Networking 005 Part 4

100 Questions | Total Attempts: 58

SettingsSettingsSettings
Please wait...
Networking Quizzes & Trivia

Netwoprking Quiz


Questions and Answers
  • 1. 
    Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?
    • A. 

      Determine what has changed

    • B. 

      Test a solution

    • C. 

      Establish the most probable cause

    • D. 

      Escalate the problem to the right section

  • 2. 
    Which of the following authenticates a web server to the remote client in PKI?
    • A. 

      FQDN

    • B. 

      DNS name

    • C. 

      Public key

    • D. 

      Private key

  • 3. 
    An administrator needs to diagnose problems with a WINS server. Which of the following tools should be used?
    • A. 

      Nslookup

    • B. 

      Nbtstat

    • C. 

      Dig

    • D. 

      Netstat

  • 4. 
    Which of the following connector types is used for coax cable?
    • A. 

      BNC

    • B. 

      ST

    • C. 

      LC

    • D. 

      SC

  • 5. 
    In an enterprise setting, access switches providing network connectivity placed throughout a building are typically connected to a backbone called the:
    • A. 

      MDF

    • B. 

      Proxy

    • C. 

      Demarcation point

    • D. 

      Smart jack

  • 6. 
    Which of the following wireless standards has the highest maximum data rate?
    • A. 

      802.11n

    • B. 

      802.11b

    • C. 

      802.11a

    • D. 

      802.11g

  • 7. 
    Which of the following solutions will detect and disable a rogue access point?
    • A. 

      Port scan

    • B. 

      Packet sniffer

    • C. 

      IPS

    • D. 

      IDS

  • 8. 
    A zone transfer occurs over which of the following ports?
    • A. 

      TCP 53

    • B. 

      UDP67

    • C. 

      UDP123

    • D. 

      TCP 25

  • 9. 
    A technician claims to have crimped a patch cable according to the T568A standard on one end and T568B on the other. Which of the following results is to be expected?
    • A. 

      Since only half the leads are used, the cable will only work at 100Mbps

    • B. 

      The cable will only work at a maximum of 100Mbps. since 1Gbps only works on T568B cables.

    • C. 

      There will be no proper data continuity; the standards utilize two different wiring diagrams.

    • D. 

      The cable will only work at a maximum of 10Mbps. since 100/1000Mbps only works on T568B pure cables

  • 10. 
    An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?
    • A. 

      Multicast

    • B. 

      Unicast

    • C. 

      Broadcast

    • D. 

      Peer-to-peer

  • 11. 
    Which of the following protocols should be used to monitor network performance?  
    • A. 

      SNTP

    • B. 

      SMTP

    • C. 

      HTTP

    • D. 

      SNMP

  • 12. 
    A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?
    • A. 

      Phishing

    • B. 

      Smurf attack

    • C. 

      Denial of service

    • D. 

      Man-in-the-middle

  • 13. 
    Which of the following protocols requests membership to a multicast group?
    • A. 

      IGMP

    • B. 

      SNMP

    • C. 

      SMTP

    • D. 

      ICMP

  • 14. 
    A standard installation for wireless will use which of the following antenna types?
    • A. 

      Sector

    • B. 

      Patch

    • C. 

      Yagi

    • D. 

      Omni-Directional

  • 15. 
    Which of the following regulates the amount of network traffic a single node receives in a server cluster?
    • A. 

      Load balancer

    • B. 

      Proxy server

    • C. 

      Content filter

    • D. 

      Quality of service

  • 16. 
    A technician would like to separate the HR department's workstations from the other workstations at the company. Which of the following network topologies should be used?
    • A. 

      Peer to peer

    • B. 

      Subnetting

    • C. 

      VLAN

    • D. 

      VPN

  • 17. 
    A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables?
    • A. 

      Switch

    • B. 

      Router

    • C. 

      Repeater

    • D. 

      Bridge

  • 18. 
    An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?
    • A. 

      Logical network diagram

    • B. 

      History logs

    • C. 

      Baseline configurations

    • D. 

      Wiring schematics

  • 19. 
    Which of the following describes what the number two represents in l00Base2 cabling?
    • A. 

      Fiber

    • B. 

      Coaxial cable

    • C. 

      UTP

    • D. 

      Twisted pair

  • 20. 
    A crossover cable is MOST commonly associated with which of the following layers of the OSI model?
    • A. 

      Session

    • B. 

      Application

    • C. 

      Network

    • D. 

      Physical

  • 21. 
    Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examples of which of the following security types?
    • A. 

      Physical

    • B. 

      Logical

    • C. 

      Software

    • D. 

      Authentication

  • 22. 
    Which of the following has a MAXIMUM distance of 300 meters (984 feet)?
    • A. 

      1000BaseT

    • B. 

      10GBaseSW

    • C. 

      100BaseFX

    • D. 

      100BaseTX

  • 23. 
    Which of the following documents should always be kept up-to-date after any major changes are made to a network backbone?
    • A. 

      Network diagram

    • B. 

      Performance baseline

    • C. 

      Network security procedure

    • D. 

      Company policy

  • 24. 
    Which of the following is a disadvantage of using the EIGRP protocol?
    • A. 

      It does not scale well.

    • B. 

      It converges slower than OSPF.

    • C. 

      It is a proprietary protocol

    • D. 

      It is a distance vector protocol

  • 25. 
    Which of the following routing protocols runs over UDP and determines path based upon distance vectors?
    • A. 

      RIP

    • B. 

      DSI

    • C. 

      BGP

    • D. 

      ISIS

Back to Top Back to top