Networking 005 Part 3

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By SGogola
S
SGogola
Community Contributor
Quizzes Created: 3 | Total Attempts: 578
| Attempts: 110 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. Which of the following is the network topology in which computers connect to form a straight line?

Explanation

Bus network topology is the correct answer. In a bus topology, computers are connected in a straight line using a single cable called the bus. All computers share this common communication medium. Each computer sends data on the bus, and the intended recipient receives it. This topology is simple to implement and cost-effective for small networks. However, if the bus cable fails, the entire network may become inoperable.

Submit
Please wait...
About This Quiz
Networking 005 Part 3 - Quiz

Networking 005 parts 3 is a quiz set and designed to test and advance your networking knowledge on both the hardware components and software knowledge of networking. It is a good avenue to study and revise for exams.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. In the 2.4GHz range, which of the following channel combinations are non-overlapping?

Explanation

The 2.4GHz range is divided into 14 channels, but only channels 1, 6, and 11 are non-overlapping. This means that these channels can be used simultaneously without causing interference to each other. Channels 2, 7, 10, 2, 8, 13, and 3, 6, 9 are overlapping channels and using them together can result in interference and degraded performance.

Submit
3. A router that takes the workstations internal IP address and changes it to another IP address when it sends the data outside of the network is and example of which of the following?

Explanation

NAT stands for Network Address Translation. It is a technology used by routers to translate the internal IP addresses of devices in a private network to a different IP address when sending data outside of the network. This allows multiple devices to share a single public IP address. In this case, the router is performing NAT by changing the internal IP address of the workstation to another IP address before sending the data outside of the network.

Submit
4. Which of the following ports is the default telnet port?

Explanation

The default telnet port is port number 23. Telnet is a network protocol used for remote terminal connections. It allows users to access and manage remote computers or devices over a network. Port number 23 is the standard port used for telnet communication, and it is the correct answer to this question.

Submit
5. Which of the following basic devices blocks ports and can sometimes filter data?

Explanation

A firewall is a basic device that blocks ports and can sometimes filter data. It acts as a barrier between a trusted internal network and an untrusted external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By blocking specific ports, a firewall can prevent unauthorized access to a network, while also filtering data to ensure that only legitimate and safe traffic is allowed through. This helps to enhance network security and protect against potential threats or attacks.

Submit
6. Which of the following is the port number used by HTTP?

Explanation

The port number used by HTTP is 80. HTTP (Hypertext Transfer Protocol) is the protocol used for transmitting and receiving web pages and other resources on the internet. Port numbers are used to identify specific processes or services on a computer or network. In the case of HTTP, port 80 is the default port number used for communication between web browsers and web servers.

Submit
7. Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?

Explanation

The reason this will ultimately not work is because a private address, such as 10.0.0.15, cannot be seen by external users. Private addresses are reserved for internal use within a network and are not routable on the internet. Therefore, external users attempting to access the FQDN mapped to this private address will not be able to reach the internal server.

Submit
8. Karen, a network administrator, needs to add an additional connection to a room. She adds a new Ethernet switch and must connect it to an existing switch. Which cable type should Karen use to connect the two switches?

Explanation

Karen should use a crossover cable to connect the two switches. A crossover cable is specifically designed to connect similar devices, such as two switches, without the need for a hub or a router. It allows the transmit and receive signals to be crossed over, enabling the switches to communicate effectively.

Submit
9. 1000BaseT has a MAXIMUM run distance of:

Explanation

The correct answer is 100 meters (328 feet). 1000BaseT is an Ethernet standard that uses twisted pair cables for data transmission. It has a maximum run distance of 100 meters, which means that the cable length between the network devices should not exceed 100 meters for optimal performance. Beyond this distance, there may be signal degradation and loss of data integrity.

Submit
10. Which of the following protocols is commonly used for VoIP technology?

Explanation

SIP (Session Initiation Protocol) is commonly used for VoIP (Voice over Internet Protocol) technology. It is a communication protocol that enables the initiation, modification, and termination of interactive user sessions involving voice, video, and messaging applications. SIP is widely adopted in the telecommunications industry as it allows for efficient and effective communication over IP networks. It facilitates the establishment and management of voice and multimedia sessions, making it the ideal protocol for VoIP technology.

Submit
11. The location where the Telco wiring stops and the clients wiring starts is known as the:

Explanation

The location where the Telco wiring stops and the clients wiring starts is known as the demarcation point or demarc. This is the point where the responsibility for the maintenance and ownership of the wiring changes from the telecommunications company to the client. It is typically marked by a physical demarcation point or a demarcation jack, where the Telco's line terminates and the client's equipment connects. The demarc is an important point for troubleshooting and determining the boundary of responsibility for any connectivity issues.

Submit
12. A layer 3 switch can move packets between subnets based on which of the following criteria?

Explanation

A layer 3 switch can move packets between subnets based on the IP address. The IP address is a unique identifier assigned to each device on a network, allowing the layer 3 switch to determine the destination of the packet and route it accordingly. The 802.1q tag is used for VLAN tagging, the port refers to the physical port on the switch, and the application does not play a role in determining the routing of packets between subnets.

Submit
13. Which of the following wireless technologies can support the MOST allowable MIMO streams?

Explanation

802.11n is the correct answer because it is the only option that supports Multiple-Input Multiple-Output (MIMO) technology. MIMO allows for the transmission and reception of multiple data streams simultaneously, which increases the overall throughput and capacity of the wireless network. 802.11a, 802.11b, and 802.11g do not support MIMO, therefore they cannot support as many allowable MIMO streams as 802.11n.

Submit
14. When installing two 802.11g access points in the same building, which of the following channels will MOST likely be used to minimize interference?

Explanation

To minimize interference, it is best to use non-overlapping channels. In the 2.4 GHz band, there are only three non-overlapping channels: 1, 6, and 11. By using channels 1 and 6, the access points can operate on different frequencies and avoid interfering with each other. This allows for better performance and less interference for the wireless network.

