Which protocol is used to retrieve email from a mail server and allows users to keep messages on the server?
a) SMTP b) POP3 c) IMAP d) SNMP
Correct Answer: c) IMAP
Explanation: IMAP (Internet Message Access Protocol) allows users to retrieve email from a server and keep messages stored on the server.
Question 42
What technology allows network traffic to be divided into multiple isolated segments, even though they share the same physical infrastructure?
a) NAT b) VLAN c) DHCP d) VPN
Correct Answer: b) VLAN
Explanation: VLAN (Virtual Local Area Network) allows network traffic to be divided into isolated segments within the same physical network.
Question 43
A technician needs to configure a switch port to support multiple VLANs. Which configuration should be applied to the port?
a) Access port b) Trunk port c) Loopback port d) Spanning port
Correct Answer: b) Trunk port
Explanation: A trunk port allows multiple VLANs to traverse a single switch port.
Question 44
A user reports that they are unable to connect to a remote server by its hostname but can connect by its IP address. What is most likely the issue?
a) IP conflict b) DNS issue c) Firewall block d) VLAN misconfiguration
Correct Answer: b) DNS issue
Explanation: If a user can connect to a server by IP but not by hostname, there is likely a DNS resolution issue.
Question 45
Which of the following methods can be used to prevent unauthorized devices from connecting to a wireless network?
a) Disable SSID broadcast b) Enable MAC filtering c) Use static IP addressing d) Enable DHCP snooping
Correct Answer: b) Enable MAC filtering
Explanation: MAC filtering is used to control which devices are allowed to connect to a wireless network based on their MAC addresses.
Question 46
A company wants to implement a solution that allows users to authenticate to multiple services using a single set of credentials. Which technology should be implemented?
a) MFA b) SSO c) VPN d) LDAP
Correct Answer: b) SSO
Explanation: SSO (Single Sign-On) allows users to authenticate to multiple services using a single set of credentials.
Question 47
Which protocol is used to manage network devices such as switches and routers?
a) SMTP b) SNMP c) HTTP d) DHCP
Correct Answer: b) SNMP
Explanation: SNMP (Simple Network Management Protocol) is used to monitor and manage network devices.
Question 48
A network technician needs to configure a static route on a router. What information is required to create the static route?
a) DNS server IP b) Default gateway c) Destination network and next-hop IP d) DHCP server IP
Correct Answer: c) Destination network and next-hop IP
Explanation: To create a static route, the destination network and the next-hop IP address must be specified.
Question 49
Which of the following best describes an IPS (Intrusion Prevention System)?
a) A device that monitors network traffic for malicious activity and blocks it in real-time b) A tool used for analyzing network traffic logs c) A software used to detect and prevent phishing emails d) A service that filters spam emails
Correct Answer: a) A device that monitors network traffic for malicious activity and blocks it in real-time
Explanation: An IPS monitors network traffic for suspicious activity and can actively block malicious traffic.
Question 50
Which technology allows for the secure transmission of data between two devices over the internet by creating a private network within the public internet?
a) NAT b) VLAN c) VPN d) DNS
Correct Answer: c) VPN
Explanation: VPN (Virtual Private Network) allows for secure transmission of data by creating an encrypted tunnel between two devices over the internet.