Network + Practice Test 4

100 Questions | Total Attempts: 54

SettingsSettingsSettings
Network Plus Quizzes & Trivia

This is the part 4 of the practice test


Questions and Answers
  • 1. 
    A user is reporting that their inquiries to the database server keep timing out. Which of the following tools would be BEST suited to troubleshoot the issue?
    • A. 

      Cable tester

    • B. 

      Packet analyzer

    • C. 

      Tone probe

    • D. 

      Butt set

  • 2. 
    Which of the following connector types would a technician utilize with fiber lines by pushing it directly into the port without twisting?
    • A. 

      RJ-45

    • B. 

      ST

    • C. 

      SC

    • D. 

      BNC

  • 3. 
    A client is using a device that allows them to synchronize their wireless device to their computer, but the device must be within 3 feet (1 meter) in order for the synchronization to complete. Which of the following BEST describes the type of wireless device being used?
    • A. 

      WiFi

    • B. 

      Bluetooth

    • C. 

      Serial

    • D. 

      Infrared

  • 4. 
    A technician is building a new network. Which of the following components would be the FIRST installed for the network?
    • A. 

      MDF

    • B. 

      VPN

    • C. 

      EMI

    • D. 

      IDF

  • 5. 
    After a technician came out and installed a new wireless router, one of the wired workstations began having problems connecting to the file server. This is only an intermittent problem. Which of the following actions will the technician MOST likely perform to resolve this problem?
    • A. 

      Move the router's location.

    • B. 

      Check the cable ends.

    • C. 

      Check user permissions

    • D. 

      Change the router's SSID

  • 6. 
    A network device that is used to connect multiple devices without segmenting a network is a:
    • A. 

      Router

    • B. 

      Bridge.

    • C. 

      Hub

    • D. 

      Switch

  • 7. 
    A mail server was recently placed in the network. The users report email is slow. Upon closer inspection a technician notices that error counters on the interface are incrementing. Which of the following could be causing the problem?
    • A. 

      Wrong subnet mask

    • B. 

      Duplex mismatch

    • C. 

      Port speed mismatch

    • D. 

      Switch loop

  • 8. 
    A technician has just finished implementing a solution for a network issue. Which of the following steps in troubleshooting should the technician do NEXT?
    • A. 

      Document the issue and the solution that was implemented.

    • B. 

      Escalate the issue to another technician

    • C. 

      Test if the solution works and identify other effects it may have

    • D. 

      Gather information about the issue.

  • 9. 
    A technician notices that when trying to ping a workstation by network name the workstation does not reply back over the network. The workstation is part of the domain and is able to get to the Internet. Which of the following is the cause of the problem?
    • A. 

      Faulty cable on the workstation

    • B. 

      Wrong host name on the workstation

    • C. 

      Wrong WINS on the workstation

    • D. 

      Incorrect IP address assigned to the workstation

  • 10. 
    Which of the following network performance optimization methods slows or restricts traffic to increase the performance of other types of traffic? (Select TWO).
    • A. 

      Load balancing

    • B. 

      Traffic shaping

    • C. 

      High availability

    • D. 

      Caching engines

    • E. 

      QoS

  • 11. 
    A user has plugged a computer into a switch port and now is unable to access any server resources on the network.Which of the following are the MOST likely reasons for the access problem? (Select TWO).
    • A. 

      The spanning tree protocol has locked down the port

    • B. 

      The computer is connected to a port in the wrong VLAN

    • C. 

      The appropriate credentials have not been supplied for network access

    • D. 

      A port mirroring session was started and is interfering with the connection

    • E. 

      The computer is connected to an incorrect PoE port.

  • 12. 
    A company has just added a new conference room. The network administrator has decided to add six new data ports to this room. The administrator has verified that all the cabling is terminated and functioning correctly. Which of the following should the administrator do next?
    • A. 

      Update the network baseline

    • B. 

      Update the wiring diagrams

    • C. 

      Move some data across each port

    • D. 

      Check all of the cables with the OTDR.

  • 13. 
    A network technician wants to add fault tolerance to a file server. Which of the following should the technician do?
    • A. 

      Install the latest NIC driver

    • B. 

      Add an additional DNS server and modify the MX record

    • C. 

      Upgrade the NIC to a one Gigabit card

    • D. 

      Add an additional NIC and setup network teaming

  • 14. 
    Which of the following VPN protocols runs over port 1723 and allows encryption to be done at the data level
    • A. 

      SLIP

    • B. 

      PPPoE

    • C. 

      PPTP

    • D. 

      RAS

  • 15. 
    Which of the following network devices would an administrator have to configure channels on?
    • A. 

      Hub

    • B. 

      Unmanaged switch

    • C. 

      Firewall

    • D. 

      Wireless access point

  • 16. 
    A network technician is installing a series of three access points to cover the entire wing of a building. Only one access point has a wired connection. 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points?
    • A. 

      Channels 1-3-5

    • B. 

      Channels 6-6-6

    • C. 

      Channels 7-11-1

    • D. 

      Channels 5-5-5

  • 17. 
    Which of the following outlines the purpose of using a proxy server in an enterprise environment?
    • A. 

      Allows the administrator to block malicious attacks on the network

    • B. 

      Allows the user to access hard to find websites

    • C. 

      Allows the client to get a fixed IP address when added to the network

    • D. 

      Allows granular control over the traffic between the local LAN and the Internet

  • 18. 
    An administrator is using a packet analyzer across a single switch but is only receiving partial packet information. Which of the following would need to be implemented on the switch for the administrator?
    • A. 

      Port authentication

    • B. 

      Port mirroring

    • C. 

      Spanning tree

    • D. 

      VLAN

  • 19. 
    Which of the following cable types is typically used to connect a hub to a hub that does not support MDIX?
    • A. 

      Straight

    • B. 

      Loopback

    • C. 

      Crossover

    • D. 

      Rollover

  • 20. 
    Which of the following features from the switch eliminates a delay in acquiring an IP address?
    • A. 

      Update the SNMP strings

    • B. 

      Change the duplex mode tohalfduplex

    • C. 

      Enable spanning tree on the interface

    • D. 

      Enable trunking.

  • 21. 
    Which of the following is the component in a wiring system designed to support legacy phone systems?
    • A. 

      Fiber conduit

    • B. 

      66 block

    • C. 

      110 block

    • D. 

      Patch panels

  • 22. 
    Which of the following protocols allows usernames and passwords to be transmitted as clear-text?
    • A. 

      PAP

    • B. 

      RADIUS

    • C. 

      CHAP

    • D. 

      SSH

  • 23. 
    Which of the following will allow certain ports to be part of the same group while other ports within that switch are part of a different group?
    • A. 

      Trunking

    • B. 

      Port authentication

    • C. 

      Enabling VLANs

    • D. 

      Enabling VTP

  • 24. 
    When preparing to place a RJ-45 connector on a CAT5 cable, which of the following tools would BEST be used to prepare the cable?
    • A. 

      Polishing kit

    • B. 

      Pliers

    • C. 

      Razor knife

    • D. 

      Snips

  • 25. 
    Which of the following authentication protocols uses certificates to negotiate access to the network?
    • A. 

      EAP-TLS

    • B. 

      PAP

    • C. 

      CHAP

    • D. 

      Kerberos

Related Topics
Back to Top Back to top