Network+ (N10-004) Quiz G

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rich70
R
Rich70
Community Contributor
Quizzes Created: 8 | Total Attempts: 1,959
Questions: 60 | Attempts: 176

SettingsSettingsSettings
Network Plus Quizzes & Trivia

301-360


Questions and Answers
  • 1. 

    QUESTION NO: 301 A user is reporting that their inquiries to the database server keep timing out. Which of the following tools would be BEST suited to troubleshoot the issue?

    • A.

      Cable tester

    • B.

      Packet analyzer

    • C.

      Tone probe

    • D.

      Butt set

    Correct Answer
    B. Packet analyzer
    Explanation
    A packet analyzer is the best tool to troubleshoot the issue of inquiries to the database server timing out. A packet analyzer captures and analyzes network traffic, allowing the user to inspect the packets being sent between the client and the server. By examining the packets, the user can identify any issues or errors that may be causing the timeouts, such as network congestion, packet loss, or misconfigured settings. This tool provides valuable insights into the network communication and helps in diagnosing and resolving the problem effectively.

    Rate this question:

  • 2. 

    QUESTION NO: 302 Which of the following connector types would a technician utilize with fiber lines by pushing it directly into the port without twisting?

    • A.

      RJ-45

    • B.

      ST

    • C.

      SC

    • D.

      BNC

    Correct Answer
    C. SC
    Explanation
    A technician would utilize an SC connector with fiber lines by pushing it directly into the port without twisting. The SC connector is a type of fiber optic connector that features a push-pull latching mechanism, allowing for easy and quick installation. It is commonly used in single-mode fiber optic networks and provides low insertion loss and high return loss. The connector has a square-shaped design and utilizes a ceramic ferrule to ensure precise alignment of the fibers.

    Rate this question:

  • 3. 

    QUESTION NO: 303 A client is using a device that allows them to synchronize their wireless device to their computer, but the device must be within 3 feet (1 meter) in order for the synchronization to complete. Which of the following BEST describes the type of wireless device being used?

    • A.

      WiFi

    • B.

      Bluetooth

    • C.

      Serial

    • D.

      Infrared

    Correct Answer
    D. Infrared
    Explanation
    The correct answer is Infrared. Infrared technology allows for short-range wireless communication between devices, typically within a range of 3 feet or 1 meter. This technology is commonly used for synchronization purposes, such as syncing a wireless device to a computer. WiFi and Bluetooth, on the other hand, have much larger ranges and can operate at greater distances. Serial is a type of wired connection, not wireless.

    Rate this question:

  • 4. 

    QUESTION NO: 304 A technician is building a new network. Which of the following components would be the FIRST installed for the network?

    • A.

      MDF

    • B.

      VPN

    • C.

      EMI

    • D.

      IDF

    Correct Answer
    A. MDF
    Explanation
    The MDF, or Main Distribution Frame, would be the first component installed for the new network. The MDF is the central point where all the network cables from various locations are terminated and connected. It acts as a hub for distributing network connections to different areas or departments within a building or campus. By installing the MDF first, the technician can ensure that all the necessary network connections are properly organized and distributed to the rest of the network infrastructure.

    Rate this question:

  • 5. 

    QUESTION NO: 305 After a technician came out and installed a new wireless router, one of the wired workstations began having problems connecting to the file server. This is only an intermittent problem. Which of tile following actions will the technician MOST likely perform to resolve this problem?

    • A.

      Move the router's location.

    • B.

      Check the cable ends.

    • C.

      Check user permissions

    • D.

      Change the router's SSID.

    Correct Answer
    B. Check the cable ends.
    Explanation
    The technician will most likely check the cable ends to resolve the intermittent connectivity issue between the wired workstation and the file server. This is because the problem started after the installation of the new wireless router, suggesting that there might be an issue with the cables connecting the workstation to the router or the router to the file server. By checking the cable ends, the technician can ensure that the cables are properly connected and not causing any disruptions in the network connection.

    Rate this question:

  • 6. 

    QUESTION NO: 306 A network device that is used to connect multiple devices without segmenting a network is a:

    • A.

      Router.

    • B.

      Bridge.

    • C.

      Hub.

    • D.

      Switch.

    Correct Answer
    C. Hub.
    Explanation
    A hub is a network device that is used to connect multiple devices without segmenting a network. Unlike a switch or a router, a hub simply broadcasts incoming data packets to all devices connected to it, regardless of the destination. This means that all devices connected to a hub share the same bandwidth, which can lead to network congestion and slower speeds. However, a hub is a cost-effective solution for small networks where network segmentation is not required.

