Network + Practice Test 4

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Afiavison
A
Afiavison
Community Contributor
Quizzes Created: 4 | Total Attempts: 1,784
Questions: 100 | Attempts: 80

SettingsSettingsSettings
Network + Practice Test 4 - Quiz


This is the part 4 of the practice test


Questions and Answers
  • 1. 

    A user is reporting that their inquiries to the database server keep timing out. Which of the following tools would be BEST suited to troubleshoot the issue?

    • A.

      Cable tester

    • B.

      Packet analyzer

    • C.

      Tone probe

    • D.

      Butt set

    Correct Answer
    B. Packet analyzer
    Explanation
    A packet analyzer would be the best tool to troubleshoot the issue of inquiries to the database server timing out. A packet analyzer can capture and analyze network traffic, allowing the user to inspect the packets being sent and received between the client and the server. By examining the packets, the user can identify any issues or errors that may be causing the timeouts, such as network congestion, packet loss, or misconfigured settings. This tool provides valuable insights into the network communication and can help pinpoint the source of the problem.

    Rate this question:

  • 2. 

    Which of the following connector types would a technician utilize with fiber lines by pushing it directly into the port without twisting?

    • A.

      RJ-45

    • B.

      ST

    • C.

      SC

    • D.

      BNC

    Correct Answer
    C. SC
    Explanation
    A technician would utilize an SC connector type with fiber lines by pushing it directly into the port without twisting. The SC connector is a popular choice for fiber optic connections because it is easy to use and provides a secure connection. It features a push-pull mechanism, allowing for quick and simple installation without the need for twisting. This makes it a convenient option for technicians working with fiber lines.

    Rate this question:

  • 3. 

    A client is using a device that allows them to synchronize their wireless device to their computer, but the device must be within 3 feet (1 meter) in order for the synchronization to complete. Which of the following BEST describes the type of wireless device being used?

    • A.

      WiFi

    • B.

      Bluetooth

    • C.

      Serial

    • D.

      Infrared

    Correct Answer
    D. Infrared
    Explanation
    The correct answer is Infrared. Infrared technology is commonly used for short-range wireless communication, typically within a range of 3 feet or less. It is often used for tasks such as synchronizing devices, transferring data, or controlling appliances. WiFi and Bluetooth are wireless technologies that can operate over longer distances and are not limited to a specific range. Serial is a type of communication interface commonly used for wired connections, not wireless.

    Rate this question:

  • 4. 

    A technician is building a new network. Which of the following components would be the FIRST installed for the network?

    • A.

      MDF

    • B.

      VPN

    • C.

      EMI

    • D.

      IDF

    Correct Answer
    A. MDF
    Explanation
    The MDF (Main Distribution Frame) is the central point where all the network cables and connections are terminated. It is the starting point of the network and serves as the main hub for connecting various components such as routers, switches, and servers. Therefore, the MDF would be the first component to be installed when building a new network.

    Rate this question:

  • 5. 

    After a technician came out and installed a new wireless router, one of the wired workstations began having problems connecting to the file server. This is only an intermittent problem. Which of the following actions will the technician MOST likely perform to resolve this problem?

    • A.

      Move the router's location.

    • B.

      Check the cable ends.

    • C.

      Check user permissions

    • D.

      Change the router's SSID

    Correct Answer
    B. Check the cable ends.
    Explanation
    The technician will most likely perform the action of checking the cable ends to resolve the intermittent connection problem. This is because after the installation of the new wireless router, the wired workstation started having issues. Checking the cable ends ensures that the physical connections between the workstation and the router are secure and properly functioning. It helps to identify any loose or faulty connections that may be causing the intermittent problem.

    Rate this question:

  • 6. 

    A network device that is used to connect multiple devices without segmenting a network is a:

    • A.

      Router

    • B.

      Bridge.

    • C.

      Hub

    • D.

      Switch

    Correct Answer
    C. Hub
    Explanation
    A hub is a network device that is used to connect multiple devices without segmenting a network. Unlike a router or a switch, a hub does not have the capability to analyze and direct network traffic. Instead, it simply broadcasts incoming data to all connected devices, causing network congestion and reducing overall network efficiency. Therefore, a hub is not recommended for larger networks or networks that require efficient data transmission.

    Rate this question:

  • 7. 

    A mail server was recently placed in the network. The users report email is slow. Upon closer inspection a technician notices that error counters on the interface are incrementing. Which of the following could be causing the problem?

