Network+ (N10-004)quiz D

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rich70
R
Rich70
Community Contributor
Quizzes Created: 8 | Total Attempts: 1,958
Questions: 50 | Attempts: 308

SettingsSettingsSettings
Network Plus Quizzes & Trivia

These questions are from the N10-004 Network+ study bank


Questions and Answers
  • 1. 

    QUESTION NO: 151 A new segment needs to be added to a network to provide access for 64 servers. Which of the following subnets will provide the needed access and still conserve IP addresses?

    • A.

      192.168.1.0/25

    • B.

      I92.168.1.0/26

    • C.

      192.168.1.0/23

    • D.

      I92.168.1.0/24

    Correct Answer
    A. 192.168.1.0/25
  • 2. 

    QUESTION NO: 152 When connecting two devices for data on a vertical cross connect, which of the following cables would be used to connect those devices?

    • A.

      CAT5e

    • B.

      Fiber

    • C.

      Coaxial

    • D.

      CAT6

    Correct Answer
    B. Fiber
    Explanation
    Fiber optic cables would be used to connect two devices for data on a vertical cross connect. Fiber optic cables are capable of transmitting data at high speeds over long distances. They use pulses of light to transmit data, making them immune to electromagnetic interference. Fiber optic cables are commonly used in networking and telecommunications to provide fast and reliable data transmission.

    Rate this question:

  • 3. 

    QUESTION NO: 153* Which of the following network protocols is needed to ensure that users can type in a FQDN instead of the IP address?

    • A.

      DNS

    • B.

      WINS

    • C.

      IMAP4

    • D.

      FTP

    Correct Answer
    A. DNS
    Explanation
    DNS (Domain Name System) is the correct answer because it is the network protocol that translates domain names (FQDN - Fully Qualified Domain Name) into IP addresses. It allows users to type in a domain name, such as www.example.com, instead of the numerical IP address, such as 192.168.0.1, when accessing websites or resources on the internet. DNS servers maintain a database of domain names and their corresponding IP addresses, allowing users to easily navigate the internet using familiar domain names.

    Rate this question:

  • 4. 

    QUESTION NO: 154 A technician is called to a clients desktop for connection issues. Which of the following is the FIRST step the technician should take?

    • A.

      Check the LEDs on the NIC.

    • B.

      Re-install the OS.

    • C.

      Install a new NIe.

    Correct Answer
    A. Check the LEDs on the NIC.
    Explanation
    The technician should first check the LEDs on the NIC (Network Interface Card). This step is important because it helps determine whether there is a physical connection issue between the computer and the network. If the LEDs are not lit or are blinking in an abnormal pattern, it could indicate a problem with the network cable or the NIC itself. By checking the LEDs, the technician can quickly identify if there is a connectivity issue and proceed with the appropriate troubleshooting steps.

    Rate this question:

  • 5. 

    QUESTION NO: 155 A technician is extending a data circuit to the other side of the building. Which of the following would the technician set up at the new location?

    • A.

      EMI

    • B.

      MDF

    • C.

      IDF

    • D.

      ESD

    Correct Answer
    C. IDF
    Explanation
    The technician would set up an IDF (Intermediate Distribution Frame) at the new location. An IDF is a network cabinet or rack that connects and distributes data circuits to various locations within a building or campus. It serves as a central point for network connectivity and allows for easy management and troubleshooting of network connections.

    Rate this question:

  • 6. 

    QUESTION NO: 156* Which of the following network devices filters packets based on rules that have been configured for it?

    • A.

      Layer 2 switch

    • B.

      Firewall

    • C.

      Hub

    • D.

      Bridge

    Correct Answer
    B. Firewall
    Explanation
    A firewall is a network device that filters packets based on rules that have been configured for it. It acts as a barrier between a trusted internal network and an untrusted external network, controlling the incoming and outgoing network traffic. By examining the source and destination addresses, ports, and protocols of the packets, a firewall can enforce security policies and block or allow specific types of traffic. This helps to protect the network from unauthorized access, malware, and other threats.

    Rate this question:

  • 7. 

    QUESTION NO: 157 A network administrator is configuring a server to provide file sharing for offices across the company. Which of the following addresses would be acceptable to set on a device?

    • A.

      255.255.255.255

    • B.

      192.168.0.255

    • C.

      192.168.0.25

    • D.

