ITN 107 CH. 7-10 Exam Review
A corporation requires a connection between two campus building that are 250 meters apart. The link must be able to carry traffic at 8 Gbps, at the very least. Which of the following cable combinations will meet these requirements
10GBase cable with either SC or LC connectors 10GBase ER, 10GBase SR, 10GBase SW, and 10GBase SX fiber-optic cables using either an SC or LC connector operate at 10 Gbps at up to 550 meters.
You are in the market for a used smartphone, but you want to ensure it you can use it as a hotspot. Which technology should it support? Select all that apply.
5G 5G offers mobile hotspot capabilities. It has an average speed of 150 Mbps with peak speeds up to 10 Gbps. 4G 4G was the first standard allowing a device to serve as a mobile hotspot.
Makani is participating in an on-the-job training program at work. He is learning how to configure computers in a network. He is told to use private IP addresses because all organizations could use them without conflict since they are not routable. If the addresses are not routable, he wonders, how will the computers have internet access?
A NAT router will translate a private address to a public one A NAT router translates internal private IP addresses to public addresses enabling the internal devices to have access to the internet. The NAT router keeps the translated information in a table to reverse the translation for returning traffic.
Ramah is preparing a presentation on networking terminology. She wants to ensure everyone understands the difference between a node and a host. How should she define these terms? Select three.
A node is not used to run a variety of applications. Depending on the network, a node that is not a host typically provides a specialized function such as a router, switch, or a printer. It is not a general-purpose computing device that provides client/server functionality. A smart thermostat is an example of a node. Devices that connect to the network such as routers, switches, hubs and even smart thermostats are considered nodes. A node that is not a host does not typically provide client/server functionality as would a web, DHCP, or DNS server. Every host is a node, but not every node is a host. All hosts and nodes have an IP address and are accessible through the network. However, a host is a general-purpose computer and can be either a client or a server. Depending on the network, a node that is not a host typically provides a specialized function such as a router, switch, or a printer.
A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?
Address reservation An address reservation can be configured on a DHCP server to always assign the same IP address to a network host. When the host queries the DHCP server, the server checks the MAC address of the host and assigns the appropriate preconfigured IP address.
Collette wants to stream a movie from her iPad to her Apple TV. What type of connection should she use?
AirDrop AirDrop is an Apple wireless standard that uses Bluetooth and Wi-Fi. It enables Apple devices to transfer data within 30 feet.
Jolie wants to see a list of, and manage, apps on her Android phone. Where can she go on her phone to do this?
App drawer You can see a list of, and manage, apps from the App drawer.
You are asked to install an authentication system at a data center that requires both, a fingerprint scanner, and facial recognition for access. What type of authentication will you implement?
Biometric authentication Biometric authentication is based on unique biological characteristics of an individual such voice, facial features, fingerprints, or iris.
Vishalini rented a small office to offer bookkeeping services. She needs DHCP, wired, wireless, and file sharing capabilities, as well as a switch to connect three computers. However, her technology budget is limited. How can she obtain access to all these capabilities at a modest cost?
Buy a multifunction router. A multifunction SOHO router can offer all the features specified. For file sharing capabilities, the router needs to have a USB port to connect external storage which can be used to share files with network users.
A technician is working at a client's office after hours and needs two cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The other cable is for an Ethernet connection from the computer to the existing keystone jack on the wall. The technician has the necessary wire and connectors to make the cables.Which of the following tools will the technician use to make the cables and then verify that they both work properly? (Select THREE.)
Cable stripper A cable stripper is used to remove the outer sheath from a cable, thus exposing the individual wires or conductors. A cable stripper will be required for this scenario for both cables. Crimper A crimper tool is used to attach connectors onto the ends of a cable. The crimper must be compatible with the crimp (or connector). Common network and telephone connectors that are attached using a crimper are RJ-45, RJ-11, F-type, and BNC. This question will require RJ-11 crimps as well as RJ-45 crimps. Cable tester A cable tester is used to determine whether a cable is good. A good cable is wired correctly (based on the type of cable desired) and provides a complete circuit from end to end for all wires. This question will require the use of a cable tester after each cable is made.