    • A.

      Wrong subnet mask

    • B.

      Duplex mismatch

    • C.

      Port speed mismatch

    • D.

      Switch loop

    Correct Answer
    B. Duplex mismatch
    Explanation
    A duplex mismatch occurs when two devices on a network have different duplex settings, meaning one is set to full-duplex while the other is set to half-duplex. This can cause communication issues and slow down network performance. In this scenario, the error counters on the interface are incrementing, indicating that there is a problem with the communication between the mail server and other devices on the network. Therefore, a duplex mismatch could be causing the slow email performance.

    Rate this question:

  • 8. 

    A technician has just finished implementing a solution for a network issue. Which of the following steps in troubleshooting should the technician do NEXT?

    • A.

      Document the issue and the solution that was implemented.

    • B.

      Escalate the issue to another technician

    • C.

      Test if the solution works and identify other effects it may have

    • D.

      Gather information about the issue.

    Correct Answer
    C. Test if the solution works and identify other effects it may have
    Explanation
    After implementing a solution for a network issue, the technician should test if the solution works and identify any other effects it may have. This step is crucial to ensure that the issue has been resolved successfully and that there are no unintended consequences of the solution. Testing the solution will help the technician confirm its effectiveness and address any potential issues that may arise. It is important to thoroughly test the solution before considering the issue fully resolved.

    Rate this question:

  • 9. 

    A technician notices that when trying to ping a workstation by network name the workstation does not reply back over the network. The workstation is part of the domain and is able to get to the Internet. Which of the following is the cause of the problem?

    • A.

      Faulty cable on the workstation

    • B.

      Wrong host name on the workstation

    • C.

      Wrong WINS on the workstation

    • D.

      Incorrect IP address assigned to the workstation

    Correct Answer
    B. Wrong host name on the workstation
    Explanation
    The cause of the problem is that the workstation has the wrong host name. This means that when the technician tries to ping the workstation using its network name, the network is unable to locate the workstation because it is using the incorrect host name. This could be due to a misconfiguration or a typo when setting up the workstation's host name.

    Rate this question:

  • 10. 

    Which of the following network performance optimization methods slows or restricts traffic to increase the performance of other types of traffic? (Select TWO).

    • A.

      Load balancing

    • B.

      Traffic shaping

    • C.

      High availability

    • D.

      Caching engines

    • E.

      QoS

    Correct Answer(s)
    B. Traffic shaping
    E. QoS
    Explanation
    Traffic shaping and QoS are network performance optimization methods that slow or restrict traffic to increase the performance of other types of traffic. Traffic shaping involves controlling the flow of network traffic to ensure that certain types of traffic receive priority over others. Quality of Service (QoS) is a technique that allows network administrators to prioritize certain types of traffic over others, ensuring that critical traffic receives higher priority and better performance. Both methods involve managing and controlling network traffic to optimize performance for specific types of traffic.

    Rate this question:

  • 11. 

    A user has plugged a computer into a switch port and now is unable to access any server resources on the network.Which of the following are the MOST likely reasons for the access problem? (Select TWO).

    • A.

      The spanning tree protocol has locked down the port

    • B.

      The computer is connected to a port in the wrong VLAN

    • C.

      The appropriate credentials have not been supplied for network access

    • D.

      A port mirroring session was started and is interfering with the connection

    • E.

      The computer is connected to an incorrect PoE port.

    Correct Answer(s)
    B. The computer is connected to a port in the wrong VLAN
    C. The appropriate credentials have not been supplied for network access
    Explanation
    The access problem is most likely caused by the computer being connected to a port in the wrong VLAN, which means it is not able to communicate with the server resources on the network. Additionally, the appropriate credentials have not been supplied for network access, which further restricts the user's ability to access the server resources.

    Rate this question:

  • 12. 

    A company has just added a new conference room. The network administrator has decided to add six new data ports to this room. The administrator has verified that all the cabling is terminated and functioning correctly. Which of the following should the administrator do next?

    • A.

      Update the network baseline

    • B.

      Update the wiring diagrams

    • C.

      Move some data across each port

    • D.

      Check all of the cables with the OTDR.

