Networking Main Set Ch. 1-7

¡Supera tus tareas y exámenes ahora con Quizwiz!

True or false? Network Map is enabled by default in Windows Vista computers within an Active Directory domain.

False

True or false? TACACS+ is backward compatible with TACACS and XTACACS.

False

True or false? The IP address 169.254.226.4 can be routed on the Internet.

False

Unlike cabling, female RJ-45 jacks used in wall outlets, do not have CAT ratings.

False

Virtualization is designed for testing and development purposes only.

False

When a computer gives itself an Automatic Private IP Address (APIPA) it also includes a valid default gateway address.

False

When a disk is formatted, it is impossible to recover the data that was on the disk.. Answer

False

When purchasing new equipment for a small business it is a good idea to invest in expandability features that will meet the company's needs for the next 10 to 15 years.

False

Windows can be installed on an extended partition that has been formatted with the NTFS file system.

False

You don't need to physically secure your servers as long as you use a good strong password for your accounts.

False

Most TCP/IP applications use TCP as the Transport layer protocol because it is a connectionless protocol designed to check for errors.

False (it is connection oriented)

A port number is an 8-bit value between 0 and 65,535.

False (it's 16 bit, same range)

BGP is used between routers inside a single Autonomous System.

False (it's used to connect autonomous systems)

True or false? A star Ethernet might be faster than a bus Ethernet, especially if there are many nodes on the network.

False. A star Ethernet might be slower than a bus Ethernet, because the hub generates a lot of data traffic that isn't used. It replicates all the data it receives from any source and sends it to every node.

True or false? To enable remote access to your network, you must provide services for authentication, authorization, and accounting.

False. Accounting functions are optional.

True or false? Events are collected in event reports.

False. Events are collect in event logs.

True or false? Firewalls are hardware devices.

False. Firewalls can be implemented as hardware or software.

True or false? The System Diagnostics Data Collector Set runs for exactly 5 minutes.

False. It runs for 1 minute.

True or false? Windows 2000 Professional clients have no way of supporting IEEE 802.1x authentication.

False. Microsoft provides an 802.1x Authentication Client download that allows Windows 2000 computers to use the 802.1x standard.

True or false? On the majority of today's laptop computers, the network adapters are PC Cards.

False. Network adapters are standard equipment on notebook computers now.

True or false? In Windows Vista, you use the software that comes with your modem to create dial-up connections to remote servers.

False. Once you've installed a modem on your computer, you establish a connection to an ISP's dial-up server or a company's remote access server by using Windows Vista's "Set up a connection or network" wizard.

True or false? PCI-based modems are less expensive to purchase because the CPU must handle all the processing, making them cheaper to produce.

False. The CPU handles all the processing for an AMR, CNR, or ACR modem, sound card, or network card.

True or false? The internetworking device used to connect computers on a Token Ring network is called a Token Ring hub.

False. Token Ring networks use Multistation Access Units (MSAUs).

True or false? The star topology uses a central networking device called a multistation access unit (MSAU).

False. Token Ring networks use a multistation access unit (MSAU).

True or false? A WINS server is necessary for address translation between IP addresses and network nodes' FQDNs.

False. WINS is used for NetBIOS names.

True or false? You must enable the Windows Event Collector service on the source computer when configuring event forwarding.

False. You must configure it on the collecting computer.

This term is used to refer to any of the several variations of ethernet that operate at 100 Mbps?

Fast Ethernet

What term is used to refer to any of the several variations of Ethernet that operate at 100 Mbps?

Fast ethernet

What general type of cabling is a tech most likely to use today when installing Ethernet cabling in areas with high Electrical Interference?

Fiber-optic

What kind of cabling does the 10BaseFL standard specify?

Fiber-optic

Why might you filter outgoing traffic between your DMZ and the Internet?

Filtering outgoing traffic that is initiated by a DMZ computer would prevent your systems from being used to take part in distributed denial-of-service attacks.

You support a large,complicated network. After experiencing problems and testing the cabling, you have discovered a bad horizontal cable. What should you do next?

Hire an experienced installer

Which of the following is a new file-sharing option that can be used on the network if all the computers have Windows 7 installed?

HomeGroup

a file sharing option in Windows 7

HomeGroup

What is the term used for the passage of a packet through a router?

Hop

What term is used for the cabling that runs from the telecommunications room to the PCs?

Horizontal cabling

It uses the same divisor as the sending station to find the same remainder

How does the receiving station on a network use the CRC to verify that it received accurate data?

B

How does the receiving station on a network use the CRC to verify that it received accurate data? A. It uses a new divisor to find a new reminder B. It uses the same divisor as the sending station to find the same remainder C. It uses the same divisor as the sending station to find a different remainder D. It adds its key to that of the sending station to find the total

A

How long is a Mac Address? A. 12 Hexidecimal Characters B. 48 bytes C. 12 bytes D. 32 bytes

B

How long is a subnet mask? A 24 bits B 32 bits C 32 bytes D 16 bits

D

How many basic pieces of information does an Ethernet frame contain? A 4 B 5 C 6 D 7

D

How many binary digits are in an IPv4 address? A. 4 B. 8 C. 16 D. 32

C

How many layers does the OSI model Contain? A. 3 B. 5 C. 7 D. 9

7

How many layers does the OSI model contain?

C

How many pins does an RJ-45 connector have? A 2 B 4 C 8 D 6

4

How many wires does the 10BaseT specification require in the cabling used?

A

How many wires does the 10BaseT specification require in the cabling used? A 4 B 8 C 64 D 6

For a network to function in full-duplex, which devices must support full duplex?

Hub, NIC, and Switch

Who assigns Autonomous System Numbers (ASNs)?

IANA

Which of the following is a standard developed by Citrix for use with a remote terminal connection?

ICA

What organization oversees the registration of domain names?

ICANN

A smurf attack overwhelms a host by flooding it with ____________ packets.

ICMP

What is the protocol of choice for very simple applications that never need more than a single packet?

ICMP

Which protocol does the ping application use?

ICMP

What is the protocol of choice for very simple applications that never need more than a single packet?

ICMP (The Internet Control Message Protocol)

Which protocol does the PING application use?

ICMP (The Internet Control Message Protocol)

Which of the following is the most popular wireless networking standard?

IEEE 802.11

This trunk standard enables you to connect switches from different manufacturers.

IEEE 802.1Q

Which standard includes secure authentication using a RADIUS server and password encryption using EAP?

IEEE 802.1x

What organization developed the new IPv6 standard?

IETF

Which protocol enables routers to communicate with hosts to determine a group membership for multicast communications?

IGMP

How does the code of ethics in a human resources policy relate to computer security?

It defines the stance of the organization on information security and demands that users act honestly, responsibly, and legally to protect the organization's information.

Which of the following is not a true statement regarding the function of a switch?

It determines the path used based on the destination IP address.

What is the statement that describes the preamble of an Ethernet frame?

It includes 64 bits of alternating 1s & 0s that ends with 11 to notify the receiving NIC.

Which of the following statements best describes the preamble of an Ethernet frame?

It includes 64 bits of alternating ones and zeroes that ends with 11 to notify the receiving NIC that a frame is starting.

What best describes the preamble of an Ethernet frame?

It includes 64-bits of alternating ones and zeros that ends with 11 to notify the receiving NIC that a frame is starting

Which of the following statements best describes an IP address?

It is a unique dotted decimal number assigned to every network node.

What does it usually mean when the activity light on a switch is blinking?

It is communicating with the network.

Why is a server in a client/server model called dedicated?

It is dedicated to serving over the network.

Which of the following is NOT an advantage of fiber-optic cabling over UTP?

It is easier and cheaper to install then UTP

Of the following are reasons to purchase name-brand NICs. (Choose all that apply)

It is easier to replace a missing driver./They often have extra features and utilities./It is easier to return them if they are defective.

Which of the following is an advantage of UTP cabling? (Choose all that apply)

It is inexpensive./It is easy to install./It provides protection against crosstalk.

What is NOT a reason for an organization to use 100BaseFX Ethernet?

It is more inexpensive & easier to install than the other 100-mbps standards

Which of the following is NOT an advantage of UTP cabling?

It is not susceptible to electro-magnetic interference.

Which of the following is not a valid statement about PCIe?

It is slower than USB

What is a disadvantage of UTP cabling?

It is susceptible to electro-magnetic interference

What is a PDU?

It is the name given to the unit of information used by each layer.

What is meant by operating system hardening?

It is the process of modifying an operating system's default configuration to make it more secure from outside threats.

What is the significance of the following Internet Protocol (IP) address: 127.0.0.1?

It is used for internal diagnostic purposes on IP hosts.

Which of the following would not be a reason to run the cabling outside the walls?

It looks neater than cabling that is inside the walls.

What does it mean if a NIC runs in promiscuous mode?

It processes all frames.

Which of the following is true of an Ethernet hub?

It reads a signal coming in from 1 port & repeats the signal out to the other ports.

Which of the following is true of an Ethernet hub?

It reads a signal coming in from one port and repeats the signal out to the other ports.

Select the functions below that a NIC performs. (Choose all that apply.)

It sends and receives binary data./It provides an interface between the PC and the network./It creates frames.

Which of the following attributes does not apply to the OSPF routing method?

It sends routing information at regular intervals even if there are no changes

What is the main disadvantage of cable modem networking?

It uses a bus topology.

A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent?

It's the organizationally unique identifier for the manufacturer of the device.

What is the purpose of the default route?

It's where the router sends all packets with destinations of which it has no knowledge.

Which of the following is an open-source virtual machine manager developed by Red Hat?

KVM

This authentication protocol is used in a TCP/IP network where many clients all connect to a single authenticating server with no point-to-point involved.

Kerberos

Which of the following was a Cisco proprietary protocol that was replaced by L2TP?

L2F

IPSec usually provides the security for this type of VPN.

L2TP

What two tunnel protocols enable tunnel endpoints to act like NICs on the same network? (Select all that apply.)

L2TP/PPTP

The "R" in the standard 10GBaseSR stands for which type of signaling?

LAN

What is the most common connector used in a 1000BaseSX network?

LC

What directory service protocol used in Linux systems is also supported by Windows?

LDAP

This proprietary EAP authentication is used almost exclusively by Cisco on their wireless products.

LEAP

Which of the following are vulnerabilities of a poorly managed network?

Lack of security, unnecessary cost, unnecessary redundancy & lack of efficiency

Anything that moves data from one system to another, such as cabling or radio waves, is part of this layer of the OSI model.

Layer 1

Which layer of the TCP/IP model is mapped to the bottom two layers of the OSI model?

Layer 1

Which of the following layers of the OSI model does NOT offer any commonly used encryption methods or technologies?

Layer 1

Which layer of the TCP/IP model performs IP addressing functions?

Layer 3

On the OSI model, where does Internet Protocol fall?

Layer 3, Network (TCP/IP hits Layers 3-5)

What is the term that describes an approach that uses tight control over what a user account can do on a network, allowing the user to only do what they need to do for their job, and no more?

Least privilege

What does LED stand for?

Light emitting diode

Of the following, select only those conditions that are issues when dealing with fiber-optic cabling. Select all that apply.

Light leakage, attenuation, modal distortion

What systems can NOT use the arping command?

Linux, Mac OS X, UNIX

C

Local connections do not use this, although every routing table has a column for it, and therefore, a value appears in this field for each route. A Netmask B Interface C Gateway D Network Destination

What identifies how wires in a network connect to various switches and other devices?

Logical network diagram

This device combines multiple circuits at one end of a connection into a single complex circuit on a single wire. The signal is then split into the individual connections on the other end.

Multiplexer

What is the solution manufactures devised to accommodate the need for switches to connect to a variety of 10 GbE connector types?

Multisource agreements

What is the solution manufactures devised to accomodate the need for switches to connect to a variety of 10-GbE connector types?

Multisource agreements (MSAs)

Which one of the following passwords meets Windows password complexity requirement?

N3tworking1O1

a device designed specifically for file sharing

NAS

What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device?

NAT

A popular option for load balancing is to hide all the Web servers behind a single IP address using a special multilayer switch that performs these two types of operations.

NAT and port forwarding

This is the "show me the endpoint" command.

NETSTAT

If your network consists mostly of computers with Linux operating systems, which file-sharing system can you use that is native to Linux?

NFS

What is the native file-sharing protocol in Linux?

NFS

the Linux native file sharing protocol

NFS

What component of the computer provides it with a MAC address?

NIC

What network component is built into most PCs today?

NIC

a full-dublex network, what devices must support full duplex?

NIC & Switch

Which part of the network communication process is responsible for sending and receiving data to and from the network media?

NIC driver

Frame

NICs encapsulate data into a _________ for sending that data over a network.

C

NICs send and receive binary data as pulses of all the following except ____. A. electricity B. radio waves C. gamma rays D. light

Which is more secure, an LM hash or an NTLM hash? Why?

NTLM hashes are more secure. LM hashes start by converting all characters to uppercase then storing the hash in two 7-byte strings; longer passwords are truncated and shorter passwords are padded with null characters.

A ___________________ name is a 16-character name, with the first 15 characters available for the name and the 16th character reserved to describe a particular service or functionality.

NetBIOS

At what layer of the OSI model does the IP live?

Network

At what layer of the OSI model does the Internet Protocol work?

Network

At which layer of the OSI model do routers work?

Network

Which layer is responsible for determining the best path a packet should travel across an internetwork?

Network

Which layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system?

Network

In what layer does the NIC operate?

Network Access

This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while hiding the actual addresses of internal network hosts.

Network Address Translation (NAT)

What is the only network protection provided by Windows Internet Connection Sharing (ICS)?

Network Address Translation (NAT)

Who assigns area IDs?

Network Administrators

What layer of the OSI model does the internet protocol work?

Network Layer

An administrator managing many routers should be using this type of tool in order to have an overall view of all the routers.

Network Management System (NMS)

For Windows Server 2008, Microsoft's RADIUS server is called __________.

Network Policy Services (NPS)

Which of the following is among the top three most important objective domains for the CompTIA Network+ exam, based on the percentage of the test that it represents?

Network Technologies

Whose job is it to create a network diagram?`

Network administrator

Fiber-optic cable

Network cabling can use either light or electricity to transmit data. The faster of these types uses light along _________.

Which of the following includes every router, switch, server, CSU/DSU, cable modem, and wireless access point, including the make and model and firmware upgrade?

Network diagram

The Lee family has three computers in the house: Mom's desktop, Dad's laptop, and another desktop shared by the kids. They decide to build a wired 100Base-T Ethernet network to connect their computers together so Dad and the kids can print documents on the printer in Mom's home office. Which of the following components will they need to achieve this goal? (Choose all that apply)

Network interface cards (NICs)/A switch/Straight-through UTP cables

You are working at the help desk and you get a message that a user cannot access the Internet. You open a command prompt, ping the workstation's IP address, and get a response. You ask the user to try the Internet again. He does so with the same result— no connection. Which type of device is most likely to be the problem?

Network layer device

This document describes the broadcast domains and individual IP addresses for all devices in a network with static IP addresses, sometimes showing individual computers, but rarely showing connections to individual computers.

Network map

Different parts of an IP address

Network segment, then host segment; depends on class where network segment ends and host segment begins

Which of the following statements about prioritizing help calls are true? (Choose all that apply)

Network-wide problems take precedence over departmental problems./Problems with shared resources take precedence over individual desktop problems.

What term refers to the process that guarantees that data remains as originally sent, and that it came from an appropriate source?

Nonrepudiation

Which of the following terms refers to the process that guarantees that data remains as originally sent, and that it came from an appropriate source?

Nonrepudiation

When a collision occurs on a network relying on the CSMA/CD access method, what alerts the NICs?

Nonstandard voltage

Which of the following is an example of a network operating system in a classic client/server network?

Novell NetWare

Which one of the following is NOT a typical SONET data rate?

OC-9001

Which of the following is the broadcasting method used by later implementations of 802.11 networks?

OFDM

Which of the following protocols would you expect to find used as an interior gateway protocol within an Autonomous System?

OSPF

Which of the following is a tool that can tell you where a cable break is on a fiber cable?

OTDR

1000BaseLX

Of all the Gigabit Ethernet standards detailed in the chapter, which maintains a signal over the greatest distance?

Repeaters retransmit all packets, while bridges examine the destination MAC address to determine which packets to forward onto the next segment

Of the following statements, which is the best comparison of repeaters and bridges?

One telecommunications room supporting the entire network

Of the following, which would probably not be true of a network that occupies multiple stories of a large building?

What is the only important measure of coax cabling?

Ohm rating

What rating defines how much a cable resists the flow of electricity?

Ohm rating

B

On a TCP/IP network, what information within a packet does a router use to determine where an incoming packet should go? A Destination MAC addresses B Destination IP Addresses C Source MAC address D Source IP Address

Transport layer

On a sending machine, data gets broken up at the __________ of the OSI seven-layer model.

Of the following, which would probably not be true of a network that occupies multiple stories of a large building?

One telecommunications room supporting the entire network

Which of the following is true of the Transport mode of IPSec?

Only the actual payload of an IP packet is encrypted.

Select the link state dynamic routing protocol from the following list. Select all that apply in alphabetical order.

Open Shortest Path First (OSPF), IS-IS

What is the status for a socket that is prepared to respond to any IP packets destined for that socket's port number?

Open port and listening port

If you suspect that a fiber-optic run has a break, which type of device would you use to determine if there is a break, and to identify the location of the break?

Optical time domain reflectometer (OTDR)

When a collision occurs on a network relying on the CSMA/CD access method, what alerts the NIC?

Overlapping signals

Which type of NAT is the most popular?

Overload NAT

What acronym is used to refer to modern peer-to-peer applications?

P2P

You are the network administrator for a company that uses a private addressing scheme for its internal network. You have 300 workstations that regularly access the Internet. What process must be in operation on your network to allow all the workstations to have access to the Internet using only one public IP address?

PAT

What types of expansion slots can you expect to see in most desktop PCs today (excluding laptops)? Select all that apply.

PCI, PCIe

You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboard. You need to make sure that you have the right connector available on your motherboard. What type of connector would be appropriate?

PCI-Express

In early Windows systems there were no user accounts, and permissions on a share could be set to one of two levels.

Read Only and Full Control

Network components will fail, and you can sum up the best protection against such failure in one word. Select that word from the following:

Redundancy

This type of port has a number in the 1024 to 49151 range.

Registered port

Comparision of repeaters and bridges?

Repeaters retansmit all packets, while bridges examine the destination MAC address to determine which packets to forward onto the next segment.

Of the following statements, which is the best comparison of repeaters and bridges?

Repeaters retransmit all packets, while bridges examine the destination MAC address to determine which packets to forward onto the next segment.

Subnet mask properties

Represented in dotted decimal, 32 bit binary numbers; if there is a dash after a subnet mask, such as "/16" (wac 16, or IP network prefix), that means fill a "1" in for 16 places of the subnet mask (11111111.11111111.00000000.00000000)

What enables a DNS server to determine an FQDN by knowing the IP address?

Reverse lookup zones

This cipher will probably be the only streaming symmetric-key algorithm you see.

Rivest Cipher 4 (RC4)

What Microsoft Windows command can you use to add a static route to an Internet Protocol (IP) host s routing table?

Route

What is another term for a Layer 3 switch?

Router

Network

Routers function at which layer of the OSI model?

C

Routers function at which layer of the OSI model? A. Physical B. Data Link C. Network D. Transport

Internet

Routers function at which layer of the TCP/IP model?

