Networking 005 Part 4

100 Questions | Attempts: 77
Please wait...
Question 1 / 101
🏆 Rank #--
Score 0/100

1. A server keeps rebooting at various times throughout the day. Which of the following tools would BEST help to diagnose this issue?

Submit
Please wait...
About This Quiz
Networking 005 Part 4 - Quiz

Netwoprking Quiz

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. An administrator finds a phone line but does not know where the line goes or if it is active. Which of the following can be used to test if it is active?

Submit

3. An administrator is deploying three B/G wireless access points in a new office location. Which of the following channels eliminates interference?

Submit

4. Which of the following tools would a technician use to check functionality of a physical network connection?

Submit

5. Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?

Submit

6. A network IPS provides which of the following?

Submit

7. Which of the following should be configured to provide priority to voice traffic?

Submit

8. On which of the following network devices would an administrator configure an ACL?

Submit

9. An administrator is trying to isolate the location of a persistent connectivity problem caused by a faulty NIC. Which of the following diagrams would assist the technician in finding the machine that is causing the problem?

Submit

10. Which of the following allows a technician to mask a private network of IP addresses behind one public IP address?

Submit

11. A standard installation for wireless will use which of the following antenna types?

Submit

12. Which of the following protocols is the LEAST secure and should be avoided on a wireless network?

Submit

13. Which of the following regulates the amount of network traffic a single node receives in a server cluster?

Submit

14. A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?

Submit

15. Which of the following solutions will detect and disable a rogue access point?

Submit

16. Which of the following cables is the MOST susceptible to interference?

Submit

17. When installing a wireless network in a large area, which of the following is the FIRST thing that should be considered when trying to get the MOST coverage?

Submit

18. Which of the following cable speeds would provide the GREATEST theoretical bandwidth?

Submit

19. An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?

Submit

20. A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?

Submit

21. A technician would like to separate the HR department's workstations from the other workstations at the company. Which of the following network topologies should be used?

Submit

22. A crossover cable is MOST commonly associated with which of the following layers of the OSI model?

Submit

23. Which of the following documents should always be kept up-to-date after any major changes are made to a network backbone?

Submit

24. Which of the following connector types is used for coax cable?

Submit

25. An administrator would like to know the name of the workstation that is being repaired. Which of the following commands, without parameters, will provide this information?

Submit

26. Which of the following technologies allows an administrator to submit traffic to an IDS for review?

Submit

27. A technician claims to have crimped a patch cable according to the T568A standard on one end and T568B on the other. Which of the following results is to be expected?

Submit

28. Which of the following is a reason to block FTP at the corporate firewall?

Submit

29. Which of the following methods can move files in clear text and can be easily intercepted?

Submit

30. An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?

Submit

31. Which of the following protocols should be used to monitor network performance?  

Submit

32. An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?

Submit

33. Prioritizing traffic between data and voice is defined as which of the following?

Submit

34. Which of the following allows a WAP to be installed in a location where there are no power outlets available?

Submit

35. Which of the following is true about an IP address if the first bit is a zero?

Submit

36. An administrator receives a contract for a server install at a new building. Which of the following should be completed after installing the server?

Submit

37. An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classful address. Which of the following is the address that can be used in this scenario?

Submit

38. An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?

Submit

39. A technician needs to add network capacity. However, when plugging a second switch into the first switch, there is no link light. Which of the following is the cause of this situation?

Submit

40. In an enterprise setting, access switches providing network connectivity placed throughout a building are typically connected to a backbone called the:

Submit

41. Which of the following is the term used to describe the aggregation of multiple components to form one logical component?

Submit

42. A demarcation point is usually installed and managed by which of the following providers?

Submit

43. Users are unable to access the Internet but the users are able to send/receive email from their desktops. Which of the following ports is MOST likely being blocked?

Submit

44. Which of the following would need to be implemented on a wireless router to allow network access based on a passphrase that the administrator would supply?

Submit

45. After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straight-thru wires. Which of the following MOST likely describes this cable type?

Submit

46. Which of the following devices would allow a technician using a packet sniffer to view all the data on a network?

Submit

47. Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examples of which of the following security types?

Submit

48. Which of the following is equipment provided by the telephone company that provides remote diagnostic and loopback services for subscriber lines?

Submit

49. An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?

Submit

50. Which of the following would be used to connect two IDFs in the same building with the LAN, while minimizing crosstalk?

Submit

51. Which of the following network devices would MOST likely be installed to allow the company's single public IP to be shared and translated into local IPs for network devices?

