Networking 005 Part 4

100 Questions | Attempts: 77
Share

SettingsSettingsSettings
Networking Quizzes & Trivia

Netwoprking Quiz


Questions and Answers
  • 1. 

    Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?

    • A.

      Determine what has changed

    • B.

      Test a solution

    • C.

      Establish the most probable cause

    • D.

      Escalate the problem to the right section

    Correct Answer
    A. Determine what has changed
  • 2. 

    Which of the following authenticates a web server to the remote client in PKI?

    • A.

      FQDN

    • B.

      DNS name

    • C.

      Public key

    • D.

      Private key

    Correct Answer
    C. Public key
  • 3. 

    An administrator needs to diagnose problems with a WINS server. Which of the following tools should be used?

    • A.

      Nslookup

    • B.

      Nbtstat

    • C.

      Dig

    • D.

      Netstat

    Correct Answer
    B. Nbtstat
  • 4. 

    Which of the following connector types is used for coax cable?

    • A.

      BNC

    • B.

      ST

    • C.

      LC

    • D.

      SC

    Correct Answer
    A. BNC
  • 5. 

    In an enterprise setting, access switches providing network connectivity placed throughout a building are typically connected to a backbone called the:

    • A.

      MDF

    • B.

      Proxy

    • C.

      Demarcation point

    • D.

      Smart jack

    Correct Answer
    A. MDF
  • 6. 

    Which of the following wireless standards has the highest maximum data rate?

    • A.

      802.11n

    • B.

      802.11b

    • C.

      802.11a

    • D.

      802.11g

    Correct Answer
    A. 802.11n
  • 7. 

    Which of the following solutions will detect and disable a rogue access point?

    • A.

      Port scan

    • B.

      Packet sniffer

    • C.

      IPS

    • D.

      IDS

    Correct Answer
    C. IPS
  • 8. 

    A zone transfer occurs over which of the following ports?

    • A.

      TCP 53

    • B.

      UDP67

    • C.

      UDP123

    • D.

      TCP 25

    Correct Answer
    A. TCP 53
  • 9. 

    A technician claims to have crimped a patch cable according to the T568A standard on one end and T568B on the other. Which of the following results is to be expected?

    • A.

      Since only half the leads are used, the cable will only work at 100Mbps

    • B.

      The cable will only work at a maximum of 100Mbps. since 1Gbps only works on T568B cables.

    • C.

      There will be no proper data continuity; the standards utilize two different wiring diagrams.

    • D.

      The cable will only work at a maximum of 10Mbps. since 100/1000Mbps only works on T568B pure cables

    Correct Answer
    C. There will be no proper data continuity; the standards utilize two different wiring diagrams.
  • 10. 

    An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?

    • A.

      Multicast

    • B.

      Unicast

    • C.

      Broadcast

    • D.

      Peer-to-peer

    Correct Answer
    A. Multicast
  • 11. 

    Which of the following protocols should be used to monitor network performance?  

    • A.

      SNTP

    • B.

      SMTP

    • C.

      HTTP

    • D.

      SNMP

    Correct Answer
    D. SNMP
  • 12. 

    A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?

    • A.

      Phishing

    • B.

      Smurf attack

    • C.

      Denial of service

    • D.

      Man-in-the-middle

    Correct Answer
    A. Phishing
  • 13. 

    Which of the following protocols requests membership to a multicast group?

    • A.

      IGMP

    • B.

      SNMP

    • C.

      SMTP

    • D.

      ICMP

    Correct Answer
    A. IGMP
  • 14. 

    A standard installation for wireless will use which of the following antenna types?

    • A.

      Sector

    • B.

      Patch

    • C.

      Yagi

    • D.

      Omni-Directional

    Correct Answer
    D. Omni-Directional
  • 15. 

    Which of the following regulates the amount of network traffic a single node receives in a server cluster?

    • A.

      Load balancer

    • B.

      Proxy server

    • C.

      Content filter

    • D.

      Quality of service

    Correct Answer
    A. Load balancer
  • 16. 

    A technician would like to separate the HR department's workstations from the other workstations at the company. Which of the following network topologies should be used?

    • A.

      Peer to peer

    • B.

      Subnetting

    • C.

      VLAN

    • D.

      VPN

    Correct Answer
    C. VLAN
  • 17. 

    A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables?

    • A.

      Switch

    • B.

      Router

    • C.

      Repeater

    • D.

