Networking 005 Part 3

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By SGogola
S
SGogola
Community Contributor
Quizzes Created: 3 | Total Attempts: 575
Questions: 100 | Attempts: 107

SettingsSettingsSettings
Networking 005 Part 3 - Quiz


Networking 005 parts 3 is a quiz set and designed to test and advance your networking knowledge on both the hardware components and software knowledge of networking. It is a good avenue to study and revise for exams.


Questions and Answers
  • 1. 

    In the 2.4GHz range, which of the following channel combinations are non-overlapping?

    • A.

      1, 6, 11

    • B.

      2, 7, 10

    • C.

      2, 8, 13

    • D.

      3, 6, 9

    Correct Answer
    A. 1, 6, 11
    Explanation
    The 2.4GHz range is divided into 14 channels, but only channels 1, 6, and 11 are non-overlapping. This means that these channels can be used simultaneously without causing interference to each other. Channels 2, 7, 10, 2, 8, 13, and 3, 6, 9 are overlapping channels and using them together can result in interference and degraded performance.

    Rate this question:

  • 2. 

    Which of the following is the port number used by HTTP?

    • A.

      21

    • B.

      80

    • C.

      443

    • D.

      3389

    Correct Answer
    B. 80
    Explanation
    The port number used by HTTP is 80. HTTP (Hypertext Transfer Protocol) is the protocol used for transmitting and receiving web pages and other resources on the internet. Port numbers are used to identify specific processes or services on a computer or network. In the case of HTTP, port 80 is the default port number used for communication between web browsers and web servers.

    Rate this question:

  • 3. 

    Which of the following is most effective against threats when used with an updated sewer? (Select TWO)

    • A.

      Kerberos server

    • B.

      Stateful firewall

    • C.

      Content filter

    • D.

      IDS

    • E.

      VPN concentrator

    Correct Answer(s)
    C. Content filter
    D. IDS
    Explanation
    A content filter is effective against threats as it can block access to malicious websites or filter out harmful content. An IDS (Intrusion Detection System) is also effective as it can detect and alert to any suspicious activity or potential threats within the network. When used in conjunction with an updated sewer, these two tools can provide a strong defense against various threats and help maintain the security of the system.

    Rate this question:

  • 4. 

    A crossover cable is MOST commonly associated with which of the following layers of the OSI model?

    • A.

      Session

    • B.

      Application

    • C.

      Network

    • D.

      Physical

    Correct Answer
    B. Application
    Explanation
    A crossover cable is used to connect two devices directly without the need for a network switch or hub. It is commonly used to connect two computers or devices together for file sharing or network communication. The Application layer in the OSI model is responsible for providing services and protocols for applications to communicate with each other. Therefore, a crossover cable is most commonly associated with the Application layer as it enables direct communication between devices at this layer.

    Rate this question:

  • 5. 

    For security reasons Kurt, a network technician, wants to install a Linux based email server. Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hardware costs?

    • A.

      VPN concentrator

    • B.

      Virtual servers

    • C.

      Wireless

    • D.

      Multimode fiber

    Correct Answer
    C. Wireless
    Explanation
    Installing a Linux based email server on a wireless network would be the best option to reduce hardware costs. By using a wireless network, Kurt can eliminate the need for additional hardware such as cables and physical connections. This can save on the cost of purchasing and maintaining network infrastructure. Additionally, wireless networks provide flexibility and scalability, allowing for easy expansion and reconfiguration without the need for physical changes to the network setup.

    Rate this question:

  • 6. 

    A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?

    • A.

      IS-IS

    • B.

      BGP

    • C.

      OSPF

    • D.

      RIP

    Correct Answer
    C. OSPF
    Explanation
    OSPF (Open Shortest Path First) is the best choice for a company installing a second network connection with a new ISP. OSPF is a link-state routing protocol that is widely used in large networks. It is designed to efficiently determine the shortest path for data packets to travel through a network, making it ideal for complex network topologies. OSPF also supports load balancing and provides fast convergence, ensuring efficient and reliable routing. BGP (Border Gateway Protocol) is typically used for routing between different autonomous systems, while IS-IS (Intermediate System to Intermediate System) and RIP (Routing Information Protocol) are less commonly used and may not be as suitable for larger networks.

    Rate this question:

  • 7. 

    A layer 3 switch can move packets between subnets based on which of the following criteria?

    • A.

      802.1q tag

    • B.

      Port

    • C.

      Application

    • D.

      IP address

    Correct Answer
    D. IP address
    Explanation
    A layer 3 switch can move packets between subnets based on the IP address. The IP address is a unique identifier assigned to each device on a network, allowing the layer 3 switch to determine the destination of the packet and route it accordingly. The 802.1q tag is used for VLAN tagging, the port refers to the physical port on the switch, and the application does not play a role in determining the routing of packets between subnets.

    Rate this question:

  • 8. 

    Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?

    • A.

      Honeynet

    • B.

      Honeypot

    • C.

      Vulnerability scanner

    • D.

      Network based IDS

    Correct Answer
    A. Honeynet
    Explanation
    A honeynet is a network of computers or systems that are intentionally set up to be vulnerable to attacks. It is used to attract and monitor attackers, allowing organizations to gather information about their techniques and motives. By deploying a honeynet, security professionals can test the security of a specific network by exposing it to potential security attacks and analyzing the attackers' behavior and methods. This helps in identifying vulnerabilities and strengthening the network's defenses.

    Rate this question:

  • 9. 

    A bridge handles frames at which of the following layers of the OSI model?

    • A.

      Network

    • B.

      Session

    • C.

      Transport

    • D.

      Data Link

    Correct Answer
    D. Data Link
    Explanation
    A bridge handles frames at the Data Link layer of the OSI model. The Data Link layer is responsible for the reliable transfer of data between adjacent network nodes and provides error detection and correction. Bridges operate at this layer by examining the MAC addresses in the frames and making forwarding decisions based on this information. They connect two or more network segments together, allowing for the transfer of data between them.

    Rate this question:

  • 10. 

    Joe, an administrator, is using a punch-down tool to connect a cable. To which of the following is Joe MOST likely connecting?

    • A.

      A 110 block

    • B.

      A demarc

    • C.

      A DB-9

    • D.

      A smart jack

    Correct Answer
    A. A 110 block
    Explanation
    Joe is most likely connecting the cable to a 110 block. A 110 block is a type of punch-down block commonly used in telecommunications and networking to terminate and connect copper wires. It is used to organize and distribute incoming and outgoing wires, allowing for easy connectivity and troubleshooting.

    Rate this question:

  • 11. 

    Joe, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and 30. The servers are able to communicate with each other, but are unable to reach the Internet. Joe sees the following information in the switch configuration: Interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Joe is able to ping the router at 192.168.105 1 from the switch. Which of the following is the MOST likely cause of the problem?

    • A.

      The subnet mask is incorrect

    • B.

      A routing loop has occurred

    • C.

      Joe used a crossover cable to connect the switch to the gateway

    • D.

      The server is missing default-gateway information

    Correct Answer
    D. The server is missing default-gateway information
    Explanation
    The server is missing default-gateway information. This means that the server does not know where to send traffic that is destined for the Internet. The default gateway is the IP address of the router that connects the local network to the Internet. Without this information, the server is unable to route traffic beyond the local network.

    Rate this question:

  • 12. 

    Which of the following wireless technologies can support the MOST allowable MIMO streams?

    • A.

      802.11a

    • B.

      802.11b

    • C.

      802.11g

    • D.

      802.11n

    Correct Answer
    D. 802.11n
    Explanation
    802.11n is the correct answer because it is the only option that supports Multiple-Input Multiple-Output (MIMO) technology. MIMO allows for the transmission and reception of multiple data streams simultaneously, which increases the overall throughput and capacity of the wireless network. 802.11a, 802.11b, and 802.11g do not support MIMO, therefore they cannot support as many allowable MIMO streams as 802.11n.

    Rate this question:

  • 13. 

