Networking 005 Quiz

  • ISO/IEC 27001
  • NIST SP 800-53
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By SGogola
S
SGogola
Community Contributor
Quizzes Created: 3 | Total Attempts: 578
| Attempts: 360 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. Which of the following network appliances would facilitate an even amount of traffic hitting each web server?

Explanation

A load balancer is a network appliance that distributes incoming network traffic evenly across multiple web servers. It helps to ensure that each web server receives an equal amount of traffic, preventing any single server from becoming overwhelmed and improving overall performance and availability. This makes it the ideal choice for facilitating an even amount of traffic hitting each web server. A VPN concentrator is used to create secure connections for remote access, a proxy server is used to handle requests on behalf of clients, and a content filter is used to restrict or monitor internet access.

Submit
Please wait...
About This Quiz
Network Security Quizzes & Trivia

Within a network, the security of the space within which the allowed computers are operating has to be secure to ensure that no unauthorized access is allowed. Networking 005 quizzes has more. All the best.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Sandy, the network technician, needs to run a cable through a power distribution room that contains a high voltage transformer. Which of the following would be used to minimize EMI interference?

Explanation

STP stands for Shielded Twisted Pair. It is a type of cable that has a layer of shielding around the twisted pairs of wires. This shielding helps to minimize electromagnetic interference (EMI) that can be caused by nearby high voltage transformers or other sources of electrical noise. By using STP, Sandy can ensure that the cable running through the power distribution room will be protected from EMI interference, resulting in a more reliable network connection.

Submit
3. Sandy, a technician, is fixing a wireless network that was receiving interference from a user's cordless phone. Which of the following should Sandy configure?

Explanation

Sandy should configure the channel of the wireless network. By changing the channel, Sandy can avoid interference from the user's cordless phone and ensure a stable and reliable wireless connection.

Submit
4. Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?

Explanation

Port 53 should be allowed through the firewall to allow DNS resolution to occur to an outside DNS server. DNS (Domain Name System) uses port 53 for communication between DNS clients and servers. By allowing port 53 through the firewall, DNS requests and responses can be transmitted between the internal network and the external DNS server, enabling the resolution of domain names to their corresponding IP addresses.

Submit
5. A packet sniffer is MOST likely used to do which of the following?

Explanation

A packet sniffer is a tool used to capture and analyze network traffic. It allows users to monitor and inspect the data packets that are being transmitted over a network. This can be useful for various purposes such as troubleshooting network issues, monitoring network performance, and detecting any unauthorized or suspicious activities on the network. It does not prevent network-based attacks, route IP packets, or record the switch ARP table.

Submit
6. In which of the following wireless standards is MIMO used?

Explanation

MIMO, which stands for Multiple-Input Multiple-Output, is a wireless technology that uses multiple antennas to improve the performance of wireless communication. It allows for the transmission of multiple data streams simultaneously, increasing the data throughput and improving the overall reliability and range of the wireless network. Among the given options, 802.11n is the wireless standard that utilizes MIMO technology. 802.11a, 802.11b, and 802.11g are older wireless standards that do not incorporate MIMO.

Submit
7. Joe, the network technician, is configuring the channels being used within the WLAN, to ensure a minimal amount of interference. Which of the following channel setups would be used to avoid overlap?

Explanation

The correct answer is 1, 6, 11. This channel setup is used to avoid overlap because it follows the 5 GHz frequency band plan for Wi-Fi channels. In this plan, there are non-overlapping channels spaced 5 channels apart, starting from channel 36. Channels 1, 6, and 11 are the only channels in the 2.4 GHz frequency band that do not overlap with each other, allowing for minimal interference between neighboring Wi-Fi networks.

Submit
8. Which of the following would Joe, a technician, configure to modify the time a device will hold an IP address provided through DHCP?

Explanation

Joe, as a technician, would configure the leases to modify the time a device will hold an IP address provided through DHCP. Leases determine the duration for which an IP address is assigned to a device. By modifying the lease time, Joe can control how long a device can retain the assigned IP address before it needs to be renewed. This allows for better management of IP address allocation and ensures that addresses are not held indefinitely by inactive devices.

Submit
9. Which of the following ports carries IMAP traffic, by default, on modern email systems?

Explanation

Port 143 carries IMAP (Internet Message Access Protocol) traffic by default on modern email systems. IMAP is a protocol used for accessing and managing email messages on a mail server. Port numbers are used to identify specific services or applications running on a computer network. In the case of IMAP, port 143 is the default port used for establishing a connection between an email client and the email server to retrieve and manage emails.

Submit
10. Which of the following technologies would Sandy, a technician, use to connect networks at large distances without the use of physical medium?

Explanation

Sandy, the technician, would use satellite technology to connect networks at large distances without the use of a physical medium. Satellites can transmit data over long distances by using radio signals, allowing for communication between networks that are geographically far apart. This technology is commonly used for remote areas or in situations where laying physical cables is impractical or impossible. ISDN, OC3, and OC12 are not suitable for connecting networks without physical mediums.

Submit
11. Which of the following network access methods is the MOST secure?

Explanation

IPSec (Internet Protocol Security) is the most secure network access method among the options given. It provides authentication, integrity, and encryption for IP packets, ensuring the confidentiality and integrity of data transmitted over the network. It establishes a secure tunnel between two endpoints, allowing for secure communication and protecting against unauthorized access and data tampering. PPPoE (Point-to-Point Protocol over Ethernet), SIP (Session Initiation Protocol), and RSH (Remote Shell) do not offer the same level of security as IPSec.

Submit
12. Which of the following is the third layer of the OSI model?

Explanation

The third layer of the OSI model is the Network layer. This layer is responsible for routing and forwarding data packets across different networks. It ensures that data is delivered from the source to the destination by choosing the best path and managing network congestion. The Network layer also provides logical addressing and translates logical addresses into physical addresses.

Submit
13. Which of the following network topologies, when a single machine's cable breaks, would only affect one network device and not the rest of the network?

Explanation

In a star network topology, each network device is connected to a central hub or switch. When a single machine's cable breaks in a star network, it would only affect that particular machine and not the rest of the network. This is because each device has its own dedicated connection to the central hub, so the failure of one machine's cable does not impact the connectivity of other devices in the network.

Submit
14. Which of the following is a form of encrypting packets for safe, secure data transmission within a network?