They allow you to connect networks with different types of cabling or frames

Routers have which of the following capabilities?

C

Routers have which of the following capabilities? A they allow you to assign a MAC address to each computer B. They allow you to assign an IP address to each computer C. They allow you to connect networks with different types of cabling or frames D. They allow you to set up wireless networks

A

Routers using the OSPF protocol are organized into these groups A Areas B Subnets C Autonomous Systems D Ports

Which of the following Internet Protocol (IP) routing protocols are distance vector? (Choose all that apply)

Routing Information Protocol version 1 (RIP v1)/Routing Information Protocol version 2 (RIP v2)/Border Gateway Protocol (BGP)

You have been asked to install a VPN remote access solution using Windows Server.What do you need to install?

Routing and Remote Access Service (RRAS)

Which of the following is NOT a Linux file system?

SFS

What protocol handles outgoing e-mail?

SMTP

Which of the following protocols is NOT used for Windows 7 VPN connections?

SMTP

This protocol offers a method for querying the state of certain network devices.

SNMP

Which of the following is the record type for an authoritative DNS server?

SOA

What very high-speed fiber network was already in place before the IEEE developed the 10-GbE Ethernet standards?

SONET

What very high-speed fiber network was already in place before the IEEE developed the 10GbE Ethernet Standards?

SONET

The "W" in the standard 10GBaseSW stands for which type of signaling?

SONET/WAN

The W in the standard 10GbaseSW stands for which type of signaling?

SONET/WAN

d. ::1

26. Which of the following is the IPv6 loopback address? Select one: a. FEDC: 00CF: 1234 b. 1.0.0.127 c. 127.0.0.1 d. ::1

c. from their routers

27. Where do IPv6 addresses other than link-local get their subnet masks? Select one: a. EUI-64 b. IANA c. from their routers d. manually configured

d. FEDC::

28. Which part of this address, FEDC::CF:0:BA98:1234/64, is the network ID? Select one: a. CF:0:BA98:1234 b. FEDC c. BA98:1234 d. FEDC::

d. 2001:0000:0000:3210:0800:200C:00CF: 1234

29. Which of the following is an example of an IPv6 address? Select one: a. 197.169.94.82 b. 197.169.94.82/24 c. FEDC.BA98.7654.3210.0800.200C.00CF.1234.56AE.9512 d. 2001:0000:0000:3210:0800:200C:00CF: 1234

Which of the following speeds is the original maximum data transfer rate of the first Ethernet developed by Xerox?

3 Mbps

a. ISATAP

3. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one uses nonstandard addresses for the endpoints? Select one: a. ISATAP b. Teredo c. 6in4 d. 6to4

c. stateful

30. In what mode is a DHCPv6 server operating if it works much like an IPv4 DHCP server, passing out IPv6 addresses, subnet masks, and default gateways, plus optional items (DNS server addresses)? Select one: a. stateless b. passive c. stateful d. active

How many binary digits are in an IPV4?

32

How many binary digits are in an IPv4 address?

32

How long is a subnet mask?

32 bits

d. tunnels

32. What must you use to span the gap in IPv6 support and access the IPv6 Internet? Select one: a. IPv4-only routers b. DNS c. DHCP6 d. tunnels

d. multicast address

33. This is a set of reserved addresses designed to go only to certain systems. Select one: a. link-local address b. anycast address c. global unicast address d. multicast address

b. tunnel broker

34. An organization or person offering this service creates an IPv6 tunnel, and usually offers a custom-made endpoint client. Select one: a. TSP b. tunnel broker c. DHCPv6 d. TIC

What is the total bandwidth of an E3 line?

34.368 Mbps

Which of the following speeds is the original maximum data transfer rate of the first ethernet developed by Xerox?

3Mbps

How many disks are needed to implement a RAID 1 + 0?

4

How many wires does the 10BaseT specification require in the cabling used?

4

What is the norm today for the number of pairs in UTP cabling?

4

What is the decimal equivalent to the hexadecimal number D?

4-byte frame check sequence

d. AAAA

4. How does a DNS server today identify a record for a host with an IPv6 address? Select one: a. A b. NS c. IPv6 d. AAAA

What wavelength is used on a 10GBaseSR/SW network?

850nm

Which of the following ports does the Kerberos authentication protocol use?

88

Most WAPs use one of the following channels by default EXCEPT:

9

d. Teredo and 6in4

9. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which two can go through a NAT router? Select one: a. 6in4 and 6to4 b. ISATAP and 6to4 c. 6to4 and Teredo d. Teredo and 6in4

What is the maximum length for UTP cables allowed by the TIA/EIA 568 cabling specification?

90

C

A MAC address is composed of which two parts? A. The network address and the node address B. the computer name and the node address C.The organizationally unique identifier and the unique device ID of the NIC D. the IP address and the NICs serial number

In which network type does each host on the LAN has the same authority as other hosts? A Peer-to-peer network B Local area network C Client/server network D Wide area network

A Peer-to-peer network

The original four NAPs are called what? A Public Internet exchange points B Private Internet exchange points C Commercial Internet Exchange (CIX) points D Federal Internet Exchange (FIX) points

A Public Internet exchange points

Modems use which RJ connector? A RJ-11 B RJ-14 C RJ-25 D RJ-45

A RJ-11

If you're using copper cable, what type of cable do you use for user and patch cords? A Solid B Stranded

A Solid

Which standard specifies UTP standards for workstation runs? A TIA/EIA-568-C B TIA/EIA-569-A C TIA/EIA-606 D There is no standard for these components.

A TIA/EIA-568-C

What is the pinout difference between the T568A and T568B standards? (Select all that apply.) A The wire color attached to pin 1 B The wire color attached to pin 2 C The wire color attached to pin 3 D The wire color attached to pin 4 E The wire color attached to pin 5 F The wire color attached to pin 6 G The wire color attached to pin 7 H The wire color attached to pin 8

A The wire color attached to pin 1 B The wire color attached to pin 2 C The wire color attached to pin 3 F The wire color attached to pin 6

Define bastion host.

A bastion host is a computer that is located between the Internet and your intranet. It has two network cards, one for each network. Communications between the networks is typically blocked to prevent inbound access to intranet systems.

What are you trying to discover when you test a cable for continuity?

A broken wire

According to the 802.11 standard, an access point is _____________.

A device that acts as a transparent bridge between wireless clients and a wired network.

Which of the following is not part of a wall outlet?

A male jack

What does the information belowt convey? Active Connections Proto Local Address Foreign Address State TCP brcce3:ftp brcce3:0 LISTENING TCP brcce3:smtp brcce3:0 LISTENING TCP brcce3:http brcce3:0 LISTENING TCP brcce3:epmap brcce3:0 LISTENING TCP brcce3:https brcce3:0 LISTENING TCP brcce3:microsoft-ds brcce3:0 LISTENING TCP brcce3:1025 brcce3:0 LISTENING TCP brcce3:3389 brcce3:0 LISTENING TCP brcce3:netbios-ssn brcce3:0 LISTENING TCP brcce3:netbios-ssn brcce3:0 LISTENING TCP brcce3:1027 brcce3:0 LISTENING TCP brcce3:1210 localhost:1211 ESTABLISHED TCP brcce3:1211 localhost:1210 ESTABLISHED TCP brcce3:1215 localhost:1216 ESTABLISHED

A network delay using netstat

You recently completed a network overhaul over the weekend. Everything seems to be functioning properly until you receive a swarm of help desk support requests, all originating from one specific floor in your building. After a few minutes on the phone with those affected, you determine that no one has indicator lights active on their NICs. What is most likely the problem?

A network switch has not been powered on.

What two items does an IP address identify?

A network/A node (host)

What is a RADIUS realm?

A realm defines a namespace.

What does the ping message "Destination net unreachable" mean?

A router in the path from the source to the destination determined that the destination network does not exist.

On the Windows side of a PPTP connection, you run "Create a New Connection" with what result?

A virtual NIC is created

An IPv6 subnet ID is how many bits long? A 8 B 16 C 32 D 64

B 16

The standard BNC barrel connector is considered a how-many-pin connector? A 1 B 2 C 3 D 4

B 2

How many octets are in an IPv4 address? A 2 B 4 C 8 D 16

B 4

For which port must you create a Windows Firewall exception when using HTTP in event forwarding? A 45 B 80 C 180 D 443

B 80

Ratified in 2003, which standard is a combination of 802.11a and 802.11b? A 802.11c B 802.11g C 802.11h D 802.11n

B 802.11g

Of the four components to security on a wireless network, to which one does a RADIUS server belong? A Access control B Authentication C Encryption D Isolation

B Authentication

Which Ethernet standard designates fiber optic cabling as its required medium? (Choose all that apply.) A BASE-CX B BASE-R C BASE-T D BASE-W E BASE-X

B BASE-R E BASE-X

Which wireless protocol is a short-range wireless technology limited to transmission distances of about 100 meters or less? A 802.11a B Bluetooth C Wi-Fi D WiMAX

B Bluetooth

Which type of address is written in the standard 4-part dotted decimal address, followed by /N where N is a number from 0 to 32? A APIPA B CIDR C IPv4 D IPv6

B CIDR

Which WAN connection technology currently uses Enhanced Data rates for GSM Evolution (EDGE), Evolution-Data Optimized (EV-DO), or High-Speed Downlink Packet Access (HSDPA)? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless

B Cellular

What are two popular options for horizontal runs to modular office systems? (Select two.) A Cable trays B Consolidation points C Multiuser outlets D Straight runs E Splices

B Consolidation points C Multiuser outlets

Which occurs because alternating electrical current flowing through a wire creates an electromagnetic field around the wire? A Attenuation B Crosstalk C Interference D Shorts

B Crosstalk

The point at which the communications network owned by one company connects to the communications network owned by another company is called what? A Cross-connect B Demarc C Entrance facility D Main distribution frame

B Demarc

Which protocol do Web browsers and Web servers use most often? A FTP B HTTP C HTTP(S) D TFTP

B HTTP

When wiring Ethernet in a star topology, the internetworking device you use to take the signal transmitted from one computer and propagate it to all the other computers on the network is which of the following? A Bridge B Hub C Repeater D Switch

B Hub

The ping utility is the most common use of which protocol? A ARP B ICMP/ICMPv6 C IGMP D RIP

B ICMP/ICMPv6

A 16-byte address displayed in hexadecimal is called which of the following? A IPv4 address B IPv6 address C MAC address D Port address

B IPv6 address

Which type of hub is yet to be defined, but might include management features and support the TCP/IP Simple Network Management Protocol (SNMP)? A Active B Intelligent C Passive D Switching

B Intelligent

To which TCP/IP architecture layer do routing protocols belong? A Application B Internet C Network Interface D Transport

B Internet

Which command displays the IP address of the host and other configuration information? A Getmac B Ipconfig C Nslookup D Ping

B Ipconfig

Bridges operate at which OSI layer? A Layer 1 - Physical B Layer 2 - Data link. C Layer 3 - Network D Layer 4 - Transport

B Layer 2 - Data link.

Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server network D Wide area network

B Local area network

In which network topology do all nodes have independent connections to all other nodes? A Bus B Mesh C Ring D Star

B Mesh

The diameter of fiber optic cable is expressed in which measurement? A Centimeters B Microns C Millimeters D Ohms

B Microns

Which of the following event delivery optimization settings might you use when collecting events from a branch office that's connected over a slow WAN link? A Minimize Latency B Minimize Bandwidth C Maximize Bandwidth D Maximize Latency

B Minimize Bandwidth

The two most common Interior Gateway protocols are: A NAT B OSPF C RIP D SNMP

B OSPF C RIP

Impedance is measured in which of the following? A Nanoseconds B Ohms C Millimeters D Volts

B Ohms

Which connection type uses two directional antennas to make the wireless link? A Indoor point-to-multipoint LANs B Outdoor point-to-point links C Outdoor point-to-multipoint links D Wi-Fi E WiMAX

B Outdoor point-to-point links

Which terminating device has the following advantages? • It's a permanent link. • Channel testing is easier. • It's a solid connection. • Moves easily. A Connecting block B Patch panel

B Patch panel

__________ are designed to fix security vulnerabilities. A Hotfixes B Patches C Updates D BIOS updates

B Patches

Thicknet cables are which type? (Choose all that apply.) A RG-6 B RG-8 C RG-11 D RG-58 E RG-59

B RG-8 C RG-11

Which of the following Radio Guide cable categories is used for Ethernet networking? (Select all that apply.) A RG-6 B RG-8 C RG-9 D RG-11 E RG-58 F RG-59

B RG-8 D RG-11 E RG-58

Which standard addresses the entrance facility, equipment room, backbone pathways, telecommunications room, and horizontal pathways? A TIA/EIA-568-C B TIA/EIA-569-A C TIA/EIA-606 D There is no standard for these components.

B TIA/EIA-569-A

Which network medium is composed of four pairs of wires, where the pairs are twisted together and bundled within a covering? A Coaxial B Twisted pair C Fiber optic D Wireless

B Twisted pair

Which of the following cities hosts one of the four original NAPs? (Choose all that apply.) A San Francisco, CA B Washington, DC C New York, NY D Seattle, WA E Chicago, IL

B Washington, DC E Chicago, IL

Which utility enables you to reset a computer's network adapter? A Network Map B Windows Network Diagnostics C IPConfig D Local Area Connection

B Windows Network Diagnostics

In a UTP installation, you don't want to exceed what distance from the user's equipment to the final termination point in the telecommunications room? A 10 meters B 90 meters C 100 meters D 1000 meters

C 100 meters

What AWG gauge is most common for cross-connect jumpers? A 20 B 22 C 24 D 26

C 24

What is the default subnet mask for a Class C IP address? A 255.0.0.0 B 255.255.0.0 C 255.255.255.0 D 0.255.255.255

C 255.255.255.0

How many octets are part of the network ID when using the subnet mask 255.255.255.0? A 1 B 2 C 3 D 4

C 3

With VLAN trunking, a single network adapter can virtualize "n" number of network adapters. "n" has a theoretical limit of what? A 90 B 1000 C 4096 D 5012

C 4096

How many bits are in an octet? A 2 B 4 C 8 D 16

C 8

Which network type requires a network operating system (NOS)? A Peer-to-peer network B Local area network C Client/server network D Wide area network

C Client/server network

Which is WAN connection technology that uses high-speed connections made over regular analog phone lines? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless

C DSL

Which type of crosstalk is a calculated value of the crosstalk between pairs measured at the far end of the cable? A Near End Crosstalk (NEXT) B Far End Crosstalk (FEXT) C Equal Level Far End Crosstalk (ELFEXT) D Pair to Pair Crosstalk

C Equal Level Far End Crosstalk (ELFEXT)

Which of the following is the local group you can use to grant permissions to view event logs on a remote computer? A Event Log Managers B Event Log Admins C Event Log Readers D Event Log Browsers

C Event Log Readers

Which network medium carries light-based data through strands of glass or plastic no thicker than a human hair? A Coaxial B Twisted pair C Fiber optic D Wireless

C Fiber optic

Routers operate at which OSI layer? A Layer 1 - Physical B Layer 2 - Data link. C Layer 3 - Network D Layer 4 - Transport

C Layer 3 - Network

Which OSI layer addresses data messages, translates logical addresses into actual physical addresses, and routes data to addresses on the network? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application

C Layer 3—Network

The built-in identifying address coded into the NIC by the manufacturers is called which of the following? A IPv4 address B IPv6 address C MAC address D Port address

C MAC address

Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages

C Media access method

When the signal from one pair of wires interferes with the signal on another pair of wires, it's called what? A Attenuation B Impedance C Near End Crosstalk D Signal degradation

C Near End Crosstalk

To which TCP/IP architecture layer do the media access methods belong? A Application B Internet C Network Interface D Transport

C Network Interface

In which type of network is data is broken up into packets before it's sent over the network? A Point-to-point B Point-to-multipoint C Packet-switching D Circuit-switching

C Packet-switching

What are the two choices you have for terminating network wiring in the telecommunications room? (Choose two.) A Cross-connect B LAN router C Patch panel D Punchdown terminal

C Patch panel D Punchdown terminal

Backbones, workstation runs, and cross connects are part of what type of wiring? A Horizontal runs B Movable wiring C Permanent wiring D Vertical cabling

C Permanent wiring

Bridges filter based on which of the following? A Host name B Domain C Physical address D Signal quality

C Physical address

In which network topology is each node connected to a central device by two wires? A Bus B Mesh C Ring D Star

C Ring

Physically, Token Ring networks look like a star, but they operate like which topology? A Bus B Hybrid C Ring

C Ring

Which of the following is another name for default gateway? A Host B Hub C Router D Switch

C Router

Which e-mail protocol is used to send and receive e-mail messages between e-mail servers and used by e-mail client software to send messages to the server, but never used to retrieve e-mail from a server? A IMAP4 B POP3 C SMTP

C SMTP

What is the default lease length used by a wired scope created in the Windows Server 2008 DHCP Service? A Three hours B Three days C Six days D Eight days E 30 days

C Six days

Which is a simple software-based protocol analyzer? A The command-line utility ARP B The command-line utility IPCONFIG C The Windows Network Monitor utility D The Windows Network Control Panel utility

C The Windows Network Monitor utility

The interface on the access point used to connect to the existing wired network is typically called what? A Antenna B Transmitter C WAN port D Wireless NIC

C WAN port

Which of the following is the most widely used wireless technology at present? A 802.11a B Bluetooth C Wi-Fi D WiMAX

C Wi-Fi

Which network component is most vulnerable to performance problems caused by poor installation practices? A Clients B Servers C Wiring D Network transmission devices

C Wiring

Which command would you use to verify name resolution (DNS) settings? A ipconfig B ping C nslookup D tracert

C nslookup

Which Ethernet standard is the fastest? A Twisted Pair Ethernet B Fast Ethernet C Gigabyte Ethernet D 10GbE

D 10GbE

How many bits is an IPv6 address? A 8 B 32 C 64 D 128

D 128

Which is not a valid subnet mask? A 255.255.0.0 B 255.247.0.0 C 255.255.255.0 D 255.0.255.0

D 255.0.255.0

For which port must you create a Windows Firewall exception when using HTTPS in event forwarding? A 45 B 80 C 180 D 443

D 443

You should place your wireless LAN access points within how many meters of the wireless clients? A 40 to 125 B 55 to 200 C 60 to 90 D 90 to 400 E 115 to 550

D 90 to 400

Which of the following is a reason to revoke a certificate? A A newer certificate has been issued to the user or computer. B The private key has become known to someone other than the holder. C The user or computer is no longer employed by the company. D All of the above.

D All of the above.

