Networking 005 Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By SGogola
S
SGogola
Community Contributor
Quizzes Created: 3 | Total Attempts: 578
| Attempts: 360
SettingsSettings
Please wait...
  • 1/100 Questions

    Which of the following network appliances would facilitate an even amount of traffic hitting each web server?

    • Load balancer
    • VPN concentrator
    • Proxy server
    • Content filte
Please wait...
Network Security Quizzes & Trivia
About This Quiz

Within a network, the security of the space within which the allowed computers are operating has to be secure to ensure that no unauthorized access is allowed. Networking 005 quizzes has more. All the best.


Quiz Preview

  • 2. 

    Sandy, the network technician, needs to run a cable through a power distribution room that contains a high voltage transformer. Which of the following would be used to minimize EMI interference?

    • FTP

    • STP

    • UTP

    • RTP

    Correct Answer
    A. STP
    Explanation
    STP stands for Shielded Twisted Pair. It is a type of cable that has a layer of shielding around the twisted pairs of wires. This shielding helps to minimize electromagnetic interference (EMI) that can be caused by nearby high voltage transformers or other sources of electrical noise. By using STP, Sandy can ensure that the cable running through the power distribution room will be protected from EMI interference, resulting in a more reliable network connection.

    Rate this question:

  • 3. 

    Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?

    • 20

    • 53

    • 80

    • 3389

    Correct Answer
    A. 53
    Explanation
    Port 53 should be allowed through the firewall to allow DNS resolution to occur to an outside DNS server. DNS (Domain Name System) uses port 53 for communication between DNS clients and servers. By allowing port 53 through the firewall, DNS requests and responses can be transmitted between the internal network and the external DNS server, enabling the resolution of domain names to their corresponding IP addresses.

    Rate this question:

  • 4. 

    Sandy, a technician, is fixing a wireless network that was receiving interference from a user’s cordless phone. Which of the following should Sandy configure?

    • Channel

    • Encryption

    • SSID

    • DHCP scope

    Correct Answer
    A. Channel
    Explanation
    Sandy should configure the channel of the wireless network. By changing the channel, Sandy can avoid interference from the user's cordless phone and ensure a stable and reliable wireless connection.

    Rate this question:

  • 5. 

    A packet sniffer is MOST likely used to do which of the following?

    • Prevent network based attacks

    • Capture and analyze network traffic

    • Route IP packets to remote destinations

    • Record the switch ARP table

    Correct Answer
    A. Capture and analyze network traffic
    Explanation
    A packet sniffer is a tool used to capture and analyze network traffic. It allows users to monitor and inspect the data packets that are being transmitted over a network. This can be useful for various purposes such as troubleshooting network issues, monitoring network performance, and detecting any unauthorized or suspicious activities on the network. It does not prevent network-based attacks, route IP packets, or record the switch ARP table.

    Rate this question:

  • 6. 

    In which of the following wireless standards is MIMO used?

    • 802.11a

    • 802.11b

    • 802.11g

    • 802.11n

    Correct Answer
    A. 802.11n
    Explanation
    MIMO, which stands for Multiple-Input Multiple-Output, is a wireless technology that uses multiple antennas to improve the performance of wireless communication. It allows for the transmission of multiple data streams simultaneously, increasing the data throughput and improving the overall reliability and range of the wireless network. Among the given options, 802.11n is the wireless standard that utilizes MIMO technology. 802.11a, 802.11b, and 802.11g are older wireless standards that do not incorporate MIMO.

    Rate this question:

  • 7. 

    Which of the following would Joe, a technician, configure to modify the time a device will hold an IP address provided through DHCP?

    • DNS suffixes

    • Leases

    • Static IP addressing

    • Reservations

    Correct Answer
    A. Leases
    Explanation
    Joe, as a technician, would configure the leases to modify the time a device will hold an IP address provided through DHCP. Leases determine the duration for which an IP address is assigned to a device. By modifying the lease time, Joe can control how long a device can retain the assigned IP address before it needs to be renewed. This allows for better management of IP address allocation and ensures that addresses are not held indefinitely by inactive devices.