Explanation

IPSec is a form of encrypting packets for safe, secure data transmission within a network. It provides authentication, integrity, and confidentiality of network packets by encrypting the data and verifying the identity of the communicating parties. IPSec is commonly used in virtual private networks (VPNs) to ensure the security of data transmitted over the internet or other public networks.

Submit
15. Karen, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identity the workstation's packets Karen wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?

Explanation

ARP (Address Resolution Protocol) would provide the needed information. ARP is used to map an IP address to a MAC address on a local network. In this case, Karen wants to identify the workstation's packets using its IP address, so she would use ARP to obtain the corresponding MAC address.

Submit
16. Joe, a network technician, blocks access to ports 25,110, and 143 on the firewall. Which of the following application services will be blocked due to this?

Explanation

Blocking ports 25, 110, and 143 on the firewall will block email sending and receiving. Port 25 is used for Simple Mail Transfer Protocol (SMTP) which is responsible for sending emails. Port 110 is used for Post Office Protocol version 3 (POP3) which is used to retrieve emails from a remote server. Port 143 is used for Internet Message Access Protocol (IMAP) which is also used to retrieve emails. By blocking these ports, the network technician is preventing any email communication from taking place.

Submit
17. A firewall that operates at Layer 7 of the OSI model is known as a(n):

Explanation

A firewall that operates at Layer 7 of the OSI model is known as an application level firewall. Layer 7, also known as the application layer, is the highest layer in the OSI model and deals with the protocols and processes that directly interact with the end-user applications. An application level firewall is capable of inspecting and filtering traffic based on specific application-layer protocols, such as HTTP, FTP, or SMTP. It provides more advanced security features compared to lower-layer firewalls, as it can understand and control the content and behavior of specific applications.

Submit
18. Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but does not want to use an encryption method. Which of the following methods would be BEST to accomplish this?

Explanation

MAC filtering would be the best method to limit access to a wireless network to company owned laptops without using an encryption method. MAC filtering allows the network administrator to create a list of approved MAC addresses (unique identifiers for network devices) and only allows devices with those approved MAC addresses to connect to the network. This way, only company owned laptops with approved MAC addresses would be able to access the wireless network, while other devices would be blocked.

Submit
19. Joe, a client, has observed non-employees sitting in his parking lot and surfing on his unsecured wireless connection. Which of the following could be employed to potentially prevent this? (Select TWO).

Explanation

WPA (Wi-Fi Protected Access) is a security protocol that can be employed to secure the wireless connection. It provides encryption and authentication, preventing unauthorized access to the network. Reduction of signal gain refers to decreasing the strength of the wireless signal, which can help limit the range of the network and prevent unauthorized users from accessing it from outside the premises.

Submit
20. Kurt, a technician, wants to prevent users from visiting social networking sites. Which of the following should be configured on the firewall to BEST achieve this?

Explanation

A content filter should be configured on the firewall to prevent users from visiting social networking sites. A content filter is a software or hardware solution that analyzes internet traffic and blocks access to certain websites or types of content based on predefined rules. By configuring a content filter on the firewall, Kurt can specify the social networking sites that should be blocked, effectively preventing users from accessing them.

Submit
21. Sandy, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem?

Explanation

The most likely cause of the problem is that an incorrect subnet mask has been entered in the WAP configuration. The subnet mask is used to determine the network address and the host address within that network. If the subnet mask is incorrect, it can result in the WAP not being able to properly communicate with the router or gateway, leading to users being unable to access the internet.

Submit
22. A switch in IDF 3 has shut down at 3 p.m. every day this week. Which of the following network tools should Karen, a technician, use to troubleshoot this problem?

Explanation

Karen should use an environmental monitor to troubleshoot the problem of the switch shutting down at 3 p.m. every day. An environmental monitor is a network tool that monitors and tracks environmental conditions such as temperature, humidity, and power fluctuations. By using an environmental monitor, Karen can determine if any environmental factors are causing the switch to shut down consistently at the same time every day.

Submit
23. Which of the following has a DB-9 connector?

Explanation

RS-232 has a DB-9 connector. RS-232 is a standard for serial communication that uses a 9-pin connector known as DB-9. This connector is commonly used for connecting devices such as computers, modems, and printers. The other options, SC, LC, and RJ-45, are types of connectors used for different purposes, such as fiber optic networking and Ethernet connections, but they do not use a DB-9 connector.

Submit
24. Sandy, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Sandy use?

Explanation

Sandy should use multimode fiber cables to prevent interference. Multimode fiber cables have a higher bandwidth and are less susceptible to electromagnetic interference compared to other cable types like CAT5e, CAT6, and coaxial cables. Running cables over the light fixtures in the ceiling can expose them to potential sources of interference, so using multimode fiber cables will ensure a reliable and interference-free connection between the offices.

Submit
25. Sandy, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?

Explanation

To not allow FTP traffic on a network, port 21 should be blocked on the firewall. Port 21 is the default port used by FTP (File Transfer Protocol) for control messages. By blocking this port, the firewall will prevent any FTP traffic from passing through and accessing the network.

Submit
26. Which of the following could Karen, a network technician, use to find the approximate location of a break in a long network cable?

Explanation

A time domain reflectometer (TDR) is a tool that can be used to find the approximate location of a break in a long network cable. It works by sending a signal down the cable and measuring the time it takes for the signal to bounce back. By analyzing the time and intensity of the reflected signal, the technician can determine the distance to the break. This makes a TDR a useful tool for troubleshooting and locating cable faults in network infrastructure.

Submit
27. Karen, an administrator, has created a patch cable. Which of the following tools should she use to check the integrity of the cable?

Explanation

A cable certifier is a tool that is specifically designed to check the integrity of cables. It can test the cable for various parameters such as continuity, length, attenuation, and impedance. By using a cable certifier, Karen can ensure that the patch cable she created is properly functioning and meets the required standards. This tool will help her identify any potential issues or faults in the cable, allowing her to fix them before deploying the cable in a network.

Submit
28. Which of the following cable mediums is NOT susceptible to EMI?

Explanation

Fiber optic cables are not susceptible to electromagnetic interference (EMI) because they use light to transmit data instead of electrical signals. Unlike wireless, coaxial, and UTP cables, fiber optic cables do not carry electrical currents, making them immune to EMI. This is because EMI is caused by electromagnetic radiation interfering with the electrical signals in the cable, which does not occur in fiber optic cables. Therefore, fiber optic cables provide a more reliable and secure means of data transmission, especially in environments with high levels of EMI.

Submit
29. Which of the following would Karen, a technician, do to monitor remote traffic through an access point?

