Networking 005 Part 7

120 Questions | Attempts: 175
Share

SettingsSettingsSettings
Networking Quizzes & Trivia

Networking


Questions and Answers
  • 1. 

    When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?

    • A.

      PCs will attempt to use the last address assigned to them.

    • B.

      PCs will pull from a static address pool.

    • C.

      PCs will use APIPA

    • D.

      PCs will prompt the user for an address

    Correct Answer
    C. PCs will use APIPA
  • 2. 

    Which of the following protocols uses port 119, by default?

    • A.

      NNTP

    • B.

      NTP

    • C.

      TFTP

    • D.

      FTP

    Correct Answer
    A. NNTP
  • 3. 

    A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?

    • A.

      Coaxial

    • B.

      CAT3

    • C.

      CAT3

    • D.

      CAT5e

    Correct Answer
    D. CAT5e
  • 4. 

    Session affinity is a feature of which of the following devices?

    • A.

      DNS server

    • B.

      DHCP server

    • C.

      Load balancer

    • D.

      IPS

    Correct Answer
    C. Load balancer
  • 5. 

    Which of the following describes 1Gigabit Ethernet?

    • A.

      10GBaseER

    • B.

      10Base2

    • C.

      1000BaseT

    • D.

      100Base5

    Correct Answer
    C. 1000BaseT
  • 6. 

    A user in the accounting department reports that their office is able to connect to the network, but they are unable to connect to the Internet. Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue? (Select TWO).

    • A.

      Physical network diagram

    • B.

      Job log

    • C.

      Acceptable use policy

    • D.

      Baseline documentation

    • E.

      Wiring schematic

    Correct Answer(s)
    A. Physical network diagram
    E. Wiring schematic
  • 7. 

    Which of the following remote access methods allows an administrator to take control of a user's machine and block the user from seeing the active session?

    • A.

      PPP

    • B.

      PPPoE

    • C.

      RDP

    • D.

      RAS

    Correct Answer
    C. RDP
  • 8. 

    Which of the following is primarily used for VoIP?

    • A.

      TLS

    • B.

      RDF

    • C.

      NTP

    • D.

      RTP

    Correct Answer
    D. RTP
  • 9. 

    Which of the following tools would allow an administrator to push out a software update to all switches on the network?

    • A.

      Network management

    • B.

      Protocol analyzer

    • C.

      Network monitoring

    • D.

      System diagnostic

    Correct Answer
    A. Network management
  • 10. 

    Which of the following wiring distribution components uses a bridge clip to connect both sides of the block?

    • A.

      110 block

    • B.

      Demarc

    • C.

      Smart jack

    • D.

      66 block

    Correct Answer
    D. 66 block
  • 11. 

    Administrators are performing a war drive around their company's complex. Which of the following are they attempting to detect?

    • A.

      Worms

    • B.

      Rogue access points

    • C.

      DDoS attacks

    • D.

      Bluesnarfing attacks

    Correct Answer
    B. Rogue access points
  • 12. 

    Which of the following is an interior routing protocol that is used to provide routing within autonomous systems?

    • A.

      ARP

    • B.

      IGP

    • C.

      BGP

    • D.

      EGP

    Correct Answer
    B. IGP
  • 13. 

    On a network switch, which of the following is the default native VLAN?

    • A.

      0

    • B.

      1

    • C.

      1024

    • D.

      4096

    Correct Answer
    B. 1
  • 14. 

    When setting up a wireless network to cover a large area, which of the following needs to be considered FIRST?

    • A.

      Device placement

    • B.

      Encryption methods

    • C.

      Wireless channels

    • D.

      SSID name

    Correct Answer
    A. Device placement
  • 15. 

    Which of the following security threats involves making phone calls?

    • A.

      Phishing

    • B.

      Vishing

    • C.

      DDoS

    • D.

      Xmas attack

    Correct Answer
    B. Vishing
  • 16. 

    Which of the following LAN technologies is defined as fast Ethernet?

    • A.

      10BaseT

    • B.

      100BaseT

    • C.

      100BaseFX

    • D.

      1000BaseT

    Correct Answer
    B. 100BaseT
  • 17. 

    A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? (Select TWO).

    • A.

      The length of the house

    • B.

      How many rooms are in the house

    • C.

      How many users will be using the wireless network

    • D.

      The building material of the house

    • E.

      The cost of the house

    Correct Answer(s)
    A. The length of the house
    D. The building material of the house
  • 18. 

    A user plugged a cable between two network jacks that attach to the same switch and caused a broadcast storm. Which of the following would have prevented the broadcast storm?

