Networking final, Networking 1, Networking...

¡Supera tus tareas y exámenes ahora con Quizwiz!

There is a special range of addresses reserved for systems that cannot obtain an IP address automatically from a DHCP server. These addresses are not routable on the network. What is the value in the first octet for these addresses?

169

A Microsoft Windows® PC is configured to obtain its IP address via DHCP. If the PC is unable to contact a DHCP server, the PC automatically assigns itself an IP address in what range?

169.254.0.0 - 169.254.255.255

Which of the following address ranges is not routable? This task contains the radio buttons and checkboxes for options. T

169.254.0.0 - 169.254.255.255

Which of the following is a valid value of the first octet for a Class B IP address?

172

Which policy is also referred to as a fair use policy?

Acceptable use policy

Which policy provides restrictions and overall guidelines on how the network should be used?

Acceptable use policy

What mode of NIC redundancy has only one NIC active at a time?

Active-Standby

Gateway

Acts as a translator between two different telephony signaling environments

What routing protocol characteristic indicates the believability of the routing protocol (as opposed to other routing protocols)?

Administrative distance

Refer to the exhibit. Consider the network topology. Which (if any) device in the topology has an incorrect IP address? (Assume that if two devices belong to one subnet, and another device belongs to a different subnet, that device (belonging to a different subnet than the other two devices) has an incorrect IP address.)

All devices have valid IP addresses.

Which of the following best defines an IDS sensor?

An IDS sensor scans, audits, and monitors the security infrastructure for signs of attacks in progress.

Which of the following best defines an IPS sensor?

An IPS sensor sits in-line with traffic being analyzed, can recognize the signature of a well-known attack, and respond appropriately.

Which of the following conditions result in no current flowing through a circuit?

An open in a cable

What IoT technology is specialized for monitoring sensor data and is ultimately led by Garmin?

Ant+

What is the name of the wireless protocol used in a sensor to relay information such as a person's heart rate or a car's tire pressure?

Ant+

A corporate e-mail service would be classified as belonging to what Layer of the OSI Model?

Application

Which of the following is a Microsoft Windows® log that would report events related to software applications running on the underlying operating system?

Application

If a network has "five nines" of availability, what is its maximum downtime per year?

Approximately five minutes

Which IEEE 802.1X component checks the credentials of a device wanting to gain access to the network?

Authentication server

What is a routing protocol that is used for moving prefixes back and forth between different autonomous systems?

BGP

Which of the following routing protocols is an EGP?

BGP

Which routing protocol uses a complex set of metrics called path vectors?

BGP

While DHCP is not the only protocol used for dynamically assigning IP addresses to clients, it does offer a more robust set of features. Which of the following is a predecessor to DHCP, offering a reduced feature set?

BOOTP

A wireless LAN (WLAN) containing only one access point (AP) is known as what type of WLAN?

BSS

Refer to the exhibit. What type of LAN topology is shown in the graphic?

BUS

Which of the following pieces of equipment can a telephone technician use to determine if a phone line has dial tone?

BUTT SET

Which of the following conditions would most likely result in corrupted data?

Bad cables or connectors

Subnetting extends a classful subnet mask of an IP network to create additional subnets. However, what IP addressing approach removes bits from a classful subnet mask, to summarize multiple classful networks?

CIDR

Which of the following DNS record types is an alias of an existing record?

CNAME

Consider the fully-qualified domain name (FQDN) host1.pearsonitcertification.com; what is the top-level domain in the FQDN?

COM

What technology do WLANs use to decide when they gain access to the wireless media?

CSMA/CA

What is the technology used in an Ethernet network that features a backoff timer?

CSMA/CD

Which of the following statements are true of an Ethernet hub? Each correct answer represents a complete solution. Choose all that apply.

CSMA/CD needs to run on all attached devices. All connections need to be half-duplex.

Which of the following can distinguish between data arriving on various DS0s and can be thought of as a digital modem?

CSU/DSU

What can terminate an incoming digital circuit from a service provider and send properly formatted bits to a router?

CSU/DSU circuit

Which QoS mechanism is often called soft QoS?

Differentiated services

While an IPsec tunnel is being established, which of the following securely establishes a shared secret key, over the unsecured medium?

Diffie-Hellman (DH)

Which of the following is a modular switch port, allowing you quickly remove and insert a port in a modular switch you are troubleshooting?

GBIC

Which security technique uses wireless technologies to create an invisible boundary around some point?

Geofencing

Question 7 :Identify the broad categories of SNMP message types. (Choose three.)

Get,Set,Trap

Which IPv6 address type is indicated by the first four hex characters of an address ranging from 2000 to 3999?

Globally routable unicast

When following a structured troubleshooting methodology, what should you do if you test a hypothesis, and the hypothesis is determined to be invalid?

Hypothesize another probable cause of the issue.

A wireless LAN (WLAN) configured to work in an ad hoc fashion (that is, without requiring the use of an access point) is known as what type of WLAN?

IBSS

WLAN formed directly between wireless clients (without the use of a wireless AP) is referred to as what type of WLAN?

IBSS

You are troubleshooting an issue where a PC can reach some hosts on the Internet (using either DNS name or IP address), while several other hosts on the Internet are not reachable. From the PC you can Ping all devices on your local subnet. What is most likely causing the problem?

Incorrect (or missing) routes ina router's routing table

What is typically the problem when a host is unable to browse the Internet using domain names?

Incorrect DNS configuration

You are troubleshooting an issue where a PC cannot reach a web server (with a DNS name of pearsonitcertification.com) on the Internet. From the PC you can Ping the IP addresses of devices on your local subnet. You cannot Ping the DNS name of the web server. However, you have previously noted the IP address of the web server's IP address, and you notice that you can Ping the IP address of the web server. Of the following potential troubleshooting issues, what is most likely causing the problem?

Incorrect DNS configuration on the PC

What is typically the problem when a host is unable to reach devices outside the local network?

Incorrect default gateway

What term defines a variation in the delay of packets in the network?

Jitter

Question 3 :A lack of bandwidth can lead to which QoS issues? (Choose three.)

Jitter,Packet drops , Delay

Which of the following remote access security technologies is a client-server authentication protocol and uses the concept of a trusted third party (that is, a Key Distribution Center) that hands out tickets that are used instead of a username and password combination?

Kerberos

What is the name of the physical security device that's commonly grouped with keys and can be used to gain access to a network or a physical location?

Key fob

Which of the following security threats is a program that runs in the background of a computer and keeps a record of what a user types on their keyboard?

Keylogger

What protocol is used to bundle links together in order to improve bandwidth availability and redundancy?

LACP

What technology enables you to assign multiple physical links to a logical interface, which appears as a single link to a route processor?

LACP

Which of the following is a protocol that allows you to bundle multiple physical interfaces (for example, Ethernet switch interfaces) into a single logical interface?

LACP

Which type of fiber optic connector connects to a terminating device by pushing the connector into the terminating device and can be removed by depressing the tab on the connector and pulling it out of the terminating device?

LC

Which QoS mechanism can fragment large packets and interleave smaller packets in amongst the packet fragments?

LFI

Which of the following mechanisms is considered a link-efficiency tool in QoS? This

LFI

Which MPLS element makes frame-forwarding decisions based on labels applied to frames? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A ELSR

LSR

What term defines a delay of packets in the network?

Latency

What wireless LAN (WLAN) issue results from a WLAN's use of CSMA/CA?

Latency

An Ethernet hub resides at which layer of the OSI Model?

Layer 1

An Ethernet switch resides at which layer of the OSI Model?

Layer 2

Question 7 :A router resides at which layer of the OSI Model?

Layer 3

Internet Protocol (IP) resides at what layer of the OSI Model? Each correct answer represents a complete solution. Choose all that apply.

Layer 3 , Network

American Standard Code for Information Interchange (ASCII) would be classified at which layer of the OSI Model?

Layer 6

A DHCP server can be used to assign a temporary IP address to a DHCP client, as opposed to a network administrator statically configuring an IP address on that client. What is this temporary IP address assignment called?

Lease

Question 63 :A T3 connection is an example of which WAN type?

Leased Line

Which IPv6 address type begins with the hex characters FE80?

Link-local

Refer to the exhibit. In the topology, "Network Appliance X" takes requests coming into the server farm and spreads those requests out over all of the available servers (which contain identical content). What type of network appliance is Network Appliance X?

Load balancer

Which of the following network appliances is also known as a content swit

Load balancer

Which of the following connects the transmit leads of an Ethernet connector (or the transmit fiber of a fiber optic connector) to the receive leads of the same Ethernet connector (or the receive fiber of a fiber optic connector)?

Loopback plug

Which of the following approaches to wireless LAN (WLAN) security restricts access to a WLAN based on a computer's wireless interface card? This

MAC address filtering

In the absence of STP, what issues might result from a Layer 2 loop in a network? (Choose two.)

MAC address table corruption, Broadcast storms

Which of the following are sublayers of the Data Link Layer (that is, Layer 2) of the OSI Model? Each correct answer represents a complete solution. Choose all that apply.

MAC, LLC

Which of the following UNIX commands can be used to invoke a UNIX syntax reference?

