Network+ (N10-004) Quiz C

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rich70
R
Rich70
Community Contributor
Quizzes Created: 8 | Total Attempts: 1,977
Questions: 50 | Attempts: 316

SettingsSettingsSettings
Network Plus Quizzes & Trivia

The N10-004 study guide is vital when it comes to the Networking profession. Have you had the chance to read through the study? If yes, did you understand it well? The quiz below has the answer to these questions.


Questions and Answers
  • 1. 

    nedQUESTION NO: 101 A network administrator is summarizing the following IP address ranges into a single route for redistribution into the network core: 192.168.0.0 /24 192.168.1.0 /24 192.168.2 .0 /24 192.168.3.0 /24 Which of the following IP summary addresses will represent the listed network ranges without including any ranges not listed?

    • A.

      192.168.0.0 /21

    • B.

      192. 168.0.0 /23

    • C.

      192.168.0.0 /16

    • D.

      192. 168.0.0/22

    Correct Answer
    D. 192. 168.0.0/22
    Explanation
    The correct answer is 192.168.0.0/22 because it includes all the given IP address ranges (192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24) without including any additional ranges. A /22 subnet mask allows for 1024 IP addresses, which is sufficient to cover the 4 /24 ranges provided.

    Rate this question:

  • 2. 

    QUESTION NO: 102* A network technician has been asked to retrieve device statistics, information, and errors. Which of the following tools would the technician likely use?

    • A.

      TFTP

    • B.

      Packet sniffer

    • C.

      SNMP

    • D.

      SMTP

    Correct Answer
    C. SNMP
    Explanation
    SNMP (Simple Network Management Protocol) is the correct answer because it is a protocol used to monitor and manage network devices. It allows the network technician to retrieve statistics, information, and errors from network devices such as routers, switches, and servers. SNMP provides a standardized way for devices to communicate and share information, making it an essential tool for network monitoring and troubleshooting. TFTP (Trivial File Transfer Protocol) is used for file transfers, Packet sniffer is used to capture and analyze network traffic, and SMTP (Simple Mail Transfer Protocol) is used for sending email.

    Rate this question:

  • 3. 

    QUESTION NO: 103* Which of the following is found in a layer two switch?

    • A.

      SSID settings

    • B.

      Routing protocols

    • C.

      DNS zones

    • D.

      VLAN settings

    Correct Answer
    D. VLAN settings
    Explanation
    A layer two switch is responsible for forwarding data packets between devices within the same network. VLAN settings, or Virtual Local Area Network settings, allow the switch to create multiple virtual networks within the physical network. This allows for better network management, security, and segmentation of network traffic. Therefore, VLAN settings are commonly found in layer two switches.

    Rate this question:

  • 4. 

    QUESTION NO: 104 Which of the following cable types transmits data over lOOMbps per direction?

    • A.

      100Base-TX

    • B.

      I0Base-T

    • C.

      100Base-T

    • D.

      L0GBase-T

    Correct Answer
    D. L0GBase-T
    Explanation
    The correct answer is l0GBase-T. l0GBase-T is a type of cable that can transmit data at a rate of lOOMbps per direction. This cable type is commonly used for high-speed data transmission in networks.

    Rate this question:

  • 5. 

    QUESTION NO: 105 A technician is dispatched to a remote office to install a new NIC in a client computer. After successfully installing and configuring the operating system to recognize the device, the computer still cannot access the network. Which of the following would MOST likely be the problem?

    • A.

      The CAT5 cable is defective

    • B.

      The NIC is disabled in BIOS

    • C.

      The NIC is disabled in Device Manager

    • D.

      The RJ-11 jack is defective

    Correct Answer
    A. The CAT5 cable is defective
    Explanation
    The most likely problem is that the CAT5 cable is defective. This is because the technician has successfully installed and configured the operating system to recognize the new NIC, indicating that the NIC itself is functioning properly. If the computer still cannot access the network, it suggests that there is an issue with the connection between the NIC and the network, which is most likely caused by a defective CAT5 cable.

    Rate this question:

  • 6. 

    QUESTION NO: 106* Which of the following is the MOST likely cause of a wireless connection drop-off in a wireless G network?

    • A.

      Cellular interference

    • B.

      AM Radio

    • C.

      Cordless phones

    • D.

      FM Radio

    Correct Answer
    C. Cordless pHones
    Explanation
    Cordless phones are the most likely cause of a wireless connection drop-off in a wireless G network. Cordless phones operate on the same frequency range as wireless G networks, which can lead to interference and signal loss. This interference can disrupt the wireless connection and cause it to drop off. Cellular interference, AM radio, and FM radio are less likely to cause drop-offs in a wireless G network compared to cordless phones.

