Network+ Quiz (Chapter 1-3)

Ace your homework & exams now with Quizwiz!

A large data room is also known as a(n): A. telecommunications room. B. telecommunications enclosure. C. patch bay. D. equipment room.

A

At which stage of the system life cycle would you replace an old router with a newer one? A. The implementation phase B. The development phase C. The requirement phase D. The documentation and maintenance phase

A

The Cambridge Law Department has complained of a loss of network signal from time to time. On inspection, it has been noticed that the loss of signal is due to noise interference at the physical layer. Which of the following is most likely to fix the problem? A. Ensure that the cables are at least 3 feet away from fluorescent lights or other sources of EMI. B. Install the cables through cable conduits and seal the ends of these pipes. C. Use patch panels to organize and connect lines. D. Ensure that you do not leave more than an inch of exposed cable before a twisted-pair termination.

A

The University of Springfield boasts of providing one of the fastest Internet experiences in the country on its multi-building campus. To ensure such efficient connectivity, the University adheres to the ANSI/TIA standards to better manage the data feed from the main data facilities. Which of the following can be reasonably inferred from the above scenario? A. Every floor in each building has an individual IDF. B. The network setup used to connect the central network to other nodes is organized in a star topology. C. The cable sheath used to provide the connection is plenum-rated. D. There are multiple MDFs in every building.

A

What consists of high capacity data storage devices in a defined network segment? A. SAN B. WLAN C. PAN D. MAN

A

What guides proper handling and disposal of chemical solvents? A. SDS B. OSHA C. PPE D. Fire suppression system

A

What is a collection of accumulated insights and solutions to problems in a network? A. Knowledge base B. Safety data sheet C. Tracking system D. Change management proposal

A

What is a graphical representation of network devices and connections known as? A. A network diagram B. A rack diagram C. A wiring diagram D. A Zenmap

A

What is the process of reverting to a previous version of the software after a failed upgrade attempt known as? A. Rollback B. Upgrade C. Patch D. Network mapper

A

What is the secure port for HTTPS? A) 443 B) 587 C) 80 D) 23

A

What operating system will you install on each of the host PCs for a peer-to-peer network? A. Windows 11 Professional B. Ubuntu Server C. Windows Server D. Red Hat Enterprise

A

What should be the next step after implementing a solution to a network troubleshooting problem? A. Verify functionality and implement preventive measures. B. Document findings, actions, and outcomes. C. Establish a theory of probable cause. D. Test the theory to determine the cause.

A

Which DNS record type holds the name-to-address mapping for IPv6 addresses? A) AAAA records B) CNAME records C) NS records D) MX records

A

Which of the following hostname commands resolves a device's hostname with its IP address on the network? A) hostname -I B) hostname C) sudo hostname D) hostname -A

A

Which of the following is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements? A. MSA B. RPF C. SLA D. MLA

A

Which of the following is an enclosed space that holds network equipment? A. Data room B. Demarc C. MDF D. Work area

A

Which of the following protocols will an Oracle Database use to communicate with other Oracle Databases? A) SQLnet B) SMB C) TFTP D) LDAP

A

Which of the following server racks would you use for a bolt-free mounting? A. Square-hole racks B. Round-hole racks C. Nonthreaded racks D. Threaded racks

A

Which of the following will act as the centralized point of connection for an organization's IDFs? A. MDF B. Data Room C. Demarc Point D. VoIP telephone equipment

A

Which of these is a node but not a host? A. Router B. Network printer C. File server D. Smartphone

A

You are adding new cables to a data outlet where you have to run the cables above the ceiling tile. What kind of cables should you use in such a scenario? A. Plenum-rated cable B. PVC C. STP D. UTP

A

You are evaluating a company's network and you notice that the hosts are all using IP addresses in the range of 172.16.0.0 through 172.31.255.255, with a subnet mask of 255.255.0.0. What class is in use? A) Class B B) Class C C) Class A D) APIPA

A

You have been sent to Kingston College to convert their regular analog phone system to digital calling using a broadband connection. Which of the following systems would you implement in such a scenario? A. VoIP B. SIP C. IMAP4 D. POP3

A

A client who has a small office setup has complained about a faulty wired connection in their LAN. When you arrive on-site, you ask to see their network documentation. Which of these documentation types are you especially interested in seeing? A. A rack diagram B. A wiring diagram C. A network diagram D. A Zenmap

B

Pisces Ltd. is a small logistics firm operating out of Los Angeles. Why recommend a P2P network model? A. A peer-to-peer network enables the network administrator to diagnose and monitor problems from a single interface. B. A client/server network is more expensive to set up and maintain than a peer-to-peer network. C. Peer-to-peer networks are scalable, so Pisces Ltd. will be ready for future growth. D. Peer-to-peer networks are well-secured, both physically and via software.