MAN

Which of the following connects to multiple intermediate distribution frames?

MDF

What Ethernet switch feature allows a port to automatically determine which of its leads are used for transmitting data and which of its leads are used for receiving data?

MDIX

Which of the following features allows an Ethernet switch port to automatically detect which of its pins should be used for transmitting and which pins should be used for receiving? This

MDIX

Which of the following features can fix mismatched Tx/Rx leads on an Ethernet switch?

MDIX

Which Ethernet switch feature allows an Ethernet switch to make a copy of frames seen on one switch port and send those copies out of another Ethernet switch port? (NOTE: This feature is often used to allow a network analyzer connected to one switch port to see traffic present on a different switch port.)

Port forwading

Which of the following is a vulnerability scanner product from Tenable Network Security®?

Nessus

What switch feature allows you to connect a network sniffer to a switch port and tells the switch to send a copy of frames seen on one port out the port to which your network sniffer is connected?

Port mirroring

Which of the following is a link-state routing protocol that uses a metric of cost, which is based on the link speed between two routers?

OSPF

A network administrator can use which of the following to locate a break in a fiber optic cable?

OTDR

What piece of test equipment enables you to locate a break in a fiber-optic cable?

OTDR

Which of the following network appliances acts as a relay for packets traveling between a network's clients and the Internet and is not focused on tunneling?

Proxy server

From the following list, identify the detection methods commonly used by IPS sensors. (Choose three.)

Policy Based, Signature Based, Behavior Based

What Ethernet switch feature allows a PC running packet capture software and connected to one switch port to receive a copy of traffic seen on another switch port?

Port Mirroring

Which of the following network appliances is used to restrict clients from accessing certain URLs on the Internet?

Proxy server

Refer to the exhibit. In the topology shown, what is the most likely type of network appliance labeled as "Network Appliance X?"

Proxy server

Which of the following tools should be used to connect wires to a 110 block?

Punch Down tool

Which of the following remote access security technologies is a UDP-based protocol used to communicate with an AAA server and does not encrypt an entire authentication packet, but only encrypts the password?

Radius

Which type of fiber optic connector, containing one fiber optic strand per connector, is connected by pushing the connector into a terminating device and can be removed by pulling the connector from the terminating device?

SC

What does the term asymmetric mean in DSL?

The upload speed and the download speed differ.

If you are working on an isolated test network (that is, a test bed), what piece of equipment can you use to simulate a heavy network load?

Throughput tester

What is a common reason for disabling SSID broadcast in a wireless LAN (WLAN)? This

To better conceal the SSID of a WLAN

Which of the following pieces of test equipment is sometimes called a "fox and hound?"

Toner Probe

Which of the following tools best helps you determine which wires on a punch down block connect back to a specific user's office?

Toner probe

Identify the quality of service (QoS) mechanism that can set a bandwidth limit on traffic and delays packets, rather than drops packets, attempting to exceed that bandwidth limit.

Traffic Shaping

Question 51 :If you want to buffer excess traffic and send it later, what traffic conditioning technology should you consider?

Traffic Shaping

Windowing is provided at what layer of the OSI reference model?

Transport Layer

Question 9 :Identify the four layers of the TCP/IP stack.

Transport Layer, Internet Layer, Application Layer, Network Interface Layer

Which of the following security threats is a program that appears to be for one purpose (for example, a game), but secretly performs another task (for example, collecting a list of contacts from an end-user's e-mail program)?

Trojan horse

Which of the following network appliances performs the most processor-intensive tasks and is critical in IPSec environments?

VPN concentrator

What technology is an IETF version of HSRP?

VRRP

Which Ethernet switch feature allows you to create a VLAN on one switch and have that VLAN be automatically created on other switches?

VTP

What virtual network device allows Microsoft Active Directory (AD) services, UNIX-based web services, and DNS services to be co-resident on the same network device?

Virtual Server

What virtual network service stores user data and the GUI in a data center, as opposed to the hard drive in a user's computer?

Virtual desktop

What virtual network component allows virtual servers located on the same physical server to be logically separated into different VLANs?

Virtual switch

Which of the following security threats is a piece of code (for example, a program or a script) that infects a system, because an end-user executed a program?

Virus

What type of software application should network administrators routinely use to verify the security of their network and check for any weaknesses?

Vulnerability scanner

Which of the following approaches to wireless LAN (WLAN) security uses RC4 as its encryption algorithm?

WEP

Which of the following wireless LAN (WLAN) security threats involves mathematical algorithms that can determine a pre-shared key value? This

WEP and WPA security cracking

Which two of the following are common wireless security standards?

WEP, WPA

Which of the following security threats can infect a system or propagate to other systems without any intervention from an end user?

WORM

Which of the following approaches to wireless LAN (WLAN) security uses TKIP for encryption?

WPA

Which of the following approaches to wireless LAN (WLAN) security requires users to authenticate against an authentication server's database, rather than a client being configured with a PSK?

WPA Enterprise

Question 7 :Which standard developed by the Wi-Fi Alliance implements the requirements of IEEE 802.11i?

WPA2

Which of the following approaches to wireless LAN (WLAN) security uses AES for encryption? This

WPA2

Which of the following wireless LAN (WLAN) security threats involves performing reconnaissance to identify open wireless access points (APs) that could potentially become targets of future attacks?

War driving

Which of the following wireless LAN (WLAN) security threats involves a user writing a symbol in a public place, letting other users know about the existence of a WLAN, and possibly information about how to access that WLAN?

Warchalking

When an organization is developing a site redundancy solution, which option offers decent recovery times without initial responsiveness equivalent to the main site?

Warm Site

A notification that a specific operation failed to complete successfully is classified as what syslog severity level?

Warnings (4)

What is a best practice to prevent you from damaging a circuit board with static from your body?

Wear an ESD wrist strap.

Which of the following UNIX commands can be used to configure the IP address of a UNIX host's Ethernet interface?

ifconfig

The Network Layer of the OSI Model corresponds to what layer of the TCP/IP Stack? This

internet

What command enables you to refresh DHCP lease information?

ipconfig

What tool would you use to release a DHCP address on a Windows system?

ipconfig

Refer to the exhibit. What command produced the output shown on your Windows workstation?

ipconfig /all

What command enables you to view the DNS settings for the device?

ipconfig /all

What command would you use to verify the DNS server to be used by your Windows workstation?

ipconfig /all

Which of the following commands is used on a UNIX host to generate information about each router hop along the path from a source to a destination? This

traceroute

Which of the following is a type of network interface device (NID) that includes circuitry to perform such functions as converting between framing formats on a digital circuit?

Smart Jack

What is the name of the physical security device that is credit card sized and allows a user to authenticate onto a network?

Smart card

Which of the following remote access security technologies is a TCP-based protocol used to communicate with an AAA server and encrypts an entire authentication packet, rather than just the password?

TACACS+

Which of the following requires two types of authentication (but no more) from a user seeking admission to a network?

TFA

Which of the following protocols is used for transferring files with a remote host in a non-secure fashion and without requiring user credentials?

TFTP

Which of the following protocols are most commonly used to provide security for an HTTPS connection? (Choose two.)

TLS, SSL

What are the two primary protocols found at the Transport Layer of the TCP/IP Stack?

Tcp/udp

Which two of the following protocols are used to connect to a remote host via a terminal emulator?

Telnet, SSH

Refer to the exhibit. What is the output shown?

The ARP cache information

What is an acceptable one-way latency in a typical VoIP network?

150 ms

What is the maximum recommended one-way delay for voice traffic?

150 ms

What is the bandwidth of an OC-3?

155.52 Mbps

What is the leased line technology that has a bandwidth capacity of 44.7 Mbps?

T3

What command produced the following snippet of output?

ifconfig

What is the data rate of an OC-3 connection?What is the data rate of an OC-3 connection?

155.52Mbps

What DSL variant has a distance limitation of 18,000 ft. between a DSL modem and its DSLAM?

ADSL

Which of the following is a symmetric encryption algorithm available in 128-bit, 192-bit, and 256-bit key versions?

AES

Which of the following is an IPSec protocol that provides authentication and integrity services but does not support encryption?

AH

What wireless LAN (WLAN) device interconnects a wired LAN with wireless devices?

AP

What specification identifies the cable television frequencies dedicated to data transmission?

DOCSIS

What device terminates the DSL signal coming from a customer?

DSLAM

What technology allows devices to simultaneously transmit and receive data?

Full duplex

What WAN topology is typically the most complex and expensive to implement?

Full mesh

Which NDP message type is used by a host to locate the IPv6 routers attached to the local network?

RS

What is the measure of a wireless signal's strength?

RSSI

Which of the following is a value measuring the power of a wireless signal?

RSSI

Question 9 :Which of the following QoS mechanisms is considered an IntServ mechanism?

RSVP

Question 22 :What technology operates in the 3 kHz through 300 GHz range

Radio

Which of the following wireless LAN (WLAN) security threats is also known as an "evil twin?"

Rogue access point

What device in an STP domain features all ports in a Designated state?

Root Bridge

Question 1 :What device is a Layer 3 device that is used to make forwarding decisions based on a Layer 3 address?

