Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?

Network Engineering Quiz

Quiz
•
Other
•
12th Grade
•
Easy
Нұрсұлтанdl Кенжебай
Used 1+ times
FREE Resource
59 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
syslog records and messages
the network performance baseline
debug output and packet captures
network configuration files
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does the service password-encryption command enhance password security on Cisco routers and switches?
It requires encrypted passwords to be used when connecting remotely to a router or switch with Telnet.
It encrypts passwords that are stored in router or switch configuration files.
It requires that a user type encrypted passwords to gain console access to a router or switch.
It encrypts passwords as they are sent across the network.
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)
The Source Address field name from IPv4 is kept in IPv6.
The Version field from IPv4 is not kept in IPv6.
The Destination Address field is new in IPv6.
The Header Checksum field name from IPv4 is kept in IPv6.
The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices: IP phones - 22 addresses, PCs - 20 addresses needed, Printers - 2 addresses needed, Scanners - 2 addresses needed. The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?
255.255.255.240
255.255.255.252
255.255.255.224
255.255.255.0
255.255.255.248
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What characteristic describes identity theft?
the use of stolen credentials to access private data
software on a router that filters traffic based on IP addresses or applications
software that identifies fast-spreading threats
a tunneling protocol that provides remote users with secure access into the network of an organization
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?
255.255.255.240
255.255.255.0
255.255.255.248
255.255.255.224
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are three commonly followed standards for constructing and installing cabling? (Choose three.)
cable lengths
connector color
connector types
pinouts
cost per meter (foot)
Create a free account and access millions of resources
Similar Resources on Quizizz
60 questions
Cryptography and Network Security Quiz

Quiz
•
12th Grade
56 questions
CIW Social Media Certification Practice Test

Quiz
•
12th Grade
59 questions
Virtual Preliminary 2021 Practice Exam

Quiz
•
12th Grade
60 questions
Klaster 1

Quiz
•
12th Grade
56 questions
llol2

Quiz
•
12th Grade
60 questions
Remedial TJKT

Quiz
•
12th Grade
63 questions
Модель OSI и сетевые протоколы

Quiz
•
12th Grade
58 questions
67 Question Sec+ Quiz

Quiz
•
12th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade