Network+ Quiz B

50 Questions | Total Attempts: 387

Settings
Network Plus Quizzes & Trivia

Questions and Answers
  • 1. 
    QUESTION NO: 80 A technician is creating a crossover cable to connect two devices. Which of the following pins would be different between connector A and connector B?
    • A. 

      Pin4, Pin5, Pin7, Pin8

    • B. 

      Pin6, Pin7, Pin8, Pin1

    • C. 

      Pin4, Pin5, Pin1 , Pin2

    • D. 

      Pin1 , Pin2, Pin3, Pin6

  • 2. 
    QUESTION NO: 81 A network technician is troubleshooting a network issue that has just been reported. Which of the following troubleshooting steps should the technician take FIRST to help resolve this issue?
    • A. 

      Record what steps should be taken to resolve the issue.

    • B. 

      Ask the user who reported the issue what past documentation they have.

    • C. 

      Ask the user who reported the issue to explain the symptoms in detail.

    • D. 

      Record the solution in the appropriate logs for future use.

  • 3. 
    QUESTION NO: 83 Which of the following protocols allows secure access to a VPN?
    • A. 

      PPP

    • B. 

      SLIP

    • C. 

      PPPoE

    • D. 

      PPTP

  • 4. 
    QUESTION NO: 84* Which of the following devices uses the IEEE 1394 standard?
    • A. 

      FireWire

    • B. 

      USB 2.0

    • C. 

      ISCSI

    • D. 

      Parallel

  • 5. 
    QUESTION NO: 85* Which of the following is the maximum segment distance ofa IOOBase-FX network?
    • A. 

      100 meters (328 feet)

    • B. 

      2,000 meters (6,561 feet)

    • C. 

      1,024 meters (3 ,359 feet)

    • D. 

      1,023 meters (3 ,356 feet)

  • 6. 
    QUESTION NO: 86 Which of the following devices is used to extend the signal strength on a network segment?
    • A. 

      Repeater

    • B. 

      NIC

    • C. 

      Transceiver

    • D. 

      Modem

  • 7. 
    QUESTION NO: 99 Which of the following cable types has the shortest maximum cable run length?
    • A. 

      Single-mode fiber

    • B. 

      Coaxial

    • C. 

      Plenum

    • D. 

      CAT3

  • 8. 
    QUESTION NO: 97* A user reports their wireless 802.IIg Intemet connection is intenllittently disrupted. Which of the following is the cause of the problem?
    • A. 

      Infrared printer

    • B. 

      Cordless phone

    • C. 

      Cell phone

    • D. 

      Incandescent light

  • 9. 
    QUESTION NO: 98* Which of the following will list the destination MAC addresses?
    • A. 

      Arp

    • B. 

      Ping

    • C. 

      Dig

    • D. 

      Nbtstat

  • 10. 
    QUESTION NO: 91 Which of the following is commonly used to test fiber connectivity?
    • A. 

      OTDR

    • B. 

      Toner probe

    • C. 

      Butt set

    • D. 

      Multimeter

  • 11. 
    QUESTION NO: 92* Which of the following protocols transmits using UDP ports?
    • A. 

      RIPv2

    • B. 

      HTTP

    • C. 

      HTTPS

    • D. 

      TFTP

  • 12. 
    QUESTION NO: 93 Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?
    • A. 

      OSPF

    • B. 

      IS-IS

    • C. 

      BGP

    • D. 

      EIGRP

  • 13. 
    QUESTION NO: 94* A network technician wants a server to have fault tolerance. Which of the following would be the MOST cost effective solution?
    • A. 

      Install two NICs for teaming.

    • B. 

      Install two switches.

    • C. 

      Install a single fiber NIC

    • D. 

      Install a single router.

  • 14. 
    QUESTION NO: 95 An employee is having issues accessing shared resources on a file server. Which of the following troubleshooting steps should the technician take FIRST?
    • A. 

      Document the problem

    • B. 