      192.255.255.255

    Correct Answer
    C. 192.168.0.25
    Explanation
    The correct answer is 192.168.0.25. This is an acceptable IP address to set on a device because it falls within the private IP address range of 192.168.0.0 to 192.168.255.255. It is a specific address within that range that can be assigned to a device on the network for file sharing purposes.

    Rate this question:

  • 8. 

    QUESTION NO: 158 Which of the following is the purpose of a packet sniffer?

    • A.

      Checks the route to a remote host.

    • B.

      Views network datagrams.

    • C.

      Verifies if a service is running on a remote host.

    • D.

      Verifies name to IP address resolution.

    Correct Answer
    B. Views network datagrams.
    Explanation
    A packet sniffer is a tool used to capture and analyze network traffic. It allows the user to view the contents of network datagrams, including the source and destination IP addresses, protocols used, and any data being transmitted. This can be useful for troubleshooting network issues, monitoring network performance, and detecting any suspicious or unauthorized activity on the network.

    Rate this question:

  • 9. 

    QUESTION NO: 159 Two PC's have been assigned the following IP addresses, subnet mask, and default gateway:PC1, 192.168. 100.20, 255.255.255.240, NoDG PC2, 192.168.100.10, 255.255.255.240, 192.168.100.1 Assuming all network devices including the switch the PC's are connected to, network cabling, and the default gateway are all functioning which of the following will occur when PCI1 attempts to transfer a file to PC2?

    • A.

      PC1 will not be able to communicate with PC2 since PC2 is in a different subnet and PC1 does not have a default gateway configured.

    • B.

      PCI will perfonn an ARP broadcast to resolve PC2s IP address to MAC address since both PCs have the same subnet mask and communication will occur.

    • C.

      PC2 and PC2 will not be able to communicate since both PCs must have the same default gateway

    • D.

      PC1 will send traffic to the default gateway at 192.168.100.1 since PC2 is in a different subnet and communication will occur.

    Correct Answer
    A. PC1 will not be able to communicate with PC2 since PC2 is in a different subnet and PC1 does not have a default gateway configured.
    Explanation
    PC1 will not be able to communicate with PC2 since PC2 is in a different subnet and PC1 does not have a default gateway configured. This means that PC1 does not have a route to reach PC2's subnet. Without a default gateway, PC1 can only communicate with devices on its own subnet. In order for PC1 to communicate with PC2, it would need to have a default gateway configured, which would provide a route to reach PC2's subnet.

    Rate this question:

  • 10. 

    QUESTION NO: 160 Which of the following tools will measure in Ohms?

    • A.

      Cable tester

    • B.

      Multimeter

    • C.

      TDR

    • D.

      Butt set

    Correct Answer
    B. Multimeter
    Explanation
    A multimeter is a versatile tool that can measure various electrical properties, including resistance, which is measured in Ohms. It can be used to measure the resistance of a component or a circuit, helping to troubleshoot electrical problems or verify the integrity of connections. A cable tester is used to check the continuity or integrity of cables, not specifically to measure resistance. TDR (Time Domain Reflectometer) is used to measure cable length or locate faults, not resistance. A butt set is used by technicians to test and troubleshoot telephone lines, it does not measure resistance.

    Rate this question:

  • 11. 

    QUESTION NO: 161 Which of the following are features of a DHCP server? (Select TWO)

    • A.

      Transfening files over the network

    • B.

      Dynamic IP addressing

    • C.

      Static IP address reservations

    • D.

      Resolving IP addresses to canonical names

    • E.

      Secure shell connections

    Correct Answer(s)
    B. Dynamic IP addressing
    C. Static IP address reservations
    Explanation
    A DHCP server is responsible for dynamically assigning IP addresses to devices on a network. This allows devices to join the network and obtain an IP address automatically without manual configuration. In addition, a DHCP server can also reserve specific IP addresses for certain devices, known as static IP address reservations. This ensures that particular devices always receive the same IP address, which can be useful for devices that require a consistent IP address for specific purposes, such as servers or printers.

    Rate this question:

  • 12. 

    QUESTION NO: 162* Which of the following routing protocols uses the next hop metric in deciding how to route traffic?

    • A.

      RIP

    • B.

      BGP

    • C.

      IGP

    • D.

      IS-IS

    Correct Answer
    A. RIP
    Explanation
    RIP (Routing Information Protocol) uses the next hop metric in deciding how to route traffic. RIP is a distance-vector routing protocol that uses hop count as its metric. The next hop metric refers to the number of routers or hops that need to be traversed to reach a destination network. RIP selects the route with the lowest hop count as the best path to forward traffic. Therefore, RIP uses the next hop metric to determine the optimal route for routing traffic.