    Rate this question:

  • 7. 

    QUESTION NO: 307 A mail server was recently placed in the network. The users report email is slow. Upon closer inspection a technician notices that error counters on the interface are incrementing. Which of the following could be causing the problem?

    • A.

      Wrong subnet mask

    • B.

      Duplex mismatch

    • C.

      Port speed mismatch

    • D.

      Switch loop

    Correct Answer
    B. Duplex mismatch
    Explanation
    A duplex mismatch occurs when two devices on a network have different duplex settings, meaning one device is set to full duplex while the other is set to half duplex. This can cause communication issues and slow down the network. In this scenario, the error counters on the interface are incrementing, indicating that there may be a problem with the communication between the mail server and another device on the network. A duplex mismatch could be the cause of this issue.

    Rate this question:

  • 8. 

    QUESTION NO: 308 A technician has just fmished implementing a solution for a network issue. Which of the following steps in troubleshooting should the technician do NEXT?

    • A.

      Docmnent the issue and the solution that was implemented.

    • B.

      Escalate the issue to another technician

    • C.

      Test if the solution works and identify other effects it may have.

    • D.

      Gather information about the issue.

    Correct Answer
    C. Test if the solution works and identify other effects it may have.
    Explanation
    After implementing a solution for a network issue, the next step in troubleshooting should be to test if the solution works and identify any other effects it may have. This is important to ensure that the issue has been resolved and that the solution does not cause any additional problems. Documenting the issue and solution, escalating the issue, and gathering information about the issue are all important steps in the troubleshooting process, but they should be done after testing the solution.

    Rate this question:

  • 9. 

    QUESTION NO: 309 A technician notices that when trying to ping a workstation by network name the workstation does not reply back over the network. The workstation is part of the domain and is able to get to the Intemet. Which of the following is the cause of the problem?

    • A.

      Faulty cable on the workstation

    • B.

      Wrong host name on the workstation

    • C.

      Wrong WINS on the workstation

    • D.

      Incorrect IP address assigned to the workstation

    Correct Answer
    B. Wrong host name on the workstation
    Explanation
    The cause of the problem is that the workstation has the wrong host name. This means that when the technician tries to ping the workstation by its network name, the request is not reaching the correct destination because the host name is incorrect.

    Rate this question:

  • 10. 

    QUESTION NO: 310 Which of the following network performance optimization methods slows or restricts traffic to increase the performance of other types of traffic? (Select TWO).

    • A.

      Load balancing

    • B.

      Traffic shaping

    • C.

      High availability

    • D.

      Caching engines

    • E.

      QoS

    Correct Answer(s)
    B. Traffic shaping
    E. QoS
    Explanation
    Traffic shaping and QoS are network performance optimization methods that slow or restrict traffic to increase the performance of other types of traffic. Traffic shaping involves controlling the flow of network traffic to improve performance by prioritizing certain types of traffic over others. QoS (Quality of Service) is a set of techniques used to manage network resources and prioritize certain types of traffic over others, ensuring that critical traffic receives higher priority and better performance. Both methods help optimize network performance by managing and prioritizing traffic flow.

    Rate this question:

  • 11. 

    QUESTION NO: 311 A user has plugged a computer into a switch port and now is unable to access any server resources on the network. Which of the following are the MOST likely reasons for the access problem? (Select TWO).

    • A.

      The spanning tree protocol has locked down the port.

    • B.

      The computer is connected to a port in the wrong VLAN.

    • C.

      The appropriate credentials have not been supplied for network access.

    • D.

      A port mirroring session was started and is interfering with the connection.

    • E.

      The computer is cOlmected to an incorrect PoE port.

    Correct Answer(s)
    B. The computer is connected to a port in the wrong VLAN.
    C. The appropriate credentials have not been supplied for network access.
    Explanation
    The access problem could be due to the computer being connected to a port in the wrong VLAN, which means it is not in the correct network segment to access the server resources. Additionally, the appropriate credentials may not have been supplied for network access, which would prevent the user from authenticating and accessing the server resources.

    Rate this question:

  • 12. 

    QUESTION NO: 312 A company has just added a new conference room. The network administrator has decided to add six new data ports to this room. The administrator has verified that all the cabling is terminated and functioning correctly. Which of the following should the administ:rator do next?

    • A.

      Update the network base line.

    • B.

      Update the wiring diagrams.

    • C.

      Move some data across each port.

    • D.

      Check all of the cables with the OTDR.

