Network+ (N10-004) Quiz F

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rich70
R
Rich70
Community Contributor
Quizzes Created: 8 | Total Attempts: 1,977
Questions: 50 | Attempts: 145

SettingsSettingsSettings
Network+ (N10-004) Quiz F - Quiz


251-300


Questions and Answers
  • 1. 

    QUESTION NO: 251 Which of the following is the point when local exchange carrier responsibility ends?

    • A.

      Demarc

    • B.

      Point of Presence (POP)

    • C.

      Smart jack

    • D.

      MDF

    Correct Answer
    A. Demarc
    Explanation
    The point when local exchange carrier responsibility ends is known as the demarcation point or "demarc" for short. This is the point where the responsibility for the telephone or data line transitions from the service provider to the customer. At the demarc, the service provider's network ends and the customer's internal wiring begins. It is typically marked by a physical device or connection point where the service provider's line terminates and the customer's equipment is connected.

    Rate this question:

  • 2. 

    QUESTION NO: 252 A company would like to configure newsfeeds on the network for employees to be aware of internal company information. Which of the following ports would be used to allow news feeds to pass-through?

    • A.

      25

    • B.

      22

    • C.

      119

    • D.

      143

    Correct Answer
    C. 119
    Explanation
    Port 119 is the correct answer because it is the standard port used for Network News Transfer Protocol (NNTP), which is commonly used for news feeds. This port allows news articles and updates to be transmitted and received by clients, such as newsreader applications, allowing employees to stay informed about internal company information. Ports 25, 22, and 143 are used for other purposes such as email (SMTP), SSH (Secure Shell), and IMAP (Internet Message Access Protocol), respectively, and are not specifically designed for news feeds.

    Rate this question:

  • 3. 

    QUESTION NO: 253 A technician needs to change locations of a telephone between 66 blocks. Which of the following tools would be used in locating the positions in the cross connections?

    • A.

      Butt set

    • B.

      Cable tester

    • C.

      Toner probe

    • D.

      Voltage meter

    Correct Answer
    C. Toner probe
    Explanation
    A toner probe is used to locate the positions in the cross connections between 66 blocks. It is a tool that consists of a tone generator and a probe. The tone generator is connected to the telephone line at one end, and the probe is used to trace the tone on the other end. By using the toner probe, the technician can identify the specific cross connection point on the 66 block where the telephone is located.

    Rate this question:

  • 4. 

    QUESTION NO: 254 Which of the following commands would allow the technician to identify the currently assigned DNS server?

    • A.

      Nbtstat

    • B.

      Netstat

    • C.

      Dig

    • D.

      Nslookup

    Correct Answer
    D. Nslookup
    Explanation
    The nslookup command is used to query DNS servers and retrieve information about domain names, including the currently assigned DNS server. It allows the technician to identify the IP address of the DNS server that is currently being used for DNS resolution. This information can be helpful in troubleshooting network connectivity or DNS-related issues.

    Rate this question:

  • 5. 

    QUESTION NO: 255 Two ports on switch A are connected to switch B. The advanced switch feature that allows these ports to be combined and managed as a single entity is called:

    • A.

      Port mirroring.

    • B.

      Trunking

    • C.

      VLAN.

    • D.

      Spanning tree.

    Correct Answer
    B. Trunking
    Explanation
    Trunking is the advanced switch feature that allows two ports on switch A to be combined and managed as a single entity. Trunking enables the transmission of multiple VLANs over a single physical link, increasing network efficiency and reducing the number of required physical connections. This feature is commonly used in larger networks where there is a need to consolidate and manage multiple connections between switches.

    Rate this question:

  • 6. 

    QUESTION NO: 256 Which of the following IEEE standards has a maximum bandwidth of 54Mbps operating at 5GHz?

    • A.

      802.11g

    • B.

      802. 11a

    • C.

      802.11b

    • D.

      802.11

    Correct Answer
    B. 802. 11a
    Explanation
    The correct answer is 802.11a. This standard has a maximum bandwidth of 54Mbps and operates at 5GHz. 802.11g has a maximum bandwidth of 54Mbps but operates at 2.4GHz. 802.11b has a maximum bandwidth of 11Mbps and also operates at 2.4GHz. 802.11 is a general term that encompasses all the different IEEE standards for wireless networking.

    Rate this question:

  • 7. 

    QUESTION NO: 257 Which of the following is the recommended maximum distance CAT6 cable should be run?

    • A.

      246 feet (75 meters)

    • B.

