Network + Practice Test 3

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Afiavison
A
Afiavison
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,814
Questions: 100 | Attempts: 105

SettingsSettingsSettings
Network + Practice  Test 3 - Quiz


Part 3 of the quiz


Questions and Answers
  • 1. 

    A technician can successfully remote into the company's server, however, the technician cannot connect to any of the other servers directories from the server itself, but can ping them via an IP address. Which of the following could be the problem?

    • A.

      The server is on a different physical network.

    • B.

      DNS is not correctly configured.

    • C.

      The server is on a different VLAN.

    • D.

      DHCP is not correctly configured.

    Correct Answer
    B. DNS is not correctly configured.
    Explanation
    The technician is able to successfully remote into the company's server, indicating that there is no issue with the physical network or VLAN configuration. Additionally, the technician is able to ping the other servers via their IP addresses, suggesting that there is no problem with DHCP configuration. However, the technician is unable to connect to the other servers' directories, indicating that there may be an issue with resolving the server names to their corresponding IP addresses. This suggests that DNS is not correctly configured, causing the problem.

    Rate this question:

  • 2. 

    A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network. Which of the following is a probable cause?

    • A.

      Switching loop is occurring on the switch.

    • B.

      Incorrect SNMP settings on the switch.

    • C.

      Wrong subnet mask on the switch.

    • D.

      Port is misconfigured on the switch.

    Correct Answer
    D. Port is misconfigured on the switch.
    Explanation
    The probable cause for the user being unable to connect to the network while others on the same switch can connect successfully is a misconfiguration of the port on the switch. This means that the specific port that the user is connected to may have incorrect settings or configurations that are preventing a successful connection.

    Rate this question:

  • 3. 

    Which of the following characteristics BEST describe SMF? (Select TWO).

    • A.

      Can be used for distances exceeding 2 kilometers (1.24 miles).

    • B.

      Can be used for distances up to 2 kilometers (1.24 miles).

    • C.

      Uses laser light for transmission.

    • D.

      Uses LED light for transmission.

    • E.

      Costs less than MMF.

    Correct Answer(s)
    A. Can be used for distances exceeding 2 kilometers (1.24 miles).
    C. Uses laser light for transmission.
    Explanation
    SMF, or Single Mode Fiber, is a type of optical fiber that can be used for long distances, exceeding 2 kilometers. It uses laser light for transmission, which allows for higher bandwidth and longer transmission distances compared to other types of fiber. Additionally, SMF is known to have a higher cost compared to MMF, or Multimode Fiber. Therefore, the characteristics that best describe SMF are that it can be used for distances exceeding 2 kilometers and uses laser light for transmission.

    Rate this question:

  • 4. 

    Which of the following would be used to connect a vertical cross connect when using data connections?

    • A.

      110 blocks

    • B.

      Demarc extension

    • C.

      Patch panel

    • D.

      66 blocks

    Correct Answer
    C. Patch panel
    Explanation
    A patch panel would be used to connect a vertical cross connect when using data connections. A patch panel acts as a central point where multiple data cables can be terminated and organized. It allows for easy management and flexibility in connecting and disconnecting different devices or equipment. By using patch cables, connections can be easily made from the patch panel to the desired destination, such as switches or routers. This helps in organizing and maintaining the network infrastructure efficiently.

    Rate this question:

  • 5. 

    Which of the following tools would be used to test the break in a fiber connection on the network?

    • A.

      Butt set

    • B.

      Multimeter

    • C.

      Toner probe

    • D.

      OTDR

    Correct Answer
    D. OTDR
    Explanation
    An OTDR (Optical Time-Domain Reflectometer) is a tool used to test the break in a fiber connection on a network. It sends a laser pulse into the fiber and measures the reflections to determine the location and severity of any breaks or faults. This allows technicians to accurately locate and troubleshoot issues in the fiber optic network. A butt set is used for testing telephone lines, a multimeter is used to measure electrical properties, and a toner probe is used to trace and identify cables.

    Rate this question:

  • 6. 

    Which of the following network devices would be responsible for translating canonical names into IP addresses?

    • A.

      A router

    • B.

      A DHCP server

    • C.

      A DNS server

    • D.