A technician is configuring a new SOHO multifunction router at a customer site to provide network access to several wireless devices. The technician is required to protect the internal network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement?
Change the default administrative password on the router. All SOHO routers come preconfigured with a default administrative username and password. Changing these settings is extremely important to prevent unauthorized access to the router settings. After connecting to the router, and before configuring anything else, it is best to change the router password (and the default username if possible).
You log in to a wireless router with administrative privileges and change the SSID. What exactly have you done?
Changed the network name The network name for a wireless router is the SSID (Service Set Identifier). When you connect to a wireless network, you may see multiple networks names available for selection; these are the SSIDs. Most are secure so you will need a password to connect.
Adelina works at an online retail company where weekend sales spike and generate increased network traffic. She is asked to investigate options to help alleviate network congestion inexpensively. Which solution will help mitigate the problem with relative ease?
Configure VLANs Configuring VLANs on the switch breaks up the network into smaller segments thereby reducing network traffic to any one specific network.
A small company has a few users that are spending too much time on specific social media web sites; this is affecting their productivity at work. The manager asks if it is possible to limit access to those sites. Which of the following will satisfy the request while not limiting access to other websites?
Configure a proxy server as an internet appliance to limit access to the web sites. A proxy server is a computer that can be configured to intercept web traffic to, among other things, limit access to certain web sites.
You need to create LAN a connection using a mobile device. Which of the following will most readily allow you to create the connection without using a physical tether? Select two.
Create a mobile Wi-Fi hotspot Creating a mobile hotspot will allow other devices to connect thereby creating a LAN connection. Use Wi-Fi to connect to a LAN You can use Wi-Fi to connect to a LAN using an access point or a wireless router.
Quintavius loves to tinker with computers so he sets off to see how many networking services he can install in one physical server. He sets up the system to support DCHP, DNS, HTTP, HTTPS, Telnet, SSH, and an email server. On what port will these services listen?
DCHP 67, DNS 53, HTTP 80, HTTPS 443, Telnet 23, SSH 22, SMTP 25 DHCP listens on port 67; it is used to assign IP addresses to computers automatically. DNS listens on port 53; it resolves domain names into IP addresses. HTTP listens on port 80; it serves online resources, but it is not secure. HTTPS listens on port 443; it serves web pages securely. Telnet listens on port 23; it is used for remote access, but transmissions are not encrypted so it is not secure. SSH listens on port 22 and is used for remote access. SSH is secure because the transmissions are encrypted. SMTP listens on port 25 and is used to send and receive email messages between email servers.
A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business. Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?
DHCP server An integral feature of a SOHO router is the DHCP (Dynamic Host Configuration Protocol) server, which automatically assigns IP address information to network clients with either wired or wireless connections. The host device is configured to obtain IP address information automatically.
You are setting up your Windows computer to connect to the Internet. When you type www.microsoft.com, the issues an error message indicating the site cannot be reached. What network setting should you check to see the address of the server being used to resolve the domain name you entered in the browser?
DNS The DNS address is used to connect to a DNS (domain name system) server that is used to resolve the domain name. This allows you to use a name like www.microsoft.com instead of trying to remember the IP address of the Microsoft web server.
Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? (Select TWO.)
DSL modem A DSL modem is the hardware device used to connect the local area network (LAN) to an Internet service provider (ISP). DSL is a broadband technology transported over copper POTS (plain old telephone service) cable that can provide high-speed Internet alone (SDSL) or Internet combined with voice (ADSL, VDSL). Cable modem The cable modem is the hardware device used to connect the local area network (LAN) to a cable Internet service provider (ISP). Cable is a broadband technology transported over a coaxial cable that can provide high-speed Internet, TV, and voice via a single cable connection.
