Network+ (N10-004) Quiz J

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rich70
R
Rich70
Community Contributor
Quizzes Created: 8 | Total Attempts: 1,977
Questions: 40 | Attempts: 379

SettingsSettingsSettings
Network Plus Quizzes & Trivia

451- 490


Questions and Answers
  • 1. 

    QUESTION NO: 451 Which of the following would a technician need to install to connect a fiber NIC to an Ethernet backbone?

    • A.

      Hub

    • B.

      Media converter

    • C.

      Repeater

    • D.

      Bridge

    Correct Answer
    B. Media converter
    Explanation
    A technician would need to install a media converter to connect a fiber NIC to an Ethernet backbone. A media converter is a device that converts the signals between fiber optic cables and Ethernet cables, allowing for the transmission of data between the two types of networks. This is necessary because fiber optic cables use light signals to transmit data, while Ethernet cables use electrical signals. Therefore, a media converter is needed to convert the signals from one type to another, enabling the connection between the fiber NIC and the Ethernet backbone.

    Rate this question:

  • 2. 

    QUESTION NO: 452 Which of the following protocols describes a connectionless state and does not use acknowledgements?

    • A.

      POP3

    • B.

      UDP

    • C.

      NTP

    • D.

      TCP

    Correct Answer
    B. UDP
    Explanation
    UDP (User Datagram Protocol) is a connectionless protocol that does not use acknowledgements. It is a simple, lightweight protocol that operates at the transport layer of the OSI model. UDP does not establish a connection before sending data and does not guarantee the delivery of packets. It is commonly used for applications that require low latency and can tolerate packet loss, such as streaming media and online gaming. Unlike TCP, which is a connection-oriented protocol that ensures reliable data transmission, UDP is faster but less reliable.

    Rate this question:

  • 3. 

    QUESTION NO: 453 Which of the following protocols maps an IP address to a MAC address?

    • A.

      RARP

    • B.

      DHCP

    • C.

      NTP

    • D.

      ARP

    Correct Answer
    D. ARP
    Explanation
    ARP (Address Resolution Protocol) is the correct answer because it is a protocol used to map an IP address to a MAC address. It is responsible for finding the MAC address of a device on a local network when only the IP address is known. ARP operates at the data link layer of the OSI model and is used by devices to communicate with each other on a local network.

    Rate this question:

  • 4. 

    QUESTION NO:454 Which of the following utilities shows the relationship between a MAC address and the corresponding IP address?

    • A.

      Arp

    • B.

      Nslookup

    • C.

      Ipconfig

    • D.

      Tracert

    Correct Answer
    A. Arp
    Explanation
    The utility that shows the relationship between a MAC address and the corresponding IP address is "arp". The Address Resolution Protocol (ARP) is used to map an IP address to a MAC address in a local network. It allows devices to communicate with each other by resolving the IP address to the corresponding MAC address. This is essential for sending data packets across the network.

    Rate this question:

  • 5. 

    QUESTION NO: 455 A network technician has discovered that passwords are being sent unencrypted over the network. Which of the following network monitoring utilities was used?

    • A.

      Throughput tester

    • B.

      Packet sniffer

    • C.

      VPN concentrator

    • D.

      Network scanner

    Correct Answer
    B. Packet sniffer
    Explanation
    A packet sniffer is a network monitoring utility that captures and analyzes network traffic. It allows the network technician to intercept and examine the packets being sent over the network, including any unencrypted passwords. By using a packet sniffer, the technician can identify any security vulnerabilities and take appropriate measures to secure the network.

    Rate this question:

  • 6. 

    QUESTION NO: 456 Which of the following advanced features prevents switching loops by using a preferred path?

    • A.

      Spanning tree

    • B.

      VLAN

    • C.

      Port bonding

    • D.

      Port authentication

    Correct Answer
    A. Spanning tree
    Explanation
    The correct answer is Spanning tree. Spanning tree is an advanced feature that prevents switching loops by creating a loop-free logical topology. It does this by selectively blocking redundant paths and allowing only a preferred path for data transmission. This ensures that there are no loops in the network, which can cause broadcast storms and degrade network performance. VLAN, port bonding, and port authentication are not specifically designed to prevent switching loops.

