Network + Practice Test 5

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Afiavison
A
Afiavison
Community Contributor
Quizzes Created: 3 | Total Attempts: 2,238
| Attempts: 114
SettingsSettings
Please wait...
  • 1/90 Questions

    Which of the following is the MOST secure wireless encryption?

    • ESSID
    • WPA
    • WPA2
    • WEP
Please wait...
About This Quiz


Network + Practice Test 5 is a quiz with short questions with multiple-choice answers to choose from. If you think you have what it takes and are well versed with the networking knowledge, take it up.

Network + Practice Test 5 - Quiz

Quiz Preview

  • 2. 

    Which of the following would occur at the application layer of the OSI model?

    • UDP

    • FTP

    • TCP

    • SPX

    Correct Answer
    A. FTP
    Explanation
    FTP (File Transfer Protocol) would occur at the application layer of the OSI model. The application layer is responsible for providing network services to the user and FTP is a protocol that allows for the transfer of files between systems over a network. It provides a way for users to access and manipulate files on a remote computer. Therefore, FTP is the correct answer as it operates at the application layer of the OSI model.

    Rate this question:

  • 3. 

    Which of the following network hardware allows the MOST network traffic collisions?

    • Hub

    • WAP

    • Router

    • Switch

    Correct Answer
    A. Hub
    Explanation
    A hub allows the most network traffic collisions because it operates in a shared environment, where all devices connected to it share the same bandwidth. When multiple devices try to transmit data at the same time, collisions can occur, resulting in data packet loss and network congestion. Unlike switches or routers, hubs do not have the ability to manage network traffic or create separate collision domains, making them more prone to collisions.

    Rate this question:

  • 4. 

    Which of the following is the default port for HTTPS?

    • 143

    • 443

    • 80

    • 8080

    Correct Answer
    A. 443
    Explanation
    The default port for HTTPS is 443. HTTPS is the secure version of HTTP, and it uses a different port (443) to ensure encrypted communication between the client and the server. This port is commonly used for secure online transactions, such as online banking or shopping, as it provides a secure connection and protects sensitive information from being intercepted or tampered with.

    Rate this question:

  • 5. 

    QoS is used to accomplish which of the following objectives?

    • Block traffic from certain websites

    • Block traffic from certain users

    • Provide priority of one or more types of traffic over others

    • Make use of the current bandwidth so it is a constant preset ideal by caching traffic.

    Correct Answer
    A. Provide priority of one or more types of traffic over others
    Explanation
    QoS, or Quality of Service, is used to provide priority of one or more types of traffic over others. It allows network administrators to prioritize certain types of traffic, such as voice or video, over others to ensure that they receive sufficient bandwidth and low latency. This helps to optimize network performance and ensure a consistent user experience for critical applications. Blocking traffic from certain websites or users is not a primary objective of QoS, and the concept of caching traffic to make use of the current bandwidth is not directly related to QoS.

    Rate this question:

  • 6. 

    Which of the following network components operates on Layer 2 of the OSI model?

    • Gateway

    • Router

    • Switch

    • Hub

    Correct Answer
    A. Switch
    Explanation
    A switch operates on Layer 2 of the OSI model. Layer 2 is the Data Link layer, which is responsible for the reliable transfer of data between network devices on the same local area network (LAN). A switch is a networking device that connects multiple devices on a LAN and forwards data packets between them. It uses MAC addresses to determine the destination of each packet and delivers them only to the intended device, enhancing network performance and security. Unlike routers, which operate on Layer 3 (Network layer), switches do not perform routing functions and are limited to the local network.

    Rate this question:

  • 7. 

    Which of the following protocols maps an IP address to a MAC address?

    • RARP

    • DHCP

    • NTP

    • ARP

    Correct Answer
    A. ARP
    Explanation
    ARP (Address Resolution Protocol) is the correct answer because it is a protocol used to map an IP address to a MAC address. When a device wants to send data to another device on the same network, it needs to know the MAC address of the destination device. ARP helps in resolving this by sending an ARP request to the network asking for the MAC address associated with a specific IP address. The device with the corresponding IP address responds with its MAC address, allowing the sender to successfully communicate with the destination device.

    Rate this question:

  • 8. 

    Which of the following protocols uses port 443?