Dennis is on a road trip with his family. His children want to use their tablet to watch a movie online. What can Dennis do that will allow the children to watch a video on the Internet while in the car?
Enable a hotspot on his smartphone. Dennis can create a hotspot on his smartphone. The hotspot will establish a wireless network that the tablet can join, which will enable the children to watch the video on the Internet.
You buy a cable that has RJ-45 connectors. For what type of transmission will the cable be used?
Ethernet Ethernet patch cables are copper twisted pair cables using RJ-45 connectors. RJ-45 connectors are constructed to accept up to four pairs of individual wires.
You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA/EIA 568A standard. Starting with pin 1 of the modular plug, which wire color code will you use?
Green/white, green, orange/white, blue, blue/white, orange, brown/white, brown This is the correct color code for the T568A standard starting with pin 1.
Liem just discovered the used phone he bought is on an IMEI blacklist. What does this mean?
He may not be able to activate it A user whose phone has been stolen can contact the carrier to place their phone on their IMEI blacklist so that it can be blocked and not used by others.
Jozef is a youngster who writes an app for the iPhone. He posts it on a website, but nobody ever downloads it. He speaks with a senior developer who gives him advice. He implements the advice, and his app now has a lot of downloads. What did Jozef do differently?
He placed the app on the Apple App Store Having the app approved for sale on the Apple App Store will make it available for download to iPhone users.
A geospatial company uses LRFW networks because it allows them to transmit signals across large distances that can sometimes exceed 100 miles. What features of LRFW enable this capability? Select two.
High power transmission LRFW uses highly directional, high powered antennas allowing it to transmit signals across large distances to create point-to-point connections. Highly directional antennas LRFW uses highly directional, high powered antennas allowing it to transmit signals across large distances to create point-to-point connections.
You are using Wireshark to troubleshoot activity on your network because the performance seems to have degraded over the last two days. What can you discover using Wireshark?
High usage by a network client Wireshark is network monitoring software used to capture and analyze traffic.
Akello uses his computer to download a document from the internet. What role does his computer play as opposed to the computer from which he is downloading the document? Select two.
His computer is a client In a client/server model, the device initiating the request is the client and the machine that responds to the request, and services that request, is the server. The client application is the browser Akello is using, and the system supplying the resource is the web server. The computer from which he downloads the document is a server In a client/server model, the device initiating the request is the client and the machine that responds to the request, and services that request, is the server. The client application is the browser Akello is using, and the system supplying the resource is the web server.
To reduce costs, a company wants to slowly transition and eventually eliminate their dependency on their own hardware, datacenter, and IT personnel to manage the data center. What would you initially recommend?
Hybrid cloud services A hybrid cloud is a combination of public and private clouds. This would allow them eventually to fully transition to a public cloud.
You are tasked with securing a network for a client that requires a spam gateway, VPN, anti-malware as well as an end-point management system. Which of the following would best help you meet the requirements of the client?
Implement a UTM appliance. A UTM (unified threat management) appliance can perform the services required by the client in a single network-attached device. The client's requirements can be met by purchasing a UTM appliance with identity-based access control lists (to mitigate data leaks), a firewall (to protect access to the internal network from the Internet), an IPS (to detect and prevent malicious activity from entering the network), and antivirus and anti-malware protection (to scan all email).
Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that company-owned workstations are up-to-date with security patches, anti-malware requirements, and software application updates. The manager is also concerned that employee-owned devices connecting to the corporate LAN have the same level of security as the company devices. Which of the following protections and services should you recommend?
Implement an endpoint management server appliance. An endpoint management server will monitor endpoint devices on the network to ensure they meet the most current security requirements. If security requirements are met, the device is granted access to the network. The user or device will still be required to authenticate on the network. If the endpoint management server determines a device does not meet the minimum security requirements, the device's access to the network is blocked.
Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?
In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet. The most common use of the alternate IP configuration method is to assign a valid IP address to a host when it cannot reach a DHCP server. For example, a client uses her laptop at home (using DHCP) and at work (using static assignment). If the host is set to obtain an IP address automatically, it will receive an IP address at home but not at work. Without an alternate configuration, if the host cannot reach a DHCP server, the host will automatically assign an automatic private Internet protocol address (APIPA).
The owner of a small loan brokerage firm does not know much about computers but has always been concerned with security, so he buys a used enterprise grade router. Mango, a loan officer with a little bit of IT knowledge, configures FE80::1 as the only address on the internal interface of the router. What effect will this have?
Internet access will now be suppressed. FE80::1 is a link-local IPv6 address; it is not routable. Configuring a global unicast address will allow devices to have internet access.
Mr. Sales knocks on your door and tries to sell you a faucet with the ability to notify you through your cell phone if it springs a leak. What technology enables this capability?
IoT IoT represents the Internet of Things. It refers to the ability to connect what could, at one point in time be considered non-traditional devices, to a network such as doorbells, baby monitors, appliances, and thermostats. Depending on the configuration, these devices can be controlled remotely or used for monitoring through the internet.
John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is similar to the charging cable for his Android smartphone, but not quite the same. What type of cable will John need to purchase to charge the iPad?
Lightning The lightning cable and lightning port are used to power most iPads, iPods, and iPhones. Some newer Apple devices use the USB-C connector.
A coworker is asking for your advice on a problem with a computer that will not communicate on the network. While assisting the coworker, you suspect that the wired NIC may have failed. Which of the following will you recommend to your coworker as the best tool to diagnose this issue?
Loopback plug A loopback plug is used to reroute a network port's output signal back to the same port's input pins. Performing a loopback test will verify whether the port on the NIC is functioning.
A mobile phone user in your company is experiencing dropped phone calls. While interviewing the user, you determine the problem started after she checked her email this morning. No other mobile devices in the organization are dropping calls. Which of the following is the most likely reason for the dropped calls?
Malware is interfering with the calls. The device most likely infected with malware while the user was checking her email, and the malware is attempting to eavesdrop on the phone calls.
Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for payments made at a retail checkout counter. The technology also allows the marketing team to share data quickly. What technology is set up on the marketing team's phones?
NFC Near field communication (NFC) allows a phone to transmit encrypted information for making payments at checkout counters and to share files. The NFC range is around 10 cm, or around 3 inches.
Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect. Where in the Windows Control Panel will Cathy find her computer's network connection settings?
Network and Sharing Center Cathy will find the computer's network connection settings in the Network and Sharing Center. She will also see all the network connection types.
Bryson has contacted you because he needs to know what kind of data he can synchronize from his iPad to his PC. What can Bryson synchronize from his iPad to his PC? (Select all that apply.)
Notes Notes can be synchronized between Bryson's iPad and his PC using iTunes. Calendar Calendar can be synchronized between Bryson's iPad and his PC using iTunes. He can then enable iCloud Calendar and have his appointments on both the PC and the iPad. Music Music can be synchronized between Bryson's iPad and his PC. He can sync the music he purchases on his iPad to his PC so that, if the iPad fails, he will have a backup of the purchases. Photos Photos can be synchronized between Bryson's iPad and his PC. The sync can be done using iTunes by connecting the iPad to a USB port on a PC or wirelessly using Wi-Fi. To sync using Wi-Fi, Bryson will need to turn on the feature with the device connected. Contacts Contacts can be synchronized between Bryson's iPad and his PC. He can use iTunes on the PC to synchronize items.
Mark has been asked to set up several smartphones to connect to the email server in the company for which he works. What is the effect of configuring POP3 vs IMAP using the default settings?
