0% found this document useful (0 votes)
25 views11 pages

NetInfra and SecurityMngt MCQ Pre Test

The document is a pre-test exam focused on network infrastructure and security management, covering topics such as routing, OSI model, firewalls, IP addressing, and network topologies. It includes multiple-choice questions and prompts related to network configuration, troubleshooting, and security practices. The content is designed to assess knowledge and understanding of key networking concepts and technologies.

Uploaded by

Liezl Balonso
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views11 pages

NetInfra and SecurityMngt MCQ Pre Test

The document is a pre-test exam focused on network infrastructure and security management, covering topics such as routing, OSI model, firewalls, IP addressing, and network topologies. It includes multiple-choice questions and prompts related to network configuration, troubleshooting, and security practices. The content is designed to assess knowledge and understanding of key networking concepts and technologies.

Uploaded by

Liezl Balonso
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Network Infrastructure and Security Management MCQ Pre-Test Exam

What is the difference between static routing and dynamic routing?

What is the primary function of a router in a network?

The Open Systems Interconnection (OSI) model consists of:

What is the purpose of the OSI physical layer?

In a perimeter configuration a firewall connects which security zones


Lease line to its top speed for T1, T3, E1, E3

Refers to creating a blueprint for a network and selecting and setting up hardware components

____________ is a massive network of networks, a networking infrastructure wherein it connects


millions of computers together globally.

Having multiple paths to a destination is known as redundancy. This is an example of which


characteristic of network architecture?

What class of IP address is the

Which of these IP addresses are Private?


Which process failed if a computer cannot access the internet and received an IP address of
169.254.142.5?

Which of the following tools in PT allows you to delete items in your PT workspace?

Which is the top advertised speed for a dial-up connection?

A network administrator is measuring the transfer of bits across the company backbone for a mission
critical financial application. The administrator notices that the network throughput appears lower than
the bandwidth expected. Which three factors could influence the differences in throughput?

In blank__________ means the sender sends the data to all the participants in the network

Which VPN technology is the most common and the easiest to set up?

To view the content of your computer's DNS cache, you can use the command ____.
Which of the following is the name for all computers connected to a network that participate directly in
network communication?

Explain the concept of DNS (Domain Name System) and its role in networking.

Social engineering is ___________________

What is the biggest issue with satellite internet

A topology which is any combination of two or more topologies.

Which of the following is the strongest topology?

Star Network Topology to one of its characteristics.

Ring Network Topology to one of its characteristics.

IPSEC

What command to check internet connection with Command Prompt?

Which of the following is the BEST security practice to use when configuring the management options of
a wireless router?
Which two devices are intermediary devices?

A computer network used for communication among computer and different information technological
devices close to one person

The amount of time it takes for a data packet to go from one place to another.

Some of the responsibilities of ________ are installing new hardware and software on the network and
monitoring performance.

The very important part about __________ is that the communication can happen in both directions, but
not at the same time.
Wi-Fi standard that facilitated the utilization of multiple input/multiple output (MIMO) technology,
allowing the use of multiple antennas on both transmitting and receiving devices to minimize errors and
enhance speed.

What form of communication does a Wireless Network uses?

Bus Network Topology to one of its characteristics.

What type of cabling is shown?

Which of the following are advantages of a large-scale server-based network?

How does a switch differ from a hub in terms of handling network traffic?

Refers to identifying and report’s locations where computers are experiencing difficulties like slow down,
viral attacks, or hacking.

Describe the function of a firewall in computer networking.

It is a device that connects two or more packet-switched networks or subnetworks.

Which is true about an internet service using DSL and a cable modem

Hardware troubleshooting tools: handheld devices are designed for testing the various types of data
communication cabling.

Which functionality is provided by DHCP?

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely
describes the SSH connection?

It features a maximum data rate of 1.3Gbs and operates on both 2.4GHz and 5GHz frequencies.

Which of the following measurements includes any latency encountered during data transmissions?
Explain the concept of IP addressing and its importance in networking.

Which statement accurately characterizes the evolution of threats to network security?

Which IP configuration parameter provides the IP address of a network device that a computer would
use to access the internet?

What technology can you use temporarily to connect networks from two different companies?

Which best describes the type of connection generated from a leased line

What is the purpose of route summarization?

Troubleshooting approaches: good approach to use when the problem is suspected to be a physical
one.

How many connections are in a full mesh network with four devices?

In-band management requires

What is the default subnet mask for the IP address, 192.168.0.200?

An administrator is configuring a new router to permit out-of-band management access. Which set of
commands will allow the required login using a password of cisco?

A single network designed to handle voice, video, and data

A task of a system administrator that trains users on how to use existing systems

Which wireless standards are capable of 5Ghz?

Which are the main purposes of wireless bridging?


With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice
communications if the network experiences congestion?

Which is not a private IP address?

Encapsulating Security Protocol (ESP)

What is the default subnet mask for the IP address, 172.16.100.100?

Which of the following is NOT considered a threat to network security?

What does the acronym VLAN stand for in networking?

Which protocol is commonly used for secure web browsing?

A service provider that manages the server used to host an organisation website and its connections to
the Internet backbones is known as:

A ________ topology describes how data flows through a network, while a ________ topology is the
actual appearance and setup of a network

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of
network architecture?

Which security measure is typically found both inside and outside a data center facility?

What do ad hoc and p2p networks lack when compared to an infrastructure network

A user is unable to reach the website when typing http://www.cisco.com in a web browser, but can
reach the same site by typing http://72.163.4.161. What is the issue?
How should users position a wireless access point to ensure high speeds? Choose two answers

Which of these responsibilities involves formulating detailed plans to add new systems to the existing
core infrastructure.

Which type of firewall blocks packets based on rules that are based on IP addresses or ports?

Choose the advantages of having a network topology map.

What is the function of Network Interface Cards?

What type of network can you set up that is another company’s internal network?

What is the primary focus of network security?

The term extranet may not be as well-known though most of us would have experienced a consumer
extranet when we have registered online to buy a product and have used a username and password.
Which is NOT a business benefit of using an extranet?

Which of the following measurements includes any latency encountered during data transmissions?

Suitable for general home and small business use due to decent range and good compatibility with
older devices.

Logical or Physical? Refer to the exhibit. Which type of topology drawing is shown?

In addition to the cable length, what two factors could interfere with the communication carried over UTP
cables?

What technology is commonly used in Wireless Local Area Networks (WLAN)?


In case if you want to connect two devices of same kind let’s say two switches or two routers or two
computers wants to be connected to each other then we have to go for __________ cable.

Which forms of wireless encryption are considered strong enough to use?

What are the two primary functions of a router?

On a switch, from the user mode how do you move to privileged mode ?

To what are wireless LANs more susceptible than wired LANs

In case of fiber-optic cables, which transmission mode is used for transmitting data over long distances?

Select soft skills a network administrator are expected to possess


Distributed denial of service attack

Which of the following cisco commands would activate an interface on a router?

Shown is a company floor plan for two teams (Operations and PM), you have been tasked to connect all
the users in one physical area. Identify Switch(es) or VLAN9s) to a correct place for number [1]

See image. Which IP address is an example of APIPA (Automatic Private IP Addressing)

These addresses exist within the IP range of 169.254.. By default, most devices are configured to continue
attempts to obtain an IP address from a DHCP server at set intervals until they are successful, though
this can be changed if desired.

You might also like