Network+ Quiz J

40 Questions | Total Attempts: 1467

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Network+


Questions and Answers
  • 1. 
    QUESTION NO: 488 The below output is from which of the following utilities? Interface: 172.30.0.104 --- 0x2 Internet Address Physical AddressType 172.30.0.500-30-48-82-72-8c dynamic 172.30.0.25400-30-48-82-65-0e dynamic
    • A. 

      Ping

    • B. 

      Arp

    • C. 

      Nbtstat

    • D. 

      Netstat

  • 2. 
    QUESTION NO: 489 The below output is from which of the following utilities? Active Connections Prato Local Address Foreign Address State TCP COMPUTER1:1085 172.30.0.5:3389 ESTABLISHED TCP COMPUTER1:1089172.30.0.5-microsoft-dsTIME WAIT
    • A. 

      Ping

    • B. 

      Ipconfig

    • C. 

      Nslookup

    • D. 

      Netstat

  • 3. 
    • A. 

      Butt set

    • B. 

      Cable tester

    • C. 

      Multimeter

    • D. 

      Toner probe

  • 4. 
    QUESTION NO: 487 A technician is troubleshooting connectivity issues on a clients machine. The technician needs to see the current NetBIOS configuration and open connections, which of the following commands would allow this information to be displayed?
    • A. 

      Nbtstat

    • B. 

      Netstat

    • C. 

      Msconfig

    • D. 

      Ipconfig

  • 5. 
    QUESTION NO: 485 A tool that is used to capture usernames and passwords on the network is known as a:
    • A. 

      Honey pot.

    • B. 

      Firewall.

    • C. 

      Sniffer

    • D. 

      Proxy server.

  • 6. 
    QUESTION NO: 486 An administrator is implementing a new wireless network. Which of the following is the highest level of wireless encryption that the administrator can run?
    • A. 

      WEP

    • B. 

      WPA2 AES

    • C. 

      WPA2 TKIP

    • D. 

      TTL

  • 7. 
    QUESTION NO: 453 Which of the following protocols maps an IP address to a MAC address?
    • A. 

      RARP

    • B. 

      DHCP

    • C. 

      NTP

    • D. 

      ARP

  • 8. 
    QUESTION NO:454 Which of the following utilities shows the relationship between a MAC address and the corresponding IP address?
    • A. 

      Arp

    • B. 

      Nslookup

    • C. 

      Ipconfig

    • D. 

      Tracert

  • 9. 
    QUESTION NO: 484 A company has one headquarters location and ten remote sites. The remote sites do not need to communicate with each other, just with headquarters. Which of the following is the BEST topology to use?
    • A. 

      Mesh

    • B. 

      Ring

    • C. 

      Hybrid

    • D. 

      Star

  • 10. 
    QUESTION NO: 481 Which of the following can an application layer firewall filter that a network layer firewall cannot?
    • A. 

      HTTP URLs

    • B. 

      Telnet traffic

    • C. 

      ICMP

    • D. 

      HTTP traffic

  • 11. 
    QUESTION NO: 482 A recently installed wireless router needs to be configured to have the highest level of security. Which of the following would MOST likely be used?
    • A. 

      SSL

    • B. 

      WEP

    • C. 

      WPA

    • D. 

      IPSec

  • 12. 
    QUESTION NO: 483 Which of the following command line tools would BEST be used to verify DNS functionality?
    • A. 

      Netstat

    • B. 

      Traceroute

    • C. 

      Dig

    • D. 

      Arp

  • 13. 
    QUESTION NO: 479 An administrator needs to find out a specific NICs MAC address, the IP address of the MC is known. Which of the following network utilities would enable the administrator to discover the MAC address without physically going to the computer?
    • A. 

      Ping

    • B. 

      Netstat

    • C. 

      Nbtstat

    • D. 

      Arp

  • 14. 
    QUESTION NO: 480 Which of the following devices is used for connecting multiple network hosts where the physical signal is always repeated to all ports?
    • A. 

      Bridge

    • B. 

      Router

    • C. 

      Hub

    • D. 

      Switch

  • 15. 
    QUESTION NO: 474 Which of the following network devices routes packets over a wireless network?
    • A. 

      NEC

    • B. 

      WAP

    • C. 

      WEP

    • D. 

      CSU / DSU

  • 16. 
    QUESTION NO: 476 Which of the following is the MOST secure access method?
    • A. 

      RSH

    • B. 

      SFTP

    • C. 

      SNMPv I

    • D. 

      RCP

  • 17. 
    QUESTION NO: 477 After adding a new cable segment to the network, the technician should:
    • A. 

      Document the changes in the business continuity plan.

    • B. 

      Update the wiring schematics.

    • C. 

      Create a new baseline document.

    • D. 

      Update the disaster recovery plan.

  • 18. 
    • A. 

      Port mirroring

    • B. 

      VLANS

    • C. 

      Spanning tree

    • D. 

      Trunking

  • 19. 
    QUESTION NO: 475 Which of the following protocols is used to access files on a remote server?
    • A. 

      ARP

    • B. 

      SIP

    • C. 

      FTP

    • D. 

      NTP

  • 20. 
    QUESTION NO: 473 Which of the following would a technician find 568B standard?
    • A. 

      Network baseline

    • B. 

      Logical network diagram

    • C. 

      Wiring schematic

    • D. 

