Networking 005 Part 3

100 Questions | Total Attempts: 56

Settings
Please wait...
Networking Quizzes & Trivia

Networking 005 parts 3 is a quiz set and designed to test and advance your networking knowledge on both the hardware components and software knowledge of networking. It is a good avenue to study and revise for exams.


Questions and Answers
  • 1. 
    In the 2.4GHz range, which of the following channel combinations are non-overlapping?
    • A. 

      1, 6, 11

    • B. 

      2, 7, 10

    • C. 

      2, 8, 13

    • D. 

      3, 6, 9

  • 2. 
    • A. 

      21

    • B. 

      80

    • C. 

      443

    • D. 

      3389

  • 3. 
    Which of the following is most effective against threats when used with an updated sewer? (Select TWO)
    • A. 

      Kerberos server

    • B. 

      Stateful firewall

    • C. 

      Content filter

    • D. 

      IDS

    • E. 

      VPN concentrator

  • 4. 
    A crossover cable is MOST commonly associated with which of the following layers of the OSI model?
    • A. 

      Session

    • B. 

      Application

    • C. 

      Network

    • D. 

      Physical

  • 5. 
    For security reasons Kurt, a network technician, wants to install a Linux based email server. Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hardware costs?
    • A. 

      VPN concentrator

    • B. 

      Virtual servers

    • C. 

      Wireless

    • D. 

      Multimode fiber

  • 6. 
    A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?
    • A. 

      IS-IS

    • B. 

      BGP

    • C. 

      OSPF

    • D. 

      RIP

  • 7. 
    A layer 3 switch can move packets between subnets based on which of the following criteria?
    • A. 

      802.1q tag

    • B. 

      Port

    • C. 

      Application

    • D. 

      IP address

  • 8. 
    Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?
    • A. 

      Honeynet

    • B. 

      Honeypot

    • C. 

      Vulnerability scanner

    • D. 

      Network based IDS

  • 9. 
    A bridge handles frames at which of the following layers of the OSI model?
    • A. 

      Network

    • B. 

      Session

    • C. 

      Transport

    • D. 

      Data Link

  • 10. 
    Joe, an administrator, is using a punch-down tool to connect a cable. To which of the following is Joe MOST likely connecting?
    • A. 

      A 110 block

    • B. 

      A demarc

    • C. 

      A DB-9

    • D. 

      A smart jack

  • 11. 
    Joe, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and 30. The servers are able to communicate with each other, but are unable to reach the Internet. Joe sees the following information in the switch configuration: Interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Joe is able to ping the router at 192.168.105 1 from the switch. Which of the following is the MOST likely cause of the problem?
    • A. 

      The subnet mask is incorrect

    • B. 

      A routing loop has occurred

    • C. 

      Joe used a crossover cable to connect the switch to the gateway

    • D. 

      The server is missing default-gateway information

  • 12. 
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11n

  • 13. 
    Which of the following devices should Joe, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?
    • A. 

      Hub

    • B. 

      VLAN

    • C. 

      Router

    • D. 

      Server

  • 14. 
    Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present?
    • A. 

      Reverse ARP

    • B. 

      Full duplex on the fiber link

    • C. 

      PoE

    • D. 

      802.1q trunking

  • 15. 
    Sandy, a user, is unable to access the company website on a laptop. A network technician verifies that the user can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?
    • A. 

      Remotely connect to Sandy’s laptop and review the network configuration settings.

    • B. 

      Ping the web server from inside the network to ensure it is still up and running.

    • C. 

      Check to make sure the company’s website is accessible from the Internet

    • D. 

      Ensure the Ethernet cable is securely plugged into Sandy’s laptop

  • 16. 
    Karen, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology?
    • A. 

      Verify full system functionality and if applicable implement preventative measures

    • B. 

      Implement the solution or escalate as necessary.

    • C. 

      Document findings, actions, and outcom

    • D. 

      Establish a theory of probable cause (e.g. question the obvious).

  • 17. 
    Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11n

  • 18. 
    A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?
    • A. 

      WEP

    • B. 

      Port filtering

    • C. 

      WPA

    • D. 

      Longer SSID broadcast intervals

  • 19. 
    • A. 

      20

    • B. 

      21

    • C. 

      22

    • D. 

      23

  • 20. 
    Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?
    • A. 