    Rate this question:

  • 13. 

    QUESTION NO: 163* Which of the following techniques would increase the bandwidth for network transmission by joining together multiple connections into one logical connection?

    • A.

      Bonding

    • B.

      Supernetting

    • C.

      Broadcasting

    • D.

      Traffic shaping

    Correct Answer
    A. Bonding
    Explanation
    Bonding is a technique that combines multiple connections into one logical connection, which helps increase the bandwidth for network transmission. By joining together multiple connections, the network can achieve higher data transfer rates and improved performance. This is particularly useful in situations where a single connection is not sufficient to handle the required bandwidth. Bonding allows for the aggregation of multiple connections, effectively increasing the overall bandwidth available for network transmission.

    Rate this question:

  • 14. 

    QUESTION NO: 164 Which of the following properiies describes a rate at which bits are transmitted over a WAN link?

    • A.

      Transmission speed

    • B.

      Baud rate

    • C.

      Frequency

    • D.

      Throughput

    Correct Answer
    A. Transmission speed
    Explanation
    The correct answer is "Transmission speed". Transmission speed refers to the rate at which bits are transmitted over a WAN link. It represents the amount of data that can be transmitted in a given time period, typically measured in bits per second (bps). Baud rate, on the other hand, refers to the number of signal changes per second in a communication channel, and is not directly related to the transmission of bits. Frequency refers to the number of cycles per second in a signal, and throughput refers to the actual amount of data that can be transmitted successfully over a network.

    Rate this question:

  • 15. 

    QUESTION NO: 165* Which of the following is a utility that translates the IP address to its physical network address?

    • A.

      Netstat

    • B.

      Arp

    • C.

      Rarp

    • D.

      Nslookup

    Correct Answer
    B. Arp
    Explanation
    The correct answer is "arp". ARP (Address Resolution Protocol) is a utility that translates the IP address to its physical network address. It is used to map an IP address to a MAC address in a local network. ARP allows devices to communicate with each other at the data link layer by resolving the IP address to its corresponding MAC address.

    Rate this question:

  • 16. 

    QUESTION NO: 166* When determining responsibility for repair and maintenance of a T1 , up to which of the following points is the local exchange carrier responsible for?

    • A.

      The Smart jack

    • B.

      The central office

    • C.

      The point of demarcation

    • D.

      The router

    Correct Answer
    C. The point of demarcation
    Explanation
    The local exchange carrier is responsible for the repair and maintenance of the T1 up to the point of demarcation. The point of demarcation is the location where the responsibility for the telecommunications line shifts from the service provider to the customer. Therefore, any issues or repairs beyond the point of demarcation would be the customer's responsibility.

    Rate this question:

  • 17. 

    QUESTION NO: 167* Which of the following is a disadvantage of static routing?

    • A.

      Unresponsive to changes.

    • B.

      High network utilization due to updates.

    • C.

      RIP updates will need to be transmitted via TCP.

    • D.

      Packet destination cannot be controlled.

    Correct Answer
    A. Unresponsive to changes.
    Explanation
    Static routing is a routing method where network administrators manually configure the routes in the routing table. One disadvantage of static routing is that it is unresponsive to changes. Unlike dynamic routing protocols, static routes do not automatically adjust to network changes such as link failures or congestion. This means that if there is a change in the network topology, the static routes will not be updated accordingly, leading to potential routing issues and suboptimal routing paths.

    Rate this question:

  • 18. 

    QUESTION NO: 168 A scanner has determined the open ports on a network device. Assuming services are running on their default ports, which of the following ports will provide secure conmmnications?

    • A.

      69

    • B.

      143

    • C.

      67

    • D.

      443

    Correct Answer
    D. 443
    Explanation
    Port 443 is the correct answer because it is the default port for secure communications using HTTPS (Hypertext Transfer Protocol Secure). HTTPS is a protocol that encrypts the data transmitted between a web browser and a web server, ensuring secure communication and protecting sensitive information.

    Rate this question:

  • 19. 

    QUESTION NO: 169 Which of the following tools would be used to determine if the connection is punched down and there is noise coming across the cable?

    • A.

      Multimeter

    • B.

      Cable tester

    • C.

      Voltage event recorder

    • D.

