
Network+ Practice Questions Day 5

Quiz
•
Computers
•
9th - 12th Grade
•
Hard
Joshua Matthew Bailey
FREE Resource
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A network administrator Is looking at switch features and is unsure whether to purchase a model with PoE Which of the following devices that commonly utilize PoE should the administrator consider? (Select TWO)
d) Cable modems
b) Cameras
e) Laptops
c) Printers
a) VoIP phones
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
All packets arriving at an interface need to be fully analyzed. Which of me following features should be used to enable monitoring of the packets?
a) LACP
b) Flow control
c) Port mirroring
d) NetFlow explorer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following topologies requires the MOST connections when designing a network?
a) Mesh
b) Star
c) Bus
d) Ring
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network technician is troubleshooting a new web server connectivity issue. The network technician discovers the following on the support ticket • The server's IP address can be pinged from the client PCs, • Access to the web resource works correctly when on the server's console. • No clients can access the server's data via URL. • The server does not have a firewall configured • No ACLs are preventing connectivity from the client's network. • All services on the server are operating normally, which was confirmed by the server team. Which of the following actions will resolve the issue?
a) Reset port security on the switchport connecting the server.
b) Adjust the web server's NTP settings to match the client settings.
c) Configure A records for the web server.
d) Install the correct MIB on the web server
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following types of attacks can be used to gain credentials by setting up rogue APs with identical corporate SSIDs?
a) VLAN hopping
b) Evil twin
c) DNS poisoning
d) Social engineering
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization set up its offices so that a desktop is connected to the network through a VoIP phone. The VoIP vendor requested that voice traffic be segmented separately from non-voice traffic. Which of the following would allow the organization to configure multiple devices with network isolation on a single switch port?
a) Subinterfaces
b) Link aggregation
c) Load balancing
d) Tunneling
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A systems administrator wants to use the least amount of equipment to segment two departments that have cables terminating in the same room. Which of the following would allow this to occur?
a) A load balancer
b) A proxy server
c) A Layer 3 switch
d) A hub
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Computer Networks - I

Quiz
•
12th Grade
18 questions
Cyber EOP - DHCP DNS Gateway Subnet Mask By Mr. B

Quiz
•
12th Grade - University
15 questions
6.6 Application Delivery

Quiz
•
9th - 12th Grade
20 questions
IGCSE ICT: Networking 1

Quiz
•
9th - 10th Grade
21 questions
Networks

Quiz
•
10th Grade
15 questions
Digital Devices

Quiz
•
1st - 12th Grade
16 questions
Network Vocab

Quiz
•
8th - 10th Grade
20 questions
asj materi kontrol dan monitoring jaringan

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
20 questions
Analog vs Digital

Quiz
•
9th - 12th Grade
10 questions
CTEA Computer Vocab Terms #1

Quiz
•
12th Grade
10 questions
Exploring Cybersecurity Techniques and Threats

Interactive video
•
6th - 10th Grade
10 questions
Understanding the Internet and Data Transmission

Interactive video
•
7th - 12th Grade