Which device reduce the traffic by spontaneous segmentation of a network?
Correct
Incorrect
Question 2 of 100
2. Question
1 point(s)
Which two layers of the OSI model multilayer switch operates.
Correct
Incorrect
Question 3 of 100
3. Question
1 point(s)
Which physical devices or software that defend an internal network or system from
unauthorized access by performing as a filter.
Correct
Incorrect
Question 4 of 100
4. Question
1 point(s)
What advantages of using DHCP in a network?
Correct
Incorrect
Question 5 of 100
5. Question
1 point(s)
What role does the Address (A) record in a Domain Name Service (DNS) server have
in your network?
Correct
Incorrect
Question 6 of 100
6. Question
1 point(s)
Which type of server performs mapping of private IP address into public IP address?
Correct
Incorrect
Question 7 of 100
7. Question
1 point(s)
What protocol pushes data on fiber links at 150 Gbps and is controlled by atomic
clocks?
Correct
Incorrect
Question 8 of 100
8. Question
1 point(s)
Which of the following is not a Fiber Optic protocol or technology?
Correct
Incorrect
Question 9 of 100
9. Question
1 point(s)
Which cellular WAN technology has the best data rate?
Correct
Incorrect
Question 10 of 100
10. Question
1 point(s)
Which should be the approx. bandwidth for Optical Carrier?
Correct
Incorrect
Question 11 of 100
11. Question
1 point(s)
Which connector provide communication and controlling factor in network devices.
Correct
Incorrect
Question 12 of 100
12. Question
1 point(s)
Select three Fiber Optic connectors?
Correct
Incorrect
Question 13 of 100
13. Question
1 point(s)
Which handy tool used to connect network wires to a patch panel.
Correct
Incorrect
Question 14 of 100
14. Question
1 point(s)
Which physical topology connects computers to central devices, and most common for
LANs
Correct
Incorrect
Question 15 of 100
15. Question
1 point(s)
Which network model provides centralized authentication for users.
Correct
Incorrect
Question 16 of 100
16. Question
1 point(s)
Which wireless technology utilizes a short-range communications facilitating data
transmission from fixed and/or mobile devices, creating wireless personal area
networks (PANs)?
Correct
Incorrect
Question 17 of 100
17. Question
1 point(s)
Select two right statements about IPv4 and IPv6 addresses?
Correct
Incorrect
Question 18 of 100
18. Question
1 point(s)
Which routing protocol belongs to Hybrid routing protocols and Cisco proprietary
protocol.
Correct
Incorrect
Question 19 of 100
19. Question
1 point(s)
Which method used by the router to make routing decisions.
Correct
Incorrect
Question 20 of 100
20. Question
1 point(s)
What term describes technologies that can deliver voice communications over the
Internet?
Correct
Incorrect
Question 21 of 100
21. Question
1 point(s)
Which scanning tool IT administrator use as an electron microscope.
Correct
Incorrect
Question 22 of 100
22. Question
1 point(s)
NetFlow is an example of
Correct
Incorrect
Question 23 of 100
23. Question
1 point(s)
Which version of SNMP provide plaintext authentication with MD5 or SHA with no
confidentiality?
Correct
Incorrect
Question 24 of 100
24. Question
1 point(s)
Which of the following is a standard for all message logging for Unix and Unix-based
computers?
Correct
Incorrect
Question 25 of 100
25. Question
1 point(s)
Which system deals with the real-time monitoring and notifying security events.
Correct
Incorrect
Question 26 of 100
26. Question
1 point(s)
Which of the following is a security device that is actually a decoy?
Correct
Incorrect
Question 27 of 100
27. Question
1 point(s)
Which system uses coded signals over communication to control remote devices?
Correct
Incorrect
Question 28 of 100
28. Question
1 point(s)
Which of the following is not a SNMP utility?
Correct
Incorrect
Question 29 of 100
29. Question
1 point(s)
Which of the following aggregates and analyzes logs?
Correct
Incorrect
Question 30 of 100
30. Question
1 point(s)
What is the most common packet sniffer use today?
Correct
Incorrect
Question 31 of 100
31. Question
1 point(s)
Which process represent the limited data flow on network resources.
Correct
Incorrect
Question 32 of 100
32. Question
1 point(s)
Interface monitoring does not monitor the following.
Correct
Incorrect
Question 33 of 100
33. Question
1 point(s)
When employees bring their own Devices to work, the administration can allow devices
from accessing the network. What is this called?