B

Royal Global Shipping has just set up a new department. They have rented an additional floor in their current building and have hired you to extend the network connection to this department. Which of the following would you need to set up on the new floor? A. SCADA B. IDF C. Demarc point D. MDF

B

The process of designing, implementing, and maintaining an entire network is called: A. SCADA. B. a system life cycle. C. a network loop. D. patch management.

B

To reach the web server, which type of port number must a tester enter in the browser address box along with the web server's IP address? A) A dynamic port number B) A private port number C) A registered port number D) A well-known port number

B

What device should be the center of a star topology for a home LAN? A. A hub B. Consumer-grade router C. A switch D. An industrial-grade router

B

What is a logical group of Windows servers controlling network access for a group of computers? A. RAID B. Domain C. Router D. Client

B

What is the maximum allowable distance for horizontal cabling? A. 90 m B. 100 m C. 7 m D. 50 m

B

What is true about change management procedures? A. Change management plans consider only the network, not the users. B. A change management plan should include how to reverse changes if they fail. C. Change management does not evaluate cost, only effectiveness. D. Changes should be done when many users are on the network.

B

What practice helps ensure users are not interrupted during a network upgrade? A. Talk to users to explain what will happen. B. Roll out changes in stages during off hours. C. Carefully document each step of the upgrade. D. Roll out changes all at once.

B

What would you apply to ensure a backup will be available if a server hard disk fails? A. Workgroup B. RAID C. Hypervisor D. AD

B

When Kyle visited Claremont Group of Institutions as a network professional to repair defective cable ends, he accidentally left more than an inch of exposed cable before a twisted-pair termination. That problem might his mistake lead to? A. It will increase the possibility of EMI, which will affect the network's signals. B. It will increase the possibility of transmission interference between wires. C. It will make it difficult to diagnose data errors. D. The cable may pull out of its connector.

B

Which of the following cables comes coated with a flame-resistant jacket? A. UTP cable B. Plenum cable C. PVC cable D. STP cable

B

Which of the following does a switch use to identify which device is using each physical connection point? A) FQDN B) MAC address C) IP address D) Port number

B

Which of the following is a centralized directory database that contains user account information and security for the entire group of computers in a Windows-based network? A. RAID B. Active Directory C. SQL Server D. Workgroups

B

Which of the following is a component of backbone cabling that runs between building floors? A. Work area B. Vertical cross connect C. IDF D. MDF

B

Which of the following is an example of an industrial controls system? A. EMI sensors B. HVAC sensors C. PVC D. MDF

B

Which of the following is an optional server that receives queries from local clients? A) Primary DNS server B) Forwarding DNS server C) Catching DNS server D) Secondary DNS server

B

Which of the following protocols is used by the echo request and echo reply of ping? A) Syslog B) ICMP C) NTP D) RDP

B

Which of the following statements is true for a peer-to-peer network and false for a client-server network? A. User accounts and passwords to the networks are all assigned in one place. B. They are simple to configure, and for this reason, they may be used in environments in which time or technical expertise is scarce. C. Access to multiple shared resources can be centrally granted to a single user or a group of users. D. Problems on the network can be monitored, diagnosed, and fixed from one location.

B

Which physical network topology does a network with five computers connected to a single broadband router represent? A. Mesh B. Star C. Bus D. Ring

B

Which protocol is used for web streaming but not for email? A. TCP B. UDP C. IMAP4 D. SNMP

B

Which protocol is used to send an email message? A. IMAP4 B. SMTP C. POP3 D. FTP

B

Yang, a network engineer, has been tasked with establishing a new long-distance connection for the branch offices between Manhattan and Texas by an ISP. Which of the following cables should he opt for to obtain maximum speed and bandwidth? A. STP B. Fiber optic cable C. UTP D. Patch cable

B

You are an employee for Asianet Solutions, which is an ISP. Rickwell Infrastructures has hired Asianet Solutions to establish a network connection in its organization. You have been sent to its office to stack up the routers, servers, and switches. Which of the following options would you use in such a scenario? A. Patch panel B. Rack C. VoIP D. Demarc

B

You are working as a network engineer with SkyNet Solutions. You have been sent to the Waylan Union High to establish a wireless link between the entrance facility and the main distribution frame. Which of the following cabling methods would you choose to complete the task at hand? A. Plenum cabling B. Backbone cabling C. Patch cabling D. Horizontal cabling

B

You have been hired to consult a multinational company about their network monitoring and security needs. Which of the following is a best practice you would recommend? A. All personnel should have access to all data rooms. B. SCADA systems should themselves be connected to the network. C. SCADA systems should monitor only the equipment in the MDF. D. Security cameras should be installed only at the MDF, not at the IDFs and other data rooms.