    Correct Answer
    B. Update the wiring diagrams
    Explanation
    The network administrator should update the wiring diagrams after adding six new data ports to the new conference room. This is important because the wiring diagrams provide a visual representation of the network infrastructure, including the location and connections of all the data ports. By updating the wiring diagrams, the administrator ensures that the documentation accurately reflects the current state of the network, which can be helpful for troubleshooting, future expansions, and maintenance purposes.

    Rate this question:

  • 13. 

    A network technician wants to add fault tolerance to a file server. Which of the following should the technician do?

    • A.

      Install the latest NIC driver

    • B.

      Add an additional DNS server and modify the MX record

    • C.

      Upgrade the NIC to a one Gigabit card

    • D.

      Add an additional NIC and setup network teaming

    Correct Answer
    D. Add an additional NIC and setup network teaming
    Explanation
    Adding an additional NIC and setting up network teaming will provide fault tolerance to the file server. Network teaming allows multiple NICs to work together as a single virtual interface, increasing the server's network bandwidth and providing redundancy in case one NIC fails. This ensures that the server remains accessible and operational even if one NIC or network connection goes down.

    Rate this question:

  • 14. 

    Which of the following VPN protocols runs over port 1723 and allows encryption to be done at the data level

    • A.

      SLIP

    • B.

      PPPoE

    • C.

      PPTP

    • D.

      RAS

    Correct Answer
    C. PPTP
    Explanation
    PPTP (Point-to-Point Tunneling Protocol) is a VPN protocol that runs over port 1723 and allows encryption to be done at the data level. It is commonly used for remote access VPN connections and provides a secure and encrypted connection between the client and the server. PPTP encapsulates the data packets and adds an additional layer of security by encrypting them, ensuring that the data transmitted over the network is protected from unauthorized access.

    Rate this question:

  • 15. 

    Which of the following network devices would an administrator have to configure channels on?

    • A.

      Hub

    • B.

      Unmanaged switch

    • C.

      Firewall

    • D.

      Wireless access point

    Correct Answer
    D. Wireless access point
    Explanation
    An administrator would have to configure channels on a wireless access point. Channels refer to the specific frequencies that wireless devices use to communicate with the access point. By configuring channels, the administrator can optimize the wireless network's performance by avoiding interference from other devices operating on the same frequency. This allows for better signal quality and overall network efficiency.

    Rate this question:

  • 16. 

    A network technician is installing a series of three access points to cover the entire wing of a building. Only one access point has a wired connection. 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points?

    • A.

      Channels 1-3-5

    • B.

      Channels 6-6-6

    • C.

      Channels 7-11-1

    • D.

      Channels 5-5-5

    Correct Answer
    B. Channels 6-6-6
    Explanation
    The correct answer is Channels 6-6-6 because in the 802.11g standard, each channel has a bandwidth of 20 MHz. Channels 1, 6, and 11 are the only non-overlapping channels in the 2.4 GHz frequency range. Since only one access point has a wired connection, using Channels 6-6-6 ensures that the access points do not interfere with each other and provides the best coverage for the entire wing of the building.

    Rate this question:

  • 17. 

    Which of the following outlines the purpose of using a proxy server in an enterprise environment?

    • A.

      Allows the administrator to block malicious attacks on the network

    • B.

      Allows the user to access hard to find websites

    • C.

      Allows the client to get a fixed IP address when added to the network

    • D.

      Allows granular control over the traffic between the local LAN and the Internet

    Correct Answer
    D. Allows granular control over the traffic between the local LAN and the Internet
    Explanation
    A proxy server in an enterprise environment allows granular control over the traffic between the local LAN and the Internet. This means that the administrator can effectively manage and regulate the flow of data, ensuring that only authorized and safe traffic is allowed through. It allows for monitoring, filtering, and blocking of certain types of traffic, providing enhanced security and protection against malicious attacks on the network. Additionally, it can also improve network performance by caching frequently accessed web content, reducing bandwidth usage, and speeding up access to websites.

    Rate this question:

  • 18. 

    An administrator is using a packet analyzer across a single switch but is only receiving partial packet information. Which of the following would need to be implemented on the switch for the administrator?

    • A.

      Port authentication

    • B.

      Port mirroring

    • C.

      Spanning tree

    • D.

      VLAN

    Correct Answer
    B. Port mirroring
    Explanation
    Port mirroring would need to be implemented on the switch for the administrator to receive complete packet information. Port mirroring allows the switch to copy the traffic from one or more ports and send it to another port where the packet analyzer is connected. This enables the administrator to capture and analyze all the packets passing through the switch, even if they are not directly connected to the analyzer's port.

