Networking 005 Part 4

100 Questions | Total Attempts: 38

Settings
Please wait...
Networking Quizzes & Trivia

Netwoprking Quiz


Questions and Answers
  • 1. 
    Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?
    • A. 

      Determine what has changed

    • B. 

      Test a solution

    • C. 

      Establish the most probable cause

    • D. 

      Escalate the problem to the right section

  • 2. 
    • A. 

      FQDN

    • B. 

      DNS name

    • C. 

      Public key

    • D. 

      Private key

  • 3. 
    An administrator needs to diagnose problems with a WINS server. Which of the following tools should be used?
    • A. 

      Nslookup

    • B. 

      Nbtstat

    • C. 

      Dig

    • D. 

      Netstat

  • 4. 
    • A. 

      BNC

    • B. 

      ST

    • C. 

      LC

    • D. 

      SC

  • 5. 
    In an enterprise setting, access switches providing network connectivity placed throughout a building are typically connected to a backbone called the:
    • A. 

      MDF

    • B. 

      Proxy

    • C. 

      Demarcation point

    • D. 

      Smart jack

  • 6. 
    • A. 

      802.11n

    • B. 

      802.11b

    • C. 

      802.11a

    • D. 

      802.11g

  • 7. 
    • A. 

      Port scan

    • B. 

      Packet sniffer

    • C. 

      IPS

    • D. 

      IDS

  • 8. 
    A zone transfer occurs over which of the following ports?
    • A. 

      TCP 53

    • B. 

      UDP67

    • C. 

      UDP123

    • D. 

      TCP 25

  • 9. 
    A technician claims to have crimped a patch cable according to the T568A standard on one end and T568B on the other. Which of the following results is to be expected?
    • A. 

      Since only half the leads are used, the cable will only work at 100Mbps

    • B. 

      The cable will only work at a maximum of 100Mbps. since 1Gbps only works on T568B cables.

    • C. 

      There will be no proper data continuity; the standards utilize two different wiring diagrams.

    • D. 

      The cable will only work at a maximum of 10Mbps. since 100/1000Mbps only works on T568B pure cables

  • 10. 
    An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?
    • A. 

      Multicast

    • B. 

      Unicast

    • C. 

      Broadcast

    • D. 

      Peer-to-peer

  • 11. 
    Which of the following protocols should be used to monitor network performance?  
    • A. 

      SNTP

    • B. 

      SMTP

    • C. 

      HTTP

    • D. 

      SNMP

  • 12. 
    A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?
    • A. 

      Phishing

    • B. 

      Smurf attack

    • C. 

      Denial of service

    • D. 

      Man-in-the-middle

  • 13. 
    • A. 

      IGMP

    • B. 

      SNMP

    • C. 

      SMTP

    • D. 

      ICMP

  • 14. 
    A standard installation for wireless will use which of the following antenna types?
    • A. 

      Sector

    • B. 

      Patch

    • C. 

      Yagi

    • D. 

      Omni-Directional

  • 15. 
    Which of the following regulates the amount of network traffic a single node receives in a server cluster?
    • A. 

      Load balancer

    • B. 

      Proxy server

    • C. 

      Content filter

    • D. 

      Quality of service

  • 16. 
    A technician would like to separate the HR department's workstations from the other workstations at the company. Which of the following network topologies should be used?
    • A. 

      Peer to peer

    • B. 

      Subnetting

    • C. 

      VLAN

    • D. 

      VPN

  • 17. 
    A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables?
    • A. 

      Switch

    • B. 

      Router

    • C. 

      Repeater

    • D. 

      Bridge

  • 18. 
    An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?
    • A. 

      Logical network diagram

    • B. 

      History logs

    • C. 

      Baseline configurations

    • D. 

      Wiring schematics

  • 19. 
    • A. 

      Fiber

    • B. 

      Coaxial cable

    • C. 

      UTP

    • D. 

      Twisted pair

  • 20. 
    A crossover cable is MOST commonly associated with which of the following layers of the OSI model?
    • A. 

      Session

    • B. 

      Application

    • C. 

      Network

    • D. 

      Physical

  • 21. 
    Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examples of which of the following security types?
    • A. 

      Physical

    • B. 

      Logical

    • C. 

      Software

    • D. 

