Networking 005 Part 3

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By SGogola
S
SGogola
Community Contributor
Quizzes Created: 3 | Total Attempts: 578
| Attempts: 110
SettingsSettings
Please wait...
  • 1/100 Questions

    Which of the following is the network topology in which computers connect to form a straight line?

    • Ring
    • Star
    • Bus
    • Mesh
Please wait...
About This Quiz


Networking 005 parts 3 is a quiz set and designed to test and advance your networking knowledge on both the hardware components and software knowledge of networking. It is a good avenue to study and revise for exams.

Networking 005 Part 3 - Quiz

Quiz Preview

  • 2. 

    In the 2.4GHz range, which of the following channel combinations are non-overlapping?

    • 1, 6, 11

    • 2, 7, 10

    • 2, 8, 13

    • 3, 6, 9

    Correct Answer
    A. 1, 6, 11
    Explanation
    The 2.4GHz range is divided into 14 channels, but only channels 1, 6, and 11 are non-overlapping. This means that these channels can be used simultaneously without causing interference to each other. Channels 2, 7, 10, 2, 8, 13, and 3, 6, 9 are overlapping channels and using them together can result in interference and degraded performance.

    Rate this question:

  • 3. 

    Which of the following ports is the default telnet port?

    • 20

    • 21

    • 22

    • 23

    Correct Answer
    A. 23
    Explanation
    The default telnet port is port number 23. Telnet is a network protocol used for remote terminal connections. It allows users to access and manage remote computers or devices over a network. Port number 23 is the standard port used for telnet communication, and it is the correct answer to this question.

    Rate this question:

  • 4. 

    A router that takes the workstations internal IP address and changes it to another IP address when it sends the data outside of the network is and example of which of the following?

    • NAT

    • IDS

    • NMAP

    • DMZ

    Correct Answer
    A. NAT
    Explanation
    NAT stands for Network Address Translation. It is a technology used by routers to translate the internal IP addresses of devices in a private network to a different IP address when sending data outside of the network. This allows multiple devices to share a single public IP address. In this case, the router is performing NAT by changing the internal IP address of the workstation to another IP address before sending the data outside of the network.

    Rate this question:

  • 5. 

    Which of the following is the port number used by HTTP?

    • 21

    • 80

    • 443

    • 3389

    Correct Answer
    A. 80
    Explanation
    The port number used by HTTP is 80. HTTP (Hypertext Transfer Protocol) is the protocol used for transmitting and receiving web pages and other resources on the internet. Port numbers are used to identify specific processes or services on a computer or network. In the case of HTTP, port 80 is the default port number used for communication between web browsers and web servers.

    Rate this question:

  • 6. 

    Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?

    • This is a private address which cannot be seen by external users

    • The address does not have the appropriate subnet mask assigned.

    • This is a public address which can only be seen by internal users.

    • This is a private address which can only be seen by external users

    Correct Answer
    A. This is a private address which cannot be seen by external users
    Explanation
    The reason this will ultimately not work is because a private address, such as 10.0.0.15, cannot be seen by external users. Private addresses are reserved for internal use within a network and are not routable on the internet. Therefore, external users attempting to access the FQDN mapped to this private address will not be able to reach the internal server.

    Rate this question:

  • 7. 

    Which of the following basic devices blocks ports and can sometimes filter data?

    • Repeater

    • Hub

    • Firewall

    • Switch

    Correct Answer
    A. Firewall
    Explanation
    A firewall is a basic device that blocks ports and can sometimes filter data. It acts as a barrier between a trusted internal network and an untrusted external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By blocking specific ports, a firewall can prevent unauthorized access to a network, while also filtering data to ensure that only legitimate and safe traffic is allowed through. This helps to enhance network security and protect against potential threats or attacks.

    Rate this question:

  • 8. 

    A layer 3 switch can move packets between subnets based on which of the following criteria?

