
Computers N4
Quiz
•
Information Technology (IT)
•
12th Grade
•
Practice Problem
•
Hard
Akau Anyieth
FREE Resource
Enhance your content in a minute
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #78
Topic 1
A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?
A. 22
B. 23
C. 80
D. 3389
E. 8080
Answer explanation
Telnet uses UDP port 23.
Telnet uses UDP port 23.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #79
Topic 1
A technician is writing documentation regarding a company's server farm. The technician needs to confirm the server name for all Linux servers. Which of the following commands should the technician run?
A. ipconfig
B. nslookup
C. arp
D. route
Answer explanation
nslookup (name server lookup) is a tool used to perform DNS lookups in Linux. It is used to display DNS details, such as the IP address of a particular computer, the MX records for a domain, or the NS servers of a domain
nslookup (name server lookup) is a tool used to perform DNS lookups in Linux. It is used to display DNS details, such as the IP address of a particular computer, the MX records for a domain, or the NS servers of a domain
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #80
Topic 1
A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring?
A. Ethernet collisions
B. A DDoS attack
C. A broadcast storm
D. Routing loops
Answer explanation
A broadcast storm is an abnormally high number of broadcast packets within a short period of time. They can overwhelm switches and endpoints as they struggle to keep up with processing the flood of packets. When this happens, network performance degrades.
A broadcast storm is an abnormally high number of broadcast packets within a short period of time. They can overwhelm switches and endpoints as they struggle to keep up with processing the flood of packets. When this happens, network performance degrades.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #81
Topic 1
A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?
A. MIMO
B. TKIP
C. LTE
D. SSID
Answer explanation
The feature that should be configured to allow different wireless access through the same equipment is SSID (Service Set Identifier). SSID is a unique identifier that allows wireless devices to connect to a wireless network. By configuring multiple SSIDs, the store owner can provide separate wireless access for business equipment and patron use, while using the same wireless access points
The feature that should be configured to allow different wireless access through the same equipment is SSID (Service Set Identifier). SSID is a unique identifier that allows wireless devices to connect to a wireless network. By configuring multiple SSIDs, the store owner can provide separate wireless access for business equipment and patron use, while using the same wireless access points
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #82
Topic 1
Which of the following systems would MOST likely be found in a screened subnet?
A. RADIUS
B. FTP
C. SQL
D. LDAP
Answer explanation
A screened subnet, also known as a DMZ (Demilitarized Zone), is a network segment that sits between an organization's internal network and an external network, such as the internet. The purpose of a screened subnet is to host services that need to be accessible from both the internal network and the external network while providing an additional layer of security.
Among the options provided, the system that would MOST likely be found in a screened subnet is:
B. FTP (File Transfer Protocol)
FTP servers are often placed in a DMZ to allow external users to access files while segregating them from the internal network. This arrangement helps mitigate security risks associated with exposing file-sharing services to external users. Therefore, FTP is the most likely system to be found in a screened subnet.
A screened subnet, also known as a DMZ (Demilitarized Zone), is a network segment that sits between an organization's internal network and an external network, such as the internet. The purpose of a screened subnet is to host services that need to be accessible from both the internal network and the external network while providing an additional layer of security.
Among the options provided, the system that would MOST likely be found in a screened subnet is:
B. FTP (File Transfer Protocol)
FTP servers are often placed in a DMZ to allow external users to access files while segregating them from the internal network. This arrangement helps mitigate security risks associated with exposing file-sharing services to external users. Therefore, FTP is the most likely system to be found in a screened subnet.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #83
Topic 1
Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?
A. Scope options
B. Reservation
C. Dynamic assignment
D. Exclusion
E. Static assignment
Answer explanation
DHCP reservations allow the DHCP server to pre-set an IP address to a specific client based on its MAC address. This ensures that the client will always get the same IP address from the DHCP server when it connects to the network. DHCP reservations are usually used with servers or printers on your internal network and are rarely used with end-user devices.
DHCP reservations allow the DHCP server to pre-set an IP address to a specific client based on its MAC address. This ensures that the client will always get the same IP address from the DHCP server when it connects to the network. DHCP reservations are usually used with servers or printers on your internal network and are rarely used with end-user devices.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #84
Topic 1
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?
A. Motion detection
B. Access control vestibules
C. Smart lockers
D. Cameras
Answer explanation
Access control vestibules can ensure that each individual's entry into the datacenter is separately recorded by a card reader, even when multiple employees enter the facility at the same time. Access control vestibules are small rooms with two doors that require authorized individuals to present their access cards to enter or exit. The vestibules ensure that only authorized individuals enter the datacenter, and their entry is individually recorded by the card reader. Once the first door is closed, the employee must present their card again to enter the second door. This double-entry system ensures that access to the datacenter is controlled and recorded accurately.
Access control vestibules can ensure that each individual's entry into the datacenter is separately recorded by a card reader, even when multiple employees enter the facility at the same time. Access control vestibules are small rooms with two doors that require authorized individuals to present their access cards to enter or exit. The vestibules ensure that only authorized individuals enter the datacenter, and their entry is individually recorded by the card reader. Once the first door is closed, the employee must present their card again to enter the second door. This double-entry system ensures that access to the datacenter is controlled and recorded accurately.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Cloud Service Models & Software Process Models
Quiz
•
2nd Grade - University
20 questions
BÀI KIỂM TRA 15 PHÚT - Môn Tin Học 10 - HK2-PYTHON
Quiz
•
10th Grade - University
20 questions
Fase E. 12 TKJ CPH. Layanan hosting CP Hosting
Quiz
•
12th Grade
20 questions
Higher Admin Microsoft Word Advanced Features
Quiz
•
8th Grade - University
20 questions
Evaluasi Topologi Jaringan
Quiz
•
9th - 12th Grade
20 questions
Final - Informatics
Quiz
•
12th Grade
20 questions
SeguridadInformaticaBasicaMod2
Quiz
•
12th Grade
20 questions
Microsoft Excel Review Part 2
Quiz
•
8th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
12 questions
Add and Subtract Polynomials
Quiz
•
9th - 12th Grade
13 questions
Model Exponential Growth and Decay Scenarios
Quiz
•
9th - 12th Grade
27 questions
7.2.3 Quadrilateral Properties
Quiz
•
9th - 12th Grade
7 questions
Amoeba Sisters Dihybrid Cross Punnett Square
Interactive video
•
9th - 12th Grade
10 questions
The Holocaust: Historical Overview
Interactive video
•
9th - 12th Grade
10 questions
Key Features of Quadratic Functions
Interactive video
•
8th - 12th Grade
11 questions
Exponent Quotient Rules A1 U7
Quiz
•
9th - 12th Grade
