Search Header Logo

Network+ Practice Questions Day 10

Authored by Joshua Matthew Bailey

Computers

12th Grade

Network+ Practice Questions Day 10
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network device is configured to send critical events to a syslog server; however, the following alerts are not being received: Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down Which of the following describes the reason why the events are not being received?

The network device is not configured to log that level to the syslog server

The network device was down and could not send the event

The syslog server is not compatible with the network device

The syslog server did not have the correct MIB loaded to receive the message

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues?

CPU usage

Memory

Temperature

Bandwidth

Latency

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following transceiver types can support up to 40Gbps?

SFP+

QSFP+

QSFP

SFP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?

Firewall

AP

Proxy server

IDS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch. Which of the following should the technician utilize for the switch?

MIB

Trap

Syslog

Audit log

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?

Ensure an implicit permit rule is enabled

Configure the log settings on the firewalls to the central syslog server

Update the firewalls with current firmware and software

Use the same complex passwords on all firewalls

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?

Pass-the-hash attack

Rainbow table attack

Brute-force attack

Dictionary attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?