Networking 005 Part 4

100 Questions | Attempts: 77
Share
SettingsSettings
Please wait...
  • 1/100 Questions

    A server keeps rebooting at various times throughout the day. Which of the following tools would BEST help to diagnose this issue?

    • Multimeter
    • Temperature monitor
    • Cable tester
    • Toner probe
Please wait...
About This Quiz

Netwoprking Quiz

Networking Quizzes & Trivia

Quiz Preview

  • 2. 

    An administrator finds a phone line but does not know where the line goes or if it is active. Which of the following can be used to test if it is active?

    • Butt set

    • Punch down tool

    • Cable tester

    • Cable stripper

    Correct Answer
    A. Butt set
  • 3. 

    An administrator is deploying three B/G wireless access points in a new office location. Which of the following channels eliminates interference?

    • 1, 6, and11

    • 3, 6, and 9

    • 11,16, and20

    • 36, 40, and 44

    Correct Answer
    A. 1, 6, and11
  • 4. 

    Which of the following tools would a technician use to check functionality of a physical network connection?

    • Butt set

    • Cable tester

    • Protocol analyzer

    • Voltage event recorder

    Correct Answer
    A. Cable tester
  • 5. 

    Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?

    • Determine what has changed

    • Test a solution

    • Establish the most probable cause

    • Escalate the problem to the right section

    Correct Answer
    A. Determine what has changed
  • 6. 

    A network IPS provides which of the following?

    • The layer 3 protocol on which other protocols like TCP and UDP communicate

    • Enables the IPSec protocol on internal workstations.

    • Packet-based detection and prevention of network attacks

    • Single mode IP communication for a fiber line between remote sites.

    Correct Answer
    A. Packet-based detection and prevention of network attacks
  • 7. 

    Which of the following should be configured to provide priority to voice traffic?

    • Port mirroring

    • DMZ

    • Qos

    • Trunking

    Correct Answer
    A. Qos
  • 8. 

    An administrator is trying to isolate the location of a persistent connectivity problem caused by a faulty NIC. Which of the following diagrams would assist the technician in finding the machine that is causing the problem?

    • Physical and logical network

    • Physical network

    • Logical network

    • DHCP tables and DNS records

    Correct Answer
    A. Physical and logical network
  • 9. 

    On which of the following network devices would an administrator configure an ACL?

    • Router

    • Hub

    • Repeater

    • NIC

    Correct Answer
    A. Router
  • 10. 

    A standard installation for wireless will use which of the following antenna types?

    • Sector

    • Patch

    • Yagi

    • Omni-Directional

    Correct Answer
    A. Omni-Directional
  • 11. 

    Which of the following regulates the amount of network traffic a single node receives in a server cluster?

    • Load balancer

    • Proxy server

    • Content filter

    • Quality of service

    Correct Answer
    A. Load balancer
  • 12. 

    Which of the following allows a technician to mask a private network of IP addresses behind one public IP address?

    • NAT

    • Subnetting

    • DHCP

    • DNS

    Correct Answer
    A. NAT
  • 13. 

    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?

    • WEP

    • PEAP

    • WPA

    • TKIP

    Correct Answer
    A. WEP
  • 14. 

    A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?

    • CAT3 cable

    • Serial cable

    • Crossover cable

    • Rollover cable

    Correct Answer
    A. Crossover cable
  • 15. 

    Which of the following solutions will detect and disable a rogue access point?

    • Port scan

    • Packet sniffer

    • IPS

    • IDS

    Correct Answer
    A. IPS
  • 16. 

    When installing a wireless network in a large area, which of the following is the FIRST thing that should be considered when trying to get the MOST coverage?

    • SSID naming

    • Device placement

    • Encryption methods

    • Channel selection

    Correct Answer
    A. Device placement
  • 17. 

    Which of the following cables is the MOST susceptible to interference?

    • Fiber

    • Coax

    • UTP

    • STP

    Correct Answer
    A. UTP
  • 18. 

    An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?

    • Multicast

    • Unicast

    • Broadcast

    • Peer-to-peer

    Correct Answer
    A. Multicast
  • 19. 

    A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?

    • Phishing

    • Smurf attack

    • Denial of service

    • Man-in-the-middle

    Correct Answer
    A. Phishing
  • 20. 

    A technician would like to separate the HR department's workstations from the other workstations at the company. Which of the following network topologies should be used?

    • Peer to peer

    • Subnetting

    • VLAN

    • VPN

    Correct Answer
    A. VLAN
  • 21. 

    A crossover cable is MOST commonly associated with which of the following layers of the OSI model?

    • Session

    • Application

    • Network

    • Physical

    Correct Answer
    A. Physical
  • 22. 

    Which of the following documents should always be kept up-to-date after any major changes are made to a network backbone?

    • Network diagram

    • Performance baseline

    • Network security procedure

    • Company policy

    Correct Answer
    A. Network diagram
  • 23. 

    Which of the following cable speeds would provide the GREATEST theoretical bandwidth?

    • 1000BaseT

    • 100BaseT

    • 10GBaseT

    • 10BaseT

    Correct Answer
    A. 10GBaseT
  • 24. 

    Which of the following connector types is used for coax cable?

    • BNC

    • ST

    • LC

    • SC

    Correct Answer
    A. BNC
  • 25. 

    Which of the following technologies allows an administrator to submit traffic to an IDS for review?

    • Spanning tree

    • VLAN

    • PoE

    • Port mirroring

    Correct Answer
    A. Port mirroring
  • 26. 

    An administrator would like to know the name of the workstation that is being repaired. Which of the following commands, without parameters, will provide this information?

    • Hostname

    • Ipconfig

    • Netstat

    • Ping

    Correct Answer
    A. Hostname
  • 27. 

