Network Pro Ch 9.2, Network+ Domain 4: Troubleshooting, part 3 network exam, 10.7.9 Practice exam, CompTIA Network+ Certification, CompTIA Network+ Certification Practice Test 1, CompTIA Network+ Certification Practice Test 3, CompTIA Network+ Certif...

¡Supera tus tareas y exámenes ahora con Quizwiz!

MAN

A computer network connecting multiple LANs over an area of a city or campus

WAN

A computer network connecting multiple smaller networks over very large geographical areas

DB-9/DE-9

A connector with ether 9 pins or 9 holes. Used for peripheral devices, PCs and Servers.

iSCSI

A data transfer protocol for linking data storage components over a network

Packet sniffer Protocol analyzer

A dedicated software tool used to monitor and examine contents of network traffic

Router

A device designed to filter and transfer data packets between dissimilar types of computer networks is called:

Cable Tray

A device for organizing cable runs in a drop ceiling.

Coupler

A device used for the purpose of extending the length of various types of network cable runs.

RAS

A dial-up or VPN connection allowing remote users to access corporate network requires what type of service?

Load Balancer

A network device designed for managing the optimal distribution of workloads across multiple computing resources is called:

Star topology

A network topology in which each node connects to a central device

Ring topology

A network topology in which each node connects to exactly two other nodes

Full mesh

A network topology in which each node has a direct physical connection to every other node

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is known as:

Accounting

VTC

Acronym which refers to a solution that enables simultaneous two-way video and audio transmissions between multiple networked hosts

True

"Metro-ethernet" is a general term for a computer network larger than a local area network (LAN) and based on ethernet standards.

Which of the following answers lists the default (classful) subnet mask for a class C network? 255.255.192.0 255.255.224.0 255.255.255.0 255.255.252.0

255.255.255.0

An IPv4 address consists of: 32 bits 48 bits 64 bits 128 bits

32 bits

OC-768

40 Gbps

Which of the following answers lists the number of connections in a full mesh network consisting of 10 nodes? 21 28 36 45

45

OC-1

51.84 Mbps

OC-12

622.08 Mbps

What must you install between your network and a T1 line for your network to use the T1 line?

CSU/DSU

IP/SIP ISDN

Examples of technologies used for implementing VTC solutions

You have just connected four new computer systems to an Ethernet switch using spare patch cables. 3 out of 4 of are working. You replace the nic, but still no connection. what could be the possible cause?

Failed patch cable

Which of the following answers apply to smurf attack? (Select 3 answers) IP spoofing Privilege escalation DDoS Polymorphic malware Order of volatility Large amount of ICMP echo replies

IP spoofing DDoS (distributed denial-of-service) Large amount of ICMP echo replies

Which of the following solutions are used for implementing VPNs?

IPsec, GRE, SSL/TLS, PPTP

The DNS database AAAA record creates a pointer that maps a hostname to:

IPv6 address

0:0:0:0:0:0:0:1 ::1

IPv6 loopback addresses

Cross-talk

In twisted-pair cabling, wires are grouped into pairs, and wires in each pair are twisted around each other in order to reduce this.

A technology that allows for prioritizing certain types of network traffic in order to improve the overall network effectiveness and performance is known as: (Select best answer)

Packet shaping

Which of the following solutions provide(s) the AAA functionality? (Select all that apply)

RADIUS, TACACS

Which of the following solutions provide(s) the AAA functionality?

RADIUS, TACACS+

True or false Category 3 (CAT3) cable is a 10 Mbps twisted-pair copper cable used in telephone wiring.

True

True or false A mechanism that allows for connecting one set of wires with another set of wires in telecommunications closets or local area networks (LANs) is commonly referred to as a punch-down block

True

True or false Materials from which the plenum-rated cable's cover is made include low-smoke polyvinyl chloride (PVC) and fluorinated ethylene polymer (FEP).

True

True or false One of the differences between the UTP and STP cabling is that STP cable takes advantage of additional protective cover reducing signal interference from outside sources.

True

ISDN

Which of the following solutions allows for simultaneous digital transmission of voice, video, Data, and other network services over a PSTN?

Which TCP/IP utility gives you the following output? Interface: 192.168.4.101 on Interface 0x3 Internet Address Physical Address Type 192.168.1.23 00-d1-b6-d7-c2-af dynamic

arp this output is displayed when you use the arp command to look at ARP cache

What shows the current entries in the computer's ARP cache?

arp-a

Capturing packets as they travel from one host to another with the intent of altering the contents of the packets is a form of which security concern?

man-in-the-middle attack

Smurf attack

Network attack type which exploits broadcast traffic

VRRP

Networking protocol which enables creation of virtual routers

SNMP

a protocol used in network management systems for the monitoring of network-attached devices

Virtualization

a solution that allows multiple operating systems to work simultaneously on the same hardware

UC server Unified communications

a system/infrastructure that integrates various types of voice, video, and data services in a single user interface

Rollover / Yost

a type of null-modem cable that is often used to connect a computer terminal to a router's console port.

straight-through cable AKA Patch Cable

a type of twisted pair cable that is used in local area networks to connect a computer to a network hub such as a router.

transport layer OSI model

acts as a dividing line between the upper and lower layers; TCP/UDP; ICMP

during a network infrastructure upgrade, you have replaced two 10 Mbps hubs with switches and upgraded from Category 3 UTP cable to CAT5e during the process, you accidentally cut the Cat 5e patch cable that stretches from the network printer to the upgraded switch. What is the impact

all network nodes, with the exception of the printer, will be available

Load balancer

A network device designed for managing the optimal distribution of workloads across multiple computing resources

Coupler

A small device for connecting two cables to make a longer cable

An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to as:

AP - Access Point (AP)

Which of the following answers refer to solutions used for controlling the light signal at a termination point of a fiber-optic connection? (Select 2 answers) APC SCP UPC AUP DLP

APC UPC

True

APIPA-assigned addresses are valid only for communications within a network segment that a given host is connected to (a host with APIPA-assigned address cannot connect to the Internet).

Which exploit seeks to maliciously re-associate the IP address of a legitimate network host with the MAC address of the attacker's computer.

ARP Poisoning ARP spoofing (also known as ARP poisoning) uses spoofed ARP messages to associate a different MAC address with an IP address. ARP spoofing can be used to perform a man-in-the-middle attack.

Which of the following exploits takes advantage of the spoofed MAC address? Bluejacking DNS poisoning MAC filtering ARP poisoning

ARP poisoning Is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.

An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to as: Demarc Access Point (AP) Intermediate Distribution Frame (IDF) Active hub

Access Point

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:

Accounting

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called: Authentication Authorization Accounting

Accounting

SONET networks are most often based on: Star topology Bus topology Dual ring topology Mesh topology

Dual ring topology

A user reports that network access from her workstation is very slow. The problem does not seem to be affecting any other users. Which of the following conditions is the most likely cause?

Duplex mismatch

Which of the following connector types are used for connecting devices to a RS-232 port? (Select 2 answers) RJ-11 DB-9/DE-9 ST RJ-48C DB-25 LC

DB-25 DB-9/DE-9

An IPv4 address in the range 169.254.1.0 through 169.254.254.255 indicates a problem with what type of service? SNMP DNS SMTP DHCP

DHCP

Which of the following solutions provides an alternative to manual assignment of IP addresses?

DHCP

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as for example numerical IP addresses?

DNS

What output shows you the results of four echo request/reply contacts with destination host?

Ping

UDP Segment Format

Source Port, Destination Port, UDP Length, UDP Checksum

4G

Standard LTE.

/27

The CIDR notation of the 255.255.255.224 subnet mask

partial mesh topology

selected sites are interconnected via direct links while sites with less frequent communication can communicate via another site; benefits: provides optimal routes for sites with higher intersite traffic volumes, more redundant than a hub-and-spoke topology; drawbacks: less fault tolerant than a full mesh topology, more expensive than a hub-and-spoke topology

server

serves up resources to a network

BIOS Firmware

types of software embedded into a hardware device

WAN

wide area network; interconnects 2 geographically dispersed locations; ex) a corporate headquarters and a remote office site

Consider the 850 nm multimode fiber optic cable shown below. How much loss can you expect between the transmitter and the receiver? ----------------------- Connectors ----------------------- Transmiter <------ 200 meters ------> Receiver

-1.2 dB When calculating a loss budget for a segment of fiber optic cable, use the following guidelines: • Connectors = 0.3 dB loss each • Splices = 0.3 dB loss each • Multimode cabling = 3 dB loss per 1000 meters (850 nm) or 1 dB loss per 1000 meters (1300 nm) • Single mode cabling = 0.5 dB loss per 1000 meters (1310 nm) or 0.4 dB loss per 1000 meters (1550 nm) In this scenario, there are two connectors (0.3 dB loss each) and 200 meters of 850 nm multimode cable (.2 * 3 dB) for a total expected loss of 1.2 dB. Note that dirty or poorly polished connectors can dramatically increase the amount of loss in the cable.

Which of the following answers lists the CIDR notation of the 255.255.255.224 subnet mask? /25 /26 /27 /28

/27

TCP/IP Model

1. Network Interface; aligns with Physical and Data Link 2. Internet; aligns with Network 3. Transport; aligns with Transport 4. Application; aligns with Session, Presentation, and Application

OSI model

1. Physical - bits 2. Data Link - frames 3. Network - packets 4. Transport - segments 5. Session 6. Presentation 7. Application

OC-24

1.244 Gbps

OC-192

10 Gbps

What is the first valid host address for a node residing in the 10.119.136.143/20 network? 10.119.96.1 10.119.128.1 10.119.132.1 10.119.136.1

10.119.128.1

What is the typical cable segment length for a copper twisted-pair Ethernet cable? 33 meters 55 meters 100 meters 250 meters

100 meters

Ephemeral ports

1023 and above

Well-known ports

1023 and below

Which of the following answers lists the binary notation of the decimal number 192? 10101100 11000000 01111111 10101000

11000000

What is the leading octet value range for an IPv4 address belonging to a class B network? 128 - 191 1 - 126 192 - 223 224 - 239

128 - 191

OC-256

13.271 Gbps

What is the network address for a 154.24.67.147/22 host? 154.24.48.0 154.24.60.0 154.24.62.0 154.24.64.0

154.24.64.0

An OC-3 line supports transmission rates of up to: 1.544 Mbps 51.84 Mbps 44.736 Mbps 155.52 Mbps

155.52 Mbps

OC-3

155.52 Mbps

Which of the following answers lists an example of an APIPA address? 192.168.0.3 127.0.0.1 169.254.10.20 65.55.57.27

169.254.10.20

Which of the following answers lists the decimal notation of the binary number 10101100? 168 172 192 255

172

Which of the following answers lists the broadcast address for the 192.168.50.155/20 network? 192.168.31.255 192.168.47.255 192.168.63.255 192.168.79.255

192.168.63.255

Frequency bands used by 802.11 networks include: (Select 2 answers) 5.0 GHz 5.4 GHz 2.0 GHz 2.4 GHz

2.4 GHz 5.0 GHz

OC-48

2.488 Gbps

Which of the following answers refer to the IPv4 multicast address block? (Select 2 answers) 128 - 191 Class B 192 - 223 Class C 224 - 239 Class D

224 - 239 Class D

Which of the following answers lists the default (classful) subnet mask for a class A network? 255.0.0.0 255.128.0.0 224.0.0.0 255.224.0.0

255.0.0.0

Which of the following answers lists the default (classful) subnet mask for a class B network? 255.252.0.0 255.255.0.0 255.248.0.0 255.224.0.0

255.255.0.0

Which of the answers listed below refers to the maximum data transfer rate of an OC-12 connection? 622.08 Mbps 1244.16 Mbps 2488.32 Mbps 9953.28 Mbps

622.08 Mbps

An IPv4 to IPv6 transition mechanism that allows IPv6 packets to be transmitted over an IPv4 network is known as: 6to4 802.3af eDiscovery Miredo

6to4

Modified older wireless standards that allow complaint devices to achieve higher speeds include: (Select all that apply) 802.11x 802.11a-ht 802.11ac 802.11g-ht

802.11a-ht 802.11g-ht

After installing a new 2.4GHz cordless phone system in your office, you notice that wireless network performance is adversely affected. Which of the following wireless networking standards are you most likely to be using? (Select two.)

802.11b 802.11g

Which of the following specifications identiy security that can be added to wireless networks? 802.11a 802.3 802.11i 802.5 802.1x

802.11i 802.1x

Port-based network access control

802.1X is an IEEE standard for implementing this

Which of the DNS database records listed below returns a 32-bit IPv4 address?

A

Category 3 (CAT3) cable

A 10 Mbps twisted-pair copper cable used in telephone wiring.

Medianet

A Cisco network architecture designed to improve the performance of video and rich-media applications

VTP

A Cisco-proprietary protocol for distributing VLAN information across the network

RS-232

A EIA standard for connecting serial devices. It supports DB-25 and DB- 9 connectors

PAT

A Network Address Translation (NAT) method that binds a combination of private IP address and port number with a corresponding public IP address and port information

what is a broadcast storm?

A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth.

Software as a Service (SaaS)

A cloud computing infrastructure offering a remote access to applications and pricing based on monthly or annual subscription fee

Software as a Service (SaaS)

A cloud computing infrastructure type where applications are hosted over a network (typically Internet) eliminating the need to install and run the software on the customer's own computers

Autonomous system

A collection of IP networks and routers under the control of one administrative entity

Hybrid topology

A combination of two or more different basic network topologies.

ipconfig /all

A command-line command used to display MAC address in MS Windows

device driver

A computer program/code that provides software interface to hardware devices enabling operating systems and other computer programs to interact with the device

RJ-45

A connector commonly seen withEthernet cables and networks

True

A device that apart from the function of an ordinary network switch can also provide additional functions at higher levels of the OSI reference model is known as a multilayer switch. True/False

logical network diagram

A document which describes the way information flows through a network

What describes a man-in-the-middle attack?

A false server intercepts communications from a client by impersonating the intended server.

TTL

A field in an IP datagram that specifies how many more hops a packet can travel before being discarded

"Metro-Ethernet"

A general term for a computer network larger than a Local Area Network (LAN) and based on Ethernet standards.

Autonomous System Number (ASN)

A globally unique number allocated for a collection of networked systems that operate common routing protocols and are under control of a single administrative authority.

Fibre Channel (FC)

A high-speed network technology primarily used to connect computer data storage

DMZ

A lightly protected subnet placed on the outside of the company's firewall consisting of publicly available servers

Static route

A manually-configured routing entry

Punch-down block

A mechanism that allows for connecting one set of wires with another set of wires in telecommunications closets or local area networks (LANs).

Multiplexing

A method that allows to combine multiple analog or digital data streams for transmission over a shared medium is known as:

Multiplexing

A method that allows to combine multiple analog or digital data streams for transmission over a shared medium.

BNC

A miniature quick connect/disconnect radio frequency connector used for coaxial cable.

Honeypot

A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker's attention from the corporate network

Leased line

A more costly alternative to VPN.

LAN

A network connecting computers within a small geographical area such as a building or group of buildings

Media converter

A network link consisting of two dissimilar media types requires an intermediary device known as this.

