Supercharge Your Skills with Our Annual Premium Plan! 🚀 Unlock Unlimited Access to Essential Tech Courses 📚 for Just $160 $70/Year . Subscribe Now!
Which device reduce the traffic by spontaneous segmentation of a network?
Correct
Incorrect
Question 2 of 100
2. Question
1 point(s)
Which two layers of the OSI model multilayer switch operates.
Correct
Incorrect
Question 3 of 100
3. Question
1 point(s)
Which physical devices or software that defend an internal network or system from
unauthorized access by performing as a filter.
Correct
Incorrect
Question 4 of 100
4. Question
1 point(s)
What advantages of using DHCP in a network?
Correct
Incorrect
Question 5 of 100
5. Question
1 point(s)
What role does the Address (A) record in a Domain Name Service (DNS) server have
in your network?
Correct
Incorrect
Question 6 of 100
6. Question
1 point(s)
Which type of server performs mapping of private IP address into public IP address?
Correct
Incorrect
Question 7 of 100
7. Question
1 point(s)
What protocol pushes data on fiber links at 150 Gbps and is controlled by atomic
clocks?
Correct
Incorrect
Question 8 of 100
8. Question
1 point(s)
Which of the following is not a Fiber Optic protocol or technology?
Correct
Incorrect
Question 9 of 100
9. Question
1 point(s)
Which cellular WAN technology has the best data rate?
Correct
Incorrect
Question 10 of 100
10. Question
1 point(s)
Which should be the approx. bandwidth for Optical Carrier?
Correct
Incorrect
Question 11 of 100
11. Question
1 point(s)
Which connector provide communication and controlling factor in network devices.
Correct
Incorrect
Question 12 of 100
12. Question
1 point(s)
Select three Fiber Optic connectors?
Correct
Incorrect
Question 13 of 100
13. Question
1 point(s)
Which handy tool used to connect network wires to a patch panel.
Correct
Incorrect
Question 14 of 100
14. Question
1 point(s)
Which physical topology connects computers to central devices, and most common for
LANs
Correct
Incorrect
Question 15 of 100
15. Question
1 point(s)
Which network model provides centralized authentication for users.
Correct
Incorrect
Question 16 of 100
16. Question
1 point(s)
Which wireless technology utilizes a short-range communications facilitating data
transmission from fixed and/or mobile devices, creating wireless personal area
networks (PANs)?
Correct
Incorrect
Question 17 of 100
17. Question
1 point(s)
Select two right statements about IPv4 and IPv6 addresses?
Correct
Incorrect
Question 18 of 100
18. Question
1 point(s)
Which routing protocol belongs to Hybrid routing protocols and Cisco proprietary
protocol.
Correct
Incorrect
Question 19 of 100
19. Question
1 point(s)
Which method used by the router to make routing decisions.
Correct
Incorrect
Question 20 of 100
20. Question
1 point(s)
What term describes technologies that can deliver voice communications over the
Internet?
Correct
Incorrect
Question 21 of 100
21. Question
1 point(s)
Which scanning tool IT administrator use as an electron microscope.
Correct
Incorrect
Question 22 of 100
22. Question
1 point(s)
NetFlow is an example of
Correct
Incorrect
Question 23 of 100
23. Question
1 point(s)
Which version of SNMP provide plaintext authentication with MD5 or SHA with no
confidentiality?
Correct
Incorrect
Question 24 of 100
24. Question
1 point(s)
Which of the following is a standard for all message logging for Unix and Unix-based
computers?
Correct
Incorrect
Question 25 of 100
25. Question
1 point(s)
Which system deals with the real-time monitoring and notifying security events.
Correct
Incorrect
Question 26 of 100
26. Question
1 point(s)
Which of the following is a security device that is actually a decoy?
Correct
Incorrect
Question 27 of 100
27. Question
1 point(s)
Which system uses coded signals over communication to control remote devices?
Correct
Incorrect
Question 28 of 100
28. Question
1 point(s)
Which of the following is not a SNMP utility?
Correct
Incorrect
Question 29 of 100
29. Question
1 point(s)
Which of the following aggregates and analyzes logs?
Correct
Incorrect
Question 30 of 100
30. Question
1 point(s)
What is the most common packet sniffer use today?
Correct
Incorrect
Question 31 of 100
31. Question
1 point(s)
Which process represent the limited data flow on network resources.
Correct
Incorrect
Question 32 of 100
32. Question
1 point(s)
Interface monitoring does not monitor the following.
Correct
Incorrect
Question 33 of 100
33. Question
1 point(s)
When employees bring their own Devices to work, the administration can allow devices
from accessing the network. What is this called?
