Network Configuration Quiz
Quiz
•
Information Technology (IT)
•
9th - 12th Grade
•
Medium
Adrian Portillo
Used 4+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
How does a switch determine which port to send a frame to?
The switch looks up the destination MAC address in the CAM table. If found, it will send the frame out of all physical ports. If not found, it will send the frame out of the first physical port.
The switch looks up the destination MAC address in the CAM table. If found, it will send the frame out of the corresponding physical port. If not found, it will send the frame out of all other physical ports
The switch looks up the destination MAC address in the CAM table. If found, it will send the frame out of the first physical port. If not found, it will send the frame out of all physical ports.
The switch looks up the destination MAC address in the CAM table. If found, it will send the frame out of the corresponding physical port. If not found, it will send the frame out of the first physical port.
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A network technician is configuring VLANs on a new network. What is one performance benefit of this approach?
Traffic on the network is encrypted
Latency on the network is increased
Physical security on the network is increased.
Messages sent on the network may reach their destinations faster.
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A technician has reviewed a network log and discovered a potential MAC spoofing attack. Which of the following attacker tactics did the technician most likely identify?
The attacker masked their port with another port on the network.
The attacker mimicked their MAC address with another device’s MAC address on the network.
The attacker filled a switch’s MAC address table with fake entries.
The attacker masked their IP address with another device’s IP address on the network.
4.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A network administrator is tasked with securing a network’s switch. The following requirements must be met. Authorized devices are allowed to connect to the network via a physical port on the switch. Unauthorized device connections will be dropped if attempting to connect to the network via a physical port on the switch. Which of the following best explains how the switch’s port security should be configured?
The physical ports on the switch should be configured to up to allow all authorized device network traffic.
The physical ports on the switch should be configured to up but only allow a specific set of IP addresses.
The physical ports on the switch should be configured to up but only allow a specific set of MAC addresses.
The physical ports on the switch should be configured to up and only allow known device names.
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A network engineer is configuring a server to support encrypted remote access on port 22. Which of the following protocols should the network engineer use to access a device on the remote server?
RDP
SSH
SFTP
Telnet
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which of the following best describes the purpose of the POP3 application layer protocol?
Client retrieval of email messages from a mail server on default port 143.
Client sending of email messages to a mail server on default port 110.
Client sending of email messages to a mail server on default port 143.
Client retrieval of email messages from a mail server on default port 110.
7.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Review the following log file.
2024-10-24 14:43:10 INFO [SSH] Connection established from 192.168.1.10 to 192.168.1.20
2024-10-24 14:43:12 INFO [SSH] User 'gilbert' authenticated successfully
2024-10-24 14:43:14 INFO [SFTP] File upload initiated from 192.168.1.10 to 192.168.1.20:/home/gilbert/uploads 2024-10-24 14:43:16 INFO [SFTP] File 'report.pdf' uploaded successfully to /home/gilbert/uploads
Which of the following TCP/IP model layers are associated with the protocols in the log files?
Application
Transport
Internet
Network
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
12 questions
Kuis
Quiz
•
11th Grade
13 questions
DIGITAL LITERACY
Quiz
•
12th Grade - University
15 questions
CSS Image Manipulation Quiz
Quiz
•
9th Grade - University
10 questions
FASE F-ADMINISTRASI SISTEM JARINGAN
Quiz
•
12th Grade
10 questions
Soal Pilihan Ganda Jaringan LAN
Quiz
•
10th Grade
10 questions
Sistem Operasi 25
Quiz
•
12th Grade - University
10 questions
STS Konsentrasi Keahlian XI TJAT 1
Quiz
•
11th Grade
10 questions
ICT 9 Q1 M4 Computer Networks
Quiz
•
9th Grade
Popular Resources on Wayground
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
20 questions
MINERS Core Values Quiz
Quiz
•
8th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade
10 questions
How to Email your Teacher
Quiz
•
Professional Development
15 questions
Order of Operations
Quiz
•
5th Grade
Discover more resources for Information Technology (IT)
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
13 questions
Halloween Trivia
Quiz
•
9th Grade
12 questions
Graphing Inequalities on a Number Line
Quiz
•
9th Grade
20 questions
Cell Organelles
Quiz
•
9th Grade
20 questions
Cell Transport
Quiz
•
9th Grade
28 questions
Ser vs estar
Quiz
•
9th - 12th Grade
20 questions
Translations, Reflections & Rotations
Quiz
•
8th - 10th Grade
