Basic Networking v2

Basic Networking v2

University

58 Qs

quiz-placeholder

Similar activities

Networking 1 Module 1 - 4

Networking 1 Module 1 - 4

University

55 Qs

NET1L - Lesson 1 (Network Components)

NET1L - Lesson 1 (Network Components)

University

58 Qs

NET1L - Lesson 3 (Reference Models - Data Encapsulation)

NET1L - Lesson 3 (Reference Models - Data Encapsulation)

University

58 Qs

N3tw0rk SeCuryTi

N3tw0rk SeCuryTi

University

60 Qs

special exam in elec4

special exam in elec4

University

60 Qs

Chapter 5.4

Chapter 5.4

University

53 Qs

Data Comm (Chapter 3 - Communications Media, Servers and Clients

Data Comm (Chapter 3 - Communications Media, Servers and Clients

University

60 Qs

GRADE 8 4TH MONTHLY EXAM- COMPUTER 8

GRADE 8 4TH MONTHLY EXAM- COMPUTER 8

8th Grade - University

56 Qs

Basic Networking v2

Basic Networking v2

Assessment

Quiz

Computers

University

Medium

Created by

Safiha Risna

Used 4+ times

FREE Resource

58 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

58.1. Match the type of threat with the cause. Hardware threats

poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.

temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).

physical damage to servers, routers, switches, cabling plant, and workstations.

voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

58.2. Match the type of threat with the cause. Environmental threats

poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.

temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).

physical damage to servers, routers, switches, cabling plant, and workstations.

voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

58.3. Match the type of threat with the cause. Electrical threats

poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.

temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).

physical damage to servers, routers, switches, cabling plant, and workstations.

voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

58.4. Match the type of threat with the cause. Maintenance threats

poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.

temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).

physical damage to servers, routers, switches, cabling plant, and workstations.

voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

62.What are two problems that can be caused by a large number of ARP request and reply messages? (Choose two.)

Switches become overloaded because they concentrate all the traffic from the attached subnets.

The ARP request is sent as a broadcast, and will flood the entire subnet.

The network may become overloaded because ARP reply messages have a very large payload due to the 48-bit MAC address and 32-bit IP address that they contain.

A large number of ARP request and reply messages may slow down the switching process, leading the switch to make many changes in its MAC table.

All ARP request messages must be processed by all nodes on the local network.

Answer explanation

Explanation: ARP requests are sent as broadcasts:
(1) All nodes will receive them, and they will be processed by software, interrupting the CPU.
(2) The switch forwards (floods) Layer 2 broadcasts to all ports.

A switch does not change its MAC table based on ARP request or reply messages. The switch populates the MAC table using the source MAC address of all frames. The ARP payload is very small and does not overload the switch.

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

63.A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)

ping

ipconfig

nslookup

netsh interface ipv6 show neighbor

arp -a

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

67.What are the two most effective ways to defend against malware? (Choose two.)

Update the operating system and other application software.

Implement network firewalls.

Install and update antivirus software.

Implement a VPN.

Implement RAID.

Answer explanation

Explanation: A cybersecurity specialist must be aware of the technologies and measures that are used as countermeasures to protect the organization from threats and vulnerabilities.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?