      A firewall

    Correct Answer
    C. A DNS server
    Explanation
    A DNS server is responsible for translating canonical names into IP addresses. DNS stands for Domain Name System, and it is a system that translates domain names (such as www.example.com) into IP addresses (such as 192.168.1.1) that computers can understand. When a user types a domain name into a web browser, the DNS server is responsible for finding the corresponding IP address and directing the user to the correct website.

    Rate this question:

  • 7. 

    When all routers in a network agree about the path from one point to another, the network is said to be which of the following?

    • A.

      Static

    • B.

      Converged

    • C.

      Secure

    • D.

      Dynamic

    Correct Answer
    B. Converged
    Explanation
    When all routers in a network agree about the path from one point to another, the network is said to be "converged". This means that all routers have reached a consensus on the best route to take, ensuring efficient and reliable communication between the two points.

    Rate this question:

  • 8. 

    Which of the following would be used to relocate a T1 closer to the switch for connectivity?

    • A.

      Patch panel

    • B.

      25 pair cable

    • C.

      Demarc extension

    • D.

      Smart jack

    Correct Answer
    D. Smart jack
    Explanation
    A smart jack would be used to relocate a T1 closer to the switch for connectivity. A smart jack is a device that is used to terminate a T1 line and provide connectivity to the switch. It is typically located near the switch and allows for easy access and troubleshooting of the T1 connection. Using a smart jack would allow for a shorter distance between the T1 and the switch, improving connectivity and reducing signal loss.

    Rate this question:

  • 9. 

    An organization with 2,500 users has exhausted their Internet bandwidth. After some investigation, the network administrator discovers that 95%of the traffic is coming from web browsing. Which of the following network devices could be added to BEST reduce the amount of Internet bandwidth the company is using?

    • A.

      Content switch

    • B.

      Load balancer

    • C.

      Proxy server

    • D.

      An additional DNS server

    Correct Answer
    C. Proxy server
    Explanation
    A proxy server can be added to the network to reduce the amount of Internet bandwidth being used. A proxy server acts as an intermediary between the users and the Internet. It can cache frequently accessed web pages and files, reducing the need for multiple users to download the same content from the Internet. This can help to conserve bandwidth and improve network performance. By routing web browsing traffic through the proxy server, the organization can effectively reduce the amount of Internet bandwidth being consumed by web browsing activities.

    Rate this question:

  • 10. 

    Which of the following subnet masks will produce the smallest subnet size for a pointtopoint network link?

    • A.

      255.255.255.248

    • B.

      255.255.255.128

    • C.

      255.255.255.252

    • D.

      255.255.255.0

    Correct Answer
    C. 255.255.255.252
    Explanation
    The subnet mask 255.255.255.252 will produce the smallest subnet size for a point-to-point network link. This is because a subnet mask of 255.255.255.252 allows for only 2 usable IP addresses in the subnet, which is the minimum number required for a point-to-point link. The other subnet masks listed allow for larger subnet sizes and more usable IP addresses.

    Rate this question:

  • 11. 

    Which of the following documentation would a network administrator refer to discover a rogue WAP?

    • A.

      Wiring schematics

    • B.

      Policies

    • C.

      Baseline

    • D.

      Regulations

    Correct Answer
    C. Baseline
    Explanation
    A network administrator would refer to a baseline documentation to discover a rogue WAP. A baseline is a set of standards and measurements that define the normal operating conditions of a network. By comparing the baseline with the current network conditions, any deviations or anomalies can be identified, including the presence of a rogue WAP. The baseline documentation provides a reference point for the network administrator to ensure the network is operating within expected parameters and to detect any unauthorized devices or configurations.

    Rate this question:

  • 12. 

    Which of the following Will allow an administrator to restrict communication between network devices?

    • A.

      DHCP

    • B.

      NAT

    • C.

      CIDR

    • D.

      ACL

    Correct Answer
    D. ACL
    Explanation
    ACL stands for Access Control List. It is a security feature that allows an administrator to restrict communication between network devices. ACLs can be used to control network traffic by specifying which packets are allowed to pass through a network interface and which are denied. By configuring ACLs, administrators can define rules and policies to filter and control the flow of data within a network, enhancing security and preventing unauthorized access.

    Rate this question:

  • 13. 

    For an enterprise to use one of the reserved private IP address ranges, as best practice they should coordinate with:

    • A.

      Their IT department.

    • B.

      IANA.

