PacketExam

Network+

Practice_Exam_02

1 / 51

1. A router receives a packet whose TTL value is 1. What will the router do?

2 / 51

2. Which specialized device authenticates users and terminates multiple VPN tunnels for enterprise remote access?

3 / 51

3. Which security property of a VPN ensures that data cannot be modified in transit without detection?

4 / 51

4. Which TWO characteristics distinguish NAS from SAN solutions (select (2))

5 / 51

5. Which TWO features are typically delivered by a wireless LAN controller to a fleet of lightweight APs (select (2))

6 / 51

6. Which statement BEST describes a Content Delivery Network (CDN)?

7 / 51

7. Which statement best describes a transparent proxy?

8 / 51

8. Traffic policing typically takes which action on packets that exceed the configured rate limit?

9 / 51

9. Most modern Windows operating systems transmit ICMP packets with which default initial TTL value?

10 / 51

10. A Storage Area Network (SAN) provides _____ access to data.

11 / 51

11. What is the primary benefit of using a wireless LAN controller (WLC) with dozens of lightweight access points?

12 / 51

12. How does a forward caching proxy such as Squid improve web performance for an enterprise?

13 / 51

13. Reducing the TTL value on a DNS record causes future changes to propagate more quickly across resolvers.

14 / 51

14. Which protocol do Windows clients typically use to access shared folders on a NAS appliance?

15 / 51

15. Which TWO characteristics are provided by a properly implemented VPN solution for teleworkers? select (2)

16 / 51

16. Which TWO CDN design features help mitigate DDoS attacks? select (2)

17 / 51

17. Which TWO header fields can QoS devices modify to SIGNAL packet priority end-to-end? select (2)

18 / 51

18. Which field in an IP header is MOST often modified by network devices to indicate packet priority for QoS policies?

Think about what happens to TTL at each router.

19 / 51

19. A packet leaves a host with TTL 128 and arrives at its destination with TTL 119. How many Layer-3 hops did it traverse?

20 / 51

20. Which THREE benefits are commonly delivered by a CDN? select (3)

21 / 51

21. Which ICMP message does a router send when it discards a packet whose TTL has reached zero?

22 / 51

22. Which mechanism ultimately STOPS a routing loop if no routing protocol fix exists?

23 / 51

23. Which networking function establishes an encrypted tunnel across the public Internet so remote hosts appear to be on the same private network?

24 / 51

24. Voice over IP traffic should be queued in the same best-effort class as large file transfers to maximize link utilization.

25 / 51

25. Which TWO IPv4 header fields are modified by routers during normal forwarding? select (2)

26 / 51

26. An intrusion detection system (IDS) is positioned inline with traffic so it can both detect and automatically block malicious packets in real time.

27 / 51

27. Inline IPS devices are commonly placed at which TWO network locations to maximize protection without excessive latency (select (2))

28 / 51

28. Which TWO QoS techniques directly govern the RATE at which traffic is sent? select (2)

29 / 51

29. What decimal DSCP value is reserved for Expedited Forwarding (EF) used by interactive voice?

30 / 51

30. What term describes the condition in which Router A lists Router B as the next hop for a network while Router B lists Router A for the same network?

31 / 51

31. Which 3-bit field inside an 802.1Q VLAN tag conveys class-of-service priority information?

This technique avoids dropping packets but may add delay.

32 / 51

32. Which QoS mechanism buffers excess traffic and releases it at a steady rate, smoothing bursts on an interface?

33 / 51

33. Marking every packet with DSCP EF guarantees low-latency service because EF has the lowest drop precedence among all codepoints.

34 / 51

34. Which THREE functions are performed by a VPN concentrator? select (3)

35 / 51

35. Compared with a separate router, what advantage does a multilayer switch offer in a campus core?

36 / 51

36. A CDN deploys multiple international points of presence (PoPs). What is the MAIN reason for this architecture?

37 / 51

37. Which of the following capabilities are core functions of a next-generation firewall – NGFW (select (3))

38 / 51

38. A standalone 802.11 access point that bridges wireless clients to a wired LAN primarily operates at which OSI layer?

39 / 51

39. In DNS, what does the TTL value of a record determine?

40 / 51

40. Which VPN characteristic MOST directly provides confidentiality for data crossing the Internet?

41 / 51

41. Which device sits between internal clients and the external network, makes web requests on their behalf, and can provide URL filtering and content scanning?

42 / 51

42. Where is the QoS trust boundary most commonly established in an enterprise campus?

43 / 51

43. Which THREE advantages can traffic shaping provide on a WAN link? select (3)

44 / 51

44. Reducing the TTL value on an authoritative DNS record will cause resolvers to cache the record for a longer time.

45 / 51

45. What is the maximum numeric value that can be stored in the IPv4 TTL or IPv6 Hop Limit field?

46 / 51

46. CDNs typically REDUCE—not increase—end-user latency because each extra hop adds propagation delay.

47 / 51

47. When a health-check marks a backend server as UNHEALTHY, a correctly configured load balancer will immediately stop forwarding NEW client sessions to that server.

48 / 51

48. What is the PRIMARY purpose of the Time To Live (TTL) field in an IPv4 header?

49 / 51

49. A modern application load balancer can offload which TWO tasks from backend servers to improve performance (select (2))

50 / 51

50. Which load-balancing algorithm directs new client sessions to the server that currently has the FEWEST active connections?

51 / 51

51. In IPv6, which header field performs the same loop-prevention role as IPv4’s TTL?

Your score is

The average score is 58%

0%