Study sets, textbooks, questions
Upgrade to remove ads
Network+ Practice Questions Volume A
Get Quizlet's official Network+ - 1 term, 1 practice question, 1 full practice test
Terms in this set (100)
Which of the following would help a new administrator quickly determine if a network had a VLAN
for its publicly accessible servers?
C. Logical network diagrams
Keyword and blacklist filtering would be handled at which level in a network?
C. Hardware firewall
A common technique used to prevent the unauthorized network devices from sending traffic
across a network is port.
When installing two 802.11g access points in the same building, which of the following channels
will MOST likely be used to minimize interference?
B. 1 and 6
Which of the following devices transmits timed broadcasts onto an active network?
C. DHCP client
Users are unable to stay connected to the company's wireless network. Several times throughout
the day the users' signals are dropped and they are forced to reconnect to the network. A
technician determines the network cabling that supplies the WAP has been run inside with several
power lines. Which of the following is the MOST likely cause of the network issue?
Which of the following describes the location where an administrator would terminate a bundle of
D. Patch panel
Which of the following can be an STP cable?
Which of the following is used to identify active hosts along with their network addresses?
B. Ping sweep
A section of the building has been having intermittent connectivity problems lately. An action plan
and solution has been created. Which of the following steps would an administrator perform
C. Implement and test the solution
A web server is running correctly but sending a RST packet to any client trying to connect using
HTTP on TCP port 80. Which of the following tools should be used to determine the listening port
of the web server?
Which of the following utilities can be used to list the routing table?
Which of the following is a multifunction device in a SOHO network?
C. Wireless router
At which of the following layers does the TFTP protocol operate?
D. Layer 7
Which of the following is an EGP routing protocol?
Which of the following is used by RADIUS to encrypt messages between the server and the
D. Shared secret
Which of the following is the name of the routing update process involved when a change occurs
in the routing environment?
Which of the following is MOST commonly powered using PoE?
D. Access points
Which of the following should an administrator do after running a command from the console on
the perimeter router?
A. Update the configuration logs
Which of the following features should an administrator configure to allow an IDS to watch the
traffic on a switch?
Which of the following utilities would be used to display a NIC's cache of MAC addresses?
Which of the following WAN technologies uses a telephone cable?
Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes
on either side of the data link?
Which of the following security devices would MOST likely be used on a network to screen and
prevent malicious traffic?
At which of the following layers does the ICMP protocol operate?
B. Layer 3
A user reports sporadic connectivity with their wireless connection. A technician determines the
wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely
cause of this issue?
D. The client distance from the AP.
Which of the following are common VPN transports? (Select TWO)
Which of the following interfaces is used to connect analog devices to the Internet?
Which of the following would contain information regarding network device alerts using SNMP?
A network technician arrives to work and discovers users are having a problem connecting the
company server. The server operator was working on upgrades the night before. Which of the
following documents should the technician use to attempt to discover the problem?
B. Change management
Which of the following are valid MAC addresses? (Select TWO)
Which of the following tools would an administrator use to determine if a DNS server is answering
authoritatively for a domain?
Which of the following is a correct IP ACL? (Select TWO)
D. DENY ANY ANY
E. PERMIT 192.168 1.100 80
Which of the following is an example of a MAC address?
Which of the following is a performance optimization technology?
A technician receives an urgent call that the switch in accounting is down. Which of the following
should the technician do FIRST to troubleshoot this issue?
A. Identity symptoms and problems
By default, which of the following ports would a network need to have opened to allow for the
transmission of incoming and outgoing email? (Select TWO).
A Stateful firewall is MOST useful in protecting against which of the following network scans?
Which of the following would be BEST to use when identifying HTTP traffic running on TCP port
D. Application layer firewall
An administrator is setting up a network and would like to prevent users from having the ability to
plug their PC into the network to receive an IP address. Which of the following addressing
schemes should the technician use?
Which of the following features does SNMPv3 have over previous versions when remotely
monitoring networking devices? (Select TWO).
An administrator only has one public IP address that must be shared among five employees.
Which of the following network schemes should be used?
Several users from the same location are reporting problems accessing the intranet server. An
administrator has verified that no other remote areas are having issues connecting to the same
server. Which of the following steps should the administrator perform NEXT?
A. Determine what has changed
Which of the following authenticates a web server to the remote client in PKI?
C. Public key
An administrator needs to diagnose problems with a WINS server. Which of the following tools
should be used?
Which of the following connector types is used for coax cable?
In an enterprise setting, access switches providing network connectivity placed throughout a
building are typically connected to a backbone called the:
Which of the following wireless standards has the highest maximum data rate?
Which of the following solutions will detect and disable a rogue access point?
A zone transfer occurs over which of the following ports?
A. TCP 53
A technician claims to have crimped a patch cable according to the T568A standard on one end
and T568B on the other. Which of the following results is to be expected?
