Network+ (N10-004) Quiz I

50 Questions | Total Attempts: 107

SettingsSettingsSettings
Network Plus Quizzes & Trivia

401-450


Questions and Answers
  • 1. 
    QUESTION NO: 401 Ensuring that data is transmitted securely over an IP network is the main purpose of:
    • A. 

      FTP.

    • B. 

      TLS

    • C. 

      Telnet.

    • D. 

      SIP.

  • 2. 
    QUESTION NO: 402 Which of the following ipconfig switches will display when the lease was obtained?
    • A. 

      /displaydns

    • B. 

      /release

    • C. 

      /all

    • D. 

      /renew

  • 3. 
    QUESTION NO: 403 Which of the following is a topology used in networks for its scalability?
    • A. 

      Star

    • B. 

      Ring

    • C. 

      Bus

    • D. 

      Mesh

  • 4. 
    QUESTION NO: 404 Which of the following logs would let the network administrator know that there are performance and network issues within the LAN?
    • A. 

      Application logs

    • B. 

      Proxy logs

    • C. 

      Configuration logs

    • D. 

      System logs

  • 5. 
    QUESTION NO: 405 Which of the following is a benefit of using dynamic routing as opposed to static routing?
    • A. 

      More secure

    • B. 

      Scales to large networks

    • C. 

      Improves network speed

    • D. 

      Less network overhead

  • 6. 
    QUESTION NO: 406 Which of the following tools would be used to verify the wiring installation for the network?
    • A. 

      Multimeter

    • B. 

      Cable tester

    • C. 

      Voltage event recorder

    • D. 

      Protocol analyzer

  • 7. 
    QUESTION NO: 407 A network administrator needs to ensure that users are authenticated before they are given access to the network. Which of the following BEST meets these requirements?
    • A. 

      802.1s

    • B. 

      802.1d

    • C. 

      802. lx

    • D. 

      802.1w

  • 8. 
    QUESTION NO: 408 Which of the following is the MOST secure wireless encryption?
    • A. 

      ESSID

    • B. 

      WPA

    • C. 

      WPA2

    • D. 

      WEP

  • 9. 
    QUESTION NO: 409 A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usemames and passwords. Which of the following technologies would support users authenticating with encrypted usenames and passwords?
    • A. 

      WPA TLS

    • B. 

      64-bit WEP

    • C. 

      128-bit WEP

    • D. 

      WPA PEAP

  • 10. 
    QUESTION NO: 410 A 66 block is typically connected to the telecommunication company through which of the following types of cable?
    • A. 

      Fiber optic

    • B. 

      CAT6

    • C. 

      25 pair

    • D. 

      100 pair

  • 11. 
    QUESTION NO: 411 A network administrator wants to ensure that connections between two servers are split according to usage. Which of the following devices can be used to BEST accomplish this?
    • A. 

      Content switch

    • B. 

      Load balancer

    • C. 

      Proxy server

    • D. 

      Bandwidth shaper

  • 12. 
    QUESTION NO: 412 Which of the following protocols should be used to securely copy a file? (Select TWO).
    • A. 

      SFTP

    • B. 

      SCP

    • C. 

      TFTP

    • D. 

      FTP

    • E. 

      SNMP

  • 13. 
    QUESTION NO: 413 Which of the following will have problems functioning if a firewall has been set up to block all UDP traffic?
    • A. 

      A server database application

    • B. 

      A VoIP device

    • C. 

      The Internet

    • D. 

      A network printer

  • 14. 
    QUESTION NO: 414 A technician is dispatched to a house where the user reports intermittent problems with their wireless network. Which of the following is the MOST likely cause of drop-offs?
    • A. 

      Cellular phones

    • B. 

      Poor cable connection

    • C. 

      Cordless phones

    • D. 

      Lighting

  • 15. 
    QUESTION NO: 415 Which of the following is resistant to crosstalk?
    • A. 

