CNIT 106 5

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following approaches to wireless LAN security requires users to authenticate against an authentication server's database? A. WPA B. WEP C. WPA2 D. WPA Enterprise

D. WPA Enterprise

What is the name of the mechanism used by TCP to increase and decrease the number of segments that are sent between each other before an acknowledgment is required? A. Buffering B. Synchronizing C. Scaling D. Windowing

D. Windowing

Which of the following commands displays Layer 2 addresses that correspond to Layer 3 addresses? A. nbstat B. ipconfig C. netstat D. arp

D. arp

What is the following OSI Layer function? Transport Layer

Disassembles and reassembles segments

Describe the following TCP utility. netstat

Displays a list of a computers active incoming and outgoing connections

Describe the following TCP utility. getmac

Displays the NIC's MAC address

Describe the following TCP utility. ifconfig

Displays the hosts IP addressing information

A converged network is a network that has the capabilities of transporting multiple types of traffic such as voice, video, and data, which can offer significant cost savings to organizations. True or False

True

Broadband bandwidth usage divides the bandwidth into channels for use with multiple communications streams. True or False

True

Switching is associated with Layer 2 and Layer 3. True or False

True

The actual traffic flow determines the logical topology, while how components are physically interconnected determines the physical topology. True or False

True

T or f - switching is associated with layer 2 and layer 3

False (just the network layer)

What is the following OSI Layer function? Network Layer

Finds best possible route

Describe the following OSI layer. Datalink Layer

Packages bits of data from the physical layer into frames, transfers them from one computer to another, and receives acknowledgement from the addressed computer

What is the administrative distance for an internal EIGRP route? a. 1 b. 90 c. 110 d. 170

90

Describe the following protocol. RDP (Remote Desktop Protocol) TCP Port 3389

A Microsoft protocol that allows a user to view and control the desktop of a remote computer

Which of the following statements are true regarding VLANs? (Choose two.) a. A VLAN is a single Layer 2 broadcast domain. b. For traffic to pass between two VLANs, that traffic must be routed by a Layer 3 device. c. Because of a switch's MAC address table, traffic does not need to be routed in order to pass between two VLANs. d. A VLAN is a single collision domain.

A VLAN is a single Layer 2 broadcast domain. AND For traffic to pass between two VLANs, that traffic must be routed by a Layer 3 device.

Describe the following OSI layer. Application

Allows programs on a network node access network services, such as file transfers, electronic mail, and database access.

Describe the following TCP utility. telnet

Allows you to communicate with another computer on the network remotely

Which of the following is a common Layer 2 protocol that could not run over a dedicated leased line? A. transmission control protocol B. point-to-point protocol C. internetwork packet exchange protocol D. routing information protocol

B. point-to-point protocol

____ is intended to eliminate single points of failure. A. availability B. redundancy C. contingency D. integrity

B. redundancy

Transport layer protocols break large data units into ____. A. PDUs B. segments C. frames D. block IDs

B. segments

Which of the following are distance vector routing protocol features that can prevent routing loops? A. reverse path forwarding (RPF check) B. split horizon C. loopback /prevent loop D. rendezvous point

B. split horizon

What are the two methods used to prevent loops in a distance vector routing protocol? A. split horizon and hold down timer B. split horizon and poison reverse C. poison reverse and hop count D. split horizon and hop count

B. split horizon and poison reverse

How is a switch selected as a root bridge for spanning tree if the bridge priorities are the same? A. switch with the lowest IP address becomes the root bridge B. switch with the lowest MAC address becomes the root bridge C. switch with highest MAC address becomes the root bridge D. switch with the highest IP address becomes the root bridge

B. switch with the lowest MAC address becomes the root bridge

What is a common reason for disabling SSID broadcast in a wireless LAN? A. to use IP v6 subnetting B. to better conceal the SSID C. to allow the use of multiple access points in a single WLAN D. to be compatible with E1 standards

B. to better conceal the SSID

Many PDUs include a characteristic closing component called a ____ that provides data integrity checks for the data portion of the PDU, known as the payload. A. well-known protocol B. trailer C. network service D. host

B. trailer

Which of the following is an exterior gateway protocol? a. BGP b. RIP c. OSPF d. EIGRP

BGP

Which of the following routing protocols is an EGP? a. BGP b. IS-IS c. RIP d. OSPF

BGP

Which of the following are dynamic approaches to assigning routable IP addresses to networked devices? (Choose two.) a. BOOTP b. APIPA c. Zeroconf d. DHCP

BOOTP And DHCP

What factors are used to calculate the OSPF cost? a. Bandwidth, delay b. Bandwidth c. Delay d. Bandwidth, MTU

Bandwidth

What factors are used in the calculation of the default EIGRP metric? A) Delay B) Bandwidth C) Bandwidth, delay D) Bandwidth, MTU

Bandwidth, delay

____ are the distinct units of data that are exchanged between nodes on a network. A. segments B. data packets C. topologies D. protocols

B. data packets

What term is used to describe a loss of signal power? A. impedance B. db loss C. amplitude modulation D. capacitance

B. db loss

The port on a segment that is closest to the root of a switch is known as _________ A. root ports B. designated ports C. non-designated ports D. inactive ports

B. designated ports

____ ARP table entries are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table. A. static B. dynamic C. temporary D. on-demand

B. dynamic

You are troubleshooting an issue where a PC cannot reach a web server on the Internet. From the PC you can ping the IP address of devices on your local subnet. You cannot ping the DNS name off the web server. However, you have previously noted the IP address of the web server's IP address, and you notice that you can ping the IP address of the web server. Of the following potential troubleshooting issues, what is most likely causing the problem? A. incorrect DNS configuration on the PC B. incorrect gateway configuration on the PC C. incorrect subnet mask on the PC D. incorrect or missing routes in a router's routing table

B. incorrect gateway configuration on the PC

Which of the following is a Windows command that can be used to release and renew a DHCP lease on a PC? A. netstat B. ipconfig C. nbtstat D. arp

B. ipconfig

Which of the following security attacks occurs when an attacker causes traffic flowing between two devices on a network to flow through the attacker's device? A. packet sniffing attack B. man-in-the-middle attack C. reverse arp attack D. syn attack

B. man-in-the-middle attack

Which of the following is a common wireless network troubleshooting issue? A. looping data between MAC addresses B. multiple paths of propagation C. crosstalk D. faulty cabling

B. multiple paths of propagation

Which IEEE standard defines wired Ethernet as it is used on modern networks? A. 802.5 B. 802.16 C. 802.3 D. 802.1

C. 802.3

Network

Packets & messages. IP addresses. Handles routing of data across network segments.

What is the following OSI Layer function? Physical Layer

Passes data on to media

Describe the following protocol. NetBIOS (Network Basic Input/Output System) TCP Port 139, UDP Port 137, 138

Provides network communication services for LANs that use NetBIOS

Which of the following is a distance-vector routing protocol with a maximum usable hop count of 15? a. BGP b. IS-IS c. RIP d. OSPF

RIP

Which of the following is a link-state routing protocol that uses a metric of hops? a. IS-IS b. OSPF c. EIGRP d. RIP

RIP

What is the following OSI Layer function? Presentation Layer

Reformats, encrypts/decodes, compresses/decompresses

Describe the following protocol. DNS (Domain Name System) TCP and UDP Port 53

Resolves domain names to corresponding IP addresses

What does the Internet layer do?

Responsible for logical addressing and routing

What does the Transport layer do?

Responsible for preparing data to be transported across the network

Describe the following protocol. HTTP (Hypertext Transfer Protocol) TCP Port 80

Retrieves content from a web server

Describe the following protocol. IMAP (Internet Message Access Protocol) TCP Port 143

Retrieves e-mail from an e-mail server

Describe the following protocol. POP3 (Post Office Protocol Version 3) TCP Port 110

Retrieves e-mail from an e-mail server

Describe the following protocol. IMAP4 (Internet Message Access Protocol Version 4) TCP Port 143

Retrieves e-mail from e-mail server

DHCP discover, DHCP offer, DHCP request, DHCPACK

What are the steps a DHCP client goes through when requesting an IP address? Make sure these are in correct order -

Poison reverse and split horizon

What are the two methods used to prevent loops in a distance vector routing protocol? Poison reverse and split horizon, Poison reverse and hop count, Slept horizon and hop count

Everything is on the same IP subnet

What is One downside to a virtual switch? Everything is on the same IP subnet, Not enough switch ports Too many collision domains Too many broadcast domains

a virtualized server running on one physical device that could be running any iOS

What is a virtual server? A physical server running any iOS, a virtualized server running on one physical device that could be running any iOS, A Microsoft server A Linux server

IEEE 802.3af

What is the IEEE standard for PoE? IEEE 802. ___ what?

185

What is the actual distance of 10base 2? 185 10 200 2

A router forwards traffic based on IP addresses and a switch directs traffic to the correct port

What is the difference between a router and a switch

ARP resolves the IP address of a host to its MAC address

What is the purpose of ARP? ARP resolves the IP address of a host to its MAC address, ARP resolves an IP addy to a Hostname, ARP locates the default gateway of the network, ARP resolves the MAC address to a NetBIOS name

It carries voice and data

What is the purpose of RTP in VoIP? It connects the VoIP phone to an analog phone, It works with a PBX, IT MANAGES THE DATA PLAN, IT CARRIES VOICE AND DATA

It sets up the VoIP phone calls,

What is the purpose of SIP in VoIP? It works with a PBX, It connects the VoIP phone to an analog phone, It sets up the VoIP phone calls, It carries voice and data

To convert natural language to the IP address

What is the purpose of a DNS server?