    Rate this question:

  • 8. 

    Which of the following ports carries IMAP traffic, by default, on modern email systems?

    • 23

    • 25

    • 80

    • 143

    Correct Answer
    A. 143
    Explanation
    Port 143 carries IMAP (Internet Message Access Protocol) traffic by default on modern email systems. IMAP is a protocol used for accessing and managing email messages on a mail server. Port numbers are used to identify specific services or applications running on a computer network. In the case of IMAP, port 143 is the default port used for establishing a connection between an email client and the email server to retrieve and manage emails.

    Rate this question:

  • 9. 

    Joe, the network technician, is configuring the channels being used within the WLAN, to ensure a minimal amount of interference. Which of the following channel setups would be used to avoid overlap?

    • 2, 6, 10

    • 1, 6, 11

    • 1, 7, 10

    • 1, 2, 3

    Correct Answer
    A. 1, 6, 11
    Explanation
    The correct answer is 1, 6, 11. This channel setup is used to avoid overlap because it follows the 5 GHz frequency band plan for Wi-Fi channels. In this plan, there are non-overlapping channels spaced 5 channels apart, starting from channel 36. Channels 1, 6, and 11 are the only channels in the 2.4 GHz frequency band that do not overlap with each other, allowing for minimal interference between neighboring Wi-Fi networks.

    Rate this question:

  • 10. 

    Which of the following network access methods is the MOST secure?

    • PPPoE

    • SIP

    • RSH

    • IPSec

    Correct Answer
    A. IPSec
    Explanation
    IPSec (Internet Protocol Security) is the most secure network access method among the options given. It provides authentication, integrity, and encryption for IP packets, ensuring the confidentiality and integrity of data transmitted over the network. It establishes a secure tunnel between two endpoints, allowing for secure communication and protecting against unauthorized access and data tampering. PPPoE (Point-to-Point Protocol over Ethernet), SIP (Session Initiation Protocol), and RSH (Remote Shell) do not offer the same level of security as IPSec.

    Rate this question:

  • 11. 

    Which of the following technologies would Sandy, a technician, use to connect networks at large distances without the use of physical medium?

    • Satellite

    • ISDN

    • OC3

    • OC12

    Correct Answer
    A. Satellite
    Explanation
    Sandy, the technician, would use satellite technology to connect networks at large distances without the use of a physical medium. Satellites can transmit data over long distances by using radio signals, allowing for communication between networks that are geographically far apart. This technology is commonly used for remote areas or in situations where laying physical cables is impractical or impossible. ISDN, OC3, and OC12 are not suitable for connecting networks without physical mediums.

    Rate this question:

  • 12. 

    Which of the following network topologies, when a single machine's cable breaks, would only affect one network device and not the rest of the network?

    • Bus

    • Peer-to-peer

    • Ring

    • Star

    Correct Answer
    A. Star
    Explanation
    In a star network topology, each network device is connected to a central hub or switch. When a single machine's cable breaks in a star network, it would only affect that particular machine and not the rest of the network. This is because each device has its own dedicated connection to the central hub, so the failure of one machine's cable does not impact the connectivity of other devices in the network.

    Rate this question:

  • 13. 

    Which of the following is a form of encrypting packets for safe, secure data transmission within a network?

    • RAS

    • PPTP

    • IPSec

    • ICA

    Correct Answer
    A. IPSec
    Explanation
    IPSec is a form of encrypting packets for safe, secure data transmission within a network. It provides authentication, integrity, and confidentiality of network packets by encrypting the data and verifying the identity of the communicating parties. IPSec is commonly used in virtual private networks (VPNs) to ensure the security of data transmitted over the internet or other public networks.

    Rate this question:

  • 14. 