CSMA

A network protocol providing means for controlling access to a transmission medium

Frame Relay

A packet switching protocol for connecting devices on a WAN. It supports T-1 and T-3 speeds

Wire Stripper

A pair of opposing blades much like scissors or wire cutters. The addition of a center notch makes it easier to cut the insulation without cutting the wire

HIDS

A security solution implemented on an individual computer monitoring that specific system for malicious activities or policy violations is referred to as:

Routing table

A set of rules stored on a Layer 3 switch or a networked host that allows to determine the topology of the surrounding network

OCX

A set of signal rate multiples for transmitting digital signals on optical fiber. This is included in SONET

Jumbo frame

A single non-standard Ethernet frame that allows for larger maximum payload size

collision

A situation in which two or more demands are made simultaneously on equipment that can handle only one at any given moment

Hypervisor

A software application used to manage multiple guest operating systems on a single host system

Agent

A software module on a managed device that sends SNMP notifications to the managing station

Web service

A software solution designed to enable interaction between two devices over a network is generally referred to as:

PoE IEEE 802.3af

A solution that allows to supply electricity over standard Ethernet cables

Route aggregation

A solution used to optimize and decrease the size of a routing table

Route redistribution

A solution used to translate routing information between routers configured to use different routing protocols

ISDN

A solution which allows for simultaneous digital transmission of voice, video, data, and other network services over a PSTN.

Plenum-rated cabling

A special type of cabling with a fire-retardant jacket placed inside the space between structural floor and dropped ceiling or inside walls.

RS-232 standard

A standard for serial communication transmission of data. It formally defines the signals connecting between a DTE (data terminal equipment) such as a computer terminal, and a DCE (data circuit-terminating equipment or data communication equipment), such as a modem.

While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of CRC errors on one interface. This interface is connected to a user's workstation located in a cubicle on the 2nd floor. What could be causing this to happen?

A strong EMI emitter near the cable run connected to that interface.

Trunk port

A switch port configured to pass all the data, regardless of the VLAN number, between all switches on a LAN

ATM

A switching technique used by telecommunication networks that uses asynchronous time-division multiplexing to encode data into small, fixed-sized cells.

System & Network Integrated Polling Software (Snips)

A system and network monitoring software that runs on Unix systems and can monitor network and system devices.

VPN

A system that uses public network (e.g. Internet) as a means for creating private encrypted connections between remote locations is known as:

Packet shaping

A technology that allows for prioritizing certain types of network traffic in order to improve the overall network effectiveness and performance is known as:

Cable Certifier

A tool used to verify that a cable meets its specifications such as the bandwidth and frequency

Plenum

A type of enclosed space in a building (such as the one between a dropped ceiling and the structural ceiling) used for air handling.

Plenum

A type of enclosed space in a building used for air handling

PAN

A type of limited-range computer network used for data transmission among various types of personal devices centered around a single workstation

WLAN

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other

Multicast

A type of network traffic intended for a particular group of hosts

Unicast

A type of network traffic intended for a single host identified by a unique IP address

Syslog server

A type of server used for collecting system messages from networked devices

Optical Time-Domain Reflectometer (OTDR)

A type of specialized cable tester that allows for locating faults and breaks in fiber-optic cabling.

Full duplex

A type of transmission that takes place in two directions simultaneously

FE80::2AA:0:4C00:FE9A

A valid address of FE80:0000:0000:0000:02AA:0000:4C00:FE9A after compression

Management Information Base (MIB)

A virtual database included in an SNMP-compliant device, containing information about configuration and state of the device that can be queried by the SNMP management station.

What is the main difference between a worm and a virus?

A worm can replicate itself and does not need a host for distribution.

You manage the two-location network shown in the exhibit. Workstations and servers at each location connect to a patch panel using behind-the-wall wiring. The patch panel then connects network hosts to one of three 1000BASE-T switches. Routers are implemented at each location to connect the two networks together using a private WAN. The switch ports have auto-MDIX disabled. Drag the cable type on the left to the most appropriate network location on the right. Each cable type can be used more than once. Laptop ---cable A---> Switch ---cable B---> Patch Panel ---cable C--> Server ---cable D for 2 kms?---> Server ---cable B---> Patch Panel ---cable C--> Switch ---cable A---> PC

A. Drop cables Cat 6 straight-through UTP B. Patch cables Cat 6 straight-through UTP C. Uplink cables Cat 6 crossover UTP D. WAN cable Single-mode fiber optic

ICS

Acronym which refers to a general term used for a system providing the capability for remote control, real-time monitoring, and gathering information related to industrial equipment

SIEM

Acronym which refers to a technology that allows for real-time analysis of security alerts generated by network hardware and applications

A wireless networking topology in which client devices communicate directly with each other without the use of a controlling Access Point (AP) is known as: (Select 3 answers) Service Set Identifier (SSID) Ad hoc mode Independent Basic Service Set (IBSS) Peer-to-peer mode Infrastructure mode

Ad hoc mode Independent Basic Service Set (IBSS) Peer-to-peer mode

Your Cisco router has three network interfaces configured: • S0/1/0 is a WAN interface that is connected to an ISP. • F0/0 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. • F0/1 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. You have configured an access control list on this router using the following rules: • deny ip 192.168.1.0 0.0.0.255 any • deny ip 192.168.2.0 0.0.0.255 any These rules will be applied to the WAN interface on the router. Your goal is to block any IP traffic coming in on the WAN interface that has a spoofed source address that makes it appear to be coming from the two internal networks. However, when you enable the ACL, you find that no traffic is being allowed through the WAN interface. What should you do?

Add a permit statement to the bottom of the access list.

You have a network connected to a physical star topology. One of the drop cables connecting a workstation is removed. What best describes what happens to communications?

All devices except the device connected with the drop cable will be able to communicate

During a network infrastructure upgrade, you have replaced two 10 Mbps hubs with switches and upgraded from Category 3 UTP cable to Category 5e. During the process, you accidentally cut the Cat 5e patch cable that stretches from the network printer to the upgraded switch. What is the impact on the network?

All network nodes, with the exception of the printer, will be available.

Toner Probe

Allows you to place a tone on one end of a wire and then locate the other end of the wire by finding the wire that has the tone. It includes two components: a tone generator and a speaker. You connect the tone generator onto one end of the cable to place a tone on the cable.

True

An Ethernet crossover cable uses T568A pin/pair assignment on one end and T568B pin/pair assignment on the opposite end.

Patch cable

An Ethernet straight-through cable is also commonly referred to as this.

Which of the following best describes the Ping of Death exploit?

An ICMP packet larger than 65,536 bytes

Unified voice services

An IP PBX system is an example of:

32 bits

An IPv4 address consists of this

DHCP

An IPv4 address in the range 169.254.1.0 through 169.254.254.255 indicates a problem with this type of service

6to4

An IPv4 to IPv6 transition mechanism that allows IPv6 packets to be transmitted over an IPv4 network

128 bits

An IPv6 address consists of this.

APIPA address

An IPv6 link-local address is the equivalent of IPv4

155.52 Mbps

An OC-3 line supports transmission rates of up to this speed.

False

An SSL VPN connection typically requires a dedicated VPN client application. True/False

Content filter

An application software used to selectively block access to certain websites is an example of:

BGP

An example of a hybrid routing protocol

Access Point

An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to as:

Which of the devices listed below allows for establishing a communication channel over a PSTN? Analog modem ICS server Multilayer switch Default gateway

Analog Modem

Which of the devices listed below allows for establishing a communication channel over a PSTN?

Analog modem

You are creating an Ethernet network for your company. the shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building what conditions are you most likely to experience?

Attenuation Loss of signal strength from one end of the cable to another. The longer the cable, the more attentuation

Which part of the AAA security architecture deals with the verification of the identity of a person or process?

Authentication

Which part of the AAA security architecture deals with the verification of the identity of a person or process? Authentication Authorization Accounting

Authentication

Which of the answers listed below refers to the process of granting or denying access to resources?

Authorization

Which of the answers listed below refers to the process of granting or denying access to resources? Authentication Authorization Accounting

Authorization

Which of the connector types listed below are used with coaxial cabling? (Select 2 answers) ST MT-RJ BNC LC F-connector

BNC F-Connector

A type of management frame containing information about the wireless network that helps wireless-capable devices discover the presence of a Wireless LAN (WLAN) is known as: Beacon frame Magic packet Service Set Identifier (SSID) Jumbo frame

Beacon frame Is one of the management frames in IEEE 802.11 based WLANs. It contains all the information about the network. Beacon frames are transmitted periodically to announce the presence of a wireless LAN. Beacon frames are transmitted by the access point (AP) in an infrastructure basic service set (BSS).

The practice of sending unsolicited messages over Bluetooth is known as: Phishing Bluejacking Vishing Bluesnarfing

Bluejacking Bluesnarfing. ... Both Bluesnarfing and Bluejacking exploit others' Bluetooth connections without their knowledge. While Bluejacking is essentially harmless as it only transmits data to the target device, Bluesnarfing is the theft of information from the target device.

The practice of gaining unauthorized access to a Bluetooth device is referred to as: MITM attack Bluejacking Phishing Bluesnarfing

Bluesnarfing Bluesnarfing. ... Both Bluesnarfing and Bluejacking exploit others' Bluetooth connections without their knowledge. While Bluejacking is essentially harmless as it only transmits data to the target device, Bluesnarfing is the theft of information from the target device.

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standard could the network be using. select two

Bluetooth 802.11b

A collection of intermediary compromised systems that are used as a platform for a DDoS attack is known as: Honeynet Botnet Quarantine network Network controllers Malware

Botnet The word Botnet is formed from the words 'robot' and 'network'. Cybercriminals use special Trojan viruses to breach the security of several users' computers, take control of each computer and organise all of the infected machines into a network of 'bots' that the criminal can remotely manage.

In which type of network topology the main network cable becomes a single point of failure? Star Full mesh Bus Partial mesh

Bus

The phone line to one office is not working. You have identified the location of the phone line in a 66 block in the wiring closet. what tool do you use to connect to the phone line at the punchdown block to see if yuo can make and receive calls?

Butt set

Penetration testing: (Select all that apply) Bypasses security controls Only identifies lack of security controls Actively tests security controls Exploits vulnerabilities Passively tests security controls

Bypasses security controls Actively tests security controls Exploits vulnerabilities

Which of the following twisted-pair copper cabling types is most commonly used in modern Ethernet networks? CAT3 CAT4 CAT5 CAT5e

CAT5e

What is the minimum cabling requirement for a 10GBASE-T network? CAT5 CAT5e CAT6 CAT6A

CAT6

Which of the DNS database records listed below allows multiple domain names to resolve to the same IP address?

CNAME

Which of the tools listed below allows for verification of the network cabling installation performance and its compliance with TIA or ISO standards? Multimeter Cable certifier Toner probe Cable tester

Cable certifier

Which of the following tools would be used for attaching an RJ-45 connector to the end of a twisted-pair Ethernet cable? Punch down tool Cable crimpers Needle-nose pliers Cable certifier

Cable crimpers

Rollover cable

Cable type often used to connect a computer terminal to a router's console port.

Coaxial Fiber-optic STP

Cabling types which provide protection against an outside signal interference.

CDMA GSM LTE

Cellular technologies used in mobile networks.

A portion of the available Radio Frequency (RF) band allocated for wireless communication is known as: Scope Channel Service set Baseline

Channel

A situation in which multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is called: Cross-talk Channel overlapping Collision Channel bonding

Channel overlapping

Copper cable RJ-45 connector 100 Mbps Ethernet

Characteristic features of Category 5 (CAT5) cabling.

Hard-coded into a NIC 48-bit hexadecimal number Physical address

Characteristic features of a MAC address

Signal latency Interference (weather dependent) Low connection speed

Characteristic features of satellite Internet connections.

Class A range Non-routable (private) IP address range

Characteristic features of the 10.0.0.0 - 10.255.255.255 IPv4 address space

Class B range Non-routable (private) IP address range

Characteristic features of the 172.16.0.0 - 172.31.255.255 IPv4 address space

Non-routable (private) IP address range Class C range

Characteristic features of the 192.168.0.0 - 192.168.255.255 IP address space

Exterior Gateway Protocol (EGP) Hybrid routing protocol

Characteristic features of the Border Gateway Protocol (BGP)

Used with telephone cabling Copper cabling connector

Characteristic features of the RJ-11 connector.

Used with Ethernet network cabling Copper cabling connector

Characteristic features of the RJ-45 connector.

In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to the: Class A address space Class B address space Class C address space Class D address space

Class A address space

Which of the following answers refer to the characteristic features of the 10.0.0.0 - 10.255.255.255 IPv4 address space? (Select 2 answers) Class A range Public IP address range Class B range Non-routable (private) IP address range Class C range

Class A range Non-routable (private) IP address range

Which of the following answers list the characteristic features of the 172.16.0.0 - 172.31.255.255 IPv4 address space? (Select 2 answers) Class A range Public IP address range Class B range Non-routable (private) IP address range Class C range

Class B range Non-routable (private) IP address range

In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to the: Class A address space Class B address space Class C address space Class D address space

Class C address space

Which of the cabling types listed below provide(s) protection against an outside signal interference? (Select all that apply) UTP Coaxial Fiber-optic STP

Coaxial Fiber-optic STP

You manage a single switch. On each switch port, a hub connects multiple devices to the switch. What condition are you most likely to experience on the networks?

Collisions

route print netstat -r

Command-line commands in MS Windows which are used to display the contents of a routing table

ifconfig

Commands used to display MAC address in Linux

RJ-48C

Connector type used for terminating a T-1 line.

DB-9/DE-9 DB-25

Connector types that are used for connecting devices to a RS-232 port.

BNC F-connector

Connector types used with coaxial cabling.

An application software used to selectively block access to certain websites is an example of:

Content filter

An application software used to selectively block access to certain websites is an example of: Captive portal Media converter Content filter Proxy server

Content filter

An application software used to selectively block access to certain websites is an example of: (Select best answer)

Content filter

A device used for the purpose of extending the length of various types of network cable runs is commonly referred to as: Coupler Media converter Amplifier Cable certifier

Coupler

What type of Ethernet cable would be used for establishing a direct communication link between two PCs? Patch cable Crossover cable Rollover cable Straight-through cable

Crossover cable

In twisted-pair cabling wires are grouped into pairs and wires in each pair are twisted around each other in order to reduce: Cross-talk Cable diameter Collisions Bend radius

Crosstalk

You are troubleshootin a network connectivity issue on a Unix system. You are able to connect to remote systems by using their IP address, but unable to connect using the hostname. You check the TCP/IP configuration, and note that a DNS serve IP address is configured You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities cna you use to do this?

DIG nslookup

In order to be able to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?

DNS server

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. What configuration values would you most likely need to change?

Default Gateway used for sending packets to other subnets

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would you most likely need to change?

Default gateway

Users report that the network is down. After some investigation, you determine that a specific router is configured such that a routing loop exists. What should you do next?

Determine if escalation is needed

A network connected using a full physical mesh topology. the link between device A and device B is broken. What happens to communications?

Device A will be able to communicate will all other devices.

Router

Device used for separating broadcast domains

Which of the following answers refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments? Dipole antenna Dish antenna Unidirectional antenna Yagi antenna

Dipole antenna

Which of the antenna types listed below provide a 360-degree horizontal signal coverage? (Select 2 answers) Unidirectional antenna Dipole antenna Dish antenna Omnidirectional antenna Yagi antenna

Dipole antenna Omnidirectional antenna

An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn't have time or resources to handle legitimate requests is called: Bluejacking MITM attack Session hijacking Bluesnarfing DoS attack

DoS attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a botnet) flooding the targeted system with traffic.

U user reports that network access from her workstation is very slow. The problem does not seem to be effecting any other users. What condition is likely the cause.

Duplex mismatch

Which of the answers listed below refers to a solution that allows for keeping a domain name linked to a changing IP address?

Dynamic DNS (DDNS)

True

Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4.

Mesh

Each of the network node, computer and other devices, are interconnected with one another.

You have a cable internet connection at home. the installer had connected the router near the outsde wall of your house with RG-6cable you move the cable router a distance of 50meters using RG-8 cables and special connector adapters. What condition are you most likely to experience?