Explanation

Enabling an SNMP agent would allow Karen to monitor remote traffic through an access point. SNMP (Simple Network Management Protocol) is a protocol used for network management and monitoring. By enabling an SNMP agent on the access point, Karen would be able to collect and monitor data about the traffic passing through it, such as bandwidth usage, network errors, and device status. This would provide her with valuable information for troubleshooting, optimizing network performance, and ensuring the security of the network.

Submit
30. Which of the following is an example of a DHCP failover mechanism?

Explanation

APIPA (Automatic Private IP Addressing) is a mechanism used in DHCP (Dynamic Host Configuration Protocol) to assign IP addresses to devices when a DHCP server is not available. It allows devices to self-assign an IP address within a specific range, ensuring they can still communicate with other devices on the network. This is a failover mechanism because it provides a temporary solution in the absence of a DHCP server, preventing network connectivity issues. In contrast, inactive lease, active lease, and reservations are not examples of DHCP failover mechanisms.

Submit
31. Which of the following security threats relies primarily on user deception and misinformation?

Explanation

Phishing is a security threat that relies primarily on user deception and misinformation. It involves tricking individuals into revealing sensitive information, such as passwords or credit card details, by posing as a trustworthy entity through fraudulent emails, websites, or messages. The attacker deceives the user into thinking they are interacting with a legitimate source, leading them to disclose confidential information unknowingly. This form of social engineering exploits human vulnerabilities to gain unauthorized access to personal or financial data.

Submit
32. Karen, an administrator, wants to verify which protocols are in use on the network. Which of the following tools should she use?

Explanation

A packet sniffer is a tool used to capture and analyze network traffic. By using a packet sniffer, Karen can monitor the network and identify the protocols that are being used. This tool allows her to inspect the data packets and see the headers, which contain information about the protocols being used. Therefore, a packet sniffer is the most suitable tool for Karen to verify which protocols are in use on the network.

Submit
33. Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfully at its destination?

Explanation

The transport OSI model layer and the transport TCP/IP model layer are responsible for retransmitting a TCP packet if it is not received successfully at its destination. These layers ensure reliable delivery of data by implementing mechanisms such as error detection, error correction, and flow control. If a TCP packet is not acknowledged by the receiving end, these layers will initiate the retransmission process to ensure that the data reaches its intended destination.

Submit
34. Which of the following can Joe, a technician, modify on an 802.11n router that is not available as an option on 802.11 g device?

Explanation

Joe, as a technician, can modify the spectrum on an 802.11n router that is not available as an option on an 802.11g device. The spectrum refers to the range of frequencies used for wireless communication. While both 802.11n and 802.11g routers operate in the 2.4 GHz frequency range, 802.11n routers also have the ability to operate in the less crowded 5 GHz frequency range. This allows Joe to adjust the spectrum on the 802.11n router to utilize the less congested 5 GHz frequency band, which can result in improved performance and reduced interference.

Submit
35. Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server?

Explanation

Kurt, the technician, would use the NTP (Network Time Protocol) to synchronize the local date and time of a client workstation with that of a server. NTP is specifically designed for time synchronization over a network and ensures accurate timekeeping by adjusting the system clock of the client workstation to match the server's clock. RTP (Real-time Transport Protocol) is used for transmitting audio and video over IP networks, TFTP (Trivial File Transfer Protocol) is used for file transfers, and ARP (Address Resolution Protocol) is used for mapping IP addresses to MAC addresses.

Submit
36. The location that the local network connection ends and the ISP responsibility begins is known as the:

Explanation

The demarcation point is the location where the responsibility of the local network connection ends and the responsibility of the ISP begins. It is the point where the network service provider's equipment connects to the customer's equipment. This point marks the boundary between the two networks and is typically located at the customer's premises. It is where any issues or troubleshooting related to the connection are divided between the customer and the ISP.

Submit
37. Which of the following would be an IP address received from APIPA?

Explanation

An IP address received from APIPA (Automatic Private IP Addressing) is in the range of 169.254.0.0 to 169.254.255.255. This range is reserved for devices that are unable to obtain an IP address from a DHCP server. Therefore, the IP address 169.254.0.100 would be received from APIPA.

Submit
38. Sandy, the network administrator, has funding to do a major upgrade of the company's LAN. This upgrade is currently in the planning stage, and Sandy still needs to determine the network requirements, bottlenecks, and any future upgrades in mind. Which of the following is the FIRST step in the planning process?

Explanation

The first step in the planning process for the major upgrade of the company's LAN is to establish a network baseline. This involves gathering information about the current state of the network, including its performance, capacity, and any existing issues or limitations. By establishing a baseline, Sandy can identify the starting point for the upgrade and determine what needs to be improved or changed. This will provide a solid foundation for the rest of the planning process, including determining network requirements, identifying bottlenecks, and planning for future upgrades.

Submit
39. Joe, a network technician, is tasked with installing a router and firewall to get an office working with Internet access. Which of the following features MUST be configured to allow sharing of a single public IP address?

Explanation

Port Address Translation (PAT) must be configured to allow sharing of a single public IP address. PAT is a feature of a router or firewall that allows multiple devices on a private network to share a single public IP address. It accomplishes this by mapping different port numbers to each device's private IP address. This allows multiple devices to access the internet using the same public IP address.

Submit
40. Sandy, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO).

Explanation

To allow all websites to be accessible, Sandy needs to enable ports 80 and 443 on the firewall. Port 80 is the default port for HTTP (Hypertext Transfer Protocol), which is used for accessing websites. Port 443 is the default port for HTTPS (Hypertext Transfer Protocol Secure), which is used for secure communication over the internet, such as accessing websites with SSL/TLS encryption. By enabling these ports, Sandy ensures that the sales team can access websites using both HTTP and HTTPS protocols.

Submit
41. Which of the following technologies would adhere to the AAA model while facilitating ease of login changes for multiple routers and switches?

Explanation

TACACS+ is the correct answer because it adheres to the AAA (Authentication, Authorization, and Accounting) model while facilitating ease of login changes for multiple routers and switches. TACACS+ is a network security protocol that provides centralized authentication, authorization, and accounting services for network devices. It allows for secure and efficient login management across multiple devices, making it easier to manage login changes for routers and switches.

Submit
42. VoIP is being implemented throughout a company and Joe, the network technician, needs to ensure that data and voice traffic do not interfere with each other. Which of the following features should be configured on a layer 3 switch to prioritize traffic for VoIP?