    Karen, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identity the workstation's packets Karen wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?

    • DHCP

    • ARP

    • DNS

    • PING

    Correct Answer
    A. ARP
    Explanation
    ARP (Address Resolution Protocol) would provide the needed information. ARP is used to map an IP address to a MAC address on a local network. In this case, Karen wants to identify the workstation's packets using its IP address, so she would use ARP to obtain the corresponding MAC address.

    Rate this question:

  • 15. 

    Which of the following is the third layer of the OSI model?

    • Transport

    • Application

    • Data Link

    • Network

    Correct Answer
    A. Network
    Explanation
    The third layer of the OSI model is the Network layer. This layer is responsible for routing and forwarding data packets across different networks. It ensures that data is delivered from the source to the destination by choosing the best path and managing network congestion. The Network layer also provides logical addressing and translates logical addresses into physical addresses.

    Rate this question:

  • 16. 

    Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but does not want to use an encryption method. Which of the following methods would be BEST to accomplish this?

    • MAC filtering

    • SSL VPN

    • PPPoE

    • WPA Enterprise

    Correct Answer
    A. MAC filtering
    Explanation
    MAC filtering would be the best method to limit access to a wireless network to company owned laptops without using an encryption method. MAC filtering allows the network administrator to create a list of approved MAC addresses (unique identifiers for network devices) and only allows devices with those approved MAC addresses to connect to the network. This way, only company owned laptops with approved MAC addresses would be able to access the wireless network, while other devices would be blocked.

    Rate this question:

  • 17. 

    Joe, a client, has observed non-employees sitting in his parking lot and surfing on his unsecured wireless connection. Which of the following could be employed to potentially prevent this? (Select TWO).

    • PoE

    • VLANs

    • MTU black hole

    • GBIC installation

    • WPA

    • Reduction of signal gain

    Correct Answer(s)
    A. WPA
    A. Reduction of signal gain
    Explanation
    WPA (Wi-Fi Protected Access) is a security protocol that can be employed to secure the wireless connection. It provides encryption and authentication, preventing unauthorized access to the network. Reduction of signal gain refers to decreasing the strength of the wireless signal, which can help limit the range of the network and prevent unauthorized users from accessing it from outside the premises.

    Rate this question:

  • 18. 

    Joe, a network technician, blocks access to ports 25,110, and 143 on the firewall. Which of the following application services will be blocked due to this?

    • Email sending and receiving

    • Domain Name Service

    • FTP access to external servers

    • Remote desktop access

    Correct Answer
    A. Email sending and receiving
    Explanation
    Blocking ports 25, 110, and 143 on the firewall will block email sending and receiving. Port 25 is used for Simple Mail Transfer Protocol (SMTP) which is responsible for sending emails. Port 110 is used for Post Office Protocol version 3 (POP3) which is used to retrieve emails from a remote server. Port 143 is used for Internet Message Access Protocol (IMAP) which is also used to retrieve emails. By blocking these ports, the network technician is preventing any email communication from taking place.

    Rate this question:

  • 19. 

    A firewall that operates at Layer 7 of the OSI model is known as a(n):

    • Circuit gateway

    • Packet filter

    • Application level

    • Redundant firewall

    Correct Answer
    A. Application level
    Explanation
    A firewall that operates at Layer 7 of the OSI model is known as an application level firewall. Layer 7, also known as the application layer, is the highest layer in the OSI model and deals with the protocols and processes that directly interact with the end-user applications. An application level firewall is capable of inspecting and filtering traffic based on specific application-layer protocols, such as HTTP, FTP, or SMTP. It provides more advanced security features compared to lower-layer firewalls, as it can understand and control the content and behavior of specific applications.

    Rate this question:

  • 20. 

    Sandy, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem?

    • The signal strength has been degraded and latency is increasing hop count

    • An incorrect subnet mask has been entered in the WAP configuration

    • The signal strength has been degraded and packets are being lost.

