Time limit: 0
Quiz Summary
0 of 50 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 50
1. Question
Your organization relies heavily on the Windows SMB protocol for file and printer sharing. Microsoft recently announced that attackers can take advantage of a vulnerability in the SMB protocol and all services should be suspended until further notice. Which of the following ports SHOULD you add to your access control lists (ACLs) to temporarily block incoming SMB packets?
CorrectIncorrect -
Question 2 of 50
2. Question
What is the host ID associated with the network located at 2.8.0.0/24?
CorrectIncorrect -
Question 3 of 50
3. Question
What is the network ID associated with the host located at 192.168.0.4/26?
CorrectIncorrect -
Question 4 of 50
4. Question
An organization has 5 Ethernet switches connected using a bus topology. Each switch has 4 different VLANs and all of them communicate through inter-VLAN routing. Which of the following network topologies BEST describes the above scenario?
CorrectIncorrect -
Question 5 of 50
5. Question
Which layer of the Open Systems Interconnection (OSI) model is responsible for transmitting signals over the network medium and defines electrical and physical specifications for devices?
CorrectIncorrect -
Question 6 of 50
6. Question
An organization requires the use of a central computer to collect and distribute emails to networked devices inside the organization. The central computer will deliver emails through SMTP using port 465. Which of the following network types is MOST suitable in this case?
CorrectIncorrect -
Question 7 of 50
7. Question
Which of the following protocols is used by servers, switches, routers, and computers to synchronize their time over a network?
CorrectIncorrect -
Question 8 of 50
8. Question
Nick is a network engineer who is planning to design an organization’s network. The servers (Web, Email, File) should receive static public IP addresses 5.5.5.1, 5.5.5.2, and 5.5.5.3 respectively. The hosts inside the organization should receive IP addresses automatically using DHCP from the range 172.16.0.0 to 172.16.255.255 without being able to access the internet or any service outside of that network. Which of the following IP addressing schema SHOULD be configured for the hosts inside the organization?
CorrectIncorrect -
Question 9 of 50
9. Question
A network technician is connecting two separate networks by configuring the interface of the routers. The new network has an IP of 30.40.50.4/30. Which of the following IPs does the technician need to assign to the routers?
CorrectIncorrect -
Question 10 of 50
10. Question
Sort the layers (from layer 1 to layer 7) to form the OSI Model.
-
Session
-
Transport
-
Network
-
Application
-
Data link
-
Physical
-
Presentation
View Answers:
CorrectIncorrect -
-
Question 11 of 50
11. Question
You are developing an application using the ASP.NET framework for the back-end and need to connect the app to your Structured Query Language (SQL) database server. Which of the following TCP ports SHOULD you open to allow the application to store, delete, update and retrieve data from the database?
CorrectIncorrect -
Question 12 of 50
12. Question
Which of the following cloud deployment models is MOST suitable for government entities that share similar requirements related to security levels, audit, and privacy?
CorrectIncorrect -
Question 13 of 50
13. Question
Which type of connector should be used to plug a telephone into the wall and the handset into the telephone?
CorrectIncorrect -
Question 14 of 50
14. Question
Drag and drop the connector types into their respective fields.
Sort elements
- RJ-45
- RJ-11
- F-type
- Local Connector
CorrectIncorrect -
Question 15 of 50
15. Question
You are planning to design a network where each node should be directly connected to every other node. Which of the following network topologies is MOST suitable for this design?
CorrectIncorrect -
Question 16 of 50
16. Question
What type of cloud services can allow you to increase or decrease IT resources as needed to meet changing demand?
CorrectIncorrect -
Question 17 of 50
17. Question
Drag and drop the ports into their respective fields.
Sort elements
- 22
- 25
- 53
- 110
-
Secure Shell (SSH)
-
Simple Mail Transfer Protocol (SMTP)
-
Domain Name System (DNS)
-
Post Office Protocol v3 (POP3)
CorrectIncorrect -
Question 18 of 50
18. Question
Which of the following ports is used by HTTPS by default?
CorrectIncorrect -
Question 19 of 50
19. Question
Which of the following concepts is the process of adding additional information when data is traveling in OSI or TCP/IP model?
CorrectIncorrect -
Question 20 of 50
20. Question
Which of the following layers in a Software-Defined Network (SDN) architecture comprises physical switches in the network?
CorrectIncorrect -
Question 21 of 50
21. Question
Which of the following layers in a Software-Defined Network (SDN) architecture manages policies and traffic flow?
CorrectIncorrect -
Question 22 of 50
22. Question
Which of the following is the difference between connectionless and connection-oriented services? (Select TWO)
CorrectIncorrect -
Question 23 of 50
23. Question
Drag and drop the wired topology terms into their respective fields.
Sort elements
- Bus Topology
- Ring Topology
- Star Topology
- Mesh Topology
-
There is a main cable and all the devices are connected to this main cable through drop lines.
-
Εach device is connected with the two devices on either side of it.
-
Each device in the network is connected to a central device called hub.
-
Each device is connected to every other device on the network through a dedicated point-to-point link.
CorrectIncorrect -
Question 24 of 50
24. Question
Nick has been hired to configure the firewall of the ACME Corporation. He needs to allow customers to visit their web pages over a secure connection. Which of the following ports must be allowed through the firewall?