      100 feet (30.5 meters)

    • C.

      328 feet (100 meters)

    • D.

      292 feet (89 meters)

    Correct Answer
    C. 328 feet (100 meters)
    Explanation
    The recommended maximum distance that CAT6 cable should be run is 328 feet (100 meters). This is because CAT6 cable is designed to support higher bandwidth and faster data transmission compared to previous versions of Ethernet cable. Beyond this recommended distance, there may be a decrease in signal quality and potential for data loss or interference. Therefore, it is important to adhere to this maximum distance guideline to ensure optimal performance of the CAT6 cable.

    Rate this question:

  • 8. 

    QUESTION NO: 258 A user calls saying they are having issues connecting to the Intenet, but they are able to connect to the email server. Which of the following commands would the user type in at the command prompt to display the MAC address?

    • A.

      Ipconfig

    • B.

      Arp-s

    • C.

      Arp-a

    • D.

      Nbtstat -R

    Correct Answer
    C. Arp-a
    Explanation
    The correct answer is "arp-a". The "arp-a" command is used to display the ARP (Address Resolution Protocol) cache, which contains the mappings of IP addresses to MAC addresses. By using this command, the user can verify if their device has the correct MAC address for the default gateway or any other network device. This can help troubleshoot connectivity issues by ensuring that the device is communicating with the correct network devices.

    Rate this question:

  • 9. 

    QUESTION NO: 259 Which of the following is a utility that translates the physical network address to its IP address?

    • A.

      Nslookup

    • B.

      Ping

    • C.

      Rarp

    • D.

      Netstat

    Correct Answer
    C. Rarp
    Explanation
    RARP (Reverse Address Resolution Protocol) is a utility that translates the physical network address to its IP address. It is used to find the IP address of a device when only the physical address (MAC address) is known. RARP is the opposite of ARP (Address Resolution Protocol), which translates IP addresses to physical addresses. Therefore, the correct answer is RARP.

    Rate this question:

  • 10. 

    QUESTION NO: 260 Which of the following cable standards has the highest effective range at a greater expense?

    • A.

      LOOOBase-T

    • B.

      IOOOBase-LX

    • C.

      IOOOBase-CX

    • D.

      LOOOBase-SX

    Correct Answer
    B. IOOOBase-LX
    Explanation
    IOOOBase-LX is the correct answer because it has the highest effective range compared to the other cable standards mentioned. It is a fiber optic cable standard that can transmit data up to 10 kilometers, whereas the other cable standards have shorter ranges. However, IOOOBase-LX is more expensive than the other options, making it a trade-off between cost and range.

    Rate this question:

  • 11. 

    QUESTION NO: 261 Which of the following technologies is BEST suited for a point-to-point circuit that is 6 kilometers (3 .7 miles) in distance?

    • A.

      LOGBase-T

    • B.

      LOGBase-ER

    • C.

      IOGBase-SR

    • D.

      LOGBase-LR

    Correct Answer
    D. LOGBase-LR
    Explanation
    The best technology suited for a point-to-point circuit that is 6 kilometers in distance is lOGBase-LR. This technology is designed for long-range connections, making it suitable for the given distance. lOGBase-T is for short-range connections, lOGBase-ER is for extended-range connections, and lOGBase-SR is for short-range connections over fiber optics.

    Rate this question:

  • 12. 

    QUESTION NO: 262 Which of the following frequency ranges does 802.11a operate at?

    • A.

      4.9GHz

    • B.

      5GHz

    • C.

      54GHz

    • D.

      2.4GHz

    Correct Answer
    B. 5GHz
    Explanation
    802.11a operates at the frequency range of 5GHz. This frequency range allows for faster data transmission and reduces interference from other devices that operate on the 2.4GHz frequency range, such as cordless phones and microwaves. The higher frequency also allows for more channels to be available, which increases the overall capacity and performance of the wireless network.

    Rate this question:

  • 13. 

    QUESTION NO: 263 Which of the following protocols provides the actual encryption used over VPN?

    • A.

      PPP

    • B.

      HTTPS

    • C.

      PPTP

    • D.

      SSH

    Correct Answer
    C. PPTP
    Explanation
    PPTP (Point-to-Point Tunneling Protocol) is the correct answer because it provides the actual encryption used over VPN. PPTP creates a secure tunnel between the client and the server, encrypting the data that is transmitted over the VPN connection. PPP (Point-to-Point Protocol) is a data link protocol but does not provide encryption. HTTPS (Hypertext Transfer Protocol Secure) is a protocol used for secure communication over a network, but it is not specific to VPN encryption. SSH (Secure Shell) is a cryptographic network protocol used for secure remote access, but it is not specific to VPN encryption.