    • Users have specified the wrong encryption type and routes are being rejected.

    Correct Answer
    A. An incorrect subnet mask has been entered in the WAP configuration
    Explanation
    The most likely cause of the problem is that an incorrect subnet mask has been entered in the WAP configuration. The subnet mask is used to determine the network address and the host address within that network. If the subnet mask is incorrect, it can result in the WAP not being able to properly communicate with the router or gateway, leading to users being unable to access the internet.

    Rate this question:

  • 21. 

    Kurt, a technician, wants to prevent users from visiting social networking sites. Which of the following should be configured on the firewall to BEST achieve this?

    • PAT

    • Content filter

    • Implicit deny

    • NAT

    Correct Answer
    A. Content filter
    Explanation
    A content filter should be configured on the firewall to prevent users from visiting social networking sites. A content filter is a software or hardware solution that analyzes internet traffic and blocks access to certain websites or types of content based on predefined rules. By configuring a content filter on the firewall, Kurt can specify the social networking sites that should be blocked, effectively preventing users from accessing them.

    Rate this question:

  • 22. 

    Which of the following has a DB-9 connector?

    • SC

    • RS-232

    • LC

    • RJ-45

    Correct Answer
    A. RS-232
    Explanation
    RS-232 has a DB-9 connector. RS-232 is a standard for serial communication that uses a 9-pin connector known as DB-9. This connector is commonly used for connecting devices such as computers, modems, and printers. The other options, SC, LC, and RJ-45, are types of connectors used for different purposes, such as fiber optic networking and Ethernet connections, but they do not use a DB-9 connector.

    Rate this question:

  • 23. 

    A switch in IDF 3 has shut down at 3 p.m. every day this week. Which of the following network tools should Karen, a technician, use to troubleshoot this problem?

    • Environmental monitor

    • Cable tester

    • TDR

    • Loopback plug

    Correct Answer
    A. Environmental monitor
    Explanation
    Karen should use an environmental monitor to troubleshoot the problem of the switch shutting down at 3 p.m. every day. An environmental monitor is a network tool that monitors and tracks environmental conditions such as temperature, humidity, and power fluctuations. By using an environmental monitor, Karen can determine if any environmental factors are causing the switch to shut down consistently at the same time every day.

    Rate this question:

  • 24. 

    Sandy, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Sandy use?

    • CAT5e

    • CAT6

    • Coaxial

    • Multimode fiber

    Correct Answer
    A. Multimode fiber
    Explanation
    Sandy should use multimode fiber cables to prevent interference. Multimode fiber cables have a higher bandwidth and are less susceptible to electromagnetic interference compared to other cable types like CAT5e, CAT6, and coaxial cables. Running cables over the light fixtures in the ceiling can expose them to potential sources of interference, so using multimode fiber cables will ensure a reliable and interference-free connection between the offices.

    Rate this question:

  • 25. 

    Sandy, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?

    • 21

    • 22

    • 23

    • 25

    Correct Answer
    A. 21
    Explanation
    To not allow FTP traffic on a network, port 21 should be blocked on the firewall. Port 21 is the default port used by FTP (File Transfer Protocol) for control messages. By blocking this port, the firewall will prevent any FTP traffic from passing through and accessing the network.

    Rate this question:

  • 26. 

    Which of the following could Karen, a network technician, use to find the approximate location of a break in a long network cable?

    • Protocol analyzer

    • Time domain reflectometer

    • Toner probe

    • Multimeter

    Correct Answer
    A. Time domain reflectometer
    Explanation
    A time domain reflectometer (TDR) is a tool that can be used to find the approximate location of a break in a long network cable. It works by sending a signal down the cable and measuring the time it takes for the signal to bounce back. By analyzing the time and intensity of the reflected signal, the technician can determine the distance to the break. This makes a TDR a useful tool for troubleshooting and locating cable faults in network infrastructure.

    Rate this question:

  • 27. 

