Network+
Practice_Exam_02
1 / 51
1. A router receives a packet whose TTL value is 1. What will the router do?
When TTL decrements to 0 the router discards the packet and typically sends an ICMP ‘Time Exceeded’ message. Reference
2 / 51
2. Which specialized device authenticates users and terminates multiple VPN tunnels for enterprise remote access?
A VPN concentrator sits at the network edge and manages many simultaneous encrypted tunnels. Reference
3 / 51
3. Which security property of a VPN ensures that data cannot be modified in transit without detection?
VPNs use integrity checks such as HMAC to detect tampering and guarantee data integrity. Reference :contentReference[oaicite:18]{index=18}
4 / 51
4. Which TWO characteristics distinguish NAS from SAN solutions (select (2))
NAS provides file-level access via protocols such as SMB or NFS, while a SAN offers block-level LUNs over Fibre Channel or iSCSI. Reference :contentReference[oaicite:18]{index=18}
5 / 51
5. Which TWO features are typically delivered by a wireless LAN controller to a fleet of lightweight APs (select (2))
WLCs centralize policy enforcement and automate RF management such as channel/power adjustments. Reference :contentReference[oaicite:16]{index=16}
6 / 51
6. Which statement BEST describes a Content Delivery Network (CDN)?
A CDN is a geographically distributed group of edge servers that cache content close to users, improving load times and reducing origin-server load. Reference
7 / 51
7. Which statement best describes a transparent proxy?
In a transparent deployment, client software is unaware; traffic is silently redirected, so browser proxy settings are not required. Reference :contentReference[oaicite:5]{index=5}
8 / 51
8. Traffic policing typically takes which action on packets that exceed the configured rate limit?
Policing enforces a hard cap by dropping or optionally re-marking excess packets. Reference :contentReference[oaicite:2]{index=2}
9 / 51
9. Most modern Windows operating systems transmit ICMP packets with which default initial TTL value?
Windows hosts start with TTL 128, while Linux defaults to 64 and Cisco IOS to 255. Reference :contentReference[oaicite:5]{index=5}
10 / 51
10. A Storage Area Network (SAN) provides _____ access to data.
SANs expose storage at the block level, unlike NAS, which is file-level. Reference :contentReference[oaicite:7]{index=7}
11 / 51
11. What is the primary benefit of using a wireless LAN controller (WLC) with dozens of lightweight access points?
A WLC provides centralized configuration and real-time monitoring for all managed APs through a single interface. Reference :contentReference[oaicite:10]{index=10}
12 / 51
12. How does a forward caching proxy such as Squid improve web performance for an enterprise?
By serving frequently-requested objects locally, the proxy lowers bandwidth use and latency for end users. Reference :contentReference[oaicite:12]{index=12}
13 / 51
13. Reducing the TTL value on a DNS record causes future changes to propagate more quickly across resolvers.
A shorter DNS TTL makes caches expire sooner, so updated records are obtained faster. Reference :contentReference[oaicite:9]{index=9}
14 / 51
14. Which protocol do Windows clients typically use to access shared folders on a NAS appliance?
Windows file-sharing relies on the Server Message Block (SMB) protocol. Reference :contentReference[oaicite:6]{index=6}
15 / 51
15. Which TWO characteristics are provided by a properly implemented VPN solution for teleworkers? select (2)
VPNs secure data in transit and allow authenticated remote users to appear logically on the internal network. Reference
16 / 51
16. Which TWO CDN design features help mitigate DDoS attacks? select (2)
Global distribution spreads malicious traffic across many POPs, while massive aggregate bandwidth at the edge absorbs volumetric floods. Reference Reference :contentReference[oaicite:8]{index=8}
17 / 51
17. Which TWO header fields can QoS devices modify to SIGNAL packet priority end-to-end? select (2)
Networks typically mark either DSCP bits in the IP header or 802.1p Priority Code Point (PCP) bits in VLAN tags. Reference
18 / 51
18. Which field in an IP header is MOST often modified by network devices to indicate packet priority for QoS policies?
QoS devices commonly set Differentiated Services Code Point (DSCP) bits in the DS field to mark traffic classes. Reference
Think about what happens to TTL at each router.