      Protocol analyzer

    Correct Answer
    B. Cable tester
    Explanation
    A cable tester would be used to determine if the connection is punched down and there is noise coming across the cable. A cable tester is a tool that is specifically designed to test the integrity and functionality of various types of cables, including Ethernet cables. It can detect issues such as incorrect wiring, shorts, and noise interference. By using a cable tester, one can quickly identify if the connection is properly punched down and if there is any noise present on the cable.

    Rate this question:

  • 20. 

    QUESTION NO: 170 Which of the following items changes the encryption key on a users session after a set period of time?

    • A.

      TKIP

    • B.

      AES

    • C.

      RADIUS

    • D.

      WEP

    Correct Answer
    A. TKIP
    Explanation
    TKIP (Temporal Key Integrity Protocol) is a security protocol used in Wi-Fi networks to enhance the security of the encryption keys. It periodically changes the encryption key on a user's session after a set period of time. This helps to prevent unauthorized access and maintain the confidentiality of the data being transmitted over the network. AES (Advanced Encryption Standard) is another encryption algorithm used in Wi-Fi networks, but it does not automatically change the encryption key like TKIP does. RADIUS (Remote Authentication Dial-In User Service) is a protocol used for authentication, authorization, and accounting in network access. WEP (Wired Equivalent Privacy) is an older and less secure encryption protocol compared to TKIP.

    Rate this question:

  • 21. 

    QUESTION NO: 171 PPTP is a combination of which of the following protocols? (Select TWO).

    • A.

      PPP

    • B.

      POP3

    • C.

      PPPoE

    • D.

      TCP

    • E.

      TCP/lP

    Correct Answer(s)
    A. PPP
    E. TCP/lP
    Explanation
    PPTP (Point-to-Point Tunneling Protocol) is a combination of PPP (Point-to-Point Protocol) and TCP/IP (Transmission Control Protocol/Internet Protocol). PPP is used for establishing a secure connection between two points, while TCP/IP is the underlying protocol suite used for communication over the internet. POP3 (Post Office Protocol 3) and PPPoE (Point-to-Point Protocol over Ethernet) are not part of PPTP. TCP (Transmission Control Protocol) is a part of the TCP/IP suite, but it is not specifically mentioned as a component of PPTP.

    Rate this question:

  • 22. 

    QUESTION NO: 172 In the OS1 model, which of the following layers would be the cause of a session time-out while browsing the web?

    • A.

      Layer 5

    • B.

      Layer 7

    • C.

      Layer 3

    • D.

      Layer 2

    Correct Answer
    A. Layer 5
    Explanation
    In the OS1 model, Layer 5 is responsible for managing the session between the client and the server. It handles the establishment, maintenance, and termination of the session. A session time-out occurs when there is no activity or communication between the client and server for a certain period of time. Therefore, Layer 5 would be the cause of a session time-out while browsing the web.

    Rate this question:

  • 23. 

    QUESTION NO: 173* A network administrator has just installed a new frame-relay DS3 to connnect an office to the corporate datacenter. Users report long load times for large documents hosted on file servers in the datacenter. Which of the following tests would be MOST useful in identifying the problem?

    • A.

      A penetration test

    • B.

      A throughput test

    • C.

      Ping t

    • D.

      Ping f

    Correct Answer
    B. A throughput test
    Explanation
    A throughput test would be the most useful in identifying the problem. A throughput test measures the amount of data that can be transferred over a network in a given amount of time. By conducting a throughput test, the network administrator can determine if the frame-relay DS3 connection is able to handle the large file transfers efficiently. If the test reveals low throughput, it would indicate that the connection is the bottleneck causing the long load times for the large documents.

    Rate this question:

  • 24. 

    QUESTION NO: 174 A technician has tested a cable and has established it can successfully send and receive signals. Which of the following tools can be used to check the speed and condition of the signal?

    • A.

      Toner probe

    • B.

      Voltage event recorder

    • C.

      Protocol analyzer

    • D.

      TDR

    Correct Answer
    D. TDR
    Explanation
    A Time Domain Reflectometer (TDR) can be used to check the speed and condition of a signal in a cable. A TDR works by sending a signal down the cable and measuring the time it takes for the signal to bounce back. This information can then be used to determine the speed and condition of the signal. TDRs are commonly used in networking and telecommunications to troubleshoot and diagnose cable issues.

    Rate this question:

  • 25. 