An IPv4 packet sent to all workstations on the network is called a __________. A Directed packet B Unicast C Multicast D Broadcast

D Broadcast

What was introduced to make IPv4 Internet routing more efficient? A Subnet masks B Switches C DHCP D CIDR

D CIDR

IP address 227.43.76.109 is an example of which of the following classes of IP addresses? A Class A B Class B C Class C D Class D

D Class D

Which type of network cable transmits digital signals in the form of pulses of light? A Coaxial B Unshielded Twisted Pair (UTP) C Shield Twisted Pair (STP) D Fiber Optic

D Fiber Optic

For LAN cross-connects, how many pairs of wires are in the cable? A One B Two C Three D Four

D Four

Which OSI layer divides long communications into smaller data packages, handles error recognition and correction, and acknowledges the correct receipt of data? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application

D Layer 4—Transport

Which of the following are router protocols? (Choose all that apply.) A ATM B Frame relay C IPX D RIP E OSPF F TCP/IP G X-25

D RIP E OSPF

Twisted pair network cable uses which RJ connector? A RJ-11 B RJ-14 C RJ-25 D RJ-45

D RJ-45

In which network topology is each node connected to a central network transmission device such as a hub or a switch? A Bus B Mesh C Ring D Star

D Star

Which internetworking device makes computers that are connected to separate segments appear and behave as if they're on the same segment? A Bridge B Hub C Router D Switch

D Switch

The device on a NIC card that converts the data that it receives from the system into a signal that's appropriate to the network is called a ______________. A Port B PROM chip C Receiver D Transceiver

D Transceiver

To which TCP/IP architecture layer do TCP and UDP belong? A Application B Internet C Network Interface D Transport

D Transport

Which TCP/IP architecture layer makes use of ports? A Application B Internet C Network Interface D Transport

D Transport

Which encryption method uses Advanced Encryption System (AES) cipher for stronger encryption? A 802.11i B WEP C WPA Personal D WPA2

D WPA2

Which network medium is a popular choice for outdoors or in an historic building? A Coaxial B Twisted pair C Fiber optic D Wireless

D Wireless

In most cases, you can install a small business network and move on to the next job, leaving the company's IT staff to support the network.

False

In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.

False

It is a good idea to place an equipment room in a high humidity area.

False

It is a good idea to protect your Web server by using NAT on the Web server itself.

False

L2TP natively includes authentication and encryption.

False

Less efficient than RIP, OSPF sends routing information at regular intervals, even if nothing has changed.

False

Microsoft Exchange is an example of a dedicated e-mail client.

False

Most small businesses require a high level of security including encryption technologies and complex network connections.

False

On a /24 network you can have 256 hosts.

False

Patch cables should be solid core cables to provide extra strength and prevent the cables from breaking easily when you move them.

False

Patch panels allow you to connect only one kind of cabling; that is, they support only UTP, STP, or fiber but not a mixture of different types.

False

T-Carrier lines only require a CSU/DSU on the customer's side of the connection.

False

The Network+ exam is administered over the Internet.

False

The first thing you should do with a new router is to plug it into an existing network.

False

The part of the IP address that is the same for all computers on a network is called the Host ID.

False

The ping command is used to determine the path between two devices.

False

The preset address in a managed switch is assigned to a single port.

False

The process of installing a large structured cabling system is so simple and logical that even a novice network tech can do it, following the published guidelines.

False

Which of the following characters is not permitted in a DNS domain or host name?

Spaces (only upper and lowercase letters numbers 0-9 and the hyphen may be used)

The addresses 127.0.0.1, 10.1.1.50, 172.16.200.1, and 192.168.35.44 are examples of what?

Special IP addresses

The adress 127.0.0.1, 10.1.1.50, 172.16.200.1, & 192.168.35.44 are all examples of what?

Special IP addresses

What type of bus does 10BASET use?

Star Bus

In what mode is a DHCPv6 server operating if it works much like an IPv4 DHCP server, passing out IPv6 addresses, subnet masks, and default gateways, plus optional items (DNS server addresses)?

Stateful

In what mode is a DHCPv6 server operating if it only passes out optional information?

Stateless

What type of filtering is employed when traffic is blocked just based on IP address?

Stateless

When a NAT router uses this in conjunction with IP addresses, it solves the two problems of security and limited IP addresses

TCP/IP port numbers

Which of the following is a tool that can tell you where a cable break is on a copper cable?

TDR

What file transfer protocol uses UDP port 69, and does not use user names and passwords?

TFTP

Which protocol, not appropriate for use over the Internet, is used for transferring files between servers and clients without requiring a user login?

TFTP

What are the standards for creating ends for 100baseT cables? (Choose all that apply)

TIA/EIA 568A/TIA/EIA 568B

Clustered servers can balance the load when there is heavy usage.

TRUE

The Internet backbone is comprised of technologies designed over 20 years ago to support telephone traffic.

TRUE

Which of the following are automatic tunnel configuration protocols?

TSP and TIC

List at least three primary causes for compromised security.

Technology weaknesses, configuration weaknesses, policy weaknesses, human error or malice.

After you have set up a network for a small business, you may need to access the network remotely to provide support for the users. Which remote access option should not be used unless a secure connection can be established first?

Telnet

Almost every server application has a way for you to access and administer it using this older protocol.

Telnet

SSH was designed as a replacement for ________________ and other insecure remote shells, which sent data (including passwords) in plaintext.

Telnet

What protocol, replaced in recent years by a more secure protocol, was for many years the primary protocol used to allow a user to log in remotely and execute text-based commands on a remote host?

Telnet

Which of the following are considerations when considering electrical and environmental issues in equipment rooms? (Choose all that apply)

Temperature/humidity/electrical load capacity

Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one is built into Microsoft Windows?

Teredo

Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which two can go through a NAT router?

Teredo and 6in4

Which of the following is a standard that offers authentication, authorization, and accounting?

Terminal Access Control Access Control System Plus (TACACS+) and Remote Authentication Dial-in User Service (RADIUS)

Which of the following is a standard that offers authentication, authorization, and accounting? (Select all that apply.)

Terminal Access Control Access Control System Plus (TACACS+)/Remote Authentication Dial-in User Service (RADIUS)

You cannot connect to a network server. The light in the back of the NIC card is not flashing. You change the patch cable and it is still not flashing. You go into the wiring closet and switch the connector from one connection on the switch to another. You check the NIC light and it is blinking. What should you do next?

Test the solution

What can the command PING do?

Tests connectivity two IP devices.

Which of the following would be a reason for an organization to use 100BaseFX Ethernet? (Choose all that apply)

The 100 meter distance limitation of the other standards may be inadequate./The network will be installed in an environment that has a high level of electrical interference./The network requires higher security than that provided by UTP.

Which of the following is not part of the fully qualified domain name (FQDN)?

The IP address

Which of the following is not a share attribute of all members of the ethernet family of networking technologies?

The same kind of cablingj

The trial-and-error method should NOT be used under which of the following situations?

The server is your public Web server and is currently hosting all of your business.

Which of the following are advantages of fiber-optic cabling over UTP? (Choose all that apply)

The signals travel farther./It has a longer maximum distance/It is immune to electrical interference.

Group accounts make it easier for an administrator to manage user rights and permissions.

True

ICMP is a transport layer protocol used for applications that are always connectionless and never need more than a single packet.

True

Ideally, once you install horizontal cabling, you should never move it.

True

If the first octet of the IP address begins with 110 (110xxxxx), the system belongs to a Class C network.

True

If the network is not visible on the internet, the DNS naming convention does not require top-level domain names such as .com or .org

True

In Windows, you can start the Task Manager by simply right-clicking the taskbar and choosing Start Task Manager.

True

In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions.

True

In a routing table, whenever the gateway address and the interface address are the same, it's a local connection.

True

In a small business network, the router usually takes on the responsibilities of many roles, which include a firewall as well as a DHCP server.

True

Most SNMP managers allow the configuration of thresholds for generating alert messages to network administrators when those thresholds are exceeded.

True

Most operating systems, including server versions of Windows, come with built-in DNS server software.

True

Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols.

True

NAT is not routing.

True

One critical difference between a client OS and a server OS is the addition of directory services on some server OSs.

True

Packet switched WANs use virtual circuits to ensure that packets are delivered reliably and at the agreed-on bandwidth level.

True

SSH is a replacement for Telnet.

True

Secure shell (SSH) is a terminal emulation program that is usable over a LAN connection.

True

The Network+ exam is vendor-neutral.

True

The creator of a HomeGroup has the ability to change the randomly generated password to a more user-friendly password.

True

Ethernet _____________ combines the bandwidth of two network interface cards as a cost-effective way to increase bandwidth available for data transfers for critical servers, such as firewalls and production servers.

bonding

The partition that contains the Windows OS files is known as the what type of partition?

boot

What is another term for a switching loop?

bridging loop

If the computers on the network connect via the same piece of cable, what topology is employed?

bus

The benefit of a ___________ topology is that it's simple and inexpensive to set up.

bus

Which of the following topologies provide no fault tolerance?

bus ring

Which tool do you use to tap into a 66-block or 110-block to see if a particular line is working?

butt set

You are working on a workstation and the operator complains that they cannot log into server1 after lunch. They logged in ok in the morning. What is your first step?

check the logon error message

Which of the following is a term used for a way to encrypt data?

cipher

Which of the following is the result of running cleartext through an algorithm using a key?

ciphertext

The plain old telephone service is a good example of what kind of WAN technology?

circuit switched

The Internet Assigned Numbers Authority (IANA) implemented _____________ IPv4 addresses in order to differentiate between the portion of the IP address that identifies a particular network and the portion that identifies a specific host on that network.

classful

Which of the following is a VPN mode that is usually implemented to give mobile users access to the network?

client-to-gateway

connection between a desktop and a VPN device

client-to-gateway

What status indicates that a connection has made a graceful closure?

close_wait

What storage solution involves a third-party company that provides off-site hosting of data?

cloud-based storage

This term describes multiple servers or groups of servers representing a single server, distributing the load and protecting from the failure of a single server.

cluster

What kind of cable is described as a central conductor wire, surrounded by insulating materials, placed inside a braided metal shield?

coaxial

What will display when you run netstat without any switches?

current sessions

Which of the following is the fastest switching mode?

cut-through

What does the frame trailer consist of in an Ethernet frame?

cyclic redundancy check

Combined permissions that lead to conflicting permissions, where a user does not get access to a needed resource, are usually caused by:

deny permissions

On a TCP/IP network, what information within a packet does a router use to determine where an incoming packet should go?

destination IP address

All of the following help to identify a problem during the troubleshooting process EXCEPT?

determine next steps to resolve problem

This command is not available on Windows, but on a computer running Linux or Mac OS X, this command will let you diagnose DNS problems.

dig

True or false? 802.11b, 802.11a, and 802.11g are all considered Wi-Fi.

True

True or false? A LAN becomes a WAN when you expand the network configuration beyond your own premises and must lease data communication lines from a public carrier.

True

True or false? A computer will use a default gateway if the destination IP address is on a different network.

True

True or false? A traffic shaper can limit the amount of bandwidth a certain type of traffic is allowed to use.

True

True or false? Brouters operate at both the network layer for routable protocols and at the data link layer for non-routable protocols.

True

True or false? Event Viewer is a Computer Management component.

True

True or false? It is important when training users to alert them to ways that attackers attempt to gather personally identifiable information and information about the organization's network.

True

True or false? Kerberos authenticates users and servers over an open multi-platform network using a single login procedure.

True

True or false? Routers were designed to prevent unnecessary broadcasts in bridged networks

True

True or false? Wireless Zero Configuration enables Windows Vista and Windows XP computers to automatically connect to available wireless networks.

True

True or false? You can safely distribute your public key to others.

True

Using TCP, if a receiving computer detects a missing packet, it just asks for a resend of the packet.

True

When performing name resolution, every operating system that supports TCP/IP will look in the local HOSTS file before sending a DNS query.

True

While most of the Network+ exam is extremely practical and deals with real-world scenarios, you can also expect conceptual questions about the OSI seven-layer model.

True

Windows Server 2008 R2 can be installed only on a 64-bit system

True

True or false? Routers have a lower throughput than bridges.

True. A router activity needs more processor time, more memory, and multiple network connections.

True or false? In a star topology, when a single connection fails, it doesn't affect the communication ability of other computers.

True. In the star topology, when a single connection fails, it doesn't affect the communication ability of other computers connected to the same network transmission device.

True or false? The purpose of a modem is to convert digital data signals from the computer into analog signals for transmission over the phone line.

True. It also converts analog signals received from the phone line back into digital signals for the computer.

True or false? TCP is a connection-oriented protocol that creates and verifies a connection with a remote host before sending information.

True. UDP is connectionless.

True or false? You terminate both workstation drops and backbone wiring using the same device.

True. You can use the same patch panel or punchdown to terminate both workstation drops and backbone wiring.

In order to have a VLAN span two switches, you must configure a port on each switch to carry all data, regardless of VLAN number, between the switches. What is the term for this port?

Trunk port

This is an encrypted link between two programs (or endpoints) on two separate computers.

Tunnel

An organization or person offering this service creates an IPv6 tunnel, and usually offers a custom-made endpoint client.

Tunnel broker

How many pairs of pins in an RJ-45 connector does a 10BaseT device actually use?

Two

Which of the following is the most common WINS/NetBIOS problem?

Two systems share the same name

What device converts 8-bit-wide parallel data from a computer into 1-bit-wide serial data to send to a modem where it is converted to an analog signal before being sent over phone lines?

UART

What Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?

UDP

Which protocol uses datagrams as its Protocol Data Unit

UDP

Which protocol uses datagrams as its protocol data unit?

UDP

This keeps your servers running for a short period of time after an electrical brownout or blackout.

UPS

E

What are the two names for dynamic IP addressing? Select the two correct answers. A. Bootstrap Protocol ( BOOTP) B. IPCONFIG C. Dynamic Host Configuration Protocol (DHCP) D. IPv4 E. A and C

A

What basis do bridges use to determine whether to forward traffic? A MAC addresses B IP addresses C traffic conditions at the time D nothing because bridges forward all traffic

C

What command can you use to test the NIC's ability to send and receive packets? A ARP -a B PING 255.255.255.255 C PING 127.0.0.1 D IPCONFIG

D

What command would you run from a windows command line to verify that a NIC can send and receive IPv4 packets? A arp-a B ipconfig /all C ping gateway D ping 127.0.0.1

Router

What device do you need to split a large network into smaller ones?

It processes all frames

What does it mean if a NIC runs in promiscuous mode?

B

What events, characteristic to an Ethernet network using hubs, does using an Ethernet switch minimize or avoid? A resends B collisions C termination D frame checking

Collisions

What events, characteristics to an Ethernet network using hubs, does using an Ethernet switch minimize or avoid?

Fiber-optic

What general type of cabling is a tech most likely to use today when installing Ethernet cabling in areas with high electrical interference?

C

What general type of cabling is a tech most likely to use today when installing ethernet cabling in areas with high electrical interference? A shielded twisted pair (STP) B coaxial C fiber optic D twinaxial copper

C

What is the MAC broadcast address? A 0.0.0.0 B 127.0.0.1 C FF-FF-FF-FF-FF-FF D 1.1.1.1

A

What is the Network layer unique identifier assigned to each device on a TCP/IP network? A. IP address B. MAC address C. Router name D. Port Number

The number of ports

What is the biggest differentiator among Ethernet hubs?

C

What is the biggest differentiator among Ethernet hubs? A the size of power supply B the types of connectors C the number of ports D the price

E

What is the binary equivalent of the decimal value 97? A 0110001 B 1001110 C 01000001 D 01101010 E None of the above

B

Which of the following attributes does not apply to those OSPF routing method? A It uses a link state algorithm B IT sends routing information at regular intervals even if there are no changes C It sends tiny messages called "Hellos" to its neighbors D It shares detailed information through link state advertisments

B

When a NAT router uses this in conjunction with IP addresses, it solves the two problems of security and limited IP addresses A source addresses B TCP/IP port numbers C Autonomous System Numbers D Area ID

Overlapping signals

When a collision occurs on a network relying on the CSMA/CD access method, what alerts the NICs?

C

Which of the following automatically gives out IP information to computers that request it? A DNS B PING C DHCP D ARP

It is a sublayer of the Data Link Layer

Which of the following best describes Logical Link Control (LLC)?

B

Which of the following best describes Logical Link Control (LLC)? A. It is a layer 1 protocol B. It is a sublayer of the Data Link layer C. It remembers the NICs MAC Address D. It controls open network sessions

B

Which of the following could be a valid Autonomous System Number (ASN)? A 0.0.0.0 B 1.33457 C 192.168.30.1 D 255

It is not susceptible to electro-magnetic interference

Which of the following is NOT an advantage of UTP cabling?

It is easier and cheaper to install than UTP

Which of the following is NOT an advantage of fiber-optic cabling over UTP?

FF-FF-FF-FF-FF-FF

Which of the following is a broadcast MAC address?

B

Which of the following is a broadcast MAC address? A. 255.255.255.255 B.FF-FF-FF-FF-FF-FF C. 256 D. 1,000

D

Which of the following is a valid IP address for an individual system expressed in dotted-deciaml notation? A 0.0.0.0 B 255.255.255.255 C 128-5EF-297 D 215.233.32.91

A

Which of the following is another a name for a MAC address? A. Physical B. Logical C. IP D. computer

Physical

Which of the following is another name for a MAC address?

C

Which of the following is not a designated private IP addresses? A 192.168.64.7 B 172.28.16.48 C 153.6.2.1 D 10.164.19.5

Network

When it receives data from the upper layers, which layer of the OSI model assembles the data into smaller pieces called packets?

D

When it recieves data from the upper layers, which layer of the OSI model assembles the data into smaller pieces called packets? A. Data Link B. Physical C. Network D. Transport

Stranded core is UTP while solid core is fiber-optic cabling

Which of the following is not an accurate description of the differences between stranded core and solid core cabling?

C

When subnetting, do not think of each subnet mask in dotted decimal, rather work with it in binary and another notation that uses a slash and is named for the method of generating blocks of IP addresses. A DHCP B BOOTP C CIDR D IANA

D

When viewed in binary, what value is always on the far left in the first octet of a class A address? A 00 B 10 C 110 D 0

All equipment racks are floor-to-ceiling and should be bolted into the wall.

Which of the following is not true about standard equipment racks?

B

Which of the following is the distance vector routing protocol used on the internet? A RIP B BGP C OSPF D IGRP

A

Where does the CRC come from in a network frame? A the sending NIC attaches it B. The receiving NIC attaches it C. The network operating system generates it and attaches it D. the network administrator attaches it

802.11

Which IEEE subcommittee sets the standards for WIreless LAN networks?

D

Which IEEE subcommittee sets the standards for Wireless LAN networks? A 802.2 B 802.3 C 802.5 D 802.11

Transport

Which TCP/IP model layer uses connection-oriented protocols?

D

Which connector is used for UTP cabling on a network? A RF-11 B BNC C RS-232 D RJ-45

B

Which ethernet cabling standard defines an Ethernet network that uses CAT3 or better UTP cabling, operating at 10Mbps? A 10BaseFL B 10BaseT C 10Base2 D 100BaseTX

A

Which kind of cable does not provide any protection against EMI? A UTP B STP C Fiber D Coax

D

Which kind of cable works best for long distance transmissions? A coax B UTP C STP D fiber-optic

B

Which layer of OSI model adds source of destination MAC addresses to frames? A. Network B. Data Link C. Transport D. Presentation

Data Link

Which layer of the OSI model adds source and destination MAC addresses to frames?

C

Which layer of the OSI model is the only layer divided into two sublayers? A transport B Network C data link D physical

B

Which layer of the OSI model manages the connections between machines on the network?

Session

Which layer of the OSI model manages the connections between machines on the network?

Application

Which layer of the OSI model refers to the code built into operating systems that enables network-aware applications?

C

Which layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system? A. Presentation B. Application C. Network D. Data Link

Mesh

Which network topology offers the greates level of fault tolerance?

D

Which network topology offers the greatest level of fault tolerance? A bus B ring C star D mesh

A D

Which of the following is true of OSPF routers? Select all that apply in alphabetical order. A They send Hello messages every 30 minutes to routers in their area B They do not support CIDR C they have a 15-hop limit D They converge almost instantly

It reads a signal coming in from one port and repeats the signal out to the other ports.