Echo An impedance mismatch (manifested by echo) occurs when you connect cables and devices that have a different impedance (resistance) rating. Impedance is mostly a factor in coaxial cables used for networking.

How can an organization help prevent social engineering attacks?

Educate employees on the risks and countermeasures Publish and enforce clearly-written security policies

You are troubleshooting a client connectivity problem on an Ethernet network. the client system has intermittent connectivity to the network. You discover that the UTP patch cable is run 75 feet from the wall outlet, passes though the ceiling and over several florescent light fixtures before reaching the client system. What is the cause of the connectivity problem

Emi interference

A new assistant network administrator was recently hired by your organization to relieve some of your workload. You assigned the assistant network administrator to replace a defective patch cable that connected port 1 on your patch panel to one of your network switches. You noticed that it took him an unusually long time to complete this task. Once done, users almost immediately began to report that the network had gone down. Upon entering the server room, you see that the assistant administrator has configured your network rack as shown in the Exhibit. What should you do? (Choose two. Each response is a complete solution.)

Enable STP on each switch. Remove the patch cable connecting the first switch to the third switch.

You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. What will help reduce the effects of a broadcast storm?

Enable spanning tree on all the switches

You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of a broadcast storm?

Enable spanning tree on the switches

You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. What will help reduce the effects of a broadcast storm?

Enable spanning tree on the switches it is a protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet

Which of the following provides a countermeasure against session hijacking? Port filtering Cleartext credentials Access Control List (ACL) Encryption

Encryption In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system.

Star

Every node connects to a central network device.

Which of the following terms is used as a synonym for a rogue Access Point (AP)? Trojan horse Evil twin Backdoor Computer worm

Evil twin Is a fraudulent Wi-Fi access point that appears to be legitimate, set up to eavesdrop on wireless communications. The evil twin is the wireless LAN equivalent of the phishing scam.

IPv6 auto-configuration

Example application of EUI-64

The Internet

Example of a large public WAN

Leased line

Example of point-to-point network topology

DCS SCADA

Examples of Industrial Control System (ICS) solutions

POTS T-carrier E-carrier

Examples of circuit-switching communication methods.

RG-59 RG-6

Examples of coaxial cabling types.

ST SC LC MT-RJ FC

Examples of fiber-optic connectors

Remote Terminal Unit (RTU) Programmable Logic Controller (PLC)

Examples of intelligent devices used in systems designed to control and automate industrial processes.

RIPv2 OSPF IS-IS

Examples of interior gateway routing protocols

OSPF IS-IS

Examples of link-state routing protocols

Frame relay ATM

Examples of packet-switching communication methods.

The 66 block (older type/used in telephony) The 110 block (newer type/used in networking)

Examples of punch-down blocks.

A Wireless Local Area Network (WLAN) operating in an infrastructure mode with the use of more than one Access Point (AP) is referred to as: Service Set Identifier (SSID) Extended Service Set (ESS) ( Your answer) Basic Service Set (BSS) Independent Basic Service Set (IBSS)

Extended Service Set (ESS)

Which of the following answers lists a valid address of FE80:0000:0000:0000:02AA:0000:4C00:FE9A after compression? FE80::2AA::4C00:FE9A FE80:0:2AA:0:4C:FE9A FE80::2AA:0:4C00:FE9A FE80:0:02AA::4C:FE9A

FE80::2AA:0:4C00:FE9A

You are moving a client to a new location within an Ethernet network. Previous to the move, the client system did not have difficulty accessing the network. during the relocation, you attach a patch cable from the client system to the wall jack and from the patch panel to the switch. Once connected you do not get a link light on the network card or the switch. You swap out the cable running between the patch panel and the switch with a known working one but you can still not connect. what might you suspect as the problem?

Failed patch cable between the client system and the wall jack

An SSL VPN connection typically requires a dedicated VPN client application.

False

An SSL VPN connection typically requires a dedicated VPN client application. t/f

False

Dynamic Network Address Translation (DNAT) provides a permanent mapping between a private IP address and a public IP address on a one-to-one basis.

False

Logical bus over physical star is an example of hybrid network topology. True False

False

Static Network Address Translation (SNAT) provides a mapping between private IP address and any of the IP addresses belonging to the available public IP address pool.

False

The advantages of multimode fiber-optic cabling over single-mode cabling include data transfer rates over longer distances, higher speed, and lower cost. True False

False

True or False The RS-232 standard defines an interface for parallel data transmission method.

False

True or False An SSL VPN connection typically requires a dedicated VPN client application.

False

Upon conducting a visual inspection of the server room, you see that a switch displays LED collision lights that are continually lit. You check the LED on the corresponding workstation and see that it is flashing rapidly even though it is not sending or receiving network traffic at that time. What is the cause of the network collisions?

Faulty network card

Upon conducting a visual inspection of the server room, you see that a switch displays LED collision lights that are continually lit. You check the LED on the corresponding workstation and see that it is flashing rapidly even though it is not sending or receiving network traffic at that time. What is the cause of the network collisions?

Faulty network card Sometimes when a NIC fails, it doesn't just stop working but begins to flood the network with transmissions called jabbering, a single network card can slow down and entire network by its continual transmissions onto the network.

What is the function of a Time-Domain Reflectometer (TDR)? Finding breaks in copper network cables Locating the beginning and the end of a cable in a cabling bundle Checking network installation for compliance with TIA or ISO standards Finding breaks in fiber-optic network cables

Finding breaks in copper network cables

Which of the following answers refers to a software or hardware that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through?

Firewall

Which of the following answers refers to a software or hardware that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through? HIDS Firewall Load balancer Vulnerability scanner

Firewall

Arrange the Group Policy Objects (GPOs) in the order in which they are applied.

First ==> The Local Group Policy on the computer. Second ==> GPOs linked to the domain that contains the user or computer object. Third ==> GPOs linked to the organizational unit that contains the object.

A network topology in which each node has a direct physical connection to every other node is called: Star Partial mesh Bus Full mesh Ring

Full mesh

Which of the following answers refers to the measurement of data transfer rate that excludes all protocol overhead information as well as re-transmission of lost data packets? Goodput Bandwidth cap Throughput Baseline

Goodput

A security solution implemented on an individual computer monitoring that specific system for malicious activities or policy violations is referred to as:

HIDS

A security solution implemented on an individual computer monitoring that specific system for malicious activities or policy violations is referred to as: NIPS MAC filter Firewall HIDS

HIDS

A security solution implemented on an individual computer which monitors that specific system for malicious activities or policy violations is referred to as:

HIDS - Host-based intrusion detection system (HIDS)

IPv4 packet format

Header = Version, header length, type of service, Total Length, Identification, IP Flags, Fragment Offset, TTL, Protocol, Header Checksum, Source Address, Destination Address, IP Option

An administrator needs to adjust multiple Access Point (AP) placement in order to ensure the best coverage for the network. Which of the following tools would be of help while identifying the areas of low signal strength? Heat map Power level controls Logical network diagram Wi-Fi hotspots

Heat map Wireless heat map. A diagram of signal strength in a Wi-Fi network. Using a wireless monitor tool, a visual map of a workplace gives the network administrator invaluable knowledge about how to adjust the access points (APs) for better coverage

The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance.

Hub

he disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance. Router Switch Bridge Hub

Hub

Which of the following answers illustrates the difference between passive and active security breach response?

IDS - Intrusion Detection Systems, which is passive vs. IPS - Intrusion Prevention Systems, which is active.

Which of the following answers illustrates the difference between passive and active security breach response? HIPS vs. NIPS UTM vs. Firewall CSMA/CD vs. CSMA/CA IDS vs. IPS

IDS vs IPS

Which of the following answers illustrates the difference between passive and active security breach response?

IDS vs. IPS

Which of the following solutions are used for implementing VPNs? (Select all that apply)

IPsec GRE SSL/TLS PPTP

Which of the following solutions are used for implementing VPNs? (Select all that apply) IPsec GRE SDLC SSL/TLS PPTP

IPsec GRE SSL/TLS PPTP

Which of the following solutions are used for implementing VPNs? (Select all that apply)

IPsec, GRE, SSL/TLS, PPTP

Hexadecimal numbers

IPv6 addresses are expressed with the use of these

FE80::/64

IPv6 link-local address

Match each network enumeration technique on the left with its corresponding description on the right.

Identifying phone numbers with modems ==> War dialing Scanning for wireless access points ==> Wardriving Identifying operating system type and version number ==> Banner grabbing Identifying services that can pass through a firewall ==> Firewalking

What do you use to look up the IP address for a linux server?

Ifconfig

you are troubleshooting a connectivity problem on a linux server. You are able to connect to another system on the local network, but are not able to connect to a server on the remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?

Ifconfig

Class A address space

In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to this.

Class C address space

In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to this

True

In dynamic VLAN configuration, a device connecting to a certain switch port does not automatically become a member of the VLAN assigned to that port.

Hop count

In routing, a rough measure of distance between two networked hosts

True

In terms of size and reach, a Metropolitan Area Network (MAN) can be placed between a LAN (smaller type of network) and a WAN (larger type of network).

True

In terms of size and reach, a metropolitan area network (Man) can be placed between a LAN (smaller type of network) and a WAN (larger type of network).

Accounting

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:

A user reports that he can't browse to a specific website on the Internet. From his computer, you find that a ping test to the web server succeeds. A traceroute test shows 17 hops to the destination web server. What is the most likely cause of the problem?

Incorrect DNS server address

a user reports that he can't browse the internet. You ping test the web server succeeds. A trace route test shows 17 hops to the destination web server. What is the likely cause

Incorrect DNS server address

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation cannot communicate with any other host on the network. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix. : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled. . . . . . . : No Autoconfiguration Enabled . . : Yes IPv4 Address. . . . . . . : 192.168.2.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . : 192.168.1.1 DNS Servers . . . . . . . : 192.168.2.20 What is the most likely cause of the problem?

Incorrect IP address In this example, the IP address assigned to the host is on the wrong subnet. The host address is on the 192.168.2.0/24 subnet, but the other devices are using addresses on the 192.168.1.0 subnet (the scenario states that you are connecting the workstation to this subnet).

You manage a local area network with several switches. A new employee has started today so you connect her workstation to a switch port. After connecting the workstation, you find that the workstation cannot get an IP address from the DHCP server. You check the link and status lights and the connection is working properly. A ping to the loopback address on the workstation succeeds. No other computers seem to have the problem. Which of the following is the most likely cause of the problem?

Incorrect VLAN assignment

You manage a local area network with several switches. anew employee has started today so you connect her workstation to a switch port. After connecting the workstation, you find that the workstation cannot get an IP address from the DHCP server. You check the link and status lights and the connection is working properly. A ping to the loopback address on the workstation succeeds. No other computers seem to have the problem.

Incorrect VLAN assignment

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20 What is the most likely cause of the problem?

Incorrect default gateway In this example, the default gateway address is incorrect. The default gateway address must be on the same subnet as the IP address for the host. The host address is on the 192.168.1.0/24 subnet, but the default gateway address is on the 192.168.2.0 subnet.

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask. . . . . . . . : 255.255.0.0 Default Gateway . . . . . . : 192.168.1.1 DNS Servers . . . . . . . : 192.168.1.20 192.168.1.27 What is the most likely cause of the problem?

Incorrect subnet mask In this example, the network is using a mask of 255.255.255.0 (24-bits), but the workstation is configured to use a mask of 255.255.0.0.

A wireless networking topology consisting of at least one Access Point (AP) is known as: Infrastructure mode Independent Basic Service Set (IBSS) Ad hoc mode Peer-to-peer mode

Infrastructure mode

IEEE

Institute of Electrical and Electronics Engineers

Exchange routing information with autonomous networks

Interior Gateway Protocol (IGP)

An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to as:

Intermediate Distribution Frame (IDF)

Dial-up

Internet access type which takes advantage of the traditional PSTN lines.

You have been called in to troubleshoot a connectivity problem on a newly installed windows Server 2003 system. The system is operating satisfactorily and is able to communicate with other systems on the local network. However it is unable to access any systems on other segments of the corporate network. You suspect that the default gateway parameter for the system has not been configured, or may be configured incorrectly. Which of the following utilitis are you most likely to use to view the default gate way information for the system

Ipconfig

You want to be able to view the DNS server address that a computer is using. Which of the following utilities would you use

Ipconfig windows ifconfig linux

Your company uses VoIP for phone calls. Recently, employees have been complaining about phone calls with unusual sound effects. Which type of problem is occurring on the VoIP system?

Jitter

IP to MAC

Kind of resolution provided by Address Resolution Protocol (ARP)

Which of the following answers lists an example of a protocol used for implementing control over multiple Access Points (APs)?

LWAPP

Which of the following answers lists an example of a protocol used for implementing control over multiple Access Points (APs)? LDAP LWAPP RTSP MGCP

LWAPP

Which of the following answers lists an example of a protocol used for implementing control over multiple Wireless Access Points (WAPs)? RTSP LWAPP LDAP MGCP

LWAPP (Lightweight Access Point Protocol) Is the name of a protocol that can control multiple Wi-Fi wireless access points at once. This can reduce the amount of time spent on configuring, monitoring or troubleshooting a large network.

The duration of time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as:

Lease

A network device designed for managing the optimal distribution of workloads across multiple computing resources is called:

Load balancer

Which protocol doies VoIP use to interface with the PSTN?

MGCP

True

MLPPP provides a method for combining two or more physical communication links into one logical interface for the purpose of improved speed and redundancy.

Which of the answers listed below refers to the new feature introduced with the IEEE 802.11ac standard? MIMO 40-Hertz mode MU-MIMO Maximum data signaling rate of up to 600 Mbps

MU-MIMO

Which of the following DNS database records maps a domain name to a list of mail servers for that domain?

MX

Disabling SSID broadcast: Is one of the measures used in securing wireless networks Makes a WLAN harder to discover Blocks access to a WAP Prevents wireless clients from accessing the network

Makes a WLAN harder to discover

Which of the answers listed below refers to a Layer 2 network switch with configuration features that can be changed through a user interface? Unmanaged switch Remote Terminal Unit (RTU) Active hub Managed switch

Managed switch

What is war chalking? Manipulating a user into disclosing confidential information Finding unsecured wireless networks Gaining unauthorized access to restricted areas by following another person Marking unsecured wireless networks

Marking unsecured wireless networks

True

Materials from which the plenum-rated cable's cover is made include low-smoke polyvinyl chloride (PVC) and fluorinated ethylene polymer (FEP).

2.048 Mbps

Maximum data transfer rate of an E1 connection.

34.368 Mbps

Maximum data transfer rate of an E3 connection.

622.08 Mbps

Maximum data transfer rate of an OC-12 connection.

A network link consisting of two dissimilar media types requires an intermediary device known as: Content filter Patch panel Media converter Coupler

Media converter

Which type of network topology provides the highest level of redundancy? Ring Mesh Bus Star

Mesh

PPP

Method for establishing a dedicated point-to-point link between two networked devices.

MTU

Metric which describes the largest allowable data unit that can be transmitted across the network

You manage a network with multiple subnets connected to the Internet. A user reports that she can't access the Internet. You investigate the problem and find that she can access all hosts on the private network, but no hosts on the Internet. Which of the following is likely the cause of the problem?

Missing default route on a router f you can access all private subnets but not the Internet, troubleshoot the connection to the Internet. For example, verify that routers have a default route that would apply to Internet traffic, and make sure the Internet link is up and working. The default gateway on the workstation is configured properly because routing to other subnets works correctly, meaning that the workstation is able to send and receive packets from remote networks.

A user reports that she can't access the Internet. You investigate the problem and find that she can access all hosts on the private network, but no hosts on the Internet. What is most likely the cause of the problem?