    Rate this question:

  • 14. 

    QUESTION NO: 264 Which of the following features of a switch will allow two switches to pass network infonnation?

    • A.

      Disabling the routing protocols

    • B.

      Port speeds

    • C.

      Trunking

    • D.

      PoE

    Correct Answer
    C. Trunking
    Explanation
    Trunking is a feature of a switch that allows two switches to pass network information. Trunking is used to combine multiple network connections into a single logical connection, which increases bandwidth and efficiency. It allows for the transmission of multiple VLANs (Virtual Local Area Networks) over a single physical link, enabling switches to exchange network information and communicate with each other effectively. Disabling routing protocols, port speeds, and PoE (Power over Ethernet) are not directly related to the ability of switches to pass network information.

    Rate this question:

  • 15. 

    QUESTION NO: 265 Which of the following tools can send a signal down a cable and measure how long it takes to comeback?

    • A.

      Multimeter

    • B.

      Voltage event recorder

    • C.

      TDR

    • D.

      Toner probe

    Correct Answer
    C. TDR
    Explanation
    A Time Domain Reflectometer (TDR) is a tool that can send a signal down a cable and measure how long it takes to come back. This is done by sending an electrical pulse down the cable and analyzing the reflections that occur when the pulse encounters impedance mismatches or faults in the cable. By measuring the time it takes for the reflections to return, the TDR can determine the length of the cable and locate any faults or discontinuities.

    Rate this question:

  • 16. 

    QUESTION NO: 266 A technician needs to connect a laptop via the small office, home office (SOHO)wireless access point. When the technician does a site survey using the laptop the wireless network is not discovered. Computers previously on the wireless network were connected, and the wireless card appears to be working. Which of the following could be causing the issue?

    • A.

      The SSID is set to not broadcast.

    • B.

      The wireless router does not have adequate AC power.

    • C.

      The WEP key is not correct.

    • D.

      The laptop is running on Windows Service Pack 1.

    Correct Answer
    A. The SSID is set to not broadcast.
    Explanation
    The reason for the issue could be that the SSID (Service Set Identifier) is set to not broadcast. This means that the wireless network's name is hidden and not visible during a site survey. Even though the wireless card on the laptop is working, it cannot detect the network because it is not broadcasting its SSID.

    Rate this question:

  • 17. 

    QUESTION NO: 267 A technician has determined that a single computer has suddenly lost network connectivity. Which of the following should be the next troubleshooting step the technician should take?

    • A.

      Determine if escalation is necessary.

    • B.

      Determine if anything has changed.

    • C.

      Identify the affected areas of the network.

    • D.

      Establish the most probable cause.

    Correct Answer
    B. Determine if anything has changed.
    Explanation
    The next troubleshooting step the technician should take is to determine if anything has changed. This is because sudden loss of network connectivity can often be attributed to recent changes in the computer's configuration or network settings. By identifying any recent changes, the technician can narrow down the potential causes of the issue and focus their troubleshooting efforts more effectively.

    Rate this question:

  • 18. 

    QUESTION NO: 268 A company has installed a new 802.11g point-to-point connection between two buildings and is experiencing low throughput across the link. The current setup involves a wireless bridge on the roof with an omni-directional antenna. Which of the following would BEST improve the link perfonnance?

    • A.

      Replace the omni-directional antennas with Yagi antennas.

    • B.

      Configure channel hopping on both wireless bridges.

    • C.

      Replace the wireless bridges with wireless access points.

    • D.

      Install bi-directional amplifiers at both sites.

    Correct Answer
    A. Replace the omni-directional antennas with Yagi antennas.
    Explanation
    Replacing the omni-directional antennas with Yagi antennas would be the best solution to improve the link performance. Yagi antennas are directional antennas that focus the signal in a specific direction, allowing for a stronger and more focused connection between the two buildings. This would help to reduce interference and increase the throughput across the link.

    Rate this question:

  • 19. 

    QUESTION NO: 269 A users workstation is able to resolve IP addresses of any host, and can ping other workstations on the local subnet, but is unable to ping addresses on other subnets. Which of the following is the MOST likely cause of the problem?

    • A.

      The workstation is configured with an incorrect subnet mask.

    • B.

      The workstation is configured with the incorrect default gateway.

    • C.