Explanation

QoS stands for Quality of Service and is a feature that can be configured on a layer 3 switch to prioritize traffic for VoIP. It allows for the prioritization of certain types of traffic, such as voice traffic, over other types of traffic, such as data traffic. By implementing QoS, Joe can ensure that the voice traffic for the VoIP system is given priority and does not interfere with data traffic on the network.

Submit
43. Joe, a user, is unable to reach websites, but is able to ping several Internet IPv4 addresses. Which of the following is the MOST likely problem?

Explanation

The most likely problem in this scenario is an incorrect DNS configuration. DNS (Domain Name System) is responsible for translating domain names into IP addresses. If Joe is unable to reach websites but can successfully ping IP addresses, it suggests that his network connectivity is functioning properly. However, the fact that he cannot access websites indicates a problem with the DNS settings, as the translation from domain names to IP addresses is not occurring correctly.

Submit
44. Joe, a network administrator, would like to ensure that the footprint of the company's wireless coverage is limited to the office borders, located on the premises. Which of the following features should he adjust on all of the company's WAPs to make this change?

Explanation

To limit the footprint of the company's wireless coverage to the office borders, Joe should adjust the transmission power on all of the company's WAPs. By reducing the transmission power, the signal strength will be decreased, resulting in a smaller coverage area. This will ensure that the wireless network is only accessible within the office premises and not beyond its borders.

Submit
45. Which of the following is the MOST economical way for Sandy, a technician, to implement 10- Gigabit Ethernet at a datacenter?

Explanation

10GBaseT is the most economical way for Sandy to implement 10-Gigabit Ethernet at a datacenter. This is because 10GBaseT uses twisted pair copper cables, which are generally less expensive than other types of cables used in the other options. Additionally, 10GBaseT is compatible with existing infrastructure, making it a cost-effective choice for implementation.

Submit
46. T568B wiring scheme is typically found on which of the following components?

Explanation

The T568B wiring scheme is typically found on patch panels. Patch panels are used in networking to connect and organize multiple network cables. The T568B wiring scheme is one of the two commonly used standards for wiring Ethernet cables, and it specifies the order in which the individual wires should be connected to the RJ45 connectors. Therefore, patch panels, which serve as a central point for connecting and managing network cables, would typically follow the T568B wiring scheme.

Submit
47. Kurt, a customer, has been using a combination of SSID disable and WEP encryption for wireless security. Lately there have been many unauthorized devices on Kurt's wireless network. Which of the following should also be implemented to prevent unauthorized devices from connecting? (Select TWO).

Explanation

SSID disable and WEP encryption are not sufficient to prevent unauthorized devices from connecting to Kurt's wireless network. WEP encryption is known to be weak and easily cracked, so it should be replaced with WPA encryption which provides stronger security. Additionally, enabling and configuring MAC filtering will allow only specific devices with approved MAC addresses to connect to the network, further enhancing security.

Submit
48. Joe, a technician, is setting up an IDS security device. Which of the following should be configured on the switch to utilize the IDS?

Explanation

Port mirroring should be configured on the switch to utilize the IDS. Port mirroring is a feature that allows the switch to copy the traffic from one or more ports and send it to another designated port, where the IDS can analyze the network traffic for any suspicious or malicious activity. By configuring port mirroring, the IDS can effectively monitor the network traffic without disrupting the normal flow of data.

Submit
49. CAT6 Ethernet cabling has a rated maximum transmission capability of:

Explanation

CAT6 Ethernet cabling has a rated maximum transmission capability of 10,000Mbps. This means that it can support data transfer speeds of up to 10 gigabits per second. CAT6 cabling is designed to provide faster and more reliable network connections compared to previous generations of Ethernet cabling. It is commonly used in high-speed networks and is capable of handling large amounts of data, making it suitable for applications that require high bandwidth, such as video streaming, online gaming, and data centers.

Submit
50. Sandy, an administrator, needs to install a wireless network that will allow legacy devices to connect to the network and also offer both 5GHz and 2.4GHz frequencies. Which of the following would BEST describe the type of WAP needed?

Explanation

The type of WAP needed would be 802.11n because it is capable of supporting both 5GHz and 2.4GHz frequencies, as well as being backward compatible with legacy devices.

Submit
51. Kurt, an administrator, configures a device that functions at the network layer, and also has 24 collision domains. Which of the following terms BEST describes this device?

Explanation

A multilayer switch is the best term to describe the device configured by Kurt. A multilayer switch operates at the network layer, allowing it to route traffic between different networks. Additionally, it has 24 collision domains, which indicates that it is capable of segmenting network traffic and reducing the chances of collisions occurring on the network.

Submit
52. Karen, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?

Explanation

The correct answer is change management. Change management involves documenting and tracking any changes made to a system or network. In this scenario, the cabling does not match the documentation from 2007, indicating that changes have been made without proper documentation or tracking. By implementing change management practices, such as documenting and approving any changes made to the network, this discrepancy could have been avoided.

Submit
53. Which of the following connector types would Sandy, a network technician, use to connect a serial cable?

Explanation

Sandy, the network technician, would use a DB-9 connector type to connect a serial cable. DB-9 connectors are commonly used for serial communication and have nine pins. They are often used to connect devices such as modems, printers, and serial ports on computers. RJ-11 connectors are used for telephone cables, BNC connectors are used for coaxial cables, and LC connectors are used for fiber optic cables.

Submit
54. Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO)

Explanation

The two duplicate pieces of equipment can be used in conjunction for high availability and fault tolerance purposes. High availability ensures that the system is always accessible and operational, even if one piece of equipment fails. Fault tolerance, on the other hand, ensures that the system can continue to function without interruption even if there is a hardware or software failure. By using duplicate equipment, any failures can be quickly and seamlessly handled, minimizing downtime and ensuring continuous operation.

Submit
55. Joe, a user, reports that his PC is the only one that does not have network connectivity. All the wiring has been tested property and the problem still exists. Joe is getting an APIPA address.Which of the following is the MOST likely cause?

Explanation

The most likely cause for Joe's PC to not have network connectivity and receive an APIPA address is that the port on the switch is disabled. This means that the switch is not allowing any network traffic to pass through the port that Joe's PC is connected to, resulting in the lack of connectivity.

Submit
56. Joe, a technician, is configuring ports on a switch. He turns off auto-negotiation and sets the port speed to 1000 Mbps. A user's PC is no longer able to access the network. Which of the following is MOST likely the problem?