Which of the following is true of an Ethernet hub?

D

Which of the following protocols would you expect to find used as an interior gateway protocol within an Autonomous System? A IS-IS B BGP C RIPv2 D OSPF

The cable

With both bus and ring networks, where is the single point of failure that will bring down the entire network?

What is Extensible Authentication Protocol (EAP) if it is not a protocol?

Wrapper

The first generation of packet-switching technology was called:

X.25

What is RAID level 1 also called?

disk mirroring

If you need to limit the amount of data users can store on a volume, you would implement which of the following?

disk quotas

What type of routing protocol are RIP and RIPv2?

distance-vector protocol

In response to demand for the most common configuration of fiber-optic cable, manufacturers created this type of fiber-optic cabling.

duplex

A disk must be formatted as what type of disk if you want to access additional features such as disk spanning?

dynamic

can be used to create a RAID

dynamic disk

What general type of cabling is a tech most likely to use today when installing Ethernet cabling in areas with high electrical interference?

fiber-optic

What kind of cabling does the 10BaseFL standard specify?

fiber-optic

Which kind of cable works best for long distance transmissions?

fiber-optic

Which kind of cable works best for long-distance transmissions?

fiber-optic

Which kind of cabling would you select when you need to cover distances that span kilometers?

fiber-optic

What type of wiring should be used for a high-speed connection between two buildings?

fiber-optic cabling

Which of the following statistics should a network baseline report include?

hard drive utilization

This is a mathematical function that creates a checksum, and which is used by most forms of nonrepudiation.

hash

What term best describes the way the DNS name space is organized?

hierarchical

This term applies to the result of techniques that make sure a shared resource is available in a timely manner when clients request.

high availability

This is a clever way to lure potential hackers in and log their behavior.

honeypot

What term is used for the cabling that runs from the telecommunications room to the PCs?

horizontal cabling

You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware workstation?

host-only

What is the correct sequence according to the DNS naming convention?

host.domain.root

Which is the correct sequence according to the DNS naming convention?

host.domain.root

Which cloud computing category refers to the use of software hosted on a service provider's network, and is usually subscription based?

hosted applications

Which cloud computing category allows a company to quickly provision additional disk space?

hosted infrastructure

Which of the following terms describes the category of cloud computing in which a customer develops applications using development tools and infrastructure provided by the service provider?

hosted platforms

hypervisor installed in a general-purpose OS

hosted virtualization

Which of the following should not be a concern when discerning the level of security that is required in a network?

how difficult it would be to enforce a password policy

A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers?

hub

With a star-bus network, where is the single point of failure that will bring down the entire network?

hub

creates and monitors the guest operating systems

hypervisor

Which of the following is the first step in troubleshooting?

identify the problem

Which of the following is NOT a good practice for performing upgrades?

ignoring updates to new releases

You have just connected a brand new workstation to your local network. As per company policy, you have used a static IP configuration. However, all attempts to reach the Internet from the workstation fail. You have verified that you can communicate with servers and other workstations on the local network, and that you are the only one having an issue reaching the Internet. What is most likely the issue?

incorrectly configured gateway address

copies all files changed since the last full or incremental backup and marks files as backed up

incremental backup

In a(n) ______________ site survey, you temporarily set up your WAPs at the locations you're considering for permanent placement.

informal

This term describes how permissions pass down from folder to folder.

inheritance

This term describes the predetermined silence period that is added to the length of a packet to determine the waiting period for a network device after it has detected traffic on the media.

interframe gap

Structured cabling is a design consideration related to which of the following?

internal connections

This system adds the capability to react to an attack detected by another component.

intrusion prevention system (IPS)

What is a potential problem a browser looks for after it receives a certificate from a secure HTTP site?

invalid certificate and revoked certificate

What is a potential problem a browser looks for after it receives a certificate from a secure HTTP site? (Select all that apply.)

invalid certificate/revoked certificate

You have just finished building a small home network. You find that you cannot access the Internet. You ping the DSL router successfully. You suspect that the default gateway is not set on the workstation. Which utility should you use to confirm your diagnosis?

ipconfig

What command should you enter to view the Host Name and DNS Server address?

ipconfig /all

Which command will display the configured IP address, default gateway, and DNS servers for a Windows workstation?

ipconfig /all

To test that a tunnel has been created, and to see the tunnel adapter, open a command prompt and enter this command.

ipconfig/all

Which of the following is not an advantage of fiber-optic cabling over UTP?

it is easier and cheaper to install than UTP

What does it mean if a NIC runs in promiscuous mode?

it processes all frames

What is the term that describes an approach that uses tight control over what a user account can do on a network, allowing the user to only do what he or she needs to do for the job, and no more?

least privilege

Of the following, select only those conditions that are issues when dealing with fiber-optic cabling. (Choose all that apply.)

light leakage/attenuation/modal distortion

Which status term applies to whether your wireless device is connected?

link state

This is the address a computer running IPv6 gives itself when it first boots up.

link-local

multiple servers acting as a single server

load-balancing cluster

When a bridge has a LAN link directly attached on each side, it's known as a ___________ bridge.

local

defines a user's environment

local profile

How is the address 127.0.0.1 listed in the HOSTS file?

localhost

Traceroute would be best suited for which of the following tasks?

locating bottlenecks in a network

Use this capability of Performance Monitor to save data collected on system and network performance.

log

What type of logical topology does a Wireless LAN use?

logical bus

What is the generic term used to describe programs that are designed to cause harm or disruption to a computer system?

malware

Which type of attack involves the attacker inserting him - or herself into a conversation between two others?

man in the middle

a set of objects containing information about a networking device that SNMP uses to manage that device

management information base (MIB)

A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, when she logs off and logs back on, the desktop reverts to its original configuration. What type of user profile does this user have?

mandatory

What is the meaning of the "10" in 10BaseT?

maximum speed of 10Mbps

The ___________ topology is extremely fault tolerant, but expensive to implement.

mesh

Which network topology offers the greatest level of fault tolerance?

mesh

a device computers use to convert digital signals to analog signals

modem

What device converts an analog signal to digital and a digital signal to analog?

modulator-demodulator

This command keeps running, providing a dynamic trace of the route a packet is taking. It is not available in Windows.

mtr

This is a set of reserved addresses designed to go only to certain systems.

multicast address

Most network technologies that use fiber-optics use which type of fiber-optic cables?

multimode

What type of fiber-optic cabling and connectors does a 100BaseFX network use?

multimode with ST or SC connectors

two or more threads being executed simultaneously

multiprocessing

In a token ring network, what is the central device called?

multistation access unit

This Windows-only program must be run with a switch (such as -n) and lets you see the NetBIOS names of systems on your Windows network (it will also see SAMBA systems).

nbtstat

What command can you use to check the current NetBIOS name cache to see if it has provided inaccurate addresses to the WINS client?

nbtstat -c

Least privilege refers to employees having only information that they _____________.

need to know

What command would you issue from a command prompt to see a listing of the computers in your workgroup?

net view

What command-line command allows you to see other NetBIOS systems?

net view

This is the "show me the endpoint" command.

netstat

This tool displays information on the current status of all running IP processes, showing what sessions are active, and shows more information when run with certain switches.

netstat

You are troubleshooting at Workstation B. You suspect that there is a TCP session connected from Workstation A. Which command should you issue at Workstation B to see if there is an established TCP connection?

netstat

Whose job is it to create a network diagram?

network administrator

Quantifying the need for equipment, operating systems, and network applications is a function of which of the following?

network design

Which of the following identifies how wires in a network connect to various switches and other devices?

network diagram

This type of configuration document goes deeper into the individual components of the network:

network map

Airwaves are an example of what type of network component?

network medium

software that monitors network traffic and gathers information about packet types, errors, and packet traffic to and from each computer

network monitors

What is the term or terms for the second level of naming in a Wi-Fi network that can be applied in either ad hoc mode or infrastructure mode? (Select all that apply.)

network name/Service Set Identifier (SSID)/Extended Service Set Identifier (ESSID)

If you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?

network policy and access services

When a collision occurs on a network relying on the CSMA/CD access method, what alerts the NICs?

overlapping signals

Which type of NAT is the most popular?

overloaded NAT

These firewall technologies block traffic based on the IP address.

packet filtering and port filtering

These firewall technologies block traffic based on the IP address. (Select all that apply.)

packet filtering/port filtering/IP filtering

This type of tool, also called a protocol analyzer, intercepts and logs network packets.

packet sniffer

The patch panel is then connected to the multiport hub by __________ cables.

patch

You have just started a new business. You need to have three to four workstations available for your employees who simply need to share some files and a printer, but you don't have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation?

peer-to-peer network

What is the name for the most recent and more nefarious form of social engineering tactics?

phishing

Door locks, deadbolts, and motion sensors that protect equipment rooms are all forms of which type of security?

physical

Which of the following is another name for a MAC address?

physical

Which of the following is the physical topology that is daisy-chained like a bus and in which the cabling is brought around from the last device to the first device?

physical ring

What is the best tool for testing DNS?

ping

What command can you use to test the NICs ability to send and receive packets?

ping 127.0.0.1

What command would you run from a Windows command line to verify that a NIC can send and receive IPv4 packets?

ping 127.0.0.1

What command would you run from a windows command line to verify that a NIC can send & recieve IPv4 packets?

ping 127.0.0.1

What command would you run from a windows command line to verify that a NIC can send and receive IPv4 packets?

ping 127.0.0.1

What command on Windows verifies a NIC can send and receive IPv4 packets

pinging the loopback address ("ping 127.0.0.1")

Cables that run in _______________ must meet applicable fire protection and environmental requirements.

plenums

An example of a ________________ connection is the dial-up connection from a computer to an ISP.

point-to-point

Which of the following describes a type of wireless bridge that can only communicate with a single other bridge, and therefore is used to connect just two wireless network segments?

point-to-point

a remote access protocol that supports many protocols and is used to carry data over a variety of network connections

point-to-point protocol

If your company has a Web site that customers need to access, you will need to allow unsolicited communications from outside the network. In this situation, you need to install a router that supports what type of forwarding?

port

What technique is used to guard against hackers looking for ways to send unauthorized TCP or UDP packets into your network?

port filtering

If your company has a single server on the private LAN that they want to make accessible from the Internet, which of the following would give the server the protection of NAT while allowing access to that server from the Internet?

port forwarding

the process by which a router forwards a request for a TCP or UDP port to a specified computer.

port forwarding

This type of tool probes ports on another system, and logs the state of the scanned ports

port scanner

power device that provides fault tolerance through battery backup

power device that provides fault tolerance through battery backup

Which of the following advantages to virtualization provides significant cost savings in utility usage?

power savings

Which form of authentication involves the exchange of a password-like key that must be entered on both devices?

preshared key

can be made the active partition

primary partition

When you run the route command, what switch must you use if you wish to see the current routing table on your computer?

print

Where are the waiting print jobs stored until they can be sent to the print device?

print queue

You're the network administrator for a large bean-bag chair company. You are presenting to your supervisor several reasons to make use of cloud computing for handling data processing. Which answer would be a valid benefit of using cloud computing?

reduced physical plant costs

Network components will fail, and you can sum up the best protection against such failure in one word. Select that word from the following:

redundancy

specialized software that gathers network data and provides statistics to a network management console

remote monitoring (RMON)

What enables a DNS server to determine a FQDN by knowing the IP address?

reverse lookup zones

action that a user can perform on a computer

right

part of an upgrade plan that provides instructions on how to undo the upgrade if problems occur during or after the upgrade

rollback plan

Which of the following is the "super" account native to Linux and Macintosh OS X?

root

This type of Trojan takes advantage of very low-level operating system functions to hide itself from most less-sophisticated anti-malware tools.

rootkit

What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?

rootkit

Which of the following commands displays the metrics for each router?

route

What device do you need to split a large network into smaller ones?

router

What is another term for a Layer 3 switch?

router

Which of the following are the devices on the customer's side of a WAN connection to a building, not including the actual connection point?

router and CSU/DSU

When a router's interface is configured with multiple IP addresses with each address belonging to different networks, what is it called?

router on a stick

When a router also acts as a firewall, it's called a _____________ router.

screening

Which type of forward lookup zone exists on a DNS server that acts as a backup?

secondary

What are the chunks called into which the available storage space on a disk drive is broken?

sectors

This log records events such as logon successes and failures.

security

Which of the following are policies that affect most users?

security and acceptable use

How to deal with a virus attack would be detailed under which of the following?

security policy

Which of the following describes exactly where and how a password will be used?

security policy

Large networks are frequently broken down into manageable pieces called _______________.

segments

While there are many e-mail server programs, this one is the leader among those used on Linux and UNIX systems, controlling about 20 percent of all e-mail servers, and only running the SMTP protocol.

sendmail

What happens every time a DHCP client boots up?

sends out a special discovery packet

What does the Transport layer use to make sure that a message is reassembled correctly on the receiving device?

sequence number

runs in the background

service

How many basic pieces of information does an Ethernet frame contain?

seven

You are a network architect for an IT consulting company. One of your clients needs a WAN connection and has asked you about the disadvantage of a packet-switched WAN method. Which of the following is a disadvantage that applies?

shared bandwidth

In a WLAN, the wireless NIC allows nodes to communicate over ____________ distances using radio waves, which it sends to, and receives, from the hub.

short

Almost every Cisco device has a command a network tech can use to document that configuration of that document. What is that command?

show startup-config

Which term applies to how well your wireless device is connecting to other devices?

signal strength

What type of fiber-optic cable uses lasers to send signals?

single-mode

Which of the following types of VPNs is used to connect two LANs separated by a WAN or the cloud?

site-to-site VPN

Which of the following are weaknesses in WEP that allow it to be easily cracked?

size of the encryption key and faulty implementation of the RC4 protocol

What type of device you can insert into a PC in lieu of entering a password?

smart

Which of the following are alternatives to passwords for authentication?

smart devices and biometric devices

Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?

smurf attack

What is a partial copy of a VM that is used to restore it to a previous state? Answer

snapshot

partial copy of a virtual machine

snapshot

part of the SNMP structure loaded on to each device to be monitored

software agents

What is CRM software?

software that is used to keep track of customer information, including contact information and appointments

What type of wireless technology is used for 802.11b /g /n networks?

spread-spectrum radio

Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.

spyware

Which hybrid topology is the dominant wired network topology?

star-bus

What type of filtering is employed when all packets are examined as a stream, and when a stream is disrupted or packets get corrupted, the firewall acts accordingly?

stateful

What type of filtering is employed when traffic is blocked just based on IP address?

stateless

What is the term used that defines network cabling in the work area and between telecommunications closets and equipment rooms?

structured cabling

Which part of a computer's IP address configuration indicates the portion of the address that specifies the network ID?

subnet mask

This is done by an organization when it takes a block of addresses received from an ISP and breaks the single block of addresses into multiple sub networks?

subnetting

To collect events on the collecting computer, you must create a __________.

subscription

Which of the following is not included in any edition of Windows Small Business Server?

support for up to 500 users

When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port?

switch

Which of the following connections might require a crossover cable?

switch to switch

This log records events related to services, device drivers, and configuration changes.

system

In Windows, you use Task Manager to view the processes running on your computer. What do you use to view the running processes on some Linux systems?

system monitor

partition that contains the boot loader

system partition

Which of these statements best describes an Application Program Interface?

t is a set of commands, provided by the manufacturer of an operating system, which allows programmers to create applications.

Subnetting

taking a single class of IP addresses and chopping it up to multiple smaller groups

What distance can a signal travel on a fiber-optic cable?

tens of kilometers

You are currently troubleshooting a network issue with your ISP's customer support agent. The agent requests that you open up command prompt and type "ping 127.0.0.1". What does this accomplish?

tests that the local IP stack is functioning

PING

tests the reachability of a host on an IP network and measures the round-trip time for messages sent

Which of the following is not part of a fully qualified domain name (FQDN)?

the IP address

The last 64 bits of an IPv6 address are the interface identifier. Where is that number derived from?

the MAC address

What is used as the BSSID for a BSS?

the MAC address of the WAP

Which of the following should you consider when choosing a wireless network instead of a wired network?

the ability of unauthorized users to receive a signal

With both bus and ring networks, where is the single point of failure that will bring down the entire network?

the cable

What is the local loop, or last mile?

the connection between the demarcation point and the CO

Which of the following is part of a fully qualified domain name (FQDN)? (Choose all that apply)

the host name/the second-level domain name/the top-level domain name

What would not be included in the data portion of an Ethernet frame on an IP network?

the length of the data being transmitted

Which of the following would NOT be included in the data portion of an Ethernet frame on an IP network?

the length of the data being transmitted

Which of the following is not identified in a cabling specification such as 10BaseT?

the maximum number of routers

What do most professional cable installers use to quote the price for an installation?

the number of drops

What is the biggest differentiator among Ethernet hubs?

the number of ports

A MAC address is composed of which two parts?

the organizationally unique identifier and the unique device ID of the NIC

A MAC address is composed of which two parts? (Choose all that apply)

the organizationally unique identifier/the unique device ID of the NIC

What is NOT a shared attribute of all members of the Ethernet family of networking technologies?

the same kind of cabling

Which of the following is NOT a shared attribute of all members of the Ethernet family of networking technologies?

the same kind of cabling

Where does the CRC come from in a network frame?

the sending NIC attaches it

Which of the following are identified in a cabling specification such as 10BaseT? (Choose all that apply)

the signal type/the speed/the maximum length

Which of the following describes the numeric designator on fiber-optic cables?

the size of the fiber and the size of the cladding measured in millionths of a meter (microns)

What does a switch store in its switching table?

the source MAC address of a frame and the port it was received on

When discussing Ethernet standards, what does the XBaseY terminology refer to?

the transmission speed, the type of transmissions, and the length or type of cabling

smallest unit of software that can be scheduled

thread

TCP establishes a connection with the destination device using which process?

three-way handshake

What method does the CPU use to divide its computing cycles between more than one process?

time slicing

a network troubleshooting device that can determine whether there's a break or short in the cable, and, if so, approximately how far down the cable it's located

time-domain reflectometer (TDR)

What is the purpose of a crimper?

to connect a RJ-45 connector to the cable

In order to transmit data on a Token Ring network, a node must have possession of the _____________.

token

Tripplet Corporation manufactures a very popular tool called a "Fox and Hound." What type of tool is this?

toner

What is the term for the servers just below the DNS root servers?

top-level domain server

What is the term for the servers just below the DNS root servers?

top-level domain servers

Which of the following commands enable you to determine if a connection can be made between 2 computers?

traceroute

Which of the following is a software tool you would use to discover just where a problem exists when you have problems reaching a remote system?

tracert

Which of the following is not a category of logs?

traffic

Which of the following is malware that pretends to do one thing, or looks as if it's doing one thing, while doing something evil?

trojan

What must you use to span the gap in IPv6 support and access the IPv6 Internet?

tunnels

Which of the following describes a link-local address?

unicast

What does UTP stand for?

unshielded twisted pair

Network backbone cabling run from floor to floor connecting the main cross-connect to intermediate cross-connects on each floor is referred to as ___________ cabling.

vertical

Which of the following is a way of presenting information in Performance Monitor?

view

a logical sequence of connections with bandwidth allocated for a specific transmission pathway

virtual circuit

What types of networks supply a great deal of complexity, security, and power, and are made possible through the use of advanced networking devices?

virtual private networks (VPNs) and virtual LANs

What types of networks supply a great deal of complexity, security, and power, and are made possible through the use of advanced networking devices? (Select all that apply.)

virtual private networks (VPNs)/virtual LANs

Which of the following allows all VMs to communicate with each other, the host, and the network?

virtual switches

Which of the following creates a complete environment for a guest operating system to function as though that operating system were installed on its own computer?

virtualization

Utility programs that can scan a network to determine things like open ports or passive applications are called:

vulnerability scanners

What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?

wardriver

What function is being used if a packet is sent to port 80?

web browsing

When would you most likely NOT choose to use a leased line connection?

when a nondedicated link is needed for backups

Star topology

when your network has all computers connected to a centrally located wiring closet, you have a physical _____ network.