    Rate this question:

  • 19. 

    Which of the following cable types is typically used to connect a hub to a hub that does not support MDIX?

    • A.

      Straight

    • B.

      Loopback

    • C.

      Crossover

    • D.

      Rollover

    Correct Answer
    C. Crossover
    Explanation
    A crossover cable is typically used to connect a hub to another hub that does not support MDIX. MDIX stands for Medium Dependent Interface with Crossover, which allows devices to automatically detect and correct for cable connection types. However, if a hub does not support MDIX, a crossover cable is needed to properly connect the two hubs. A crossover cable is wired in a way that allows the transmit and receive signals to be swapped, enabling communication between the two hubs.

    Rate this question:

  • 20. 

    Which of the following features from the switch eliminates a delay in acquiring an IP address?

    • A.

      Update the SNMP strings

    • B.

      Change the duplex mode tohalfduplex

    • C.

      Enable spanning tree on the interface

    • D.

      Enable trunking.

    Correct Answer
    C. Enable spanning tree on the interface
    Explanation
    Enabling spanning tree on the interface helps to eliminate a delay in acquiring an IP address. Spanning tree protocol prevents loops in a network by blocking redundant paths. By enabling spanning tree on the interface, the switch can quickly determine the best path to forward traffic, reducing any delays in acquiring an IP address.

    Rate this question:

  • 21. 

    Which of the following is the component in a wiring system designed to support legacy phone systems?

    • A.

      Fiber conduit

    • B.

      66 block

    • C.

      110 block

    • D.

      Patch panels

    Correct Answer
    B. 66 block
    Explanation
    A 66 block is a component in a wiring system that is specifically designed to support legacy phone systems. It is a type of punch-down block that is used to connect telephone wires to each other and to external lines. The 66 block provides a convenient and organized way to terminate and manage phone connections in a wiring system, making it an essential component for legacy phone systems.

    Rate this question:

  • 22. 

    Which of the following protocols allows usernames and passwords to be transmitted as clear-text?

    • A.

      PAP

    • B.

      RADIUS

    • C.

      CHAP

    • D.

      SSH

    Correct Answer
    A. PAP
    Explanation
    PAP (Password Authentication Protocol) is a protocol that allows usernames and passwords to be transmitted as clear-text. Unlike other protocols like RADIUS, CHAP, and SSH, PAP does not encrypt the credentials, making it less secure. This lack of encryption makes PAP vulnerable to eavesdropping and unauthorized access to sensitive information.

    Rate this question:

  • 23. 

    Which of the following will allow certain ports to be part of the same group while other ports within that switch are part of a different group?

    • A.

      Trunking

    • B.

      Port authentication

    • C.

      Enabling VLANs

    • D.

      Enabling VTP

    Correct Answer
    C. Enabling VLANs
    Explanation
    Enabling VLANs allows certain ports to be part of the same group while other ports within that switch are part of a different group. VLANs (Virtual Local Area Networks) are used to logically divide a switch into multiple virtual switches, allowing different groups of devices to be isolated from each other. By assigning ports to different VLANs, certain ports can be grouped together while others are part of a different group, providing network segmentation and improved security. Trunking is used to carry multiple VLANs over a single link, port authentication is used to control access to a port, and enabling VTP is used for VLAN management and propagation.

    Rate this question:

  • 24. 

    When preparing to place a RJ-45 connector on a CAT5 cable, which of the following tools would BEST be used to prepare the cable?

    • A.

      Polishing kit

    • B.

      Pliers

    • C.

      Razor knife

    • D.

      Snips

    Correct Answer
    D. Snips
    Explanation
    Snips would be the best tool to prepare a CAT5 cable when placing a RJ-45 connector. Snips are used to cut and trim the cable to the desired length. They provide clean and precise cuts, ensuring that the cable is properly prepared for the connector. Pliers could be used for gripping and bending wires, but they may not provide the same level of precision as snips. A polishing kit is used for polishing and finishing surfaces, which is not necessary for preparing a cable. A razor knife could be used to strip the outer insulation of the cable, but snips would be more efficient for this task.

    Rate this question:

  • 25. 

    Which of the following authentication protocols uses certificates to negotiate access to the network?

    • A.

      EAP-TLS

    • B.

      PAP

    • C.

      CHAP

    • D.