    • SMTP

    • FTP

    • HTTPS

    • HTTP

    Correct Answer
    A. HTTPS
    Explanation
    HTTPS (Hypertext Transfer Protocol Secure) is the correct answer because it uses port 443. HTTPS is a secure version of HTTP that encrypts data sent between a web server and a web browser, ensuring that the information remains confidential and secure. Port 443 is the default port for HTTPS communication, allowing secure transmission of data over the internet. SMTP (Simple Mail Transfer Protocol) uses port 25, FTP (File Transfer Protocol) uses port 21, and HTTP (Hypertext Transfer Protocol) uses port 80.

    Rate this question:

  • 9. 

    A network technician has discovered that passwords are being sent unencrypted over the network. Which of the following network monitoring utilities was used?

    • Throughput tester

    • Packet sniffer

    • VPN concentrator

    • Network scanner

    Correct Answer
    A. Packet sniffer
    Explanation
    A packet sniffer is a network monitoring utility that captures and analyzes network traffic. It allows the network technician to intercept and examine the packets being sent over the network. In this scenario, the technician discovered that passwords were being sent unencrypted, indicating a security vulnerability. By using a packet sniffer, the technician was able to identify this issue and take appropriate measures to secure the network.

    Rate this question:

  • 10. 

    A technician is dispatched to a house where the user reports intermittent problems with their wireless network. Which of the following is the MOST likely cause of dropoffs?

    • Cellular phones

    • Poor cable connection

    • Cordless phones

    • Lighting

    Correct Answer
    A. Cordless phones
    Explanation
    Cordless phones are the most likely cause of dropoffs in the wireless network. Cordless phones operate on the same frequency range as Wi-Fi networks, which can cause interference and disrupt the wireless signal. This interference can lead to intermittent problems and dropoffs in the network connection.

    Rate this question:

  • 11. 

    Which of the following punch down blocks is BEST suited for high-speed data transmission?

    • 66 block

    • Cross-connect block

    • 110 block

    • 25 pair cable block

    Correct Answer
    A. 110 block
    Explanation
    The 110 block is the best suited for high-speed data transmission. This type of punch down block is specifically designed for use with Category 5 or higher Ethernet cables, which are commonly used for high-speed data transmission. The 110 block provides better performance and reliability compared to other punch down blocks, making it the ideal choice for transmitting data at high speeds.

    Rate this question:

  • 12. 

    Which of the following protocols is used to access files on a remote server?

    • ARP

    • SIP

    • FTP

    • NTP

    Correct Answer
    A. FTP
    Explanation
    FTP stands for File Transfer Protocol and it is used to access files on a remote server. It allows users to upload, download, and manipulate files on a remote server over a network connection. ARP (Address Resolution Protocol) is used to map an IP address to a physical MAC address. SIP (Session Initiation Protocol) is used for initiating, modifying, and terminating multimedia sessions. NTP (Network Time Protocol) is used for synchronizing the time on networked devices.

    Rate this question:

  • 13. 

    Which of the following tools would be used to verify the wiring installation for the network?

    • Multimeter

    • Cable tester

    • Voltage event recorder

    • Protocol analyzer

    Correct Answer
    A. Cable tester
    Explanation
    A cable tester is used to verify the wiring installation for a network. It is a tool designed to test the integrity of network cables, ensuring that they are properly connected and functioning correctly. It can detect faults such as open circuits, short circuits, and incorrect wiring configurations. By using a cable tester, network technicians can quickly identify and troubleshoot any issues with the wiring installation, ensuring reliable network connectivity.

    Rate this question:

  • 14. 

    Which of the following protocols should be used to securely copy a file? (Select TWO).

    • SFTP

    • SCP

    • TFTP

    • FTP

    • SNMP

    Correct Answer(s)
    A. SFTP
    A. SCP
    Explanation
    SFTP (Secure File Transfer Protocol) and SCP (Secure Copy Protocol) should be used to securely copy a file. Both protocols provide secure and encrypted file transfer over a network. SFTP is an extension of the SSH protocol and uses SSH for authentication and encryption. SCP is also based on SSH and allows secure copying of files between hosts on a network. TFTP (Trivial File Transfer Protocol) and FTP (File Transfer Protocol) do not provide encryption and are not secure for file transfers. SNMP (Simple Network Management Protocol) is used for network monitoring and management, not for file transfer.

    Rate this question:

  • 15. 

    SMTP resides at which of the following layers of the OSI model?