CorrectIncorrect -
Question 25 of 50
25. Question
Which of the following IP addresses are not valid Class A network IDs? (Select TWO)
CorrectIncorrect -
Question 26 of 50
26. Question
Drag and drop the DNS record types into their respective fields.
Sort elements
- A
- CNAME
- NS
- MX
-
Used to map hostnames to an IPv4 address of the host
-
Used to point a domain or subdomain to another hostname
-
Indicates which DNS server is authoritative for that domain
-
Used to help route email according to the domain owners preference
CorrectIncorrect -
Question 27 of 50
27. Question
Drag and drop the various 802.11 wireless standards into their respective frequencies.
Sort elements
- 802.11g
- 802.11a
- 802.11n
-
2.4 GHz
-
5 GHz
-
2.4 GHz / 5 GHz
CorrectIncorrect -
Question 28 of 50
28. Question
Which of the following cloud services requires the least amount of user management, where a service provider manages everything, and the end-user just uses the software?
CorrectIncorrect -
Question 29 of 50
29. Question
Two purposes of using Virtual Local Area Networks (VLANs) are to: (Select TWO)
CorrectIncorrect -
Question 30 of 50
30. Question
A network technician is tasked with configuring the firewall of your organization. You need to block employees to use Telnet to connect remotely to your servers. What port must be blocked through the firewall?
CorrectIncorrect -
Question 31 of 50
31. Question
Nick has just connected his new keyboard to his PC to play his favorite online games wirelessly. Which of the following types of networks is he using?
CorrectIncorrect -
Question 32 of 50
32. Question
Which of the following ports does DHCP use? (Select TWO)
CorrectIncorrect -
Question 33 of 50
33. Question
What is the broadcast address associated with the host located at 40.20.3.2/30?
CorrectIncorrect -
Question 34 of 50
34. Question
What is the last available address that can be assigned to a host associated with the network located at 72.29.189.2/27?
CorrectIncorrect -
Question 35 of 50
35. Question
Drag and drop the fiber connector types into their respective fields.
Sort elements
- MTRJ
- SC
- ST
- LC
CorrectIncorrect -
Question 36 of 50
36. Question
A network engineer designs a Local Area Network (LAN) for a new office. He needs to determine the devices and the cabling to create a star topology. Which layer of the (OSI) model defines electrical specifications for cabling and devices?
CorrectIncorrect -
Question 37 of 50
37. Question
Which layer of the Open Systems Interconnection (OSI) model is responsible for providing connectionless and connection-oriented services to applications?
CorrectIncorrect -
Question 38 of 50
38. Question
A software architect has been tasked to develop a web-based application that provides guaranteed delivery of data between hosts. Which layer of the Open Systems Interconnection (OSI) model is responsible for providing guaranteed delivery of data?
CorrectIncorrect -
Question 39 of 50
39. Question
Which of the following service models allows users to connect to and use cloud-based apps over the Internet?
CorrectIncorrect -
Question 40 of 50
40. Question
A network technician has been notified that a connection where the public switched telephone network ends and the private network of the customer begins has intermittent issues. Which of the following is the place where the connection MOST likely has problems with?
CorrectIncorrect -
Question 41 of 50
41. Question
What information can you extract having the IP address 172.16.99.45? (Select TWO.)
CorrectIncorrect -
Question 42 of 50
42. Question
Which of the following IPs are private networks? (Select TWO).
CorrectIncorrect -
Question 43 of 50
43. Question
A network engineer is tasked with designing the Classless (variable-length subnet mask) IP scheme for a new campus network. Which of the following number of subnet bits is required to create 200 subnets?
CorrectIncorrect -
Question 44 of 50
44. Question
How many bits are allocated to the host bits in an IPv4 address on the network with IP 42.172.0.0/20?
CorrectIncorrect -
Question 45 of 50
45. Question
What is the CIDR notation for a new IT department’s subnet that requires allocating 9 addresses?
CorrectIncorrect -
Question 46 of 50
46. Question
A network technician is connecting to a server to modify the DHCP configuration. DHCP’s new configuration is to lease the last 50 usable IP addresses in subnet 88.9.4.0/23. Which of the following IP addresses could be leased as a result of your new configuration?
CorrectIncorrect -
Question 47 of 50
47. Question
A network technician is tasked with deploying a VoIP solution that provides a direct connection between private or local telephone systems and the public telephone network without the need for a legacy telephone line. Which of the following protocols SHOULD be used to deploy the VoIP solution?
CorrectIncorrect -
Question 48 of 50
48. Question
A network technician has been notified that the routing protocol which is used to distribute IP routing information throughout a single Autonomous System (AS) in an IP network needs troubleshooting. Which of the following routing protocols should the technician be familiar with?
CorrectIncorrect -
Question 49 of 50
49. Question
A network technician is tasked with installing an access point to connect all devices wirelessly. What type of network would the technician end up creating?
CorrectIncorrect -
Question 50 of 50
50. Question
A network security expert is called to troubleshoot the firewall configuration issues within an organization. Hosts aren’t able to access any website using their domain, such as examsdigest.com or google.com. Which of the following is causing the issue?
CorrectIncorrect