    • 802.1q tag

    • Port

    • Application

    • IP address

    Correct Answer
    A. IP address
    Explanation
    A layer 3 switch can move packets between subnets based on the IP address. The IP address is a unique identifier assigned to each device on a network, allowing the layer 3 switch to determine the destination of the packet and route it accordingly. The 802.1q tag is used for VLAN tagging, the port refers to the physical port on the switch, and the application does not play a role in determining the routing of packets between subnets.

    Rate this question:

  • 9. 

    Which of the following wireless technologies can support the MOST allowable MIMO streams?

    • 802.11a

    • 802.11b

    • 802.11g

    • 802.11n

    Correct Answer
    A. 802.11n
    Explanation
    802.11n is the correct answer because it is the only option that supports Multiple-Input Multiple-Output (MIMO) technology. MIMO allows for the transmission and reception of multiple data streams simultaneously, which increases the overall throughput and capacity of the wireless network. 802.11a, 802.11b, and 802.11g do not support MIMO, therefore they cannot support as many allowable MIMO streams as 802.11n.

    Rate this question:

  • 10. 

    Karen, a network administrator, needs to add an additional connection to a room. She adds a new Ethernet switch and must connect it to an existing switch. Which cable type should Karen use to connect the two switches?

    • CAT3cable

    • Serial cable

    • Crossover cable

    • Rollover cable

    Correct Answer
    A. Crossover cable
    Explanation
    Karen should use a crossover cable to connect the two switches. A crossover cable is specifically designed to connect similar devices, such as two switches, without the need for a hub or a router. It allows the transmit and receive signals to be crossed over, enabling the switches to communicate effectively.

    Rate this question:

  • 11. 

    1000BaseT has a MAXIMUM run distance of:

    • 25 meters (82 feet)

    • 100 meters (328 feet)

    • 500 meters (1640 feet)

    • 1000 meters (3280 feet)

    Correct Answer
    A. 100 meters (328 feet)
    Explanation
    The correct answer is 100 meters (328 feet). 1000BaseT is an Ethernet standard that uses twisted pair cables for data transmission. It has a maximum run distance of 100 meters, which means that the cable length between the network devices should not exceed 100 meters for optimal performance. Beyond this distance, there may be signal degradation and loss of data integrity.

    Rate this question:

  • 12. 

    Which of the following protocols is commonly used for VoIP technology?

    • Telnet

    • SMTP

    • SIP

    • SNMP

    Correct Answer
    A. SIP
    Explanation
    SIP (Session Initiation Protocol) is commonly used for VoIP (Voice over Internet Protocol) technology. It is a communication protocol that enables the initiation, modification, and termination of interactive user sessions involving voice, video, and messaging applications. SIP is widely adopted in the telecommunications industry as it allows for efficient and effective communication over IP networks. It facilitates the establishment and management of voice and multimedia sessions, making it the ideal protocol for VoIP technology.

    Rate this question:

  • 13. 

    The location where the Telco wiring stops and the clients wiring starts is known as the:

    • MDF

    • Demarc

    • IDF

    • 66 block

    Correct Answer
    A. Demarc
    Explanation
    The location where the Telco wiring stops and the clients wiring starts is known as the demarcation point or demarc. This is the point where the responsibility for the maintenance and ownership of the wiring changes from the telecommunications company to the client. It is typically marked by a physical demarcation point or a demarcation jack, where the Telco's line terminates and the client's equipment connects. The demarc is an important point for troubleshooting and determining the boundary of responsibility for any connectivity issues.

    Rate this question:

  • 14. 

    When installing two 802.11g access points in the same building, which of the following channels will MOST likely be used to minimize interference?

    • 5 and 6

    • 1 and 6

    • 6 and 10

    • 2 and 6

    Correct Answer
    A. 1 and 6
    Explanation
    To minimize interference, it is best to use non-overlapping channels. In the 2.4 GHz band, there are only three non-overlapping channels: 1, 6, and 11. By using channels 1 and 6, the access points can operate on different frequencies and avoid interfering with each other. This allows for better performance and less interference for the wireless network.

    Rate this question:

  • 15. 

    Which of the following protocols is Joe, a technician, using to encrypt data between web servers and web browsers?

