Time limit: 0
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Test complete. Results are being recorded.
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Question 1 of 20
1. Question
Your client wants to upgrade her desktop computer’s wireless network card. Which of the following network interface cards (NIC) is suitable in this scenario?
CorrectIncorrect -
Question 2 of 20
2. Question
A network administrator wants to set up their Wi-Fi network so that there are no overlapping channels. What are the only three channels in the 2.4 GHz range that they can use to accomplish this?
CorrectIncorrect -
Question 3 of 20
3. Question
Which Wi-Fi standard operates only in the 5 GHz band?
CorrectIncorrect -
Question 4 of 20
4. Question
A client wants to identify the physical objects and people entering a restricted area. He wants a database of identifiers that can match the identification data to the people and the material objects entering the area. Which technology should be considered for this scenario?
CorrectIncorrect -
Question 5 of 20
5. Question
A CTO wants to set up one server hosting an Internet website and another server handling sensitive files and folders internally. She also wants a system that can send network alert messages to the administrators and the network managers. Which of the following servers are suitable for this scenario? Choose three.
CorrectIncorrect -
Question 6 of 20
6. Question
A mail server can use __________ for incoming emails and __________ for outgoing email messages. (FILL IN THE BLANKS.)
CorrectIncorrect -
Question 7 of 20
7. Question
Match the server security framework on the left to their correct descriptions on the right.
Sort elements
- verifies username and password.
- assigns predefined rights and permissions to an authenticated user.
- tracks the actions and results of a user.
-
Authentication
-
Authorization
-
Accounting
CorrectIncorrect -
Question 8 of 20
8. Question
Which Internet appliance provides a firewall, remote access, VPN support, web filtering, anti-malware, and network intrusion prevention systems in one place?
CorrectIncorrect -
Question 9 of 20
9. Question
A client wants to use a proxy for his extensive enterprise network. He wants to monitor usage, restrict access to objectionable content, and cache resources to improve performance. However, he doesn’t want to spend money on a standalone appliance. What is the best solution to implement an enterprise-grade proxy service using existing resources?
CorrectIncorrect -
Question 10 of 20
10. Question
A spare parts factory wants to collect real-time data for efficiency analysis, cost reduction, and operational improvements in manufacturing products. They want a system that allows them to select and access specific data and control the equipment and machinery functions. Which system is suitable for this scenario?
CorrectIncorrect -
Question 11 of 20
11. Question
Which of the following addresses is most likely the loopback address on a single PC?
CorrectIncorrect -
Question 12 of 20
12. Question
Which of the following IPv4 address ranges is not in the loopback, private, or link-local range?
CorrectIncorrect -
Question 13 of 20
13. Question
A client is having a problem with Internet connectivity. Upon investigation, you discover the network interface card’s LEDs light up to show connectivity, but no browser requests go through. Which Windows command-line tools can be used to help diagnose the problem? (Choose two.)
CorrectIncorrect -
Question 14 of 20
14. Question
Which services can be used to receive IP configuration information for a network node using IPv6? (Choose two.)
CorrectIncorrect -
Question 15 of 20
15. Question
Which DNS record type allows an email to reach a particular mail server with an active A record?
CorrectIncorrect -
Question 16 of 20
16. Question
A client wants to implement three separate wired networks with a single switch and a router. What type of network does the client intend to create?
CorrectIncorrect -
Question 17 of 20
17. Question
How can you create a secure connection using a portable device (mobile, laptop, etc.) while connected to an untrusted Wi-Fi hotspot?
CorrectIncorrect -
Question 18 of 20
18. Question
Match the Internet services on the left to the corresponding types of connection devices on the right.
Sort elements
- Modem/Router combo
- Modem
- Modem/router/dish combo
- Cellular Internet Gateway
-
Cable Internet
-
Digital Subscriber Line (DSL)
-
Satellite Internet
-
3G/4G/5G Internet
CorrectIncorrect -
Question 19 of 20
19. Question
A user requires a stable 5Gbps connection to her office in a multi-story building. She wants a 99.9% uptime with stable download and consistent upload speeds. She wants a wireless connection to all the devices in her office. Which of the following Internet services is most suitable and fulfills all the requirements?
CorrectIncorrect -
Question 20 of 20
20. Question
The IT department is considering implementing a storage area network (SAN) to enhance data storage and management in a large enterprise. The team evaluates different aspects of SAN technology for optimal performance and scalability.
Given the advantages mentioned for a storage area network (SAN), which factor makes it particularly beneficial for enterprises seeking both redundancy and the ability easily increase or decrease the capacity of their storage infrastructure?
CorrectIncorrect
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Correct
- Incorrect