Search Header Logo

Network Plus Questions

Authored by Ashley Brown

Computers

University

Used 4+ times

Network Plus Questions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

121 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following devices can operate on multiple layers of the OSI model?

Switch

Hub

Transceiver

Modem

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A network admin needs to connect two routers in a point-to-point configuration and conserve IP space. What of the following subnets should the admin use?

/30

724

/26

/28

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A network admin suspects users are being sent to malware sites that are posing as legitimate sites. The network admin investigates and discovers that user workstations are configured with incorrect DNS IP addresses. Which of the following should the network admin implement to prevent this from happening again?

DHCP Snooping

Dynamic ARP inspection

Access Control Lists

Port Security

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A network admin performed upgrades on a server and installed a new NIC to improve performance. Follwing the upgrades, user A is unable to reach the server. Which of the following is most likely the reason?

An incorrect cable type was installed

The PoE power budget was exceeded

TX/RX was transposed

A port security violation occured

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A customer recently moved into a new office and notices that some wall plates are not working and not properly labeled. Which of the following tools would be best to identify the proper wiring in the IDF?

Toner and Probe

Cable Tester

Visual Fault Locator

Network Tap

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are the best device-hardening techniques for network security?

Disabling Unused Ports

Performing Regular Scanning of Unauthorized Devices

Enabling Logical Security Such as SSO

Changing Default Passwords

Ensuring Least-Privilege Concepts Are in Place

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential. Which of the following will achieve this goal?

ESP

AH

GRE

IKE

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?