    Rate this question:

  • 7. 

    QUESTION NO: 457 Which of the following port numbers does SSH use?

    • A.

      21

    • B.

      22

    • C.

      23

    • D.

      20

    Correct Answer
    B. 22
    Explanation
    SSH (Secure Shell) is a network protocol used for secure remote login and file transfer. It operates on port number 22, which is the correct answer. Port number 21 is used for FTP (File Transfer Protocol), port number 23 is used for Telnet, and port number 20 is used for FTP data transfer.

    Rate this question:

  • 8. 

    QUESTION NO: 458 Which of the following protocols will help reduce multicast flooding on a layer 2 switch?

    • A.

      IGMP

    • B.

      ARP

    • C.

      SNMP

    • D.

      ICMP

    Correct Answer
    A. IGMP
    Explanation
    IGMP (Internet Group Management Protocol) is a protocol that helps reduce multicast flooding on a layer 2 switch. It allows hosts to join and leave multicast groups, and it enables switches to only forward multicast traffic to ports where hosts have expressed an interest in receiving it. By using IGMP, switches can effectively control and limit the propagation of multicast traffic, reducing unnecessary flooding and improving network efficiency.

    Rate this question:

  • 9. 

    QUESTION NO: 459 Which of the following command line utilities is used to display the IP to Physical address table?

    • A.

      Netstat

    • B.

      Arp

    • C.

      Nbtstat

    • D.

      Ping

    Correct Answer
    B. Arp
    Explanation
    The correct answer is "arp". The Address Resolution Protocol (ARP) is used to map an IP address to its corresponding physical (MAC) address. The "arp" command line utility is used to display the IP to physical address table, which contains the mappings between IP addresses and MAC addresses in a network.

    Rate this question:

  • 10. 

    QUESTION NO: 460 A network administrator is developing a solution that will allow a new remote site with 400 users access to the Internet using only one public routable IP address. The solution must allow for direct user access to the Internet. Which of the following technologies is the BEST to implement?

    • A.

      VPN

    • B.

      DHCP

    • C.

      PAT

    • D.

      DNS

    Correct Answer
    C. PAT
    Explanation
    The best technology to implement in this scenario is Port Address Translation (PAT). PAT allows multiple private IP addresses to be translated into a single public IP address, allowing all 400 users at the remote site to access the Internet using only one public routable IP address. VPN (Virtual Private Network) is used for secure remote access, DHCP (Dynamic Host Configuration Protocol) is used for assigning IP addresses, and DNS (Domain Name System) is used for translating domain names into IP addresses. However, none of these technologies specifically address the requirement of allowing direct user access to the Internet with only one public IP address.

    Rate this question:

  • 11. 

    QUESTION NO: 461 A network technician has addressed an issue where many workstations have lost network connectivity, but is not able to establish the most probable cause. Which of the following steps should be taken next to resolve this issue?

    • A.

      Escalate the issue to a senior network associate.

    • B.

      Reboot the computer to try and recreate the issue.

    • C.

      Determine if anything has changed.

    • D.

      Document all possible causes.

    Correct Answer
    A. Escalate the issue to a senior network associate.
    Explanation
    Escalating the issue to a senior network associate is the next step because the network technician has already tried to troubleshoot the problem but was unable to determine the most probable cause. By involving a senior network associate, who has more experience and expertise, the issue can be resolved more effectively. Rebooting the computer or documenting possible causes may not be necessary at this point since the technician has already tried basic troubleshooting steps and determining if anything has changed is not mentioned as a step to be taken next.

    Rate this question:

  • 12. 

    QUESTION NO: 462 The optimal transmission speed for a CAT5 network cable in a main distribution frame (MDF) is:

    • A.

      1Mbps

    • B.

      10Mbps.

    • C.

      1000Mbps.

    • D.

      100Mbps.

    Correct Answer
    D. 100Mbps.
    Explanation
    The optimal transmission speed for a CAT5 network cable in a main distribution frame (MDF) is 100Mbps. CAT5 cables are capable of supporting speeds up to 100Mbps, making it the most suitable option among the given choices. Higher speed options, such as 1000Mbps, would require a higher category cable, such as CAT6. Therefore, 100Mbps is the correct answer for the given scenario.