19 / 51
19. A packet leaves a host with TTL 128 and arrives at its destination with TTL 119. How many Layer-3 hops did it traverse?
Routers decrement TTL by one per hop, so 128 – 119 = 9 routers were crossed. Reference :contentReference[oaicite:12]{index=12}
20 / 51
20. Which THREE benefits are commonly delivered by a CDN? select (3)
Edge caching shortens latency, offloads traffic from the origin, and can absorb large-scale DDoS attacks. Reference
21 / 51
21. Which ICMP message does a router send when it discards a packet whose TTL has reached zero?
Routers reply with ICMP Type 11 Code 0 (Time Exceeded – TTL expired in transit). Reference :contentReference[oaicite:10]{index=10}
22 / 51
22. Which mechanism ultimately STOPS a routing loop if no routing protocol fix exists?
The TTL value reaches zero after enough hops, forcing routers to discard looping packets. Reference
23 / 51
23. Which networking function establishes an encrypted tunnel across the public Internet so remote hosts appear to be on the same private network?
A Virtual Private Network (VPN) creates an encrypted tunnel that protects data as it traverses untrusted networks. Reference
24 / 51
24. Voice over IP traffic should be queued in the same best-effort class as large file transfers to maximize link utilization.
QoS best practice is to give real-time voice packets higher priority than bulk data; mixing them increases jitter and latency. Reference
25 / 51
25. Which TWO IPv4 header fields are modified by routers during normal forwarding? select (2)
Routers decrement TTL and then recalculate the Header Checksum; other fields remain unchanged. Reference :contentReference[oaicite:13]{index=13}
26 / 51
26. An intrusion detection system (IDS) is positioned inline with traffic so it can both detect and automatically block malicious packets in real time.
IDS operates in detection mode only; automatic blocking requires an inline IPS. Reference :contentReference[oaicite:3]{index=3}
27 / 51
27. Inline IPS devices are commonly placed at which TWO network locations to maximize protection without excessive latency (select (2))
Best practice positions an IPS just inside the perimeter firewall and/or directly in front of critical server farms. Reference :contentReference[oaicite:11]{index=11}
28 / 51
28. Which TWO QoS techniques directly govern the RATE at which traffic is sent? select (2)
Shaping buffers excess packets to smooth bursts, while policing drops or re-marks packets that exceed a contract. Reference
29 / 51
29. What decimal DSCP value is reserved for Expedited Forwarding (EF) used by interactive voice?
EF uses codepoint 46, giving voice the lowest latency treatment on QoS devices. Reference :contentReference[oaicite:4]{index=4}
30 / 51
30. What term describes the condition in which Router A lists Router B as the next hop for a network while Router B lists Router A for the same network?
Such mutually incorrect routes create a routing loop that can persist until TTL expires. Reference
31 / 51
31. Which 3-bit field inside an 802.1Q VLAN tag conveys class-of-service priority information?
The Priority Code Point (PCP) bits let switches assign eight service levels to frames. Reference :contentReference[oaicite:0]{index=0}
This technique avoids dropping packets but may add delay.
32 / 51
32. Which QoS mechanism buffers excess traffic and releases it at a steady rate, smoothing bursts on an interface?
Traffic shaping enforces a lower bitrate by queuing packets that exceed the configured rate. Reference
33 / 51
33. Marking every packet with DSCP EF guarantees low-latency service because EF has the lowest drop precedence among all codepoints.
