Networking 005 Part 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By SGogola
S
SGogola
Community Contributor
Quizzes Created: 3 | Total Attempts: 578
| Attempts: 108
SettingsSettings
Please wait...
  • 1/100 Questions

    Joe, a technician, is configuring a wireless access point. Which of the following channels should he use if the LEAST interference potential is desired?

    • 1, 6, 11
    • 2, 5, 10
    • 3, 7, 10
    • 7, 8, 9
Please wait...
About This Quiz


Networking 005 comes in 3 parts and this one forms the 2nd part of it. It tests your understanding, comprehension and knowledge of both the hardware and software involved in networking. Use it to your advantage.

Networking 005 Part 2 - Quiz

Quiz Preview

  • 2. 

    Which of the following networking protocols would Kurt, a technician, use to standardize correct time on network devices?

    • NTP

    • RTP

    • FTP

    • TFTP

    Correct Answer
    A. NTP
    Explanation
    Kurt, as a technician, would use NTP (Network Time Protocol) to standardize correct time on network devices. NTP is a protocol used to synchronize the clocks of network devices, ensuring accurate timekeeping across the network. It allows devices to obtain time information from a reliable time source, such as an atomic clock or a time server, and adjust their clocks accordingly. This ensures that all devices on the network have the same time, which is crucial for various network operations and services. RTP (Real-time Transport Protocol), FTP (File Transfer Protocol), and TFTP (Trivial File Transfer Protocol) are not specifically designed for time synchronization purposes.

    Rate this question:

  • 3. 

    Joe, a network technician, is installing multiple 802.11 g WAPs with the same SSID. Which of the following channel combinations would allow all three WAPs to operate without interfering with each other?

    • 1, 6, 11

    • 2, 6, 10

    • 3, 5, 9

    • 7, 9, 11

    Correct Answer
    A. 1, 6, 11
    Explanation
    The correct answer is 1, 6, 11. This is because these channel combinations are non-overlapping channels in the 2.4 GHz frequency band. By using these channels, the WAPs can operate without interfering with each other, as they are on different frequencies.

    Rate this question:

  • 4. 

    Karen, a network administrator, has discovered attempts to penetrate the network and access the customer database. Which of the following methods could she use to provide a false customer database to the attacker?

    • Radius

    • DMZ

    • Honeypot

    • Kerberos

    Correct Answer
    A. Honeypot
    Explanation
    Karen, the network administrator, can use a honeypot method to provide a false customer database to the attacker. A honeypot is a decoy system or network that is designed to attract and trap potential attackers. By creating a fake customer database within the honeypot, Karen can deceive the attacker into thinking they have successfully accessed the real database while monitoring their activities and gathering information about their techniques and intentions. This allows Karen to gain valuable insights into the attacker's methods and enhance the network's security measures.

    Rate this question:

  • 5. 

    Kurt, a user, is able to connect to a distant wireless network then loses connection. This is an ongoing problem for Kurt and the only wireless network around. Which of the following is MOST likely causing this problem?

    • Signal strength

    • Encryption type

    • Incorrect SSID

    • Incorrect channel

    Correct Answer
    A. Signal strength
    Explanation
    The most likely cause of Kurt's ongoing problem with connecting to the distant wireless network is the signal strength. If the signal strength is weak or intermittent, Kurt may be able to initially connect but then lose connection. This could be due to obstacles between Kurt and the wireless access point, such as walls or distance, causing a weak signal.

    Rate this question:

  • 6. 

    Which of the following tools allows Kurt, an administrator, to test connectivity between two computers?

    • Route

    • Ping

    • Ipconfig

    • Tfconfig

    Correct Answer
    A. Ping
    Explanation
    Ping is a tool that allows administrators to test connectivity between two computers. It sends a small packet of data from one computer to another and measures the time it takes for the packet to be sent and received. By analyzing the results, administrators can determine if there is a connection issue between the two computers, such as high latency or packet loss. This tool is commonly used for troubleshooting network connectivity problems and verifying if a computer is reachable on a network.