    QUESTION NO: 175* Which of the following wireless security protocols supports the highest enclryption standards?

    • A.

      3DES

    • B.

      WPA2

    • C.

      WPA

    • D.

      WEP

    Correct Answer
    B. WPA2
    Explanation
    WPA2 is the correct answer because it supports the highest encryption standards among the given options. WPA2 uses the Advanced Encryption Standard (AES) algorithm, which is considered more secure than the encryption algorithms used by the other protocols listed. WPA2 provides stronger data protection and is recommended for securing wireless networks. 3DES, WPA, and WEP are all older and less secure protocols compared to WPA2.

    Rate this question:

  • 26. 

    QUESTION NO: 176 How many pairs are crossed in a crossover cable?

    • A.

      Three

    • B.

      Two

    • C.

      One

    • D.

      Four

    Correct Answer
    B. Two
    Explanation
    A crossover cable is used to connect two similar devices, such as two computers or two switches, directly together without the need for a hub or switch. In a crossover cable, two pairs of wires are crossed over, specifically the transmit and receive pairs. This allows for communication between the devices by ensuring that the transmit signal from one device is connected to the receive signal of the other device. Therefore, there are two pairs crossed in a crossover cable.

    Rate this question:

  • 27. 

    QUESTION NO: 177* Which of the following is the length of a MAC address?

    • A.

      48bit

    • B.

      32bit

    • C.

      24bit

    • D.

      64bit

    Correct Answer
    A. 48bit
    Explanation
    A MAC address, also known as a Media Access Control address, is a unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment. It is 48 bits in length, consisting of 6 groups of 2 hexadecimal digits separated by colons or hyphens. This address is used to uniquely identify devices on a network and is essential for proper communication between devices.

    Rate this question:

  • 28. 

    QUESTION NO: 178 Which of the following layers of the OSI model does a network router perform traffic routing at?

    • A.

      Layer 3

    • B.

      Layer 4

    • C.

      Layer 2

    • D.

      Layer 5

    Correct Answer
    A. Layer 3
    Explanation
    A network router performs traffic routing at Layer 3 of the OSI model. Layer 3, also known as the network layer, is responsible for logical addressing and routing of data packets. Routers use the information in the network layer headers, such as IP addresses, to determine the best path for forwarding data packets to their destination. Therefore, a network router operates at Layer 3 to perform traffic routing.

    Rate this question:

  • 29. 

    QUESTION NO: 179 All printers on a network are network printers with server hosted queues. A user reports that they cannot print. The dispatched technician verifies that all jobs sent from the users computer to the network printer fail. Which of the following would be an appropriate NEXT step?

    • A.

      Reboot the print server.

    • B.

      Power cycle the switch.

    • C.

      Try the printer from another PC.

    • D.

      Replace the printer.

    Correct Answer
    C. Try the printer from another PC.
    Explanation
    The appropriate next step would be to try the printer from another PC. This step will help determine if the issue is specific to the user's computer or if it is a problem with the printer itself. If the printer works fine from another PC, then the problem is likely with the user's computer and further troubleshooting can be done to identify and fix the issue. If the printer still doesn't work from another PC, then it is more likely that there is a problem with the printer itself and further steps can be taken to address the issue.

    Rate this question:

  • 30. 

    QUESTION NO: 180 Which of the following BEST describes the use of plenum cable?

    • A.

      Increases the cable signal

    • B.

      Decreases the cable signal

    • C.

      Reduces toxic gas released during a fire

    • D.

      Reduces the amount of EMI going to the cable

    Correct Answer
    C. Reduces toxic gas released during a fire
    Explanation
    Plenum cable is a type of cable that is specifically designed for use in plenum spaces, which are areas in buildings that are used for air circulation. In the event of a fire, plenum spaces can quickly fill with toxic smoke and gases. Plenum cable is made with special materials that have low smoke and low toxicity properties, which means that it releases fewer toxic gases when exposed to fire. This helps to reduce the risk of harm to people in the building during a fire. Therefore, the statement "Reduces toxic gas released during a fire" is the best description of the use of plenum cable.

    Rate this question:

  • 31. 

    QUESTION NO: 181 Which of the following is an example of a valid MAC address for a workstation?

    • A.

      05: 14:K9:07:B2:M4

    • B.

      FFFF.FFFF.FFFF

    • C.

      00:08:38:05 :B5:F4

    • D.

      131.44.32.255

    Correct Answer
    C. 00:08:38:05 :B5:F4
  • 32. 

