Search test library by skills or roles
⌘ K

Adaface Sample Computer Networks Questions

Here are some sample Computer Networks questions from our premium questions library (10273 non-googleable questions).

Skills

Others

Embedded Systems Agile/Scrum Cyber Security SAP ABAP SAP HANA SAP Fiori SAP GRC SAP QM SAP SuccessFactors Salesforce Developer Salesforce Administrator Boomi Dynamics 365 SCM Dynamics 365 Finance Dynamics 365 Customer Service Dynamics 365 Sales Dynamics 365 Customer Voice Dynamics 365 Commerce Dynamics AX Spark Adobe InDesign Oracle Hyperion Planning Customer Support ITIL Blue Prism SAS SCCM SSAS SSIS SSRS Citrix Google AdWords Weblogic Talend UML Human Resource Management Talent Acquisition Power Apps RPA CISCO CISCO DCIM French Apache NiFi Apache Pig TIBCO Spotfire TIBCO Business Studio TIBCO Administration TIBCO ActiveMatrix BPM TIBCO Hawk TIBCO Apache Tomcat Oracle Hyperion Financial Management Oracle Fusion Oracle AIA Oracle APEX Oracle BPM Oracle Apps Oracle Financial Apps Oracle OAF Oracle SOA SAP Hybris SAP BusinessObjects SAP BI SAP PowerDesigner SAP PowerBuilder SAP Leonardo SAP MDM SAP MDG SAP BW SAP SRM SAP UI5 SAP MM SAP HCM SAP BTP (SCP) SAP PI SAP PP SAP Basis SAP SD SAP WM SAP PS SAP BODS SAP DBM SAP Litmos SAP FI Loadrunner WPF WebFOCUS Ranorex Informatica Data Quality GDPR RabbitMQ Gradle Grunt EJB SnapLogic SharePoint Progress (OpenEdge) Informatica B2B Data Exchange Informatica MDM Joomla Ionic Liferay Sqoop Computer Literacy Communication Skills Technical Support Ecommerce Analytics Software Support Growth Marketing Marketing Analysis Digital Marketing Product Marketing SEO Outreach Market Research Jira German Italian Spanish Grammar & Vocabulary Listening Comprehension Reading Comprehension Sentence Structure
🧐 Question

Medium

Mac address and IP on router hop
Routers
Switches
Solve
Refer to the following exhibit:
 image
Host A is sending a packet to Host B. 
            
            1. What is the source and destination MAC address at point PA?
            2. What is the source and destination IP address at point PB?
// Option A
            PA: source MAC - Mac-A
            PA: destination MAC - Mac-B
            PB: source IP - 192.168.1.1
            PB: destination IP - 192.168.3.1
            
            // Option B
            PA: source MAC - Mac-A
            PA: destination MAC - Mac-RA
            PB: source IP - 192.168.3.3
            PB: destination IP - 192.168.3.1
            
            // Option C
            PA: source MAC - Mac-A
            PA: destination MAC - Mac-B
            PB: source IP - 192.168.3.3
            PB: destination IP - 192.168.3.1
            
            // Option D
            PA: source MAC - Mac-A
            PA: destination MAC - Mac-RA
            PB: source IP - 192.168.1.1
            PB: destination IP - 192.168.3.1

Easy

MX Record, DMARC and Email Authentication
DNS
MX Records
DMARC
SPF
DKIM
Solve
You work as a network administrator for a company, "example.com", that recently started experiencing issues with email spoofing. To mitigate the problem, you decide to implement DMARC (Domain-based Message Authentication, Reporting & Conformance) in addition to existing SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) records.
            
            Your current DNS records for example.com include the following:
            
            - MX 10 mail.example.com (IP address 203.0.113.10)
            - TXT "v=spf1 ip4:203.0.113.10 -all"
            - TXT "v=DKIM1; k=rsa; p=public-key-here"
            
            You add the following DMARC record:
            
            - TXT "_dmarc.example.com" "v=DMARC1; p=quarantine; pct=100; rua=mailto:[email protected]"
            
            After implementing the DMARC record, an external mail server sends an email to your domain. The email passes the SPF and DKIM checks but fails the DMARC check.
            