    Which of the following devices should Joe, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?

    • A.

      Hub

    • B.

      VLAN

    • C.

      Router

    • D.

      Server

    Correct Answer
    A. Hub
    Explanation
    A hub is the correct device to connect to a protocol analyzer in order to collect all of the traffic on a LAN segment. A hub is a networking device that broadcasts all incoming network traffic to all connected devices, allowing the protocol analyzer to capture and analyze the traffic. Unlike switches or routers, hubs do not filter or direct traffic, making them ideal for capturing all network traffic for analysis purposes.

    Rate this question:

  • 14. 

    Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present?

    • A.

      Reverse ARP

    • B.

      Full duplex on the fiber link

    • C.

      PoE

    • D.

      802.1q trunking

    Correct Answer
    D. 802.1q trunking
    Explanation
    In order for packets from all VLANs to cross the fiber cable, the configuration of 802.1q trunking must be present. 802.1q trunking is a method of tagging VLAN information on Ethernet frames, allowing multiple VLANs to be transmitted over a single physical link. This allows the switches to understand and separate the different VLANs, ensuring that packets from all VLANs can cross the fiber cable.

    Rate this question:

  • 15. 

    Sandy, a user, is unable to access the company website on a laptop. A network technician verifies that the user can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?

    • A.

      Remotely connect to Sandy’s laptop and review the network configuration settings.

    • B.

      Ping the web server from inside the network to ensure it is still up and running.

    • C.

      Check to make sure the company’s website is accessible from the Internet

    • D.

      Ensure the Ethernet cable is securely plugged into Sandy’s laptop

    Correct Answer
    C. Check to make sure the company’s website is accessible from the Internet
    Explanation
    The next step should be to check if the company's website is accessible from the Internet. This is important because if the website is not accessible, it could indicate a problem with the website itself rather than an issue with Sandy's laptop or network configuration. By checking the website's accessibility from the Internet, the technician can narrow down the possible causes of the issue and determine the appropriate course of action to resolve it.

    Rate this question:

  • 16. 

    Karen, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology?

    • A.

      Verify full system functionality and if applicable implement preventative measures

    • B.

      Implement the solution or escalate as necessary.

    • C.

      Document findings, actions, and outcom

    • D.

      Establish a theory of probable cause (e.g. question the obvious).

    Correct Answer
    B. Implement the solution or escalate as necessary.
    Explanation
    The next step in the troubleshooting methodology after establishing a plan of action is to implement the solution or escalate the problem as necessary. This means that Karen should now take the necessary steps to resolve the problem based on the plan that has been established. If she is unable to implement the solution herself, she should escalate the problem to someone who can. This step is crucial in order to move forward with resolving the issue effectively.

    Rate this question:

  • 17. 

    Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?

    • A.

      802.11a

    • B.

      802.11b

    • C.

      802.11g

    • D.

      802.11n

    Correct Answer
    D. 802.11n
    Explanation
    802.11n can support the greatest distance on either 2.4GHz or 5GHz frequencies compared to the other options. This is because 802.11n uses multiple-input multiple-output (MIMO) technology, which allows for multiple antennas to be used for transmitting and receiving data. This results in improved range and coverage compared to older wireless technologies like 802.11a, 802.11b, and 802.11g.

    Rate this question:

  • 18. 

    A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?

    • A.

      WEP

    • B.

      Port filtering

    • C.

      WPA

    • D.

      Longer SSID broadcast intervals

    Correct Answer
    C. WPA
    Explanation
    WPA (Wi-Fi Protected Access) is the best security measure to use for strong wireless security at minimal cost. WPA provides better security than WEP (Wired Equivalent Privacy) as it uses stronger encryption algorithms and authentication methods. Port filtering is not specifically a wireless security measure and may not provide adequate protection. Longer SSID broadcast intervals may help in reducing the visibility of the wireless network, but it does not provide strong security. Therefore, WPA is the most suitable option for the given scenario.

    Rate this question:

  • 19. 

    Which of the following ports is the default telnet port?

    • A.

