Network + Practice Test 3

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Afiavison
A
Afiavison
Community Contributor
Quizzes Created: 3 | Total Attempts: 2,289
| Attempts: 108 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. Which of the following actions should the administrator do FIRST to help access a gigabit connection?

Explanation

Changing the CAT5 cable to a CAT6 cable would be the first step to help access a gigabit connection. CAT6 cables are designed to support higher bandwidth and faster data transmission compared to CAT5 cables. This upgrade would ensure that the network is capable of handling the increased speed and performance requirements of a gigabit connection.

Submit
Please wait...
About This Quiz
Network + Practice  Test 3 - Quiz

Network + Practice Test 3 evaluates essential networking skills, focusing on troubleshooting connectivity issues, understanding server configurations, and utilizing network tools. This quiz prepares learners for practical challenges... see morein network administration, enhancing their problem-solving abilities in real-world scenarios. see less

2. When using the ping utility, which switch pings a network device until stopped?

Explanation

The correct answer is "ping -t". When using the ping utility, the "-t" switch is used to continuously ping a network device until it is manually stopped. This is useful for monitoring the network connection and checking for any interruptions or delays in communication.

Submit
3. Which of the following is the maximum speed available from a full T1 line?

Explanation

A full T1 line has a maximum speed of 1.544Mbps. This is a standard data transmission rate for digital telecommunication services.

Submit
4. Which of the following tools would be used to test the break in a fiber connection on the network?

Explanation

An OTDR (Optical Time-Domain Reflectometer) is a tool used to test the break in a fiber connection on a network. It sends a laser pulse into the fiber and measures the reflections to determine the location and severity of any breaks or faults. This allows technicians to accurately locate and troubleshoot issues in the fiber optic network. A butt set is used for testing telephone lines, a multimeter is used to measure electrical properties, and a toner probe is used to trace and identify cables.

Submit
5. A client is able to ping its default gateway, but is unable to communicate with a remote host. Which of the following utilities would the technicianuse to determine where the fault is?

Explanation

The technician would use the traceroute utility to determine where the fault is. Traceroute is used to trace the route that packets take from the client to the remote host, showing each hop along the way. By analyzing the output of traceroute, the technician can identify any network devices or connections that may be causing the communication issue.

Submit
6. Which of the following is an example of secure tunneling?

Explanation

SSL VPN is an example of secure tunneling because it uses Secure Sockets Layer (SSL) encryption to create a secure and encrypted connection between the client and the VPN server. This ensures that the data transmitted between the client and the server is protected from unauthorized access and eavesdropping. SSL VPNs are commonly used to provide remote access to corporate networks and to secure communication over public networks such as the internet.

Submit
7. A technician is asked to place wireless Internet access in an open warehouse environment. After installing the equipment the technician notices varying signal strengths at different locations. Which of the following should the technician consider to increase the consistency of the signal strength?

Explanation

To increase the consistency of the signal strength in an open warehouse environment, the technician should consider changing the antenna placement. This is because the varying signal strengths at different locations indicate that the current antenna placement may not be optimal for providing a consistent signal throughout the warehouse. By strategically relocating the antennas, the technician can potentially improve the coverage and signal strength in areas that are currently experiencing weak or inconsistent signals.

Submit
8. Which of the following cable types are the MOST widely used in a corporate gigabit network scheme?

Explanation

CAT6 cables are the most widely used in a corporate gigabit network scheme because they offer higher bandwidth and faster data transmission compared to CAT5, CAT1, and CAT3 cables. CAT6 cables are designed to support gigabit Ethernet and can handle higher frequencies, reducing crosstalk and improving overall network performance. They are also backward compatible with previous cable types, making them a popular choice for corporate networks that require high-speed and reliable connectivity.

Submit
9. Which of the following cable types is used in a 100Base-FX network?

Explanation

Fiber optic cable is used in a 100Base-FX network. This type of cable is specifically designed for high-speed data transmission over long distances. It uses light signals to transmit data, which allows for faster and more reliable communication compared to other cable types like UTP, coaxial, or STP. Fiber optic cables are also immune to electromagnetic interference, making them ideal for use in networking environments.

Submit
10. A technician is connecting two buildings located approximately 1969 feet (600 meters) apart on the same campus. Primary objectives are to create a secure link that that is capable of transmitting at 1Gbps. Which of the following would be the BEST way to connect these two buildings?

Explanation

Fiber optic cable would be the best way to connect the two buildings located 1969 feet apart on the same campus because it can provide a secure and high-speed connection capable of transmitting at 1Gbps. Fiber optic cables use light signals to transmit data, which allows for faster and more reliable communication compared to other options like point-to-point wireless link, CAT6 cable, or RG-58 cable. Additionally, fiber optic cables are less susceptible to interference and can support longer distances without signal degradation.

Submit
11. Which of the following is a utility that translates the physical network address to its IP address?

Explanation

RARP (Reverse Address Resolution Protocol) is a utility that translates the physical network address to its IP address. It is used in situations where a device needs to find its IP address but only knows its physical address. By sending a RARP request, the device can obtain its IP address from a RARP server. This is particularly useful in diskless workstations or devices that do not have permanent storage for storing IP addresses.

Submit
12. Which of the following documentations would a network technician find ports that a company has blocked?

Explanation

A network technician would find the ports that a company has blocked in the documentation of policies, procedures, and configurations. This documentation typically outlines the specific rules and restrictions that are in place for the company's network. By referring to this documentation, the technician can identify the ports that have been blocked and understand the reasons behind these restrictions. This information is crucial for troubleshooting network issues and ensuring the security and efficiency of the network.

Submit
13. Which of the following cables would a technician make in order to identify a physical interface problem?

Explanation

A loopback cable is used to test the functionality of a physical interface by creating a loop within the device itself. When the loopback cable is connected, the device sends signals to itself, allowing the technician to determine if the physical interface is functioning properly. This helps in identifying any physical interface problems such as faulty connectors, cables, or ports.

Submit
14. In a Class C subnet, a network ID may occupy a maximum of:

Explanation

In a Class C subnet, the network ID may occupy a maximum of 24 bits. This means that the first 24 bits of the IP address are used to identify the network, while the remaining 8 bits are used to identify the hosts within that network. This allows for a maximum of 256 (2^8) hosts in a Class C subnet.

Submit
15. Which of the following IEEE standards has a maximum bandwidth of 54Mbps operating at 5GHz?