      Authentication

  • 22. 
    • A. 

      1000BaseT

    • B. 

      10GBaseSW

    • C. 

      100BaseFX

    • D. 

      100BaseTX

  • 23. 
    Which of the following documents should always be kept up-to-date after any major changes are made to a network backbone?
    • A. 

      Network diagram

    • B. 

      Performance baseline

    • C. 

      Network security procedure

    • D. 

      Company policy

  • 24. 
    • A. 

      It does not scale well.

    • B. 

      It converges slower than OSPF.

    • C. 

      It is a proprietary protocol

    • D. 

      It is a distance vector protocol

  • 25. 
    Which of the following routing protocols runs over UDP and determines path based upon distance vectors?
    • A. 

      RIP

    • B. 

      DSI

    • C. 

      BGP

    • D. 

      ISIS

  • 26. 
    Which of the following is equipment provided by the telephone company that provides remote diagnostic and loopback services for subscriber lines?
    • A. 

      66 block

    • B. 

      Demarc

    • C. 

      Smart jack

    • D. 

      110 block

  • 27. 
    An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?
    • A. 

      Setup an ACL that allows and logs all IP traffic between the two computers

    • B. 

      Configure a spanning tree to check for a loop

    • C. 

      Setup a span port on the switch to watch for CRC errors

    • D. 

      Connect both computers using a crossover cable

  • 28. 
    Which of the following devices is used to connect multiple devices to a network and does not stop broadcast traffic?
    • A. 

      Switch

    • B. 

      Hub

    • C. 

      Modem

    • D. 

      Repeater

  • 29. 
    Which of the following protocols allow the set up, teardown and streaming of VoIP traffic? (Select TWO)
    • A. 

      NTP

    • B. 

      VNC

    • C. 

      RTP

    • D. 

      SIP

    • E. 

      TLS

  • 30. 
    • A. 

      SCP

    • B. 

      SMTP

    • C. 

      SNMP

    • D. 

      TFTP

  • 31. 
    An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals? (Select TWO).
    • A. 

      TACACS+

    • B. 

      RADIUS

    • C. 

      Kerberos

    • D. 

      802.1X

    • E. 

      RRAS

  • 32. 
    • A. 

      2.4GHz

    • B. 

      900MHz

    • C. 

      1.1GHz

    • D. 

      5GHz

  • 33. 
    An administrator suspects that an incorrect POTS line is carrying the DSL signal. Which of the following will help diagnose this issue?
    • A. 

      Multimeter

    • B. 

      Toner probe

    • C. 

      Protocol analyzer

    • D. 

      Butt set

  • 34. 
    An administrator wants to test the network MTU. Which of the following commands allows different size packets to be sent?
    • A. 

      Netstat

    • B. 

      Traceroute

    • C. 

      Nbtstat

    • D. 

      Ping

  • 35. 
    Which of the following is used to serve as an emergency backup line to troubleshoot a broadband connection on many routers?
    • A. 

      DSL

    • B. 

      POTS

    • C. 

      VDSL

    • D. 

      Smart jack

  • 36. 
    • A. 

      FTP

    • B. 

      SFTP

    • C. 

      SMTP

    • D. 

      TFTP

  • 37. 
    • A. 

      RG-6

    • B. 

      STP

    • C. 

      CAT3

    • D. 

      UTP

  • 38. 
    Which of the following network devices would MOST likely be installed to allow the company's single public IP to be shared and translated into local IPs for network devices?
    • A. 

      Router

    • B. 

      Hub

    • C. 

      WAP

    • D. 

      Switch

  • 39. 
    A technician who separated two departments using VLANs now discovers that the VLANs cannot communicate with each other. Which of the following does the technician need to enable communication between the VLANs?
    • A. 

      Port spanning

    • B. 

      VLAN concentrator

    • C. 

      Firewall

    • D. 

      Router

  • 40. 
    • A. 

      Point to Point

    • B. 

      Point to Multipoint

    • C. 

      VLAN

    • D. 

      Ring

    • E. 

      Bus

  • 41. 
    • A. 

      1000BaseT

    • B. 

      100BaseT

    • C. 

      10GBaseT

    • D. 

      10BaseT

  • 42. 
    • A. 

      The address is a Class A address.

