Networking final

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the Internet standard MTU?

1,500 bytes.

What is the minimum amount of ESD required to damage sensitive electronic equipment?

10 volts

What is the typical maximum segment length for Ethernet networks?

100 meters

Which IPv6 prefix can be routed on the Internet?

2000::/3

What decimal number corresponds to the binary number 11111111?

255

Which of the following IPv4 addresses is a public IP address?

64.233.177.189

Which of the following is part of a network's physical topology?

A printer plugged into a nearby desktop computer

If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?

AC adapter

Which of these categories of twisted-pair cable can support Gigabit Ethernet?

Cat 5e, cat 6a, cat 7

What is the minimum twisted-pair category required for 10-Gigabit Ethernet at 100 meters?

Cat6a

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

Checksum

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?

Client-Server

Which OSI layer adds both a header and a trailer?

Data Link Layer

At what point does the ISP hand over responsibility to the customer?

Demarc

Which of the following causes physical layer failures?

ElectroMagnetic Interference (EMI)

Which IPsec encryption type encrypts the IP header?

Encapsulating security payload (ESP)

Which protocol's header includes the source MAC address?

Ethernet

When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself?

FE::/64

In the event of a fire, the most appropriate failure policy is a _______ policy.

Fail-Open

In the client-server model, what is the primary secure protocol used for communication between a browser and web server?

HTTPS

What numbering system do humans use to write MAC addresses?

Hexadecimal

An ARP table maps MAC addresses to what information?

IPV4 addresses

Which of these protocols does not include some kind of integrity check field in its header?

IPV6

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?

IPconfig release

Which encryption protocol does GRE use to increase the security of its transmissions?

IPsec

According to structured cabling standards, there must be at least one _______ on each floor.

Intermediate Distribution Frame (IDF)

Which two protocols manage neighbor discovery processes on IPv4 networks?

Internet Control Message Protocol (ICMP) and Address Resoultion Protocol (ARP)

what protocol does ping use

Internet control Message Protocol (ICMP)

Which type of DNS record identifies an email server?

Mail Exchanger (MX)

Which kind of crosstalk occurs between wire pairs near the source of the signal?

NEXT

Which of the following applications could be used to run a website from a server?

NGNIX

What problem will ping google.com check for that ping 8.8.8.8 will not?

Name resolution issues

At which OSI layer does IP operate?

Network Layer

Which network diagram shows a logical topology?

Network Map

You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.

Nmap, command prompt, and powershell

What is one advantage offered by VDI over RDS and VNC?

Offers access to multiple OSs in VMs

Which part of a MAC address is unique to each manufacturer?

Organizationally Unique Identifier (OUI)

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?

Peer-to-Peer

When your computer requests a DNS lookup, which DNS server holds the most reliable information for that DNS record?

Primary DNS server

Which kind of multiplexing assigns slots to nodes according to priority and need?

STDM (statistical time division multiplexing)

Which remote file access protocol is an extension of SSH?

Secure File Transfer Protocol (SFTP)

which of the following is a secure protocol

Secure Shell (SSH)

Which two encryption protocols might be used to provide secure transmissions for email services?

Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

Which remote file access protocol uses port 22

Secure file transfer protocol (SFTP)

You need to remote into a Linux server in another building on your network. Which of the following protocols should you use?

Secure shell (SSH)

When an Internet connection goes down, what business document defines a customer's options for paying a reduced rate?

Service Level Agreement (SLA)

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

Star

Which DNS record type is listed first in a zone file?

Start Of Security (SOA)

You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?

Structured Query Language (SQL)

Which networking device is best for connecting your network printer to three computers

Switch

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server

Which protocol's header would a layer 4 device read and process?

Transmission control protocol (TCP)

Which of these protocols could not be used to access a server in a nearby building?

Transport Layer Security (TLS)

Which network types can your smartphone use?

Wan, Lan, and Pan

What type of diagram shows a graphical representation of a network's wired infrastructure?

Wiring diagram

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

all devices on your local network

At what OSI layer does your browser's web page request begin its journey through the OSI layers?

application layer

You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address?

arp-a

Which transmission characteristic is never fully achieved?

bandwidth

Which two components of the CIA triad are ensured by adequate encryption methods?

confidentiality and integrity

Which tool could you use to test a twisted-pair cable's pinout?

continuity tester

What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network?

default gateway

Which change management principle must you apply to all changes regardless of scope or impact?

document the change

What group must clients join to access network resources in a client-server network?

domain

Pin 1 on one end of a cable is orange and white striped. What color should Pin 1 be on the other end of the cable to create a crossover cable?

green and white striped

Which of these commands has no parameters in Windows?

hostname

As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?

identify the problem

In which life cycle phase is an old device removed from the network?

implementation

Which of the following is an advantage of P2P file sharing?

inexpensive

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

integrity

What command shows you a computer's TCP/IP configuration?

ipconfig

What Windows command outputs a computer's MAC address?

ipconfig / all

Which command disables a computer's connection to the network?

ipconfig/release

Which tool could you use to determine if a laptop's power cable is working properly?

multimeter

Which of the following improves overall network performance?

multiplexing

Which of the following devices are you likely to find in the MDF? Choose all that apply.

switches, KVM switch, and routers

You need to determine which device on your network is sending excessive messages to your Ubuntu Server. Which utility will give you this information?

tcpdump

While exploring the problem and developing a theory about the cause, where can you go to get information on similar problems your coworkers have faced in the past?

Knowledge Base

What is the first step of inventory management?

List all components on the network

Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack?

passive twinaxial cable

Which of these is considered a secure place to store a list of documented network passwords?

password manager

Which change is designed to close a security vulnerability without affecting other components of an application?

patch

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?

patch cable

Which DNS record type is used to find an FQDN from a given IP address?

pointer (PTR)

Which DNS server offers the most current resolution to a DNS query?

primary DNS server

What is the earliest transceiver type to support four channels on a single transceiver to increase throughput?

qual small form-factor protocol (QSFP)

You're working from home and need to access a file server at the office while working in an application from your work desktop. At the same time, you often stream music in your browser. Which VPN type will be most efficient while still meeting your needs?

split tunnel VPN

When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using?

star topology

Which fiber connector does not support full-duplex transmissions?

straight tip (ST)

When you measure the amount of data coming into your home network, what metric are you identifying?

throughput

Which layer holds the address of the target application running on the destination computer?

transport layer

What should you do after making a plan to solve a problem and carrying out your plan?

verify functionality

Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?

voice gateway

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?

Entrance Facility (EF)

What protocol must be allowed through a firewall for tracert to work correctly?

Internet control message protocol (ICMP)

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?

Look at whether the device is located on the ISP's side of the demarc.

What is an example of an open source DBMS?

MySQL

Which fire suppression level provides the most targeted protection?

Rack Level

Which of the following is an application layer protocol?

Remote Desktop Protocol (RDP)

Which of the following statements is not true?

SMF supports lower bandwidths than MMF.


Conjuntos de estudio relacionados

Chapt 22-Upper Respiratory disorders

View Set

chapter 9 vocabulary , english .

View Set

Social Psychology Pearson Chapter 5

View Set

Clinical Presentation and Detection and Diagnosis

View Set

Topic 1: Globalization and Contemporary World

View Set