Search Header Logo

Network154-165

Authored by IT Support

Computers

1st Grade

Used 45+ times

Network154-165
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.154 Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?

(A). Firewall

(B). AP

(C). Proxy server

(D). IDS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.155 Which of the following is the LARGEST MTU for a standard Ethernet frame?

(A). 1452

(B). 1492

(C). 1500

(D). 2304

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.156 Which of the following attacks encrypts user data and requires a proper backup implementation to recover?

(A). DDoS

(B). Phishing

(C). Ransomware

(D). MAC spoofing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.157 A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default gateway and DNS server of the workstation According to troubleshooting methodology this is an example of:

(A). a divide-and-conquer approach

(B). gathering information

(C). a top-to-bottom approach

(D). Implementing a solution

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.158 At the destination host, which of the following OSI model layers will discard a segment with a bad checksum in the UDP header?

(A). Network

(B). Data link

(C). Transport

(D). Session

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.159 Several employees have expressed concerns about the company monitoring their internet activity when they are working from home. The company wants to mitigate this issue and reassure employees that their private internet activity is not being monitored. Which of the following would satisfy company and employee needs?

(A). Split tunnel

(B). Full tunnel

(C). Site-to-site tunnel

(D). Virtual desktop

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.160 During a risk assessment which of the following should be considered when planning to mitigate high CPU utilization of a firewall?

(A). Recovery time objective

(B). Uninterruptible power supply

(C). NIC teaming

(D). Load balancing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?