Router

What device would forward information using the following address as its primary information: 192.168.1.101?

Router

An IP version 6 (IPv6) address contains how many bits?

128

What is the common TCP port (that is, "well-known" port) used by IMAP?

143

What is the maximum amount of power a switch is allowed to provide per port according to the IEEE 802.3af standard?

15.4W

One error occurred during the transmission of 8 bits. What is the BER?

.125

Which of the following are examples of top-level domains? Each correct answer represents a complete solution. Choose two.

.com, .edu

Given a subnet mask of 255.255.192.0, what is the corresponding prefix notation?

/18

Your company has been assigned the 172.16.0.0/16 network for use at one of its sites. You need to use a subnet mask that will accommodate 42 subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask will you use?

/22

Your company has been assigned the 192.168.1.0/24 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 30 hosts per subnet, while maximizing the number of available subnets. What subnet mask will you use?

/27

What option would you specify after the ipconfig command to display the IP address of a Windows PC's DNS server?

/all

Question 61 :Which Syslog severity level indicates the most severe condition?

0

What is the best possible value for administrative distance?

0

What is the subnet mask address used in a default static route?

0.0.0.0

Question 6 :What is the network address and subnet mask of a default route?

0.0.0.0/0

The default route in Internet Protocol Version 4 is designated as which of the following?

0.0.0.0/0.

What is the MAC address corresponding to the IP address of 172.16.202.2?

00-50-56-fd-65-2c

Although it does not indicate the most severe Syslog error condition, which Syslog severity level indicates a condition requiring immediate attention?

1

You have a Layer 2 switch. You have left all ports in the default VLAN. You connect five workstations. How many broadcast domains exist on this switch?

1

In the given figure, all the three wireless access points (APs) operate in the 2.4 GHz frequency band. Which three channels should be used by the APs?

1,6,11

You are configuring a wireless LAN (WLAN) with three wireless access points having overlapping coverage areas. The wireless access points are using the 2.4 GHz frequency band and are located in the United States. What three non-overlapping channels in the 2.4 GHz band should you select?

1,6,11

What is the range for a Class A address?

1-126

Which of the following statements are true regarding VLANs?

1. A VLAN has a single broadcast domain. 2. For traffic to pass between two VLANs, that traffic must be routed.

Which of the following categories of UTP cabling are commonly used for 1000BASE-T networks?

1. CAT 6 2. CAT 5e

Identify two differences between an Ethernet bridge and an Ethernet switch.

1. Switches usually have higher port densities than bridges. 2. Switches use ASICs to make forwarding decisions, whereas bridges make their forwarding decisions in software.

What is the bandwidth of a T1 digital circuit?

1.544 Mbps

What is the distance limitation of 10GBASE-LW?

10 km

If multiple wireless access points exist in a wireless LAN (WLAN), what percentage of coverage overlap should the access points have?

10 to 15 percent

When extending the range for a 2.4GHz WLAN, you can use nonoverlapping channels for adjacent coverage cells. However, there should be some overlap in coverage between those cells (using nonoverlapping channels) to prevent a connection from dropping as a user roams from one coverage cell to another. What percentage of coverage overlap should you recommend for these adjacent cells?

10% to 15%

Given the following network address translation (NAT) topology, identify the IP address that is the outside global IP address. (NOTE: To avoid using an organization's actual IP addresses in this question, all IP addresses are technically private IP addresses. However, assume that the 172.16.1.0/24 network and the 10.1.2.3 IP address are publicly routable.)

10.1.2.3

Identify the distance limitation of a 1000BASE-T Ethernet network.

100 m

What is the distance limitation of 10GBASE-LR?

10km

What is the maximum bandwidth of an 802.11b wireless LAN (WLAN)?

11 MBPS

What is the administrative distance of OSPF in a Cisco network?

110

A router has 12 ports. How many broadcast domains does the router have?

12

A switch has 12 ports. How many collision domains does the switch have?

12

What is the administrative distance of RIP in a Cisco network?

120

Identify the well-known UDP port number for NTP.

123

Refer to the exhibit. Given the network address translation (NAT) topology, identify the IP address that is the inside global IP address. (NOTE: To avoid using an organization's actual IP addresses in this question, all IP addresses are technically private IP addresses. However, assume that the 172.16.1.0/24 network and the 10.1.2.3 IP address are publicly routable.)

172.16.1.2

To what subnet does a host with an IP address of 172.16.155.10/18 belong?

172.16.128.0/18

Refer to the exhibit. Examine the output shown. What is the address that information is sent to if it is determined that the remote address is on a different subnet?

192.168.1.1

A router's IP routing table has entries noted in the exhibit. To which next hop IP address will the router forward a packet destined for 10.1.2.1?

192.168.1.2

Refer to the exhibit. Given the network address translation (NAT) topology, identify the IP address that is the inside local IP address. (NOTE: To avoid using an organization's actual IP addresses in this question, all IP addresses are technically private IP addresses. However, assume that the 172.16.1.0/24 network and the 10.1.2.3 IP address are publicly routable.)

192.168.1.2

You are designing a small office/home office (SOHO) network, and you wish to have four subnets, while maximizing the number of hosts per subnet. The network you need to subnet is 192.168.5.0/24. Which of the following is one of the four subnets you should create?

192.168.5.64/26

What type of cordless phone is most likely to interfere with a wireless LAN (WLAN)?

2.4 GHZ

The IEEE 802.11b wireless standard has which of the following frequency band / maximum bandwidth parameters?

2.4 GHz / 11 Mbps

The IEEE 802.11g wireless standard has which of the following frequency band / maximum bandwidth parameters?

2.4 GHz / 54 Mbps

The IEEE 802.11n wireless standard has which of the following frequency band / maximum bandwidth parameters?

2.4 GHz or 5 GHz / > 300 Mbps

What are the common TCP ports (that is, "well-known" ports) used by FTP? Each correct answer represents a complete solution. Choose two.

20,21

What is the common TCP port (that is, "well-known" port) used by SSH?

22

What is the common TCP port (that is, "well-known" port) used by Telnet?

23

Question 8 :What is the common TCP port (that is, "well-known" port) used by SMTP?

25

Given a subnet mask of /19, what is the corresponding dotted decimal notation?

255.255.224.0

What is the correct formula for the calculation of the number of hosts that can exist on a given subnet?

2^h - 2

If you need to create at least six subnets, how many bits should you use for subnetting?

3

How many channels on an E1 circuit are available for voice, video, or data?

30

Question 58 :What is the distance limitation of 10GBASE-SW?

300 M

What is the size of an MPLS header?

32 bits

What is the maximum range of the IEEE 802.11g wireless standard?

32 m indoors / 140 m outdoors

Question 20 :What TCP port is used by RDP?

3389

What is the maximum range of the IEEE 802.11b wireless standard?

35 m indoors / 140 m outdoors

Which Syslog severity level is a condition where a specific operation failed to complete successfully?

4

Question 37 :What is the distance limitation of 100GBASE-ER4?

40 km

What is the distance limitation of 10GBASE-ER?

40 km

What is the common TCP port (that is, "well-known" port) used by HTTPS?

443

How big is the payload of an ATM cell?

48 bytes

How big is the payload part of an ATM cell?

48 bytes

If you need to create at least 30 subnets, how many bits must you use for subnetting?

5

In a wireless LAN (WLAN) operating in the 2.4 GHz band, access points (APs) with adjacent coverage areas should have how many channels of separation to avoid interfering with one another?

5

You have a Layer 2 switch. You have left all ports in the default VLAN. You connect five workstations. How many collision domains exist on this switch?

5

The IEEE 802.11a wireless standard has which of the following frequency band / maximum bandwidth parameters?

5 GHz / 54 Mbps

If a network has the five nines of availability, how much downtime does it experience per year?

5 minutes

Question 31 :What is the common port (that is, "well-known" port) used by DNS?

53

What is the maximum bandwidth of an 802.11g wireless LAN (WLAN)?

54 Mbps

Question 81 :What is the maximum bandwidth of an 802.11a wireless LAN (WLAN)?

544 Mbps

If you need to create at least 58 subnets, how many bits must you use for subnetting?

6

When you're using the 2.4GHz band for multiple access points in a WLAN found in the United States, which nonoverlapping channels should you select? (Choose three.)

6,11,1

What protocol is used to request a MAC address that corresponds to a known IPv4 address on the local network?

ARP

Approximately how many addresses are provided by a Class B scheme?

65,000

Which of the following is a cross-connect block that was popular for cross-connecting Cat 3 UTP cables for 10 Mbps Ethernet LANs, but does not support higher-speed LAN technologies, such as 100 Mbps Ethernet LANs?

66 block

Which Syslog severity level produces highly detailed information that is typically used for troubleshooting purposes?

7

What is the maximum range of the IEEE 802.11n wireless standard?

70 m indoors/ 250 m outdoors

Question 15 :What is the common TCP port (that is, "well-known" port) used by HTTP?

80

What is the name of the wireless protocol that can be used to form local area networks in the 900MHz as well as 2.4, 3.6, 5, and 60GHz frequencies?