    Rate this question:

  • 13. 

    QUESTION NO: 463 A client purchases a new wireless printer and wants to be able to bond it to their PDA. Which of the following technologies BEST describes the type of wireless printer that was purchased?

    • A.

      Bluetooth

    • B.

      WiFi

    • C.

      IEEE 1394

    • D.

      802.11a

    Correct Answer
    A. Bluetooth
    Explanation
    The client purchased a wireless printer that can be bonded to their PDA. Bluetooth is the technology that allows devices to connect and communicate wirelessly over short distances. It is commonly used for connecting peripherals such as printers to mobile devices like PDAs. WiFi, IEEE 1394 (FireWire), and 802.11a are other wireless technologies, but they are not specifically designed for printer-PDA connectivity like Bluetooth is.

    Rate this question:

  • 14. 

    QUESTION NO: 464 Which of the following defines the main purpose of dynamic routing?

    • A.

      Adapts quickly to network changes without manual entries.

    • B.

      Enables routing protocols with the least amount of hops.

    • C.

      Adapts to network changes by making manual changes.

    • D.

      Reduces domain collisions.

    Correct Answer
    A. Adapts quickly to network changes without manual entries.
    Explanation
    Dynamic routing is a method of automatically updating and adjusting routing tables in response to changes in the network topology. It allows the network to adapt quickly to changes without the need for manual intervention or configuration. This ensures that the network remains efficient and functional even as the network changes over time. By automatically updating routing tables, dynamic routing enables the network to find the most optimal paths for data transmission, reducing potential delays and improving overall network performance.

    Rate this question:

  • 15. 

    QUESTION NO: 465 How many DSOs are used in a T1?

    • A.

      24

    • B.

      30

    • C.

      23

    • D.

      31

    Correct Answer
    A. 24
    Explanation
    A T1 line is a digital transmission line that carries data at a rate of 1.544 Mbps. Each T1 line is divided into 24 channels, with each channel capable of carrying 64 Kbps of data. These channels are called Digital Signal 0 (DS0) channels. Therefore, the correct answer is 24, as there are 24 DSOs used in a T1 line.

    Rate this question:

  • 16. 

    QUESTION NO: 466 Which of the following authentication protocols uses plain text to transmit passwords over the internet?

    • A.

      RADIUS

    • B.

      PAP

    • C.

      CHAP

    • D.

      Kerberos

    Correct Answer
    B. PAP
    Explanation
    PAP (Password Authentication Protocol) is an authentication protocol that uses plain text to transmit passwords over the internet. This means that the passwords are not encrypted or protected, making them vulnerable to interception and unauthorized access. PAP is considered to be a weak authentication protocol and is not recommended for use in secure environments.

    Rate this question:

  • 17. 

    QUESTION NO: 467 A technician is setting up a public server for their company. The lP address of the server is 19.19.0.1. Which of the following is the default subnet mask for the server?

    • A.

      255.255.255.255

    • B.

      255.255.0.0

    • C.

      255.255.255.0

    • D.

      255.0.0.0

    Correct Answer
    D. 255.0.0.0
    Explanation
    The default subnet mask for the given IP address 19.19.0.1 is 255.0.0.0. This is because the IP address falls within the range of Class A addresses, which have a default subnet mask of 255.0.0.0. This subnet mask allows for a large number of network addresses and a smaller number of host addresses.

    Rate this question:

  • 18. 

    QUESTION NO: 468 Which of the following is a client-server based authentication software system which maintains user profiles in a central database?

    • A.

      CHAP

    • B.

      MS-CHAP

    • C.

      RADIUS

    • D.

      EAP

    Correct Answer
    C. RADIUS
    Explanation
    RADIUS is a client-server based authentication software system that maintains user profiles in a central database. It is commonly used in network access authentication and authorization. RADIUS stands for Remote Authentication Dial-In User Service and it allows users to authenticate their identities before accessing a network. The user profiles are stored in a central database, making it easier to manage and control access to the network.