    • C.

      IEEE.

    • D.

      Their legal department.

    Correct Answer
    A. Their IT department.
    Explanation
    When an enterprise wants to use one of the reserved private IP address ranges, it is best practice to coordinate with their IT department. The IT department is responsible for managing and maintaining the organization's network infrastructure, including IP address allocation. They have the knowledge and expertise to ensure that the chosen IP address range does not conflict with existing network resources and can provide guidance on best practices for IP address management within the organization. Coordinating with the IT department helps to maintain the integrity and stability of the network.

    Rate this question:

  • 14. 

    Which of the following is the maximum transmission distance of 10GBase-LR?

    • A.

      6 miles (9.7 kilometers)

    • B.

      25 miles (40 kilometers)

    • C.

      512 miles (824 kilometers)

    • D.

      1,024 miles (1648 kilometers)

    Correct Answer
    A. 6 miles (9.7 kilometers)
    Explanation
    The maximum transmission distance of 10GBase-LR is 6 miles (9.7 kilometers). This standard is designed for long-range fiber optic connections and can transmit data up to a distance of 6 miles. It is commonly used in applications where there is a need for high-speed and long-distance communication, such as in data centers or telecommunications networks.

    Rate this question:

  • 15. 

    A company has many traveling sales employees that need secure access to corporate resources from nontrusted devices (e.g. computers at client sites and/or public computers). Which VPN solution is MOST appropriate for this company?

    • A.

      SSL

    • B.

      PPTP

    • C.

      IPSec

    • D.

      L2TP

    Correct Answer
    A. SSL
    Explanation
    SSL (Secure Sockets Layer) VPN is the most appropriate solution for the company's traveling sales employees who need secure access to corporate resources from nontrusted devices. SSL VPN uses encryption and authentication protocols to establish a secure connection between the employee's device and the corporate network. It allows employees to access resources through a web browser without requiring any additional software installation, making it convenient for accessing corporate resources from client sites or public computers. Additionally, SSL VPN provides granular access control, ensuring that only authorized individuals can access specific resources.

    Rate this question:

  • 16. 

    Which of the following commands would provide the following output?DNS request timed out. timeout was 2 seconds.*** Cant find server name for address 172.30.0.5: Timed out*** Default servers are not availableServer: UnKnownAddress: 172.30.0.5DNS request timed out. timeout was 2 seconds.*** Request to UnKnown timedout

    • A.

      Winipcfg

    • B.

      Nslookup

    • C.

      Ipconfig

    • D.

      Netstat

    Correct Answer
    B. Nslookup
    Explanation
    The correct answer is nslookup because nslookup is a command-line tool used to query Domain Name System (DNS) to obtain domain name or IP address mapping. In this case, the output provided indicates that there was a DNS request timeout and the server name for the given address could not be found. This aligns with the purpose of nslookup, which is to perform DNS queries and obtain information about DNS records.

    Rate this question:

  • 17. 

    A technician is troubleshooting a switch and has identified the symptoms. Which of the following steps should the technician take NEXT?

    • A.

      Escalate the issue.

    • B.

      Determine the scope of the problem

    • C.

      Implement and test the solution on the switch.

    • D.

      Create an action plan for reconfiguring the switch.

    Correct Answer
    B. Determine the scope of the problem
    Explanation
    The technician should determine the scope of the problem next in order to understand the extent of the issue. This step will help the technician in identifying the specific areas of the switch that are affected and the potential causes of the problem. By determining the scope, the technician can then proceed to implement an appropriate solution and create an action plan for reconfiguring the switch. Escalating the issue or implementing and testing the solution without first determining the scope may result in ineffective troubleshooting and potential further complications.

    Rate this question:

  • 18. 

    Which of the following transfers data at a maximum rate of 44.7Mbps?

    • A.

      T3

    • B.

      T2

    • C.

      T5

    • D.

      T1

    Correct Answer
    A. T3
    Explanation
    T3 refers to a type of telecommunications line that can transmit data at a maximum rate of 44.7Mbps. This makes it the correct answer to the question. T2, T5, and T1 are other types of telecommunications lines, but they do not have the same maximum data transfer rate as T3.

    Rate this question:

  • 19. 

