<< Prev Question Next Question >>

Question 21/105

This question requires that you evaluate the underlined text to determine if it is correct.
The process of replicating a zone file to multiple DNS servers is called "zone replication".
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (105q)
Question 1: Which protocol is a transport layer protocol?...
Question 2: If a router is installed so that it separates a DHCP server ...
Question 3: In which OSI layer does routing occur?...
Question 4: Which of the following represents a Media Access Control (MA...
Question 5: In addition to switching, multilayer switches also:...
Question 6: The type of connector used on a 100BaseT Ethernet cable is:...
Question 7: Which of the following is a public IP address?...
Question 8: The top-level domain of www.adventureworks.com is:...
Question 9: In a physical star topology, the central device is referred ...
Question 10: DRAG DROP Order the layers of the OSI model: Select and Plac...
1 commentQuestion 11: DRAG DROP Match the VPN connection type to the corresponding...
Question 12: One advantage of dynamic routing is that it:...
Question 13: Which type of network covers the broadest area?...
Question 14: Which subnet mask is valid?
Question 15: The default port used for SMTP is:...
Question 16: Which of the following uses a tunneling protocol?...
Question 17: A node within a local area network (LAN) must have a network...
Question 18: What is the default subnet mask for a Class C Internet netwo...
Question 19: Which of these is an application layer protocol?...
Question 20: When a client's DHCP-issued address expires, the client will...
Question 21: This question requires that you evaluate the underlined text...
Question 22: VPNs are implemented to provide:...
Question 23: Which two of the following are connectivity options for wide...
Question 24: You ping a server by using fully qualified domain name (FQDN...
Question 25: A computer that has an IP address of 169.254.0.1 cannot acce...
Question 26: The topology of a local area network (LAN) is defined by the...
Question 27: The protocol that maps IP addresses to a Media Access Contro...
Question 28: The query protocol used to locate resources on a network is:...
Question 29: A network that separates an organization's private network f...
Question 30: To which IP configuration does the CIDR notation 192.168.1.1...
Question 31: A service that resolves NetBIOS names to IP addresses is:...
Question 32: A user reports that she cannot connect to network resources ...
Question 33: Connecting to a private network address from a public networ...
Question 34: Which type of port is used to support VLAN traffic between t...
Question 35: One purpose of a perimeter network is to:...
Question 36: A Media Access Control (MAC) address identifies a/an:...
Question 37: Which of the following is a Layer 2 WAN protocol?...
Question 38: Which technology provides the highest bit rate?...
Question 39: A router's static route is set by the:...
Question 40: Teredo tunneling is a protocol that:...
Question 41: Which of the following services masks internal IP addresses ...
Question 42: The default subnet mask for a Class B network is:...
Question 43: If an 802.llg Internet connection has connectivity problems,...
Question 44: What is the minimum cabling requirement for a 100BaseTX netw...
Question 45: The host name of the fully qualified domain name (FQDN) mail...
Question 46: The maximum throughput of an 802.llg network is:...
Question 47: Which of the following determines the media access method th...
Question 48: Which wireless authentication method provides the highest le...
Question 49: The default port used for telnet is:...
Question 50: DRAG DROP Match each protocol to its description. To answer,...
Question 51: This question requires that you evaluate the underlined text...
Question 52: The service that resolves fully qualified domain names (FQDN...
Question 53: A characteristic of the mesh topology is that it:...
Question 54: A Layer 2 device that connects multiple computers within a n...
Question 55: A private network that allows members of an organization to ...
Question 56: What type of record does DNS use to find a mail service?...
Question 57: HOTSPOT For each of the following statements, select Yes if ...
Question 58: Internet Key Exchange (IKE) is responsible for which two fun...
Question 59: Which of these addresses is a multicast address?...
Question 60: Which protocol can be used to encrypt packets on the Interne...
Question 61: One reason to replace an unmanaged switch with a managed swi...
Question 62: Which two are published IEEE 802.11 wireless transmission st...
Question 63: What type of DNS record maps host names to addresses?...
Question 64: HOTSPOT You are trying to access a music sharing service on ...
Question 65: A university has network links between various locations. Wh...
Question 66: DRAG DROP Match each set of characteristics to the correspon...
Question 67: Which DNS record type specifies the host that is the authori...
Question 68: A network device that associates a Media Access Control (MAC...
Question 69: One reason to incorporate VLANs in a network is to:...
Question 70: The ping tool is used to: (Choose two.)...
Question 71: HOTSPOT For each of the following statements, select Yes if ...
Question 72: Two companies want to share data by using the Internet. Whic...
Question 73: HOTSPOT For each of the following statements, select Yes if ...
Question 74: The default gateway address identifies the:...
Question 75: DRAG DROP Match each IP address to its corresponding IPv4 ad...
Question 76: Which of the following uses pointer records and A records?...
Question 77: Which technology can you use to extend an internal network a...
Question 78: How many bits are there in an Internet Protocol version 6 (I...
Question 79: Which setting is used to determine the Domain Name System (D...
Question 80: If a router cannot determine the next hop for a packet, the ...
Question 81: You need to divide a network into three subnets. Which devic...
Question 82: HOTSPOT You cannot get to any site on the Internet or on the...
Question 83: Which of the following are features of DHCP? (Choose two.)...
Question 84: Security is a concern on wireless networks due to:...
Question 85: In local area network (LAN) topologies, the primary media ac...
Question 86: DRAG DROP Match each network type to its corresponding defin...
Question 87: Which command is used to verify that a server is connected t...
Question 88: Attenuation in a wireless network signal is a result of:...
Question 89: Which of these represents the Internet Protocol version 6 (I...
Question 90: Which network does the IP address 220.100.100.100 belong to?...
Question 91: A cable that meets the l000BaseT standard has a maximum leng...
Question 92: This question requires that you evaluate the underlined text...
Question 93: The ipconfig command will:
Question 94: Which of these factors has the biggest impact on data transm...
Question 95: The function of a router is to:...
Question 96: What happens when an 802.11b node starts broadcasting within...
Question 97: Which type of network is most vulnerable to intrusion?...
Question 98: A VPN is a/an:
Question 99: This question requires that you evaluate the underlined text...
Question 100: Tracert is used to:
Question 101: To directly connect the Ethernet network interface cards (NI...
Question 102: The command-line tool used to list a host's active incoming ...
Question 103: To protect a network when it is connected to the Internet, y...
Question 104: In which physical network topology is each computer connecte...
Question 105: At what layer in the OSI model are hardware addresses refere...