    Rate this question:

  • 19. 

    QUESTION NO: 469 Which of the following protocols uses port 443?

    • A.

      SMTP

    • B.

      FTP

    • C.

      HTTPS

    • D.

      HTTP

    Correct Answer
    C. HTTPS
    Explanation
    HTTPS (Hypertext Transfer Protocol Secure) is the correct answer because it uses port 443. This protocol is an extension of HTTP and is used for secure communication over a computer network. It encrypts the data transmitted between a web server and a web browser, ensuring that it cannot be intercepted or tampered with by unauthorized individuals. Port 443 is the default port for HTTPS, allowing for secure communication between clients and servers.

    Rate this question:

  • 20. 

    QUESTION NO: 470 When creating a fault tolerant switched network, which of the following will allow for loops in the switched topology while preventing a broadcast storm?

    • A.

      Spanning tree protocol

    • B.

      Port mirroring

    • C.

      Port aggregation

    • D.

      802.1q VLAN trunking protocol

    Correct Answer
    A. Spanning tree protocol
    Explanation
    The Spanning Tree Protocol (STP) is used to prevent loops in a switched network while allowing for fault tolerance. STP creates a loop-free logical topology by blocking redundant paths and selecting a root bridge. It ensures that there is only one active path between any two network devices, preventing broadcast storms caused by endless loops. STP constantly monitors the network and dynamically adjusts the topology to maintain loop-free connectivity in the event of link failures or additions. This allows for a fault-tolerant network without compromising network performance or causing broadcast storms.

    Rate this question:

  • 21. 

    QUESTION NO: 471 On a wireless network, a user is able to connect to local resources, but not to the Internet. Which of the following is the MOST likely cause?

    • A.

      The wireless network card is not working.

    • B.

      The wireless router does not have DHCP enabled.

    • C.

      The wireless network card is out of range.

    • D.

      The gateway is not configured on the router.

    Correct Answer
    D. The gateway is not configured on the router.
    Explanation
    The most likely cause for the user being able to connect to local resources but not the internet on a wireless network is that the gateway is not configured on the router. The gateway is the device that connects the local network to the internet, and if it is not properly configured on the router, the user will not be able to access the internet. This issue is specific to the router's configuration and does not involve the wireless network card or its range, or the DHCP settings on the router.

    Rate this question:

  • 22. 

    QUESTION NO: 472 Which of the following wiring standards is depicted below?  Pin 1 WhiteOrange Pin 2 Orange Pin 3 White Green Pin 4 Blue Pin 5 White Blue Pin 6 Green Pin 7 White Brown Pin 8 Brown

    • A.

      IEEE 1394

    • B.

      Crossover cable

    • C.

      568A

    • D.

      568B

    Correct Answer
    D. 568B
    Explanation
    The given wiring standard is 568B. This can be determined by looking at the order of the colored wires on each pin. In the 568B standard, the order is as follows: Pin 1 WhiteOrange, Pin 2 Orange, Pin 3 White Green, Pin 4 Blue, Pin 5 White Blue, Pin 6 Green, Pin 7 White Brown, Pin 8 Brown. This matches the given sequence, confirming that it is 568B wiring standard.

    Rate this question:

  • 23. 

    QUESTION NO: 473 Which of the following would a technician find 568B standard?

    • A.

      Network baseline

    • B.

      Logical network diagram

    • C.

      Wiring schematic

    • D.

      Local regulation

    Correct Answer
    C. Wiring schematic
    Explanation
    A technician would find the 568B standard in a wiring schematic. The 568B standard is a specification for the wiring of Ethernet cables, specifically for the arrangement of the wires within the cable's connector. A wiring schematic would provide a visual representation of how the wires should be connected according to the 568B standard. This standard ensures that network cables are wired consistently and correctly, allowing for proper communication and data transmission within a network.

    Rate this question:

  • 24. 

    QUESTION NO: 474 Which of the following network devices routes packets over a wireless network?

    • A.

      NEC

    • B.

      WAP

    • C.

      WEP

    • D.