Submit

52. An administrator needs to diagnose problems with a WINS server. Which of the following tools should be used?

Submit

53. Which of the following wireless standards has the highest maximum data rate?

Submit

54. Which of the following troubleshooting steps should be performed NEXT after a core router has been reported down?

Submit

55. Which of the following tools are BEST used to cut away the outside covering of a CAT5e cable?

Submit

56. Which of the following is an invalid subnet mask?

Submit

57. Which of the following routing protocols runs over UDP and determines path based upon distance vectors?

Submit

58. An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals? (Select TWO).

Submit

59. Which of the following wiring distribution components should be chosen to provide level integrated diagnostic capabilities?

Submit

60. Which of the following ports is the default telnet port?

Submit

61. Which of the following network topologies BEST describes a VPN? (Select TWO)

Submit

62. A zone transfer occurs over which of the following ports?

Submit

63. Which of the following connectivity issues is likely to occur within a token ring network?

Submit

64. Which of the following devices would MOST likely integrate a DHCP server?

Submit

65. Which of the following is a disadvantage of using the EIGRP protocol?

Submit

66. Which of the following protocols requests membership to a multicast group?

Submit

67. Which of the following tools would an administrator BEST use to trace a network cable?

Submit

68. Which of the following is the purpose of QoS?

Submit

69. Which of the following ports are used by default for web servers? (Select TWO).

Submit

70. A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables?

Submit

71. Which of the following has a MAXIMUM distance of 300 meters (984 feet)?

Submit

72. An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?

Submit

73. Which of the following analyzes the entire subnet to identify all hosts that are active?

Submit

74. The helpdesk is receiving calls about the corporate web server being down. Which of the following should be taken NEXT after verifying that the server is unreachable?

Submit

75. Which of the following describes what the number two represents in l00Base2 cabling?

Submit

76. Which of the following devices is used to connect multiple devices to a network and does not stop broadcast traffic?

Submit

77. Which of the following is a secure method of copying information over a public network?

Submit

78. Which of the following is used to serve as an emergency backup line to troubleshoot a broadband connection on many routers?

Submit

79. A technician who separated two departments using VLANs now discovers that the VLANs cannot communicate with each other. Which of the following does the technician need to enable communication between the VLANs?

Submit

80. Which of the following authenticates a web server to the remote client in PKI?

Submit

81. Which of the following is true of an ACL when a packet matching an ACE is found?

Submit

82. Which of the following technologies is used on the backbone of an ISDN?

Submit

83. A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?

Submit

84. Which of the following protocols allow the set up, teardown and streaming of VoIP traffic? (Select TWO)

Submit

85. An administrator suspects that an incorrect POTS line is carrying the DSL signal. Which of the following will help diagnose this issue?

Submit

86. An administrator wants to test the network MTU. Which of the following commands allows different size packets to be sent?

Submit

87. A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugs the cable into the only available laptop connection, but the connector is loose inside the port. The MOST likely reason the connector is loose is the:

Submit

88. An administrator is having a hard time adding a new switch to the network. After verifying that all the ports are configured correctly on each switch, which of the following should the administrator verily NEXT?

Submit

89. Which of the following protocols uses UDP to transfer files?

Submit

90. Which of the following LAN technology has a MAXIMUM range of 10,000 meters (6 miles)?

Submit

91. Which of the following is true of stateless inspection?

Submit

92. Which of the following utilities would be used to display a network's MX record?

Submit

93. Which of the following is typically used In an LAN environment?

Submit

94. A user connecting a laptop to a wall jack is prompted for user credentials before being granted access to the network. Which of the following is MOST likely implemented on the switch?

Submit

95. Which of the following routing protocols involves all routers knowing the connections status of other routers within the network?

Submit

96. When testing a CAT5 cable, the technician notices that pin A is open. However, the cable still works fine. Which of the following describes how this is possible?

