Network + Practice Test 5

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Afiavison
A
Afiavison
Community Contributor
Quizzes Created: 3 | Total Attempts: 2,289
| Attempts: 117 | Questions: 90
Please wait...
Question 1 / 90
0 %
0/100
Score 0/100
1. Which of the following is the MOST secure wireless encryption?

Explanation

WPA2 is the most secure wireless encryption among the options given. WPA2 (Wi-Fi Protected Access 2) is the successor to WPA and provides stronger security measures. It uses the Advanced Encryption Standard (AES) algorithm, which is considered highly secure and difficult to crack. WPA2 also supports stronger authentication methods, such as the use of digital certificates, making it more resistant to unauthorized access and attacks compared to other encryption methods like WEP or WPA.

Submit
Please wait...
About This Quiz
Network + Practice Test 5 - Quiz


Network + Practice Test 5 is a quiz with short questions with multiple-choice answers to choose from. If you think you have what it takes and are well... see moreversed with the networking knowledge, take it up. see less

2. Which of the following would occur at the application layer of the OSI model?

Explanation

FTP (File Transfer Protocol) would occur at the application layer of the OSI model. The application layer is responsible for providing network services to the user and FTP is a protocol that allows for the transfer of files between systems over a network. It provides a way for users to access and manipulate files on a remote computer. Therefore, FTP is the correct answer as it operates at the application layer of the OSI model.

Submit
3. Which of the following network hardware allows the MOST network traffic collisions?

Explanation

A hub allows the most network traffic collisions because it operates in a shared environment, where all devices connected to it share the same bandwidth. When multiple devices try to transmit data at the same time, collisions can occur, resulting in data packet loss and network congestion. Unlike switches or routers, hubs do not have the ability to manage network traffic or create separate collision domains, making them more prone to collisions.

Submit
4. Which of the following is the default port for HTTPS?

Explanation

The default port for HTTPS is 443. HTTPS is the secure version of HTTP, and it uses a different port (443) to ensure encrypted communication between the client and the server. This port is commonly used for secure online transactions, such as online banking or shopping, as it provides a secure connection and protects sensitive information from being intercepted or tampered with.

Submit
5. QoS is used to accomplish which of the following objectives?

Explanation

QoS, or Quality of Service, is used to provide priority of one or more types of traffic over others. It allows network administrators to prioritize certain types of traffic, such as voice or video, over others to ensure that they receive sufficient bandwidth and low latency. This helps to optimize network performance and ensure a consistent user experience for critical applications. Blocking traffic from certain websites or users is not a primary objective of QoS, and the concept of caching traffic to make use of the current bandwidth is not directly related to QoS.

Submit
6. Which of the following network components operates on Layer 2 of the OSI model?

Explanation

A switch operates on Layer 2 of the OSI model. Layer 2 is the Data Link layer, which is responsible for the reliable transfer of data between network devices on the same local area network (LAN). A switch is a networking device that connects multiple devices on a LAN and forwards data packets between them. It uses MAC addresses to determine the destination of each packet and delivers them only to the intended device, enhancing network performance and security. Unlike routers, which operate on Layer 3 (Network layer), switches do not perform routing functions and are limited to the local network.

Submit
7. Which of the following protocols maps an IP address to a MAC address?

Explanation

ARP (Address Resolution Protocol) is the correct answer because it is a protocol used to map an IP address to a MAC address. When a device wants to send data to another device on the same network, it needs to know the MAC address of the destination device. ARP helps in resolving this by sending an ARP request to the network asking for the MAC address associated with a specific IP address. The device with the corresponding IP address responds with its MAC address, allowing the sender to successfully communicate with the destination device.

Submit
8. Which of the following protocols uses port 443?

Explanation

HTTPS (Hypertext Transfer Protocol Secure) is the correct answer because it uses port 443. HTTPS is a secure version of HTTP that encrypts data sent between a web server and a web browser, ensuring that the information remains confidential and secure. Port 443 is the default port for HTTPS communication, allowing secure transmission of data over the internet. SMTP (Simple Mail Transfer Protocol) uses port 25, FTP (File Transfer Protocol) uses port 21, and HTTP (Hypertext Transfer Protocol) uses port 80.

Submit
9. A network technician has discovered that passwords are being sent unencrypted over the network. Which of the following network monitoring utilities was used?

Explanation

A packet sniffer is a network monitoring utility that captures and analyzes network traffic. It allows the network technician to intercept and examine the packets being sent over the network. In this scenario, the technician discovered that passwords were being sent unencrypted, indicating a security vulnerability. By using a packet sniffer, the technician was able to identify this issue and take appropriate measures to secure the network.

Submit
10. A technician is dispatched to a house where the user reports intermittent problems with their wireless network. Which of the following is the MOST likely cause of dropoffs?

Explanation

Cordless phones are the most likely cause of dropoffs in the wireless network. Cordless phones operate on the same frequency range as Wi-Fi networks, which can cause interference and disrupt the wireless signal. This interference can lead to intermittent problems and dropoffs in the network connection.

Submit
11. Which of the following punch down blocks is BEST suited for high-speed data transmission?

Explanation

The 110 block is the best suited for high-speed data transmission. This type of punch down block is specifically designed for use with Category 5 or higher Ethernet cables, which are commonly used for high-speed data transmission. The 110 block provides better performance and reliability compared to other punch down blocks, making it the ideal choice for transmitting data at high speeds.

Submit
12. Which of the following protocols is used to access files on a remote server?

Explanation

FTP stands for File Transfer Protocol and it is used to access files on a remote server. It allows users to upload, download, and manipulate files on a remote server over a network connection. ARP (Address Resolution Protocol) is used to map an IP address to a physical MAC address. SIP (Session Initiation Protocol) is used for initiating, modifying, and terminating multimedia sessions. NTP (Network Time Protocol) is used for synchronizing the time on networked devices.

Submit
13. Which of the following tools would be used to verify the wiring installation for the network?

