Network+ Quiz A

50 Questions | Total Attempts: 622

SettingsSettingsSettings
Network Plus Quizzes & Trivia

1-50


Questions and Answers
  • 1. 
    Which of the following IPv4 address pairs would be able to share files on a network using a hub?
    • A. 

      10.192.2.220/16 and 10.254.2.222/16

    • B. 

      10.254.2.220/16 and 10.254.2.222/24

    • C. 

      10.192.2.220/ 16 and 10.254.2.222/16

    • D. 

      10.254.2.220/16 and 10.254.2.222/16

  • 2. 
    Which of the following LAN connection technologies has a full duplex speed of 200Mbps and uses a CAT5e cable?
    • A. 

      1000Base-X

    • B. 

      100Base-FX

    • C. 

      1000Base-TX

    • D. 

      100Base-T

  • 3. 
    QUESTION NO:6A technician is configuring a router for a SOHO network. The technician changed the IP address scheme on the router and disabled DHCP service before the wireless was configured. After the router updates the information, the PC can no longer connectect to the router. Which of the following would be the BEST solution to reestablish the connection while maintaining the routers current configuration state?
    • A. 

      Restart the PC so it obtains a new IP address from the router

    • B. 

      Restart the router so that the PC obtains a new IF address.

    • C. 

      Assign a static Ip address on the PC that matches the router.

    • D. 

      Use APIPA to connect the PC to the router.

  • 4. 
    QUESTION NO: 9Which of the following protocols is the MOST susceptible to a packet sniffer?
    • A. 

      SFTP

    • B. 

      SSH

    • C. 

      HTTPS

    • D. 

      SNMPv2

  • 5. 
    QUESTION NO: 8Which of the following network components would be used to create VLANs?
    • A. 

      Routers

    • B. 

      Gateways

    • C. 

      Switches

    • D. 

      Bridges

  • 6. 
    QUESTION NO: 7Which of the following is the number of bits used for IPv6?
    • A. 

      128

    • B. 

      32

    • C. 

      64

    • D. 

      256

  • 7. 
    QUESTION NO: 50Which of the following is the default port for SMTP?
    • A. 

      443

    • B. 

      21

    • C. 

      110

    • D. 

      25

  • 8. 
    QUESTION NO: 5Which of the following networks has the LEAST likelihood of collisions?
    • A. 

      Ring

    • B. 

      Mesh

    • C. 

      Star

    • D. 

      Bus

  • 9. 
    QUESTION NO: 49A client wants to extend the range of their wireless network without running wires throughout the small office. Which of the following could be implemented with the LEAST administrative effort?
    • A. 

      Install a repeater at the end ofthe office.

    • B. 

      Install an 802.11n router and change all NICS to match

    • C. 

      Install a WAP in the middle of the office.

    • D. 

      Install an additional router to help with congestion.

  • 10. 
    QUESTION NO: 48How many broadcast domains are created by a 24 port switch configured with 12 VLANs with all of the ports being actively used
    • A. 

      2

    • B. 

      12

    • C. 

      36

    • D. 

      24

  • 11. 
    QUESTION NO: 47Automatic private Internet protocol addressing (APIPA) assigns IP addresses from which of the following ranges?
    • A. 

      10.0.x.x

    • B. 

      169.254.x.x

    • C. 

      192.168.x.x

    • D. 

      172. 16.x.x

  • 12. 
    QUESTION NO: 46Using a routing table, which of the following routes will be selected MOST frequently?
    • A. 

      The lowest administrative distance

    • B. 

      The highest administrative distance

    • C. 

      The BGP route

    • D. 

      The one with the greatest number of hops

  • 13. 
    QUESTION NO: 45Which of the following network devices could be used to extend the range limitation of Ethemet networks?
    • A. 

      Load balancer

    • B. 

      Repeater

    • C. 

      IDS

    • D. 

      Firewall

  • 14. 
    QUESTION NO: 10Which of the following WAN technologies uses fiber as a transmission medium?
    • A. 

      T1

    • B. 

      ADSL

    • C. 

      E1

    • D. 

      SONET

  • 15. 
    QUESTION NO: 11Which of the following would be a correct statement about VLANs?
    • A. 

      VLANs help isolate network traffic.

    • B. 

      VLAN broadcasts are limited to the switch

    • C. 

      VLANs create physical segments

    • D. 

      VLANs help prevent overlapping

  • 16. 
    QUESTION NO: 13Which of the following protocols enables administrators to control network devices like routers and switches?
    • A. 

      NAT

    • B. 

      SNMP

    • C. 

      DNS

    • D. 

      NFS

  • 17. 
    QUESTION NO: 12When configuring a wireless access point, which of the following principles should be used to select a channel to operate on?
    • A. 