      20

    • B.

      21

    • C.

      22

    • D.

      23

    Correct Answer
    D. 23
    Explanation
    The default telnet port is port number 23. Telnet is a network protocol used for remote terminal connections. It allows users to access and manage remote computers or devices over a network. Port number 23 is the standard port used for telnet communication, and it is the correct answer to this question.

    Rate this question:

  • 20. 

    Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?

    • A.

      This is a private address which cannot be seen by external users

    • B.

      The address does not have the appropriate subnet mask assigned.

    • C.

      This is a public address which can only be seen by internal users.

    • D.

      This is a private address which can only be seen by external users

    Correct Answer
    A. This is a private address which cannot be seen by external users
    Explanation
    The reason this will ultimately not work is because a private address, such as 10.0.0.15, cannot be seen by external users. Private addresses are reserved for internal use within a network and are not routable on the internet. Therefore, external users attempting to access the FQDN mapped to this private address will not be able to reach the internal server.

    Rate this question:

  • 21. 

    Which of the following is the network topology in which computers connect to form a straight line?

    • A.

      Ring

    • B.

      Star

    • C.

      Bus

    • D.

      Mesh

    Correct Answer
    C. Bus
    Explanation
    Bus network topology is the correct answer. In a bus topology, computers are connected in a straight line using a single cable called the bus. All computers share this common communication medium. Each computer sends data on the bus, and the intended recipient receives it. This topology is simple to implement and cost-effective for small networks. However, if the bus cable fails, the entire network may become inoperable.

    Rate this question:

  • 22. 

    Users have reported slow access limes when retrieving information from a server on the company’s network. Which of the following tools would provide access time information on each segment of the network to reach the server?

    • A.

      Arp

    • B.

      Route

    • C.

      Ipconfig

    • D.

      Tracert

    Correct Answer
    D. Tracert
    Explanation
    Tracert is a network diagnostic tool that allows users to trace the route taken by packets from their computer to a destination server. It provides access time information on each segment of the network by displaying the IP addresses of the routers that the packets pass through and the time it takes for the packets to reach each router. By analyzing the output of tracert, users can identify any network segments that are causing slow access times and troubleshoot the issue accordingly.

    Rate this question:

  • 23. 

    Karen, a network administrator, needs to add an additional connection to a room. She adds a new Ethernet switch and must connect it to an existing switch. Which cable type should Karen use to connect the two switches?

    • A.

      CAT3cable

    • B.

      Serial cable

    • C.

      Crossover cable

    • D.

      Rollover cable

    Correct Answer
    C. Crossover cable
    Explanation
    Karen should use a crossover cable to connect the two switches. A crossover cable is specifically designed to connect similar devices, such as two switches, without the need for a hub or a router. It allows the transmit and receive signals to be crossed over, enabling the switches to communicate effectively.

    Rate this question:

  • 24. 

    Which of the following DNS record types provides the hostname to IP address mapping?

    • A.

      A record

    • B.

      NS record

    • C.

      CNAME record

    • D.

      MX record

    Correct Answer
    A. A record
    Explanation
    The A record in DNS (Domain Name System) provides the hostname to IP address mapping. It is used to translate domain names into their corresponding IP addresses. When a user enters a domain name in a web browser, the A record is queried to retrieve the IP address associated with that domain name, allowing the browser to establish a connection to the correct server.

    Rate this question:

  • 25. 

    The selection of the correct punch down tool to use depends on which of the following?

    • A.

      Connector type

    • B.

      Demarcation point location

    • C.

      Block type

    • D.

      Switch location

    Correct Answer
    C. Block type
    Explanation
    The correct punch down tool to use depends on the block type. Different block types may require different punch down tools to ensure proper termination and connection.

    Rate this question:

  • 26. 

    Which of the following uses a ring topology?

    • A.

      DSL

    • B.

      Ethernet

    • C.

      DOCSIS

    • D.