    Rate this question:

  • 7. 

    QUESTION NO: 107* Which of the following tools will identify if a CAT5e cable is operating at optimal performance?

    • A.

      Toner probe

    • B.

      Multimeter

    • C.

      Certifier

    • D.

      Butt set

    Correct Answer
    C. Certifier
    Explanation
    A certifier is a tool specifically designed to test and certify the performance of network cables. It can accurately determine if a CAT5e cable is operating at optimal performance by measuring parameters such as signal strength, attenuation, and crosstalk. This tool provides detailed test reports and ensures that the cable meets industry standards for data transmission. A toner probe is used to trace and locate cables, a multimeter is used to measure electrical properties, and a butt set is used for testing telephone lines, none of which are specifically designed to evaluate the performance of CAT5e cables.

    Rate this question:

  • 8. 

    QUESTION NO: 108* Which of the following is the default port for POP3?

    • A.

      21

    • B.

      80

    • C.

      110

    • D.

      25

    Correct Answer
    C. 110
    Explanation
    The default port for POP3 is 110. POP3 (Post Office Protocol version 3) is a protocol used for retrieving emails from a remote server. When a client wants to retrieve emails from a POP3 server, it connects to port 110 on the server. Therefore, the correct answer is 110.

    Rate this question:

  • 9. 

    QUESTION NO: 109 A user contacts a technician and states that they are unable to access the network. The technician discovers that the IP address of the workstation is 169.123.142.34. Which of the following has occurred?

    • A.

      The workstation has obtained a public address.

    • B.

      The workstation has obtained a multicast address.

    • C.

      The workstation has obtained a private address.

    • D.

      The workstation has obtained an APIPA address.

    Correct Answer
    D. The workstation has obtained an APIPA address.
    Explanation
    The IP address 169.123.142.34 falls within the range of APIPA (Automatic Private IP Addressing) addresses, which are automatically assigned by the operating system when a device is unable to obtain an IP address from a DHCP server. APIPA addresses are used in local networks and cannot be routed over the internet, indicating that the workstation is unable to access the network due to a failure in obtaining a valid IP address.

    Rate this question:

  • 10. 

    QUESTION NO: 110* A technician needs to trace a wire that is in the wall. Which of the following is the BEST way for the technician to identify the wires location?

    • A.

      Media Tester

    • B.

      Continuity Tester

    • C.

      Tone Generator

    • D.

      Multimeter

    Correct Answer
    C. Tone Generator
    Explanation
    A tone generator is the best way for a technician to identify the location of a wire in a wall. A tone generator is a device that emits a specific tone or signal that can be detected by a tone probe. The technician can attach the tone generator to one end of the wire and then use the tone probe to trace the wire's path through the wall. The tone generator will emit a continuous tone that can be easily detected, allowing the technician to accurately locate the wire.

    Rate this question:

  • 11. 

    QUESTION NO: 111 Users are reporting that they can access Intenet web pages but cannot access the internal company website. Which of the following is the MOST likely source of the problem?

    • A.

      The intranet server is down.

    • B.

      The intranet DNS entry is non-authoritative.

    • C.

      The DNS address handed out by DHCP is incorrect.

    • D.

      The default gateway is incorrect.

    Correct Answer
    A. The intranet server is down.
    Explanation
    The most likely source of the problem is that the intranet server is down. This means that the internal company website is not accessible because the server hosting it is not functioning properly or is completely offline. This would explain why users can access internet web pages but not the internal company website.

    Rate this question:

  • 12. 

    QUESTION NO: 112 When connecting two devices for voice on a vertical connect, which of the following cables would be used to connect the two devices?

    • A.

      Cross-connect wire

    • B.

      25 pair cable

    • C.

      CAT3

    • D.

      CAT5

    Correct Answer
    B. 25 pair cable
    Explanation
    The 25 pair cable would be used to connect the two devices for voice on a vertical connect. This cable is commonly used in telecommunications for connecting telephone systems and other voice communication devices. It consists of 25 pairs of wires, each color-coded for easy identification and termination. The 25 pair cable provides multiple channels for voice communication, making it suitable for connecting multiple devices in a vertical connect setup.

    Rate this question:

  • 13. 

    QUESTION NO: 113* Which of the following protocols allows email to be viewed while remaining on the email server?

    • A.

      SMTP

    • B.

      SSL

    • C.