      The workstations NIC is configured for a different port speed than the switch.

    • D.

      The workstation is assigned to the incorrect VLAN.

    Correct Answer
    B. The workstation is configured with the incorrect default gateway.
    Explanation
    The most likely cause of the problem is that the workstation is configured with the incorrect default gateway. The default gateway is the IP address of the router that connects the local subnet to other subnets. If the workstation has the wrong default gateway configured, it will not be able to send packets to other subnets, resulting in the inability to ping addresses on other subnets.

    Rate this question:

  • 20. 

    QUESTION NO: 270 The 66 block termination point is:

    • A.

      CAT3 compliant.

    • B.

      Coaxial compliant.

    • C.

      CAT6 compliant.

    • D.

      IEEE 1394 compliant.

    Correct Answer
    A. CAT3 compliant.
    Explanation
    The 66 block termination point is CAT3 compliant. This means that it is designed to handle and support CAT3 cables, which are commonly used for voice and data transmission in telecommunications and networking applications. CAT3 cables have a maximum data transfer rate of 10 Mbps and are suitable for applications such as telephone systems and Ethernet networks.

    Rate this question:

  • 21. 

    QUESTION NO: 271 A network using RIP has taken several minutes to begin routing traffic around a failed piece of equipment. Which of the following could be implemented to improve convergence time?

    • A.

      Replace RIP with adistance-vector routing protocol such as RIP version 2.

    • B.

      Replace RIP with an exterior gateway protocol such as BGP.

    • C.

      Replace RIP with static route s so dynamic updates are not sent.

    • D.

      Replace RIP with alink-state routing protocol such as OSPF.

    Correct Answer
    D. Replace RIP with alink-state routing protocol such as OSPF.
    Explanation
    Replacing RIP with a link-state routing protocol such as OSPF would improve convergence time in the network. Link-state routing protocols use a more efficient and accurate method of exchanging routing information, which allows them to quickly adapt to changes in the network topology. This means that when a piece of equipment fails, OSPF would be able to identify the failure and reroute traffic much faster than RIP.

    Rate this question:

  • 22. 

    QUESTION NO: 272 Which of the following devices is used to connect a WAN to a LAN?

    • A.

      Basic router

    • B.

      Repeater

    • C.

      Bridge

    • D.

      Basic switch

    Correct Answer
    A. Basic router
    Explanation
    A basic router is used to connect a wide area network (WAN) to a local area network (LAN). Routers are networking devices that forward data packets between networks, allowing devices on different networks to communicate with each other. In this case, the basic router would be used to connect the LAN to the WAN, enabling devices on the LAN to access the resources and services available on the WAN.

    Rate this question:

  • 23. 

    QUESTION NO: 273 Routing convergence time is which of the following?

    • A.

      Time required for an IDS to detect suspicious software

    • B.

      Time required by switch ports to update their link status and transition to the forwarding state

    • C.

      Time required for a VPN connection to occur

    • D.

      Time required by protocols to update their forwarding tables after changes have occured

    Correct Answer
    D. Time required by protocols to update their forwarding tables after changes have occured
    Explanation
    The correct answer is "Time required by protocols to update their forwarding tables after changes have occurred." Routing convergence time refers to the time it takes for routing protocols to update their forwarding tables after changes have occurred in the network. This includes updating routes, calculating new paths, and redistributing this information to other routers in the network. It is an important factor in network performance and can affect the overall efficiency and stability of the network.

    Rate this question:

  • 24. 

    QUESTION NO: 274 A new business with five computers moves into an office where coaxial cable exists. In order to use the existing infrastucture, which of the following topologies would be used?

    • A.

      Spanning Tree

    • B.

      Star

    • C.

      Mesh

    • D.

      Bus

    Correct Answer
    D. Bus
    Explanation
    In order to use the existing coaxial cable infrastructure, the most suitable topology would be the Bus topology. In a Bus topology, all devices are connected to a single cable, which acts as a shared communication medium. Each device can transmit data onto the cable, and all other devices on the network can receive that data. This topology is cost-effective and easy to install, making it a good choice for a small business with existing coaxial cable infrastructure.

    Rate this question:

  • 25. 

    QUESTION NO: 275 A company is in the process of upgrading their network infrastructure to support new VoIP telephony equipment. Which of the following is a primary feature to consider when selecting a new switch to support the phones?

    • A.

      Port mirroring

    • B.

      PoE

    • C.

      VPN capability

    • D.