Missing default route on the router

You manage a network with multiple subnets connected to the Internet. A user reports that she can't access the Internet. You investigate the problem and find that she can access all hosts on the private network, but no hosts on the Internets. What is likely the cause of the problem.

Missing default route on the router

You manage a network with multiple subnets connected to the Internet. A user reports that she can't access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on that subnet, however the computer does access other computers on other subnets as well as the Internet. Which of the following is most likely the cause of the problem?

Missing route on the default gateway router

IEEE 802.11

Most modern WLANs are based on this.

Device that can prioritize traffic based on QoS

Multilayered Switch

You want to measure the voltage, amps, and ohms of various devices. what do you use?

Multimeter is a device for testing various electrical properties.

CWDM DWDM

Multiplexing methods used in fiber-optic communication.

Which of the following solutions alleviates the problem of depleting number of routable IPv4 addresses?

NAT

What best describes the condition where a signal sent on one wire is received on another wire within the same connector

NEXT near end crosstalk measured on the same end as the transmitter.

snmpwalk snmpget

Net-SNMP commands used for retrieving information from an SNMP-capable device

Star topology

Network topology most commonly used in contemporary Ethernet LANs

You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used multimode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MT-RJ connectors. You purchased several used 1 meter multimode patch cables from Amazon. However, when they arrived, you noticed that they use LC connectors. Fortunately, with some force, you found that you are able to get the LC connectors on the cables to lock into the MT-RJ connectors on the GBIC modules and on the switch. Will this implementation work?

No, you should purchase patch cables that use MT-RJ connectors.

You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MT-RJ connectors. You connect each module to the switch with 1 meter multimode patch cables. Will this implementation work?

No, you shouldn't use multimode patch cables with single mode GBIC modules.

Which of the following answers list the characteristic features of the 192.168.0.0 - 192.168.255.255 IP address space? (Select 2 answers) Class A range Public IP address range Class B range Non-routable (private) IP address range Class C range

Non-routable (private) IP address range Class C range

Which of the following is an example of a valid subnet mask? 255.255.225.0 255.255.191.0 255.255.127.0 255.255.64.0 None of the above is a valid subnet mask

None of the above is a valid subnet mask

You are working with an existing fiber optic installation in your building. You want to know how long each length of cable is that runs through walls. Which tool do you use?

OTDR Optical Time domain reflector

You are setting up a wireless hotspot in a local coffee shop. For best results, you want todisperse the radio signals evenly throughout the coffee shop.Which of the following types of antennas would you use on the AP to provide a 360degree dispersed wave pattern?

Omni-Directional

Which of the following answers refer(s) to highly directional antenna type(s) used for long-range point-to-point bridging links? (Select all that apply) Dipole antenna Omnidirectional antenna Dish antenna Non-directional antenna Unidirectional antenna

Omnidirectional antenna Dish antenna Unidirectional antenna

You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?

On a RADIUS server

True

One of the differences between the UTP and STP cabling is that STP cable takes advantage of additional protective cover reducing signal interference from outside sources.

You work for a large, multinational organization that has an extensive global network that is interconnected using WAN links and routers. Lately, users in one location have complained that they are unable to access resources stored on a server named FS23 in a South American branch office. To troubleshoot the issue, you have done the following: • Verified that the server is up and running. • Verified that the various routers in between the two locations are up and running. You suspect that perhaps one of the routers between the two locations may be dropping packets. To test this theory, you enter the ping FS23 -f -l 1500 command on your workstation. The ping command returns the following command for each ping packet sent: "Packet needs to be fragmented but DF set." What does this mean?

One of the intermediate routers is an MTU black hole. A black hole router will drop packets when the packet size exceeds the Maximum Transmission Unit (MTU) size. You can use ping to locate a black hole router by setting the following parameters along with the IP address of the remote host: • -f causes the ping utility to send an ICMP echo packet that has the IP "do not fragment" bit set. • -l sets the buffer (or payload) size of the ICMP echo packet. Specify this size by typing a number after the -l parameter. The ping test will provide you with helpful information: • If the MTU of every segment of a routed connection is at least the MTU size, the ping is successful. • If there is an intermediate segment that has a smaller MTU size, the router returns an ICMP "destination unreachable" packet and the ping utility displays a Packet needs to be fragmented but DF set message.

Vulnerability scanning: (Select all that apply) Only identifies lack of security controls Actively tests security controls Exploits vulnerabilities Passively tests security controls

Only identifies lack of security controls Passively tests security controls

In half-duplex communication, transmission takes place

Only in one direction at a time

True

Optical Carrier (OC) transmission rate specifications adhere to a pattern whereby OC prefix is followed by a number designating a multiple of the base unit of 51.84 Mbps.

True

Optical carrier (OC) transmission rate specifications adhere to a pattern whereby OC prefix is followed by a number designating a multiple of the base unit of 51.84 Mbps

Single Mode Fiber

Optical fiber that is designed for the transmission of a single ray or mode of light as a carrier and is used for long-distance signal transmission.

Multimode Fiber

Optical fiber that is designed to carry multiple light rays or modes concurrently, over short distances

DHCP allows for passing additional configuration settings to DHCP clients on a network. The additional settings might include (among other types of configuration info) the default gateway IP address, or DNS server IP address. Which of the answers listed below refers to the part of a DHCP message containing those settings?

Options

The process of managing a network device via a connection other than the regular network link used by the device to send and receive network traffic is known as: Session hijacking Out-of-band management Backdoor access In-band management

Out-of-band management

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer and all settings, with the exception of SSIDs, remain configured to the default. Which of the following might you suspect as the cause of the connectivity problems?

Overlapping channels

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer and all settings, with the exception of SSIDs, remain configured to the default. Which of the following might you suspect as the cause of the connectivity problems?

Overlapping channels

Which of the following answers refers to a Network Address Translation (NAT) method that binds a combination of private IP address and port number with a corresponding public IP address and port information?

PAT

Which of the answers listed below refer(s) to example(s) of circuit-switching communication method(s)? (Select all that apply) Frame relay POTS T-carrier ATM E-carrier

POTS T-carrier E-carrier

A technology that allows for prioritizing certain types of network traffic in order to improve the overall network effectiveness and performance is known as:

Packet Shaping

A technology that allows for prioritizing certain types of network traffic in order to improve the overall network effectiveness and performance is known as:

Packet shaping

A technology that allows for prioritizing certain types of network traffic in order to improve the overall network effectiveness and performance is known as: AAA framework Packet shaping Content filtering Port forwarding

Packet shaping AKA Traffic Shaping

An Ethernet straight-through cable is also commonly referred to as: Rollover cable Crossover cable Patch cable Yost cable

Patch cable

You work in an office that uses NetWare servers and Wind. nt 4 servers. The network uses both the TCp/Ip and IPX/SPX protocols. You are sitting at a workstation that uses Windows 95 OSR2. an application you are using is unable to contact a Windows NT server named FileSrvr2. What command can you use to determine whether your computer can still contact the server?

Ping

which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building>

Place access points above where most clients are

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

Place accès points above where most clients are

A type of enclosed space in a building (such as the one between a dropped ceiling and the structural ceiling) used for air handling is commonly referred to as: Plenum Access Point (AP) Cable tray HVAC system

Plenum

Which of the following features is used with digital IP phones to supply power through a switch port?

PoE

Which switch features are typically used with VoIP?

PoE VLAN

Needle Nose Pliers

Pointy pr long nose pliers used to snip wires

A server with a private IP address has been set up to handle requests from an outside (public) network. Which of the solutions listed below would enable this function?

Port forwarding

Which of the following WAP configuration settings allows for adjusting the boundary range of the wireless signal? Fair access policy Power level controls Quality of Service (QoS) Wi-Fi Protected Setup (WPS) Bandwidth cap

Power level controls

CorpServ is a small company with 14 client systems and network printer. Because there are only a limited number of networked systems, you decide to us APIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other but you are having rouble configuring Internet access. What is the likely cause of the problem?

Private addresses cannot directly communicate to hosts outside the local subnet

Port trunking

Process of data from multiple VLANs on a single switch being carried through a single network link between switches

EGP

Protocol types used for sharing routing information between autonomous systems

VRRP HSRP

Protocols which are used for designating a backup router in the event of an active router failure

MLPPP

Provides a method for combining two or more physical communication links into one logical interface for the purpose of improved speed and redundancy.

Network Address Translation (NAT)

Provides an IP proxy between a private LAN and a public network such as the Internet.

In computer networking, a system or an application processing requests on behalf of another system is commonly referred to as:

Proxy

Which of the answers listed below refers to a tool used for attaching cables to a 110 block? Punch down tool Crimp tool Cable certifier Needle-nose pliers

Punch down tool

Which of the following solutions provides the AAA functionality? (Select all that apply)

RADIUS TACACS+

Which of the following solutions provide(s) the AAA functionality? PAP RADIUS TACACS+ PPTP MSCHAP

RADIUS TACACS+

A dial-up or VPN connection allowing remote users to access corporate network requires what type of service?

RAS

A dial-up or VPN connection allowing remote users to access corporate network requires what type of service? RAS PoE NAS WPS

RAS

Which of the following answers list examples of coaxial cabling types? (Select 2 answers) STP RG-59 Multimode fiber UTP RG-6 Single mode fiber

RG-59 RG-6

Which of the following answers list(s) the characteristic feature(s) of a Category 5 (CAT5) cabling? (Select all that apply) Copper cable RJ-45 connector Fiber-optic cable 10 Gbps Ethernet 100 Mbps Ethernet

RJ-45 connector Fiber-optic cable 100 Mbps Ethernet

Which of the following connector types would be used for terminating a T-1 line? RJ-45 RJ-48C UTP RJ-11

RJ-48C

Mobile device on-boarding BYOD

Refer to a policy that allows employees to use their own mobile devices on the corporate network

224 - 239 Class D

References to IPv4 multicast address block

You are creating an ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single cat 6e cable to connect the wiring closet to the shipping building. What should you include in your plan?

Repeater regenerates the signal and removes the unwanted effects caused by attenuation

You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360dispersed RF wave design. After installed, the signal between the two systems is weak as many obstacles interfere with the signal.

Replace the Omni-directional antenna with a directional antenna

A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server. Which of the following troubleshooting actions are you most likely to perform first?

Replace the network card in the user's computer

A user from the Sales department calls to report that he is experiencing problems connecting to the sales file server all users in the sales department connect to the sales server through a single ethernet switch. No other users have reported problems connecting to the sales server. what troubleshooting actions are you most likely to perform first?

Replace the network card in the user's computer

Which of the following terms refers to permanent IP address assignment from a DHCP server?

Reservation

A network topology in which each node connects to exactly two other nodes is called: Partial mesh topology Ring topology Full mesh topology Star topology

Ring Topolgy

The process of moving from one Wireless Access Point (WAP) coverage area to another without re-authentication or loss in connectivity is commonly referred to as: Roaming Switching Routing DHCP relay

Roaming

Which of the cable types listed below is often used to connect a computer terminal to a router's console port? Crossover cable Straight-through cable Patch cable Rollover cable

Rollover cable

A device designed to filter and transfer data packets between different types of computer networks is called:

Router

A device designed to filter and transfer data packets between dissimilar types of computer networks is called:

Router

A device designed to filter and transfer data packets between dissimilar types of computer networks is called: Hub Load balancer Router Switch

Router

Which of the following protocols are used by VoIP to set up, maintain, and terminate a phone call?

SIP

Which of the following protocols are used with VoIP?

SIP RTP

Which of the following answers refers to an international standard for high-speed data communications over fiber-optic media?

SONET

Dual ring topology

SONET networks are most often based on this.

you have physically added a wireless access point to your network and installed a wireless network card in two laptops running windows. Neither laptop can find the network and you have come to the conclusion that you must manually configure the wireless access points (AP). Which of the following values uniquely identifies the network AP?

SSID

Which of the following serves as a unique identifier for a WLAN (a wireless network name)? EUI SSID OUI CNAME

SSID (Service Set Identifier)

Which of the VPN connection types listed below typically doesn't require a dedicated VPN client application? (Select all that apply)

SSL VPN Site-to-site

Which of the following answers list(s) example(s) of fiber-optic connectors (Select all that apply) ST DB-25 SC LC MT-RJ FC RG-6

ST SC LC MT-RJ FC

Facilitates redundant Links between segments connected with a layer 2 switch.

STP (Spanning Tree Protocol)

The term "War driving" refers to: Penetration test Scanning for unsecured wireless networks while driving in a car Vulnerability scan Marking unsecured wireless networks

Scanning for unsecured wireless networks while driving in a car

A range of IP addresses assigned to hosts requesting dynamic IP address from a DHCP server is known as:

Scope

Mobile devices in your organization us the access point shown in the figure below to connect to your wireless network. what should you do. select two

Set the channel used by access pint B to 8 Set the access point B to sue 802.11n wireless network

You're responsible for implementing network cabling in a new network installation. The cabling will be installed in a manufacturing environment where there is a great deal of electromagnetic interference. What cabling would operate best in this environment?

Shielded twist pair fiber optic

You use Cat5e twisted pair cable on your network. cables are routed through walls and the ceiling. a user puts a screw in the wall to hang a picture and pierces the cable such that a signal sent on pin 1 arrives on the cable connected to pin 7. What term describes this condition?

Short circuit is when electrical signals take a different path other than the intended path.

POTS

Short for plain old telephone service, which refers to the standard telephone service that most homes use

Users report that the Internet is nolonger accessible. You suspect that the line connecting your building to the internet is not working properly. What allows the service provider to remotely test the local loop?

Smart Jack is a special loopback plug installed at the demarc point for a WAN service. Technicians at the central office can send diagnostic commands to the smart plug to test connectivity between the central office and the demarc

Which of the following answers refers to a specialized tool used for evening out wire ends? Cable crimper Needle-nose pliers Wire stripper Snips

Snips

A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of: Bluesnarfing Brute-force attack Social engineering Bluejacking

Social engineering Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

The unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is known as: Social engineering Zero-day attack Multifactor authentication Backdoor access

Social engineering Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

CSMA/CD

Solution which allows for verifying the absence of other traffic on a shared medium before transmitting in order to prevent collisions and loss of data in 802.3 networks

NAT

Solution which hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device

APC UPC

Solutions used for controlling the light signal at a termination point of a fiber-optic connection.

Partical Mesh

Some nodes are organized in a full mesh scheme but others are only connected to one or two in the network.

TCP Segment Format

Source Port, Destination Port, Sequence Number, Acknowledgement Number, Offset, Reserved, TCP Flags, Window, Checksum, Urgent Pointer, TCP Options Option

Which of the following solutions would you implement to eliminate switching loops?

Spanning tree Run the spanning tree protocol to prevent switching loops. A switching loop occurs when there are multiple active paths between switches. The spanning tree protocol runs on each switch and is used to select a single path between any two switches. Switch ports that are part of that path are placed in a forwarding state. Switch ports that are part of redundant but unused paths are placed in a blocking (non-forwarding) state.

Snips

Specialized tool used for evening out wire ends.

An email sent from unknown source disguised as a source known to the message receiver is an example of: (Select all that apply) Spoofing Bluesnarfing Shoulder surfing Bluejacking Social engineering

Spoofing Social engineering

A network topology in which each node connects to a central device is called: Bus topology Ring topology Star topology Mesh topology

Star topology

False (I wasn't sure how to reword this one. Sorry)

Static VLAN configuration relies on assigning VLAN membership by examining the MAC address of the device connecting to a switch port.

Which of the following answers refers to a data link layer (Layer 2) device designed to forward data packets between Local Area Network (LAN) segments?