      Search the intemet for the problem

    • C. 

      Test the results

    • D. 

      Identify the symptoms

  • 15. 
    QUESTION NO: 89 After increasing the interface MTU of a branch router to 1600 bytes, a network administrator is no longer able to send packets with a size of 1501 bytes. Which of the following is the cause?
    • A. 

      The WAN link does not supp011 frames over 1500 bytes in size.

    • B. 

      The branch router cannot process frames larger than 1500 bytes.

    • C. 

      The router at the other end of the WAN link is configured with an MTU of 1500.

    • D. 

      The frames take too long to send causing collisions with other devices attempting to send traffic.

  • 16. 
    QUESTION NO: 90 Users on the network can no longer access a custom application that uses TCP 8090 hosted on the DMZ. A technician has verified that the firewall is permitting the TCP port. Which of the following commands would verify the server is still accepting connections on TCP 8090?
    • A. 

      Netstat

    • B. 

      Ipconfig

    • C. 

      Telnet

    • D. 

      Nslookup

  • 17. 
    QUESTION NO: 87 Which of the following remote access solutions allows the LEAST connection overhead?
    • A. 

      L2TPVPN

    • B. 

      IPSecVPN

    • C. 

      SSL VPN

    • D. 

      PPTP VPN

  • 18. 
    QUESTION NO: 88 A technician is at a small facility that has five computers connected to a central switch and accessing a single server for file and print sharing. One computer becomes unable to connect to the network, while the other four are still connecting properly. Which of the following could be causing the computer to not connect to the network?
    • A. 

      The server has failed.

    • B. 

      The computers OS needs to be updated.

    • C. 

      The switch has failed.

    • D. 

      The NIC has failed.

  • 19. 
    QUESTION NO: 96 A user states that they have decreased signal strength on their wireless connection. They have been using the wireless network previously without problems and the network configuration has not been changed. Which of the following is MOST likely the cause of the degraded signal?
    • A. 

      Incorrect encryption

    • B. 

      Standards mismatch

    • C. 

      Lncorrect SSID

    • D. 

      Environmental factors

  • 20. 
    QUESTION NO: 78* Which of the following wireless standards allows for increased bandwidth by allowing channel bonding?
    • A. 

      802.11g

    • B. 

      802.11a

    • C. 

      802.11b

    • D. 

      802.11n

  • 21. 
    QUESTION NO: 70 Which of the following does an administrator need to be aware of when installing a wireless network in a building with multiple floors?
    • A. 

      Frequency configuration

    • B. 

      SSID naming

    • C. 

      Channel overlap

    • D. 

      Encryption algorithm

  • 22. 
    QUESTION NO: 71 A network technician is contacted about a system that is unable to connect to a file server. After investigating the problem thoroughly the technician is able to successfully test and resolve the issue. Which of the following is the NEXT step the technician should take?
    • A. 

      Document the solution.

    • B. 

      Create an action plan.

    • C. 

      Reboot the selver.

    • D. 

      Identify the problem.

  • 23. 
    QUESTION NO: 67* Some users are unable to access the network. A teclmician determines that the computers that were unable to access the network have an IP address of 169.254.0.1. Which of the following network services should the technician check?
    • A. 

      TFTP

    • B. 

      DNS

    • C. 

      BOOTP

    • D. 

      DHCP

  • 24. 
    QUESTION NO: 82 * A user has been transferred from the accounting team to the human resources team. The user can only print to the accounting teams printer and cannot print to the human resources teams printer. Which of the following is the cause of the problem?
    • A. 

      Wrong gateway

    • B. 

      Wrong DNS

    • C. 

      Wrong host file

    • D. 