POP3 deletes messages from the email server, IMAP does not. IMAP is an email protocol that can synchronize email between multiple email clients on multiple devices. Using IMAP, Mark and others at the company will be able to read email on all the devices that receive their email. IMAP does not automatically delete messages from the email server when they are downloaded. POP3 is a protocol for receiving email by downloading it to a computer from a mailbox on the server of an Internet service provider. After the email is downloaded, it is deleted from the email server.
Jana is an independent software developer looking for a cloud model that will allow her to easily and quickly provision computing resources, test her application, then release the computing resources when done. Which model should Jana use?
PaaS With PaaS (Platform as a Service) a developer can build and test an application over the web, and then throw out the machine and start over with a new one easily and quickly.
You run the ipconfig /all command on your Windows computer and see a hexadecimal value that looks like this: E0-70-EA-4E-AB-A5 What does it represent? Select two.
Physical address The Physical address is the same as the MAC address burned-in to the NIC. It cannot be changed by conventional means and is globally unique. MAC address The MAC address is the same as the physical address burned-in to the NIC. It cannot be changed by conventional means and is globally unique.
You are running a performance test using three different browsers on the same computer to simultaneously access the same web site. What numeric identifier or address is used to keep the three connections separate at the application (browser) level?
Port number The port number is used to identify the application or service running on the host. It is used to create a socket which is the combination of the IP address and the port number such as 192.168.1.1:8000. The IP address identifies the host, and the port number identifies the application or service running on the host. Since the three browsers are running on the same system, the socket will have the same IP address, but each will have a different port number to help keep the three connections or conversations separate. The source port number is assigned randomly, but the destination port number for the service being requested, HTTP (web server), is 80 (443 for HTTPS).
You have been asked to work on 25 mobile devices at a mid-sized company due to malware. Once you clean the devices, you suggest implementing a company-wide mobile device policy. Which of the following would you recommend? Select three.
Provide basic security training Providing basic security training about privacy settings and email phishing scams are helpful. In addition, keep the OS up to date and install an anti-malware app. Install an anti-malware app Installing an anti-malware app will help protect devices. As will keeping the OS up to date and providing basic security training about privacy settings and email phishing scams. Always keep the OS up to date Keeping the OS up to date will help patch known vulnerabilities. Basic security training about privacy settings and phishing scams are also helpful.
Arun recently graduated with both, civil and electrical engineering degrees. His first project is to design a system that will replace the manual tolls in a highway with a wireless toll booth collection system. He decides that passing vehicles should have a small device that transmits data to fixed stations at various points along the highway for automated billing. What type of technology should Arun consider to be the most viable?
RFID RFID uses wireless technology to transfer data including for example, data from a registered transponder in a vehicle to a wireless toll booth collection system to identify the vehicle with a high degree of accuracy at highway speeds.
A large retail chain has asked Dillion to explore wireless technologies to see if there is a better way of tracking apparel inventories. What technology should Dylan recommend to his company?
RFID tags RFID tags use a passive or active tag. This technology is used by some companies to track inventory.
Online activity for a retail company rises dramatically in November and December. Which cloud computing feature allows them to automatically scale up or down their computing resources to meet demand?
Rapid Elasticity Rapid elasticity is the ability of the cloud service to be scaled up or down as the need level changes for a particular customer.
What is the purpose for the twists in twisted pair Ethernet cabling?
Reduce crosstalk between wire pairs. The twists in a twisted pair cable reduce crosstalk between pairs. Crosstalk is interference induced by a wire that interferes with neighboring wires.
Kwan, a fifth-grade teacher, has been learning about computers but does not know much about networking. He found a hub in the supply closet and decided to create a small network in his classroom consisting of a file/application server, 10 relatively new computers, and a printer. The students often complain that the computers are slow, but one student blames it on the network. What can Kwan do to eliminate complaints?