    Correct Answer
    B. Update the wiring diagrams.
    Explanation
    The administrator should update the wiring diagrams because the cabling has been verified to be terminated and functioning correctly. Updating the wiring diagrams will ensure that the documentation accurately reflects the current configuration of the network, including the new conference room and the six new data ports. This will help in troubleshooting any future issues and in maintaining an organized and up-to-date network infrastructure.

    Rate this question:

  • 13. 

    QUESTION NO: 313 A network technician wants to add fault tolerance to a file server. Which of the following should the technician do?

    • A.

      Install the latest NIC driver

    • B.

      Add an additional DNS server and modify the MX record

    • C.

      Upgrade the NIC to a one Gigabit card

    • D.

      Add an additional NIC and setup network teaming

    Correct Answer
    D. Add an additional NIC and setup network teaming
    Explanation
    Adding an additional NIC and setting up network teaming would provide fault tolerance for the file server. Network teaming allows multiple NICs to work together as a single virtual NIC, providing redundancy in case one NIC fails. This ensures that the file server remains accessible even if one NIC goes down.

    Rate this question:

  • 14. 

    QUESTION NO: 314 Which of the following VPN protocols runs over port 1723 and allows enclyption to be done at the data level?

    • A.

      SLIP

    • B.

      PPPoE

    • C.

      PPTP

    • D.

      RAS

    Correct Answer
    C. PPTP
    Explanation
    PPTP (Point-to-Point Tunneling Protocol) is the correct answer. PPTP runs over port 1723 and allows encryption to be done at the data level. PPTP is a VPN protocol that creates a secure connection between the client and the server, allowing for secure transmission of data over a public network. It is commonly used for remote access VPNs and supports encryption of data packets, ensuring the confidentiality and integrity of the transmitted information.

    Rate this question:

  • 15. 

    QUESTION NO: 315 Which of the following network devices would an administrator have to configure channels on?

    • A.

      Hub

    • B.

      Unmanaged switch

    • C.

      Firewall

    • D.

      Wireless access point

    Correct Answer
    D. Wireless access point
    Explanation
    An administrator would have to configure channels on a wireless access point. Channels are used to divide the frequency spectrum into smaller bands to avoid interference between different wireless networks. By configuring channels on a wireless access point, the administrator can select the specific frequency band that the access point will use to communicate with wireless devices. This allows for optimal performance and reduces the likelihood of interference from other wireless networks operating in the same area.

    Rate this question:

  • 16. 

    QUESTION NO: 316 A network technician is installing a series of three access points to cover the entire wing of a building. Only one access point has a wired connection. 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points?

    • A.

      Channels 1-3-5

    • B.

      Channels 6-6-6

    • C.

      Channels 7-11-1

    • D.

      Channels 5-5-5

    Correct Answer
    B. Channels 6-6-6
    Explanation
    The correct answer is Channels 6-6-6. In the 802.11g standard, there are 11 channels available for use. However, these channels overlap with each other, causing interference. To minimize interference, it is recommended to use non-overlapping channels. Channels 1, 6, and 11 are the only non-overlapping channels in the 802.11g standard. Therefore, in this scenario, the access points should be set to Channels 6-6-6 to avoid interference and provide optimal coverage.

    Rate this question:

  • 17. 

    QUESTION NO: 317 Which of the following outlines the purpose of using a proxy server in an enterprise environment?

    • A.

      Allows the administrator to block malicious attacks on the network

    • B.

      Allows the user to access hard to find websites

    • C.

      Allows the client to get a fixed IP address when added to the network

    • D.

      Allows granular control over the traffic between the local LAN and the Internet

    Correct Answer
    D. Allows granular control over the traffic between the local LAN and the Internet
    Explanation
    A proxy server in an enterprise environment allows for granular control over the traffic between the local LAN and the Internet. This means that the administrator can regulate and monitor the flow of data, allowing or blocking specific websites or types of content. It provides an additional layer of security by filtering out malicious attacks on the network. It does not provide a fixed IP address or help in accessing hard to find websites.

    Rate this question:

  • 18. 

    QUESTION NO: 318 An administrator is using a packet analyzer across a single switch but is only receiving partial packet information. Which of the following would need to be implemented on the switch for the administrator?

    • A.

      Port authentication

    • B.

      Port mirroring

    • C.

      Spanning tree

    • D.

      VLAN

    Correct Answer
    B. Port mirroring
    Explanation
    Port mirroring would need to be implemented on the switch in order for the administrator to receive complete packet information. Port mirroring allows for the duplication of network traffic from one port to another, which would enable the packet analyzer to capture all packets passing through the switch. This feature is commonly used for network monitoring and troubleshooting purposes.

