Search Header Logo

Network+ Practice Questions Day 5

Authored by Joshua Matthew Bailey

Computers

9th - 12th Grade

Network+ Practice Questions Day 5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A network administrator Is looking at switch features and is unsure whether to purchase a model with PoE Which of the following devices that commonly utilize PoE should the administrator consider? (Select TWO)

d) Cable modems

b) Cameras

e) Laptops

c) Printers

a) VoIP phones

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All packets arriving at an interface need to be fully analyzed. Which of me following features should be used to enable monitoring of the packets?

a) LACP

b) Flow control

c) Port mirroring

d) NetFlow explorer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following topologies requires the MOST connections when designing a network?

a) Mesh

b) Star

c) Bus

d) Ring

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network technician is troubleshooting a new web server connectivity issue. The network technician discovers the following on the support ticket • The server's IP address can be pinged from the client PCs, • Access to the web resource works correctly when on the server's console. • No clients can access the server's data via URL. • The server does not have a firewall configured • No ACLs are preventing connectivity from the client's network. • All services on the server are operating normally, which was confirmed by the server team. Which of the following actions will resolve the issue?

a) Reset port security on the switchport connecting the server.

b) Adjust the web server's NTP settings to match the client settings.

c) Configure A records for the web server.

d) Install the correct MIB on the web server

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of attacks can be used to gain credentials by setting up rogue APs with identical corporate SSIDs?

a) VLAN hopping

b) Evil twin

c) DNS poisoning

d) Social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization set up its offices so that a desktop is connected to the network through a VoIP phone. The VoIP vendor requested that voice traffic be segmented separately from non-voice traffic. Which of the following would allow the organization to configure multiple devices with network isolation on a single switch port?

a) Subinterfaces

b) Link aggregation

c) Load balancing

d) Tunneling

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A systems administrator wants to use the least amount of equipment to segment two departments that have cables terminating in the same room. Which of the following would allow this to occur?

a) A load balancer

b) A proxy server

c) A Layer 3 switch

d) A hub

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?