      WrongVLAN

  • 25. 
    QUESTION NO: 77 While analyzing the contents of the IP routing table in a router, the administrator notices the following routes in the table: PrefixNext-Hop IPlnterface 192.168.1.0 /24172.16.31.1 Ethernet0 192.168.2.0 /24172.16.31.1 Ethernet0 172.16.31.0 /24 Directly Connected Ethernet0 0.0.0.0/0172.16.31.2Ethernet0 Which of the following BEST describes what would occur if a packet from 192.168.1.4 were sent to 192.168.3.4?
    • A. 

      The packet will be dropped as there is no matching route in the IP routing table to reach the destination network

    • B. 

      An ICMP network unreachable message will be sent to 192.168.1.4

    • C. 

      The packet will be forwarded to 172.16.31.2

    • D. 

      The packet will be fOlwarded to 172.16.31.1 since the source IP address is in the 192.168.1.0/24 range

  • 26. 
    QUESTION NO: 75* Which of the following is a valid IP address in the public addressing scheme?
    • A. 

      172.20.10.1

    • B. 

      10.20.1.1

    • C. 

      168.192.10.1

    • D. 

      233.10.20.1

  • 27. 
    QUESTION NO: 76* A system administrator is troubleshooting an application that is terminating frequently. Which of the following utilities can be used to determine the problem?
    • A. 

      Port scanner

    • B. 

      History log

    • C. 

      DNS log

    • D. 

      Application log

  • 28. 
    QUESTION NO: 79 If static addressing is not configured and the DHCP server for a network is unavailable, which of the following will a PC use to configme its IP address?
    • A. 

      APIPA

    • B. 

      BOOTP

    • C. 

      DNS

    • D. 

      TFTP

  • 29. 
    QUESTION NO: 73* A small  office home office (*SOHO)wireless user reports their new laptop is 802.11 band 802.11g capable but will not wirelessly connect faster than 11Mbps. Which of the following is the cause of the problem?
    • A. 

      The laptop wireless card is running on a different frequency.

    • B. 

      The wireless router needs a firmware update

    • C. 

      The wireless router is 802.11b only

    • D. 

      The wireless router is defective.

  • 30. 
    QUESTION NO: 74 An automated application capable of infecting computers without user interaction would be described as which of the following?
    • A. 

      A social engineering attack

    • B. 

      A Trojan

    • C. 

      A smurf attack

    • D. 

      A worm

  • 31. 
    QUESTION NO: 72* Which of the following is implemented on multiple switches to allow altemate paths?
    • A. 

      Spanning tree

    • B. 

      VLAN

    • C. 

      Port authentication

    • D. 

      Port mirroring

  • 32. 
    QUESTION NO: 69* An administrator is in charge of several remote servers in Japan. Users call and report they cannot connect to the company's resources located on those servers. Which of the following commands would allow the administrator to verify the servers are running?
    • A. 

      Nbtstat

    • B. 

      Ping

    • C. 

      Telnet

    • D. 

      Netstat

  • 33. 
    QUESTION NO: 58 A technician has gathered information on a network issue, and has determined the affected area. Which of the following would be the NEXT step in resolving tills issue?
    • A. 

      The technician should test the best solution for the issue.

    • B. 

      The technician should check to see if there have been any recent changes to this area of the network.

    • C. 

      The technician should consider any negative impacts to the network that nlight be caused by a solution.

    • D. 

      The technician should implement what the is the best solution for the issue.

  • 34. 
    QUESTION NO: 59* A company's web selver is located in a climate controlled enviromllent, with multiple power supplies, and a UPS to provide the maximum uptime available. Which of the following would allow the company the BEST opportunity to increase network uptime for the web selver?
    • A. 

      Upgrade all switches to Gigabit speed

    • B. 

      Install an additional Router

    • C. 

      Upgrade the outbound NIC to a gigabit card

    • D. 

      Install additional NICs

  • 35. 
    QUESTION NO: 60* Which of the following devices will segment a network and help cut down on network congestion?
    • A. 

      Switch

    • B. 

      Repeater

    • C. 

      Gateway

    • D. 

      Hub

  • 36. 
    QUESTION NO: 61 Which of the following protocols is used in a ping command?
    • A. 