    Rate this question:

  • 19. 

    QUESTION NO: 319 Which of the following cable types is typically used to connect a hub to a hub that does not support MDI-X?

    • A.

      Straight

    • B.

      Loopback

    • C.

      Crossover

    • D.

      Rollover

    Correct Answer
    C. Crossover
    Explanation
    A crossover cable is typically used to connect a hub to a hub that does not support MDI-X. This type of cable allows for the direct connection of two similar devices, such as two hubs, without the need for a switch. The crossover cable has the transmit and receive wires crossed over, allowing the devices to communicate effectively. This is in contrast to a straight cable, which is used to connect different types of devices, such as a hub to a switch. A loopback cable is used for testing purposes, and a rollover cable is used to connect a computer to a router or switch console port.

    Rate this question:

  • 20. 

    QUESTION NO: 320 Which of the following features from the switch eliminates a delay in acquiring an IP address?

    • A.

      Update the SNMP strings.

    • B.

      Change the duplex mode to half-duplex.

    • C.

      Enable spanning tree on the interface.

    • D.

      Enable trunking

    Correct Answer
    C. Enable spanning tree on the interface.
    Explanation
    Enabling spanning tree on the interface helps eliminate a delay in acquiring an IP address. Spanning tree protocol (STP) prevents loops in a network by blocking redundant paths. By enabling STP on the interface, it ensures that only one active path is used, preventing any delays or conflicts in acquiring an IP address. This allows for a more efficient and reliable network connection.

    Rate this question:

  • 21. 

    QUESTION NO: 321 Which of the following is the component in a wiring system designed to support legacy phone systems?

    • A.

      Fiber conduit

    • B.

      66 block

    • C.

      110 block

    • D.

      Patch panels

    Correct Answer
    B. 66 block
    Explanation
    A 66 block is a component in a wiring system that is specifically designed to support legacy phone systems. It is a type of punch-down block that is used to connect telephone wires to each other or to other equipment. It allows for easy termination and cross-connection of telephone wires, making it ideal for use with older phone systems. Fiber conduit, 110 block, and patch panels are not specifically designed for legacy phone systems, so they are not the correct answer.

    Rate this question:

  • 22. 

    QUESTION NO: 322 Which of the following protocols allows usernames and passwords to be transmitted asclear-text?

    • A.

      PAP

    • B.

      RADIUS

    • C.

      CHAP

    • D.

      SSH

    Correct Answer
    A. PAP
    Explanation
    PAP (Password Authentication Protocol) is the correct answer because it is an authentication protocol that transmits usernames and passwords in clear-text format. This means that the information is not encrypted and can be easily intercepted by attackers. RADIUS (Remote Authentication Dial-In User Service) and CHAP (Challenge-Handshake Authentication Protocol) both use encryption to protect the transmission of usernames and passwords. SSH (Secure Shell) is a secure protocol that encrypts all data, including usernames and passwords, ensuring they are not transmitted in clear-text.

    Rate this question:

  • 23. 

    QUESTION NO: 323 Which of the following will allow certain ports to be part of the same group while other ports within that switch are part of a different group? 

    • A.

      Trunking

    • B.

      Port authentication

    • C.

      Enabling VLANs

    • D.

      Enabling VTP

    Correct Answer
    C. Enabling VLANs
    Explanation
    Enabling VLANs allows certain ports to be part of the same group while other ports within that switch are part of a different group. VLANs (Virtual Local Area Networks) are used to segment a network into separate broadcast domains, allowing for better network management and security. By assigning ports to different VLANs, network administrators can control which devices can communicate with each other, creating separate groups or segments within the network. This allows for more efficient use of network resources and better control over network traffic.

    Rate this question:

  • 24. 

    QUESTION NO: 324 When preparing to place a RJ-4S connector on  a CATS5cable, which of the following tools would BEST be used to prepare the cable?

    • A.

      Polishing kit

    • B.

      Pliers

    • C.

      Razor knife

    • D.

      Snips

    Correct Answer
    D. Snips
    Explanation
    Snips would be the best tool to prepare the CAT5 cable for placing an RJ-45 connector. Snips are commonly used for cutting wires and cables, and they provide a clean and precise cut. Using snips ensures that the cable ends are neat and properly trimmed, allowing for a better connection when attaching the connector. Pliers may be used for other tasks such as crimping, but they are not the most suitable tool for preparing the cable. A polishing kit is not necessary for preparing the cable, and a razor knife may not provide as clean of a cut as snips.