B

You work for an ISP that is interested in buying 500 broadband routers to replace the aging ones that some of their customers currently lease. You want to put the word out to vendors that you are open to receiving bids for this. What kind of a business document will you make available to interested vendors? A. An MOU B. An RFP C. An MSA D. An SOW

B

A client contacted you to ask for your cable installation services. The requirement is to set up a connection that connects workstations to the data room, and the distance between them spans 87 meters. Which of the following cabling methods would be an ideal option for this assignment? A. Backbone cabling B. Plenum cabling C. Horizontal cabling D. Patch cabling

C

As a network engineer, you have been sent to run data cable underground between buildings. Which of the following practices will help protect the cable from damage from pests and water? A. Install the cable at least 3 feet away from sources of EMI. B. Make sure that the cable sheath is plenum-rated. C. Install cable through conduits. D. Do not untwist the wire pairs more than one-half inch.

C

At which layer of the OSI model are IP addresses most important? A. Transport layer B. Data link layer C. Network layer D. Presentation layer

C

At which layer of the OSI model do email-related protocols operate such as POP3 and IMAP4? A. Data link layer B. Transport C. Application D. Network

C

If a twisted-pair cable has a diameter of 0.8 cm, which of the following options would you apply as the bend radius of the cable so that data transmission is not impaired? A. 3 cm B. 2.4 cm C. 3.2 cm D. 1.6 cm

C

James is troubleshooting a network issue where hosts connected to the same LAN can communicate but hosts that are separated by a router are not. At what layer of the OSI model should he start troubleshooting? A. Transport B. Physical C. Network D. Session

C

Sphinx Infra Ltd. has asked you to evaluate their network backup processes. When you arrive on site, you ask to see their documentation. In which type of documentation are you likely to find information about their backup processes? A. Procedures B. Software C. Network configuration D. Hardware

C

What connects segments of a multi-LAN network? A. Spoke B. Switch C. Backbone D. Router

C

What is help desk software used for? A. To specify how to handle substances like chemical solvents. B. To educate end users about preventing problems. C. To document problems and their resolutions. D. To accumulate insights and solutions to problems.

C

What is the data passed between utility programs or applications and the operating system known as? A. Ethernet B. Firmware C. Payload D. Host

C

What layer of the OSI model encapsulates data into packets? A. Transport B. Data Link C. Network D. Application

C

What method will you use to troubleshoot antivirus software? A. Escalate the problem. B. Use a bottom-to-top OSI layers approach. C. Use a top-to-bottom OSI layers approach. D. Check the change management policies.

C

What network model would be best suited for a university to enable data exchange among students and teachers? A. WAN B. PAN C. CAN D. LAN

C

What should you do after testing your theory to determine the cause of a problem? A. Implement the solution or escalate the problem. B. Document findings, actions, and outcomes. C. Establish a plan for resolving the problem. D. Verify functionality and implement preventive measures.

C

Which email-related protocol allows you to receive email messages locally but have them remain on the server? A. SMTP B. POP3 C. IMAP4 D. SSH

C

Which of the following consists of twisted-pair wires encased in a plastic sheath, with no EMI protection? A. MMF B. SMF C. UTP D. STP

C

Which of the following diagrams is needed while tracking and troubleshooting equipment installed in a rack? A. A network diagram B. A network mapper C. A rack diagram D. A wiring diagram

C

Which of the following is a DBMS application? A. FileZilla B. Apache C. Microsoft SQL Server D. Outlook

C

Which of the following manages the dynamic distribution of IP addresses to devices on a network? A) NAT B) A gateway C) A DHCP server D) A MAC address

C

Which of the following ports range from 49152 to 65535 and are open for use without restriction? A) Sockets B) Registered ports C) Dynamic and private ports D) Well-known ports

C

Which of the following statements is true? A. A DBMS does not support a multiuser environment. B. Standard FTP servers provide secure encryption for file transfer. C. An email can be downloaded to the client computer using POP3. D. HTTP provides secure transmission using encryption.

C

Which of the following statements is true? A. In a general scenario, if a network supports fewer than 15 computers, a client-server network model is the way to go. B. Logical topologies mostly refer to how computers work together with radio signals and other devices to form the physical network. C. In a peer-to-peer network model, each computer controls its own administration, resources, and security. D. Physical topologies mostly refer to how software controls access to network resources.

C

Which of these is a transport layer protocol used when message delivery must be guaranteed? A. Internet Message Access Protocol B. User Datagram Protocol C. Transmission Control Protocol D. Simple Network Management Protocol

C

You are creating a network diagram for a client, and you need a symbol that represents a router. Which of these is the best description of the router symbol, per Cisco? A. A plain hockey-puck shape. B. A small rectangular box that contains four arrows, all pointing outward. C. A hockey-puck shape with two arrows pointing inward and two arrows pointing outward. D. A brick wall symbol.