    Rate this question:

  • 7. 

    Which of the following describes the purpose of DHCP?

    • Applying prioritization to certain types of network traffic.

    • Resolving FQDNs to IP addresses

    • Filtering web content based on keywords

    • Dynamic assignment of IP addresses.

    Correct Answer
    A. Dynamic assignment of IP addresses.
    Explanation
    The purpose of DHCP is to dynamically assign IP addresses to devices on a network. DHCP eliminates the need for manual IP configuration, allowing devices to automatically obtain an IP address, subnet mask, default gateway, and other network configuration parameters. This simplifies network management and ensures efficient use of IP addresses by allowing them to be reused when devices are no longer connected to the network. DHCP also provides flexibility by allowing IP address leases to be renewed or released, enabling devices to easily join or leave the network without manual intervention.

    Rate this question:

  • 8. 

    Joe, a customer, is looking to implement wireless security. Which of the following provides the WEAKEST encryption?

    • SSH

    • WEP

    • TLS

    • EAP

    Correct Answer
    A. WEP
    Explanation
    WEP (Wired Equivalent Privacy) provides the weakest encryption among the given options. WEP is an older and less secure encryption protocol for wireless networks. It uses a static encryption key and has several vulnerabilities that can be exploited by attackers, making it relatively easy to crack the encryption and gain unauthorized access to the network. SSH (Secure Shell), TLS (Transport Layer Security), and EAP (Extensible Authentication Protocol) are all stronger encryption protocols compared to WEP.

    Rate this question:

  • 9. 

    Joe, a user, accidentally unplugs a cable from the patch panel and plugs it into the switch stack. Now, all users are unable to access any network resources. Which of the following is the MOST likely cause?

    • EMI

    • Mismatched MTUs

    • Looping

    • Faulty module

    Correct Answer
    A. Looping
    Explanation
    When Joe accidentally unplugs a cable from the patch panel and plugs it into the switch stack, it creates a loop in the network. This means that the network traffic is continuously circulating in the loop, causing a broadcast storm. As a result, all users are unable to access any network resources. This is the most likely cause of the network issue. EMI, mismatched MTUs, and a faulty module may cause network problems, but they are less likely to cause a complete network outage for all users.

    Rate this question:

  • 10. 

    Which of the following identifies the WLAN Joe, a user, is connected to?

    • SSID

    • Frequency

    • WEP

    • Channel

    Correct Answer
    A. SSID
    Explanation
    The SSID (Service Set Identifier) is a unique name that identifies a wireless network. It is used by devices to connect to a specific WLAN (Wireless Local Area Network). In this case, Joe, the user, is connected to a WLAN, and the SSID is what identifies that specific network. The other options, such as Frequency, WEP (Wired Equivalent Privacy), and Channel, are not used to identify the WLAN, but rather represent different aspects of wireless networks.

    Rate this question:

  • 11. 

    Which of the following layers of the OSI model is above the Session layer?

    • Data link

    • Presentation

    • Physical

    • Transport

    Correct Answer
    A. Presentation
    Explanation
    The Presentation layer in the OSI model is responsible for the formatting and encryption of data to be transmitted across the network. It ensures that the data is in a compatible format for the receiving device. The Session layer, which is below the Presentation layer, establishes, maintains, and terminates communication sessions between applications. Therefore, the Presentation layer is above the Session layer in the OSI model.

    Rate this question:

  • 12. 

    Which of the following technologies has different upload and download speeds?

    • OC12

    • SDSL

    • OC3

    • ADSL

    Correct Answer
    A. ADSL
    Explanation
    ADSL (Asymmetric Digital Subscriber Line) is the correct answer because it has different upload and download speeds. ADSL is designed to provide faster download speeds than upload speeds, making it suitable for activities such as browsing the internet, streaming videos, and downloading files. This asymmetry in speeds allows for efficient utilization of the available bandwidth, as most users typically require faster download speeds for consuming content rather than uploading large files. In contrast, technologies like OC12, OC3, and SDSL offer symmetrical upload and download speeds.