      IGMP

    • B. 

      ICMP

    • C. 

      SMTP

    • D. 

      TFTP

  • 37. 
    QUESTION NO: 62 Which of the following would allow for encrypted login credentials to be sent over the network?
    • A. 

      Telnet

    • B. 

      FTP

    • C. 

      SSH

    • D. 

      HTTP

  • 38. 
    QUESTION NO: 63* Which of the following is the maximum hop count for RIPv2?
    • A. 

      18

    • B. 

      10

    • C. 

      16

    • D. 

      17

  • 39. 
    QUESTION NO: 64 Which of the following is used to simplify the process of setting up a network and the administration of the network?
    • A. 

      ZEROCONF

    • B. 

      SNMP

    • C. 

      WlNS

    • D. 

      DNS

  • 40. 
    QUESTION NO: 65* When terminating a CAT5e cable a technician terminates the 568A end and the 568B end. The resulting cable IS:
    • A. 

      Astraight-through cable.

    • B. 

      Non-functional

    • C. 

      A crossover cable.

    • D. 

      Capable of 10GBaseT.

  • 41. 
    QUESTION NO: 68 A technician is troubleshooting a workstation that is connected to a star network. The technician determines that the workstation is unable to connect to the network resources. Which of the following should be checked FIRST?
    • A. 

      The link lights on the server network card

    • B. 

      The link lights on the network card

    • C. 

      The link lights on the switch

    • D. 

      The installed network drivers

  • 42. 
    QUESTION NO: 54 A network administrator is configuring a network with a dynamic routing protocol. Which of the following would support equal cost load balancing and have all routers contain the same topology view?
    • A. 

      OSPF

    • B. 

      IGRP

    • C. 

      RIP

    • D. 

      BGP

  • 43. 
    QUESTION NO: 66 Which of the following is the maximum CAT5 length acceptable for a horizontal cross-connect?
    • A. 

      500 feet (152 meters)

    • B. 

      100 feet (30.5 meters)

    • C. 

      336 feet (102 meters)

    • D. 

      328 feet (100 meters)

  • 44. 
    QUESTION NO: 51* When troubleshooting a network error, a technician using a laptop as a network sniffer can see all the communications on the network segment. Which off the following network devices is the laptop plugged into?
    • A. 

      Gateway

    • B. 

      Router

    • C. 

      Hub

    • D. 

      Basic switch

  • 45. 
    QUESTION NO: 57 Which of the following is the maximum CAT3 length acceptable for a horizontal cross-connect?
    • A. 

      100 meters (328 feet)

    • B. 

      125 meters (410 feet)

    • C. 

      256 meters (840 feet)

    • D. 

      328 meters (1076 feet)

  • 46. 
    QUESTION NO: 56 Which of the following components in a structured wiring system supports an Ethernet network?
    • A. 

      110 block

    • B. 

      66 block

    • C. 

      25 pair cable

    • D. 

      Smart jack

  • 47. 
    QUESTION NO: 55 Which of the following is the maximum amount of wires that fit into a RJ-l1 connector?
    • A. 

      2

    • B. 

      8

    • C. 

      4

    • D. 

      6

  • 48. 
    QUESTION NO: 53 Which of the following WAN layer two protocols would be BEST suited for a full mesh topology?
    • A. 

      PPP

    • B. 

      ATM

    • C. 

      MPLS

    • D. 

      Frame-relay

  • 49. 
    -QUESTION NO: 52* Which of the following could be installed to improve network performance when accessing Internet websites?
    • A. 

      Caching engine

    • B. 

      Traffic shaping

    • C. 

      Load balancing

    • D. 

      Firewall

  • 50. 
    QUESTION NO: 100* Which of the following is the MOST common pin-out configuration used when crimping RJ-45 connectors?
    • A. 

      UTP

    • B. 

      IEEE 802.5

    • C. 

      T568A/B

    • D. 

      STP