    Rate this question:

  • 25. 

    QUESTION NO: 325 Which of the following authentication protocols uses certificates to negotiate access to the network?

    • A.

      EAP-TLS

    • B.

      PAP

    • C.

      CHAP

    • D.

      Kerberos

    Correct Answer
    A. EAP-TLS
    Explanation
    EAP-TLS is the correct answer because it is an authentication protocol that uses certificates to negotiate access to the network. EAP-TLS stands for Extensible Authentication Protocol-Transport Layer Security, and it provides secure authentication by using digital certificates to verify the identities of both the client and the server. This protocol is commonly used in wireless networks and provides a high level of security by encrypting the authentication process. PAP, CHAP, and Kerberos are also authentication protocols, but they do not specifically use certificates for negotiating access to the network.

    Rate this question:

  • 26. 

    QUESTION NO: 326 Which of the following components allows a technician to use short Ethernet cables to connect cable drops to other devices?

    • A.

      EDF

    • B.

      MDF

    • C.

      Demarc extension

    • D.

      Patch panel

    Correct Answer
    D. Patch panel
    Explanation
    A patch panel allows a technician to use short Ethernet cables to connect cable drops to other devices. A patch panel is a device that provides multiple ports for connecting and managing network cables. It acts as a central point for organizing and routing network cables, allowing for easy connections and disconnections. By using short Ethernet cables, the technician can efficiently connect cable drops to other devices without the need for long cables.

    Rate this question:

  • 27. 

    QUESTION NO: 327 Which of the following is the strongest type of wireless encryption?

    • A.

      AES

    • B.

      RADIUS

    • C.

      WEP

    • D.

      TKlP

    Correct Answer
    A. AES
    Explanation
    AES (Advanced Encryption Standard) is the strongest type of wireless encryption. It is a symmetric encryption algorithm that uses a 128-bit, 192-bit, or 256-bit key to encrypt and decrypt data. AES is widely used and considered secure, making it the preferred choice for protecting wireless networks from unauthorized access and data breaches. RADIUS (Remote Authentication Dial-In User Service) is a networking protocol used for authentication, authorization, and accounting. WEP (Wired Equivalent Privacy) is an outdated and insecure encryption protocol, while TKIP (Temporal Key Integrity Protocol) is a more secure alternative to WEP but not as strong as AES.

    Rate this question:

  • 28. 

    QUESTION NO: 328 Which of the following wireless communication standards allows for communication at both 2.4GHz and 5GHz frequencies?

    • A.

      802.11b

    • B.

      802. 11a

    • C.

      802.11n

    • D.

      802.11g

    Correct Answer
    C. 802.11n
    Explanation
    802.11n is the correct answer because it is a wireless communication standard that allows for communication at both 2.4GHz and 5GHz frequencies. This standard is an improvement over previous standards such as 802.11a, 802.11b, and 802.11g, which only operate at either 2.4GHz or 5GHz frequencies. 802.11n is capable of using multiple antennas and advanced signal processing techniques to achieve higher data rates and improved range compared to earlier standards.

    Rate this question:

  • 29. 

    QUESTION NO: 329 Which of the following network security devices prevents users from propagating viruses?

    • A.

      IPS

    • B.

      Firewall

    • C.

      IDS

    • D.

      Content engine

    Correct Answer
    A. IPS
    Explanation
    An Intrusion Prevention System (IPS) is a network security device that monitors network traffic for malicious activities and prevents users from propagating viruses. It works by analyzing network packets and comparing them against a database of known attack signatures. When a potential threat is detected, the IPS can take immediate action to block the malicious traffic and prevent it from spreading throughout the network. This proactive approach helps to protect the network from viruses and other malware, ensuring a safer and more secure environment for users.

    Rate this question:

  • 30. 

    QUESTION NO: 330 A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?

    • A.

      RIPv2

    • B.

      IGRP

    • C.

      IS-IS

    • D.

      BGP

    Correct Answer
    A. RIPv2
    Explanation
    RIPv2 should be used as the dynamic routing protocol in this scenario. RIPv2 is a distance vector routing protocol that supports variable-length subnet masks (VLSM), making it compatible with the subnet mask of 255.255.255.224 used in each branch location. It allows for automatic updates of routing tables and can adapt to changes in the network topology. IGRP, IS-IS, and BGP are not suitable in this case as they do not support VLSM or may not be appropriate for smaller branch locations.

    Rate this question:

  • 31. 

    QUESTION NO: 331 Which of the following network devices operates on Layer 1 of the OSI model?

