Computer tech study deck
You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use?
Straight-through
In which type of device is a MAC address table stored?
Switch
Which of the following is a communication device that connects other network devices through cables and receives and forwards data to a specified destination within a LAN?
Switch
What is the correct binary form of the decimal IP address 192.168.1.1?
11000000.10101000.00000001.00000001
Which of the following is a valid APIPA address?
169.254.32.50
Which of the following IPv6 addresses is equivalent to the IPv4 loopback address of 127.0.0.1?
::1
Which of the following is true about a network-based firewall?
A network-based firewall is installed at the edge of a private network or network segment.
Which of the following is a valid MAC address?
AB.07.CF.62.16.BD
A host wants to send a message to another host that has an IP address of 115.99.80.157, but it does not know the destination device's hardware address. Which protocol can be used to discover the MAC address?
ARP
Which of the following describes how access control lists can improve network security?
An access control list filters traffic based on the IP header information, such as source or destination IP address, protocol, or socket number.
You also check your NIC and see that the link light is on. What might the problem be in this scenario?
An unavailable DHCP server
Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?
Bastion
Which of the following cable types often includes a solid plastic core that keeps the twisted pairs separated?
Cat 6
Which of the following is true about half-duplex mode?
Collision detection is turned on.
What does the ip address dhcp command allow you to do?
Configure a switch to obtain an IP address from a DHCP server.
You need to connect two switches using their uplink ports. The switches do not support auto-MDI. Which type of cable should you use?
Crossover
You need to transfer data from one laptop to another, and you would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?
Crossover
Which protocol can you implement on your network to help prevent problems such as this
DHCP
You want to implement a protocol on your network that allows computers to find a host's IP address from a logical name. Which protocol should you implement?
DNS
You need to enable hosts on your network to find the IP address of logical names, such as srv1.myserver.com. Which device should you use?
DNS server
Which level of the OSI model does a Layer 2 switch operate at?
Data Link layer
Which of the following utilities produced this output?
Dig
You have just connected four new computer systems to an Ethernet switch using spare patch cables. After the installation, only three systems are able to access the network. You verify all client network settings and replace the network card in the failed system. The client is still unable to access the network. Which of the following might you suspect is the real cause of the problem?
Failed patch cable
You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the internet. Since doing so, it has come to your attention that an intruder has invaded your network from the internet on three separate occasions. Which type of network hardware should you implement to prevent this from happening again?
Firewall
Which of the following creates a visual representation of physical components along with a clearly defined set of principles and procedures?
Floor plan
Which of the following is a device that can send and receive data simultaneously?
Full-duplex
Which of the following are advantages of using fiber optic cabling for a network? (Select two.)
Greater cable distances without a repeater Immunity to electromagnetic interference
As a security precaution, you've implemented IPsec to work between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement?
Host-based IDS
Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
ICMP
Which of the following would a device use to receive NTP configuration from a NTP server that's located on a different network?
IP helper
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation cannot communicate with any other host on the network. You run ipconfig /all and see the following: What is the MOST likely cause of the problem?
Incorrect IP address
Which of the following is true about an unmanaged switch?
It can connect to all devices in a small area.
At which OSI model layer does a media converter operate?
Layer 1
You have a network that uses a logical ring topology. How do messages travel through the network?
Messages travel from one device to the next until they reach the destination device.
Which address type do people use to support video confrence calls?
Multicast
Which type of address is the IP address 232.111.255.250?
Multicast
You want to measure the voltage, amps, and ohms of various devices. Which tool should you use?
Multimeter
Which of the following BEST describes port aggregation?
Multiple ports linked together and used as a single logical port.
At which OSI layer does a router operate to forward network messages?
Network
Which of the following are included as part of the Data Link layer specifications? (Select two.)
Physical network device identification Data transmission between hosts
Which of the following switch features allows you to configure how the switch's MAC address table is filled?
Port security
You are the network administrator for a large hospital. One of your users, Suzie, calls you stating that she is unable to access any network resources. After some initial troubleshooting, you realize that her computer is using the IP address 169.254.0.52. You've confirmed that the network's physical connection is connected properly. Which of the following should you do next?
Renew the IP address.
A user from the sales department calls to report that he is experiencing problems connecting to the sales file server. All users in the sales department connect to this server through a single Ethernet switch. No other users have reported problems connecting to the sales server. Which of the following troubleshooting actions are you MOST likely to perform first?
Replace the network card in the user's computer.
Which of the following connectors is used with Ethernet 100BaseTX networks?
Rj45
You manage a single subnet with three switches. The switches are connected to provide redundant paths between themselves. Which feature prevents switching loops and ensures that there is only a single active path between any two switches?
Spanning Tree
You're an application developer, and you're writing a program for exchanging video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol provides this capability?
TCP
A switch receives a frame with a destination MAC address that is not found in its MAC address table. What happens next?
The frame is replicated and sent to every active port on the switch except the source port.
Which of the following are characteristics of an MTRJ fiber optic connector? (Select two.)
They use metal guide pins to ensure accurate alignment. They can be used with multi-mode fiber optic cables.
Which of the following are characteristics of an MTRJ fiber optic connector?
They use metal guide pins to ensure accurate alignment. They can be used with multi-mode fiber optic cables.
What is it called when a system's clock begins to be off by a few seconds or even minutes?
Time drift
Which of the following combines several layers of security services and network functions into one piece of hardware?
Unified Threat Management (UTM)
Which of the following is the BEST solution to allow access to private resources from the internet?
VPN
You configure the server to distribute IP addresses from 192.168.2.1 to 192.168.2.100. You use the subnet mask of 255.255.255.0. After you make all the setting changes on the DHCP server, you reboot each client system, but they are not able to obtain an IP address from the DHCP server. Which of the following explains the failure?
You must configure the clients to obtain IP addressing from a DHCP server.
Which of the following is true about a firewall?
You must manually specify which traffic you want to allow through the firewall. Everything else is blocked.
Which of the following works as an authoritative time device?
atomic clock
You've implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but they don't host services of their own. Which type of network do you have?
client-server
You've been called in to troubleshoot a connectivity problem on a newly installed Windows Server system. The system is operating well and is able to communicate with other systems on the local network. However, it's unable to access any systems on other segments of the corporate network. You suspect that the system's default gateway parameter hasn't been configured or may be configured incorrectly. Which of the following utilities are you MOST likely to use to view the system's default gateway information?
ipconfig
Which of the following commands do you use to clear the local DNS cache?
ipconfig /flushdns
Mary calls to tell you that she can't connect to an intranet server called WebSrv1. From her computer, you ping the server's IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem?
nslookup