      Kerberos

    Correct Answer
    A. EAP-TLS
    Explanation
    EAP-TLS is the correct answer because it is an authentication protocol that uses certificates to negotiate access to the network. EAP-TLS stands for Extensible Authentication Protocol - Transport Layer Security, and it is commonly used in wireless networks. With EAP-TLS, both the client and the server are required to present digital certificates, which are used to verify their identities and establish a secure connection. This protocol provides a high level of security and is widely used in enterprise environments.

    Rate this question:

  • 26. 

    Which of the following components allows a technician to use short Ethernet cables to connect cable drops to other devices?

    • A.

      EDF

    • B.

      MDF

    • C.

      Demarc extension

    • D.

      Patch panel

    Correct Answer
    D. Patch panel
    Explanation
    A patch panel is a component that allows a technician to use short Ethernet cables to connect cable drops to other devices. It acts as a central point where all the cables from different cable drops are terminated and can be easily connected or disconnected to other devices using short Ethernet cables. This helps in organizing and managing the network connections efficiently.

    Rate this question:

  • 27. 

    Which of the following is the strongest type of wireless encryption?

    • A.

      AES

    • B.

      RADIUS

    • C.

      WEP

    • D.

      TKIP

    Correct Answer
    A. AES
    Explanation
    AES (Advanced Encryption Standard) is the strongest type of wireless encryption among the given options. It is a symmetric encryption algorithm that provides a high level of security and is widely used in various applications, including wireless networks. AES uses a 128-bit, 192-bit, or 256-bit key length, making it highly resistant to brute-force attacks. It has been adopted by the U.S. government and is considered a reliable and secure encryption standard. RADIUS, WEP, and TKIP are all weaker encryption methods compared to AES.

    Rate this question:

  • 28. 

    Which of the following wireless communication standards allows for communication at both 2.4GHz and 5GHz frequencies?

    • A.

      802.11b

    • B.

      802.11a

    • C.

      802.11n

    • D.

      802.11g

    Correct Answer
    C. 802.11n
    Explanation
    802.11n is the correct answer because it is a wireless communication standard that allows for communication at both 2.4GHz and 5GHz frequencies. This standard supports multiple-input multiple-output (MIMO) technology, which enhances the signal quality and data transfer rates. It is backward compatible with previous standards (802.11a/b/g) and offers improved range and throughput compared to them.

    Rate this question:

  • 29. 

    Which of the following network security devices prevents users from propagating viruses?

    • A.

      IPS

    • B.

      Firewall

    • C.

      IDS

    • D.

      Content engine

    Correct Answer
    A. IPS
    Explanation
    An Intrusion Prevention System (IPS) is a network security device that actively monitors network traffic and prevents malicious activities such as virus propagation. It analyzes packets of data, identifies potential threats, and takes immediate action to block or prevent them from spreading across the network. Unlike a firewall or an Intrusion Detection System (IDS), which primarily focus on monitoring and blocking unauthorized access, an IPS specifically targets and prevents the spread of viruses and other malware within the network. Therefore, an IPS is the correct answer for this question.

    Rate this question:

  • 30. 

    A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?

    • A.

      RIPv2

    • B.

      IGRP

    • C.

      IS-IS

    • D.

      BGP

    Correct Answer
    A. RIPv2
    Explanation
    RIPv2 should be used as the dynamic routing protocol in this scenario. RIPv2 is a distance vector routing protocol that supports variable-length subnet masks (VLSM), making it compatible with the subnet mask of 255.255.255.224 used in each branch location. It allows for automatic updating of routing tables and is suitable for smaller networks with simple topologies, making it a good choice for the company's branch locations.

    Rate this question:

  • 31. 

    Which of the following network devices operates on Layer 1 of the OSI model?

    • A.

      Bridge

    • B.

      Switch

    • C.

      Hub

    • D.

      Router

    Correct Answer
    C. Hub
    Explanation
    A hub operates on Layer 1 of the OSI model because it is a simple device that connects multiple devices in a network, allowing them to communicate with each other. It does not perform any intelligent filtering or forwarding of data packets like switches or routers, which operate on higher layers of the OSI model. Instead, a hub simply broadcasts incoming data packets to all connected devices, regardless of their destination. This lack of intelligence makes hubs less efficient and more prone to collisions in network traffic.

    Rate this question:

  • 32. 

    After reconfiguring a server to facilitate DNS requests, which of the following would help provide the highest level of fault tolerance?

