25 Random Network+ Questions

Posted by:

|

On:

|

25 Random Network+ Questions

1 / 25

What is the main difference between North-South traffic and East-West traffic in a data center?

2 / 25

Which cloud service model provides a platform allowing customers to develop, run, and manage applications without dealing with the underlying infrastructure?

3 / 25

What is the purpose of a site survey report in network planning?

4 / 25

In an Ethernet network, which protocol allows devices to share the same communication medium by detecting collisions and taking action?

5 / 25

Which type of attack involves setting up a rogue DHCP server on a network?

6 / 25

What is the purpose of a reverse DNS lookup?

7 / 25

A high-frequency trading firm requires the highest available bandwidth and shielding for their network infrastructure, supporting speeds up to 40 Gbps. Which cable should they select?

8 / 25

Which metric measures the average time taken to repair a failed component or device in a network?

9 / 25

During troubleshooting, you need to check if a specific service is running on a remote server. Which tool should you use?

10 / 25

What is the main role of the Application layer in the OSI model?

11 / 25

Which layer in a Software-Defined Networking (SDN) architecture is responsible for the physical network devices and data forwarding?

12 / 25

What is the purpose of asset tags in physical security?

13 / 25

A metropolitan area network (MAN) requires high-speed connectivity between multiple buildings in a city. Which technology should they use to achieve this?

14 / 25

Which routing protocol is an example of an exterior gateway protocol (EGP) used for inter-domain routing?

15 / 25

Which disaster recovery site type involves minimal setup and equipment, requiring the longest time to become operational?

16 / 25

Which environmental sensor would you use to monitor the risk of electrical surges or outages in a data center?

17 / 25

A user complains about slow wireless speeds. What specification should the network technician check first?

18 / 25

Which of the following tasks is handled by the Presentation layer?

19 / 25

What is a rogue access point (AP) used for in an attack?

20 / 25

Which type of spoofing attack involves changing the MAC address of a device?

21 / 25

What type of attack involves intercepting and altering communications between two parties without their knowledge?

22 / 25

An enterprise needs a cabling solution that provides shielding to minimize interference and supports data rates up to 10 Gbps. Which cable type should they use?

23 / 25

A network administrator is assigning VLANs to different departments. What consideration does this fall under?

24 / 25

Which type of DNS server holds the authoritative DNS records for a domain?

25 / 25

A user reports that their device takes a long time to connect to the wireless network. What could be causing the delay?

Your score is

Exit