Submit
15. Which of the following protocols is Joe, a technician, using to encrypt data between web servers and web browsers?

Explanation

Joe, the technician, is using SSL (Secure Sockets Layer) protocol to encrypt data between web servers and web browsers. SSL is a cryptographic protocol that provides secure communication over the internet. It ensures that the data transmitted between the web server and web browser is encrypted, preventing unauthorized access or tampering of the information. SSL is commonly used for secure online transactions, such as online banking or shopping, to protect sensitive data like credit card information.

Submit
16. Which of the following metrics indentifies the number of connections that is between two devices?

Explanation

Hop count is a metric that identifies the number of connections between two devices. It represents the number of routers or network devices that a packet must traverse to reach its destination. A higher hop count indicates a longer path and potentially more latency in the network. Therefore, hop count is a useful metric for measuring the efficiency and performance of a network connection.

Submit
17. Karen, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Karen purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?

Explanation

Installing two CAT6 cables with a repeater would be the best option instead of the CAT6 cable. This is because the weak signal between the office and the networking equipment suggests that the distance is too long for a single CAT6 cable to maintain a strong signal. By installing two CAT6 cables and using a repeater, the signal can be boosted and maintained over the longer distance.

Submit
18. Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?

Explanation

The most likely cause of the network issue is electromagnetic interference (EMI). EMI occurs when the network cabling is exposed to electromagnetic fields from power lines, which can disrupt the wireless signals and cause the users' signals to drop.

Submit
19. A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?

Explanation

After creating an action plan and solution for the intermittent connectivity problems, the next step for the administrator would be to implement and test the solution. This means actually putting the solution into action and checking if it resolves the connectivity issues. By implementing and testing the solution, the administrator can determine if it is effective or if further adjustments are needed.

Submit
20. A bridge handles frames at which of the following layers of the OSI model?

Explanation

A bridge handles frames at the Data Link layer of the OSI model. The Data Link layer is responsible for the reliable transfer of data between adjacent network nodes and provides error detection and correction. Bridges operate at this layer by examining the MAC addresses in the frames and making forwarding decisions based on this information. They connect two or more network segments together, allowing for the transfer of data between them.

Submit
21. Which of the following describes the location where an administrator would terminate a bundle of CAT5e cables?

Explanation

A patch panel is the location where an administrator would terminate a bundle of CAT5e cables. A patch panel is a device that allows multiple network cables to be connected and organized in one central location. It provides a convenient and organized way to manage and troubleshoot network connections. By terminating the CAT5e cables at a patch panel, the administrator can easily make changes or repairs to the network without having to directly access the individual cables.

Submit
22. A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?

Explanation

WPA (Wi-Fi Protected Access) is the best security measure to use for strong wireless security at minimal cost. WPA provides better security than WEP (Wired Equivalent Privacy) as it uses stronger encryption algorithms and authentication methods. Port filtering is not specifically a wireless security measure and may not provide adequate protection. Longer SSID broadcast intervals may help in reducing the visibility of the wireless network, but it does not provide strong security. Therefore, WPA is the most suitable option for the given scenario.

Submit
23. Joe, a user, can no longer access the accounting file share, but others are still able to access the share. Which of the following would be the FIRST step in troubleshooting the issue?

Explanation

The first step in troubleshooting the issue would be to ask Joe if anything has changed on the system. By doing so, it can help identify if there have been any recent changes or updates that may have caused Joe's inability to access the accounting file share. This information can then be used to narrow down the possible causes and determine the appropriate solution.

Submit
24. Which of the following regulates the amount of network traffic a single node receives in a server cluster?

Explanation

A load balancer is a device or software that distributes network traffic across multiple servers or nodes in a server cluster. It helps regulate the amount of network traffic that each individual node receives by evenly distributing the workload. This ensures that no single node is overwhelmed with too much traffic, which can lead to performance issues or system failure. Therefore, a load balancer is the correct answer for regulating network traffic in a server cluster.

Submit
25. Which of the following would contain information regarding network device alerts using SNMP?

Explanation

Syslog is a standard protocol used to collect and send system log messages in a network. It is commonly used to monitor and troubleshoot network devices. By analyzing the syslog messages, administrators can gather information about network device alerts using SNMP (Simple Network Management Protocol). SNMP is a protocol used to manage and monitor network devices. Therefore, syslog would contain the necessary information regarding network device alerts using SNMP.

Submit
26. Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?

Explanation

802.11n can support the greatest distance on either 2.4GHz or 5GHz frequencies compared to the other options. This is because 802.11n uses multiple-input multiple-output (MIMO) technology, which allows for multiple antennas to be used for transmitting and receiving data. This results in improved range and coverage compared to older wireless technologies like 802.11a, 802.11b, and 802.11g.

Submit
27. Which of the following wiring standards would Karen, a technician, MOST likely use to interconnect two devices without the use of a hub or switch?

Explanation

Karen would most likely use the crossover wiring standard to interconnect two devices without the use of a hub or switch. Crossover cables are specifically designed to connect two devices directly, without the need for an intermediary device like a hub or switch. This allows for direct communication between the devices, making it an ideal choice in this scenario.

Submit
28. Which of the following connector types is MOST commonly found with coaxial cabling?

Explanation

The BNC connector is the most commonly found connector type with coaxial cabling. BNC stands for Bayonet Neill-Concelman and it is widely used for connecting coaxial cables in various applications such as video surveillance systems, television antennas, and computer networks. The BNC connector provides a secure and reliable connection, ensuring good signal transmission and minimizing interference. It is easy to install and remove, making it a popular choice for coaxial cabling.

Submit
29. Which of the following connector types will MOST likely be located on a serial cable?

Explanation

A DB-9 connector is most likely to be located on a serial cable. Serial cables are commonly used to connect devices such as modems, printers, and older computer peripherals. The DB-9 connector is a type of D-subminiature connector that has 9 pins arranged in a D-shaped housing. It is often used for serial communication and is compatible with RS-232 standards.