    QUESTION NO: 182 Which of the following would be used before a technician crimps a connector to a UTP/STP cable?

    • A.

      Multimeter

    • B.

      Punch down tool

    • C.

      Cable tester

    • D.

      Cable stripper

    Correct Answer
    D. Cable stripper
    Explanation
    A cable stripper would be used before a technician crimps a connector to a UTP/STP cable in order to remove the outer insulation of the cable and expose the inner conductors. This is necessary to ensure a proper connection between the cable and the connector.

    Rate this question:

  • 33. 

    QUESTION NO: 183 A network technician is connecting through the console port to configure a switch. Which of the following ports would be used to transfer configuration files from the switch?

    • A.

      TCP 110

    • B.

      UDP 67

    • C.

      UDP 69

    • D.

      TCP 69

    Correct Answer
    C. UDP 69
    Explanation
    The correct answer is UDP 69. UDP stands for User Datagram Protocol, which is a connectionless protocol that does not require a handshake before data transfer. UDP 69 is specifically used for TFTP (Trivial File Transfer Protocol), which is commonly used to transfer configuration files between devices. TCP 110, UDP 67, and TCP 69 are not used for file transfer purposes.

    Rate this question:

  • 34. 

    QUESTION NO: 184 Which of the following tools would be used to establish a connection on a wall jack to connect to the desktop?

    • A.

      Multimeter

    • B.

      Snips

    • C.

      Punch down tool

    • D.

      Cable stripper

    Correct Answer
    C. Punch down tool
    Explanation
    A punch down tool is used to establish a connection on a wall jack to connect to the desktop. This tool is specifically designed to terminate and secure the wires onto the punch down block or keystone jack. It allows for quick and efficient installation of network cables by punching the wires into the appropriate slots, ensuring a secure and reliable connection.

    Rate this question:

  • 35. 

    QUESTION NO: 185 A computer configured to use DHCP cannot locate a DHCP server. Automatic Private IP Address (APIPA)will assign which of the following addresses?

    • A.

      172.16.1.25

    • B.

      192.168.1.25

    • C.

      169.254.1.25

    • D.

      I0.16.1.25

    Correct Answer
    C. 169.254.1.25
    Explanation
    When a computer configured to use DHCP cannot locate a DHCP server, it will be assigned an Automatic Private IP Address (APIPA). APIPA assigns IP addresses in the range of 169.254.0.0 to 169.254.255.255. Therefore, the correct answer is 169.254.1.25.

    Rate this question:

  • 36. 

    QUESTION NO: 186 A company guest is requesting to use their personal laptop on the company wireless network. DHCP is configured correctly for wireless and a temporary WEP key is assigned. The laptop canot  connect to the network because:

    • A.

      This laptop is enabled for both 802.11 band 802.11g.

    • B.

      DNS server is not working properly.

    • C.

      The network is out of wireless connections

    • D.

      MAC filtering is enabled on the WAP.

    Correct Answer
    D. MAC filtering is enabled on the WAP.
    Explanation
    The correct answer is MAC filtering is enabled on the WAP. MAC filtering is a security feature that allows or denies access to a network based on the MAC address of a device. If MAC filtering is enabled on the wireless access point (WAP), it will only allow devices with specific MAC addresses to connect to the network. Since the company guest is using a personal laptop, it is likely that their laptop's MAC address is not included in the allowed list, resulting in the inability to connect to the network.

    Rate this question:

  • 37. 

    QUESTION NO: 187 221 .17.101 .223/28 is an example of which kind of notation?

    • A.

      CIDR

    • B.

      DNS

    • C.

      Port Number

    • D.

      ARP

    Correct Answer
    A. CIDR
    Explanation
    221.17.101.223/28 is an example of CIDR notation, which stands for Classless Inter-Domain Routing. CIDR notation is used to represent IP addresses and their associated subnet masks. In this notation, the IP address is followed by a slash (/) and the number of bits in the subnet mask. In this case, the subnet mask is 28 bits, indicating that the first 28 bits of the IP address are the network address and the remaining 4 bits are the host address.

    Rate this question:

  • 38. 

    QUESTION NO: 188 Which of the following is the BEST reason to implement QoS when real-time applications are in use in the network?

    • A.

      Increase network reliability.

    • B.

      Prioritize delay sensitive traffic.

    • C.

      Increase network bandwidth of delay sellSitive traffic.