    • A.

      Adding a Kerberos server

    • B.

      Configuring traffic shaping

    • C.

      Configuring WEP

    • D.

      Adding a second NIC

    Correct Answer
    D. Adding a second NIC
    Explanation
    Adding a second NIC would help provide the highest level of fault tolerance because it allows for redundancy in network connections. If one NIC fails, the other NIC can still handle the network traffic, ensuring that the server remains accessible and DNS requests can still be processed. This helps to minimize downtime and maintain the availability of the server.

    Rate this question:

  • 33. 

    Which of the following devices controls traffic on a LAN?

    • A.

      Switch

    • B.

      Hub

    • C.

      Repeater

    • D.

      Bridge

    Correct Answer
    A. Switch
    Explanation
    A switch is a device that controls traffic on a LAN (Local Area Network). It receives data packets from connected devices and forwards them to the appropriate destination device based on the MAC addresses of the devices. Switches operate at the data link layer of the OSI model and provide better performance and security compared to hubs or repeaters. Unlike a hub, a switch can direct traffic to a specific device rather than broadcasting it to all devices on the network. Therefore, a switch is the correct device for controlling traffic on a LAN.

    Rate this question:

  • 34. 

    Which of the following network media has the longest maximum segment length?

    • A.

      CAT6

    • B.

      Single Mode Fiber

    • C.

      Coaxial cable

    • D.

      Multimode Fiber

    Correct Answer
    B. Single Mode Fiber
    Explanation
    Single Mode Fiber has the longest maximum segment length compared to the other network media options listed. This is because single mode fiber uses a much narrower core, allowing for a higher transmission capacity and longer distances without signal degradation. It is commonly used in long-distance telecommunications and high-speed data transmission applications.

    Rate this question:

  • 35. 

    Which of the following are the IEEE designations for the spanning tree protocol? (Select TWO).

    • A.

      802.1x

    • B.

      802.1p

    • C.

      802.1d

    • D.

      802.1w

    • E.

      802.1n

    Correct Answer(s)
    C. 802.1d
    D. 802.1w
    Explanation
    The IEEE designations for the spanning tree protocol are 802.1d and 802.1w. These protocols are used to prevent loops in a network by creating a tree-like structure. 802.1d is the original spanning tree protocol, while 802.1w is an enhanced version known as Rapid Spanning Tree Protocol (RSTP).

    Rate this question:

  • 36. 

    A network technician is trying to find out the NETBIOS name of another workstation using its IP address, which of the following commands would be used to find this information?

    • A.

      Nbtstat

    • B.

      Netstat

    • C.

      Ipconfig

    • D.

      Ping

    Correct Answer
    A. Nbtstat
    Explanation
    The correct answer is "nbtstat." Nbtstat is a command-line tool used to troubleshoot NetBIOS name resolution problems. It displays protocol statistics and current TCP/IP connections using NetBIOS over TCP/IP. By using the IP address as an argument with nbtstat, the network technician can retrieve the NETBIOS name associated with that workstation.

    Rate this question:

  • 37. 

    Which of the following cable standards is used for Ethernet over fiber?

    • A.

      1000Base-T

    • B.

      1000Base-CX

    • C.

      100Base-TX

    • D.

      10Base-FL

    Correct Answer
    D. 10Base-FL
    Explanation
    10Base-FL is the correct answer because it is a cable standard specifically used for Ethernet over fiber. The "10" in 10Base-FL refers to the data transfer rate of 10 Mbps, while "Base" signifies baseband transmission. "FL" stands for fiber optic link, indicating that this standard is designed for Ethernet connections using fiber optic cables. 1000Base-T, 1000Base-CX, and 100Base-TX are all cable standards used for Ethernet over copper, not fiber.

    Rate this question:

  • 38. 

    An employee is receiving an access denied error message when they try to access a network resource. Which of the following troubleshooting steps should the technician perform FIRST?

    • A.

      Identify what the employee cannot access

    • B.

      Implement an action plan to resolve the issue

    • C.

      Document the process

    • D.

      Ask the employee what has changed since yesterday

    Correct Answer
    A. Identify what the employee cannot access
    Explanation
    The technician should first identify what the employee cannot access. This will help narrow down the issue and determine if it is a problem with a specific resource or a more widespread network issue. Once the specific resource is identified, the technician can then proceed with troubleshooting and implementing an action plan to resolve the issue. Documenting the process and asking the employee what has changed since yesterday can be done after identifying the inaccessible resource.