      Modular chassis

    Correct Answer
    B. PoE
    Explanation
    When selecting a new switch to support VoIP telephony equipment, a primary feature to consider is Power over Ethernet (PoE). PoE allows the switch to provide power to the VoIP phones through the Ethernet cables, eliminating the need for separate power cables and adapters. This simplifies installation and reduces clutter. Without PoE, the phones would require an additional power source, which can be inconvenient and may limit the placement options for the phones. Therefore, PoE is an important feature to ensure the smooth operation of the VoIP telephony system.

    Rate this question:

  • 26. 

    QUESTION NO: 276 Which of the following protocols are used to transfer files between two systems?(Select TWO).

    • A.

      RIP

    • B.

      SCP

    • C.

      FTP

    • D.

      NTP

    • E.

      SNMP

    Correct Answer(s)
    B. SCP
    C. FTP
    Explanation
    The correct answer is SCP and FTP. SCP (Secure Copy Protocol) is a network protocol that allows secure file transfer between hosts. It uses SSH (Secure Shell) for authentication and encryption. FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. It provides a reliable and efficient way to transfer files and supports various operations such as uploading, downloading, and deleting files.

    Rate this question:

  • 27. 

    QUESTION NO: 277 Which of the following network devices would a network administrator use to create a DMZ?

    • A.

      Host -based firewall

    • B.

      File server

    • C.

      Network-based firewall

    • D.

      WINS server

    Correct Answer
    C. Network-based firewall
    Explanation
    A network administrator would use a network-based firewall to create a DMZ. A DMZ (demilitarized zone) is a separate network that sits between the internal network and the external network (usually the internet). It is used to host public-facing services, such as web servers, while keeping them isolated from the internal network for security purposes. A network-based firewall is specifically designed to filter and control network traffic, making it an ideal choice for creating and securing a DMZ.

    Rate this question:

  • 28. 

    QUESTION NO: 278 Which of the following tools are needed to create a CAT5e crossover cable?(Select TWO).

    • A.

      Snips

    • B.

      Cable crimper

    • C.

      TDR

    • D.

      Multimeter

    • E.

      OTDR

    Correct Answer(s)
    A. Snips
    B. Cable crimper
    Explanation
    To create a CAT5e crossover cable, you would need snips and a cable crimper. Snips are necessary to cut the CAT5e cable to the desired length, while a cable crimper is required to attach the RJ-45 connectors to the cable ends. TDR (Time Domain Reflectometer), multimeter, and OTDR (Optical Time Domain Reflectometer) are not needed for creating a crossover cable.

    Rate this question:

  • 29. 

    QUESTION NO: 279 A technician received a call from a remote user who is having issues connecting to a new VPN. Which of the following is the FIRST step the technician should take?

    • A.

      Document the solution and process

    • B.

      Identify the symptoms and potential causes

    • C.

      Establish what has changed

    • D.

      Implement an action plan

    Correct Answer
    B. Identify the symptoms and potential causes
    Explanation
    The technician should first identify the symptoms and potential causes of the issue. This step is important in order to understand the root cause of the problem and determine the appropriate solution. By identifying the symptoms, the technician can gather information about the specific issues the user is facing. Then, by exploring potential causes, the technician can narrow down the possible reasons for the problem and develop an effective troubleshooting plan.

    Rate this question:

  • 30. 

    QUESTION NO: 280 A technician installed a new wireless router. The customer is now having a problem playing online games, but they can connect to websites. Which of the following should the technician configure to resolve this problem?

    • A.

      Port forwarding

    • B.

      SSID

    • C.

      MAC filtering

    • D.

      Antenna placement

    Correct Answer
    A. Port forwarding
    Explanation
    To resolve the customer's problem with playing online games, the technician should configure port forwarding. Port forwarding allows specific ports or protocols to be directed to a specific device on the network, in this case, the customer's gaming console or computer. By configuring port forwarding, the technician can ensure that the necessary ports for online gaming are open and properly directed to the customer's device, allowing them to play games without any issues.

    Rate this question:

  • 31. 

    QUESTION NO: 281 Which of the following is an advantage of  lOOBase-T over lOOBase-FX?

    • A.

      Uses a more flexible cable

    • B.

      Faster transmission speeds

    • C.

      Longer cable runs

    • D.

      Can be used in a topology

    Correct Answer
    A. Uses a more flexible cable
    Explanation
    The advantage of using a more flexible cable in lOOBase-T over lOOBase-FX is that it allows for easier installation and flexibility in network design. The more flexible cable used in lOOBase-T, such as twisted pair cables, can be easily routed and maneuvered around obstacles, making it more convenient for network setups in various environments. On the other hand, lOOBase-FX uses fiber optic cables which are less flexible and may require more careful planning and installation.