      Local regulation

  • 21. 
    QUESTION NO: 472 Which of the following wiring standards is depicted below?  Pin 1 WhiteOrange Pin 2 Orange Pin 3 White Green Pin 4 Blue Pin 5 White Blue Pin 6 Green Pin 7 White Brown Pin 8 Brown
    • A. 

      IEEE 1394

    • B. 

      Crossover cable

    • C. 

      568A

    • D. 

      568B

  • 22. 
    QUESTION NO: 471 On a wireless network, a user is able to connect to local resources, but not to the Internet. Which of the following is the MOST likely cause?
    • A. 

      The wireless network card is not working.

    • B. 

      The wireless router does not have DHCP enabled.

    • C. 

      The wireless network card is out of range.

    • D. 

      The gateway is not configured on the router.

  • 23. 
    QUESTION NO: 468 Which of the following is a client-server based authentication software system which maintains user profiles in a central database?
    • A. 

      CHAP

    • B. 

      MS-CHAP

    • C. 

      RADIUS

    • D. 

      EAP

  • 24. 
    QUESTION NO: 469 Which of the following protocols uses port 443?
    • A. 

      SMTP

    • B. 

      FTP

    • C. 

      HTTPS

    • D. 

      HTTP

  • 25. 
    QUESTION NO: 465 How many DSOs are used in a T1?
    • A. 

      24

    • B. 

      30

    • C. 

      23

    • D. 

      31

  • 26. 
    QUESTION NO: 466 Which of the following authentication protocols uses plain text to transmit passwords over the internet?
    • A. 

      RADIUS

    • B. 

      PAP

    • C. 

      CHAP

    • D. 

      Kerberos

  • 27. 
    QUESTION NO: 467 A technician is setting up a public server for their company. The lP address of the server is 19.19.0.1. Which of the following is the default subnet mask for the server?
    • A. 

      255.255.255.255

    • B. 

      255.255.0.0

    • C. 

      255.255.255.0

    • D. 

      255.0.0.0

  • 28. 
    QUESTION NO: 470 When creating a fault tolerant switched network, which of the following will allow for loops in the switched topology while preventing a broadcast storm?
    • A. 

      Spanning tree protocol

    • B. 

      Port mirroring

    • C. 

      Port aggregation

    • D. 

      802.1q VLAN trunking protocol

  • 29. 
    QUESTION NO: 464 Which of the following defines the main purpose of dynamic routing?
    • A. 

      Adapts quickly to network changes without manual entries.

    • B. 

      Enables routing protocols with the least amount of hops.

    • C. 

      Adapts to network changes by making manual changes.

    • D. 

      Reduces domain collisions.

  • 30. 
    QUESTION NO: 463 A client purchases a new wireless printer and wants to be able to bond it to their PDA. Which of the following technologies BEST describes the type of wireless printer that was purchased?
    • A. 

      Bluetooth

    • B. 

      WiFi

    • C. 

      IEEE 1394

    • D. 

      802.11a

  • 31. 
    QUESTION NO: 461 A network technician has addressed an issue where many workstations have lost network connectivity, but is not able to establish the most probable cause. Which of the following steps should be taken next to resolve this issue?
    • A. 

      Escalate the issue to a senior network associate.

    • B. 

      Reboot the computer to try and recreate the issue.

    • C. 

      Determine if anything has changed.

    • D. 

      Document all possible causes.

  • 32. 
    QUESTION NO: 459 Which of the following command line utilities is used to display the IP to Physical address table?
    • A. 

      Netstat

    • B. 

      Arp

    • C. 

      Nbtstat

    • D. 

      Ping

  • 33. 
    QUESTION NO: 460 A network administrator is developing a solution that will allow a new remote site with 400 users access to the Internet using only one public routable IP address. The solution must allow for direct user access to the Internet. Which of the following technologies is the BEST to implement?
    • A. 

      VPN

    • B. 

      DHCP

    • C. 

      PAT

    • D. 

      DNS

  • 34. 
    QUESTION NO: 462 The optimal transmission speed for a CAT5 network cable in a main distribution frame (MDF) is:
    • A. 

      1Mbps

    • B. 

      10Mbps.

    • C. 

      1000Mbps.

    • D. 

      100Mbps.

  • 35. 
    QUESTION NO: 455 A network technician has discovered that passwords are being sent unencrypted over the network. Which of the following network monitoring utilities was used?
    • A. 

      Throughput tester

    • B. 

      Packet sniffer

    • C. 

      VPN concentrator

    • D. 

      Network scanner

  • 36. 
    QUESTION NO: 456 Which of the following advanced features prevents switching loops by using a preferred path?
    • A. 

      Spanning tree

    • B. 

      VLAN

    • C. 

      Port bonding

    • D. 

      Port authentication

  • 37. 
    QUESTION NO: 457 Which of the following port numbers does SSH use?
    • A. 

      21

    • B. 

      22

    • C. 

      23

    • D. 

      20

  • 38. 
    QUESTION NO: 458 Which of the following protocols will help reduce multicast flooding on a layer 2 switch?
    • A. 

      IGMP

    • B. 

      ARP

    • C. 

      SNMP

    • D. 

      ICMP

  • 39. 
    QUESTION NO: 451 Which of the following would a technician need to install to connect a fiber NIC to an Ethernet backbone?
    • A. 

      Hub

    • B. 

      Media converter

    • C. 

      Repeater

    • D. 

      Bridge

  • 40. 
    QUESTION NO: 452 Which of the following protocols describes a connectionless state and does not use acknowledgements?
    • A. 

      POP3

    • B. 

      UDP

    • C. 

      NTP

    • D. 

      TCP