    Rate this question:

  • 39. 

    A technician is installing a basic router for a SOHO network. After installing the router the PCs connected to it are not able to acquire an IP address. Which of the following did the technician fail to configure correctly?

    • A.

      NAT

    • B.

      DHCP

    • C.

      WINS

    • D.

      DNS

    Correct Answer
    B. DHCP
    Explanation
    The technician failed to configure the DHCP (Dynamic Host Configuration Protocol) correctly. DHCP is responsible for assigning IP addresses to devices on a network. Without proper DHCP configuration, the PCs connected to the router are not able to acquire an IP address, resulting in network connectivity issues.

    Rate this question:

  • 40. 

    Internet connectivity for a company is mission critical. The technician must be notified if the Internet router has failed. Which of the following is the BEST method to monitor this device?

    • A.

      SLIP

    • B.

      SFTP

    • C.

      SMTP

    • D.

      SNMP

    Correct Answer
    D. SNMP
    Explanation
    SNMP (Simple Network Management Protocol) is the best method to monitor the Internet router for failure. SNMP allows for the monitoring and management of network devices, including routers, by collecting and organizing information about their performance and status. It enables the technician to receive notifications and alerts in real-time if the router fails, ensuring prompt action can be taken to restore connectivity. Additionally, SNMP provides valuable data for troubleshooting and maintaining the network infrastructure.

    Rate this question:

  • 41. 

    Which of the following Layer 2 devices is used to connect multiple nodes on a network?

    • A.

      DHCP server

    • B.

      Router

    • C.

      Switch

    • D.

      Bridge

    Correct Answer
    C. Switch
    Explanation
    A switch is a Layer 2 device that is used to connect multiple nodes on a network. It operates by receiving data packets and forwarding them to the appropriate destination based on their MAC addresses. Unlike a router, which operates at Layer 3 and makes decisions based on IP addresses, a switch operates at Layer 2 and makes decisions based on MAC addresses. Therefore, a switch is the correct answer for connecting multiple nodes on a network.

    Rate this question:

  • 42. 

    A network technician is responsible for setting up four branch offices for a company. Each office will have 12 hosts, but needs the ability to expand to 16 hosts. Which of the following subnet masks should be chosen?

    • A.

      255.255.255.224

    • B.

      255.255.255.248

    • C.

      255.255.255.16

    • D.

      255.255.255.240

    Correct Answer
    A. 255.255.255.224
    Explanation
    The subnet mask 255.255.255.224 is the correct choice because it allows for a total of 30 usable IP addresses. This is calculated by subtracting 2 from the total number of IP addresses in the subnet, which is 32 (2^5). Since each office needs to accommodate 12 hosts initially and expand to 16 hosts, a subnet mask that provides at least 16 usable IP addresses is required. The subnet mask 255.255.255.224 meets this requirement and allows for future expansion.

    Rate this question:

  • 43. 

    Which of the following is a secure method for file transfer to a network device?

    • A.

      SNMPv2

    • B.

      TFTP

    • C.

      SCP

    • D.

      FTP

    Correct Answer
    C. SCP
    Explanation
    SCP (Secure Copy Protocol) is a secure method for file transfer to a network device. It uses SSH (Secure Shell) protocol to provide encryption and authentication, ensuring the confidentiality and integrity of the transferred files. Unlike FTP (File Transfer Protocol) and TFTP (Trivial File Transfer Protocol), which do not provide encryption, SCP encrypts the data during transit, making it a more secure option for transferring files. SNMPv2 (Simple Network Management Protocol version 2) is used for network management and monitoring, but it does not provide secure file transfer capabilities.

    Rate this question:

  • 44. 

    Which of the following would accelerate repeated access requests for static web content?

    • A.

      A caching engine

    • B.

      A traffic shaper

    • C.

      A load balancer

    • D.

      A redundant switch

    Correct Answer
    A. A caching engine
    Explanation
    A caching engine would accelerate repeated access requests for static web content by storing a copy of the content in its cache memory. When a user requests the content again, the caching engine can quickly retrieve it from the cache instead of fetching it from the original source. This reduces the response time and network congestion, improving the overall performance and user experience.

    Rate this question:

  • 45. 

    Which of the following tools should be used to physically attach an RJ-45 connector to a CAT5 cable?