    • D.

      Prioritize bulk traffic.

    Correct Answer
    B. Prioritize delay sensitive traffic.
    Explanation
    Implementing Quality of Service (QoS) is important when real-time applications are in use because it allows for the prioritization of delay-sensitive traffic. Real-time applications, such as video conferencing or VoIP, require low latency and minimal packet loss to function properly. By implementing QoS, network administrators can allocate sufficient bandwidth and prioritize the delivery of these time-sensitive packets, ensuring a smooth and uninterrupted user experience. This helps to minimize delays and improve the overall performance of real-time applications on the network.

    Rate this question:

  • 39. 

    QUESTION NO: 189 Which of the following would be an appropriate use of an EGP?

    • A.

      Unequal cost load balancing over a switched network.

    • B.

      Advertising a /24 to an upstream provider.

    • C.

      Periodic updates to neighbors on the LAN.

    • D.

      Routing between VLANs on an Ethernet network.

    Correct Answer
    B. Advertising a /24 to an upstream provider.
    Explanation
    An Exterior Gateway Protocol (EGP) is used to exchange routing information between different autonomous systems (AS). Advertising a /24 to an upstream provider would be an appropriate use of an EGP as it involves announcing the availability of a specific network prefix to the upstream provider. This allows the provider to direct traffic towards that network.

    Rate this question:

  • 40. 

    QUESTION NO: 190 Which of the following cables has a solid Kevlar center to restrict it from making a 90 degree bend?

    • A.

      CAT6

    • B.

      CAT5

    • C.

      CAT5e

    • D.

      CAT3

    Correct Answer
    A. CAT6
    Explanation
    CAT6 cables have a solid Kevlar center to restrict them from making a 90 degree bend. This feature helps to maintain the integrity and performance of the cable by preventing excessive bending or twisting that could cause signal loss or damage. CAT5, CAT5e, and CAT3 cables do not have this solid Kevlar center and are more flexible, making them more prone to bending or twisting.

    Rate this question:

  • 41. 

    QUESTION NO: 191 A network technician is installing a series off three access points to cover the entire wing of a building. Each access point has a wired conection and 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points?

    • A.

      Channels 7-11-1

    • B.

      Channels 1-6-11

    • C.

      Channels 1-3-5

    • D.

      Chalmeis 2-4-6

    Correct Answer
    B. Channels 1-6-11
    Explanation
    The access points should be set to channels 1, 6, and 11. This is because these channels do not overlap with each other and provide the best coverage without interference. By using these channels, the access points can transmit on different frequencies, reducing the chances of signal interference and ensuring a stable wireless connection for users in the building.

    Rate this question:

  • 42. 

    QUESTION NO: 192* A technician is working on a new employees workstation in the accounting department? The workstation needs access to the accounting server. Currently the technician notices that the employee can only access the Internet. Which of the following would the technician need to verify?

    • A.

      Correct VPN setting

    • B.

      Correct VLAN setting

    • C.

      Correct DNS setting

    • D.

      Correct WINS setting

    Correct Answer
    B. Correct VLAN setting
    Explanation
    The technician would need to verify the correct VLAN setting. VLANs (Virtual Local Area Networks) are used to separate network traffic and isolate devices into different logical networks. If the workstation can only access the Internet and not the accounting server, it suggests that it may be on the wrong VLAN, which is preventing it from accessing the server. By verifying the VLAN setting, the technician can ensure that the workstation is on the correct network to access the accounting server.

    Rate this question:

  • 43. 

    QUESTION NO: 193* Which of the following devices can be remotely looped for troubleshooting purposes?

    • A.

      A 66 block

    • B.

      A 110 block

    • C.

      A smart jack

    • D.

      A patch panel

    Correct Answer
    C. A smart jack
    Explanation
    A smart jack can be remotely looped for troubleshooting purposes. This means that it can be tested or diagnosed from a remote location without physically accessing the device. This is useful for troubleshooting network connectivity issues or identifying faults in the smart jack without the need for on-site intervention.

    Rate this question:

  • 44. 

    QUESTION NO: 194 Which of the following is part of the TCP/IP protocol suite?

    • A.

      UDP

    • B.

      IPX

    • C.

      NetBEUI

    • D.

