Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
Network+ Practice Test 8
Home
Network+ Practice Test 8
Start your Network+ Practice Test 8
Which of the following cloud connectivity methods would provide a secure and high-speed connection between an enterprise and a cloud services provider without the involvement of a third party?
A.VPN
B.Telco managed connection
C.MetroEthernet
D.Direct Connection
None
Which of these statements is true. NIC teaming involves: The aggregation of multiple links between switches The aggregation of multiple NICs of a server The clustering of multiple servers over a single link
A.Only statement 1 is true
B.Statements 1 and 2 are true
C.Only statement 2 is true
D.Statements 1 and 3 are true
None
Your organization uses biometric authentication for entering the corporate building. Which type of authentication mechanism is being used?
A.Inherence
B.Knowledge
C.Action
D.Location
E.Possession
None
A wireless access point has MAC filtering enabled and has several clients connected. You will be attempting MAC spoofing of one of the connected clients. Which is the method should you use to disconnect this client from the wireless access point? [Choose two that apply.]
A.Remotely shutdown the client
B.Initiate DoS against the client
C.Perform deassoc
D.Perform deauth
You need to connect to a colleague’s system using the default Microsoft Windows remote desktop application to troubleshoot an application issue. Which port should be opened on the colleague’s system firewall to ensure successful remote connection?
A.389
B.3389
C.89
D.22
None
Which of the following are the key intention of internal export controls?
A.Publicly available technology
B.Software and devices with cryptographic mechanism
C.Licensing
D.Learning applications
None
You have a Voice over IP (VoIP) system that is configured to run over a wireless network. When you attempt to make a call, the voice of the receiver is broken, and you are not able to hear the words clearly. Which of the following issue is being faced in this scenario?
A.Attenuation
B.Latency
C.Jitter
D.Refraction
None
You have installed an access point that is unable to process the sheer number of requests and transmissions from the wireless users connected to it. Not all the users are able to connect at once. What could be the probable cause?
A.Interference
B.Overprovisioning
C.Frequency mismatch
D.Overcapacity
None
You oversee procuring data networking equipment for the organization you work for. You are required to purchase switches and routers that are capable of terminating pairs of fiber optic cables with LC connectors that will provide up to 1 Gbps speeds and no greater. Which of the following transceiver types should the network devices be compatible with and should you procure with the equipment?
A.SFP
B.SFP+
C.GBIC
D.QSFP
None
You are configuring a new wireless network. You want to ensure that the protocol that you use provides CCMP and AES encryption support. Which of the following protocol should you use?
A.EAP-FAST
B.WEP
C.WPA2
D.WPA
None
Time's up