N10-007

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following statements is true of load balancing? load balancing decreases redundancy load balancing increases data availability load balancing can only be done on multilayer switches load balancing decreases performance

*Load balancing increases redundancy and therefore data availability.* Also, load balancing increases performance by distributing the workload. *Multilayer switches* and *DNS servers* can serve as load balancers.

Which of the following switches can be used with ipconfig to purge the DNS cache? /purge /unfetter /release /flushdns

/flushdns /flushdns switch instructs ipconfig to purge the DNS cache

Which of the following is a default port for NetBIOS? 443 119 137 97

137 is a default port for NetBIOS.

What is the transmission rate possible with an OC-3 connection? 9.953 Gbps 622.08 Mbps 155.52 Mbps 4.976 Gbps

155.52 Mbps. Think # of 5's, then # of 2's, then Find the # in the middle. Remember, OC-1 = 51-84 Mbps. OC level is multiples of OC-1 _OC-X = X *51.84Mbps_ OC Level Data Rate OC-1 51.84 Mbps OC-3 155.52 Mbps OC-12 622.08 Mbps OC-24 1.244 Gbps OC-48 2.488 Gbps OC-192 10 Gbps OC-256 13.271 Gbps OC-768 40 Gbps

You are trying to configure the newly purchased firewall. Which of the following is the default port for H.323 traffic? 443 1720 445 323

1720 is the default port for H.323 traffic. H.323 is used for audio-visual purposes. Teleconferencing, video call, etc.

What is the decimal format of the following binary IP address? 11001110.00111010.10101010.01000011 238.90.202.99 190.42.154.51 205.57.169.66 206.58.170.67

206.58.170.67

You need to run some equipment beneath a raised floor and are considering using PoE to avoid needing to run separate electrical outlets. With the 802.at standard, what is the maximum wattage supported? 64.2W 32.4W 24.2W 15.4W

32.4W is the maximum supported wattage.

You need to speed up the your switches so they do a faster job of adapting to network conditions and have heard of Rapid Spanning Tree. What IEEE standard addresses this? 802.1w 802.1a 802.1r 802.1d

802.1w addresses Rapid Spanning Tree.

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents? (Choose two) Bridge Hub Switch Gateway Router Repeater

A *hub* and a *repeater* send received signals out all other ports. These devices do not examine the frame or the packet contents.

Which of the following uses metal clips placed over plastic slots to connect individual copper wires? 66 block 100 pair 25 pair 110 block

A 110 block is a punch down block that uses metal clips fitted over plastic pins. To connect wires using a 110 block, place the wires in the plastic slots, attach the metal clip, then punch down the connecting cable on the top of the clip.

You want a switch to have the ability to modify the media type the switch port supports. Which type of module might you use to make this possible? (Choose two) OC-x GBIC MPLS SFP

A GBIC (gigabit interface converter) is a large transceiver that fits in a port slot. GBICs are used for Gigabit media, including copper and fiber optic. • An SFP (small form-factor pluggable) is similar to a GBIC, but is smaller in size. An SFP is sometimes called a mini-GBIC. • An XFP transceiver is similar in size to an SFP, but is used for 10-Gigabit networking.

Which of the following is a valid MAC address? C0-34-FF-15-01-8E 192.168.12.15 34-9A-86-1G-B3-24 83-5A-5B-0B-31-55-F1 73-99-12-61-15 255.255.255.0

A MAC or hardware address is a unique identifier hard coded on every network adapter card. A valid MAC address has a total of 12 hexadecimal numbers.

The Ping of Death takes advantage of a weakness in which of the main protocols in the TCP/IP suite? UDP TCP IP ICMP

A Ping of Death attack exploits an ICMP weakness. Internet Control Message Protocol. The variable size of the ICMP packet data section has been exploited. In the "Ping of death", large or fragmented ping packets are used for denial-of-service attacks.

You have been asked to document the wiring in your building. You would like to identify the length of each Cat5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use? Butt set TDR Smartjack OTDR Toner probe

A TDR is a special device that sends electrical pulses on a wire in order to discover information about the cable.

Which of the following tests can be performed by a TDR? (Choose two) Measure the length of a cable. Measure near end and far end crosstalk. Verify that the cable meets Cat5e, Cat6, or Cat7 standards. Identify split pairs and miswires. Identify the location of a fault on a cable.

A TDR is a special device that sends electrical pulses on a wire in order to discover information about the cable. The TDR measures impedance discontinuities, the echo received on the same wire in response to a signal on the wire. The results of this test can be used to: • Estimate the length of a wire. • Measure the cable impedance. • Identify the locations of splices and connectors on the wire. • Identify shorts and open circuits and the location of the fault.

Which of the following geographic network types are typically managed by a city as a public utility? Metropolitan area network (MAN) Wide area network (WAN) Local area network (LAN) Personal area network (PAN)

A _metropolitan area network (MAN)_ is a network that can cover an entire city. A city typically owns and manages a MAN as a public utility.

You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100 Mbps. Which tool should you use to test the drop cable and the connection to the network? Cable tester Multimeter TDR Certifier Toner probe

A cable certifier is a multi-function tool that verifies or validates that a cable or an installation meets the requirements for a specific architecture implementation. For example, you would use a certifier to verify that a specific drop cable meets the specifications for 1000BaseT networking.

