
Network Configuration Quiz
Authored by Adrian Portillo
Information Technology (IT)
9th - 12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
How does a switch determine which port to send a frame to?
The switch looks up the destination MAC address in the CAM table. If found, it will send the frame out of all physical ports. If not found, it will send the frame out of the first physical port.
The switch looks up the destination MAC address in the CAM table. If found, it will send the frame out of the corresponding physical port. If not found, it will send the frame out of all other physical ports
The switch looks up the destination MAC address in the CAM table. If found, it will send the frame out of the first physical port. If not found, it will send the frame out of all physical ports.
The switch looks up the destination MAC address in the CAM table. If found, it will send the frame out of the corresponding physical port. If not found, it will send the frame out of the first physical port.
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A network technician is configuring VLANs on a new network. What is one performance benefit of this approach?
Traffic on the network is encrypted
Latency on the network is increased
Physical security on the network is increased.
Messages sent on the network may reach their destinations faster.
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A technician has reviewed a network log and discovered a potential MAC spoofing attack. Which of the following attacker tactics did the technician most likely identify?
The attacker masked their port with another port on the network.
The attacker mimicked their MAC address with another device’s MAC address on the network.
The attacker filled a switch’s MAC address table with fake entries.
The attacker masked their IP address with another device’s IP address on the network.
4.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A network administrator is tasked with securing a network’s switch. The following requirements must be met. Authorized devices are allowed to connect to the network via a physical port on the switch. Unauthorized device connections will be dropped if attempting to connect to the network via a physical port on the switch. Which of the following best explains how the switch’s port security should be configured?
The physical ports on the switch should be configured to up to allow all authorized device network traffic.
The physical ports on the switch should be configured to up but only allow a specific set of IP addresses.
The physical ports on the switch should be configured to up but only allow a specific set of MAC addresses.
The physical ports on the switch should be configured to up and only allow known device names.
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A network engineer is configuring a server to support encrypted remote access on port 22. Which of the following protocols should the network engineer use to access a device on the remote server?
RDP
SSH
SFTP
Telnet
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which of the following best describes the purpose of the POP3 application layer protocol?
Client retrieval of email messages from a mail server on default port 143.
Client sending of email messages to a mail server on default port 110.
Client sending of email messages to a mail server on default port 143.
Client retrieval of email messages from a mail server on default port 110.
7.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Review the following log file.
2024-10-24 14:43:10 INFO [SSH] Connection established from 192.168.1.10 to 192.168.1.20
2024-10-24 14:43:12 INFO [SSH] User 'gilbert' authenticated successfully
2024-10-24 14:43:14 INFO [SFTP] File upload initiated from 192.168.1.10 to 192.168.1.20:/home/gilbert/uploads 2024-10-24 14:43:16 INFO [SFTP] File 'report.pdf' uploaded successfully to /home/gilbert/uploads
Which of the following TCP/IP model layers are associated with the protocols in the log files?
Application
Transport
Internet
Network
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Project Management Fundamentals Quiz
Quiz
•
11th Grade
15 questions
Kuis Dasar TJKT - Perkembangan Teknologi IPv6
Quiz
•
10th Grade
15 questions
Intro to Word Processing
Quiz
•
9th Grade - University
15 questions
Ulangan Harian 2
Quiz
•
10th Grade
14 questions
Week 3-Database Quiz 1
Quiz
•
9th - 12th Grade
10 questions
Mikrotik
Quiz
•
12th Grade
10 questions
0- and 1-Pixel Art Activity
Quiz
•
9th - 12th Grade
15 questions
Exploring Digital Transformation and IoT
Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
20 questions
El Verbo IR Practice
Quiz
•
9th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
10 questions
Cell Organelles and Their Functions
Interactive video
•
6th - 10th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
20 questions
Combining Sentences
Lesson
•
9th Grade
22 questions
El Imperfecto
Quiz
•
9th - 12th Grade
20 questions
Box and Whisker Plots
Quiz
•
9th Grade