Network+ (N10-004) Quiz G

60 Questions | Total Attempts: 152

SettingsSettingsSettings
Network Plus Quizzes & Trivia

301-360


Questions and Answers
  • 1. 
    QUESTION NO: 301 A user is reporting that their inquiries to the database server keep timing out. Which of the following tools would be BEST suited to troubleshoot the issue?
    • A. 

      Cable tester

    • B. 

      Packet analyzer

    • C. 

      Tone probe

    • D. 

      Butt set

  • 2. 
    QUESTION NO: 302 Which of the following connector types would a technician utilize with fiber lines by pushing it directly into the port without twisting?
    • A. 

      RJ-45

    • B. 

      ST

    • C. 

      SC

    • D. 

      BNC

  • 3. 
    QUESTION NO: 303 A client is using a device that allows them to synchronize their wireless device to their computer, but the device must be within 3 feet (1 meter) in order for the synchronization to complete. Which of the following BEST describes the type of wireless device being used?
    • A. 

      WiFi

    • B. 

      Bluetooth

    • C. 

      Serial

    • D. 

      Infrared

  • 4. 
    QUESTION NO: 304 A technician is building a new network. Which of the following components would be the FIRST installed for the network?
    • A. 

      MDF

    • B. 

      VPN

    • C. 

      EMI

    • D. 

      IDF

  • 5. 
    QUESTION NO: 305 After a technician came out and installed a new wireless router, one of the wired workstations began having problems connecting to the file server. This is only an intermittent problem. Which of tile following actions will the technician MOST likely perform to resolve this problem?
    • A. 

      Move the router's location.

    • B. 

      Check the cable ends.

    • C. 

      Check user permissions

    • D. 

      Change the router's SSID.

  • 6. 
    QUESTION NO: 306 A network device that is used to connect multiple devices without segmenting a network is a:
    • A. 

      Router.

    • B. 

      Bridge.

    • C. 

      Hub.

    • D. 

      Switch.

  • 7. 
    QUESTION NO: 307 A mail server was recently placed in the network. The users report email is slow. Upon closer inspection a technician notices that error counters on the interface are incrementing. Which of the following could be causing the problem?
    • A. 

      Wrong subnet mask

    • B. 

      Duplex mismatch

    • C. 

      Port speed mismatch

    • D. 

      Switch loop

  • 8. 
    QUESTION NO: 308 A technician has just fmished implementing a solution for a network issue. Which of the following steps in troubleshooting should the technician do NEXT?
    • A. 

      Docmnent the issue and the solution that was implemented.

    • B. 

      Escalate the issue to another technician

    • C. 

      Test if the solution works and identify other effects it may have.

    • D. 

      Gather information about the issue.

  • 9. 
    QUESTION NO: 309 A technician notices that when trying to ping a workstation by network name the workstation does not reply back over the network. The workstation is part of the domain and is able to get to the Intemet. Which of the following is the cause of the problem?
    • A. 

      Faulty cable on the workstation

    • B. 

      Wrong host name on the workstation

    • C. 

      Wrong WINS on the workstation

    • D. 

      Incorrect IP address assigned to the workstation

  • 10. 
    QUESTION NO: 310 Which of the following network performance optimization methods slows or restricts traffic to increase the performance of other types of traffic? (Select TWO).
    • A. 

      Load balancing

    • B. 

      Traffic shaping

    • C. 

      High availability

    • D. 

      Caching engines

    • E. 

      QoS

  • 11. 
    QUESTION NO: 311 A user has plugged a computer into a switch port and now is unable to access any server resources on the network. Which of the following are the MOST likely reasons for the access problem? (Select TWO).
    • A. 

      The spanning tree protocol has locked down the port.

    • B. 

      The computer is connected to a port in the wrong VLAN.

    • C. 

      The appropriate credentials have not been supplied for network access.

    • D. 

      A port mirroring session was started and is interfering with the connection.

    • E. 

      The computer is cOlmected to an incorrect PoE port.

  • 12. 
    QUESTION NO: 312 A company has just added a new conference room. The network administrator has decided to add six new data ports to this room. The administrator has verified that all the cabling is terminated and functioning correctly. Which of the following should the administ:rator do next?
    • A. 

      Update the network base line.

    • B. 

      Update the wiring diagrams.

    • C. 

      Move some data across each port.

    • D. 

      Check all of the cables with the OTDR.