      SONET

    Correct Answer
    D. SONET
    Explanation
    SONET (Synchronous Optical Networking) uses a ring topology. In a ring topology, the network nodes are connected in a circular manner, where each node is connected to exactly two other nodes, forming a closed loop. This allows for data to flow in both directions, providing redundancy and fault tolerance. SONET is commonly used in telecommunications networks to transmit large amounts of data reliably and efficiently over long distances.

    Rate this question:

  • 27. 

    A company wants to secure access to its internal wifeless network. The company wants to use the most secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?

    • A.

      WEP encryption

    • B.

      Channel rotation

    • C.

      Disable SSID

    • D.

      WPA encryption

    Correct Answer
    D. WPA encryption
    Explanation
    WPA encryption is the best choice for wireless security in this situation. WPA (Wi-Fi Protected Access) provides stronger security compared to WEP (Wired Equivalent Privacy) encryption. WEP encryption is outdated and vulnerable to attacks. Channel rotation does not directly relate to wireless security. Disabling SSID (Service Set Identifier) can provide some level of security, but it is not as effective as WPA encryption in protecting the network from unauthorized access.

    Rate this question:

  • 28. 

    1000BaseT has a MAXIMUM run distance of:

    • A.

      25 meters (82 feet)

    • B.

      100 meters (328 feet)

    • C.

      500 meters (1640 feet)

    • D.

      1000 meters (3280 feet)

    Correct Answer
    B. 100 meters (328 feet)
    Explanation
    The correct answer is 100 meters (328 feet). 1000BaseT is an Ethernet standard that uses twisted pair cables for data transmission. It has a maximum run distance of 100 meters, which means that the cable length between the network devices should not exceed 100 meters for optimal performance. Beyond this distance, there may be signal degradation and loss of data integrity.

    Rate this question:

  • 29. 

    Sandy, an administrator, attempts to open a web page and sees the following error 'Error 404: Page not found'. She then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside?

    • A.

      Layer 1

    • B.

      Layer 4

    • C.

      Layer 5

    • D.

      Layer 7

    Correct Answer
    A. Layer 1
    Explanation
    The problem most likely resides at Layer 1, which is the physical layer of the OSI model. The error message "Error 404: Page not found" indicates that the web page cannot be accessed, which suggests a connectivity issue. The fact that the default gateway cannot be pinged further supports this, as the default gateway is responsible for routing network traffic. Layer 1 deals with the physical transmission of data, such as cables, connectors, and network interfaces. Therefore, a problem at Layer 1 could indicate a physical issue with the network connection, such as a faulty cable or network interface.

    Rate this question:

  • 30. 

    Which of the following protocols is Joe, a technician, using to encrypt data between web servers and web browsers?

    • A.

      SMTP

    • B.

      SIP

    • C.

      HTTP

    • D.

      SSL

    Correct Answer
    D. SSL
    Explanation
    Joe, the technician, is using SSL (Secure Sockets Layer) protocol to encrypt data between web servers and web browsers. SSL is a cryptographic protocol that provides secure communication over the internet. It ensures that the data transmitted between the web server and web browser is encrypted, preventing unauthorized access or tampering of the information. SSL is commonly used for secure online transactions, such as online banking or shopping, to protect sensitive data like credit card information.

    Rate this question:

  • 31. 

    Which of the following would Karen, a technician, use in voice over IP communications?

    • A.

      SNTP

    • B.

      SCP

    • C.

      SMTP

    • D.

      SIP

    Correct Answer
    D. SIP
    Explanation
    Karen, as a technician, would use SIP (Session Initiation Protocol) in voice over IP communications. SIP is a signaling protocol that is used to establish, modify, and terminate multimedia sessions such as voice and video calls over IP networks. It is commonly used in VoIP systems to initiate and manage communication sessions between devices, allowing users to make and receive voice calls over the internet. SNTP (Simple Network Time Protocol), SCP (Secure Copy Protocol), and SMTP (Simple Mail Transfer Protocol) are not specifically related to voice over IP communications.

    Rate this question:

  • 32. 

    Kurt, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to the MDF, through a room that has a large number of motors. Which of the following would be the BEST cable type to choose?

