Network Pro Exam Test Questions All Correctly Solved Current Update
7 views 0 purchase
Module
Network Pro
Institution
Network Pro
Network Pro Exam Test Questions All Correctly Solved Current Update
Router - Answer -connects multiple computers or other routers together and transmits data to its correct destination on a network
Switch - Answer -connect multiple devices to the same network segment
ethernet patch panel -...
Network Pro Exam Questions And
Answers Revised Update
Five salespeople work out of your office. They frequently leave their laptops on the
desks in their cubicles. You are concerned that someone might walk by and take one of
these laptops.
Which of the following is the BEST way to address your concerns? - Answer -Use cable
locks to chain the laptops to the desks.
What is the primary benefit of CCTV? - Answer -Expands the area visible to security
guards.
Which of the following CCTV types would you use in areas with little or no light? -
Answer -Infrared
You want to use CCTV as a preventative security measure. Which of the following is a
requirement for your plan? - Answer -Security guards
Which of the following is the MOST important way to prevent console access to a
network switch? - Answer -Keep the switch in a room that is locked by a keypad.
Which of the following controls is an example of a physical access control method? -
Answer -Locks on Doors
Which of the following can you use to stop piggybacking from occurring at a front
entrance where employees swipe smart cards to gain entry? - Answer -Deploy a
mantrap.
Which of the following is a secure doorway that can be used with a mantrap to allow an
easy exit but actively prevents re-entrance through the exit portal? - Answer -Turnstiles
Which type of denial-of-service (DoS) attack occurs when a name server receives
malicious or misleading data that incorrectly maps hostnames to IP addresses? -
Answer -DNS poisoning
Which of the following is an attack that either exploits a software flaw or floods a system
with traffic in order to prevent legitimate activities or transactions from occurring? -
Answer -Denial-of-service attack
You are using a password attack that tests every possible keystroke for each single key
in a password until the correct one is found. Which of the following technical password
attacks are you using? - Answer -Brute force attack
,Which of the following is a text file that a website stores on a client's hard drive to track
and record information about the user? - Answer -Cookie
Which of the following is the open standard for tagging Layer 2 frames? - Answer -
802.1q
Which of the following protocols prescribes what to do when a data channel is in use on
a half-duplex device? - Answer -CSMA/CD
A switch receives a frame with a destination MAC address that is not found in its MAC
address table. What happens next? - Answer -The frame is replicated and sent to every
active port on the switch except the source port.
Which of the following is the protocol used for address resolution when you switch from
IPv4 to IPv6? - Answer -Which of the following is the protocol used for address
resolution when you switch from IPv4 to IPv6?
In which type of device is a MAC address table stored? - Answer -Switch
You run a small network for your business that has a single router connected to the
internet and a single switch. You keep sensitive documents on a computer that you
would like to keep isolated from other computers on the network. Other hosts on the
network should not be able to communicate with this computer through the switch, but
you still need to access the network through the computer.
Which of the following should you use in this situation? - Answer -VLAN
For which of the following devices does a voice VLAN prioritize traffic? - Answer -VoIP
phone
What does the ip address dhcp command allow you to do? - Answer -Configure a
switch to obtain an IP address from a DHCP server.
Which command would you use on a switch to enable management from a remote
network? - Answer -ip default-gateway 192.168.10.185
You are configuring a switch so that you can manage it using PuTTY from the same
network segment. On the switch, you enter the following commands:
switch#config terminal
switch(config)#interface vlan 1
switch(config-if)#ip address 192.168.1.10 255.255.255.0
Will this configuration work? - Answer -No. The no shutdown command needs to be
entered.
In a network setup, two devices are connected via Ethernet. Both devices are set to
auto-negotiation.
, During a high-volume data transfer, the receiving device is unable to keep up with the
volume of data being sent.
What feature of auto-negotiation can help prevent packet loss in this scenario? - Answer
-Flow Control
You manage a single subnet with three switches. The switches are connected to
provide redundant paths between themselves.
Which feature prevents switching loops and ensures that there is only a single active
path between any two switches? - Answer -Spanning Tree
You manage a network with two switches. The switches are connected together through
their Gigabit Ethernet uplink ports.
You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1
needs to communicate with a device on the second switch in VLAN 1.
What should you configure to allow communication between these two devices through
the switches? - Answer -Trunking
Computers A and B are on the same VLAN and are separated by two switches as
shown in the exhibit. Computer A sends a frame to Computer B.
Which of the following BEST describes the frame's composition as it travels from A to
B? - Answer -Computer A sends a normal frame. The first switch appends a VLAN ID to
the frame. The second switch removes the VLAN ID before forwarding it to Computer B.
Which of the following BEST describes port aggregation? - Answer -Multiple ports linked
together and used as a single logical port.
Which of the following BEST describes Ethernet flow control? - Answer -A configuration
that sends a pause frame to the transmitting device when the receiving device cannot
keep up with the volume of data being sent.
Which of the following must each device's MTU be set to for jumbo frames to transverse
the network without risk of fragmentation? - Answer -9,000
Your organization's management wants to monitor all the customer services calls. The
calls are taken on VoIP phones. Which of the following configurations would BEST help
you set up a way to monitor the calls? - Answer -Port mirroring
You have a large Power over Ethernet flat screen that you are installing in a conference
room that requires 70 watts of power. Which of the following IEEE standards does your
PoE switch need to provide power for the flat screen? - Answer -PoE++ Type 4
Which of the following switch features allows you to configure how the switch's MAC
address table is filled? - Answer -Port security
Which of the following scenarios would typically utilize 802.1x authentication? - Answer
-Controlling access through a switch.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Stuviaascorers. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £11.25. You're not tied to anything after your purchase.