Replace the hub with a switch Hubs employs older technology, operate at 10/100 Mbps, and share the bandwidth with all the devices connected to it. This means signals will collide and delay transmissions as the network recovers. A modern-day switch has 1 Gbps ports and every port is capable of operating at that speed because the bandwidth is not shared. There are network design considerations that need to be taken into account but a switch will outperform a hub in all cases.
Which of the following is a function of an endpoint management server appliance?
Restricting a device's access to the network until security requirements are met. An endpoint management server will monitor endpoint devices on the network to ensure they meet the most current security requirements. If security requirements are met, the device is granted access to the network. The user or device will still be required to authenticate on the network. If the endpoint management server determines a device does not meet the minimum security requirements, the device's access to the network is blocked.
A large corporation needs a high-speed network to test a product that will backup and restore terabytes of data. What type of network should they use?
SAN A SAN (storage area network) is a specialized high-speed network used for storing and sharing files. Storage pools can be configured and presented to a variety of server types.
You are completing a networking assignment and need to connect devices as shown in the schematic. Computer PC1 connects to switch S1. S1 connects to router R1. R1 connects to router R2. R2 connects to switch S2 which connects to computer PC2. None of the devices support auto-linking. PC1 - - - - S1 - - - - R1 - - - - R2 - - - - S2 - - - - PC2 Beginning with PC1, what type of cable do you need to connect the devices (XO = crossover, ST = straight-through)?
ST, ST, XO, ST, ST Use a straight-through cable to connect a PC to a switch or to a router. Use a straight-through cable to connect a switch to a router. Use a cross-over cable to connect like devices such as router to router, switch to switch, and PC to PC.
Jochi just started college and is using an online LMS (learning management system) to gain access to his assignments. From his perspective, what type of cloud service does the LMS represent?
SaaS With SaaS (Software as a Service) applications are provided through an online user interface and are compatible with a multitude of devices and operating systems. Examples include Gmail and Netflix.
Reyad is preparing for a hands-on Linux exam. He wants to practice in an isolated environment on his computer because he does not want his live system to be negatively affected. Which of the following should he implement?
Sandbox A sandbox is an isolated environment users and developers can learn and experiment safely without affecting the live environment.
James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files. How can James select what to synchronize from his phone to Google storag
Settings app In the Settings app, James can navigate to the Google section. There he will navigate to Backups, where he can change what he wants to back up to Google.
Venus is a member of the IT department at a company that has a moderately-sized network. One of her performance review objectives is to help her department be more proactive relative to being notified, and responding to, certain events that occur in the network. What type of server will help her meet the objective?
Syslog Server A syslog server gathers information about various network devices and stores the events into a database. Syslog messages have a numeric identifier to denote the severity of the event.
Frank is traveling for work with his company laptop and company phone. During a layover, he reviews his files in preparation for a presentation but discovers he forgot an important file. The good news is the file is in cloud storage. How can Frank download this file? (Select all that apply.)
Tether his laptop to his smartphone Frank can use his charging cable and tether his laptop to his smartphone, which creates an Internet connection using the smartphone as a modem. Use his cellphone to create a hotspot Frank can create a hotspot with his smartphone and connect his laptop to the wireless connection. He should make sure the wireless network is secure.
A restricted computer lab at a college has been set up with local authentication. Students are able to log in but do not have internet access. You check the network settings on one of the computers and it has an IP address of 169.254.1.10. What is the problem?
The DHCP server is not reachable When a computer is configured to request an IP address from a DHCP server on power up, and the DHCP server is not available or reachable, the operating system will assign an address in the 169.254.x.y address space (APIPA, Automatic Private IP Addressing). This allows devices in the local network to have connectivity with each other but not with computers on another network, hence internet access is not possible. The host will transmit a DHCP discover message periodically in an attempt to obtain an address from a DHCP server.
You buy a PoE (Power over Ethernet) security camera in a liquidation sale that requires at least 22 Watts of power. Before installing it, you test it by connecting it to a switch capable of transmitting power based on the PoE IEEE 802.3af standard. However, the camera does not turn on. Which of the following best describes the problem?