    • A.

      CAT3

    • B.

      STP

    • C.

      Coaxial

    • D.

      Fiber

    Correct Answer
    D. Fiber
    Explanation
    Fiber optic cables are the best choice in this scenario because they are immune to electromagnetic interference, which is important in a room with a large number of motors. Fiber optic cables also have a much higher bandwidth and can transmit data over longer distances compared to other cable types like CAT3, STP, and coaxial cables.

    Rate this question:

  • 33. 

    Karen, a customer, wants to install a wireless network into a shared office space. There are several other wireless networks from other companies that can be detected within the office space. Which of the following should be configured on Karen's wireless network to differentiate it from other wireless network and still provide the BEST performance and security? (Select TWO).

    • A.

      SSID

    • B.

      Channel

    • C.

      Antenna type

    • D.

      Wireless standard

    • E.

      NAT

    Correct Answer(s)
    A. SSID
    B. Channel
    Explanation
    SSID and Channel should be configured on Karen's wireless network to differentiate it from other wireless networks and still provide the best performance and security. The SSID (Service Set Identifier) is a unique name that identifies the wireless network. By giving Karen's network a distinct SSID, it will be easily identifiable among the other networks in the shared office space. The Channel refers to the specific frequency on which the wireless network operates. By selecting a channel that is less congested or interference-free, Karen's network can achieve better performance and security.

    Rate this question:

  • 34. 

    Joe, a user, can no longer access the accounting file share, but others are still able to access the share. Which of the following would be the FIRST step in troubleshooting the issue?

    • A.

      Notify senior management of the issue

    • B.

      Develop a probable cause theory.

    • C.

      Ask Joe if anything has changed on the system.

    • D.

      Escalate the issue to the vendor.

    Correct Answer
    C. Ask Joe if anything has changed on the system.
    Explanation
    The first step in troubleshooting the issue would be to ask Joe if anything has changed on the system. By doing so, it can help identify if there have been any recent changes or updates that may have caused Joe's inability to access the accounting file share. This information can then be used to narrow down the possible causes and determine the appropriate solution.

    Rate this question:

  • 35. 

    Which of the following wiring standards would Karen, a technician, MOST likely use to interconnect two devices without the use of a hub or switch?

    • A.

      568A

    • B.

      568B

    • C.

      Crossover

    • D.

      Loopback

    Correct Answer
    C. Crossover
    Explanation
    Karen would most likely use the crossover wiring standard to interconnect two devices without the use of a hub or switch. Crossover cables are specifically designed to connect two devices directly, without the need for an intermediary device like a hub or switch. This allows for direct communication between the devices, making it an ideal choice in this scenario.

    Rate this question:

  • 36. 

    Which of the following would provide Kurt, a technician, with a performance reference point to refer back to after hardware repair?

    • A.

      Baseline

    • B.

      Network map

    • C.

      Wire scheme

    • D.

      Asset management

    Correct Answer
    A. Baseline
    Explanation
    A baseline would provide Kurt with a performance reference point to refer back to after hardware repair. A baseline is a snapshot of the system's performance before any changes or repairs are made. It serves as a benchmark to compare the system's performance before and after the repair, allowing Kurt to assess the effectiveness of the repair and identify any discrepancies or improvements in the system's performance.

    Rate this question:

  • 37. 

    Which of the following connector types is MOST commonly found with coaxial cabling?

    • A.

      DB-9

    • B.

      BNC

    • C.

      RJ-45

    • D.

      RJ-11

    Correct Answer
    B. BNC
    Explanation
    The BNC connector is the most commonly found connector type with coaxial cabling. BNC stands for Bayonet Neill-Concelman and it is widely used for connecting coaxial cables in various applications such as video surveillance systems, television antennas, and computer networks. The BNC connector provides a secure and reliable connection, ensuring good signal transmission and minimizing interference. It is easy to install and remove, making it a popular choice for coaxial cabling.

    Rate this question:

  • 38. 

    Which of the following connector types will MOST likely be located on a serial cable?

    • A.