    Karen, an administrator, has created a patch cable. Which of the following tools should she use to check the integrity of the cable?

    • Protocol analyzer

    • Toner probe

    • Cable certifier

    • Cable stripper

    Correct Answer
    A. Cable certifier
    Explanation
    A cable certifier is a tool that is specifically designed to check the integrity of cables. It can test the cable for various parameters such as continuity, length, attenuation, and impedance. By using a cable certifier, Karen can ensure that the patch cable she created is properly functioning and meets the required standards. This tool will help her identify any potential issues or faults in the cable, allowing her to fix them before deploying the cable in a network.

    Rate this question:

  • 28. 

    Which of the following security threats relies primarily on user deception and misinformation?

    • Rogue access points

    • DoS attacks

    • Man-in-the-middle attacks

    • Phishing

    Correct Answer
    A. Phishing
    Explanation
    Phishing is a security threat that relies primarily on user deception and misinformation. It involves tricking individuals into revealing sensitive information, such as passwords or credit card details, by posing as a trustworthy entity through fraudulent emails, websites, or messages. The attacker deceives the user into thinking they are interacting with a legitimate source, leading them to disclose confidential information unknowingly. This form of social engineering exploits human vulnerabilities to gain unauthorized access to personal or financial data.

    Rate this question:

  • 29. 

    Which of the following cable mediums is NOT susceptible to EMI?

    • Wireless

    • Fiber

    • Coaxial

    • UTP

    Correct Answer
    A. Fiber
    Explanation
    Fiber optic cables are not susceptible to electromagnetic interference (EMI) because they use light to transmit data instead of electrical signals. Unlike wireless, coaxial, and UTP cables, fiber optic cables do not carry electrical currents, making them immune to EMI. This is because EMI is caused by electromagnetic radiation interfering with the electrical signals in the cable, which does not occur in fiber optic cables. Therefore, fiber optic cables provide a more reliable and secure means of data transmission, especially in environments with high levels of EMI.

    Rate this question:

  • 30. 

    Which of the following would Karen, a technician, do to monitor remote traffic through an access point?

    • Enable an SNMP agent

    • Enable network mapping

    • Set monitoring SSID

    • Select WPA2

    Correct Answer
    A. Enable an SNMP agent
    Explanation
    Enabling an SNMP agent would allow Karen to monitor remote traffic through an access point. SNMP (Simple Network Management Protocol) is a protocol used for network management and monitoring. By enabling an SNMP agent on the access point, Karen would be able to collect and monitor data about the traffic passing through it, such as bandwidth usage, network errors, and device status. This would provide her with valuable information for troubleshooting, optimizing network performance, and ensuring the security of the network.

    Rate this question:

  • 31. 

    Which of the following is an example of a DHCP failover mechanism?

    • APIPA

    • Inactive lease

    • Reservations

    • Active lease

    Correct Answer
    A. APIPA
    Explanation
    APIPA (Automatic Private IP Addressing) is a mechanism used in DHCP (Dynamic Host Configuration Protocol) to assign IP addresses to devices when a DHCP server is not available. It allows devices to self-assign an IP address within a specific range, ensuring they can still communicate with other devices on the network. This is a failover mechanism because it provides a temporary solution in the absence of a DHCP server, preventing network connectivity issues. In contrast, inactive lease, active lease, and reservations are not examples of DHCP failover mechanisms.

    Rate this question:

  • 32. 

    Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfully at its destination?

    • The transport OSI model layer and the transport TCP/IP model layer

    • The transport OSI model layer and the Internet TCP/IP model layer

    • The network OSI model layer and the transport TCP/IP model layer

    • The network OSI model layer and the Internet TCP/IP model layer

    Correct Answer
    A. The transport OSI model layer and the transport TCP/IP model layer
    Explanation
    The transport OSI model layer and the transport TCP/IP model layer are responsible for retransmitting a TCP packet if it is not received successfully at its destination. These layers ensure reliable delivery of data by implementing mechanisms such as error detection, error correction, and flow control. If a TCP packet is not acknowledged by the receiving end, these layers will initiate the retransmission process to ensure that the data reaches its intended destination.