    • SMTP

    • SIP

    • HTTP

    • SSL

    Correct Answer
    A. SSL
    Explanation
    Joe, the technician, is using SSL (Secure Sockets Layer) protocol to encrypt data between web servers and web browsers. SSL is a cryptographic protocol that provides secure communication over the internet. It ensures that the data transmitted between the web server and web browser is encrypted, preventing unauthorized access or tampering of the information. SSL is commonly used for secure online transactions, such as online banking or shopping, to protect sensitive data like credit card information.

    Rate this question:

  • 16. 

    Which of the following metrics indentifies the number of connections that is between two devices?

    • Hop count

    • MTU

    • Latency

    • Bandwidth

    Correct Answer
    A. Hop count
    Explanation
    Hop count is a metric that identifies the number of connections between two devices. It represents the number of routers or network devices that a packet must traverse to reach its destination. A higher hop count indicates a longer path and potentially more latency in the network. Therefore, hop count is a useful metric for measuring the efficiency and performance of a network connection.

    Rate this question:

  • 17. 

    Karen, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Karen purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?

    • Install two CAT6 cables with a repeater

    • Install a 500 foot (152 meter) CAT5 cable.

    • Install a 500 foot (152 meter) CAT5e cable

    • Install three CAT6 cables with a repeater

    Correct Answer
    A. Install two CAT6 cables with a repeater
    Explanation
    Installing two CAT6 cables with a repeater would be the best option instead of the CAT6 cable. This is because the weak signal between the office and the networking equipment suggests that the distance is too long for a single CAT6 cable to maintain a strong signal. By installing two CAT6 cables and using a repeater, the signal can be boosted and maintained over the longer distance.

    Rate this question:

  • 18. 

    Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?

    • A short

    • Open pairs

    • ESD

    • EMI

    Correct Answer
    A. EMI
    Explanation
    The most likely cause of the network issue is electromagnetic interference (EMI). EMI occurs when the network cabling is exposed to electromagnetic fields from power lines, which can disrupt the wireless signals and cause the users' signals to drop.

    Rate this question:

  • 19. 

    A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?

    • Document the solution and process

    • Establish the most probable cause

    • Implement and test the solution

    • Identify additional symptoms and problems

    Correct Answer
    A. Implement and test the solution
    Explanation
    After creating an action plan and solution for the intermittent connectivity problems, the next step for the administrator would be to implement and test the solution. This means actually putting the solution into action and checking if it resolves the connectivity issues. By implementing and testing the solution, the administrator can determine if it is effective or if further adjustments are needed.

    Rate this question:

  • 20. 

    A bridge handles frames at which of the following layers of the OSI model?

    • Network

    • Session

    • Transport

    • Data Link

    Correct Answer
    A. Data Link
    Explanation
    A bridge handles frames at the Data Link layer of the OSI model. The Data Link layer is responsible for the reliable transfer of data between adjacent network nodes and provides error detection and correction. Bridges operate at this layer by examining the MAC addresses in the frames and making forwarding decisions based on this information. They connect two or more network segments together, allowing for the transfer of data between them.

    Rate this question:

  • 21. 

    A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?

    • WEP

    • Port filtering

    • WPA

    • Longer SSID broadcast intervals

    Correct Answer
    A. WPA
    Explanation
    WPA (Wi-Fi Protected Access) is the best security measure to use for strong wireless security at minimal cost. WPA provides better security than WEP (Wired Equivalent Privacy) as it uses stronger encryption algorithms and authentication methods. Port filtering is not specifically a wireless security measure and may not provide adequate protection. Longer SSID broadcast intervals may help in reducing the visibility of the wireless network, but it does not provide strong security. Therefore, WPA is the most suitable option for the given scenario.

    Rate this question:

  • 22. 

    Which of the following describes the location where an administrator would terminate a bundle of CAT5e cables?

    • Switch

    • Smart jack

    • Router

    • Patch panel

    Correct Answer
    A. Patch panel
    Explanation
    A patch panel is the location where an administrator would terminate a bundle of CAT5e cables. A patch panel is a device that allows multiple network cables to be connected and organized in one central location. It provides a convenient and organized way to manage and troubleshoot network connections. By terminating the CAT5e cables at a patch panel, the administrator can easily make changes or repairs to the network without having to directly access the individual cables.

