NETWORKING -SWITCHING 2

NETWORKING -SWITCHING 2

University

20 Qs

quiz-placeholder

Similar activities

Python Quiz

Python Quiz

University

15 Qs

Spreadsheet Fundamentals - Quiz2

Spreadsheet Fundamentals - Quiz2

University

20 Qs

Coding Karel 2

Coding Karel 2

KG - University

20 Qs

ITE TEST 2

ITE TEST 2

University

20 Qs

Computer Hardware - CPU & GPU

Computer Hardware - CPU & GPU

7th Grade - University

16 Qs

Web Development Revision 1

Web Development Revision 1

University

15 Qs

Java Quiz 4

Java Quiz 4

University

15 Qs

Skill Competition Quiz 2024

Skill Competition Quiz 2024

10th Grade - University

20 Qs

NETWORKING -SWITCHING 2

NETWORKING -SWITCHING 2

Assessment

Quiz

Computers

University

Easy

Created by

Victor Rodriguez

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A network technician has just configured NAC for connections using Cat 6 cables. However, none of the Windows clients can connect to the network. Which of

the following components should the technician check on the Windows workstations? (Choose two.)

Start the Wired AutoConfig service in the Services console.

Enable IEEE 802.1q Authentication in Network Interface Card Properties.

Enable IEEE 802.1x Authentication in Network Interface Card Properties.

Start the Wireless AutoConfig service in the Services console.

Enable IEEE 802.3 Ethernet IPv6 in Network Interface Card Properties.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network connection type requires line-of-sight called the Fresnel zone?

Microwave radio

Fiber optic

Coaxial

Ethernet

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-post rack, and there is power available for

this equipment. Which of the following would be the FIRST issue to remediate?

Air flow and cooling

UPS capability

Circuit labeling

Power redundancy

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A network topology requires a switch to be placed in an unsecured location. Which of the following techniques should be used to prevent unauthorized access?

(Choose two.)

Disabling unused ports

Upgrading firmware

File hashing

MAC filtering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the basic topology that fiber distributed data interface (FDDI) networking depends on?

Bus

Ring

Star

Mesh

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term references the ability of the different parts of a network to work together in the enviroment?

Availability

Integrity

Affordability

Usability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ASCII would be classified at which layer of the OSI ?

Layer 6

Layer 1

Layer 4

Layer 2

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?