Explanation

IEEE standard 802.11a has a maximum bandwidth of 54Mbps operating at 5GHz. This standard was introduced as an enhancement to the 802.11 standard and operates on the 5GHz frequency band. It offers higher data rates compared to the 802.11b standard, which operates on the 2.4GHz frequency band. The 802.11a standard provides faster and more reliable wireless connections, making it suitable for applications that require high-speed data transfer, such as video streaming and online gaming.

Submit
16. Which of the following logical topologies uses centralized authentication?

Explanation

Client/server topology uses centralized authentication because in this type of network, there is a central server that controls and authenticates user access to resources. This server acts as a central authority for authentication, allowing users to log in and access resources based on their credentials. In a client/server network, clients (individual computers) connect to the server to request services or access data, and the server verifies their identity before granting access. This centralized authentication ensures security and control over user access within the network.

Submit
17. Which of the following features of a switch will allow two switches to pass network information?

Explanation

Trunking is a feature of a switch that allows two switches to pass network information. Trunking enables the switches to carry multiple VLANs (Virtual Local Area Networks) over a single physical link. By using trunking, the switches can exchange network traffic and share information about different VLANs, allowing for efficient communication and better network management. Disabling routing protocols, port speeds, and PoE (Power over Ethernet) are not directly related to the ability of switches to pass network information.

Submit
18. The network administrator needs to use an IP addressing method that will not require manual updating. Which of the following should be used?

Explanation

Dynamic IP addressing should be used in this scenario. Dynamic IP addressing allows the network administrator to assign IP addresses to devices automatically using a DHCP (Dynamic Host Configuration Protocol) server. This eliminates the need for manual updating as the IP addresses are assigned dynamically and can be changed as needed. This method is more efficient and scalable, especially in large networks where manual IP address assignment would be time-consuming and prone to errors.

Submit
19. Which of the following network devices would be responsible for translating canonical names into IP addresses?

Explanation

A DNS server is responsible for translating canonical names into IP addresses. DNS stands for Domain Name System, and it is a system that translates domain names (such as www.example.com) into IP addresses (such as 192.168.1.1) that computers can understand. When a user types a domain name into a web browser, the DNS server is responsible for finding the corresponding IP address and directing the user to the correct website.

Submit
20. A second network card in a server that activates if the primary card fails is an example of which of the following network performance optimization?

Explanation

A second network card in a server that activates if the primary card fails is an example of fault tolerance. Fault tolerance refers to the ability of a system or network to continue functioning even if there is a failure or error in one of its components. In this case, the presence of a backup network card ensures that there is redundancy in case the primary card fails, allowing for uninterrupted network connectivity and preventing any downtime or disruption in service.

Submit
21. Which of the following technologies do the 802.11 networks utilize to prevent packet collisions?

Explanation

802.11 networks utilize CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) to prevent packet collisions. This technology allows devices to sense the wireless medium before transmitting data, and if it is busy, they wait for a random period of time before attempting to transmit again. This helps to avoid collisions and ensures that data is transmitted successfully in a shared network environment.

Submit
22. When all routers in a network agree about the path from one point to another, the network is said to be which of the following?

Explanation

When all routers in a network agree about the path from one point to another, the network is said to be "converged". This means that all routers have reached a consensus on the best route to take, ensuring efficient and reliable communication between the two points.

Submit
23. A technician receives a call on monday morning that several computers will not connect to the network. The technician determines that the computers left on over the weekend are functional and those that were turned off over the weekend are not functioning. Which of the following is the MOST likely source of the problem?

Explanation

The fact that the computers left on over the weekend are functional while those that were turned off are not functioning suggests that the issue lies with the dynamic host configuration protocol (DHCP). DHCP is responsible for assigning IP addresses to computers on a network. If DHCP is not functioning, the computers that were turned off over the weekend would not have been able to obtain an IP address and therefore cannot connect to the network. Restarting WINS, fixing DNS, or LDAP would not address this specific issue.

Submit
24. Which of the following network segments is located outside the firewall?

Explanation

A DMZ (Demilitarized Zone) is a network segment that is located outside the firewall. It acts as a buffer zone between the internal network and the external network, providing an additional layer of security. The DMZ is used to host servers that need to be accessible from the internet, such as web servers or email servers. By placing these servers in the DMZ, it reduces the risk of unauthorized access to the internal network if the server is compromised. Therefore, the correct answer is DMZ.

Submit
25. Which of the following frequency ranges does 802.11a operate at?

Explanation

802.11a operates at the frequency range of 5GHz. This frequency range allows for higher data transfer rates and less interference compared to the 2.4GHz frequency range used by other Wi-Fi standards like 802.11b and 802.11g. By operating at 5GHz, 802.11a can provide faster and more reliable wireless connections, making it suitable for applications that require high bandwidth such as streaming videos or online gaming.

Submit
26. A technician needs to connect a laptop via the small office, home office (SOHO)wireless access point. When the technician does a site survey using the laptop the wireless network is not discovered. Computers previously on the wireless network were connected, and the wireless card appears to be working. Which of the following could be causing the issue?

Explanation

The reason the wireless network is not being discovered is because the SSID is set to not broadcast. When the SSID is not broadcasted, the network does not appear in the list of available networks on the laptop during the site survey. This is a security measure to prevent unauthorized users from easily identifying and connecting to the network. However, devices that were previously connected to the network will still be able to connect as long as they have the correct SSID and security key.

Submit
27. A users workstation is able to resolve IP addresses of any host, and can ping other workstations on the local subnet, but is unable to ping addresses on other subnets. Which of the following is the MOST likely cause of the problem?

Explanation

The most likely cause of the problem is that the workstation is configured with the incorrect default gateway. The default gateway is responsible for routing traffic between different subnets. If the workstation has the wrong default gateway configured, it will not be able to send traffic to other subnets, resulting in the inability to ping addresses on other subnets.

Submit
28. A technician is troubleshooting a printer problem in a SOHO environment. The printer is connected to the network and the computers can print using TCP/IP directly. The computers were able to print the day before, but now they cannot. Which of the following setups would aid in preventing this problem?

Explanation

Placing the printer on a static IP address would aid in preventing the problem. In a SOHO environment, using a static IP address ensures that the printer's IP address remains consistent and does not change. This allows the computers to always locate and connect to the printer without any issues. If the printer is set to use a dynamic IP address (such as APIPA or multicast), its IP address may change over time, causing the computers to lose connection and be unable to print.

Submit
29. Which of the following is the recommended maximum distance CAT6 cable should be run?

Explanation

The recommended maximum distance that a CAT6 cable should be run is 328 feet (100 meters). This is because CAT6 cables are designed to support higher bandwidths and faster data transmission rates compared to previous versions of Ethernet cables. Beyond this distance, there may be a significant loss in signal quality and an increase in data errors. Therefore, it is recommended to stay within the specified maximum distance to ensure optimal performance of the CAT6 cable.

