placeholder image to represent content

Day 7 Practice Questions

Quiz by Rachel Hirsch

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
11 questions
Show answers
  • Q1
    A network administrator has informed you that access to a switch at a remote site is only available through out-of-band management. Which of these would apply to this configuration?
    A browser with HTTPS is used for management
    All access is provided over a serial connection
    You will need an SSL VPN to access the switch
    File transfers must use FTPS
    30s
  • Q2
    Which of these technologies would be the best choice for encrypting terminal communication across the network?
    SFTP
    SSH
    SSL
    TLS
    30s
  • Q3
    A server administrator has identified two devices on the network with duplicate IP addresses. Which layer of the OSI model would best represent this issue?
    Layer 2
    Layer 3
    Layer 1
    Layer 5
    30s
  • Q4
    A manufacturing company has built a disaster recovery site that maintains an exact hardware duplicate of their data center, and all software is synchronized between the sites every hour. Which of the following would best describe this site?
    Clustering
    Hot site
    Load balancing
    Snapshot
    30s
  • Q5
    A security administrator would like to limit the number of devices that can communicate through a switch interface. Which of the following would allow this functionality?
    DHCP snooping
    Flood guard
    VLAN trunking
    STP
    30s
  • Q6
    A network engineer is connecting two switches directly together in the data center. Which type of cable would be the best choice for this connection?
    Serial
    Straight-through
    Crossover
    Loopback
    30s
  • Q7
    A security administrator is creating a series of rules and regulations for employee Internet use. Which of the following would be the best way to notify employees of these rules?
    NDA
    BYOD
    AUP
    SLA
    30s
  • Q8
    A company has discovered that an internal database of customer information has been published to the Internet. The security team has determined that the database was copied to a USB drive and released by a disgruntled employee. Which of the following would best describe this attack type?
    Social Engineering
    Insider threat
    Rogue Access Point
    Man in the Middle
    30s
  • Q9
    A network administrator has been asked to troubleshoot an issue with a web server that hosts the domain www.example.com. Which of these tools should the administrator use to identify the IP address associated with this web site?
    Dig
    ipconfig
    netstat
    tcpdump
    30s
  • Q10
    During the initialization process, a desktop VoIP phone uses TFTP to receive a configuration file. What port should be configured in the firewall to allow this traffic to pass?
    udp/161
    udp/69
    tcp/22
    tcp/5060
    30s
  • Q11
    A computer in the accounting department is automatically assigning itself an IP address associated with the marketing department. Which of the following would be the most likely reason for this issue?
    STP is enabled
    Routing loop
    Incorrect wire map
    Incorrect VLAN assignment
    30s

Teachers give this quiz to your class