    • Transport

    • Application

    • Network

    • Presentation

    Correct Answer
    A. Application
    Explanation
    SMTP (Simple Mail Transfer Protocol) is a protocol used for sending email messages over a network. It operates at the application layer of the OSI model. The application layer is responsible for providing network services to the user and enables communication between applications. SMTP is specifically designed for the application layer as it handles the transfer of email messages between mail servers and clients.

    Rate this question:

  • 16. 

    Which of the following protocols are used for email traffic? (Select THREE).

    • POP3

    • TFTP

    • IMAP4

    • SSH

    • SMTP

    Correct Answer(s)
    A. POP3
    A. IMAP4
    A. SMTP
    Explanation
    POP3, IMAP4, and SMTP are all protocols used for email traffic. POP3 (Post Office Protocol version 3) is a protocol used to retrieve emails from a mail server. IMAP4 (Internet Message Access Protocol version 4) is a protocol used to access and manage emails on a mail server. SMTP (Simple Mail Transfer Protocol) is a protocol used to send emails from a client to a mail server for delivery to the recipient's email server. TFTP (Trivial File Transfer Protocol) and SSH (Secure Shell) are not specifically used for email traffic.

    Rate this question:

  • 17. 

    A user is having connectivity issues at multiple locations when using the RJ-45 port on the laptop. A technician wants to know if the CAT5e cable is the source of the problem. Which of the following should the technician use to troubleshoot the issue?

    • Toner probe

    • Cable stripper

    • Protocol analyzer

    • Cable tester

    Correct Answer
    A. Cable tester
    Explanation
    To troubleshoot the connectivity issues with the RJ-45 port, the technician should use a cable tester. A cable tester is a tool used to check the integrity and functionality of network cables. By connecting the CAT5e cable to the tester, the technician can verify if the cable is the source of the problem. The tester will check for continuity, proper wiring, and potential faults in the cable, helping to identify if the cable is causing the connectivity issues at multiple locations.

    Rate this question:

  • 18. 

    Which of the following routing protocols has a limitation of 15 hops?

    • OSPF

    • RIP

    • IGRP

    • BGP

    Correct Answer
    A. RIP
    Explanation
    RIP (Routing Information Protocol) has a limitation of 15 hops. This means that RIP can only support a maximum network diameter of 15 hops, beyond which it will not be able to effectively route packets. RIP uses hop count as the metric to determine the best path for routing, and a hop count of 16 or higher is considered unreachable. Therefore, RIP is not suitable for large networks with a diameter greater than 15 hops.

    Rate this question:

  • 19. 

    Which of the following utilities shows the relationship between a MAC address and the corresponding IP address?

    • Arp

    • Nslookup

    • Ipconfig

    • Tracert

    Correct Answer
    A. Arp
    Explanation
    The correct answer is "arp." ARP (Address Resolution Protocol) is a utility that is used to map an IP address to a corresponding MAC address in a local network. It helps in identifying the MAC address of a device based on its IP address, allowing for communication between devices at the data link layer.

    Rate this question:

  • 20. 

    Which of the following advanced features prevents switching loops by using a preferred path?

    • Spanning tree

    • VLAN

    • Port bonding

    • Port authentication

    Correct Answer
    A. Spanning tree
    Explanation
    Spanning tree is the correct answer because it is an advanced feature that prevents switching loops by using a preferred path. Switching loops can occur when there are multiple paths between switches, causing packets to be endlessly forwarded in a loop. Spanning tree protocol (STP) identifies the best path and blocks redundant paths, ensuring a loop-free network. By doing so, it enhances network reliability and prevents broadcast storms that can result from switching loops.

    Rate this question:

  • 21. 

    The optimal transmission speed for a CAT5 network cable in a main distribution frame (MDF) is:

    • 1Mbps

    • 10Mbps

    • 1000Mbps

    • 100Mbps

    Correct Answer
    A. 100Mbps
    Explanation
    The optimal transmission speed for a CAT5 network cable in a main distribution frame (MDF) is 100Mbps. This is because CAT5 cables are designed to support speeds up to 100Mbps. The "Mbps" stands for megabits per second, which is a unit of data transfer speed. Therefore, the correct answer is 100Mbps.

    Rate this question:

  • 22. 

    Which of the following defines the main purpose of dynamic routing?

    • Adapts quickly to network changes without manual entries

    • Enables routing protocols with the least amount of hops.

