Networking 005 Part 6

100 Questions | Attempts: 142
Share

SettingsSettingsSettings
Networking Quizzes & Trivia

Networking


Questions and Answers
  • 1. 

    A technician is working on a SOHO wireless network and notices that the wireless adaptor in the laptop shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of the following would BEST describe this connection speed?

    • A.

      The laptop is too far away from the WAP.

    • B.

      The WAP is using 802.11a frequencies

    • C.

      The laptop is only set to allow 802.11n connections

    • D.

      The technician is on an 802.11b network

    Correct Answer
    D. The technician is on an 802.11b network
  • 2. 

    Users report an intermittent degradation of sound on their IP phones. Which of the following would a network administrator do to alleviate the problem?

    • A.

      Use plenum cables

    • B.

      Provide fault tolerance for the switch

    • C.

      Configure VLAN trunking on the switch

    • D.

      Configure QoS

    Correct Answer
    D. Configure QoS
  • 3. 

    Which of the following network devices would MOST likely be installed on a network to help reduce broadcast traffic and to allow individual virtual networks?

    • A.

      Switch

    • B.

      Repeater

    • C.

      Hub

    • D.

      WAP

    Correct Answer
    A. Switch
  • 4. 

    A natural disaster has occurred and the administrator must return the network to a healthy status. Which of the following should the administrator do in this case?

    • A.

      Follow the emergency action plan.

    • B.

      Wait for an issue to be reported.

    • C.

      Establish a new baseline

    • D.

      Determine if escalation is necessary.

    Correct Answer
    A. Follow the emergency action plan.
  • 5. 

    Switch A is configured with VLAN 105 and 106. Switch Bis configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present?

    • A.

      Reverse ARP

    • B.

      Full duplex on the fiber link

    • C.

      PoE

    • D.

      802.1q trunking

    Correct Answer
    D. 802.1q trunking
  • 6. 

    Which of the following connector types is commonly identified by two rows of pins with four in one row and five in the other?

    • A.

      DB-9

    • B.

      RJ-45

    • C.

      SC

    • D.

      BNC

    Correct Answer
    A. DB-9
  • 7. 

    At which of the following layers does the UDP protocol operate?

    • A.

      Layer 1

    • B.

      Layer4

    • C.

      Layer 6

    • D.

      Layer 7

    Correct Answer
    B. Layer4
  • 8. 

    Interior gateway protocols are used for resolving routes:

    • A.

      Between networks

    • B.

      Within routers

    • C.

      Within networks

    • D.

      Between WAPs

    Correct Answer
    C. Within networks
  • 9. 

    Which of the following commands would allow a computer to acquire an IP address?

    • A.

      Ipconfig/release

    • B.

      Ipconfig/renew

    • C.

      Ipconfig/all

    • D.

      Ipconfig/help

    Correct Answer
    B. Ipconfig/renew
  • 10. 

    Which of the following protocols can be used to retrieve system and network performance information from a router?

    • A.

      LDAP

    • B.

      IMAP

    • C.

      TFTP

    • D.

      SNMP

    Correct Answer
    D. SNMP
  • 11. 

    Which of the following devices can be installed on individual computers throughout the network?

    • A.

      NIPS

    • B.

      Network-based firewall

    • C.

      VPN concentrator

    • D.

      Host-based firewall

    Correct Answer
    D. Host-based firewall
  • 12. 

    Several users are sending emails to CompTIA.org. but they are not being received. Which of the following commands could be used to verify that the company is able to connect to the mail service at CompTIA.org?

    • A.

      Ping

    • B.

      Arp

    • C.

      Dig

    • D.

      Telnet

    Correct Answer
    D. Telnet
  • 13. 

    Which of the following metrics indentifies the number of connections that is between two devices?

    • A.

      Hop count

    • B.

      MTU

    • C.

      Latency

    • D.

      Bandwidth

    Correct Answer
    A. Hop count
  • 14. 

    Which of the following tools can be used to identify the location of a network outage?

    • A.

      Traceroute

    • B.

      Netstat

    • C.

      Nslookup

    • D.

      Ping

    Correct Answer
    A. Traceroute
  • 15. 

    Which of the following has a maximum data rate of 11Mbps?

    • A.

      802.11n

    • B.

      802.11g

    • C.

      802.11b

    • D.

      802.11a

    Correct Answer
    C. 802.11b
  • 16. 

    Which of the following networks are reserved for private IP addresses?

    • A.

      168.129.00/24

    • B.

      172.16.128.0/15

    • C.

      192.168.0.0/16

    • D.

      162.17.0.0/12

    Correct Answer
    C. 192.168.0.0/16
  • 17. 

    A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?

    • A.

      Phishing scam

    • B.

      Social engineering

    • C.

      Man-in-the-Middle

    • D.

      Shoulder surfing

    Correct Answer
    B. Social engineering
  • 18. 

    An administrator needs to terminate network cables that have just been installed in the main communications closet. Which of the following tools is required?

