rtw43fzxs51.70

rtw43fzxs51.70

12th Grade

20 Qs

quiz-placeholder

Similar activities

Let's talk about advertising

Let's talk about advertising

9th - 12th Grade

15 Qs

Renewable Energy - TED-Ed

Renewable Energy - TED-Ed

10th Grade - Professional Development

20 Qs

DeBakey HSHP Integrity Month |Module 1: Intro

DeBakey HSHP Integrity Month |Module 1: Intro

9th - 12th Grade

18 Qs

Career Management Vocab 2.1

Career Management Vocab 2.1

9th - 12th Grade

18 Qs

Business Quiz

Business Quiz

10th Grade - University

17 Qs

Chapter 4: ROM/RAM

Chapter 4: ROM/RAM

9th Grade - Professional Development

15 Qs

FOOTBALL VOCABULARY

FOOTBALL VOCABULARY

1st Grade - University

20 Qs

Ch-4 masalah ekonomi  pelaporan keu

Ch-4 masalah ekonomi pelaporan keu

KG - Professional Development

18 Qs

rtw43fzxs51.70

rtw43fzxs51.70

Assessment

Quiz

Professional Development

12th Grade

Practice Problem

Easy

Created by

Tom Stha

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?

Virtual network computing

Secure Socket Shell

In-band connection

Site-to-site VPN

Answer explanation

Site-to-site VPN provides the best security for connecting a new datacenter to an old one because it creates a secure tunnel between the two locations, protecting data in transit. Reference: CompTIA Network+ Certification Study Guide, Chapter 5: Network Security.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?

Pass-the-hash attack

Rainbow table attack

Brute-force attack

Dictionary attack

Answer explanation

The attacker attempting to find the password to a network by inputting common words and phrasesin plaintext to the password prompt is using a dictionary attack. Reference: CompTIA Network+ Certification Study Guide, Chapter 6: Network Attacks and Mitigation.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technologies provides a failover mechanism for the default gateway?

FHRP

LACP

OSPF

STP

Answer explanation

First Hop Redundancy Protocol (FHRP) provides a failover mechanism for the default gateway, allowing a backup gateway to take over if the primary gateway fails. Reference: CompTIA Network+ Certification Study Guide, Chapter 4: Infrastructure.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The following configuration is applied to a DHCP server connected to a VPN concentrator:

There are 300 non-concurrentsales representatives who log in for one hour a day to upload reports, and 252 of these representatives are able to connect to the VPN without any Issues. The remaining sales representatives cannot connect to the VPN over the course of the day. Which of the following can be done to resolve the issue without utilizing additional resources?

Decrease the lease duration

Rebootthe DHCP server

Install a new VPN concentrator

Configure a new router

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A technician needs to configure a Linux computer for network monitoring. The technician hasthe following information:
look at image:

After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?

ifconfig ecth0 promisc

ifconfig eth1 up

ifconfig eth0 10.1.2.3

ifconfig eth1 hw ether A1:B2:C3:D4:E5:F6

Answer explanation

The ifconfig eth0 promisc command should be run on the Linux computer to enable promiscuous mode, which allows the computer to capture all network traffic passing through the switch mirror port. Reference: CompTIA Network+ Certification Study Guide, Chapter 7: Network Devices.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding?

Increased CRC errors

Increased giants and runts

. Increased switching loops

Increased device temperature

Answer explanation

Mismatched duplex settings can cause an increase in CRC errors, which are errorsin data transmission that can result in corrupted data. Reference: CompTIA Network+ Certification Study Guide, Chapter 4: Infrastructure.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following devices would be used to manage a corporate WLAN?

A wireless NAS

A wireless bridge

. A wireless router

A wireless controller

Answer explanation

A wireless controller is used to manage a corporate WLAN, providing centralized management and configuration of access points. Reference: CompTIA Network+ Certification Study Guide, Chapter 8: Wireless Networks.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development