Network+ (N10-004) Quiz F

50 Questions | Total Attempts: 113

SettingsSettingsSettings
Network Plus Quizzes & Trivia

251-300


Questions and Answers
  • 1. 
    QUESTION NO: 251 Which of the following is the point when local exchange carrier responsibility ends?
    • A. 

      Demarc

    • B. 

      Point of Presence (POP)

    • C. 

      Smart jack

    • D. 

      MDF

  • 2. 
    QUESTION NO: 252 A company would like to configure newsfeeds on the network for employees to be aware of internal company information. Which of the following ports would be used to allow news feeds to pass-through?
    • A. 

      25

    • B. 

      22

    • C. 

      119

    • D. 

      143

  • 3. 
    QUESTION NO: 253 A technician needs to change locations of a telephone between 66 blocks. Which of the following tools would be used in locating the positions in the cross connections?
    • A. 

      Butt set

    • B. 

      Cable tester

    • C. 

      Toner probe

    • D. 

      Voltage meter

  • 4. 
    QUESTION NO: 254 Which of the following commands would allow the technician to identify the currently assigned DNS server?
    • A. 

      Nbtstat

    • B. 

      Netstat

    • C. 

      Dig

    • D. 

      Nslookup

  • 5. 
    QUESTION NO: 255 Two ports on switch A are connected to switch B. The advanced switch feature that allows these ports to be combined and managed as a single entity is called:
    • A. 

      Port mirroring.

    • B. 

      Trunking

    • C. 

      VLAN.

    • D. 

      Spanning tree.

  • 6. 
    QUESTION NO: 256 Which of the following IEEE standards has a maximum bandwidth of 54Mbps operating at 5GHz?
    • A. 

      802.11g

    • B. 

      802. 11a

    • C. 

      802.11b

    • D. 

      802.11

  • 7. 
    QUESTION NO: 257 Which of the following is the recommended maximum distance CAT6 cable should be run?
    • A. 

      246 feet (75 meters)

    • B. 

      100 feet (30.5 meters)

    • C. 

      328 feet (100 meters)

    • D. 

      292 feet (89 meters)

  • 8. 
    QUESTION NO: 258 A user calls saying they are having issues connecting to the Intenet, but they are able to connect to the email server. Which of the following commands would the user type in at the command prompt to display the MAC address?
    • A. 

      Ipconfig

    • B. 

      Arp-s

    • C. 

      Arp-a

    • D. 

      Nbtstat -R

  • 9. 
    QUESTION NO: 259 Which of the following is a utility that translates the physical network address to its IP address?
    • A. 

      Nslookup

    • B. 

      Ping

    • C. 

      Rarp

    • D. 

      Netstat

  • 10. 
    QUESTION NO: 260 Which of the following cable standards has the highest effective range at a greater expense?
    • A. 

      LOOOBase-T

    • B. 

      IOOOBase-LX

    • C. 

      IOOOBase-CX

    • D. 

      LOOOBase-SX

  • 11. 
    QUESTION NO: 261 Which of the following technologies is BEST suited for a point-to-point circuit that is 6 kilometers (3 .7 miles) in distance?
    • A. 

      LOGBase-T

    • B. 

      LOGBase-ER

    • C. 

      IOGBase-SR

    • D. 

      LOGBase-LR

  • 12. 
    QUESTION NO: 262 Which of the following frequency ranges does 802.11a operate at?
    • A. 

      4.9GHz

    • B. 

      5GHz

    • C. 

      54GHz

    • D. 

      2.4GHz

  • 13. 
    QUESTION NO: 263 Which of the following protocols provides the actual encryption used over VPN?
    • A. 

      PPP

    • B. 

      HTTPS

    • C. 

      PPTP

    • D. 

      SSH

  • 14. 
    QUESTION NO: 264 Which of the following features of a switch will allow two switches to pass network infonnation?
    • A. 

      Disabling the routing protocols

    • B. 

      Port speeds

    • C. 

      Trunking

    • D. 

      PoE

  • 15. 
    QUESTION NO: 265 Which of the following tools can send a signal down a cable and measure how long it takes to comeback?
    • A. 

      Multimeter

    • B. 

      Voltage event recorder

    • C. 

      TDR

    • D. 

      Toner probe

  • 16. 
    QUESTION NO: 266 A technician needs to connect a laptop via the small office, home office (SOHO)wireless access point. When the technician does a site survey using the laptop the wireless network is not discovered. Computers previously on the wireless network were connected, and the wireless card appears to be working. Which of the following could be causing the issue?
    • A. 

      The SSID is set to not broadcast.

    • B. 

      The wireless router does not have adequate AC power.

    • C. 

      The WEP key is not correct.

    • D. 

      The laptop is running on Windows Service Pack 1.

  • 17. 
    QUESTION NO: 267 A technician has determined that a single computer has suddenly lost network connectivity. Which of the following should be the next troubleshooting step the technician should take?
    • A. 

      Determine if escalation is necessary.

    • B. 

      Determine if anything has changed.

    • C. 

      Identify the affected areas of the network.

    • D. 