Switch

Which of the following answers refers to a data link layer (Layer 2) device designed to forward data packets between Local Area Network (LAN) segments? Switch Firewall Router Hub

Switch

Traffic gets routed between switches or bridges and without reaching destination

Switch or Bridge loops

1.544 Mbps

T1 lines support data transfer rates of up to this speed.

1.544 Mbps

T1 lines support data transfer rates of up to:

44.736 Mbps

T3 lines support data transfer rates of up to this speed.

44.736 Mbps

T3 lines support data transfer rates of up to:

What kind of termination would be used to create a straight-through Ethernet cable? (Select 2 answers) T568A on both ends Rollover / Yost T568A and T568B T568B on both ends

T568A on both ends T568B on both ends

You have been asked to document the wiring in your building. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. What tool do you use?

TDR a special device that sends electrical pulses on a wire in order to discover information about the cable. It measures impedance discontinuities, or in other words the echo received on the same wire in response to a signal on the wire.: Length of wire cable impedance location of splices and connectors on the wire shorts and open circuits and location of the fault

What encryption method is used by WPA for wireless networks?

TKIP uses rotating keys for added security over WEP

Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams. True False

TRUE

Bluetooth Near Field Communication (NFC) Infrared (IR)

Technologies that can be used by devices communicating in a WPAN

MPLS

Technology which enables the use of different types of network protocols on the same network.

Miredo

Teredo IPv6 tunneling software

What does the term "Miredo" refer to? IPv4 to IPv6 migration mechanism Load balancing solution Teredo IPv6 tunneling software Content filtering solution

Teredo IPv6 tunneling software

SONET

Term which refers to an international standard for high-speed data communications over fiber-optic media.

T568A on both ends T568B on both ends

Termination used to create a straight-through Ethernet cable.

True

The Category 6 (CAT6) cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas CAT6A (Augmented) cabling allows for 10 Gbps data transfer rate over a cable segment length of 100 meters.

WiMAX

The IEEE 802.16 standards defining high-speed, long-distance wireless communication are also commonly referred to as this.

WiMAX

The IEEE 802.16 standards defining high-speed, long-distance wireless communication are also commonly referred to as:

False: Multimode cables are less expensive to operate, install and maintain than single-mode cables. However, they are much more limited in both speed and distance.

The advantages of multimode fiber-optic cabling over single-mode cabling include data transfer rates over longer distances, higher speed, and lower cost.

Higher level of security Easier administration Improved performance

The advantages of the client-server model over peer-to-peer networking model

192.168.63.255

The broadcast address for the 192.168.50.155/20 network

MIMO

The characteristic features of the evolved high-speed packet access (HSPA+) standard is the use of:

A user on your network has been moved to another office down the hall. after the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?

The client system has moved to far away from the access point.

A user on your network has been moved to another office down the hall. After the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?

The client system has moved too far away from the access point.

172

The decimal notation of the binary number 10101100

255.0.0.0

The default (classful) subnet mask for a class A network

255.255.255.0

The default (classful) subnet mask for a class C network

E- Carrier

The digital telecommunications services backbone system of Europe. They can be used for wide area network (WAN) connections. Available wherever the parallel T-carrier services are not.

Hub

The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance.

10.119.128.1

The first valid host address for a node residing in the 10.119.136.143/20 network

Finding breaks in copper network cables

The function of a Time-Domain Reflectometer (TDR)

128 - 191

The leading octet value range for an IPv4 address belonging to a class B network

Cable Diameter

The measurement of a cable end

CAT6

The minimum cabling requirement for a 10GBASE-T network.

Bend Radius

The minimum radius one can bend a pipe, tube, sheet, cable or hose without kinking it, damaging it, or shortening its life. The smaller, the better

ADSL

The most common type of a DSL Internet access.

154.24.64.0

The network address for a 154.24.67.147/22 host

"Default route"

The network path used by a router for forwarding all packets with destination addresses not listed in its routing table

45

The number of connections in a full mesh network consisting of 10 nodes

Collisions

The result of two devices on the same Ethernet network attempting to transmit data at exactly the same time.

53 bytes

The size of an ATM cell.

HAVAC System

The technology of indoor and vehicular environmental comfort.

T568A/T568B

The two color codes used for wiring eight-position RJ45 modular plugs.

Broadband cable

The use of cable modems within a standard cable television infrastructure for Internet access is commonly referred to as:

Broadband cable

The use of cable modems within a standard cable television infrastructure for Internet access.

MIMO

The use of this is the characteristic feature of the Evolved High-Speed Packet Access (HSPA+) standard.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee rom two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor

While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of oversized Ethernet frames being received on one interface. This interface is connected to a workstation located on the 2nd floor. What could be causing this to happen?

The workstation's network board is jabbering. Frames that are too long are typically caused by a faulty network card that jabbers (constantly sending garbage data).

True

To allow for multiple VLANs on a single link, frames from individual VLANs must be identified. The most common and preferred method, IEEE 802.1Q, adds a tag to the Ethernet frame header labeling it as belonging to a certain VLAN.

Punch down tool

Tool used for attaching cables to a 110 block.

Wire stripper

Tool used for removing electrical insulation cover from electric wires.

Cable certifier

Tools that allows for verification of the network cabling installation performance and its compliance with TIA or ISO standards

Cable crimpers

Tools used for attaching an RJ-45 connector to the end of a twisted-pair Ethernet cable.

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the US. The office has two Windows 2000 servers, tow UNIX servers, on Windows NT server, 90 Windows 98 clients, 40 Windows 2000 Professional clients, and five Macintosh clients. Users ahve been complaining that they are unable to access resources over the VAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working proplerly What TCP/IP utility can you use to see if a router is not working properly?

Tracert

Broadcast

Transmission type which would be used to reach a networked host with unknown address

Match each Wi-Fi jamming attack on the left with its corresponding description on the right.

Transmits radio signals at random amplitudes and frequencies ==> Random noise jamming Transmits pulses of radio signals at random amplitudes and frequencies ==> Random pulse jamming Repeatedly transmits high-intensity, short-duration RF bursts at a rapid pace ==> Spark jamming

A device that apart from the function of an ordinary network switch can also provide additional functions at higher levels of the OSI reference model is known as a multilayer switch.

True

A hybrid network topology is a combination of several physical topologies. True False

True

APIPA-assigned addresses are valid only for communications within a network segment that a given host is connected to (a host with APIPA-assigned address cannot connect to the Internet). True False

True

An Ethernet crossover cable uses T568A pin/pair assignment on one end and T568B pin/pair assignment on the opposite end. True False

True

Networked clients not residing on the same subnet as the DHCP server can still obtain an IP address from the server through a DHCP relay agent.

True

One of the features of the Dynamic Host Configuration Protocol (DHCP) is the capability for static allocation of an IP address based on the IP-to-MAC address mapping.

True

Optical Time-Domain Reflectometer (OTDR) is a type of specialized cable tester that allows for locating faults and breaks in fiber-optic cabling. True False

True

True or False A special type of cabling with a fire-retardant jacket placed inside the space between structural floor and dropped ceiling or inside walls is known as a plenum-rated cabling.

True

True or false A device that apart from the function of an ordinary network switch can also provide additional functions at higher levels of the OSI reference model is known as a multilayer switch.

True

True or false The Category 6 (CAT6) cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas CAT6A (Augmented) cabling allows for 10 Gbps data transfer rate over a cable segment length of 100 meters.

True

double colon in an IPv6 address indicates that part of the address containing only zeroes has been compressed to make the address shorter. True False

True

As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform attack against its target. True False

True A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a botnet) flooding the targeted system with traffic.

Penetration test of a computer system without the prior knowledge on how the system that is to be tested works is commonly referred to as black box testing. True False

True Black-box testing is a method of software testing that examines the functionality of an application without peering into its internal structures or workings. This method of test can be applied virtually to every level of software testing: unit, integration, system and acceptance.

An attack against encrypted data that relies heavily on computing power in order to check all possible keys and passwords until the correct one is found is known as a brute-force attack. True False

True Is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.

A smurf attack is an example of reflective Distributed Denial of Service (DDoS) attack. True False

True The Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.

you manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN1 and VLAN2 on each switch. A device on the first switch in VLAN1 needs to communicate with a device on the second switch also in VLAN 1. What should you configure to allow communication between these two devices through eh switches?

Trunking trunk port is used to connect two switches together

Which of the following answers refers to Generic Routing Encapsulation (GRE)?

Tunneling Protocol

Which of the following answers refers to Generic Routing Encapsulation (GRE)?

Tunneling protocol

Which of the following answers refers to Generic Routing Encapsulation (GRE)? Tunneling protocol IEEE 802.1Q VLAN Trunking Protocol (VTP) Address Resolution Protocol (ARP)

Tunneling protocol

CAT5e

Twisted-pair copper cabling that is most commonly used in modern Ethernet networks.

Crossover cable

Type of Ethernet cable used for establishing a direct communication link between two PCs.

Bus

Type of network topology in which the main network cable becomes a single point of failure

Mesh

Type of network topology which provides the highest level of redundancy

100 meters

Typical cable segment length for a copper twisted-pair Ethernet cable.

Wireless site survey

Typically involved in the process of planning and designing new WLANs for optimal performance, security, and compliance

161

UDP port upon which An SNMP Agent receives requests

162

UDP port upon which An SNMP management station receives SNMP notifications from Agents

You've been asked by upper management if there is a way to integrate phone calls, emails, and instant messaging into a single platform. Which of the following systems should you recommend to them?

Unified communication

An IP PBX system is an example of:

Unified voice services

An IP PBX system is an example of: UTM appliance Peer-to-Peer (P2P) architecture Unified voice services Reverse proxy

Unified voice services

You have been recently hired to manage a network for a small company. Prior to your arrival, the entire network was migrated from IPv4 to IPv6. Each of the two functional groups within the organization has its own network segment that is separated from the other with a router. All network segments within the organization use a /64 prefix, including the point-to-point backbone segment that connects the two routers. You are concerned that Neighbor Discovery (ND) issues could occur between the two routers on the backbone segment. Which strategy could you employ to help prevent these issues from occurring?

Use a /127 prefix on the backbone segment.

While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?

Use a different channel ID

You are troubleshooting a connectivity problem in which one client system is unable to connect to a server. Both the server and client system are connected to the same Ethernet network switch. No other users have complained of a problem, and you suspect that faulty network cabling might be to blame. What steps will you perform first?

Use a media tester to test the cable between the computer system and the network switch. it is a hardware device that can be used to verify the correct operation of network cabling.

You have just been hired as a network administrator. a user has just changed offices and needs you to activate the network and telephone connections in his office. However, the wiring at the punch down block is labelled poorly and you are unable to tell which wires go to the user's office

Use a tone generator to locate the correct wiring This allows you to create a tone at on end of a wire and find the other and by testing alll connections at the location of the other end of the wire

Which of the following answers refer to the RJ-45 connector? Used with telephone cabling Coaxial cabling connector Used with Ethernet network cabling Copper cabling connector Fiber-optic cabling connector

Used with Ethernet network cabling Copper cabling connector

What are the characteristic features of the RJ-11 connector? (Select 2 answers) Used with telephone cabling Copper cabling connector Used with Ethernet network cabling Fiber-optic cabling connector Coaxial cabling connector

Used with telephone cabling Copper cabling connector

What is the best countermeasure against social engineering? User authentication Strong passwords Changing default user names User education

User education

Which switch features are typically used with VoIP?

VLAN PoE

Switch ports MAC-address-to-VLAN mapping

VLAN membership can be configured through these

Which of the following answers refers to a dedicated device for managing encrypted connections established over an untrusted network, such as the Internet?

VPN concentrator

Which of the following answers refers to a dedicated device for managing encrypted connections established over an untrusted network, such as the Internet? VPN concentrator Load balancer Managed switch Multilayer switch

VPN concentrator

Used to centrally Store Data and is accessed using Remote Desktop

Virtual Desktop

A system that uses public network (e.g. Internet) as a means for creating private encrypted connections between remote locations is known as:

Virtual Private Network (VPN)

A system that uses public network (e.g. Internet) as a means for creating private encrypted connections between remote locations is known as: Personal Area Network (PAN) Virtual Local Area Network (VLAN) Integrated Services Digital Network (ISDN) Virtual Private Network (VPN)

Virtual Private Network (VPN)

A system that uses public network (such as Internet) as a means for creating private encrypted connections between remote locations is known as:

Virtual Private Network (VPN)

Which of the following answers lists an example method for passive test of security controls? Tabletop exercises Pentest Vulnerability scan War chalking

Vulnerability scan

A type of network covering large geographic areas is commonly referred to as:

WAN

hub-and-spoke topology

WAN topology; each remote site connects back to a main site, communication between the two remote sites travels through the hub site; benefits: costs are reduced, adding an additional site is easy (only one link per site); drawbacks: suboptimal routes between remote sites, hub site is a single point of failure because all remote sites converge on that main site, lacks redundancy

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? WEP,WPA PERSONAL, WPA ENTERPRISE, WPA2 PERSONAL, AND WPA2 ENTERPRISE OR WEP, WPA PERSONAL, AND WPA2 PERSONAL

WEP, WPA PERSONAL, AND WPA2 PERSONAL

Internet access

WLAN hotspot

You need to add security for your wireless network. you would like to use the most secure method. What method should you implement? -WPA -WPA2 -WEP KEBEROS

WPA2

Which of the following technologies simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network? WPA WPS WEP WAP

WPS Wi-Fi Protected Setup (WPS; originally, Wi-Fi Simple Config) is a network security standard to create a secure wireless home network.

Which of the following wireless technologies are not recommended and should not be used due to their known vulnerabilities? (Select 2 answers) WPS WAP WPA2 WAF WEP

WPS (Wi-Fi Protected Setup) WEP (Wired Equivalent Privacy)

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against: War chalking Tailgating War driving Shoulder surfing

War driving

Which of the following is an example of a wireless site survey? Spear phishing Bluejacking War driving Shoulder surfing

War driving Also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere.

A software solution designed to enable interaction between two devices over a network is generally referred to as: Proxy Web service Software as a Service (SaaS) Virtual switch

Web Server

A software solution designed to enable interaction between two devices over a network is generally referred to as:

Web Service

A software solution designed to enable interaction between two devices over a network is generally referred to as:

Web service

Signal latency Interference (weather dependent) Low connection speed

What are the characteristic features of satellite Internet connections? (Select all that apply)

ADSL

What is the most common type of DSL Internet access?

53 bytes

What is the size of an ATM cell?

4G

What type of standard is LTE?

ATM

Which of the answers listed below refer to examples of packet-switching communication methods?

34.368 Mbps

Which of the answers listed below refers to the maximum data transfer rate of an E3 connection?

Authorization

Which of the answers listed below refers to the process of granting or denying access to resources?

Analog modem

Which of the devices listed below allows for establishing a communication channel over a PSTN?

Dial-up

Which of the following Internet access types takes advantage of the traditional PSTN lines?

IDS vs. IPS

Which of the following answers illustrates the difference between passive and active security breach response?

2.048 Mbps

Which of the following answers less the maximum data transfer rate of an E1 connection?

Lease line

Which of the following answers list a more costly alternative to VPN?

LWAPP

Which of the following answers lists an example of a protocol used for implementing control over multiple Access Points (APs)?

CWDM DWDM

Which of the following answers refer(S) to the multiplexing method(s) used I. Fiber-optic communication?

CDMA, GSM, LTE

Which of the following answers referred to cellular technology is used in mobile networks? (Select 3 answers)

Tunneling protocol

Which of the following answers refers to Generic Routing Encapsulation (GRE)?

Switch

Which of the following answers refers to a data link layer device designed to forward data packets between LAN segments?

VPN concentrator

Which of the following answers refers to a dedicated device for managing encrypted connections established over an untrusted network, such as the Internet?

