1. Which of the following statements is true about authentication in a client-server fashion?
A). The server hosting resources ask for credentials, and the client provides them.
2. Which of the following networks connects multiple LANs using long-range transmission media?
A). WAN
3. James, a network engineer, is asked to implement a network encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following networks will James implement?
A). MAN
4. Ethernet is not only the standard used for almost all modern wired LANs, it’s also increasingly being used for telecommunications and storage networks and is even increasingly adopted as a WAN technology.
A). True
5. Which of the following technologies is used to connect private devices?
A). PAN
6. Which of the following standards are used within the telecommunication networks?
A).
1. MPLS
2. Frame Relay
7. Internet is an example of the largest WAN.
A). True
8. A LAN could have hundreds or thousands of nodes.
A). True
9. SDWAN is a virtual WAN architecture that uses software to manage connectivity, devices, and services and can make changes in the network that is based on the current operations.
A). True
10. A WAN operates using leased lines from a telecommunication provider, connecting to the LANs in each site.
A. True).
11. Which of the following statements are true about networks?
A).
1. In a logical network, connections are the protocols that guide data to its destination address.
2. Radio signals are part of the physical network.
12. Which of these is a primary concern for WANs?
A). Security
13. Which type of network scope is often used to connect all or parts of a city?
A). MAN
14. Which of the following statements are true about a logical network?
A).
1. It is the information carried by the physical network.
2. It is the network from the perspective of the computers that use it.
3. It is the path that the information follows.
15. Which of these implies a line topology with reference to the point-to-point connections?
A). Bus
16. An effective network’s topology is a matter of planning, not organic growth.
A). True
17. Essential WAN technologies include user-level connections, such as cable, DSL, or 4G.
A). True
18. Which of these is a standardized rule for formatting data?
A). Protocol
19. Tasks, such as data compression, decompression, encryption, and decryption, are all associated with the presentation layer of the OSI model.
A). True
20. Which of the following statements is correct about sessions in the session layer of the OSI model?
A). They must be created, maintained separately from other sessions, and ended.
21. Which of the following statements are not true about the OSI model?
A).
1. It describes network communication in terms of the underlying network technology or structure.
2. It is a suite of protocols that serves as the world’s primary network standard.
22. Which of the following statements is true about the data link layer of the OSI model?
A). It is subdivided into two sublayers, namely, MAC and LLC.
23. Which of the following statements is correct about the OSI model in networking?
A).
1. It is made up of seven layers arranged vertically in what is called a stack.
2. A communication protocol or network appliance can be described by the layer it occupies.
24. The transport layer of the OSI model translates the data between network packets and also the data used by applications.
A). True
25. The OSI model is more general and widely used by network engineers to discuss network theory, but most protocols that the users use daily were written as part of the TCP/IP model.
A). True
26. Which of the following statements is true about the twisted-pair cables?
A). Each balanced pair is warped around itself for the cable’s length, so even a nearby source, such as a parallel cable, will, on average, balance out.
27. APC connectors can be used only with other APC connectors.
A). True
28. Which type of cable uses low-smoke and fire-retardant materials?
A). Plenum
29. Ethernet addressing uses the MAC address burned into each and every Ethernet NIC.
A). True
30. Which of these are the common representations of binary values?
A).
1. Hexadecimal
2. Octal
31. What is the correct distance range of 1000BaseLX?
A). From 3 km up to 10 km
32. Which of the following actions are taken by a learning bridge when it checks the destination address against its MAC table?
A).
1. If the destination is on the same segment as the source, it filters the frame by ignoring it.
2. If the destination is in the table and on a different segment from that source, it forwards the frame to only that segment.
3. If the destination address isn’t in the table, it floods the frame to all other segments except the source.
33. A network technician has to perform maintenance on many of the company’s web servers during a scheduled change window. This maintenance should not affect the service availability. Which of the following network devices should the network technician use for this purpose?
A). Load balancer
34. Which of these is not considered a network device?
A). Media
35. Which DNS record is an IPv6 address record that maps a hostname to an IPv6 address?
A). AAAA
36. Which of the following statements is true about the networking concepts?
A). A repeater is a node on the physical network.
37. Which of these best describes network reliability?
A). Minimal transmission errors, and detection and correction of any that do occur
38. The MIB is a database with a set of predefined questions that the NMS can ask the agents regarding the health of the device or network.
A). True
39. Why is the TCP/IP model in such wide use, despite its limitations?
A). It proved so robust and scalable that it was quickly adopted by the US government and research networks that formed the early Internet.
40. Which of the following statements is correct about SMB?
A). It allows folders or hard drives to be shared over the network and accessed as if they were local drives.
41. Which of the following are the resource-sharing protocols?
A).
1. LDAP
2. SMB
42. What is the port number of SMB?
A). TCP 445
43. Which of the following IP addresses is reserved for private use?
A). 10.100.200.0
44. Which of the following would be the most efficient subnet mask for a subnetwork accommodating eight hosts?
A). /28
45. A network technician in a company has to create a subnet for 500 host machines. The technician is instructed to use a class B address scheme and leave possible rooms for additional subnets of the same size. Which of the following addresses would fulfill these requirements?
A). 172.18.0.0/23
46. A technician is troubleshooting a customer’s network connectivity issue. He needs to determine the IP address of the customer’s router. The customer has an IP address of 192.168.1.55/24. Which of these is the address of the customer’s router?
A). 192.168.1.1
47. A company is setting up a new branch office. The new office will have two departments, Finance and Engineering. The Finance department will have 55 employees and the Engineering department will have 5 employees. The IP subscribed from the ISP is 192.168.1.0/29. The network administrator is configuring the subnets for the two departments starting with the Finance department. What will be the last host address on the Engineering subnet?
A). 192.168.1.78
48. A network technician has to set up a firewall on a company’s network that would assign private IP addresses to users inside the network and show a public IP address out to the Internet. Which of these should the network technician use to achieve this goal?
A). NAT
49. The original intention of NAT was to slow the depletion of available IP address space by allowing many private IP addresses to be represented by some smaller number of public IP addresses.
A). True
Other Links:
See other websites for quiz:
Check on QUIZLET