802.11

Consider the following wireless network (WLAN) topology. A wireless client running IEEE 802.11a is having connectivity issues when attempting to roam between access points (APs). What is the most likely issue?

802.11 standards

Which wireless LAN (WLAN) standards can operate in the 5 GHz frequency band? Each correct answer represents a complete solution. Choose all that apply.

802.11a, 802.11n

You are configuring a wireless access point (AP). You specify a wireless standard of 802.11n operating in the 2.4 GHz band. You also select an option to make it operate in a "backward compatible" mode. Therefore, what additional 802.11 standards are supported? Each correct answer represents a complete solution. Choose all that apply.

802.11b 802.11g

Which IEEE 802.11 variant supports a maximum speed of 54Mbps and uses the 2.4GHz band?

802.11g

Direct-Sequence Spread Spectrum (DSSS) is a wireless LAN (WLAN) transmission method. Which two of the following WLAN standards use the DSSS transmission method?

802.11g 802.11b

Orthogonal Frequency Division Multiplexing (OFDM) is a wireless LAN (WLAN) transmission method. Which three of the following WLAN standards support OFDM?

802.11n 802.11a 802.11g

Which wireless LAN (WLAN) standards can operate in the 2.4 GHz frequency band? Each correct answer represents a complete solution. Choose all that apply.

802.11n 802.11g 802.11b

Which of the following approaches to wireless LAN (WLAN) security involves the use of an authentication server?

802.1X

Which of the following user authentication technologies uses a supplicant, an authenticator, and an authentication server?

802.1X

Which IEEE standard, supported on some Ethernet switches, requires a user to authenticate themselves before gaining access to the rest of the network?

802.1x

What is the IEEE standard for link aggregation?

802.3ad

What is the IEEE standard for the version of Power over Ethernet that offers a maximum of 15.4 Watts of power to an attached device?

802.3af

What is the IEEE standard for the version of Power over Ethernet that offers a maximum of 32.4 Watts of power to an attached device?

802.3at

Which of the following protocols resolves an IP address of a network device to a corresponding MAC address?

ARP

Which of the following DNS record types is used to map a hostname to an IPv4 address?

A

What is a DHCP lease?

A DHCP lease is a temporary assignment of IP address information to a DHCP client.

What is a DHCP reservation?

A DHCP reservation is a static addressing approach where a specific MAC address is mapped to a specific IP address, which will not be assigned to any other network device.

Which two of the following are true regarding a client-to-site and site-to-site virtual private networks (VPN)?

A client-to-site VPN (also known as a remote access VPN) interconnects a remote user with a site, as an alternative to dial-up or ISDN connectivity, at a reduced cost. A site-to-site VPN interconnects two locations, as an alternative to a leased line, at a reduced cost.

Which of the following best defines a firewall?

A firewall defines a set of rules dictating which types of traffic are permitted or denied as that traffic enters or exits a firewall interface.

In a wireless LAN (WLAN), what might cause a "multipath" problem?

A metal file cabinet

Question 39 :What is a native VLAN?

A native VLAN is the VLAN on an IEEE 802.1Q trunk that does not have any tag bytes added.

Call agent

A repository for a VoIP network's dial plan

Which of the following are ways routes can be injected into a router's IP routing table? Each correct answer represents a complete solution. Choose all that apply.

A route is dynamically learned. A route is redistributed from one routing source into a dynamic routing protocol. A route is statically configured. A route is directly connected.

Why might a network using DHCP for IP address assignment need a DHCP relay agent?

A router resides between a DHCP client and a DHCP server.

Question 26 :Identify the purpose of a DHCP scope.

A scope acts as a pool of IP addresses from which a DHCP server can assign IP addresses to DHCP clients.

IP phone:

A telephone with an integrated Ethernet connection.

While troubleshooting a connectivity issue in your network, you did a Ping from Host A to Host B, and the Ping was successful. From this, where can you conclude the issue resides?

Above OSI Layer 3

A router operating at Layer 3 primarily makes its forwarding decisions based on what address? This

Destination IP address

Which of the following DNS record types is an IPv6 address record?

AAAA

Which approach to bandwidth usage consumes all the available frequencies on a medium to transmit data?

BaseBand

What is a snapshot of performance on a typical usage level for the network?

Baseline

Which of the following configuration management (CM) elements involves collecting network statistics during normal network operation?

Baselining

What is the range of well-known TCP and UDP ports?

Below 1024

Which QoS mechanism does not reorder packets and simply uses first-in, first-out logic?

Best effort

Question 103 :Where is PPPoE typically used in a DSL environment?

Between the home and a service provider

What type of physical security utilizes a fingerprint or facial recognition to verify identity? This

Biometrics

If a packet cannot be forwarded by a router interface due to the packet's size exceeding the interface's maximum transmission unit (MTU), the router attempts to fragment the packet, unless the packet's header has the don't fragment (DF) bit set. If the DF bit is set, the router usually drops the packet and sends an ICMP message back to the sender, to let the sender know that the packet was dropped. If a router does not send such a notification, what is that router called?

Black hole router

A router that drops a packet exceeding a router interface's MTU size, when that packet has its "don't fragment" bit set, is called which of the following?

Black-hole router

What is the name of the wireless technology that can create a personal area network (PAN)? This

Bluetooth

Which of the following security attacks occurs when an attacker exploits a known vulnerability in an application (for example, an error in an application that allowed that application to write to an area of memory dedicated to a different application), which could cause another application to crash?

Buffer overflow attack

What device, traditionally used by telephone technicians, enables you to tap into a phone line to, for example, check a line for dial tone?

Butt set

Question 1 :If you successfully ping from host A to host B, what can you conclude about host A?

Its OSI Layers 1-3 are functional.

Question 65 :Which of the following is an open standard variant of HSRP? This

CARP

Question 3 :Which piece of test equipment can you use to test the throughput of a Cat 5 cable?

Cable certifier

Which of the following pieces of equipment can be used to determine the supported frequency range of a cable?

Cable certifier

Which of the following is mostly likely to cause EMI?

Cable placement

A network administrator can use which of the following to locate a break in a copper cable?

Cable tester

Which of the following pieces of equipment can be used to check the wires in a cable for continuity (that is, check to make sure there are no opens, or breaks, in a conductor)?

Cable tester

Which of the following reflect the media type, bandwidth capacity, and distance limitation combination of 10BASE-T Ethernet?

Cat 3 (or higher) UTP/10 Mbps/100 m

Which type of unshielded twisted pair (UTP) is commonly used in Ethernet 10BASE-T networks, which carry data at a rate of 10 Mbps (although it can carry data at a maximum rate of 16 Mbps, as seen in some Token Ring networks)?

Category 3

Which type of unshielded twisted pair (UTP) cable uses 24 gauge wiring and is commonly used in Ethernet 100BASE-TX networks, which carry data at a rate of 100 Mbps, although it is capable of carrying traffic at a rate of 155 Mbps on older implementations of ATM networks? (NOTE: This type of UTP should not be used for networks running at speeds of 1 Gbps or higher.)

Category 5

Which type of unshielded twisted pair (UTP) cable is commonly used for 1000BASE-T Ethernet networks and is often made of relatively thick conductors (for example, 22 gauge or 23 gauge wire) and thick insulation?

Category 6

What is the minimum category of unshielded twisted pair (UTP) cable that can be used for 10GBASE-T networks for the distance of 100 meters?

Category 6a

ATM can be considered in which of the following WAN categories?

Cell switched

Asynchronous Transfer Mode is associated with which of the following?

Cell-switched connection

Question 33 :What type of authentication credentials are used by SNMPv2c?

Community Strings

Refer to the exhibit. Consider the wireless network (WLAN) topology. A wireless client running IEEE 802.1g is having connectivity issues when attempting to roam between access points (APs). What is the most likely issue?

Channel Selection

Which of the following remote access security technologies performs authentication through a three-way handshake (that is, challenge, response, and acceptance messages) between a server and a client, where the three-way handshake allows a client to be authenticated without sending credential information across a network?

Chap

ISDN is an example of which of these WAN types?

Circuit Switched

SDN is considered to be what type of WAN connection?

Circuit-switched connection

What class of IP address is 172.16.1.2?

Class B

What class of address is used for small networks with few systems that need connection?

Class C

What class of address is used for multicast in IP?

Class D

What class of address is used for experimental purposes?

Class E

Question 120 :Which of the following (QoS) functions places traffic into different categories?

Classification

Which DLP target activity level addresses data in operation?

Client Level

What type of network has a dedicated file server, which provides shared access to files?

Client-server

Which is not an area typically targeted by a data loss prevention policy?

Cloud level

Which of the following reflects the media type, bandwidth capacity, and distance limitation combination of 10BASE2 Ethernet?

Coax/10 Mbps/185 m

Which of the following reflect the media type, bandwidth capacity, and distance limitation combination of 10BASE5 Ethernet?

Coax/10 Mbps/500 m

When an organization is developing a site redundancy solution, which option offers recovery but is the most time consuming upon main site failure?

Cold Site

Which of the following steps are involved in diagnosing a problem? Each correct answer represents a complete solution. Choose all that apply.

Collect information. B Eliminate potential causes. C Verify hypothesis.