You are troubleshooting a connectivity problem in which one client system is unable to connect to a server. Both the server and client system are connected to the same Ethernet network switch. No other users have complained of a problem, and you suspect that faulty network cabling might be to blame. Which of the following troubleshooting steps are you most likely to perform first? Use a punch down tool to test the network cable between the computer system and the network switch. Use a wire crimper to ensure that the cable ends are still fully attached to the cable in two places: between the computer and the network switch, and between the network switch and the server system. Use a tone generator to test the network cables between the computer and the network switch and between the network switch and the server system. Use a cable tester to test the cable between the computer system and the network switch. Use a cable tester to test the cable between the network switch and the server system.

A cable tester is a hardware device that can be used to verify the correct operation of network cabling. In this scenario, because no other systems are having problems connecting to the server, you are most likely to use the cable tester to check the cable between the client system and the network switch.

Which topologies is a CAN able to use? (Choose three) Partial mesh Bus Ring Full mesh Star

A controller area network (CAN) is designed to allow communication between microcontrollers and devices. CANs use _bus_, _star_, and _ring_ topologies.

You have a network that occupies the top floor of a three-story building. The WAN service provider has installed the line for the WAN service in a wiring closet on the main floor. What would you use to relocate the WAN line into a wiring closet on your floor? Demarc extension Smart jack 66 block Horizontal cross connect 110 block

A demarc extension extends the demarcation point from its original location to another location within the building. The demarc extension typically consists of a single wire bundle that attaches to the existing demarc and supplies a termination point to a different location. You might need a demarc extension if your network occupies an upper floor of a building. The LEC will typically install the demarc into the MDF on the bottom floor, and you will need to install an extension to place the demarc into the IDF on your floor.

What tool should you use to extend network services beyond the demarc? Punch down tool Crimper Media certifier Tone generator

A demarc is the location where the local network ends and the telephone company's network begins. This location is usually at a punch down block in a wiring closet. You use a punch down tool to attach wires to the punch down block.

You have a small network that uses a switch to connect multiple devices. Which physical topology are you using? Mesh Ring Bus Star

A hub creates a network with a physical _star_ topology. The physical star topology uses a logical bus topology and sends messages to all the devices connected to the hub.

Which of the following devices does not segment the network? Firewall Switch Router Hub

A hub does not create multiple segments on the network. A segment is a portion of the network that has different media, collision domains, or broadcast domains. A hub simply connects devices using the same media type. All devices are members of the same collision and broadcast domains.

On the sending end of a connection, connection-oriented protocols assume that a lack of acknowledgment is sufficient reason to do which of the following? terminate encrypt retransmit alert

A lack of acknowledgment is sufficient reason to *retransmit*.

At which OSI model layer does a media converter operate? Layer 3 Layer 4 Layer 1 Layer 2

A media converter operates at Layer 1 of the OSI model, the Physical Layer. The media converter translates frames into bits and transmits them on the transmission medium.

At which OSI layer does a router operate to forward network messages? Data Link Network Transport Session Physical

A router uses the logical network address specified at the Network layer to forward messages to the appropriate LAN segment. A bridge, on the other hand, uses the MAC address and works at the Data Link layer.

Users report that the internet is no longer accessible. You suspect that the line connecting your building to the internet is not working properly. Which of the following allows the service provider to remotely test the local loop? Smartjack Horizontal cross connect Loopback plug Demarc extension Demarc

A smartjack is a special loopback plug installed at the demarcation point for a WAN service. Technicians at the central office can send diagnostic commands to the smart plug to test connectivity between the central office and the demarc.

Which of the following devices operates at the OSI model Layer 2? Firewall Router Hub Switch

A switch operates at the OSI model Layer 2 (Data Link layer). It reads the MAC address to make frame forwarding decisions.

You have just been hired as a network administrator. A user has just changed offices and needs you to activate the network and telephone connections in his office. However, the wiring at the punch down block is labeled poorly, and you are unable to tell which wires go to the user's office. What should you do? Use a punch down tool to locate the correct wiring. Install new wiring from the punch down block to the user's office. Use a tone generator to locate the correct wiring. Use a media tester to locate the correct wiring.

A tone generator allows you to create a tone at one end of a wire and find the other end by testing all connections at the location of the other end of the wire.

Which device sends signals from a computer onto a network? Router Transceiver Gateway Cable

A transceiver (short for transmitter/receiver) sends signals to and receives signals from the network. It translates the parallel data stream of the computer to the serial data stream of the network and vice versa. Most transceivers are now built into network interface cards (NICs).

You have a cable internet connection at home. The installer had connected the router near the outside wall of your house with RG6 cable. You move the cable router a distance of 50 meters using RG8 cables and special connector adapters. Which condition are you most likely to experience? Echo NEXT FEXT Attenuation EMI

An impedance mismatch, manifested by *echo*, occurs when you connect cables and devices that have a different impedance (resistance) rating. Impedance is mostly a factor in coaxial cables used for networking. Be sure to choose cable with the correct rating (50 or 75 ohm) based on the network type, and do not mix cables with different ratings. RG6 cables have a rating of 75 ohms, while RG-8 cables have a rating of 50 ohms.

You have a network that occupies both floors of a building. The WAN service provider has installed the line for the WAN service in a wiring closet on the main floor. You have a second wiring closet on the second floor directly above the wiring closet that holds the demarc. Which of the following terms describes the closet on the second floor? Horizontal cross connect MDF Demarc extension Vertical cross connect IDF

An intermediate distribution frame (IDF) is a wiring distribution point within a building that is smaller than the MDF. IDFs are typically located on each floor directly above the MDF, but you can place additional IDFs on each floor as necessary.

