NETWORKING CERTIFICATION TEST
QUESTIONS WITH COMPLETE
ANSWERS
VPNs are implemented to provide - Answer-a secure connection through public
networks
If an 802.11g internet connection has connectivity problems what may be the cause? -
Answer-Electromagnetic interference (EMI)
Which of these factors have the biggest impact on data transmission speed in a
wireless network? - Answer-The transmission standard of the equipment used
which of the following uses a tunneling protocol - Answer-VPN
A network that separates an organization private network from a public network -
Answer-Perimeter
Which type of network is most vulnerable to intrusion - Answer-wireless
Attenuation in a wireless network signal is a result of: - Answer-Distance form the
access point
Which type of network covers the broadcast area - Answer-WAN
In local area network topologies, the primary media access methods are - Answer-
contention and token passing
in a physical star topology, the central device is referred to as a - Answer-hub
Which technology can you use to extend an internal network across shared or public
networks - Answer-VPN
Which two are published IEE 802.11 wireless transmission standards - Answer-802.11g
and 802.11n
What happens when an 802.11b node starts broadcasting within the range of an
802.11g access point? - Answer-a connection will be established
Which technology provides the highest bit rate? - Answer-DS3
A VPN is a - Answer-encrypted connection across the internet
, Which of the following determines the media access method that is used in a network -
Answer-Topology and protocols
Which wireless authentication method provides the highest level of security - Answer-
WI-FI protected Access (WPA)
the topology of a local area network (LAN) is defined by the - Answer-physical and
logical characteristics
the maximum throughput of an 802.11g network is - Answer-54
a node within a local area network (LAN) must have a network interface device and a -
Answer-Host address
Which of the following is a layer 2 WAN protocol - Answer-Point-to-Point Protocol (PPP)
Which type of port is used to support VLAN traffic between two switches - Answer-Trunk
port
the protocol that maps IP addresses to a media access control address is - Answer-
address resolution protocol (ARP)
A user reports that she cannot connect to network resources from a computer on the
company network. The user was able to connect to the network resources
yesterday.
You verify that the user's computer is properly physically connected to the network. You
discover that the computer's IP address is 169.254.48.97.
You need to restore access to network resources.
What should you do next? - Answer-D. Verify that the DHCP service is available.
The host name of the fully qualified domain name (FQDN)
mail.exchange.corp.nwtraders.com - Answer-mail
To which IP configuration does the CIDR notation 192.168.1.1/25 refer? - Answer-
192.168.1.1 255.255.255.128
Which command is used to verify that a server is connected to the network? - Answer-
PING
Which of these represents the Internet Protocol version 6 (IPv6) loopback address? -
Answer-::1
Which of these addresses is a multicast address - Answer-224.0.0.1
Which of the following uses pointer records and A records - Answer-DNS server
QUESTIONS WITH COMPLETE
ANSWERS
VPNs are implemented to provide - Answer-a secure connection through public
networks
If an 802.11g internet connection has connectivity problems what may be the cause? -
Answer-Electromagnetic interference (EMI)
Which of these factors have the biggest impact on data transmission speed in a
wireless network? - Answer-The transmission standard of the equipment used
which of the following uses a tunneling protocol - Answer-VPN
A network that separates an organization private network from a public network -
Answer-Perimeter
Which type of network is most vulnerable to intrusion - Answer-wireless
Attenuation in a wireless network signal is a result of: - Answer-Distance form the
access point
Which type of network covers the broadcast area - Answer-WAN
In local area network topologies, the primary media access methods are - Answer-
contention and token passing
in a physical star topology, the central device is referred to as a - Answer-hub
Which technology can you use to extend an internal network across shared or public
networks - Answer-VPN
Which two are published IEE 802.11 wireless transmission standards - Answer-802.11g
and 802.11n
What happens when an 802.11b node starts broadcasting within the range of an
802.11g access point? - Answer-a connection will be established
Which technology provides the highest bit rate? - Answer-DS3
A VPN is a - Answer-encrypted connection across the internet
, Which of the following determines the media access method that is used in a network -
Answer-Topology and protocols
Which wireless authentication method provides the highest level of security - Answer-
WI-FI protected Access (WPA)
the topology of a local area network (LAN) is defined by the - Answer-physical and
logical characteristics
the maximum throughput of an 802.11g network is - Answer-54
a node within a local area network (LAN) must have a network interface device and a -
Answer-Host address
Which of the following is a layer 2 WAN protocol - Answer-Point-to-Point Protocol (PPP)
Which type of port is used to support VLAN traffic between two switches - Answer-Trunk
port
the protocol that maps IP addresses to a media access control address is - Answer-
address resolution protocol (ARP)
A user reports that she cannot connect to network resources from a computer on the
company network. The user was able to connect to the network resources
yesterday.
You verify that the user's computer is properly physically connected to the network. You
discover that the computer's IP address is 169.254.48.97.
You need to restore access to network resources.
What should you do next? - Answer-D. Verify that the DHCP service is available.
The host name of the fully qualified domain name (FQDN)
mail.exchange.corp.nwtraders.com - Answer-mail
To which IP configuration does the CIDR notation 192.168.1.1/25 refer? - Answer-
192.168.1.1 255.255.255.128
Which command is used to verify that a server is connected to the network? - Answer-
PING
Which of these represents the Internet Protocol version 6 (IPv6) loopback address? -
Answer-::1
Which of these addresses is a multicast address - Answer-224.0.0.1
Which of the following uses pointer records and A records - Answer-DNS server