Networking 005 Part 4

100 Questions | Attempts: 77
Share
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. A server keeps rebooting at various times throughout the day. Which of the following tools would BEST help to diagnose this issue?
Submit
Please wait...
About This Quiz
Networking Quizzes & Trivia

Netwoprking Quiz

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. An administrator finds a phone line but does not know where the line goes or if it is active. Which of the following can be used to test if it is active?
Submit
3. An administrator is deploying three B/G wireless access points in a new office location. Which of the following channels eliminates interference?
Submit
4. Which of the following tools would a technician use to check functionality of a physical network connection?
Submit
5. Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?
Submit
6. A network IPS provides which of the following?
Submit
7. Which of the following should be configured to provide priority to voice traffic?
Submit
8. On which of the following network devices would an administrator configure an ACL?
Submit
9. An administrator is trying to isolate the location of a persistent connectivity problem caused by a faulty NIC. Which of the following diagrams would assist the technician in finding the machine that is causing the problem?
Submit
10. Which of the following allows a technician to mask a private network of IP addresses behind one public IP address?
Submit
11. A standard installation for wireless will use which of the following antenna types?
Submit
12. Which of the following protocols is the LEAST secure and should be avoided on a wireless network?
Submit
13. Which of the following regulates the amount of network traffic a single node receives in a server cluster?
Submit
14. A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?
Submit
15. Which of the following solutions will detect and disable a rogue access point?
Submit
16. Which of the following cables is the MOST susceptible to interference?
Submit
17. When installing a wireless network in a large area, which of the following is the FIRST thing that should be considered when trying to get the MOST coverage?
Submit
18. Which of the following cable speeds would provide the GREATEST theoretical bandwidth?
Submit
19. An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?
Submit
20. A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?
Submit
21. A technician would like to separate the HR department's workstations from the other workstations at the company. Which of the following network topologies should be used?
Submit
22. A crossover cable is MOST commonly associated with which of the following layers of the OSI model?
Submit
23. Which of the following documents should always be kept up-to-date after any major changes are made to a network backbone?
Submit
24. Which of the following connector types is used for coax cable?
Submit
25. An administrator would like to know the name of the workstation that is being repaired. Which of the following commands, without parameters, will provide this information?
Submit
26. Which of the following technologies allows an administrator to submit traffic to an IDS for review?
Submit
27. A technician claims to have crimped a patch cable according to the T568A standard on one end and T568B on the other. Which of the following results is to be expected?
Submit
28. Which of the following is a reason to block FTP at the corporate firewall?
Submit
29. Which of the following methods can move files in clear text and can be easily intercepted?
Submit
30. An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?
Submit
31. Which of the following protocols should be used to monitor network performance?  
Submit
32. An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?
Submit
33. Prioritizing traffic between data and voice is defined as which of the following?
Submit
34. Which of the following allows a WAP to be installed in a location where there are no power outlets available?
Submit
35. Which of the following is true about an IP address if the first bit is a zero?
Submit
36. An administrator receives a contract for a server install at a new building. Which of the following should be completed after installing the server?
Submit
37. An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classful address. Which of the following is the address that can be used in this scenario?
Submit
38. An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?
Submit
39. A technician needs to add network capacity. However, when plugging a second switch into the first switch, there is no link light. Which of the following is the cause of this situation?
Submit
40. In an enterprise setting, access switches providing network connectivity placed throughout a building are typically connected to a backbone called the:
Submit
41. Which of the following is the term used to describe the aggregation of multiple components to form one logical component?
Submit
42. A demarcation point is usually installed and managed by which of the following providers?
Submit
43. Users are unable to access the Internet but the users are able to send/receive email from their desktops. Which of the following ports is MOST likely being blocked?
Submit
44. Which of the following would need to be implemented on a wireless router to allow network access based on a passphrase that the administrator would supply?
Submit
45. After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straight-thru wires. Which of the following MOST likely describes this cable type?
Submit
46. Which of the following devices would allow a technician using a packet sniffer to view all the data on a network?
Submit
47. Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examples of which of the following security types?
Submit
48. Which of the following is equipment provided by the telephone company that provides remote diagnostic and loopback services for subscriber lines?
Submit
49. An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?
Submit
50. Which of the following would be used to connect two IDFs in the same building with the LAN, while minimizing crosstalk?
Submit
51. Which of the following network devices would MOST likely be installed to allow the company's single public IP to be shared and translated into local IPs for network devices?
