CompTIA N10-007 Network+ Pop Quiz #4

| April 13, 2020
4-1: A network administrator has performed a packet capture on a VoIP application and has noticed excessive delays between individual packets. Which of the following would describe these delays?
Attenuation
Interference
Jitter
Excessive SNR
Security type mismatch

Correct!

Wrong!

4-2: A family has installed IoT automation that can control door locks, lights, and garage doors. Which of the following technologies would commonly be used to communicate between these systems?
Z-Wave
Bluetooth
NFC
IR
RFID

Correct!

Wrong!

4-3: A security researcher needs a high-speed switching storage technology that can support speeds up to 200 gigabits per second with aggregation up to 12x. Which of the following would support these requirements?
InfiniBand
Broadband Ethernet
Fibre Channel
eSATA
iSCSI

Correct!

Wrong!

4-4: What SSH-based protocol allows the copying of files between systems over the network?
AFS
SFTP
TFTP
SMB
FTPS

Correct!

Wrong!

4-5: Which of these authentication methods use multi-factor authentication?
Password and a PIN
USB token and an SMS code
Swipe pattern and a smart card
Fingerprint and an iris scan

Correct!

Wrong!

4-6: A network administrator is troubleshooting a wireless issue on a user's workstation and believes that the access point is too far away. Which of these would BEST describe this issue?
Attenuation
Reflection
Absorption
Refraction
Jitter

Correct!

Wrong!

4-7: When two switches are connected to each other, the network creates a loop and devices are no longer able to communicate. Which of the following would prevent this loop from occurring?
802.1Q
ACL
NAT
Poisoning
RSTP

Correct!

Wrong!

4-8: The local telecommunications provider is installing a new WAN link at the corporate office. Which of the following would BEST describe this installation point?
CSU/DSU
Demarc
SONET
CoS
DMZ

Correct!

Wrong!

4-9: The data center manager would like to identify all devices that respond to requests made from a web browser. Which of the following would be the BEST way to identify these devices?
Protocol analyzer
SNMP manager
Port scanner
Captive portal
SIEM

Correct!

Wrong!

4-10: A system administrator has found that accessing certain websites will connect to IP addresses that are not associated with the legitimate website. Which of the following would describe this type of attack?
Ransomware
Poisoning
Phishing
Brute force
Social engineering

Correct!

Wrong!

Share the quiz to show your results !

Subscribe to see your results

N10-007 – Pop Quiz #4

I got %%score%% of %%total%% right

%%description%%

%%description%%

Loading...

Category: Network+ Pop Quizzes

Comments are closed.

X