    Rate this question:

  • 13. 

    Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices?

    • PKI

    • TACACS+

    • CHAP

    • SSH

    Correct Answer
    A. TACACS+
    Explanation
    TACACS+ is an authentication, authorization, and accounting (AAA) method that provides administrative access to network devices. TACACS+ stands for Terminal Access Controller Access Control System Plus and it is a protocol that separates the authentication, authorization, and accounting processes. It allows network administrators to centrally manage and control access to network devices, ensuring that only authorized users can access and make changes to the devices. TACACS+ provides a high level of security and flexibility, making it a commonly used method for managing network device access.

    Rate this question:

  • 14. 

    Karen, an administrator, finds a phone line but does not know where the line goes or if it is active. Which of the following can be used to test if it is active?

    • Butt set

    • Punch down tool

    • Cable tester

    • Cable stripper

    Correct Answer
    A. Butt set
    Explanation
    A butt set is a device used to test telephone lines. It can be connected to the phone line in question to determine if it is active. By using a butt set, Karen can listen for a dial tone or make test calls to verify if the line is active or not.

    Rate this question:

  • 15. 

    Joe, a network technician, has configured a server with the following IP settings: IP Address: 192.168.1.40/27 Default Gateway: 192.168.1.64 DNS: 192.168.1.33 The server cannot access the Internet. Which of the following settings needs to be changed?

    • Default gateway

    • IP address

    • VLAN

    • DNS

    Correct Answer
    A. Default gateway
    Explanation
    The default gateway needs to be changed. The current default gateway address (192.168.1.64) is not within the same subnet as the server's IP address (192.168.1.40/27). The default gateway should be within the same subnet as the server's IP address in order for the server to access the Internet.

    Rate this question:

  • 16. 

    Which of the following ports would Kurt, a technician, need to open on a firewall to allow SSH on the default port?

    • 20

    • 21

    • 22

    • 23

    Correct Answer
    A. 22
    Explanation
    Kurt would need to open port 22 on the firewall to allow SSH on the default port. SSH (Secure Shell) is a protocol used for secure remote access to a computer or server. By opening port 22, Kurt would enable incoming SSH connections on the firewall, allowing users to securely access the system using SSH.

    Rate this question:

  • 17. 

    Joe, a company executive, has noticed that a wireless network signal from the company's WAP can be seen in the company's parking lot. Joe is very worried that this is a potential security threat. Which of the following can be done to eliminate this threat?

    • Implement WEP encryption

    • Decrease signal strength

    • Change wireless channels

    • Rotate the SSID daily

    Correct Answer
    A. Decrease signal strength
    Explanation
    Decreasing the signal strength of the wireless network can help eliminate the potential security threat of the signal being visible in the company's parking lot. By reducing the signal strength, the range of the network will be limited, making it harder for unauthorized individuals to access the network from outside the company's premises. This can help enhance the overall security of the network and protect sensitive information from being compromised.

    Rate this question:

  • 18. 

    Which of the following layers of the OSI model would a NIC operate on?

    • Physical

    • Network

    • Session

    • Transport

    Correct Answer
    A. Physical
    Explanation
    A NIC (Network Interface Card) operates on the Physical layer of the OSI model. This layer is responsible for the transmission and reception of raw bit streams over a physical medium, such as cables or wireless signals. The NIC handles tasks like encoding and decoding data into electrical or optical signals, as well as handling physical connections and network hardware.

    Rate this question:

  • 19. 

    Which of the following defines the purpose of a DHCP scope?

    • To allocate a preset range of MAC addresses available for assignment

    • To tell a DHCP server to exclude IP addresses.

    • To properly configure a DHCP server's allowed bandwidth level.