Random Early Detection (RED) is an example of which of the following (QoS) functions?

Congestion avoidance

Queuing is another name for which of the following quality of service (QoS) functions?

Congestion management

Which phase of an incident response plan focuses on the protection of resources and determining operational status?

Contain

Refer to the exhibit. In the topology, "Network Appliance X" receives content coming over a WAN from the HQ server and stores that content locally. This allows devices at the Branch Office site to get their content directly from this network appliance, without burdening the WAN. What type of network appliance is Network Appliance X?

Content engine

What performance optimization technology uses a network appliance, which can receive a copy of content stored elsewhere (for example, a video presentation located on a server at a corporate headquarters), and serves that content to local clients, thus reducing the bandwidth burden on an IP WAN?

Content engine

What specialized network device is commonly used to load-balance traffic across multiple servers in a group?

Content switch

Routing protocols differ in the amount of time they require to fail over from a previously active route to a backup route. What is the name for this routing protocol property?

Convergence

Which options should be included in a bring-your-own-device policy?

Corporate support policy per device or device category,Explicit and detailed list of permitted devices,

What metric is used by the OSPF routing protocol?

Cost

Which of the following pieces of equipment can be used to attach an RJ-45 connector to a UTP cable?

Crimper

Which of the following conditions can occur when an analog connection creates an electromagnetic field around its conductors, inducing its waveforms on a nearby analog connection?

Cross-talk

Which options should be included in a bring-your-own-device policy?

Detailed presentation on the exit policies for employees C Integration between it and the acceptable use policy

In what type of attack does the attacker compromise multiple systems and then instruct those compromised systems, called zombies, to simultaneously flood a target system with traffic?

DDos

Which of the following security attacks occurs when an attacker compromises multiple systems, and those compromised systems, called "zombies," are instructed by the attacker to simultaneously launch an attack against a target system, exhausting that target system's resources?

DDos Attack

Which of the following features allows a network device without an IP address to dynamically be assigned IP address information (for example, IP address, subnet mask, DNS server, and WINS server) from a network server?

DHCP

Refer to the exhibit. Consider the topology. What needs to be configured on router R1 in order for the DHCP client to successfully send a DHCPDISCOVER message to the DHCP server?

DHCP relay agent

A DHCP reservation involves the exchange of four messages between a DHCP client and a DHCP server. What is the first of these messages?

DHCPDISCOVER

What is the first DHCP message sent by a client attempting to obtain IP address information from a DHCP server?

DHCPDISCOVER

Which of the following are valid DHCP message types used during a DHCP reservation? Each correct answer represents a complete solution. Choose all that apply.

DHCPDISCOVER C DHCPREQUEST D DHCPACK

What locally significant identifier is used by a Frame Relay network to reference a virtual circuit?

DLCI

A firewall might use what configuration option to prevent users on the Internet from initiating sessions with devices inside a corporate network, while still allowing users on the Internet to initiate sessions with publicly available corporate servers (for example, an e-mail server or a web server)?

DMZ

What variation of network address translation (NAT) automatically assigns an inside global address from a pool of available addresses?

DNAT

What NAT variation automatically assigns an inside global address from a pool of available addresses?

DNAT - Dynamic NAT permits

What service is typically used to resolve a FQDN?

DNS

In cable modem technologies, the frequencies dedicated to data transmission are specified by what?

DOCSIS

Which layer of the OSI reference model contains the MAC and LLC sublayers?

Data Link Layer

What type of policy seeks to focus on accidental or malicious information loss?

Data loss prevention policy

What are common sensitive data-identification methods that are the focus of data loss prevention systems?

Deep content inspection, Content-level scanning

Which two of the following are DHCP options that a DHCP server can assign to a DHCP client?

Default gateway, DNS server

What type of route is manually configured in a router's routing table and tells a router where to send traffic destined for a network not in the router's routing table?

Default static route

Question 3 :Which of the following is most likely the first step in a structured troubleshooting methodology?

Define the problem.

Which of the following is the point in a telephone network where the maintenance responsibility passes from a telephony company to a subscriber (unless the subscriber has purchased inside wiring maintenance)?

Demarc

In a topology running STP, every network segment has a single ______________ port, which is the port on that segment that is closest to the root bridge in terms of cost.

Designated

If a PC on an Ethernet network attempts to communicate with a host on a different subnet, what destination IP address and destination MAC address will be placed in the packet/frame header sent by the PC?

Dest. IP: IP address of remote host. Dest. MAC: MAC address of default gateway.

Which of the following approaches to wireless LAN (WLAN) security helps conceal the existence of a WLAN?

Disabling SSID broadcast

What is often the last stage of a system life cycle used in the network?

Disposal

Who developed the TCP/IP Stack network reference model (also known as the TCP/IP Model)?

DoD

Which of the following security attacks occurs when an attacker sends the target system a flood of data or requests that consume the target system's resources?

DoS attack

Which of the following security attacks occurs when an attacker sends a target system a flood of data or requests that consume the target system's resources?

Dos attack

What topology is seen in WAN networks and was designed to increase the redundancy of communications?

Dual ring

You are troubleshooting an issue where a PC is having intermittent connectivity issues. The PC can Ping specific local and remote hosts (using both IP addresses and DNS names) some of the time but not all of the time. Which of the following issues is the most likely cause of this PC's unpredictable traffic patterns?

Duplicate IP addresses

Which of the following is a valid representation of the IPv6 address of 0E50:0002:0000:0000:0000:4000:0000:0001?

E50:2::4000:0:1

Which of the following specifies how authentication is performed by IEEE 802.1X?

EAP

What variant of Domain Name System (DNS) overcomes the size limitations of the original version of DNS through the use of pseudo-resource-records?

EDNS

A Cisco router has learned a network via three different routing protocols: OSPF, EIGRP, and RIP. Which route will the router believe (that is, inject into the router's IP routing table)? This

EIGRP

Which of the following routing protocols are interior gateway protocols? Each correct answer represents a complete solution. Choose all that apply.

EIGRP IS-IS OSPF

Which two routing protocols use bandwidth in their calculation of metric by default?

EIGRP, OSPF

What is another name used to reference the functions provided by the Provider Edge (PE) router?

ELSR

A wireless LAN (WLAN) containing at least two access points (APs) is known as what type of WLAN?

ESS

What is the name of the process that is used in IPv6 address autoconfiguration to form a host ID?

EUI-64

If two devices simultaneously transmit data on an Ethernet network and a collision occurs, what does each station do in an attempt to resend the data and avoid another collision?

Each device sets a random back-off timer, and the device will attempt retransmission after the timer expires.

Which of the following is a Microsoft Windows® command that can display a listing of NetBIOS device names learned by a PC?

N\\nbtstat

Consider the following wireless network (WLAN) topology. A wireless client running IEEE 802.11g is having connectivity issues when attempting to roam between access points (APs). What is the most likely issue?

Encryption types

Which of the following can send an alert to a network administrator if humidity levels in a server farm exceeds a configured threshold?

Environmental monitor

Which phase of an incident response plan focuses on the removal of an infection?

Eradicate

What Microsoft Windows application enables you to view a variety of log types, including application, security, and system logs?

Event Viewer

Which of the following conditions would most likely result in corrupted data?

Exceeding the distance limitation of a cable

What is typically the problem when a host is unable to obtain an IP address from a local DHCP server?

Exhausted DHCP scope

Drag the routing information sources to match them with their administrative distances.

Explanation: The routing information sources with their administrative distances are given below: Statically configured network: 1 EIGRP: 90 OSPF: 110 RIP: 120 External EIGRP: 170

Drag the network attacks to match them with their descriptions.

Explanation: Types of network attacks are described below: Malware: A software program designed to damage or take other unwanted actions on a computer system EMI interception: An attacker copies information traveling over the wire Man-in-the-middle: An attacker gets in the direct path between a client and a server and eavesdrops on their conversation FTP bounce: An attacker sends a PORT command specifying the IP address of a third party Dumpster diving: A technique used to retrieve information that could be used to carry out an attack on a network

Drag the network categories to match them with their descriptions.

Explanation: Types of network categories are described below:WAN (Wide Area Network): Interconnects network components that are geographically separatedMAN (Metropolitan Area Network): Interconnects locations scattered throughout a metropolitan areaLAN (Local Area Network): Interconnects network components within a local areaPAN (Personal Area Network): A network whose scale is very small, like a connection between a PC and a digital camera via USBCAN (Campus Area Network): Interconnection of local-area networks within a limited geographical space

Drag the network categories to match them with their descriptions. Here, in this type of question, you have to match the item on the left with the correct item on the right by selecting and placing the item to its correct answer. Shortcut key to perform this task are. Press the Alt+down arrow key to activate the target. Press the arrow key to navigate through all the item. Copy the left item using the Enter key. Paste the item using the Enter key. If you want to remove the item, navigate to any of the left side items and press the Delete key to remove for Windows and the Fn+Delete key for Mac. Correct AnswerCompareYour Answer Network Category Description 1.MAN 2.LAN 3.WAN 4.CAN 5.PAN

Explanation: Types of network categories are described below:WAN (Wide Area Network): Interconnects network components that are geographically separatedMAN (Metropolitan Area Network): Interconnects locations scattered throughout a metropolitan areaLAN (Local Area Network): Interconnects network components within a local areaPAN (Personal Area Network): A network whose scale is very small, like a connection between a PC and a digital camera via USBCAN (Campus Area Network): Interconnection of local-area networks within a limited geographical space Lesson: Computer Network Fundamentals

Which options should be included in a bring-your-own-device policy?

