Network+ N10-007 Practice Tests

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What does this command do? Command: no shutdown A.) Administratively enables an interface B.) Applies an IP address to a layer 3 interface C.) Allows configuration from the terminal D.) Enters configuration mode for a specific interface

A.) Administratively enables an interface

SPX (Sequence Packet Exchange) is a _____ protocol? A.) Connection-oriented B.) Connectionless

A.) Connection-oriented

What does this command do? Command: configure terminal A.) Enter configuration mode B.) Enter interface configuration mode C.) Specify the type of port D.) Assign port to a specific layer 2 broadcast domain

A.) Enter configuration mode

Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? A.) NTP B.) VTP C.) NNTP D.) RTP

A.) NTP

What are the characteristic features of TFTP? (Select 2 answers) A.) Provides no security features B.) Typically used for exchanging files over the Internet C.) A very basic form of file sharing protocol D.) Provides authentication and encryption E.) Directory access protocol

A.) Provides no security features C.) A very basic form of file sharing protocol

A type of protocol used in network management systems for monitoring network-attached devices is called: A.) SMB B.) NTP C.) SNMP D.) RDP

A.) SMB

The SMTP protocol is used for: (Select 2 answers) A.) Sending email between mail servers B.) Name resolution C.) Serving of web pages D.) Retrieving email from mail servers E.) Sending email from a client device

A.) Sending email between mail servers E.) Sending email from a client device

You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission? (Choose two.) A.) The application will automatically retransmit the packets. B.) The application will drop the packets. C.) The protocol will automatically retransmit the packets. D.) The protocol will drop the packets.

A.) The application will automatically retransmit the packets. D.) The protocol will drop the packets.

Your company is deploying a VoIP system on its premises at three locations. The internal VoIP system must communicate with the existing PSTN network. Which device will be necessary to permit metwork-based calls to access the PSTN, and for PSTN-based calls to access the network? A.) VoIP-PSTN gateway B.) IP-ISDN adapter C.) IP-PBX adapter gateway D.) PBX system E.) Internet modem

A.) VoIP-PSTN gateway

Active hubs or multi port repeaters... _____

Amplify or regenerate signals to all other ports on the hub. Often used to extend the length of segments beyond their maximum specified lengths. Considered Physical layer devices (Layer 1) because they act on the data at the bit level.

What is a OTDR?

An Optical Time Domain Reflectometer which is a tool that analyzes the quality of a connection in a fiber optic cable.

What is an active/active cluster?

An active/active cluster is also known as a load-balancing cluster.

What does this command do? Command: ip address 67.83.45.3 255.255.255.240 A.) Administratively enables an interface B.) Applies an IP address to a layer 3 interface C.) Allows configuration from the terminal D.) Enters configuration mode for a specific interface

B.) Applies an IP address to a layer 3 interface

IPX (Internetwork Packet Exchange) is a _____ protocol? A.) Connection-oriented B.) Connectionless

B.) Connectionless

What does this command do? Command: interface gig 0/0 A.) Enter configuration mode B.) Enter interface configuration mode C.) Specify the type of port D.) Assign port to a specific layer 2 broadcast domain

B.) Enter interface configuration mode

Which of the answers listed below refers to a protocol used for managing VoIP and VTC services? A.) SMB B.) H.323 C.) SCP D.) IGP

B.) H.323

What is the name of a network protocol that secures web traffic via SSL/TLS encryption? A.) SFTP B.) HTTPS C.) FTPS D.) SNMP

B.) HTTPS

As a network administrator, you decide to replace a hub on your network with an active hub. At which OSI layer does the new device function? A.) Session B.) Physical C.) Transport D.) Network

B.) Physical

A network protocol that allows for secure file transfer over Secure Shell (SSH) is called: A.) TFTP B.) SFTP C.) Telnet D.) FTPS

B.) SFTP

Information about previous connections is maintained in the _____. A.) connection table B.) state table C.) schema table D.) spooler table