Providing an IP address for a fully qualified domain name

What is the purpose of a DNS server? Providing an IP address for a fully qualified domain name Routing packets to the Internet Blocking packets to the Internet Connecting devices at layer 2 of the OSI

Route packets to a different subnet

What is the purpose of a default gateway? Route packets to a different subnet, Route packets to the same subnet, black packets, forward frames

List the features of the following OSI Layer. Transport Layer

Windowing TCP/UDP Buffering

Your company has been assigned the 192.168.30.0/24 network for use at one of its sites. You need to use a subnet mask that will accommodate seven subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask should you use? a. /24 b. /26 c. /27 d. /28

/27

What is the prefix notation for a subnet mask of 255.255.255.240? a. /20 b. /24 c. /28 d. /29

/28

You have a subnet mask of 255.255.255.248. What is the prefix notation? a. /29 b. /28 c. /27 d. /26

/29

What is the administrative distance of a directly connected network? a. 0 b. 90 c. 110 d. 170

0

What is the network address and subnet mask of a default route? a. 255.255.255.255/32 b. 0.0.0.0/32 c. 255.255.255.255/0 d. 0.0.0.0/0

0.0.0.0/0

What is the binary version of the decimal number 49? a. 10110001 b. 00110001 c. 00110010 d. 00111010

00110001

What is the binary representation of the decimal number 117? a. 10110101 b. 01110101 c. 10110110 d. 01101001

01110101

How many bits per octet in an IPv4 address? a. 2 b. 4 c. 6 d. 8

8

Describe the following protocol. rsh (Remote Shell) TCP Port 514

Allows commands to be executed on a computer from a remote user

How many bits are used for an IPv6 address? a. 256 b. 128 c. 64 d. 32

128

What is the result of the binary conversion in the example shown here? 128 64 32 16 8 4 2 1 1 0 0 0 0 0 0 0 a. 128 b. 256 c. 32 d. 127

128

How many hosts can you have with a subnet of 192.168.1.0/28? a. 30 b. 14 c. 16 d. 6

14

What is the result of the binary conversion in the example shown here? 128 64 32 16 8 4 2 1 1 0 0 1 0 1 1 0 a. 105 b. 256 c. 128 d. 150

150

How many subnets do you get with a subnet of 192.168.1.0/28? a. 12 b. 13 c. 16 d. 20

16

What is the hop count that is used by RIP to indicate an unreachable metric? a. 16 b. 0 c. 15 d. 255

16

What is the network address for APIPA? a. 169.254.0.0/16 b. 172.16.0.0/16 c. 192.168.0.0/24 d. 10.0.0.0/8

169.254.0.0/16

A client with an IP address of 172.16.18.5/18 belongs to what network? a. 172.16.0.0/18 b. 172.16.64.0/18 c. 172.16.96.0/18 d. 172.16.128.0/18

172.16.0.0/18

The binary number 10110100 has what decimal equivalent? a. 114 b. 190 c. 172 d. 180

180

Which option is NOT a valid representation of the 2001:0000:35d0:0000:5600:abed:e930:0001 address? a. 2001:0000:35d0::5600:abed:e930:0001 b. 2001::35d0:0:56:abed:e930:0001 c. 2001:0:35d0:0:5600:abed:e930:1 d. 2001::35d0:0:5600:abed:e930:1

2001::35d0:0:56:abed:e930:0001

How can the following IPv6 address be condensed? 2009:0123:4040:0000:0000:000:000A:100B a. 2009::123:404:A:100B b. 2009::123:404:A:1B c. 2009:123:4040::A:100B d. 2009:0123:4040::0::000A:100B

2009:123:4040::A:100B

You have an IP address with a prefix notation of /27. What is the dotted-decimal form of the subnet mask? a. 255.255.255.0 b. 255.255.255.128 c. 255.255.255.192 d. 255.255.255.224

255.255.255.224

How many assignable IP addresses exist in the 172.16.1.10/27 network? a. 30 b. 32 c. 14 d. 64

30

How many bits are in an IPv4 address? a. 32 b. 64 c. 128 d. 256

32

How many octets are in an IPv4 address? a. 2 b. 4 c. 6 d. 8

4

WAN link

A ___ is The link that interconnects networks Media Server WAN link

True

A converged network is a network that has the capability of transferring multiple types of traffic such as voice data video, and can offer significant cost savings to organizations. True or false?

What metric is used by OSPF routing protocol? A. load B. cost C. hop count D. return on investment

B. cost

VLAN virtual local area network

A more Efficient design which involves the logical separation of a switch port into different broadcast domains is known as a Subnet, (VLAN) Virtual local area network, Collision domain, LAN

A converged network

A network that transports multiple types of traffic. Ex - voice, video, and data

Describe the following protocol. SNMP Trap (Simple Network Management Protocol Trap) TCP and UDP Port 162

A notification sent from an SNMP agent to an SNMP manager

True

A service-level agreement (SLA), which specifies performance metrics, (for example, available bandwidth and maximum delay) guaranteed for a certain percentage of time. True or false?

Client

A workstation, laptop, smart phone with wireless capabilities, or a variety of other in user terminal devices. Hub Client Server

Which of the following user authentication technologies uses digital certificates? A. PKI B. RAS C. MS-CHAP D. 802.1X

A. PKI

A common Layer 2 protocol used on dedicated leased lines is _____________? A. PPP B. CHAP C. TCP-IP D. IPSEC

A. PPP

What is the administrative distance of a directly connected network? A. 0 B. 90 C.110 D. 170

A. 0

The average geographic range for an 802.11a antenna is ____ meters. A. 20 meters B. 100 meters C. 330 meters D. 600 meters

A. 20 meters

What is the common TCP port used by HTTP? A. 80 B. 443 C. 123 D. 110

A. 80

Which of the following is an Exterior Gateway Protocol? A. BGP B. RIP C. OSPF D. EIGRP

A. BGP

Which of the following routing protocols is an EGP? A. BGP B. IS-IS C. RIP D. OSPF

A. BGP

Which of the following is a VPN protocol that lacks native security features? A. PPTP B. TLS C. SSL D. Clear Text Protocol

A. PPTP

Which of the following statements is true? (Choose two) A. Client/server networks can easily scale, which might require the purchase of additional client licenses. B. Client/server networks can cost more than peer-to-peer networks. For example, client/server networks might require the purchase of dedicated server hardware and a network OS with an appropriate number of licenses. C. Peer-to-peer networks can be very difficult to install. D. Peer-to-peer networks typically cost more than client/server networks because there is no requirement for dedicated server resources or advanced NOS software.

A. Client/server networks can easily scale, which might require the purchase of additional client licenses. B. Client/server networks can cost more than peer-to-peer networks. For example, client/server networks might require the purchase of dedicated server hardware and a network OS with an appropriate number of licenses.

A DHCP reservation involves the exchange of four messages between a DHCP client and a DHCP server. What is the first of these messages? A. DHCPDISCOVER B. DHCPACK C. DHCPREQUEST D. DHCPOFFER

A. DHCPDISCOVER

It is the job of the ____ to enable reliable transmission of data through the Physical layer at the sending end, and to check such reliability upon reception at the receiving end. A. Data Link B. Physical Layer C. Network Layer D. Transport Layer

A. Data Link

An FDDI network uses which type of topology? A. Dual ring B. Ring C. Star D. Bus

A. Dual ring

Which of the following protocols is used for transferring files with a remote host in a non-secure fashion? A. FTP B. SSH C. SFTP D. SCP

A. FTP

Which of the following security attacks leverages the PORT command? A. FTP bounce attack B. smurf attack C. DoS attack D. DDoS attack

A. FTP bounce attack

Which of the following topologies offers the highest level of redundancy? A. Full mesh B. Hub and spoke C. Bus D. Partial mesh

A. Full mesh

Which of the following protocols is used to retrieve email from an email server? A. IMAP4 B. NNTP C. SMTP D. MAILX

A. IMAP4

Which of the following is an advantage of fiber-optic cable? A. Immunity from electromagnetic interference B. prevent network problems C. use in dial-up analog modem D. protect networks from hackers

A. Immunity from electromagnetic interference

Which Data Link sublayer manages flow control? A. LLC B. MAC C. Management Layer D. Addressing Layer

A. LLC

Which of the following is a sublayer of the Data Link Layer of the OSI Model? A. LLC B. LEC C. ACK D. VPN layer

A. LLC

On which OSI layer is encryption performed? A. Layer 6 B. Layer 5 C. Layer 7 D. Layer 4

A. Layer 6

Identify two advantages of a hub and spoke WAN topology as compared to a full mesh WAN topology. A. Lower cost B. Optimal routes C. More scalable D. More redundancy

A. Lower cost C. More scalable

What is the name of the address that is used by a switch to identify specific devices? A. MAC B. IP C. LLC D. ARP

A. MAC

Which of the following is used by IEEE 802.11n to achieve high throughput through the use of multiple antennas for transmission and reception? A. MIMO B. DSSS C. FHSS D. LACP

A. MIMO

Which type of fiber optic connector contains two fiber strands in a single connector? A. MTRJ B. ST C. SC D. LC

A. MTRJ

Which of the following WAN technology types provides the FASTEST speeds? A. OC3 B. SDSL C. ADSL D. T3

A. OC3

Which of the following is a multicast routing protocol? A. PIM B. IGMP C. IS-IS D. OSPF

A. PIM

____ is the process of reconstructing segmented data. A. Reassembly B. Reengineering C. Resegmenting D. Realigning

A. Reassembly

What variation of network address translation allows you to statically configure the inside global address assigned to a specific device inside your network? A. SNAT B. DNAT C. PAT D. Both DNAT and PAT

A. SNAT

Identify the SNMP component that is a piece of software which runs on a managed device? A. SNMP trap B. SNMP agent C. MIB D. SNMP manager