      DB-9

    • B.

      LC

    • C.

      ST

    • D.

      BNC

    Correct Answer
    A. DB-9
    Explanation
    A DB-9 connector is most likely to be located on a serial cable. Serial cables are commonly used to connect devices such as modems, printers, and older computer peripherals. The DB-9 connector is a type of D-subminiature connector that has 9 pins arranged in a D-shaped housing. It is often used for serial communication and is compatible with RS-232 standards.

    Rate this question:

  • 39. 

    Kurt, a user, on a network cannot access any network resources. The link light on his computer shows that a connection is present. Which of the following is the MOST likely cause of the problem?

    • A.

      The wrong cable type has been used

    • B.

      IDS has shut down the computer's switch port

    • C.

      The port on the switch is configured incorrectly

    • D.

      Spanning tree protocol was implemented

    Correct Answer
    C. The port on the switch is configured incorrectly
    Explanation
    The most likely cause of Kurt not being able to access any network resources, despite having a connection present, is that the port on the switch is configured incorrectly. This means that there may be an issue with the settings or configuration of the switch port, preventing Kurt from accessing the network resources.

    Rate this question:

  • 40. 

    Which of the following basic devices blocks ports and can sometimes filter data?

    • A.

      Repeater

    • B.

      Hub

    • C.

      Firewall

    • D.

      Switch

    Correct Answer
    C. Firewall
    Explanation
    A firewall is a basic device that blocks ports and can sometimes filter data. It acts as a barrier between a trusted internal network and an untrusted external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By blocking specific ports, a firewall can prevent unauthorized access to a network, while also filtering data to ensure that only legitimate and safe traffic is allowed through. This helps to enhance network security and protect against potential threats or attacks.

    Rate this question:

  • 41. 

    Which of the following protocols is commonly used for VoIP technology?

    • A.

      Telnet

    • B.

      SMTP

    • C.

      SIP

    • D.

      SNMP

    Correct Answer
    C. SIP
    Explanation
    SIP (Session Initiation Protocol) is commonly used for VoIP (Voice over Internet Protocol) technology. It is a communication protocol that enables the initiation, modification, and termination of interactive user sessions involving voice, video, and messaging applications. SIP is widely adopted in the telecommunications industry as it allows for efficient and effective communication over IP networks. It facilitates the establishment and management of voice and multimedia sessions, making it the ideal protocol for VoIP technology.

    Rate this question:

  • 42. 

    Which of the following metrics indentifies the number of connections that is between two devices?

    • A.

      Hop count

    • B.

      MTU

    • C.

      Latency

    • D.

      Bandwidth

    Correct Answer
    A. Hop count
    Explanation
    Hop count is a metric that identifies the number of connections between two devices. It represents the number of routers or network devices that a packet must traverse to reach its destination. A higher hop count indicates a longer path and potentially more latency in the network. Therefore, hop count is a useful metric for measuring the efficiency and performance of a network connection.

    Rate this question:

  • 43. 

    A router that takes the workstations internal IP address and changes it to another IP address when it sends the data outside of the network is and example of which of the following?

    • A.

      NAT

    • B.

      IDS

    • C.

      NMAP

    • D.

      DMZ

    Correct Answer
    A. NAT
    Explanation
    NAT stands for Network Address Translation. It is a technology used by routers to translate the internal IP addresses of devices in a private network to a different IP address when sending data outside of the network. This allows multiple devices to share a single public IP address. In this case, the router is performing NAT by changing the internal IP address of the workstation to another IP address before sending the data outside of the network.

    Rate this question:

  • 44. 

    Karen, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Karen purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?

    • A.

      Install two CAT6 cables with a repeater

    • B.

      Install a 500 foot (152 meter) CAT5 cable.

    • C.

      Install a 500 foot (152 meter) CAT5e cable

    • D.

      Install three CAT6 cables with a repeater

    Correct Answer
    A. Install two CAT6 cables with a repeater
    Explanation
    Installing two CAT6 cables with a repeater would be the best option instead of the CAT6 cable. This is because the weak signal between the office and the networking equipment suggests that the distance is too long for a single CAT6 cable to maintain a strong signal. By installing two CAT6 cables and using a repeater, the signal can be boosted and maintained over the longer distance.