Submit
30. Joe, an administrator, is using a punch-down tool to connect a cable. To which of the following is Joe MOST likely connecting?

Explanation

Joe is most likely connecting the cable to a 110 block. A 110 block is a type of punch-down block commonly used in telecommunications and networking to terminate and connect copper wires. It is used to organize and distribute incoming and outgoing wires, allowing for easy connectivity and troubleshooting.

Submit
31. Which of the following is a multifunction device in a SOHO network?

Explanation

A wireless router is a multifunction device in a SOHO (Small Office/Home Office) network. It serves as a router, allowing multiple devices to connect to the internet wirelessly. It also functions as a wireless access point, providing wireless connectivity to devices within its range. Additionally, it often includes a built-in switch, allowing wired devices to connect to the network as well. Therefore, a wireless router is a versatile device that combines the functions of routing, wireless access, and switching, making it an essential component in a SOHO network.

Submit
32. A company wants to secure access to its internal wifeless network. The company wants to use the most secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?

Explanation

WPA encryption is the best choice for wireless security in this situation. WPA (Wi-Fi Protected Access) provides stronger security compared to WEP (Wired Equivalent Privacy) encryption. WEP encryption is outdated and vulnerable to attacks. Channel rotation does not directly relate to wireless security. Disabling SSID (Service Set Identifier) can provide some level of security, but it is not as effective as WPA encryption in protecting the network from unauthorized access.

Submit
33. Which of the following would Karen, a technician, use in voice over IP communications?

Explanation

Karen, as a technician, would use SIP (Session Initiation Protocol) in voice over IP communications. SIP is a signaling protocol that is used to establish, modify, and terminate multimedia sessions such as voice and video calls over IP networks. It is commonly used in VoIP systems to initiate and manage communication sessions between devices, allowing users to make and receive voice calls over the internet. SNTP (Simple Network Time Protocol), SCP (Secure Copy Protocol), and SMTP (Simple Mail Transfer Protocol) are not specifically related to voice over IP communications.

Submit
34. Which of the following is a performance optimization technology?

Explanation

QoS, or Quality of Service, is a performance optimization technology that prioritizes certain types of network traffic over others, ensuring that critical data packets receive higher priority and are delivered with minimal delay and loss. It helps to optimize network performance by managing bandwidth allocation, reducing latency, and improving overall network efficiency. By implementing QoS, organizations can ensure that important applications and services, such as VoIP (Voice over Internet Protocol), receive the necessary network resources and deliver a better user experience. Trunking, Spanning, and VoIP are not specifically performance optimization technologies.

Submit
35. Which of the following would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers?

Explanation

Logical network diagrams would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers. These diagrams provide a visual representation of the network infrastructure, including the different VLANs and their connections. By examining the logical network diagram, the administrator can identify the presence of VLANs and their configuration, allowing them to understand how the network is segmented and which servers are part of the VLAN for publicly accessible services. This information is crucial for managing and securing the network effectively.

Submit
36. Keyword and blacklist filtering would be handled at which level in a network?

Explanation

A hardware firewall would be responsible for handling keyword and blacklist filtering at the network level. A hardware firewall is a dedicated device that sits between the internal network and the external network, monitoring and filtering incoming and outgoing traffic. It can be configured to block specific keywords or websites based on predefined rules. This ensures that only authorized and safe traffic is allowed to pass through the network, providing an additional layer of security.

Submit
37. Karen, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology?

Explanation

The next step in the troubleshooting methodology after establishing a plan of action is to implement the solution or escalate the problem as necessary. This means that Karen should now take the necessary steps to resolve the problem based on the plan that has been established. If she is unable to implement the solution herself, she should escalate the problem to someone who can. This step is crucial in order to move forward with resolving the issue effectively.

Submit
38. A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?

Explanation

CAT5e should be purchased because it is capable of supporting a transmission rate of 1Gbps. Coaxial, CAT3, and CAT5 cables do not have the same level of performance and may not be able to achieve the desired transmission rate.

Submit
39. Which of the following is the name of the routing update process involved when a change occurs in the routing environment?

Explanation

Convergence is the correct answer because it refers to the process by which routers in a network exchange routing information and update their routing tables to reflect changes in the network topology. When a change occurs in the routing environment, such as a link failure or a new route becoming available, routers need to converge and adjust their routing tables accordingly to ensure efficient and accurate packet forwarding. Convergence is essential for maintaining network connectivity and optimal routing performance.

Submit
40. Which of the following uses a ring topology?

Explanation

SONET (Synchronous Optical Networking) uses a ring topology. In a ring topology, the network nodes are connected in a circular manner, where each node is connected to exactly two other nodes, forming a closed loop. This allows for data to flow in both directions, providing redundancy and fault tolerance. SONET is commonly used in telecommunications networks to transmit large amounts of data reliably and efficiently over long distances.

Submit
41. Kurt, a user, on a network cannot access any network resources. The link light on his computer shows that a connection is present. Which of the following is the MOST likely cause of the problem?

Explanation

The most likely cause of Kurt not being able to access any network resources, despite having a connection present, is that the port on the switch is configured incorrectly. This means that there may be an issue with the settings or configuration of the switch port, preventing Kurt from accessing the network resources.

Submit
42. Which of the following DNS record types provides the hostname to IP address mapping?

Explanation

The A record in DNS (Domain Name System) provides the hostname to IP address mapping. It is used to translate domain names into their corresponding IP addresses. When a user enters a domain name in a web browser, the A record is queried to retrieve the IP address associated with that domain name, allowing the browser to establish a connection to the correct server.

Submit
43. Which of the following WAN technologies uses a telephone cable?

Explanation

POTS stands for Plain Old Telephone Service, which is a traditional telephone system that uses telephone cables to transmit voice signals. Unlike other WAN technologies mentioned in the options, POTS is specifically designed for voice communication over telephone lines. Therefore, POTS is the correct answer as it is the WAN technology that utilizes telephone cables.

Submit
44. A technician receives an urgent call that the switch in accounting is down. Which of the following should the technician do FIRST to troubleshoot this issue?