      POP3

    • D.

      IMAP4

    Correct Answer
    D. IMAP4
    Explanation
    IMAP4 (Internet Message Access Protocol version 4) is the correct answer because it is a protocol that allows email to be viewed while remaining on the email server. Unlike POP3 (Post Office Protocol version 3), which downloads emails to the device, IMAP4 enables users to access and manage their emails directly on the server. This means that emails can be viewed, organized, and synced across multiple devices, providing a more flexible and convenient email experience. SMTP (Simple Mail Transfer Protocol) is responsible for sending emails, while SSL (Secure Sockets Layer) is a security protocol used to encrypt data transmitted over the internet.

    Rate this question:

  • 14. 

    QUESTION NO: 114* A Network address of 220.100.100.100 with a subnet mask of 255.255.255.0 can be rewritten in classlessinterdomain routing notation (CIDR) as which of the following?

    • A.

      220.100.100.100 /24

    • B.

      220.100.100.100/16

    • C.

      220.100.100.100 /8

    • D.

      220.100.100.100 /32

    Correct Answer
    A. 220.100.100.100 /24
    Explanation
    The given network address of 220.100.100.100 with a subnet mask of 255.255.255.0 can be rewritten in classless interdomain routing notation (CIDR) as 220.100.100.100 /24. In CIDR notation, the number after the slash represents the number of bits in the subnet mask, which in this case is 24. This means that the first 24 bits of the IP address are used to identify the network, while the remaining 8 bits can be used to identify hosts within the network.

    Rate this question:

  • 15. 

    QUESTION NO: 115 A company is getting a new sales system that must remain secure and isolated. The network administrator needs to segregate network traffic for security reasons. Currently there is one addressing scheme 10.2.1 O.x, with a subnet mask of 255.255.255.0. Which of the following methods would BEST help in segregating the traffic?

    • A.

      Implementing a dedicated broadcast network

    • B.

      Implementing a dedicated multicast network

    • C.

      Changing the IP scheme to class C addresses

    • D.

      Creating a new subnet for this system

    Correct Answer
    D. Creating a new subnet for this system
    Explanation
    Creating a new subnet for this system would be the best method for segregating the traffic. By creating a new subnet, the network administrator can separate the sales system from the rest of the network, ensuring that the traffic remains isolated and secure. This allows for better control and management of the sales system's network traffic, reducing the risk of unauthorized access or interference from other devices on the network.

    Rate this question:

  • 16. 

    QUESTION NO: 116* A network administrator has been receiving work orders about poor voice quality crossing a branch T1 . The cause is determined to be users running high bandwidth file sharing applications across the T1 sending large packets delaying the smaller voice streams. Which of the following would improve voice quality?

    • A.

      Install a content caching proxy at the branch to reduce inbound WAN traffic.

    • B.

      Configure traffic shaping to reduce the bandwidth available to the file sharing application.

    • C.

      Configure a separate VLAN for the IP phones.

    • D.

      Upgrade switches to provide higher bandwidth ports for workstations and IP phones.

    Correct Answer
    B. Configure traffic shaping to reduce the bandwidth available to the file sharing application.
    Explanation
    Configuring traffic shaping to reduce the bandwidth available to the file sharing application would improve voice quality. By limiting the bandwidth allocated to the file sharing application, the network administrator can ensure that the voice streams are given priority and are not delayed by the large packets from the file sharing application. This will help to prevent congestion and improve the overall quality of the voice calls.

    Rate this question:

  • 17. 

    QUESTION NO: 117 Which of the following uses pointer records and A records?

    • A.

      NAT server

    • B.

      IPS

    • C.

      DNS server

    • D.

      IDS

    Correct Answer
    C. DNS server
    Explanation
    A DNS server uses pointer records and A records to map domain names to IP addresses. Pointer records, also known as PTR records, are used to map IP addresses to domain names, while A records are used to map domain names to IP addresses. This allows the DNS server to resolve domain names to their corresponding IP addresses, enabling communication between devices on a network.

    Rate this question:

  • 18. 

    QUESTION NO: 118* DNS services are in a failed state on a network. Some users require FQDN to access specific services. A temporary solution would be to:

    • A.

      Create a local host file on the PC

    • B.

      Release and renew DHCP.

    • C.

      Change the IP address of the specific services needed.

    • D.

      Change all domain relationships to WINS.

    Correct Answer
    A. Create a local host file on the PC
    Explanation
    A temporary solution for the failed DNS services on the network would be to create a local host file on the PC. This file would contain mappings of IP addresses to domain names, allowing the users to access specific services using their fully qualified domain names (FQDNs) even when DNS services are not functioning properly. By creating this local host file, the PC can resolve the domain names locally without relying on the DNS services.