    • A.

      Bridge

    • B.

      Switch

    • C.

      Hub

    • D.

      Router

    Correct Answer
    C. Hub
    Explanation
    A hub operates on Layer 1 of the OSI model. A hub is a simple networking device that connects multiple devices in a network, allowing them to communicate with each other. It receives signals from one device and broadcasts them to all other devices connected to it. Hubs do not perform any intelligent processing or filtering of data, making them operate at the physical layer (Layer 1) of the OSI model.

    Rate this question:

  • 32. 

    QUESTION NO: 332 After re-configuring a server to facilitate DNS requests, which of the following would help provide the highest level of fault tolerance?

    • A.

      Adding a Kerberos server

    • B.

      Configuring traffic shaping

    • C.

      Configuring WEP

    • D.

      Adding a second NIC

    Correct Answer
    D. Adding a second NIC
    Explanation
    Adding a second NIC would provide the highest level of fault tolerance because it allows for redundancy in network connections. If one NIC fails, the other NIC can still handle the DNS requests, ensuring that the server remains accessible. This helps to minimize downtime and maintain the availability of the server.

    Rate this question:

  • 33. 

    QUESTION NO: 333 Which of the following devices controls traffic on a LAN?

    • A.

      Switch

    • B.

      Hub

    • C.

      Repeater

    • D.

      Bridge

    Correct Answer
    A. Switch
    Explanation
    A switch is a device that controls traffic on a LAN by using MAC addresses to forward data packets to the appropriate destination. It operates at the data link layer of the OSI model and can create multiple collision domains, allowing for simultaneous communication between multiple devices on the network. Unlike a hub, which simply broadcasts data to all connected devices, a switch intelligently directs data only to the device it is intended for, improving network efficiency and reducing collisions. Therefore, a switch is the correct answer for this question.

    Rate this question:

  • 34. 

    QUESTION NO: 334 Which of the following network media has the longest maximum segment length?

    • A.

      CAT6

    • B.

      Single Mode Fiber

    • C.

      Coaxial cable

    • D.

      Multimode Fiber

    Correct Answer
    B. Single Mode Fiber
    Explanation
    Single Mode Fiber has the longest maximum segment length compared to the other network media listed. Single Mode Fiber is designed to carry a single ray of light, allowing for longer distances to be covered without signal degradation. CAT6, Coaxial cable, and Multimode Fiber have shorter maximum segment lengths in comparison.

    Rate this question:

  • 35. 

    QUESTION NO: 335 Which of the following are the IEEE designations for the spanning tree protocol? (Select TWO).

    • A.

      802.1x

    • B.

      802.1p

    • C.

      802.1d

    • D.

      802.1w

    • E.

      802.1n

    Correct Answer(s)
    C. 802.1d
    D. 802.1w
    Explanation
    The IEEE designations for the spanning tree protocol are 802.1d and 802.1w. 802.1d is the original spanning tree protocol (STP) that provides loop-free topology in Ethernet networks. 802.1w is the rapid spanning tree protocol (RSTP) which is an improvement over STP and provides faster convergence in case of network changes.

    Rate this question:

  • 36. 

    QUESTION NO: 336 A network technician is trying to find out the NETBIOS name of another workstation using its IP address, which of the following commands would be used to find this information?

    • A.

      Nbtstat

    • B.

      Netstat

    • C.

      Ipconfig

    • D.

      Ping

    Correct Answer
    A. Nbtstat
    Explanation
    The command "nbtstat" is used to find the NETBIOS name of a workstation using its IP address. This command is specifically designed to display the NetBIOS over TCP/IP (NetBT) protocol statistics, which includes information about the NetBIOS name. The other options, such as "netstat" and "ipconfig", do not provide this specific functionality. "Ping" is used to test the reachability of a host on an IP network and does not provide information about the NETBIOS name.

    Rate this question:

  • 37. 

    QUESTION NO: 337 Which of the following cable standards is used for Ethernet over fiber?

    • A.

      LOOOBase-T

    • B.

      1000Base-CX

    • C.

      1 OOBase-TX

    • D.

      LOBase-FL

    Correct Answer
    D. LOBase-FL
    Explanation
    The correct answer is 10Base-FL. This cable standard is used for Ethernet over fiber.

    Rate this question:

  • 38. 

    QUESTION NO: 338 An employee is receiving an access denied error message when they try to access a network resource. Which of the following troubleshooting steps should the technician perform FIRST?

    • A.

      Identify what the employee cannot access

    • B.

      Implement an action plan to resolve the issue

    • C.