    Rate this question:

  • 33. 

    Karen, an administrator, wants to verify which protocols are in use on the network. Which of the following tools should she use?

    • Intrusion detection software

    • PoE

    • Packet sniffer

    • Intrusion prevention software

    Correct Answer
    A. Packet sniffer
    Explanation
    A packet sniffer is a tool used to capture and analyze network traffic. By using a packet sniffer, Karen can monitor the network and identify the protocols that are being used. This tool allows her to inspect the data packets and see the headers, which contain information about the protocols being used. Therefore, a packet sniffer is the most suitable tool for Karen to verify which protocols are in use on the network.

    Rate this question:

  • 34. 

    Which of the following can Joe, a technician, modify on an 802.11n router that is not available as an option on 802.11 g device?

    • SSID

    • Encryption

    • Channels

    • Spectrum

    Correct Answer
    A. Spectrum
    Explanation
    Joe, as a technician, can modify the spectrum on an 802.11n router that is not available as an option on an 802.11g device. The spectrum refers to the range of frequencies used for wireless communication. While both 802.11n and 802.11g routers operate in the 2.4 GHz frequency range, 802.11n routers also have the ability to operate in the less crowded 5 GHz frequency range. This allows Joe to adjust the spectrum on the 802.11n router to utilize the less congested 5 GHz frequency band, which can result in improved performance and reduced interference.

    Rate this question:

  • 35. 

    Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server?

    • RTP

    • NTP

    • TFTP

    • ARP

    Correct Answer
    A. NTP
    Explanation
    Kurt, the technician, would use the NTP (Network Time Protocol) to synchronize the local date and time of a client workstation with that of a server. NTP is specifically designed for time synchronization over a network and ensures accurate timekeeping by adjusting the system clock of the client workstation to match the server's clock. RTP (Real-time Transport Protocol) is used for transmitting audio and video over IP networks, TFTP (Trivial File Transfer Protocol) is used for file transfers, and ARP (Address Resolution Protocol) is used for mapping IP addresses to MAC addresses.

    Rate this question:

  • 36. 

    Sandy, the network administrator, has funding to do a major upgrade of the company’s LAN. This upgrade is currently in the planning stage, and Sandy still needs to determine the network requirements, bottlenecks, and any future upgrades in mind. Which of the following is the FIRST step in the planning process?

    • Conduct a vulnerability scan

    • Establish a network baseline

    • Conduct traffic analysis

    • Conduct a risk assessment

    Correct Answer
    A. Establish a network baseline
    Explanation
    The first step in the planning process for the major upgrade of the company's LAN is to establish a network baseline. This involves gathering information about the current state of the network, including its performance, capacity, and any existing issues or limitations. By establishing a baseline, Sandy can identify the starting point for the upgrade and determine what needs to be improved or changed. This will provide a solid foundation for the rest of the planning process, including determining network requirements, identifying bottlenecks, and planning for future upgrades.

    Rate this question:

  • 37. 

    Joe, a network technician, is tasked with installing a router and firewall to get an office working with Internet access. Which of the following features MUST be configured to allow sharing of a single public IP address?

    • QoS

    • POP3

    • PAT

    • SMTP

    Correct Answer
    A. PAT
    Explanation
    Port Address Translation (PAT) must be configured to allow sharing of a single public IP address. PAT is a feature of a router or firewall that allows multiple devices on a private network to share a single public IP address. It accomplishes this by mapping different port numbers to each device's private IP address. This allows multiple devices to access the internet using the same public IP address.

    Rate this question:

  • 38. 