PPP

Which of the following answers refers to a method for establishing a dedicated point-to-point link between two network devices?

Firewall

Which of the following answers refers to a software or hardware that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through?

SONET

Which of the following answers refers to an international standard for high-speed data communications over fiber-optic media?

IPsec, GRE, SSL/TLS, PPTP

Which of the following solutions are used for implementing VPNs? (Select all that apply)

RADIUS, TACACS+

Which of the following solutions provide(s) the AAA functionality? (Select all that apply)

MPLS

Which of the technologies listed below enables the use of different types of network protocols on the same network?

Authentication

Which part of the AAA security architecture deals with the verification of the identity of a person or process?

Penetration test performed by an authorized professional with the full prior knowledge on how the system that is to be tested works is called: Black hat White box testing Fuzz testing Black box testing

White box testing Is a method of testing software that tests internal structures or workings of an application, as opposed to its functionality

What can a TDR Test

Wire length Identify fault location

What is the name of a tool used for removing electrical insulation cover from electric wires? Cable crimper Snips Wire stripper Certifier

Wire stripper

What type of device would be the most convenient for interconnecting two or more physically separated network segments? Wireless bridge Layer 3 switch Wireless Access Point (WAP) Cable modem

Wireless bridge Connects two wired networks together over Wi-Fi. The wireless bridge acts as a client, logging in to the primary router and getting an Internet connection, which it passes on to the devices connected to its LAN Jacks

You configure on o3 router on your DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP addressing information dynamically, your users complain that they are unable to access web sites on the internet. How can you fix this problem

You must configure your DHCP server with an option that delivers the IP address of the DNS server (option 06)

You want to implement 802.1x authentication on your wireless network. What will be required?

a RADIUS server

F-Connector

a coaxial RF connector commonly used for Satellite

SAN

a dedicated local network consisting of devices providing data access

NAS

a dedicated storage appliance that can be added to a local network

Media Converter

a device that makes it possible to connect two dissimilar media types

MTRJ

a fiber-optic Cable Connector that is very popular for small form factor devices due to its small size

IaaS

a form of cloud computing that provides virtualized computing resources over the Internet The question from the quiz seemed confusing, so I looked up the term and entered what I have above, but just in case, here is the original question: In which of the cloud computing infrastructure types clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment?

VLAN

a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain regardless of their physical location

Quality of Service (QoS)

a mechanism that allows for controlling network resources and assigning priority to different types of traffic

Ring

a network configuration in which node connections create a circular data path. Each node is connected to two others, like points on a circle.

Bus

a network setup in which each node are connected to a single cable or backbone.

802.1w RSTP

a newer replacement for the Spanning Tree Protocol (STP)

Port mirroring

allows an administrator to inspect the traffic passing through a network switch

CSMA/CA

allows for controlling the shared medium in order to minimize collisions in 802.11 networks

169.254.10.20

an example of an APIPA address

11000000

binary notation of the decimal number 192

CAN

campus area network; interconnects building-to-building; ex) a university campus, an industrial/business park

You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100mbps. What device should you use to test the drop cable and the connection to the network?

certifier is a multifunction tool that verifies or validates that a cable or an installation meets the requirements for a specific architecture implementation.

peer-to-peer network

client devices share their resources with other client devices, resource sharing is made available through the clients' operating systems; benefits: easily installed, usually cost less due to no dedicated server resources; drawbacks: scalability is limited, performance might be degraded depending on what other tasks are running on the device providing resources

PaaS

cloud service type which would provide the best solution for a web developer intending to create a web app

VoIP

common term for a group of protocols used to carry voice data over a packet-switched network

T- Carrier

commonly used by telecommunications companies, for providing Internet access to homes and businesses.

network layer OSI model

concerned with forwarding data based on logical addresses

data link layer OSI model

concerned with packaging data into frames and transmitting those frames on the network, performing error detection/correction, uniquely identifying network devices with an address, and handling flow control; has 2 sublayers: MAC and LLC; logical topology

physical layer OSI model

concerned with the transmission of bits on the network along with the physical and electrical characteristics of the network; physical topology

After configuring the server to distribute ip addresses and DHCP server, what do you need to do next

configure client s to obtain IP addressing from the DHCP server

TCP

connection-oriented protocol

UDP

connectionless protocol, unreliable

RJ-48C

connector type used for terminating a T-1 line

DB-25

connector types would be used for terminating a T-1 line

crossover cable

connects two devices of the same type. Uses T568A/T568B. One on each side.

media

copper cabling, fiber optic cable, wireless radio waves

You have decided to implement Gigabit ethernet on your network. Each switch port is connected to a single device. Following the installation, you find a device connected to a switch that is only running a 100 mbps. What is the likely causes?

crosstalk

ring topology

data flows in a loop, devices are connected to a single ring, each device includes a receiver and a transmitter, each device repeats the signal it receives; benefits: fault tolerant, troubleshooting simplified; drawbacks: more cable is needed, scalability limitations, a break could result in a network outage for single rings

Network Access Control (NAC)

defines a set of rules enforced in a network that the clients attempting to access the network must comply with. With NAC, policies can be enforced before or after end-stations gain access to the network. NAC can be implemented as Pre-admission NAC where a host must, for example, be virus free or have patches applied before it is allowed to connect to the network, and/or Post-admission NAC, where a host is being granted/denied permissions based on its actions after it has been provided with the access to the network.

A user reports that she can't connect to a server on your network. You check the problem and find out that all users are having the same problem. what should you do next?

determine what has changed.

RIPv2

distance-vector routing protocol

current state modulation

electrically or optically represents a binary 0 or 1; 1 = presence of voltage or light; 0 = absence of voltage or light

state transition modulation

electrically or optically represents a binary 0 or 1; 1 = the transition to having voltage or light; 0 = having no transition in a voltage or light level from one time period to the next

client/server network

end user devices share a common set of resources located on dedicated servers; benefits: can easily scale, administration is simplified; drawbacks: if a single server is relied on for resources the server could be a single point of failure, can be more costly than other networks

Full Mesh

every node has a circuit connecting it to every other node in a network.

full mesh topology

every site has a direct connection to every other site; benefits: an optimal route exists between any two sites, fault tolerant, easy troubleshooting; drawbacks: difficult and expensive to scale

QoS Traffic management

functionality provided by the Class of Service (CoS) parameter

QoS Traffic management

functions of Differentiated Services Code Point (DSCP) architecture

The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance.

hub

Your wireless network consists of multiple 802.11n access points that are configured as follows... what should you do

implement antenna diversity

You need to place a wireless access point in your two-story building. While trying avoid interference, which of the following is the best location for the access point?

in the top floor

A double colon in an IPv6 address

indicates that part of the address containing only zeroes has been compressed to make the address shorter.

hub

interconnects network components; Layer 1 device; broadcasts data traffic all ports; multiport repeater

switch

interconnects network components; Layer 2 device; forwards data based on the MAC address on the NIC

router

interconnects network components; Layer 3 device; forwards data based on the destination IP address

Which of the following is not a primary characteristic of a worm?

it infects the MBR of a hard drive

All routers have finished updating their routing tables

known as a convergence state in routing

LAN

local area network; interconnects within a building

1500 bytes

maximum payload value for a standard Ethernet frame

Maximum hop count Time to live (TTL)

mechanisms which can be used to prevent routing loops

MAN

metropolitan area network; interconnects locations scattered throughout a metropolitan area; ex) Metro Ethernet

You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for its customers who want Internet access. You decide to check your e-mail before the meeting begins, but when you open the browser you cannot gain Internet access. Other customers are on the Internet and because you use a wireless connection at work, you are sure your laptops wireless adapter works. What is the likely cause of this problem?

mismatched SSID

star topology

most popular topology; devices have independent connects back to a central device like a hub or switch; benefits: cable break only impacts the one connected device, simple troubleshooting; drawbacks: more cable is required, longer installation time

What shows you the resolved NetBIOS name cache for a computer or NetBIOS name-to-Ip address mappings for known remote computers.

nbstat-c

You administer a NetBIOS-based network that uses the TCP/IP protocol. You are trying to troubleshoot a computer that is unable to contact a server by its NetBIOS name. Which command can you use to check the connection?

nbtstat

Your computer is sharing information with remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection?

netstat checks the status of a TCP connection

Active connections Proto Local Address Foreign Address State TCP SERVER1:1036 localhost: 4832 TIME WAIT TCP SERVER1:4798 localhost:1032 TIME WAIT

netstat reports the TCP/IP ports open on the local system, as well identifying the protocol and remote host connected to that port. This information can be very useful when looking for security weaknesses, as TCP/IP port that is open to traffic unnecessarily represents a security risk.

what shows you the status of all connections and listening ports.

netstat-a

What shows you the computer's route table?

netstat-r

Which command displays network activity statistics for TCP, USP, and IP?

netstat-s

VRRP HSRP

networking protocols which provide redundancy

A network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. what happens to communications?

no devices will be able to communicate

Mary calls to tell you that she can't connect to tan intranet server called Srvr1. From her computer, you ping the server's IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem?

nslookup to troubleshoot name resolution problems. Because the ping test was successful, you know that both the client and the server can communicate using TCP/IP with IP addresses. This tells you that the problem is related to name resolution

bus topology

one cable is used per network segment which all the data flows on, requires a terminator at each end of the cable, uses T connectors; benefits: less cable required, can be less expensive, easy installation; drawbacks: potential single point of failure, difficult to troubleshoot problems, adding devices could cause an outage, does not scale well, high collision rate

CoS

optional field in an Ethernet frame header which can be used to enable the Quality of Service (QoS) functionality

PAN

personal area network; connection is limited to just a few meters; ex) connecting your PC to your digital camera or external hard drive through USB

You want to create a loopback plug using a single RJ-45 connector. How should you connect the wires in the connector?

pin 1 to 3 and 2 to 6

SPB

provides a replacement for the Spanning Tree Protocol (STP)

Trap

provides a replacement term for SNMP notification

application layer OSI model

provides application services to a network and advertises available services; file sharing, email, networked printers advertising that they are online

A loopback interface on a router

provides the means for basic testing whether the router is on and operational

session layer OSI model

responsible for setting up (username/password), maintaining (data transfers), and tearing down sessions; H.323, NetBIOS

presentation layer OSI model

responsible for the formatting of data being exchanged and securing that data with encryption

A device designed to filter and transfer data packets between dissimilar types of computer networks is called:

router

you are troubleshooting access to a server in a remote network. You use the tracert command and see the following: Tracing route to 192.168.2.250 over a maximum of 30 hops 1 2 ms 2 ms 2 ms 192.168.12.11 2 2 ms 2 ms 2 ms 192.168.11.1 3 5 ms 5 ms 3 ms 192.168.10.15 4 2 ms 2 ms 2 ms 192.168.9.1 5 2 ms 2 ms 2 ms 192.168.11.1 6 2ms 2 ms 2 ms 192.168.10.15 7 5ms 5 ms 3 ms 192.168.9.1

routing loop

NAC

security measure that's in place when a client is denied access to the network due to an outdated antivirus software

Check Answer The network board in a workstation is currently configured as follows: • Network speed = Auto • Duplexing = Auto The workstation is experiencing poor network performance and you suspect that the network board is not correctly detecting the network speed and duplex settings. Upon investigation, you find that it is running at 10 Mbps half-duplex. You know that your network switch is capable of much faster throughput. To fix this issue, you decide to manually configure these settings on the workstation. Before you do so, you need to verify the configuration of the switch port that the workstation is connected to. Given that it is a Cisco switch, which commands can be used on the switch to show a list of all switch ports and their current settings? (Select two.)

show running-config interface show interface

HVAC

solution used for controlling temperature and humidity

LACP

solution which enables combining several physical ports into a single logical channel

NAT

solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address

STP 802.1d RSTP 802.1w

solutions which provide protection against switching loops

Which of the following solutions would you implement to eliminate switching loops?

spanning tree used to select single path between two switches

IEEE 802.3at

standards which implements PoE+

Which of the following answers refers to a data link layer (Layer 2) device designed to forward data packets between Local Area Network (LAN) segments?

switch

1500 bytes

the MTU for a standard Ethernet frame

logical topology

the actual traffic flow of the data

255.255.0.0

the default (classful) subnet mask for a class B network

client

the device an end user uses to access a network

protocol data unit

the name given to data at different layers of the OSI model; segment, packet, frame, bit

Dynamic routing

the process of the automated update of a routing table

physical topology

the way the components are physically interconnected

Port scanner

tools used to identify running services on a networked host

What TCP/IP utility gives you the following output?

tracert

A device designed to provide emergency power during an unexpected main power source outage is called: UPS ( Your answer) PoE SVC PSU

uninterruptible power supply (UPS)

Which of the following statements describe the function of a forward proxy? (Select 2 answers)

• Acts on behalf of a client • Hides the identity of a client

Which of the statements listed below describe the function of a reverse proxy? (Select 2 answers)

• Acts on behalf of a server • Hides the identity of a server

Which of the statements listed below describe the function of a reverse proxy? (Select 2 answers)

• Acts on behalf of a server ( Missed) • Hides the identity of a server

Which of the following answers list(s) the characteristic feature(s) of fiber-optic cabling? (Select all that apply)

• Immunity to electromagnetic interference • Provides higher level of security than copper cabling (difficult to tap into) • More suitable for carrying digital information than copper cabling

Which of the following statements describing the function of a DNS PTR record are true? (Select 2 answers)

• PTR record resolves an IP address to a hostname for reverse lookups. • The functionality provided by a PTR record is the opposite of A and AAAA DNS records.

At what percent is packet loss noticeable in voice traffic?

1%

Consider the following output from a dig command run on a Linux system. ; <<>> DiG 8.2 <<>> westsim111.com ;;res options:init recurs defnam dnsrch ;;got answer: ;;->>HEADER<<-opcode:QUERY, status: NOERROR, id:4 ;;flags: qr rd ra; QUERY:1, ANSWER:1, AUTHORITY:2, ADDITIONAL:0 ;;QUERY SECTION: ;; westsim111.com, type = A, class = IN ;;ANSWER SECTION: westsim111.com. 7h33m IN A 76.141.43.129 ;;AUTHORITY SECTION: westsim111.com. 7h33m IN NS dns1.deriatct111.com. westsim111.com. 7h33m IN NS dns2.deriatct222.com. ;;Total query time: 78 msec ;;FROM: localhost.localdomain to SERVER:default -- 202.64.49.150 ;;WHEN: Tue Feb 16 23:21:24 2005 ;;MSG SIZE sent: 30 rcvd:103 What is the IP address of the DNS server that performed this name resolution?

202.64.49.150

After installing a new 2.4Ghz cordless phone system in your office, you notice that wireless network performance is adversely affected. Which of the following wireless networking standards are you most likely to be using? (Select two.)

802.11b 802.11g

Review the output from the show interfaces fa0/1 command on the switch2 switch in the exhibit. What is wrong with the fa0/1 interface in this example?

A duplex mismatch exists with the device on the other end of the connection. In this example, the following statistics indicate that a duplex mismatch error has occurred: • Duplexing is set to half. • There are a significant number of runts. • There are a significant number of collisions. • There are a significant number of late collisions.

You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building. Which of the following conditions are you most likely to experience?

Attenuation Attenuation is the loss of signal strength from one end of a cable to the other. The longer the cable, the more attenuation. For this reason, it is important to not exceed the maximum cable length defined by the networking architecture. In this example, the distance from the wiring closet to the other building exceeds the 100 meter maximum for Ethernet.

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.)

Bluetooth 802.11b

Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?