The PoE device is not transmitting enough power to turn on the camera The IEEE 802.3af standard provides up to 15.4 watts of power but the camera requires at least 22. The solution would be to either use a camera that requires less power or upgrade the switch to one that supports PoE+ (802.3at) which can deliver up to 25.5 watts through CAT-5 cabling.
The back cover of a mobile device is warmer than usual, and the battery seems to lose its charge much quicker than normal. The user has scanned for malware, closed unused apps, and decreased the brightness level of the screen, but the symptoms persist. Which of the following is the most likely cause for this behavior?
The battery is going bad. A battery that is going bad will cause its charge to be depleted much quicker than normal. Many times, a failed or failing battery can cause the device to feel hotter than usual.
Torino receives a call from a SOHO client who says her computer is not working. He goes to her office and checks the network settings. He notices that the default gateway entry is blank, yet he can ping the router. Once he enters the default gateway, the problem is solved. What did the client mean when she said her computer is not working?
The computer had no internet access If the default gateway is not set, the computer will not be able to send traffic outside of the local network. He can ping the default gateway because the router interface is part of the local network. The address on the router interface is the default gateway but the computer does not know this unless it is explicitly configured either manually or automatically using DHCP.
You want to setup a separate network at home that is accessible from the internet. You want it to be isolated from your personal network, so you lease an IPv6 address from the ISP. When you configure the interface IDs of the devices on the network, which bits in the IPv6 address will you be modifying?
The last 64 bits of an IPv6 address The last 64 bits of an IPv6 address represent the interface ID. A simplistic analogy is to say that the interface ID of an IPv6 address is equivalent to the host portion of an IPv4 address.
A user is asking her smartphone to recommend a restaurant. But even though the cellular service is active and functioning properly, the app seems unable to determine its whereabouts. What is the first thing the user should check?
The user should verify location services is enabled on the smartphone. Location-aware apps rely on location services. This setting should be checked first.
What characteristics do the 10.0.0.1/24, 172.16.0.2/24, and 192.168.0.3/24 IP addresses have in common? Select three.
They are not routable by the ISP. Private IP addresses are not routable and can be used internally by any organization. If an ISP router encounters a packet with any one of these addresses, it will drop the packet (not forward it). They all have the same subnet mask. The /24 is using the CIDR notation. This means that the first 24 bits of the address represent the network portion. It is an alternate way of representing the subnet mask which is used to help computers determine if the destination device is on the local network or on another network. They are private IP addresses. The range of private IP addresses is 10.0.0.0 - 10.255.255.255, 172,16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255. They can be used internally by any organization and will not create a conflict because they are not routable.
A technician has verified that a bad Cat6 cable run in the wall is responsible for a workstation's lack of communication on the network. Which of the following tools can be used to pinpoint the location of the cable inside the wall?
Toner probe The toner probe (also called tone generator and probe) is used to locate copper cable runs in walls and at their termination points.
You want to add another layer of security to your bank account so that when you log in with a username and password, it sends a pin to your phone. What must you configure to enable this functionality?
Two-factor authentication Two-factor authentication requires two different types of authentication to verify your identity. The password is something you know, the pin is something you have (the phone where the pin is displayed).
Jesenia read an article that said stored data, such as when you are downloading an app, is transmitted using TCP, but live-streaming events are transmitted using UDP. Why would this be true? Select two.
UDP is fast and does not retransmit lost data so as not to disrupt the live video feed. Live stream video feeds and real-time calls using Voice over IP are best delivered in a continuous stream so as not to disrupt the experience. If a live-stream video packet is lost, the video quality may be degraded for a second. If a voice packet is lost, the recipient could ask to repeat the statement. TCP is reliable and ensures the delivery of data using a connection-oriented mechanism. TCP (Transmission Control Protocol) is reliable and uses a connection-oriented mechanism to guarantee the delivery of data. It expects an acknowledgement from the destination. If it does not receive one, it resends the data.