Explicit list of permitted applications B Explicit and detailed list of permitted devices Integration between it and the acceptable use policy

Which of the following copper connector types is most commonly used for cable TV connections?

F-conenector

Which of the following protocols is used for transferring files with a remote host in a non-secure fashion?

FTP

Which of the following security attacks leverages the PORT command?

FTP bounce attack

BGP's path selection is solely based on autonomous system hops.

False

Which of the following network devices uses ACL to prevent unauthorized access into company systems?

Firewall

Which of the following can often be categorized as an encryption device (that is, a device capable of participating in an encrypted session)? Each correct answer represents a complete solution. Choose all that apply.

Firewall, VPN concentrator, Router

Question 4 :A toner probe is also known as what?

Fox and hound

What is the protocol data unit name for data at Layer 2?

Frame

Which of the following parameters must match between a wireless LAN (WLAN) client and a WLAN access point (AP) in order for the client to associate with the AP? Each correct answer represents a complete solution. Choose all that apply.

Frequency band B SSID C Encryption type

What WAN topology permits the highest degree of failover and redundancy?

Full Mesh

The steps that occur as a DHCP client obtains IP address information from a DHCP server are:

HCPDISCOVER: When a DHCP client initially boots, it has no IP address, default gateway, or other such configuration information. Therefore, a DHCP client initially communicates by sending a broadcast message in an attempt to discover a DHCP server. DHCPOFFER: When a DHCP server receives a DHCPDISCOVER message, it can respond with a unicast DHCPOFFER message. DHCPREQUEST: The DHCP client communicates with the selected server by sending a unicast DHCPREQUEST message asking the DHCP server to provide IP configuration parameters. DHCPACK: The DHCP server responds to the client with a unicast DHCPACK message. This DHCPACK message contains a collection of IP configuration parameters

What kind of network is used by many cable companies to service their cable modems and has both fiber-optic and coaxial cabling?

HFC

A host that can protect itself by inspecting traffic flowing into its network interface is called a ________.

HIPS

Which of the following security solutions consists of software running on a host to protect that host against a collection of well-known attacks?

HIPS

What technology is similar to WiMAX and offers wireless broadband service? The maximum data rate is 84 Mbps.

HSPA+

Which of the following are Layer 3 redundancy mechanisms? Each correct answer represents a complete solution. Choose all that apply.

HSRP, CARP

Firewalls can be categorized based on their platform or based on the way they inspect traffic. Which two of the following are two categories of firewalls, based on a firewall's platform?

Hardware, Software

What does RIP use for a metric?

Hop count

Which of the following is a telephony solution that is typically based on a traditional privately-owned telephone system?

Hosted PBX

What site provides a nearly identical level of service with virtually no downtime?

Hot

When an organization is developing a site redundancy solution, which option offers the best recovery times upon main site failure?

Hot site

Question 3 :What device operates at Layer 1 of the OSI model?

Hub

Question 7 :What is the most common topology seen with a DMVPN?

Hub and spoke (partial mesh)

What WAN topology enables you to minimize WAN expenses by not directly connecting any two remote locations?

Hub-and-Spoke

What topology features a central location that connects to each remote connection but does not feature connections between those remote locations directly?

Hub-and-spoke

Of the steps listed, which one occurs first in a structured troubleshooting model?

Hypothesize a probable cause.

Which step in a structured troubleshooting methodology can most benefit from your experience and intuition?

Hypothesize a probable cause.

Which of the following remote access technologies is a Citrix Systems® proprietary protocol that allows applications running on one platform (for example, Microsoft Windows®) to be seen and controlled from a remote client, independent of the client platform (for example, UNIX)?

ICA

Question 9 :What protocol is used by the ping command?

ICMP

Which of the following standards specifies a method for sending traffic for multiple VLANs across a single link?

IEEE 802.1Q

What multicast protocol is used between clients and routers to let routers know which of their interfaces are connected to a multicast receiver?

IGMP

Question 10 :Identify three e-mail protocols.

IMAP4, POP3, SMTP

Which IoT technology is commonly used in remote controls to transmit information using a form of light?

IR

Which of the following are examples of interior gateway protocols? Each correct answer represents a complete solution. Choose all that apply.

IS-IS, OSPF, RIP

What are the three levels of security associated with events appearing in Microsoft Windows® application logs?

Information, Warning, Error

What type of wireless topology features the use of access points to facilitate network communications?

Infrastructure

WEP's RC4 approach to encryption uses a 24-bit string of characters added to transmitted data, such that the same plain-text data frame will never appear as the same WEP-encrypted data frame. What is this string of characters called?

Initialization vector

What NAT IP address is a public IP address that maps to an inside device?

Inside global

Which QoS mechanism is also referred to as hard QoS because it makes strict bandwidth reservations?

Integrated services

Which three of the following are features of IPsec?

Integrity Confidentiality Authentication

A building might have multiple patch panels (for example, on different floors of a building). These common locations, where cables from nearby offices terminate, are often called what?

Intermediate distribution frames

Which of the following is a Microsoft Windows® command that can be used release and renew a DHCP lease on a PC?

Ipconfig

Which of the following antenna types radiates an equal amount of power in all directions (in a spherical pattern), and is said to have a gain of 0 dBi?

Isotropic

Which of the following is a primary benefit of a VPN concentrator?

It allows traffic to travel securely over an untrusted network (for example, the Internet).

Which of the following are the primary benefit of a proxy server?

It hides inside addresses from the public Internet. It reduces bandwidth demand on an internal LAN.

Question 6 :Which of the following is a primary benefit of a content engine?

It reduces bandwidth demand on an IP WAN.

Which of the following is a technology that allows a service provider to offer networking services to customers?

NaaS

SNMP uses a series of objects to collect information about a managed device. The structure, similar to a database, containing these objects is referred to as what?

MIB

What wireless technology allows the IEEE 802.11n standard to achieve higher throughput than other standards (that is, IEEE 802.11 a/b/g) by using multiple antennas for transmission and reception?

MIMO

Which of the following is used by IEEE 802.11n to achieve high throughput using multiple antennas for transmission and reception?

MIMO

What kind of media is used by 100GBASE-SR10 Ethernet?

MMF

What media type is used by 10GBASE-SR?

MMF

Which of the following specifies a type of fiber optic cable that has a core whose diameter is large enough to transport light arriving at a variety of angles (that is, more than one mode of propagation)?

MMF

Which of the following is a type of network, commonly used by service providers, that makes forwarding decisions based on a label contained in a 32-bit header?

MPLS

Which of the following user authentication protocols added two-way authentication to an earlier version of the protocol?

MS-CHAP

Which type of fiber optic connector contains two fiber strands in a single connector?

MTRJ

What router interface parameter specifies the largest packet size the interface will forward (without fragmentation being required)?

MTU

Which of the following DNS record types is used for an e-mail server?

MX

Which of the following security attacks occurs when an attacker causes traffic flowing between two devices on a network to flow through the attacker's device?

Man-in-the-middle attack

Identify the quality of service (QoS) function that alters bits in a frame, cell, or packet.

Marking

What name is given to a VLAN on an IEEE 802.1Q trunk whose frames are not tagged?

Native VLAN

Which of the following are common sources of wireless network radio frequency interference (RFI)? (Choose three.)

Microwave ovens, Game consoles, Baby monitors

Which of the following are common sources of interference with a wireless LAN (WLAN)? Each correct answer represents a complete solution. Choose all that apply.

Microwave ovens,Codless Phones

Which issue is commonly related to a network device becoming a black hole for traffic?

Mismatched MTU

What IP traffic type should you use if you want to send out a video stream to 23 of the systems in the marketing department? There are 50 total systems in this department.

Multicast

Which IPv6 address type is indicated by an address beginning with the hex characters FF?

Multicast

Which of the following requires two or more types of authentication from a user seeking admission to a network?

Multifactor authentication

Which of the following can be used to measure the amount of current (in Amps) flowing through a circuit?

Multimeter

Many firewalls use what feature to translate private IP addresses on an inside network to publicly routable IP addresses on an outside network (for example, the Internet)?

NAT

What is the name of the document that creates a confidential relationship between parties to protect any type of confidential or proprietary information or trade secrets?

NDA

What is the name of the document that outlines the confidential material, knowledge, or information that agreeing parties cannot communicate to others?

NDA

What is the name of the protocol used with IPv6 to learn the Layer 2 addresses that exist on the same local network?

NDP

Which wireless communication protocol requires devices to be within 1.6 inches to communicate?

NFC

A box containing a demarc is called a ______________.

NID

A dedicated network device that acts as an intrusion prevention system (IPS) sensor is called a ________.

NIPS

Which NDP message type is used by an IPv6 device to locate neighbors on the local network?

