0

Computer Network Technology

Description: computer network
Number of Questions: 10
Created by:
Tags: networking
Attempted 0/10 Correct 0 Score 0

checking CAT5e cabling the ends were not properly terminated. Which tools will verify this?

  1. Cable tester

  2. Toner probe

  3. OTDR

  4. Loopback plug


Correct Option: A

Which of the following is a method to prioritize network traffic coming from VoIP phones?

  1. PAT

  2. DNS

  3. QoS

  4. SIP


Correct Option: C

A bridge handles frames at which of the following layers of the OSI model?

  1. Data Link

  2. Transport

  3. Session

  4. Network


Correct Option: A

Which of the following ports is the default telnet port?

  1. 20

  2. 21

  3. 22

  4. 23


Correct Option: D

After establishing a plan of action to resolve the problem. Which is the next step ?

  1. Verify full functionality and use preventative measures

  2. Implement the solution or escalate as necessary.

  3. Document findings, actions, and outcomes.

  4. Establish a theory of probable cause.


Correct Option: B

When troubleshooting, which is the next step after verifying full system functionality?

  1. a plan of action to resolve the problem and identify effects

  2. Implement the solution.

  3. Establish a theory of probable cause.

  4. Document findings, actions, and outcomes.


Correct Option: D

Which of the following protocols is commonly used for VoIP technology?

  1. Telnet

  2. SIP

  3. SNMP

  4. SMTP


Correct Option: B

what commands can a technician use on a Windows 2012 server to display default router address?

  1. Ping

  2. nslookup

  3. ipconfig

  4. Arp


Correct Option: C

Which of the following separates broadcast domains?

  1. Port mirroring

  2. Router

  3. Convergence

  4. Switch


Correct Option: B

The protocol that use a three-way handshake to transfer information is found in which layer?

  1. layer 2

  2. layer 3

  3. layer 4

  4. layer 5


Correct Option: C
- Hide questions