CSU/DSU A CSU/DSU is a device that converts the signal received from the WAN provider into a signal that can be used by equipment at the customer site. A CSU/DSU is composed of two separate devices: • The CSU terminates the digital signal and provides error correction and line monitoring. • The DSU converts the digital data into synchronous serial data for connection to a router. The CSU/DSU might be two separate devices, one combined device, or it might be integrated into a router.

Consider the network shown in the exhibit. When you run the show interfaces command on switch1, you observe a significant number of runts on the Gi0/1 interface. What does this statistic indicate?

Collisions are occurring. Runts are frames that are too small. (The minimum frame size required is 64 bytes.) This is commonly caused by collisions. In this scenario, the collisions are probably caused by a duplex mismatch error.

Match each wireless term or concept on the left with its associated description on the right. Each term may be used more than once; not all descriptions have a matching term.

Compares the level of the WiFi signal to the level of background radio signals. ==> Signal to Noise Ratio Checks channel utilization and identifies sources of RF inference. ==> Spectrum analysis Identifies how strong a radio signal is at the receiver. ==> Received Signal Level Identifies the number of useful bits delivered from the sender to the receiver. ==> Leave Blank Causes multiple copies of the same radio signal to be received by the receiving antenna. ==> Bounce Degrades wireless network performance. ==> Device saturation

A user reports that she can't connect to the Internet. After some investigation, you find that the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point. What should you do next?

Create an action plan.

You have decided to implement Gigabit Ethernet on your network. Each switch port is connected to a single device. Following the installation, you find one device connected to a switch that is only running at 100 Mbps. Which of the following are likely causes?

Crosstalk Crosstalk is interference that is caused by signals within the twisted pairs of wires. For example, current flow on one wire causes a current flow on a different wire. Crosstalk and other miswiring problems typically mean that a cable does not operate at the desired standard. Use a cable certifier to verify that that cable is properly configured to support the rated speed.

Users report that the network is down. After some investigation, you determine that a specific router is configured such that a routing loop exists. What should you do next?

Determine if escalation is needed.

A user reports that she can't connect to a server on your network. You check the problem and find out that all users are having the same problem. What should you do next?

Determine what has changed.

You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the UTP patch cable is run 75 feet from the wall outlet, passes though the ceiling and over several florescent light fixtures before reaching the client system. Which of the following may be a cause of the connectivity problem?

EMI interference

You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice a significant number of CRC errors displayed. What are the most likely causes? (Select two. Either response is a complete solution.)

EMI or cross-talk on the cable connected to the interface Collisions

You have a cable Internet connection at home. The installer had connected the router near the outside wall of your house with RG-6 cable. You move the cable router a distance of 50 meters using RG-8 cables and special connector adapters. Which condition are you most likely to experience?

Echo An impedance mismatch (manifested by echo) occurs when you connect cables and devices that have a different impedance (resistance) rating. Impedance is mostly a factor in coaxial cables used for networking. Be sure to choose cable with the correct rating (50 or 75 ohm) based on the network type, and do not mix cables with different ratings. RG-6 cables have a rating of 75 ohms, while RG-8 cables have a rating of 50 ohms.

You have configured a remote access server to accept dial-up connections for remote access clients. Remote clients are able to connect successfully and access resources on the remote access server. However, the remote clients are not able to connect to other devices located on the same subnet where the remote access server is located. Which action would likely correct the problem?

Enable proxy arp on the LAN connection for the remote access server.

You are a network administrator for your company. A frantic user calls you one morning exclaiming that "nothing is working." What should you do next in your troubleshooting strategy?

Establish the symptoms.

You have just connected four new computer systems to an Ethernet switch using spare patch cables. After the installation only three systems are able to access the network. You verify all client network settings and replace the network card in the failed system. The client is still unable to access the network. Which of the following might you suspect as the real cause of the problem?

Failed patch cable

You are moving a client to a new location within an Ethernet network. Previous to the move, the client system did not have difficulty accessing the network. During the relocation, you attach a patch cable from the client system to the wall jack and from the patch panel to the switch. Once connected you do not get a link light on the network card or the switch. You swap out the cable running between the patch panel and the switch with a known working one but you can still not connect. Which of the following might you suspect as the problem?

Failed patch cable between the client system and the wall jack

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next?

Identify possible effects of the solution.

A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem. What should you do next?

Identify the affected areas of the network.

A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works. What should you do next?

Identify the results and effects of the solution.

Match each type of access point on the left with the wireless network architecture that they are commonly used in on the right. Each type of access point may be used once, more than once, or not at all.

Independent access point infrastructure ==> Intelligent AP Hub-and-spoke infrastructure ==> Lightweight AP Distributed wireless mesh infrastructure ==> Intelligent AP Independent access points: In the early days of wireless networking, large organization implemented independent access points through their facility. Each AP stood alone, providing separate wireless networks using its own independent configuration. Hub-and-spoke infrastructure: In a hub-and-spoke configuration, a wireless controller is connected to all access points using wired links. The individual access points contain very little embedded intelligence and are sometimes referred to as lightweight access points (LWAPs). Distributed wireless mesh infrastructure: Newer wireless networks can be deployed using a distributed wireless mesh architecture. These networks still use a controller, but they move some of the network intelligence from the controller out to the individual access points. In this configuration, the controller is no longer a bottleneck. The APs are smart enough to communicate directly with each other to create more efficient data paths for network traffic.

Users are complaining that sometimes network communications are slow. You use a protocol analyzer and find that packets are being corrupted as they pass through a switch. You also notice that this only seems to happen when the elevator is running. What should you do?

Install shielded cables near the elevator

You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. Which interface statistic displays the number of collisions that occurred after the 64th byte of the frame was transmitted?

Late collisions

You are troubleshooting an IP addressing issue, and so issue a command to view the TCP/IP configuration of the system. The command you use produces the following output: fxp0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 inet6 fe80::2a0:83ff:fe30:57a%fxp0 prefixlen 64 scopeid 0x1 inet 192.168.1.235 netmask 0xfffffc00 broadcast 255.255.255.255 ether 00:a0:83:30:05:7a media: Ethernet autoselect (100baseTX ) status: active lo0: flags=8049 mtu 16384 inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x7 inet 127.0.0.1 netmask 0xff000000 Which of the following operating systems are you working on?

Linux The output shown is from the ifconfig command run on a Linux system. The equivalent command on Windows 98, Windows 2000, and Windows Server 2003 is ipconfig.

You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for its customers who want Internet access. You decide to check your e-mail before the meeting begins, but when you open the browser you cannot gain Internet access. Other customers are on the Internet and because you use a wireless connection at work, you are sure your laptops wireless adapter works. What is the likely cause of the problem?

Mismatched SSID

You want to measure the voltage, amps, and ohms of various devices. Which tool should you use?

Multimeter

Which of the following best describes the condition where a signal sent on one wire is received on another wire within the same connector?

NEXT Near end crosstalk (NEXT) is crosstalk measured on the same end as the transmitter. For example, when a signal is sent on one wire, near end crosstalk measures the interference on another wire at the same connector near the source of the original signal. Far end crosstalk (FEXT) is crosstalk measured on the opposite end from the transmitter. For example, when a signal is sent on one wire, far end crosstalk measures the interference on another wire at the opposite end from the source signal.

You are setting up a wireless hotspot in a local coffee shop. For best results, you want to disperse the radio signals evenly throughout the coffee shop. Which of the following types of antennas would you use on the AP to provide a 360-degree dispersed wave pattern?

Omni-directional

Two routers with the hostnames SLC and PROVO have been configured to connect using PPP with CHAP authentication through their BRI0 interfaces. Attempts to establish a session between the two routers fails. You check the running configuration on both routers and find the output shown below: hostname SLC enable password cisco username PROVO password vanilla ! ! interface Serial0 ip address 172.16.55.129 255.255.255.252 encapsulation ppp ppp authentication chap ! ! - remaining output omitted -- hostname PROVO enable password ccna username SLC password chocolate ! ! interface Serial0 ip address 172.16.55.130 255.255.255.252 encapsulation ppp ppp authentication chap ! ! - remaining output omitted -- What should you do to correct the problem?

On SLC, change the username password to chocolate.

Your company recently installed a unified communication system. Employees are now able to inform each other of their availability.

Presence information

You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use?

Protocol analyzer Use a protocol analyzer (also called a packet sniffer) to examine network traffic. You can capture or filter packets from a specific device or that use a specific protocol.

You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installed, the signal between the two systems is weak as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength?

Replace the Omni-directional antenna with a directional antenna

Which of the following protocols is used during the call control process of multimedia communications?

Session Initiation Protocol

Mobile devices in your organization use the access points shown in the figure below to connect to your wireless network. Recently, a catastrophic early morning power surge occurred, followed by an outage that lasted longer than your backup equipment could supply temporary power. After you powered the equipment back on, everything initially appeared to work correctly. However, ever since this event, some mobile users report that wireless network connections sometimes get dropped or perform very poorly. What should you do? (Select two.)

Set the channel used by access point B to 8. Set access point B to use 802.11n wireless networking.

You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wall to hang a picture and pierces the cable such that a signal sent on pin 1 arrives on the cable connected to pin 7. What term describes this condition?

Short circuit An electrical short occurs when electrical signals take a different path other than the intended path. In the case of twisted pair wiring, a short means that a signal sent on one wire might arrive on a different wire. Shorts are caused by worn wire jackets or crushed wires so that two wires touch, or by something metal piercing the wire and causing an alternate path. An open circuit is a cut in the wire that prevents the original signal from reaching the end of the wire. With a short, the signal travels a different path, but with an open circuit, the signal does not travel anywhere (electricity cannot flow because the path is disconnected).

Users report that the Internet is no longer accessible. You suspect that the line connecting your building to the Internet is not working properly. Which of the following allows the service provider to remotely test the local loop?

Smart jack A smart jack is a special loopback plug installed at the demarcation point for a WAN service. Technicians at the central office can send diagnostic commands to the smart plug to test connectivity between the central office and the demarc. A smart jack is similar to a loopback plug; however, the loopback plug must be manually inserted into a jack to test the line, while the smart jack is a special plug that includes loopback support and can be used for remote testing of the local loop. With a smart jack, technicians can diagnose the local loop without visiting your location.

One method of preventing routing loops is to not send information about a route back to the router from which the information came. What is this technique called?

Split horizon Split horizon is a technique used by distance vector routing protocols that prevents routing loops by making sure that a router cannot send network information backwards. If Router1 receives routing information from Router2, it cannot send that same information back to Router2.

When troubleshooting network issues, it's important to carry out tasks in a specific order. Drag the trouble shooting task on the left to the correct step on the right.

Step 1- Identify the problem. Step 2 - Establish a theory of probable cause. Step 3 - Test the theory to determine the cause. Step 4 - Establish a plan of action. Step 5 - Implement the solution or escalate. Step 6 - Verify full system functionality. Step 7 - Document findings, actions and outcomes.

You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, that she can no longer access the network. You go to the office and see that one of the user's stiletto heels has broken and exposed some of the wires in the Cat 5 network cable. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy?

Test the solution.

Match each troubleshooting command on the left with its function on the right. Each utility may be used once, more than once, or not at all.

Tests connectivity between two network hosts by sending IPv4 ICMP Echo Request packets without modifying the TTL parameter. ==> ping Computes lost/sent packet statistics for each hop in the route between two hosts. ==> pathping Used on Linux systems to identify the route between two IPv6 hosts. ==> traceroute6 Used on Windows systems to identify the route between two IPv4 hosts. ==> tracert Tests connectivity between two network hosts by sending IPv6 ICMP Echo Request packets without modifying the TTL parameter. ==> Leave Blank

Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. Recently, your CEO conducted a video conference with the employees at the branch office. The employees complained that the video was choppy and that the audio was frequently out of sync with the video. What is the most likely cause of this poor WAN performance?

The WAN provider is throttling bandwidth on the link. In this scenario, its possible that the WAN service provider is the cause of the problem. You should check the contract with the service provider to make sure they aren't throttling the bandwidth of the WAN link. It's not uncommon for service providers to impose bandwidth or utilization caps that could be hampering communications. Because connectivity exists between the home and branch office networks in this scenario, the following are very unlikely to be the cause of the problem: • A disabled WAN interface • A protocol mismatch • An authentication mismatch • An IP address misconfiguration

Consider the network shown in the exhibit. You have been experiencing intermittent connectivity issues with switch2. To check the status of the interfaces, you run the following commands: switch2# show interfaces fa0/1 status Port Name Status Vlan Duplex Speed Type Fa0/1 connected 3 a-half a-100 10/100BaseTX switch2# show interfaces Gi0/1 status Port Name Status Vlan Duplex Speed Type Gi0/1 connected trunk a-full a-1000 1000BaseTX switch2# show interfaces Gi0/2 status Port Name Status Vlan Duplex Speed Type Gi0/2 connected trunk a-full a-1000 1000BaseTX What is the issue with this network?

The device connected to the Fa0/1 interface has autonegotiation disabled. A duplex mismatch probably exists on the Fa0/1 interface. Note that duplexing has been automatically set to half, which is the default behavior for Cisco devices when autonegotiation fails. To fix the issue, check the Gi0/1 interface on router1 to see if autonegotiation has been disabled. You could manually configure the Fa0/1 interface on switch2 to use the same duplexing and link speed settings as the interface on the router, or you could re-enable autonegotiation on the router interface. The Gi0/1 and Gi0/2 interfaces on switch2 appear to be functioning correctly with full duplexing and full link speed having been automatically configured.

A workstation is connected to a switch on the Gi 0/2 interface using a straight-through cable. The Ethernet interface in the workstation has been manually configured to use a 100 Mbps link speed in full-duplex mode. Which of the following are true in this scenario? (Select three.)

The switch attempts to sense the link speed. If it can't, the slowest link speed supported on the interface is selected. If the link speed is 10 Mbps or 100 Mbps, half-duplex is used. If the link speed is 1000 Mbps or faster, full-duplex is used.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor.

Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: • A wireless television distribution system running at 2.4 GHz • A wireless phone system running at 5.8 GHz • A wireless phone system running at 900 MHz • An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range • An 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?

The wireless TV system

Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Up • Protocol status: Down What is the most likely cause of this WAN issue?

There is a data link encapsulation protocol mismatch between the WAN interfaces on both ends of the link. If the WAN interface's line status is up and the protocol status is down, then you're most likely experiencing a Layer 2 issue. This could be caused by a mismatch in the data link encapsulation protocol used on the link. Common Layer 2 point-to-point WAN protocols include HDLC, PPP, and Frame Relay. The same Layer 2 protocol must be used on both ends of the link.

Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Down • Protocol status: Down What are the most likely causes of this WAN issue? (Select two.)

There is a problem with the service provider's network. The WAN interface on one or both routers has been disabled. Because both the line status and the protocol status of the WAN interface is down, you're most likely experiencing a Layer 1 issue. As such, you should start troubleshooting at Layer 1. In this scenario, it's possible that: • One or both WAN interfaces have been shut down (disabled). • There is an issue with the service provider's network. Because both interfaces have a status of down/down, the problem must lie at Layer 1. The following issues are Layer 2 or 3 issues: • A protocol mismatch • An authentication mismatch • An IP address misconfiguration Latency on the link would still allow communications to occur between the routers, but performance would be poor. If this were the case, the interface status of both link ends would be in an up/up state.

Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Up • Protocol status: Up What is the most likely cause of this WAN issue?

There is an IP address misconfiguration issue between the WAN interfaces on both ends of the link.

Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Up • Protocol status: Down What is the most likely cause of this WAN issue?

There is an authentication misconfiguration issue between the WAN interfaces on both ends of the link.