      Document the process

    • D.

      Ask the employee what has changed since yesterday

    Correct Answer
    A. Identify what the employee cannot access
    Explanation
    The technician should first identify what the employee cannot access in order to understand the specific resource or network area that is causing the access denied error message. This will help the technician narrow down the troubleshooting process and focus on resolving the issue in that specific area. By identifying the exact resource or network area, the technician can then proceed with implementing an action plan to resolve the issue and document the process for future reference. Asking the employee what has changed since yesterday may be helpful, but it should be done after identifying the specific access issue.

    Rate this question:

  • 39. 

    QUESTION NO: 339 A technician is installing a basic router for a SOHO network. After installing the router the PCs connected to it are not able to acquire an IP address. Which of the following did the technician fail to configure correctly?

    • A.

      NAT

    • B.

      DHCP

    • C.

      WlNS

    • D.

      DNS

    Correct Answer
    B. DHCP
    Explanation
    The technician failed to configure the DHCP (Dynamic Host Configuration Protocol) correctly. DHCP is responsible for assigning IP addresses to devices on a network. Without proper DHCP configuration, the PCs connected to the router are not able to acquire an IP address, resulting in the network connectivity issue.

    Rate this question:

  • 40. 

    QUESTION NO: 340 Internet connectivity for a company is mission critical. The technician must be notified if the Internet router has failed. Which of the following is the BEST method to monitor this device?

    • A.

      SLIP

    • B.

      SFTP

    • C.

      SMTP

    • D.

      SNMP

    Correct Answer
    D. SNMP
    Explanation
    SNMP (Simple Network Management Protocol) is the best method to monitor the Internet router for failures. SNMP allows for the monitoring and management of network devices, including routers, by collecting and organizing information about their status and performance. It can send alerts and notifications to a technician when an issue or failure occurs, ensuring that they are promptly informed and can take appropriate action to restore connectivity.

    Rate this question:

  • 41. 

    QUESTION NO: 341 Which of the following Layer 2 devices is used to connect multiple nodes on a network?

    • A.

      DHCP server

    • B.

      Router

    • C.

      Switch

    • D.

      Blidge

    Correct Answer
    C. Switch
    Explanation
    A switch is a Layer 2 device that is used to connect multiple nodes on a network. Unlike a router, which operates at Layer 3 and is used to connect different networks, a switch operates at Layer 2 and is used to connect devices within the same network. A switch forwards data packets based on the MAC addresses of the devices connected to it, allowing for efficient communication between multiple nodes on the network. Therefore, a switch is the correct answer for this question.

    Rate this question:

  • 42. 

    QUESTION NO: 342 A network technician is responsible for setting up four branch offices for a company. Each office will have 12 hosts, but needs the ability to expand to 16 hosts. Which of the following subnet masks should be chosen?

    • A.

      255.255.255.224

    • B.

      255.255.255.248

    • C.

      255.255.255 .16

    • D.

      255.255.255.240

    Correct Answer
    A. 255.255.255.224
    Explanation
    The subnet mask 255.255.255.224 should be chosen because it allows for a maximum of 30 hosts per subnet, which is sufficient for the 12 hosts required initially. It also provides room for expansion up to 16 hosts, as requested.

    Rate this question:

  • 43. 

    QUESTION NO: 343 Which of the following is a secure method for file transfer to a network device?

    • A.

      SNMPv2

    • B.

      TFTP

    • C.

      SCP

    • D.

      FTP

    Correct Answer
    C. SCP
    Explanation
    SCP (Secure Copy Protocol) is a secure method for file transfer to a network device. It uses SSH (Secure Shell) protocol to provide secure and encrypted file transfers. SCP ensures the confidentiality and integrity of the transferred files by encrypting the data and using authentication mechanisms. Unlike FTP (File Transfer Protocol) and TFTP (Trivial File Transfer Protocol), which do not provide secure file transfers, SCP is a recommended method for transferring files securely over a network. SNMPv2 (Simple Network Management Protocol version 2) is not a file transfer protocol, but rather a network management protocol.

    Rate this question:

  • 44. 

    QUESTION NO: 344 Which of the following would accelerate repeated access requests for static web content?

    • A.

      A caching engine

    • B.

      A traffic shaper

    • C.

      A load balancer

    • D.

      A redundant switch

    Correct Answer
    A. A caching engine
    Explanation
    A caching engine would accelerate repeated access requests for static web content by storing a copy of the content on the server or in a local cache. When a user requests the content again, the caching engine can retrieve it from the cache instead of fetching it from the original source. This reduces the latency and network traffic associated with accessing the content, resulting in faster response times for subsequent requests.