  • 13. 
    QUESTION NO: 313 A network technician wants to add fault tolerance to a file server. Which of the following should the technician do?
    • A. 

      Install the latest NIC driver

    • B. 

      Add an additional DNS server and modify the MX record

    • C. 

      Upgrade the NIC to a one Gigabit card

    • D. 

      Add an additional NIC and setup network teaming

  • 14. 
    QUESTION NO: 314 Which of the following VPN protocols runs over port 1723 and allows enclyption to be done at the data level?
    • A. 

      SLIP

    • B. 

      PPPoE

    • C. 

      PPTP

    • D. 

      RAS

  • 15. 
    QUESTION NO: 315 Which of the following network devices would an administrator have to configure channels on?
    • A. 

      Hub

    • B. 

      Unmanaged switch

    • C. 

      Firewall

    • D. 

      Wireless access point

  • 16. 
    QUESTION NO: 316 A network technician is installing a series of three access points to cover the entire wing of a building. Only one access point has a wired connection. 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points?
    • A. 

      Channels 1-3-5

    • B. 

      Channels 6-6-6

    • C. 

      Channels 7-11-1

    • D. 

      Channels 5-5-5

  • 17. 
    QUESTION NO: 317 Which of the following outlines the purpose of using a proxy server in an enterprise environment?
    • A. 

      Allows the administrator to block malicious attacks on the network

    • B. 

      Allows the user to access hard to find websites

    • C. 

      Allows the client to get a fixed IP address when added to the network

    • D. 

      Allows granular control over the traffic between the local LAN and the Internet

  • 18. 
    QUESTION NO: 318 An administrator is using a packet analyzer across a single switch but is only receiving partial packet information. Which of the following would need to be implemented on the switch for the administrator?
    • A. 

      Port authentication

    • B. 

      Port mirroring

    • C. 

      Spanning tree

    • D. 

      VLAN

  • 19. 
    QUESTION NO: 319 Which of the following cable types is typically used to connect a hub to a hub that does not support MDI-X?
    • A. 

      Straight

    • B. 

      Loopback

    • C. 

      Crossover

    • D. 

      Rollover

  • 20. 
    QUESTION NO: 320 Which of the following features from the switch eliminates a delay in acquiring an IP address?
    • A. 

      Update the SNMP strings.

    • B. 

      Change the duplex mode to half-duplex.

    • C. 

      Enable spanning tree on the interface.

    • D. 

      Enable trunking

  • 21. 
    QUESTION NO: 321 Which of the following is the component in a wiring system designed to support legacy phone systems?
    • A. 

      Fiber conduit

    • B. 

      66 block

    • C. 

      110 block

    • D. 

      Patch panels

  • 22. 
    QUESTION NO: 322 Which of the following protocols allows usernames and passwords to be transmitted asclear-text?
    • A. 

      PAP

    • B. 

      RADIUS

    • C. 

      CHAP

    • D. 

      SSH

  • 23. 
    QUESTION NO: 323 Which of the following will allow certain ports to be part of the same group while other ports within that switch are part of a different group? 
    • A. 

      Trunking

    • B. 

      Port authentication

    • C. 

      Enabling VLANs

    • D. 

      Enabling VTP

  • 24. 
    QUESTION NO: 324 When preparing to place a RJ-4S connector on  a CATS5cable, which of the following tools would BEST be used to prepare the cable?
    • A. 

      Polishing kit

    • B. 

      Pliers

    • C. 

      Razor knife

    • D. 

      Snips

  • 25. 
    QUESTION NO: 325 Which of the following authentication protocols uses certificates to negotiate access to the network?
    • A. 

      EAP-TLS

    • B. 

      PAP

    • C. 

      CHAP

    • D. 

      Kerberos

  • 26. 
    QUESTION NO: 326 Which of the following components allows a technician to use short Ethernet cables to connect cable drops to other devices?
    • A. 

      EDF

    • B. 

      MDF

    • C. 

      Demarc extension

    • D. 

      Patch panel

  • 27. 
    QUESTION NO: 327 Which of the following is the strongest type of wireless encryption?
    • A. 

      AES

    • B. 

      RADIUS

    • C. 

      WEP

    • D. 

      TKlP

  • 28. 
    QUESTION NO: 328 Which of the following wireless communication standards allows for communication at both 2.4GHz and 5GHz frequencies?
    • A. 