      Bridge

    Correct Answer
    C. Repeater
  • 18. 

    An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?

    • A.

      Logical network diagram

    • B.

      History logs

    • C.

      Baseline configurations

    • D.

      Wiring schematics

    Correct Answer
    A. Logical network diagram
  • 19. 

    Which of the following describes what the number two represents in l00Base2 cabling?

    • A.

      Fiber

    • B.

      Coaxial cable

    • C.

      UTP

    • D.

      Twisted pair

    Correct Answer
    B. Coaxial cable
  • 20. 

    A crossover cable is MOST commonly associated with which of the following layers of the OSI model?

    • A.

      Session

    • B.

      Application

    • C.

      Network

    • D.

      Physical

    Correct Answer
    D. Physical
  • 21. 

    Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examples of which of the following security types?

    • A.

      Physical

    • B.

      Logical

    • C.

      Software

    • D.

      Authentication

    Correct Answer
    A. Physical
  • 22. 

    Which of the following has a MAXIMUM distance of 300 meters (984 feet)?

    • A.

      1000BaseT

    • B.

      10GBaseSW

    • C.

      100BaseFX

    • D.

      100BaseTX

    Correct Answer
    B. 10GBaseSW
  • 23. 

    Which of the following documents should always be kept up-to-date after any major changes are made to a network backbone?

    • A.

      Network diagram

    • B.

      Performance baseline

    • C.

      Network security procedure

    • D.

      Company policy

    Correct Answer
    A. Network diagram
  • 24. 

    Which of the following is a disadvantage of using the EIGRP protocol?

    • A.

      It does not scale well.

    • B.

      It converges slower than OSPF.

    • C.

      It is a proprietary protocol

    • D.

      It is a distance vector protocol

    Correct Answer
    C. It is a proprietary protocol
  • 25. 

    Which of the following routing protocols runs over UDP and determines path based upon distance vectors?

    • A.

      RIP

    • B.

      DSI

    • C.

      BGP

    • D.

      ISIS

    Correct Answer
    A. RIP
  • 26. 

    Which of the following is equipment provided by the telephone company that provides remote diagnostic and loopback services for subscriber lines?

    • A.

      66 block

    • B.

      Demarc

    • C.

      Smart jack

    • D.

      110 block

    Correct Answer
    C. Smart jack
  • 27. 

    An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?

    • A.

      Setup an ACL that allows and logs all IP traffic between the two computers

    • B.

      Configure a spanning tree to check for a loop

    • C.

      Setup a span port on the switch to watch for CRC errors

    • D.

      Connect both computers using a crossover cable

    Correct Answer
    D. Connect both computers using a crossover cable
  • 28. 

    Which of the following devices is used to connect multiple devices to a network and does not stop broadcast traffic?

    • A.

      Switch

    • B.

      Hub

    • C.

      Modem

    • D.

      Repeater

    Correct Answer
    B. Hub
  • 29. 

    Which of the following protocols allow the set up, teardown and streaming of VoIP traffic? (Select TWO)

    • A.

      NTP

    • B.

      VNC

    • C.

      RTP

    • D.

      SIP

    • E.

      TLS

    Correct Answer(s)
    C. RTP
    D. SIP
  • 30. 

    Which of the following is a secure method of copying information over a public network?

    • A.

      SCP

    • B.

      SMTP

    • C.

      SNMP

    • D.

      TFTP

    Correct Answer
    A. SCP
  • 31. 

    An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals? (Select TWO).

    • A.

      TACACS+

    • B.

      RADIUS

    • C.

      Kerberos

    • D.

      802.1X

    • E.

      RRAS

    Correct Answer(s)
    A. TACACS+
    B. RADIUS
  • 32. 

    An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?

    • A.

      2.4GHz

    • B.

      900MHz

    • C.

      1.1GHz

    • D.

      5GHz

    Correct Answer
    A. 2.4GHz
  • 33. 

    An administrator suspects that an incorrect POTS line is carrying the DSL signal. Which of the following will help diagnose this issue?

    • A.

      Multimeter

    • B.

      Toner probe

    • C.

      Protocol analyzer

    • D.

      Butt set

    Correct Answer
    D. Butt set
  • 34. 

    An administrator wants to test the network MTU. Which of the following commands allows different size packets to be sent?

    • A.

      Netstat

    • B.

      Traceroute

    • C.

      Nbtstat

    • D.

      Ping

    Correct Answer
    D. Ping
  • 35. 