Explanation

A cable tester is used to verify the wiring installation for a network. It is a tool designed to test the integrity of network cables, ensuring that they are properly connected and functioning correctly. It can detect faults such as open circuits, short circuits, and incorrect wiring configurations. By using a cable tester, network technicians can quickly identify and troubleshoot any issues with the wiring installation, ensuring reliable network connectivity.

Submit
14. Which of the following protocols should be used to securely copy a file? (Select TWO).

Explanation

SFTP (Secure File Transfer Protocol) and SCP (Secure Copy Protocol) should be used to securely copy a file. Both protocols provide secure and encrypted file transfer over a network. SFTP is an extension of the SSH protocol and uses SSH for authentication and encryption. SCP is also based on SSH and allows secure copying of files between hosts on a network. TFTP (Trivial File Transfer Protocol) and FTP (File Transfer Protocol) do not provide encryption and are not secure for file transfers. SNMP (Simple Network Management Protocol) is used for network monitoring and management, not for file transfer.

Submit
15. SMTP resides at which of the following layers of the OSI model?

Explanation

SMTP (Simple Mail Transfer Protocol) is a protocol used for sending email messages over a network. It operates at the application layer of the OSI model. The application layer is responsible for providing network services to the user and enables communication between applications. SMTP is specifically designed for the application layer as it handles the transfer of email messages between mail servers and clients.

Submit
16. Which of the following protocols are used for email traffic? (Select THREE).

Explanation

POP3, IMAP4, and SMTP are all protocols used for email traffic. POP3 (Post Office Protocol version 3) is a protocol used to retrieve emails from a mail server. IMAP4 (Internet Message Access Protocol version 4) is a protocol used to access and manage emails on a mail server. SMTP (Simple Mail Transfer Protocol) is a protocol used to send emails from a client to a mail server for delivery to the recipient's email server. TFTP (Trivial File Transfer Protocol) and SSH (Secure Shell) are not specifically used for email traffic.

Submit
17. A user is having connectivity issues at multiple locations when using the RJ-45 port on the laptop. A technician wants to know if the CAT5e cable is the source of the problem. Which of the following should the technician use to troubleshoot the issue?

Explanation

To troubleshoot the connectivity issues with the RJ-45 port, the technician should use a cable tester. A cable tester is a tool used to check the integrity and functionality of network cables. By connecting the CAT5e cable to the tester, the technician can verify if the cable is the source of the problem. The tester will check for continuity, proper wiring, and potential faults in the cable, helping to identify if the cable is causing the connectivity issues at multiple locations.

Submit
18. Which of the following routing protocols has a limitation of 15 hops?

Explanation

RIP (Routing Information Protocol) has a limitation of 15 hops. This means that RIP can only support a maximum network diameter of 15 hops, beyond which it will not be able to effectively route packets. RIP uses hop count as the metric to determine the best path for routing, and a hop count of 16 or higher is considered unreachable. Therefore, RIP is not suitable for large networks with a diameter greater than 15 hops.

Submit
19. Which of the following utilities shows the relationship between a MAC address and the corresponding IP address?

Explanation

The correct answer is "arp." ARP (Address Resolution Protocol) is a utility that is used to map an IP address to a corresponding MAC address in a local network. It helps in identifying the MAC address of a device based on its IP address, allowing for communication between devices at the data link layer.

Submit
20. Which of the following advanced features prevents switching loops by using a preferred path?

Explanation

Spanning tree is the correct answer because it is an advanced feature that prevents switching loops by using a preferred path. Switching loops can occur when there are multiple paths between switches, causing packets to be endlessly forwarded in a loop. Spanning tree protocol (STP) identifies the best path and blocks redundant paths, ensuring a loop-free network. By doing so, it enhances network reliability and prevents broadcast storms that can result from switching loops.

Submit
21. The optimal transmission speed for a CAT5 network cable in a main distribution frame (MDF) is:

Explanation

The optimal transmission speed for a CAT5 network cable in a main distribution frame (MDF) is 100Mbps. This is because CAT5 cables are designed to support speeds up to 100Mbps. The "Mbps" stands for megabits per second, which is a unit of data transfer speed. Therefore, the correct answer is 100Mbps.

Submit
22. Which of the following defines the main purpose of dynamic routing?

Explanation

Dynamic routing is a routing method that automatically adjusts and adapts to network changes without the need for manual entries. This means that the main purpose of dynamic routing is to enable routers to automatically update and optimize their routing tables based on changes in the network topology. By doing so, dynamic routing ensures efficient and reliable communication by dynamically selecting the best paths for data transmission.

Submit
23. A technician pings 127.0.0.1 and gets the following result: Unable to contact IP driver, error code 2.Which of the following would resolve this?

Explanation

Installing the TCP/IP protocol would resolve the issue because the error message suggests that the IP driver is not functioning properly. The TCP/IP protocol is responsible for communication over the internet and is essential for the IP driver to work correctly. By installing the TCP/IP protocol, the technician can ensure that the necessary components for IP communication are in place, resolving the error code 2.

Submit
24. A technician is troubleshooting a network data transmission issue. Which of the following commands would the technician be able to use to identify the location of the packet loss?

Explanation

The technician would be able to use the "traceroute" command to identify the location of the packet loss. Traceroute is a network diagnostic tool that shows the path taken by packets from the source to the destination. It displays the IP addresses of the routers along the path and the round-trip time for each hop. By analyzing the traceroute results, the technician can determine where the packet loss is occurring and troubleshoot the network issue accordingly.

Submit
25. Which of the following will prevent unauthorized access to the server room?

Explanation

A biometric lock is a security measure that uses unique physical characteristics, such as fingerprints or iris scans, to grant access to a server room. This prevents unauthorized individuals from gaining entry, as the lock can only be opened by those with registered biometric data. Unlike PKI cards, cable locks, or RSA tokens, which can be lost, stolen, or replicated, a biometric lock provides a higher level of security as it relies on an individual's unique biological traits.

Submit
26. A network administrator wants to ensure that connections between two servers are split according to usage. Which of the following devices can be used to BEST accomplish this?

