What can you use to periodically verify that a file has maintained its integrity?
a) Encryption b) File hashing c) Data compression d) RAID
Correct Answer: b) File hashing
Explanation: File hashing creates a unique hash value for a file that can be used to verify its integrity over time, ensuring it hasn't been tampered with or corrupted.
Question 42
What type of feature works with spanning tree to mitigate the risk of introducing rogue root switches?
a) Loop guard b) Root guard c) BPDU filter d) Storm control
Correct Answer: b) Root guard
Explanation: Root guard is a feature used in spanning tree protocols to prevent unauthorized switches from becoming the root switch.
Question 43
What type of punch-down block is typically found on the back of a patch panel?
a) 66 block b) 110 block c) Cross-connect block d) Smart jack
Correct Answer: b) 110 block
Explanation: 110 punch-down blocks are commonly used on the back of patch panels to terminate and organize network cables.
Question 44
What hardware tool can identify breaks and insertion loss in a fiber optic cable?
a) Tone generator b) Multimeter c) OTDR d) Cable tester
Correct Answer: c) OTDR
Explanation: An Optical Time-Domain Reflectometer (OTDR) is used to detect faults, breaks, and loss of signal in fiber optic cables.
Question 45
What command identifies a network path as well as reports on packet loss?
a) ipconfig b) traceroute c) pathping d) ping
Correct Answer: c) pathping
Explanation: The pathping command is a combination of ping and traceroute, providing both route information and packet loss statistics.
Question 46
What command is the Linux equivalent of ipconfig?
a) netstat b) ifconfig c) traceroute d) ping
Correct Answer: b) ifconfig
Explanation: In Linux systems, the ifconfig command is used to configure and display network interface settings, similar to ipconfig in Windows.
Question 47
What common command line tool can be used to port scan a network?
a) Wireshark b) ipconfig c) nmap d) ping
Correct Answer: c) nmap
Explanation: Nmap is a widely used tool for network discovery and security auditing, often employed to scan open ports on a network.
Question 48
What type of cable flips the transmit and receive pairs?
a) Straight-through cable b) Crossover cable c) Fiber optic cable d) Shielded cable
Correct Answer: b) Crossover cable
Explanation: Crossover cables are used to connect two similar devices directly, such as two computers or two switches, by flipping the transmit and receive pairs.
Question 49
What is the word for variable latency?
a) Jitter b) Lag c) Echo d) Drop
Correct Answer: a) Jitter
Explanation: Jitter refers to the variation in packet delay, which can cause issues in real-time applications like VoIP.
Question 50
What is typically responsible for handing out unauthorized IP addresses to clients?
a) Rogue DNS server b) Rogue DHCP server c) Man-in-the-middle attack d) ARP poisoning
Correct Answer: b) Rogue DHCP server
Explanation: A rogue DHCP server is an unauthorized server that hands out incorrect IP addresses to clients, potentially disrupting network communication.