    Rate this question:

  • 32. 

    QUESTION NO: 282 Which of the following cable types are the MOST widely used in a corporate gigabit network scheme?

    • A.

      CAT5

    • B.

      CAT1

    • C.

      CAT3

    • D.

      CAT6

    Correct Answer
    D. CAT6
    Explanation
    CAT6 cables are the most widely used in a corporate gigabit network scheme because they offer higher bandwidth and faster data transmission speeds compared to CAT5, CAT1, and CAT3 cables. CAT6 cables are designed to support gigabit Ethernet and can handle higher frequencies, resulting in better performance and less signal loss. They are also backward compatible with previous cable types, making them a popular choice for upgrading existing network infrastructure.

    Rate this question:

  • 33. 

    QUESTION NO: 283 Which of the following LAN types would utilize CAT5 UTP?

    • A.

      100Base-TX

    • B.

      I000Base-T

    • C.

      100Base-FX

    • D.

      LOGBase-SR

    Correct Answer
    A. 100Base-TX
    Explanation
    CAT5 UTP (Unshielded Twisted Pair) is a type of Ethernet cable that is commonly used for LAN (Local Area Network) connections. It is capable of supporting data transfer speeds of up to 100 Mbps (megabits per second). Among the given LAN types, 100Base-TX is the only one that would utilize CAT5 UTP. 100Base-TX is a standard for Fast Ethernet, which uses two pairs of twisted-pair wires for transmitting and receiving data. Therefore, the correct answer is 100Base-TX.

    Rate this question:

  • 34. 

    QUESTION NO: 284 A network administrator configured several network devices earlier today, but now the Internet is no longer available to several users. Which of the following logs should the network administrator reference to help identify the problem?

    • A.

      Phone logs

    • B.

      Event logs

    • C.

      History logs

    • D.

      Application logs

    Correct Answer
    C. History logs
    Explanation
    The network administrator should reference the history logs to help identify the problem. History logs provide a record of past events and actions taken on the network devices. By reviewing the history logs, the administrator can determine if any recent changes or configurations may have caused the loss of internet connectivity for the users. This can help in troubleshooting and resolving the issue effectively.

    Rate this question:

  • 35. 

    QUESTION NO: 285 Which of the following devices would be used to connect different broadcast domains in order to allow them to communicate with each other?

    • A.

      Bridge

    • B.

      Layer 2 switch

    • C.

      Hub

    • D.

      Multilayer switch

    Correct Answer
    D. Multilayer switch
    Explanation
    A multilayer switch would be used to connect different broadcast domains and allow them to communicate with each other. Unlike a bridge or a layer 2 switch, which operate at the data link layer and can only forward packets within the same broadcast domain, a multilayer switch operates at both the data link layer and the network layer. This means that it can not only forward packets within a broadcast domain but also route packets between different broadcast domains, enabling communication between them. A hub, on the other hand, simply broadcasts all incoming packets to all connected devices without any intelligence or segmentation.

    Rate this question:

  • 36. 

    QUESTION NO: 286 Enabling MAC address filtering on a switch can be used to mitigate which of the following security threats?

    • A.

      Rogue access points

    • B.

      Viruses

    • C.

      Social engineering

    • D.

      Worms

    Correct Answer
    A. Rogue access points
    Explanation
    Enabling MAC address filtering on a switch can be used to mitigate the security threat of rogue access points. MAC address filtering allows the switch to only allow specific devices with approved MAC addresses to connect to the network. By implementing this security measure, unauthorized devices, such as rogue access points, will be prevented from connecting to the network, reducing the risk of unauthorized access and potential security breaches.

    Rate this question:

  • 37. 

    QUESTION NO: 287 Which of the following mechanisms is used to calculate back-off time on an Ethernet link after a collision?

    • A.

      CSMA/CD

    • B.

      CSMA/CA

    • C.

      Spanning Tree

    • D.

      Weighted Random Early Detect (WRED)

    Correct Answer
    A. CSMA/CD
    Explanation
    CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is the correct answer. This mechanism is used in Ethernet networks to avoid collisions between data packets. When a collision occurs, CSMA/CD initiates a back-off time, during which the devices involved in the collision wait before attempting to retransmit their packets. This back-off time is calculated using a random algorithm to prevent repeated collisions. CSMA/CD is an important component of Ethernet networks, ensuring efficient and reliable data transmission.