Submit

97. Which of the following performs posture assessments for unknown devices that connect to the network?

Submit

98. At which of the following OSI model layers is HTTPS encryption performed?

Submit

99. Which of the following network cable types requires grounding?

Submit

100. Which of the following routing protocols are unable to advertise CIDR networks? (Select TWO)

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A server keeps rebooting at various times throughout the day. Which of...
An administrator finds a phone line but does not know where the line...
An administrator is deploying three B/G wireless access points in a...
Which of the following tools would a technician use to check...
Several users from the same location are reporting problems accessing...
A network IPS provides which of the following?
Which of the following should be configured to provide priority to...
On which of the following network devices would an administrator...
An administrator is trying to isolate the location of a persistent...
Which of the following allows a technician to mask a private network...
A standard installation for wireless will use which of the following...
Which of the following protocols is the LEAST secure and should be...
Which of the following regulates the amount of network traffic a...
A network administrator needs to add an additional connection to a...
Which of the following solutions will detect and disable a rogue...
Which of the following cables is the MOST susceptible to interference?
When installing a wireless network in a large area, which of the...
Which of the following cable speeds would provide the GREATEST...
An administrator is setting up a security camera that will send the...
A user receives an email slating that their account was compromised...
A technician would like to separate the HR department's...
A crossover cable is MOST commonly associated with which of the...
Which of the following documents should always be kept up-to-date...
Which of the following connector types is used for coax cable?
An administrator would like to know the name of the workstation that...
Which of the following technologies allows an administrator to submit...
A technician claims to have crimped a patch cable according to the...
Which of the following is a reason to block FTP at the corporate...
Which of the following methods can move files in clear text and can be...
An administrator receives reports from users in an office that their...
Which of the following protocols should be used to monitor network...
An administrator is concerned about users utilizing the company's...
Prioritizing traffic between data and voice is defined as which of the...
Which of the following allows a WAP to be installed in a location...
Which of the following is true about an IP address if the first bit is...
An administrator receives a contract for a server install at a new...
An administrator is configuring IP 10.178.1.5 on a legacy device that...
An administrator has completed the installation of a new WLAN. Which...
A technician needs to add network capacity. However, when plugging a...
In an enterprise setting, access switches providing network...
Which of the following is the term used to describe the aggregation of...
A demarcation point is usually installed and managed by which of the...
Users are unable to access the Internet but the users are able to...
Which of the following would need to be implemented on a wireless...
After testing a new 100BaseTX cable, the technician determines that...
Which of the following devices would allow a technician using a packet...
Hardware locks, keypads on entry doors, badge readers, and biometric...
Which of the following is equipment provided by the telephone company...
An administrator is troubleshooting a communication issue between two...
Which of the following would be used to connect two IDFs in the same...
Which of the following network devices would MOST likely be installed...
An administrator needs to diagnose problems with a WINS server. Which...
Which of the following wireless standards has the highest maximum data...
Which of the following troubleshooting steps should be performed NEXT...
Which of the following tools are BEST used to cut away the outside...
Which of the following is an invalid subnet mask?
Which of the following routing protocols runs over UDP and determines...
An administrator needs to authenticate users to the network, authorize...
Which of the following wiring distribution components should be chosen...
Which of the following ports is the default telnet port?
Which of the following network topologies BEST describes a VPN?...
A zone transfer occurs over which of the following ports?
Which of the following connectivity issues is likely to occur within a...
Which of the following devices would MOST likely integrate a DHCP...
Which of the following is a disadvantage of using the EIGRP protocol?
Which of the following protocols requests membership to a multicast...
Which of the following tools would an administrator BEST use to trace...
Which of the following is the purpose of QoS?
Which of the following ports are used by default for web servers?...
A client wants to improve the wireless coverage on the third floor of...
Which of the following has a MAXIMUM distance of 300 meters (984...
An administrator wants to prevent users from plugging in their...
Which of the following analyzes the entire subnet to identify all...
The helpdesk is receiving calls about the corporate web server being...
Which of the following describes what the number two represents in...
Which of the following devices is used to connect multiple devices to...
Which of the following is a secure method of copying information over...
Which of the following is used to serve as an emergency backup line to...
A technician who separated two departments using VLANs now discovers...
Which of the following authenticates a web server to the remote client...
Which of the following is true of an ACL when a packet matching an ACE...
Which of the following technologies is used on the backbone of an...
A technician needs to troubleshoot connectivity between two devices...
Which of the following protocols allow the set up, teardown and...
An administrator suspects that an incorrect POTS line is carrying the...
An administrator wants to test the network MTU. Which of the following...
A user is attempting to connect to the network remotely using a laptop...
An administrator is having a hard time adding a new switch to the...
Which of the following protocols uses UDP to transfer files?
Which of the following LAN technology has a MAXIMUM range of 10,000...
Which of the following is true of stateless inspection?
Which of the following utilities would be used to display a...
Which of the following is typically used In an LAN environment?
A user connecting a laptop to a wall jack is prompted for user...
Which of the following routing protocols involves all routers knowing...
When testing a CAT5 cable, the technician notices that pin A is open....
Which of the following performs posture assessments for unknown...
At which of the following OSI model layers is HTTPS encryption...
Which of the following network cable types requires grounding?
Which of the following routing protocols are unable to advertise CIDR...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!