    A technician is asked tore-terminate a wall jack that has become loose. Upon looking at the wiring, the technician notices that it was originally wired as 568A. The company implemented a policy stating that all cable terminations should adhere to the 568B standard. With this in mind the technician should:

    • A.

      Re-terminate both ends of the cable to the 568B standard.

    • B.

      Run a new cable and terminate both ends to the 568B standard.

    • C.

      Re-terminate the non-loose end of the cable to the 568B standard.

    • D.

      Re-terminate the loose end of the cable to the 568B standard.

    Correct Answer
    A. Re-terminate both ends of the cable to the 568B standard.
    Explanation
    The technician should re-terminate both ends of the cable to the 568B standard because the company implemented a policy stating that all cable terminations should adhere to the 568B standard. Since the wall jack has become loose, it is necessary to fix it by re-terminating both ends of the cable to ensure a secure and proper connection.

    Rate this question:

  • 20. 

    When using the ping utility, which switch pings a network device until stopped?

    • A.

      Ping-t

    • B.

      Ping-s 3

    • C.

      Ping-a

    • D.

      Ping-r 3

    Correct Answer
    A. Ping-t
    Explanation
    The correct answer is "ping -t". When using the ping utility, the "-t" switch is used to continuously ping a network device until it is manually stopped. This is useful for monitoring the network connection and checking for any interruptions or delays in communication.

    Rate this question:

  • 21. 

    Which of the following cables would a technician make in order to identify a physical interface problem?

    • A.

      Serial

    • B.

      Rollover

    • C.

      Console

    • D.

      Loopback

    Correct Answer
    D. Loopback
    Explanation
    A loopback cable is used to test the functionality of a physical interface by creating a loop within the device itself. When the loopback cable is connected, the device sends signals to itself, allowing the technician to determine if the physical interface is functioning properly. This helps in identifying any physical interface problems such as faulty connectors, cables, or ports.

    Rate this question:

  • 22. 

    A client is able to ping its default gateway, but is unable to communicate with a remote host. Which of the following utilities would the technicianuse to determine where the fault is?

    • A.

      Arp

    • B.

      Ping-t

    • C.

      Traceroute

    • D.

      Nbstat

    Correct Answer
    C. Traceroute
    Explanation
    The technician would use the traceroute utility to determine where the fault is. Traceroute is used to trace the route that packets take from the client to the remote host, showing each hop along the way. By analyzing the output of traceroute, the technician can identify any network devices or connections that may be causing the communication issue.

    Rate this question:

  • 23. 

    Which of the following is an example of secure tunneling?

    • A.

      PPPoE

    • B.

      SSL VPN

    • C.

      PPP

    • D.

      PAP

    Correct Answer
    B. SSL VPN
    Explanation
    SSL VPN is an example of secure tunneling because it uses Secure Sockets Layer (SSL) encryption to create a secure and encrypted connection between the client and the VPN server. This ensures that the data transmitted between the client and the server is protected from unauthorized access and eavesdropping. SSL VPNs are commonly used to provide remote access to corporate networks and to secure communication over public networks such as the internet.

    Rate this question:

  • 24. 

    Which of the following cable types is used in a 100Base-FX network?

    • A.

      UTP

    • B.

      Coaxial

    • C.

      STP

    • D.

      Fiber

    Correct Answer
    D. Fiber
    Explanation
    Fiber optic cable is used in a 100Base-FX network. This type of cable is specifically designed for high-speed data transmission over long distances. It uses light signals to transmit data, which allows for faster and more reliable communication compared to other cable types like UTP, coaxial, or STP. Fiber optic cables are also immune to electromagnetic interference, making them ideal for use in networking environments.

    Rate this question:

  • 25. 

    A technician receives a call on monday morning that several computers will not connect to the network. The technician determines that the computers left on over the weekend are functional and those that were turned off over the weekend are not functioning. Which of the following is the MOST likely source of the problem?

    • A.

      WINS needs to be restarted.

    • B.

      DNS is not functioning.

    • C.

      LDAP is not functioning.

    • D.

      DHCP is not functioning.

    Correct Answer
    D. DHCP is not functioning.
    Explanation
    The fact that the computers left on over the weekend are functional while those that were turned off are not functioning suggests that the issue lies with the dynamic host configuration protocol (DHCP). DHCP is responsible for assigning IP addresses to computers on a network. If DHCP is not functioning, the computers that were turned off over the weekend would not have been able to obtain an IP address and therefore cannot connect to the network. Restarting WINS, fixing DNS, or LDAP would not address this specific issue.