What information would you find in the header of a Transport layer PDU?

window size

Which of the following is NOT a technique used to deal with malware?

wireless encryption

Which of the following documents the cabling runs of a network, defining the type of connections, such as Gigabit Ethernet, T1, and so on?

wiring scheme

Which of the following includes diagrams of individual structured cabling connections, including the actual designation for each cable run, such as the wiring details for an EIA/TIA 568B connection?

wiring scheme

Which of the following terms describes cabling and connectors in network wiring standards used (CAT53, 568A, fiber, and so on)?

wiring scheme

B

with a star-bus network, where is the single point of failure that will bring down the entire network? A the cable B the hub C the server D the client

This type of malware replicates through networks.

worm

Which of the following is NOT a version of DSL service?

xDSL

This term describes a single computer under the control of a (usually) remote operator.

zombie

The target systems in a DDoS attack use ____________ which are later woken up to launch the attack.

zombies or agents

This is one example of the many programs that use the BitTorrent file-sharing protocol in modern peer-to-peer implementations.

µTorrent

What are the four components of wireless security?

• Access control • Encryption • Authentication • Isolation

A network analyzer can detect problems with what four pieces of hardware?

• Cabling • Jacks • Network cards • Hubs

What information does the command ipconfig report?

• Connection-specific DNS Suffix • IP Address • Subnet Mask • Default Gateway

Which of the following is included in the output from the arping command?

"Unicast reply from ..."

In the US, what is the typical cost of a network cable installation?

$150 per drop

Every ip node on a network has a routing table.

True

What is the IP range for Class C private IP?

192.168.0.0 - 192.168.255.255

Which of the following represents a network layer address?

192.168.3.24

What is the default subnet mask for a class B network?

255.255.0.0

How many cable fibers are normally required by almost all network technologies that use fiber-optic cable?

2

How many cables are used inmost fiber-optic runs?

2

How many pairs of pins in an RJ-45 connector does a 10BaseT device actually use?

2

What is the default subnet mask for a Class C network?

255.255.255.0

What wavelength is used on a 10GBaseSR/SW network?

850 nm

Including the separators, what is the maximum number of characters allowed by the DNS naming convention?

255

What is the default subnet mask for a class A network?

255.0.0.0

Which of the following are wireless network modes

***

What type of multicast address is FF02::1?

***All nodes address

Which of the following are not dynamic routing protocols

***Dynamic routes are automatically added into the routing table and routing scales well in large networks. These include (link state, RIP, IS-IS)

Which one of the following NAT technologies uses port numbers to map traffic

***Port forwarding or PAT?

When you run the nbtstat command, what switch must you use if you wish to see the NetBIOS names on the local network?

-n

When you run the netstat command, what switch must you use if you wish to see the current routing table on your computer?

-r

When sending a PING packet which switch allow the ping to be continuous?

-t

In the syntax for a domain, what character or characters separates a domain name from its sub domains.

.

Which of the following is not a top-level domain name?

.html

Which of the following subnet masks is an example of classless subnetting?

/12

Which of the following subnet masks is an example of classless subnetting??

/12

When you run the ipconfig command, what switch must you use if you wish to see detailed information?

/all

What level of RAID does not provide fault tolerance?

0

When viewed in binary, what value is always on the far left in the first octet of a Class A address?

0

What is the range of decimal values in each of the 4 groups of an IPV4?

0 - 255

What is the range of decimal values in each of the four groups of an IPv4 address?

0 to 255

What is the decimal range in each octet?

0-255

Which of the following would be a valid Area ID?

0.0.0.0

Which of the following is a correct MAC address?

00-02-3F-6B-25-13

Which of the following is the IPv6 loopback address?

0000: 0000: 0000: 0000: 0000: 0000: 0001 OR 127.0.0.1

What is the binary equivalent of the decimal value 97?

01100001

If you want to implement fault-tolerance on your network, what type of RAID would you use on the drives that contain the OS and applications?

1

Which layer is responsible for the encoding of signals?

1

In an MDI device, on which two pins does the device use to transmit?

1 and 2

Which of the channels defined by the 802.11 standard may be used in the United States?

1 through 11

a. Teredo

1. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one is built into Microsoft Windows? Select one: a. Teredo b. 6in4 c. ISATAP d. 6to4

Which of the following could be a valid Autonomous System Number (ASN)?

1.33457

Your local ISP has provided you with a dedicated line that has a Committed Information Rate of 1.54 Mbps. What does this mean?

1.54 Mbps is the guaranteed minimum transmission rate.

What is the data transfer speed for DS1?

1.544 Mbps

What is the size of a U, the equipment rack unit of measure, used for specifying height?

1.75 inches

What is the IP Range for Class A Private IP?

10

What is the maximum speed at which 10BaseT Ethernet networks communicate?

10 Mbps

When a multispeed, auto-sensing 100BaseT NIC connects to a 10BaseT Ethernet hub, at what speed will the NIC function?

10 Mbps sending and receiving

What is an acceptable maximum collision rate on a properly running Ethernet network?

10%

a. rare but normal

10. With IPv6, how should we regard Internet address changes? Select one: a. rare but normal b. common, and disruptive c. impossible d. a manual task

What are the private address ranges for Class A, Class B, and Class C networks? (Choose all that apply)

10.0.0.0 through 10.255.255.255/172.16.0.0 through 172.31.255.255/192.168.0.0 through 192.168.255.255

If you have a 100BaseT switched Ethernet network, what is the theoretical maximum bandwidth using full duplex NICs?

100 Mbps

What is the maximum distance between a hub & a node on a 10BAseT network?

100 Meters

What is the maximum cable length for both category 5e and category 6 UTP cable?

100 m

What is the maximum cable length for a 1000BaseT network?

100 meters

What is the maximum distance between a hub and a node on a 10BaseT network?

100 meters

When using UTP cabling, what is the maximum cable length that can be used from the NIC to a hub or switch?

100 meters

Which version of Gigabit Ethernet uses a unique cable known as twinaxial?

1000BaseCX

Which version of gigabit Ethernet uses an unique cable know as twinaxial?

1000BaseCX

Which versions of Gigabit Ethernet are published under the 802.3z standard?

1000BaseCX ,1000BaseLX, 1000BaseSX

OF all the gigabit Ethernet standards detailed in the chapter, which maintains a signal over the greatest distance?

1000BaseLX

Of all the gigabit Ethernet standards detailed in the chapter, which maintains a signal over the greatest distance?

1000BaseLX

What version of Gigabit Ethernet is being positioned as the Ethernet Backbone of the future?

1000BaseLX

What version of Gigabit Ethernet is being positioned as the Ethernet backbone of the future?

1000BaseLX

Which version of Gigabit Ethernet is published under the 802.3ab standard?

1000BaseT

Together, 3 versions of Gigabit Ethernet, publised under the 802.3z standard, are known by what name?

1000BaseX

b. 224.0.0.0/4

19. Which address range does multicast use in IPv4? Select one: a. 192.168.0.0/24 b. 224.0.0.0/4 c. 172.16.0.0/16 d. 127.0.0.0/8

The decimal value 151 converts to what binary value?

10010111

Which version of gigabit ethernet are published under the 802.3z Standard?

100BaseCX, SX, & 100baseLX

What is the limit to the number of nodes in every version of Ethernet?

1024

What is the maximum number of nodes that can be attached to a 10BaseT segment or hub?

1024

Which of the following key sizes does WEP use?

104 bits and 40 bits

Which standard specifies multimode cabling?

10BaseFL

Which Ethernet cabling standard defines an Ethernet network that uses CAT3 or better UTP cabling, operating at 10Mbps?

10BaseT

Which version of Ethernet was introduced in 1990?

10BaseT

Which is the cheapest & most popular 10GbE media type?

10GBaseLR

Of all the 10 GbE standards described in the chapter, which one was most recently released?

10GBaseT

Of all the 10-GbE standards described in the chapter, which one was most recently released?

10GBaseT

Of all the 10 GBE standards described in the chapter, which one was most recently released?

10GbaseT

What is the maximum speed at which 10baseT Ethernet networks communicate?

10Mbps

b. forward packets

11. Presently, almost all the tier 1ISP routers properly perform what function for IPv6? Select one: a. resolve names to addresses b. forward packets c. provide DNS addresses to clients d. host DNS servers

What is the hexadecimal number F equal to in binary?

1111

How long is a MAC address?

12 hexadecimal characters

a. 128 bits

12. What is the length of addresses in IPv6? Select one: a. 128 bits b. 64 bits c. 32 bits d. 256 bits

What is the loopback address?

127.0.0.1 OR 0000: 0000: 0000: 0000: 0000: 0000: 0001

In Windows 7, what is the maximum length that a password can be?

128

What is the length of addresses in IPv6?

128 bits

What is the valid decimal range for the first byte of a Class B address?

128 through 191

What is the decimal equivalent to the hexadecimal number D?

13

a. 32

13. How many binary digits are in an IPv4 address? Select one: a. 32 b. 16 c. 4 d. 8

What is the size of the wavelenth used by 1000BaseLX fiber-optic cabling?

1300 nm

What wavelength is used on 10GBaseLW fiber-optic cabling?

1310

What wavelenth is used on 10GB base LW fiber optic cabling?

1310

How many channels were defined by the 802.11 standard?

14

b. 6to4

14. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one is presently the dominant one? Select one: a. ISATAP b. 6to4 c. Teredo d. 6in4

Which of the following is something X.25 does NOT offer?

144 Mbps maximum throughput

What is the maximum number of hops allowed by RIP?

15

b. 0000: 0000: 0000: 0000: 0000: 0000: 0001

15. Which of the following is the IPv6 loopback address? Select one: a. 1.0.0.127 b. 0000: 0000: 0000: 0000: 0000: 0000: 0001 c. FEDC: 00CF: 1234 d. 127.0.0.1

What is the length of the typical frame?

1500 bytes of data

Which of the following is not a designated private IP address?

153.6.2.1

What wavelength is used on a 10GBaseEy network?

1550

How many bits are available in an IPv6 network for creating subnets when the prefix is /48 and the host ID is 64 bits?

16

How many host can Class A IP address have?

16,227,214

d. TSP and TIC

16. Which of the following are automatic tunnel configuration protocols? Select one: a. ISATAP and Teredo b. TIC and ISATAP c. Teredo and TSP d. TSP and TIC

c. FF02::2

17. Which of the following multicast addresses will only reach routers? Select one: a. FF02::1 b. FF02::1:FFXX:XXXX c. FF02::2 d. FE80::.

What is the IP range for Class B private IP?

172.16.0.0 - 172.31.255.255

What is the maximum distance between a user's demarc and the central office for all versions of DSL?

18,000 feet

b. global unicast address

18. What type of IPv6 address do you need to get on the Internet? Select one: a. link-local address b. global unicast address c. anycast address d. global multicast address

What is the gain of the typical WAP antenna?

2 dB

What formula is used for calculating the number of new subnets?

2(number of network ID extension digits) -2

Which of the following isthe correct formula for calculating the number of new subnets?

2(number of network ID extension digits) -2

What formula would you use to arrive at the number of hosts on a subnet.

2(number of zeroes in the subnet mask) - 2

Which of the following isthe formula you would use to arrive at the number of hosts on a subnet.

2(number of zeroes in the subnet mask) - 2

Which of the following is the formula you would use to arrive at the number of hosts on a subnet?

2(number of zeros in the subnet mask)-2

A signal has just been received from the WAN link on your network. Using the given components, which of the following shows the path that the signal would take from the WAN to a workstation on your network? Assume all components are used at least once and that some components may be used more than once. 1—backbone cabling 2—entrance facility 3—equipment room 4—horizontal wiring 5—telecommunications closet 6—work area

2, 1, 3, 1, 5, 4, 6

How many copper wires are used by a T1 line?

2-pair

d. IPv4-to-IPv6 tunnel

2. This type of tunnel allows you to connect your IPv6 client to an IPv6 router over an IPv4 network. Select one: a. IPv6-to-IPv6 tunnel b. IPv6-to-IPv4 tunnel c. IPv4-to-IPv4 tunnel d. IPv4-to-IPv6 tunnel

Which TCP port(s) does File Transfer Protocol (FTP) use?

20 and 21

d. 6to4

20. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one does not require a tunnel broker? Select one: a. ISATAP b. 6in4 c. Teredo d. 6to4

If you have a 100BaseT switched Ethernet network, what is the theoretical maximum bandwidth using full duplex NICs?

200 Mbps

If you have a 100BaseT switched Ethernet network, what is the theoretical maximum bandwidth using full-duplex NICs?

200 Mbps

Which of the following is an example of an IPv6 address?

2001:0000:0000:3210:0800:200C:00CF:1234

d. stateless

21. In what mode is a DHCPv6 server operating if it only passes out optional information? Select one: a. passive b. active c. stateful d. stateless

Convert the binary value 11010101 to decimal.

213

Which of the following is a valid IP address for an individual system expressed in dotted-deciaml notation?

215.233.32.91

a. IETF

22. What organization developed the new IPv6 standard? Select one: a. IETF b. ICANN c. IEEE d. IANA

Which address range does multicast use in IPv4?

224.0.0.0/4

An ISDN PRI setup consists of which of the following?

23 B channels over T1

d. ipconfig/all

23. To test that a tunnel has been created, and to see the tunnel adapter, open a command prompt and enter this command. Select one: a. netsh b. ping Microsoft.com c. netstat d. ipconfig/all

How many channels are in a T1 bundle?

24

d. link-local

24. This is the address a computer running IPv6 gives itself when it first boots up. Select one: a. EUI-64 b. CIDR c. global d. link-local

a. 64 bits

25. What is the maximum length of an IPv6 subnet mask? Select one: a. 64 bits b. 16 bits c. 8 bits d. 32 bits

How Many host can Class C IP address have?

254

What is the maximum number of host you may have on a network if the first decimal value of the ip address is between 192 and 223 and the subnet mask is /24?

254

What is the maximum number of hosts you can have on a network if the first decimal value of the IP address is between 192 & 223 & the subnet mask is /24?

254

What is the maximum number of hosts you may have on a network if the first decimal value of the IP address is between 192 and 223 and the subnet mask is /24?

254

If you want to implement fault-tolerance on your network, what type of RAID would you use on the drives that contain data?

5

d. all nodes address

5. What type of multicast address is FF02::1? Select one: a. broadcast address b. all routers address c. solicited node address d. all nodes address

What is the speed of the low end of the Optical Carrier (OC) specification, OC-1?

51.8 Mbps

What layer is responsible for making sure that the data that it sends and receives is in a format that the receiving and sending computers can understand?

6

a. complete support; active on default install

6. What is the default status of IPv6 for Windows Server 2008? Select one: a. complete support; active on default install b. complete support; not installed by default c. rudimentary IPv6 support d. developmental support

What is the maximum length of an IPv6 subnet mask?

64 bits

What is the minimum size of an Ethernet frame?

64 bytes

How many host can Class B IP address have?

65,534

If your network subnet mask is /16, what is the maximum number of host IDs available for this network?

65,534

Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one does not require a tunnel broker?

6to4

Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one is presently the dominant one?

6to4

How many basic pieces of information does an Ethernet frame contain?

7

How many layers does the OSI model contain?

7

c. FE00::0250:8DFF:FE86:0A07

7. Given that your MAC address is 00-50-8D-86-0A-07, calculate a link-local address for a non-Windows system. Select one: a. FF02::2:0050:8D86:0A07 b. FF02::2:0250:8DFF:FE86:0A07 c. FE00::0250:8DFF:FE86:0A07 d. FE00::0050:8D86:0A07

How many pins does an RJ-45 connector have?

8

How many wires does the 100BaseT cable have?

8

a. unicast

8. Which of the following describes a link-local address? Select one: a. unicast b. multicast c. stateful d. broadcast

You'll know that you are ready to schedule your Network+ exam when you consistently make a minimum of what score on the practice exams?

80-85%

What is the IEEE standard governing wireless networking?

802.11

Which IEEE subcommittee sets the standards for Wireless LAN networks?

802.11

Which Wi-Fi standard offers speeds of up to 54 Mbps, a range of up to about 300 feet, operates in the 2.4 GHz frequency, and is downward compatible with an earlier, popular Wi-Fi standard?

802.11g

Which of the following is a port-authentication network access control standard that forces devices to go through a full AAA process to get past the gateway to a network?

802.1x

Which 802.x is The Logical Link Control related to?

802.2

Which Wi-Fi standard offers speeds of up to 100 Mbps (or higher), a range of up to about 300 feet, and operates in the 2.4-GHz and 5.0-GHz frequencies?

802.n

What wavelength is used on 10GBase SW fiber optic cabling?

850

Which of the following display types can you use to display data in Performance Monitor? A Line graph B Pie chart C Histogram D Pictogram

A Line graph C Histogram

The organizationally unique identifier and the unique device ID of the NIC

A MAC address is composed of which two parts?

Routers work primarily with the source IP address of each packet.

F

Which OSI layer transmits bits from one computer to another and regulates the transmission stream over a medium? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application

A Layer 1—Physical

Which content switch load balancing method indirectly accounts for differences in server processor speeds? A Least connections B Round robin C Weighting

A Least connections

The part of the IP address that is the same for all computers on a network is called the Host ID.

F

Two systems on the same network may share the same MAC address.

F

Every operating system's VPN client fully supports L2TP/IPSec VPNs.

True

What type of IPv6 address do you need to get on the Internet?

global unicast address

Which of the following statements about subnet masks is NOT true?

A 0 in the subnet mask indicates part of the network ID.

Which of the following statements about subnet masks is NOT true?

A 0 on the subnet mask indicates part of the network ID

To obtain the IEEE speed designated as high, clients are within how many meters of the AP? A 40 to 125 B 55 to 200 C 60 to 90 D 90 to 400 E 115 to 550

A 40 to 125

An RJ-11 connector is which type? A 6P2C B 6P4C C 6P6C D 8P8C

A 6P2C

Which IEEE standard defines the communication protocol for Ethernet? A 802.3 B 802.5 C 802.11 D 802.15

A 802.3

Which protocol is used to convert logical IP addresses to physical MAC addresses? A ARP B DNS C IMAP4 D RIP

A ARP

Which WAN technology that's used to connect a small ISP or large business to a regional ISP, and a regional ISP to an Internet backbone, uses fixed-length packets, called cells, to transmit data, voice, video, and frame relay traffic? A ATM B E1/E3 C Frame relay D T1/T3 E X.25

A ATM

Which type of hubs repairs weak signals by actually retransmitting the data with proper transmission voltage and current? A Active B Intelligent C Passive D Switching

A Active

To which TCP/IP architecture layer do e-mail and Web browser protocols belong? A Application B Internet C Network Interface D Transport

A Application

Which of the following are default Windows Logs? (Choose all that apply.) A Application B Hardware C Media Player D Security

A Application D Security

Multilayer switches combine Layer 2 data switching with Layer 3 routing using which of the following? A Application-specific integrated circuit (ASIC) B MPLS C Round robin D Specialized software

A Application-specific integrated circuit (ASIC)

The 802.1x standard requires which roles in the authentication process? (Select all that apply.)