    Rate this question:

  • 19. 

    QUESTION NO: 119 A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?

    • A.

      Four port wireless router

    • B.

      Four port switch

    • C.

      Four port hub

    • D.

      Four port WAP

    Correct Answer
    A. Four port wireless router
    Explanation
    A four port wireless router would allow the user to connect their small network of four computers to a single cable modem. A wireless router not only provides wireless connectivity to the devices but also has multiple Ethernet ports, in this case, four ports, allowing the computers to be connected directly to the router using Ethernet cables. This setup would enable all the computers to access the internet through the cable modem.

    Rate this question:

  • 20. 

    QUESTION NO: 120 Which of the following devices allows segregation of collision domains but not broadcasting domains?

    • A.

      NIC

    • B.

      Switch

    • C.

      Hub

    • D.

      Router

    Correct Answer
    B. Switch
    Explanation
    A switch is a networking device that allows for the segregation of collision domains. Collision domains refer to the area in a network where packets may collide with each other, causing data loss or delays. A switch uses its switching fabric to create separate collision domains for each port, ensuring that data packets are transmitted without collision within each domain. However, a switch does not segregate broadcasting domains. Broadcasting domains refer to the area in a network where broadcast messages are sent to all devices. In a switch, broadcast messages are still sent to all connected devices within the same network.

    Rate this question:

  • 21. 

    QUESTION NO: 121* A user reports that when the phone rings in their house the wireless on their laptops becomes disconnected. Which of the following BEST describes the issue?

    • A.

      The cordless phones are 2.4Ghz which interferes with wireless

    • B.

      The cordless phones are plugged into the RJ-ll jack

    • C.

      The cordless phones are 5.8Ghz which interferes with wireless

    • D.

      The cordless phones are plugged into same outlet as the router

    Correct Answer
    A. The cordless pHones are 2.4Ghz which interferes with wireless
    Explanation
    The issue is that the cordless phones in the user's house operate on the same frequency (2.4Ghz) as the wireless network, causing interference and disconnecting the wireless connection on their laptops.

    Rate this question:

  • 22. 

    QUESTION NO: 122* Which of the following documentation would a network administrator need to update if they have just finished upgrading the firmware on all the switches within the LAN?

    • A.

      Wiring schematics

    • B.

      Logical network diagram

    • C.

      Physical network diagram

    • D.

      Baseline and configuration documentation

    Correct Answer
    D. Baseline and configuration documentation
    Explanation
    After upgrading the firmware on all the switches within the LAN, the network administrator would need to update the baseline and configuration documentation. This documentation includes the current settings and configurations of the switches, which would need to be updated to reflect the changes made during the firmware upgrade. The baseline and configuration documentation serves as a reference for future troubleshooting, maintenance, and upgrades, so it is important to keep it up to date.

    Rate this question:

  • 23. 

    QUESTION NO: 123 After deploying three large additional servers in a rack there are reports of network instability and other issues across all servers in the rack. It has been verified that there is sufficient power resources and network bandwidth. Which of the following should the technician check NEXT?

    • A.

      Cable tester

    • B.

      Celiifier

    • C.

      Temperature monitor

    • D.

      Multimeter

    Correct Answer
    C. Temperature monitor
    Explanation
    The technician should check the temperature monitor next because the deployment of three large additional servers may have caused an increase in heat generation, leading to overheating issues. Monitoring the temperature will help identify if the servers are operating within the acceptable range and if any cooling measures need to be taken to resolve the network instability and other issues.

    Rate this question:

  • 24. 

    QUESTION NO: 124 A network engineer for a company has issued the 10.44.210.0/24 network for a branch office. The network administrator for the branch has three separate VLANs for voice, workstations, and servers. There are approximately 50 end user workstations, 50 IP phones that require addressing, and a dozen servers. How should the network administrator use the block allocated to the branch?

    • A.

      Subnet the block into /26s and assign one to each VLAN.b

    • B.

      Do not subnet the block? use the /24 for all VLANs.

    • C.

      The administrator must request more networks and use the networks given so far for the servers and workstation VLANs.

    • D.

      Subnet the block into /25s and assign one to each voice and workstation VLANs.