    Rate this question:

  • 26. 

    To forward traffic from a host with the IP address of 10.0.0.100/25 to10.0.0.200/25 which of the following devices will be required?

    • A.

      A router

    • B.

      A layer 2 switch

    • C.

      A hub

    • D.

      A DNS server

    Correct Answer
    A. A router
    Explanation
    To forward traffic from one IP address to another IP address, a router is required. A router is a networking device that connects different networks and forwards data packets between them. It examines the destination IP address of incoming packets and determines the best path to forward them to the intended destination. In this scenario, to forward traffic from the host with the IP address 10.0.0.100/25 to 10.0.0.200/25, a router would be needed to route the packets between the two hosts. A layer 2 switch and a hub are not designed to perform routing functions, and a DNS server is used for domain name resolution, not for forwarding traffic between IP addresses.

    Rate this question:

  • 27. 

    Which of the following technologies do the 802.11 networks utilize to prevent packet collisions?

    • A.

      FDDI

    • B.

      CSMA/CD

    • C.

      Token ring

    • D.

      CSMA/CA

    Correct Answer
    D. CSMA/CA
    Explanation
    802.11 networks utilize CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) to prevent packet collisions. This technology allows devices to sense the wireless medium before transmitting data, and if it is busy, they wait for a random period of time before attempting to transmit again. This helps to avoid collisions and ensures that data is transmitted successfully in a shared network environment.

    Rate this question:

  • 28. 

    Which of the following protocols uses port 22 by default?

    • A.

      FTP

    • B.

      DNS

    • C.

      Telnet

    • D.

      SSH

    Correct Answer
    D. SSH
    Explanation
    SSH (Secure Shell) is a protocol used for secure remote login and file transfer. It uses port 22 by default to establish a secure connection between the client and the server. FTP (File Transfer Protocol) uses port 21, DNS (Domain Name System) uses port 53, and Telnet uses port 23. Therefore, the correct answer is SSH.

    Rate this question:

  • 29. 

    Which of the following protocols permits secure polling of network devices?

    • A.

      SNMPv2

    • B.

      SCP

    • C.

      SNMPv3

    • D.

      SSH

    Correct Answer
    C. SNMPv3
    Explanation
    SNMPv3 is the correct answer because it is an updated version of the Simple Network Management Protocol (SNMP) that provides enhanced security features. SNMPv3 supports authentication, encryption, and access control, making it suitable for secure polling of network devices. SCP (Secure Copy Protocol) is used for secure file transfer, while SSH (Secure Shell) is used for secure remote access. SNMPv2 is an older version of SNMP and does not offer the same level of security as SNMPv3.

    Rate this question:

  • 30. 

    Which of the following commands is used to provide the output below in a Windows environment? 1 * * * Request timed out. 2 * * * Request timed out. 3 * * * Request timed out.

    • A.

      Nbtstat

    • B.

      Netstat

    • C.

      Tracert

    • D.

      Ping

    Correct Answer
    C. Tracert
    Explanation
    The correct answer is tracert. Tracert is a command used in Windows to trace the route taken by packets across an IP network. It sends a series of ICMP Echo Request messages to each hop along the path to a destination, and displays the round-trip time for each hop. In the given output, the "Request timed out" message indicates that the packets sent to the destination did not receive a response within the specified time limit. This can be useful in troubleshooting network connectivity issues.

    Rate this question:

  • 31. 

    Which of the following traffic types would a network layer firewall be unable to filter?

    • A.

      SMTP traffic

    • B.

      HTTP traffic

    • C.

      ICMP messages

    • D.

      Email sender verification

    Correct Answer
    D. Email sender verification
    Explanation
    A network layer firewall operates at the network layer of the OSI model and is primarily responsible for filtering and controlling network traffic based on IP addresses, ports, and protocols. SMTP traffic, HTTP traffic, and ICMP messages are all types of network traffic that can be filtered by a network layer firewall. However, email sender verification is not a type of network traffic that can be filtered at the network layer. It is a process that involves checking the authenticity of the sender's email address, which typically occurs at the application layer of the OSI model. Therefore, a network layer firewall would be unable to filter email sender verification.