Explanation

A load balancer is the best device to accomplish splitting connections between two servers according to usage. Load balancers distribute incoming network traffic across multiple servers, ensuring that each server receives an equal share of the workload. This helps to optimize performance, improve availability, and prevent any single server from becoming overwhelmed with traffic. By evenly distributing the connections, a load balancer can effectively balance the load and ensure efficient utilization of server resources.

Submit
27. Which of the following network protocols allows for automated alerts and reports on network devices?

Explanation

SNMP (Simple Network Management Protocol) allows for automated alerts and reports on network devices. It is a widely used protocol for network management and monitoring. SNMP enables network administrators to collect information from network devices, such as routers, switches, and servers, and receive automated alerts and reports based on predefined thresholds or events. This allows for proactive monitoring and troubleshooting of network issues, ensuring the smooth operation of the network. SMTP (Simple Mail Transfer Protocol) is used for sending email, IGMP (Internet Group Management Protocol) is used for managing multicast group memberships, and TLS (Transport Layer Security) is a protocol for secure communication over a network.

Submit
28. Which of the following would a technician need to install to connect a fiber NIC to an Ethernet backbone?

Explanation

A technician would need to install a media converter to connect a fiber NIC to an Ethernet backbone. A media converter is a device that converts the electrical signals used in Ethernet networks to the optical signals used in fiber optic networks. This allows for the seamless integration of fiber optic connections into an existing Ethernet infrastructure.

Submit
29. A tool that is used to capture usernames and passwords on the network is known as a:

Explanation

A sniffer is a tool that is used to capture usernames and passwords on the network. It is designed to intercept and analyze network traffic, allowing it to capture sensitive information such as login credentials. Unlike a firewall or proxy server, which focus on network security and traffic management, a sniffer is specifically designed for capturing and analyzing data packets. A honey pot, on the other hand, is a decoy system used to lure attackers, while a sniffer is used for passive monitoring and capturing of network traffic.

Submit
30. Which of the following ipconfig switches will display when the lease was obtained?

Explanation

The correct answer is "/all" because the "/all" switch in the ipconfig command displays detailed information about all network connections, including the lease information. This includes the date and time when the lease was obtained, allowing the user to see when their network connection was established.

Submit
31. Which of the following logs would let the network administrator know that there are performance and network issues within the LAN?

Explanation

System logs would provide information about the overall performance and network issues within the LAN. These logs record events and activities related to the operating system, hardware, and network components. By analyzing system logs, the network administrator can identify any errors, warnings, or anomalies that may be affecting the performance of the LAN. This can include issues such as network connectivity problems, resource utilization, or system crashes. Therefore, system logs are a valuable source of information for diagnosing and troubleshooting performance and network issues within the LAN.

Submit
32. Which of the following is a benefit of using dynamic routing as opposed to static routing?

Explanation

Dynamic routing is a benefit over static routing because it can scale to large networks. Static routing requires manually configuring each router with the specific routes, which becomes impractical and time-consuming in large networks. Dynamic routing protocols, on the other hand, automatically exchange routing information between routers, allowing them to dynamically update and adapt to changes in the network topology. This scalability enables dynamic routing to efficiently handle large networks without the need for manual configuration updates.

Submit
33. A network administrator needs to ensure that users are authenticated before they are given access to the network. Which of the following BEST meets these requirements?

Explanation

802.1x is the best option to ensure user authentication before granting network access. This protocol provides port-based network access control, allowing users to authenticate themselves before being allowed onto the network. It supports various authentication methods such as EAP, RADIUS, and LDAP, providing flexibility for different network environments. 802.1s, 802.1d, and 802.1w are not specifically designed for user authentication, making them less suitable for this requirement.

Submit
34. Which of the following is the maximum cable length in a 1000Base-T network?

Explanation

The maximum cable length in a 1000Base-T network is 100 meters (328 feet). This is because 1000Base-T is a type of Ethernet technology that uses twisted pair cables, and the maximum length for these cables is 100 meters. Going beyond this length can result in signal degradation and loss of network performance.

Submit
35. A network administrator is developing a solution that will allow a new remote site with 400 users access to the Internet using only one public routable IP address. The solution must allow for direct user access to the Internet. Which of the following technologies is the BEST to implement?

Explanation

The best technology to implement in this scenario is Port Address Translation (PAT). PAT allows multiple private IP addresses to be translated to a single public IP address. This means that all 400 users at the remote site can access the Internet using only one public routable IP address. PAT also allows for direct user access to the Internet, making it the most suitable option for this situation.

Submit
36. Which of the following would a technician find 568B standard?

Explanation

A technician would find the 568B standard in a wiring schematic. The 568B standard is a specification for the wiring of Ethernet networks. It defines the arrangement of the wires within an Ethernet cable, specifically for the purpose of connecting devices using the TIA/EIA-568-B standard. A wiring schematic is a visual representation of the wiring connections and layout, making it the most appropriate option for finding information about the 568B standard.

Submit
37. Which of the following network devices routes packets over a wireless network?

Explanation

A wireless access point (WAP) is a network device that routes packets over a wireless network. It acts as a central hub for connecting wireless devices to a wired network, allowing them to communicate with each other and access the internet. WAPs are commonly used in homes, offices, and public spaces to provide wireless connectivity and enable mobility.

Submit
38. After installing a new switch and connecting redundant uplinks to other switches, a LAN experiences a broadcast storm causing severe throughput problems. Which of the following is the MOST likely cause of the broadcast storm?

Explanation

The most likely cause of the broadcast storm is that the spanning-tree protocol was not operational on the LAN. Spanning-tree protocol is used to prevent loops in a network by blocking redundant paths. Without the spanning-tree protocol, the redundant uplinks created a loop, causing the broadcast storm and severe throughput problems.

Submit
39. An administrator is going to be performing maintenance on a network router and wants to temporarily reroute traffic through another office. Which of the following would allow the administrator to accomplish this?