You are working with an existing fiber optic installation in your building. You want to know the length of each cable that runs through the walls. Which tool should you use? Toner probe Multimeter OTDR Smart jack

An optical time domain reflector (OTDR) sends light pulses on a cable to discover information about the cable. The results of this test can be used to: • Estimate the length of a wire. • Measure the cable impedance. • Identify locations of splices and connectors on the wire. • Identify shorts and open circuits, and the location of the fault. A TDR performs the same tests on copper cables.

Which type of polish grade uses green-colored connectors to help you keep from using the wrong connector type? Ultra Physical Contact (UPC) Angled Physical Contact (APC) Physical Contact (PC) Super Physical Contact (SPC)

Angled Physical Contact (APC) Physical Contact (PC), Super Physical Contact (SPC), and Ultra Physical Contact (UPC) connectors do not use any specific coloring designations.

You need to replace a fiber optic cable that is connecting two switches together. You inspect the existing fiber cable and determine that it uses LC connectors. You also notice the cable's ferrule has a slight slant to it. Which polish grade should you use to replace the existing cable? Flat Physical Contact polish Angled Physical Contact polish Physical Contact polish Ultra Physical Contact polish

Angled Physical Contact polish A Physical Contact (PC) polish is polished with a slight curvature. An Ultra Physical Contact (UPC) polish uses a higher grade polish and is slightly more curved than a PC polish. A Flat Physical Contact connector has little to no curvature and suffers from the most insertion loss.

When an AP is doing key functions — authentication, filtering, QoS enforcement, and so on — what is it said to be? smart thick engaged active

Anytime an AP is doing key functions—authentication, filtering, QoS enforcement, and so on—it is said to be _thick_. If it is not doing these key functions—even though it might be doing others—it is usually said to be _thin_.

You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You use a single Cat6e cable to connect the wiring closet to the shipping building. Which of the following conditions are you most likely to experience? Crosstalk Impedance mismatch Attenuation Open circuit

Attenuation is the loss of signal strength from one end of a cable to the other. The longer the cable, the more attenuation. For this reason, it is important to not exceed the maximum cable length defined by the networking architecture. In this example, the distance from the wiring closet to the other building exceeds the 100 meter maximum for Ethernet.

How do switches and bridges learn where devices are located on a network? When a frame enters a port, the destination MAC address is copied from frame header. When a frame enters a port, the source MAC address is copied from the frame header. When a frame enters a port, the destination IP address is copied from the frame header. When a frame enters a port, the source IP address is copied from the frame header.

Bridges and switches learn addresses by copying the MAC address of the source device and placing it into the MAC address table. The port number that the frame entered is also recorded in the table and associated with the source MAC address.

Which of the following topologies connects all devices to a trunk cable? Star Bus Ring Tree

Bus

While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of CRC errors on one interface. This interface is connected to a user's workstation located in a cubicle on the second floor. What could cause this to happen? An incorrect subnet mask configured on the workstation. Collisions between two or more network hosts. A strong EMI emitter near the cable run connected to that interface. Two hosts on the network with the same MAC address.

CRC errors indicate that a frame has been corrupted in transit. The CRC counter displays the number of frames received by the switch that did not pass the FCS check. On a hub-based Ethernet network, these errors are usually caused by collisions. However, because a switch is being used in this scenario, collisions can't occur. Therefore, the most likely cause is EMI or cross-talk on the UTP cabling, which can corrupt frames transmitted on the wire and cause a CRC error.

You are making Ethernet drop cables using Cat5e cable and RJ45 connectors. You need to remove the plastic coating over the cable to expose the individual wires. Which tool should you use? Needle nose pliers Snips Punch down tool Cable stripper

Cable stripper

Which of the following cable types often includes a solid plastic core that keeps the twisted pairs separated? Cat 5 Cat 5e Cat 3 Cat 6

Cat 6

RG-58 (thin) RG-8 (thick) RG-59 (short) RG-6 (long)

Coaxial cable RG-59/6 are used for cable TV

Which of the following are characteristics of coaxial network cable? (Choose three) The conductors within the cable are twisted around each other to eliminate cross-talk. It is composed of four pairs of 22-gauge copper wire. The ends of the cable must be terminated. It has a conductor made from copper in the center of the cable. It uses two concentric conductors that are made from plastic or glass and conduct light signals. It uses RJ45 connectors. It uses two concentric metallic conductors.

Coaxial cable is composed of a central copper conductor surrounded by an insulator, which is then surrounded by a second metallic mesh conductor. The name coaxial is derived from the fact that both of these conductors share a common axis. Both ends of a coaxial cable must be terminated.

Which of the following are advantages of using fiber optic cabling for a network? (Choose two) Greater cable distances without a repeater Lower installation cost Immunity to electromagnetic interference No special training or equipment is required

Compared to other types of cabling, fiber optic cabling allows greater cable distances without a repeater and is immune to electromagnetic interference. However, it is more costly, and specialized training and equipment is required for installation.

You have decided to implement Gigabit Ethernet on your network. Each switch port is connected to a single device. Following the installation, you find one device connected to a switch that is only running at 100 Mbps. Which of the following are likely causes? Crosstalk Incorrect VLAN Short Collisions Switching loop

Crosstalk is interference caused by signals within the twisted pairs of wires. For example, current flow on one wire causes a current flow on a different wire. Crosstalk and other miswiring problems typically mean that a cable does not operate at the desired standard. Use a cable certifier to verify that that cable is properly configured to support the rated speed.

Which type of problem occurs when the signals sent through media interfere with data signals on adjacent wires? Crosstalk Jamming Jitter EMI

Crosstalk occurs when the signals sent through media interfere with data signals on adjacent wires.