    • To allocate a preset range of IP addresses available for assignment

    Correct Answer
    A. To allocate a preset range of IP addresses available for assignment
    Explanation
    The purpose of a DHCP scope is to allocate a preset range of IP addresses available for assignment. DHCP (Dynamic Host Configuration Protocol) is used to automatically assign IP addresses to devices on a network. A DHCP scope defines the range of IP addresses that the DHCP server can assign to devices. By defining a scope, the DHCP server knows which IP addresses are available for assignment and can assign them to devices as needed. This allows for efficient and automatic IP address allocation on a network.

    Rate this question:

  • 20. 

    Which of the following tools would Sandy, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together?

    • Cable tester

    • Toner probe

    • Cable crimper

    • Punch down tool

    Correct Answer
    A. Toner probe
    Explanation
    A toner probe is the best tool for tracing a wire through an area where multiple wires of the same color are twisted together. A toner probe is used to identify and trace wires by sending a tone through one end of the wire and using the probe to detect the tone at the other end. This allows the technician to accurately locate and trace the specific wire they are looking for, even if it is twisted together with other wires of the same color.

    Rate this question:

  • 21. 

    Which of the following is a purpose of a VLAN?

    • Decreases bandwidth on a network

    • Segments broadcast traffic

    • Increases port speed

    • Allows another connection to the router

    Correct Answer
    A. Segments broadcast traffic
    Explanation
    A VLAN, or Virtual Local Area Network, is a network segmentation technique that allows for the creation of multiple virtual networks within a single physical network. One of the main purposes of VLANs is to segment broadcast traffic. By dividing a network into smaller VLANs, broadcast traffic is contained within each VLAN, reducing the overall amount of broadcast traffic on the network and improving network performance and efficiency. This segmentation helps to isolate and control network traffic, enhancing security and network management capabilities.

    Rate this question:

  • 22. 

    Which of the following allows for multiple operating systems to be run simultaneously on a single server?

    • Dual boot

    • Multiple hard drives

    • PXE boot

    • Virtual machines

    Correct Answer
    A. Virtual machines
    Explanation
    Virtual machines allow for multiple operating systems to be run simultaneously on a single server. A virtual machine is a software emulation of a physical computer, allowing for the creation and operation of multiple virtual machines on a single physical server. Each virtual machine can run its own operating system, independent of the others, allowing for greater flexibility and efficiency in resource allocation. This enables organizations to consolidate their server infrastructure, reduce hardware costs, and easily manage and scale their IT environments.

    Rate this question:

  • 23. 

    Joe, a customer, has reported that the wireless signal from a WAP can only be found in one specific corner of a conference room. Which of the following is the MOST likely cause?

    • Incorrect encryption method

    • Incorrect antenna type

    • Incorrect channel

    • Incorrect SSID identifier

    Correct Answer
    A. Incorrect antenna type
    Explanation
    The most likely cause for the wireless signal from a WAP only being found in one specific corner of a conference room is an incorrect antenna type. Different antenna types have different coverage patterns and ranges. If the WAP is equipped with an antenna that has a narrow coverage pattern or limited range, it would explain why the signal is only strong in one corner of the room.

    Rate this question:

  • 24. 

    Which of the following terms correctly defines the event in which multiple dynamic routers agree on the state of the network?

    • Convergence

    • Spanning tree

    • Port mirroring

    • Link state

    Correct Answer
    A. Convergence
    Explanation
    Convergence is the correct term that defines the event in which multiple dynamic routers agree on the state of the network. Convergence refers to the process in which routers exchange information and update their routing tables to reach a consistent view of the network topology. This ensures that all routers have the same information about the network and can make accurate routing decisions.

    Rate this question:

  • 25. 

    Which of the following is a reason to use dynamic DNS?

    • The host IP address is not listed in the firewall

    • The host IP address is assigned by DHCP.

    • Static routes cannot be used on the host network.

    • A third-party certificate is being used.