A. SNMP trap

The ____ is where ongoing communications between a sender and a receiver, somewhat like a telephone conversation, are set up, maintained, and then terminated, or torn down, as needed. A. Session Layer B. Physical Layer C. Network Layer D. Presentation Layer

A. Session Layer

In the modern LAN, what type of device is typically used at the center of a star topology? A. Switch B. Hub C. Router D. Firewall

A. Switch

What device is a Layer 2 device that uses MAC address learning to intelligently forward traffic? A. Switch B. Hub C. Router D. WAN link

A. Switch

What device is know for a large number of interfaces and its ability to create separate collision domains for each end device? A. Switch B. Hub C. Router D. WAN link

A. Switch

Which of the following requires two types of authentication (but no more) from a user seeking admission to a network? A. TFA B. EAP C. SSO D. multifactor authentication

A. TFA

Which of the following transport layer protocols of the OSI reference model is a connection oriented protocol that provides reliable transport between two communicating hosts? A. Transmission Control Protocol (TCP) B. Transport Control Protocol (TCP) C. User Datagram Protocol (UDP) D. Internetwork Packet Exchange (IPX)

A. Transmission Control Protocol (TCP)

Which of the following is a common wireless security standard? A. WPA B. WAP C. WUP D. CHAP

A. WPA

Which of the following statements is true regarding VLANs? A. a VLAN is a single broadcast domain B. for traffic to pass between two VLANS, the traffic must be layer 7 traffic C. because of a switches MAC address table, traffic does not need to be routed in order to pass between two VLANs D. a VLAN is a single collision domain

A. a VLAN is a single broadcast domain

In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range. A. active B. passive C. fixed D. open

A. active

An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived. A. bit B. byte C. flag D. field

A. bit

Which of the following are dynamic approaches to assigning routable IP addresses to a networked device? A. boot P B. APIPA C. zeroconf D. dynamic MAC

A. boot P

____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel. A. channel bonding B. channel aggregation C. packet bonding D. data bonding

A. channel bonding

On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time. A. collision domain B. domain network C. interference domain D. duplicate domain

A. collision domain

Random Early Detection (RED) is an example of which of the following QOS functions? A. congestion avoidance B. marking C. classification D. congestion management

A. congestion avoidance

Which of the following conditions would most likely result in corrupted data? A. exceeding the distance limitation of a cable B. a short in a cable C. an open in a cable D. a VLAN mismatch

A. exceeding the distance limitation of a cable

In wireless communication, to exchange information, two antennas must be tuned to the same ____. A. frequency B. variance C. attenuation D. port

A. frequency

You are troubleshooting an issue where a PC can reach some hosts on the Internet while several other hosts on the Internet are not reachable. From the PC you can Ping all devices on your local subnet. What is most likely causing the problem? A. incorrect or missing routes in a routers routing table B. incorrect DNS configuration on the PC C. duplicate IP addresses D. incorrect gateway configuration on the PC

A. incorrect or missing routes in a routers routing table

What name is given to a VLAN on an IEEE 802.1 Q trunk whose frames are not tagged? A. native VLAN B. default VLAN C. management VLAN D. VLAN

A. native VLAN

What type of network allows interconnected devices to share their resources with one another but would have issues regarding scalability? A. peer-to-peer B. client-server C. hub and spoke D. MPLS

A. peer-to-peer

In which OSI model layer do hubs operate? A. physical B. network C. data link D. physical data link

A. physical

Which of the following is a WLAN authentication method? A. pre-shared key B. RC 24 bit initialization vector C. Advanced Encryption Standard D. triple key ack

A. pre-shared key

Which of the following can often be categorized as an encryption device (in other words it is capable of participating in an encrypted session)? A. router B. smart-jack C. demarc D. repeater

A. router

____ routing is a technique in which a network administrator programs a router to use specific paths between nodes. A. static B. dynamic C. best path D. link state

A. static

What is the name of the location within a building where network cables terminate? A. wiring closet B. access point C. multi-station access unit D. central office

A. wiring closet

Match the type of NAT on the left with the correct definition on the right. (A) NAT IP Address Definition (B) Inside local (C) Inside global (D) Outside local (1) Outside global A public IP address referencing an outside device (2) A public IP address referencing an inside device (3) A private IP address referencing an outside device (4) A private IP address referencing an inside device a. A1 B2 C3 D4 b. A4 B2 C3 D1 c. A3 B2 C4 D1 d. A2 B1 C4 D3

A4 B2 C3 D1

What protocol is used to request a MAC address that corresponds to a known IPv4 address on the local network? a. IGMP b. TTL c. ICMP d. ARP

ARP

What is the purpose of ARP? a. ARP resolves the MAC address to a NetBIOS name. b. ARP resolves an IP address to a hostname. c. ARP locates the default gateway of the network. d. ARP resolves the IP address of a Host to its MAC address.

ARP resolves the IP address of a Host to its MAC address.

Describe the following OSI layer. Network Layer

Addresses data messages, translates logical addresses into actual physical addresses, and routes data to addresses on the network

What routing protocol characteristic indicates the believability of the routing protocol (as opposed to other routing protocols)? a. Weight b. Metric c. Administrative distance d. SPF algorithm

Administrative distance

Hub

An older technology that interconnect network components such as clients and servers. It has a variable number of available Ports. Switch Hub Router

False

An omnidirectional antenna radiates power at relatively unequal power levels in all directions somewhat similar to the theoretical isotopic antenna. True or false?

Which of the following is an advantage of a peer-to-peer network, as compared with a client/server network? A. More scalable B. Less expensive C. Better performance D. Simplified administration

B. Less expensive

Which of the following are sublayers of the Data Link Layer of the OSI Model? A. PPP B. MAC C. LLC D. LAPD

B. MAC C. LLC

While an IPsec tunnel is being established, which type of session is initially formed to protect the exchange of parameters used to form the IPsec session? A. perfect forward secrecy (PFS) B. Internet security association and key management protocol C. Diffie-Helman D. Security Association

B. Internet security association and key management protocol

(True or False) The routes on R1 and R2 are directly connected routes.

Answer: TRUE Explanation: Because interfaces are physically attached to each network, they are directly connected.

What are the layers of the TCP/IP stack?

Application, transport, Internet, network interface

True

At the upper layer of the OSI MODEL, bits are grouped together into PDU's or data service units. True or false?

The IP address range of 172.16.0.0 - 172.31.255.255 is what address class? a. A b. B c. C d. D

B

An Ethernet workgroup switch resides at which layer of the OSI Model? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4

B. Layer 2

How many WAN links are required to create a full mesh of connections between five remote sites? A. 5 B. 10 C. 15 D. 20

B. 10

What percentage of WLAN overlapping coverage should there be between cells to avoid dropping connections? A. 5-10% B. 10-15% C. 15-20% D. 20-25%

B. 10-15%

Which of the following allows the LONGEST distance using single-mode fiber? A. 10GBaseSR B. 10GBaseER C. 10GBaseSW D. 10GBaseLW

B. 10GBaseER

You are configuring a wireless LAN with 3 wireless access points having overlapping coverage areas. The wireless access points are using 2.4 GHz frequency band, and are located in the United States. What three non-overlapping channels in the 2.4 GHz band should you select? A. 128,64,32 B. 11,6,1 C. 1.2, 2.4, 4.8 D. 2.6,2.4,2.2

B. 11,6,1

What is the distance limitation of 10GBase-sw? A. 10 km B. 300 m C. 25 km D. 40 km

B. 300 m

What is the maximum range of the IEEE 802.11b wireless standard? A. 20m indoors / 100 m outdoors B. 32 m indoors / 140 m outdoors C. 35 m indoors / 120 m outdoors D. 70 m indoors / 150 m outdoors

B. 32 m indoors / 140 m outdoors

Direct sequence spread spectrum (DSSS) is a wireless transmission method? Which of the follow WLAN standards supports DSSS? A. 802.11a B. 802.11b C. 802.11n D. chip protocol

B. 802.11b

Which of the following approaches to wireless LAN security involves the use of an authentication server? A. pre-shared key B. 802.1x C. MAC address filtering D. disabling SSID broadcast

B. 802.1x

Which IEEE standard describes Ethernet? A. 802.1 B. 802.3 C. 802.5 D. 802.11

B. 802.3

What is the IEEE standard for link aggregation? A. 802.1Q B. 802.3ad C. 802.1d D. 802.3af

B. 802.3ad

What is the IEEE standard for the version of Power over Ethernet that offers a maximum of 15.4 watts of power to an attached device? A. 802.3at B. 802.3af C. 802.1d D. 802.1q

B. 802.3af

What is the administrative distance for an internal EIGRP route? A. 1 B. 90 C. 110 D. 170

B. 90

Match the Type of NAT on the left with the correct definition on the right? A Inside local 1 Public IP address referencing an outside device B Inside global 2 Public IP address referencing an inside device C Outside local 3 Private IP address referencing an outside device D Outside global 4 Private IP address referencing an inside device A. A1, B2, C3, D4 B. A4, B2, C3, D1 C. A3, B2, C4, D1 D. A2, B1, C4, D3

B. A4, B2, C3, D1

If an IP address range is 172.16.0.0 to 172.31.255.255 what is the address class? A. A B. B C. C D. D

B. B

Subnetting extends a classful subnet mask of an IP network to create additional subnets. However, what IP addressing approach removes bits from a classful subnet mask to summarize multiple classful networks? A. anycast B. CIDR C. EUI-64 D. APIPA

B. CIDR

What class of IP address is 172.0.0.2? A. Class A B. Class B C. loopcheck D. Class D

B. Class B

A toner probe is also known as what? A. TDR B. Fox and hound C. Tip and ring D. OTDR

B. Fox and hound

What WAN topology uses the formula n(n - 1)/2 to calculate the number of links required? A. Ring B. Full mesh C. Partial mesh D. Hub and spoke