      Select the same channel as that configured on the neighboring access points

    • B. 

      Select the channel closest to that configured on neighboring access points.

    • C. 

      Select the channel with the frequency range least used in the given area

    • D. 

      Select the chamlel farthest from that configured on neighboring access points

  • 18. 
    QUESTION NO: 14Which of the following is used to test the operation of a NIC?
    • A. 

      Loopback

    • B. 

      568B

    • C. 

      Rollover

    • D. 

      Crossover

  • 19. 
    QUESTION NO: 15Which of the following protocols are used for tunneling and encryption purposes?(Select TWO).
    • A. 

      L2TP

    • B. 

      PAP

    • C. 

      SLIP

    • D. 

      PPPoE

    • E. 

      IPSec

  • 20. 
    QUESTION NO: 16Which of the following TCP connect scanners is always set for normal data flow once a connection is established?
    • A. 

      TCP

    • B. 

      ACK

    • C. 

      SYN

    • D. 

      RSH

  • 21. 
    QUESTION NO: 17A company has a wired bus topology and a client accidentally unplugs the network cabling to their computer. Which of the following is true about the company's network?
    • A. 

      It will function properly once all affected pc's are rebooted and authenticateto the network.

    • B. 

      It will function with no downtime.

    • C. 

      It will function with minimal downtime.

    • D. 

      It will not function properly until the wires are reconnected

  • 22. 
    QUESTION NO: 18Which of the following protocols is used to encrypt packets over the Internet? (Select TWO).
    • A. 

      SIP

    • B. 

      HTTPS

    • C. 

      SMTP

    • D. 

      SMNP

    • E. 

      SSH

  • 23. 
    QUESTION NO: 20Users at a branch office have informed a technician that access to static web content is slow from their location.It is deternined that most users are visiting the same site repeatedly throughout the day. Which of the following would improve WAN utilization?
    • A. 

      A caching proxy server at the branch

    • B. 

      A traffic shaper

    • C. 

      A load balancer at the datacenter hosting the web selvers

    • D. 

      An application level firewall

  • 24. 
    QUESTION NO: 21A technician is asked to verify available phone numbers at a telecommunication block. Which of the following tools is required to verify the available numbers?
    • A. 

      Multimeter

    • B. 

      Butt set

    • C. 

      Punch down tool

    • D. 

      ´╗┐Toner probe

  • 25. 
    QUESTION NO: 22When connecting two switches together, which of the following protocols would be used to trunk multiple VLAN traffic across the same physical link?
    • A. 

      Porttrunking

    • B. 

      802. lq

    • C. 

      Port mirroring

    • D. 

      802.lx

  • 26. 
    QUESTION NO: 23Which of the following cables is used to connect multiple layer 2 switches?
    • A. 

      Loopback

    • B. 

      Crossover

    • C. 

      Serial

    • D. 

      Rollover

  • 27. 
    QUESTION NO: 25A company needs the ability to run a network that can handle 30Mbps datatransfer speeds but also needs to keep the cost of installing the network down. Which of the following cable types would BEST meet the company's needs?
    • A. 

      CAT6

    • B. 

      CAT3

    • C. 

      CAT5e

    • D. 

      CAT1

  • 28. 
    QUESTION NO: 26Which of the following data is included in a wireless access points beacon frame?
    • A. 

      SSID and MAC address

    • B. 

      IP and MAC address

    • C. 

      SSID and WEP key

    • D. 

      Channel and WEP key

  • 29. 
    QUESTION NO: 27Which of the following devices has a primary purpose of proactively detecting and reacting to security threats?
    • A. 

      SSL

    • B. 

      IDS

    • C. 

      IPS

    • D. 

      VPN

  • 30. 
    QUESTION NO: 28Which of the following is the default port for telnet?
    • A. 

      21

    • B. 

      23

    • C. 

      20

    • D. 

      22

  • 31. 
    QUESTION NO: 29A technician is resolving an issue where a computer is unable to connect to the Intemet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Intemet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?
    • A. 

      The computers gateway is not routing to a public IP address.

    • B. 

      The computer is using an invalid IP address.

    • C. 

      The computer and the gateway are not on the same network.

    • D. 

      The computer is not using a private IP address.

  • 32. 
    QUESTION NO: 31How much bandwidth does an OC-12 provide?
    • A. 

      12Mbps

    • B. 

      622Mbps

    • C. 

      1.2Gbps

    • D. 

      45Mbps

  • 33. 
    QUESTION NO: 30In an office visitors need to be connected to the Intemet without attaching to the company server. Employees also need to connect to the company server and to the Intemet. All the connections are managed by the same switch. Which of the following should be used to meet these requirements?
    • A. 

      RIP

    • B. 

      OSPF

    • C. 

      Port trunking

    • D. 