      1 OOBase-FX

    • B. 

      10GBase-CX

    • C. 

      STP

    • D. 

      1000Base-T

  • 16. 
    QUESTION NO: 416 The difference between lOBase-T and 100Base-T is:
    • A. 

      100Base-T frames hold more data.

    • B. 

      Shorter timing between Ethernet frames.

    • C. 

      100Base-T requires STP cabling.

    • D. 

      Smaller headers on Ethernet frames.

  • 17. 
    QUESTION NO: 417 Which of the following tools could an administrator use to determine if a machine was using the correct DNS server? (Select TWO).
    • A. 

      Ipconfig

    • B. 

      Nbtstat

    • C. 

      Netstat

    • D. 

      Ifconfig

    • E. 

      Tracert

  • 18. 
    QUESTION NO: 418 Which of the following would occur at the application layer of the OSI model?
    • A. 

      UDP

    • B. 

      FTP

    • C. 

      TCP

    • D. 

      SPX

  • 19. 
    QUESTION NO: 419 Given the following routing table entries, which of the following will the next-hop address be for a packet destined for the address 192.168.1.203? Network Address Subnet Mask Next Hop Address 0.0.0.0 0.0.0.0 77.0.5.5 192.168.0.0 255.255.0.0 66.40.90.121 192.168.1.0 255.255.255.0 72.40.91.1 192.168.1.0 255.255.255.127 40.40.0.254
    • A. 

      40.40.0.254

    • B. 

      66.40.90.121

    • C. 

      77.0.5.5

    • D. 

      72.40.91.1

  • 20. 
    QUESTION NO: 420 SMTP resides at which of the following layers of the OSI model?
    • A. 

      Transport

    • B. 

      Application

    • C. 

      Network

    • D. 

      Presentation

  • 21. 
    QUESTION NO: 421 A host is unable to communicate across a network. From the information below, which of the following is the cause of the issue?Host Name ...............- Test20 Primary Dns Suffix ........... - abc.com Node Type ...............Unknown IP Routing Enabled .................- No WINS Proxy Enabled .................- No DNS Suffix Search List .............- abc.com Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : Description ........ Physical Address ...... - Broadcom NetXtreme Gigabit Ethernet • 00-00-00-15-Al-DO Dhcp Enabled ........... - No IP Address ................. : 10.0.37.144 Subnet Mask ....... - 255.255.254.0 Default Gateway - 10.0.38.1 DNS Servers ............ .: 10.0.36.5
    • A. 

      Subnet mask is incorrect.

    • B. 

      IP address is incorrect.

    • C. 

      Gateway IP is incorrect.

    • D. 

      DNS server address is incorrect.

  • 22. 
    QUESTION NO: 422 Which of the following is the maximum cable length in a 1000Base-T network?
    • A. 

      1,024 meters (3360 feet)

    • B. 

      1000 meters (3280 feet)

    • C. 

      128 meters (420 feet)

    • D. 

      100 meters (328 feet)

  • 23. 
    QUESTION NO: 423 After a power outage several switches lose their current configurations, but the core router is still working properly. The switches affected are not able to connect to the network. After further investigation the network administrator is able to identify the affected areas, establish the cause, and escalated the problem. Which of the following would be the NEXT step that the network administrator should do?
    • A. 

      Immediately implement a solution.

    • B. 

      Meet with the emergency response team to determine the next step.

    • C. 

      Create an action plan and solution.

    • D. 

      Copy the core routers current configuration to all the affected switches.

  • 24. 
    QUESTION NO: 424 100Base-TF uses which of the following types of cabled medium?
    • A. 

      Ethernet implementation overThinNet

    • B. 

      Ethernet implementation over coaxial

    • C. 

      Ethernet implementation overThickNet

    • D. 

      Ethernet implementation over fiber

  • 25. 
    QUESTION NO: 425 Which of the following protocols are used for email traffic? (Select THREE).
    • A. 