B. Full mesh

What device operates at Layer 1 of the OSI model? A. Switch B. Hub C. Router D. WAN link

B. Hub

How does a switch prevent loops? A. IEEE 802.1Q B. IEEE 802.1D C. IEEE 802.11 D. IEEE 802.3

B. IEEE 802.1D

What is the name of the address that is used by a router to identify specific devices? A. MAC B. IP C. LLC D. ARP

B. IP

In the absence of STP what issues might result from a Layer 2 loop in a network? A. a router interface's MTU decrementing B. MAC address table corruption C. DHCP broadcasts D. packet fragmentation

B. MAC address table corruption

A dedicated network device that acts as an IDS sensor is called a _________ ? A. HIDS B. NIDS C. NIPS D. HIPS

B. NIDS

What protocol is used to synchronize a network device's clock with a time server? A. NNTP B. NTP C. RTSP D. LDAP

B. NTP

Which of the following is a link-state routing protocol that uses a metric of cost? A. IS-IS B. OSPF C. EIGRP D. RIP

B. OSPF

A network administrator can use which of the following to locate a break in a fiber optic cable? A. environmental monitor B. OTDR C. mulitmeter D. TDR

B. OTDR

Which layer of the OSI Model is concerned with how bits are represented on the medium? A. Presentation B. Physical C. Data Link D. Network

B. Physical

Which of the following remote access security technologies is a UDP based protocol used to communicate with a AAA server and does not encrypt an entire authentication packet, but only encrypts the password? A. Kerberos B. RADIUS C. TACACS+ D. CHAP

B. RADIUS

Which of the following standards specifies a type of coaxial cable commonly used by local cable companies to connect individual homes to the cable company's distribution network? A. RG 59 B. RG 6 C. MMF D. RG 58

B. RG 6

What topology was used in an early Lan technology that used the passing of a token to transmit? A. Star B. Ring C. Dual Ring D. Bus

B. Ring

Identify the SNMP component that is also known as an NMS? A. SNMP agent B. SNMP manager C. SNMP trap D. MIB

B. SNMP manager

A technician is troubleshooting a UTP cable that has been suspected of having problems due to EMI. Which of the following cables should the technician use without adding new equipment to the network? A. Singlemode fiber B. STP C. Plenum D. Multimode fiber

B. STP

Which of the following technologies is used by an application service provider to give subscribers access to application software? A. PaaS B. SaaS C. NaaS D. HaaS

B. SaaS

Which list of PDU names is in the correct OSI order starting with Layer 4? A. Bits, Packets, Datagrams, Frames B. Segments, Datagrams. Frames, Bits C. Datagrams, Frames, Bits, Segments D. Frames, Bits, Segments, Packets

B. Segments, Datagrams. Frames, Bits

Which of the following security attacks uses ICMP traffic, directed to a subnet, to flood target system with ping replies? A. DoS attack B. Smurf attack C. DDoS attack D. FTP bounce attack

B. Smurf attack

What is the most popular topology that is used on modern LANs? A. Bus B. Star C. Ring D. Partial mesh

B. Star

A network administrator can use which of the following to locate a break in copper cable? A. environmental monitor B. TDR C. multimeter D. volt meter

B. TDR

Which of the following VPN tunneling protocols can be used to provide security for HTTPS? A. CHAP B. TLS C. L2TP D. PPTP

B. TLS

Which type of protocol is useful when data must be transferred quickly? A. connection oriented B. connectionless C. TCP D. IP

B. connectionless

____ is more efficient than TCP for carrying messages that fit within one data packet. A. IP B. UDP C. ICMP D. IGMP

B. UDP

Which of the following approaches to wireless LAN security uses RC4 encryption algorithm? A. WPA2 B. WEP C. WPA D. WPA Enterprise

B. WEP

Which of the following is not a network category based on the geographic dispersion of network components? A. Local-area network B. World-area network C. Campus-area network D. Metropolitan-area network E. Personal-area network

B. World-area network

What is a DHCP reservation? A. a DHCP reservation is a temporary assignment of IP address information to a DHCP client B. a DHCP reservation is a static mapping of an IP address to a specific MAC address C. a DHCP reservation is a pool of IP addresses used by a DHCP server to assign IP addresses to DHCP clients D. a DHCP reservation is an IP address parameter that a DHCP server assigns a DHCP client

B. a DHCP reservation is a static mapping of an IP address to a specific MAC address

Which of the following is a way a route can be injected into a router's IP routing table? A. a route that is mirrored by a SAN B. a route that is dynamically learned C. a route that is interpolated from existing routes D. a route that is provided by the DNS routing service

B. a route that is dynamically learned

RSVP is _________ A. a protocol for recreating packets B. a way to reserve space on the server C. a hard QoS makes strict bandwidth reservations D. easily scalable for system changes

B. a way to reserve space on the server

Which of the following statements are true of an Ethernet hub? A. all connections need to be full-duplex B. all connections need to be half-duplex C. Appletalk needs to run on all attached devices D. attached devices do not need to run CSMA/CD

B. all connections need to be half-duplex

What is the purpose of the trunk in the diagram? A. limiting collision domains B. allowing VLAN traffic C. allowing subnet traffic D. forwarding packets

B. allowing VLAN traffic

RADIUS and TACACS belong to a category of protocols known as AAA (____). A. access, authorization, and accounting B. authentication, authorization, and accounting C. authentication, authorization, and authority D. authentication, authorization, and access

B. authentication, authorization, and accounting

Which of the following reflects the media type, bandwidth capacity, and distance limitation combination of 10base2 Ethernet? A. Cat 5 UTP / 100 Mbps / 100 m B. coax / 10 Mbps / 185 m C. coax / 10 Mbps / 500 m D. Cat 3 UTP / 10 Mbps / 100 m

B. coax / 10 Mbps / 185 m

A ____ occurs when two transmissions interfere with each other. A. jam B. collision C. carrier sense D. multiple access

B. collision

Physical layer

Binary or bits represent data. Concerned with physical and electrical network issues.

Which data flow is NOT supported by IPv6? a. Broadcast b. Anycast c. Unicast d. Multicast

Broadcast

Which of the following is a type of coaxial cable? A. 10 base T B. 100 base FX C. 10 base 5 D. 1000 base FX

C. 10 base 5

What is the maximum range of the IEEE 802.11a wireless standard? A. 20m indoors / 100 m outdoors B. 32 m indoors / 140 m outdoors C. 35 m indoors / 120 m outdoors D. 70 m indoors / 150 m outdoors

C. 35 m indoors / 120 m outdoors

The data rate for T3 link is ______? A. 45.736 Mbps, 51.84 Mbps B. 44.736 Mbps, 52.84 Mbps C. 44.736 Mbps D. 40 Mbps, 50 Mbps

C. 44.736 Mbps

What is the common TCP port used by HTTPS? A. 80 B. 110 C. 443 D. 128

C. 443

The IEEE 802.11a wireless standard has which of the following frequency band / maximum bandwidth parameters? A. 5 GHz / 11 Mbps B. 2.4 GHz / 11 Mbps C. 5 GHz / 54 Mbps D. 2.4 GHz / 54 Mbps

C. 5 GHz / 54 Mbps

What is a native VLAN? A. A native VLAN is the VLAN used to identify the virtual port created by an EtherChannel B. A native VLAN is an out of band management VLAN C. A native VLAN is the VLAN on an IEEE 802.1Q trunk that does not have any tag bytes added D. A native VLAN is the VLAN on an IEEE802.1Q trunk that has tag bytes added to each frame

C. A native VLAN is the VLAN on an IEEE 802.1Q trunk that does not have any tag bytes added

Match the link speeds on the left with the correct STP port cost on the right Link Speed STP Port Cost A 10 Mbps Ethernet 1 2 B 100 Mbps Fast Ethernet 2 19 C 1 Gbps Gigabit Ethernet 3 100 D 10 Gbps Ten Gig Ethernet 4 4 A. A1, B2, C3, D4 B. A2, B3, C4, D1 C. A3, B2, C4, D1 D. A3, B4, C1, D2

C. A3, B2, C4, D1

Which type of transmission synchronization technique uses start and stop bits at the beginning and end of a data frame? A. Synchronous B. Isochronous C. Asynchronous D. Biochronous

C. Asyncronous

The term packet is used fairly generically to refer to protocol data unit. There are PDU equivalent names in the different OSI layers. What is the name of the unit in the physical layer of the OSI reference model? A. Segment B. Frames C. Bits D. Packet

C. Bits

Which of the following is an open standard variant of HSRP? A. LFI B. DSCP C. CARP D. cRTP

C. CARP

What media type is 1000 Base - T A. Cat 3 B. Cat 5 C. Cat 5e D. 10 base 2

C. Cat 5e

Which device makes traffic forwarding decisions based on MAC addresses? A. Hub B. Router C. Switch D. Multiplexer

C. Switch

A firewall might use what configuration option to prevent users on the Internet from initiating sessions with devices inside a corporate network, while still allowing users on the Internet to initiate sessions with publically available corporate servers? A. packet filtering B. NAT C. DMZ D. stateful inspection

C. DMZ

While an IPsec tunnel is being established which of the following securely establishes a shared secret key over the unsecured medium? A. Internet security association and key management protocol B. perfect forward secrecy C. Diffie-Helman D. security association

C. Diffie-Helman

Which of the following is a layer 3 redundancy mechanism? A. LFI B. Address routing protocol (ARP) C. HSRP D. DSCP

C. HSRP

Which list of protocols and standards is in the correct OSI order starting with the highest layer? A. DHCP, SSL, ICMP, UDP B. DNS, PPTP, ARP, 802.11 C. HTTP, SSL, CSMA/CD, 802.3 D. SNMP, TLS, L2TP, ARP