Submit
30. To forward traffic from a host with the IP address of 10.0.0.100/25 to10.0.0.200/25 which of the following devices will be required?

Explanation

To forward traffic from one IP address to another IP address, a router is required. A router is a networking device that connects different networks and forwards data packets between them. It examines the destination IP address of incoming packets and determines the best path to forward them to the intended destination. In this scenario, to forward traffic from the host with the IP address 10.0.0.100/25 to 10.0.0.200/25, a router would be needed to route the packets between the two hosts. A layer 2 switch and a hub are not designed to perform routing functions, and a DNS server is used for domain name resolution, not for forwarding traffic between IP addresses.

Submit
31. A company's network is wired in a bus topology and one of the computers is unable to access the network. Which of the following is the FIRST step in the troubleshooting process?

Explanation

The first step in troubleshooting a network issue in a bus topology is to check the cable connections. This is because a loose or faulty cable connection can often cause connectivity problems. By checking the cable connections, you can ensure that all the devices are properly connected and that there are no loose or damaged cables. If the cable connections are found to be fine, then further troubleshooting steps can be taken, such as checking the NIC driver or replacing the cable.

Submit
32. A packet sniffer has been placed on a network and shows client A is sending TCP SYN packets to server B. Which of the following packets should be sent from server B in response?

Explanation

When client A sends TCP SYN packets to server B, it is initiating a connection request. In response, server B should send a SYN-ACK packet. This packet acknowledges the receipt of the SYN packet and also includes its own SYN flag to establish a connection. This is part of the TCP three-way handshake process, where the client sends a SYN packet, the server responds with a SYN-ACK packet, and finally, the client sends an ACK packet to complete the connection establishment.

Submit
33. Which of the following tools can send a signal down a cable and measure how long it takes to comeback?

Explanation

A Time Domain Reflectometer (TDR) is a tool that can send a signal down a cable and measure how long it takes to comeback. It is commonly used in the field of telecommunications to locate faults or breaks in cables. By analyzing the time it takes for the signal to return, the TDR can determine the distance to the fault or break. This makes it a valuable tool for troubleshooting and maintenance of cable systems.

Submit
34. Enabling MAC address filtering on a switch can be used to mitigate which of the following security threats?

Explanation

Enabling MAC address filtering on a switch can be used to mitigate the security threat of rogue access points. MAC address filtering allows the switch to only allow connections from devices with specific MAC addresses. By configuring the switch to only accept connections from authorized devices, it can prevent unauthorized devices, such as rogue access points, from gaining access to the network. This helps to ensure that only trusted devices are able to connect to the network and reduces the risk of unauthorized access and potential security breaches.

Submit
35. A 100 pair cable is typically used to connect:

Explanation

A 100 pair cable is typically used to connect telephony distribution because telephony distribution systems often require a large number of connections. A 100 pair cable has 100 individual pairs of wires, which allows for a high number of connections to be made. This is necessary in telephony distribution systems where multiple telephone lines need to be connected and distributed to various locations.

Submit
36. Which of the following utilities will produce the results printed below?
TCP Certs03:1072 172.31.0.78:3389 Established

Explanation

Netstat is the correct answer because it is a utility that displays active network connections and listening ports on a computer. It provides information about the protocol, local and remote IP addresses, and the state of the connection. In this case, the output "TCP Certs03:1072 172.31.0.78:3389 Established" indicates an established TCP connection between the local host Certs03 on port 1072 and the remote IP address 172.31.0.78 on port 3389.

Submit
37. Which of the following devices is used to connect a WAN to a LAN?

Explanation

A basic router is used to connect a Wide Area Network (WAN) to a Local Area Network (LAN). A router is a networking device that forwards data packets between computer networks. It determines the best path for data to travel from the LAN to the WAN and vice versa. It also performs network address translation (NAT) to allow multiple devices on the LAN to share a single public IP address. Therefore, a basic router is the correct device for connecting a WAN to a LAN.

Submit
38. A user reports that the wireless network is slow and is able to see and access shared folders that are unknown to the user. Which of the following is the cause of the problem?

Explanation

The user is connecting to the wrong SSID because they are able to see and access shared folders that are unknown to them. This suggests that they are connected to a different wireless network than they intended to, which is causing the slow network speed.

Submit
39. A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network. Which of the following is a probable cause?

Explanation

The probable cause for the user being unable to connect to the network while others on the same switch can connect successfully is a misconfiguration of the port on the switch. This means that the specific port that the user is connected to may have incorrect settings or configurations that are preventing a successful connection.

Submit
40. Which of the following Will allow an administrator to restrict communication between network devices?

Explanation

ACL stands for Access Control List. It is a security feature that allows an administrator to restrict communication between network devices. ACLs can be used to control network traffic by specifying which packets are allowed to pass through a network interface and which are denied. By configuring ACLs, administrators can define rules and policies to filter and control the flow of data within a network, enhancing security and preventing unauthorized access.

Submit
41. For an enterprise to use one of the reserved private IP address ranges, as best practice they should coordinate with:

Explanation

When an enterprise wants to use one of the reserved private IP address ranges, it is best practice to coordinate with their IT department. The IT department is responsible for managing and maintaining the organization's network infrastructure, including IP address allocation. They have the knowledge and expertise to ensure that the chosen IP address range does not conflict with existing network resources and can provide guidance on best practices for IP address management within the organization. Coordinating with the IT department helps to maintain the integrity and stability of the network.

Submit
42. At which of the following layers of the OSI model would a repeater operate?

Explanation

A repeater operates at Layer 1 of the OSI model, which is the Physical layer. This layer is responsible for the transmission and reception of raw data bits over a physical medium. A repeater amplifies and regenerates signals that have weakened over long distances, allowing them to be transmitted further without loss of quality. It does not interpret or manipulate the data in any way, making it the appropriate layer for a repeater to operate.

Submit
43. An organization with 2,500 users has exhausted their Internet bandwidth. After some investigation, the network administrator discovers that 95%of the traffic is coming from web browsing. Which of the following network devices could be added to BEST reduce the amount of Internet bandwidth the company is using?

Explanation

A proxy server can be added to the network to reduce the amount of Internet bandwidth being used. A proxy server acts as an intermediary between the users and the Internet. It can cache frequently accessed web pages and files, reducing the need for multiple users to download the same content from the Internet. This can help to conserve bandwidth and improve network performance. By routing web browsing traffic through the proxy server, the organization can effectively reduce the amount of Internet bandwidth being consumed by web browsing activities.