Correct
Incorrect
Question 34 of 100
34. Question
1 point(s)
In CompTIA term, Link Aggregation Control Protocol (LACP) is also called
Correct
Incorrect
Question 35 of 100
35. Question
1 point(s)
Which of the following are IEEE standard of RSTP?
Correct
Incorrect
Question 36 of 100
36. Question
1 point(s)
Which switching protocol can prevent switching loops in network.
Correct
Incorrect
Question 37 of 100
37. Question
1 point(s)
Which cable is used by PoE and PoE+ for transmitting power and data for remote
devices?
Correct
Incorrect
Question 38 of 100
38. Question
1 point(s)
Which of the following best describes goodput?
Correct
Incorrect
Question 39 of 100
39. Question
1 point(s)
Which of the following are valid frequency bands for wireless networks?
Correct
Incorrect
Question 40 of 100
40. Question
1 point(s)
Which type of wireless network topology does not use a WAP?
Correct
Incorrect
Question 41 of 100
41. Question
1 point(s)
RTO and RPO metrics related to which concept?
Correct
Incorrect
Question 42 of 100
42. Question
1 point(s)
If Single Point of Failure (SPOF) occurs, the whole system will be?
Correct
Incorrect
Question 43 of 100
43. Question
1 point(s)
Which of the following is used for Penetration testing?
Correct
Incorrect
Question 44 of 100
44. Question
1 point(s)
In which attack, the attacker flooded a network with ping packets sent to all target
address?
Correct
Incorrect
Question 45 of 100
45. Question
1 point(s)
A permanent DoS (PDoS) is somehow referred to as?
Correct
Incorrect
Question 46 of 100
46. Question
1 point(s)
Which method is used to find wireless network by using antenna connected to wireless
devices in a moving vehicle?
Correct
Incorrect
Question 47 of 100
47. Question
1 point(s)
Which of these attacks does not depend on wireless technologies?
Correct
Incorrect
Question 48 of 100
48. Question
1 point(s)
Which of the following attack does not affect the technology?
Correct
Incorrect
Question 49 of 100
49. Question
1 point(s)
Which of the following is not an unsecure protocol?
Correct
Incorrect
Question 50 of 100
50. Question
1 point(s)
Which method can prevent attacks related to ARP spoofing?
Correct
Incorrect
Question 51 of 100
51. Question
1 point(s)
Which of the following is not an attack but instead a method of securing network?
Correct
Incorrect
Question 52 of 100
52. Question
1 point(s)
Which type of filtering may be affected if a source address has been transformed by
Network Address Translation (NAT) or Port Address Translation (PAT)?
Correct
Incorrect
Question 53 of 100
53. Question
1 point(s)
What was the first attempt to secure wireless connections?
Correct
Incorrect
Question 54 of 100
54. Question
1 point(s)
Which IEEE standards enhances the security mechanism of WPA Enterprise?
Correct
Incorrect
Question 55 of 100
55. Question
1 point(s)
Which system uses two doors authentication process?
Correct
Incorrect
Question 56 of 100
56. Question
1 point(s)
Which of the following statements regarding firewalls is true?
Correct
Incorrect
Question 57 of 100
57. Question
1 point(s)
Which firewall keep track the major attributes of each connection?
Correct
Incorrect
Question 58 of 100
58. Question
1 point(s)
What is the function of a DMZ?
Correct
Incorrect
Question 59 of 100
59. Question
1 point(s)
Which method acts on behalf of the whole network to completely separate packets from
internal hosts and external hosts.
Correct
Incorrect
Question 60 of 100
60. Question
1 point(s)
What is the process of preserving, collecting, and processing computer data after an
attack?
Correct
Incorrect
Question 61 of 100
61. Question
1 point(s)
What is the purpose of the “ipconfig” command?
Correct
Incorrect
Question 62 of 100
62. Question
1 point(s)
On Which Operating System “ifconfig” command belongs?
Correct
Incorrect
Question 63 of 100
63. Question
1 point(s)
On Which Operating System “ipconfig” command belongs?
Correct
Incorrect
Question 64 of 100
64. Question
1 point(s)
Which of the following command can be used to examine active connections
information?
Correct
Incorrect
Question 65 of 100
65. Question
1 point(s)
Tracerout command is used in
Correct
Incorrect
Question 66 of 100
66. Question
1 point(s)
Tracert command is used in
Correct
Incorrect
Question 67 of 100
67. Question
1 point(s)
The command “nbtstat -a” displays the list of
Correct
Incorrect
Question 68 of 100
68. Question
1 point(s)
Most Appropriate command to troubleshoot DNS related issues is:
Correct
Incorrect
Question 69 of 100
69. Question
1 point(s)
Which of the following statement is correct about Straight Through cable?