C. HTTP, SSL, CSMA/CD, 802.3

What Layer 4 protocol is used by the ping command? A. IGMP B. UTP C. ICMP D. RTP

C. ICMP

Which of the following best defines and IDS sensor? A. IDS sensor secures communication between two sites over an untrusted network B. IDS sensor defines a set of rules dictating which types of traffic are permitted or denied as that traffic enters or exits a firewall interface C. IDS sensor receives a copy of traffic being analyzed, can recognize the signature of well-known attack, and respond appropriately D. IDS sensor sits in-line with traffic being analyzed, can recognize the signature of a well-known attack, and respond appropriately

C. IDS sensor receives a copy of traffic being analyzed, can recognize the signature of well-known attack, and respond appropriately

Internet Protocol resides at what layer of the OSI Model? (all that apply) A. Layer 4 B. Transport C. Layer 3 D Network

C. Layer 3 D Network

You are designing a network and need to interconnect two Ethernet switches. Cost is the primary design consideration? The link speed you need is 10 Gbps and the switches are separated by a distance of 70 m. You decide to use 10GBASE-SR. What media type should you select? A. Cat 5 UTP B. SMF C. MMF D. Cat 6 UTP

C. MMF

What layer of the OSI model is concerned with logical addressing? A. Transport B. Data Link C. Network D. Layer 2

C. Network

Which of the following layers of the OSI reference model is primarily concerned with fowarding data based on logical addresses? A. Physical layer B. Data link layer C. Network layer D. Presentation layer

C. Network layer

A network formed by interconnecting a PC to a digital camera via a USB cable is considered what type of network? A. WAN B. CAN C. PAN D. MAN

C. PAN

Which PPP authentication method provides one-way authentication and sends credentials in clear trust? A. WEP B. MS-CHAP C. PAP D. CHAP

C. PAP

What topology aims to balance redundancy with easier management and cost effectiveness? A. Ring B. Full mesh C. Partial mesh D. Dual ring

C. Partial mesh

Which type of network is based on network clients sharing resources with one another? A. Client/server B. Client-peer C. Peer-to-peer D. Peer-to-server

C. Peer-to-peer

Which of the following protocols is used for transferring files with a remote host in a non-secure fashion and without requiring credentials? A. SFTP B. SSH C. TFTP D. SCP

C. TFTP

Which of the following protocols is used for transferring files with a remote host in a non-secure fashion and without requiring user credentials? A. SFTP B. SSH C. TFTP D. SCP

C. TFTP

What Ethernet switch feature allows a PC running packet capture software and connected to one switch port to receive a copy of traffic seen on another switch port? A. STP B. IEEE 802.1X C. port mirroring D. EtherChannel

C. port mirroring

What is the purpose of a default gateway? A. block packets B. forward packets C. route packets to a remote subnet or to the Internet D. route packets to the same subnet

C. route packets to a remote subnet or to the Internet

Which of the following tools best helps you determine which wires on a punch down block connect to a specific users office? A. loop back plug B. punch down tool C. toner probe D. protocol analyzer

C. toner probe

Which of the following remote access technologies is a protocol that allows a user to view and control the desktop of a remote computer? A. PPP B. RAS C. RDP D. ICA

C. RDP

Identify the congestion avoidance mechanism from the following list of QOS tools. A. LLQ B. RSVP C. RED D. cRTP

C. RED

What device is a Layer 3 device that is used to make forwarding decisions based on a Layer 3 address? A. Switch B. Hub C. Router D. WAN link

C. Router

____ are distinct networks of storage devices that communicate directly with each other and with other networks. A. NAS B. RAID C. SANs D. Optical media

C. SANs

Which of the following media types supports the longest transmission distance? A. Cat 6 UTP B. MMF C. SMF D. Cat 5 UTP

C. SMF

Which options are a benefit of implementing a client/server arrangement over a peer to peer arrangment? A. Easy installation B. Cheaper C. Simplified administration D. Easy scalability

C. Simplified administration D. Easy scalability

Which of the following LAN topologies requires the most cabling? A. Bus B. Ring C. Star D. WLAN

C. Star

Which of the following physical LAN topologies requires the most cabling? A. Bus B. Ring C. Star D. WLAN

C. Star

Which of the following is a connectionless transport layer protocol? A. IP B. TCP C. UDP D. H.323

C. UDP

Why might a network using DHCP for IP address assignment need a DHCP relay agent? A. the DHCP server is not configured to assign a default gateway to DHCP clients B. you are load balancing between two DHCP servers C. a router resides between a DHCP client and a DHCP server D. you have configured a static reservation

C. a router resides between a DHCP client and a DHCP server

What is the purpose of introducing NAT in a network design? A. block hackers on the internet B. route packets to the internet C. allows private IP address (RFC 1918) to be translated into Internet routable IP addresses (public IP addresses) D. translate public addresses to private addresses

C. allows private IP address (RFC 1918) to be translated into Internet routable IP addresses (public IP addresses)

Which OSI model layer initiates the flow of information? A. MAC Layer B. LLC C. application D. Layer 5

C. application

Which list of the TCP/IP stack is in the correct OSI order starting with Layer 4? A. application, internet, transport, network interface B. internet, application, transport, network interface C. application, transport, internet, network interface D. internet, transport, application, network interface

C. application, transport, internet, network interface

There are four states that a port goes through when transitioning to the forwarding state. What is the correct order? A. blocking, learning, listening, forwarding B. learning, listening, blocking, forwarding C. blocking, listening, learning, forwarding D. listening, blocking, learning, forwarding

C. blocking, listening, learning, forwarding

Which of the following reflect the media type, bandwidth capacity, and distance limitation combination of 10Base5 Ethernet? A. Cat 3 UTP/10 Mbps/100 m B. coax/10 Mbps/185 m C. coax/10 Mbps/ 500 m D. Cat 5 UTP / 100 Mbps /100 m

C. coax/10 Mbps/ 500 m

Which of the following is the point in a telephone network where the maintenance responsibility passes from a telephony company to a subscriber? A. NT1 B. tip and ring C. demarc D. smart jack

C. demarc

In ____, a wireless signal splits into secondary waves when it encounters an obstruction. A. reflection B. scattering C. diffraction D. bounceback

C. diffraction

____ is an 802.11n network feature allowing the combination of multiple frames into one larger frame. A. channel bonding B. channel aggregation C. frame aggregation D. frame bonding

C. frame aggregation

____ are combinations of networking hardware and software that connect two dissimilar kinds of networks. A. routers B. switches C. gateways D. broadcast domains

C. gateways

Which of the following is a common OSI Layer 3 troubleshooting issue? A. looping data between MAC addresses B. distance limitations exceeded C. incorrect subnet mask D. crosstalk

C. incorrect subnet mask

An Ethernet switch resides at which layer of the OSI model? A. layer 1 B. layer 4 C. layer 2 D. layer 3

C. layer 2

The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____. A. demarcation point B. NIU (Network Interface Unit) C. local loop D. central office

C. local loop

Identify the quality of service function that alters bits in a frame, cell, or packet? A. congestion avoidance B. classification C. marking D. congestion management

C. marking

What type of antenna radiates power at relatively equal power levels in all directions? A. Yagi antenna B. unidirectional antenna C. omnidirectional antenna D. sector antenna

C. omnidirectional antenna

Identify the QOS mechanism that can set bandwidth limit on traffic and drop packets attempting to exceed that bandwidth limit? A. Link fragmentation and interleaving B. cRTP C. policing D. traffic shaping

C. policing

32

How many bits are in an IPv4 address? 256, 128, 32, 64

A more efficient design which involves the logical separation of switch ports into different broadcast domains is known as __________ A. subnet B. collision domain C. virtual local area network D. LAN

C. virtual local area network

What virtual network device allows Microsoft Active Directory (AD) services, Unix based web services and DNS services to be co-resident on the same network device? A. SOHO server B. virtual switch C. virtual server D. Storage Area Network

C. virtual server

What is the class of IP address 10.1.2.3/24? a. Class A b. Class B c. Class C d. Class D

Class A

Describe the following TCP utility. mtr

Combines the functionality of ping and traceroute

Describe the following protocol. RTSP (Real Time Streaming Protocol) TCP and UDP Port 554

Communicates with a media server and controls the playback of the servers media files

If multiple wireless access points exist in a wireless LAN, what percentage of coverage overlap should the access points have? A. 20-30% B. approximately 50% C. 0 percent D. 10-15%

D. 10-15%

What is the distance limitation of 10GBASE-LW? A. 40 km B. 328ft C. 25km D. 10km

D. 10km

What is the maximum recommended one-way delay for voice traffic? A. 25ms B. 75ms C. 125ms D. 150ms

D. 150ms

What is the bandwidth of a E1 circuit? A. 1000 mbps B. 1.54 mbps C. 2.4 mbps D. 2.048 mbps

D. 2.048 mbps

The IEEE 802.11n wireless standard has which of the following frequency band / maximum bandwidth parameters? A. 2.4 GHz / 54 Mbps B. 2.4 GHz / 11 Mbps C. 5 GHz / 54 Mbps D. 2.4 GHz or 5 GHz / > 300 Mbps

D. 2.4 GHz or 5 GHz / > 300 Mbps

What is the common TCP port used by SMTP? A. 21 B. 22 C. 23 D. 25

D. 25

Which IEEE standard describes specifications for wireless transmissions? A. 802.1 B. 802.3 C. 802.5 D. 802.11

D. 802.11

Which of the following remote access security technologies a is a client server authentication protocol and uses a the concept of a trusted third party that hands out tickets that are used instead of user name and password? A. CHAP B. RADIUS C. TACACS+ D. Kerberos

