A network technician is troubleshooting an issue where a workstation is not receiving an IP address from the DHCP server. What could be a possible cause?
a) Incorrect default gateway b) Misconfigured DNS server c) DHCP server unavailable d) Firewall blocking ports
Correct Answer: c) DHCP server unavailable
Explanation: If the DHCP server is unavailable, the workstation will not receive an IP address automatically.
Question 42
Which of the following routing protocols is considered a distance-vector protocol?
a) OSPF b) EIGRP c) RIP d) BGP
Correct Answer: c) RIP
Explanation: RIP (Routing Information Protocol) is a distance-vector routing protocol that determines the best path based on hop count.
Question 43
A technician needs to configure a secure method for transferring large files between two remote servers. Which of the following protocols should be used?
a) FTP b) TFTP c) SFTP d) HTTP
Correct Answer: c) SFTP
Explanation: SFTP (SSH File Transfer Protocol) provides secure file transfer between two remote servers using encryption.
Question 44
What is the purpose of a proxy server in a network?
a) To resolve domain names b) To block unauthorized access to the network c) To act as an intermediary between client devices and external services d) To route traffic between VLANs
Correct Answer: c) To act as an intermediary between client devices and external services
Explanation: A proxy server acts as an intermediary between client devices and external services, often used to improve security or performance.
Question 45
Which of the following ports is used by the Telnet protocol?
a) 22 b) 23 c) 443 d) 3389
Correct Answer: b) 23
Explanation: Telnet operates on port 23 and is used for remote access to devices over a network, although it is not secure.
Question 46
A technician is configuring a router to block traffic from a specific IP address. Which of the following should be configured to implement this restriction?
a) NAT b) ACL c) DHCP d) DNS
Correct Answer: b) ACL
Explanation: Access Control Lists (ACLs) are used to allow or block specific traffic based on IP addresses, protocols, or ports.
Question 47
A network administrator is setting up a wireless network and needs to ensure that only authorized users can access it. Which of the following security measures should be implemented?
a) MAC address filtering b) Open SSID c) WEP encryption d) DHCP reservations
Correct Answer: a) MAC address filtering
Explanation: MAC address filtering restricts access to the wireless network by allowing only authorized devices with specific MAC addresses to connect.
Question 48
Which of the following protocols is used for automated discovery of devices on a network?
a) SNMP b) LLDP c) FTP d) HTTP
Correct Answer: b) LLDP
Explanation: LLDP (Link Layer Discovery Protocol) is used for the automated discovery of devices on a network.
Question 49
What is the primary function of a load balancer in a network?
a) To route traffic between VLANs b) To distribute network traffic across multiple servers c) To filter network traffic based on rules d) To encrypt data in transi
Correct Answer: b) To distribute network traffic across multiple servers
Explanation: A load balancer distributes network traffic across multiple servers to ensure availability and improve performance.
Question 50
A network administrator is configuring a switch to assign IP addresses to clients dynamically. What feature must be enabled on the switch?
a) DNS b) DHCP c) SNMP d) VLANs
Correct Answer: b) DHCP
Explanation: DHCP (Dynamic Host Configuration Protocol) assigns IP addresses dynamically to clients on a network.