C

You are going to be rolling out a new version of a desktop operating system to client PCs. You've been instructed to minimize any inconvenience or downtime to the users as much as possible, but to get it done within a week. How will you proceed? A. Roll out the new version to all PCs at once during business hours. B. Roll out the new version to all PCs at once at night. C. Roll out the new version to a few test PCs first. Roll it out to more users only after it has proved to work. D. Place the upgrade utility on the file server and allow each user to choose when to run it.

C

At which layer of the OSI model do IPv4 and IPv6 operate? A) Data Link B) Transport C) Application D) Network

D

Hill Corporation Ltd., an Internet service provider, has been providing networking solutions to Riverdale High School for over a year. However, recently the administration at Riverdale High School has been complaining of an unstable connection. You are employed by Hill Corporation for the purpose of inspecting the issue at hand. What would be your first check point to ensure that there are no network issues from the service provider's end? A. The intermediate distribution frame (IDF) B. The data room C. The main distribution frame (MDF) D. The entrance facility (EF)

D

Larry has just moved several PCs to a different floor of the building. Now he needs to document what he did. In which type of documentation should he record his changes? A. Hardware B. Software C. Procedures D. Network configuration

D

What application will you suggest for file transfer between two computers? A. MySQL B. Ubuntu C. Nginx D. FileZilla

D

What fact is NOT relevant when documenting a solution in a knowledge base? A. The name of the technician who handled the problem. B. The symptoms of the problem. C. The contact name of the person reporting the issue. D. The length of time the problem persisted before it was solved.

D

What is the best choice of physical topology for a WAN with four locations ensuring communication if any device fails? A. Ring B. Star C. Bus D. Mesh

D

What is the purpose of the TXT DNS resource record? A) Holds the name-to-address mapping for IPv6 addresses B) Indicates the authoritative name server for a domain C) Identifies an email server D) Holds any type of free-form text

D

What is the scope of a wireless Internet subscription plan for a city or suburbs? A. PAN B. LAN C. WAN D. MAN

D

What is the third step in a network troubleshooting methodology? A. Establish a plan for solving the problem. B. Establish a theory of probable cause. C. Identify the problem and its symptoms. D. Test your theory to determine the cause.

D

What is your first point of action when troubleshooting a software issue? A. Establish a causal theory by following the OSI model. B. Document the data regarding the person who alerted you. C. Escalate the problem. D. Gather information about symptoms and conditions.

D

What older type of cable connection system uses a tool that pushes each wire individually into connection blocks? A. Patch panel B. Wall jack C. KVM D. Punchdown block

D

Which client-server services use Apache and Nginx? A. FTP services B. Email services C. DNS service D. Web services

D

Which element in a Domain Name System is a DNS client that requests information? A) Namespace B) Name server C) TLD D) Resolver

D

Which of the following cabling methods connects workstations to the closest data rooms? A. Backbone cabling B. Plenum cabling C. Patch cabling D. Horizontal cabling

D

Which of the following institutions assigns a manufacturer's OUI? A) IANA B) ICANN C) FQDN D) IEEE

D

Which of the following is NOT a recognized cabling type for horizontal cabling as per the ANSI/TIA standards? A. STP B. Fiber optic cable C. UTP D. Patch cable

D

Which of the following ports would you troubleshoot to sort out outgoing email issues? A) 21 B) 53 C) 23 D) 25

D

Which of the following protocols is used to synchronize clocks on computers throughout a network? A) TFTP B) IMAP4 C) LDAP D) NTP

D

Which of the following registered ports will you use to secure a connection with SSL? A) Port 514 B) Port 123 C) Port 3389 D) Port 443

D

Which of the following would you use to connect and organize lines running from wall jacks to racks of network devices? A. MMF B. Cable trays C. STP D. Patch panels

D

Which protocol establishes a secure, encrypted channel or tunnel between two computers? A. FTP B. POP3 C. Telnet D. SSH

D

Which top-level domain should Angela opt for to create a unique website? A) .eu B) .com C) .mil D) .biz

D

You have been hired to implement a major change in the financial software used by the accountants at a fast-food chain. On implementation, you notice that the devices are not compatible with the upgrade and have started showing errors, as a result of which the organization is unable to function. How should you proceed? A. Redo the upgrade. B. Check the rack diagram. C. Reconfigure the network. D. Rollback.

D


Related study sets

二年级 第十五课__这里有好多蔬菜!

View Set

Leadership - week 3 study questions

View Set