D. Kerberos

8

How many bits per octet in an IPv4 address? 6, 2, 8, 4

What is the purpose of ARP? A. ARP resolves the MAC address to a NetBios name B. ARP resolves an IP address to a Hostname C. ARP locates the default gateway of the network D. ARP resolves the IP address of a Host to its MAC address

D. ARP resolves the IP address of a Host to its MAC address

Which of the following is NOT an example of wireless media? A. cellular phone B. wimax C. HSPA+ D. DSL

D. DSL

A router has learned a network via three different routing protocols: OSPF, EIGRP, and RIP. Which route will the router believe and place into the router's IP routing table? A. a route entry from each routing protocol will be injected into the router's IP routing table, and the router will load-balance across the three routes B. RIP C. OSPF D. EIGRP

D. EIGRP

What kind of network is used by many cable companies to service their cable modems, and contains both fiber-optic and coaxial cabling? A. head-end B. DOCSIS C. composite D. HFC

D. HFC

What WAN topology enables you to minimize WAN expenses by not directly connecting any two remote locations? A. Ring B. Full mesh C. Partial mesh D. Hub and spoke

D. Hub and spoke

What topology features a central location that connects to each remote connection but does not feature connections between those remote locations directly? A. Ring B. Full mesh C. Dual ring D. Hub and spoke

D. Hub and spoke

Which statement accurately describes the OSI model? A. It describes how software programs interact with humans. B. It prescribes the type of hardware or software that should support each layer. C. It describes how software programs interact with other software programs. D. It describes a theoretical representation of what happens between two nodes communicating on a network.

D. It describes a theoretical representation of what happens between two nodes communicating on a network.

Which of the following is a primary benefit of a proxy server, assuming the proxy server is only performing proxy services? A. It reduces bandwidth demand on an IP WAN B. It allows a server farm to scale C. It allows traffic to travel securely over an untrusted network such as the Internet D. It hides inside addresses from the public internet

D. It hides inside addresses from the public internet

Which of the following approaches to wire LAN security restricts access to a WLAN based on a computer's wireless interface card? A. disabling SSID broadcast B. TCP filtering C. pre-shared key D. MAC address filtering

D. MAC address filtering

A company has various locations in a city interconnected using Metro Ethernet connections. This is an example of what type of network? A. WAN B. CAN C. PAN D. MAN

D. MAN

Which of the following DNS record types is used for an email server? A. mail.txt B. cname C. PTR D. MX

D. MX

A bluetooth connection between a mobile phone and a headset is an example of what type of network category? A. CAN B. LAN C. MAN D. PAN

D. PAN

In which OSI model layer(s) do NICs operate? A. Physical B. Network and Physical C. Data Link D. Physical and Data Link

D. Physical and Data Link

The IEEE standard 802.3af states the specifications for which of the following? A. Quality of Service B. VLANs C. Routing tables D. Power over Ethernet

D. Power over Ethernet

The ____ manages the way data is presented to the network (on its way down the protocol stack), and to a specific machine/application combination (on its way up the protocol stack). A. Session Layer B. Physical Layer C. Network Layer D. Presentation Layer

D. Presentation Layer

What is the measure of a wireless signals strength? A. AP B. RFI C. latency D. RSSI

D. RSSI

Which of the following is a voice over IP signaling protocol used to setup, maintain, and tear down VOIP calls? A. SNMP B. RTP C. IGMP D. SIP

D. SIP

Which of the following is not a characteristic of the Media Access Control sublayer of the data link layer of the OSI reference layered model? A. The MAC sublayer uses a physical address called a MAC address, which is a 48-bit address assigned to a device network interface card. B. Layer 2 devices view a network as a logical topology. C. Method of transmitting on the media. D. The use of flow control on a network to prevent a receiver from being overwhelmed.

D. The use of flow control on a network to prevent a receiver from being overwhelmed.

Which of the following network appliances performs the most processor intensive tasks? A. load balancer B. content filter C. proxy server D. VPN concentrator

D. VPN concentrator

Which Ethernet switch feature allows you to create a VLAN on one switch and have that VLAN be automatically created on other switches? A. v-mirroring B. port mirroring C. POE D. VTP

D. VTP

4

How many bytes in an IEEE 802.1Q VLAN tag? 2 4 8 6

If a packet cannot be forwarded by a router due to the packets size exceeding the interface's maximum transmission unit, the router attempts to fragment the packet, unless the packet's header has the don't fragment bit set. If the DF bit is set, the router usually drops the packet and sends an ICMP message back to the sender, to let the sender know that the packet was dropped. If a router does not send such a notification, what is the router called? A. next-hop router B. next adjacent router C. area border router D. black hole router

D. black hole router

Which of the following attacks occurs when an attacker exploits a known vulnerability in an application that allow that application to write to an area of memory? A. packet sniffing attack B. man-in-the-middle attack C. spoofing D. buffer overflow attack

D. buffer overflow attack

Which of the following pieces of equipment can be used to determine the supported frequency range of a cable? A. crimper B. butt set C. cable tester D. cable certifier

D. cable certifier

Which of the following is most likely to cause EMI? A. the MDIX feature B. an open in a cable C. a short in cable D. cable placement

D. cable placement

What is the root domain in the FQDN, http://test.pearsoncertification.com? A. test B. http C. pearsoncertification D. com

D. com

____ management refers to the detection and signaling of device, link, or component faults. A. performance B. fault C. network D. configuration

D. configuration

A router primarily makes its forwarding decisions based on what address? A. destination MAC address B. source IP address C. source MAC D. destination IP address

D. destination IP address

Which of the following commands is primarily used to resolve FQDN to an IP address and lacks an interactivity mode? A. man B. nslookup C. ifconfig D. dig

D. dig

Which list of OSI model functions is in the correct OSI order starting with the highest layer? A. tearing down a session, physical addressing, switching, synchronizing bits B. service advertisement, route discovery, buffering, switching C. application services, synchronizing transmissions, windowing, switching D. encryption, setting up a session, buffering, logical addressing

D. encryption, setting up a session, buffering, logical addressing

Which of the following is a telephony solution that is typically based on a traditional privately owned telephone system? A. PBX-VPN call mux B. VOIP C. IP telephony D. hosted PBX

D. hosted PBX

When following a structured troubleshooting methodology, what should you do if you test a hypothesis, and the hypothesis is determined to be invalid? A. redefine the problem B. create an action plan that does not involve the failed hypothesis C. notify management and escalate the problem D. hypothesize another probable cause of the issue

D. hypothesize another probable cause of the issue

A building might have multiple patch panels. These common locations where cables from nearby office home back to, are often called what? A. central offices B. multi-station access units C. access points D. intermediate distribution frames

D. intermediate distribution frames

In which OSI model layer does IP operate? A. layer 6 B. layer 5 C. layer 4 D. layer 3

D. layer 3

____ is an automatic distribution of traffic over multiple links or processors to optimize response. A. redundancy B. failover C. RAID D. load balancing

D. load balancing

Combining the various sources of outgoing data into a single output data stream is called ____. A. segmentation B. Reassembly C. Resegmenting D. multiplexing

D. multiplexing

An Extended Service Set __________ A. is used in SOHO Applications B. provides protection from electromagnetic interference C. operates in ad-hoc fashion D. must be configured to prevent overlapping channels

D. must be configured to prevent overlapping channels

Which of the following commands is primarily used to resolve a FQDN to an IP address and can operate in an interactive mode? A. man B. dig C. ifconfig D. nslookup

D. nslookup

Which of the following are characteristics of RADIUS? A. TCP based B. encrypts both request and the ack C. encrypts an entire authentication packet D. only encrypts the password in an authentication packet

D. only encrypts the password in an authentication packet

Which is NOT a primary feature offered by Link Control Protocol? A. looped link detection B. error detection C. authentication D. packet detection

D. packet detection

The ____ is a fixed number associated with a device's NIC. A. LLC address B. framer address C. logical address D. physical address

D. physical address

Which of the following IDS detection methods needs a very specific declaration of a security policy? A. statistical anomaly detection B. signature based detection C. non-statistical anomaly detection D. policy based detection

D. policy based detection

Which OSI model layer manages data encryption? A. physical B. session C. application D. presentation

D. presentation

In a ____ cable, the usual wire positions are exactly reversed in one of the two RJ-45 terminations. A. crossover B. cross-through C. straight-through D. rollover

D. rollover

The process of determining the best path from Point A on one network to Point B on another is known as ____. A. mapping B. enhancing C. reconfiguring D. routing

D. routing

Which of the following MS Windows log files would report failed login attempts? A. system B. application C. syslog D. security

D. security

MPLS inserts a 32 bit header between Layer 2 and Layer 3 headers. Because this header is _________ between the Layer 2 and Layer 3 headers, it is sometimes referred to as a _________ header A. inserted, insert B. added, addon C. inserted, proxy D. shimmed, shim

D. shimmed, shim

You have an Ethernet switch with port 1 assigned to VLAN A and port 2 assigned to VLAN B. How can traffic from a device connected to port 1 be forwarded to port 2? A. an etherchannel must be configured which creates a logical path B. since both ports share the same Ethernet switch backplane, they can communicate with one another without any further configuration C. spanning tree protocol should be configured D. traffic must be routed to flow between VLANS

D. traffic must be routed to flow between VLANS

____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment. A. traffic monitoring B. traffic routing C. traffic polling D. traffic shaping

D. traffic shaping

Which IP addresses assignment method leads to less administrative efforts for Information Technology professionals? a. Statically b. Manually c. BOOTP d. DHCP

DHCP

What NAT variation automatically assigns an inside global address from a pool of available addresses? a. SNAT b. DNAT c. PAT d. GNAT

DNAT

Presentation

Data formatting & encryption. ASCII, JPG, PNG, etc. convert data in the way we are able to see it (abc's).