    Which of the following is used to serve as an emergency backup line to troubleshoot a broadband connection on many routers?

    • A.

      DSL

    • B.

      POTS

    • C.

      VDSL

    • D.

      Smart jack

    Correct Answer
    B. POTS
  • 36. 

    Which of the following protocols uses UDP to transfer files?

    • A.

      FTP

    • B.

      SFTP

    • C.

      SMTP

    • D.

      TFTP

    Correct Answer
    D. TFTP
  • 37. 

    Which of the following would be used to connect two IDFs in the same building with the LAN, while minimizing crosstalk?

    • A.

      RG-6

    • B.

      STP

    • C.

      CAT3

    • D.

      UTP

    Correct Answer
    B. STP
  • 38. 

    Which of the following network devices would MOST likely be installed to allow the company's single public IP to be shared and translated into local IPs for network devices?

    • A.

      Router

    • B.

      Hub

    • C.

      WAP

    • D.

      Switch

    Correct Answer
    A. Router
  • 39. 

    A technician who separated two departments using VLANs now discovers that the VLANs cannot communicate with each other. Which of the following does the technician need to enable communication between the VLANs?

    • A.

      Port spanning

    • B.

      VLAN concentrator

    • C.

      Firewall

    • D.

      Router

    Correct Answer
    D. Router
  • 40. 

    Which of the following network topologies BEST describes a VPN? (Select TWO)

    • A.

      Point to Point

    • B.

      Point to Multipoint

    • C.

      VLAN

    • D.

      Ring

    • E.

      Bus

    Correct Answer(s)
    A. Point to Point
    B. Point to Multipoint
  • 41. 

    Which of the following cable speeds would provide the GREATEST theoretical bandwidth?

    • A.

      1000BaseT

    • B.

      100BaseT

    • C.

      10GBaseT

    • D.

      10BaseT

    Correct Answer
    C. 10GBaseT
  • 42. 

    Which of the following is true about an IP address if the first bit is a zero?

    • A.

      The address is a Class A address.

    • B.

      The address is a Class B address

    • C.

      The address is a Class C address

    • D.

      The address is a Class D address.

    Correct Answer
    A. The address is a Class A address.
  • 43. 

    Which of the following tools are BEST used to cut away the outside covering of a CAT5e cable?

    • A.

      Stripper

    • B.

      Punch down tool

    • C.

      Butt set

    • D.

      Snips

    Correct Answer
    A. Stripper
  • 44. 

    Which of the following is typically used In an LAN environment?

    • A.

      10GBaseSW

    • B.

      10GBaseLW

    • C.

      10GBaseSR

    • D.

      10GBaseEW

    Correct Answer
    C. 10GBaseSR
  • 45. 

    After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straight-thru wires. Which of the following MOST likely describes this cable type?

    • A.

      Crossover cable with open pairs

    • B.

      Crossover cable

    • C.

      Rollover cable

    • D.

      Straight-thru cable with open pairs

    Correct Answer
    B. Crossover cable
  • 46. 

    A server keeps rebooting at various times throughout the day. Which of the following tools would BEST help to diagnose this issue?

    • A.

      Multimeter

    • B.

      Temperature monitor

    • C.

      Cable tester

    • D.

      Toner probe

    Correct Answer
    B. Temperature monitor
  • 47. 

    Which of the following devices would allow a technician using a packet sniffer to view all the data on a network?

    • A.

      GBIC

    • B.

      Hub

    • C.

      Bridge

    • D.

      Modem

    Correct Answer
    B. Hub
  • 48. 

    An administrator finds a phone line but does not know where the line goes or if it is active. Which of the following can be used to test if it is active?

    • A.

      Butt set

    • B.

      Punch down tool

    • C.

      Cable tester

    • D.

      Cable stripper

    Correct Answer
    A. Butt set
  • 49. 

    Which of the following allows a technician to mask a private network of IP addresses behind one public IP address?

    • A.

      NAT

    • B.

      Subnetting

    • C.

      DHCP

    • D.

      DNS

    Correct Answer
    A. NAT
  • 50. 

    An administrator is deploying three B/G wireless access points in a new office location. Which of the following channels eliminates interference?

    • A.

      1, 6, and11

    • B.

      3, 6, and 9

    • C.

      11,16, and20

    • D.

      36, 40, and 44

    Correct Answer
    A. 1, 6, and11

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • May 15, 2012
    Quiz Created by
    SGogola
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.