Submit
44. Which of the following subnet masks will produce the smallest subnet size for a pointtopoint network link?

Explanation

The subnet mask 255.255.255.252 will produce the smallest subnet size for a point-to-point network link. This is because a subnet mask of 255.255.255.252 allows for only 2 usable IP addresses in the subnet, which is the minimum number required for a point-to-point link. The other subnet masks listed allow for larger subnet sizes and more usable IP addresses.

Submit
45. Two servers and five workstations are connected using a 100BASE-T network. Which of the following physical topologies is used?

Explanation

A star topology is used in this scenario where two servers and five workstations are connected using a 100BASE-T network. In a star topology, all devices are connected to a central hub or switch. This central hub acts as a central point of communication, allowing each device to communicate directly with the hub. This topology provides a high level of reliability and scalability as each device has its own dedicated connection to the central hub, minimizing network downtime and allowing for easy addition or removal of devices.

Submit
46. Which of the following would a technician use a punch down tool on?

Explanation

A technician would use a punch down tool on a 110 block. A 110 block is a type of punch down block used to connect and terminate network cables. The punch down tool is used to insert the individual wires into the corresponding slots on the 110 block, creating a secure and reliable connection. The RJ-45 connector is typically used for Ethernet connections, the ST connector is used for fiber optic connections, and the smart jack is a type of network interface device.

Submit
47. Which of the following is the point when local exchange carrier responsibility ends?

Explanation

The point when local exchange carrier responsibility ends is known as the demarcation point. This is the point where the responsibility for the telecommunications line transfers from the service provider to the customer. At the demarcation point, the service provider's responsibility for maintaining and repairing the line ends, and any issues beyond that point are the customer's responsibility.

Submit
48. A company would like to configure newsfeeds on the network for employees to be aware of internal company information. Which of the following ports would be used to allow newsfeeds to passthrough?

Explanation

Port 119 is used for the Network News Transfer Protocol (NNTP), which is specifically designed for the distribution, retrieval, and posting of news articles. By allowing newsfeeds to pass through port 119, employees will be able to access internal company information and stay updated on the latest news within the organization. Ports 25, 22, and 143 are used for other protocols such as SMTP (email), SSH (secure shell), and IMAP (email retrieval), respectively, and are not relevant for configuring newsfeeds.

Submit
49. Which of the following commands would allow the technician to identify the currently assigned DNS server?

Explanation

The nslookup command is used to query the DNS (Domain Name System) server to obtain information about a specific domain or IP address. By running the nslookup command, the technician can identify the currently assigned DNS server. The other options, nbtstat, netstat, and dig, do not provide the same functionality as nslookup in terms of identifying the assigned DNS server.

Submit
50. A new business with five computers moves into an office where coaxial cable exists. In order to use the existing infrastructure, which of the following topologies would be used?

Explanation

In a bus topology, all computers are connected to a single cable, known as the backbone. Each computer can transmit data to all other computers on the network by broadcasting the data onto the backbone. This makes it suitable for the scenario described, where the new business with five computers wants to utilize the existing coaxial cable infrastructure.

Submit
51. Which of the following protocols uses port 22 by default?

Explanation

SSH (Secure Shell) is a protocol used for secure remote login and file transfer. It uses port 22 by default to establish a secure connection between the client and the server. FTP (File Transfer Protocol) uses port 21, DNS (Domain Name System) uses port 53, and Telnet uses port 23. Therefore, the correct answer is SSH.

Submit
52. An Ethernet LAN has several trunk links passing near heavy machinery resulting in EMI. Which of the following Ethernet media types should be used to avoid interference?

Explanation

100Base-FX should be used to avoid interference in an Ethernet LAN near heavy machinery because it uses fiber optic cables which are immune to electromagnetic interference (EMI). Fiber optic cables do not conduct electricity and therefore do not generate or pick up electromagnetic signals, making them ideal for environments with high levels of EMI.

Submit
53. Which of the following commands would provide the following output?
DNS request timed out. timeout was 2 seconds.
*** Cant find server name for address 172.30.0.5: Timed out
*** Default servers are not available
Server: UnKnownAddress: 172.30.0.5
DNS request timed out. timeout was 2 seconds.
*** Request to UnKnown timedout

Explanation

The correct answer is nslookup because nslookup is a command-line tool used to query Domain Name System (DNS) to obtain domain name or IP address mapping. In this case, the output provided indicates that there was a DNS request timeout and the server name for the given address could not be found. This aligns with the purpose of nslookup, which is to perform DNS queries and obtain information about DNS records.

Submit
54. Which of the following network devices would a network administrator use to create a DMZ?

Explanation

A network administrator would use a network-based firewall to create a DMZ. A DMZ (demilitarized zone) is a network segment that is isolated from the internal network and the internet, providing an additional layer of security. A network-based firewall is specifically designed to control and monitor network traffic, allowing or blocking access based on predefined security policies. By placing a network-based firewall between the internal network and the DMZ, the administrator can regulate the flow of traffic and protect the internal network from potential threats originating from the DMZ.

Submit
55. A technician received a call from a remote user who is having issues connecting to a new VPN. Which of the following is the FIRST step the technician should take?

Explanation

The technician should first identify the symptoms and potential causes of the issue before taking any further steps. This will help in understanding the problem and finding a suitable solution. By analyzing the symptoms and potential causes, the technician can narrow down the possibilities and troubleshoot effectively. It is important to gather all the necessary information before proceeding with any action plan or documentation.

Submit
56. Two small companies sharing a switch would MOST likely benefit from which of the following advanced switch features?

Explanation

Two small companies sharing a switch would most likely benefit from VLAN (Virtual Local Area Network) feature. VLAN allows the switch to divide a single physical network into multiple virtual networks, providing separate broadcast domains and improving network security. With VLAN, each company can have its own isolated network within the shared switch, ensuring privacy and preventing interference between the two companies' devices. This feature allows for better network management, scalability, and flexibility in terms of network configuration and resource allocation.

Submit
57. Which of the following protocols would a multilayer switch use to learn the IP address of a directly connecte  device?

Explanation

A multilayer switch would use the ARP (Address Resolution Protocol) to learn the IP address of a directly connected device. ARP is used to map an IP address to a MAC address in a local network. When a device wants to communicate with another device on the same network, it uses ARP to find the MAC address associated with the IP address of the destination device. This allows the multilayer switch to build and maintain its ARP table, which is used for forwarding network traffic efficiently.

Submit
58. A user calls saying they are having issues connecting to the Internet, but they are able to connect to the email server. Which of the following commands would the user type in at the command prompt to display the MAC address?