A Authentication server B Authenticator D Requesting access device

After installing the DHCP Server service on a domain member server, what must be done in Active Directory before it begins delivering leased IP addresses? A Authorize it. B Reinstall Active Directory. C Activate it. D Modify the firewall rules.

A Authorize it.

Which wireless technology is used to create a connection between two devices? (Select all that apply.) A Bluetooth B Infrared C Radio D Wi-Fi E WiMAX

A Bluetooth B Infrared

In which network topology is each node connected to the next by a direct line so that a continuous line is formed? A Bus B Mesh C Ring D Star

A Bus

Repeaters are typically used on what type of network? A Bus B Star C Ring D Hybrid

A Bus

Which network topologies can you use with Ethernet networks? (Choose all that apply.) A Bus B Mesh C Ring D Star

A Bus D Star

Which TCP/IP-based management protocol implemented on routers provides for security? A CMIP over TCP/IP (CMOT) B Common Management Information Protocol (CMIP) C Simple Network Management Protocol (SNMP) D SNMPv3

A CMIP over TCP/IP (CMOT)

Before data gets onto a T1 line, it must be cleaned and formatted by a device called what? A CSU/DSU B Router C Hub D Demarc device

A CSU/DSU

Which network medium contains a layer of braided wire or foil between the core and the outside insulating layer, plus another layer of plastic or rubberized material that separates the central core from the shielding layer? A Coaxial B Twisted pair C Fiber optic D Wireless

A Coaxial

Which of the following are types of events reported in Event Viewer? (Choose all that apply.) A Critical B Error C Logon D Logoff

A Critical B Error

Which of the following are client options that can be set at the scope level? (Choose all that apply.) A DNS B WINS C ROUTER D MAC address

A DNS B WINS C ROUTER

What type of bridge can package frames of one format into the format of another? A Encapsulating B Heterogeneous C Translating D Transparent

A Encapsulating

Many companies run what type of cabling as their backbone media? A Fiber optic B Solid twisted pair C Stranded twisted pair D Coaxial

A Fiber optic

Which protocol is responsible for the logical addressing of each packet created by the transport layer? A IP B RIP C TCP D UDP

A IP

At a minimum, which IPv4 address components must you configure in order to communicate on your local subnet? A IP address B Subnet mask C Default gateway D DNS server address

A IP address B Subnet mask

Repeaters operate at which OSI layer? A Layer 1 - Physical B Layer 2 - Data link. C Layer 3 - Network D Layer 4 - Transport

A Layer 1 - Physical

If a problem occurs after a successful login, Last Known Good Configuration will fix the issue.

False

If a user gets a "No server is found" error, it usually points to a problem with the network software.

False

_____________ policies address the use of computer equipment and network resources for personal use or use that doesn't benefit the organization.

Acceptable use

Which type of DNS allows the zone information to be stored across multiple domain controllers?

Active Directory-integrated zones

If this light is on a NIC,it turns on and flickers when the NIC detects network traffic.

Activity light

ARP

Address Resolution Protocol; how TCP/IP networks figure out the MAC address based on their destination IP address

Why would an administrator use password cracking tools?

Administrators often use them as well to test how vulnerable their network is to attacks. They might also use the tools to access systems or devices where the password has been lost.

In DNS load balancing, all Web servers share the same IP address.

False

Which of the following is the block cipher used by most TCP/IP applications that use that type of cipher?

Advanced Encryption Standard (AES)

How does a DNS server today identify a record for a host with an IPv6 address?

AAAA

Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses?

ARP

Which of the following best describes the function of the Address Resolution Protocol (ARP)?

ARP allows computers to resolve the IP addresses of systems to which they must transmit data into hardware addresses.

Worldwide, most voice and data SONET rings use this cell-based packet-switching standard.

ATM

Which of the following is not true about standard equipment racks?

All equipment racks are floor-to-ceiling and should be bolted into the wall.

Why is the use of a switch preferred over a hub?

All of the above.

B

An administrator managing many routers should be using this type of tool in order to have an overall view of all the routers. A TRACEROUTE B Network Management System (NMS) C PING D MTR

Select the true statement regarding analog and digital signals.

Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels.

What might be the cause if you are unable to connect to radio wireless device?

Answers include: • Out of range • Interference from electrical motors or equipment • Drivers not installed • Wireless router turned off • Security settings preventing connections

List four network function tests you can perform with a cable testing device.

Answers include: • Verifying if PC is ON, if it appears as a PC and maximum speed • Verifying if hub is ON, if it appears as a hub and maximum speed • Verifying PC to hub speed and data transmission • Verifying hub to hub data transmission • Determining if straight thru or crossover patch cable is required • Finding speed bottlenecks on LANs • Monitoring LAN link between two devices

Name at least two actions you should take to limit risk of attacks on your network devices (switches, routers, and so forth).

Answers should include: • Changing default passwords • Disabling features, protocols, and options you do not need • Applying firmware and software updates regularly • Monitoring physical and virtual access to your network and devices

A

Anything that moves data from one system to another is part of this layer of the OSI model. A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4

Layer 1

Anything that moves data from one system to another, such as cabling or radio waves, is part of this layer of the OSI model.

This Web server was originally created for the UNIX/Linux platforms, but now comes in a version for Windows.

Apache HTTP Server

At which layer of the TCP/IP protocol stack do HTTP, FTP, and DNS reside?

Application

What layer of the OSI model refers to the code built into operating systems that enables network-aware applications?

Application

Routers using the OSPF protocol are organized into these groups

Areas

C

At what layer f the OSI model does the Internet Protocol work? A session B transport C network D data link

C

At what layer of the OSI model does the IP protocol work? A presentation B session C network D data link

D

At which layer of the OSI model do routers work? A transport B session C data link D network

A

At which layer os the OSI model does network cabling belong? A physical B data link C network D transport

What are the three VPN security models?

Authentication before connection, trusted delivery network, and Secure VPN

What are the three steps of the AAA model?

Authentication, authorization, and accounting

VPNs generally use __________, __________, and __________ to enable secure remote connections across insecure networks.

Authentication, tunneling, and encryption

Which of the following terms describes what rights, privileges, permissions, and actions a person has or can take with respect to a resource or system?

Authorization

APIPA

Automatic Private IP Addressing; all DHCP clients are designed to generate an APIPA address automatically if there is no response to a DHCP discovery message

In Linux, every user that is created automatically belongs to a default group named Users.

False

Which of the following protocols uses TCP as its transport layer protocol?

HTTP

This is the secure counterpart of HTTP

HTTPS

What term best describes the way the DNS name space is organized?

Hierarchical

Presently, where is 10 GbE equipment employed?

High bandwidth LANS & Wans

Presently, where is 10-GbE equipment employed?

High-bandwidth LANs and WANs

Which Windows utility can you use to find the ip network information on a Windows machine?

Ipconfig.exe

On a TCP/IP network, what information within a packet does a router use to determine where an incoming packet should go?

Destination IP addresses

Internet Protocol (IP)

Is an example of software that creates packets for moving data across networks.

Which of the following is a situation in which a network with NetBIOS clients would not need to use WINS?

It can broadcast across it's entire network

What test should a network administrator know how to run on a CSU/DSU to test a WAN connection?

BERT

Which of the following is the distance vector routing protocol used on the Internet?

BGP

Which of the following is the distance vector routing protocol used on the internet?

BGP

Which of the following newer technologies proposes to provide networking over the existing power line infrastructure?

BPL

What causes the most common problems with HTTPS?

Bad certificates

CompTIA uses this term to refer to routers and switches that can perform traffic shaping.

Bandwidth shapers

The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have?

Basic Rate Interface (BRI)

an ISDN version that provides two 64 Kbps B-Channels

Basic Rate Interface (BRI)

What type of unit is formed by a single WAP servicing a given area?

Basic Service Set (BSS)

What is the term for the name attached to an infrastructure mode wireless network serviced by a single WAP and including at least one wireless node?

Basic Service Set Identifier (BSSID)

What is the name for the practice of using multiple NICs for a single machine in order to double (or more) the speed between that machine and a switch? Hint: another term for this is link aggregation.

Bonding

What are the two names for dynamic IP addressing?

Bootstrap Protocol ( BOOTP), Dynamic Host Configuration Protocol (DHCP)

What are the 2 names for dynamic IP addressing?

Bootstrap Protocol (BOOTP) & Dynamic host configuration protocol (DHCP)

BOOTP

Bootstrap Protocol; alternate and older version of DHCP, common on Linux and Mac; DHCP has more specific limitations

What is the one protocol used on the internet for communication between Autonomous Systems?

Border Gateway Protocol (BGP-4)

What is the best way to eliminate the possibility of collisions in a network?

Both a and c

___________ combine the characteristics of bridges and routers.

Brouters

Which of the following topologies provide no fault tolerance? Select all correct answers.

Bus and Ring

How does NetBIOS identify a computer system on the network? Select all that apply.

By using a computer name

The problem of modal distortion, involving light bouncing back and forth at a sharp angle as it travels down a cable, is unique to which type of fiber-optic cable?

Multimode

What type of fiber-optic cabling & connectors does a 100BaseFX network use?

Multimode with ST or SC connectors

What type of fiber-optic cabling and connectors does a 100BaseFX network use?

Multimode with ST or SC connectors

What name is given to the port numbers in the range of 0 to 1023?

Well-known port numbers

Which of the following routing metrics, administratively assigned to links, affect which routes are chosen?

Cost

Unshielded twisted pair (UTP)

CAT 5e cable is a type of ______ wiring.

The specification for 100BaseTX calls for UTP cabling using ________ or better rated cabling.

CAT5e

What is the minimum category rating of UTP cabling you would need for a network that runs at 1000 Mbps?

CAT5e

What are the category rating of UTP cabling you could use for a network that that needs to run at 1000 Mbps? (Choose all that apply)

CAT5e/CAT6

Of the following, which is the fastest category of UTP cabling?

CAT6

This is done by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller individual subnets to customers.

CIDR

This is done by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller indiviual subnets to customers?

CIDR

What is an IP addressing notation that uses a slash and is named for the method of generating blocks of IP addresses?

CIDR

what is an IP addressing notation that uses a slash and is named for the method of generating blocks of IP addresses?

CIDR

Which of the following is the latest version of Microsoft's folder- and printer-sharing protocol?

CIFS

software designed to help business owners

CRM

In wireless networks, what type of media access control is used?

CSMA/CA

What is the media access method used by Ethernet?

CSMA/CD

______________ is an acronym for the channel access method that avoids collisions rather than detecting them.

CSMA/CD

What device connects to each end of a T1 connection?

CSU/DSU

What device connects to each end of a T3 connection?

CSU/DSU

Which of the following are the devices on the customer's side of a WAN connection to a building, not including the actual connection point? (Select all that apply.)

CSU/DSU/demarc

What cable type has a maximum cable length of 100 meters? (Choose all that apply)

Cat3/Cat5/Cat5e

_____________ policies describe the set of procedures followed whenever a network change is made.

Change management

You are having problems with wireless clients losing their connections to the wireless network. What could you do? (Choose all that apply)

Change the channel on the access point and client/Reboot the access point

A user complains that they can't log onto a server. What troubleshooting steps would you likely take to resolve the problem? (Select 3)

Check connectivity to the server from your system/Find out if a user on the same segment can connect/Find out if a user on a remote segment can connect

You install a new virus suite in your network of 120 computers. In the same afternoon, you configure RAID on a server. You are experiencing system crashes throughout your network. What would be the first step to correct the problem?

Check the virus vendor for system patches or service packs.

What IP Class is 1 - 126?

Class A

Different properties of each class

Class A: 1-126, first octet, 16,277,214 hosts; Class B: 128-191, second octet, 65,534 hosts; Class C: 192-223, third octet, 254 hosts; Class D: 224-239, multicast for hosts; Class E: 240-255, reserved host

Default subnet masks for Class A, Class B, and Class C

Class A: 255.0.0.0; Class B: 255.255.0.0; Class C: 255.255.255.0

If the first decimal value of an IP address is between 128 & 191, to what IP class does the network belong?

Class B

If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong?

Class B

What IP class is 128 - 191?

Class B

What IP class is 192 - 223?

Class C

What IP Class is 224 - 239?

Class D

What IP class is 240 - 254?

Class E

CIDR

Classless Inter-Domain Routing; based on subnetting; a single IP address can be used to designate many unique IP addresses; subnetting can be done by an organization, but CIDR has to be done by the ISP; looks like "172.200.0.0/16," which shows how many addresses are covered by the CIDR address

Electromagnetic interference (EMI)

Coaxial cable uses a braided metal shield to protect data from _________.

What events, characteristic to an Ethernet network using hubs, does using an Ethernet switch minimize or avoid?

Collisions

What events, characteristic to an Ethernet network, using hubs, does using an Ethernet switch minimize or avoid?

Collisions

a guaranteed minimum transmission rate offered by the service provider

Committed Information Rate (CIR)

What is the overall term for the set of documents, policies, and procedures for maintaining and updating a network with the objective of lessening vulnerabilities?

Configuration management

This is another name for a session.

Connection

A communication between computers that begins with an acknowledgement, followed by a message, and ending with a closing acknowledgement is which type of communication?

Connection-oriented

What two types of protocols exist at the transport layer? (Choose two)

Connection-oriented/Connectionless

Explain "same subnetting" (ESSAY)

Convert subnet mask to binary; find how many consecutive "1"s there are; convert the addresses to binary; find the octet that is unique for each address, which is different for each class type; only evaluate the amount of numbers that coincides with the number of consecutive "1"s in the subnet mask (if there were 4 consecutive "1"s in the subnet mask, only evaluate the first 4 numbers of each unique octet in the addresses); if one set of binary numbers in an address matches another set of binary numbers in another address, then those addresses are on the same subnet

D

Convert the binary value 11010101 to decimal. A. 221 B. 198 C. 245 D. 213

Which of the following routing metrics is the ability of a connection to handle more traffic than others?

bandwidth

What begins an Ethernet Frame?

Preamble

Which layer of the OSI model is responsible for encryption and decryption?

Presentation

an ISDN version that provides 23 64-Kbps B-channels

Primary Rate Interface (PRI)

Which of the following are considered network peripherals? (Select all that apply.)

Printer/scanner

CompTIA's Network+ exam consists of two tests.

False

DNS is a protocol for the automatic allocation of IP addresses to DNS clients.

False

Each column in a routing table defines a single route.

False

What type of attack uses zombie computers to bring a network down under a massive number of requests?

DDOS

For a computer to connect to a HomeGroup, it must have certain features enabled or configured correctly. Which of the following is not necessary to join a HomeGroup?

DHCP

Which of the following automatically gives out IP information to computers that request it?

DHCP

which of the following automatically gives out IP information to computers that request it?

DHCP

_______________ servers match host names to IP addresses.

DNS

In this type of load balancing, one domain name is assigned to many servers, using different IP addresses.

DNS load balancing

Almost immediately after a server migration project, employees are complaining that they can't reach the Internet. You sit down at a machine and try to ping a well-known website, which fails. You then try to ping a known-public IP address, which succeeds. What is most likely the issue?

DNS settings are incorrect

If you have cable Internet service, what protocol is used between the head end connection and the cable company's network?

DOCSIS

What is the digital signal used to which a central office converts analog voice signals before sending them across trunk lines?

DS0

Which of the following is the digital signal to which a central office converts analog voice signals before sending them across trunk lines?

DS0

The frame for this signaling method has a framing bit, plus 24 channels, each holding a single 8-bit data sample.

DS1

What is the T1 signaling method?

DS1

In a DSL connection, what device is used between your computer (or router) and the wall jack?

DSL modem

Which of the following is the DSL device that is located in a central office, connecting multiple DSL customers to the Internet?

DSLAM

the device that sends data to (and receives data from) the local loop, usually a CSU/DSU or modem

Data Circuit-terminating Equipment (DCE)

What is the oldest of the TCP/IP symmetric-key algorithms?

Data Encryption Standard (DES)

Which layer has been subdivided into the Logical Link Control sublayer and the Media Access Control sublayer?

Data Link

Which layer of the OSI model adds source and destination MAC addresses to frames?

Data Link

Which layer of the OSI model is the only layer divided into two sublayers?

Data Link

Which layers of the OSI model are mapped to the Link layer of the TCP/IP DOD model? (Choose all that apply)

Data Link/Physical

the device that passes data from the customer LAN to the DCE, usually a router.

Data Terminal Equipment (DTE)

Which edition of Windows Server 2008 includes support for up to 64 processors and provides unlimited virtual instances?

Datacenter Edition

Analytical and __________ logs are hidden by default and generally used only by developers.

Debug

What is the signs of APIPA?

Default IP of 169.254.XX.XX with a subnet of 255.255. Everything works except for internet

A client using a PPTP VPN to connect to a private LAN will have an IP address of that network, just as if it were directly connected to the LAN, right down to this IP configuration setting, which will control where that client's packets with destination addresses beyond the LAN will be sent.

Default gateway

You receive a phone call from a co-worker telling you that "the network is down." Just as you are about to look into the issue, you receive several more phone calls from other co-workers. Using the problem-solving process, what must be done first to effectively troubleshoot the issue?

Determine what the problem is, and then figure out who has been affected on your network.

When troubleshooting a potential wireless hardware problem, open this Windows utility to see if there is an error or conflict with the wireless adapter.

Device manager

With Windows, what can you use to verify that Windows recognizes a NIC and is ready to use it?

Device manager

You'd use the LAN __________ Data Collector Set to troubleshoot network performance.

Diagnostics

What is a potential problem a browser looks for after it receives a certificate from a secure HTTP site? Select all that apply.

Disconnected certificate and Invalid certificate

Rather than destroying or stealing data, a ____________ attack is designed to disrupt daily standard operation.

DoS

Man-in-the-middle attacks can be used for what types of attacks?

DoS, Web spoofing, information theft, and TCP session hijacking

What task(s) should you perform as soon as you finish configuring a router? Select all the correct answers

Document, backup

DNS

Domain Name System; translates domain name into IP addresses

What is true and what is not true about subnets?

Don't always get exact number of subnets; efficient; *just think of the basics you already know*

_____________ means that reasonable precautions are being taken which indicates that the organization is being responsible.

Due care

Which service would allow home or office networks that may change IP addresses to be contacted via domain names?

Dynamic DNS

Which technology allows DNS clients to automatically update DNS servers?

Dynamic DNS

Which technology allows DNS servers to query DHCP servers for host IP addresses?

Dynamic DNS

Which of the following automatically gives out IP information to computers that request it?

Dynamic Host Configuration Protocol (DHCP)

DHCP

Dynamic Host Configuration Protocol; automatically assigns an IP address whenever a computer connects to a network

With this type of NAT, many computers can share a pool of routable IP addresses that number fewer than the computers.

Dynamic NAT

What is the common term for a VLAN based on MAC addresses?

Dynamic VLAN

Each domain in DNS must have it's own dedicated authoritative DNS server that cannot be shared with other domains.