      Establish the most probable cause.

  • 18. 
    QUESTION NO: 268 A company has installed a new 802.11g point-to-point connection between two buildings and is experiencing low throughput across the link. The current setup involves a wireless bridge on the roof with an omni-directional antenna. Which of the following would BEST improve the link perfonnance?
    • A. 

      Replace the omni-directional antennas with Yagi antennas.

    • B. 

      Configure channel hopping on both wireless bridges.

    • C. 

      Replace the wireless bridges with wireless access points.

    • D. 

      Install bi-directional amplifiers at both sites.

  • 19. 
    QUESTION NO: 269 A users workstation is able to resolve IP addresses of any host, and can ping other workstations on the local subnet, but is unable to ping addresses on other subnets. Which of the following is the MOST likely cause of the problem?
    • A. 

      The workstation is configured with an incorrect subnet mask.

    • B. 

      The workstation is configured with the incorrect default gateway.

    • C. 

      The workstations NIC is configured for a different port speed than the switch.

    • D. 

      The workstation is assigned to the incorrect VLAN.

  • 20. 
    QUESTION NO: 270 The 66 block termination point is:
    • A. 

      CAT3 compliant.

    • B. 

      Coaxial compliant.

    • C. 

      CAT6 compliant.

    • D. 

      IEEE 1394 compliant.

  • 21. 
    QUESTION NO: 271 A network using RIP has taken several minutes to begin routing traffic around a failed piece of equipment. Which of the following could be implemented to improve convergence time?
    • A. 

      Replace RIP with adistance-vector routing protocol such as RIP version 2.

    • B. 

      Replace RIP with an exterior gateway protocol such as BGP.

    • C. 

      Replace RIP with static route s so dynamic updates are not sent.

    • D. 

      Replace RIP with alink-state routing protocol such as OSPF.

  • 22. 
    QUESTION NO: 272 Which of the following devices is used to connect a WAN to a LAN?
    • A. 

      Basic router

    • B. 

      Repeater

    • C. 

      Bridge

    • D. 

      Basic switch

  • 23. 
    QUESTION NO: 273 Routing convergence time is which of the following?
    • A. 

      Time required for an IDS to detect suspicious software

    • B. 

      Time required by switch ports to update their link status and transition to the forwarding state

    • C. 

      Time required for a VPN connection to occur

    • D. 

      Time required by protocols to update their forwarding tables after changes have occured

  • 24. 
    QUESTION NO: 274 A new business with five computers moves into an office where coaxial cable exists. In order to use the existing infrastucture, which of the following topologies would be used?
    • A. 

      Spanning Tree

    • B. 

      Star

    • C. 

      Mesh

    • D. 

      Bus

  • 25. 
    QUESTION NO: 275 A company is in the process of upgrading their network infrastructure to support new VoIP telephony equipment. Which of the following is a primary feature to consider when selecting a new switch to support the phones?
    • A. 

      Port mirroring

    • B. 

      PoE

    • C. 

      VPN capability

    • D. 

      Modular chassis

  • 26. 
    QUESTION NO: 276 Which of the following protocols are used to transfer files between two systems?(Select TWO).
    • A. 

      RIP

    • B. 

      SCP

    • C. 

      FTP

    • D. 

      NTP

    • E. 

      SNMP

  • 27. 
    QUESTION NO: 277 Which of the following network devices would a network administrator use to create a DMZ?
    • A. 

      Host -based firewall

    • B. 

      File server

    • C. 

      Network-based firewall

    • D. 

      WINS server

  • 28. 
    QUESTION NO: 278 Which of the following tools are needed to create a CAT5e crossover cable?(Select TWO).
    • A. 

      Snips

    • B. 

      Cable crimper

    • C. 

      TDR

    • D. 

      Multimeter

    • E. 

      OTDR

  • 29. 
    QUESTION NO: 279 A technician received a call from a remote user who is having issues connecting to a new VPN. Which of the following is the FIRST step the technician should take?
    • A. 

      Document the solution and process

    • B. 

      Identify the symptoms and potential causes

    • C. 

      Establish what has changed

    • D. 

      Implement an action plan

  • 30. 
    QUESTION NO: 280 A technician installed a new wireless router. The customer is now having a problem playing online games, but they can connect to websites. Which of the following should the technician configure to resolve this problem?
    • A. 

      Port forwarding

    • B. 

      SSID

    • C. 

      MAC filtering

    • D. 

      Antenna placement

  • 31. 
    QUESTION NO: 281 Which of the following is an advantage of  lOOBase-T over lOOBase-FX?
    • A. 

      Uses a more flexible cable

    • B. 

      Faster transmission speeds

    • C. 

      Longer cable runs

    • D. 

      Can be used in a topology

  • 32. 
    QUESTION NO: 282 Which of the following cable types are the MOST widely used in a corporate gigabit network scheme?
    • A. 

      CAT5

    • B. 

      CAT1

    • C. 

      CAT3

    • D. 

      CAT6

  • 33. 
    QUESTION NO: 283 Which of the following LAN types would utilize CAT5 UTP?
    • A. 