Explanation

A static route allows the administrator to manually configure the path that network traffic should take. By configuring a static route, the administrator can specify that traffic should be rerouted through another office temporarily during maintenance on a network router. This allows for flexibility and control over the network traffic flow without relying on dynamic routing protocols.

Submit
40. Which of the following is resistant to crosstalk?

Explanation

100Base-FX is resistant to crosstalk because it uses fiber optic cables for data transmission. Fiber optic cables are not susceptible to electromagnetic interference, which helps to prevent crosstalk. In contrast, 10GBase-CX, STP, and 1000Base-T use copper cables, which are more prone to crosstalk.

Submit
41. Which of the following protocols describes a connectionless state and does not use acknowledgements?

Explanation

UDP (User Datagram Protocol) is a connectionless protocol that does not use acknowledgements. Unlike TCP, which is a connection-oriented protocol that guarantees reliable delivery of data, UDP does not establish a connection before sending data and does not require acknowledgements. This makes UDP faster and more efficient for applications that do not require reliable data transmission, such as streaming media or online gaming. However, the lack of acknowledgements means that UDP does not guarantee delivery or order of packets, making it less suitable for applications that require reliable communication.

Submit
42. Which of the following command line utilities is used to display the IP to Physical address table?

Explanation

The correct answer is arp. The Address Resolution Protocol (ARP) is a command line utility used to display the IP to Physical address table. It is used to map an IP address to a physical (MAC) address on a local network.

Submit
43. 100Base-TF uses which of the following types of cabled medium ?

Explanation

100Base-TF uses Ethernet implementation over fiber as its cabled medium. This means that it uses fiber optic cables to transmit data. Fiber optic cables are made of glass or plastic fibers that can transmit data at high speeds over long distances. They are known for their high bandwidth, low latency, and resistance to electromagnetic interference. This makes them suitable for high-performance networking applications.

Submit
44. An administrator needs to find out a specific NICs MAC address, the IP address of the NIC is known. Which of the following network utilities would enable the administrator to discover the MAC address without physically going to the computer?

Explanation

The "arp" command is a network utility that enables the administrator to discover the MAC address of a specific NIC without physically going to the computer. ARP (Address Resolution Protocol) is used to map an IP address to a MAC address on a local network. By using the "arp" command, the administrator can query the ARP cache of a device to find the MAC address associated with a known IP address. This allows for remote identification of the MAC address without the need for physical access to the computer.

Submit
45. Which of the following will have problems functioning if a firewall has been set up to block all UDP traffic?

Explanation

A VoIP device relies heavily on UDP (User Datagram Protocol) for transmitting real-time audio and video data. UDP is a connectionless protocol that does not require handshaking or error-checking, making it ideal for time-sensitive applications like VoIP. If a firewall blocks all UDP traffic, the VoIP device will not be able to establish and maintain connections, resulting in problems with its functioning. Therefore, a VoIP device will have problems functioning if a firewall blocks all UDP traffic.

Submit
46. A user is experiencing slow connections. Which of the following commands would be used to determine the delay time between the hops?

Explanation

Tracert is the correct command to determine the delay time between the hops. Tracert stands for "trace route" and it is used to trace the route that packets take from the source to the destination. It shows the IP addresses of the routers or hops that the packets pass through and also provides information about the time it takes for each hop. By analyzing the delay time between hops, the user can identify any network congestion or latency issues that may be causing the slow connections.

Submit
47. A client purchases a new wireless printer and wants to be able to bond it to their PDA. Which of the following technologies BEST describes the type of wireless printer that was purchased?

Explanation

The client purchased a wireless printer that can be bonded to their PDA, indicating that they want to connect the printer and the PDA wirelessly. Bluetooth is a technology that allows for wireless communication between devices over short distances, making it the most suitable option for this scenario. WiFi, IEEE 1394 (FireWire), and 802.11a are all wireless technologies, but they are not specifically designed for printer-PDA connectivity like Bluetooth is.

Submit
48. A technician is setting up a public server for their company. The IP address of the server is 19.19.0.1. Which of the following is the default subnet mask for the server?

Explanation

The default subnet mask for the server is 255.0.0.0. This is because the IP address 19.19.0.1 falls within the range of Class A IP addresses, which have a default subnet mask of 255.0.0.0.

Submit
49. Which of the following is a client-server based authentication software system which maintains user profiles in a central database?

Explanation

RADIUS is a client-server based authentication software system that maintains user profiles in a central database. RADIUS stands for Remote Authentication Dial-In User Service. It is commonly used in network access authentication, where users are required to provide credentials to access a network. RADIUS allows for centralized management of user profiles, making it easier to control access and authentication for multiple users across different network devices.

Submit
50. On a wireless network, a user is able to connect to local resources, but not to the Internet. Which of the following is the MOST likely cause?

Explanation

If the user is able to connect to local resources but not to the internet, it suggests that the issue is not with the wireless network card or its range. If the wireless router does not have DHCP enabled, it would affect the user's ability to obtain an IP address and connect to the local network, but it would not specifically prevent internet access. The most likely cause is that the gateway is not configured on the router. The gateway is responsible for connecting the local network to the internet, so if it is not configured properly, the user would be able to access local resources but not the internet.

Submit
51. Which of the following devices is used for connecting multiple network hosts where the physical signal is always repeated to all ports?

Explanation

A hub is a networking device that is used to connect multiple network hosts together. It operates at the physical layer of the OSI model and is responsible for repeating the incoming signal to all ports. This means that any data received on one port of the hub will be transmitted to all other ports, allowing all connected devices to receive the data. Unlike switches or routers, hubs do not have the ability to selectively send data to specific devices based on their MAC addresses or IP addresses.

Submit
52. A technician is troubleshooting connectivity issues on a clients machine. The technician needs to see the current NetBIOS configuration and open connections, which of the following commands would allow this information to be displayed?

Explanation

The correct answer is nbtstat. Nbtstat is a command-line utility that displays NetBIOS over TCP/IP (NetBT) protocol statistics, NetBIOS name tables for both local and remote computers, and the NetBIOS name cache. It can also display the current NetBIOS connections and the NetBIOS name resolution information. This command is useful for troubleshooting connectivity issues related to NetBIOS.