Explanation

The most likely problem is that the user's NIC (Network Interface Card) does not support a speed of 1Gbps (Gigabits per second). Since Joe configured the port speed to 1000Mbps, the user's NIC is not able to communicate at that speed and therefore cannot access the network.

Submit
57. Kurt, a network administrator, is responding to a support ticket. The ticket does not have enough information to determine the problem. Which of the following should Kurt perform FIRST before responding to the ticket?

Explanation

Before responding to the support ticket, Kurt should first determine if anything has changed. This is important because any recent changes in the network or system could potentially be the cause of the problem. By checking for any recent changes, Kurt can narrow down the possible causes and focus on troubleshooting those specific areas. Once he has identified any changes, he can then proceed to test a theory to determine the cause or establish a plan of action to resolve the problem. If necessary, he can also escalate the problem to higher-level support.

Submit
58. Joe, an end user, has plugged in both ends of the same network cable to two adjacent jacks. Both ports are connected to the same switch in the IDF. Which of the following will MOST likely happen?

Explanation

When Joe plugs in both ends of the same network cable to two adjacent jacks that are connected to the same switch, it creates a loop in the network. This can lead to a broadcast storm, where broadcast packets continuously circulate in the network, causing excessive network traffic and degrading network performance. Therefore, the most likely outcome in this scenario is a broadcast storm.

Submit
59. Which of the following uses eight groups of characters for addressing?

Explanation

IPv6 uses eight groups of characters for addressing. Each group consists of four hexadecimal digits separated by colons. This addressing scheme allows for a significantly larger number of unique addresses compared to IPv4, which uses four groups of characters. DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to assign IP addresses dynamically, while MAC (Media Access Control) refers to the unique identifier assigned to network interfaces.

Submit
60. Sandy, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?

Explanation

The correct answer is 802.11n. Sandy is reporting wireless transmission speeds of 300Mbps, which is a characteristic of the 802.11n wireless standard. 802.11a, 802.11b, and 802.11g have lower maximum speeds and cannot achieve 300Mbps.

Submit
61. For which of the following reasons could a single server's NIC transmit packets from multiple MAC address sources?

Explanation

A single server's NIC can transmit packets from multiple MAC address sources if the server contains several virtual machines and the MAC addresses are from the virtual machines. Each virtual machine has its own MAC address, and the server's NIC can handle the transmission of packets from all the virtual machines simultaneously. This allows for efficient network communication between the server and the virtual machines.

Submit
62. Sandy, an administrator, believes that the network has been attacked and MAC addresses have been captured allowing unauthorized computers to access the network. Which of the following tools did the attackers MOST likely use to accomplish this?

Explanation

The attackers most likely used a packet sniffer to capture MAC addresses and gain unauthorized access to the network. A packet sniffer is a tool that intercepts and analyzes network traffic, allowing the attacker to capture and view the contents of packets, including MAC addresses. This would enable them to identify and target specific devices on the network for unauthorized access. Intrusion prevention software, intrusion detection software, and port scanners are not specifically designed for capturing MAC addresses, making them less likely tools for this scenario.

Submit
63. Which of the following network devices MOST likely functions as a network repeater or a bridge?

Explanation

An access point is a network device that functions as a bridge or a repeater. It is used to connect wireless devices to a wired network, extending the network's coverage area. As a bridge, it connects two different networks, allowing communication between them. As a repeater, it amplifies and retransmits the wireless signal, increasing its range. Therefore, an access point is the most likely network device to function as a repeater or a bridge.

Submit
64. Which of the following wireless standards operates on the same frequency as 802.11a?

Explanation

802.11n operates on the same frequency as 802.11a. This means that devices using 802.11n can communicate with devices using 802.11a on the same frequency band.

Submit
65. Joe, a customer, shares a building with several other tenants. He reports that an unencrypted wireless network has been getting slower while his Internet traffic has steadily been increasing. Which of the following should be configured to resolve this problem?

Explanation

To resolve the problem of the unencrypted wireless network getting slower while Joe's Internet traffic has been increasing, WPA (Wi-Fi Protected Access) should be configured. WPA is a security protocol that provides encryption and authentication for wireless networks. By configuring WPA, the network will be protected from unauthorized access and ensure that Joe's Internet traffic is secure, which can help improve the network's performance.

Submit
66. Which of the following allows for multiple backend web servers to be accessed through a single public IP address?

Explanation

Port address translation (PAT) allows for multiple backend web servers to be accessed through a single public IP address. PAT is a technique used in network address translation (NAT) where multiple private IP addresses are mapped to a single public IP address by using different port numbers. This allows for efficient use of IP addresses and enables multiple devices to share a single public IP address.

Submit
67. Which of the following utilities would Karen, a technician, use to resolve the FQDN of a web server to its IP address?

Explanation

To resolve the FQDN (Fully Qualified Domain Name) of a web server to its IP address, Karen would use the utility called nslookup. Nslookup is a command-line tool used to query DNS (Domain Name System) servers to retrieve information about domain names, including their corresponding IP addresses. By entering the FQDN of the web server into nslookup, Karen can obtain the IP address associated with that domain name, which can be useful for troubleshooting network connectivity or configuring network settings.

Submit
68. Which of the following can Joe, a network technician, change to help limit war driving?

Explanation

Joe, as a network technician, can change the signal strength to help limit war driving. By reducing the signal strength, the wireless network's range is decreased, making it more difficult for unauthorized users to detect and access the network from a distance. This can help prevent war driving, which is the act of searching for and exploiting vulnerable wireless networks.

Submit
69. A company has only three laptops that connect to their wireless network. The company is currently using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO).

Explanation

Changing the encryption method to WPA would provide stronger security for the wireless network compared to WEP. WPA offers more advanced encryption algorithms and is less vulnerable to attacks. Enabling and configuring MAC filtering would also enhance security by allowing only authorized devices with specific MAC addresses to connect to the network, effectively blocking unauthorized connections. Limiting the DHCP scope to only have three addresses and enabling the SSID broadcast are not effective security measures in preventing unauthorized connections. Changing the broadcast channel to a less commonly used channel may help reduce interference, but it does not directly address the issue of unauthorized connections.

Submit
70. Which of the following defines the range of IP addresses a DHCP server can assign?

Explanation

A scope is a range of IP addresses that a DHCP server can assign to devices on a network. It defines the available pool of IP addresses that can be dynamically assigned to clients. The DHCP server manages and allocates IP addresses from this scope to devices that request network configuration information.

Submit
71. Which of the following OSI model layers is used for logical addressing?