    • B. 

      The address is a Class B address

    • C. 

      The address is a Class C address

    • D. 

      The address is a Class D address.

  • 43. 
    • A. 

      Stripper

    • B. 

      Punch down tool

    • C. 

      Butt set

    • D. 

      Snips

  • 44. 
    • A. 

      10GBaseSW

    • B. 

      10GBaseLW

    • C. 

      10GBaseSR

    • D. 

      10GBaseEW

  • 45. 
    After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straight-thru wires. Which of the following MOST likely describes this cable type?
    • A. 

      Crossover cable with open pairs

    • B. 

      Crossover cable

    • C. 

      Rollover cable

    • D. 

      Straight-thru cable with open pairs

  • 46. 
    A server keeps rebooting at various times throughout the day. Which of the following tools would BEST help to diagnose this issue?
    • A. 

      Multimeter

    • B. 

      Temperature monitor

    • C. 

      Cable tester

    • D. 

      Toner probe

  • 47. 
    Which of the following devices would allow a technician using a packet sniffer to view all the data on a network?
    • A. 

      GBIC

    • B. 

      Hub

    • C. 

      Bridge

    • D. 

      Modem

  • 48. 
    An administrator finds a phone line but does not know where the line goes or if it is active. Which of the following can be used to test if it is active?
    • A. 

      Butt set

    • B. 

      Punch down tool

    • C. 

      Cable tester

    • D. 

      Cable stripper

  • 49. 
    Which of the following allows a technician to mask a private network of IP addresses behind one public IP address?
    • A. 

      NAT

    • B. 

      Subnetting

    • C. 

      DHCP

    • D. 

      DNS

  • 50. 
    An administrator is deploying three B/G wireless access points in a new office location. Which of the following channels eliminates interference?
    • A. 

      1, 6, and11

    • B. 

      3, 6, and 9

    • C. 

      11,16, and20

    • D. 

      36, 40, and 44

  • 51. 
    An administrator receives a contract for a server install at a new building. Which of the following should be completed after installing the server?
    • A. 

      Log the administrator password used

    • B. 

      Test the air temperature

    • C. 

      Update the network diagram

    • D. 

      Review the evacuation procedures

  • 52. 
    • A. 

      It does not transfer encrypted files.

    • B. 

      It cannot be tunneled in a VPN.

    • C. 

      It is a deprecated protocol

    • D. 

      It transmits passwords in clear text.

  • 53. 
    A network IPS provides which of the following?
    • A. 

      The layer 3 protocol on which other protocols like TCP and UDP communicate

    • B. 

      Enables the IPSec protocol on internal workstations.

    • C. 

      Packet-based detection and prevention of network attacks

    • D. 

      Single mode IP communication for a fiber line between remote sites.

  • 54. 
    An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classful address. Which of the following is the address that can be used in this scenario?
    • A. 

      10.178.1.5/1

    • B. 

      10.178.1.5/8

    • C. 

      10.178.1.5/16

    • D. 

      10.178.15/30

  • 55. 
    • A. 

      Port mirroring

    • B. 

      DMZ

    • C. 

      Qos

    • D. 

      Trunking

  • 56. 
    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?
    • A. 

      WEP

    • B. 

      PEAP

    • C. 

      WPA

    • D. 

      TKIP

  • 57. 
    • A. 

      255.0.0.0

    • B. 

      255.256.255.0

    • C. 

      255.255.255.255

    • D. 

      255.255.00

  • 58. 
    Which of the following tools would a technician use to check functionality of a physical network connection?
    • A. 

      Butt set

    • B. 

      Cable tester

    • C. 

      Protocol analyzer

    • D. 

      Voltage event recorder

  • 59. 
    • A. 

      RSH

    • B. 

      SNMP

    • C. 

      FTP

    • D. 

      TELNET

  • 60. 
    A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?
    • A. 

      IGP

    • B. 

      EIGRP

    • C. 

      EGP

    • D. 

      BGP

  • 61. 
    • A. 

      80

    • B. 

      110

    • C. 

      123

    • D. 

      143

    • E. 

      443

  • 62. 
    An administrator is trying to isolate the location of a persistent connectivity problem caused by a faulty NIC. Which of the following diagrams would assist the technician in finding the machine that is causing the problem?
    • A. 

