Networking 005 Part 3

100 Questions | Total Attempts: 85

SettingsSettingsSettings
Networking Quizzes & Trivia

Networking 005 parts 3 is a quiz set and designed to test and advance your networking knowledge on both the hardware components and software knowledge of networking. It is a good avenue to study and revise for exams.


Questions and Answers
  • 1. 
    In the 2.4GHz range, which of the following channel combinations are non-overlapping?
    • A. 

      1, 6, 11

    • B. 

      2, 7, 10

    • C. 

      2, 8, 13

    • D. 

      3, 6, 9

  • 2. 
    Which of the following is the port number used by HTTP?
    • A. 

      21

    • B. 

      80

    • C. 

      443

    • D. 

      3389

  • 3. 
    Which of the following is most effective against threats when used with an updated sewer? (Select TWO)
    • A. 

      Kerberos server

    • B. 

      Stateful firewall

    • C. 

      Content filter

    • D. 

      IDS

    • E. 

      VPN concentrator

  • 4. 
    A crossover cable is MOST commonly associated with which of the following layers of the OSI model?
    • A. 

      Session

    • B. 

      Application

    • C. 

      Network

    • D. 

      Physical

  • 5. 
    For security reasons Kurt, a network technician, wants to install a Linux based email server. Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hardware costs?
    • A. 

      VPN concentrator

    • B. 

      Virtual servers

    • C. 

      Wireless

    • D. 

      Multimode fiber

  • 6. 
    A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?
    • A. 

      IS-IS

    • B. 

      BGP

    • C. 

      OSPF

    • D. 

      RIP

  • 7. 
    A layer 3 switch can move packets between subnets based on which of the following criteria?
    • A. 

      802.1q tag

    • B. 

      Port

    • C. 

      Application

    • D. 

      IP address

  • 8. 
    Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?
    • A. 

      Honeynet

    • B. 

      Honeypot

    • C. 

      Vulnerability scanner

    • D. 

      Network based IDS

  • 9. 
    A bridge handles frames at which of the following layers of the OSI model?
    • A. 

      Network

    • B. 

      Session

    • C. 

      Transport

    • D. 

      Data Link

  • 10. 
    Joe, an administrator, is using a punch-down tool to connect a cable. To which of the following is Joe MOST likely connecting?
    • A. 

      A 110 block

    • B. 

      A demarc

    • C. 

      A DB-9

    • D. 

      A smart jack

  • 11. 
    Joe, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and 30. The servers are able to communicate with each other, but are unable to reach the Internet. Joe sees the following information in the switch configuration: Interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Joe is able to ping the router at 192.168.105 1 from the switch. Which of the following is the MOST likely cause of the problem?
    • A. 

      The subnet mask is incorrect

    • B. 

      A routing loop has occurred

    • C. 

      Joe used a crossover cable to connect the switch to the gateway

    • D. 

      The server is missing default-gateway information

  • 12. 
    Which of the following wireless technologies can support the MOST allowable MIMO streams?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11n

  • 13. 
    Which of the following devices should Joe, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?
    • A. 

      Hub

    • B. 

      VLAN

    • C. 

      Router

    • D. 

      Server

  • 14. 
    Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present?
    • A. 

      Reverse ARP

    • B. 

      Full duplex on the fiber link

    • C. 

      PoE

    • D. 

      802.1q trunking

  • 15. 
    Sandy, a user, is unable to access the company website on a laptop. A network technician verifies that the user can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?
    • A. 

      Remotely connect to Sandy’s laptop and review the network configuration settings.

    • B. 

      Ping the web server from inside the network to ensure it is still up and running.

    • C. 

      Check to make sure the company’s website is accessible from the Internet

    • D. 

      Ensure the Ethernet cable is securely plugged into Sandy’s laptop

  • 16. 
    Karen, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology?
    • A. 

      Verify full system functionality and if applicable implement preventative measures

    • B. 

      Implement the solution or escalate as necessary.

    • C. 

      Document findings, actions, and outcom

    • D. 

      Establish a theory of probable cause (e.g. question the obvious).

  • 17. 
    Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11n

  • 18. 
    A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?
    • A. 

      WEP

    • B. 

      Port filtering

    • C. 

      WPA

    • D. 

      Longer SSID broadcast intervals

  • 19. 
    Which of the following ports is the default telnet port?
    • A. 

      20

    • B. 

      21

    • C. 

      22

    • D. 

      23

  • 20. 
    Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?
    • A. 

      This is a private address which cannot be seen by external users

    • B. 

      The address does not have the appropriate subnet mask assigned.

    • C. 

      This is a public address which can only be seen by internal users.

    • D. 

      This is a private address which can only be seen by external users

  • 21. 
    Which of the following is the network topology in which computers connect to form a straight line?
    • A. 

      Ring

    • B. 

      Star

    • C. 

      Bus

    • D. 

      Mesh

  • 22. 
    Users have reported slow access limes when retrieving information from a server on the company’s network. Which of the following tools would provide access time information on each segment of the network to reach the server?
    • A. 

      Arp

    • B. 

      Route

    • C. 

      Ipconfig

    • D. 

      Tracert

  • 23. 
    Karen, a network administrator, needs to add an additional connection to a room. She adds a new Ethernet switch and must connect it to an existing switch. Which cable type should Karen use to connect the two switches?
    • A. 

      CAT3cable

    • B. 

      Serial cable

    • C. 

      Crossover cable

    • D. 

      Rollover cable

  • 24. 
    Which of the following DNS record types provides the hostname to IP address mapping?
    • A. 

      A record

    • B. 

      NS record

    • C. 

      CNAME record

    • D. 

      MX record

  • 25. 
    The selection of the correct punch down tool to use depends on which of the following?
    • A. 

      Connector type

    • B. 

      Demarcation point location

    • C. 

      Block type

    • D. 

      Switch location

Back to Top Back to top