Submit
52. An administrator needs to diagnose problems with a WINS server. Which of the following tools should be used?
Submit
53. Which of the following wireless standards has the highest maximum data rate?
Submit
54. Which of the following troubleshooting steps should be performed NEXT after a core router has been reported down?
Submit
55. Which of the following tools are BEST used to cut away the outside covering of a CAT5e cable?
Submit
56. Which of the following is an invalid subnet mask?
Submit
57. Which of the following routing protocols runs over UDP and determines path based upon distance vectors?
Submit
58. An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals? (Select TWO).
Submit
59. Which of the following wiring distribution components should be chosen to provide level integrated diagnostic capabilities?
Submit
60. Which of the following ports is the default telnet port?
Submit
61. Which of the following network topologies BEST describes a VPN? (Select TWO)
Submit
62. A zone transfer occurs over which of the following ports?
Submit
63. Which of the following connectivity issues is likely to occur within a token ring network?
Submit
64. Which of the following devices would MOST likely integrate a DHCP server?
Submit
65. Which of the following is a disadvantage of using the EIGRP protocol?
Submit
66. Which of the following protocols requests membership to a multicast group?
Submit
67. Which of the following tools would an administrator BEST use to trace a network cable?
Submit
68. Which of the following is the purpose of QoS?
Submit
69. Which of the following ports are used by default for web servers? (Select TWO).
Submit
70. A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables?
Submit
71. Which of the following has a MAXIMUM distance of 300 meters (984 feet)?
Submit
72. An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?
Submit
73. Which of the following analyzes the entire subnet to identify all hosts that are active?
Submit
74. The helpdesk is receiving calls about the corporate web server being down. Which of the following should be taken NEXT after verifying that the server is unreachable?
Submit
75. Which of the following describes what the number two represents in l00Base2 cabling?
Submit
76. Which of the following devices is used to connect multiple devices to a network and does not stop broadcast traffic?
Submit
77. Which of the following is a secure method of copying information over a public network?
Submit
78. Which of the following is used to serve as an emergency backup line to troubleshoot a broadband connection on many routers?
Submit
79. A technician who separated two departments using VLANs now discovers that the VLANs cannot communicate with each other. Which of the following does the technician need to enable communication between the VLANs?
Submit
80. Which of the following authenticates a web server to the remote client in PKI?
Submit
81. Which of the following is true of an ACL when a packet matching an ACE is found?
Submit
82. Which of the following technologies is used on the backbone of an ISDN?
Submit
83. A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?
Submit
84. Which of the following protocols allow the set up, teardown and streaming of VoIP traffic? (Select TWO)
Submit
85. An administrator suspects that an incorrect POTS line is carrying the DSL signal. Which of the following will help diagnose this issue?
Submit
86. An administrator wants to test the network MTU. Which of the following commands allows different size packets to be sent?
Submit
87. A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugs the cable into the only available laptop connection, but the connector is loose inside the port. The MOST likely reason the connector is loose is the:
Submit
88. An administrator is having a hard time adding a new switch to the network. After verifying that all the ports are configured correctly on each switch, which of the following should the administrator verily NEXT?
Submit
89. Which of the following protocols uses UDP to transfer files?
Submit
90. Which of the following LAN technology has a MAXIMUM range of 10,000 meters (6 miles)?
Submit
91. Which of the following is true of stateless inspection?
Submit
92. Which of the following utilities would be used to display a network's MX record?
Submit
93. Which of the following is typically used In an LAN environment?
Submit
94. A user connecting a laptop to a wall jack is prompted for user credentials before being granted access to the network. Which of the following is MOST likely implemented on the switch?
Submit
95. Which of the following routing protocols involves all routers knowing the connections status of other routers within the network?
Submit
96. When testing a CAT5 cable, the technician notices that pin A is open. However, the cable still works fine. Which of the following describes how this is possible?
Submit
97. Which of the following performs posture assessments for unknown devices that connect to the network?
Submit
98. At which of the following OSI model layers is HTTPS encryption performed?
Submit
99. Which of the following network cable types requires grounding?
Submit
100. Which of the following routing protocols are unable to advertise CIDR networks? (Select TWO)
Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • May 15, 2012
    Quiz Created by
    SGogola
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A server keeps rebooting at various times throughout the day. Which of...
An administrator finds a phone line but does not know where the line...
An administrator is deploying three B/G wireless access points in a...
Which of the following tools would a technician use to check...
Several users from the same location are reporting problems accessing...
A network IPS provides which of the following?
Which of the following should be configured to provide priority to...
On which of the following network devices would an administrator...
An administrator is trying to isolate the location of a persistent...
Which of the following allows a technician to mask a private network...