C. There will be no proper data continuity; the standards utilize two different wiring diagrams
An administrator is setting up a security camera that will send the same feed to twelve of the
twenty workstations on the network. Which of the following addressing schemes was designed for
Which of the following protocols should be used to monitor network performance?
A user receives an email slating that their account was compromised and there is a need to verify
account credentials by submitting the correct information on a website. Which of the following
security threats is occurring?
Which of the following protocols requests membership to a multicast group?
A standard installation for wireless will use which of the following antenna types?
Which of the following regulates the amount of network traffic a single node receives in a server
A. Load balancer
A technician would like to separate the HR department's workstations from the other workstations
at the company. Which of the following network topologies should be used?
A client wants to improve the wireless coverage on the third floor of their house. The wireless
router is located in the basement and there is no easy way to run a cable to the third floor. Which
of the following devices should be installed to extend the wireless coverage to cover the entire
third floor without running cables?
An administrator has completed the installation of a new WLAN. Which of the following
configuration management documents needs to be updated?
A. Logical network diagram
Which of the following describes what the number two represents in l00Base2 cabling?
B. Coaxial cable
A crossover cable is MOST commonly associated with which of the following layers of the OSI
Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examples
of which of the following security types?
Which of the following has a MAXIMUM distance of 300 meters (984 feet)?
Which of the following documents should always be kept up-to-date after any major changes are
made to a network backbone?
A. Network diagram
Which of the following is a disadvantage of using the EIGRP protocol?
C. It is a proprietary protocol
Which of the following routing protocols runs over UDP and determines path based upon distance
Which of the following is equipment provided by the telephone company that provides remote
diagnostic and loopback services for subscriber lines?
C. Smart jack
An administrator is troubleshooting a communication issue between two computers on the same
Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the
D. Connect both computers using a crossover cable
Which of the following devices is used to connect multiple devices to a network and does not stop
Which of the following protocols allow the set up, teardown and streaming of VoIP traffic? (Select
Which of the following is a secure method of copying information over a public network?
An administrator needs to authenticate users to the network, authorize network activities, and
account for activities done. Which of the following are services that will BEST meet these goals?
An administrator receives reports from users in an office that their 802.11g wireless connectivity
has been problematic since the installation of the new wireless phone system. At which of the
following frequencies are both systems operating at to cause this issue?
An administrator suspects that an incorrect POTS line is carrying the DSL signal. Which of the
following will help diagnose this issue?
D. Butt set
An administrator wants to test the network MTU. Which of the following commands allows different size packets to be sent?
Which of the following is used to serve as an emergency backup line to troubleshoot a broadband
connection on many routers?
Which of the following protocols uses UDP to transfer files?
Which of the following would be used to connect two IDFs in the same building with the LAN, while minimizing crosstalk?
Which of the following network devices would MOST likely be installed to allow the company's
single public IP to be shared and translated into local IPs for network devices?
A technician who separated two departments using VLANs now discovers that the VLANs cannot
communicate with each other. Which of the following does the technician need to enable
communication between the VLANs?
Which of the following network topologies BEST describes a VPN? (Select TWO)
A. Point to Point
B. Point to Multipoint
Which of the following cable speeds would provide the GREATEST theoretical bandwidth?
Which of the following is true about an IP address if the first bit is a zero?
A. The address is a Class A address
Which of the following tools are BEST used to cut away the outside covering of a CAT5e cable?
Which of the following is typically used In an LAN environment?
After testing a new 100BaseTX cable, the technician determines that only pairs 4,
B. Crossover cable
A server keeps rebooting at various times throughout the day. Which of the following tools would
BEST help to diagnose this issue?
B. Temperature monitor
Which of the following devices would allow a technician using a packet sniffer to view all the data
on a network?
An administrator finds a phone line but does not know where the line goes or if it is active. Which
of the following can be used to test if it is active?
A. Butt set
Which of the following allows a technician to mask a private network of IP addresses behind one
public IP address?
An administrator is deploying three B/G wireless access points in a new office location. Which of
the following channels eliminates interference?
A. 1, 6, and11
An administrator receives a contract for a server install at a new building. Which of the following
should be completed after installing the server?
C. Update the network diagram
Which of the following is a reason to block FTP at the corporate firewall?
D. It transmits passwords in clear text.
A network IPS provides which of the following?
C. Packet-based detection and prevention of network attacks.
An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classful
address. Which of the following is the address that can be used in this scenario?
Which of the following should be configured to provide priority to voice traffic?
Which of the following protocols is the LEAST secure and should be avoided on a wireless
Which of the following is an invalid subnet mask?
Which of the following tools would a technician use to check functionality of a physical network
B. Cable tester
Sets found in the same folder
OSI Model and TCP/IP
Practice Network+ 1
Cisco Exam 11
Sets with similar terms
Foundations Study set
Network + 100 Study Questions Set 003
Network+ - Industry Standards, Practices…
AT N10-004 1-50
Other Quizlet sets
multi cultural fam exam 2
Exam #1 (SOCIAL PSYCH)