Explanation

The Network layer of the OSI model is responsible for logical addressing. This layer is responsible for routing and forwarding data packets between different networks. It assigns logical addresses to devices, such as IP addresses, which are used for identifying the source and destination of data packets. The Network layer also determines the best path for data transmission and ensures that packets are delivered to the correct destination.

Submit
72. Which of the following cable types would have the LEAST amount of EMI?

Explanation

STP stands for Shielded Twisted Pair, which means that the cable has an additional layer of shielding to protect against electromagnetic interference (EMI). CAT6 refers to the category of the cable, indicating its performance capabilities. Therefore, STPCAT6 would have the least amount of EMI because it combines the benefits of both shielding and higher performance category.

Submit
73. Sandy, a network administrator, wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity?

Explanation

A signature-based intrusion prevention system (IPS) would allow Sandy to block all already known malicious activity. This type of IPS uses a database of known attack signatures to identify and block malicious traffic. By comparing network traffic against these signatures, the IPS can detect and prevent known attacks from occurring. This is an effective method for blocking already known malicious activity on a network.

Submit
74. Once Kurt, a technician, has implemented the solution to a user's reported problem, which of the following should Kurt do NEXT?

Explanation

After implementing the solution to the user's reported problem, Kurt should verify the full system functionality. This step is important to ensure that the problem has been completely resolved and that the system is working properly. By verifying the system functionality, Kurt can confirm that the solution has been successful and that the user will not encounter any further issues. It is a crucial step in the troubleshooting process to ensure the effectiveness of the implemented solution.

Submit
75. Which of the following issues is a common problem in wireless infrastructures?

Explanation

Mismatched SSIDs is a common problem in wireless infrastructures. SSID stands for Service Set Identifier, which is the name of a wireless network. When devices try to connect to a wireless network, they need to have the correct SSID. If the SSID on the device does not match the SSID of the network, the device will not be able to connect. This can cause connectivity issues and prevent users from accessing the network. Therefore, ensuring that the SSID is correctly configured on all devices is crucial for a smooth wireless infrastructure.

Submit
76. A new business' web server has seen a huge spike of legitimate traffic in the last week. The owners want to ensure the site has no problems as the business continues to grow. For Karen, a network administrator, which of the following is the MOST important concern for this company?

Explanation

High availability is the most important concern for the company because it ensures that the website remains accessible and operational even during high traffic periods. With the spike in legitimate traffic, it is crucial for the business to have a web server that can handle the increased load and not experience any downtime or performance issues. High availability ensures that the website remains reliable and can meet the demands of the growing business.

Submit
77. Kurt, a network technician, is setting up a router and wants to ensure the fastest convergence of the routing information. Which of the following protocols would be BEST for him to use?

Explanation

OSPF (Open Shortest Path First) would be the best protocol for Kurt to use in order to ensure the fastest convergence of routing information. OSPF is a link-state routing protocol that calculates the shortest path between routers based on a cost metric. It is designed to quickly adapt to changes in the network topology and converge the routing information. This allows for efficient and rapid routing updates, making OSPF the ideal choice for ensuring fast convergence.

Submit
78. Which of the following is an example of two-factor authentication?

Explanation

A username, password, and key fob number is an example of two-factor authentication because it requires the user to provide two different types of credentials to verify their identity. The username and password serve as the first factor, while the key fob number acts as the second factor. This combination adds an extra layer of security compared to using just a username and password, as it requires the user to possess a physical token (the key fob) in addition to knowing the login credentials.

Submit
79. Users are unable to access the company's intranet website. Which of the following attacks has the network MOST likely experienced?

Explanation

The network is most likely experiencing a DoS (Denial of Service) attack. A DoS attack occurs when an attacker overwhelms a network or website with a flood of illegitimate requests, causing it to become unavailable to legitimate users. In this case, the users are unable to access the company's intranet website, indicating that the network is being flooded with malicious traffic, resulting in a denial of service to legitimate users.

Submit
80. Which of the following sizes is the fixed cell length in ATM?

Explanation

The correct answer is 53 bytes. In Asynchronous Transfer Mode (ATM), the fixed cell length is 53 bytes. This fixed length allows for efficient and predictable transmission of data, as it ensures that each cell is the same size and can be processed quickly by network devices. The 53-byte cell includes a 5-byte header and a 48-byte payload, which carries the actual user data.

Submit
81. Which of the following network scanners detects and sends out alerts for malicious network activity?

Explanation

IDS stands for Intrusion Detection System. It is a network security tool that monitors network traffic for suspicious activity or potential security breaches. IDS detects and sends out alerts for malicious network activity, such as unauthorized access attempts, malware infections, or unusual network behavior. It analyzes network packets and compares them against a database of known attack signatures or abnormal patterns to identify potential threats. IDS helps in identifying and responding to security incidents in real-time, allowing network administrators to take necessary actions to protect the network and its resources.

Submit
82. The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?

Explanation

The correct answer is MDF, which stands for Main Distribution Frame. An MDF is a centralized point in a network where all the connections from the ISP terminate. It is typically located in the network server room where the company LAN equipment is also located. The MDF serves as a distribution point for connecting the WAN connection to the LAN equipment, allowing for efficient and organized connectivity.

Submit
83. Which of the following tools would Kurt, an administrator, use to identify opens and shorts?

Explanation

A cable tester is used to identify opens and shorts in cables. It is a tool specifically designed for testing the integrity and continuity of cables. By connecting the cable to the tester, Kurt can easily detect any breaks or short circuits in the cable. This helps in troubleshooting and identifying issues with the cable connections, ensuring proper functioning of the network or system. An ohmmeter measures resistance, a protocol analyzer analyzes network traffic, and a multimeter measures various electrical properties, but none of these tools are specifically designed for identifying opens and shorts in cables like a cable tester.

Submit
84. DNS lookups for a given host are intermittently failing. Which of the following would Karen, a technician, MOST likely use to verify this problem?

Explanation

Karen, a technician, would most likely use "dig" to verify the intermittent DNS lookup failures for a given host. "Dig" is a command-line tool used for querying DNS servers to retrieve information about DNS records. By using "dig," Karen can check the DNS resolution process and identify any issues or inconsistencies that may be causing the intermittent failures.

Submit
85. Karen, a network technician, needs to identify the MAC address of a device that is creating broadcast storms on the network. Which of the following tools will provide the needed information?