Explanation

The technician should first identify the symptoms and problems related to the switch in accounting being down. This involves gathering information about any error messages, network connectivity issues, or any other indications of the problem. By understanding the symptoms, the technician can then proceed to troubleshoot and resolve the issue effectively.

Submit
45. By default, which of the following ports would a network need to have opened to allow for the transmission of incoming and outgoing email? (Select TWO).

Explanation

To allow for the transmission of incoming and outgoing email, a network would need to have ports 25 and 110 opened. Port 25 is used for Simple Mail Transfer Protocol (SMTP), which is responsible for sending outgoing email. Port 110 is used for Post Office Protocol version 3 (POP3), which is responsible for receiving incoming email.

Submit
46. Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).

Explanation

To allow SNMP traffic to pass on its default port, ports 161 and 162 would have to be allowed through the firewall. Port 161 is used for SNMP requests, while port 162 is used for SNMP trap messages. By allowing these ports, the firewall will permit the necessary communication for SNMP traffic to flow through.

Submit
47. Which of the following DNS records would be queried to locate a company's mail server?

Explanation

The MX (Mail Exchanger) record is used to locate a company's mail server. This record specifies the mail server responsible for accepting incoming email messages on behalf of the domain. When someone sends an email to a specific domain, the sender's mail server queries the MX record of that domain to determine where to deliver the email. Therefore, the MX record is essential for identifying the mail server associated with a company's domain.

Submit
48. Which of the following features should an administrator configure to allow an IDS to watch the traffic on a switch?

Explanation

An administrator should configure the mirroring feature to allow an IDS to watch the traffic on a switch. Mirroring, also known as port mirroring or switch port monitoring, is a feature that allows network traffic to be copied from one port to another. By configuring mirroring, the administrator can direct a copy of all network traffic to the IDS, allowing it to analyze and monitor the traffic for any suspicious or malicious activity. This enables the IDS to effectively detect and prevent any potential security threats on the network.

Submit
49. Which of the following improves wireless performance only allowing only one wireless transmission on the network at a time?

Explanation

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) improves wireless performance by allowing only one wireless transmission on the network at a time. It is a protocol used in wireless networks to avoid collisions between data packets. Before transmitting, devices using CSMA/CA listen for ongoing transmissions. If the channel is clear, the device can transmit its data. If the channel is busy, the device waits for a random amount of time before attempting to transmit again. This process helps to avoid collisions and improve the overall performance of the wireless network.

Submit
50. Creating a uniform user environment throughout the network can BEST be achieved by using which of the following?

Explanation

Virtual desktops can best achieve creating a uniform user environment throughout the network. Virtual desktops allow users to access their desktop environment from any device, providing a consistent experience regardless of the device being used. This eliminates the need for individual device configurations and ensures that all users have the same access to applications and data. Additionally, virtual desktops can be centrally managed, making it easier to deploy updates and enforce security policies across the network.

Submit
51. Users have reported slow access limes when retrieving information from a server on the company's network. Which of the following tools would provide access time information on each segment of the network to reach the server?

Explanation

Tracert is a network diagnostic tool that allows users to trace the route taken by packets from their computer to a destination server. It provides access time information on each segment of the network by displaying the IP addresses of the routers that the packets pass through and the time it takes for the packets to reach each router. By analyzing the output of tracert, users can identify any network segments that are causing slow access times and troubleshoot the issue accordingly.

Submit
52. Which of the following interfaces is used to connect analog devices to the Internet?

Explanation

POTS stands for Plain Old Telephone Service, which is a traditional analog telephone system. It uses copper wires to transmit voice signals over a telephone line. POTS can also be used to connect analog devices, such as fax machines or modems, to the Internet. This is done by converting the analog signals into digital signals that can be transmitted over the Internet. Therefore, POTS is the correct answer for connecting analog devices to the Internet.

Submit
53. Which of the following is an example of a MAC address?

Explanation

The MAC address is a unique identifier assigned to network interfaces for communications on a network. It is a 48-bit address, typically represented as six pairs of hexadecimal digits separated by hyphens or colons. The correct answer, "1A-23-F9-CD-06-9B," follows this format and is a valid example of a MAC address.

Submit
54. An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?

Explanation

To prevent users from being able to plug their PC into the network and receive an IP address, the administrator should use the static addressing scheme. In a static addressing scheme, IP addresses are manually assigned to devices and do not change. This means that users cannot simply plug in their PC and automatically receive an IP address from a DHCP server. By using static addressing, the administrator can have more control over the network and prevent unauthorized devices from connecting.

Submit
55. Joe, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and 30. The servers are able to communicate with each other, but are unable to reach the Internet. Joe sees the following information in the switch configuration: Interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Joe is able to ping the router at 192.168.105 1 from the switch. Which of the following is the MOST likely cause of the problem?

Explanation

The server is missing default-gateway information. This means that the server does not know where to send traffic that is destined for the Internet. The default gateway is the IP address of the router that connects the local network to the Internet. Without this information, the server is unable to route traffic beyond the local network.

Submit
56. Which of the following is used by RADIUS to encrypt messages between the server and the client?

Explanation

RADIUS uses a shared secret to encrypt messages between the server and the client. This shared secret is a piece of information that is known only to the RADIUS server and the client. It is used to authenticate and secure the communication between the two entities. By encrypting the messages with the shared secret, RADIUS ensures that the data exchanged between the server and the client remains confidential and cannot be accessed or tampered with by unauthorized parties.

Submit
57. Which of the following should an administrator do after running a command from the console on the perimeter router?

Explanation

After running a command from the console on the perimeter router, an administrator should update the configuration logs. This is important because the configuration logs keep track of any changes made to the router's settings, allowing for easy troubleshooting and reverting back to previous configurations if needed. By updating the configuration logs, the administrator ensures that the most recent changes are documented and can be referred to in the future if necessary.

Submit
58. Which of the following would provide Kurt, a technician, with a performance reference point to refer back to after hardware repair?

