Time limit: 0
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Test complete. Results are being recorded.
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Question 1 of 20
1. Question
Which TCP port is used by client systems to connect to a Microsoft SQL server database?
CorrectIncorrect -
Question 2 of 20
2. Question
Which security protocol can authenticate users without transmitting their passwords over the network?
CorrectIncorrect -
Question 3 of 20
3. Question
Ralph configures a new email client on a workstation to use the Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3) email protocols. He wants SMTP to use encryption when communicating with the email server. Which of the following port numbers should Ralph use to create the POP3 connection and secure the SMTP connection with Transport Layer Security (TLS)? (Choose two.)
CorrectIncorrect -
Question 4 of 20
4. Question
Which of the following is a term used to describe the cryptographic security for the NTP client-server mode, ensuring that the devices receive accurate time from a reliable source?
CorrectIncorrect -
Question 5 of 20
5. Question
Which DHCP server options provide informational elements to the clients, such as TTL, DNS server, and TFTP server?
CorrectIncorrect -
Question 6 of 20
6. Question
Which protocol uses TCP port 389 to access and query directory services systems such as Microsoft Active Directory?
CorrectIncorrect -
Question 7 of 20
7. Question
Which protocols generate messages carried directly within Internet Protocol (IPv4) datagrams, with no intervening Transport layer protocol? (Choose two.)
CorrectIncorrect -
Question 8 of 20
8. Question
An administrator wants to ensure the data packets are encrypted before transmitting to prevent eavesdropping through symmetric encryption algorithms. Which Encapsulating Security Payload (ESP) component can provide the same confidentiality on both endpoints of the VPN?
CorrectIncorrect -
Question 9 of 20
9. Question
Which protocols identify VLANs by inserting a 32-bit field in the Ethernet frame?
CorrectIncorrect -
Question 10 of 20
10. Question
Andy has been hired to design the network between two buildings 2000 feet apart. The client requires high-bandwidth network cables that transfer data at high speeds while providing high-level resistance to Electromagnetic Interference (EMI). The solution should be easy to install and economical. Which cable type meets the client’s needs?
CorrectIncorrect -
Question 11 of 20
11. Question
Which transceiver interfaces networking hardware to a fiber-optic cable or active/passive electrical copper connection, allowing a 4×10 Gbit/s link?
CorrectIncorrect -
Question 12 of 20
12. Question
Which of the following is NOT one of the advantages of iSCSI over Fibre Channel?
CorrectIncorrect -
Question 13 of 20
13. Question
What maximum distance can a twinaxial cable be used for a high-speed copper connection?
CorrectIncorrect -
Question 14 of 20
14. Question
Identify the multi-fiber push-on (MPO) connector type from the images below:
CorrectIncorrect -
Question 15 of 20
15. Question
Which topology is least likely to have a collision when the data from two hosts try to communicate simultaneously collide and the data is lost?
CorrectIncorrect -
Question 16 of 20
16. Question
Alex has been hired to connect three local area networks (LANs) with redundant paths, forming a fault-tolerant backbone. The LANs reside on different floors in the same building and are approximately 600 meters apart. Each LAN is currently configured in a star/hub and spoke topology using twisted-pair cabling. Each LAN includes wall plates and rack-mounted patch panels and switches. Building and fire codes allow cables to run through existing risers, ceilings, and walls, but a 50,000-watt radio station occupies one of the floors between the LANs. Which topology, cable type, and installation method best suits this network?
CorrectIncorrect -
Question 17 of 20
17. Question
Switching between two leaf in a leaf and spine network is always ______ hops away no matter where they are in the network. (Fill in the blank).
CorrectIncorrect -
Question 18 of 20
18. Question
Which of the following best describes the difference between east-west and north-south traffic in a data center?
CorrectIncorrect -
Question 19 of 20
19. Question
Which two layers in a three-tiered model are NOT considered the backbone of the network because they are designed for high availability and provide routing and switching for the entire network? (Choose two.)
CorrectIncorrect -
Question 20 of 20
20. Question
Which of the following is NOT listed as RFC 1918 reserved private IP addresses?
CorrectIncorrect
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Correct
- Incorrect