Correct
Incorrect
Question 34 of 100
34. Question
1 point(s)
In CompTIA term, Link Aggregation Control Protocol (LACP) is also called
Correct
Incorrect
Question 35 of 100
35. Question
1 point(s)
Which of the following are IEEE standard of RSTP?
Correct
Incorrect
Question 36 of 100
36. Question
1 point(s)
Which switching protocol can prevent switching loops in network.
Correct
Incorrect
Question 37 of 100
37. Question
1 point(s)
Which cable is used by PoE and PoE+ for transmitting power and data for remote
devices?
Correct
Incorrect
Question 38 of 100
38. Question
1 point(s)
Which of the following best describes goodput?
Correct
Incorrect
Question 39 of 100
39. Question
1 point(s)
Which of the following are valid frequency bands for wireless networks?
Correct
Incorrect
Question 40 of 100
40. Question
1 point(s)
Which type of wireless network topology does not use a WAP?
Correct
Incorrect
Question 41 of 100
41. Question
1 point(s)
RTO and RPO metrics related to which concept?
Correct
Incorrect
Question 42 of 100
42. Question
1 point(s)
If Single Point of Failure (SPOF) occurs, the whole system will be?
Correct
Incorrect
Question 43 of 100
43. Question
1 point(s)
Which of the following is used for Penetration testing?
Correct
Incorrect
Question 44 of 100
44. Question
1 point(s)
In which attack, the attacker flooded a network with ping packets sent to all target
address?
Correct
Incorrect
Question 45 of 100
45. Question
1 point(s)
A permanent DoS (PDoS) is somehow referred to as?
Correct
Incorrect
Question 46 of 100
46. Question
1 point(s)
Which method is used to find wireless network by using antenna connected to wireless
devices in a moving vehicle?
Correct
Incorrect
Question 47 of 100
47. Question
1 point(s)
Which of these attacks does not depend on wireless technologies?
Correct
Incorrect
Question 48 of 100
48. Question
1 point(s)
Which of the following attack does not affect the technology?
Correct
Incorrect
Question 49 of 100
49. Question
1 point(s)
Which of the following is not an unsecure protocol?
Correct
Incorrect
Question 50 of 100
50. Question
1 point(s)
Which method can prevent attacks related to ARP spoofing?
Correct
Incorrect
Question 51 of 100
51. Question
1 point(s)
Which of the following is not an attack but instead a method of securing network?
Correct
Incorrect
Question 52 of 100
52. Question
1 point(s)
Which type of filtering may be affected if a source address has been transformed by
Network Address Translation (NAT) or Port Address Translation (PAT)?
Correct
Incorrect
Question 53 of 100
53. Question
1 point(s)
What was the first attempt to secure wireless connections?
Correct
Incorrect
Question 54 of 100
54. Question
1 point(s)
Which IEEE standards enhances the security mechanism of WPA Enterprise?
Correct
Incorrect
Question 55 of 100
55. Question
1 point(s)
Which system uses two doors authentication process?
Correct
Incorrect
Question 56 of 100
56. Question
1 point(s)
Which of the following statements regarding firewalls is true?
Correct
Incorrect
Question 57 of 100
57. Question
1 point(s)
Which firewall keep track the major attributes of each connection?
Correct
Incorrect
Question 58 of 100
58. Question
1 point(s)
What is the function of a DMZ?
Correct
Incorrect
Question 59 of 100
59. Question
1 point(s)
Which method acts on behalf of the whole network to completely separate packets from
internal hosts and external hosts.
Correct
Incorrect
Question 60 of 100
60. Question
1 point(s)
What is the process of preserving, collecting, and processing computer data after an
attack?
Correct
Incorrect
Question 61 of 100
61. Question
1 point(s)
What is the purpose of the “ipconfig” command?
Correct
Incorrect
Question 62 of 100
62. Question
1 point(s)
On Which Operating System “ifconfig” command belongs?
Correct
Incorrect
Question 63 of 100
63. Question
1 point(s)
On Which Operating System “ipconfig” command belongs?
Correct
Incorrect
Question 64 of 100
64. Question
1 point(s)
Which of the following command can be used to examine active connections
information?
Correct
Incorrect
Question 65 of 100
65. Question
1 point(s)
Tracerout command is used in
Correct
Incorrect
Question 66 of 100
66. Question
1 point(s)
Tracert command is used in
Correct
Incorrect
Question 67 of 100
67. Question
1 point(s)
The command “nbtstat -a” displays the list of
Correct
Incorrect
Question 68 of 100
68. Question
1 point(s)
Most Appropriate command to troubleshoot DNS related issues is:
Correct
Incorrect
Question 69 of 100
69. Question
1 point(s)
Which of the following statement is correct about Straight Through cable?
