Computers N4

Computers N4

12th Grade

25 Qs

quiz-placeholder

Similar activities

Soal Ulangan Internet 8.7

Soal Ulangan Internet 8.7

8th Grade - University

20 Qs

KUIZ DIAGNOSTIK

KUIZ DIAGNOSTIK

11th Grade - University

20 Qs

Domain 4 Network Security

Domain 4 Network Security

12th Grade

20 Qs

1stQ Quiz 1 E-Tech

1stQ Quiz 1 E-Tech

12th Grade

20 Qs

ETECH 2ND QUARTER QUIZ

ETECH 2ND QUARTER QUIZ

9th - 12th Grade

20 Qs

Konfigurasi Dasar MikroTik

Konfigurasi Dasar MikroTik

12th Grade - University

20 Qs

LATIHAN PSAJ DPK TJKT

LATIHAN PSAJ DPK TJKT

12th Grade

20 Qs

Cyber 1 Networking FINAL

Cyber 1 Networking FINAL

9th - 12th Grade

20 Qs

Computers N4

Computers N4

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

Akau Anyieth

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #78

Topic 1

A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?

  • A. 22

  • B. 23

  • C. 80

  • D. 3389

  • E. 8080

Answer explanation

  • Telnet uses UDP port 23.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #79

Topic 1

A technician is writing documentation regarding a company's server farm. The technician needs to confirm the server name for all Linux servers. Which of the following commands should the technician run?

  • A. ipconfig

  • B. nslookup

  • C. arp

  • D. route

Answer explanation

  • nslookup (name server lookup) is a tool used to perform DNS lookups in Linux. It is used to display DNS details, such as the IP address of a particular computer, the MX records for a domain, or the NS servers of a domain

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #80

Topic 1

A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring?

  • A. Ethernet collisions

  • B. A DDoS attack

  • C. A broadcast storm

  • D. Routing loops

Answer explanation

  • A broadcast storm is an abnormally high number of broadcast packets within a short period of time. They can overwhelm switches and endpoints as they struggle to keep up with processing the flood of packets. When this happens, network performance degrades.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #81

Topic 1

A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?

  • A. MIMO

  • B. TKIP

  • C. LTE

  • D. SSID

Answer explanation

  • The feature that should be configured to allow different wireless access through the same equipment is SSID (Service Set Identifier). SSID is a unique identifier that allows wireless devices to connect to a wireless network. By configuring multiple SSIDs, the store owner can provide separate wireless access for business equipment and patron use, while using the same wireless access points

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #82

Topic 1

Which of the following systems would MOST likely be found in a screened subnet?

  • A. RADIUS

  • B. FTP

  • C. SQL

  • D. LDAP

Answer explanation

  • A screened subnet, also known as a DMZ (Demilitarized Zone), is a network segment that sits between an organization's internal network and an external network, such as the internet. The purpose of a screened subnet is to host services that need to be accessible from both the internal network and the external network while providing an additional layer of security.

  • Among the options provided, the system that would MOST likely be found in a screened subnet is:

  • B. FTP (File Transfer Protocol)

  • FTP servers are often placed in a DMZ to allow external users to access files while segregating them from the internal network. This arrangement helps mitigate security risks associated with exposing file-sharing services to external users. Therefore, FTP is the most likely system to be found in a screened subnet.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #83

Topic 1

Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?

  • A. Scope options

  • B. Reservation

  • C. Dynamic assignment

  • D. Exclusion

  • E. Static assignment

Answer explanation

  • DHCP reservations allow the DHCP server to pre-set an IP address to a specific client based on its MAC address. This ensures that the client will always get the same IP address from the DHCP server when it connects to the network. DHCP reservations are usually used with servers or printers on your internal network and are rarely used with end-user devices.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #84

Topic 1

Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?

  • A. Motion detection

  • B. Access control vestibules

  • C. Smart lockers

  • D. Cameras

Answer explanation

  • Access control vestibules can ensure that each individual's entry into the datacenter is separately recorded by a card reader, even when multiple employees enter the facility at the same time. Access control vestibules are small rooms with two doors that require authorized individuals to present their access cards to enter or exit. The vestibules ensure that only authorized individuals enter the datacenter, and their entry is individually recorded by the card reader. Once the first door is closed, the employee must present their card again to enter the second door. This double-entry system ensures that access to the datacenter is controlled and recorded accurately.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?