      This is a private address which cannot be seen by external users

    • B. 

      The address does not have the appropriate subnet mask assigned.

    • C. 

      This is a public address which can only be seen by internal users.

    • D. 

      This is a private address which can only be seen by external users

  • 21. 
    • A. 

      Ring

    • B. 

      Star

    • C. 

      Bus

    • D. 

      Mesh

  • 22. 
    Users have reported slow access limes when retrieving information from a server on the company’s network. Which of the following tools would provide access time information on each segment of the network to reach the server?
    • A. 

      Arp

    • B. 

      Route

    • C. 

      Ipconfig

    • D. 

      Tracert

  • 23. 
    Karen, a network administrator, needs to add an additional connection to a room. She adds a new Ethernet switch and must connect it to an existing switch. Which cable type should Karen use to connect the two switches?
    • A. 

      CAT3cable

    • B. 

      Serial cable

    • C. 

      Crossover cable

    • D. 

      Rollover cable

  • 24. 
    • A. 

      A record

    • B. 

      NS record

    • C. 

      CNAME record

    • D. 

      MX record

  • 25. 
    The selection of the correct punch down tool to use depends on which of the following?
    • A. 

      Connector type

    • B. 

      Demarcation point location

    • C. 

      Block type

    • D. 

      Switch location

  • 26. 
    • A. 

      DSL

    • B. 

      Ethernet

    • C. 

      DOCSIS

    • D. 

      SONET

  • 27. 
    A company wants to secure access to its internal wifeless network. The company wants to use the most secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?
    • A. 

      WEP encryption

    • B. 

      Channel rotation

    • C. 

      Disable SSID

    • D. 

      WPA encryption

  • 28. 
    1000BaseT has a MAXIMUM run distance of:
    • A. 

      25 meters (82 feet)

    • B. 

      100 meters (328 feet)

    • C. 

      500 meters (1640 feet)

    • D. 

      1000 meters (3280 feet)

  • 29. 
    Sandy, an administrator, attempts to open a web page and sees the following error 'Error 404: Page not found'. She then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside?
    • A. 

      Layer 1

    • B. 

      Layer 4

    • C. 

      Layer 5

    • D. 

      Layer 7

  • 30. 
    Which of the following protocols is Joe, a technician, using to encrypt data between web servers and web browsers?
    • A. 

      SMTP

    • B. 

      SIP

    • C. 

      HTTP

    • D. 

      SSL

  • 31. 
    • A. 

      SNTP

    • B. 

      SCP

    • C. 

      SMTP

    • D. 

      SIP

  • 32. 
    Kurt, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to the MDF, through a room that has a large number of motors. Which of the following would be the BEST cable type to choose?
    • A. 

      CAT3

    • B. 

      STP

    • C. 

      Coaxial

    • D. 

      Fiber

  • 33. 
    Karen, a customer, wants to install a wireless network into a shared office space. There are several other wireless networks from other companies that can be detected within the office space. Which of the following should be configured on Karen's wireless network to differentiate it from other wireless network and still provide the BEST performance and security? (Select TWO).
    • A. 

      SSID

    • B. 

      Channel

    • C. 

      Antenna type

    • D. 

      Wireless standard

    • E. 

      NAT

  • 34. 
    Joe, a user, can no longer access the accounting file share, but others are still able to access the share. Which of the following would be the FIRST step in troubleshooting the issue?
    • A. 

      Notify senior management of the issue

    • B. 

      Develop a probable cause theory.

    • C. 

      Ask Joe if anything has changed on the system.

    • D. 

      Escalate the issue to the vendor.

  • 35. 
    Which of the following wiring standards would Karen, a technician, MOST likely use to interconnect two devices without the use of a hub or switch?
    • A. 

      568A

    • B. 

      568B

    • C. 

      Crossover

    • D. 

      Loopback

  • 36. 
    Which of the following would provide Kurt, a technician, with a performance reference point to refer back to after hardware repair?
    • A. 

      Baseline

    • B. 

      Network map

    • C. 

      Wire scheme

    • D. 

      Asset management

  • 37. 
    • A. 

      DB-9

    • B. 

      BNC

    • C. 

      RJ-45

    • D. 

      RJ-11

  • 38. 
    • A. 

      DB-9

    • B. 

      LC

    • C. 

      ST

    • D. 

