Networking Warm-Up Flashcards
Study 10 per day
Which of the following would be the BEST way to maintain uptime if a server motherboard failure occurs?
A) NIC teaming
B) Redundant switches
C) RAID
D) Load balancing
D) Load balancing
A network administrator needs to connect devices between buildings located four kilometers from each other. Which of the following standards would be the BEST choice?
A) 1000BASE-SX
B) 1000BASE-T
C) 1000BASE-LX
D) 10GBASE-T
C) 1000BASE-LX
A network administrator is connecting two devices using twisted pair copper cables transmitting at ten gigabits per second. Which of the following Ethernet standards would describe this connection?
A) 10GBASE-T
B) 1000BASE-SX
C) 1000BASE-T
D) 100BASE-TX
A) 10GBASE-T
A network administrator is upgrading the wireless network in a warehouse that operates at 54 megabits per second in the 5 GHz range. Which of the following would describe this network type?
A) 802.1x
B) 802.11ac
C) 802.3
D) 802.11a
D) 802.11a
A remote office WAN link is a single connection communicating at 1.544 Mbit/sec. Which of the following would describe this network type?
A) OC-48
B) POTS
C) Metro E
D) T1
D) T1
A switch is not forwarding traffic to the destination device, and the MAC address of the destination does not appear in the switch forwarding table. Which of the following OSI layers is MOST associated with this issue?
A) Layer 1
B) Layer 2
C) Layer 3
D) Layer 4
B) Layer 2
Which of the following would be MOST associated with 802.1X?
A) Multiple VLANs between switches
B) Loop prevention on a switched network
C) RADIUS server
D) Redundant storage
C) RADIUS server
Which of the following would BEST describe a Z-Wave network topology?
A) Ring
B) Star
C) Mesh
D) Bus
C) Mesh
Which of the following attacks would describe an exploit of a web server with a vulnerability that had not previously been detected or published?
A) Brute force
B) VLAN hopping
C) Zero-day
D) Insider threat
C) Zero-day
A network administrator is troubleshooting an issue with a blocked port number on a firewall. Which of the following OSI layers would be MOST associated with this issue?
A) Layer 1
B) Layer 2
C) Layer 3
D) Layer 4
D) Layer 4
The audio during a VoIP phone call breaks up and parts of the audio are missing during the call. Which of the following would BEST describe this issue?
A) Excessive jitter
B) VLAN mismatch
C) TX/RX reversal
D) Transceiver mismatch
A) Excessive jitter
A company’s contract with a third party states that the Internet router should continue to operate properly for approximately three years, but if it needs replacing it will be fixed within four hours. Which of the following describes the three-year and the four-hour timeframe, respectively?
A) SLA, MTFB
B) MTFB, SLA
C) MTTR, MTBF
D) SLA, MTTR
B) MTFB, SLA
Which of the following would BEST describe the protocol used on a DSL network?
A) PPPoE
B) ATM
C) DMVPN
D) MPLS
A) PPPoE
A network administrator is concerned that a nearby office building may be interfering with their 802.11ac network. Which of the following tools would be the BEST way to troubleshoot this issue?
A) Protocol analyzer
B) Spectrum analyzer
C) Loopback plug
D) Inductive probe
B) Spectrum analyzer
Which of the following measures the signal loss across a length of twisted pair cabling?
A) TDR
B) Tone generator
C) Light meter
D) Cable tester
A) TDR
Which of the following would be the BEST way to identify open services on a remote server?
A) Wireless analyzer
B) Port scanner
C) Protocol analyzer
D) OTDR
B) Port scanner
Which of the following would best describe distributed switching in an SDN?
A) Application servers have a redundant path through the network
B) VMs are connected through a high-speed fiber network
C) Any missing routes will automatically converge
D) Devices can belong to any VLAN, regardless of where the VM is running
D) Devices can belong to any VLAN, regardless of where the VM is running
Distributed switching removes the physical network segmentation created by a VM server farm and allows the network administrator to define VLANs regardless of physical VM location. If the VM moves to another server, the VLAN and IP addressing remains static.
When entering a car, a user’s mobile phone automatically pairs to their automobile and all phone audio is sent over the car’s speakers. What kind of network would best describe this connection?
A) WAN
B) LAN
C) SAN
D) PAN
D) PAN
A PAN (Personal Area Network) is commonly associated with devices that are in immediate proximity to the user.
A network administrator has been asked to create a secondary name for an existing file server. Which DNS record type would be the best choice for this task?
A) SRV
B) MX
C) CNAME
D) TXT
C) CNAME
A canonical name (CNAME) DNS record is used to create an alias for an existing device.
What command would be the best way to reboot a Windows computer from the command line?
A) RESTART
B) SHUTDOWN
C) BOOT
D) TASKKILL
B) SHUTDOWN
The Windows SHUTDOWN command can be used to shutdown and power off Windows or to restart the system.
A network administrator needs to update the software in all of the access points across a college campus. Which of the following would be the best fit for this task?
A) Mobile Device Manager
B) Application Proxy
C) Wireless LAN Controller
D) AAA Server
C) Wireless LAN Controller
A wireless LAN controller provides centralized management of all wireless access points on the network.
A network engineer is designing a WAN that would connect all remote locations to each other using encrypted tunnels. Which of these WAN technologies best fits this description?
A) DMVPN
B) ATM
C) PPPoE
D) MPLS
A) DMVPN
A DMVPN (Dynamic Multipoint VPN) is designed to dynamically build encrypted VPN tunnels between multiple sites to create a meshed WAN architecture.
A network administrator has configured two Ethernet adapters in a database server to operate as a single connection. Which of these would best describe this configuration?
A) Channel bonding
B) Mesh network
C) MIMO
D) NIC teaming
D) NIC teaming
NIC teaming combines multiple network interfaces together to operate as a single entity, allowing for aggregate bandwidth and redundant network paths.
Which of the following device hardening techniques would best protect the information transmitted across the network while administering the device?
A) Disable unnecessary services
B) Use complex passwords
C) Create new keys during the installation
D) Check the hash of each patch file
C) Create new keys during the installation
Devices often ship with encryption keys that are used by default, but that usually means that everyone has access to the same keys. Creating your own keys ensures that others would not have the ability to tap into your encrypted communications.