Correct
Incorrect
Question 70 of 100
70. Question
1 point(s)
Which of the following statement is correct about Cross over cable?
Correct
Incorrect
Question 71 of 100
71. Question
1 point(s)
Feature that enables auto detection of cable type connected to the NIC is called
Correct
Incorrect
Question 72 of 100
72. Question
1 point(s)
Sublayer that servers as midway between Physical Link and higher layer protocols,
performing flow-control and error-control is called as
Correct
Incorrect
Question 73 of 100
73. Question
1 point(s)
Which of the following does not belongs to Data-Link Layer?
Correct
Incorrect
Question 74 of 100
74. Question
1 point(s)
Connection Oriented Protocol of Transport layer is
Correct
Incorrect
Question 75 of 100
75. Question
1 point(s)
The process in which multiple Data Streams, coming from different Sources, are
combined and Transmitted over a Single Data Channel is called?
Correct
Incorrect
Question 76 of 100
76. Question
1 point(s)
Signal units per second is called
Correct
Incorrect
Question 77 of 100
77. Question
1 point(s)
Document or Agreement that defines what services are expected and how they are to
be accomplished is called:
Correct
Incorrect
Question 78 of 100
78. Question
1 point(s)
Which tool used to test the connectivity of wires that run through walls and other
obstructions.
Correct
Incorrect
Question 79 of 100
79. Question
1 point(s)
Which of the following cable issues is caused by signal bleed from wires running next
to each other in a cable?
Correct
Incorrect
Question 80 of 100
80. Question
1 point(s)
Which common wireless standard uses only the 2.4 GHz frequency band?
Correct
Incorrect
Question 81 of 100
81. Question
1 point(s)
Which layer is responsible for the reliable transfer of data, by ensuring that data arrives
at its destination are error-free and in order.
Correct
Incorrect
Question 82 of 100
82. Question
1 point(s)
FTP, HTTP, and Telnet related to which layer of the OSI model?
Correct
Incorrect
Question 83 of 100
83. Question
1 point(s)
Which layer controls the formatting and syntax of user data for the application layer?
Correct
Incorrect
Question 84 of 100
84. Question
1 point(s)
In encapsulation PDUs stands for?
Correct
Incorrect
Question 85 of 100
85. Question
1 point(s)
At which process(es) data transfer rate is exchanged to prevent congestion?
Correct
Incorrect
Question 86 of 100
86. Question
1 point(s)
CSMA/CD is the mechanism caused by the device called?
Correct
Incorrect
Question 87 of 100
87. Question
1 point(s)
The most common functionality of Internet Control Message Protocol (ICMP) is
Correct
Incorrect
Question 88 of 100
88. Question
1 point(s)
UDP, instead of connection less protocol but it is quite demanding due to?
Correct
Incorrect
Question 89 of 100
89. Question
1 point(s)
UDP header has 4 fields whereas TCP header has?
Correct
Incorrect
Question 90 of 100
90. Question
1 point(s)
Which of the following wireless channels is not a best-practice channel to use to avoid
frequency overlaps?
Correct
Incorrect
Question 91 of 100
91. Question
1 point(s)
Which of the following Standard set for Ethernet?
Correct
Incorrect
Question 92 of 100
92. Question
1 point(s)
Which of the following is a common CATV standard?
Correct
Incorrect
Question 93 of 100
93. Question
1 point(s)
Which agreement takes place between the two organizations?
Correct
Incorrect
Question 94 of 100
94. Question
1 point(s)
Which component is used to arrange cable neatly and avoid heating areas?
Correct
Incorrect
Question 95 of 100
95. Question
1 point(s)
Which issue will not be monitor by the Rack monitor?
Correct
Incorrect
Question 96 of 100
96. Question
1 point(s)
What should be the last step for change management procedure?
Correct
Incorrect
Question 97 of 100
97. Question
1 point(s)
Which of the following identifies steps to recover from adverse effects caused by a
change?
Correct
Incorrect
Question 98 of 100
98. Question
1 point(s)
Which protocol has been outdated by DNS?
Correct
Incorrect
Question 99 of 100
99. Question
1 point(s)
For secure communications using HTTPS. What port number is used by default?
Correct
Incorrect
Question 100 of 100
100. Question
1 point(s)
Which protocol does not relate to multimedia communication
Correct
Incorrect
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.