-
web.groovymark@gmail.com
- December 3, 2024
Question 21
A company is expanding its network and needs to ensure that only authorized devices can connect to its wireless network. Which of the following would best meet this requirement?
a) WPA2-PSK
b) WEP
c) Open network
d) MAC address filtering
Correct Answer: a) WPA2-PSK
Explanation: WPA2-PSK provides secure encryption and ensures that only authorized users with the correct pre-shared key can access the network.
Question 22
A network technician is troubleshooting an issue where users cannot access certain external websites. Upon investigation, the technician discovers that all requests to these websites are being blocked. What is the most likely cause of this issue?
a) Incorrect DNS settings
b) Firewall rules
c) Faulty switch
d) Cable failure
Correct Answer: b) Firewall rules
Explanation: Firewall rules can block specific websites or IP ranges, preventing access to those sites from within the network.
Question 23
Which of the following protocols is responsible for resolving IP addresses to MAC addresses?
a) ARP
b) DHCP
c) DNS
d) ICMP
Correct Answer: a) ARP
Explanation: ARP (Address Resolution Protocol) is used to map IP addresses to MAC addresses in a local area network.
Question 24
What type of cabling should a network technician install to ensure the network is protected from electromagnetic interference (EMI) in an industrial environment?
a) UTP
b) STP
c) Coaxial
d) Fiber optic
Correct Answer: d) Fiber optic
Explanation: Fiber optic cabling is immune to electromagnetic interference, making it ideal for environments with high EMI.
Question 25
Which of the following is a characteristic of a stateful firewall?
a) Tracks the state of network connections
b) Filters traffic based on IP address only
c) Filters traffic at the application layer
d) Does not keep track of connection states
Correct Answer: a) Tracks the state of network connections
Explanation: Stateful firewalls track the state of active connections and make decisions based on the context of the traffic.
Question 26
A technician needs to install a new VoIP phone system in a company. Which of the following network services should be configured to ensure voice traffic is prioritized?
a) STP
b) NAT
c) QoS
d) VLAN
Correct Answer: c) QoS
Explanation: Quality of Service (QoS) is used to prioritize certain types of traffic, such as voice, over other types to ensure reliable communication.
Question 27
What is the primary purpose of VLANs in a network?
a) Increase wireless coverage
b) Segment a network for security and traffic management
c) Reduce the number of IP addresses required
d) Improve the speed of data transfer
Correct Answer: b) Segment a network for security and traffic management
Explanation: VLANs are used to logically segment a network to improve security and manage network traffic more effectively.
Question 28
Which of the following ports is used by HTTPS?
a) 80
b) 21
c) 443
d) 25
Correct Answer: c) 443
Explanation: HTTPS uses TCP port 443 for secure web traffic.
Question 29
A network administrator wants to prevent unauthorized devices from accessing the network by requiring authentication for devices connected to a switch. Which protocol should the administrator use?
a) STP
b) SNMP
c) 802.1X
d) DHCP
Correct Answer: c) 802.1X
Explanation: 802.1X is used for port-based authentication, ensuring that only authorized devices can access the network.
Question 30
Which command can be used on a Windows machine to release and renew the DHCP lease?
a) ifconfig
b) ping
c) tracert
d) ipconfig
Correct Answer: d) ipconfig
Explanation: The ipconfig command in Windows is used to release and renew DHCP leases, along with displaying network configuration.
Question 31
Which of the following technologies allows for the tunneling of IPv6 traffic over an IPv4 network?
a) RIP
b) SLAAC
c) 6to4
d) ICMP
Correct Answer: c) 6to4
Explanation: 6to4 is a tunneling method that allows IPv6 traffic to be transmitted over an IPv4 network.
Question 32
A network administrator needs to assign IP addresses to several new devices on a network but does not want to assign them manually. What service should the administrator configure?
a) DNS
b) ARP
c) DHCP
d) SNMP
Correct Answer: c) DHCP
Explanation: DHCP automatically assigns IP addresses to devices on a network.
Question 33
Which of the following is used to prevent loops in a network?
a) VLAN
b) ARP
c) STP
d) DHCP
Correct Answer: c) STP
Explanation: Spanning Tree Protocol (STP) is used to prevent loops in Ethernet networks by disabling redundant links.
Question 34
Which type of cable is commonly used for high-speed data transmission over short distances in a data center environment?
a) Coaxial
b) UTP
c) STP
d) Fiber optic
Correct Answer: d) Fiber optic
Explanation: Fiber optic cables are often used for high-speed data transmission in data centers due to their high bandwidth and resistance to interference.
Question 35
Which of the following IP address ranges is reserved for documentation and example purposes?
a) 192.168.0.0/24
b) 198.51.100.0/24
c) 172.16.0.0/12
d) 224.0.0.0/4
Correct Answer: b) 198.51.100.0/24
Explanation: The range 198.51.100.0/24 is reserved for documentation and examples, as specified by RFC 5737.
Question 36
A company is setting up a wireless network that must support high data rates and operate on the 5 GHz band. Which of the following wireless standards should the company implement?
a) 802.11b
b) 802.11g
c) 802.11n
d) 802.11ac
Correct Answer: d) 802.11ac
Explanation: 802.11ac operates on the 5 GHz band and supports higher data rates compared to older wireless standards.
Question 37
Which of the following routing protocols is a distance-vector protocol and uses hop count as its primary metric?
a) OSPF
b) BGP
c) RIP
d) EIGRP
Correct Answer: c) RIP
Explanation: RIP (Routing Information Protocol) is a distance-vector protocol that uses hop count to determine the best route.
Question 38
Which protocol is responsible for converting a public IP address into a private IP address when communicating with external networks?
a) DNS
b) ARP
c) NAT
d) ICMP
Correct Answer: c) NAT
Explanation: NAT (Network Address Translation) is responsible for converting private IP addresses into public IP addresses for communication with external networks.
Question 39
Which command is used to display the routing table on a Linux machine?
a) ping
b) traceroute
c) netstat
d) route
Correct Answer: d) route
Explanation: The route command is used to display or modify the routing table on a Linux machine.
Question 40
What is the maximum size of a standard Ethernet frame, excluding the preamble?
a) 1500 bytes
b) 1518 bytes
c) 1600 bytes
d) 9000 bytes
Correct Answer: b) 1518 bytes
Explanation: The maximum size of a standard Ethernet frame, excluding the preamble, is 1518 bytes, which includes the Ethernet header and trailer.