Explanation

A baseline would provide Kurt with a performance reference point to refer back to after hardware repair. A baseline is a snapshot of the system's performance before any changes or repairs are made. It serves as a benchmark to compare the system's performance before and after the repair, allowing Kurt to assess the effectiveness of the repair and identify any discrepancies or improvements in the system's performance.

Submit
59. Which of the following is MOST commonly powered using PoE?

Explanation

Access points are most commonly powered using PoE (Power over Ethernet). PoE allows for both power and data to be transmitted over a single Ethernet cable, simplifying the installation process and reducing the need for additional power outlets. Access points are devices that provide wireless network connectivity, typically in large areas such as offices, campuses, or public spaces. Since access points are often mounted on ceilings or walls, running a separate power cable to each access point can be impractical. Therefore, using PoE to power access points is a common and convenient solution.

Submit
60. The selection of the correct punch down tool to use depends on which of the following?

Explanation

The correct punch down tool to use depends on the block type. Different block types may require different punch down tools to ensure proper termination and connection.

Submit
61. Kurt, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to the MDF, through a room that has a large number of motors. Which of the following would be the BEST cable type to choose?

Explanation

Fiber optic cables are the best choice in this scenario because they are immune to electromagnetic interference, which is important in a room with a large number of motors. Fiber optic cables also have a much higher bandwidth and can transmit data over longer distances compared to other cable types like CAT3, STP, and coaxial cables.

Submit
62. A network technician arrives to work and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documents should the technician use to attempt to discover the problem?

Explanation

The network technician should use the change management document to attempt to discover the problem. This document would provide information about the upgrades that were performed on the company server the night before. By reviewing the change management document, the technician can identify any potential changes or configurations that may have caused the connectivity issue.

Submit
63. Which of the following virtual components maintains a MAC-to-port forwarding table?

Explanation

A virtual switch maintains a MAC-to-port forwarding table. This table keeps track of the MAC addresses of devices connected to the virtual switch and the corresponding ports they are connected to. This allows the virtual switch to efficiently forward network traffic within the virtual network by using the MAC addresses to determine the destination port for each packet.

Submit
64. Which of the following devices should Joe, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?

Explanation

A hub is the correct device to connect to a protocol analyzer in order to collect all of the traffic on a LAN segment. A hub is a networking device that broadcasts all incoming network traffic to all connected devices, allowing the protocol analyzer to capture and analyze the traffic. Unlike switches or routers, hubs do not filter or direct traffic, making them ideal for capturing all network traffic for analysis purposes.

Submit
65. Which of the following can be an STP cable?

Explanation

CAT5e can be an STP (Shielded Twisted Pair) cable because it is designed with four pairs of twisted copper wires that are individually shielded, providing protection against electromagnetic interference (EMI) and crosstalk. The "e" in CAT5e stands for "enhanced," indicating that it has improved shielding compared to CAT5 cables. This makes CAT5e suitable for applications that require a higher level of noise reduction and signal integrity, such as in networking and telecommunications systems.

Submit
66. Which of the following utilities would be used to display a NIC's cache of MAC addresses?

Explanation

The correct answer is "arp". The Address Resolution Protocol (ARP) is a network protocol used to map an IP address to a physical (MAC) address. ARP maintains a cache of MAC addresses on a NIC (Network Interface Card) to optimize network communication. By using the "arp" utility, one can display the NIC's cache of MAC addresses, allowing for troubleshooting and network analysis.

Submit
67. Which of the following tools would an administrator use to determine if a DNS server is answering authoritatively for a domain?

Explanation

An administrator would use the "dig" tool to determine if a DNS server is answering authoritatively for a domain. "dig" is a command-line tool used for querying DNS servers and retrieving information about DNS records. By using "dig" with the appropriate parameters and specifying the domain name, the administrator can check if the DNS server is providing authoritative responses for that domain.

Submit
68. An administrator only has one public IP address that must be shared among five employees. Which of the following network schemes should be used?

Explanation

SNAT (Source Network Address Translation) should be used in this scenario. SNAT allows multiple devices to share a single public IP address by translating the source IP address of outgoing packets to the public IP address. This enables the five employees to access the internet using the same public IP address, while still being able to differentiate the traffic based on the translated source IP address.

Submit
69. Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present?

Explanation

In order for packets from all VLANs to cross the fiber cable, the configuration of 802.1q trunking must be present. 802.1q trunking is a method of tagging VLAN information on Ethernet frames, allowing multiple VLANs to be transmitted over a single physical link. This allows the switches to understand and separate the different VLANs, ensuring that packets from all VLANs can cross the fiber cable.

Submit
70. Which of the following is an EGP routing protocol?

Explanation

BGP (Border Gateway Protocol) is an EGP (Exterior Gateway Protocol) routing protocol used in large-scale networks, such as the internet, to exchange routing information between different autonomous systems (AS). It is designed to handle routing between different AS and allows for the exchange of routing information, including network reachability and path information, making it the correct answer for the given question. IGP (Interior Gateway Protocol) is used within an AS, while OSPF (Open Shortest Path First) and RIP (Routing Information Protocol) are examples of IGPs, making them incorrect answers for this question.

Submit
71. Kurt, the network administrator, has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. Kurt checks the port connecting the new switch to the core switch and sees the following information: #show run interface GigabitEthernet 0/10 Switchport trunk encapsulation dotlq Switchport mode trunk Switchport trunk native VLAN 10 Which of the following is the MOST likely cause of the slow connections?

Explanation

The most likely cause of the slow connections is that the speed and duplex settings have not been configured on the port connecting the new switch to the core switch. This means that the switch and the core switch are not communicating at the optimal speed and duplex settings, resulting in slower LAN connections. Configuring the correct speed and duplex settings on the port should help resolve the issue and improve the network performance.

Submit
72. Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?