    Correct Answer
    A. The host IP address is assigned by DHCP.
    Explanation
    Dynamic DNS is used when the host IP address is assigned by DHCP. DHCP assigns IP addresses dynamically, which means they can change over time. Dynamic DNS allows the host to update its IP address with a DNS server so that it can still be reached using a domain name, even if its IP address changes. This is particularly useful for devices that are constantly connecting and disconnecting from the network or for devices that have a dynamic IP address assigned by their internet service provider.

    Rate this question:

  • 26. 

    Which of the following is the MAIN purpose of a packet sniffer?

    • To determine open ports on a server

    • To ensure encryption is being used

    • To analyze network traffic

    • To prevent network intrusion

    Correct Answer
    A. To analyze network traffic
    Explanation
    A packet sniffer is a tool used to capture and analyze network traffic. It allows network administrators to monitor and analyze the data packets flowing through a network. By capturing and examining these packets, network administrators can gain insights into network performance, troubleshoot issues, detect anomalies, and identify potential security threats. Therefore, the main purpose of a packet sniffer is to analyze network traffic.

    Rate this question:

  • 27. 

    Which of the following technologies is used on cellular networks?

    • Ethernet

    • CDMA

    • CSMA/CA

    • POTS

    Correct Answer
    A. CDMA
    Explanation
    CDMA stands for Code Division Multiple Access, which is a technology used on cellular networks. It allows multiple users to share the same frequency band simultaneously by assigning unique codes to each user. This enables efficient use of the available bandwidth and increases the capacity of the network. CDMA is widely used in 2G, 3G, and 4G cellular networks for voice and data communication.

    Rate this question:

  • 28. 

    Kurt, a user, is having difficulty connecting a laptop to the company's wireless network. The technician determines Kurt’s wireless NIC has failed and replaces it. Which of the following network troubleshooting methodology steps should the technician do NEXT?

    • Implement the solution

    • Verify full system functionality

    • Test the theory to determine cause

    • Establish a plan of action to resolve the problem

    Correct Answer
    A. Verify full system functionality
    Explanation
    After replacing Kurt's wireless NIC, the technician should verify the full system functionality. This step is important to ensure that the replacement of the wireless NIC has resolved the issue and that Kurt is now able to connect to the company's wireless network without any difficulty. By verifying the full system functionality, the technician can confirm that the problem has been resolved and that Kurt's laptop is now functioning properly.

    Rate this question:

  • 29. 

    Sandy, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis?

    • TDR

    • Protocol analyzer

    • Multimeter

    • Cable crimper

    Correct Answer
    A. TDR
    Explanation
    A Time Domain Reflectometer (TDR) is a network tool used to locate cable faults. It sends a signal down the cable and measures the time it takes for the signal to bounce back. By analyzing the time it takes for the signal to return, Sandy can determine the distance to the cable issue. Therefore, a TDR will confirm her analysis that the issue is 50 yards (46 meters) from the location.

    Rate this question:

  • 30. 

    Which of the following is the broadcast address for a network defined as 192.168.0.0/24?

    • 192.168.0.255

    • 192.168.0.1

    • 192.168.0.0

    • 192.168.0.253

    Correct Answer
    A. 192.168.0.255
    Explanation
    The broadcast address for a network is the address that is used to send a message to all devices on the network. In this case, the network is defined as 192.168.0.0/24, which means it has a subnet mask of 255.255.255.0. The last octet of the network address is all zeros (192.168.0.0), and the last octet of the broadcast address should be all ones. Therefore, the correct broadcast address is 192.168.0.255.

    Rate this question:

  • 31. 

    Which of the following media types will block EMI?

    • UTP

    • Serial

    • STP

    • Non-plenum

    Correct Answer
    A. STP
    Explanation
    STP stands for Shielded Twisted Pair, which is a type of media cable that has a metallic shield around each individual pair of wires. This shielding helps to block electromagnetic interference (EMI) from external sources. Therefore, STP is the correct answer as it is specifically designed to block EMI and ensure better signal quality and reliability in data transmission. UTP (Unshielded Twisted Pair) does not have this shielding, making it more susceptible to EMI. Serial and Non-plenum are not media types and do not provide any EMI blocking capabilities.

