Networking 005 Part 7

120 Questions | Attempts: 175
Share
SettingsSettings
Please wait...
  • 1/120 Questions

    Which of the following tools would allow an administrator to push out a software update to all switches on the network?

    • Network management
    • Protocol analyzer
    • Network monitoring
    • System diagnostic
Please wait...
About This Quiz

Networking

Networking Quizzes & Trivia

Quiz Preview

  • 2. 

    When setting up a wireless network to cover a large area, which of the following needs to be considered FIRST?

    • Device placement

    • Encryption methods

    • Wireless channels

    • SSID name

    Correct Answer
    A. Device placement
  • 3. 

    A router that takes the workstations internal IP address and changes it to another IP address when it sends the data outside of the network is an example of which of the following?

    • NAT

    • IDS

    • NMAP

    • DMZ

    Correct Answer
    A. NAT
  • 4. 

    A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?

    • DHCP

    • ARP

    • DNS

    • PING

    Correct Answer
    A. ARP
  • 5. 

    A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?

    • Coaxial

    • CAT3

    • CAT3

    • CAT5e

    Correct Answer
    A. CAT5e
  • 6. 

    Which of the following describes 1Gigabit Ethernet?

    • 10GBaseER

    • 10Base2

    • 1000BaseT

    • 100Base5

    Correct Answer
    A. 1000BaseT
  • 7. 

    At which of the following layers does the TCP protocol operate?

    • Layer 1

    • Layer4

    • Layer 6

    • Layer 7

    Correct Answer
    A. Layer4
  • 8. 

    Which of the following ports does POP3 services use, by default?

    • 25

    • 110

    • 143

    • 443

    Correct Answer
    A. 110
  • 9. 

    In order for computers with private IP addresses to access the public Internet, which of the following must the router perform?

    • NAT

    • BGP

    • DHCP

    • APIPA

    Correct Answer
    A. NAT
  • 10. 

    A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?

    • WEP

    • Port filtering

    • WPA

    • Longer SSID broadcast intervals

    Correct Answer
    A. WPA
  • 11. 

    Which of the following defines access for a network?

    • ACL

    • RDF

    • RAS

    • ARP

    Correct Answer
    A. ACL
  • 12. 

    Which of the following technologies facilitates the conversion of internal private IP addressing to external public IP addressing?

    • DHCP

    • TCP/IP

    • NAT

    • SNMP

    Correct Answer
    A. NAT
  • 13. 

    Which of the following logical network topologies is used to provide a secure connection across the Internet?

    • VLAN

    • Peer to Peer

    • VTP

    • VPN

    Correct Answer
    A. VPN
  • 14. 

    A SONET network typically uses which of the following transmission media?

    • Single-mode fiber

    • Multimode fiber

    • Copper

    • Wireless

    Correct Answer
    A. Single-mode fiber
  • 15. 

    Which of the following protocols is commonly used for VoIP technology?

    • Telnet

    • SMTP

    • SIP

    • SNMP

    Correct Answer
    A. SIP
  • 16. 

    Which of the following processes translates a private IP address for a public IP address?

    • NAT

    • DNS

    • DHCP

    • PAT

    Correct Answer
    A. NAT
  • 17. 

    When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?

    • PCs will attempt to use the last address assigned to them.

    • PCs will pull from a static address pool.

    • PCs will use APIPA

    • PCs will prompt the user for an address

    Correct Answer
    A. PCs will use APIPA
  • 18. 

    A user plugged a cable between two network jacks that attach to the same switch and caused a broadcast storm. Which of the following would have prevented the broadcast storm?

    • Spanning tree

    • VLAN tagging

    • 802.1x

    • Port mirroring

    Correct Answer
    A. Spanning tree
  • 19. 

    1000BaseT has a MAXIMUM run distance of:

    • 25 meters (82 feet)

    • 100 meters (328 feet)

    • 500 meters (1640 feet)

    • 1000 meters (3280 feet)

    Correct Answer
    A. 100 meters (328 feet)
  • 20. 