      802.11b

    • B. 

      802. 11a

    • C. 

      802.11n

    • D. 

      802.11g

  • 29. 
    QUESTION NO: 329 Which of the following network security devices prevents users from propagating viruses?
    • A. 

      IPS

    • B. 

      Firewall

    • C. 

      IDS

    • D. 

      Content engine

  • 30. 
    QUESTION NO: 330 A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used?
    • A. 

      RIPv2

    • B. 

      IGRP

    • C. 

      IS-IS

    • D. 

      BGP

  • 31. 
    QUESTION NO: 331 Which of the following network devices operates on Layer 1 of the OSI model?
    • A. 

      Bridge

    • B. 

      Switch

    • C. 

      Hub

    • D. 

      Router

  • 32. 
    QUESTION NO: 332 After re-configuring a server to facilitate DNS requests, which of the following would help provide the highest level of fault tolerance?
    • A. 

      Adding a Kerberos server

    • B. 

      Configuring traffic shaping

    • C. 

      Configuring WEP

    • D. 

      Adding a second NIC

  • 33. 
    QUESTION NO: 333 Which of the following devices controls traffic on a LAN?
    • A. 

      Switch

    • B. 

      Hub

    • C. 

      Repeater

    • D. 

      Bridge

  • 34. 
    QUESTION NO: 334 Which of the following network media has the longest maximum segment length?
    • A. 

      CAT6

    • B. 

      Single Mode Fiber

    • C. 

      Coaxial cable

    • D. 

      Multimode Fiber

  • 35. 
    QUESTION NO: 335 Which of the following are the IEEE designations for the spanning tree protocol? (Select TWO).
    • A. 

      802.1x

    • B. 

      802.1p

    • C. 

      802.1d

    • D. 

      802.1w

    • E. 

      802.1n

  • 36. 
    QUESTION NO: 336 A network technician is trying to find out the NETBIOS name of another workstation using its IP address, which of the following commands would be used to find this information?
    • A. 

      Nbtstat

    • B. 

      Netstat

    • C. 

      Ipconfig

    • D. 

      Ping

  • 37. 
    QUESTION NO: 337 Which of the following cable standards is used for Ethernet over fiber?
    • A. 

      LOOOBase-T

    • B. 

      1000Base-CX

    • C. 

      1 OOBase-TX

    • D. 

      LOBase-FL

  • 38. 
    QUESTION NO: 338 An employee is receiving an access denied error message when they try to access a network resource. Which of the following troubleshooting steps should the technician perform FIRST?
    • A. 

      Identify what the employee cannot access

    • B. 

      Implement an action plan to resolve the issue

    • C. 

      Document the process

    • D. 

      Ask the employee what has changed since yesterday

  • 39. 
    QUESTION NO: 339 A technician is installing a basic router for a SOHO network. After installing the router the PCs connected to it are not able to acquire an IP address. Which of the following did the technician fail to configure correctly?
    • A. 

      NAT

    • B. 

      DHCP

    • C. 

      WlNS

    • D. 

      DNS

  • 40. 
    QUESTION NO: 340 Internet connectivity for a company is mission critical. The technician must be notified if the Internet router has failed. Which of the following is the BEST method to monitor this device?
    • A. 

      SLIP

    • B. 

      SFTP

    • C. 

      SMTP

    • D. 

      SNMP

  • 41. 
    QUESTION NO: 341 Which of the following Layer 2 devices is used to connect multiple nodes on a network?
    • A. 

      DHCP server

    • B. 

      Router

    • C. 

      Switch

    • D. 

      Blidge

  • 42. 
    QUESTION NO: 342 A network technician is responsible for setting up four branch offices for a company. Each office will have 12 hosts, but needs the ability to expand to 16 hosts. Which of the following subnet masks should be chosen?
    • A. 

      255.255.255.224

    • B. 

      255.255.255.248

    • C. 

      255.255.255 .16

    • D. 

      255.255.255.240

  • 43. 
    QUESTION NO: 343 Which of the following is a secure method for file transfer to a network device?
    • A. 

      SNMPv2

    • B. 

      TFTP

    • C. 

      SCP

    • D. 

      FTP

  • 44. 
    QUESTION NO: 344 Which of the following would accelerate repeated access requests for static web content?
    • A. 

      A caching engine

    • B. 

      A traffic shaper

    • C. 