    Rate this question:

  • 23. 

    Joe, a user, can no longer access the accounting file share, but others are still able to access the share. Which of the following would be the FIRST step in troubleshooting the issue?

    • Notify senior management of the issue

    • Develop a probable cause theory.

    • Ask Joe if anything has changed on the system.

    • Escalate the issue to the vendor.

    Correct Answer
    A. Ask Joe if anything has changed on the system.
    Explanation
    The first step in troubleshooting the issue would be to ask Joe if anything has changed on the system. By doing so, it can help identify if there have been any recent changes or updates that may have caused Joe's inability to access the accounting file share. This information can then be used to narrow down the possible causes and determine the appropriate solution.

    Rate this question:

  • 24. 

    Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?

    • 802.11a

    • 802.11b

    • 802.11g

    • 802.11n

    Correct Answer
    A. 802.11n
    Explanation
    802.11n can support the greatest distance on either 2.4GHz or 5GHz frequencies compared to the other options. This is because 802.11n uses multiple-input multiple-output (MIMO) technology, which allows for multiple antennas to be used for transmitting and receiving data. This results in improved range and coverage compared to older wireless technologies like 802.11a, 802.11b, and 802.11g.

    Rate this question:

  • 25. 

    Which of the following regulates the amount of network traffic a single node receives in a server cluster?

    • Load balancer

    • Proxy server

    • Content filter

    • Quality of service

    Correct Answer
    A. Load balancer
    Explanation
    A load balancer is a device or software that distributes network traffic across multiple servers or nodes in a server cluster. It helps regulate the amount of network traffic that each individual node receives by evenly distributing the workload. This ensures that no single node is overwhelmed with too much traffic, which can lead to performance issues or system failure. Therefore, a load balancer is the correct answer for regulating network traffic in a server cluster.

    Rate this question:

  • 26. 

    Which of the following would contain information regarding network device alerts using SNMP?

    • Syslog

    • Audit log

    • History log

    • Ping sweep reports

    Correct Answer
    A. Syslog
    Explanation
    Syslog is a standard protocol used to collect and send system log messages in a network. It is commonly used to monitor and troubleshoot network devices. By analyzing the syslog messages, administrators can gather information about network device alerts using SNMP (Simple Network Management Protocol). SNMP is a protocol used to manage and monitor network devices. Therefore, syslog would contain the necessary information regarding network device alerts using SNMP.

    Rate this question:

  • 27. 

    Joe, an administrator, is using a punch-down tool to connect a cable. To which of the following is Joe MOST likely connecting?

    • A 110 block

    • A demarc

    • A DB-9

    • A smart jack

    Correct Answer
    A. A 110 block
    Explanation
    Joe is most likely connecting the cable to a 110 block. A 110 block is a type of punch-down block commonly used in telecommunications and networking to terminate and connect copper wires. It is used to organize and distribute incoming and outgoing wires, allowing for easy connectivity and troubleshooting.

    Rate this question:

  • 28. 

    Which of the following wiring standards would Karen, a technician, MOST likely use to interconnect two devices without the use of a hub or switch?

    • 568A

    • 568B

    • Crossover

    • Loopback

    Correct Answer
    A. Crossover
    Explanation
    Karen would most likely use the crossover wiring standard to interconnect two devices without the use of a hub or switch. Crossover cables are specifically designed to connect two devices directly, without the need for an intermediary device like a hub or switch. This allows for direct communication between the devices, making it an ideal choice in this scenario.

    Rate this question:

  • 29. 

    Which of the following connector types is MOST commonly found with coaxial cabling?

    • DB-9

    • BNC

    • RJ-45

    • RJ-11

    Correct Answer
    A. BNC
    Explanation
    The BNC connector is the most commonly found connector type with coaxial cabling. BNC stands for Bayonet Neill-Concelman and it is widely used for connecting coaxial cables in various applications such as video surveillance systems, television antennas, and computer networks. The BNC connector provides a secure and reliable connection, ensuring good signal transmission and minimizing interference. It is easy to install and remove, making it a popular choice for coaxial cabling.