      CSU / DSU

    Correct Answer
    B. WAP
    Explanation
    A Wireless Access Point (WAP) is a network device that routes packets over a wireless network. It acts as a central hub for wireless devices to connect to a wired network. WAPs enable wireless communication by receiving and transmitting data between wireless devices and the network. They provide a wireless connection to the internet or a local area network (LAN) by creating a wireless hotspot. WAPs are commonly used in homes, offices, and public spaces to provide wireless internet access.

    Rate this question:

  • 25. 

    QUESTION NO: 475 Which of the following protocols is used to access files on a remote server?

    • A.

      ARP

    • B.

      SIP

    • C.

      FTP

    • D.

      NTP

    Correct Answer
    C. FTP
    Explanation
    FTP (File Transfer Protocol) is the correct answer because it is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. FTP allows users to access and manipulate files on a remote server, making it the appropriate protocol for accessing files on a remote server. ARP (Address Resolution Protocol) is used for mapping an IP address to a physical (MAC) address, SIP (Session Initiation Protocol) is used for initiating, modifying, and terminating multimedia communication sessions, and NTP (Network Time Protocol) is used for synchronizing the clocks of computers over a network.

    Rate this question:

  • 26. 

    QUESTION NO: 476 Which of the following is the MOST secure access method?

    • A.

      RSH

    • B.

      SFTP

    • C.

      SNMPv I

    • D.

      RCP

    Correct Answer
    B. SFTP
    Explanation
    SFTP (Secure File Transfer Protocol) is the most secure access method among the options provided. Unlike RSH (Remote Shell), SFTP encrypts the data being transferred, ensuring confidentiality. Additionally, SFTP uses SSH (Secure Shell) for authentication and secure communication, providing a higher level of security compared to RCP (Remote Copy) and SNMPv1 (Simple Network Management Protocol version 1). Therefore, SFTP is the most secure option for accessing and transferring files.

    Rate this question:

  • 27. 

    QUESTION NO: 477 After adding a new cable segment to the network, the technician should:

    • A.

      Document the changes in the business continuity plan.

    • B.

      Update the wiring schematics.

    • C.

      Create a new baseline document.

    • D.

      Update the disaster recovery plan.

    Correct Answer
    B. Update the wiring schematics.
    Explanation
    After adding a new cable segment to the network, it is important for the technician to update the wiring schematics. This is because the wiring schematics provide a visual representation of the network's physical layout and connections. By updating the wiring schematics, the technician ensures that the documentation accurately reflects the current state of the network, making it easier for future troubleshooting, maintenance, and expansion. Documenting the changes in the business continuity plan, creating a new baseline document, or updating the disaster recovery plan may also be important tasks, but they are not directly related to the addition of a new cable segment.

    Rate this question:

  • 28. 

    QUESTION NO: 478 A VoIP telephone with a built-in hub is plugged into a single network using both the hub port and the telephone port. The network begins to experience severe lag due to a significant increase in traffic. Which of the following features would help to prevent this from occurring in the future?

    • A.

      Port mirroring

    • B.

      VLANS

    • C.

      Spanning tree

    • D.

      Trunking

    Correct Answer
    C. Spanning tree
    Explanation
    Spanning tree is a protocol that prevents loops and ensures a loop-free logical topology in a network. In this scenario, the severe lag is likely caused by a loop created by connecting the VoIP telephone with both the hub port and the telephone port. By implementing spanning tree, the protocol will detect and disable one of the redundant connections, preventing the loop and resolving the lag issue. This feature will help to prevent such occurrences in the future.

    Rate this question:

  • 29. 

    QUESTION NO: 479 An administrator needs to find out a specific NICs MAC address, the IP address of the MC is known. Which of the following network utilities would enable the administrator to discover the MAC address without physically going to the computer?

    • A.

      Ping

    • B.

      Netstat

    • C.

      Nbtstat

    • D.

      Arp

    Correct Answer
    D. Arp
    Explanation
    The correct answer is "arp". The Address Resolution Protocol (ARP) is a network protocol used to map an IP address to a MAC address. By using the ARP command, the administrator can query the ARP cache on the MC (Management Console) to find the MAC address associated with a specific IP address without needing to physically go to the computer.