    Rate this question:

  • 38. 

    QUESTION NO: 288 Which of the following is an advantage of  lOOBase-FX over IOOBase-TX?

    • A.

      Faster transmission speeds

    • B.

      Longer cable runs

    • C.

      Uses a more durable cable

    • D.

      Ease of installation

    Correct Answer
    B. Longer cable runs
    Explanation
    lOOBase-FX has an advantage over lOOBase-TX in terms of longer cable runs. This means that lOOBase-FX can transmit data over a greater distance compared to lOOBase-TX.

    Rate this question:

  • 39. 

    QUESTION NO: 289 At which of the following layers of the OSI model would a repeater operate?

    • A.

      Layer 7

    • B.

      Layer 5

    • C.

      Layer 3

    • D.

      Layer 1

    Correct Answer
    D. Layer 1
    Explanation
    A repeater operates at Layer 1 of the OSI model, which is the Physical layer. The Physical layer is responsible for transmitting raw bit streams over a physical medium, such as copper or fiber optic cables. A repeater receives a weak or degraded signal and regenerates it to boost the signal strength and extend the distance over which the signal can be transmitted. Therefore, a repeater operates at the lowest layer of the OSI model, which deals with the physical transmission of data.

    Rate this question:

  • 40. 

    QUESTION NO: 290 Which of the following documentations would a network technician find ports that a company has blocked?

    • A.

      Policies, procedures and configurations

    • B.

      Baseline reports

    • C.

      Network wiring schematics

    • D.

      RFC

    Correct Answer
    A. Policies, procedures and configurations
    Explanation
    A network technician would find the ports that a company has blocked in the policies, procedures, and configurations documentation. This documentation provides information on the rules and restrictions set by the company regarding network access and security. It includes details on which ports are blocked or restricted to ensure the network's integrity and protect against potential threats.

    Rate this question:

  • 41. 

    QUESTION NO: 291 A technician is troubleshooting a printer problem in a SOHO enviromnent. The printer is connected to the network and the computers can print using TCP/IP directly. The computers were able to print the day before, but now they cannot. Which of the following setups would aid in preventing this problem?

    • A.

      Set up the printer on a public IP address.

    • B.

      Configure the printer to use an APIPA

    • C.

      Change the printer setting to use multicast.

    • D.

      Place the printer on a static IP address.

    Correct Answer
    D. Place the printer on a static IP address.
    Explanation
    Placing the printer on a static IP address would prevent the problem of the computers being unable to print. By assigning a static IP address to the printer, it ensures that the IP address does not change, allowing the computers to consistently connect to the printer. This is especially important in a SOHO environment where there may not be a dedicated network administrator to manage IP address assignments.

    Rate this question:

  • 42. 

    QUESTION NO: 292 Which of the following systems detects and reports attempts of unauthorized access to the network?

    • A.

      Host -based firewall

    • B.

      Basic firewall

    • C.

      IDS

    • D.

      IPS

    Correct Answer
    C. IDS
    Explanation
    An Intrusion Detection System (IDS) is a system that detects and reports attempts of unauthorized access to a network. It monitors network traffic and analyzes it for any suspicious or malicious activity. Unlike a firewall, which primarily focuses on blocking or allowing network traffic based on predefined rules, an IDS is designed to detect and alert administrators about potential security breaches. An IDS can help identify and respond to unauthorized access attempts, providing an additional layer of security to the network.

    Rate this question:

  • 43. 

    QUESTION NO: 293 .Which of the following software types would BEST be used at identifying and reacting to an attack by shutting down a port or dropping certain types of packets?

    • A.

      Port scanner

    • B.

      IPS

    • C.

      Packet sniffer

    • D.

      IDS

    Correct Answer
    B. IPS
    Explanation
    An Intrusion Prevention System (IPS) would be the best software type for identifying and reacting to an attack by shutting down a port or dropping certain types of packets. IPS is designed to monitor network traffic, detect potential threats or attacks, and take proactive measures to prevent them. It can analyze network packets in real-time, identify malicious activity, and respond by blocking or dropping the suspicious packets or closing the affected ports. This helps to protect the network and prevent further damage or unauthorized access.

    Rate this question:

  • 44. 

    QUESTION NO: 294 A user reports that the wireless network is slow and is able to see and access shared folders that are unknown to the user. Which of the following is the cause of the problem?

    • A.