Which mode of PIM uses a source distribution tree? a. Sparse mode b. Dense mode c. Broadcast mode d. Source mode

Dense mode

If a PC on an Ethernet network attempts to communicate with a host on a different subnet, what destination IP address and destination MAC address will be placed in the packet/frame header sent by the PC? a. Dest. IP: IP address of default gateway. Dest. MAC: MAC address of default gateway. b. Dest. IP: IP address of remote host. Dest. MAC: MAC address of default gateway. c. Dest. IP: IP address of remote host. Dest. MAC: MAC address of remote host. d. Dest. IP: IP address of remote host. Dest. MAC: MAC address of local PC.

Dest. IP: IP address of remote host. Dest. MAC: MAC address of default gateway.

Describe the following OSI layer. Transport Layer

Divides long communications into smalled data packages, handles error recognition and correction, and acknowledges the correct receipt of data.

What symbol can be used to represent a group of consecutive 0s in an IPv6 address? a. Semicolon b. Double semicolon c. Double colon d. Period

Double colon

Describe the following protocol. DHCP (Dynamic Host Configuration Protocol) UDP Port 67, 68

Dynamically assigns IP address information to a network device

List the features of the following OSI Layer. Presentation Layer

Encryption Data formatting

What is the following OSI Layer function? Data Link Layer

Error correction

Session

Establishes a session between devices on the network. A phone call or sending something to the printer.

Describe the following OSI layer. Session Layer

Establishes and controls data communication between applications operating on two computers

What format can be used to represent the low order 64 bits of an IPv6 address by reformatting a devices MAC address? a. EUI-48 b. IEEE 802.3ar c. IEEE 802.3ab d. EUI-64

Extended Unique Identifier (EUI-64)

Describe the following protocol. H.323 TCP Port 1720

H.323 is a signaling protocol used to provide multimedia communications over a network

What ports are associated with the following? Http, SMTP simple mail transfer protocol, DNS, telnet, SSH, FTP.

HTTP is 80. FTP is 20 and 21. SSH (secure shell) is 22. Telnet is 23. SMTP is 25. DNS is 53.

Application

HTTP, FTP, SMTP. Serves as a window for the users

Power over Ethernet uses an Ethernet switch to provide power to a device. It is used because of its scalability and flexibility; devices can be installed where they are most needed

How does POE work and why do we use it

10 mbps

How fast is standard Ethernet? 1 gbps, 10 gbps, 10mbps, 100 mbps

4

How many octets are in an IPv4 address? 6 2 8 4

What multicast protocol is used between clients and routers to let routers know which of their interfaces are connected to a multicast receiver? a. IGMP b. PIM-DM c. PIM-SM d. SPT switchover

IGMP

Mirroring

In order to have active monitoring and see all traffic on the network, which of the following needs to be configured? Root bridge STP mirroring Listening

What NAT IP address is a public IP address that maps to an inside device? a. Inside local b. Inside global c. Outside local d. Outside global

Inside local

Switch

It Interconnects network components, and it has a variety of port Destinies. It does not simply take traffic in on one port and blast that traffic out on all other ports, rather, it learns which devices reside off of which ports. Router Switch Hub

Which message type was added with IGMP Version 2? a. Join b. Prune c. Combine d. Leave

Leave

List the features of the following OSI Layer. Network Layer

Logical addressing Switching Route discovery and selection Connection services Bandwidth usage Multiplexing Strategy

What is the following OSI Layer function? Session Layer

Makes connection at both ends

Which of the following layers of the OSI reference model are primarily concerned with forwarding data based on logical addresses?

Network layer

Describe the following protocol. LDAP (Lightweight Directory Access Protocol) TCP Port 389

Provides directory services to network clients

At the moment, PC1 cannot reach the Internet. You add a static default route to R1 that sends all traffic to an unknown destination out S1/1. Can a user on PC1 access the Internet? a. Yes, PC1 has Internet access. b. No, packets will not make it past R1. c. No, packets can make it to the Internet, but they will never make it back to PC1. d. No, packets will stop at R2.

No, packets can make it to the Internet, but they will never make it back to PC1.

For static NAT to work, how many inside global addresses are needed for inside local addresses? a. One inside global addresses for unlimited inside local addresses b. Two inside global addresses for every inside local address c. Ten inside global addresses for unlimited inside local addresses d. One inside global address for every inside local address

One inside global address for every inside local address

R1 is using both NAT and PAT. What is the purpose of the port numbers in the translation table? a. Basic NAT uses the port numbers to track separate communication flows. b. PAT uses the port numbers to track separate communication flows. c. The port numbers are not used. d. PAT only uses the destination port to track separate communication flows.

PAT uses the port numbers to track separate communication flows.

Which of the following is a multicast routing protocol? a. PIM b. IGMP c. IS-IS d. OSPF

PIM

What is the difference between a logical and physical topology?

Physical is wiring, how it is physically connected to one another. Logical is how data gets around the network

Please do not throw sausage pizza away & some people fear birthdays

Physical, data link, network,transport, session presentation, application. Segments, packets, frames and bits.

John is interested in changing the form of text for ASCII to extended binary code decimal interchange code. His manager requested that all sensitive and confidential info on the sever should be protected by applying the appropriate ENCRYPTION. what OSI model layer is responsible for a data format such as encryption?

Presentation layer

Subnetting

Protected segments of a network used for specific purposes.

Describe the following protocol. SFTP (Secure File Transfer Protocol) TCP Port 22

Provides FTP file transfer service over a SSH connection

Describe the following protocol. SCP (Secure Copy) TCP Port 22

Provides a secure file transfer service over a SSH connection and offers a files original date and time information, which is not available with FTP

What does the Application layer do?

Provides access to network resources

Both PC1 and Server 1 have a default gateway. What is the purpose of a default gateway? a. Block packets b. Forward frames c. Route packets to a different subnet d. Route packets to the same subnet

Route packets to a different subnet

Which feature was added with IGMPv3 that allowed a client to specify the joining of a group and a specific source server? a. SSM b. SRM c. SME d. SMJ

SSM

What are sections A and B of the IP address? a. Section A are used bits, and Section B are unused bits. b. Section A is the network portion, and Section B is the host portion. c. Section A equals 8 bits, and Section B equals 0 bits. d. Section A equals 255, and Section B are all 0s.

Section A is the network portion, and Section B is the host portion.

Describe the following protocol. SSH (Secure Shell) TCP Port 22

Securely connect to a remote host (Typically via a terminal emulator)

Transport

Segments. Transport protocols, TCP. Buffering. Ensures that messages are delivered error free and received in sequence.

List the features of the following OSI Layer. Application Layer

Service advertisement Application Services

Which mode of PIM uses a rendezvous point (RP)? a. Broadcast mode b. Dense mode c. Sparse mode d. Source mode

Sparse mode

Which of the following are distance-vector routing protocol features that can prevent routing loops? (Choose two.) a. Reverse path forwarding (RPF) check b. Split horizon c. Poison reverse d. Rendezvous point

Split horizon AND Poison reverse

What are the two methods used to prevent loops in a distance vector routing protocol? a. Split horizon and hold-down timer b. Split horizon and poison reverse c. Poison reverse and hop count d. Split horizon and hop count

Split horizon and poison reverse

Describe the following protocol. NNTP (Network News Transport Protocol) TCP Port 119

Supports the posting and reading of articles on Usenet news servers

Describe the following protocol. SNTP (Simple Network Time Protocol) UDP Port 123

Supports time synchronization among network devices, similar to Network Time Protocol, although SNTP uses a less complex algorith in its calculation and is slighty less accurate than NTP

List the features of the following OSI Layer. Physical Layer

Synchronizing bits How bits are represented on the medium Wiring standards for connectors and jacks Physical topology Bandwidth usage Multiplexing strategy

List the features of the following OSI Layer. Data Link Layer

Synchronizing transmissions Physical addressing Logical topology Method of transmitting on the media Connection services

Which of the following transport layer protocols of the OSI model is a connection oriented protocol that provides reliable transport to two communicating hosts

TCP (transport control protocol)

What is the following OSI Layer function? Application Layer

Talks to application software

List the features of the following OSI Layer. Session Layer

Tearing down a session Setting up a session Maintaining a session

A trunk

This allows traffic for multiple VLANs to travel over a single connection

Name a few protocols that correspond to the following TCP/IP architecture. Application layer

The Application layer provides access to network resources. It defines the rules, commands, and procedures that client software uses to talk to a service running on a server. It makes use of the following protocols: HTTP FTP Telnet SMTP POP3 IMAP4

Name a few protocols that correspond to the following TCP/IP architecture. Internet layer

The Internet layer is responsible for logical addressing and routing. It makes use of the following protocols: RIP OSPF IGMP ICMP

Name a few protocols that correspond to the following TCP/IP architecture. Network Access layer

The Network Access layer consists of the network card driver and the circuitry on the network card itself. It makes use of only the following protocol: ARP

Name a few protocols that correspond to the following TCP/IP architecture. Transport layer

The Transport layer is responsible for preparing data to be transported across the network. This layer breaks large messages into smaller packets of information and tracks whether they arrived at their destination. It makes use of the following protocols: TCP UDP

Media

This device can be copper or fiber optic cable. Router Media WAN Link

Designated port

The port on a segment that is closest to the root of a switch is known as Root ports Designated port Inactive ports Non-designated ports

blocking, listening, learning, forwarding

There are four states that a port goes through when transitioning to the forwarding state. What is the correct order? Listening, learning, forwarding, blocking (put in order)

Router

This is a device which makes it forwarding decisions based on logical network addresses. Switch Router Hub

Quality of service (QOS)

This is a suite of technologies that allows you to strategically optimize network performance for select traffic types

Enabling SSID broadcast (you want to disable, not enable

To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following instead: Enabling SSID broadcast IEEE 802.1X MAC address filtering Pre shared key

Describe the following protocol. FTP (File Transfer Protocol) TCP Port 20 and 21

Transfers files with a remote host (Typically requires authentication of user credentials)

Describe the following protocol. TFTP (Trivial File Transfer Protocol) UDP Port 69

Transfers files with a remote host (doesnt require authentication of user credentials)

Describe the following OSI layer. Presentation Layer

Translates application layer data to an intermediate form that provides security, encyption, and compression for the data

What does the Network Access layer?