    • Adapts to network changes by making manual changes

    • Reduces domain collisions

    Correct Answer
    A. Adapts quickly to network changes without manual entries
    Explanation
    Dynamic routing is a routing method that automatically adjusts and adapts to network changes without the need for manual entries. This means that the main purpose of dynamic routing is to enable routers to automatically update and optimize their routing tables based on changes in the network topology. By doing so, dynamic routing ensures efficient and reliable communication by dynamically selecting the best paths for data transmission.

    Rate this question:

  • 23. 

    A technician pings 127.0.0.1 and gets the following result: Unable to contact IP driver, error code 2.Which of the following would resolve this?

    • Flush the DNS Cache

    • Install NetBEUI

    • Release the IP Address

    • Install the TCP/IP protocol

    Correct Answer
    A. Install the TCP/IP protocol
    Explanation
    Installing the TCP/IP protocol would resolve the issue because the error message suggests that the IP driver is not functioning properly. The TCP/IP protocol is responsible for communication over the internet and is essential for the IP driver to work correctly. By installing the TCP/IP protocol, the technician can ensure that the necessary components for IP communication are in place, resolving the error code 2.

    Rate this question:

  • 24. 

    A technician is troubleshooting a network data transmission issue. Which of the following commands would the technician be able to use to identify the location of the packet loss?

    • Ipconfig

    • Traceroute

    • Ping

    • Arp

    Correct Answer
    A. Traceroute
    Explanation
    The technician would be able to use the "traceroute" command to identify the location of the packet loss. Traceroute is a network diagnostic tool that shows the path taken by packets from the source to the destination. It displays the IP addresses of the routers along the path and the round-trip time for each hop. By analyzing the traceroute results, the technician can determine where the packet loss is occurring and troubleshoot the network issue accordingly.

    Rate this question:

  • 25. 

    Which of the following will prevent unauthorized access to the server room?

    • Biometric lock

    • PKI card

    • Cable lock

    • RSA token

    Correct Answer
    A. Biometric lock
    Explanation
    A biometric lock is a security measure that uses unique physical characteristics, such as fingerprints or iris scans, to grant access to a server room. This prevents unauthorized individuals from gaining entry, as the lock can only be opened by those with registered biometric data. Unlike PKI cards, cable locks, or RSA tokens, which can be lost, stolen, or replicated, a biometric lock provides a higher level of security as it relies on an individual's unique biological traits.

    Rate this question:

  • 26. 

    A network administrator wants to ensure that connections between two servers are split according to usage. Which of the following devices can be used to BEST accomplish this?

    • Content switch

    • Load balancer

    • Proxy server

    • Bandwidth shaper

    Correct Answer
    A. Load balancer
    Explanation
    A load balancer is the best device to accomplish splitting connections between two servers according to usage. Load balancers distribute incoming network traffic across multiple servers, ensuring that each server receives an equal share of the workload. This helps to optimize performance, improve availability, and prevent any single server from becoming overwhelmed with traffic. By evenly distributing the connections, a load balancer can effectively balance the load and ensure efficient utilization of server resources.

    Rate this question:

  • 27. 

    Which of the following network protocols allows for automated alerts and reports on network devices?

    • SMTP

    • SNMP

    • IGMP

    • TLS

    Correct Answer
    A. SNMP
    Explanation
    SNMP (Simple Network Management Protocol) allows for automated alerts and reports on network devices. It is a widely used protocol for network management and monitoring. SNMP enables network administrators to collect information from network devices, such as routers, switches, and servers, and receive automated alerts and reports based on predefined thresholds or events. This allows for proactive monitoring and troubleshooting of network issues, ensuring the smooth operation of the network. SMTP (Simple Mail Transfer Protocol) is used for sending email, IGMP (Internet Group Management Protocol) is used for managing multicast group memberships, and TLS (Transport Layer Security) is a protocol for secure communication over a network.

    Rate this question:

  • 28. 

    Which of the following would a technician need to install to connect a fiber NIC to an Ethernet backbone?

    • Hub

    • Media converter

    • Repeater

    • Bridge

    Correct Answer
    A. Media converter
    Explanation
    A technician would need to install a media converter to connect a fiber NIC to an Ethernet backbone. A media converter is a device that converts the electrical signals used in Ethernet networks to the optical signals used in fiber optic networks. This allows for the seamless integration of fiber optic connections into an existing Ethernet infrastructure.