NS

What protocol is used to synchronize a network device's clock with a time server?

NTP

Which layer of the OSI Model is concerned with logical addressing?

Network

IP addresses reside at which layer of the OSI reference model?

Network Layer

Which DLP target activity level addresses data in transit?

Network Level

Which of the following is a publicly available network security scanner?

Nmap

Which of the following IDS/IPS detection methods allows an administrator to define what normal traffic patterns are supposed to look like?

Non-statistical anomaly detection

In a SaaS solution, where are a company's applications hosted?

Offsite

What type of antenna radiates power at relatively equal power levels in all directions?

Omnidirectional

What type of antenna, used in wireless APs and wireless routers in SOHO locations, radiates equal power in all directions?

Omnidirectional

Which procedures detail what should happen when employees are hired and terminated?

On-boarding/off-boarding

If a WLAN does not need a user to give credentials to associate with a wireless AP and access the WLAN, what type of authentication is in use?

Open

Question 6 :A broken copper strand in a circuit is known as which of the following?

Open

Which MPLS network element is a service provider internal router that does not have a direct interface with the customer routers?

P

Which PPP authentication method offers one-way authentication and sends credentials in clear text?

PAP

What variation of network address translation (NAT) allows multiple inside local addresses to share a single inside global address?

PAT

Refer to the exhibit. What type of network topology is shown in the graphic?

PArtial Mesh

Which MPLS element is the provider's router that connects to the customer?

PE

Which of the following user authentication technologies uses digital certificates and a certificate authority (CA)?

PKI

Which two of the following protocols are used to retrieve e-mail from an e-mail server?

POP3, IMAP4

Question 61 :What is a very common protocol found on dedicated leased lines? This

PPP

Which of the following remote access technologies is a common Layer 2 protocol offering features such as: multilink interface, looped link detection, error detection, and authentication?

PPP

What technology is typically used in conjunction with DSL?

PPPoE

Which of the following is a set of communication rules that govern the secure implementation of a VPN?

PPTP

Which two of the following virtual private network (VPN) protocols lack native security features?

PPTP, L2TP

Which two of the following are types of Integrated Services Digital Network (ISDN) circuits?

PRI C BRI

Which of the following DNS record types points to a canonical name and is commonly used when performing a reverse DNS lookup?

PTR

Which agreement would need to be read carefully and signed by a network administrator (not an end user in the Sales department)?

PUA

Which of the following is a technology that allows a company to use development resources owned and maintained by a service provider?

PaaS

Question 48 :Frame Relay is an example of what WAN connection type?

Packet Switched

What loop-prevention mechanism is an override of another loop-prevention mechanism?

Poison reverse

Which of the following are distance-vector routing protocol features that can prevent routing loops? (Choose two.)

Poison reverse, Split Horizon

What topology aims to balance redundancy with easier management and cost-effectiveness?

Partial mesh

Which of the following technologies is not typically considered for an increase in redundancy?

Pat

Cables in wiring closets commonly terminate on what?

Patch panel

What type of network allows interconnected devices to share their resources with one another but would have issues regarding scalability?

Peer-to-peer

Which type of network is based on network clients sharing resources with one another?

Peer-to-peer

While an IPsec tunnel is being established, the peers at each end of the tunnel determine whether or not a certain feature should be used. This feature makes sure that a session key will remain secure, even if one of the private keys used to derive the session key becomes compromised. What is the name of this feature?

Perfect forward secrecy (PFS)

Which layer of the OSI Model is concerned with how bits are represented on the medium?

Physical

Which of the following Microsoft Windows® commands is primarily used to check reachability to a remote IP address? This

Ping

Which type of cable might be required for installation in a drop ceiling, which is used as an open-air return duct?

Plenum

Which type of twisted pair cable has an insulator that is fire retardant and minimizes the emission of dangerous fumes in the event of fire?

Plenum

Which Ethernet switch feature allows an Ethernet switch to provide power to an attached device?

PoE

Which of the following approaches to wireless LAN (WLAN) security requires a matching string of characters to be configured on a WLAN client and a WLAN access point (AP)?

Pre-shared key

What is the name of Layer 6 in the OSI Model?

Presentation

The process of troubleshooting can be simplified into three basic phases: (1) Problem report, (2) Problem diagnosis, and (3) Problem resolution. The majority of a troubleshooter's efforts are spent in which of these three phases?

Problem diagnosis

Which of the following comprise a simplified troubleshooting flow? (Choose three.)

Problem resolution Problem report Problem diagnosis

Which of the following is also known as a "network sniffer?"

Protocol analyzer

Which of the following copper connector types is an eight-pin connector found in most Ethernet networks?

RJ-45

Refer to the exhibit. Consider the network topology. Which (if any) device in the topology has an incorrect IP address? (Assume that if two devices belong to one subnet, and another device belongs to a different subnet, that device (belonging to a different subnet than the other two devices) has an incorrect IP address.)

R1

Which NDP message type is used by an IPv6 router to advertise its presence along with various link information?

RA

Which two of the following protocols are commonly used to communicate with an AAA server?

RADIUES, TACACS+

Which of the following user authentication technologies is used by Microsoft Windows® clients to remotely access a Microsoft Windows® network?

RAS

Which of the following protocols can be used to remotely connect to and control the desktop of a Microsoft Windows® computer?

RDP

Which of the following remote access technologies is a Microsoft protocol that allows a user to view and control the desktop of a remote Microsoft Windows® computer?

RDP

Identify the congestion-avoidance mechanism from the following list of QoS tools.

RED

If two nearby wireless devices (for example, a cordless phone or a wireless client) transmit using overlapping frequencies, those devices can interfere with one another. What is the term given to this type of interference?

RFI

Which IoT technology uses electromagnetic fields to identify and track tags attached to items?

RFID

Which of the following standards specifies a type of coaxial cable typically used for short distance applications, such as carrying composite video between two nearby devices, and has a characteristic impedance of 75 Ohms?

RG-59

Which of the following standards specifies a type of coaxial cable commonly used by local cable companies to connect individual homes to the cable company's distribution network?

RG-6

What topology was used in an early LAN technology that used the passing of a token to transmit?

RING

Which of the following is a distance-vector routing protocol with a maximum usable hop count of 15?

RIP

Which phase of an incident response plan focuses on the restoration of network devices and systems?

Recover

Which of the following are recommendations for developing a password policy?

Require passwords to contain uppercase and lowercase characters, a number, and a symbol . Do not allow words to be spelled out completely.

Most DHCP client devices on a network are dynamically assigned an IP address from a DHCP server (that is, dynamic addressing). However, some devices (for example, servers) might need to be assigned a specific IP address. What DHCP feature allows a static IP address to MAC address mapping?

Reservation

An incident response policy often ends with which phase?

Review

Refer to the exhibit. What type of LAN topology is shown?

Ring

What topology could result in a lack of all communication capabilities with a single connection break?

Ring

What topology was used in an early LAN technology that used the passing of a token to transmit?

Ring

Which of the following copper connector types is found in most home telephone networks?

Rj-11

Which of the following WAN technologies use unshielded twisted pair (UTP)? (Choose three.)

SDN - DSL modem - POTS dial-up modem

Which of the following are three broad categories of SNMP message types?

SET, GET, TRAP

Which of the following is a VoIP signaling protocol used to set up, maintain, and tear down VoIP phone calls?

SIP

Which of the following is a voice over IP (VoIP) signaling protocol used to setup, maintain, and tear down VoIP phone calls?

SIP

What media type is used by 1000BASE-ZX?

SMF

Which of the following specifies a type of fiber optic cable that has a core whose diameter is only large enough to transport light arriving at one angle (that is, one mode of propagation)?

SMF

Which of the following protocols is used to send e-mail to an e-mail server?

SMTP

What variation of network address translation (NAT) allows you to statically configure the inside global address assigned to a specific device inside your network?

SNAT

Identify the Simple Network Management Protocol (SNMP) component that is a piece of software, which runs on a managed device (for example, a server, router, or a switch).

SNMP Agent

Which component of an SNMP solution is a piece of software, which runs on a managed device (for example, a server, router, or a switch)?

SNMP Agent

Identify the Simple Network Management Protocol (SNMP) component that is an unsolicited message sent from an SNMP managed device to provide a notification about a significant event occurring on that managed device.

SNMP TRAP

Identify the Simple Network Management Protocol (SNMP) component that is also known as an NMS.

SNMP manager

Which of the following DNS record types provides authoritative information about a DNS zone (for example, the e-mail address of a DNS zone's administrator, the zone's primary name server, and various refresh timers)?

SOA

Which protocol supports a secure connection to a remote host via terminal emulation software?

SSH

You must send commands to a remote router and you are communicating over an unsecure channel. What protocol should you use?

SSH

Which of the following is a cryptographic protocol that provides communication security over a computer network?

SSL

Which two of the following virtual private network (VPN) tunneling protocols can be used to provide security for HTTPS?

SSL, TLS

Which of the following allows a user to authenticate only once in order to gain access to multiple systems, without requiring the user to independently authenticate with each system?

SSO

Which type of fiber optic connector is often referred to as a bayonet connector?

