-
web.groovymark@gmail.com
- December 3, 2024
Question 21
Which of the following methods is used by IPv6 to allow a host to automatically assign an IP address without a DHCP server?
a) APIPA
b) SLAAC
c) NAT
d) Static addressing
Correct Answer: b) SLAAC
Explanation: SLAAC (Stateless Address Autoconfiguration) allows IPv6 devices to configure their own IP addresses without the need for a DHCP server.
Question 22
What type of network device combines the features of a switch and a wireless access point?
a) Router
b) Bridge
c) Hub
d) Wireless router
Correct Answer: d) Wireless router
Explanation: A wireless router combines the functionality of a switch for wired devices and a wireless access point for wireless devices.
Question 23
Which of the following is used to detect and prevent unauthorized access to a wireless network?
a) WPA2
b) HTTP
c) NAT
d) FTP
Correct Answer: a) WPA2
Explanation: WPA2 (Wi-Fi Protected Access 2) is a security protocol used to protect wireless networks from unauthorized access.
Question 24
A technician needs to prioritize voice traffic over other types of traffic on a network. Which feature should be implemented to achieve this?
a) NAT
b) DHCP
c) QoS
d) DNS
Correct Answer: c) QoS
Explanation: QoS (Quality of Service) is used to prioritize certain types of network traffic, such as voice or video, over other traffic.
Question 25
What type of cable is used for high-speed, long-distance connections and is immune to electromagnetic interference?
a) Coaxial cable
b) Twisted-pair cable
c) Fiber optic cable
d) Serial cable
Correct Answer: c) Fiber optic cable
Explanation: Fiber optic cables are used for high-speed, long-distance connections and are immune to electromagnetic interference.
Question 26
Which protocol is used to synchronize time across devices on a network?
a) SNMP
b) NTP
c) SMTP
d) DHCP
Correct Answer: b) NTP
Explanation: NTP (Network Time Protocol) is used to synchronize time across network devices.
Question 27
Which of the following commands can be used to trace the path that packets take to a destination on a network?
a) ping
b) nslookup
c) tracert
d) ipconfig
Correct Answer: c) tracert
Explanation: tracert is used to trace the path that packets take from source to destination, showing each hop along the way.
Question 28
What feature of a switch ensures that only authorized devices can connect to the network by verifying MAC addresses?
a) VLAN
b) DHCP
c) Port security
d) QoS
Correct Answer: c) Port security
Explanation: Port security is used on switches to allow only authorized devices to connect by verifying their MAC addresses.
Question 29
A user reports slow network performance while working on a Wi-Fi connection. Upon investigation, the network administrator discovers many devices using the same channel. What could be done to improve performance?
a) Use a stronger encryption method
b) Change the Wi-Fi channel
c) Increase the signal strength
d) Disable SSID broadcast
Correct Answer: b) Change the Wi-Fi channel
Explanation: Changing the Wi-Fi channel can reduce interference from other devices using the same channel, improving performance.
Question 30
A company uses a web-based application that must be accessible by employees and customers from different locations. Which type of IP address should be assigned to the server hosting the application?
a) Private IP
b) Public IP
c) APIPA
d) Multicast IP
Correct Answer: b) Public IP
Explanation: A public IP address is required for a server that needs to be accessible over the internet.
Question 31
A technician needs to verify whether a specific switch port is connected to a particular device. Which command should be used on a Cisco switch to view this information?
a) show ip route
b) show vlan
c) show interfaces
d) show mac address-table
Correct Answer: d) show mac address-table
Explanation: The show mac address-table command displays the MAC addresses associated with specific switch ports.
Question 32
What is the primary advantage of using fiber optic cables over copper cables for data transmission?
a) Cost
b) Durability
c) Higher bandwidth and longer distance
d) Compatibility with existing hardware
Correct Answer: c) Higher bandwidth and longer distance
Explanation: Fiber optic cables support higher bandwidth and longer distance transmission than copper cables.
Question 33
Which of the following protocols is used to provide secure remote access to network devices?
a) FTP
b) Telnet
c) SSH
d) SNMP
Correct Answer: c) SSH
Explanation: SSH (Secure Shell) is used to provide secure remote access to network devices.
Question 34
What is the default subnet mask for a Class C IPv4 address?
a) 255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.255.255
Correct Answer: c) 255.255.255.0
Explanation: The default subnet mask for a Class C IPv4 address is 255.255.255.0.
Question 35
Which of the following protocols is used to send email from a client to a mail server?
a) POP3
b) SMTP
c) IMAP
d) SNMP
Correct Answer: b) SMTP
Explanation: SMTP (Simple Mail Transfer Protocol) is used to send email from a client to a mail server.
Question 36
A network administrator needs to configure a switch to prevent loops when redundant links are present. Which protocol should be enabled on the switch?
a) OSPF
b) RIP
c) STP
d) EIGRP
Correct Answer: c) STP
Explanation: STP (Spanning Tree Protocol) prevents loops in networks with redundant links.
Question 37
What type of server is responsible for translating domain names into IP addresses?
a) DHCP server
b) Web server
c) DNS server
d) Proxy server
Correct Answer: c) DNS server
Explanation: A DNS server translates domain names into IP addresses for devices to connect to websites.
Question 38
A company needs to connect multiple LANs across several branch offices. Which technology would be best suited for this?
a) WAN
b) VLAN
c) VPN
d) LAN
Correct Answer: a) WAN
Explanation: A WAN (Wide Area Network) connects multiple LANs across geographically dispersed locations.
Question 39
A technician needs to find out the IP address configuration of a Windows machine. Which command should they use?
a) ifconfig
b) ipconfig
c) ping
d) netstat
Correct Answer: b) ipconfig
Explanation: The ipconfig command is used to view the IP address configuration of a Windows machine.
Question 40
A network engineer is troubleshooting a network issue and wants to see the active connections on a server. Which command would be most appropriate?
a) ping
b) netstat
c) tracert
d) nslookup
Correct Answer: b) netstat
Explanation: The netstat command displays active network connections on a server.