Submit
53. After adding a new cable segment to the network, the technician should:

Explanation

After adding a new cable segment to the network, it is important for the technician to update the wiring schematics. This is necessary because the wiring schematics provide a detailed representation of the network's physical layout, including the connections and configurations of cables. By updating the wiring schematics, the technician ensures that the documentation accurately reflects the current state of the network, which can be helpful for troubleshooting, maintenance, and future expansion. The other options, such as documenting the changes in the business continuity plan, creating a new baseline document, or updating the disaster recovery plan, may also be important tasks, but they are not directly related to the addition of a new cable segment.

Submit
54. Ensuring that data is transmitted securely over an IP network is the main purpose of:

Explanation

TLS (Transport Layer Security) is a cryptographic protocol that ensures secure communication over a network. It provides encryption and authentication mechanisms to protect data transmitted between devices. By using TLS, data can be encrypted, preventing unauthorized access and ensuring that it remains confidential during transmission. This protocol is commonly used in applications such as web browsing, email, and messaging services to establish a secure connection between the client and the server.

Submit
55. A 66 block is typically connected to the telecommunication company through which of the following types of cable?

Explanation

A 66 block is typically connected to the telecommunication company through a 25 pair cable. This type of cable is commonly used for telephone systems and consists of 25 pairs of wires, allowing for multiple phone lines to be connected.

Submit
56. A power outage occurred over the weekend and on Monday morning the helpdesk was receiving calls about network issues from only one section of the LAN. A network administrator has implemented the solution and identified all the results. After all the network issues were resolved, what would be the NEXT step for that network administrator?

Explanation

The next step for the network administrator would be to document the entire process. This is important for future reference and troubleshooting purposes. By documenting the steps taken to resolve the network issues, the administrator can create a record of the solution implemented and the results achieved. This documentation can be helpful in case similar issues arise in the future or if other network administrators need to understand the process followed. It also serves as a reference for the administrator to review and ensure that all necessary steps were taken and no important details were missed.

Submit
57. Which of the following network devices is required to translate a synchronous serial connection to time division multiplexed connection?

Explanation

A CSU/DSU (Channel Service Unit/Data Service Unit) is a network device that is required to translate a synchronous serial connection to a time division multiplexed connection. A CSU/DSU is responsible for converting the data from the synchronous serial format to the TDM format, allowing for the transmission of multiple signals over a single channel. This device is commonly used in telecommunications and networking to connect devices using different protocols or transmission methods.

Submit
58. Which of the following is the MOST secure access method?

Explanation

SFTP is the most secure access method among the given options. SFTP (Secure File Transfer Protocol) is a secure version of FTP that uses encryption to protect data during transmission. It provides a secure and reliable way to transfer files over a network, ensuring the confidentiality and integrity of the data being transferred. RSH, RCP, and SNMPv1, on the other hand, are older and less secure protocols that do not provide the same level of encryption and security as SFTP.

Submit
59. A company has one headquarters location and ten remote sites. The remote sites do not need to communicate with each other, just with headquarters. Which of the following is the BEST topology to use?

Explanation

The best topology to use in this scenario is a star topology. In a star topology, all remote sites are connected to the headquarters location, forming a central hub. This allows for efficient communication between the remote sites and the headquarters, as all communication is directed through the central hub. Additionally, the star topology provides a high level of reliability, as any issues or failures at one remote site will not affect the communication between other sites and the headquarters.

Submit
60. Which of the following is a topology used in networks for its scalability?

Explanation

The star topology is used in networks for its scalability because it allows for easy addition or removal of devices without affecting the rest of the network. In a star topology, all devices are connected to a central hub or switch, which acts as a central point of control. This makes it easier to expand the network by simply adding more devices to the hub. Additionally, if one device fails, it does not affect the rest of the network, as each device has its own dedicated connection to the central hub.

Submit
61. A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?

Explanation

WPA PEAP would support users authenticating with encrypted usernames and passwords. PEAP (Protected Extensible Authentication Protocol) is an authentication protocol that provides secure authentication for wireless networks. It encrypts the usernames and passwords during the authentication process, ensuring that they are protected from unauthorized access. This makes it a suitable choice for the network technician to meet the requirement of secure authentication for individual users.

Submit
62. When creating a fault tolerant switched network, which of the following will allow for loops in the switched topology while preventing a broadcast storm?

Explanation

The Spanning Tree Protocol (STP) is used to prevent loops in a switched network while allowing for fault tolerance. It achieves this by creating a loop-free logical topology by selectively blocking redundant links. This prevents broadcast storms, where broadcast packets endlessly circulate in a loop, overwhelming the network. STP selects a root bridge and calculates the shortest path to each switch, blocking redundant links to avoid loops. By doing so, it ensures network stability and prevents congestion caused by broadcast storms.

Submit
63. Which of the following wiring standards is depicted below? Pin 1 WhiteOrange Pin 2 Orange Pin 3 White Green Pin 4 Blue Pin 5 White Blue Pin 6 Green Pin 7 White Brown Pin 8 Brown

Explanation

The given wiring standard is 568B. This can be determined by comparing the given pin configuration with the pin configuration of the 568B standard. In the 568B standard, the pin configuration is as follows: Pin 1 WhiteOrange, Pin 2 Orange, Pin 3 White Green, Pin 4 Blue, Pin 5 White Blue, Pin 6 Green, Pin 7 White Brown, Pin 8 Brown. Therefore, the correct answer is 568B.

Submit
64. A recently installed wireless router needs to be configured to have the highest level of security. Which of the following would MOST likely be used?

Explanation

WPA (Wi-Fi Protected Access) would most likely be used to configure the wireless router with the highest level of security. WPA is a security protocol that provides strong encryption and authentication for wireless networks. It is an improvement over WEP (Wired Equivalent Privacy), which is known to have security vulnerabilities. SSL (Secure Sockets Layer) and IPSec (Internet Protocol Security) are encryption protocols used for securing data transmission over the internet, but they are not specifically designed for wireless network security.