You are having a problem with your Cat5e cabling at the Chesterfield site. Electrical interference from outside sources are disrupting the normal flow of data in the cabling. What is this problem known as? Attenuation Crosstalk Open Short

Electrical interference from outside sources disrupting the flow of data is known as crosstalk.

With which type of STP port does every network segment have a single assigned port (the one closest to the root bridge)? Stem port Nondesignated port Root port Designated port

Every network segment is coupled with a designated port.

You have just signed up for a broadband home internet service that uses coaxial cable. Which connector type will you most likely use? BNC SC ST F-type RJ45

F-type

F-type connectors are typically used with which of the following cable standards? (Choose two) RG-6 Cat 6a RG-59 Cat 5e RG-58

F-type connectors are used with coaxial cable. They are typically used for cable TV and satellite installations using *RG-6* or *RG-59* cables.

You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have their own network segments separated by routers. Funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used multi-mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You purchased several used 1-meter multi-mode patch cables from Amazon. But when they arrived, you noticed that they use LC connectors. Fortunately, with some force, you found that you are able to get the LC connectors on the cables to lock into the MTRJ connectors on the GBIC modules and on the switch. Will this implementation work? Yes. All of the requirements for implementing a fiber optic network have been met. No. You should use a specialized backbone fiber optic switch to create a backbone network for routers. No. You should use single-mode patch cables to connect a GBIC module to a switch. No. You should purchase patch cables that use MTRJ connectors.

For light to pass through a fiber optic connector, the fiber within the jack must line up perfectly with the fiber in the connector. Using the wrong connector will result in misaligned fibers. This will disrupt the light signal, even if you are able to successfully lock the connector into the jack. In this scenario, you should purchase patch cables that use MT-RJ connectors.

HSRP (Hot Standby Router Protocol) is running on your routers and multilayer switches. It uses virtual IP and what else? MAC addresses Private keys Port states IP addresses

HSRP uses virtual IP and MAC addresses.

As data is passed up through the OSI model structure, headers are added at each layer in a process called which of the following? transposition inversion encryption encapsulation

Headers are added at each layer in a process called encapsulation.

You want to make sure there are no areas on your floor where users cannot get a wireless signal and thus you want coverage overlap of APs using non-overlapping channels. What type of pattern should you use? Triangle Square Diamond Honeycomb

Honeycomb

A host wants to send a message to another host that has the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address? BOOTP ICMP ARP DNS IGMP DHCP

Hosts use the address resolution protocol (ARP) to discover the hardware address of a host.

At which layer of the OSI model do hubs operate? Data Link Layer 3 Internet Physical

Hubs operate at Layer 1, or the Physical layer of the OSI model.

You were recently hired by a small start-up company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the current size of the company, but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power. Which cloud service model should you use? IaaS SaaS PaaS DaaS

IaaS

You have implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but do not host services of their own. What type of network do you have? Client-server Peer-to-peer Intranet Extranet

In a _client-server_ network, hosts have specific roles. For example, some hosts are assigned server roles, which allow them to provide network resources to other hosts. Other hosts are assigned client roles, which allow them to consume network resources.

Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement? Partial mesh Full mesh Star Bus

In a _partial mesh_ topology, only some redundant paths exist. A partial mesh topology is more practical and less expensive than a full mesh topology.

You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have? Client-server Peer-to-peer Multiple access Polling

In a _peer-to-peer_ network, each host can provide network resources to other hosts or access resources located on other hosts, and each host is in charge of controlling access to those resources.

You have a network that uses a logical ring topology. How do messages travel through the network? Messages are sent to a central device that forwards them to the destination devices. Messages travel from one device to the next until they reach the destination device. Messages are sent directly to the destination device only. Messages are sent to all devices connected to the network.

In a logical ring topology, messages travel to each device in turn. If the message is not intended for that device, the message is forwarded to the next device on the network.

You are installing single strand fiber and have heard that two different wavelengths can be used on the same piece of cable. Given that state of affairs, which of the following applies? Only multi-strand fiber can use different wavelengths. There is only one wavelength that is ever used by fiber. Transmitters and receivers must be matched correctly. There is no need to match transmitters and receivers.

In order for two different wavelengths to be used on the same piece of cable, transmitters and receives must be matched correctly.

Which recommendation should you follow while using 110 blocks for connecting Cat 5 and higher data cables? Connect wires using the T568B standard. Keep wire pairs twisted up to within one-half of an inch of the connector. Connect wires using the T568A standard. Use C-5 connectors.

Keep wire pairs twisted up to within one-half of an inch of the connector.

Which of the following are characteristics of an LC fiber optic connector? (Choose two) They are half the size of standard connectors. They are threaded. They use a housing and latch system similar to an RJ45 UTP connector. They can be used with either fiber optic or copper cabling. They use a one-piece bayonet connecting system.

LC fiber optic connectors are small, about half the size of other fiber optic connectors. Like an RJ45 connector, an LC fiber optic connector uses a small latch to lock the connector in a jack.

Which of the following protocols can be used to manage wireless access points remotely? WTLS LDAP LWAPP WPS

LWAPP can be used to manage wireless access points remotely. Lightweight Access Point Protocol can control multiple Wi-Fi wireless access points at once.

Which layer of the OSI model establishes, maintains, and breaks connections between two devices? (It also determines the ordering and priorities of data, and performs error checking and verification, and handles retransmissions if necessary.) Layer 2 Layer 4 Layer 5 Layer 3

Layer 4 establishes, maintains, and breaks connections between two devices. Layer 4 is UDP/TCP

A switch forwards data only to the port that connects to the destination device. It knows which port to forward it to based on which value? IP address Conf value Port number MAC address

MAC address _Hub_ forwards the data it receives to all the ports on the device, _Switch_ forwards it to only the port that connects to the destination device. via MAC address.