      SNMP

    • B. 

      NTP

    • C. 

      POP3

    • D. 

      TFTP

    • E. 

      IMAP4

    • F. 

      SSH

    • G. 

      SMTP

  • 26. 
    QUESTION NO: 426 Which of the following is required to pass traffic from one VLAN to another?
    • A. 

      A layer three switch

    • B. 

      A layer two switch

    • C. 

      A server with NICs on both VLANs

    • D. 

      A layer one switch

  • 27. 
    QUESTION NO: 427 A user is having connectivity issues at multiple locations when using the RJ-45 port on the laptop. A technician wants to know if the CAT5e cable is the source of the problem. Which of the following should the technician use to troubleshoot the issue?
    • A. 

      Toner probe

    • B. 

      Cable stripper

    • C. 

      Protocol analyzer

    • D. 

      Cable tester

  • 28. 
    QUESTION NO: 428 Which of the following address ranges should a network administrator deny in the ACL to prevent multicast packets from crossing the WAN interface?
    • A. 

      224.0.0.0-239.255.255.255

    • B. 

      127.0.0.0-127.255.255.255

    • C. 

      192.168.0.0-192.168.255.255

    • D. 

      10.0.0.0-10.255.255.255

  • 29. 
    QUESTION NO: 429 After installing a new switch and connecting redundant uplinks to other switches, a LAN experiences a broadcast storm causing severe throughput problems. Which of the following is the MOST likely cause of the broadcast storm?
    • A. 

      VLAN assignments on the new switch conflicted with existing VLAN assignments elsewhere on the network.

    • B. 

      Spanning-tree protocol was not operational on the LAN.

    • C. 

      Incorrect trunk encapsulation was applied

    • D. 

      Port aggregation was incorrectly configured.

  • 30. 
    QUESTION NO: 430 Which of the following routing protocols has a limitation of 15 hops?
    • A. 

      OSPF

    • B. 

      RIP

    • C. 

      IGRP

    • D. 

      BGP

  • 31. 
    QUESTION NO: 431 Which of the following is the default port for HTTPS?
    • A. 

      143

    • B. 

      443

    • C. 

      80

    • D. 

      8080

  • 32. 
    QUESTION NO: 432 An administrator is going to be performing maintenance on a network router and wants to temporarily re-route traffic through another office. Which of the following would allow the administrator to accomplish this?
    • A. 

      Configure a static route.

    • B. 

      Configure EGP.

    • C. 

      Implement NAT on the server.

    • D. 

      Implement steady state convergence.

  • 33. 
    QUESTION NO: 433 A technician pings 127.0.0.1 and gets the following result: Unable to contact IP driver, en-or code 2.Which of the following would resolve this?
    • A. 

      Flush the DNS Cache.

    • B. 

      Install NetBEUI.

    • C. 

      Release the IP Address.

    • D. 

      Install the TCP/IP protocol.

  • 34. 
    QUESTION NO: 434 A corporate office network has 40 computers all in the same private IP subnet. The corporate office has purchased an Internet connection from their local ISP. They were assigned one static public IP address, and all 40 computers will require access to the Internet. How can this be accomplished?
    • A. 

      DHCP will assign addresses capable of accessing the Internet.

    • B. 

      The use of static NAT will allow access to the Internet.

    • C. 

      PAT will allow access to the Internet.

    • D. 

      Supernetting will allow access to the Internet.

  • 35. 
    QUESTION NO: 435 A user is experiencing slow connections. Which of the following commands would be used to determine the delay time between the hops?
    • A. 

      Tracert

    • B. 

      Nbtstat

    • C. 

      Nslookup

    • D. 

      Ping

  • 36. 
    QUESTION NO: 436 A technician is troubleshooting a network data transmission issue. Which of the following commands would the technician be able to use to identify the location of the packet loss?
    • A. 

      Ipconfig

    • B. 

      Traceroute

    • C. 

      Ping

    • D. 

