Search Header Logo

Network Engineering Quiz

Authored by Нұрсұлтанdl Кенжебай

Other

12th Grade

Used 1+ times

Network Engineering Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

59 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?

syslog records and messages

the network performance baseline

debug output and packet captures

network configuration files

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the service password-encryption command enhance password security on Cisco routers and switches?

It requires encrypted passwords to be used when connecting remotely to a router or switch with Telnet.

It encrypts passwords that are stored in router or switch configuration files.

It requires that a user type encrypted passwords to gain console access to a router or switch.

It encrypts passwords as they are sent across the network.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

The Source Address field name from IPv4 is kept in IPv6.

The Version field from IPv4 is not kept in IPv6.

The Destination Address field is new in IPv6.

The Header Checksum field name from IPv4 is kept in IPv6.

The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices: IP phones - 22 addresses, PCs - 20 addresses needed, Printers - 2 addresses needed, Scanners - 2 addresses needed. The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?

255.255.255.240

255.255.255.252

  • 255.255.255.224

255.255.255.0

255.255.255.248

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What characteristic describes identity theft?

the use of stolen credentials to access private data

software on a router that filters traffic based on IP addresses or applications

software that identifies fast-spreading threats

a tunneling protocol that provides remote users with secure access into the network of an organization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.240

255.255.255.0

255.255.255.248

255.255.255.224

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are three commonly followed standards for constructing and installing cabling? (Choose three.)

cable lengths

connector color

connector types

pinouts

cost per meter (foot)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?