Which of the following is a valid MAC address? FABC.875E.9BG6 145.65.254.10 95ABC2F4.ABC5.569D.43BF AB.07.CF.62.16.BD

MAC addresses are comprised of 12 hexadecimal digits (ranging from 0-9 and A-F). They are typically represented as a three sets of four hexadecimal digits or six sets of two hexadecimal digits separated with periods.

Which of the following protocols, by default, is associated with ports 2427 and 2727? RDP SIP MGCP RTP

MGCP is associated with ports 2427 and 2727. Media Gateway Control Protocol is used for VoIP

Which of the following are characteristics of an MTRJ fiber optic connector? (Choose two) They are used with multi-fiber fiber optic ribbon cables. They must never be used with single-mode fiber-optic cables. They can be used with multi-mode fiber optic cables. They use metal guide pins to ensure accurate alignment. They use a keyed bayonet.

MTRJ connectors can be used with either multi-mode or single-mode fiber optic cabling. The connector is made from plastic and uses metal guide pins to ensure that it is properly aligned in the jack.

You are trying to explain to Evan that fragmentation is necessary because the (Fill in the blank) size is limited in IP. In other words, network transmissions that are too big to traverse the network in a single packet must be broken into smaller chunks and reassembled at the other end. Which of the following fills in that blank? TIA MTU TDM CSU

MTU size is limited in IP. Maximum Transmission Unit

You have implemented an ad hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented? Bus Tree Ring Mesh Star

Mesh

You want to implement a fault tolerant topology as you connect routers on your wide area network. Which of the following topologies meets your needs? Ring Mesh Bus Star

Mesh

Your manager has asked you to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link? Bus Star Mesh Ring

Mesh Each network device is interconnected to all other network nodes. This creates multiple data paths. If a link fails, the data has an alternate route to its destination.

You have a network that uses a logical bus topology. How do messages travel through the network? Messages are sent directly to the correct destination device. Messages travel from one device to the next until they reach the destination device. Messages are sent to a central device that forwards them to the destination devices. Messages are broadcast to all devices connected to the network.

Messages sent using a physical _bus_ topology are broadcast to all devices in the network.

Which of the following statements accurately describes how a modem works? (Choose two) It modulates digital data from a telephone network into analog data that a PC can use. It communicates over a telephone network using digital signals. It transmits digital signals over ordinary telephone copper wiring at a rate up to 128 Kbps. It demodulates analog data from a telephone network into digital PC data. It demodulates analog PC data into digital data that can be transmitted through a telephone network. It modulates digital data from the PC into analog data and transmits it on a telephone network.

Modem is shorthand for modulator/demodulator. A modem's job is to convert (or modulate) digital data from a PC into analog telephone signals and transmit them through a telephone network. Modems also receive analog data from the telephone network and convert (or demodulate) it into digital PC data.

Should you use Cat 3 cabling as a substitute for Cat 5e cabling to finish the project?

No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing cross-talk and supporting higher data rates.

What is the default amount of time nondesignated ports on an STP switch spend in the listening state? 45 seconds 20 seconds 15 seconds 30 seconds

Nondesignated ports on an STP switch spend 15 seconds in the listening state.

Spencer is completely unable to connect to the wireless network. What is a likely cause of this and one of the first things you would want to check for? Weak signal Interference Wrong SSID Overlapping channels

Overlapping channels is likely the cause of the problem, and one of the first things to check for.

Which of the following is part of a strategic security solution that provides secure authentication services to users, applications, and network devices? SSL PKI LDAP Kerberos

PKI, public key infrastructure PKI is a collection of software, standards, and policies combined to enable users from the Internet or other unsecured public networks to securely exchange data. LDAP is a protocol used to access and query compliant directory services systems such as Microsoft Active Directory. SSL is a method of securely transmitting information to and receiving information from a remote website.

Which of the following is used to terminate individual wires from a 25 pair or 100 pair cable using female RJ45 ports? 66 block Horizontal cross connect 110 block Patch panel

Patch panel A patch panel is a device that typically connects individual stranded wires into female RJ45 connectors. For example, you might connect 4 pairs of wires from a punch down block to a port on the patch panel. On the patch panel, you then connect drop cables (cables with RJ45 connectors) to the patch panel on one end and a computer on the other end.

At what layer of the OSI model do time domain reflectometers operate? presentation session application physical

Physical TDR = Time Domain Reflectometer TDRs work at the physical layer of the OSI model, sending a signal through a length of cable, looking for cable faults. Other answer choices are OSI layers above the physical layer and thus higher than that at which time domain reflectometers operate.

You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for heating and air conditioning. You would like to run your Ethernet cables in this area. Which type of cable must you use?

Plenum rated cable

You want to put a stop to a routing loop in your network by implementing a split horizon. Which of the following can make this possible? Header snatching Poison reverse Jamming Banner grabbing

Poison reverse makes it possible to stop a routing loop with a split horizon.

Redundancy is the name of the game at your company. You are wanting to configure one of your switches to make a copy of the traffic on one port and send that traffic out another port to be able to record it. Which switch feature will make this possible? Port imaging Port mirroring Port ghosting Port emulation

Port mirroring copies traffic from one port to another.