    Rate this question:

  • 32. 

    Which of the following protocols would a multilayer switch use to learn the IP address of a directly connecte  device?

    • A.

      ARP

    • B.

      BOOTP

    • C.

      DNS

    • D.

      DHCP

    Correct Answer
    A. ARP
    Explanation
    A multilayer switch would use the ARP (Address Resolution Protocol) to learn the IP address of a directly connected device. ARP is used to map an IP address to a MAC address in a local network. When a device wants to communicate with another device on the same network, it uses ARP to find the MAC address associated with the IP address of the destination device. This allows the multilayer switch to build and maintain its ARP table, which is used for forwarding network traffic efficiently.

    Rate this question:

  • 33. 

    Two servers and five workstations are connected using a 100BASE-T network. Which of the following physical topologies is used?

    • A.

      FDDI

    • B.

      Bus

    • C.

      Ring

    • D.

      Star

    Correct Answer
    D. Star
    Explanation
    A star topology is used in this scenario where two servers and five workstations are connected using a 100BASE-T network. In a star topology, all devices are connected to a central hub or switch. This central hub acts as a central point of communication, allowing each device to communicate directly with the hub. This topology provides a high level of reliability and scalability as each device has its own dedicated connection to the central hub, minimizing network downtime and allowing for easy addition or removal of devices.

    Rate this question:

  • 34. 

    A company's network is wired in a bus topology and one of the computers is unable to access the network. Which of the following is the FIRST step in the troubleshooting process?

    • A.

      Reinstall the NIC driver.

    • B.

      Replace the cable.

    • C.

      Check the cable connections.

    • D.

      Replace the NIC.

    Correct Answer
    C. Check the cable connections.
    Explanation
    The first step in troubleshooting a network issue in a bus topology is to check the cable connections. This is because a loose or faulty cable connection can often cause connectivity problems. By checking the cable connections, you can ensure that all the devices are properly connected and that there are no loose or damaged cables. If the cable connections are found to be fine, then further troubleshooting steps can be taken, such as checking the NIC driver or replacing the cable.

    Rate this question:

  • 35. 

    Which of the following network segments is located outside the firewall?

    • A.

      SPAP

    • B.

      VPN

    • C.

      DMZ

    • D.

      PPTP

    Correct Answer
    C. DMZ
    Explanation
    A DMZ (Demilitarized Zone) is a network segment that is located outside the firewall. It acts as a buffer zone between the internal network and the external network, providing an additional layer of security. The DMZ is used to host servers that need to be accessible from the internet, such as web servers or email servers. By placing these servers in the DMZ, it reduces the risk of unauthorized access to the internal network if the server is compromised. Therefore, the correct answer is DMZ.

    Rate this question:

  • 36. 

    To support roaming across a wireless 802.11g network, each access point should be configured to use which of the following?

    • A.

      The same channel

    • B.

      The same frequency

    • C.

      The same SSID

    • D.

      CSMA/CD

    Correct Answer
    C. The same SSID
    Explanation
    For roaming across a wireless 802.11g network, it is important for each access point to be configured to use the same SSID (Service Set Identifier). The SSID is a unique identifier that allows devices to connect to a specific wireless network. By using the same SSID, devices can seamlessly transition from one access point to another without having to reconnect or reconfigure their network settings. This ensures a smooth and uninterrupted connection as users move throughout the network coverage area.

    Rate this question:

  • 37. 

    Which of the following would a technician use a punch down tool on?

    • A.

      RJ-45 connector

    • B.

      ST connector

    • C.

      110 block

    • D.

      Smart jack

    Correct Answer
    C. 110 block
    Explanation
    A technician would use a punch down tool on a 110 block. A 110 block is a type of punch down block used to connect and terminate network cables. The punch down tool is used to insert the individual wires into the corresponding slots on the 110 block, creating a secure and reliable connection. The RJ-45 connector is typically used for Ethernet connections, the ST connector is used for fiber optic connections, and the smart jack is a type of network interface device.

    Rate this question:

  • 38. 

    Two small companies sharing a switch would MOST likely benefit from which of the following advanced switch features?

    • A.

      Spanning tree

    • B.

      Trunking

    • C.

      PoE

    • D.