    Rate this question:

  • 45. 

    Kurt, the network administrator, has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. Kurt checks the port connecting the new switch to the core switch and sees the following information: #show run interface GigabitEthernet 0/10 Switchport trunk encapsulation dotlq Switchport mode trunk Switchport trunk native VLAN 10 Which of the following is the MOST likely cause of the slow connections?

    • A.

      The servers have not had VLAN tagging enabled on their NICs

    • B.

      Speed and duplex have not been set

    • C.

      VLAN tagging was not set on the trunk

    • D.

      The servers have been connected with CAT5 cable

    Correct Answer
    B. Speed and duplex have not been set
    Explanation
    The most likely cause of the slow connections is that the speed and duplex settings have not been configured on the port connecting the new switch to the core switch. This means that the switch and the core switch are not communicating at the optimal speed and duplex settings, resulting in slower LAN connections. Configuring the correct speed and duplex settings on the port should help resolve the issue and improve the network performance.

    Rate this question:

  • 46. 

    Karen, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used?

    • A.

      Traceroute

    • B.

      Ping

    • C.

      Ipconfig

    • D.

      Netstat

    Correct Answer
    D. Netstat
    Explanation
    The command "netstat" would most likely be used to list all the network connections to and from the server. Netstat is a command-line tool that displays active network connections, listening ports, and other network statistics. It provides information about the IP addresses and ports being used by the server for network communication. This command is commonly used by administrators to troubleshoot network issues and monitor network activity.

    Rate this question:

  • 47. 

    A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?

    • A.

      Coaxial

    • B.

      CAT3

    • C.

      CAT5

    • D.

      CAT5e

    Correct Answer
    D. CAT5e
    Explanation
    CAT5e should be purchased because it is capable of supporting a transmission rate of 1Gbps. Coaxial, CAT3, and CAT5 cables do not have the same level of performance and may not be able to achieve the desired transmission rate.

    Rate this question:

  • 48. 

    Which of the following regulates the amount of network traffic a single node receives in a server cluster?

    • A.

      Load balancer

    • B.

      Proxy server

    • C.

      Content filter

    • D.

      Quality of service

    Correct Answer
    A. Load balancer
    Explanation
    A load balancer is a device or software that distributes network traffic across multiple servers or nodes in a server cluster. It helps regulate the amount of network traffic that each individual node receives by evenly distributing the workload. This ensures that no single node is overwhelmed with too much traffic, which can lead to performance issues or system failure. Therefore, a load balancer is the correct answer for regulating network traffic in a server cluster.

    Rate this question:

  • 49. 

    Before installing a wireless network, which of the following should Karen, a network technician, take into consideration to reduce signal exposure for war drivers?

    • A.

      Device placement

    • B.

      MAC address filtering

    • C.

      User authentication

    • D.

      Encryption protocols

    Correct Answer
    A. Device placement
    Explanation
    To reduce signal exposure for war drivers, Karen should consider device placement. This means strategically positioning the wireless network devices, such as routers and access points, to minimize the range and strength of the wireless signal outside of the intended coverage area. By placing the devices in areas where the signal does not extend beyond the desired boundaries, Karen can help prevent unauthorized individuals from accessing the network and reduce the risk of data breaches or attacks.

    Rate this question:

  • 50. 

    Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).

    • A.

      22

    • B.

      23

    • C.

      143

    • D.

      161

    • E.

      162

    • F.

      8080

    Correct Answer(s)
    D. 161
    E. 162
    Explanation
    To allow SNMP traffic to pass on its default port, ports 161 and 162 would have to be allowed through the firewall. Port 161 is used for SNMP requests, while port 162 is used for SNMP trap messages. By allowing these ports, the firewall will permit the necessary communication for SNMP traffic to flow through.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 28, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • May 15, 2012
    Quiz Created by
    SGogola
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.