B.) state table

Management has asked you to ensure that any traffic through the external firewall is allowed as long as it is the result of a previous connection. Which type of firewall performs this assessment when it first encounters traffic? A.) application-level proxy firewall B.) stateful firewall C.) circuit-level proxy firewall D.) packet-filtering firewall

B.) stateful firewall

What does the command do? Command: configure terminal A.) Administratively enables an interface B.) Applies an IP address to a layer 3 interface C.) Allows configuration from the terminal D.) Enters configuration mode for a specific interface

C.) Allows configuration from the terminal

Which of these has helped reduce wiring, weight, and cost in industrial applications? A.) SAN B.) PAN C.) CAN D.) MAN

C.) CAN

Which type of VLAN assigns each communication port to a different VLAN? A.) Variable B.) Constant C.) Port based D.) Port switching

C.) Port based

Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? A.) L2TP B.) BGP C.) RSTP D.) SIP

C.) RSTP

What does this command do? Command: switchport mode access A.) Enter configuration mode B.) Enter interface configuration mode C.) Specify the type of port D.) Assign port to a specific layer 2 broadcast domain

C.) Specify the type of port

In PKI, what is the entity that signs a certificate? A.) a subject B.) a verifier C.) an issuer D.) a principal

C.) an issuer

What does CAN stand for?

Controller Area Network

Which of the following uses cells that are equally sized at 53 bytes each? A.) SIP trunk B.) PPPoE C.) DMVPN D.) ATM

D.) ATM

What does this command do? Command: switchport access vlan 100 A.) Enter configuration mode B.) Enter interface configuration mode C.) Specify the type of port D.) Assign port to a specific layer 2 broadcast domain

D.) Assign port to a specific layer 2 broadcast domain

What does the command do? Command: interface gig 1/0 A.) Administratively enables an interface B.) Applies an IP address to a layer 3 interface C.) Allows configuration from the terminal D.) Enters configuration mode for a specific interface

D.) Enters configuration mode for a specific interface

You have two Web servers, named WebSrv1 and WebSrv2. You need to configure the Web servers so that they share the Web request load equally. What should you do? A.) Implement traffic shaping B.) Implement Quality of Service (QoS) C.) Implement an active/passive cluster D.) Implement an active/active cluster

D.) Implement an active/active cluster

In your fiber network, some users are reporting connectivity issues, while others are not. You suspect a faulty or broken cable. Which tool would help you locate the fault? A.) Multimeter B.) Spectrum analyzer C.) Loopback adapter D.) OTDR

D.) OTDR

Secure Shell (SSH) protocol runs on: A.) TCP port 21 B.) UDP port 22 C.) TCP port 20 D.) TCP port 22

D.) TCP port 22

Which device or feature provides a bridge between the physical environment and the virtual environment? A.) Virtual router B.) Virtual firewall C.) Hypervisor D.) Virtual NIC

D.) Virtual NIC

What does a VoIP-PSTN gateway do?

Establish the routing of calls to the existing PSTN network. Such gateways connect to the PSTN network through T1/E1/J1, ISDN, or FXO interfaces.

What are the common network protocols and their associated ports?

FTP - 20, 21 SSH, SFTP - 22 TELNET - 23 SMTP - 25 DNS - 53 DHCP - 67, 68 TFTP - 69 HTTP - 80 POP3 - 110

What does the logical network diagram represent?

How the data will be logically transported through the network.

What does a physical network diagram include?

The actual network interfaces used & represents the physical locations of the network devices and how they are connected.

What do the wiring schematics include?

The flow of the network communication and symbols to indicate equipment function.


Ensembles d'études connexes

3.07 Quiz: Energy During Collisions

View Set

HD Quiz 14: Diagnosing Cancer: Lab tests, Imaging, and Biopsy

View Set

AP Marco: Edge Ex: Real and Nominal Values

View Set

MKT 350: Chapter 15 Practice Problems

View Set

Cultural Anthropology Quizzes (still need 15)

View Set

SPANISH 201 Lección 10 | Lesson Test

View Set