    Rate this question:

  • 29. 

    Which of the following ipconfig switches will display when the lease was obtained?

    • /displaydns

    • /release

    • /all

    • /renew

    Correct Answer
    A. /all
    Explanation
    The correct answer is "/all" because the "/all" switch in the ipconfig command displays detailed information about all network connections, including the lease information. This includes the date and time when the lease was obtained, allowing the user to see when their network connection was established.

    Rate this question:

  • 30. 

    Which of the following logs would let the network administrator know that there are performance and network issues within the LAN?

    • Application logs

    • Proxy logs

    • Configuration logs

    • System logs

    Correct Answer
    A. System logs
    Explanation
    System logs would provide information about the overall performance and network issues within the LAN. These logs record events and activities related to the operating system, hardware, and network components. By analyzing system logs, the network administrator can identify any errors, warnings, or anomalies that may be affecting the performance of the LAN. This can include issues such as network connectivity problems, resource utilization, or system crashes. Therefore, system logs are a valuable source of information for diagnosing and troubleshooting performance and network issues within the LAN.

    Rate this question:

  • 31. 

    Which of the following is a benefit of using dynamic routing as opposed to static routing?

    • More secure

    • Scales to large networks

    • Improves network speed

    • Less network overhead

    Correct Answer
    A. Scales to large networks
    Explanation
    Dynamic routing is a benefit over static routing because it can scale to large networks. Static routing requires manually configuring each router with the specific routes, which becomes impractical and time-consuming in large networks. Dynamic routing protocols, on the other hand, automatically exchange routing information between routers, allowing them to dynamically update and adapt to changes in the network topology. This scalability enables dynamic routing to efficiently handle large networks without the need for manual configuration updates.

    Rate this question:

  • 32. 

    A network administrator needs to ensure that users are authenticated before they are given access to the network. Which of the following BEST meets these requirements?

    • 802.1s

    • 802.1d

    • 802.1x

    • 802.1w

    Correct Answer
    A. 802.1x
    Explanation
    802.1x is the best option to ensure user authentication before granting network access. This protocol provides port-based network access control, allowing users to authenticate themselves before being allowed onto the network. It supports various authentication methods such as EAP, RADIUS, and LDAP, providing flexibility for different network environments. 802.1s, 802.1d, and 802.1w are not specifically designed for user authentication, making them less suitable for this requirement.

    Rate this question:

  • 33. 

    Which of the following is the maximum cable length in a 1000Base-T network?

    • 1,024 meters (3360 feet)

    • 1000 meters (3280 feet)

    • 128 meters (420 feet)

    • 100 meters (328 feet)

    Correct Answer
    A. 100 meters (328 feet)
    Explanation
    The maximum cable length in a 1000Base-T network is 100 meters (328 feet). This is because 1000Base-T is a type of Ethernet technology that uses twisted pair cables, and the maximum length for these cables is 100 meters. Going beyond this length can result in signal degradation and loss of network performance.

    Rate this question:

  • 34. 

    A network administrator is developing a solution that will allow a new remote site with 400 users access to the Internet using only one public routable IP address. The solution must allow for direct user access to the Internet. Which of the following technologies is the BEST to implement?

    • VPN

    • DHCP

    • PAT

    • DNS

    Correct Answer
    A. PAT
    Explanation
    The best technology to implement in this scenario is Port Address Translation (PAT). PAT allows multiple private IP addresses to be translated to a single public IP address. This means that all 400 users at the remote site can access the Internet using only one public routable IP address. PAT also allows for direct user access to the Internet, making it the most suitable option for this situation.

    Rate this question:

  • 35. 

    Which of the following would a technician find 568B standard?

    • Network baseline

    • Logical network diagram

    • Wiring schematic

    • Local regulation

    Correct Answer
    A. Wiring schematic
    Explanation
    A technician would find the 568B standard in a wiring schematic. The 568B standard is a specification for the wiring of Ethernet networks. It defines the arrangement of the wires within an Ethernet cable, specifically for the purpose of connecting devices using the TIA/EIA-568-B standard. A wiring schematic is a visual representation of the wiring connections and layout, making it the most appropriate option for finding information about the 568B standard.

    Rate this question:

  • 36. 

    Which of the following network devices routes packets over a wireless network?