    After a brownout, a user can connect to the internal network, but not the Internet. Which of the following is the company's DSL router experiencing that is causing this issue?

    • Switching loop

    • Power failure

    • Broadcast storm

    • Duplicate IP address

    Correct Answer
    A. Power failure
  • 21. 

    An administrator is experiencing availability issues on a Linux server. The administrator decides to check the server for an IP address conflict on the server. Which of the following commands should the administrator use?

    • Traceroute

    • Tracert

    • Ifconfig

    • Ipconfig

    Correct Answer
    A. Ifconfig
  • 22. 

    When each routing device has a consistent view of the network topology, the network is said to be:

    • Fault tolerant

    • Converged

    • Autonomous

    • Vectored

    Correct Answer
    A. Converged
  • 23. 

    A customer wants to network several computers within a large warehouse. The warehouse has one computer at the very far end of the warehouse that is 170 meters (557 feet) from the network switch. Which of the following cable types should a technician use for this computer?

    • CAT3

    • CAT5

    • CAT6

    • Fiber

    Correct Answer
    A. Fiber
  • 24. 

    Which of the following protocols is used to disable switch ports automatically to prevent switching loops?

    • RIP

    • 0S: F

    • STP

    • EGP

    Correct Answer
    A. STP
  • 25. 

    Administrators are performing a war drive around their company's complex. Which of the following are they attempting to detect?

    • Worms

    • Rogue access points

    • DDoS attacks

    • Bluesnarfing attacks

    Correct Answer
    A. Rogue access points
  • 26. 

    Which of the following operates in the 2.4GHz range and has a MAXIMUM distance of 10 meters (33 feet)?

    • X-10

    • Bluetooth

    • 802.11a

    • 802.11b

    Correct Answer
    A. Bluetooth
  • 27. 

    Which of the following DNS records would be queried to locate a company's mail server?

    • A

    • MX

    • AAAA

    • CNAME

    Correct Answer
    A. MX
  • 28. 

    Which of the following commands provides similar information about the current configuration of active local Ethernet adapters? (Select TWO).

    • Traceroute

    • Ipconfig

    • Ifconfig

    • Route

    • Hostname

    Correct Answer(s)
    A. Ipconfig
    A. Ifconfig
  • 29. 

    The network technician is troubleshooting a network issue by implementing a new security device. After installing and configuring the device, which of the following steps should the technician take NEXT?

    • Verity full system functionality

    • Identify the main problem and question the user

    • Document their findings, actions, and outcomes

    • Escalate the issue to upper management

    Correct Answer
    A. Verity full system functionality
  • 30. 

    Users report that there Internet connection is slow. The network technician has a suspicion that users are streaming video and music. Which of the following would BEST confirm the technician's theory?

    • Traffic analysis

    • SNMP

    • History logs

    • System logs

    Correct Answer
    A. Traffic analysis
  • 31. 

    A wireless access point supports up to 20 clients. Which of the following describes this wireless network?

    • Mesh

    • Point to point

    • Point to multipoint

    • Ring

    Correct Answer
    A. Point to multipoint
  • 32. 

    On a network switch, which of the following is the default native VLAN?

    • 0

    • 1

    • 1024

    • 4096

    Correct Answer
    A. 1
  • 33. 

    Which of the following protocols is used to encrypt data between web servers and web browsers?

    • SMTP

    • SIP

    • HTTP

    • SSL

    Correct Answer
    A. SSL
  • 34. 

    A company wants to secure access to its internal wireless network. The company wants to use the most secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?

    • WEP encryption

    • Channel rotation

    • Disable SSID

    • WPA encryption

    Correct Answer
    A. WPA encryption
  • 35. 

    A user on a network cannot access any network resources. The link light on the computer shows that a connection is present. Which of the following is the MOST likely cause of the problem?