    • A.

      Snips

    • B.

      Screwdrive

    • C.

      Punch down tool

    • D.

      Crimping tool

    Correct Answer
    D. Crimping tool
    Explanation
    A crimping tool should be used to physically attach an RJ-45 connector to a CAT5 cable. This tool is specifically designed to crimp the connector onto the cable, ensuring a secure and reliable connection. Snips are used for cutting wires, a screwdriver is used for turning screws, and a punch down tool is used for terminating wires on a patch panel or keystone jack. However, none of these tools are suitable for attaching an RJ-45 connector to a CAT5 cable.

    Rate this question:

  • 46. 

    A wireless network is created for six computers. Five connect correctly? one machine sees the wireless network but will not connect. Which of the following should the technician do?

    • A.

      Ensure the failed computer has the correct WEP key.

    • B.

      Restart the wireless router

    • C.

      Remove the WEP key from the router.

    • D.

      Change the WEP key on the router

    Correct Answer
    A. Ensure the failed computer has the correct WEP key.
    Explanation
    The correct answer is to ensure the failed computer has the correct WEP key. This is because the computer is able to see the wireless network but is unable to connect, which suggests that the issue may lie with the authentication process. By ensuring that the computer has the correct WEP key, the technician can ensure that the computer is able to authenticate and connect to the wireless network successfully. Restarting the wireless router, removing the WEP key, or changing the WEP key on the router may not address the specific issue of the failed computer not being able to connect.

    Rate this question:

  • 47. 

    Which of the following IEEE standards describes the power output of a standard switch port?

    • A.

      802.3ab

    • B.

      802.3ae

    • C.

      802.3af

    • D.

      802.3aa

    Correct Answer
    C. 802.3af
    Explanation
    IEEE 802.3af is the correct answer because this standard specifically describes the power output of a standard switch port. It is also known as Power over Ethernet (PoE), which allows devices to receive power and data through the same Ethernet cable. This standard defines the maximum power output of a switch port, which is typically around 15.4 watts.

    Rate this question:

  • 48. 

    Which of the following can operate at both layers 2 and 3 of the OSI model?

    • A.

      Bridge

    • B.

      Switch

    • C.

      Repeater

    • D.

      Hub

    Correct Answer
    B. Switch
    Explanation
    A switch is capable of operating at both layers 2 and 3 of the OSI model. At layer 2, a switch functions as a bridge, forwarding data based on MAC addresses. It learns the MAC addresses of devices connected to its ports and uses this information to determine the appropriate port to forward data to. At layer 3, a switch can also perform routing functions by examining IP addresses in the packet headers and making decisions on how to forward the packets to their destinations. This dual functionality makes switches versatile and enables them to handle both local area network (LAN) and wide area network (WAN) traffic efficiently.

    Rate this question:

  • 49. 

    Which of the following authentication methods allows for domain level authentication on a wireless network?

    • A.

      WAP

    • B.

      TKIP

    • C.

      RADIUS

    • D.

      WEP

    Correct Answer
    C. RADIUS
    Explanation
    RADIUS (Remote Authentication Dial-In User Service) is an authentication method that allows for domain level authentication on a wireless network. It is a networking protocol that provides centralized authentication, authorization, and accounting for users who connect and use a network service. RADIUS enables the wireless network to authenticate users against a central database, such as Active Directory, allowing for domain-level authentication and ensuring secure access to the network. WAP (Wireless Access Point) is a device that allows wireless devices to connect to a wired network, TKIP (Temporal Key Integrity Protocol) is a security protocol used in Wi-Fi networks, and WEP (Wired Equivalent Privacy) is an older and less secure encryption method for wireless networks.

    Rate this question:

  • 50. 

    Which of the following routing protocol uses a state algorithm?

    • A.

      BGP

    • B.

      RIP

    • C.

      OSPF

    • D.

      RIPv2

    Correct Answer
    C. OSPF
    Explanation
    OSPF (Open Shortest Path First) is a routing protocol that uses a state algorithm. It is a link-state routing protocol that calculates the shortest path to a destination based on the information it has about the network's topology. OSPF routers exchange information about their directly connected neighbors and use this information to build a complete map of the network. By maintaining a database of this network information, OSPF is able to calculate the best path for routing packets to their destination. This state algorithm allows OSPF to dynamically adjust to changes in the network, making it a scalable and efficient routing protocol.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.