False

Which categories of UTP cabling can be used in Gigabit Ethernet networks? (Select all that apply.) A CAT 1 B CAT 2 C CAT 3 D CAT 4 E CAT 5 F CAT 5e G CAT 6 H CAT 6e I CAT 7

E CAT 5 F CAT 5e G CAT 6 H CAT 6e

Which type of coaxial cable is used for low-power video and RF signal connections? A RG-6 B RG-8 C RG-11 D RG-58 E RG-59

E RG-59

Every Web server must include www as part of its name.

False

If Windows installs the driver for a NIC, you should use it rather than using a driver that comes from the manufacturer of the NIC.

False

A 0 in the subnet mask indicates part of the network ID

F

hypervisor installed directly onto the server

bare-metal virtualization

What is the European counterpart to a T1 line?

E1

802.1X combines RADIUS-style AAA with which of the following to make a complete authentication solution?

EAP

Which of the following technologies is not a true protocol, but enables the use of different authentication methods?

EAP

This is the most popular form of authentication used in wireless networks today.

EAP-PSK (Personal Shared Key)

What is the protocol developed by Cisco for enterprise-wide routing environments?

EIGRP

Which of the following are examples of hypervisors? (Choose all that apply)

ESX/Hyper-V/Oracle VM Server

agreement regarding the use of an application

EULA

Which of the following is true of the names in a flat name space?

Each must be unique

What is the goal of subnetting?

Efficiency; more efficient use of IP addresses

NICs send and receive binary data as pulses for all of the following? (Choose all that apply.)

Electricity/radio waves/light

Hub

Enables multiple machines to connect over a network.

This term means to scramble, to mix up, to change data in such a way that the wrong people can't read it, but so the right people can unscramble it.

Encryption

In a NAT router, what is the name for an arbitrary number generated by the sending computer?

Ephemeral port

When a Web browser sends a message to a Web server, it generates this type of port number pseudo-randomly as the source port for the packet.

Ephemeral port number

What is the status of a port that is part of an active working endpoint pair?

Established port

What is the Ethernet frame type that is used by TCP/IP?

Ethernet II

What is the name of the Windows utility for viewing log files?

Event Viewer

What tool would you use to view error messages that are generated by system services or applications?

Event Viewer

What is the name of the Windows utility for viewing log files?

Event viewer

MAC address

Every NIC has a hard-coded identifier called ___________.

What is Class E IP address used?

Experimental

What type of unit is formed by two or more WAPs servicing a given area?

Extended Service Set (ESS)

If a collision has occurred on an Ethernet network, the cable is restricted to the nodes whose data collided until they have finished retransmitting.

F

Which OSI layer provides security, encryption, and compression for the data? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application

F Layer 6—Presentation

Which is WAN connection technology that uses encryption and security protocols to create a private network over a public network? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless

F VPN

RAID technology provides backup for data stored on hard drives.

FALSE

Given that your MAC address is 00-50-8D-86-0A-07, calculate a link-local address for a non-Windows system.

FE00::0250:8DFF:FE86:0A07

Which part of the address, FEDC::CF:0:BA98:1234/64, is the network ID?

FEDC::

Which part of this address, FEDC::CF:0:BA98:1234/64, is the network ID?

FEDC::

What is the MAC broadcast address?

FF-FF-FF-FF-FF-FF

Which of the following is a broadcast MAC address?

FF-FF-FF-FF-FF-FF

what is the MAC broadcast address?

FF-FF-FF-FF-FF-FF

Which of the following multicast addresses will only reach routers?

FF02::2

All of the following items can cause interference to wireless networks in the 2.4-GHz range EXCEPT:

FM radios

All of the following are attacks on wireless connections EXCEPT:

FTP bounce

A RAID that is configured as a level 0 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.

False

A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.

False

A security policy should clearly state the desired rules, even if they cannot be enforced

False

Apache HTTP Server is Microsoft's Web Server.

False

As the internet grew, HOSTS replaced DNS.

False

At any given time your computer can only have one communication session open.

False

Both Cisco and Microsoft treat CompTIA Network+ as a prerequisite toward at least some of their own certifications.

False

Browsers request HTML pages from mail servers.

False

CompTIA requires A+ certification before you can take the Network+ exam.

False

NIC and Switch

For a network to function in full-duplex, which of those devices must support full-duplex? (Select all that apply)

C

For network tech, one benefit of understanding the OSI seven-layer model and how traffic in an actual network works through the model is applying this knowledge to ___ networks. A. Purchasing NICs B. connecting to the Internet C. troubleshooting D. securing a PC

On an authoritative DNS server, what are the storage areas called that hold the IP addresses and names of systems for a particular domain or domains?

Forward lookup zones

Presently, almost all the tier 1ISP routers properly perform what function for IPv6?

Forward packets

What packet-switching standard designed for and used primarily with T-carrier lines is very fast, but does not guarantee data integrity?

Frame relay

Multiplexers used this technology to keep individual calls separate.

Frequency Division Multiplexing

Given the following information: • Your company's regular business hours are from 8 a.m. to 5 p.m. Monday to Friday. • Your supervisor instructed you to run backups only after business hours to avoid impacting network performance. • You have a 50 GB tape drive with a data transfer rate of 3600 KB/min, allowing transfer of 2.1 GB per hour. • You have 40 GB to backup. On which day(s) can you do full backups? (Choose all that apply.)

Friday/Saturday

How can you remove an update from Windows Vista?

From the Windows Update window, click View update history. Click the Installed Updates link on the Review your update history page. If the update can be removed, Uninstall is displayed in the toolbar. Click Uninstall to remove the update.

Local connections do not use this, although every routing table has a column for it, and therefore, a value appears in this field for each route.

Gateway

What type of IPv6 address do you need to get on the Internet?

Global unicast address

If you support, but do not install UTP networks, which two of the following are the most important tools you should use?

Good, medium-priced toner & good, medium-priced cable tester

Which protocol will help prevent downtime due to failures on the default gateway?

HSRP

This is the most common type of proxy server.

HTTP

This is the underlying protocol on the World Wide Web.

HTTP

This protocol is an alternative to POP3, with special enhancements.

IMAP4

If a switch contains a Web page that you must connect to in order to configure it, then the switch must also have this type of address for accessing that Web page.

IP address

What is the Network layer unique identifier assigned to each device on a TCP/IP network?

IP address

You can use the command-line utility _______________ to retrieve a computer's IP configuration.

IPCONFIG

What is the most convenient means of determining what the Internet Protocol (IP) address is on a Microsoft Windows 7 machine is using?

IPCONFIG.EXE

A(n) _________ device can terminate a network connection or user session.

IPS

You install a(n) ____________ device on the perimeter of your network to monitor for and stop threats before they are passed on your network.

IPS

Which of the following is an authentication and encryption protocol that works at the Network layer of the OSI seven-layer model?

IPSec

Which protocol is used to encrypt data as it travels a network?

IPSec

Diameter provides better security than RADIUS by providing end-toend security using __________ or __________.

IPsec or TLS

Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one uses nonstandard addresses for the endpoints?

ISATAP

Which standards organization is named for the Greek word for "equal"?

ISO

Smaller companies and individuals use a(n) ____________ to make the connection to a commercial backbone.

ISP

Which of the following design considerations affects the bandwidth and reliability of external connections?

ISP selection

A

If the computer on the network connect via the same piece of cable, what topology is employed? A bus B ring C star D mesh

Bus

If the computers on the network connect via the same piece of cable, what topology is employed?

B

If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong? A Class A B Class B C Class C D Class D

Activity light

If this light is on a NIC, it turns on and flickers when the NIC detects network traffic.

200 Mbps

If you have a 100BaseT switched Ethernet network, what is the theoretical maximum bandwidth using full-duplex NICs?

B

If your company has a single server on the private LAN that they want to make accessible from the Internet, which of the following would give the server the protection of NAT while allowing access to that server from the Internet? A Source NAT B Port forwarding C Overload NAT D Network Address Translation (NAT)

B

If your network subnet mask is /16, what is the maximum number of host IDs available for this network? A 62 B 65,534 C 254 D 16,227,214

B

In a NAT router, what is the name for an arbitrary number generated by the sending computer? A Destination port B Ephemeral port C ASN number D Area ID

D

In some networks data moves over radio waves, which fall into which layer of the OSI model? A. Application B. Session C. Presentation D. Physical

_____________ policies detail how a security break or disaster is dealt with.

Incident response

Which statement is true regarding differential / incremental backups?

Incremental backups copy all files changed since the last full or incremental backup and marks files as backed up.

What type of unit is formed by one or more wireless nodes communicating in ad hoc mode?

Independent Basic Service Set (IBSS)

This term describes how permissions pass down from folder to folder.

Inheritance

Following a massive infection of your network by a virus, you have been tasked with developing preventive measures for keeping the network infection free. What would be an effective preventive measure?

Install an enterprise-based anti-virus solution.

What steps can you take to minimize electrical interference on your wired LAN?

Install cables in separate conduits away from items such as electric motors (like those found in lifts/elevators), fluorescent lights, and air conditioners. In areas where there's an abundance of electrical noise, use shielded cables or other technologies such as fiber optic cables to avoid interference.

What is the Cisco term for a feature in a special switch that will provide routing between VLANs?

InterVLAN routing

List some of the items a dumpster diver seeks.

Internal phone directories, organizational charts, policy manuals, calendars, outdated hardware, systems manuals, network diagrams, other technical information sources.

The three main zones into which you can divide a network are the _________, _________, and _________.

Intranet, perimeter network (or DMZ), and extranet (or Internet)

Each interface on a router must have an IP address and what else to be able to communicate on the network?

MAC address

What is a method for limiting access to your wireless network based on the physical addresses of wireless NICs?

MAC address filtering

Which of the following is a method for limiting access to your wireless network based on the physical addresses of wireless NICs?

MAC address filtering

What basis do bridges use to determine whether to forward traffic?

MAC addresses

What firewall technology allows or denies access to a network according to the MAC address of the computer seeking access?

MAC filtering

Which statement about Multiprotocol Label Switching (MPLS) is true?

MPLS works with any network layer protocol.

Which of the following is the most common authentication method for dial-up connections?

MS-CHAP

The Transport layer segments data into smaller chunks, the size of which is determined by which of the following?

MTU

Which one of the following routing metrics determines the largest frame a particular technology can handle?

MTU

You're configuring your network switch to improve its security. You have changed the default password for the unit's Web interface. What else should you configure to be sure all management interfaces have been locked down?

Make sure to secure TELNET and SNMP interfaces. Also, if available, block access to management interfaces from all external network locations. In the case of wireless devices, block access to management interfaces over wireless connections (allow wired connections only).

Why can't computer equipment just be thrown in with the regular trash?

Many pieces of computer equipment contain hazardous materials and heavy metals. Also, you want to make sure that any information stored on the equipment is not able to be retrieved.

Which of the following is NOT a state that VLAN Trunk Protocol (VTP) uses?

Master

What is the meaning of the "10" in 10BaseT?

Maximum speed of 10 MBps

What is the meaning of the "10" in 10BaseT?

Maximum speed of 10 Mbps

What company was not involved in the 1979 introduction of the DIX ethernet standard?

Microsoft

Which of the following companies was NOT involved in the 1979 introduction of the DIX Ethernet standard?

Microsoft

What device converts an analog signal to digital and a digital signal to analog?

Modulator-demodulator

Multimode

Most network technologies that use fiber-optics use which type of fiver-optic cables?

_____________ fiber optic cable is used mostly for short distances (up to 500 m).

Multi-mode

What is Class D IP address used?

Multicast

This is a set of reserved addresses designed to go only to certain systems.

Multicast address

You are troubleshooting a TCP/IP network and want to test a network adapter on a client computer. What TCP/IP utility could be used to find out if TCP/IP is configured correctly on the system, and to find out if the host can contact a host at another location?

PING

What command can you use to test the NIC's ability to send and receive packets?

PING 127.0.0.1

Which of the following would confirm that you have a DNS problem?

PING works with the IP address but not with the FQDN

If you cannot receive e-mail, which of the following protocols should you suspect is not working properly?

POP3

Which of the following common terms describe a regular phone line designed to work only with analog sound and that uses an RJ-11 connector?

POTS and PSTN

CHAP is an authentication scheme used by _________ servers to validate the identity of the remote user.

PPP

This type of connection is always used for dial-up.

PPP

What two tunnel protocols enable tunnel endpoints to act like NICs on the same network?

PPTP and L2TP

Which of the following are the two tunneling protocols used by the majority of VPNs?

PPTP and L2TP

Name two VPN protocols.

PPTP and L2TP are the most common. IPsec can be used with VPNs, though it is a general network protocol.

Which of the following common terms describe a regular phone line designed to work only with analog sound and that uses an RJ-11 connector? (Select all that apply.)

PSTN/POTS

Most fiber-to-the-home technologies employ a version of:

Passive optical network

Computers that both serve and access data participate in which kind of network?

Peer-to-peer

This Windows utility will allow you to gather information on many aspects of a computer and network, which you can save in log files to serve as a baseline.

Performance monitor

At which layer of the OSI model does network cabling belong?

Physical

At which layer would you find errors that were caused by EMI?

Physical

In some networks data moves over radio waves, which fall into which layer of the OSI model?

Physical

Which of the following would confirm that you have a DNS problem?

Ping works with the IP address but not with the FQDN.

Which of the following choices are collision avoidance methods defined by the 802.11 standard?

Point Coordination Function (PCF) and Distributed Coordination Function (DCF)

Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?

Port

Some manufacturers, such as Cisco, use this term to refer to either overloaded NAT or port forwarding.

Port Address Translation (PAT)

If your company has a single server on the private LAN that they want to make accessible from the Internet, which of the following would give the server the protection of NAT while allowing access to that server from the Internet?

Port forwarding

Some IDS/IPS products will use this advanced switch capability so that administrators can examine all the packet traffic for certain ports.

Port mirroring

Some advanced switches have this ability to mirror data from any or all physical ports to a single physical port in order to monitor traffic.

Port mirroring

This is a name used for ports in the 49152 to 65535 range.

Private port, dynamic port

Private vs. Public IP address

Private: IP addresses that help hide a system from the Internet, which means that the system cannot access the internet (fall in the 10, 172, and 192 range); Public: an IP address that allows the system access the Internet

A network _________ is a language that is used by systems that which to communicate.

Protocol

Data Link Layer

Provides the key interface between the Physical and Network layers.

When configuring a Web client to use a proxy server, you must tell the Web client not to use the usual DNS resolution, and give it this setting.

Proxy server IP address

This term describes several methods for spreading data across multiple drives.

RAID

Which of the following RAID levels has no fault tolerance?

RAID 0

This form of redundancy uses multiple hard drives working together in such a way that if one drive fails, the others will continue without interruption.

RAID 1

Which of the following is the most limiting factor in a host's ability to run virtual machines?

RAM

Which of these routing protocols is the oldest?

RIP

Which one of the following routing protocols did not support Variable-Length Subnet Masking (VLSM)?

RIPv1

Select the distance vector protocols from the following list. Select all that apply in alphabetical order.

RIPv1, RIPv2, BGP

What protocol (including version number) was adopted in 1994, and is now considered obsolete execept for small, private WANS

RIPv2

What type of connector is used by all UTP Ethernet NICs?

RJ-45

Which of the following is the most heavily adopted VoiP standard?

RTP

Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to the AP?

RTS

Which of the following protocols is commonly used to stream video?

RTSP

With IPv6, how should we regard Internet address changes?

Rare but normal

Telnet is rarely used on the Internet, having been replaced by _______________, which looks just like Telnet, but encrypts data.

SSH

An AP typically broadcasts its _____________ so clients can discover its presence.

SSID

When configuring a WAP, set this to something unique and easily identified, and follow up by giving this same name on all wireless hosts that should connect to this network.

SSID

The two most common types of SSL VPNs are:

SSL portal VPNs and SSL tunnel VPNs

In which type of VPN does the client browser run an active control, such as Java or Flash?

SSL tunnel

Which VPN implementation needs no additional configuration to be allowed access through a firewall?

SSTP

____________ attacks flood a server with half open TCP connections which prevent users from being able to access the server.

SYN flood

the Linux file sharing protocol that is compatible with Windows

Samba

Which of the following is an SSH-enabled program?

Secure Copy Protocol (SCP)

This cryptographic hash comes in two versions, but is not the most popular cryptographic hash.

Secure Hash Algorithm (SHA)

Which of the following was developed as a secure replacement for Telnet?

Secure Shell (SSH)

B C D

Select the distance vector protocols from the following list. Select all that apply in alphabetical order. A. Open Shortest Part First (OSPF) B RIPv1 C RIPv2 D BGP

A B

Select the link state dynamic routing protocol from the following list. Select all that apply in alphabetical order. A Open Shortest Path First (OSPF) B IS-IS C RIPv2 D BGP

D

Select the one function below that NIC does NOT perform. A. It sends and receives binary data B. It provides an interface between the PC and the Network C. It creates frames D. It routes data across the most efficient route on the network

If you are installing a new WAP, and it is near another WAP, what is one way to reduce interference?

Separate channels should be used

Which of the following are NOT contained in a UDP header?

Sequence number, window size, acknowledgment number

When you configure an ISDN terminal adapter (TA), you must enter the telephone number for the other end of the ISDN connection, as well as this special number, provided by the telephone company.

Service Profile ID (SPID)

Which of the following is a term for the second level of naming in a Wi-Fi network that can be applied in either ad hoc mode or infrastructure mode?

Service Set Identifier (SSID), Extended Service Set Identifier (ESSID), network name

Which layer is responsible for establishing a connection between the source and destination?

Session

Which layer of the OSI model manages the connections between machines on the network?

Session

What are the three LDAP Bind methods?

Simple Bind, SASL (Simple Authentication and Security Layer), and Anonymous BIND

an industry-standard protocol used for network management and monitoring

Simple Network Management Protocol (SNMP)

What type of fiber-optic cable is used in a 1000BaseLX network?

Single-mode fiber

What is the name for the session information stored in RAM by a computer on one side of a session?

Socket and endpoint

C

Some manufacturers, such as cisco, use this ter m to refer to either overloaded NAT or port forwarding. A Static NAT B Dynamic NAT C Port Address Translation (PAT) D Source NAT

To organize your diagnostic process when tracing cabling, use these very simple aids to keep track of your progress on the patch panel.

Stickers

Which of the following is not an accurate description of the differences between stranded core and solid core cabling?

Stranded core is UTP while solid core is fiber-optic cabling

This is done by an organization when it takes a block of addresses received from an ISP and breaks the single block of addresses into multiple subnetworks.

Subnetting

What are some examples of Physical security? (Choose all that apply)

Swipe cards/Servers in locked closets./Biometrics as input devices

What type of advanced network device is used to create VLANs?

Switch

Which networkign devices can use the spanning Tree Protocol?

Switches

a high-speed, baseband digital networking standard that specifies incrementally increasing data rates across fiber-optic links.

Synchronous Optical Network (SONET)

Which of the following is a Unix/Linux logging program?

Syslog

Select the utility inside of Windows that allows the user to recover a previous system state. This utility monitors drives and partitions, as well as registry settings and system files.

System Restore

A NIC is not concerned about the contents of the data part of a frame.

T

Adding a digital signature to an encrypted message ensures that you are getting the message from the person you expect it to be from.

T

All implementations of Ethernet use the same frame type as the original Ethernet networks.