A standard installation for wireless will use which of the following...
Which of the following protocols is the LEAST secure and should be...
Which of the following regulates the amount of network traffic a...
A network administrator needs to add an additional connection to a...
Which of the following solutions will detect and disable a rogue...
Which of the following cables is the MOST susceptible to interference?
When installing a wireless network in a large area, which of the...
Which of the following cable speeds would provide the GREATEST...
An administrator is setting up a security camera that will send the...
A user receives an email slating that their account was compromised...
A technician would like to separate the HR department's...
A crossover cable is MOST commonly associated with which of the...
Which of the following documents should always be kept up-to-date...
Which of the following connector types is used for coax cable?
An administrator would like to know the name of the workstation that...
Which of the following technologies allows an administrator to submit...
A technician claims to have crimped a patch cable according to the...
Which of the following is a reason to block FTP at the corporate...
Which of the following methods can move files in clear text and can be...
An administrator receives reports from users in an office that their...
Which of the following protocols should be used to monitor network...
An administrator is concerned about users utilizing the company's...
Prioritizing traffic between data and voice is defined as which of the...
Which of the following allows a WAP to be installed in a location...
Which of the following is true about an IP address if the first bit is...
An administrator receives a contract for a server install at a new...
An administrator is configuring IP 10.178.1.5 on a legacy device that...
An administrator has completed the installation of a new WLAN. Which...
A technician needs to add network capacity. However, when plugging a...
In an enterprise setting, access switches providing network...
Which of the following is the term used to describe the aggregation of...
A demarcation point is usually installed and managed by which of the...
Users are unable to access the Internet but the users are able to...
Which of the following would need to be implemented on a wireless...
After testing a new 100BaseTX cable, the technician determines that...
Which of the following devices would allow a technician using a packet...
Hardware locks, keypads on entry doors, badge readers, and biometric...
Which of the following is equipment provided by the telephone company...
An administrator is troubleshooting a communication issue between two...
Which of the following would be used to connect two IDFs in the same...
Which of the following network devices would MOST likely be installed...
An administrator needs to diagnose problems with a WINS server. Which...
Which of the following wireless standards has the highest maximum data...
Which of the following troubleshooting steps should be performed NEXT...
Which of the following tools are BEST used to cut away the outside...
Which of the following is an invalid subnet mask?
Which of the following routing protocols runs over UDP and determines...
An administrator needs to authenticate users to the network, authorize...
Which of the following wiring distribution components should be chosen...
Which of the following ports is the default telnet port?
Which of the following network topologies BEST describes a VPN?...
A zone transfer occurs over which of the following ports?
Which of the following connectivity issues is likely to occur within a...
Which of the following devices would MOST likely integrate a DHCP...
Which of the following is a disadvantage of using the EIGRP protocol?
Which of the following protocols requests membership to a multicast...
Which of the following tools would an administrator BEST use to trace...
Which of the following is the purpose of QoS?
Which of the following ports are used by default for web servers?...
A client wants to improve the wireless coverage on the third floor of...
Which of the following has a MAXIMUM distance of 300 meters (984...
An administrator wants to prevent users from plugging in their...
Which of the following analyzes the entire subnet to identify all...
The helpdesk is receiving calls about the corporate web server being...
Which of the following describes what the number two represents in...
Which of the following devices is used to connect multiple devices to...
Which of the following is a secure method of copying information over...
Which of the following is used to serve as an emergency backup line to...
A technician who separated two departments using VLANs now discovers...
Which of the following authenticates a web server to the remote client...
Which of the following is true of an ACL when a packet matching an ACE...
Which of the following technologies is used on the backbone of an...
A technician needs to troubleshoot connectivity between two devices...
Which of the following protocols allow the set up, teardown and...
An administrator suspects that an incorrect POTS line is carrying the...
An administrator wants to test the network MTU. Which of the following...
A user is attempting to connect to the network remotely using a laptop...
An administrator is having a hard time adding a new switch to the...
Which of the following protocols uses UDP to transfer files?
Which of the following LAN technology has a MAXIMUM range of 10,000...
Which of the following is true of stateless inspection?
Which of the following utilities would be used to display a...
Which of the following is typically used In an LAN environment?
A user connecting a laptop to a wall jack is prompted for user...
Which of the following routing protocols involves all routers knowing...
When testing a CAT5 cable, the technician notices that pin A is open....
Which of the following performs posture assessments for unknown...
At which of the following OSI model layers is HTTPS encryption...
Which of the following network cable types requires grounding?
Which of the following routing protocols are unable to advertise CIDR...
Alert!

Advertisement