Submit
65. Which of the following protocols is used by several different operating systems to authenticate resources such as computers, users and printers?

Explanation

LDAP (Lightweight Directory Access Protocol) is the correct answer. It is a protocol used by various operating systems to authenticate and access directory services, such as user accounts, computers, printers, and other resources. LDAP provides a standardized way to communicate with directory servers, allowing users to authenticate and access resources across different platforms and systems. SMTP (Simple Mail Transfer Protocol) is used for sending email, TCP (Transmission Control Protocol) is responsible for establishing a reliable connection between devices, and UDP (User Datagram Protocol) is a connectionless protocol used for faster transmission of data.

Submit
66. In a Class A subnet, a Host ID may occupy a maximum of:

Explanation

In a Class A subnet, the network ID is represented by the first 8 bits, leaving 24 bits for the host ID. This means that a maximum of 24 bits can be used to identify individual hosts within the network.

Submit
67. Which of the following authentication methods uses public and private keys to secure communication and ensure the senders identity?

Explanation

PKI (Public Key Infrastructure) is an authentication method that uses public and private keys to secure communication and ensure the sender's identity. In PKI, a user is assigned a unique pair of keys - a public key and a private key. The public key is shared with others, while the private key is kept secret. When a user wants to authenticate themselves, they use their private key to encrypt a message, and the recipient uses the corresponding public key to decrypt it. This process verifies the sender's identity and ensures the confidentiality and integrity of the communication.

Submit
68. Which of the following authentication protocols uses plain text to transmit passwords over the internet?

Explanation

PAP (Password Authentication Protocol) is the authentication protocol that uses plain text to transmit passwords over the internet. This means that the passwords are not encrypted or protected in any way, making it less secure compared to other protocols.

Submit
69. The below output is from which of the following utilities? Interface: 172.30.0.104 0x2 Internet Address Physical AddressType 172.30.0.500304882728c dynamic 172.30.0.25400304882650e dynamic

Explanation

The given output is from the "arp" utility. The output displays the IP address and physical address (MAC address) of the devices in the network. In this case, it shows two dynamic entries with their corresponding IP and MAC addresses.

Submit
70. Which of the following port numbers does SSH use?

Explanation

SSH (Secure Shell) is a network protocol that provides a secure way to access and manage remote devices. It uses port number 22 as the default port for communication. This port is specifically designated for SSH traffic, allowing secure remote login, file transfer, and other network services. Port numbers 21, 23, and 20 are used for FTP (File Transfer Protocol), Telnet, and FTP data transfer respectively, and are not associated with SSH.

Submit
71. How many DS0s are used in a T1?

Explanation

A T1 line consists of 24 individual channels, each called a DS0. Each DS0 can carry a voice call or data transmission. Therefore, the correct answer is 24, as there are 24 DS0s used in a T1 line.

Submit
72. Which of the following can an application layer firewall filter that a network layer firewall cannot?

Explanation

An application layer firewall can filter HTTP URLs, which means it can examine the specific URLs being accessed within the HTTP traffic. A network layer firewall, on the other hand, operates at a lower level and cannot inspect the contents of the traffic at the application layer. Therefore, it cannot filter HTTP URLs specifically.

Submit
73. Which of the following protocols will help reduce multicast flooding on a layer 2 switch?

Explanation

IGMP (Internet Group Management Protocol) is the correct answer because it is specifically designed to manage and control multicast group memberships on a network. By using IGMP, layer 2 switches can efficiently forward multicast traffic only to the ports that have joined the multicast group, rather than flooding it to all ports. ARP (Address Resolution Protocol) is used for mapping IP addresses to MAC addresses, SNMP (Simple Network Management Protocol) is used for network management and monitoring, and ICMP (Internet Control Message Protocol) is used for error reporting and diagnostics. None of these protocols directly address multicast flooding on a layer 2 switch.

Submit
74. Which of the following BEST explains the purpose of a DMZ?

Explanation

A DMZ (Demilitarized Zone) is a network segment that is isolated from the internal private network and is designed to allow public traffic. It acts as a buffer zone between the public internet and the private network, providing an additional layer of security. By placing servers or services that need to be accessible to the public in the DMZ, it helps protect the internal network from potential threats and attacks. This setup ensures that any malicious activity originating from the public network is contained within the DMZ and does not have direct access to the private network.

Submit
75. After a power outage several switches lose their current configurations, but the core router is still working properly. The switches affected are not able to connect to the network. After further investigation the network administrator is able to identify the affected areas, establish the cause, and escalated the problem. Which of the following would be the NEXT step that the network administrator should do?

Explanation

After identifying the affected areas and establishing the cause of the problem, the network administrator should create an action plan and solution. This step is crucial in order to address the issue systematically and effectively. It allows the administrator to outline the necessary steps to resolve the problem and ensure that all necessary resources and actions are coordinated. Meeting with the emergency response team and implementing a solution immediately may be premature without first creating a comprehensive plan. Copying the core router's configuration to the affected switches may not address the root cause of the problem.

Submit
76. Which of the following address ranges should a network administrator deny in the ACL to prevent multicast packets from crossing the WAN interface?

Explanation

The address range 224.0.0.0 to 239.255.255.255 is reserved for multicast addresses. Multicast packets are used to send data to multiple hosts simultaneously, and they are typically used within a local network. In order to prevent multicast packets from crossing the WAN interface, the network administrator should deny this address range in the ACL.

Submit
77. Which of the following tools could an administrator use to determine if a machine was using the correct DNS server? (Select TWO).

Explanation

An administrator can use the ipconfig tool on Windows or the ifconfig tool on Linux to determine if a machine is using the correct DNS server. These tools display the network configuration information, including the DNS server IP addresses that the machine is currently using. By comparing the displayed DNS server IP addresses with the expected or correct DNS server IP addresses, the administrator can verify if the machine is using the correct DNS server.