Nikita attempts to install a hypervisor on her laptop. When she tries to create a virtual machine an error message suggests that virtualization is not supported. Where can she check to see if virtualization is enabled?
UEFI/BIOS Access the motherboard BIOS/UEFI to enable virtualization as needed.
Ibrahim is a computer teacher at a large high school with an 802.11n wireless network. They ask him to run a 1 Gbps Ethernet cable from a switch to a computer that happens to be 150 meters away. How should he best proceed?
Use two 75-meter-long cables with a switch in between. Since Ethernet limits the maximum cable length to 100 meters, two 75-meter cables with a switch in between will satisfy the requirement.
Jerry recently purchased a new iPad. He needs guidance on setting it up and wants to find documentation to help with the setup. Where can Jerry find detailed steps on how to connect to a network, configure email, update the OS, sync, and back up settings and data, as well as what to do when things go wrong with his iPad or an iPhone?
User guide for the device Apple has a user guide that Jerry can download. The user guide will give him detailed steps on everything his needs to set up and use his device.
Randy is concerned about his company's data security on the Internet. Because cellular signals are not encrypted, he is concerned that the new smartphones given to the sales department will allow a breach. Randy has decided the company needs a more secure way to allow the sales department to connect to the company network over the Internet. What should Randy deploy to allow the sales department to connect to the company network securely over a cellular data signal?
VPN A VPN creates an encrypted path or tunnel between two devices, making it appear to the computers that they are on the same network.
Abigail needs to move out of state to take care of her mother. She will need secure remote access to continue working as a cloud engineer. What type of connection does Abigail need to securely access the computing resources at her company?
VPN A virtual private network (VPN) will allow a secure remote connection over the internet, which is a public network. This is realized by creating a secure connection and encrypting all the data flowing between the client device and the company.
Ferran got a new cell phone. But every month he receives a data-usage limit notification even though he has not done anything unusual except use, install, and remove games and apps. What can he do to try to rectify the problem?
Verify all apps that are not being used are closed. Some apps will continue to run in the background and consume data. Closing all unused apps will help limit data usage.
You just completed a contract setting up the network in a new 10-story office building for a commercial airline company. They are not happy with their VoIP service. You troubleshoot and determine you need to modify the QoS policies. Which type of traffic should have the highest priority?
Voice Voice traffic should have the highest quality of service (QoS) to ensure the calls are loud, clear, and without echoing, delay, or static.
A company asks Aurora to work on a mobile device that belongs to a colleague. After her evaluation, she narrows down the list of things to consider doing. They include uninstalling some apps, updating the OS, and possibly performing a factory reset. What would have prompted her to consider these actions?
You are trying to remove suspected malware. These steps should be taken when removing malware from a mobile device.
In which of the following situations should you install an IPS instead of an IDS?
You want to block unauthorized activity on your LAN from the Internet. An IPS (intrusion prevention system) will monitor, detect, log, issue alerts, and prevent malicious activity.
Juula just purchased a new tablet from the Apple Store for her home-based business. She wants to ensure the calendar and contacts she creates are automatically saved online. What service should Juula use?
iCloud iCloud is the most seamless option. When Juula sets up her iPad, the setup will include an iCloud account and free online storage. She can also set up to automatically send her calendar and contacts directly to her iCloud account without the need to manually move or sync them.
You are asked to add a resource record in the DNS namespace for a website your company wants to publish. Which of the following entries will you make?
www.company.com A IN 14440 209.165.200.5 The proper format is resource name (www.company.com), record type (A), class code (IN), TTL (14400), Data (209.168.200.5). The record type of A is the address record and points a host name to its IP address. The class code IN means the record is allowed on the internet. The TTL is the time-to-live and represents the time a server can hold the record in its cache. The data is the IP address mapped to the host.