      VLAN

  • 34. 
    QUESTION NO: 32An office has just added an employee kitchen area. The work area and equipment has stayed the same. Which of the following is the MOST likely reason why they are now having wireless connectivity problems?
    • A. 

      Distance

    • B. 

      Interference

    • C. 

      Encryption

    • D. 

      Antenna placement

  • 35. 
    QUESTION NO: 33A scanner has determined the open ports on a network device. Assuming servicess are running on their default ports, which of the following ports will provide secure communication?
    • A. 

      25

    • B. 

      21

    • C. 

      22

    • D. 

      23

  • 36. 
    QUESTION NO: 35A network technician is asked to implement a separate network for guests that arrive onsite. Which of the following would be the MOST cost effective solution?
    • A. 

      Create a VLAN.

    • B. 

      Install a firewall

    • C. 

      Install a VPN.

    • D. 

      Implement trunking

  • 37. 
    QUESTION NO: 36A user is unable to send an email to another user at company. A network technician believes that the issue is DNS related. After typing nslookup, which of the following commands would help determine the IP address of company As mail server?
    • A. 

      Set type=mx

    • B. 

      Set type=ptr

    • C. 

      Set type=soa

    • D. 

      Set type=cname

  • 38. 
    QUESTION NO: 37Which of the following does a star ring topology use for data transfer?
    • A. 

      CSMA/CA

    • B. 

      CHAP

    • C. 

      CSMA/CD

    • D. 

      Token passing

  • 39. 
    QUESTION NO: 39A network with multiple devices needs to have a smaller broadcast domain while working with a small budget. Which of the following is the BEST solution?
    • A. 

      Create VLANs

    • B. 

      Implement more hubs.

    • C. 

      Implement more switches.

    • D. 

      Assign static IPs.

  • 40. 
    QUESTION NO: 40None of the users in an office can connect to the servers using the FQDN. Which of the following is MOST likely the cause of this issue?
    • A. 

      WINS is not enabled

    • B. 

      NetBIOS is not enabled

    • C. 

      DNS is not enabled

    • D. 

      DHCP is not enabled

  • 41. 
    QUESTION NO: 41The role of intelligently forwarding frames fi:om one broadcast domain to another would be performed by which of the following network equipment?
    • A. 

      Router

    • B. 

      Hub

    • C. 

      Media converter

    • D. 

      Unmanaged switch

  • 42. 
    QUESTION NO: 42Which of the following protocols is used for connecting clients to a news server?
    • A. 

      IMAP4

    • B. 

      NCP

    • C. 

      NNTP

    • D. 

      SMTP

  • 43. 
    QUESTION NO: 44Which of the following wireless networks is configured without an access point?
    • A. 

      Ad-hoc

    • B. 

      Multiport repeating

    • C. 

      Local

    • D. 

      Extended

  • 44. 
    QUESTION NO: 43Which of the following OSI layers handles the routing of data across segments?
    • A. 

      Network

    • B. 

      Transport

    • C. 

      Session

    • D. 

      Data Link

  • 45. 
    A technician must enable which of thefollowing services to prevent broadcast storms?
    • A. 

      DHCP

    • B. 

      Port mirroring

    • C. 

      Spanning tree

    • D. 

      Bonding

  • 46. 
    QUESTION NO: 19A user is able to access the network shares and their email, but is unable to connect to any website. Which of the following command line tools should a technician use on that users workstation to begin troubleshooting?
    • A. 

      Traceroute to any website to see where the disconnection is occurring.

    • B. 

      Perform the ipconfig command to verify settings on that workstation are correct

    • C. 

      Use the route add command to add static routes to see if the routes are an issue.

    • D. 

      Use the ping command to see if the workstation can access the DHCP server

  • 47. 
    QUESTION NO: 24An active/passive server cluster in which only one server is active and handling requests, is an example of which of the following network performance optimization?
    • A. 

      Traffic shaping

    • B. 

      QoS

    • C. 

      High availability

    • D. 

      Load balancing

  • 48. 
    QUESTION NO: 34Implementing a set of policies and procedures that define the corporate information is confidential and training employees on these procedures can help prevent which of the following?
    • A. 

      Smurf attacks

    • B. 

      Man-in-the-middle attacks

    • C. 

      Social engineering

    • D. 

      Patch management

  • 49. 
    QUESTION NO: 38Which of the following commands would allow a technician to see the DNS servers that a computer is configured to use?
    • A. 

      Netstat

    • B. 

      Nbtstat

    • C. 

      Nslookup

    • D. 

      Arp

  • 50. 
    One end of a CAT5 cable is punched down following the 568B standard. The other end should be terminated using which standard to make a straight-through cable?
    • A. 

      568B

    • B. 

      RJ-45

    • C. 

      568A

    • D. 

      RJ-11