    The location that the local network connection ends and the ISP responsibility begins is known as the:

    • Access point

    • Default gateway

    • IDF connection

    • Demarcation point

    Correct Answer
    A. Demarcation point
    Explanation
    The demarcation point is the location where the responsibility of the local network connection ends and the responsibility of the ISP begins. It is the point where the network service provider's equipment connects to the customer's equipment. This point marks the boundary between the two networks and is typically located at the customer's premises. It is where any issues or troubleshooting related to the connection are divided between the customer and the ISP.

    Rate this question:

  • 39. 

    Which of the following would be an IP address received from APIPA?

    • 10.0.0.100

    • 172.168.0.100

    • 169.254.0.100

    • 192.168.0.100

    Correct Answer
    A. 169.254.0.100
    Explanation
    An IP address received from APIPA (Automatic Private IP Addressing) is in the range of 169.254.0.0 to 169.254.255.255. This range is reserved for devices that are unable to obtain an IP address from a DHCP server. Therefore, the IP address 169.254.0.100 would be received from APIPA.

    Rate this question:

  • 40. 

    VoIP is being implemented throughout a company and Joe, the network technician, needs to ensure that data and voice traffic do not interfere with each other. Which of the following features should be configured on a layer 3 switch to prioritize traffic for VoIP?

    • VLAN

    • VTP

    • Port security

    • QoS

    Correct Answer
    A. QoS
    Explanation
    QoS stands for Quality of Service and is a feature that can be configured on a layer 3 switch to prioritize traffic for VoIP. It allows for the prioritization of certain types of traffic, such as voice traffic, over other types of traffic, such as data traffic. By implementing QoS, Joe can ensure that the voice traffic for the VoIP system is given priority and does not interfere with data traffic on the network.

    Rate this question:

  • 41. 

    Sandy, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO).

    • 23

    • 25

    • 53

    • 80

    • 443

    Correct Answer(s)
    A. 80
    A. 443
    Explanation
    To allow all websites to be accessible, Sandy needs to enable ports 80 and 443 on the firewall. Port 80 is the default port for HTTP (Hypertext Transfer Protocol), which is used for accessing websites. Port 443 is the default port for HTTPS (Hypertext Transfer Protocol Secure), which is used for secure communication over the internet, such as accessing websites with SSL/TLS encryption. By enabling these ports, Sandy ensures that the sales team can access websites using both HTTP and HTTPS protocols.

    Rate this question:

  • 42. 

    Which of the following technologies would adhere to the AAA model while facilitating ease of login changes for multiple routers and switches?

    • DOCSIS

    • HDLC

    • SNMP

    • TACACS+

    Correct Answer
    A. TACACS+
    Explanation
    TACACS+ is the correct answer because it adheres to the AAA (Authentication, Authorization, and Accounting) model while facilitating ease of login changes for multiple routers and switches. TACACS+ is a network security protocol that provides centralized authentication, authorization, and accounting services for network devices. It allows for secure and efficient login management across multiple devices, making it easier to manage login changes for routers and switches.

    Rate this question:

  • 43. 

    Joe, a user, is unable to reach websites, but is able to ping several Internet IPv4 addresses. Which of the following is the MOST likely problem?

    • Incorrect subnet mask

    • Incorrect DNS

    • Missing default gateway

    • Incorrect IPv6 address

    Correct Answer
    A. Incorrect DNS
    Explanation
    The most likely problem in this scenario is an incorrect DNS configuration. DNS (Domain Name System) is responsible for translating domain names into IP addresses. If Joe is unable to reach websites but can successfully ping IP addresses, it suggests that his network connectivity is functioning properly. However, the fact that he cannot access websites indicates a problem with the DNS settings, as the translation from domain names to IP addresses is not occurring correctly.

    Rate this question:

  • 44. 

    Joe, a network administrator, would like to ensure that the footprint of the company’s wireless coverage is limited to the office borders, located on the premises. Which of the following features should he adjust on all of the company’s WAPs to make this change?