    • A.

      Multimeter

    • B.

      Snips

    • C.

      Toner probe

    • D.

      Punch down tool

    Correct Answer
    D. Punch down tool
  • 19. 

    A small business with eight employees has just opened their office in a renovated loft in a busy downtown area. The owner of the building does not want to run any additional wiring beyond power, to preserve the historic nature of the building. Because of this stipulation, almost all tenants in the building have chosen to implement wireless. Which of the following should be the FIRST step in setting up this SOHO network?

    • A.

      Run a wireless site survey

    • B.

      Speak to tenants to determine their telephone standards.

    • C.

      Install and configure a Gigabit switch.

    • D.

      Determine the operating system versions

    Correct Answer
    A. Run a wireless site survey
  • 20. 

    Two business partners have recently been connected via a dedicated extranet. It has been discovered that each of the companies are using the same private IP address space. Which of the following will help to resolve potential routing issues?

    • A.

      Multicast

    • B.

      PAT

    • C.

      CIDR

    • D.

      NAT

    Correct Answer
    D. NAT
  • 21. 

    Two autonomous networks who wish to exchange routing data should use which of the following protocols?

    • A.

      OSPF

    • B.

      BGP

    • C.

      EIGRP

    • D.

      IS-IS

    Correct Answer
    B. BGP
  • 22. 

    A computer is able to ping other devices on the same network but is unable to ping devices on another network. Which of the following needs to be configured?

    • A.

      DNS primary server

    • B.

      Host route

    • C.

      Proxy ARP

    • D.

      Default gateway

    Correct Answer
    D. Default gateway
  • 23. 

    A technician at a company providing online, real-time media streaming to the Internet needs a network technology that will reduce bandwidth while delivering high throughput. Which of the following can the technician implement to fit these requirements?

    • A.

      Subnetting

    • B.

      Unicast

    • C.

      Broadcast

    • D.

      Multicast

    Correct Answer
    D. Multicast
  • 24. 

    Which of the following would be used to lock all of the primary communication equipment of a building, including its demarcation point?

    • A.

      MTR

    • B.

      MDF

    • C.

      Smartjack

    • D.

      IDF

    Correct Answer
    B. MDF
  • 25. 

    Which of the following restricts network access to a router administrator's interface?

    • A.

      IDS

    • B.

      SSL

    • C.

      ACL

    • D.

      SMNPv2

    Correct Answer
    C. ACL
  • 26. 

    In which of the following topologies could the failure of one machine cause the entire network to stop functioning?

    • A.

      Mesh

    • B.

      Token ring

    • C.

      Star

    • D.

      Spanning tree

    Correct Answer
    B. Token ring
  • 27. 

    A user reports that their laptop does not have network connectivity, but was working fine last week. The technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1 address. This address is not part of the company's subnet. Which of the following MOST likely identifies this address type?

    • A.

      Multicast

    • B.

      DHCP

    • C.

      APIPA

    • D.

      Broadcast

    Correct Answer
    C. APIPA
  • 28. 

    Which of the following address formats uses 32-bit addressing?

    • A.

      IPv4IPv4

    • B.

      MAC address

    • C.

      IPv6

    • D.

      Host address

    Correct Answer
    A. IPv4IPv4
  • 29. 

    Determining when to retransmit frames is an example of which of the following Ethernet properties?

    • A.

      Carrier sense

    • B.

      Collision detection

    • C.

      Multiple access points

    • D.

      Collision avoidance

    Correct Answer
    B. Collision detection
  • 30. 

    The T568B wiring standard slates that CAT5 cables should be coded as follows:

    • A.

      White/Orange, Orange, White/Green, Green, Blue, White/Blue, White/Brown, Brown

    • B.

      White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown,

    • C.

      White/Orange, Orange, \White/Green, Green, White/Blue, Blue, White/Brown, Brown

    • D.

      White/Orange, Orange, White/Green, Blue,

    Correct Answer
    B. White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown,
  • 31. 

    Using network monitoring tools would allow an administrator to do which of the following?

    • A.

      Configure offline devices

    • B.

      Examine performance issues

    • C.

      Install additional software and updates

    • D.

      View syslog events

    Correct Answer
    B. Examine performance issues
  • 32. 

    Which of the following WAN protocols is a packet switching technology?

    • A.

      Frame Relay

    • B.

      POTS

    • C.

      PSTN

    • D.

      ISDN

    Correct Answer
    A. Frame Relay
  • 33. 

    Which of the following layers of the OSI model is the presentation layer?

    • A.

      Layer 1

    • B.

      Layer 5

    • C.

      Layer 6

    • D.

      Layer 7

    Correct Answer
    C. Layer 6
  • 34. 

    An administrator has added a new access point to the network to provide additional coverage. A heat-map survey shows coverage now extends beyond company property and is interfering with other wireless networks in the area. How should the administrator modify the new installation to stop the interference?