    • A.

      Spanning tree

    • B.

      VLAN tagging

    • C.

      802.1x

    • D.

      Port mirroring

    Correct Answer
    A. Spanning tree
  • 19. 

    Which of the following protocols is used to encrypt data between web servers and web browsers?

    • A.

      SMTP

    • B.

      SIP

    • C.

      HTTP

    • D.

      SSL

    Correct Answer
    D. SSL
  • 20. 

    Which of the following devices separates a LAN segment into two collision domains, without affecting the broadcast domain?

    • A.

      Firewall

    • B.

      Bridge

    • C.

      Repeater

    • D.

      Router

    Correct Answer
    B. Bridge
  • 21. 

    When configured. MPLS can increase routing redundancy by providing which of the following network topology types?

    • A.

      Bus

    • B.

      Mesh

    • C.

      Multipath

    • D.

      Ring

    Correct Answer
    B. Mesh
  • 22. 

    On which of the following cables would a technician find a BNC connector installed?

    • A.

      CAT6

    • B.

      RG-6

    • C.

      Fiber

    • D.

      CAT3

    Correct Answer
    B. RG-6
  • 23. 

    Which of the following ping parameters will set the size of the outgoing packet?

    • A.

      –c

    • B.

      I

    • C.

      R

    • D.

      –s

    Correct Answer
    D. –s
  • 24. 

    Which of the following WAN technologies modulates 24 channels into a 1 5Mbps signal?

    • A.

      ISDN

    • B.

      PSTN

    • C.

      OC-24

    • D.

      T1

    Correct Answer
    D. T1
  • 25. 

    A company wants to secure access to its internal wireless network. The company wants to use the most secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?

    • A.

      WEP encryption

    • B.

      Channel rotation

    • C.

      Disable SSID

    • D.

      WPA encryption

    Correct Answer
    D. WPA encryption
  • 26. 

    A user on a network cannot access any network resources. The link light on the computer shows that a connection is present. Which of the following is the MOST likely cause of the problem?

    • A.

      The wrong cable type has been used.

    • B.

      IDS has shut down the computer's switch port.

    • C.

      The port on the switch is configured incorrectly

    • D.

      Spanning tree protocol was implemented.

    Correct Answer
    C. The port on the switch is configured incorrectly
  • 27. 

    At which of the following layers does the TCP protocol operate?

    • A.

      Layer 1

    • B.

      Layer4

    • C.

      Layer 6

    • D.

      Layer 7

    Correct Answer
    B. Layer4
  • 28. 

    A technician is troubleshooting a network connectivity issue. Given the following abbreviated trace route output: 1 192.168.1.1 2 172.16.40.1 310.4.0.1 4172.16.40.1 Which of the following is MOST likely occurring?

    • A.

      Switching loop

    • B.

      Broadcast storm

    • C.

      IP conflict

    • D.

      Routing loop

    Correct Answer
    D. Routing loop
  • 29. 

    Which of the following configuration management documentation types would an administrator use to know how and when to property install new network devices on the LAN?

    • A.

      Baseline configuration

    • B.

      Logical network diagram

    • C.

      Network policy

    • D.

      Wiring schematic

    Correct Answer
    C. Network policy
  • 30. 

    Which of the following applications is MOST likely to require QoS to ensure proper functionality?

    • A.

      HTTP

    • B.

      VoIP

    • C.

      SNMPv3

    • D.

      Peer to peer

    Correct Answer
    B. VoIP
  • 31. 

    An administrator wants to limit the wireless guest network traffic to 100Kbps so that utilization issues do not occur on the company's T1 Internet access network. Which of the following optimizations should the administrator implement?

    • A.

      Load balancing

    • B.

      Caching engine

    • C.

      Traffic shaping

    • D.

      Quality of service

    Correct Answer
    C. Traffic shaping
  • 32. 

    Which of the following commands would be used to display the IP address on a UNIX/Linux computer?

    • A.

      Netstat

    • B.

      Ipconfig

    • C.

      Ifconfig

    • D.

      Dig

    Correct Answer
    C. Ifconfig
  • 33. 

    A technician wants to test the DNS server ns.company.com to ensure it is able to resolve the company web address. Which of the following command sequences will test DNS functionality?

    • A.

      Nslookup set type=mx www.company.com

    • B.

      Nslookup Set type=ns @ns.company.com www

    • C.

      Nslookup domain ns.company.com lookup www

    • D.

      Nslookup server ns.company.com www.company.com

    Correct Answer
    D. Nslookup server ns.company.com www.company.com
  • 34. 