    • SSID masking

    • PPPOE

    • Transmission power

    • Encryption technology

    Correct Answer
    A. Transmission power
    Explanation
    To limit the footprint of the company's wireless coverage to the office borders, Joe should adjust the transmission power on all of the company's WAPs. By reducing the transmission power, the signal strength will be decreased, resulting in a smaller coverage area. This will ensure that the wireless network is only accessible within the office premises and not beyond its borders.

    Rate this question:

  • 45. 

    Which of the following is the MOST economical way for Sandy, a technician, to implement 10- Gigabit Ethernet at a datacenter?

    • 10GBaseLR

    • 10GBaseSR

    • 10GBaseX

    • 10GBaseT

    Correct Answer
    A. 10GBaseT
    Explanation
    10GBaseT is the most economical way for Sandy to implement 10-Gigabit Ethernet at a datacenter. This is because 10GBaseT uses twisted pair copper cables, which are generally less expensive than other types of cables used in the other options. Additionally, 10GBaseT is compatible with existing infrastructure, making it a cost-effective choice for implementation.

    Rate this question:

  • 46. 

    T568B wiring scheme is typically found on which of the following components?

    • Demarc extension

    • 66 block

    • Patch panel

    • Vertical cross connect

    Correct Answer
    A. Patch panel
    Explanation
    The T568B wiring scheme is typically found on patch panels. Patch panels are used in networking to connect and organize multiple network cables. The T568B wiring scheme is one of the two commonly used standards for wiring Ethernet cables, and it specifies the order in which the individual wires should be connected to the RJ45 connectors. Therefore, patch panels, which serve as a central point for connecting and managing network cables, would typically follow the T568B wiring scheme.

    Rate this question:

  • 47. 

    Kurt, a customer, has been using a combination of SSID disable and WEP encryption for wireless security. Lately there have been many unauthorized devices on Kurt’s wireless network. Which of the following should also be implemented to prevent unauthorized devices from connecting? (Select TWO).

    • SSID should be changed daily and enabled.

    • WEP should be replaced with WPA encryption.

    • MAC filtering should be enabled and configured.

    • A different WAP manufacturer should be used to prevent commonly used security cracking techniques

    • Omni-directional antennas should be used to limit signal strength

    Correct Answer(s)
    A. WEP should be replaced with WPA encryption.
    A. MAC filtering should be enabled and configured.
    Explanation
    SSID disable and WEP encryption are not sufficient to prevent unauthorized devices from connecting to Kurt's wireless network. WEP encryption is known to be weak and easily cracked, so it should be replaced with WPA encryption which provides stronger security. Additionally, enabling and configuring MAC filtering will allow only specific devices with approved MAC addresses to connect to the network, further enhancing security.

    Rate this question:

  • 48. 

    Joe, a technician, is setting up an IDS security device. Which of the following should be configured on the switch to utilize the IDS?

    • PoE

    • Port mirroring

    • Convergence

    • Port speed

    Correct Answer
    A. Port mirroring
    Explanation
    Port mirroring should be configured on the switch to utilize the IDS. Port mirroring is a feature that allows the switch to copy the traffic from one or more ports and send it to another designated port, where the IDS can analyze the network traffic for any suspicious or malicious activity. By configuring port mirroring, the IDS can effectively monitor the network traffic without disrupting the normal flow of data.

    Rate this question:

  • 49. 

    Which of the following connector types would Sandy, a network technician, use to connect a serial cable?

    • RJ-11

    • BNC

    • LC

    • DB-9

    Correct Answer
    A. DB-9
    Explanation
    Sandy, the network technician, would use a DB-9 connector type to connect a serial cable. DB-9 connectors are commonly used for serial communication and have nine pins. They are often used to connect devices such as modems, printers, and serial ports on computers. RJ-11 connectors are used for telephone cables, BNC connectors are used for coaxial cables, and LC connectors are used for fiber optic cables.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 04, 2012
    Quiz Created by
    SGogola
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.