    Correct Answer
    A. Subnet the block into /26s and assign one to each VLAN.b
    Explanation
    The network administrator should subnet the block into /26s and assign one to each VLAN. This will allow for separate addressing for each VLAN, ensuring that the voice, workstation, and server networks are isolated from each other. Subnetting into /26s will provide enough IP addresses for the approximately 50 workstations and 50 IP phones in the branch office.

    Rate this question:

  • 25. 

    QUESTION NO: 125* Which of the following is the standard data transmission rate for an OC-31ine?

    • A.

      51.84Mbps

    • B.

      44. 74Mbps

    • C.

      622.08Mbps

    • D.

      155.52Mbps

    Correct Answer
    D. 155.52Mbps
    Explanation
    The correct answer is 155.52Mbps. This is the standard data transmission rate for an OC-3 line. OC stands for Optical Carrier, and the number after OC represents the transmission rate in multiples of 51.84Mbps. Therefore, OC-3 represents a transmission rate of 3 times 51.84Mbps, which equals 155.52Mbps.

    Rate this question:

  • 26. 

    QUESTION NO: 126* A router receives a packet with a destination address 72.44.69.254?however, no entry in the routing table exists for the network. Which of the following actions will the router take?  

    • A.

      The packet will be queued while the router queries for an acceptable path to the destination.

    • B.

      The packet will be dropped as non-mutable.

    • C.

      The packet will be fowarded out until another router forwards the packet.

    • D.

      The packet will be forwarded to the next hop address of the default route.

    Correct Answer
    D. The packet will be forwarded to the next hop address of the default route.
    Explanation
    When a router receives a packet with a destination address for which there is no entry in the routing table, it will look for a default route. A default route is a preconfigured route that is used when there is no specific route for a destination network. In this case, since there is no entry for the network in the routing table, the router will forward the packet to the next hop address of the default route. This allows the packet to be sent to a gateway that can potentially find a valid route for the destination network.

    Rate this question:

  • 27. 

    QUESTION NO: 127 A technician is sent to troubleshoot a connectivity issue on A company's web server. Which of the following is the NEXT step after verifying that one of the NICs has no LEDs flashing?

    • A.

      Re-install application.

    • B.

      Check for hardware conflicts or disabled devices.

    • C.

      Re-install drivers.

    • D.

      Check system properties for correct caching settings.

    Correct Answer
    B. Check for hardware conflicts or disabled devices.
    Explanation
    After verifying that one of the NICs has no LEDs flashing, the next step would be to check for hardware conflicts or disabled devices. This is because a lack of flashing LEDs indicates that there may be an issue with the network interface card (NIC) itself or with the hardware it is connected to. By checking for hardware conflicts or disabled devices, the technician can identify and resolve any issues that may be causing the connectivity problem.

    Rate this question:

  • 28. 

    QUESTION NO: 128 Which of the following WAN technologies uses thirty 64Kbps channels?

    • A.

      ATM

    • B.

      T-1

    • C.

      E-1

    • D.

      MPLS

    Correct Answer
    C. E-1
    Explanation
    E-1 is the correct answer because it is a WAN technology that uses thirty 64Kbps channels. E-1, also known as European format 1, is a digital transmission format commonly used in Europe and other parts of the world. It provides a total bandwidth of 2.048 Mbps, which is divided into 30 channels, each with a capacity of 64Kbps. This allows for simultaneous transmission of voice, data, and video over the network.

    Rate this question:

  • 29. 

    QUESTION NO: 129* Which of the following is considered a connection-oriented protocol?

    • A.

      UDP

    • B.

      SPX

    • C.

      TCP

    • D.

      IP

    Correct Answer
    C. TCP
    Explanation
    TCP (Transmission Control Protocol) is considered a connection-oriented protocol because it establishes a reliable and ordered connection between two devices before transmitting data. It ensures that all packets are received in the correct order and retransmits any lost or corrupted packets. TCP also provides flow control and congestion control mechanisms to prevent network congestion and ensure efficient data transmission. This connection-oriented nature makes TCP suitable for applications that require reliable and error-free data transmission, such as web browsing, email, and file transfer.

    Rate this question:

  • 30. 

    QUESTION NO: 130 A technician wants to remotely log into an office computer using remote desktop. The technicain needs to do this in a secure manner. Which of the following would accomplish this?

    • A.

      VPN

    • B.

      Telnet

    • C.

      VLAN

    • D.

      Tagged packets

    Correct Answer
    A. VPN
    Explanation
    A Virtual Private Network (VPN) would accomplish secure remote login to an office computer. VPNs create a secure and encrypted connection over a public network, such as the internet, allowing users to access a private network remotely. This ensures that the data transmitted between the remote computer and the office computer is protected from unauthorized access or interception. Telnet, VLAN, and tagged packets do not provide the same level of security as a VPN.