      Arp

  • 37. 
    QUESTION NO: 437 Which of the following punch down blocks is BEST suited for high-speed data transmission?
    • A. 

      66 block

    • B. 

      Cross-connect block

    • C. 

      110 block

    • D. 

      25 pair cable block

  • 38. 
    QUESTION NO: 438 Which of the following protocols is used by several different operating systems to authenticate resources such as computers, users and printers?
    • A. 

      LDAP

    • B. 

      SMTP

    • C. 

      TCP

    • D. 

      UDP

  • 39. 
    QUESTION NO: 439 Which of the following will prevent unauthorized access to the server room?
    • A. 

      Biometric lock

    • B. 

      PICT card

    • C. 

      Cable lock

    • D. 

      RSA token

  • 40. 
    QUESTION NO: 440 QoS is used to accomplish which of the following objectives?
    • A. 

      Block traffic from certain websites

    • B. 

      Block traffic from certain users.

    • C. 

      Provide priority of one or more types of traffic over others.

    • D. 

      Make use of the current bandwidth so it is a constant preset ideal by caching traffic.

  • 41. 
    QUESTION NO: 441 Which of the following network components operates on Layer 2 of the OSI model?
    • A. 

      Gateway

    • B. 

      Router

    • C. 

      Switch

    • D. 

      Hub

  • 42. 
    QUESTION NO: 442 Which of the following authentication methods uses public and private keys to secure communication and ensure the senders identity?
    • A. 

      CHAP

    • B. 

      EAP

    • C. 

      PKI

    • D. 

      Kerberos

  • 43. 
    QUESTION NO: 443 In a Class A subnet, a Host ID may occupy a maximum of:
    • A. 

      32bits.

    • B. 

      31bits.

    • C. 

      24bits.

    • D. 

      16bits.

  • 44. 
    QUESTION NO: 444 Which of the following network hardware allows the MOST network traffic collisions?
    • A. 

      Hub

    • B. 

      WAP

    • C. 

      Router

    • D. 

      Switch

  • 45. 
    QUESTION NO: 445 Which of the following is the maximum range of 10GBase-SR?
    • A. 

      1000 feet (305 meters)

    • B. 

      6 miles (1593 kilometers)

    • C. 

      990 feet (302 meters)

    • D. 

      328 feet (100 meters)

  • 46. 
    QUESTION NO: 446 Which of the following BEST explains the purpose of a DMZ?
    • A. 

      To separate a security zone for an IPS.

    • B. 

      To separate a security zone for a VPN.

    • C. 

      To create a security zone that allows private traffic but is isolated from the public network.

    • D. 

      To create a security zone that allows public traffic but is isolated from the private network.

  • 47. 
    QUESTION NO: 447 Which of the following network protocols allows for automated alerts and reports on network devices?
    • A. 

      SMTP

    • B. 

      SNMP

    • C. 

      IGMP

    • D. 

      TLS

  • 48. 
    QUESTION NO: 448 Which of the following security mitigation techniques is the MOST effective against zero-day attacks?
    • A. 

      MAC filtering

    • B. 

      User awareness training

    • C. 

      Update antivirus definitions

    • D. 

      Effective security policies

  • 49. 
    QUESTION NO: 449 A power outage occurred over the weekend and on Monday morning the helpdesk was receiving calls about network issues from only one section of the LAN. A network administrator has implemented the solution and identified all the results. After all the network issues were resolved, what would be the NEXT step for that network administrator?
    • A. 

      Identify potential effects of the solution.

    • B. 

      Document the entire process.

    • C. 

      Let all users within the LAN know what the problem was.

    • D. 

      Determine if anything has changed.

  • 50. 
    QUESTION NO: 450 Which of the following network devices is required to translate a synchronous serial connection to time division multiplexed connection?
    • A. 

      A proxy server

    • B. 

      A CSU/DSU

    • C. 

      A content switch

    • D. 

      A router