Explanation

A honeynet is a network of computers or systems that are intentionally set up to be vulnerable to attacks. It is used to attract and monitor attackers, allowing organizations to gather information about their techniques and motives. By deploying a honeynet, security professionals can test the security of a specific network by exposing it to potential security attacks and analyzing the attackers' behavior and methods. This helps in identifying vulnerabilities and strengthening the network's defenses.

Submit
73. Which of the following is used to identify active hosts along with their network addresses?

Explanation

A ping sweep is used to identify active hosts along with their network addresses. It sends ICMP echo requests to a range of IP addresses and waits for a response. If a host responds to the echo request, it means it is active and its network address is identified. This technique is commonly used by network administrators to discover and map out the devices present on a network. Port scan, IDS (Intrusion Detection System), and NIPS (Network Intrusion Prevention System) are not specifically designed for identifying active hosts and their network addresses.

Submit
74. A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?

Explanation

Netstat is the correct tool to determine the listening port of the web server. Netstat is a command-line network utility that displays active network connections, routing tables, and listening ports. By using netstat, one can identify the open ports on a system and determine which processes or services are using those ports. In this case, using netstat will help identify if the web server is indeed listening on TCP port 80, as it should be for HTTP connections.

Submit
75. A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?

Explanation

The most likely cause of the sporadic connectivity issue is the client's distance from the access point (AP). If the client is too far away from the AP, the signal strength may be weak, resulting in a slower wireless speed. This can lead to intermittent connectivity problems.

Submit
76. At which of the following layers does the TFTP protocol operate?

Explanation

The TFTP protocol operates at Layer 7 of the OSI model, which is the application layer. This layer is responsible for providing services and protocols that enable communication between applications and network services. TFTP (Trivial File Transfer Protocol) is a simple file transfer protocol that allows clients to retrieve and send files from or to a remote server. As an application layer protocol, TFTP utilizes the services provided by lower layers to establish communication and transfer files over a network.

Submit
77. Before installing a wireless network, which of the following should Karen, a network technician, take into consideration to reduce signal exposure for war drivers?

Explanation

To reduce signal exposure for war drivers, Karen should consider device placement. This means strategically positioning the wireless network devices, such as routers and access points, to minimize the range and strength of the wireless signal outside of the intended coverage area. By placing the devices in areas where the signal does not extend beyond the desired boundaries, Karen can help prevent unauthorized individuals from accessing the network and reduce the risk of data breaches or attacks.

Submit
78. In which of the following layers of the OSI model does the TCP protocol operate?

Explanation

The TCP protocol operates in the Transport layer of the OSI model. This layer is responsible for reliable and efficient data transfer between end systems. TCP provides reliable, connection-oriented communication by establishing a virtual circuit between the sender and receiver. It handles segmentation and reassembly of data into smaller units called segments, ensures data integrity through error detection and correction, and provides flow control and congestion control mechanisms.

Submit
79. After a baseline check was completed it was noted that the network was working far below the level of the last baseline. Which of the following should Joe, the technician, do NEXT to determine where the network problems are occurring?

Explanation

Conducting a network traffic analysis would be the next step to determine where the network problems are occurring. This analysis would involve monitoring and analyzing the traffic flow on the network to identify any bottlenecks, congestion, or abnormal behavior. By examining the network traffic, Joe can gather data and insights to pinpoint the specific areas or devices that are causing the network to perform below the baseline level. This analysis will help in troubleshooting and identifying the root cause of the network problems.

Submit
80. Sandy, a user, is unable to access the company website on a laptop. A network technician verifies that the user can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?

Explanation

The next step should be to check if the company's website is accessible from the Internet. This is important because if the website is not accessible, it could indicate a problem with the website itself rather than an issue with Sandy's laptop or network configuration. By checking the website's accessibility from the Internet, the technician can narrow down the possible causes of the issue and determine the appropriate course of action to resolve it.

Submit
81. Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?

Explanation

A bridge is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link. It operates at the data link layer of the OSI model and uses the MAC addresses to forward data packets between different network segments. Unlike a hub, which simply broadcasts data to all connected devices, a bridge selectively forwards packets based on their destination MAC address, improving network efficiency. Therefore, a bridge is the correct answer in this case.

Submit
82. Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?

Explanation

A Network Intrusion Prevention System (NIPS) is a security device that is used to screen and prevent malicious traffic on a network. It can detect and block unauthorized access attempts, malware, and other malicious activities in real-time. NIPS works by analyzing network traffic and comparing it against known patterns of malicious behavior, allowing it to identify and block any suspicious or harmful activity. By using a NIPS, organizations can effectively protect their network from potential cyber threats and attacks.

Submit
83. Which of the following devices transmits timed broadcasts onto an active network?

Explanation

A DHCP client is a device that automatically receives IP addresses and network configuration information from a DHCP server. It transmits timed broadcasts onto an active network by sending DHCP requests to the server at regular intervals to renew or obtain a new lease for its IP address. This ensures that the device remains connected to the network and receives the necessary network settings. Bridges, unmanaged switches, and firewalls do not perform this function.

Submit
84. Karen, a customer, wants to install a wireless network into a shared office space. There are several other wireless networks from other companies that can be detected within the office space. Which of the following should be configured on Karen's wireless network to differentiate it from other wireless network and still provide the BEST performance and security? (Select TWO).

Explanation

SSID and Channel should be configured on Karen's wireless network to differentiate it from other wireless networks and still provide the best performance and security. The SSID (Service Set Identifier) is a unique name that identifies the wireless network. By giving Karen's network a distinct SSID, it will be easily identifiable among the other networks in the shared office space. The Channel refers to the specific frequency on which the wireless network operates. By selecting a channel that is less congested or interference-free, Karen's network can achieve better performance and security.

Submit
85. Which of the following features does SNMPv3 have over previous versions when remotely monitoring networking devices? (Select TWO).

Explanation

SNMPv3 has two additional features over previous versions when remotely monitoring networking devices: authentication and privacy. Authentication ensures that the sender and receiver of SNMP messages can verify each other's identities, preventing unauthorized access. Privacy, on the other hand, ensures that SNMP messages are encrypted, providing confidentiality and preventing eavesdropping on sensitive information. Both of these features enhance the security of SNMPv3 compared to earlier versions.