    Rate this question:

  • 31. 

    QUESTION NO: 131* A user is trying to establish an FTP connection to a computer at home. The home computer is turned on and has Intemet connectivity? However, they are unable to connect from the PC at work. The IP address that the user is trying to connect to is 192.168.1.125.Which of the following is the MOST likely problem?

    • A.

      The firewall at the office is blocking the outgoing connection.

    • B.

      FTP client is not installed in the work computer.

    • C.

      FTP server is not installed on the home computer.

    • D.

      The IP address off the home computer is not routable across the Intemet.

    Correct Answer
    D. The IP address off the home computer is not routable across the Intemet.
    Explanation
    The most likely problem is that the IP address of the home computer (192.168.1.125) is not routable across the Internet. This is because the IP address falls within the range of private IP addresses, which are not directly accessible from the Internet. In order for the user to establish an FTP connection to the home computer, they would need to use a public IP address that is routable across the Internet.

    Rate this question:

  • 32. 

    QUESTION NO: 132 A company requires a hub and spoke WAN solution. Which of the following are BEST suited to meet this need? (Select THREE).

    • A.

      ISDN

    • B.

      MPLS

    • C.

      ADSL

    • D.

      SONET

    • E.

      Frame-relay

    • F.

      ATM

    • G.

      DOCSIS

    Correct Answer(s)
    B. MPLS
    E. Frame-relay
    F. ATM
    Explanation
    MPLS, Frame-relay, and ATM are all suitable for a hub and spoke WAN solution. MPLS (Multiprotocol Label Switching) is a scalable and flexible solution that allows for efficient routing of traffic between multiple locations. Frame-relay is a reliable and cost-effective solution for connecting multiple sites in a hub and spoke configuration. ATM (Asynchronous Transfer Mode) is a high-speed networking technology that supports voice, video, and data transmission, making it ideal for a hub and spoke network. ISDN, ADSL, SONET, and DOCSIS are not mentioned as suitable options for this specific requirement.

    Rate this question:

  • 33. 

    QUESTION NO: 133* Which of the following tools enables the technician to trace cables in multiple pair wiring?

    • A.

      Cable tester

    • B.

      Multimeter

    • C.

      Butt set

    • D.

      Toner probe

    Correct Answer
    D. Toner probe
    Explanation
    A toner probe is a tool that enables a technician to trace cables in multiple pair wiring. It works by sending a tone or signal through one end of the cable, and the technician can then use a probe to detect the signal at the other end of the cable. This allows the technician to identify the specific cable or pair of wires they are looking for, making it easier to troubleshoot and trace connections. A toner probe is a valuable tool for network or telecommunications technicians working with complex wiring systems.

    Rate this question:

  • 34. 

    QUESTION NO: 134* Which of the following is a routable public class A address?

    • A.

      10.0.0.255

    • B.

      19.16.18.255

    • C.

      10.0.0.10

    • D.

      19.16.18.1

    Correct Answer
    D. 19.16.18.1
  • 35. 

    QUESTION NO: 135* A technician wants to see how many server connections are open on a client machine. Which of the following is the command to see these connections?

    • A.

      Dig

    • B.

      Netstat

    • C.

      Nslookup

    • D.

      Arp

    Correct Answer
    B. Netstat
    Explanation
    The correct answer is "netstat". The netstat command is used to display active network connections, listening ports, and routing tables on a client machine. By running this command, the technician can see how many server connections are open on the client machine.

    Rate this question:

  • 36. 

    QUESTION NO: 136* A technician is creating a patch cable to connect two PC's for file sharing. Which of the following cables should the teclmician use?

    • A.

      Straight

    • B.

      Straight

    • C.

      Crossover

    • D.

      Rollover

    Correct Answer
    C. Crossover
    Explanation
    A crossover cable should be used to connect two PCs for file sharing. Unlike a straight cable, which is used to connect a PC to a router or switch, a crossover cable is specifically designed to connect two PCs directly to each other. This is necessary because PCs transmit and receive data on different pins, and a crossover cable allows the transmit pins on one PC to connect to the receive pins on the other PC, enabling direct communication between them.

    Rate this question:

  • 37. 

    QUESTION NO: 137 Which of the following is the maximum number of wire pairs that can be used in an RJ-11 connector?

    • A.

      8

    • B.

      2

    • C.

      6

    • D.