      100Base-TX

    • B. 

      I000Base-T

    • C. 

      100Base-FX

    • D. 

      LOGBase-SR

  • 34. 
    QUESTION NO: 284 A network administrator configured several network devices earlier today, but now the Internet is no longer available to several users. Which of the following logs should the network administrator reference to help identify the problem?
    • A. 

      Phone logs

    • B. 

      Event logs

    • C. 

      History logs

    • D. 

      Application logs

  • 35. 
    QUESTION NO: 285 Which of the following devices would be used to connect different broadcast domains in order to allow them to communicate with each other?
    • A. 

      Bridge

    • B. 

      Layer 2 switch

    • C. 

      Hub

    • D. 

      Multilayer switch

  • 36. 
    QUESTION NO: 286 Enabling MAC address filtering on a switch can be used to mitigate which of the following security threats?
    • A. 

      Rogue access points

    • B. 

      Viruses

    • C. 

      Social engineering

    • D. 

      Worms

  • 37. 
    QUESTION NO: 287 Which of the following mechanisms is used to calculate back-off time on an Ethernet link after a collision?
    • A. 

      CSMA/CD

    • B. 

      CSMA/CA

    • C. 

      Spanning Tree

    • D. 

      Weighted Random Early Detect (WRED)

  • 38. 
    QUESTION NO: 288 Which of the following is an advantage of  lOOBase-FX over IOOBase-TX?
    • A. 

      Faster transmission speeds

    • B. 

      Longer cable runs

    • C. 

      Uses a more durable cable

    • D. 

      Ease of installation

  • 39. 
    QUESTION NO: 289 At which of the following layers of the OSI model would a repeater operate?
    • A. 

      Layer 7

    • B. 

      Layer 5

    • C. 

      Layer 3

    • D. 

      Layer 1

  • 40. 
    QUESTION NO: 290 Which of the following documentations would a network technician find ports that a company has blocked?
    • A. 

      Policies, procedures and configurations

    • B. 

      Baseline reports

    • C. 

      Network wiring schematics

    • D. 

      RFC

  • 41. 
    QUESTION NO: 291 A technician is troubleshooting a printer problem in a SOHO enviromnent. The printer is connected to the network and the computers can print using TCP/IP directly. The computers were able to print the day before, but now they cannot. Which of the following setups would aid in preventing this problem?
    • A. 

      Set up the printer on a public IP address.

    • B. 

      Configure the printer to use an APIPA

    • C. 

      Change the printer setting to use multicast.

    • D. 

      Place the printer on a static IP address.

  • 42. 
    QUESTION NO: 292 Which of the following systems detects and reports attempts of unauthorized access to the network?
    • A. 

      Host -based firewall

    • B. 

      Basic firewall

    • C. 

      IDS

    • D. 

      IPS

  • 43. 
    QUESTION NO: 293 .Which of the following software types would BEST be used at identifying and reacting to an attack by shutting down a port or dropping certain types of packets?
    • A. 

      Port scanner

    • B. 

      IPS

    • C. 

      Packet sniffer

    • D. 

      IDS

  • 44. 
    QUESTION NO: 294 A user reports that the wireless network is slow and is able to see and access shared folders that are unknown to the user. Which of the following is the cause of the problem?
    • A. 

      The wireless NIC is defective.

    • B. 

      Wireless router is improperly configured.

    • C. 

      The user is connecting to the wrong SSID.

    • D. 

      The SSID broadcast is disabled.

  • 45. 
    QUESTION NO: 295 Which of the following WAN technologies provides a 45Mbps circuit over TDM equipment?
    • A. 

      SONET

    • B. 

      E3

    • C. 

      T3

    • D. 

      OC-12

  • 46. 
    QUESTION NO: 296 A new virus was just released and has infected several workstations. A technician receives a newly released patch. Which of the following troubleshooting steps should the technician take FIRST?
    • A. 

      Implement an action plan

    • B. 

      Document the solution

    • C. 

      Apply the patch as quickly as possible

    • D. 

      Wait for the virus definitions to be updated

  • 47. 
    QUESTION NO: 297 The network amninistrator needs to use an IP addressing method that will not require manual updating. Which of the following should be used?
    • A. 

      Static

    • B. 

      Dynamic

    • C. 

      TCP

    • D. 

      Multiple

  • 48. 
    QUESTION NO: 298 Which of the following logical topologies uses centralized authentication?
    • A. 

      Peer -to-peer

    • B. 

      Client/server

    • C. 

      VPN

    • D. 

      VLAN

  • 49. 
    QUESTION NO: 299 Which of the following command and switch combination would provide the following output? Interface: 172.30.0.102 --- Ox2 Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic
    • A. 

      Arp-s

    • B. 

      Netstat -a

    • C. 

      Arp-a

    • D. 

      Netstat -s

  • 50. 
    QUESTION NO: 300 A second network card in a server that activates if the primary card fails is an example of which of the following network performance optimization?
    • A. 

      Fault tolerance

    • B. 

      High availability

    • C. 

      QoS

    • D. 

      Load balancing