25 Random Network+ Questions

Posted by:

|

On:

|

25 Random Network+ Questions

1 / 25

Which type of attack involves overwhelming a network or server with excessive traffic to render it unavailable?

2 / 25

What type of DNS record is used to provide an alias for another domain name?

3 / 25

A user is unable to access resources outside their local network. What IP setting should be checked?

4 / 25

Which cloud service model provides a platform allowing customers to develop, run, and manage applications without dealing with the underlying infrastructure?

5 / 25

A technician needs to configure a router to prioritize video conferencing traffic over other types of traffic on the network. Which type of IP address configuration will be most useful for this purpose?

6 / 25

The technician consults with colleagues to brainstorm potential causes of a complex network issue. Which troubleshooting step is being performed?

7 / 25

Which tool can be used to collect and analyze network traffic for performance monitoring and troubleshooting?

8 / 25

Which type of attack exploits a vulnerability on the same day that it is discovered and before a fix is released?

9 / 25

You need to implement security by restricting physical access to specific areas of your building. Which device should you use?

10 / 25

An organization wants to ensure that their internal IPv4 addresses are not routable on the public internet. Which range of IP addresses should they avoid using?

11 / 25

After replacing the network hardware, the technician ensures all devices are functioning properly. Which troubleshooting step is being performed?

12 / 25

To prevent unauthorized devices from connecting to a network through a switch port, which feature should you configure?

13 / 25

What is the role of an NTP client in a network?

14 / 25

What is the primary advantage of using Fibre Channel over Ethernet (FCoE) in a data center?

15 / 25

You are configuring a network for a small office that needs to support both IPv4 and IPv6 addresses simultaneously. What configuration should you enable on the network devices to meet this requirement?

16 / 25

What is the primary benefit of using SSH over Telnet for remote access?

17 / 25

Which protocol and port number are used by web servers to deliver web pages to browsers over an unencrypted connection?

18 / 25

Which policy governs how employees should connect to the corporate network when working remotely?

19 / 25

Which protocol and port number should be used for transferring small files between network devices without authentication?

20 / 25

Which access control hardware uses fingerprint or retina scans to grant access?

21 / 25

Which component in a data center is crucial for maintaining a controlled environment and preventing overheating of network devices?

22 / 25

Which command is used to test network connectivity between two devices?

23 / 25

A network device is unable to communicate with devices in the same VLAN. What issue might this indicate?

24 / 25

Which common issue involves a loop in the network routing paths, causing packets to circulate indefinitely?

25 / 25

Your client’s network uses IPv6 addressing, and they need to automatically configure addresses for new devices joining the network. Which IPv6 feature allows for this automatic configuration without a DHCP server?

Your score is

Exit