Which key is the secret half of a cryptographic key pair that is never transmitted over a network? open private public restricted

Private A _private key_ is the secret half of a cryptographic key pair used with a public key algorithm. The private part of the public key cryptography system is never transmitted over a network. A _public key_ is a nonsecret key that forms half of a cryptographic key pair used with a public key algorithm. The public key is freely given to all potential receivers. The other answer choices are incorrect terms for the private key.

You are working with 25 pair wires and 66 blocks. You have pushed the wires onto the 66 block, but now you need to cut off the excess end of each wire. Which tool should you use? Needle nose pliers Snips Cable stripper Punch down tool

Punch down tool Use a punch down tool to push wires into 66 or 110 blocks and cut wires at the same time. The punch down tool has a blade on one side that cuts off the excess wires.

Which of the following protocols resolves MAC addresses to IP addresses? RARP LWAPP BACP LDAP

RARP resolves MAC addresses to IP addresses. (Reverse) Address Resolution Protocol

You have a small home network connected to the internet using an RG-6 cable. You need to move the router connecting the network to the internet, but can't find any RG-6 cable. Which cable types could you use instead? RG-58 Cat 3 Cat 5e RG-59

RG-6

Which of the following cables offers the best protection against EMI? RG-6 Cat 5 Cat 5e Cat 6a

RG-6 Coaxial cable offers better protection against EMI than twisted pair cables. Coaxial cable has a mesh conductor, which provides a ground and protects against EMI.

Which of the following connector types are used with UTP cables? (Choose two) RJ45 SC RJ11 BNC F-Type

RJ11 and RJ45 connectors are used with UTP (unshielded twisted pair) cables.

Which of the following connectors is used with Ethernet 100BaseT networks? RJ45 ST RJ11 BNC

RJ45

Which of the following connector types would you most likely use to connect to a T1 WAN service? GG45 RJ45 RJ48c RJ11

RJ48c The RJ48c connector is similar to an RJ45 connector, but has different pin-outs.

In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device? Star Tree Ring Bus

Ring

Which of the following topologies connects each device to a neighboring device? Star Tree Ring Bus

Ring Each device connects to a neighboring device so that a ring is formed.

Which of the following allows files to be copied securely between two systems, using Secure Shell (SSH) technology to provide encryption services? SCP TFTP IGMP CCIP

SCP allows files to be copied securely between two systems, using Secure Shell (SSH) technology to provide encryption services. Secure Copy Protocol

Which of the following protocols is an application-layer protocol designed to establish and maintain multimedia sessions such as Internet telephony calls? RIP SIP SCP RTP

SIP is an application-layer protocol designed to establish and maintain multimedia sessions. Session Initiation Protocol

Which of the following connectors is used with fiber optic cables and requires that you use a twisting motion to connect it? ST LC SC

ST

Which of the following connectors usually require polishing as part of the assembly process? (Choose two) F-type BNC ST SC

ST, SC The fiber optic cable assembly process is more complex than other assemblies. It is necessary to polish the exposed fiber tip to ensure that light is passed from one cable to the next with minimal dispersion.

An eight-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do? Send the frame out all eight ports. Send the frame out ports two through eight. Drop the frame. Send the frame out the destination port.

Send the frame out ports two through eight. Because the switch does not know the port that is used to reach the destination device, it will send the frame out all ports except for the port on which the frame was received. After the switch learns the port that is used to reach the destination device, it will send the frame out only that port.

You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wall to hang a picture and pierces the cable so that a signal sent on pin 1 arrives on the cable connected to pin 7. Which term describes this condition? Split pair Crosstalk Open circuit Short circuit Attenuation

Short circuit An electrical short occurs when electrical signals take a path other than the intended path. In the case of twisted pair wiring, a short means that a signal sent on one wire might arrive on a different wire.

Which type of optical fiber is normally used to connect two buildings that are several kilometers apart? Multi-mode Single-mode Fibre Channel mode Dual-mode

Single-mode Single-mode consists of a single very thin core, which produces fewer reflections. This provides greater effective bandwidth over greater distances.

Of the following cables, which offer the best protection against EMI? Cat 5 Cat 5e Single-mode fiber optic RG-6

Single-mode Fiber optic cables offer the best protection against electromagnetic interference (EMI).

Which of the following is true about single-mode fiber optic network cabling? Single-mode cabling supports shorter segment lengths than multi-mode fiber optic cabling. The central core is composed of braided plastic or glass fibers. Single-mode fiber optic cabling is less expensive than multi-mode cabling. The central core is smaller than standard multi-mode fiber optic cabling core.

Single-mode fiber optic cabling provides one path (or mode) for the light to travel. It supports longer transmission distances than multi-mode fiber optic cable, and it's also more expensive. Single-mode cabling also has a central core that is much smaller than standard multi-mode fiber optic cabling core.

You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single-mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You connect each module to the switch with 1-meter multimode patch cables. Will this implementation work? No. You should not use standard fiber optic switches to create a backbone network for routers. Yes. All of the requirements for implementing a fiber optic network have been met. No. You shouldn't use multi-mode patch cables with single-mode GBIC modules. No. You should purchase fiber optic equipment that use FC connectors.

Some GBIC/SFP modules use multi-mode fiber, while others use single-mode. You must use the correct type of fiber optic cable and connector required by the specific adapter. You cannot mix and match different types of cable. In this scenario, connecting a single-mode GBIC to multi-mode fiber will introduce a catastrophic signal loss of up to 99%.