      VLAN

    Correct Answer
    D. VLAN
    Explanation
    Two small companies sharing a switch would most likely benefit from VLAN (Virtual Local Area Network) feature. VLAN allows the switch to divide a single physical network into multiple virtual networks, providing separate broadcast domains and improving network security. With VLAN, each company can have its own isolated network within the shared switch, ensuring privacy and preventing interference between the two companies' devices. This feature allows for better network management, scalability, and flexibility in terms of network configuration and resource allocation.

    Rate this question:

  • 39. 

    Which of the following is the maximum speed available from a full T1 line?

    • A.

      1.544Mbps

    • B.

      5.23Mbps

    • C.

      765Kpbs

    • D.

      10.73Mbps

    Correct Answer
    A. 1.544Mbps
    Explanation
    A full T1 line has a maximum speed of 1.544Mbps. This is a standard data transmission rate for digital telecommunication services.

    Rate this question:

  • 40. 

    A technician is connecting two buildings located approximately 1969 feet (600 meters) apart on the same campus. Primary objectives are to create a secure link that that is capable of transmitting at 1Gbps. Which of the following would be the BEST way to connect these two buildings?

    • A.

      Fiber optic cable

    • B.

      Point-to-point wireless link

    • C.

      CAT6 cable

    • D.

      RG-58 cable

    Correct Answer
    A. Fiber optic cable
    Explanation
    Fiber optic cable would be the best way to connect the two buildings located 1969 feet apart on the same campus because it can provide a secure and high-speed connection capable of transmitting at 1Gbps. Fiber optic cables use light signals to transmit data, which allows for faster and more reliable communication compared to other options like point-to-point wireless link, CAT6 cable, or RG-58 cable. Additionally, fiber optic cables are less susceptible to interference and can support longer distances without signal degradation.

    Rate this question:

  • 41. 

    An Ethernet LAN has several trunk links passing near heavy machinery resulting in EMI. Which of the following Ethernet media types should be used to avoid interference?

    • A.

      10Base5

    • B.

      100Base-T

    • C.

      10Base2

    • D.

      100Base-FX

    Correct Answer
    D. 100Base-FX
    Explanation
    100Base-FX should be used to avoid interference in an Ethernet LAN near heavy machinery because it uses fiber optic cables which are immune to electromagnetic interference (EMI). Fiber optic cables do not conduct electricity and therefore do not generate or pick up electromagnetic signals, making them ideal for environments with high levels of EMI.

    Rate this question:

  • 42. 

    Which of the following software types would BEST be used for identifying an attack?

    • A.

      IDS

    • B.

      IPS

    • C.

      Packet sniffer

    • D.

      Port scanner

    Correct Answer
    A. IDS
    Explanation
    An IDS (Intrusion Detection System) would be the best software type for identifying an attack. IDS monitors network traffic and analyzes it for any signs of malicious activity or unauthorized access attempts. It can detect and alert administrators about potential attacks, allowing them to take appropriate action to prevent further damage. IPS (Intrusion Prevention System) is similar to IDS but also has the ability to actively block or prevent attacks. A packet sniffer is a tool used to capture and analyze network traffic, but it may not specifically focus on identifying attacks. A port scanner is used to identify open ports on a network, but it may not provide comprehensive attack identification capabilities.

    Rate this question:

  • 43. 

    A packet sniffer has been placed on a network and shows client A is sending TCP SYN packets to server B. Which of the following packets should be sent from server B in response?

    • A.

      SYN-NAK

    • B.

      SYN-ACK

    • C.

      ACK

    • D.

      NAK

    Correct Answer
    B. SYN-ACK
    Explanation
    When client A sends TCP SYN packets to server B, it is initiating a connection request. In response, server B should send a SYN-ACK packet. This packet acknowledges the receipt of the SYN packet and also includes its own SYN flag to establish a connection. This is part of the TCP three-way handshake process, where the client sends a SYN packet, the server responds with a SYN-ACK packet, and finally, the client sends an ACK packet to complete the connection establishment.

    Rate this question:

  • 44. 

    Which of the following Ethernet technologies has the shortest transmission distance?

    • A.

      10Base-T

    • B.

      10GBase-T

    • C.

      100Base-T

    • D.