Explanation

A network sniffer is a tool that captures and analyzes network traffic, including MAC addresses. By using a network sniffer, Karen can monitor the network and identify the MAC address of the device that is causing the broadcast storms. This tool will provide the needed information to pinpoint the problematic device and take appropriate actions to resolve the issue.

Submit
86. Karen, a technician, needs to test if domain name resolution is functioning properly. Which of the following software tools would she use to accomplish this? (Select TWO).

Explanation

Karen, as a technician, would use the software tools dig and nslookup to test if domain name resolution is functioning properly. Dig is a command-line tool used for querying DNS servers to retrieve information about DNS records, while nslookup is a network administration tool used to query DNS to obtain domain name or IP address mapping information. By using these tools, Karen can check if the domain name resolution is working correctly by querying the DNS servers and retrieving the necessary information.

Submit
87. A small office has asked to have six PCs networked together by Joe. a consultant. Ttie office users want file sharing capability with no access to the Internet. Which of the following items will Joe need? (Select TWO).

Explanation

Joe will need CAT5e patch cabling to connect the PCs together in the network. CAT5e cables are commonly used for Ethernet networks and provide high-speed data transmission. Additionally, Joe will need a switch to connect the PCs to the network. A switch is a networking device that allows multiple devices to connect and communicate with each other within a local network. Together, the CAT5e patch cabling and switch will enable the file sharing capability among the PCs in the office network.

Submit
88. Which of the following VPN methods is BEST used for connecting a remote office to the main company office?

Explanation

Site-to-site VPN is the best method for connecting a remote office to the main company office. This type of VPN establishes a secure connection between the networks of two or more physical locations, allowing the remote office to access resources and services in the main office as if they were directly connected. It provides a seamless and secure connection, ensuring data confidentiality and integrity between the two locations.

Submit
89. Kurt, an administrator, wants to eliminate remote access to a network from all users, except those users in Kurt's own country. Which of the following security measures could he use to set up this functionality?

Explanation

Kurt can use IP filtering to eliminate remote access to the network from all users, except those in his own country. IP filtering allows the administrator to specify which IP addresses or ranges are allowed or denied access to the network. By configuring the IP filter to only allow access from IP addresses within his country, Kurt can restrict remote access to only those users located in his country. This helps to enhance the security of the network by limiting access to trusted sources.

Submit
90. Kurt, a technician, spoke to a user regarding a network problem. He searched all the logs associated with the problem and pulled the change logs for the network environment. Which of the following should Kurt perform NEXT?

Explanation

After searching all the logs and pulling the change logs for the network environment, Kurt should establish a theory of probable cause. This means that he should analyze the information gathered from the logs and try to identify the most likely cause of the network problem. By establishing a theory of probable cause, Kurt can then proceed to implement the solution or escalate the issue if necessary. It is important to have a clear understanding of the cause before taking any further action to ensure an effective resolution.

Submit
91. Which of the following services would Karen, a technician, use to create or update a client's DNS 'A' and 'PTR' records automatically?

Explanation

Karen, as a technician, would use DHCP (Dynamic Host Configuration Protocol) to create or update a client's DNS 'A' and 'PTR' records automatically. DHCP is a network protocol that allows devices to obtain IP addresses and other network configuration settings automatically. It can also be configured to update DNS records, including 'A' and 'PTR' records, which associate IP addresses with domain names and vice versa. This automation simplifies the process of managing DNS records for clients, saving time and effort for the technician.

Submit
92. Which of the following provides Kurt, a network technician, resource record information about network nodes such as canonical names?

Explanation

DNS (Domain Name System) provides Kurt, a network technician, resource record information about network nodes such as canonical names. DNS is responsible for translating domain names into IP addresses and vice versa. It maintains a database of resource records that contain information about various network nodes, including their canonical names. This information is crucial for network technicians like Kurt to efficiently manage and troubleshoot network resources.

Submit
93. Which of the following services do TCP connections provide to application layer protocols? (Select TWO).

Explanation

TCP connections provide two services to application layer protocols:
1. Large data size manageability using segmentation: TCP breaks down large data into smaller segments and reassembles them at the receiving end, allowing efficient transmission of large amounts of data.
2. Delivery through error recovery: TCP ensures reliable delivery of data by using acknowledgments, retransmissions, and error detection mechanisms. It guarantees that all data sent by the sender will be received correctly and in the correct order by the receiver.

Submit
94. Which of the following exterior routing protocols uses an algorithm to determine the quickest route to a destination?

Explanation

BGP (Border Gateway Protocol) is the correct answer because it uses an algorithm to determine the quickest route to a destination. Unlike RIP and RIPv2 which use distance-vector algorithms, BGP uses a path-vector algorithm that takes into account multiple factors such as network policies, path attributes, and AS (Autonomous System) path information to determine the best route. OSPF (Open Shortest Path First) is an interior routing protocol and does not consider the quickest route to a destination outside of the local network.

Submit
95. After installing new cabling, Karen, a technician, notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem?

Explanation

A cable certifier is the best tool to determine if the new cabling is causing the slow connection to network resources. A cable certifier tests the quality and performance of the cabling by measuring parameters such as signal strength, noise, and crosstalk. It can identify any issues or faults in the cabling that may be causing the slow connection. By using a cable certifier, Karen can verify if the new cabling meets the required standards and troubleshoot any potential problems.

Submit
96. Sandy, a technician, is asked to install a wireless router in a company's public cafe area. The company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this?

Explanation

Block traffic from the wireless access point would be the best firewall rule to accomplish the company's objective. By blocking traffic from the wireless access point, the public will not be able to connect to the private internal network, ensuring the security of the internal network.

Submit
97. Which of the following could Karen, a network technician, use to inspect connection setup, request, and response headers for users connecting to a web server?

Explanation

A protocol analyzer is a tool that allows network technicians like Karen to inspect connection setup, request, and response headers for users connecting to a web server. It captures and analyzes network traffic, providing detailed information about the protocols, packets, and headers being used. This allows Karen to troubleshoot network issues, monitor network performance, and ensure that the web server is functioning correctly. The other options listed (nbtstat command, dig command, and ipconfig command) are not specifically designed for inspecting connection setup and headers in the same way that a protocol analyzer is.

Submit
98. Kurt, a network administrator, wants to separate the network into broadcast domains. Which of the following can he use? (Select TWO).

Explanation

Kurt, as a network administrator, can use routers and VLANs to separate the network into broadcast domains. Routers are devices that connect different networks and can separate broadcast domains by limiting the broadcast traffic to each network. VLANs, on the other hand, are virtual LANs that allow for the segmentation of a physical network into multiple logical networks, each with its own broadcast domain. By using VLANs, Kurt can create separate broadcast domains within the same physical network infrastructure.

