Net Plus Day 7

Net Plus Day 7

12th Grade - University

10 Qs

quiz-placeholder

Similar activities

Unit 28 - Quiz #1

Unit 28 - Quiz #1

University

15 Qs

PROBLEM SOLVING USING R  UNIT I  MCQS

PROBLEM SOLVING USING R UNIT I MCQS

University

15 Qs

Quiz on Basics of C

Quiz on Basics of C

University

10 Qs

PYTHON_CHAPTER 6

PYTHON_CHAPTER 6

University

10 Qs

nestedif _ And _ Or

nestedif _ And _ Or

University

10 Qs

CHAPTER 5 ONLINE QUIZ

CHAPTER 5 ONLINE QUIZ

University

9 Qs

Database Concepts

Database Concepts

11th - 12th Grade

15 Qs

BTEC Level 3 Nat Ext Dip in Computing - Unit 2.1 Hardware and Software

BTEC Level 3 Nat Ext Dip in Computing - Unit 2.1 Hardware and Software

11th - 12th Grade

10 Qs

Net Plus Day 7

Net Plus Day 7

Assessment

Quiz

Computers

12th Grade - University

Medium

Created by

David Winters

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company has completed construction of a new datacenter, and the IT staff is now planning to relocate all server and network equipment from the old site to the new site.

Which of the following should the IT staff reference to determine the location of the equipment being moved?

A. Rack diagrams

B. Network topology

C. Standard operating procedures

D. Wiring documentation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?

A. MAC address reservation

B. Static IP address

C. IP address exclusion

D. Custom DNS server entry

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician wants to prevent an unauthorized host from connecting to the network via Ethernet.

Which of the following is a Layer 2 access control the technician should implement?

A. Access control lists

B. Captive portal

C. WPA2

D. Port security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests.

Which of the following represents the MOST secure method to configure guest access to the wireless network?

A. Guests should log into a separate wireless network using a captive portal

B. Guests should log into the current wireless network using credentials obtained upon entering the facility

C. The existing wireless network should be configured to allow guest access

D. An additional wireless network should be configured to allow guest access

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers.

Which of the following should the network team implement to fulfill the request?

A. Proxy server

B. UTM appliance

C. Content filter

D. Load balancer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network technician is deploying mobile phones for a company’s sales staff.

Salespeople frequently travel nationally and internationally to meet with clients and often have to roam or switch cellular providers.

Which of the following standards is the BEST option to fit the requirements?

A. TDM

B. GSM

C. CDMA

D. PSTN

E. MIMO

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet.

Which of the following indicates the correct IP address range?

A. 172.16.80.0-172.16.85.254

B. 172.16.80.0-172.16.88.255

C. 172.16.80.1-172.16.87.254

D. 172.16.80.1-172.16.85.255

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?