      10GBase-SR

    Correct Answer
    B. 10GBase-T
    Explanation
    10GBase-T has the shortest transmission distance among the given Ethernet technologies. This is because 10GBase-T uses twisted pair copper cables for transmission, which have a limited distance capability compared to other technologies. 10GBase-SR, on the other hand, uses fiber optic cables and can transmit data over longer distances. Therefore, 10GBase-T is the correct answer.

    Rate this question:

  • 45. 

    A network technician is implementing new wireless access points in an existing wireless infrastructure. The security is the WPA 2 standard. Which of the following encryption methods may not be compatible with the previously installed access points?

    • A.

      TKIP

    • B.

      3DES

    • C.

      AES

    • D.

      CHAP

    Correct Answer
    C. AES
    Explanation
    AES (Advanced Encryption Standard) is a strong encryption method that is commonly used in wireless networks. It is compatible with the WPA 2 standard and can be used with the existing wireless access points. Therefore, the encryption method that may not be compatible with the previously installed access points is not AES.

    Rate this question:

  • 46. 

    In a Class C subnet, a network ID may occupy a maximum of:

    • A.

      24bits

    • B.

      16bits

    • C.

      31bits

    • D.

      32bits

    Correct Answer
    A. 24bits
    Explanation
    In a Class C subnet, the network ID may occupy a maximum of 24 bits. This means that the first 24 bits of the IP address are used to identify the network, while the remaining 8 bits are used to identify the hosts within that network. This allows for a maximum of 256 (2^8) hosts in a Class C subnet.

    Rate this question:

  • 47. 

    A 100 pair cable is typically used to connect:

    • A.

      Telephony distribution.

    • B.

      Computer labs with more than 20 computers.

    • C.

      Security cameras.

    • D.

      Businesses with more than 75 computers.

    Correct Answer
    A. Telephony distribution.
    Explanation
    A 100 pair cable is typically used to connect telephony distribution because telephony distribution systems often require a large number of connections. A 100 pair cable has 100 individual pairs of wires, which allows for a high number of connections to be made. This is necessary in telephony distribution systems where multiple telephone lines need to be connected and distributed to various locations.

    Rate this question:

  • 48. 

    Which of the following utilities will produce the results printed below?TCP Certs03:1072 172.31.0.78:3389 Established

    • A.

      Netstat

    • B.

      Arp

    • C.

      Ping

    • D.

      Tracert

    Correct Answer
    A. Netstat
    Explanation
    Netstat is the correct answer because it is a utility that displays active network connections and listening ports on a computer. It provides information about the protocol, local and remote IP addresses, and the state of the connection. In this case, the output "TCP Certs03:1072 172.31.0.78:3389 Established" indicates an established TCP connection between the local host Certs03 on port 1072 and the remote IP address 172.31.0.78 on port 3389.

    Rate this question:

  • 49. 

    A technician is asked to place wireless Internet access in an open warehouse environment. After installing the equipment the technician notices varying signal strengths at different locations. Which of the following should the technician consider to increase the consistency of the signal strength?

    • A.

      Enable traffic shaping

    • B.

      Change the antenna placement

    • C.

      Change the encryption method

    • D.

      Broadcast the SSID

    Correct Answer
    B. Change the antenna placement
    Explanation
    To increase the consistency of the signal strength in an open warehouse environment, the technician should consider changing the antenna placement. This is because the varying signal strengths at different locations indicate that the current antenna placement may not be optimal for providing a consistent signal throughout the warehouse. By strategically relocating the antennas, the technician can potentially improve the coverage and signal strength in areas that are currently experiencing weak or inconsistent signals.

    Rate this question:

  • 50. 

    Which of the following actions should the administrator do FIRST to help access a gigabit connection?

    • A.

      Change the CAT5 cable to a CAT3 cable.

    • B.

      Change the CAT3 cable to RG-58 cable.

    • C.

      Change the CAT5 cable to a CAT6 cable.

    • D.

      Change the CAT5 cable to a CAT5 Crossover cable.

    Correct Answer
    C. Change the CAT5 cable to a CAT6 cable.
    Explanation
    Changing the CAT5 cable to a CAT6 cable would be the first step to help access a gigabit connection. CAT6 cables are designed to support higher bandwidth and faster data transmission compared to CAT5 cables. This upgrade would ensure that the network is capable of handling the increased speed and performance requirements of a gigabit connection.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 19, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 23, 2010
    Quiz Created by
    Afiavison
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.