      BNC

  • 39. 
    Kurt, a user, on a network cannot access any network resources. The link light on his computer shows that a connection is present. Which of the following is the MOST likely cause of the problem?
    • A. 

      The wrong cable type has been used

    • B. 

      IDS has shut down the computer's switch port

    • C. 

      The port on the switch is configured incorrectly

    • D. 

      Spanning tree protocol was implemented

  • 40. 
    • A. 

      Repeater

    • B. 

      Hub

    • C. 

      Firewall

    • D. 

      Switch

  • 41. 
    • A. 

      Telnet

    • B. 

      SMTP

    • C. 

      SIP

    • D. 

      SNMP

  • 42. 
    • A. 

      Hop count

    • B. 

      MTU

    • C. 

      Latency

    • D. 

      Bandwidth

  • 43. 
    A router that takes the workstations internal IP address and changes it to another IP address when it sends the data outside of the network is and example of which of the following?
    • A. 

      NAT

    • B. 

      IDS

    • C. 

      NMAP

    • D. 

      DMZ

  • 44. 
    Karen, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Karen purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?
    • A. 

      Install two CAT6 cables with a repeater

    • B. 

      Install a 500 foot (152 meter) CAT5 cable.

    • C. 

      Install a 500 foot (152 meter) CAT5e cable

    • D. 

      Install three CAT6 cables with a repeater

  • 45. 
    Kurt, the network administrator, has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. Kurt checks the port connecting the new switch to the core switch and sees the following information: #show run interface GigabitEthernet 0/10 Switchport trunk encapsulation dotlq Switchport mode trunk Switchport trunk native VLAN 10 Which of the following is the MOST likely cause of the slow connections?
    • A. 

      The servers have not had VLAN tagging enabled on their NICs

    • B. 

      Speed and duplex have not been set

    • C. 

      VLAN tagging was not set on the trunk

    • D. 

      The servers have been connected with CAT5 cable

  • 46. 
    Karen, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used?
    • A. 

      Traceroute

    • B. 

      Ping

    • C. 

      Ipconfig

    • D. 

      Netstat

  • 47. 
    A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?
    • A. 

      Coaxial

    • B. 

      CAT3

    • C. 

      CAT5

    • D. 

      CAT5e

  • 48. 
    Which of the following regulates the amount of network traffic a single node receives in a server cluster?
    • A. 

      Load balancer

    • B. 

      Proxy server

    • C. 

      Content filter

    • D. 

      Quality of service

  • 49. 
    Before installing a wireless network, which of the following should Karen, a network technician, take into consideration to reduce signal exposure for war drivers?
    • A. 

      Device placement

    • B. 

      MAC address filtering

    • C. 

      User authentication

    • D. 

      Encryption protocols

  • 50. 
    Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).
    • A. 

      22

    • B. 

      23

    • C. 

      143

    • D. 

      161

    • E. 

      162

    • F. 

      8080

  • 51. 
    • A. 

      Virtual PBX

    • B. 

      Virtual desktop

    • C. 

      Virtual switch

    • D. 

      Virtual server

  • 52. 
    In which of the following layers of the OSI model does the TCP protocol operate?
    • A. 

      Session

    • B. 

      Network

    • C. 

      Data link

    • D. 

      Transport

  • 53. 
    • A. 

      A

    • B. 

      MX

    • C. 

      AAAA

    • D. 

      CNAME

  • 54. 
    Which of the following improves wireless performance only allowing only one wireless transmission on the network at a time?
    • A. 

      CSMA/CA

    • B. 

      CSMA/CD

    • C. 

      Wireless encryption

    • D. 

      Wireless bonding

  • 55. 
    Creating a uniform user environment throughout the network can BEST be achieved by using which of the following?
    • A. 

      Honeypots

    • B. 

      Virtual switches

    • C. 

      Virtual PBX

    • D. 

      Virtual desktops

  • 56. 
    After a baseline check was completed it was noted that the network was working far below the level of the last baseline. Which of the following should Joe, the technician, do NEXT to determine where the network problems are occurring?
    • A. 

      Upgrade the firmware on all routers and switches

    • B. 

      Reboot the entire network one device at a time

    • C. 

      Conduct a network traffic analysis

    • D. 

      Rerun the baseline to ensure the results were correct

  • 57. 
    The location where the Telco wiring stops and the clients wiring starts is known as the:
    • A. 

