Basic Networking v2

Basic Networking v2

University

58 Qs

quiz-placeholder

Similar activities

Java

Java

University

61 Qs

Model Bisnis - Quiz 1

Model Bisnis - Quiz 1

University

55 Qs

NETWORK HARDWARE

NETWORK HARDWARE

University - Professional Development

55 Qs

FDS_MIDTERM

FDS_MIDTERM

University

60 Qs

IoT_Midterm

IoT_Midterm

University

60 Qs

IT for life

IT for life

KG - University

55 Qs

Conocimientos previos: Diseño y Desarrollo Web. HTML y CSS

Conocimientos previos: Diseño y Desarrollo Web. HTML y CSS

University

59 Qs

IC3_GS6_LV2

IC3_GS6_LV2

7th Grade - University

60 Qs

Basic Networking v2

Basic Networking v2

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Safiha Risna

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

58 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

58.1. Match the type of threat with the cause. Hardware threats

poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.

temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).

physical damage to servers, routers, switches, cabling plant, and workstations.

voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

58.2. Match the type of threat with the cause. Environmental threats

poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.

temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).

physical damage to servers, routers, switches, cabling plant, and workstations.

voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

58.3. Match the type of threat with the cause. Electrical threats

poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.

temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).

physical damage to servers, routers, switches, cabling plant, and workstations.

voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

58.4. Match the type of threat with the cause. Maintenance threats

poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.

temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).

physical damage to servers, routers, switches, cabling plant, and workstations.

voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

62.What are two problems that can be caused by a large number of ARP request and reply messages? (Choose two.)

Switches become overloaded because they concentrate all the traffic from the attached subnets.

The ARP request is sent as a broadcast, and will flood the entire subnet.

The network may become overloaded because ARP reply messages have a very large payload due to the 48-bit MAC address and 32-bit IP address that they contain.

A large number of ARP request and reply messages may slow down the switching process, leading the switch to make many changes in its MAC table.

All ARP request messages must be processed by all nodes on the local network.

Answer explanation

Explanation: ARP requests are sent as broadcasts:
(1) All nodes will receive them, and they will be processed by software, interrupting the CPU.
(2) The switch forwards (floods) Layer 2 broadcasts to all ports.

A switch does not change its MAC table based on ARP request or reply messages. The switch populates the MAC table using the source MAC address of all frames. The ARP payload is very small and does not overload the switch.

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

63.A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)

ping

ipconfig

nslookup

netsh interface ipv6 show neighbor

arp -a

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

67.What are the two most effective ways to defend against malware? (Choose two.)

Update the operating system and other application software.

Implement network firewalls.

Install and update antivirus software.

Implement a VPN.

Implement RAID.

Answer explanation

Explanation: A cybersecurity specialist must be aware of the technologies and measures that are used as countermeasures to protect the organization from threats and vulnerabilities.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?