Submit
78. An administrator is implementing a new wireless network. Which of the following is the highest level of wireless encryption that the administrator can run?

Explanation

WPA2 AES is the highest level of wireless encryption that the administrator can run. AES (Advanced Encryption Standard) is a symmetric encryption algorithm that provides strong security for wireless networks. It is considered more secure than WEP (Wired Equivalent Privacy) and WPA2 TKIP (Temporal Key Integrity Protocol), which are older and less secure encryption methods. TTL (Time to Live) is not a wireless encryption method, but rather a network protocol field used in IP packets.

Submit
79. A technician is troubleshooting the phone service at a site. The technician tests one of the connections on the 66 block and no dial tone is present. Which of the following would be the BEST tool to test the connection at the demarcation point?

Explanation

A butt set is the best tool to test the connection at the demarcation point because it allows the technician to directly connect to the phone line and listen for a dial tone. It can also be used to test for other issues such as noise or cross-talk on the line. A cable tester is used to check the integrity of network cables, not phone lines. A multimeter can measure voltage, resistance, and continuity, but it may not provide the necessary functionality to test a phone line. A toner probe is used to trace and identify cables, but it does not directly test for dial tone.

Submit
80. Which of the following is required to pass traffic from one VLAN to another?

Explanation

A layer three switch is required to pass traffic from one VLAN to another because it operates at the network layer and can route traffic between different networks or VLANs. A layer two switch operates at the data link layer and can only switch traffic within the same VLAN. A server with NICs on both VLANs can also pass traffic between VLANs, but it is not the most efficient solution. A layer one switch operates at the physical layer and does not have the capability to route or switch traffic between VLANs.

Submit
81. Which of the following command line tools would BEST be used to verify DNS functionality?

Explanation

The command line tool "dig" would be the best choice to verify DNS functionality. "dig" stands for "domain information groper" and is used to query DNS servers for information about domain names. It allows users to perform DNS lookups, retrieve DNS records, and troubleshoot DNS issues. By using "dig", one can verify if DNS resolution is working correctly and obtain information about DNS records such as IP addresses associated with domain names.

Submit
82. Given the following routing table entries, which of the following will the next-hop address be for a packet destined for the address 192.168.1.203?
Network Address Subnet Mask Next Hop Address

0.0.0.0 0.0.0.0 77.0.5.5 192.168.0.0 255.255.0.0 66.40.90.121 192.168.1.0 255.255.255.0 72.40.91.1 192.168.1.0 255.255.255.127 40.40.0.254

Explanation

The next-hop address for a packet destined for the address 192.168.1.203 will be 72.40.91.1. This is because the routing table entry with the subnet mask 255.255.255.0 matches the destination address 192.168.1.203, and the corresponding next-hop address for this entry is 72.40.91.1.

Submit
83. A network technician has addressed an issue where many workstations have lost network connectivity, but is not able to establish the most probable cause. Which of the following steps should be taken next to resolve this issue?

Explanation

To resolve the issue of lost network connectivity on multiple workstations, the network technician should escalate the problem to a senior network associate. This is because the technician has already addressed the issue but is unable to determine the most probable cause. By involving a senior network associate, who has more experience and expertise, they can provide further assistance in troubleshooting and resolving the problem.

Submit
84. The difference between 10Base-T and 100Base-T is:

Explanation

The correct answer is "shorter timing between Ethernet frames". This means that in 100Base-T, the time interval between the transmission of Ethernet frames is shorter compared to 10Base-T. This allows for faster data transfer and improves the overall performance of the network.

Submit
85. The below output is from which of the following utilities?
Active Connections Proto Local Address Foreign Address State TCP COMPUTER1:1085 172.30.0.5:3389 ESTABLISHED TCP COMPUTER1:1089172.30.0.5:microsoftdsTIME_ WAIT

Explanation

The given output is from the netstat utility. Netstat is a command-line tool that displays active network connections, routing tables, and various network statistics. In the output, it shows the active TCP connection between the local address "COMPUTER1" on port 1085 and the foreign address "172.30.0.5" on port 3389. The state of the connection is "ESTABLISHED". The second line shows another TCP connection in the TIME_WAIT state. Netstat is commonly used to troubleshoot network connectivity issues and monitor network activity.

Submit
86. A corporate office network has 40 computers all in the same private IP subnet. The corporate office has purchased an Internet connection from their local ISP. They were assigned one static public IP address, and all 40 computers will require access to the Internet. How can this be accomplished?

Explanation

PAT (Port Address Translation) is a method of translating private IP addresses to a single public IP address. It allows multiple devices on a private network to share a single public IP address, enabling them to access the Internet. In this scenario, since the corporate office has only one static public IP address, PAT would be the appropriate solution to provide Internet access to all 40 computers on the network.

Submit
87. A host is unable to communicate across a network. From the information below, which of the following is the cause of the issue?

Host Name . . . . .. . . . . . . : Test20
Primary Dns Suffix . . . . . .. : abc.com Node Type . . . . .. . . . . . . : Unknown IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : abc.com Ethernet adapter Local Area Connection: Connectionspecific DNS Suffix . : Description . . . . .. . . . . . : Broadcom NetXtreme Gigabit Ethernet Physical Address. . . . . . . . . : 00000015A1D0 Dhcp Enabled. . . . . . . . . . . : No IP Address. . . . . . . . . . . .: 10.0.37.144 Subnet Mask . . .. . . . . . . . : 255.255.254.0 Default Gateway . . .. . . . . . : 10.0.38.1 DNS Servers . . . . . . . . . .. : 10.0.36.5

Explanation

The given information shows that the host has an IP address of 10.0.37.144 and a subnet mask of 255.255.254.0. The default gateway is listed as 10.0.38.1. Since the subnet mask and IP address are correct, the issue is most likely with the gateway IP. The gateway IP should be on the same network as the host's IP address, but in this case, it is on a different network. This means that the host cannot communicate with devices outside of its network, causing the issue.

Submit
88. Which of the following security mitigation techniques is the MOST effective against zero-day attacks?