Explanation

The user would type in "arp-a" at the command prompt to display the MAC address. The "arp-a" command is used to view the ARP (Address Resolution Protocol) cache, which contains the IP addresses and corresponding MAC addresses of devices on the local network. By using this command, the user can check if the MAC address is correctly associated with the IP address, which can help troubleshoot network connectivity issues.

Submit
59. Which of the following protocols are used to transfer files between two systems?(Select TWO).

Explanation

SCP (Secure Copy Protocol) and FTP (File Transfer Protocol) are both protocols used to transfer files between two systems. SCP is a secure file transfer protocol that uses SSH (Secure Shell) to provide encryption and authentication. FTP, on the other hand, is a standard network protocol that allows for the transfer of files between a client and a server on a computer network. Both protocols are widely used for transferring files over the internet or local networks.

Submit
60. Which of the following is an advantage of 100Base-FX over 100Base-TX?

Explanation

100Base-FX has an advantage over 100Base-TX in terms of longer cable runs. This means that it can transmit data over longer distances without experiencing significant signal degradation. This is beneficial in situations where the network infrastructure requires data to be transmitted over longer distances, such as in large office buildings or campus environments.

Submit
61. A company has installed a new 802.11g point-to-point connection between two buildings and is experiencing low throughput across the link. The current setup involves a wireless bridge on the roof with an omnidirectional antenna. Which of the following would BEST improve the link performance?

Explanation

Replacing the omnidirectional antennas with Yagi antennas would be the best solution to improve the link performance. Omnidirectional antennas radiate signals in all directions, resulting in a weaker and less focused signal. Yagi antennas, on the other hand, have a more directional beam pattern, allowing for a stronger and more focused signal. This would help increase the signal strength and improve the throughput across the link.

Submit
62. Which of the following tools are needed to create a CAT5e crossover cable?(Select TWO).

Explanation

To create a CAT5e crossover cable, two tools are required: snips and a cable crimper. Snips are necessary to cut the CAT5e cable to the desired length, while a cable crimper is used to attach the connectors onto the cable ends. The other options listed, such as TDR, multimeter, and OTDR, are not relevant to the creation of a crossover cable.

Submit
63. Which of the following mechanisms is used to calculate back-off time on an Ethernet link after a collision?

Explanation

CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is the correct answer. This mechanism is used to calculate the back-off time on an Ethernet link after a collision. CSMA/CD is a protocol used in Ethernet networks to avoid data collisions. When a collision occurs, the devices involved in the collision use a random back-off algorithm to determine when they can retransmit their data. This helps to minimize further collisions and maximize the efficiency of data transmission on the network.

Submit
64. A technician is asked tore-terminate a wall jack that has become loose. Upon looking at the wiring, the technician notices that it was originally wired as 568A. The company implemented a policy stating that all cable terminations should adhere to the 568B standard. With this in mind the technician should:

Explanation

The technician should re-terminate both ends of the cable to the 568B standard because the company implemented a policy stating that all cable terminations should adhere to the 568B standard. Since the wall jack has become loose, it is necessary to fix it by re-terminating both ends of the cable to ensure a secure and proper connection.

Submit
65. A technician installed a new wireless router. The customer is now having a problem playing online games, but they can connect to websites. Which of the following should the technician configure to resolve this problem?

Explanation

Port forwarding should be configured to resolve the problem of not being able to play online games while still being able to connect to websites. Port forwarding allows specific ports to be opened on the router, allowing incoming and outgoing data for certain applications or games. By configuring port forwarding, the technician can ensure that the necessary ports for online gaming are open, allowing the customer to play games without any connectivity issues.

Submit
66. Which of the following systems detects and reports attempts of unauthorized access to the network?

Explanation

An Intrusion Detection System (IDS) is a security tool that monitors network traffic and detects any suspicious or unauthorized activity or attempts to access the network. It analyzes network packets and compares them against a database of known attack signatures or abnormal behavior patterns. When an intrusion is detected, the IDS generates an alert or notification to the system administrator or security team, allowing them to respond and take appropriate action to prevent any potential security breaches. Unlike a firewall, which primarily focuses on blocking or allowing network traffic based on predefined rules, an IDS is specifically designed to detect and report unauthorized access attempts.

Submit
67. Which of the following software types would BEST be used for identifying an attack?

Explanation

An IDS (Intrusion Detection System) would be the best software type for identifying an attack. IDS monitors network traffic and analyzes it for any signs of malicious activity or unauthorized access attempts. It can detect and alert administrators about potential attacks, allowing them to take appropriate action to prevent further damage. IPS (Intrusion Prevention System) is similar to IDS but also has the ability to actively block or prevent attacks. A packet sniffer is a tool used to capture and analyze network traffic, but it may not specifically focus on identifying attacks. A port scanner is used to identify open ports on a network, but it may not provide comprehensive attack identification capabilities.

Submit
68. Which of the following cable standards has the highest effective range at a greater expense?

Explanation

1000Base-LX has the highest effective range at a greater expense compared to the other cable standards listed. This is because 1000Base-LX uses long-wavelength laser optics, allowing it to transmit data over longer distances, up to 10 kilometers. On the other hand, 1000Base-T uses twisted-pair copper cables and has a range of up to 100 meters. 1000Base-CX uses copper cables as well but has a shorter range of up to 25 meters. Lastly, 1000Base-SX uses short-wavelength optics and has a range of up to 550 meters. Therefore, 1000Base-LX offers the highest range but comes at a higher cost.

Submit
69. The 66 block termination point is:

Explanation

The 66 block termination point is CAT3 compliant, which means it is designed to support Category 3 cabling standards. Category 3 cabling is commonly used for telephone and data communication systems, providing a bandwidth of up to 16 MHz. This type of termination point is suitable for transmitting voice and low-speed data signals. It is not compatible with higher-speed applications like CAT6 or coaxial connections, which have greater bandwidth capabilities. Similarly, IEEE 1394 (FireWire) is a standard for high-speed data transfer, so it is not applicable to the 66 block termination point.

Submit
70. Which of the following LAN types would utilize CAT5 UTP?

Explanation

CAT5 UTP (Unshielded Twisted Pair) is a type of Ethernet cable commonly used for local area networks (LANs). It supports data transmission speeds of up to 1000 Mbps (megabits per second). Among the given LAN types, 100Base-TX is the only one that would utilize CAT5 UTP. 100Base-TX is an Ethernet standard that uses two pairs of twisted-pair cables, making it compatible with CAT5 UTP. 1000Base-T and 10GBase-SR, on the other hand, require higher-grade cables such as CAT5e or CAT6 for their higher data transmission speeds. 100Base-FX utilizes fiber optic cables instead of UTP.