    • NIC

    • WAP

    • WEP

    • CSU / DSU

    Correct Answer
    A. WAP
    Explanation
    A wireless access point (WAP) is a network device that routes packets over a wireless network. It acts as a central hub for connecting wireless devices to a wired network, allowing them to communicate with each other and access the internet. WAPs are commonly used in homes, offices, and public spaces to provide wireless connectivity and enable mobility.

    Rate this question:

  • 37. 

    A tool that is used to capture usernames and passwords on the network is known as a:

    • Honey pot

    • Firewall

    • Sniffer

    • Proxy server

    Correct Answer
    A. Sniffer
    Explanation
    A sniffer is a tool that is used to capture usernames and passwords on the network. It is designed to intercept and analyze network traffic, allowing it to capture sensitive information such as login credentials. Unlike a firewall or proxy server, which focus on network security and traffic management, a sniffer is specifically designed for capturing and analyzing data packets. A honey pot, on the other hand, is a decoy system used to lure attackers, while a sniffer is used for passive monitoring and capturing of network traffic.

    Rate this question:

  • 38. 

    After installing a new switch and connecting redundant uplinks to other switches, a LAN experiences a broadcast storm causing severe throughput problems. Which of the following is the MOST likely cause of the broadcast storm?

    • VLAN assignments on the new switch conflicted with existing VLAN assignments elsewhere on the network.

    • Spanning-tree protocol was not operational on the LAN.

    • Incorrect trunk encapsulation was applied

    • Port aggregation was incorrectly configured

    Correct Answer
    A. Spanning-tree protocol was not operational on the LAN.
    Explanation
    The most likely cause of the broadcast storm is that the spanning-tree protocol was not operational on the LAN. Spanning-tree protocol is used to prevent loops in a network by blocking redundant paths. Without the spanning-tree protocol, the redundant uplinks created a loop, causing the broadcast storm and severe throughput problems.

    Rate this question:

  • 39. 

    An administrator is going to be performing maintenance on a network router and wants to temporarily reroute traffic through another office. Which of the following would allow the administrator to accomplish this?

    • Configure a static route.

    • Configure EGP

    • Implement NAT on the server

    • Implement steady state convergence

    Correct Answer
    A. Configure a static route.
    Explanation
    A static route allows the administrator to manually configure the path that network traffic should take. By configuring a static route, the administrator can specify that traffic should be rerouted through another office temporarily during maintenance on a network router. This allows for flexibility and control over the network traffic flow without relying on dynamic routing protocols.

    Rate this question:

  • 40. 

    Which of the following is resistant to crosstalk?

    • 100Base-FX

    • 10GBase-CX

    • STP

    • 1000Base-T

    Correct Answer
    A. 100Base-FX
    Explanation
    100Base-FX is resistant to crosstalk because it uses fiber optic cables for data transmission. Fiber optic cables are not susceptible to electromagnetic interference, which helps to prevent crosstalk. In contrast, 10GBase-CX, STP, and 1000Base-T use copper cables, which are more prone to crosstalk.

    Rate this question:

  • 41. 

    Which of the following protocols describes a connectionless state and does not use acknowledgements?

    • POP3

    • UDP

    • NTP

    • TCP

    Correct Answer
    A. UDP
    Explanation
    UDP (User Datagram Protocol) is a connectionless protocol that does not use acknowledgements. Unlike TCP, which is a connection-oriented protocol that guarantees reliable delivery of data, UDP does not establish a connection before sending data and does not require acknowledgements. This makes UDP faster and more efficient for applications that do not require reliable data transmission, such as streaming media or online gaming. However, the lack of acknowledgements means that UDP does not guarantee delivery or order of packets, making it less suitable for applications that require reliable communication.

    Rate this question:

  • 42. 

    Which of the following command line utilities is used to display the IP to Physical address table?

    • Netstat

    • Arp

    • Nbtstat

    • Ping

    Correct Answer
    A. Arp
    Explanation
    The correct answer is arp. The Address Resolution Protocol (ARP) is a command line utility used to display the IP to Physical address table. It is used to map an IP address to a physical (MAC) address on a local network.

    Rate this question:

  • 43. 

    100Base-TF uses which of the following types of cabled medium ?