      A load balancer

    • D. 

      A redundant switch

  • 45. 
    QUESTION NO: 345 Which of the following tools should be used to physically attach an RJ-45 connector to a CAT5 cable?
    • A. 

      Snips

    • B. 

      Screwdriver

    • C. 

      Punch down tool

    • D. 

      Crimping tool

  • 46. 
    QUESTION NO: 346 A wireless network is created for six computers . Five connect correctly? one machine sees the wireless network but will not connect. Which of the following should the technician do?
    • A. 

      Ensure the failed computer has the correct WEP key.

    • B. 

      Restart the wireless router.

    • C. 

      Remove the WEP key from the router.

    • D. 

      Change the WEP key on the router.

  • 47. 
    QUESTION NO: 347 Which of the following IEEE standards describes the power output of a standard switch port?
    • A. 

      802.3ab

    • B. 

      802.3ae

    • C. 

      802.3af

    • D. 

      802.3aa

  • 48. 
    QUESTION NO: 348 Which of the following can operate at both layers 2 and 3 of the OSI model?
    • A. 

      Bridge

    • B. 

      Switch

    • C. 

      Repeater

    • D. 

      Hub

  • 49. 
    QUESTION NO: 349 Which of the following authentication methods allows for domain level authentication on a wireless network?
    • A. 

      WAP

    • B. 

      TKIP

    • C. 

      RADIUS

    • D. 

      WEP

  • 50. 
    QUESTION NO: 350 Which of the following routing protocol uses a state algorithm?
    • A. 

      BGP

    • B. 

      RIP

    • C. 

      OSPF

    • D. 

      RIPv2

  • 51. 
    QUESTION NO: 351 The data center power will not be restored for several hours. Which of the following can be implemented in the future to allow the data center to keep running?
    • A. 

      Connect all the switches to a batter backup

    • B. 

      Connect all the switches to a generator.

    • C. 

      Connect the data centers power to a generator.

    • D. 

      Connect the data centers power to a UPS.

  • 52. 
    QUESTION NO: 352 Which of the following WAN technology types would MOST likely be used in a SOHO enviromnent with a few network devices?
    • A. 

      Frame relay

    • B. 

      Cable modem

    • C. 

      ATM

    • D. 

      E1/T1

  • 53. 
    QUESTION NO: 353 Which of the following protocols is used for transmitting email?
    • A. 

      SCP

    • B. 

      SFTP

    • C. 

      SMTP

    • D. 

      SNMP

  • 54. 
    QUESTION NO: 354 According to the OSI model, which of the following layers is responsible for providing reliable communication?
    • A. 

      Data Link

    • B. 

      Transport

    • C. 

      Network

    • D. 

      Session

  • 55. 
    QUESTION NO: 355 In a network constructed using star topology, all the devices are connecting to one central device known as the:
    • A. 

      Router.

    • B. 

      Repeater.

    • C. 

      Hub.

    • D. 

      Gateway

  • 56. 
    QUESTION NO: 356 When would a technician use plenum-rated cable?
    • A. 

      When installing cable in ceilings

    • B. 

      If transmission speeds greater than lOOMbps are required

    • C. 

      When installing cable in damp environments

    • D. 

      Where EMI may be an issue

  • 57. 
    QUESTION NO: 357 Which of the following is part of the IP protocol suite and is used to monitor network managed devices?
    • A. 

      LDAP

    • B. 

      SMTP

    • C. 

      SNMP

    • D. 

      SMB

  • 58. 
    QUESTION NO: 358 A user reports that they cannot access any network resources. Which of the following tools would a technician use to troubleshoot the problem?
    • A. 

      Cable tester

    • B. 

      TDR

    • C. 

      Certifier

    • D. 

      Butt set

  • 59. 
    QUESTION NO: 359 Which of the following wireless technologies uses the 5GHz spectrum?
    • A. 

      802.11n

    • B. 

      801.11g

    • C. 

      802.11b

    • D. 

      802.11a

  • 60. 
    QUESTION NO: 360 Users at a remote office connected to headquarters are using a dynamic routing protocol. There are several paths to headquarters in the event of a route failure. The network technician has noticed that when a failure occurs there is a time lag of several minutes until service is restored. Which of the following describes the time lag?
    • A. 

      Convergence

    • B. 

      Update algorithm

    • C. 

      Static routing

    • D. 

      Distance-vector