Networking Fundamentals
The default port used for SMTP is:
23
25
80
8080
Which of the following are features of DHCP? (Choose two.)
IP address resolution to canonical names
Secure shell connections
Address reservation
Network file transfer
IP address exclusion
Which network does the IP address 220.100.100.100 belong to?
220.100.100.0/24
220.100.100.1/24
255.255.255.0/24
255.255.255.1/24
Which subnet mask is valid?
255.255.255.240
255.255.255.228
255.255.255.164
255.255.255.245
A service that resolves NetBIOS names to IP addresses is :
Domain Name Service (DNS)
Internet Service Provider (ISP)
Address Resolution Protocol (ARP)
Windows Internet Name Service (WINS)
Teredo tunneling is a protocol that:
Translates Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6)
Allows IPv6 connectivity through IPv4 devices
Provides VPN security
Dynamically allocates IPv6 addresses
What is the default subnet mask for a Class C Internet network?
255.255.255.252
255.255.255.240
255.255.255.192
255.255.255.0
The default port used for telnet is :
23
25
80
8080
When a client's DHCP-issued address expires, the client will:
Select a new address and request approval from the DHCP server
Require manual configuration with a static IP address
Attempt to obtain a new address by broadcasting
Continue to use the address until it is notified to stop
A Media Access Control (MAC) address identifies a/an :
UPnP device
Local broadcast domain.
Network interface card (NIC).
Local area network (LAN)
Two companies want to share data by using the Internet. Which type of network provides the solution?
Ethernet
Intranet
Extranet
Perimeter
VPNs are implemented to provide:
A secure connection within a private network
A secure connection through public networks
Additional encryption by using IPSec
Additional security for selected computers.
If an 802.llg Internet connection has connectivity problems, what may be the cause?
A cordless phone
A cellular phone
Incandescent lights
Electromagnetic interference (EMI)
Which of these factors has the biggest impact on data transmission speed in a wireless network?
The access method used for the network
The transmission standard of the equipment used
The use of strong encryption for transmissions
The transmission wattage rating used on the NIC
Which type of network covers the broadest area?
WAN
CAN
LAN
PAN
In local area network (LAN) topologies, the primary media access methods are: (Choose two.)
Contention
Negotiation
Kerberos
Token passing
In a physical star topology, the central device is referred to as a:
Bridge
Server
Segmenter
Hub
Which technology can you use to extend an internal network across shared or public networks?
VLAN
Microsoft ASP-NET
Microsoft .NET Framework
VPN
Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)
802.1 If
802.11g
802.11k
802.11m
802.11n
What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point?
The access point will transmit, but the node will be unable to receive
A connection will be established
Both the node and the access point will be unable to transmit
The node will transmit, but the access point will be unable to receive
A VPN is a/an:
Encrypted connection across the Internet
Virtual network within your local area network (LAN).
Communication tunnel between VLANs.
Personal network for your use only
Which of the following determines the media access method that is used in a network?
Number of hosts connected to the network
Number of domain servers on the segment
Maximum speed of the media
Topology and protocols
Which wireless authentication method provides the highest level of security?
Wired Equivalency Privacy (WEP)
IEEE 802.lln
WI-FI Protected Access (WPA)
IEEE 802.11a
Which type of port is used to support VLAN traffic between two switches?
Virtual port
WAN port
Trunk port
LAN port
The protocol that maps IP addresses to a Media Access Control (MAC) address is
Internet Message Access Protocol (IMAP)
Dynamic Host Configuration Protocol (DHCP)
Routing Information Protocol (RIP)
User Datagram Protocol (UDP)
Address Resolution Protocol (ARP)
A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97. You need to restore access to network resources. What should you do next?
Flush the cache on the DNS server
Reset the user's password on the server
Check your router's current routing tables
Verify that the DHCP service is available
The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is:
Corp
Com
Nwtraders
Exchange
Mail
To which IP configuration does the CIDR notation 192.168.1.1/25 refer?