    • Ethernet implementation overThinNet

    • Ethernet implementation over coaxial

    • Ethernet implementation overThickNet

    • Ethernet implementation over fiber

    Correct Answer
    A. Ethernet implementation over fiber
    Explanation
    100Base-TF uses Ethernet implementation over fiber as its cabled medium. This means that it uses fiber optic cables to transmit data. Fiber optic cables are made of glass or plastic fibers that can transmit data at high speeds over long distances. They are known for their high bandwidth, low latency, and resistance to electromagnetic interference. This makes them suitable for high-performance networking applications.

    Rate this question:

  • 44. 

    Which of the following will have problems functioning if a firewall has been set up to block all UDP traffic?

    • A server database application

    • A VoIP device

    • The Internet

    • A network printer

    Correct Answer
    A. A VoIP device
    Explanation
    A VoIP device relies heavily on UDP (User Datagram Protocol) for transmitting real-time audio and video data. UDP is a connectionless protocol that does not require handshaking or error-checking, making it ideal for time-sensitive applications like VoIP. If a firewall blocks all UDP traffic, the VoIP device will not be able to establish and maintain connections, resulting in problems with its functioning. Therefore, a VoIP device will have problems functioning if a firewall blocks all UDP traffic.

    Rate this question:

  • 45. 

    A user is experiencing slow connections. Which of the following commands would be used to determine the delay time between the hops?

    • Tracert

    • Nbtstat

    • Nslookup

    • Ping

    Correct Answer
    A. Tracert
    Explanation
    Tracert is the correct command to determine the delay time between the hops. Tracert stands for "trace route" and it is used to trace the route that packets take from the source to the destination. It shows the IP addresses of the routers or hops that the packets pass through and also provides information about the time it takes for each hop. By analyzing the delay time between hops, the user can identify any network congestion or latency issues that may be causing the slow connections.

    Rate this question:

  • 46. 

    A client purchases a new wireless printer and wants to be able to bond it to their PDA. Which of the following technologies BEST describes the type of wireless printer that was purchased?

    • Bluetooth

    • WiFi

    • IEEE 1394

    • 802.11a

    Correct Answer
    A. Bluetooth
    Explanation
    The client purchased a wireless printer that can be bonded to their PDA, indicating that they want to connect the printer and the PDA wirelessly. Bluetooth is a technology that allows for wireless communication between devices over short distances, making it the most suitable option for this scenario. WiFi, IEEE 1394 (FireWire), and 802.11a are all wireless technologies, but they are not specifically designed for printer-PDA connectivity like Bluetooth is.

    Rate this question:

  • 47. 

    A technician is setting up a public server for their company. The IP address of the server is 19.19.0.1. Which of the following is the default subnet mask for the server?

    • 255.255.255.255

    • 255.255.0.0

    • 255.255.255.0

    • 255.0.0.0

    Correct Answer
    A. 255.0.0.0
    Explanation
    The default subnet mask for the server is 255.0.0.0. This is because the IP address 19.19.0.1 falls within the range of Class A IP addresses, which have a default subnet mask of 255.0.0.0.

    Rate this question:

  • 48. 

    Which of the following is a client-server based authentication software system which maintains user profiles in a central database?

    • CHAP

    • MS-CHAP

    • RADIUS

    • EAP

    Correct Answer
    A. RADIUS
    Explanation
    RADIUS is a client-server based authentication software system that maintains user profiles in a central database. RADIUS stands for Remote Authentication Dial-In User Service. It is commonly used in network access authentication, where users are required to provide credentials to access a network. RADIUS allows for centralized management of user profiles, making it easier to control access and authentication for multiple users across different network devices.

    Rate this question:

  • 49. 

    On a wireless network, a user is able to connect to local resources, but not to the Internet. Which of the following is the MOST likely cause?

    • The wireless network card is not working.

    • The wireless router does not have DHCP enabled.

    • The wireless network card is out of range

    • The gateway is not configured on the router

    Correct Answer
    A. The gateway is not configured on the router
    Explanation
    If the user is able to connect to local resources but not to the internet, it suggests that the issue is not with the wireless network card or its range. If the wireless router does not have DHCP enabled, it would affect the user's ability to obtain an IP address and connect to the local network, but it would not specifically prevent internet access. The most likely cause is that the gateway is not configured on the router. The gateway is responsible for connecting the local network to the internet, so if it is not configured properly, the user would be able to access local resources but not the internet.

    Rate this question:

Quiz Review Timeline (Updated): Dec 11, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 11, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 26, 2010
    Quiz Created by
    Afiavison
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.