      SPX

    Correct Answer
    A. UDP
    Explanation
    UDP (User Datagram Protocol) is indeed part of the TCP/IP protocol suite. TCP/IP is a set of protocols that allows computers to communicate over a network. UDP is one of the core protocols in this suite, providing a connectionless and unreliable transmission of data. Unlike TCP, UDP does not guarantee the delivery of packets or the order in which they are received. It is commonly used for applications that require low latency and can tolerate packet loss, such as real-time streaming or online gaming. IPX, NetBEUI, and SPX are not part of the TCP/IP suite.

    Rate this question:

  • 45. 

    QUESTION NO: 195 The function of a tone generator is to generate a tone to test:

    • A.

      Continuity

    • B.

      Signal strength.

    • C.

      Impedance.

    • D.

      Signal feedback.

    Correct Answer
    A. Continuity
    Explanation
    A tone generator is used to generate a continuous tone signal that can be used to test the continuity of a circuit or a cable. By connecting the tone generator to one end of the circuit and using a probe or a receiver at the other end, the presence of the tone indicates that there is a continuous path for the signal to flow through, confirming the continuity of the circuit or cable. This is useful for troubleshooting and identifying breaks or faults in the wiring.

    Rate this question:

  • 46. 

    QUESTION NO: 196* A technician is not able to ping a server by the FQDN but can by the IP. Which of the following should the technician check?

    • A.

      Ensure that WINS is configured

    • B.

      Ensure that the DNS is configured

    • C.

      Ensure the MAC address is correct

    • D.

      Ensure that the IP address is correct

    Correct Answer
    B. Ensure that the DNS is configured
    Explanation
    The technician should check if the DNS is configured correctly. The FQDN (Fully Qualified Domain Name) is used to resolve the IP address of a server using DNS. If the technician is unable to ping the server by the FQDN but can by the IP, it suggests that the DNS is not able to resolve the FQDN to the correct IP address. Therefore, checking the DNS configuration is necessary to ensure proper resolution of the FQDN.

    Rate this question:

  • 47. 

    QUESTION NO: 197 Which of the following cable types allows for the maximum cable run distance?

    • A.

      Coaxial

    • B.

      Multi-mode fiber

    • C.

      Single-mode fiber

    • D.

      CAT3

    Correct Answer
    C. Single-mode fiber
    Explanation
    Single-mode fiber allows for the maximum cable run distance compared to the other cable types mentioned. This is because single-mode fiber has a smaller core size and uses a single beam of light to transmit data, allowing for less signal loss and greater distance coverage. Coaxial cable, multi-mode fiber, and CAT3 cables have larger core sizes and are more susceptible to signal loss over longer distances.

    Rate this question:

  • 48. 

    QUESTION NO: 198 Which of the following is a function of a NIC?

    • A.

      It filters frame packets

    • B.

      It captures keystrokes

    • C.

      It sends data to Non-Volatile RAM

    • D.

      It transceives digital data

    Correct Answer
    D. It transceives digital data
    Explanation
    A NIC (Network Interface Card) is responsible for facilitating communication between a computer and a network. It transceives digital data, meaning it both transmits and receives digital data packets over the network. This allows the computer to send and receive information to and from other devices on the network. The other options listed, such as filtering frame packets, capturing keystrokes, and sending data to Non-Volatile RAM, are not functions of a NIC.

    Rate this question:

  • 49. 

    QUESTION NO: 199* A network technician discovers that the phone company has installed the smart jack in the wrong location. It needs to be moved 75 feet (23 meters) to the computer room. Which of the following should be requested?

    • A.

      A replacement smart jack

    • B.

      A 66 block extension

    • C.

      A demarc extension

    • D.

      A 110 block extension

    Correct Answer
    C. A demarc extension
    Explanation
    A demarc extension should be requested in this situation. A demarc extension is used to extend the demarcation point, which is the point where the responsibility of the phone company ends and the responsibility of the customer begins. By requesting a demarc extension, the network technician can move the smart jack to the computer room, ensuring that it is in the correct location for proper connectivity.

    Rate this question:

  • 50. 

    QUESTION NO: 200 Remote users are having problems accessing files from a file selver. Which of the following should a technician check FIRST?

    • A.

      User accounts

    • B.

      Access rights

    • C.

      Network resources

    • D.

      Connectivity

    Correct Answer
    D. Connectivity
    Explanation
    The technician should check connectivity first because if there is an issue with the network connection, remote users will not be able to access files from the file server. Once connectivity is confirmed, the technician can then proceed to check user accounts, access rights, and network resources to further troubleshoot the problem.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.