            What will likely happen to the email?
A: The email will be accepted and delivered to the recipient's inbox.
            B: The email will be rejected and returned to the sender as undeliverable.
            C: The email might be delivered to the recipient's spam or junk folder.
            D: The email will be accepted, but a report will be sent to the sender.
            E: The email will be silently discarded, and the sender will not be notified.

Medium

Remote network resources
Gateway
Routing protocols
Solve
Review the following exhibit:
 image
Angelina noticed that the computers on 192.168.10.0/24 network can ping their default gateway. But they found that these computers cannot connect to any remote network resources. Which of the following is the most likely reason for this?

Medium

SSL Certificate Expiry
SSL/TLS
Network Security
Solve
You are a network administrator for an e-commerce company. The company's online store allows customers to browse products and make purchases securely over the internet. The online store uses SSL/TLS for secure communication. You receive reports that some customers are seeing a security warning in their web browsers when trying to access the online store. Upon investigation, you discover the following information:
            
            - The SSL certificate used by the online store's web server is valid for one year and is due to expire in two days.
            - The web server is configured to automatically redirect HTTP traffic to HTTPS.
            - The SSL certificate was issued by a trusted certificate authority (CA), and all major web browsers have the CA's root certificate in their trusted certificate stores.
            - The SSL certificate includes the correct domain name for the online store.
            
            Given the above information, which of the following steps should be taken to resolve the issue and prevent customers from seeing the security warning?
A: Extend the validity of the current SSL certificate by one year.
            B: Obtain a new SSL certificate from the same CA and install it on the web server before the current certificate expires.
            C: Remove the automatic redirect from HTTP to HTTPS on the web server.
            D: Ask customers to ignore the security warning and proceed to the online store.
            E: Replace the SSL certificate with a self-signed certificate.
🧐 Question🔧 Skill

Medium

Mac address and IP on router hop
Routers
Switches

2 mins

Computer Networks
Solve

Easy

MX Record, DMARC and Email Authentication
DNS
MX Records
DMARC
SPF
DKIM

2 mins

Computer Networks
Solve

Medium

Remote network resources
Gateway
Routing protocols

3 mins

Computer Networks
Solve

Medium

SSL Certificate Expiry
SSL/TLS
Network Security

2 mins

Computer Networks
Solve
🧐 Question🔧 Skill💪 Difficulty⌛ Time
Mac address and IP on router hop
Routers
Switches
Computer Networks
Medium2 mins
Solve
MX Record, DMARC and Email Authentication
DNS
MX Records
DMARC
SPF
DKIM
Computer Networks
Easy2 mins
Solve
Remote network resources
Gateway
Routing protocols
Computer Networks
Medium3 mins
Solve
SSL Certificate Expiry
SSL/TLS
Network Security
Computer Networks
Medium2 mins
Solve

Trusted by recruitment teams in enterprises globally

Amazon Morgan Stanley Vodafone United Nations HCL PayPal Bosch WeWork Optimum Solutions Deloitte Microsoft NCS Doubtnut Sokrati J&T Express Capegemini

We evaluated several of their competitors and found Adaface to be the most compelling. Great library of questions that are designed to test for fit rather than memorization of algorithms.


Swayam Narain, CTO, Affable

hashtag image heart icon Swayam
customers across world
Join 1200+ companies in 75+ countries.
Prøv det mest kandidatvenlige færdighedsvurderingsværktøj i dag.
g2 badges
Ready to streamline your recruitment efforts with Adaface?
Ready to streamline your recruitment efforts with Adaface?
logo
40 min tests.
No trick questions.
Accurate shortlisting.
ada
Ada
● Online
Previous
Score: NA
Next
✖️