      4

    Correct Answer
    B. 2
    Explanation
    An RJ-11 connector is commonly used for telephone connections and typically has 6 positions and 2 contacts. Each contact can accommodate one wire pair, so the maximum number of wire pairs that can be used in an RJ-11 connector is 2.

    Rate this question:

  • 38. 

    QUESTION NO: 138* Which of the following is correct when converting 192 to binary?

    • A.

      00110000

    • B.

      00001100

    • C.

      11000000

    • D.

      00000011 b printers?

    Correct Answer
    C. 11000000
    Explanation
    When converting 192 to binary, the correct answer is 11000000. This is because in binary, each digit represents a power of 2. Starting from the right, the first digit represents 2^0, the second digit represents 2^1, the third digit represents 2^2, and so on. By adding the corresponding powers of 2 for each digit, we get the decimal value of 192. In this case, the binary representation of 192 is 11000000.

    Rate this question:

  • 39. 

    QUESTION NO: 139 Which of the following is the FIRST criterion used to select a nexthop from the routing table?

    • A.

      Lowest administrative distance

    • B.

      Greatest number of hops

    • C.

      Most precise matching prefix

    • D.

      The BGP route

    Correct Answer
    C. Most precise matching prefix
    Explanation
    The first criterion used to select a nexthop from the routing table is the most precise matching prefix. This means that the router will look for the route with the longest prefix match to the destination IP address. It will choose the route that has the most specific match, as this will provide the most accurate path to reach the destination.

    Rate this question:

  • 40. 

    QUESTION NO: 140* Which of the following is port 123 commonly used for?

    • A.

      IMAP4

    • B.

      HTTPS

    • C.

      NTP

    • D.

      DNS

    Correct Answer
    C. NTP
    Explanation
    Port 123 is commonly used for NTP (Network Time Protocol). NTP is a protocol used to synchronize the clocks of computers and other devices on a network. It is responsible for ensuring that all devices have accurate and synchronized time. By using port 123, NTP can communicate and exchange time information between devices, allowing them to maintain consistent and accurate timekeeping.

    Rate this question:

  • 41. 

    QUESTION NO: 141 A remote user cannot connect to the office via VPN. The user has established Internet connectivity. Which of the following is the MOST likely next step in troubleshooting?

    • A.

      Reinstall the VPN client at the remote computer.

    • B.

      Detennine if the VPN service is running at the office.

    • C.

      Power cycle the VPN concentrator at the office.

    • D.

      Determine if the user has the correct VPN address and password.

    Correct Answer
    D. Determine if the user has the correct VPN address and password.
    Explanation
    The most likely next step in troubleshooting is to determine if the user has the correct VPN address and password. This is because even though the user has established Internet connectivity, they may not be able to connect to the office via VPN if they are using incorrect VPN address or password. Reinstalling the VPN client, determining if the VPN service is running, or power cycling the VPN concentrator may not be necessary if the issue is simply due to incorrect VPN address or password.

    Rate this question:

  • 42. 

    QUESTION NO: 142* Which of the following would limit the availability of the types of sites that users on a LAN have access to?

    • A.

      A DNS server

    • B.

      A proxy server

    • C.

      A DC server

    • D.

      A DHCP server

    Correct Answer
    B. A proxy server
    Explanation
    A proxy server can limit the availability of the types of sites that users on a LAN have access to by acting as an intermediary between the users and the internet. It can filter and block certain websites based on predefined rules or policies set by the network administrator. By controlling and monitoring the traffic, a proxy server can restrict access to specific websites or categories of websites, ensuring that users can only access approved or permitted sites.

    Rate this question:

  • 43. 

    QUESTION NO: 143 Which of the following utilities will produce the results printed below? Tracing route to 172.30.0.78 over a maximum of 30 hops 1 <1 ms <1 ms l72.30.0.78

    • A.

      Arp

    • B.

      Tracert

    • C.

      Ping

    • D.

      Netstat

    Correct Answer
    B. Tracert
    Explanation
    The correct answer is "tracert". Tracert is a utility that is used to trace the route taken by packets across an IP network. It displays the path that packets take from the source to the destination, showing the IP addresses of each hop along the way. In this case, the result printed suggests that the packets reached the destination (172.30.0.78) in less than 1 millisecond, indicating a successful trace route.

    Rate this question:

  • 44. 

    QUESTION NO: 144* Which of the following would a network administrator MOST likely configure on a workstation to block certain websites and ports?

    • A.

      Network-based firewall

    • B.

      Antivirus service

    • C.

      Host-based firewall

    • D.