      Physical and logical network

    • B. 

      Physical network

    • C. 

      Logical network

    • D. 

      DHCP tables and DNS records

  • 63. 
    • A. 

      Crosstalk

    • B. 

      Broadcast storm

    • C. 

      Duplex mismatch

    • D. 

      Collision

  • 64. 
    An administrator is having a hard time adding a new switch to the network. After verifying that all the ports are configured correctly on each switch, which of the following should the administrator verily NEXT?
    • A. 

      Straight-through cable is used to connect both switches

    • B. 

      Loopback plug is connected

    • C. 

      Crossover cable is used to connect both switches

    • D. 

      Cable is a rollover cable

  • 65. 
    • A. 

      Router

    • B. 

      Hub

    • C. 

      Switch

    • D. 

      Bridge

  • 66. 
    The helpdesk is receiving calls about the corporate web server being down. Which of the following should be taken NEXT after verifying that the server is unreachable?
    • A. 

      Escalate the call to a technician

    • B. 

      Document any changes in the web server configuration

    • C. 

      Implement and test a solution

    • D. 

      Continuously ping the server until a ping response is obtained

  • 67. 
    Which of the following tools would an administrator BEST use to trace a network cable?
    • A. 

      Toner

    • B. 

      Cable tester

    • C. 

      Butt set

    • D. 

      Multimeter

  • 68. 
    An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?
    • A. 

      Multilayer switch

    • B. 

      CSU

    • C. 

      Proxy server

    • D. 

      IDS

  • 69. 
    • A. 

      Spanning tree

    • B. 

      VLAN

    • C. 

      PoE

    • D. 

      Port mirroring

  • 70. 
    • A. 

      The matching ACE is skipped to allow all other ACEs to be examined.

    • B. 

      The matching ACE is processed and then the last ACE is examined.

    • C. 

      The matching ACE is processed and then the next ACE is examined

    • D. 

      The matching ACE is processed and the next packet is examined

  • 71. 
    • A. 

      VDSL

    • B. 

      SDSL

    • C. 

      OC3

    • D. 

      ATM

  • 72. 
    A user connecting a laptop to a wall jack is prompted for user credentials before being granted access to the network. Which of the following is MOST likely implemented on the switch?
    • A. 

      MAC filtering

    • B. 

      PoE

    • C. 

      IP filtering

    • D. 

      802.1X

  • 73. 
    A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?
    • A. 

      CAT3 cable

    • B. 

      Serial cable

    • C. 

      Crossover cable

    • D. 

      Rollover cable

  • 74. 
    • A. 

      Load balance traffic across multiple LAN and WAN links.

    • B. 

      Increase speed of network traffic.

    • C. 

      Classify, mark, and prioritize traffic on WAN and LAN links

    • D. 

      Guarantee traffic delivery.

  • 75. 
    • A. 

      10GBaseER

    • B. 

      10GBaseSW

    • C. 

      10GBaseLW

    • D. 

      10GBaseEW

  • 76. 
    Prioritizing traffic between data and voice is defined as which of the following?
    • A. 

      Caching engines

    • B. 

      Proxy server

    • C. 

      QoS

    • D. 

      Load balancing

  • 77. 
    A demarcation point is usually installed and managed by which of the following providers?
    • A. 

      Web host provider

    • B. 

      VoIP company

    • C. 

      Telephone company

    • D. 

      Hardware manufacturer

  • 78. 
    • A. 

      Vampire tap

    • B. 

      Smart jack

    • C. 

      Demarcation point

    • D. 

      Programmable logic controller

  • 79. 
    A technician needs to add network capacity. However, when plugging a second switch into the first switch, there is no link light. Which of the following is the cause of this situation?
    • A. 

      The switches are not stackable

    • B. 

      The cable was not wired using 568A.

    • C. 

      The cable needs to be a crossover cable

    • D. 

      The switches have IGMP snooping enabled

  • 80. 
    Which of the following allows a WAP to be installed in a location where there are no power outlets available?
    • A. 

      Port authentication

    • B. 

      PoE

    • C. 

      PPTP

    • D. 

      Trunking

  • 81. 
    When testing a CAT5 cable, the technician notices that pin A is open. However, the cable still works fine. Which of the following describes how this is possible?
    • A. 

