
Basic Networking v2

Quiz
•
Computers
•
University
•
Medium

Safiha Risna
Used 4+ times
FREE Resource
58 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
58.1. Match the type of threat with the cause. Hardware threats
poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.
temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
physical damage to servers, routers, switches, cabling plant, and workstations.
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
58.2. Match the type of threat with the cause. Environmental threats
poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.
temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
physical damage to servers, routers, switches, cabling plant, and workstations.
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
58.3. Match the type of threat with the cause. Electrical threats
poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.
temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
physical damage to servers, routers, switches, cabling plant, and workstations.
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
58.4. Match the type of threat with the cause. Maintenance threats
poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.
temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
physical damage to servers, routers, switches, cabling plant, and workstations.
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
62.What are two problems that can be caused by a large number of ARP request and reply messages? (Choose two.)
Switches become overloaded because they concentrate all the traffic from the attached subnets.
The ARP request is sent as a broadcast, and will flood the entire subnet.
The network may become overloaded because ARP reply messages have a very large payload due to the 48-bit MAC address and 32-bit IP address that they contain.
A large number of ARP request and reply messages may slow down the switching process, leading the switch to make many changes in its MAC table.
All ARP request messages must be processed by all nodes on the local network.
Answer explanation
Explanation: ARP requests are sent as broadcasts:
(1) All nodes will receive them, and they will be processed by software, interrupting the CPU.
(2) The switch forwards (floods) Layer 2 broadcasts to all ports.
A switch does not change its MAC table based on ARP request or reply messages. The switch populates the MAC table using the source MAC address of all frames. The ARP payload is very small and does not overload the switch.
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
63.A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)
ping
ipconfig
nslookup
netsh interface ipv6 show neighbor
arp -a
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
67.What are the two most effective ways to defend against malware? (Choose two.)
Update the operating system and other application software.
Implement network firewalls.
Install and update antivirus software.
Implement a VPN.
Implement RAID.
Answer explanation
Explanation: A cybersecurity specialist must be aware of the technologies and measures that are used as countermeasures to protect the organization from threats and vulnerabilities.
Create a free account and access millions of resources
Similar Resources on Wayground
53 questions
[Q] Chapter 1: Introduction to Computers

Quiz
•
University
60 questions
quiz1 it exam

Quiz
•
University
56 questions
Produktif TKJ

Quiz
•
University
60 questions
Cloud Computing

Quiz
•
University
60 questions
Associate Diploma in Software Development Quiz- Set 1 (Amal)

Quiz
•
University
60 questions
GoalsRUs Twitch Stream 1

Quiz
•
University
60 questions
JARINGAN KOMPUTER LANJUT

Quiz
•
University
60 questions
Grand quiz - N&S - 1-4

Quiz
•
University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
21 questions
Spanish-Speaking Countries

Quiz
•
6th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
7 questions
Common and Proper Nouns

Interactive video
•
4th Grade - University
12 questions
Los numeros en español.

Lesson
•
6th Grade - University
7 questions
PC: Unit 1 Quiz Review

Quiz
•
11th Grade - University
7 questions
Supporting the Main Idea –Informational

Interactive video
•
4th Grade - University
12 questions
Hurricane or Tornado

Quiz
•
3rd Grade - University
7 questions
Enzymes (Updated)

Interactive video
•
11th Grade - University