
481-510 Network+
Authored by Hakan Genc
Science
1st Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
QUESTION NO: 481 A network engineer is designing a wireless network that has the following requirements: * Network speed must be higher than 100Mbps * Must use the 2.4GHz and 5GHz bands Which of the following 802.11 standards should the engineer select?
A. 802. lla
B. 802.11b
C. 802. 11g
D. 802.11 n
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
QUESTION NO: 482 The network engineer receives a new router to use for WAN connectivity. Which of the following best describes the layer the network engineer should connect the new router to?
A. Core
B. Leaf
C. Distribution
D. Access
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
QUESTION NO: 483 Which of the following most likely occurs when an attacker is between the target and a legitimate server?
A. IP spoofing
B. VLAN hopping
C. Rogue DHCP
D. On-path attack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
QUESTION NO: 484 After a critical power issue, the network team was not receiving UPS status notifications. The network team would like to be alerted on these status changes. Which of the following would be BEST to use tor these notifications?
A. Traps
B. MB
C. NetFlow
D. Syslog
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
QUESTION NO: 485 A network technician was troubleshooting an issue for a user who was being directed to cloned websites that were stealing credentials. The URLs were correct for the websites but an incorrect IP address was revealed when the technician used ping on the user's PC After checking the is setting, the technician found the DNS server address was incorrect Which of the following describes the issue?
A. Rogue DHCP server
B. Misconfigured HSRP
C. DNS poisoning
D. Exhausted IP scope
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
QUESTION NO: 486 Which of the following fouling protocols is generally used by major ISPs for handing largescale internet traffic?
A. RIP
B. EIGRP
C. OSPF
D. BGP
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
QUESTION NO: 487 An engineer needs to restrict the database servers that are in the same subnet from communicating with each other. The database servers will still need to communicate with the application servers in a different subnet. In some cases, the database servers will be clustered, and the servers will need to communicate with other cluster members. Which of the following technologies will be BEST to use to implement this filtering without creating rules?
A. Private VLANs
B. Access control lists
C. Firewalls
D. Control plane policing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?