Submit
71. A network administrator configured several network devices earlier today, but now the Internet is no longer available to several users. Which of the following logs should the network administrator reference to help identify the problem?

Explanation

The network administrator should reference the history logs to help identify the problem. History logs typically provide a record of past events and actions taken on the network devices. By reviewing the history logs, the administrator can track any recent changes or configurations made to the network devices that may have caused the Internet connectivity issue. This will help in troubleshooting and finding a solution to restore the Internet access for the affected users.

Submit
72. Which of the following protocols permits secure polling of network devices?

Explanation

SNMPv3 is the correct answer because it is an updated version of the Simple Network Management Protocol (SNMP) that provides enhanced security features. SNMPv3 supports authentication, encryption, and access control, making it suitable for secure polling of network devices. SCP (Secure Copy Protocol) is used for secure file transfer, while SSH (Secure Shell) is used for secure remote access. SNMPv2 is an older version of SNMP and does not offer the same level of security as SNMPv3.

Submit
73. Which of the following software types would BEST be used at identifying and reacting to an attack by shutting down a port or dropping certain types of packets?

Explanation

An Intrusion Prevention System (IPS) is a software type that is designed to identify and react to attacks by shutting down a port or dropping certain types of packets. It actively monitors network traffic, detects suspicious or malicious activity, and takes immediate action to prevent further damage or unauthorized access. Unlike a port scanner, which is used to discover open ports on a network, or a packet sniffer, which captures and analyzes network traffic, an IPS focuses on actively defending against attacks by blocking or filtering network traffic. An IDS (Intrusion Detection System) is similar to an IPS but lacks the ability to actively prevent attacks.

Submit
74. Which of the following traffic types would a network layer firewall be unable to filter?

Explanation

A network layer firewall operates at the network layer of the OSI model and is primarily responsible for filtering and controlling network traffic based on IP addresses, ports, and protocols. SMTP traffic, HTTP traffic, and ICMP messages are all types of network traffic that can be filtered by a network layer firewall. However, email sender verification is not a type of network traffic that can be filtered at the network layer. It is a process that involves checking the authenticity of the sender's email address, which typically occurs at the application layer of the OSI model. Therefore, a network layer firewall would be unable to filter email sender verification.

Submit
75. To support roaming across a wireless 802.11g network, each access point should be configured to use which of the following?

Explanation

For roaming across a wireless 802.11g network, it is important for each access point to be configured to use the same SSID (Service Set Identifier). The SSID is a unique identifier that allows devices to connect to a specific wireless network. By using the same SSID, devices can seamlessly transition from one access point to another without having to reconnect or reconfigure their network settings. This ensures a smooth and uninterrupted connection as users move throughout the network coverage area.

Submit
76. Routing convergence time is which of the following?

Explanation

Routing convergence time refers to the time required by protocols to update their forwarding tables after changes have occurred. This includes the process of exchanging routing information between routers, calculating the best paths, and updating the forwarding tables accordingly. During this time, the network may experience temporary disruptions or suboptimal routing until the convergence process is completed.

Submit
77. A company is in the process of upgrading their network infrastructure to support new VoIP telephony equipment. Which of the following is a primary feature to consider when selecting a new switch to support the phones?

Explanation

When upgrading the network infrastructure to support new VoIP telephony equipment, it is important to consider Power over Ethernet (PoE) as a primary feature when selecting a new switch. PoE allows the switch to provide power to the VoIP phones through the Ethernet cables, eliminating the need for separate power adapters. This simplifies the installation process and reduces cable clutter. Therefore, PoE is a crucial feature to ensure that the new switch can effectively support the power requirements of the VoIP phones.

Submit
78. A technician can successfully remote into the company's server, however, the technician cannot connect to any of the other servers directories from the server itself, but can ping them via an IP address. Which of the following could be the problem?

Explanation

The technician is able to successfully remote into the company's server, indicating that there is no issue with the physical network or VLAN configuration. Additionally, the technician is able to ping the other servers via their IP addresses, suggesting that there is no problem with DHCP configuration. However, the technician is unable to connect to the other servers' directories, indicating that there may be an issue with resolving the server names to their corresponding IP addresses. This suggests that DNS is not correctly configured, causing the problem.

Submit
79. Which of the following characteristics BEST describe SMF? (Select TWO).

Explanation

SMF, or Single Mode Fiber, is a type of optical fiber that can be used for long distances, exceeding 2 kilometers. It uses laser light for transmission, which allows for higher bandwidth and longer transmission distances compared to other types of fiber. Additionally, SMF is known to have a higher cost compared to MMF, or Multimode Fiber. Therefore, the characteristics that best describe SMF are that it can be used for distances exceeding 2 kilometers and uses laser light for transmission.

Submit
80. A technician is troubleshooting a switch and has identified the symptoms. Which of the following steps should the technician take NEXT?

Explanation

The technician should determine the scope of the problem next in order to understand the extent of the issue. This step will help the technician in identifying the specific areas of the switch that are affected and the potential causes of the problem. By determining the scope, the technician can then proceed to implement an appropriate solution and create an action plan for reconfiguring the switch. Escalating the issue or implementing and testing the solution without first determining the scope may result in ineffective troubleshooting and potential further complications.

Submit
81. A new virus was just released and has infected several workstations. A technician receives a newly released patch. Which of the following troubleshooting steps should the technician take FIRST?

Explanation

The technician should first implement an action plan. This is because when dealing with a virus infection, it is important to have a structured approach to address the issue. Implementing an action plan will help the technician prioritize tasks, allocate resources, and ensure a systematic and efficient response to the virus outbreak. Once the action plan is in place, the technician can then proceed with other troubleshooting steps such as applying the patch, documenting the solution, and waiting for virus definitions to be updated.

Submit
82. Which of the following transfers data at a maximum rate of 44.7Mbps?

Explanation

T3 refers to a type of telecommunications line that can transmit data at a maximum rate of 44.7Mbps. This makes it the correct answer to the question. T2, T5, and T1 are other types of telecommunications lines, but they do not have the same maximum data transfer rate as T3.

Submit
83. Which of the following technologies is BEST suited for a point-to-point circuit that is 6 kilometers (3.7 miles) in distance?

Explanation

10GBase-LR is the best suited technology for a point-to-point circuit that is 6 kilometers in distance. The "LR" in 10GBase-LR stands for "long reach," indicating that it is designed for longer distance transmissions. It uses single-mode fiber optic cables, which have a higher capacity for transmitting data over longer distances compared to other options like 10GBase-T, which uses copper cables and is limited to shorter distances. 10GBase-ER and 10GBase-SR are also not suitable for this distance, as they are designed for even longer distances or shorter distances respectively.