Your organization recently opened a branch office in a remote area. Because of its location, traditional WAN connectivity was not available, so you contracted with a satellite provider to connect the branch office network to your home office network. Recently, your CEO conducted a video conference with the employees at the branch office. The employees complained that the video was choppy and that the audio was frequently out of sync with the video. What is the most likely cause of this poor WAN performance?

There is latency on the WAN link. In this scenario, its very likely that the satellite link itself is the cause of the problem. Because the radio signals used by satellite links must travel thousands of miles into space and back, several milliseconds of latency are introduced. For some types of network communications, such as saving a file or sending an email, this latency is not a problem. However, for time-sensitive communications such as a video conference, the latency inherent in the satellite link can cause poor network performance.

You have a WAN link that connects two sites. The WAN link is supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the actual bandwidth of the link. Which tool should you use?

Throughput tester

Match each UC component on the left with its corresponding definition on the right.

UC Server - Manages the entire UC system UC Gateway - Connects a digital network to an analog network UC Server - Makes presence information available to users UC Hardware Device - An IP phone for making phone calls UC Gateway - Connects a UC network to the PSTN UC Software Device - A smart phone used to access the UC system UC Hardware Device - Designed to work specifically with the UC server

You are troubleshooting a connectivity problem in which one client system is unable to connect to a server. Both the server and client system are connected to the same Ethernet network switch. No other users have complained of a problem, and you suspect that faulty network cabling might be to blame. Which of the following troubleshooting steps are you most likely to perform first?

Use a cable tester to test the cable between the computer system and the network switch.

While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?

Use a different Channel ID.

You have just been hired as a network administrator. A user has just changed offices and needs you to activate the network and telephone connections in his office. However, the wiring at the punch down block is labeled poorly and you are unable to tell which wires go to the user's office. What should you do?

Use a tone generator to locate the correct wiring

Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently?

arp

Which TCP/IP utility gives you the following output? Interface: 192.168.4.101 on Interface 0x3 Internet Address Physical Address Type 192.168.1.23 00-d1-b6-b7-c2-af dynamic

arp This output is displayed when you use the arp command to look at the ARP cache.

Which TCP/IP utility gives you the following output? Interface: 192.168.1.111 on Interface 0x2 Internet Address Physical Address Type 192.168.1.102 00-60-08-bd-62-5a dynamic 192.168.1.168 00-06-5b-1c-48-76 dynamic

arp -a The arp -a command shows the current entries in the computer's ARP cache.

Consider the following output. ;; res options: init recurs defnam dnsrch ;;got answer: ;;->>HEADER<<-opcode:QUERY, status; NOERROR,id:4 ;;flags: qr rd ra; QUERY:1, ANSWER:1, AUTHORITY:2, ADDITIONAL:0 ;;QUERY SECTION: ;; westsim111.com, type = A, class = IN ;;ANSWER SECTION: westsim111.com. 7h33m IN A 76.141.43.129 ;;AUTHORITY SECTION: westsim111.com. 7h33m IN NS dns1.deriatct111.com. westsim111.com. 7h33m IN NS dns2.deriatct222.com. ;;Total query time: 78 msec ;;FROM: localhost.localdomain to SERVER: default -- 202.64.49.150 ;;WHEN: Tue Feb 16 23:21:24 2005 ;;MSG SIZE sent: 30 rcvd: 103 Which of the following utilities produced this output?

dig The output shown is from the dig command run on a Linux system. Although nslookup and dig provide much the same information, this output can be identified as coming from dig because dig produces significantly more detail in its default usage.

You are troubleshooting a connectivity problem on a Linux server. You are able to connect to another system on the local network, but are not able to connect to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?

ifconfig Use the ifconfig command on systems running Linux to view information on the TCP/IP configuration of network adapters. Use ipconfig and winipcfg to view network configuration information on Windows systems. Use the dig command on Linux and Unix systems to query Domain Name Service (DNS) servers.

You work in an office that uses Linux servers, NetWare servers, and Windows NT 4.0 servers. The network uses both the TCP/IP and IPX/SPX protocols. The Linux server is used as an FTP server. Today you have received several calls from people who are unable to contact the Linux server at its known IP address. You are sitting at the Linux server and want to check its IP address. Which command should you use?

ifconfig Use the ifconfig command to show the TCP/IP configuration for a Linux computer.

You want to be able to view the DNS server address that a computer is using. Which of the following utilities would you use? (Select two.)

ifconfig ipconfig Use the ipconfig command on Windows and ifconfig command on Linux to view the IP configuration for a device including the IP address, subnet mask, default gateway, and DNS server addresses used for a connection.

Which TCP/IP utility gives you the following output? Ethernet Adapter Local Area Connection: Connection-specific DNS Suffix . : testout.com IP Address. . . . . . . . . . . . . . . . . . . : 192.168.1.111 Subnet Mask . . . . . . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . . . . . : 192.168.1.1

ipconfig The ipconfig command shows the computer's TCP/IP configuration information. winipcfg also shows the TCP/IP configuration, but in a Windows graphical format.

You have been called in to troubleshoot a connectivity problem on a newly installed Windows Server 2003 system. The system is operating satisfactorily and is able to communicate with other systems on the local network. However it is unable to access any systems on other segments of the corporate network. You suspect that the default gateway parameter for the system has not been configured, or may be configured incorrectly. Which of the following utilities are you most likely to use to view the default gateway information for the system?

ipconfig Use the ipconfig utility to view the TCP/IP configuration of a Windows Server 2003 system. The information displayed by ipconfig includes default gateway information. Use winipcfg to view the TCP/IP configurations on earlier versions of Windows including Windows 98 and Me. It is not supported by Windows Server 2003. Use the ifconfig command to view the TCP/IP configuration on a Linux, Unix or Macintosh system. Use the netstat command to view statistics on TCP connections.

You administer a NetBIOS-based network that uses the TCP/IP protocol. You are trying to troubleshoot a computer that is unable to contact a server by its NetBIOS name. Which command can you use to check the connection?

nbtstat Use nbtstat to troubleshoot NetBIOS name resolution problems. The command shows which NetBIOS names the server uses, and which NetBIOS names the client knows about.

Which TCP/IP utility gives you the following output? Local Area Connection: Node IpAddress: [192.168.1.111] Scope Id: [ ] NetBios Remote Cache Name Table Name Type Host Address Life [sec] ------------------------------------------------------------------------ NTINE.ES <54> UNIQUE 192.168.1.23 395 NTINE <20> UNIQUE 192.168.1.23 45 AUDIO <00> UNIQUE 192.168.1.168 585

nbtstat -c nbtstat -c shows you the resolved NetBIOS name cache for a computer. In other words, these are the NetBIOS name-to-IP address mappings for known remote computers.

Examine the following output: Active Connections Proto Local Address Foreign Address State TCP SERVER1:1036 localhost:4832 TIME_WAIT TCP SERVER1:4798 localhost:1032 TIME_WAIT TCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAIT TCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHED TCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHED TCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED Which of the following utilities produced this output?

netstat The output shown is produced by the netstat command. netstat reports the TCP/IP ports open on the local system, as well as identifying the protocol and remote host connected to that port. This information can be very useful when looking for security weaknesses, as a TCP/IP port that is open to traffic unnecessarily represents a security risk.

Your computer is sharing information with a remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection?

netstat Use the netstat command to check the status of a TCP connection.

Which TCP/IP utility gives you the following output? Active Connections Proto Local Address Foreign Address State TCP me:epmap me:0 LISTENING TCP me:1025 me:0 LISTENING UDP me:emap *:* UDP me:netbios-ns *:*

netstat -a netstat -a shows you the status of all connections and listening ports.

Which TCP/IP utility gives you the following output? Route Table ========================================== Interface List 0x1 . . . . . . . . . . . . . . MS TCP Loopback interface 0x2 . . .00 10 4b . . . 3 Com 3C90x Ethernet Adapter ========================================== ========================================== Active Routes:

netstat -r netstat -r shows you the computer's route table.

Which command displays network activity statistics for TCP, UDP, and IP?

netstat -s Netstat -s displays network activity statistics for TCP, UDP, and IP.

Examine the following output: Server: helicuplar.xct.takro.net Address: 209.53.4.130 Name: westsim.com Address: 64.78.193.84 Which of the following utilities produced this output?

nslookup The output is from the nslookup command on a Windows Server 2003 system. nslookup is a tool that allows you to send manual DNS resolution requests to a DNS server. The output displays the IP address and hostname of the DNS server that performed the resolution, and the IP address and hostname of the target specified for resolution. nslookup can be a useful tool when troubleshooting DNS name resolution problems.

Mary calls to tell you that she can't connect to an intranet server called WebSrv1. From her computer, you ping the server's IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem?

nslookup Use nslookup to troubleshoot name resolution problems. Because the ping test was successful, you know that both the client and the server can communicate using TCP/IP with IP addresses. This tells you that the problem is related to name resolution.

You are troubleshooting a network connectivity issue on a Unix system. You are able to connect to remote systems by using their IP address, but unable to connect using the hostname. You check the TCP/IP configuration, and note that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Choose two.)

nslookup dig The dig and nslookup commands allow you to perform manual DNS lookups from a Linux or Unix system. This can be very useful when troubleshooting name resolution issues.

You need to perform a reverse lookup of the 10.0.0.3 IP address. Which command can you use to accomplish this? (Select two. Each response is a complete solution.)

nslookup 10.0.0.3 dig -x 10.0.0.3

You work in an office that uses NetWare servers and Windows NT 4.0 servers. The network uses both the TCP/IP and IPX/SPX protocols. You are sitting at a workstation that uses Windows 95 OSR2. An application you are using is unable to contact a Windows NT server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?

ping

Which TCP/IP utility gives you the following output? Reply from 192.168.1.168: bytes=32 time<10ms TTL=128> Reply from 192.168.1.168: bytes=32 time<10ms TTL=128> Reply from 192.168.1.168: bytes=32 time<10ms TTL=128> Reply from 192.168.1.168: bytes=32 time<10ms TTL=128> Packets: Sent = 4, Received = 4, Lost = 0 <0% Loss>, Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms

ping The output of the ping command shows you the results of four echo request/reply contacts with a destination host.

Examine the following output. Reply from 64.78.193.84: bytes=32 time=86ms TTL=115 Reply from 64.78.193.84: bytes=32 time=43ms TTL=115 Reply from 64.78.193.84: bytes=32 time=44ms TTL=115 Reply from 64.78.193.84: bytes=32 time=47ms TTL=115 Reply from 64.78.193.84: bytes=32 time=44ms TTL=115 Reply from 64.78.193.84: bytes=32 time=44ms TTL=115 Reply from 64.78.193.84: bytes=32 time=73ms TTL=115 Reply from 64.78.193.84: bytes=32 time=46ms TTL=115 Which of the following utilities produced this output?

ping The output shown was produced by the ping utility. Specifically, the information output was created using theping -t command. The -t switch causes packets to be sent to the remote host continuously until stopped manually. ping is a useful tool for testing connectivity between devices on a network. Using the -t switch with ping can be useful in determining whether the network is congested, as such a condition will cause sporadic failures in the ping stream. tracert is similar to ping in that it tests connectivity between two hosts on the network. The difference is that tracert reports information on all intermediate devices between the host system and the target system. ping, on the other hand, does not report information on intermediate devices.

Which of the following utilities would you use to view the routing table?

route Use the route command to display the contents of the routing table or to add or remove static routes. traceroute or tracert uses ICMP packets to test connectivity between devices, and shows the path between the two devices. Responses from each hop on the route are measured three times to provide an accurate representation of how long the packet takes to reach, and be returned by that host. The mtr command on Linux is a combination of the ping and traceroute commands.

Which of the following commands would display the output shown here? Route Table ========================================== Interface List 0x1 . . . . . . . . . . . . . . MS TCP Loopback interface 0x2 . . .00 10 4b . . . 3 Com 3C90x Ethernet Adapter ========================================== ========================================== Active Routes:

route print Use the route print or netstat -r commands to display the contents of the routing table.

You are troubleshooting physical layer issues with the Gi0/1 interface in a router. You need to view and analyze the number of collisions detected on the interface. Which command should you use?

show interfaces gi0/1

You are troubleshooting physical layer issues with the Gi0/1 interface in a router. You suspect that a duplex mismatch error has occurred, and you need to determine the duplex settings configured on the interface. Which commands could you use? (Choose two. Each response is a complete solution.)

show interfaces gi0/1 show interfaces gi0/1 status

While troubleshooting a problem on a Linux system, you run a utility that generates the following output: 5 s3232.gw.Seat.someisp.net (63.201.72.9) 38.433 ms 38.713 ms 39.085 ms 6 st11122.gar1.Seat.someisp.net (211.242.9.121) 38.620 ms 38.593 ms 38.050 ms 7 oc48-6yy.Seat.someisp.net (14.248.154.129) 57.440 ms 56.678 ms 57.675 ms 8 t223hgh-ytry.swa.someisp.net (142.133.89.232) 103.041 ms 57.181 ms 56.619 ms 9 t8343mmd.cgssel.someisp.net (162.191.10261) 91.977 ms 93.971 ms 93.767 ms 10 twirem2.cgssfdl.ip.someisp.net (145.97.133.23) 92.463 ms 92.337 ms 93.523 ms 11 twerrm1.nfffsiny.ip.someisp.net (117.116.141.38) 106.000 ms 106.007 ms 105.283 ms 12 gbed22repp0.n5ddsdsy.ip.someisp.net (123.194.132.8) 103.198 ms 105.447 ms 104.263 ms Which of the following utilities were you using?

traceroute The output from traceroute and tracert are very similar. However, tracert is a utility used on Windows systems, not on Linux systems. As the question stated that you were working on a Linux system, the output would therefore be from traceroute. Use the dig command on Unix to troubleshoot DNS issues. Use ping to test connectivity between systems on a network.

While working on a Linux server, you are unable to connect to Windows Server 2003 system across the Internet. You are able to ping the default gateway on your own network, so you suspect that the problem lies outside of the local network. Which utility would you use to track the route a packet takes as it crosses the network?

traceroute traceroute is a Linux utility that allows you to track the route of a packet as it traverses the network. The traceroute utility is used on Linux systems, while tracert is used on Windows systems.

Which TCP/IP utility gives you the following output? 2 14 ms <10 ms 14 ms Loopback0.GW1.ALTER.NET [137.39.2.123] 3 14 ms <10 ms 13 ms 122.at.-6-0.SLT4.ALTER.NET [152.63.91.86] 4 <10 ms 14 ms 10 ms 0.so.-0-1-0.ALTER.NET [152.63.1.210]

tracert The exhibit shows a few lines from the tracert command, which shows you each host a packet must pass through to reach its destination.

Examine the following output: 4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [205.171.205.29] 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1] Which of these commands produced this output?

tracert The output is from a tracert command run on a Windows Server 2003 system. The tracert command provides information on each step in the route a packet takes to reach a remote host. Responses from each hop on the route are measured three times to provide an accurate representation of how long the packet takes to reach, and be returned by that host. This information can be useful in locating congestion points on a network, or when verifying that network routing is operating as expected.

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. The office has two Windows 2000 servers, two UNIX servers, one Windows NT server, 90 Windows 98 clients, 40 Windows 2000 Professional clients, and five Macintosh clients. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is not working properly?

tracert tracert shows you the series of routers that are used between the source and destination computers. If a router is not functioning, tracert can help you find which router is not working by showing you the last router it was successfully able to contact.


Conjuntos de estudio relacionados

supply chain multiple choice answers

View Set

STATS EXAM, Chapter 3 (Quantitative Variables), Chapter 2 (Categorical Variables)

View Set

26208-17 Conductor Terminations & Splices, Module 26206 conductor installations, 26205-20 Pull & Junction Boxes, Midterm

View Set

Chapter 24 - Urinary system - Smart book

View Set