      MDF

    • B. 

      Demarc

    • C. 

      IDF

    • D. 

      66 block

  • 58. 
    Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack? (Select TWO).
    • A. 

      Physical

    • B. 

      Session

    • C. 

      Data Link

    • D. 

      Network

    • E. 

      Transport

  • 59. 
    Which of the following would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers?
    • A. 

      Baselines

    • B. 

      Regulations

    • C. 

      Logical network diagrams

    • D. 

      Wiring schematics

  • 60. 
    Keyword and blacklist filtering would be handled at which level in a network?
    • A. 

      Layer 2 managed switch

    • B. 

      DHCP server

    • C. 

      Hardware firewall

    • D. 

      Bridge

  • 61. 
    A common technique used to prevent the unauthorized network devices from sending traffic across a network is port.
    • A. 

      Spanning

    • B. 

      Address translation

    • C. 

      Mirroring

    • D. 

      Authentication

  • 62. 
    When installing two 802.11g access points in the same building, which of the following channels will MOST likely be used to minimize interference?
    • A. 

      5 and 6

    • B. 

      1 and 6

    • C. 

      6 and 10

    • D. 

      2 and 6

  • 63. 
    • A. 

      Bridge

    • B. 

      Unmanaged switch

    • C. 

      DHCP client

    • D. 

      Firewall

  • 64. 
    Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?
    • A. 

      A short

    • B. 

      Open pairs

    • C. 

      ESD

    • D. 

      EMI

  • 65. 
    Which of the following describes the location where an administrator would terminate a bundle of CAT5e cables?
    • A. 

      Switch

    • B. 

      Smart jack

    • C. 

      Router

    • D. 

      Patch panel

  • 66. 
    • A. 

      RG-6

    • B. 

      CAT5e

    • C. 

      Fiber

    • D. 

      RG-59

  • 67. 
    • A. 

      Port scan

    • B. 

      Ping sweep

    • C. 

      IDS

    • D. 

      NIPS

  • 68. 
    A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?
    • A. 

      Document the solution and process

    • B. 

      Establish the most probable cause

    • C. 

      Implement and test the solution

    • D. 

      Identify additional symptoms and problems

  • 69. 
    A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?
    • A. 

      Route

    • B. 

      Ifconfig

    • C. 

      Netstat

    • D. 

      Nslookup

  • 70. 
    • A. 

      Ipconficj

    • B. 

      Nslookup

    • C. 

      Netstat

    • D. 

      Dig

  • 71. 
    • A. 

      Bandwidth shaper

    • B. 

      Proxy server

    • C. 

      Wireless router

    • D. 

      Load balancer

  • 72. 
    At which of the following layers does the TFTP protocol operate?
    • A. 

      Layer 1

    • B. 

      Layer 4

    • C. 

      Layer 5

    • D. 

      Layer 7

  • 73. 
    • A. 

      IGP

    • B. 

      OSPF

    • C. 

      BGP

    • D. 

      RIP

  • 74. 
    Which of the following is used by RADIUS to encrypt messages between the server and the client?
    • A. 

      Public key

    • B. 

      CSU/DSU

    • C. 

      Private key

    • D. 

      Shared secret

  • 75. 
    Which of the following is the name of the routing update process involved when a change occurs in the routing environment?
    • A. 

      Supernetting

    • B. 

      Dynamic

    • C. 

      Subletting

    • D. 

      Convergence

  • 76. 
    • A. 

      Routers

    • B. 

      Switches

    • C. 

      Laptops

    • D. 

      Access points

  • 77. 
    Which of the following should an administrator do after running a command from the console on the perimeter router?
    • A. 

      Update the configuration logs

    • B. 

      Update the network wiring schematics

    • C. 

      Update the network configuration procedures

    • D. 

      Compare the configuration with the baseline

  • 78. 
    Which of the following features should an administrator configure to allow an IDS to watch the traffic on a switch?
    • A. 

      ARP spoofing

    • B. 

      VLAN

    • C. 

      Mirroring

    • D. 

      Spanning tree

  • 79. 
    • A. 

      Arp

    • B. 

      Nslookup

    • C. 

      Dig

    • D. 

      Netstat

  • 80. 
    • A. 

      POTS

    • B. 