    • The wrong cable type has been used.

    • IDS has shut down the computer's switch port.

    • The port on the switch is configured incorrectly

    • Spanning tree protocol was implemented.

    Correct Answer
    A. The port on the switch is configured incorrectly
  • 36. 

    Which of the following applications is MOST likely to require QoS to ensure proper functionality?

    • HTTP

    • VoIP

    • SNMPv3

    • Peer to peer

    Correct Answer
    A. VoIP
  • 37. 

    An administrator wants to limit the wireless guest network traffic to 100Kbps so that utilization issues do not occur on the company's T1 Internet access network. Which of the following optimizations should the administrator implement?

    • Load balancing

    • Caching engine

    • Traffic shaping

    • Quality of service

    Correct Answer
    A. Traffic shaping
  • 38. 

    An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?

    • IDS

    • IPS

    • Firewall

    • Managed PKI

    Correct Answer
    A. IDS
  • 39. 

    Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?

    • Trunking

    • LAN

    • VPN

    • Peer to peer

    Correct Answer
    A. VPN
  • 40. 

    New service from the telephone company is delivered over fiber, but the technician does not have a fiber module for the router. Which of the following would remedy this issue?

    • OTDR

    • Media converter

    • CSU/DSU

    • Fiber repeater

    Correct Answer
    A. Media converter
  • 41. 

    Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?

    • IDF

    • 66 block

    • MDF

    • 110 block

    Correct Answer
    A. 110 block
  • 42. 

    Which of the following is a secure method of remote access via command line?

    • RCP

    • Telnet

    • RSH

    • SSH

    Correct Answer
    A. SSH
  • 43. 

    Which of the following uses copper wiring?

    • 10GBaseER

    • 10GBaseLW

    • 100BaseFX

    • 1000BaseT

    Correct Answer
    A. 1000BaseT
  • 44. 

    When ordering switches for a new building, which of the following is the BEST way for the technician to determine the number of switches to put in each network closet?

    • Review the architectural plans to see how many drops go to each closet.

    • Count the number of rooms near each closet and standardize eight drops per room.

    • Wireless is the new standard and no network switches will be needed in the building,

    • Count the number of phone ports and configure two network ports for each phone port.

    Correct Answer
    A. Review the architectural plans to see how many drops go to each closet.
  • 45. 

    After a baseline check was completed it was noted that the network was working far below the level of the last baseline. Which of the following should the technician do NEXT to determine where the network problems are occurring?

    • Upgrade the firmware on all routers and switches

    • Reboot the entire network one device at a time

    • Conduct a network traffic analysis

    • Rerun the baseline to ensure the results were correct

    Correct Answer
    A. Conduct a network traffic analysis
  • 46. 

    Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?

    • 802.11a

    • 802.11b

    • 802.11g

    • 802,11n

    Correct Answer
    A. 802,11n
  • 47. 

    Which of the following holds multiple connections and is usually maintained by the telephone company?

    • Demarc

    • IDF

    • MDF

    • 110 block

    Correct Answer
    A. Demarc
  • 48. 

    An administrator replaced a router with a switch. End users are able to access network shares but are not able to access the Internet. Which of the following is the BEST explanation why the users are unable to access the Internet?

    • Router routes traffic between different networks and a switch does not

    • The new switch is faulty and needs to be replaced and configured correctly

    • The firewall needs to be setup to allow traffic to reach the Internet

    • The switch needs to be setup to forward data traffic to the Internet

    Correct Answer
    A. Router routes traffic between different networks and a switch does not
  • 49. 

    Which of the following is a hybrid network topology used for fault tolerance, in which all computers MUST connect to each other?

    • Star

    • Ring

    • Bus

    • Mesh

    Correct Answer
    A. Mesh

Quiz Review Timeline (Updated): Mar 22, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • May 15, 2012
    Quiz Created by
    SGogola
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.