ST

Which of the following technologies prevents a broadcast storm from forming due to a Layer 2 topological loop?

STP

Which network infrastructure device primarily makes forwarding decisions based on Layer 2 MAC addresses?

SWITCH

Which of the following technologies is used by an application service provider (ASP) to give subscribers access to application software?

SaaS

A DHCP server uses a pool of addresses (which typically corresponds to a single subnet) to assign IP address to DHCP clients on a specific network segment. What is a common name for this pool of addresses? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and al

Scope

Which of the following is a Microsoft Windows® log that would report events such as a failed login attempt?

Security

While an IPsec tunnel is being established, which of the following acts as an agreement between the two IPsec peers about the cryptographic parameters to be used in the ISAKMP session?

Security association (SA)

Which of the following is a continually changing document that dictates a set of guidelines for network use?

Security policy

Refer to the exhibit. Consider the network topology. Which (if any) device in the topology has an incorrect IP address? (Assume that if two devices belong to one subnet, and another device belongs to a different subnet, that device (belonging to a different subnet than the other two devices) has an incorrect IP address.)

Server 1

NetBIOS is associated with which layer of the OSI Model?

Session

Which of the following IDS/IPS detection methods could trigger an alarm if a certain string of bytes, in a certain context, is observed?

Signature-based detection

A __________ should provide valuable guidance on best practices throughout the network.

System lifecycle

Which of the following security attacks uses Internet Control Message Protocol (ICMP) traffic, directed to a subnet, to flood a target system with Ping replies?

Smurf Attack

What type of backup solution is a point-in-time, read-only copy of data?

Snapshot

Which of the following security attacks occurs when an attacker convinces someone to voluntarily provide information (for example, username and password credentials) to the attacker?

Social engineering attack

Automating the management and configuration of many different network devices, thanks to a centralized controller, refers to what technology?

Software-defined networking

What loop-prevention mechanism prevents a route learned on one interface from being advertised back out of that same interface?

Split Horizon

Which of the following installation practices could result in non-standard pin-outs in network cabling?

Splitting pairs in a cable

In the modern LAN, what topology is often used with LAN switches and Ethernet connections?

Star

Refer to the exhibit. What type of physical LAN topology is shown in the graphic?

Star

Refer to the exhibit. Examine the topology and Telnet sessions. Notice that return Telnet traffic for Session A (which originated on the inside of the network) is permitted to enter the inside network. However, Telnet traffic for Session B (which originated on the outside of the network) is not permitted to enter the inside network. What type of firewall is being used in the topology?

Stateful

What type of firewall inspects traffic leaving an inside network as it goes out to the Internet and allows returning traffic belonging to that session?

Stateful

Which two of the following are firewall inspection types?

Stateful , Packet Filtering

What feature allows a firewall to permit traffic to flow from a trusted network (for example, a corporate intranet) to an untrusted network (for example, the Internet) and then allow return traffic for that session, while blocking sessions initiated on the untrusted network?

Stateful inspection

Which of the following IDS/IPS detection methods watches network traffic patterns over a period of time and dynamically builds a baseline?

Statistical anomaly detection

Question 20 :Which DLP target activity level addresses data at rest?

Storage level

Which component of an IP address dictates how many bits of the 32-bit address are the network portion versus the host portion?

Subnet Mask

In the modern LAN, what type of device is typically used at the center of a star topology?

Switch

What device is a Layer 2 device that uses MAC address learning to intelligently forward traffic?

Switch

What device is used to create many different collision domains, thus helping to eliminate collisions in the modern network?

Switch

What device would forward traffic based on a MAC address?

Switch

Which of the following is a Microsoft Windows® log that would report events occurring on the underlying operating system?

System

SIP (Session Initiation Protocol):

The Layer 4 protocol that carries voice

What is the primary difference between the TIA/EIA-568-A and TIA/EIA-568-B wiring standards?

The color coding of the wiring

Question 35 :A system on an Ethernet network detects a collision. How does it respond?

The device retransmits after waiting for a period dictated by the backoff timer.

Question 5 :What should you follow closely when installing new network equipment?

The installation and maintenance guides

For understanding the netstat command, here's what you need to do: On the taskbar, right-click the Start button and open Command Prompt. show figure Execute the following netstat commands in the command prompt:netstat to list source and destination IP addresses and port numbers for all IP-based sessions.netstat -b to display names of the program that opened up a session.netstat -e to display statistical information for an interface's IP-based traffic.

Type netstat Type netstat -b Type netstat -e

Which of the following is a connectionless transport layer protocol?

UDP

Question 4 :Which of the following are characteristics of RADIUS? (Choose two.

UDP based, Only encrypts the password in an authentication packet

What can you add to a network to mitigate a power failure that might otherwise make an Ethernet switch unusable?

UPS

Host A (with an IP address of 10.1.2.3) sends a packet to Host B (with an IP address of 192.168.1.2). What type of data flow does this represent?

Unicast

Question 2 :Which is not a typical best practice found in a password policy?

Use of uppercase and lowercase letters only

Which of the following usually offers the highest bandwidth?

VDSL

Refer to the exhibit. In the topology, what type of network appliance is located at each of the sites?

VPN concentrator

Which two of the following are wireless broadband technologies?

WiMAX, HSPA+

A location within a building where network cables terminate is commonly called a(n) __________.

Wiring Closet

What is the name of the wireless communications protocol used primarily for home automation?

Z-Wave

Which of the following is a Microsoft Windows® command that displays what Layer 2 MAC address corresponds to a Layer 3 IP address?

arp

Refer to the exhibit. What command produced the output shown on your Windows workstation?

arp -a

What command enables you to view the ARP cache entries on a Windows workstation?

arp -a

Which of the following QoS mechanisms can compress the Layer 3 and Layer 4 headers of a voice over IP packet?

cRTP

Question 118 :What term is used to describe a loss of signal power?

dB loss

Which of the following UNIX commands is primarily used to resolve a fully-qualified domain name (FQDN) to an IP address and lacks an interactivity mode (that is, the entire command and all of the appropriate parameters are entered with a single command)?

dig

Which of the following UNIX commands can be used to check FQDN-to-IP-address resolution? (Choose three.)

dig host nslookup

What command produced the following snippet of output?

dig pearsonitcertification.com

Refer to the exhibit. In the topology, "Network Appliance X" takes requests coming into the server farm and spreads those requests out over all of the available servers (which contain identical content). What type of network appliance is Network Appliance X?

honeypott

Question 2 :Which of the following Windows commands enables you to display NetBIOS over TCP/IP information?

nbtstat

Refer to the exhibit. What command produced the output shown on your Windows workstation?

nbtstat

What command enables you to view the NetBIOS name cache on your Windows workstation?

nbtstat

Which of the following is a Microsoft Windows® command that can display a listing of the source and destination IP address for existing sessions on a PC?

netstat

You need to verify the TCP connections your workstation is making. What tool should you use?

netstat

Which Windows commands could have produced the following output? (Choose two.)

netstat -r route print

Refer to the exhibit. What command produced the output shown on your Windows workstation?

nslookup

What command enables you to verify DNS information and functionality?

nslookup

What is the most likely command you would be using to verify your DNS configuration is functioning properly?

nslookup

Which of the following UNIX commands is primarily used to resolve a fully-qualified domain name (FQDN) to an IP address and can operate in an interactive mode (that is, you enter this command, receive a prompt, and can then give additional commands)?

nslookup

While more than one of the following Microsoft Windows® commands can be used to resolve a fully-qualified domain name (FQDN) to an IP address, identify the command whose primary purpose is to resolve a FQDN to an IP address (for example, to determine if a Domain Name System (DNS) record is correct).

nslookup

What type of network allows interconnected devices to share their resources with one another but would have issues regarding scalability?

peer-to-peer

Refer to the exhibit. What command produced the output shown on your Windows workstation?

ping

Which tool enables you to test basic connectivity to a remote system?

ping

Which of the following commands would you issue on a UNIX host to send five ICMP echo messages to a device with an IP address of 10.1.1.1?

ping -c 5 10.1.1.1

Identify the quality of service (QoS) mechanism that can set a bandwidth limit on traffic and drop packets attempting to exceed that bandwidth limit.

policing

Which of the following Microsoft Windows® commands can be used to manipulate a PC's forwarding table?

route

What device operates at Layer 3 of the OSI model?

router

What is the name of the default congestion avoidance technique that allows newly arriving packets to be discarded when a queue is full?

tail drop

You are troubleshooting a reachability issue, where a PC cannot reach a remote host. Packets from the PC must transit multiple routers to reach the remote host. Which of the following Microsoft Windows® commands would be most appropriate for locating the last router hop that successfully transmitted packets destined for the remote host?

tracert


Conjuntos de estudio relacionados

Network+ Guide to Networks - Eighth Edition - Chapter Four

View Set

Psych- learnsmart chapter 15: Psychological Disorders

View Set

Chapter 13 | PrepU | Nutrition for Infants, Children, and Adolescents

View Set

Psychometric Chapter 9: Theories of intelligence & the Binet Scale

View Set

5.NBT.5 Vocabulary Words Practice

View Set