EF (46) receives strict priority, but excessive EF marking can starve other traffic and still face policing; EF has high priority, not lowest drop precedence. Reference :contentReference[oaicite:14]{index=14}
34 / 51
34. Which THREE functions are performed by a VPN concentrator? select (3)
The device authenticates remote users, establishes many encrypted tunnels, and handles bulk encryption/decryption at the edge. Reference :contentReference[oaicite:7]{index=7}
35 / 51
35. Compared with a separate router, what advantage does a multilayer switch offer in a campus core?
Layer-3 switching performs routing in hardware, delivering wire-speed inter-VLAN forwarding with lower latency. Reference :contentReference[oaicite:13]{index=13}
36 / 51
36. A CDN deploys multiple international points of presence (PoPs). What is the MAIN reason for this architecture?
Distributing PoPs places cached content closer to users, cutting RTT and accelerating delivery. Reference
37 / 51
37. Which of the following capabilities are core functions of a next-generation firewall – NGFW (select (3))
NGFWs combine deep-packet inspection, application awareness/control, and integrated IPS to enforce contextual security policies. Reference :contentReference[oaicite:2]{index=2}
38 / 51
38. A standalone 802.11 access point that bridges wireless clients to a wired LAN primarily operates at which OSI layer?
An AP is effectively a wireless Layer 2 bridge. Reference :contentReference[oaicite:9]{index=9}
39 / 51
39. In DNS, what does the TTL value of a record determine?
DNS TTL tells resolvers how long to cache the record before re-querying the authoritative server. Reference
40 / 51
40. Which VPN characteristic MOST directly provides confidentiality for data crossing the Internet?
A VPN encrypts payloads inside a secure tunnel so intercepted packets remain unreadable. Reference
41 / 51
41. Which device sits between internal clients and the external network, makes web requests on their behalf, and can provide URL filtering and content scanning?
A forward proxy intermediates client traffic, enabling policy enforcement and caching. Reference :contentReference[oaicite:17]{index=17}
42 / 51
42. Where is the QoS trust boundary most commonly established in an enterprise campus?
Best practice sets the trust boundary on the access-layer switch port to an IP phone or other trusted device. Reference :contentReference[oaicite:6]{index=6}
43 / 51
43. Which THREE advantages can traffic shaping provide on a WAN link? select (3)
Shaping queues excess packets to smooth bursts, lowers drop rates compared to policing, and reserves predictable bandwidth for latency-sensitive flows. Reference :contentReference[oaicite:3]{index=3}
44 / 51
44. Reducing the TTL value on an authoritative DNS record will cause resolvers to cache the record for a longer time.
A lower DNS TTL SHORTENS cache duration, forcing quicker re-queries; it never lengthens caching. Reference
45 / 51
45. What is the maximum numeric value that can be stored in the IPv4 TTL or IPv6 Hop Limit field?
Both fields are 8 bits wide, so the maximum possible value is 255. Reference :contentReference[oaicite:15]{index=15}
46 / 51
46. CDNs typically REDUCE—not increase—end-user latency because each extra hop adds propagation delay.
Although CDNs add hops, the shorter physical distance to an edge server more than offsets hop delay, so total latency drops. Reference
47 / 51
47. When a health-check marks a backend server as UNHEALTHY, a correctly configured load balancer will immediately stop forwarding NEW client sessions to that server.
Health-monitored pools ensure traffic only reaches servers that pass continuous checks; failed nodes are withdrawn until healthy again. Reference :contentReference[oaicite:14]{index=14}
48 / 51
48. What is the PRIMARY purpose of the Time To Live (TTL) field in an IPv4 header?
TTL limits a packet’s lifetime by decrementing at each hop, preventing it from circulating indefinitely in routing loops. Reference
49 / 51
49. A modern application load balancer can offload which TWO tasks from backend servers to improve performance (select (2))
SSL/TLS and TCP session handling consume CPU cycles that the load balancer can absorb, freeing the servers for application logic. Reference :contentReference[oaicite:4]{index=4}
50 / 51
50. Which load-balancing algorithm directs new client sessions to the server that currently has the FEWEST active connections?
The least-connections method continuously tracks active sessions and assigns the next one to the least-loaded server. Reference :contentReference[oaicite:8]{index=8}
51 / 51
51. In IPv6, which header field performs the same loop-prevention role as IPv4’s TTL?
The Hop Limit field is decremented at every router; when it reaches zero, the packet is discarded. Reference :contentReference[oaicite:1]{index=1}
Your score is
The average score is 58%
Restart quiz