    A technician claims to have crimped a patch cable according to the T568A standard on one end and T568B on the other. Which of the following results is to be expected?

    • Since only half the leads are used, the cable will only work at 100Mbps

    • The cable will only work at a maximum of 100Mbps. since 1Gbps only works on T568B cables.

    • There will be no proper data continuity; the standards utilize two different wiring diagrams.

    • The cable will only work at a maximum of 10Mbps. since 100/1000Mbps only works on T568B pure cables

    Correct Answer
    A. There will be no proper data continuity; the standards utilize two different wiring diagrams.
  • 28. 

    An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?

    • 2.4GHz

    • 900MHz

    • 1.1GHz

    • 5GHz

    Correct Answer
    A. 2.4GHz
  • 29. 

    Which of the following is a reason to block FTP at the corporate firewall?

    • It does not transfer encrypted files.

    • It cannot be tunneled in a VPN.

    • It is a deprecated protocol

    • It transmits passwords in clear text.

    Correct Answer
    A. It transmits passwords in clear text.
  • 30. 

    Which of the following methods can move files in clear text and can be easily intercepted?

    • RSH

    • SNMP

    • FTP

    • TELNET

    Correct Answer
    A. FTP
  • 31. 

    Which of the following protocols should be used to monitor network performance?  

    • SNTP

    • SMTP

    • HTTP

    • SNMP

    Correct Answer
    A. SNMP
  • 32. 

    An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?

    • Secure VPN

    • MAC filtering

    • IP filtering

    • Static IP addresses

    Correct Answer
    A. MAC filtering
  • 33. 

    Prioritizing traffic between data and voice is defined as which of the following?

    • Caching engines

    • Proxy server

    • QoS

    • Load balancing

    Correct Answer
    A. QoS
  • 34. 

    Which of the following allows a WAP to be installed in a location where there are no power outlets available?

    • Port authentication

    • PoE

    • PPTP

    • Trunking

    Correct Answer
    A. PoE
  • 35. 

    An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?

    • Logical network diagram

    • History logs

    • Baseline configurations

    • Wiring schematics

    Correct Answer
    A. Logical network diagram
  • 36. 

    Which of the following is true about an IP address if the first bit is a zero?

    • The address is a Class A address.

    • The address is a Class B address

    • The address is a Class C address

    • The address is a Class D address.

    Correct Answer
    A. The address is a Class A address.
  • 37. 

    An administrator receives a contract for a server install at a new building. Which of the following should be completed after installing the server?

    • Log the administrator password used

    • Test the air temperature

    • Update the network diagram

    • Review the evacuation procedures

    Correct Answer
    A. Update the network diagram
  • 38. 

    An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classful address. Which of the following is the address that can be used in this scenario?

    • 10.178.1.5/1

    • 10.178.1.5/8

    • 10.178.1.5/16

    • 10.178.15/30

    Correct Answer
    A. 10.178.1.5/8
  • 39. 

    A technician needs to add network capacity. However, when plugging a second switch into the first switch, there is no link light. Which of the following is the cause of this situation?

    • The switches are not stackable

    • The cable was not wired using 568A.

    • The cable needs to be a crossover cable

    • The switches have IGMP snooping enabled

    Correct Answer
    A. The cable needs to be a crossover cable
  • 40. 

    In an enterprise setting, access switches providing network connectivity placed throughout a building are typically connected to a backbone called the:

    • MDF

    • Proxy

    • Demarcation point

    • Smart jack

    Correct Answer
    A. MDF
  • 41. 

    Which of the following is the term used to describe the aggregation of multiple components to form one logical component?

    • Bonding

    • Circuit switching

    • CSMA/CD

    • Channelization

    Correct Answer
    A. Bonding
  • 42. 

    A demarcation point is usually installed and managed by which of the following providers?

    • Web host provider

    • VoIP company

    • Telephone company

    • Hardware manufacturer

    Correct Answer
    A. Telephone company
  • 43. 

    Users are unable to access the Internet but the users are able to send/receive email from their desktops. Which of the following ports is MOST likely being blocked?

    • 25

    • 80

    • 110

    • 143

    Correct Answer
    A. 80
  • 44. 

    Which of the following would need to be implemented on a wireless router to allow network access based on a passphrase that the administrator would supply?

    • WPA-PSK encryption

    • SSID broadcast

    • Port forwarding

    • MAC filtering

    Correct Answer
    A. WPA-PSK encryption
  • 45. 

    Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examples of which of the following security types?

    • Physical

    • Logical

    • Software

    • Authentication

    Correct Answer
    A. Physical
  • 46. 

    Which of the following is equipment provided by the telephone company that provides remote diagnostic and loopback services for subscriber lines?

    • 66 block

    • Demarc

    • Smart jack

    • 110 block

    Correct Answer
    A. Smart jack
  • 47. 

    An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?

    • Setup an ACL that allows and logs all IP traffic between the two computers

    • Configure a spanning tree to check for a loop

    • Setup a span port on the switch to watch for CRC errors

    • Connect both computers using a crossover cable

    Correct Answer
    A. Connect both computers using a crossover cable
  • 48. 

    Which of the following would be used to connect two IDFs in the same building with the LAN, while minimizing crosstalk?

    • RG-6

    • STP

    • CAT3

    • UTP

    Correct Answer
    A. STP
  • 49. 

    Which of the following network devices would MOST likely be installed to allow the company's single public IP to be shared and translated into local IPs for network devices?

    • Router

    • Hub

    • WAP

    • Switch

    Correct Answer
    A. Router

Quiz Review Timeline (Updated): Mar 21, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • May 15, 2012
    Quiz Created by
    SGogola
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.