    Rate this question:

  • 45. 

    QUESTION NO: 345 Which of the following tools should be used to physically attach an RJ-45 connector to a CAT5 cable?

    • A.

      Snips

    • B.

      Screwdriver

    • C.

      Punch down tool

    • D.

      Crimping tool

    Correct Answer
    D. Crimping tool
    Explanation
    A crimping tool should be used to physically attach an RJ-45 connector to a CAT5 cable. This tool is specifically designed to crimp or compress the connector onto the cable, creating a secure and reliable connection. Snips are used for cutting wires, a screwdriver is used for tightening or loosening screws, and a punch down tool is used for terminating wires on a punch down block. However, none of these tools are suitable for attaching an RJ-45 connector to a CAT5 cable.

    Rate this question:

  • 46. 

    QUESTION NO: 346 A wireless network is created for six computers . Five connect correctly? one machine sees the wireless network but will not connect. Which of the following should the technician do?

    • A.

      Ensure the failed computer has the correct WEP key.

    • B.

      Restart the wireless router.

    • C.

      Remove the WEP key from the router.

    • D.

      Change the WEP key on the router.

    Correct Answer
    A. Ensure the failed computer has the correct WEP key.
    Explanation
    The correct answer is to ensure the failed computer has the correct WEP key. This is because the question states that the machine sees the wireless network but will not connect. This suggests that the issue is with the authentication or security settings, which in this case is the WEP key. By ensuring that the failed computer has the correct WEP key, the technician can resolve the problem and allow the computer to connect to the wireless network.

    Rate this question:

  • 47. 

    QUESTION NO: 347 Which of the following IEEE standards describes the power output of a standard switch port?

    • A.

      802.3ab

    • B.

      802.3ae

    • C.

      802.3af

    • D.

      802.3aa

    Correct Answer
    C. 802.3af
    Explanation
    IEEE 802.3af is the correct answer because it is the standard that describes the power output of a standard switch port. This standard, also known as Power over Ethernet (PoE), allows network devices to receive power and data over the same Ethernet cable. It specifies the maximum power that can be delivered to a device, typically up to 15.4 watts. This standard is commonly used to power devices such as IP phones, wireless access points, and security cameras, simplifying installation and reducing the need for separate power cables.

    Rate this question:

  • 48. 

    QUESTION NO: 348 Which of the following can operate at both layers 2 and 3 of the OSI model?

    • A.

      Bridge

    • B.

      Switch

    • C.

      Repeater

    • D.

      Hub

    Correct Answer
    B. Switch
    Explanation
    A switch is capable of operating at both layers 2 and 3 of the OSI model. At layer 2, it functions as a bridge, forwarding data packets based on their MAC addresses. At layer 3, it can also perform routing functions, forwarding packets based on their IP addresses. This dual functionality allows switches to efficiently connect devices within a local network (layer 2) as well as route traffic between different networks (layer 3).

    Rate this question:

  • 49. 

    QUESTION NO: 349 Which of the following authentication methods allows for domain level authentication on a wireless network?

    • A.

      WAP

    • B.

      TKIP

    • C.

      RADIUS

    • D.

      WEP

    Correct Answer
    C. RADIUS
    Explanation
    RADIUS (Remote Authentication Dial-In User Service) is an authentication method that allows for domain level authentication on a wireless network. It is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service. RADIUS allows for authentication of users against a central database, such as Active Directory, which enables domain level authentication on a wireless network. WAP (Wireless Application Protocol) is a protocol for accessing information over a mobile wireless network, TKIP (Temporal Key Integrity Protocol) is an encryption protocol, and WEP (Wired Equivalent Privacy) is a security algorithm for wireless networks.

    Rate this question:

  • 50. 

    QUESTION NO: 350 Which of the following routing protocol uses a state algorithm?

    • A.

      BGP

    • B.

      RIP

    • C.

      OSPF

    • D.

      RIPv2

    Correct Answer
    C. OSPF
    Explanation
    OSPF (Open Shortest Path First) is a routing protocol that uses a state algorithm. This means that OSPF routers maintain information about the network topology and exchange this information with other OSPF routers to calculate the shortest path to each destination. By using a state algorithm, OSPF is able to dynamically adapt to changes in the network and efficiently route traffic. BGP (Border Gateway Protocol) is a path vector protocol, RIP (Routing Information Protocol) is a distance vector protocol, and RIPv2 is an enhanced version of RIP, but none of these protocols use a state algorithm.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.