Which of the following topologies connects each network device to a central hub? Star Bus Ring Mesh

Star

What device is used to create a physical star topology? Firewall Switch Router Bridge

Switch (or Hub)

A switch is associated with which OSI model layer? Physical Data Link Network Transport

Switches are associated with the Data Link layer of the OSI model. Switches examine the device address in the packet and forward messages directly to that device.

Which of the following best describes how a switch functions? It connects multiple cable segments (or devices) and forwards frames to the appropriate segment. It connects multiple segments of different architectures. It translates frames and forwards them to the appropriate segment. It connects multiple segments of different architectures. It translates frames and broadcasts them to all of its ports. It connects multiple cable segments (or devices) and broadcasts frames to all of its ports.

Switches have multiple ports and can connect multiple segments or devices. The switch forwards frames to the appropriate port. They function similarly to a hub, except instead of sending packets to all ports, switches send packets only to the destination computer's port.

Which type of multiplexing is commonly used with baseband networks? TDM GBIC QSFP FDM

TDM Baseband uses time-division multiplexing (TDM) which divides a single channel into time slots. Broadband uses frequency-division multiplexing (FDM) which allows broadband media to accommodate traffic going in different directions on a single medium at the same time.

arp and options arp -a arp -d traceroute arp -s

The -a option is used with arp to display entries in the routing table. -d option is used to delete an entry, -s is used to add an entry. traceroute is a UNIX/Linux utility for tracing the route from one host to another.

Which of the following are included as part of Data Link layer specifications? (Choose two) Synchronizing individual bits as they are transmitted through the network. Composing electrical signals as they pass through the transmission medium. Identifying physical network devices. Controlling how messages are propagated through the network.

The Data Link layer controls _device identification_ on networks, as well as _how messages travel through the network_ (the logical topology).

Which of the following is true about the MAC address? (Choose two) It is a 64-bit address. It is a 32-bit address. It is a 48-bit address. It is typically represented by hexadecimal numbers.

The MAC address identifies the physical address of the network adapter. The MAC address is a 12-digit (48-bit) hexadecimal number (each number ranges from 0-9 or A-F). The address is often written as 00-B0-D0-06-BC-AC or 00B0.D006.BCAC, although dashes, periods, and colons can be used to divide the MAC address parts.

In the OSI model, what is the primary function of the Network layer? Routes messages between networks Allows applications to establish, use, and end a connection Transmits data frames Ensures that packets are delivered with no loss or duplication

The Network layer is responsible for routing messages between networks.

What is the basic purpose of the OSI Physical layer? Coordinates rules for routing packets. Coordinates rules for managing network servers. Defines basic physical structures, such as disks. Coordinates rules for transmitting bits.

The OSI Physical layer coordinates _rules for transmitting bits._

You want to use the T568B standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector? White/orange, orange, white/green, green, white/blue, blue, white/brown, brown White/green, green, white/orange, blue, white/blue, orange, white/brown, brown White/orange, orange, white/green, blue, white/blue, green, white/brown, brown White/blue, blue, white/orange, orange, white/green, green, white/brown, brown

The T568B standard uses the following order of wires in the connector: white/orange, orange, white/green, blue, white/blue, green, white/brown, brown.

Which of the following functions are performed by the OSI Transport layer? (Choose three) Consistent data formatting between dissimilar systems Format packets for delivery through the media Reliable message delivery End-to-end flow control Path identification and selection Data segmentation and reassembly Control media access, logical topology, and device identification

The Transport layer is responsible for breaking upper-layer data into segments and allowing reliable communications through end-to-end flow control, error detection, and error correction. TCP/UDP

You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service in a wiring closet on the main floor. You have a second wiring closet on the main floor. You need to connect the two wiring closets. Which of the following are typically used to connect the two wiring closets? (Choose two) Vertical cross connect Horizontal cross connect Demarc extension 25 pair

The demarcation point (demarc) is the line that marks the boundary between the telco equipment and the private network or telephone system. A demarc extension extends the demarcation point from its original location to another location within the building. A smart jack is a special loopback plug installed at the demarcation point for a WAN service. Technicians at the central office can send diagnostic commands to the smart plug to test connectivity between the central office and the demarc.

Which of the following terms identifies the wiring closet in the basement or a ground floor that typically includes the demarcation point? Horizontal cross connect MDF 110 block Smart jack

The main distribution frame (MDF) is the main wiring point for a building. The MDF is typically located on the bottom floor or basement. The LEC typically installs the demarc to the MDF.

Which network component connects a device to transmission media and allows the device to send and receive messages? Server Client Protocol Peripheral Network interface card

The network interface card (NIC) allows a device to send and receive messages over the transmission media.

What is the STP port cost if your link speed is 1 Gbps? 100 4 19 2

The port cost is 4 for a link speed of 1 Gbps. Port Speed Default Cost Value 10 Mbps 100 100 Mbps 19 1 Gbps 4

A number of telecommuters report a problem that occurs when they go to download the training videos HR has thrust on everyone. The videos will begin to download quickly and then immediately slow to a crawl and take hours to finish installing locally. What is the likely cause of this? Utilization limits NIU Throttling Blocking

Throttling

To create secure data transmissions, IPsec uses which two separate protocols? AH and ESP EIGRP and IGRP AH and IGRP EGP and BGP

To create secure data transmissions, IPsec uses two separate protocols: _Authentication Header (AH)_ and _Encapsulating Security Payload (ESP)_.

You need to configure multiple VLANs over a single connection. What is this type of connection known as? Tree Ring Trunk Check

Trunk

Which pins in an RJ45 connector are used to transmit data when used on a 100BaseT Ethernet network?