    Rate this question:

  • 30. 

    QUESTION NO: 480 Which of the following devices is used for connecting multiple network hosts where the physical signal is always repeated to all ports?

    • A.

      Bridge

    • B.

      Router

    • C.

      Hub

    • D.

      Switch

    Correct Answer
    C. Hub
    Explanation
    A hub is a device used for connecting multiple network hosts where the physical signal is always repeated to all ports. Unlike a switch, which intelligently routes data to specific ports based on the destination MAC address, a hub simply broadcasts all incoming data to all connected devices. This means that all devices connected to a hub will receive all data packets, regardless of whether they are the intended recipient or not.

    Rate this question:

  • 31. 

    QUESTION NO: 481 Which of the following can an application layer firewall filter that a network layer firewall cannot?

    • A.

      HTTP URLs

    • B.

      Telnet traffic

    • C.

      ICMP

    • D.

      HTTP traffic

    Correct Answer
    A. HTTP URLs
    Explanation
    An application layer firewall can filter HTTP URLs, while a network layer firewall cannot. This is because an application layer firewall operates at the application layer of the OSI model, which allows it to inspect and filter specific application protocols, such as HTTP. On the other hand, a network layer firewall operates at the network layer, which primarily focuses on filtering based on IP addresses and ports. Therefore, it does not have the capability to filter HTTP URLs specifically.

    Rate this question:

  • 32. 

    QUESTION NO: 482 A recently installed wireless router needs to be configured to have the highest level of security. Which of the following would MOST likely be used?

    • A.

      SSL

    • B.

      WEP

    • C.

      WPA

    • D.

      IPSec

    Correct Answer
    C. WPA
    Explanation
    WPA (Wi-Fi Protected Access) is the most likely option for configuring a wireless router with the highest level of security. WPA is an encryption protocol that provides stronger security than WEP (Wired Equivalent Privacy). WPA uses a stronger encryption algorithm and provides better protection against unauthorized access to the wireless network. It also supports key rotation, which enhances security by changing encryption keys at regular intervals. Therefore, WPA is the preferred choice for securing wireless networks.

    Rate this question:

  • 33. 

    QUESTION NO: 483 Which of the following command line tools would BEST be used to verify DNS functionality?

    • A.

      Netstat

    • B.

      Traceroute

    • C.

      Dig

    • D.

      Arp

    Correct Answer
    C. Dig
    Explanation
    The command line tool "dig" is the best option for verifying DNS functionality. "dig" stands for Domain Information Groper and is used to query DNS servers for information about a specific domain. It can be used to check if a domain name is resolving correctly, if the DNS records are set up correctly, and to troubleshoot any DNS issues. It provides detailed information about DNS responses, such as the IP address associated with a domain name, the DNS server that provided the response, and the time it took to receive the response.

    Rate this question:

  • 34. 

    QUESTION NO: 484 A company has one headquarters location and ten remote sites. The remote sites do not need to communicate with each other, just with headquarters. Which of the following is the BEST topology to use?

    • A.

      Mesh

    • B.

      Ring

    • C.

      Hybrid

    • D.

      Star

    Correct Answer
    D. Star
    Explanation
    In a star topology, all remote sites are connected to the headquarters location. This allows for efficient communication between each remote site and the headquarters, as all traffic flows through a central point. Since the remote sites do not need to communicate with each other, a star topology is the best choice as it simplifies the network design and reduces complexity.

    Rate this question:

  • 35. 

    QUESTION NO: 485 A tool that is used to capture usernames and passwords on the network is known as a:

    • A.

      Honey pot.

    • B.

      Firewall.

    • C.

      Sniffer

    • D.

      Proxy server.

    Correct Answer
    C. Sniffer
    Explanation
    A sniffer is a tool used to capture usernames and passwords on the network. It is designed to intercept and analyze network traffic, allowing an attacker to capture sensitive information such as login credentials. Unlike a honey pot, which is a decoy system used to attract and deceive attackers, a sniffer actively intercepts and captures data. A firewall is a network security device that monitors and filters incoming and outgoing network traffic. A proxy server is an intermediary between a client and a server, used for various purposes including caching, filtering, and anonymity.