    Rate this question:

  • 30. 

    Which of the following connector types will MOST likely be located on a serial cable?

    • DB-9

    • LC

    • ST

    • BNC

    Correct Answer
    A. DB-9
    Explanation
    A DB-9 connector is most likely to be located on a serial cable. Serial cables are commonly used to connect devices such as modems, printers, and older computer peripherals. The DB-9 connector is a type of D-subminiature connector that has 9 pins arranged in a D-shaped housing. It is often used for serial communication and is compatible with RS-232 standards.

    Rate this question:

  • 31. 

    Karen, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology?

    • Verify full system functionality and if applicable implement preventative measures

    • Implement the solution or escalate as necessary.

    • Document findings, actions, and outcom

    • Establish a theory of probable cause (e.g. question the obvious).

    Correct Answer
    A. Implement the solution or escalate as necessary.
    Explanation
    The next step in the troubleshooting methodology after establishing a plan of action is to implement the solution or escalate the problem as necessary. This means that Karen should now take the necessary steps to resolve the problem based on the plan that has been established. If she is unable to implement the solution herself, she should escalate the problem to someone who can. This step is crucial in order to move forward with resolving the issue effectively.

    Rate this question:

  • 32. 

    A company wants to secure access to its internal wifeless network. The company wants to use the most secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?

    • WEP encryption

    • Channel rotation

    • Disable SSID

    • WPA encryption

    Correct Answer
    A. WPA encryption
    Explanation
    WPA encryption is the best choice for wireless security in this situation. WPA (Wi-Fi Protected Access) provides stronger security compared to WEP (Wired Equivalent Privacy) encryption. WEP encryption is outdated and vulnerable to attacks. Channel rotation does not directly relate to wireless security. Disabling SSID (Service Set Identifier) can provide some level of security, but it is not as effective as WPA encryption in protecting the network from unauthorized access.

    Rate this question:

  • 33. 

    Which of the following would Karen, a technician, use in voice over IP communications?

    • SNTP

    • SCP

    • SMTP

    • SIP

    Correct Answer
    A. SIP
    Explanation
    Karen, as a technician, would use SIP (Session Initiation Protocol) in voice over IP communications. SIP is a signaling protocol that is used to establish, modify, and terminate multimedia sessions such as voice and video calls over IP networks. It is commonly used in VoIP systems to initiate and manage communication sessions between devices, allowing users to make and receive voice calls over the internet. SNTP (Simple Network Time Protocol), SCP (Secure Copy Protocol), and SMTP (Simple Mail Transfer Protocol) are not specifically related to voice over IP communications.

    Rate this question:

  • 34. 

    Which of the following would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers?

    • Baselines

    • Regulations

    • Logical network diagrams

    • Wiring schematics

    Correct Answer
    A. Logical network diagrams
    Explanation
    Logical network diagrams would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers. These diagrams provide a visual representation of the network infrastructure, including the different VLANs and their connections. By examining the logical network diagram, the administrator can identify the presence of VLANs and their configuration, allowing them to understand how the network is segmented and which servers are part of the VLAN for publicly accessible services. This information is crucial for managing and securing the network effectively.

    Rate this question:

  • 35. 

    Keyword and blacklist filtering would be handled at which level in a network?

    • Layer 2 managed switch

    • DHCP server

    • Hardware firewall

    • Bridge

    Correct Answer
    A. Hardware firewall
    Explanation
    A hardware firewall would be responsible for handling keyword and blacklist filtering at the network level. A hardware firewall is a dedicated device that sits between the internal network and the external network, monitoring and filtering incoming and outgoing traffic. It can be configured to block specific keywords or websites based on predefined rules. This ensures that only authorized and safe traffic is allowed to pass through the network, providing an additional layer of security.

    Rate this question:

  • 36. 

    Which of the following is a multifunction device in a SOHO network?