Tx: 1 & 2 Rx: 3 & 6

You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BaseTX switch ports. Which device should you use? Hub Bridge Repeater Media converter Gateway

Use a media converter to convert from one media type to another media type within the same architecture.

You are preparing to attach wires in a 110 block. You want to connect the wires and trim off the excess at the same time. Which of the following should you do? (Choose two; each answer is part of the complete solution) Use a punch down tool with a straight blade. Point the cut side of the tool towards the wire end. Point the cut side of the tool towards the connected end of the wire. Use a punch down tool with a notched blade.

Use a punch down tool to connect wires to a 110 or 66 block. When using a punch down tool, choose the right blade for the job: • Use a notched blade for a 110 block. • Use a straight blade for a 66 block. • For both blade types, you can use the end without a cutting blade if you want to punch down without cutting the wire. When using the cutting blade, point the cut side of the punch down tool towards the wire end that you want to trim.

Which of the following methods would you use to create a crossover cable? Use the T568A standard. Use the T568B standard. Use the T568A standard on one connector and the T568B standard on the other connector. Use the T568B standard on one connector and the BLOG convention on the other connector. Use the BLOG convention. Use the T568A standard on one connector and the BLOG convention on the other connector.

Use the T568A standard on one connector and the T568B standard on the other connector.

Which of the following protocols allows a VLAN created on one switch to be propagated to other switches? NAC LACP VTP LWAPP

VTP VLan Trunking Protocol

You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor. What would you use to connect the wiring closets together? Vertical cross connect Demarc extension Horizontal cross connect Smart jack

Vertical cross connect A vertical cross connect joins the main distribution frame (MDF) on the main floor to intermediate distribution frames (IDFs) on upper floors. Cabling runs vertically (up and down) between the MDF and the IDFs.

When would you typically use an RJ11 connector? When using single-mode fiber optic cables When using Cat 3 cables When connecting a phone to a phone line When using RG-6 cables When using Cat 5 or higher cables When using multi-mode fiber optic cables

When connecting a phone to a phone line RJ11 connectors are typically used for telephones and modems.

Which of the following describes the point where the service provider's responsibility to install and maintain wiring and equipment ends, and the customer's responsibility begins? Demarc Vertical cross connect Punch down block IDF

When you contract with a local exchange carrier (LEC) for data or telephone services, they install a physical cable and a termination jack onto your premises. The demarcation point (demarc) is the line that marks the boundary between the telco equipment and the private network or telephone system. Typically, the LEC is responsible for all equipment on one side of the demarc, and the customer is responsible for all equipment on the other side of the demarc.

You are connecting Cat 5e cables to a 110 block. What order should you connect the wires in to follow standard wiring conventions? White/blue, blue, white/orange, orange, white/green, green, white/brown, brown White/orange, orange, white/green, blue, white/blue, green, white/brown, brown White/green, green, white/orange, blue, white/blue, orange, white/brown, brown White/brown, brown, white/blue, blue, white/orange, orange, white/green, green

White/blue, blue, white/orange, orange, white/green, green, white/brown, brown When connecting data wires on a 110 block, you typically connect wires in the following order: • White wire with a blue stripe followed by the solid blue wire. • White wire with an orange stripe followed by the solid orange wire. • White wire with a green stripe followed by the solid green wire. • White wire with a brown stripe followed by the solid brown wire. Use BLOG (blue-orange-green) to remember the wire order, and remember to start with the white striped wire first.

You want to use the T568A standard to add connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector? White/orange, orange, white/green, green, white/blue, blue, white/brown, brown White/orange, orange, white/green, blue, white/blue, green, white/brown, brown White/blue, blue, white/orange, orange, white/green, green, white/brown, brown White/green, green, white/orange, blue, white/blue, orange, white/brown, brown

White/green, green, white/orange, blue, white/blue, orange, white/brown, brown

The vice president of IT wants someone to come to his newly purchased house and figure out why he can't get a wireless signal from his AP when he steps outside. Which of the following could be a likely culprit in this situation? Stucco siding Window film Wood decking SSID mismatch

Window film is a likely culprit of the blocked access point.

Why might you use an RJ11 connector? You want to test a network cable to see if there is a break in the line. You want to upgrade your 10BaseT network to 100BaseTX. You want to connect your computer to the internet with a DSL modem. You want to connect the 10BaseT network card in your computer to a switch.

You want to connect your computer to the internet with a DSL modem. RJ11 connectors are typically used for telephones and modems.

Your company purchases a new bridge that filters packets based on the MAC address of the destination computer. On which layer of the OSI model is this device functioning? Data Link Session Transport Presentation

he bridge is operating at the Data Link layer.

Which of the following switches can be used with nslookup to ask for a recursive answer to the query? vc search recurse defname

recurse The recurse switch asks for a recursive answer to the query (IDC)

You have been summoned to the server room to work on a critical connectivity problem and told to make a crossover cable for a hub. In such a cable, which wires are crossed? wires 4 and 5 and wires 7 and 8 wires 1 and 6 and wires 2 and 7 wires 2 and 3 and wires 5 and 6 wires 1 and 3 and wires 2 and 6

wires 1 and 3 and wires 2 and 6


Conjuntos de estudio relacionados

HTML Elements and Structure - Introduction to HTML 1.1

View Set

Evaluating Global Warming Midterm

View Set

WEEK 3: Opportunity Costs, Production Possibilities, Supply, and Demand

View Set

Period 2: The Protestant Reformation and State Rivalries

View Set

Process Technology Safety, Health, and Environment

View Set

Hospitality Marketing Chapter 5 Quiz

View Set