    Rate this question:

  • 36. 

    QUESTION NO: 486 An administrator is implementing a new wireless network. Which of the following is the highest level of wireless encryption that the administrator can run?

    • A.

      WEP

    • B.

      WPA2 AES

    • C.

      WPA2 TKIP

    • D.

      TTL

    Correct Answer
    B. WPA2 AES
    Explanation
    WPA2 AES is the highest level of wireless encryption that the administrator can run. AES (Advanced Encryption Standard) is a symmetric encryption algorithm that provides a high level of security. WPA2 (Wi-Fi Protected Access 2) is the latest and most secure protocol for wireless networks. It uses AES encryption to protect the data transmitted over the network, making it difficult for unauthorized users to intercept and decode the information. WEP (Wired Equivalent Privacy) and WPA2 TKIP (Temporal Key Integrity Protocol) are older and less secure encryption methods compared to WPA2 AES.

    Rate this question:

  • 37. 

    QUESTION NO: 487 A technician is troubleshooting connectivity issues on a clients machine. The technician needs to see the current NetBIOS configuration and open connections, which of the following commands would allow this information to be displayed?

    • A.

      Nbtstat

    • B.

      Netstat

    • C.

      Msconfig

    • D.

      Ipconfig

    Correct Answer
    A. Nbtstat
    Explanation
    The correct answer is nbtstat. This command is used to display the current NetBIOS configuration and open connections on a machine. It provides information about NetBIOS over TCP/IP (NetBT) protocol statistics, NetBIOS name tables for both local and remote computers, and current NetBIOS sessions. This command is commonly used for troubleshooting network connectivity issues and diagnosing NetBIOS-related problems.

    Rate this question:

  • 38. 

    QUESTION NO: 488 The below output is from which of the following utilities? Interface: 172.30.0.104 --- 0x2 Internet Address Physical AddressType 172.30.0.500-30-48-82-72-8c dynamic 172.30.0.25400-30-48-82-65-0e dynamic

    • A.

      Ping

    • B.

      Arp

    • C.

      Nbtstat

    • D.

      Netstat

    Correct Answer
    B. Arp
    Explanation
    The given output shows the IP addresses and corresponding physical addresses (MAC addresses) of devices on the network. This information is obtained using the Address Resolution Protocol (ARP) utility. ARP is used to map an IP address to its corresponding MAC address, allowing devices to communicate with each other on a local network.

    Rate this question:

  • 39. 

    QUESTION NO: 489 The below output is from which of the following utilities? Active Connections Prato Local Address Foreign Address State TCP COMPUTER1:1085 172.30.0.5:3389 ESTABLISHED TCP COMPUTER1:1089172.30.0.5-microsoft-dsTIME WAIT

    • A.

      Ping

    • B.

      Ipconfig

    • C.

      Nslookup

    • D.

      Netstat

    Correct Answer
    D. Netstat
    Explanation
    The given output is from the "netstat" utility. Netstat is a command-line network utility tool that displays active network connections and listening ports on a computer. It provides information about the local address, foreign address, and state of each connection. In the given output, we can see the active TCP connections with their local and foreign addresses, as well as their states (ESTABLISHED and TIME WAIT).

    Rate this question:

  • 40. 

    QUESTION NO: 490 A technician is troubleshooting the phone service at a site. The technician tests one of the connections on the 66 block and no dial tone is present. Which of the following would be the BEST tool to test the connection at the demarcation point?

    • A.

      Butt set

    • B.

      Cable tester

    • C.

      Multimeter

    • D.

      Toner probe

    Correct Answer
    A. Butt set
    Explanation
    A butt set is the best tool to test the connection at the demarcation point because it allows the technician to directly connect to the phone line and listen for a dial tone. It can also be used to test for noise on the line and check for proper voltage levels. A cable tester is used to test the integrity of network cables, not phone lines. A multimeter is used to measure voltage, current, and resistance, but it does not provide the same level of functionality as a butt set for testing phone lines. A toner probe is used to trace and identify cables, but it does not test for dial tone or other phone line issues.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 02, 2010
    Quiz Created by
    Rich70
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.