    Rate this question:

  • 32. 

    Which of the following network performance methods would Sandy, a technician, use with SIP phones?

    • CARP

    • Load balancing

    • Qos

    • Caching engines

    Correct Answer
    A. Qos
    Explanation
    Sandy, as a technician, would use Quality of Service (QoS) with SIP phones. QoS is a network performance method that prioritizes and manages network traffic to ensure that critical applications, such as voice and video calls, receive the necessary bandwidth and are not affected by other non-priority traffic. By implementing QoS, Sandy can optimize the performance and reliability of SIP phones, ensuring high-quality voice communication.

    Rate this question:

  • 33. 

    Which of the following BEST describes the point at which an ISP's responsibility for an Internet connection ends?

    • Router

    • MDF

    • IDF

    • Demarc

    Correct Answer
    A. Demarc
    Explanation
    The term "Demarc" is short for "demarcation point," which is the point where the responsibility of an ISP (Internet Service Provider) for an internet connection ends. It refers to the physical location where the ISP's network ends and the customer's network begins. At this point, the ISP is no longer responsible for the connection and any issues beyond the demarcation point are the customer's responsibility.

    Rate this question:

  • 34. 

    Which of the following would Sandy, a technician, find in a network map?

    • QoS standards

    • MDF/IDFs

    • System logs

    • Firewall rules

    Correct Answer
    A. MDF/IDFs
    Explanation
    Sandy, as a technician, would find MDF/IDFs in a network map. MDF stands for Main Distribution Frame, which is a centralized point where all the network cables from different locations are terminated. IDF stands for Intermediate Distribution Frame, which is a smaller distribution point that connects the end devices to the MDF. In a network map, MDF/IDFs are typically depicted to show the physical layout of the network and the connections between different locations.

    Rate this question:

  • 35. 

    When examining a suspected faulty copper network cable. Karen, the administrator, notices that some of the pairs are untwisted too much. This is MOST likely causing which of the following?

    • DB loss

    • Dispersion

    • Collisions

    • Cross-talk

    Correct Answer
    A. Cross-talk
    Explanation
    When the pairs in a copper network cable are untwisted too much, it can cause cross-talk. Cross-talk refers to the interference between adjacent pairs of wires in the cable. When the pairs are untwisted, the electromagnetic signals from one pair can bleed into the adjacent pairs, leading to signal degradation and potential data transmission errors. Therefore, the excessive untwisting of pairs in a copper network cable is most likely causing cross-talk.

    Rate this question:

  • 36. 

    Karen, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem?

    • Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.

    • Use the DB-9 port with a DB-9 to RJ-45 adapter on the server

    • Manually adjust the duplex mode on the server1 slink.

    • Configure the laptop to receive a DHCP address from the server, rather than manually setting one

    Correct Answer
    A. Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.
    Explanation
    Swapping wires 1, 2 and 3, 6 on one end of the connecting cable would most likely fix the IP connectivity problem. This is because RJ-45 ports use these wires for transmitting and receiving data, and if they are not properly connected, it can cause connectivity issues. By swapping these wires, the connection between the laptop and the server will be established correctly, allowing for proper IP connectivity.

    Rate this question:

  • 37. 

    Sandy, an administrator, is responsible for one Linux and two Windows servers. She would like to review all server logs centrally. Which of the following services could Sandy use in this scenario?

    • Event logs

    • Baselines

    • Change management

    • Syslog

    Correct Answer
    A. Syslog
    Explanation
    Sandy, as an administrator responsible for multiple servers, can use the Syslog service to review all server logs centrally. Syslog is a standard protocol used for sending and receiving log messages in a network. It allows logs from different systems to be collected and stored in a central location, making it easier for administrators like Sandy to monitor and analyze server activity. By using Syslog, Sandy can efficiently manage and review logs from both the Linux and Windows servers she oversees.

    Rate this question:

  • 38. 

    Which of the following DNS records would allow for a website to have more than one FQDN?

