
Basic Networking v2
Quiz
•
Computers
•
University
•
Practice Problem
•
Medium
Safiha Risna
Used 4+ times
FREE Resource
Enhance your content in a minute
58 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
58.1. Match the type of threat with the cause. Hardware threats
poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.
temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
physical damage to servers, routers, switches, cabling plant, and workstations.
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
58.2. Match the type of threat with the cause. Environmental threats
poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.
temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
physical damage to servers, routers, switches, cabling plant, and workstations.
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
58.3. Match the type of threat with the cause. Electrical threats
poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.
temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
physical damage to servers, routers, switches, cabling plant, and workstations.
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
58.4. Match the type of threat with the cause. Maintenance threats
poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.
temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
physical damage to servers, routers, switches, cabling plant, and workstations.
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
62.What are two problems that can be caused by a large number of ARP request and reply messages? (Choose two.)
Switches become overloaded because they concentrate all the traffic from the attached subnets.
The ARP request is sent as a broadcast, and will flood the entire subnet.
The network may become overloaded because ARP reply messages have a very large payload due to the 48-bit MAC address and 32-bit IP address that they contain.
A large number of ARP request and reply messages may slow down the switching process, leading the switch to make many changes in its MAC table.
All ARP request messages must be processed by all nodes on the local network.
Answer explanation
Explanation: ARP requests are sent as broadcasts:
(1) All nodes will receive them, and they will be processed by software, interrupting the CPU.
(2) The switch forwards (floods) Layer 2 broadcasts to all ports.
A switch does not change its MAC table based on ARP request or reply messages. The switch populates the MAC table using the source MAC address of all frames. The ARP payload is very small and does not overload the switch.
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
63.A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)
ping
ipconfig
nslookup
netsh interface ipv6 show neighbor
arp -a
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
67.What are the two most effective ways to defend against malware? (Choose two.)
Update the operating system and other application software.
Implement network firewalls.
Install and update antivirus software.
Implement a VPN.
Implement RAID.
Answer explanation
Explanation: A cybersecurity specialist must be aware of the technologies and measures that are used as countermeasures to protect the organization from threats and vulnerabilities.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
53 questions
Modules 1-2
Quiz
•
University
55 questions
Information Security Management System - Kuis 1
Quiz
•
University
60 questions
IS1 extra 2021
Quiz
•
University
61 questions
TOPOLOGIAS
Quiz
•
University - Professi...
62 questions
SAINS KOMPUTER TING 4 - 1.2 ALGORITMA
Quiz
•
12th Grade - University
60 questions
JavaScript -MIDTERM EXAM
Quiz
•
University
60 questions
K11 - ĐỀ CƯƠNG
Quiz
•
11th Grade - University
53 questions
System Analysis and Design (Prelim Exam)
Quiz
•
University
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
Discover more resources for Computers
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)
Quiz
•
8th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
9 questions
Principles of the United States Constitution
Interactive video
•
University
18 questions
Realidades 2 2A reflexivos
Quiz
•
7th Grade - University
10 questions
Dichotomous Key
Quiz
•
KG - University
25 questions
Integer Operations
Quiz
•
KG - University
7 questions
What Is Narrative Writing?
Interactive video
•
4th Grade - University
20 questions
SER vs ESTAR
Quiz
•
7th Grade - University