    • Bandwidth shaper

    • Proxy server

    • Wireless router

    • Load balancer

    Correct Answer
    A. Wireless router
    Explanation
    A wireless router is a multifunction device in a SOHO (Small Office/Home Office) network. It serves as a router, allowing multiple devices to connect to the internet wirelessly. It also functions as a wireless access point, providing wireless connectivity to devices within its range. Additionally, it often includes a built-in switch, allowing wired devices to connect to the network as well. Therefore, a wireless router is a versatile device that combines the functions of routing, wireless access, and switching, making it an essential component in a SOHO network.

    Rate this question:

  • 37. 

    Which of the following is a performance optimization technology?

    • QoS

    • Trunking

    • Spanning

    • VoIP

    Correct Answer
    A. QoS
    Explanation
    QoS, or Quality of Service, is a performance optimization technology that prioritizes certain types of network traffic over others, ensuring that critical data packets receive higher priority and are delivered with minimal delay and loss. It helps to optimize network performance by managing bandwidth allocation, reducing latency, and improving overall network efficiency. By implementing QoS, organizations can ensure that important applications and services, such as VoIP (Voice over Internet Protocol), receive the necessary network resources and deliver a better user experience. Trunking, Spanning, and VoIP are not specifically performance optimization technologies.

    Rate this question:

  • 38. 

    A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?

    • Coaxial

    • CAT3

    • CAT5

    • CAT5e

    Correct Answer
    A. CAT5e
    Explanation
    CAT5e should be purchased because it is capable of supporting a transmission rate of 1Gbps. Coaxial, CAT3, and CAT5 cables do not have the same level of performance and may not be able to achieve the desired transmission rate.

    Rate this question:

  • 39. 

    Which of the following uses a ring topology?

    • DSL

    • Ethernet

    • DOCSIS

    • SONET

    Correct Answer
    A. SONET
    Explanation
    SONET (Synchronous Optical Networking) uses a ring topology. In a ring topology, the network nodes are connected in a circular manner, where each node is connected to exactly two other nodes, forming a closed loop. This allows for data to flow in both directions, providing redundancy and fault tolerance. SONET is commonly used in telecommunications networks to transmit large amounts of data reliably and efficiently over long distances.

    Rate this question:

  • 40. 

    Kurt, a user, on a network cannot access any network resources. The link light on his computer shows that a connection is present. Which of the following is the MOST likely cause of the problem?

    • The wrong cable type has been used

    • IDS has shut down the computer's switch port

    • The port on the switch is configured incorrectly

    • Spanning tree protocol was implemented

    Correct Answer
    A. The port on the switch is configured incorrectly
    Explanation
    The most likely cause of Kurt not being able to access any network resources, despite having a connection present, is that the port on the switch is configured incorrectly. This means that there may be an issue with the settings or configuration of the switch port, preventing Kurt from accessing the network resources.

    Rate this question:

  • 41. 

    Which of the following is the name of the routing update process involved when a change occurs in the routing environment?

    • Supernetting

    • Dynamic

    • Subletting

    • Convergence

    Correct Answer
    A. Convergence
    Explanation
    Convergence is the correct answer because it refers to the process by which routers in a network exchange routing information and update their routing tables to reflect changes in the network topology. When a change occurs in the routing environment, such as a link failure or a new route becoming available, routers need to converge and adjust their routing tables accordingly to ensure efficient and accurate packet forwarding. Convergence is essential for maintaining network connectivity and optimal routing performance.

    Rate this question:

  • 42. 

    Which of the following DNS record types provides the hostname to IP address mapping?

    • A record

    • NS record

    • CNAME record

    • MX record

    Correct Answer
    A. A record
    Explanation
    The A record in DNS (Domain Name System) provides the hostname to IP address mapping. It is used to translate domain names into their corresponding IP addresses. When a user enters a domain name in a web browser, the A record is queried to retrieve the IP address associated with that domain name, allowing the browser to establish a connection to the correct server.

    Rate this question:

  • 43. 

    Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).