    • A.

      Turn down the transmission strength of the access point.

    • B.

      Replace the antenna with a smaller one.

    • C.

      Change the wireless password to a more complex one.

    • D.

      Change the SSID of the access point

    Correct Answer
    A. Turn down the transmission strength of the access point.
  • 35. 

    Which of the following wireless technologies can operate at only 5GHz?

    • A.

      802.11b/g

    • B.

      802.11g

    • C.

      802.11b

    • D.

      802.11a

    Correct Answer
    D. 802.11a
  • 36. 

    The "1000" in 1000BaseT cabling represents which of the following?

    • A.

      The theoretical maximum cable length

    • B.

      The theoretical maximum bandwidth

    • C.

      The theoretical port limit of the cable

    • D.

      The quality level of the copper wiring used

    Correct Answer
    B. The theoretical maximum bandwidth
  • 37. 

    Which of the following protocols is commonly used by ping?

    • A.

      SIP

    • B.

      ICMP

    • C.

      TFTP

    • D.

      ARP

    Correct Answer
    B. ICMP
  • 38. 

    Which of the following wireless standards has a MAXIMUM throughput, by default, of 11Mbps?

    • A.

      802.11g

    • B.

      802.11a

    • C.

      802.1 n

    • D.

      802.11b

    Correct Answer
    D. 802.11b
  • 39. 

    Which of the following WAN protocols is a circuit switching technology?

    • A.

      ISDN

    • B.

      SONET

    • C.

      Frame Relay

    • D.

      ATM

    Correct Answer
    A. ISDN
  • 40. 

    When verifying a new wireless installation the administrator is unable to see a wireless signal with any wireless laptop. The MOST likely problem is:

    • A.

      The SSID is not set to broadcast

    • B.

      An incorrect channel is being used

    • C.

      Incorrect client security settings are configured

    • D.

      Incorrect client configuration on the laptops

    Correct Answer
    A. The SSID is not set to broadcast
  • 41. 

    Link aggregation is also known as port:

    • A.

      Distribution

    • B.

      Mirroring

    • C.

      Spanning

    • D.

      Trunking

    Correct Answer
    A. Distribution
  • 42. 

    802.11g wireless signals operating at 24GHz has a maximum line of sight range of which of the following?

    • A.

      460 feet (140 meters

    • B.

      540 feet (165 meters)

    • C.

      560 feet (171 meters

    • D.

      840 feet (256 meters

    Correct Answer
    A. 460 feet (140 meters
  • 43. 

    Which of the following devices allows multiple internal IP addresses to access an external website with minimal impact to the network bandwidth?

    • A.

      Proxy

    • B.

      Load balancer

    • C.

      Router

    • D.

      Bandwidth shaper

    Correct Answer
    A. Proxy
  • 44. 

    Which of the following is a TRUE statement about static routing vs. dynamic routing?

    • A.

      Dynamic routing is created adhoc and static routing cannot be changed once implemented

    • B.

      Static routing is hard-coded and requires significant administrative overhead for large networks.

    • C.

      Static routing requires little administrative overhead and dynamic routing requires significant administrative overhead

    • D.

      Dynamic routing is the best solution for small networks and static routing is the best solution for large scale networks.

    Correct Answer
    B. Static routing is hard-coded and requires significant administrative overhead for large networks.
  • 45. 

    A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the following actions should the technician do FIRST?

    • A.

      Call their local ISP

    • B.

      Verify the IP information of the server

    • C.

      Check their local Internet connection

    • D.

      Verify the hostname of the server

    Correct Answer
    C. Check their local Internet connection
  • 46. 

    A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?

    • A.

      The laptop is missing the software supplicant

    • B.

      The access point SSID is hidden.

    • C.

      The laptop only supports TKIP and AES encryption,

    • D.

      The access point is on the wrong channel

    Correct Answer
    A. The laptop is missing the software supplicant
  • 47. 

    Which of the following is used to reduce the number of public IP addresses required?

    • A.

      RADIUS

    • B.

      SNAT

    • C.

      PAT

    • D.

      NAT

    Correct Answer
    D. NAT
  • 48. 

    Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?

    • A.

      Baseline configuration

    • B.

      Security policy

    • C.

      Performance and transaction logs

    • D.

      Physical network diagram

    Correct Answer
    D. Physical network diagram
  • 49. 

    A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?

    • A.

      DHCP server

    • B.

      Proxy server

    • C.

      Repeater

    • D.

      DHCP relay

    Correct Answer
    D. DHCP relay
  • 50. 

    An administrator is troubleshooting wireless connectivity issues at a client’s office and discovers that the machine loses connectivity when the wireless phone is being used. Which of the following WAPS should be installed to help resolve the issue?

    • A.

      802.1 1g

    • B.

      802.1X

    • C.

      802.11n

    • D.

      802.11b

    Correct Answer
    C. 802.11n

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • May 15, 2012
    Quiz Created by
    SGogola
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.