    Which of the following components is typically used for voice transmissions and has a 10Mbps maximum transfer speed?

    • A.

      110 block

    • B.

      Patch panel

    • C.

      Vertical cross connect

    • D.

      66 block

    Correct Answer
    D. 66 block
  • 35. 

    An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?

    • A.

      IDS

    • B.

      IPS

    • C.

      Firewall

    • D.

      Managed PKI

    Correct Answer
    A. IDS
  • 36. 

    A company is about to install a second network connect on with a new ISP. Which of the following routing protocols is the BEST choice?

    • A.

      IS-IS

    • B.

      BGP

    • C.

      OSPF

    • D.

      RIP

    Correct Answer
    B. BGP
  • 37. 

    A customer wants to network several computers within a large warehouse. The warehouse has one computer at the very far end of the warehouse that is 170 meters (557 feet) from the network switch. Which of the following cable types should a technician use for this computer?

    • A.

      CAT3

    • B.

      CAT5

    • C.

      CAT6

    • D.

      Fiber

    Correct Answer
    D. Fiber
  • 38. 

    Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?

    • A.

      Trunking

    • B.

      LAN

    • C.

      VPN

    • D.

      Peer to peer

    Correct Answer
    C. VPN
  • 39. 

    Which of the following represents the physical address of a network access card?

    • A.

      FF01:D2:C4:87::11

    • B.

      00-30-48-83-9B-C8

    • C.

      08-9D-35-22-L2-34-FF-21

    • D.

      2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A

    Correct Answer
    B. 00-30-48-83-9B-C8
  • 40. 

    New service from the telephone company is delivered over fiber, but the technician does not have a fiber module for the router. Which of the following would remedy this issue?

    • A.

      OTDR

    • B.

      Media converter

    • C.

      CSU/DSU

    • D.

      Fiber repeater

    Correct Answer
    B. Media converter
  • 41. 

    An administrator needs to update a router configuration for a router that does not support SSH. Which of the following can be used to securely update the router configuration?

    • A.

      FTP

    • B.

      SNMPv2

    • C.

      TFTP

    • D.

      KTTPS

    Correct Answer
    D. KTTPS
  • 42. 

    Which of the following is an invalid IPv4 address?

    • A.

      225.0.0.1

    • B.

      254.254.0.0

    • C.

      256.0.0.4

    • D.

      224.2.1.4

    Correct Answer
    C. 256.0.0.4
  • 43. 

    A layer 3 switch can move packets between subnets based on which of the following criteria?

    • A.

      802.1q tag

    • B.

      Port

    • C.

      Application

    • D.

      IP address

    Correct Answer
    D. IP address
  • 44. 

    Which of the following features is essential in a firewall if it is to support RTP sessions?

    • A.

      Remote console

    • B.

      Statefulness

    • C.

      Address translation

    • D.

      Zones

    Correct Answer
    B. Statefulness
  • 45. 

    1000BaseT has a MAXIMUM run distance of:

    • A.

      25 meters (82 feet)

    • B.

      100 meters (328 feet)

    • C.

      500 meters (1640 feet)

    • D.

      1000 meters (3280 feet)

    Correct Answer
    B. 100 meters (328 feet)
  • 46. 

    Which of the following features would BEST be used to optimize real-time voice and video chat? (Select TWO)

    • A.

      Load balancing

    • B.

      Caching engines

    • C.

      Qos

    • D.

      Fault tolerance systems

    • E.

      Traffic shaping

    Correct Answer(s)
    C. Qos
    E. Traffic shaping
  • 47. 

    An administrator is unable to ping a workstation. Which of the following tools would BEST help to resolve the issue?

    • A.

      Cable tester

    • B.

      Multimeter

    • C.

      Toner probe

    • D.

      Protocol analyzer

    Correct Answer
    A. Cable tester
  • 48. 

    A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?

    • A.

      Multicasting

    • B.

      Proxy server

    • C.

      NAT

    • D.

      Subnetting

    Correct Answer
    C. NAT
  • 49. 

    A technician is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?

    • A.

      802.11a

    • B.

      802.11b

    • C.

      802.11g

    • D.

      802.11n

    Correct Answer
    C. 802.11g
  • 50. 

    A user took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. The user can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?

    • A.

      Incorrect DNS

    • B.

      Incorrect subnet mask

    • C.

      Duplicate IP address

    • D.

      Incorrect SSID

    Correct Answer
    A. Incorrect DNS

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • May 15, 2012
    Quiz Created by
    SGogola
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.