      The cable was tested for 100BaseTX.

    • B. 

      The cable is a 1000BaseT cable.

    • C. 

      The switch uses link aggregation,

    • D. 

      The switch was setup to use MDIX.

  • 82. 
    Users are unable to access the Internet but the users are able to send/receive email from their desktops. Which of the following ports is MOST likely being blocked?
    • A. 

      25

    • B. 

      80

    • C. 

      110

    • D. 

      143

  • 83. 
    Which of the following would need to be implemented on a wireless router to allow network access based on a passphrase that the administrator would supply?
    • A. 

      WPA-PSK encryption

    • B. 

      SSID broadcast

    • C. 

      Port forwarding

    • D. 

      MAC filtering

  • 84. 
    • A. 

      OSPF

    • B. 

      RIP

    • C. 

      EIGRP

    • D. 

      IGRP

    • E. 

      RIPv2

  • 85. 
    When installing a wireless network in a large area, which of the following is the FIRST thing that should be considered when trying to get the MOST coverage?
    • A. 

      SSID naming

    • B. 

      Device placement

    • C. 

      Encryption methods

    • D. 

      Channel selection

  • 86. 
    • A. 

      Dig

    • B. 

      Nbtstat

    • C. 

      Traceroute

    • D. 

      Route

  • 87. 
    Which of the following is the term used to describe the aggregation of multiple components to form one logical component?
    • A. 

      Bonding

    • B. 

      Circuit switching

    • C. 

      CSMA/CD

    • D. 

      Channelization

  • 88. 
    Which of the following performs posture assessments for unknown devices that connect to the network?
    • A. 

      PKI

    • B. 

      EAP

    • C. 

      NAC

    • D. 

      AAA

  • 89. 
    At which of the following OSI model layers is HTTPS encryption performed?
    • A. 

      Layer 3

    • B. 

      Layer 5

    • C. 

      Layer 6

    • D. 

      Layer 7

  • 90. 
    • A. 

      STP

    • B. 

      UTP

    • C. 

      Fiber

    • D. 

      Serial

  • 91. 
    An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?
    • A. 

      Secure VPN

    • B. 

      MAC filtering

    • C. 

      IP filtering

    • D. 

      Static IP addresses

  • 92. 
    • A. 

      Fiber

    • B. 

      Coax

    • C. 

      UTP

    • D. 

      STP

  • 93. 
    • A. 

      20

    • B. 

      21

    • C. 

      22

    • D. 

      23

  • 94. 
    On which of the following network devices would an administrator configure an ACL?
    • A. 

      Router

    • B. 

      Hub

    • C. 

      Repeater

    • D. 

      NIC

  • 95. 
    • A. 

      Ping sweep

    • B. 

      Packet sniffer

    • C. 

      Traceroute

    • D. 

      Port scanner

  • 96. 
    A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugs the cable into the only available laptop connection, but the connector is loose inside the port. The MOST likely reason the connector is loose is the:
    • A. 

      RJ-11 connector needs to be re-crimped

    • B. 

      User has plugged into the laptop's NIC port

    • C. 

      User has plugged the wrong end of the cable into the port

    • D. 

      RJ-11 connector needs to be replaced with an RJ-45 connector

  • 97. 
    • A. 

      It is not able to determine which ports to block.

    • B. 

      It is able to detect packets from established connections only.

    • C. 

      It is able to determine the connection state of all packets going through the firewall

    • D. 

      It is not able to determine if a packet is related to an established connection.

  • 98. 
    An administrator would like to know the name of the workstation that is being repaired. Which of the following commands, without parameters, will provide this information?
    • A. 

      Hostname

    • B. 

      Ipconfig

    • C. 

      Netstat

    • D. 

      Ping

  • 99. 
    Which of the following troubleshooting steps should be performed NEXT after a core router has been reported down?
    • A. 

      Implement a solution

    • B. 

      Establish the outage cause

    • C. 

      Identify all affected areas.

    • D. 

      Test a solution

  • 100. 
    Which of the following routing protocols involves all routers knowing the connections status of other routers within the network?
    • A. 

      RIPv2

    • B. 

      OSPF

    • C. 

      IGRP

    • D. 

      BGP