    • TXT

    • PTR

    • MX

    • CNAME

    Correct Answer
    A. CNAME
    Explanation
    A CNAME (Canonical Name) record allows a website to have more than one Fully Qualified Domain Name (FQDN). It is used to create an alias for a domain name, pointing it to another domain name. This means that multiple FQDNs can be associated with the same website, allowing users to access the website using different domain names. For example, if a website has the FQDN "www.example.com", a CNAME record can be created to associate "blog.example.com" with "www.example.com", allowing users to access the website using either domain.

    Rate this question:

  • 39. 

    Which of the following commands can Sandy, a technician, use on a server to display the default router setting?

    • Ping

    • Nslookup

    • Route

    • Arp

    Correct Answer
    A. Route
    Explanation
    Sandy, the technician, can use the "route" command on a server to display the default router setting. This command allows her to view and manage the routing table, which contains information about how data packets should be forwarded from one network to another. By using the "route" command, Sandy can check the default gateway or router that the server is using to send and receive network traffic.

    Rate this question:

  • 40. 

    Kurt, a network technician, has configured a new firewall on the network. Users are reporting errors when attempting to access several websites. Kurt attempts to access several popular websites with no errors, however, he does receive an error when attempting to access a bank website. Which of the following rules would BEST allow access to the bank website?

    • Allow UDP port 53

    • Allow TCP port 80

    • Allow UDP port 340

    • Allow TCP port 443

    Correct Answer
    A. Allow TCP port 443
    Explanation
    The correct answer is to allow TCP port 443. This is because TCP port 443 is the standard port used for secure web browsing using HTTPS. The bank website likely uses HTTPS to encrypt the communication between the user's browser and the server, ensuring secure transmission of sensitive information such as login credentials and financial data. By allowing TCP port 443, the firewall will allow the necessary traffic for accessing the bank website securely.

    Rate this question:

  • 41. 

    Karen, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?

    • MS-CHAP

    • Kerberos

    • TACACS+

    • PKI

    Correct Answer
    A. TACACS+
    Explanation
    TACACS+ would be the best user authentication to implement for troubleshooting a remote router within the WAN. TACACS+ (Terminal Access Controller Access Control System Plus) is a protocol that provides centralized authentication, authorization, and accounting services for network devices. It allows for granular control over user access and privileges, making it ideal for troubleshooting and managing network devices remotely. MS-CHAP (Microsoft Challenge Handshake Authentication Protocol), Kerberos, and PKI (Public Key Infrastructure) are also authentication methods, but they may not offer the same level of control and flexibility as TACACS+ in this specific scenario.

    Rate this question:

  • 42. 

    Which of the following is the loopback address for IPv6?

    • ::1

    • ::255

    • 127.0.0.1

    • 127:0:0:1

    Correct Answer
    A. ::1
    Explanation
    The loopback address for IPv6 is represented as ::1. This address is used to test network connectivity on a local machine. It is equivalent to the IPv4 loopback address 127.0.0.1. The "::" notation represents a sequence of zeros in an IPv6 address, and the "1" represents the loopback interface. Therefore, "::1" is the correct loopback address for IPv6.

    Rate this question:

  • 43. 

    Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links?

    • VLAN

    • MPLS

    • VPN

    • PSTN

    Correct Answer
    A. MPLS
    Explanation
    MPLS (Multiprotocol Label Switching) is a technique used by telecommunications carriers to segregate customer traffic over long fiber links. It allows for the creation of virtual private networks (VPNs) and enables the routing of traffic based on labels, improving network performance and efficiency. VLAN (Virtual Local Area Network) is used to segregate traffic within a local area network, while VPN is a secure connection over a public network. PSTN (Public Switched Telephone Network) is a traditional telephone network.

    Rate this question:

  • 44. 

    Joe, a customer, wants to have wireless network access only in the conference room. He has placed a WAP in the room, but notices that offices across the hall also receive a wireless signal. Which of the following could be done together to solve this problem? (Select TWO).