    • 22

    • 23

    • 143

    • 161

    • 162

    • 8080

    Correct Answer(s)
    A. 161
    A. 162
    Explanation
    To allow SNMP traffic to pass on its default port, ports 161 and 162 would have to be allowed through the firewall. Port 161 is used for SNMP requests, while port 162 is used for SNMP trap messages. By allowing these ports, the firewall will permit the necessary communication for SNMP traffic to flow through.

    Rate this question:

  • 44. 

    Which of the following DNS records would be queried to locate a company’s mail server?

    • A

    • MX

    • AAAA

    • CNAME

    Correct Answer
    A. MX
    Explanation
    The MX (Mail Exchanger) record is used to locate a company's mail server. This record specifies the mail server responsible for accepting incoming email messages on behalf of the domain. When someone sends an email to a specific domain, the sender's mail server queries the MX record of that domain to determine where to deliver the email. Therefore, the MX record is essential for identifying the mail server associated with a company's domain.

    Rate this question:

  • 45. 

    Which of the following WAN technologies uses a telephone cable?

    • POTS

    • FDDI

    • SONET

    • Cable modem

    Correct Answer
    A. POTS
    Explanation
    POTS stands for Plain Old Telephone Service, which is a traditional telephone system that uses telephone cables to transmit voice signals. Unlike other WAN technologies mentioned in the options, POTS is specifically designed for voice communication over telephone lines. Therefore, POTS is the correct answer as it is the WAN technology that utilizes telephone cables.

    Rate this question:

  • 46. 

    A technician receives an urgent call that the switch in accounting is down. Which of the following should the technician do FIRST to troubleshoot this issue?

    • Identity symptoms and problems

    • Document the process and solutions

    • Establish the most probable cause

    • Escalate if necessary

    Correct Answer
    A. Identity symptoms and problems
    Explanation
    The technician should first identify the symptoms and problems related to the switch in accounting being down. This involves gathering information about any error messages, network connectivity issues, or any other indications of the problem. By understanding the symptoms, the technician can then proceed to troubleshoot and resolve the issue effectively.

    Rate this question:

  • 47. 

    By default, which of the following ports would a network need to have opened to allow for the transmission of incoming and outgoing email? (Select TWO).

    • 21

    • 25

    • 80

    • 110

    • 123

    Correct Answer(s)
    A. 25
    A. 110
    Explanation
    To allow for the transmission of incoming and outgoing email, a network would need to have ports 25 and 110 opened. Port 25 is used for Simple Mail Transfer Protocol (SMTP), which is responsible for sending outgoing email. Port 110 is used for Post Office Protocol version 3 (POP3), which is responsible for receiving incoming email.

    Rate this question:

  • 48. 

    Which of the following improves wireless performance only allowing only one wireless transmission on the network at a time?

    • CSMA/CA

    • CSMA/CD

    • Wireless encryption

    • Wireless bonding

    Correct Answer
    A. CSMA/CA
    Explanation
    CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) improves wireless performance by allowing only one wireless transmission on the network at a time. It is a protocol used in wireless networks to avoid collisions between data packets. Before transmitting, devices using CSMA/CA listen for ongoing transmissions. If the channel is clear, the device can transmit its data. If the channel is busy, the device waits for a random amount of time before attempting to transmit again. This process helps to avoid collisions and improve the overall performance of the wireless network.

    Rate this question:

  • 49. 

    Creating a uniform user environment throughout the network can BEST be achieved by using which of the following?

    • Honeypots

    • Virtual switches

    • Virtual PBX

    • Virtual desktops

    Correct Answer
    A. Virtual desktops
    Explanation
    Virtual desktops can best achieve creating a uniform user environment throughout the network. Virtual desktops allow users to access their desktop environment from any device, providing a consistent experience regardless of the device being used. This eliminates the need for individual device configurations and ensures that all users have the same access to applications and data. Additionally, virtual desktops can be centrally managed, making it easier to deploy updates and enforce security policies across the network.

    Rate this question:

Quiz Review Timeline (Updated): Feb 28, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 28, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • May 15, 2012
    Quiz Created by
    SGogola
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.