Networking 005 Part 7

120 Questions | Total Attempts: 161

SettingsSettingsSettings
Please wait...
Networking Quizzes & Trivia

Networking


Questions and Answers
  • 1. 
    When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?
    • A. 

      PCs will attempt to use the last address assigned to them.

    • B. 

      PCs will pull from a static address pool.

    • C. 

      PCs will use APIPA

    • D. 

      PCs will prompt the user for an address

  • 2. 
    Which of the following protocols uses port 119, by default?
    • A. 

      NNTP

    • B. 

      NTP

    • C. 

      TFTP

    • D. 

      FTP

  • 3. 
    A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?
    • A. 

      Coaxial

    • B. 

      CAT3

    • C. 

      CAT3

    • D. 

      CAT5e

  • 4. 
    Session affinity is a feature of which of the following devices?
    • A. 

      DNS server

    • B. 

      DHCP server

    • C. 

      Load balancer

    • D. 

      IPS

  • 5. 
    Which of the following describes 1Gigabit Ethernet?
    • A. 

      10GBaseER

    • B. 

      10Base2

    • C. 

      1000BaseT

    • D. 

      100Base5

  • 6. 
    A user in the accounting department reports that their office is able to connect to the network, but they are unable to connect to the Internet. Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue? (Select TWO).
    • A. 

      Physical network diagram

    • B. 

      Job log

    • C. 

      Acceptable use policy

    • D. 

      Baseline documentation

    • E. 

      Wiring schematic

  • 7. 
    Which of the following remote access methods allows an administrator to take control of a user's machine and block the user from seeing the active session?
    • A. 

      PPP

    • B. 

      PPPoE

    • C. 

      RDP

    • D. 

      RAS

  • 8. 
    Which of the following is primarily used for VoIP?
    • A. 

      TLS

    • B. 

      RDF

    • C. 

      NTP

    • D. 

      RTP

  • 9. 
    Which of the following tools would allow an administrator to push out a software update to all switches on the network?
    • A. 

      Network management

    • B. 

      Protocol analyzer

    • C. 

      Network monitoring

    • D. 

      System diagnostic

  • 10. 
    Which of the following wiring distribution components uses a bridge clip to connect both sides of the block?
    • A. 

      110 block

    • B. 

      Demarc

    • C. 

      Smart jack

    • D. 

      66 block

  • 11. 
    Administrators are performing a war drive around their company's complex. Which of the following are they attempting to detect?
    • A. 

      Worms

    • B. 

      Rogue access points

    • C. 

      DDoS attacks

    • D. 

      Bluesnarfing attacks

  • 12. 
    Which of the following is an interior routing protocol that is used to provide routing within autonomous systems?
    • A. 

      ARP

    • B. 

      IGP

    • C. 

      BGP

    • D. 

      EGP

  • 13. 
    On a network switch, which of the following is the default native VLAN?
    • A. 

      0

    • B. 

      1

    • C. 

      1024

    • D. 

      4096

  • 14. 
    When setting up a wireless network to cover a large area, which of the following needs to be considered FIRST?
    • A. 

      Device placement

    • B. 

      Encryption methods

    • C. 

      Wireless channels

    • D. 

      SSID name

  • 15. 
    Which of the following security threats involves making phone calls?
    • A. 

      Phishing

    • B. 

      Vishing

    • C. 

      DDoS

    • D. 

      Xmas attack

  • 16. 
    Which of the following LAN technologies is defined as fast Ethernet?
    • A. 

      10BaseT

    • B. 

      100BaseT

    • C. 

      100BaseFX

    • D. 

      1000BaseT

  • 17. 
    A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? (Select TWO).
    • A. 

      The length of the house

    • B. 

      How many rooms are in the house

    • C. 

      How many users will be using the wireless network

    • D. 

      The building material of the house

    • E. 

      The cost of the house

  • 18. 
    A user plugged a cable between two network jacks that attach to the same switch and caused a broadcast storm. Which of the following would have prevented the broadcast storm?
    • A. 

      Spanning tree

    • B. 

      VLAN tagging

    • C. 

      802.1x

    • D. 

      Port mirroring

  • 19. 
    Which of the following protocols is used to encrypt data between web servers and web browsers?
    • A. 

      SMTP

    • B. 

      SIP

    • C. 

      HTTP

    • D. 

      SSL

  • 20. 
    Which of the following devices separates a LAN segment into two collision domains, without affecting the broadcast domain?
    • A. 

      Firewall

    • B. 

      Bridge

    • C. 

      Repeater

    • D. 

      Router

  • 21. 
    When configured. MPLS can increase routing redundancy by providing which of the following network topology types?
    • A. 

      Bus

    • B. 

      Mesh

    • C. 

      Multipath

    • D. 

      Ring

  • 22. 
    On which of the following cables would a technician find a BNC connector installed?
    • A. 

      CAT6

    • B. 

      RG-6

    • C. 

      Fiber

    • D. 

      CAT3

  • 23. 
    Which of the following ping parameters will set the size of the outgoing packet?
    • A. 

      –c

    • B. 

      I

    • C. 

      R

    • D. 

      –s

  • 24. 
    Which of the following WAN technologies modulates 24 channels into a 1 5Mbps signal?
    • A. 

      ISDN

    • B. 

      PSTN

    • C. 

      OC-24

    • D. 

      T1

  • 25. 
    A company wants to secure access to its internal wireless network. The company wants to use the most secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?
    • A. 

      WEP encryption

    • B. 

      Channel rotation

    • C. 

      Disable SSID

    • D. 

      WPA encryption

Back to Top Back to top