      The wireless NIC is defective.

    • B.

      Wireless router is improperly configured.

    • C.

      The user is connecting to the wrong SSID.

    • D.

      The SSID broadcast is disabled.

    Correct Answer
    C. The user is connecting to the wrong SSID.
    Explanation
    The correct answer is "The user is connecting to the wrong SSID." This is the cause of the problem because if the user is connecting to the wrong SSID, they will be accessing a different wireless network than intended. This can result in slower network speeds and accessing shared folders that are unknown to the user, as they are connecting to a different network with different settings and permissions.

    Rate this question:

  • 45. 

    QUESTION NO: 295 Which of the following WAN technologies provides a 45Mbps circuit over TDM equipment?

    • A.

      SONET

    • B.

      E3

    • C.

      T3

    • D.

      OC-12

    Correct Answer
    C. T3
    Explanation
    T3 is the correct answer because it provides a 45Mbps circuit over TDM (Time Division Multiplexing) equipment. T3 is a high-speed digital transmission line that uses DS3 (Digital Signal 3) technology to achieve this speed. SONET, E3, and OC-12 are not capable of providing a 45Mbps circuit over TDM equipment.

    Rate this question:

  • 46. 

    QUESTION NO: 296 A new virus was just released and has infected several workstations. A technician receives a newly released patch. Which of the following troubleshooting steps should the technician take FIRST?

    • A.

      Implement an action plan

    • B.

      Document the solution

    • C.

      Apply the patch as quickly as possible

    • D.

      Wait for the virus definitions to be updated

    Correct Answer
    A. Implement an action plan
    Explanation
    The technician should first implement an action plan. This is the first step because it allows the technician to assess the situation, prioritize tasks, and create a plan of action to address the virus infection. By implementing an action plan, the technician can ensure that the necessary steps are taken in a systematic and organized manner to effectively mitigate the impact of the virus on the workstations.

    Rate this question:

  • 47. 

    QUESTION NO: 297 The network amninistrator needs to use an IP addressing method that will not require manual updating. Which of the following should be used?

    • A.

      Static

    • B.

      Dynamic

    • C.

      TCP

    • D.

      Multiple

    Correct Answer
    B. Dynamic
    Explanation
    Dynamic IP addressing should be used by the network administrator because it does not require manual updating. With dynamic addressing, IP addresses are automatically assigned to devices on the network by a DHCP (Dynamic Host Configuration Protocol) server. This allows for easier management and scalability as devices can be added or removed from the network without the need for manual configuration.

    Rate this question:

  • 48. 

    QUESTION NO: 298 Which of the following logical topologies uses centralized authentication?

    • A.

      Peer -to-peer

    • B.

      Client/server

    • C.

      VPN

    • D.

      VLAN

    Correct Answer
    B. Client/server
    Explanation
    The client/server logical topology uses centralized authentication. In a client/server network, there is a central server that manages and controls access to resources. The server authenticates users and grants them access based on their credentials. This centralized authentication ensures that only authorized users can access the network resources, providing a higher level of security and control. In contrast, peer-to-peer, VPN, and VLAN topologies do not necessarily have centralized authentication mechanisms.

    Rate this question:

  • 49. 

    QUESTION NO: 299 Which of the following command and switch combination would provide the following output? Interface: 172.30.0.102 --- Ox2 Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic

    • A.

      Arp-s

    • B.

      Netstat -a

    • C.

      Arp-a

    • D.

      Netstat -s

    Correct Answer
    C. Arp-a
    Explanation
    The command "arp-a" is used to display the ARP (Address Resolution Protocol) cache table on a Windows system. It provides the output of the interface with the IP address 172.30.0.102 and its corresponding physical address (MAC address) 00-30-48-82-72-8c. This command is used to view the mapping between IP addresses and MAC addresses in the local network.

    Rate this question:

  • 50. 

    QUESTION NO: 300 A second network card in a server that activates if the primary card fails is an example of which of the following network performance optimization?

    • A.

      Fault tolerance

    • B.

      High availability

    • C.

      QoS

    • D.

      Load balancing

    Correct Answer
    A. Fault tolerance
    Explanation
    A second network card in a server that activates if the primary card fails is an example of fault tolerance. Fault tolerance refers to the ability of a system to continue functioning even in the presence of hardware or software failures. In this case, having a second network card ensures that the server can maintain network connectivity even if the primary card fails, thus providing fault tolerance.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 14, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 24, 2010
    Quiz Created by
    Rich70
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.