

    • Demarc

    • Point of Presence (POP)

    • Smart jack

    • MDF

    Correct Answer
    A. Demarc
    Explanation
    The point when local exchange carrier responsibility ends is known as the demarcation point. This is the point where the responsibility for the telecommunications line transfers from the service provider to the customer. At the demarcation point, the service provider's responsibility for maintaining and repairing the line ends, and any issues beyond that point are the customer's responsibility.

    Rate this question:

  • 48. 

    A company would like to configure newsfeeds on the network for employees to be aware of internal company information. Which of the following ports would be used to allow newsfeeds to passthrough?

    • 25

    • 22

    • 119

    • 143

    Correct Answer
    A. 119
    Explanation
    Port 119 is used for the Network News Transfer Protocol (NNTP), which is specifically designed for the distribution, retrieval, and posting of news articles. By allowing newsfeeds to pass through port 119, employees will be able to access internal company information and stay updated on the latest news within the organization. Ports 25, 22, and 143 are used for other protocols such as SMTP (email), SSH (secure shell), and IMAP (email retrieval), respectively, and are not relevant for configuring newsfeeds.

    Rate this question:

  • 49. 

    Which of the following commands would allow the technician to identify the currently assigned DNS server?

    • Nbtstat

    • Netstat

    • Dig

    • Nslookup

    Correct Answer
    A. Nslookup
    Explanation
    The nslookup command is used to query the DNS (Domain Name System) server to obtain information about a specific domain or IP address. By running the nslookup command, the technician can identify the currently assigned DNS server. The other options, nbtstat, netstat, and dig, do not provide the same functionality as nslookup in terms of identifying the assigned DNS server.

    Rate this question:

Quiz Review Timeline (Updated): Feb 19, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 19, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 23, 2010
    Quiz Created by
    Afiavison
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.