
Day 7 Practice Questions
Quiz by Rachel Hirsch
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
11 questions
Show answers
- Q1A network administrator has informed you that access to a switch at a remote site is only available through out-of-band management. Which of these would apply to this configuration?A browser with HTTPS is used for managementAll access is provided over a serial connectionYou will need an SSL VPN to access the switchFile transfers must use FTPS30s
- Q2Which of these technologies would be the best choice for encrypting terminal communication across the network?SFTPSSHSSLTLS30s
- Q3A server administrator has identified two devices on the network with duplicate IP addresses. Which layer of the OSI model would best represent this issue?Layer 2Layer 3Layer 1Layer 530s
- Q4A manufacturing company has built a disaster recovery site that maintains an exact hardware duplicate of their data center, and all software is synchronized between the sites every hour. Which of the following would best describe this site?ClusteringHot siteLoad balancingSnapshot30s
- Q5A security administrator would like to limit the number of devices that can communicate through a switch interface. Which of the following would allow this functionality?DHCP snoopingFlood guardVLAN trunkingSTP30s
- Q6A network engineer is connecting two switches directly together in the data center. Which type of cable would be the best choice for this connection?SerialStraight-throughCrossoverLoopback30s
- Q7A security administrator is creating a series of rules and regulations for employee Internet use. Which of the following would be the best way to notify employees of these rules?NDABYODAUPSLA30s
- Q8A company has discovered that an internal database of customer information has been published to the Internet. The security team has determined that the database was copied to a USB drive and released by a disgruntled employee. Which of the following would best describe this attack type?Social EngineeringInsider threatRogue Access PointMan in the Middle30s
- Q9A network administrator has been asked to troubleshoot an issue with a web server that hosts the domain www.example.com. Which of these tools should the administrator use to identify the IP address associated with this web site?Digipconfignetstattcpdump30s
- Q10During the initialization process, a desktop VoIP phone uses TFTP to receive a configuration file. What port should be configured in the firewall to allow this traffic to pass?udp/161udp/69tcp/22tcp/506030s
- Q11A computer in the accounting department is automatically assigning itself an IP address associated with the marketing department. Which of the following would be the most likely reason for this issue?STP is enabledRouting loopIncorrect wire mapIncorrect VLAN assignment30s