Submit
86. A common technique used to prevent the unauthorized network devices from sending traffic across a network is port.

Explanation

Authentication is a common technique used to prevent unauthorized network devices from sending traffic across a network. By implementing authentication protocols and mechanisms, such as passwords, digital certificates, or biometric identification, network administrators can ensure that only authorized devices and users are granted access to the network. This helps to maintain network security and prevent unauthorized access or data breaches.

Submit
87. Karen, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used?

Explanation

The command "netstat" would most likely be used to list all the network connections to and from the server. Netstat is a command-line tool that displays active network connections, listening ports, and other network statistics. It provides information about the IP addresses and ports being used by the server for network communication. This command is commonly used by administrators to troubleshoot network issues and monitor network activity.

Submit
88. A Stateful firewall is MOST useful in protecting against which of the following network scans?

Explanation

A stateful firewall is most useful in protecting against Xmas scans. An Xmas scan is a type of network scan where all TCP flags are set to "on" in an attempt to exploit vulnerabilities in a target system. A stateful firewall can detect and block these types of scans by monitoring the state of TCP connections and only allowing legitimate traffic to pass through. It can identify the abnormal behavior of an Xmas scan and prevent any potential attacks.

Submit
89. Which of the following is most effective against threats when used with an updated sewer? (Select TWO)

Explanation

A content filter is effective against threats as it can block access to malicious websites or filter out harmful content. An IDS (Intrusion Detection System) is also effective as it can detect and alert to any suspicious activity or potential threats within the network. When used in conjunction with an updated sewer, these two tools can provide a strong defense against various threats and help maintain the security of the system.

Submit
90. Sandy, an administrator, attempts to open a web page and sees the following error 'Error 404: Page not found'. She then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside?

Explanation

The problem most likely resides at Layer 1, which is the physical layer of the OSI model. The error message "Error 404: Page not found" indicates that the web page cannot be accessed, which suggests a connectivity issue. The fact that the default gateway cannot be pinged further supports this, as the default gateway is responsible for routing network traffic. Layer 1 deals with the physical transmission of data, such as cables, connectors, and network interfaces. Therefore, a problem at Layer 1 could indicate a physical issue with the network connection, such as a faulty cable or network interface.

Submit
91. Which of the following are valid MAC addresses? (Select TWO)

Explanation

The first MAC address, 00-1C-1F-2C-13-43, is valid because it consists of six groups of two hexadecimal digits separated by hyphens. The second MAC address, FFFF.FFFF.FFFF, is also valid because it consists of six groups of four hexadecimal digits separated by periods.

Submit
92. Which of the following utilities can be used to list the routing table?

Explanation

Netstat is a utility that can be used to list the routing table. It provides information about active network connections, listening ports, and routing tables. By using the appropriate options, netstat can display the routing table information, including the destination IP addresses, network masks, gateways, and interface information. This allows administrators to view and troubleshoot the routing configuration of the system.

Submit
93. At which of the following layers does the ICMP protocol operate?

Explanation

The ICMP protocol operates at Layer 3, also known as the network layer. This layer is responsible for routing and forwarding data packets across different networks. ICMP, or Internet Control Message Protocol, is used for network diagnostics and troubleshooting. It allows devices to send error messages, such as "destination unreachable" or "time exceeded," to inform the sender about network issues. ICMP is an integral part of the IP protocol suite and is used by network devices like routers to communicate network-related information.

Submit
94. Which of the following would be BEST to use when identifying HTTP traffic running on TCP port 53?

Explanation

An application layer firewall would be the best choice for identifying HTTP traffic running on TCP port 53. This is because an application layer firewall operates at the highest layer of the OSI model, the application layer, and can inspect the content of the HTTP traffic to determine if it is running on port 53. This type of firewall can analyze the application-specific protocols and make decisions based on the content of the traffic, allowing it to accurately identify and control HTTP traffic on the specified port.

Submit
95. Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack? (Select TWO).

Explanation

The Network Interface layer of the TCP stack corresponds to the Physical and Data Link layers of the OSI model. The Physical layer is responsible for the transmission and reception of raw bit streams over a physical medium, while the Data Link layer provides reliable transmission of data frames between nodes over a physical network link. These two layers handle the low-level aspects of network communication, such as encoding/decoding of signals and framing of data.

Submit
96. For security reasons Kurt, a network technician, wants to install a Linux based email server. Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hardware costs?

Explanation

Installing a Linux based email server on a wireless network would be the best option to reduce hardware costs. By using a wireless network, Kurt can eliminate the need for additional hardware such as cables and physical connections. This can save on the cost of purchasing and maintaining network infrastructure. Additionally, wireless networks provide flexibility and scalability, allowing for easy expansion and reconfiguration without the need for physical changes to the network setup.

Submit
97. Which of the following is a correct IP ACL? (Select TWO)

Explanation

The correct answer is DENY ANY ANY and PERMIT 192.168 1.100 80. These options represent valid IP ACL entries. The first entry, DENY ANY ANY, denies all traffic from any source to any destination. The second entry, PERMIT 192.168 1.100 80, permits traffic from the specific source IP address 192.168.1.100 to any destination on port 80.

Submit
98. A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?

Explanation

OSPF (Open Shortest Path First) is the best choice for a company installing a second network connection with a new ISP. OSPF is a link-state routing protocol that is widely used in large networks. It is designed to efficiently determine the shortest path for data packets to travel through a network, making it ideal for complex network topologies. OSPF also supports load balancing and provides fast convergence, ensuring efficient and reliable routing. BGP (Border Gateway Protocol) is typically used for routing between different autonomous systems, while IS-IS (Intermediate System to Intermediate System) and RIP (Routing Information Protocol) are less commonly used and may not be as suitable for larger networks.

Submit
99. Which of the following are common VPN transports? (Select TWO)

Explanation

RDP (Remote Desktop Protocol) and SSL (Secure Sockets Layer) are common VPN transports. RDP allows users to remotely access and control a computer over a network connection, making it a suitable transport for VPNs. SSL, on the other hand, provides secure communication over the internet by encrypting data transmitted between a client and a server. This encryption makes SSL a commonly used transport for VPNs, ensuring the confidentiality and integrity of data transmitted over the network.

Submit
100. A crossover cable is MOST commonly associated with which of the following layers of the OSI model?

Explanation

A crossover cable is used to connect two devices directly without the need for a network switch or hub. It is commonly used to connect two computers or devices together for file sharing or network communication. The Application layer in the OSI model is responsible for providing services and protocols for applications to communicate with each other. Therefore, a crossover cable is most commonly associated with the Application layer as it enables direct communication between devices at this layer.

Submit
View My Results

Quiz Review Timeline (Updated): Feb 28, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 28, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • May 15, 2012
    Quiz Created by
    SGogola
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following is the network topology in which computers...
In the 2.4GHz range, which of the following channel combinations are...
A router that takes the workstations internal IP address and changes...
Which of the following ports is the default telnet port?
Which of the following basic devices blocks ports and can sometimes...
Which of the following is the port number used by HTTP?
Sandy, a network technician, is attempting to map a FQDN to an...
Karen, a network administrator, needs to add an additional connection...
1000BaseT has a MAXIMUM run distance of:
Which of the following protocols is commonly used for VoIP technology?
The location where the Telco wiring stops and the clients wiring...
A layer 3 switch can move packets between subnets based on which of...
Which of the following wireless technologies can support the MOST...
When installing two 802.11g access points in the same building, which...
Which of the following protocols is Joe, a technician, using to...
Which of the following metrics indentifies the number of connections...
Karen, a technician, is asked to run new cabling for an office that is...
Users are unable to stay connected to the company's wireless...
A section of the building has been having intermittent connectivity...
A bridge handles frames at which of the following layers of the OSI...
Which of the following describes the location where an administrator...
A company needs strong wireless security enabled for minimal cost....
Joe, a user, can no longer access the accounting file share, but...
Which of the following regulates the amount of network traffic a...
Which of the following would contain information regarding network...
Which of the following wireless technologies can support the GREATEST...
Which of the following wiring standards would Karen, a technician,...
Which of the following connector types is MOST commonly found with...
Which of the following connector types will MOST likely be located on...
Joe, an administrator, is using a punch-down tool to connect a cable....
Which of the following is a multifunction device in a SOHO network?
A company wants to secure access to its internal wifeless network. The...
Which of the following would Karen, a technician, use in voice over IP...
Which of the following is a performance optimization technology?
Which of the following would help a new administrator quickly...
Keyword and blacklist filtering would be handled at which level in a...
Karen, a network technician, is troubleshooting a problem and has just...
A company plans to implement a wired network between several...
Which of the following is the name of the routing update process...
Which of the following uses a ring topology?
Kurt, a user, on a network cannot access any network resources. The...
Which of the following DNS record types provides the hostname to IP...
Which of the following WAN technologies uses a telephone cable?
A technician receives an urgent call that the switch in accounting is...
By default, which of the following ports would a network need to have...
Which of the following ports would have to be allowed through a...
Which of the following DNS records would be queried to locate a...
Which of the following features should an administrator configure to...
Which of the following improves wireless performance only allowing...
Creating a uniform user environment throughout the network can BEST be...
Users have reported slow access limes when retrieving information from...
Which of the following interfaces is used to connect analog devices to...
Which of the following is an example of a MAC address?
An administrator is setting up a network and would like to prevent...
Joe, an administrator, has just finished installing a new switch and...
Which of the following is used by RADIUS to encrypt messages between...
Which of the following should an administrator do after running a...
Which of the following would provide Kurt, a technician, with a...
Which of the following is MOST commonly powered using PoE?
The selection of the correct punch down tool to use depends on which...
Kurt, an administrator, needs to install a new 100 foot (30 meter)...
A network technician arrives to work and discovers users are having a...
Which of the following virtual components maintains a MAC-to-port...
Which of the following devices should Joe, an administrator, connect...
Which of the following can be an STP cable?
Which of the following utilities would be used to display a NIC's...
Which of the following tools would an administrator use to determine...
An administrator only has one public IP address that must be shared...
Switch A is configured with VLAN 105 and 106. Switch B is configured...
Which of the following is an EGP routing protocol?
Kurt, the network administrator, has just finished installing a new...
Which of the following would be used to test out the security of a...
Which of the following is used to identify active hosts along with...
A web server is running correctly but sending a RST packet to any...
A user reports sporadic connectivity with their wireless connection. A...
At which of the following layers does the TFTP protocol operate?
Before installing a wireless network, which of the following should...
In which of the following layers of the OSI model does the TCP...
After a baseline check was completed it was noted that the network was...
Sandy, a user, is unable to access the company website on a laptop. A...
Which of the following is an intelligent repeater that is aware of the...
Which of the following security devices would MOST likely be used on a...
Which of the following devices transmits timed broadcasts onto an...
Karen, a customer, wants to install a wireless network into a shared...
Which of the following features does SNMPv3 have over previous...
A common technique used to prevent the unauthorized network devices...
Karen, an administrator, wants to list all the network connections to...
A Stateful firewall is MOST useful in protecting against which of the...
Which of the following is most effective against threats when used...
Sandy, an administrator, attempts to open a web page and sees the...
Which of the following are valid MAC addresses? (Select TWO)
Which of the following utilities can be used to list the routing...
At which of the following layers does the ICMP protocol operate?
Which of the following would be BEST to use when identifying HTTP...
Which of the following layers of the OSI model maps to the Network...
For security reasons Kurt, a network technician, wants to install a...
Which of the following is a correct IP ACL? (Select TWO)
A company is about to install a second network connection with a new...
Which of the following are common VPN transports? (Select TWO)
A crossover cable is MOST commonly associated with which of the...
Alert!

Advertisement