Submit
99. Which of the following should Joe, a technician, do FIRST when setting up a SOHO network?

Explanation

When setting up a SOHO (Small Office/Home Office) network, the first step for Joe, the technician, should be to choose the correct operating system version. This is because the operating system is the foundation of the network and will determine the compatibility and functionality of the network components. Once the operating system is chosen, Joe can then proceed with other steps such as setting up an account with an Internet service provider, creating a list of requirements and constraints, and arranging a domain name with a suitable registrar.

Submit
100. Kurt, an administrator, receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?

Explanation

The correct answer is 5GHz. Both the 802.11g wireless connectivity and the new wireless phone system are operating at the 5GHz frequency, causing interference and connectivity issues.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 04, 2012
    Quiz Created by
    SGogola
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following network appliances would facilitate an even...
Sandy, the network technician, needs to run a cable through a power...
Sandy, a technician, is fixing a wireless network that was receiving...
Which of the following ports should be allowed through a firewall to...
A packet sniffer is MOST likely used to do which of the following?
In which of the following wireless standards is MIMO used?
Joe, the network technician, is configuring the channels being used...
Which of the following would Joe, a technician, configure to modify...
Which of the following ports carries IMAP traffic, by default, on...
Which of the following technologies would Sandy, a technician, use to...
Which of the following network access methods is the MOST secure?
Which of the following is the third layer of the OSI model?
Which of the following network topologies, when a single machine's...
Which of the following is a form of encrypting packets for safe,...
Karen, a network technician, wants to use a packet analyzer to...
Joe, a network technician, blocks access to ports 25,110, and 143 on...
A firewall that operates at Layer 7 of the OSI model is known as a(n):
Sandy, a technician, wants to limit access to a wireless network to...
Joe, a client, has observed non-employees sitting in his parking lot...
Kurt, a technician, wants to prevent users from visiting social...
Sandy, a technician, installs a new WAP and users are able to connect;...
A switch in IDF 3 has shut down at 3 p.m. every day this week. Which...
Which of the following has a DB-9 connector?
Sandy, an administrator, has been tasked with running cables from one...
Sandy, a technician, is asked to not allow FTP traffic on a network....
Which of the following could Karen, a network technician, use to find...
Karen, an administrator, has created a patch cable. Which of the...
Which of the following cable mediums is NOT susceptible to EMI?
Which of the following would Karen, a technician, do to monitor remote...
Which of the following is an example of a DHCP failover mechanism?
Which of the following security threats relies primarily on user...
Karen, an administrator, wants to verify which protocols are in use on...
Which of the following TCP/IP and OSI model layers retransmits a TCP...
Which of the following can Joe, a technician, modify on an 802.11n...
Which of the following protocols would Kurt, a technician, use to...
The location that the local network connection ends and the ISP...
Which of the following would be an IP address received from APIPA?
Sandy, the network administrator, has funding to do a major upgrade of...
Joe, a network technician, is tasked with installing a router and...
Sandy, a network administrator, needs to allow all websites to be...
Which of the following technologies would adhere to the AAA model...
VoIP is being implemented throughout a company and Joe, the network...
Joe, a user, is unable to reach websites, but is able to ping several...
Joe, a network administrator, would like to ensure that the footprint...
Which of the following is the MOST economical way for Sandy, a...
T568B wiring scheme is typically found on which of the following...
Kurt, a customer, has been using a combination of SSID disable and WEP...
Joe, a technician, is setting up an IDS security device. Which of the...
CAT6 Ethernet cabling has a rated maximum transmission capability of:
Sandy, an administrator, needs to install a wireless network that will...
Kurt, an administrator, configures a device that functions at the...
Karen, a network technician, is troubleshooting in a wiring closet in...
Which of the following connector types would Sandy, a network...
Two duplicate pieces of equipment can be used in conjunction for which...
Joe, a user, reports that his PC is the only one that does not have...
Joe, a technician, is configuring ports on a switch. He turns off...
Kurt, a network administrator, is responding to a support ticket. The...
Joe, an end user, has plugged in both ends of the same network cable...
Which of the following uses eight groups of characters for addressing?
Sandy, a technician, is reporting wireless transmission speeds of...
For which of the following reasons could a single server's NIC...
Sandy, an administrator, believes that the network has been attacked...
Which of the following network devices MOST likely functions as a...
Which of the following wireless standards operates on the same...
Joe, a customer, shares a building with several other tenants. He...
Which of the following allows for multiple backend web servers to be...
Which of the following utilities would Karen, a technician, use to...
Which of the following can Joe, a network technician, change to help...
A company has only three laptops that connect to their wireless...
Which of the following defines the range of IP addresses a DHCP server...
Which of the following OSI model layers is used for logical...
Which of the following cable types would have the LEAST amount of EMI?
Sandy, a network administrator, wants to be able to block all already...
Once Kurt, a technician, has implemented the solution to a user's...
Which of the following issues is a common problem in wireless...
A new business' web server has seen a huge spike of legitimate...
Kurt, a network technician, is setting up a router and wants to ensure...
Which of the following is an example of two-factor authentication?
Users are unable to access the company's intranet website. Which of...
Which of the following sizes is the fixed cell length in ATM?
Which of the following network scanners detects and sends out alerts...
The ISP needs to terminate the WAN connection. The connection should...
Which of the following tools would Kurt, an administrator, use to...
DNS lookups for a given host are intermittently failing. Which of the...
Karen, a network technician, needs to identify the MAC address of a...
Karen, a technician, needs to test if domain name resolution is...
A small office has asked to have six PCs networked together by Joe. a...
Which of the following VPN methods is BEST used for connecting a...
Kurt, an administrator, wants to eliminate remote access to a network...
Kurt, a technician, spoke to a user regarding a network problem. He...
Which of the following services would Karen, a technician, use to...
Which of the following provides Kurt, a network technician, resource...
Which of the following services do TCP connections provide to...
Which of the following exterior routing protocols uses an algorithm to...
After installing new cabling, Karen, a technician, notices that...
Sandy, a technician, is asked to install a wireless router in a...
Which of the following could Karen, a network technician, use to...
Kurt, a network administrator, wants to separate the network into...
Which of the following should Joe, a technician, do FIRST when setting...
Kurt, an administrator, receives reports from users in an office that...
Alert!

Advertisement