    • Turn down the signal gain

    • Increase the encryption method

    • Change the wireless channel.

    • Replace the WAP’s antennas with directional antennas

    • Disable the SSID

    Correct Answer(s)
    A. Turn down the signal gain
    A. Replace the WAP’s antennas with directional antennas
    Explanation
    To solve the problem of the wireless signal reaching offices across the hall, two actions can be taken. First, turning down the signal gain will reduce the strength of the signal, limiting its range and preventing it from reaching the offices. Second, replacing the WAP's antennas with directional antennas will allow the signal to be focused in a specific direction, specifically towards the conference room, minimizing signal leakage to other areas. Increasing the encryption method, changing the wireless channel, and disabling the SSID are unrelated to the issue of signal leakage and therefore not applicable in this scenario.

    Rate this question:

  • 45. 

    Which of the following devices will allow Sandy, a user, to see a cached copy of websites?

    • Content switch

    • DNS server

    • Proxy server

    • Load balancer

    Correct Answer
    A. Proxy server
    Explanation
    A proxy server allows users to access cached copies of websites. When a user requests a website, the proxy server retrieves the content from the original server and stores it in its cache. If another user requests the same website, the proxy server can deliver the cached copy instead of retrieving it again from the original server. This improves performance and reduces bandwidth usage. Therefore, a proxy server is the correct device that allows Sandy to see a cached copy of websites.

    Rate this question:

  • 46. 

    Which of the following protocols does a router use to communicate packets to other routers?

    • RIP

    • VLAN

    • STP

    • VTP

    Correct Answer
    A. RIP
    Explanation
    A router uses the Routing Information Protocol (RIP) to communicate packets to other routers. RIP is a dynamic routing protocol that uses distance-vector algorithms to determine the best path for packets to reach their destination. It exchanges routing information with neighboring routers, allowing them to update their routing tables and make informed decisions about packet forwarding. RIP is commonly used in small to medium-sized networks and is known for its simplicity and ease of configuration.

    Rate this question:

  • 47. 

    Which of the following capabilities of a firewall allows Kurt, an administrator, to block traffic based on keywords determined by the company?

    • Stateless traffic monitor

    • Stateful traffic monitor

    • Signature identification

    • Content filter

    Correct Answer
    A. Content filter
    Explanation
    A content filter is a capability of a firewall that allows an administrator to block traffic based on keywords determined by the company. It examines the content of the network traffic and compares it against a set of predefined keywords or patterns. If any match is found, the firewall can block or restrict the traffic. This helps in enforcing the company's security policies and preventing the transmission of sensitive or unauthorized information.

    Rate this question:

  • 48. 

    Joe, a technician, is asked to install a new wireless router, and make sure access to the new wireless network is secured. Which of the following should be considered for security?

    • The router has the correct antenna type

    • The router has SSID disabled.

    • The router is compatible with 802.11g.

    • The router is broadcasting on the correct frequency.

    Correct Answer
    A. The router has SSID disabled.
    Explanation
    Disabling the SSID (Service Set Identifier) on a wireless router can enhance security by making the network less visible to potential unauthorized users. When the SSID is disabled, the network name is not broadcasted, making it harder for attackers to detect and target the network. This can help prevent unauthorized access and protect the network from potential security threats.

    Rate this question:

  • 49. 

    After a brownout, Kurt, a user, can connect to the internal network, but not the Internet. Which of the following is the company's DSL router experiencing that is causing this issue?

    • Switching loop

    • Power failure

    • Broadcast storm

    • Duplicate IP address

    Correct Answer
    A. Power failure
    Explanation
    After a brownout, which is a temporary drop in voltage, Kurt is able to connect to the internal network but not the Internet. This indicates that the company's DSL router is experiencing a power failure. A power failure would cause the router to lose connectivity to the Internet while still allowing connections to the internal network.

    Rate this question:

Quiz Review Timeline (Updated): Mar 11, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 11, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • May 08, 2012
    Quiz Created by
    SGogola
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.