Submit
84. A network using RIP has taken several minutes to begin routing traffic around a failed piece of equipment. Which of the following could be implemented to improve convergence time?

Explanation

Replacing RIP with a link-state routing protocol such as OSPF would improve convergence time. Link-state protocols have faster convergence times compared to distance-vector protocols like RIP. OSPF uses a more efficient algorithm to calculate the shortest path and updates routing tables more quickly. This allows the network to quickly adapt to changes in the network topology, such as a failed piece of equipment, and begin routing traffic around it in a shorter amount of time.

Submit
85. Which of the following protocols provides the actual encryption used over VPN?

Explanation

PPTP (Point-to-Point Tunneling Protocol) is a protocol that provides the actual encryption used over VPN (Virtual Private Network). It creates a secure tunnel between the user's device and the VPN server, encrypting the data that is transmitted over the network. This ensures that the data remains confidential and protected from unauthorized access. PPTP is commonly used for remote access VPNs and is supported by a wide range of devices and operating systems.

Submit
86. Which of the following would be used to connect a vertical cross connect when using data connections?

Explanation

A patch panel would be used to connect a vertical cross connect when using data connections. A patch panel acts as a central point where multiple data cables can be terminated and organized. It allows for easy management and flexibility in connecting and disconnecting different devices or equipment. By using patch cables, connections can be easily made from the patch panel to the desired destination, such as switches or routers. This helps in organizing and maintaining the network infrastructure efficiently.

Submit
87. Which of the following documentation would a network administrator refer to discover a rogue WAP?

Explanation

A network administrator would refer to a baseline documentation to discover a rogue WAP. A baseline is a set of standards and measurements that define the normal operating conditions of a network. By comparing the baseline with the current network conditions, any deviations or anomalies can be identified, including the presence of a rogue WAP. The baseline documentation provides a reference point for the network administrator to ensure the network is operating within expected parameters and to detect any unauthorized devices or configurations.

Submit
88. Which of the following is the maximum transmission distance of 10GBase-LR?

Explanation

The maximum transmission distance of 10GBase-LR is 6 miles (9.7 kilometers). This standard is designed for long-range fiber optic connections and can transmit data up to a distance of 6 miles. It is commonly used in applications where there is a need for high-speed and long-distance communication, such as in data centers or telecommunications networks.

Submit
89. Which of the following is an advantage of 100Base-T over 100BaseFX? 

Explanation

100Base-T uses a more flexible cable compared to 100BaseFX. This means that it can be easily installed and maneuvered in different environments. The flexibility of the cable allows for easier installation and maintenance, reducing the time and effort required for network setup. Additionally, the flexibility of the cable makes it more resistant to damage and breakage, ensuring a more reliable and stable network connection.

Submit
90. Which of the following devices would be used to connect different broadcast domains in order to allow them to communicate with each other?

Explanation

A multilayer switch would be used to connect different broadcast domains and allow them to communicate with each other. Unlike a bridge or a layer 2 switch, a multilayer switch operates at both layer 2 and layer 3 of the OSI model, meaning it can handle both MAC addresses and IP addresses. This allows it to route traffic between different networks or subnets, effectively connecting broadcast domains and enabling communication between them. A hub, on the other hand, simply broadcasts all incoming traffic to all connected devices without any intelligence or filtering capabilities.

Submit
91. Two ports on switch A are connected to switch B. The advanced switch feature that allows these ports to be combined and managed as a single entity is called:

Explanation

Trunking is the advanced switch feature that allows multiple ports on switch A to be combined and managed as a single entity when connected to switch B. This feature enables the transmission of multiple VLANs over a single physical link, increasing network efficiency and reducing the number of physical connections required. Port mirroring is used for monitoring network traffic, VLAN is a logical grouping of network devices, and spanning tree is a protocol used to prevent loops in a network.

Submit
92. A technician has determined that a single computer has suddenly lost network connectivity. Which of the following should be the next troubleshooting step the technician should take?

Explanation

The next troubleshooting step the technician should take is to determine if anything has changed. This is because sudden loss of network connectivity can often be attributed to recent changes or updates made to the computer or network settings. By identifying any recent changes, the technician can narrow down the possible causes and focus on resolving the issue more effectively.

Submit
93. A network technician is implementing new wireless access points in an existing wireless infrastructure. The security is the WPA 2 standard. Which of the following encryption methods may not be compatible with the previously installed access points?

Explanation

AES (Advanced Encryption Standard) is a strong encryption method that is commonly used in wireless networks. It is compatible with the WPA 2 standard and can be used with the existing wireless access points. Therefore, the encryption method that may not be compatible with the previously installed access points is not AES.

Submit
94. A technician needs to change locations of a telephone between 66 blocks. Which of the following tools would be used in locating the positions in the cross connections?

Explanation

A toner probe is used to locate the positions in the cross connections between 66 blocks. It is a tool that helps in identifying and tracing the wiring connections. The toner probe sends a signal through the wiring, and the technician can use the probe to trace the signal and determine the location of the telephone connections. This tool is commonly used in telecommunications and network installations to troubleshoot and locate specific connections.

Submit
95. Which of the following command and switch combination would provide the following output? Interface: 172.30.0.102 0x2---
Internet Address Physical Address
Type 172.30.0.5
00304882728c dynamic

Explanation

The correct answer is "arp-a". This command and switch combination would provide the output mentioned in the question. The "arp-a" command displays the ARP cache table, which includes the interface, internet address, physical address, and type of each entry.

Submit
96. Which of the following WAN technologies provides a 45 Mbps circuit over TDM equipment?

Explanation

T3 is the correct answer because it provides a 45 Mbps circuit over TDM (Time Division Multiplexing) equipment. T3 is a high-speed digital transmission line that uses DS-3 signaling, which provides a maximum data rate of 44.736 Mbps. It is commonly used for long-distance, high-bandwidth applications and is capable of carrying voice, data, and video traffic. SONET, E3, and OC12 are all different WAN technologies but do not specifically provide a 45 Mbps circuit over TDM equipment.

Submit
97. Which of the following commands is used to provide the output below in a Windows environment? 1 * * * Request timed out. 2 * * * Request timed out. 3 * * * Request timed out.

Explanation

The correct answer is tracert. Tracert is a command used in Windows to trace the route taken by packets across an IP network. It sends a series of ICMP Echo Request messages to each hop along the path to a destination, and displays the round-trip time for each hop. In the given output, the "Request timed out" message indicates that the packets sent to the destination did not receive a response within the specified time limit. This can be useful in troubleshooting network connectivity issues.