192.168.1.1 255.255.255.64
192.168.1.1 255.255.255.1
192.168.1.1 255.255.255.32
192.168.1.1 255.255.255.256
192.168.1.1 255.255.255.128
Which command is used to verify that a server is connected to the network?
IPCONFIG
ROUTE
PING
CHECK
Which of these represents the Internet Protocol version 6 (IPv6) loopback address?
127.0.0.1
192.168.0.1
FEC0:A8C0::AA01
::1
Which of these addresses is a multicast address?
127.0.0.1
169.254.0.1
192.168.0.1
224.0.0.1
Which of the following uses pointer records and A records?
IDS
DNS Server
NAT Server
IPS
The ipconfig command will:
Configure routers
Display a client's address
Display a client's broadcast mode
Configure DHCP clients
One reason to incorporate VLANs in a network is to :
Increase the number of available IP addresses
Increase the number of available Media Access Control (MAC) addresses
Reduce the number of broadcast domains.
Reduce the number of nodes in a broadcast domain
Which of these is an application layer protocol?
TCP
FTP
IP
UDP
In addition to switching, multilayer switches also:
Provide Layer 3 routing functions
Interface with CAT3, CATS, CAT5e, and fiber optics.
Support 10 MB, 100 MB, and 1 GB local area network (LAN) ports
Operate by using only Layer 1 and 2 protocols
One reason to replace an unmanaged switch with a managed switch is to:
Manage the routing tables
Support multiple VLANS
Reduce collision domains
Route between networks,
To directly connect the Ethernet network interface cards (NICs) of two computers, you should use a:
Crossover cable
Straight cable
Rollover cable
Coaxial cable
The function of a router is to:
Provide IP subnet masks for hosts
Forward traffic to other networks
Broadcast routing tables to clients
Store tables for name resolution
If a router cannot determine the next hop for a packet, the router will:
Forward the packet to the default route
Send the packet back to the packet's source.
Broadcast the packet.
Store the packet in the memory buffer
Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)
Token ring
Ethernet
Dial-up
Leased line
A private network that allows members of an organization to exchange data is an:
Extranet
Ethernet
Intranet
Internet
Security is a concern on wireless networks due to:
The radio broadcast access method.
Spread spectrum issues
Frequency modulation issues.
The potential for cross-talk
A characteristic of the mesh topology is that it:
Uses a central hub
Cannot use wired connections
Uses redundant paths.
Cannot use wireless connections
To protect a network when it is connected to the Internet, you should use a:
Bridge
Firewall
Switch
Router
One purpose of a perimeter network is to
Make resources available to the intranet
Link campus area networks (CANs)
Link local area networks (LANs)
Make resources available to the Internet.
Which protocol can be used to encrypt packets on the Internet?
SNMP
HTTPS
TFTP
HTTP
The service that resolves fully qualified domain names (FQDN) to IP addresses is:
Windows Internet Name Service (WINS)
Domain Name Service (DNS)
Internet Service Provider (ISP)
Address Resolution Protocol (ARP).
{"name":"Networking Fundamentals", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Please type your email address (for verification):, Please type your phone number using the international format (use your country code), The default port used for SMTP is:","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
More Quizzes
تمرين اختباري رقم 01 في مجال التنظيم القضائي بالمغرب للتهييء لمباريات المحررين والمنتدبين القضائيين ومفتشي الشغل
10518
Which Halloween Character Are You?
11690
The F1 Carlos and Lando Quiz
136116
¿Qué tanto sabes sobre Beyoncé?
52142
Karantina Günlerine Dair Quiz
136685
Inertia
136215
Would I be friends with you?
15871
Who is your Greek Godly Parent?
1585965
Swift or Chaucer: Who Said It?
147184
What animal are you?
136225
What book genre are you?
10527
What Guide and Seek Creature are you?
136307