Network+ Quiz F

50 Questions | Total Attempts: 497

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Network+


Questions and Answers
  • 1. 
    QUESTION NO: 299 Which of the following command and switch combination would provide the following output? Interface: 172.30.0.102 --- Ox2 Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic
    • A. 

      Arp-s

    • B. 

      Netstat -a

    • C. 

      Arp-a

    • D. 

      Netstat -s

  • 2. 
    QUESTION NO: 297 The network amninistrator needs to use an IP addressing method that will not require manual updating. Which of the following should be used?
    • A. 

      Static

    • B. 

      Dynamic

    • C. 

      TCP

    • D. 

      Multiple

  • 3. 
    QUESTION NO: 298 Which of the following logical topologies uses centralized authentication?
    • A. 

      Peer -to-peer

    • B. 

      Client/server

    • C. 

      VPN

    • D. 

      VLAN

  • 4. 
    QUESTION NO: 296 A new virus was just released and has infected several workstations. A technician receives a newly released patch. Which of the following troubleshooting steps should the technician take FIRST?
    • A. 

      Implement an action plan

    • B. 

      Document the solution

    • C. 

      Apply the patch as quickly as possible

    • D. 

      Wait for the virus definitions to be updated

  • 5. 
    QUESTION NO: 293 .Which of the following software types would BEST be used at identifying and reacting to an attack by shutting down a port or dropping certain types of packets?
    • A. 

      Port scanner

    • B. 

      IPS

    • C. 

      Packet sniffer

    • D. 

      IDS

  • 6. 
    QUESTION NO: 294 A user reports that the wireless network is slow and is able to see and access shared folders that are unknown to the user. Which of the following is the cause of the problem?
    • A. 

      The wireless NIC is defective.

    • B. 

      Wireless router is improperly configured.

    • C. 

      The user is connecting to the wrong SSID.

    • D. 

      The SSID broadcast is disabled.

  • 7. 
    QUESTION NO: 292 Which of the following systems detects and reports attempts of unauthorized access to the network?
    • A. 

      Host -based firewall

    • B. 

      Basic firewall

    • C. 

      IDS

    • D. 

      IPS

  • 8. 
    QUESTION NO: 295 Which of the following WAN technologies provides a 45Mbps circuit over TDM equipment?
    • A. 

      SONET

    • B. 

      E3

    • C. 

      T3

    • D. 

      OC-12

  • 9. 
    QUESTION NO: 290 Which of the following documentations would a network technician find ports that a company has blocked?
    • A. 

      Policies, procedures and configurations

    • B. 

      Baseline reports

    • C. 

      Network wiring schematics

    • D. 

      RFC

  • 10. 
    QUESTION NO: 291 A technician is troubleshooting a printer problem in a SOHO enviromnent. The printer is connected to the network and the computers can print using TCP/IP directly. The computers were able to print the day before, but now they cannot. Which of the following setups would aid in preventing this problem?
    • A. 

      Set up the printer on a public IP address.

    • B. 

      Configure the printer to use an APIPA

    • C. 

      Change the printer setting to use multicast.

    • D. 

      Place the printer on a static IP address.

  • 11. 
    QUESTION NO: 287 Which of the following mechanisms is used to calculate back-off time on an Ethernet link after a collision?
    • A. 

      CSMA/CD

    • B. 

      CSMA/CA

    • C. 

      Spanning Tree

    • D. 

      Weighted Random Early Detect (WRED)

  • 12. 
    QUESTION NO: 288 Which of the following is an advantage of  lOOBase-FX over IOOBase-TX?
    • A. 

      Faster transmission speeds

    • B. 

      Longer cable runs

    • C. 

      Uses a more durable cable

    • D. 

      Ease of installation

  • 13. 
    QUESTION NO: 289 At which of the following layers of the OSI model would a repeater operate?
    • A. 

      Layer 7

    • B. 

      Layer 5

    • C. 

      Layer 3

    • D. 

      Layer 1

  • 14. 
    QUESTION NO: 285 Which of the following devices would be used to connect different broadcast domains in order to allow them to communicate with each other?
    • A. 

      Bridge

    • B. 

      Layer 2 switch

    • C. 

      Hub

    • D. 

      Multilayer switch

  • 15. 
    QUESTION NO: 286 Enabling MAC address filtering on a switch can be used to mitigate which of the following security threats?
    • A. 

      Rogue access points

    • B. 

      Viruses

    • C. 

      Social engineering

    • D. 

      Worms

  • 16. 
    QUESTION NO: 282 Which of the following cable types are the MOST widely used in a corporate gigabit network scheme?
    • A. 

      CAT5

    • B. 

      CAT1

    • C. 

      CAT3

    • D. 

      CAT6

  • 17. 
    QUESTION NO: 283 Which of the following LAN types would utilize CAT5 UTP?
    • A. 

      100Base-TX

    • B. 

      I000Base-T

    • C. 

      100Base-FX

    • D. 

      LOGBase-SR

  • 18. 
    QUESTION NO: 284 A network administrator configured several network devices earlier today, but now the Internet is no longer available to several users. Which of the following logs should the network administrator reference to help identify the problem?
    • A. 

      Phone logs

    • B. 

      Event logs

    • C. 

      History logs

    • D. 

      Application logs

  • 19. 
    QUESTION NO: 280 A technician installed a new wireless router. The customer is now having a problem playing online games, but they can connect to websites. Which of the following should the technician configure to resolve this problem?
    • A. 

      Port forwarding

    • B. 

      SSID

    • C. 

      MAC filtering

    • D. 

      Antenna placement

  • 20. 
    QUESTION NO: 281 Which of the following is an advantage of  lOOBase-T over lOOBase-FX?
    • A. 

      Uses a more flexible cable

    • B. 

      Faster transmission speeds

    • C. 

      Longer cable runs

    • D. 

      Can be used in a topology

  • 21. 
    QUESTION NO: 278 Which of the following tools are needed to create a CAT5e crossover cable?(Select TWO).
    • A. 

      Snips

    • B. 

      Cable crimper

    • C. 

      TDR

    • D. 

      Multimeter

    • E. 

      OTDR

  • 22. 
    QUESTION NO: 279 A technician received a call from a remote user who is having issues connecting to a new VPN. Which of the following is the FIRST step the technician should take?
    • A. 

      Document the solution and process

    • B. 

      Identify the symptoms and potential causes

    • C. 

      Establish what has changed

    • D. 

      Implement an action plan

  • 23. 
    QUESTION NO: 272 Which of the following devices is used to connect a WAN to a LAN?
    • A. 

      Basic router

    • B. 

      Repeater

    • C. 

      Bridge

    • D. 

      Basic switch

  • 24. 
    QUESTION NO: 273 Routing convergence time is which of the following?
    • A. 

      Time required for an IDS to detect suspicious software

    • B. 

      Time required by switch ports to update their link status and transition to the forwarding state

    • C. 

      Time required for a VPN connection to occur

    • D. 

      Time required by protocols to update their forwarding tables after changes have occured

  • 25. 
    QUESTION NO: 274 A new business with five computers moves into an office where coaxial cable exists. In order to use the existing infrastucture, which of the following topologies would be used?
    • A. 

      Spanning Tree

    • B. 

      Star

    • C. 

      Mesh

    • D. 

      Bus