Submit
98. A company has many traveling sales employees that need secure access to corporate resources from nontrusted devices (e.g. computers at client sites and/or public computers). Which VPN solution is MOST appropriate for this company?

Explanation

SSL (Secure Sockets Layer) VPN is the most appropriate solution for the company's traveling sales employees who need secure access to corporate resources from nontrusted devices. SSL VPN uses encryption and authentication protocols to establish a secure connection between the employee's device and the corporate network. It allows employees to access resources through a web browser without requiring any additional software installation, making it convenient for accessing corporate resources from client sites or public computers. Additionally, SSL VPN provides granular access control, ensuring that only authorized individuals can access specific resources.

Submit
99. Which of the following would be used to relocate a T1 closer to the switch for connectivity?

Explanation

A smart jack would be used to relocate a T1 closer to the switch for connectivity. A smart jack is a device that is used to terminate a T1 line and provide connectivity to the switch. It is typically located near the switch and allows for easy access and troubleshooting of the T1 connection. Using a smart jack would allow for a shorter distance between the T1 and the switch, improving connectivity and reducing signal loss.

Submit
100. Which of the following Ethernet technologies has the shortest transmission distance?

Explanation

10GBase-T has the shortest transmission distance among the given Ethernet technologies. This is because 10GBase-T uses twisted pair copper cables for transmission, which have a limited distance capability compared to other technologies. 10GBase-SR, on the other hand, uses fiber optic cables and can transmit data over longer distances. Therefore, 10GBase-T is the correct answer.

Submit
View My Results

Quiz Review Timeline (Updated): Feb 19, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 19, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 23, 2010
    Quiz Created by
    Afiavison
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following actions should the administrator do FIRST to...
When using the ping utility, which switch pings a network device until...
Which of the following is the maximum speed available from a full T1...
Which of the following tools would be used to test the break in a...
A client is able to ping its default gateway, but is unable to...
Which of the following is an example of secure tunneling?
A technician is asked to place wireless Internet access in an open...
Which of the following cable types are the MOST widely used in a...
Which of the following cable types is used in a 100Base-FX network?
A technician is connecting two buildings located approximately 1969...
Which of the following is a utility that translates the physical...
Which of the following documentations would a network technician find...
Which of the following cables would a technician make in order to...
In a Class C subnet, a network ID may occupy a maximum of:
Which of the following IEEE standards has a maximum bandwidth of...
Which of the following logical topologies uses centralized...
Which of the following features of a switch will allow two switches to...
The network administrator needs to use an IP addressing method that...
Which of the following network devices would be responsible for...
A second network card in a server that activates if the primary card...
Which of the following technologies do the 802.11 networks utilize to...
When all routers in a network agree about the path from one point to...
A technician receives a call on monday morning that several computers...
Which of the following network segments is located outside the...
Which of the following frequency ranges does 802.11a operate at?
A technician needs to connect a laptop via the small office, home...
A users workstation is able to resolve IP addresses of any host, and...
A technician is troubleshooting a printer problem in a SOHO...
Which of the following is the recommended maximum distance CAT6 cable...
To forward traffic from a host with the IP address of 10.0.0.100/25...
A company's network is wired in a bus topology and one of the...
A packet sniffer has been placed on a network and shows client A is...
Which of the following tools can send a signal down a cable and...
Enabling MAC address filtering on a switch can be used to mitigate...
A 100 pair cable is typically used to connect:
Which of the following utilities will produce the results printed...
Which of the following devices is used to connect a WAN to a LAN?
A user reports that the wireless network is slow and is able to see...
A user is unable to connect to the network. A network technician is...
Which of the following Will allow an administrator to restrict...
For an enterprise to use one of the reserved private IP address...
At which of the following layers of the OSI model would a repeater...
An organization with 2,500 users has exhausted their Internet...
Which of the following subnet masks will produce the smallest subnet...
Two servers and five workstations are connected using a 100BASE-T...
Which of the following would a technician use a punch down tool on?
Which of the following is the point when local exchange carrier...
A company would like to configure newsfeeds on the network for...
Which of the following commands would allow the technician to identify...
A new business with five computers moves into an office where coaxial...
Which of the following protocols uses port 22 by default?
An Ethernet LAN has several trunk links passing near heavy machinery...
Which of the following commands would provide the following output?DNS...
Which of the following network devices would a network administrator...
A technician received a call from a remote user who is having issues...
Two small companies sharing a switch would MOST likely benefit from...
Which of the following protocols would a multilayer switch use to...
A user calls saying they are having issues connecting to the Internet,...
Which of the following protocols are used to transfer files between...
Which of the following is an advantage of 100Base-FX over 100Base-TX?
A company has installed a new 802.11g point-to-point connection...
Which of the following tools are needed to create a CAT5e crossover...
Which of the following mechanisms is used to calculate back-off time...
A technician is asked tore-terminate a wall jack that has become...
A technician installed a new wireless router. The customer is now...
Which of the following systems detects and reports attempts of...
Which of the following software types would BEST be used for...
Which of the following cable standards has the highest effective range...
The 66 block termination point is:
Which of the following LAN types would utilize CAT5 UTP?
A network administrator configured several network devices earlier...
Which of the following protocols permits secure polling of network...
Which of the following software types would BEST be used at...
Which of the following traffic types would a network layer firewall be...
To support roaming across a wireless 802.11g network, each access...
Routing convergence time is which of the following?
A company is in the process of upgrading their network infrastructure...
A technician can successfully remote into the company's server,...
Which of the following characteristics BEST describe SMF? (Select...
A technician is troubleshooting a switch and has identified the...
A new virus was just released and has infected several workstations. A...
Which of the following transfers data at a maximum rate of 44.7Mbps?
Which of the following technologies is BEST suited for a...
A network using RIP has taken several minutes to begin routing traffic...
Which of the following protocols provides the actual encryption used...
Which of the following would be used to connect a vertical cross...
Which of the following documentation would a network administrator...
Which of the following is the maximum transmission distance of...
Which of the following is an advantage of 100Base-T over...
Which of the following devices would be used to connect different...
Two ports on switch A are connected to switch B. The advanced switch...
A technician has determined that a single computer has suddenly lost...
A network technician is implementing new wireless access points in an...
A technician needs to change locations of a telephone between 66...
Which of the following command and switch combination would provide...
Which of the following WAN technologies provides a 45 Mbps circuit...
Which of the following commands is used to provide the output below in...
A company has many traveling sales employees that need secure access...
Which of the following would be used to relocate a T1 closer to the...
Which of the following Ethernet technologies has the shortest...
Alert!

Advertisement