      Port scanner

    Correct Answer
    C. Host-based firewall
    Explanation
    A network administrator would most likely configure a host-based firewall on a workstation to block certain websites and ports. A host-based firewall is software that is installed on an individual computer and can be customized to block specific websites and ports based on the administrator's preferences. This type of firewall provides an additional layer of security for the workstation and allows the administrator to have more control over the network traffic and access to certain resources.

    Rate this question:

  • 45. 

    QUESTION NO: 145 A user is having intermittent problems connecting to their network shares. A network technician is able to determine that there is a problem within the network cabling in between the workstation and the switch. All other users are able to connect successfully to the network. Which of the following is the MOST likely cause?

    • A.

      Patch cable is a crossover cable instead of straight-through.

    • B.

      Cable is not punched down at the punch panel.

    • C.

      Cable has been cut somewhere within the wall.

    • D.

      Crosstalk and interference are occurring.

    Correct Answer
    D. Crosstalk and interference are occurring.
    Explanation
    The most likely cause for the intermittent problems connecting to the network shares is crosstalk and interference. This can disrupt the signal transmission between the workstation and the switch, leading to connectivity issues. The other options, such as using a crossover cable instead of a straight-through cable, not punching down the cable at the punch panel, or a cut cable within the wall, would result in a complete loss of connectivity rather than intermittent problems.

    Rate this question:

  • 46. 

    QUESTION NO: 146 Which of the following protocols provides a secure method to remotely administer a server?

    • A.

      HTTP

    • B.

      SFTP

    • C.

      SSH

    • D.

      Telnet

    Correct Answer
    C. SSH
    Explanation
    SSH (Secure Shell) is a protocol that provides a secure method to remotely administer a server. It encrypts the data transmitted between the client and the server, ensuring that it cannot be intercepted or tampered with by unauthorized users. This makes SSH a more secure alternative to protocols like Telnet, which transmit data in clear text. SFTP (Secure File Transfer Protocol) is a secure extension of FTP, used for transferring files securely over a network. HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting data over the internet, but it does not provide the same level of security as SSH.

    Rate this question:

  • 47. 

    QUESTION NO: 147 Which of the following is the maximum distance a 10GBase-EW connection can transmit with one repeater?

    • A.

      10,000 meters (32,808 feet)

    • B.

      80,000 meters (262,467 feet)

    • C.

      20,000 meters (65,616 feet)

    • D.

      40,000 meters (131 ,233 feet)

    Correct Answer
    B. 80,000 meters (262,467 feet)
    Explanation
    The correct answer is 80,000 meters (262,467 feet). This is the maximum distance that a 10GBase-EW connection can transmit with one repeater.

    Rate this question:

  • 48. 

    QUESTION NO: 148* On a Windows network, users are reporting that they cannot access any network resources. The users can ping the IP address and connect to the network resource using the IP address. Which off the following is the cause of the problem?

    • A.

      The domain controller is not responding

    • B.

      The DNS server is not resolving correctly

    • C.

      The DHCP server is not assigning correct IP addresses.

    • D.

      The file server is offline

    Correct Answer
    B. The DNS server is not resolving correctly
    Explanation
    The cause of the problem is that the DNS server is not resolving correctly. This means that the DNS server is not able to translate domain names into IP addresses, which is why the users are unable to access network resources by their names but can still connect using IP addresses.

    Rate this question:

  • 49. 

    QUESTION NO: 149* A network technician is assigned the task of  connecting two switches in two different wiring closets. Which of the following cable types is the appropriate choice?

    • A.

      Crossover

    • B.

      Loopback

    • C.

      568A

    • D.

      Rollover

    Correct Answer
    A. Crossover
    Explanation
    A crossover cable is the appropriate choice for connecting two switches in different wiring closets. A crossover cable is designed to connect two devices of the same type, such as switches, without the need for a hub or a switch in between. It allows for the exchange of data between the switches by swapping the transmit and receive pairs of wires. This enables the switches to communicate and share information effectively.

    Rate this question:

  • 50. 

    QUESTION NO: 150* Which of the following access methods is used for wireless medium access?

    • A.

      CSMA / CD

    • B.

      PPPoE

    • C.

      CSMA / CA

    • D.

      PPTP

    Correct Answer
    C. CSMA / CA
    Explanation
    CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is the correct answer. This access method is used for wireless medium access. It is a protocol used to avoid collisions in wireless networks by having devices listen before transmitting data. This helps to reduce the chances of data collisions and improves the overall efficiency of the wireless network.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 09, 2010
    Quiz Created by
    Rich70
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.