Network + Quiz Domain 4 -5

Network + Quiz Domain 4 -5

Professional Development

9 Qs

quiz-placeholder

Similar activities

Measure up

Measure up

Professional Development

13 Qs

Network - Test 3

Network - Test 3

Professional Development

7 Qs

Network+ Quiz 1

Network+ Quiz 1

Professional Development

10 Qs

Network Fundamentals-Physical layer

Network Fundamentals-Physical layer

9th Grade - Professional Development

14 Qs

A+ Review Quiz

A+ Review Quiz

Professional Development

10 Qs

Computer Science

Computer Science

Professional Development

10 Qs

Cybersecurity

Cybersecurity

Professional Development

10 Qs

Intro to Cybersecurity 3

Intro to Cybersecurity 3

12th Grade - Professional Development

12 Qs

Network + Quiz Domain 4 -5

Network + Quiz Domain 4 -5

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Kerwin Vialva

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?

  • A. Establish a theory.

  • B. Implement the solution.

  • C. Create a plan of action.

  • D. Verify functionality.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

  • A. LLDP

  • B. IKE

  • C. VLAN

  • D. netstat

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A network administrator wants to implement an authentication process for temporary access to an organization's network. Which of the following technologies would facilitate this process?

  • A. Captive portal

  • B. Enterprise authentication

  • C. Ad hoc network

  • D. WPA3

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?

  • A. netstat

  • B. nslookup

  • C. ping

  • D. tracert

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?

  • A. DNS poisoning

  • B. Denial-of-service

  • C. Social engineering

  • D. ARP spoofing

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools would help identify which ports are open on the remote file server?

  • A. dig

  • B. nmap

  • C. tracert

  • D. nslookup

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the next step to take after successfully testing a root cause theory?

  • A. Determine resolution steps.

  • B. Duplicate the problem in a lab.

  • C. Present the theory for approval.

  • D. Implement the solution to the problem.

8.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following should be used to obtain remote access to a network appliance that has failed to start up properly?

  • A. Crash cart

  • B. Jump box

  • C. Secure Shell

  • D. Out-of-band management

9.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A company's office has publicly accessible meeting rooms equipped with network ports. A recent audit revealed that visitors were able to access the corporate network by plugging personal laptops into open network ports. Which of the following should the company implement to prevent this in the future?

  • A. URL filters

  • B. VPN

  • C. ACLs

  • D. NAC