Correct
Incorrect
Question 70 of 100
70. Question
1 point(s)
Which of the following statement is correct about Cross over cable?
Correct
Incorrect
Question 71 of 100
71. Question
1 point(s)
Feature that enables auto detection of cable type connected to the NIC is called
Correct
Incorrect
Question 72 of 100
72. Question
1 point(s)
Sublayer that servers as midway between Physical Link and higher layer protocols,
performing flow-control and error-control is called as
Correct
Incorrect
Question 73 of 100
73. Question
1 point(s)
Which of the following does not belongs to Data-Link Layer?
Correct
Incorrect
Question 74 of 100
74. Question
1 point(s)
Connection Oriented Protocol of Transport layer is
Correct
Incorrect
Question 75 of 100
75. Question
1 point(s)
The process in which multiple Data Streams, coming from different Sources, are
combined and Transmitted over a Single Data Channel is called?
Correct
Incorrect
Question 76 of 100
76. Question
1 point(s)
Signal units per second is called
Correct
Incorrect
Question 77 of 100
77. Question
1 point(s)
Document or Agreement that defines what services are expected and how they are to
be accomplished is called:
Correct
Incorrect
Question 78 of 100
78. Question
1 point(s)
Which tool used to test the connectivity of wires that run through walls and other
obstructions.
Correct
Incorrect
Question 79 of 100
79. Question
1 point(s)
Which of the following cable issues is caused by signal bleed from wires running next
to each other in a cable?
Correct
Incorrect
Question 80 of 100
80. Question
1 point(s)
Which common wireless standard uses only the 2.4 GHz frequency band?
Correct
Incorrect
Question 81 of 100
81. Question
1 point(s)
Which layer is responsible for the reliable transfer of data, by ensuring that data arrives
at its destination are error-free and in order.
Correct
Incorrect
Question 82 of 100
82. Question
1 point(s)
FTP, HTTP, and Telnet related to which layer of the OSI model?
Correct
Incorrect
Question 83 of 100
83. Question
1 point(s)
Which layer controls the formatting and syntax of user data for the application layer?
Correct
Incorrect
Question 84 of 100
84. Question
1 point(s)
In encapsulation PDUs stands for?
Correct
Incorrect
Question 85 of 100
85. Question
1 point(s)
At which process(es) data transfer rate is exchanged to prevent congestion?
Correct
Incorrect
Question 86 of 100
86. Question
1 point(s)
CSMA/CD is the mechanism caused by the device called?
Correct
Incorrect
Question 87 of 100
87. Question
1 point(s)
The most common functionality of Internet Control Message Protocol (ICMP) is
Correct
Incorrect
Question 88 of 100
88. Question
1 point(s)
UDP, instead of connection less protocol but it is quite demanding due to?
Correct
Incorrect
Question 89 of 100
89. Question
1 point(s)
UDP header has 4 fields whereas TCP header has?
Correct
Incorrect
Question 90 of 100
90. Question
1 point(s)
Which of the following wireless channels is not a best-practice channel to use to avoid
frequency overlaps?
Correct
Incorrect
Question 91 of 100
91. Question
1 point(s)
Which of the following Standard set for Ethernet?
Correct
Incorrect
Question 92 of 100
92. Question
1 point(s)
Which of the following is a common CATV standard?
Correct
Incorrect
Question 93 of 100
93. Question
1 point(s)
Which agreement takes place between the two organizations?
Correct
Incorrect
Question 94 of 100
94. Question
1 point(s)
Which component is used to arrange cable neatly and avoid heating areas?
Correct
Incorrect
Question 95 of 100
95. Question
1 point(s)
Which issue will not be monitor by the Rack monitor?
Correct
Incorrect
Question 96 of 100
96. Question
1 point(s)
What should be the last step for change management procedure?
Correct
Incorrect
Question 97 of 100
97. Question
1 point(s)
Which of the following identifies steps to recover from adverse effects caused by a
change?
Correct
Incorrect
Question 98 of 100
98. Question
1 point(s)
Which protocol has been outdated by DNS?
Correct
Incorrect
Question 99 of 100
99. Question
1 point(s)
For secure communications using HTTPS. What port number is used by default?
Correct
Incorrect
Question 100 of 100
100. Question
1 point(s)
Which protocol does not relate to multimedia communication
Correct
Incorrect
Sign-Up with your email address to receive news, new content updates, FREE reports and our most-awaited special discount offers on curated titles !
Sign-Up with your email address to receive news, new content updates, FREE reports and our most-awaited special discount offers on curated titles !