
Computers N4

Quiz
•
Information Technology (IT)
•
12th Grade
•
Hard
Akau Anyieth
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #78
Topic 1
A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?
A. 22
B. 23
C. 80
D. 3389
E. 8080
Answer explanation
Telnet uses UDP port 23.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #79
Topic 1
A technician is writing documentation regarding a company's server farm. The technician needs to confirm the server name for all Linux servers. Which of the following commands should the technician run?
A. ipconfig
B. nslookup
C. arp
D. route
Answer explanation
nslookup (name server lookup) is a tool used to perform DNS lookups in Linux. It is used to display DNS details, such as the IP address of a particular computer, the MX records for a domain, or the NS servers of a domain
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #80
Topic 1
A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring?
A. Ethernet collisions
B. A DDoS attack
C. A broadcast storm
D. Routing loops
Answer explanation
A broadcast storm is an abnormally high number of broadcast packets within a short period of time. They can overwhelm switches and endpoints as they struggle to keep up with processing the flood of packets. When this happens, network performance degrades.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #81
Topic 1
A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?
A. MIMO
B. TKIP
C. LTE
D. SSID
Answer explanation
The feature that should be configured to allow different wireless access through the same equipment is SSID (Service Set Identifier). SSID is a unique identifier that allows wireless devices to connect to a wireless network. By configuring multiple SSIDs, the store owner can provide separate wireless access for business equipment and patron use, while using the same wireless access points
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #82
Topic 1
Which of the following systems would MOST likely be found in a screened subnet?
A. RADIUS
B. FTP
C. SQL
D. LDAP
Answer explanation
A screened subnet, also known as a DMZ (Demilitarized Zone), is a network segment that sits between an organization's internal network and an external network, such as the internet. The purpose of a screened subnet is to host services that need to be accessible from both the internal network and the external network while providing an additional layer of security.
Among the options provided, the system that would MOST likely be found in a screened subnet is:
B. FTP (File Transfer Protocol)
FTP servers are often placed in a DMZ to allow external users to access files while segregating them from the internal network. This arrangement helps mitigate security risks associated with exposing file-sharing services to external users. Therefore, FTP is the most likely system to be found in a screened subnet.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #83
Topic 1
Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?
A. Scope options
B. Reservation
C. Dynamic assignment
D. Exclusion
E. Static assignment
Answer explanation
DHCP reservations allow the DHCP server to pre-set an IP address to a specific client based on its MAC address. This ensures that the client will always get the same IP address from the DHCP server when it connects to the network. DHCP reservations are usually used with servers or printers on your internal network and are rarely used with end-user devices.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #84
Topic 1
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?
A. Motion detection
B. Access control vestibules
C. Smart lockers
D. Cameras
Answer explanation
Access control vestibules can ensure that each individual's entry into the datacenter is separately recorded by a card reader, even when multiple employees enter the facility at the same time. Access control vestibules are small rooms with two doors that require authorized individuals to present their access cards to enter or exit. The vestibules ensure that only authorized individuals enter the datacenter, and their entry is individually recorded by the card reader. Once the first door is closed, the employee must present their card again to enter the second door. This double-entry system ensures that access to the datacenter is controlled and recorded accurately.
Create a free account and access millions of resources
Similar Resources on Wayground
23 questions
Initial Assessment 12B Semester 2

Quiz
•
12th Grade
30 questions
All of LO4 unit 1

Quiz
•
12th Grade
29 questions
Quiz 3.1 - Operating Systems

Quiz
•
9th - 12th Grade
21 questions
Latihan Soal Bab 3 Jaringan Komputer Kelas XI

Quiz
•
9th - 12th Grade
25 questions
Administrasi Jaringan XII Sesi 1

Quiz
•
12th Grade
20 questions
Linux and Windows Quiz

Quiz
•
12th Grade
22 questions
Internet and App script

Quiz
•
5th Grade - University
30 questions
Internet Basics Quiz

Quiz
•
6th Grade - University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Video Games

Quiz
•
6th - 12th Grade
28 questions
Ser vs estar

Quiz
•
9th - 12th Grade
13 questions
BizInnovator Startup - Experience and Overview

Quiz
•
9th - 12th Grade
16 questions
AP Biology: Unit 1 Review (CED)

Quiz
•
9th - 12th Grade
20 questions
Parallel lines and transversals

Quiz
•
9th - 12th Grade
9 questions
Geometry and Trigonometry Concepts

Interactive video
•
9th - 12th Grade
10 questions
Angle Relationships with Parallel Lines and a Transversal

Quiz
•
9th - 12th Grade