Explanation

User awareness training is the most effective security mitigation technique against zero-day attacks because it focuses on educating and training users about potential security risks and how to identify and respond to them. By increasing user awareness and knowledge about common attack techniques, social engineering tactics, and safe computing practices, organizations can significantly reduce the likelihood of falling victim to zero-day attacks. This approach empowers users to be proactive in identifying and reporting suspicious activities, thereby strengthening the overall security posture of the organization.

Submit
89. Which of the following is the maximum range of 10GBase-SR ?

Explanation

The correct answer is 990 feet (302 meters). This is the maximum range for 10GBase-SR, which is a type of Ethernet networking technology that uses multimode fiber optic cables. It is designed for short-range connections and can transmit data up to a maximum distance of 990 feet or 302 meters.

Submit
90. A VoIP telephone with a built-in hub is plugged into a single network using both the hub port and the telephone port. The network begins to experience severe lag due to a significant increase in traffic. Which of the following features would help to prevent this from occurring in the future?

Explanation

Spanning tree is a feature that helps prevent network loops by creating a logical tree-like structure in a network. In this scenario, if there is a significant increase in traffic, the spanning tree feature can prevent network congestion and lag by blocking redundant paths and selecting the most efficient path for data transmission. By preventing network loops and optimizing the network's topology, spanning tree ensures that the network operates smoothly and efficiently, reducing the chances of severe lag in the future.

Submit
View My Results

Quiz Review Timeline (Updated): Dec 11, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 11, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 26, 2010
    Quiz Created by
    Afiavison
Cancel
  • All
    All (90)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following is the MOST secure wireless encryption?
Which of the following would occur at the application layer of the OSI...
Which of the following network hardware allows the MOST network...
Which of the following is the default port for HTTPS?
QoS is used to accomplish which of the following objectives?
Which of the following network components operates on Layer 2 of the...
Which of the following protocols maps an IP address to a MAC address?
Which of the following protocols uses port 443?
A network technician has discovered that passwords are being sent...
A technician is dispatched to a house where the user reports...
Which of the following punch down blocks is BEST suited for high-speed...
Which of the following protocols is used to access files on a remote...
Which of the following tools would be used to verify the wiring...
Which of the following protocols should be used to securely copy a...
SMTP resides at which of the following layers of the OSI model?
Which of the following protocols are used for email traffic? (Select...
A user is having connectivity issues at multiple locations when using...
Which of the following routing protocols has a limitation of 15 hops?
Which of the following utilities shows the relationship between a MAC...
Which of the following advanced features prevents switching loops by...
The optimal transmission speed for a CAT5 network cable in a main...
Which of the following defines the main purpose of dynamic routing?
A technician pings 127.0.0.1 and gets the following result: Unable to...
A technician is troubleshooting a network data transmission issue....
Which of the following will prevent unauthorized access to the server...
A network administrator wants to ensure that connections between two...
Which of the following network protocols allows for automated alerts...
Which of the following would a technician need to install to connect a...
A tool that is used to capture usernames and passwords on the network...
Which of the following ipconfig switches will display when the lease...
Which of the following logs would let the network administrator know...
Which of the following is a benefit of using dynamic routing as...
A network administrator needs to ensure that users are authenticated...
Which of the following is the maximum cable length in a 1000Base-T...
A network administrator is developing a solution that will allow a new...
Which of the following would a technician find 568B standard?
Which of the following network devices routes packets over a wireless...
After installing a new switch and connecting redundant uplinks to...
An administrator is going to be performing maintenance on a network...
Which of the following is resistant to crosstalk?
Which of the following protocols describes a connectionless state and...
Which of the following command line utilities is used to display the...
100Base-TF uses which of the following types of cabled medium ?
An administrator needs to find out a specific NICs MAC address, the IP...
Which of the following will have problems functioning if a firewall...
A user is experiencing slow connections. Which of the following...
A client purchases a new wireless printer and wants to be able to bond...
A technician is setting up a public server for their company. The IP...
Which of the following is a client-server based authentication...
On a wireless network, a user is able to connect to local resources,...
Which of the following devices is used for connecting multiple network...
A technician is troubleshooting connectivity issues on a clients...
After adding a new cable segment to the network, the technician...
Ensuring that data is transmitted securely over an IP network is the...
A 66 block is typically connected to the telecommunication company...
A power outage occurred over the weekend and on Monday morning the...
Which of the following network devices is required to translate a...
Which of the following is the MOST secure access method?
A company has one headquarters location and ten remote sites. The...
Which of the following is a topology used in networks for its...
A network technician is installing a small wireless network. A...
When creating a fault tolerant switched network, which of the...
Which of the following wiring standards is depicted below? ...
A recently installed wireless router needs to be configured to have...
Which of the following protocols is used by several different...
In a Class A subnet, a Host ID may occupy a maximum of:
Which of the following authentication methods uses public and private...
Which of the following authentication protocols uses plain text to...
The below output is from which of the following utilities? ...
Which of the following port numbers does SSH use?
How many DS0s are used in a T1?
Which of the following can an application layer firewall filter that a...
Which of the following protocols will help reduce multicast flooding...
Which of the following BEST explains the purpose of a DMZ?
After a power outage several switches lose their current...
Which of the following address ranges should a network administrator...
Which of the following tools could an administrator use to determine...
An administrator is implementing a new wireless network. Which of the...
A technician is troubleshooting the phone service at a site. The...
Which of the following is required to pass traffic from one VLAN to...
Which of the following command line tools would BEST be used to verify...
Given the following routing table entries, which of the following will...
A network technician has addressed an issue where many workstations...
The difference between 10Base-T and 100Base-T is:
The below output is from which of the following utilities? ...
A corporate office network has 40 computers all in the same private IP...
A host is unable to communicate across a network. From the information...
Which of the following security mitigation techniques is the MOST...
Which of the following is the maximum range of 10GBase-SR ?
A VoIP telephone with a built-in hub is plugged into a single network...
Alert!

Advertisement