Translates the logical network address into physical machine address.

Describe the following OSI layer. Physical Layer

Transmits bit from one computer to another and regulates the transmission over a medium

(True or False) A router can support more than one routing protocol through the process of route redistribution.

True

(True or False) IPv6 no longer supports the ability to fragment packets.

True

Describe the following protocol. MGCP (Media Gateway Control Protocol) UDP Port 2427, 2727

Used as a call control and communication protocol for Voice over IP networks

Describe the following protocol. NTP (Network Time Protocol) UDP Port 123

Used by a network device to synchronize its clock with a time server

Describe the following protocol. RTP (Real-time Transport Protocol) TCP and UDP Port 5004, 5005

Used for delivering media-based data over networks, such as Voice over IP

Describe the following protocol. SMTP (Simple Mail Transfer Protocol) TCP Port 25

Used for sending e-mail

Describe the following protocol. Telnet TCP Port 23

Used to connect to a remote host (Typically via a teminal emulator)

Describe the following protocol. SIP (Session Initiation Protocol) TCP Port 5061, UDP Port 5060

Used to create and end sessions for one or more media connections, including Voice over IP calls

Describe the following protocol. SNMP (Simple Network Management Protocol) UDP Port 161

Used to monitor and manage network devices

Describe the following protocol. HTTPS (Hypertext Transfer Protocol Secure) TCP Port 443

Used to securely retrieve content from a web sever

Describe the following protocol. SMB (Server Message Block) TCP Port 445

Used to share files, printers, and other network resources

IBSS, BSS, ESS

WLANs can be categorized based on their use of wireless APs. The three main categories are ____, ____, and ____. IBSS, BSS, RSS IBSS, BSS, ESS HBSS, BSS, ESS

Receive clients request, and forward them onto the Internet

What is the purpose of a proxy server? Receive clients requests and forward them onto the Internet Route packets to the Internet Block requests from the Internet Provide an IP address to a FQDN

To give users access to their data from any device or location

What is the purpose of a virtual desktop? To save money, To store users info in a data center, Better authentication and security, To give users access to their data from any device or location

Network

What layer is switching associated with?

Cat 5e

What media type is 100BASE-T? Cat 3, Cat 5, A10 base 2, Cat 5e

Spread

When a wireless channel uses more than one frequency the transmission method called _____ spectrum. Spread Long Multi Broad

Packet detection

Which is not a primary feature offered by link control protocol (LCP)? Authentication, Looped link dedication, Packet detection, Error detection

immunity from electromagnetic interference, high bandwidth capacity

Which of th following is an advantage of fiber-optic cable? (CHOOSE 2) Using dial-up analog modem, prevent network problems, high band with capacity, protect networks from hackers, immunity from electromagnetic interference

PPP Point to point protocol

Which of the following is a common layer to protocol that could run over a dedicated leaseline? Internetwork packet exchange/sequenced packet exchange (IPX/SPX), Routing information protocol (RIP), Point to point protocol, Transmission Control Protocol

DSSS, OFDM, FHSS

Which of the following is a variation of spread spectrum technology use in Wireless Local Area Networks? (CHOOSE 3) Wifi Direct sequence spread spectrum (DSSS) Orthogonal frequency division multiplexing (OFDM) Frequency hopping spread spectrum (FHSS) WPA - 2 WEP

WAP

Which of the following is not a WLAN security standard? WPA WAP WEP WPA2

World area network

Which of the following is not a network category based on the geographical dispersion of network components? Campus area network (CAN) Local area network (LAN) Personal area network (PAN) World Area network (WAN) Metropolitan area network (MAN)

DFSS

Which of the following is not a variation of spread-spectrum technology? OFDM, FHSS, DSSS, DFSS

Presentation

Which of the following layers is not part of the TCP/IP protocol stack? Internet access layer Transport Presentation Application

A broadcast storm is when a broadcast is received by a switch and the switch floods its ports with the broadcast. Clients receive endless copies of the broadcast which consumes resources

Why are broadcast storms detrimental?

WAN

Wide area network. State, country or global. Fiber wired.

True

Worldwide interoperability for microwave access (WiMAX) provides wireless broadband access to fixed locations ( as an alternative to technologies such as DSL) and mobile devices. True or false?

Server

___ serves up resources to a network. Router Server Switch

What is a virtual server? a. A virtualized server running on one physical device. It could be running any OS. b. A Microsoft Server c. A physical server running any OS d. A Linux Server

a. A virtualized server running on one physical device. It could be running any OS.

The term packet is used fairly generically to refer to protocol data unit (PDU). However, PDU might have additional names based on their OSI layer. What is the name of the PDU in the physical layer of the OSI reference Model? a. Bits b. Segment c. Packet d. Frames

a. Bits

Which of the following statements is TRUE? (Choose 2) a. Client-server networks can easily scale, which might require the purchase of additional client licenses. b. Client-server networks can cost more than peer-to-peer networks. For example, client-server networks might require the purchase of dedicated server hardware and a network OS with an appropriate number of licenses. c. Peer-to-peer networks typically cost more than client-server networks because there is no requirement for dedicated server resources or advanced NOS software. d. Client-server networks can easily scale, which might require the purchase of additional client licenses.

a. Client-server networks can easily scale, which might require the purchase of additional client licenses. b. Client-server networks can cost more than peer-to-peer networks. For example, client-server networks might require the purchase of dedicated server hardware and a network OS with an appropriate number of licenses.

What are the steps a DHCP client goes through when requesting an IP address? Make sure they are in the correct order. a. DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK b.DHCPACK, DHCPDISCOVER, DHCPREQUEST, DHCPOFFER c.DHCPOFFER, DHCPDISCOVER, DHCPREQUEST, DHCPACK d.DHCPDISCOVER, DHCPREQUEST, DHCPOFFER, DHCPACK

a. DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK

Which of the following layers of the OSI reference model is primarily concerned with forwarding data based on logical addresses? a. Network Layer b. Presentation Layer c. Physical Layer d. Data Link Layer

a. Network Layer

A converged network is a network that has the capabilities of transporting multiple types of traffic such as voice, video, and data, which can offer significant cost savings to organizations a. True b. False

a. True

How fast is standard Ethernet? a. 10 Gbps b. 10 Mbps c. 1 Gbps d. 100 Mbps

b. 10 Mbps

What is the actual distance of 10Base 2? a. 200 b. 185 c. 2 d. 10

b. 185

What media type is 1000BASE-T? a. Cat 5 b. Cat 5e c. Cat 3 d. 10 Base 2

b. Cat 5e

IEEE stands for Institute of Electronic and Electrical Engineer, and it is an internationally recognized standards body. a. True b. False

b. False

How many bytes in an IEEE 802.1Q VLAN tag? a. 8 b. 6 c. 4 d. 2

c. 4

There are four states that a port goes through when transitioning to the forwarding state. What is the correct order? a. Learning, Listening, Blocking, Forwarding b. Listening, Blocking, Learning, Forwarding c. Blocking, Listening, Learning, Forwarding d. Blocking, Learning, Listening, Forwarding

c. Blocking, Listening, Learning, Forwarding

Which of the following is NOT a layer of the Open Systems Interconnect (OSI) reference model? a. Physical Layer b. Presentation Layer c. Internet Access Layer d. Data Link Layer

c. Internet Access Layer

Which of the following layers is NOT part of the TCP/IP protocol stack? a. Internet b. Transport c. Presentation d. Application

c. Presentation

What is the purpose of a DNS server? a. Blocking packets from the Internet b. Routing packets to the Internet c. Providing an IP address for an Fully Qualified Domain Name d. Connecting devices at Layer 2 of the OSI

c. Providing an IP address for an Fully Qualified Domain Name

What is the purpose of a proxy server? a. Block requests from the Internet b. Route packets to the Internet c. Receive client's requests, and forward them on to the Internet d. Provide an IP address to an FQDN

c. Receive client's requests, and forward them on to the Internet

Which of the following is NOT an example of an application that can travel over a network's connections? a. Email b. File sharing between computers c. Voice over IP (VoiceIP) d. Local Area Network

d. Local Area Network

Which two categories of media are twisted-pair cable? a. RG-59 and RG-58 b. MMF and SMF c. RJ-11 and RJ-45 d. STP and UTP

d. STP and UTP

Which of the following transport layer protocol of the OSI reference model is a connection-oriented protocol that provides reliable transport between two communicating hosts? a. Internetwork Packet Exchange (IPX) b. Transport Center Protocol (TCP) c. User datagram Protocol (UDP) Correct d. Transmission Control Protocol (TCP)

d. Transmission Control Protocol (TCP)

Which of the following is a NOT a network category based on the geographical dispersion of network components? a. Personal-area network (PAN) b. Metropolitan-area network (MAN) c. Local-area network (LAN) d. World-area network (WAN)

d. World-area network (WAN)

Data link layer

packaging data into frames, uniquely identifying network devices with an address. MAC (media access control) and LLC

Test 3 #41, is a diagram

see test

Test 3 #43, is a diagram

see test


Conjuntos de estudio relacionados

Chapter 23 Financial Statement Analysis

View Set

The Canadian Investment Marketplace

View Set