      FDDI

    • C. 

      SONET

    • D. 

      Cable modem

  • 81. 
    Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?
    • A. 

      Gateway

    • B. 

      Hub

    • C. 

      Bridge

    • D. 

      Router

  • 82. 
    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?
    • A. 

      IDS

    • B. 

      VPN

    • C. 

      NIPS

    • D. 

      HIDS

  • 83. 
    At which of the following layers does the ICMP protocol operate?
    • A. 

      Layer 1

    • B. 

      Layer 3

    • C. 

      Layer 4

    • D. 

      Layer 5

  • 84. 
    A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?
    • A. 

      The client does not support 802.11n.

    • B. 

      Incorrect frequency on the client is being used.

    • C. 

      Incorrect encryption on the AP.

    • D. 

      The client distance from the AP.

  • 85. 
    • A. 

      RDP

    • B. 

      VNC

    • C. 

      SSL

    • D. 

      PPTP

    • E. 

      RAS

  • 86. 
    • A. 

      POTS

    • B. 

      ATM

    • C. 

      VDSL

    • D. 

      SDSL

  • 87. 
    • A. 

      Syslog

    • B. 

      Audit log

    • C. 

      History log

    • D. 

      Ping sweep reports

  • 88. 
    A network technician arrives to work and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documents should the technician use to attempt to discover the problem?
    • A. 

      Network maps

    • B. 

      Change management

    • C. 

      Baselines

    • D. 

      Cable management

  • 89. 
    • A. 

      00-1C-1F-2C-13-43

    • B. 

      FFFF.FFFF.FFFF

    • C. 

      00-1B-26-3F-B1-16-34

    • D. 

      00-01-1E-2F-B3-16-01

    • E. 

      001C.1G2F.1234

  • 90. 
    Which of the following tools would an administrator use to determine if a DNS server is answering authoritatively for a domain?
    • A. 

      Nbtstat

    • B. 

      Dig

    • C. 

      Netstat

    • D. 

      Hostname

  • 91. 
    • A. 

      PERMIT 192.268.20.1

    • B. 

      DROP 00-12-34-56-78-9A

    • C. 

      DENYO:::0:::0:::3

    • D. 

      DENY ANY ANY

    • E. 

      PERMIT 192.168 1.100 80

  • 92. 
    • A. 

      10.0.10.1

    • B. 

      1A-23-F9-CD-06-9L

    • C. 

      1A-23-F9-CD-06-9B

    • D. 

      1A-23-F9-CD-06-9B-23-5C

  • 93. 
    • A. 

      QoS

    • B. 

      Trunking

    • C. 

      Spanning

    • D. 

      VoIP

  • 94. 
    A technician receives an urgent call that the switch in accounting is down. Which of the following should the technician do FIRST to troubleshoot this issue?
    • A. 

      Identity symptoms and problems

    • B. 

      Document the process and solutions

    • C. 

      Establish the most probable cause

    • D. 

      Escalate if necessary

  • 95. 
    By default, which of the following ports would a network need to have opened to allow for the transmission of incoming and outgoing email? (Select TWO).
    • A. 

      21

    • B. 

      25

    • C. 

      80

    • D. 

      110

    • E. 

      123

  • 96. 
    A Stateful firewall is MOST useful in protecting against which of the following network scans?
    • A. 

      PING

    • B. 

      UDP

    • C. 

      Xmas

    • D. 

      ACK

  • 97. 
    Which of the following would be BEST to use when identifying HTTP traffic running on TCP port 53?
    • A. 

      Network layer firewall

    • B. 

      Stateful inspection firewall

    • C. 

      Zone aware firewall

    • D. 

      Application layer firewall

  • 98. 
    An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?
    • A. 

      NAT

    • B. 

      Dynamic

    • C. 

      Subnetting

    • D. 

      Static

  • 99. 
    Which of the following features does SNMPv3 have over previous versions when remotely monitoring networking devices? (Select TWO).
    • A. 

      Trap receivers

    • B. 

      HTTPS

    • C. 

      Authentication

    • D. 

      Privacy

    • E. 

      Availability

  • 100. 
    An administrator only has one public IP address that must be shared among five employees. Which of the following network schemes should be used?
    • A. 

      SNAT

    • B. 

      SNAP

    • C. 

      NAC

    • D. 

      MPLS