T

Before encryption, we consider all data as being plaintext (also called cleartext). This does not necessarily mean that the data is simple text format, but it can be any type of data.

T

One function that an NIC does not perform is that it routes data across the most efficient route on the network.

T

When a frame arrives at the hub, the hub makes an exact copy of the frame and sends it to every other system on the network.

T

When the NIC sends a frame that contains the broadcast address, every NIC on the network processes that frame.

T

Although a frame relay connection is established in much the same way that a T1 connection is, which of the following is an important distinction between the two technologies?

T1 uses point to point, while frame relay makes use of virtual circuits.

how much something costs when intangibles are factored in

TCO

Most computer connections use this Transport layer protocol.

TCP

TACACS+ uses __________ rather than UDP for messages.

TCP

Which of the following is not an Application layer protocol?

TCP

Which of the following protocols are connection-oriented?

TCP

What is the de facto protocol suite of the Internet?

TCP/IP

What network protocol do Linux and Apple (Macintosh) systems most commonly use today?

TCP/IP

What network protocol do linux & apple systems most commonly use today?

TCP/IP

what is the De Facto protocol suite of the internet?

TCP/IP

You have a small network with 25 users, 2 Fast Ethernet switches, and 1 router that connects the network to the Internet. Users on all of the internal local area networks (LANs) are complaining that when they came in this morning they could not access the Internet. Users can access resources on their own LAN and other internal LANs with no problem. What network component is the most likely problem in this scenario? (Choose all that apply)

The Internet router/The Domain Name Service (DNS) server

If the Network Administrator needs an IP address, where do they go, and why would the Network Administrator want to subnet this address? (ESSAY)

The Network Administrator will go the ISP for a new IP address; The Network Administrator will subnet for efficiency and organization (grouping), such as if there are many departments, subnetting could allot a certain amount of the network to that department (this also allows for more address usage from one IP address)

Which of the following statements are true about the OSI model? (Choose all that apply)

The OSI model encourages modular design in networking./The OSI model provides a common jargon to describe the function of any network protocol./Each layer of the OSI model addresses an essential network task.

In RADIUS terminology, what is the name given to the system that provides connectivity services for remote computers?

The RADIUS client

In RADIUS terminology, what is the name given to the system that provides authentication services for remote computers?

The RADIUS server

Identify each of the four layers in the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack and the layer it maps to in the Open Systems Interconnection (OSI) model. (Choose all that apply)

The TCP/IP application layer maps to the OSI session, presentation and application layers./The TCP/IP transport layer maps to the OSI transport layer./The TCP/IP internet layer maps to the OSI network layer./The TCP/IP link layer maps to the OSI physical and data-link layers.

In regards to a user account, what does a white circle with a black arrow indicate?

The account is disabled.

C

The addresses 127.0.0.1, 10.1.1.50, 172.16.200.1, and 192.168.35.44 are examples of what? A DHCP lease addresses B APIPA addresses C Special IP addresses D Class A addresses

How do WINS servers learn the NetBIOS names of computers on the network?

The computers register their names with the WINS server.

A

The decimal value 151 converts to what binary value? A 10010111 B 11010001 C 10010110 D 10010101

TACACS+ provides better message security than RADIUS because it encrypts __________.

The entire message and not just the message body.

What happens to frames when the hub sends them to the NICs on the network?

The frames are received by every NIC, but only the NIC with the matching MAC address processes the frame

Your current backup schedule involves incremental backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?

The full backup must be restored first, followed by all incremental backups in sequential order leading up to the day of failure.

UTP category ratings are based on what?

The highest frequency and bandwidth that the cable can handle

Which statement is true about NetBIOS name broadcasts?

The host sends the message to all machines on the local network.

Your current backup schedule involves differential backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?

The last full backup should be restored first, followed by the last successful differential backup prior to the drive failure.

What would not be included in the data portion of an Ethernet frame on an IP network?

The length of the data being transmitted

Which of the following is not identified in a cabling specification such as 10BaseT?

The maximum number of routers

At which layer of the OSI model does NAT operate?

The network layer

What do most professional cable installers use to quote the price for an installation?

The number of drops

What is the biggest differentiator among Ethernet hubs?

The number of ports

What does the ping message "Destination host unreachable" message mean?

The pinged IP address is on the same network, but an ARP reply was not received.

CAT 5e

The specification for 100BaseTX calls for UTP cabling using _______ or better rated cabling.

C

The specification for 100BaseTX calls ofr UTP cabling using ___ or better rated cabling. A CAT 1 A CAT 3 C CAT 5e D CAT 6

How does a switch "learn" MAC addresses?

The switch reads each frame and makes a note of where each MAC address came from.

Crosstalk

The twisting of the cables in UTP and STP reduces _________.

If the minimum password length on a Windows system is set to zero, what does that mean?

The user can use a blank password.

Routers have which of the following capabilities?

They allow you to connect networks with different types of cabling or frames.

All of the following are reasons to purchase name-brand NICs, with one exception. Which one is the exception?

They are less expensive

Which of the following is not a characteristic of cheap cable testers?

They come with a small loopback device

Which of the following statements about routers are true? (Choose all that apply)

They develop tables based on IP addresses to determine routes./Each port of a router must have a separate network address or subnet.

Which of the following statements is true about DNS root servers?

They have the complete definitive name resolution table.

Which of the following is true of OSPF routers? Select all that apply

They send Hello messages every 30 minutes to routers in their area, they converge almost instantly

B

This is done by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller individual subnets to customers. A dynamic addressing B CIDR C static addressing D BOOTP

D

This is done by an organization when it takes a block of addresses received from an ISP and breaks the single block of addresses into multiple subnetworks. A dynamic addressing B CIDR C static addressing D subnetting

Fast Ethernet

This term is used to refer to any of the several variations of Ethernet that operate at 100 Mbps.

A

This terms is used to refer to any of the serval variation of the Ethernet that operate at 100 Mbps. A fast ethernet B full-duplex Ethernet C gigabit Ethernet D switched Ethernet

Even if you do not wish to take the CompTIA Network+ exam, the information in the Study Guide will be valuable to you.

True

What is the signaling method used to allocate time slots for each channel in a T-carrier line called?

Time Division Multiplexing (TDM)

What status indicates that a connection has been lost to the other side, and has not yet closed?

Time-wait

What is the purpose of a crimper?

To connect a RJ-45 connector to the cable

In a Microsoft domain using Kerberos authentication, after a client has been authenticated and received a TGT, the client presents this to a Ticket-Granting Service to receive something that allows authorization to resources for up to 8 hours. What is a common name for this last item?

Token

Tripplet Corporation manufactures a very popular tool called a "Fox and Hound." What type of tool is this?

Toner

What is the term for servers just below the DNS root servers?

Top-level domain servers

How are QoS policies often implemented?

Traffic shaping

What is one of the most overlooked security measures?

Training and awareness

At what layer of the OSI model does the set of protocols indicated by the TCP part of TCP/IP work?

Transport

Which TCP/IP model layer uses connection-oriented protocols?

Transport

What are the two IPsec encryption modes?

Transport and tunnel

A __________ is a program that poses as something else, causing the user to 'willingly' inflict the attack on himself or herself.

Trojan horse

A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.

True

A protocol analyzer, such as Wireshark, gives the ability to listen in on network traffic as it moves through the Application layer to the Data Link layer and vice versa..

True

An Ethernet network uses the CSMA/CD access method.

True

An application actively providing a service to a network client has an open port.

True

An event log entry that is an error is marked with a red circle with a white exclamation point in the center.

True

Before Secure methods were created for making connections over the internet, the biggest drawback to private remote connections was the cost to connect.

True

CompTIA periodically updates the Network+ test objectives, domains, and test questions to keep up with newer technological changes.

True

When using BitLocker to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?

USB key mode

When using to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?

USB key mode

Which kind of cable does not provide any protection against EMI?

UTP

Which type of cabling does the 10BaseT standard specify?

UTP

The highest frequency and bandwidth that the cable can handle

UTP category ratings are based on what?

How does antivirus software recognize new viruses and worms?

Updated virus definitions are downloaded.

You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords but that they must change their password every 30 days. You have just received a call from a user who can't log on because she forgot her password. After you change her password, which of the password options listed would you set in the user's account so that she will have to change the password when she logs on using the password you assigned?

User must change password at next logon.

All of the following are true concerning LTE (Long-Term Evolution), EXCEPT:

Uses satellite technology

Broadcast address

Using the __________ enables a computer to send a packet that every other PC on the network will process.

What is the current V standard for modems?

V.92

Which of the following would be included in a network diagram?

VLAN, gateway router, IP addresses

Which of the following virtualization products provides hosted virtualization?

VMware Workstation

Which of the following is not a feature that you should consider when choosing a new switch for a small business?

VPN support

What organization is a very popular certificate authority?

VeriSign

You just set up a new workstation on a TCP/IP network. You configure the IP settings, but the computer cannot access anything on the network. Which of the following is the first step to troubleshoot this problem?

Verify connection to the systems IP configuration

When using tape backup, what should be done to ensure that the backups are viable?

Verify data can be restored.

Where do you need to look to determine whether a service pack has been installed?

View Computer Properties, and in the Windows edition portion of the page it will indicate if a Service Pack has been installed.

A form of virtualization that eliminates telephone switching hardware is called a:

Virtual PBX

Using an encrypted tunnel between a computer (or remote network) and a private network is an example of using this type of network.

Virtual Private Network (VPN)

Using an encrypted tunnel between a computer (or remote network) and a private network is an example of using this type of network.

Virtual private network (VPN)

What type of server resolves NetBIOS names to IP addresses?

WINS

Which two of the following represent two strategies Microsoft used to solve the problem of resolving NetBIOS names to IP addresses without using broadcasting?

WINS and LMHOSTS

The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?

WPA2

Which is the strongest form of wireless security?

WPA2

Which function is being used if a packet is sent to port 80?

Web browsing

Microsoft Internet Explorer and Mozilla Firefox are examples of this type of TCP/IP application.

Web client

C

What is the de facto protocol suite of the Internet? A netBEUI B IPX/SPx C TCP/IP D UNIX

B

What is the default subnet mask for a class C network? A 255.0.0.0 B 255.255.255.0 C 255.255.0.0 D 255.255.255.255

1500 bytes of data

What is the length of the typical frame?

C

What is the length of the typical frame? A. 150 bytes of data B 1024 bytes of data C 1500 bytes of data D 48 bytes of data

1024

What is the limit to the number of nodes in every version of Ethernet?

A

What is the maximum cable length for a 1000BaseT network? A 100 meters B 200 meters C 400 meters D 2000 meters

100 meters

What is the maximum distance between a hub and a node on a 10BaseT network?

B

What is the maximum distance between a hub and a node on a 10BaseT network? A 2.5 meters B 100 meters C 50 meters D 500 meters

90

What is the maximum length for UTP cables allowed by the TIA/EIA 568 cabling specification?

D

What is the maximum number of hops allowed by RIP? A 4 B 8 C 12 D 15

C

What is the maximum number of host you may have on a network if the first decimal value of the ip address is between 192 and 223 and the subnet mask is /24? A 16.7 million B 65,546 C 254 D 64

1024

What is the maximum number of nodes that can be attached to a 10BaseT segment or hub?

D

What is the minimum category rating of UTP cabling you would need for a network that runs at 1000 Mbps? A. CAT1 B CAT2 C CAT5 D CAT5e

64 bytes

What is the minimum size of an Ethernet frame?

C

What is the name of the proprietary cable designed by Cisco for connecting to their routers? A Port B Parallel C Yost D Crossover

IP Address

What is the network layer unique identifier assigned to each device on a TCP/IP network?

4

What is the norm today for the number of pairs in UTP cabling?

B

What is the norm today for the number of pairs in UTP cabling? A 2 B 4 C 25 D 8

A

What is the one protocol used on the internet for communication between Autonomous Systems? A border gateway Protocol (BGP-4) B Open Shortest Path First (OSPF) C Overloaded NAT D RIPv2

D

What is the protocol developed by Cisco for enterprise-wide routing environments? A RIP B OSPF C BGP D EIGRP

C

What is the purpose of a crimper? A to attach the RJ-45 connector to the NIC B to connect a NIC to a hub C to connect a RJ-45 connector to the cable D to install a NIC in a PC

B

What is the range of decimal values in each of the four groups of an IPv4 address? A 1 to 256 B 0 to 255 C 1 to 1024 D 0 to 1023

C

What is the range of numbers normally used for ephemeral ports? A 0-255 B 0-1023 C 1024-5000 D 0.0.0.0-255.255.255.255

1.75 inches

What is the size of a U, the equipment rack unit of measure, used for specifying height?

A

What is the term used for the passage of a packet through a router? A hop B gateway C jump D metric

C

What kind of cable is described as a central conductor wire, surrounded by insulating materials, placed inside a braided metal shield? A unshielded twisted pair B shielded twisted pair C coaxial D fiber-optic

A

What layer of the OSI model refers to the code built into operating systems that enables network- aware applications? A. application B.Transport C.Session D.Presentation

Frame Type

What must match in the communications between all NICs on a network?

D

What network component is built into most PCs today? A Switch B router C Patch Panel D NIC

D

What network protocol do Linux and Apple (Macintosh) systems most commonly use today? A AppleTalk B NetBIOS/NetBEUI C IPX/SPX D TCP/IP

B

What oragnization provides a vvariety of industry wide cabling standards, such as those for serial, parallel, and FireWire? A IBM B IEEE C ISO D ARPA

D

What protocol (including version number) was adopted in 1994, and is now considered obsolete execept for small, private WANS A Border Gateway Protocol (BGP-4) B Open Shortest path first (OSPF) C Overloaded NAT D RIPv2

C B

What task(s) should you perform as soon as you finish configuring a router? Select all the correct answers in alphabetical order. A TRACEROUTE B Backup C Document D Turn on dynamic routing

Horizontal cabling

What term is used for the cabling that runs from the telecommunications room to the PCs?

C

What type of connector is used by all UTP Ethernet NICS A SC B RJ-11 C RJ-45 D ST

RJ-45

What type of connector is used by all UTP Ethernet NICs?

Multimode with ST or SC connectors

What type of fiber-optic cabling and connectors does a 100BaseFX network use?

1000BaseLX

What version of Gigabit Ethernet is being positioned as the Ethernet backbone of the future?

A

Which of the following statements about subnet masks is not true? A A 0 on the subnet mask indicates part of the network ID B All machines on the same network have the same subnet mask C the subnet mask can be expressed either in a dotted decimal or in the /x notation ( EX: 192.168.14.3 /24) D The subnet mask is the same length as the IP address

B

Which of the following statements best describes an IP address? A. It is a unique identifier burned into the NIC when it is manufactured B. It is a unique dotted decimal number assigned to ever network node C. It is a number shared by all computers on the same network D. It is a number assigned only to routes, identifying their priority ratings

It includes 64 bits of alternating ones and zeroes that ends with 11 to notify the receiving NIC that a frame is starting

Which of the following statements best describes the preamble of an Ethernet frame?

B

Which of the following subnet masks is an example of classless subnetting? A /8 B /12 C /16 D /24

It is more inexpensive, but is easier to install than the other 100 Mbps standards

Which of the following would NOT be a reason for an organization to use 100BaseFX Ethernet?

B

Which of the following would be a valid Area ID? A 192.168.30.4 B 0.0.0.0 C 192.168.30.0/24 D 1.33457

A

Which of these routing protocols is the oldest? A RIP B OSPF C BGP D IGRP

The frames are received by every NIC, but only the NIC with the matching MAC address processes the frame

Which statement best describes what happens to frames when the hub sends them to the NICs on the network?

UTP has a category rating

Which statement is true about Category ratings for cables?

B

Which statement is true about Category ratings for cables? A only cables used for networking receive a category rating B UTP has a category rating C Only STP has a category rating D only coaxial has a category rating

C

Which type of NAT is the most popular? A Source NAT B Static NAT C Overload NAT D Destination NAT

UTP

Which type of cabling does the 10BaseT standard specify?

D

Which type of cabling does the 10BaseT standard specify? A coaxial B fiber-optic C STP D UTP

A

Who assigns Autonomous System Numbers (ASNs)? A IANA B IETF C Autonomous System Administrator D Network Administrator

D

Who assigns area IDs A IANA B IETF C Autonomous System Administrator D Network Administrators

This encryption standard uses a 128-bit block cipher that is more difficult to crack than the 128-bit TKIP wrapper of the previous standard.

Wi-Fi Protected Access 2 (WPA2)

Which of the following installations of Windows can be used to create a HomeGroup?

Windows 7 Home Premium

Which of the following is a common example of an operating system designed for peer-to-peer networking?

Windows 98

What is the Windows Vista built-in spyware protection function called?

Windows Defender

You have been contracted to set up a network for a small business. The company currently has 100 users, and they are looking to expand. They want to use Microsoft Exchange Server for their e-mail and shared calendar feature What version of Windows Server would you suggest that they purchase?

Windows Essential Business Server

How do you renew a DHCP address on Windows, Mac, and Linux?

Windows: IPCONFIG renew ("ipconfig /renew"); Linux/Mac: IFCONFIG renew ("sudo ifconfig eth0 up")

This data encryption standard is the weakest of the wireless encryption standards, with many problems, including encryption that is easy to break; it only encrypts the Data Link and Physical layers, the key is static and shared, and there is no mechanism for performing user authentication.

Wired Equivalent Privacy (WEP)

Device Manager

With Windows, what can you use to verify that Windows recognizes a NIC and is ready to use it?

Does the Internet run on TCP/IP?

Yes

What is the name of the proprietary cable designed by Cisco for connecting to their routers?

Yost

Router

You can connect two very different networks by using ______.

Which of the following statements is true about Network+ certification?

You must pay a fee and sit for the test.

Why would you need to use a repeater?

You need to add a group of computers to your network, and the distance is too far for normal means of communication.

Why is it necessary to have a disposal and destruction of computer equipment policy?

You should have a disposal and destruction policy for computer equipment so that when equipment is decommissioned that the information on the components cannot compromise the security of the network and the organization.

Which file requires manual updates if Dynamic DNS is not used?

Zone files

What are you trying to discover when you test a cable for continuity?

a broken wire

What do wireless nodes in an IBSS use in place of the BSSID value in each packet?

a randomly generated value

While not malware, strictly speaking, this type of program monitors the types of Web sites you frequent and uses that information to create targeted advertisements, often pop-up windows.

adware

This type of device accepts something of the user, such as a fingerprint, retina scan, or voiceprint in place of a password.

biometric devices

Which of the following is a term that describes a log of performance and other indicators taken of a network and its server during normal operations?

baseline

can be divided in up to four primary partitions

basic disk

Which of the following describes exactly what a user can and cannot do with the organization's computers and network?

acceptable use policy

One job that a router performs is that of gatekeeper, which means that it can be configured to only allow certain packets access into the network based on a list of rules. What is that process called?

access control

Which of the following are not contained in a UDP Header?

ack number

When a wireless computer uses a peer-to-peer connection to directly connect to another wireless computer, it is operating in what mode?

ad hoc

What method of extending a wireless network creates an Extended Service Set?

adding a WAP

What is an example of classless subnetting?

anything with a wap/IP Network Prefix other than a multiple of 8 (ex. "/12")

This log records events related to a program, including starts, stops, and failures.

application

Which of the following commands displays lines that include both the IP address and MAC address of the target system?

arping

Which type of algorithm is used when two different keys are used in encryption?

asymmetric-key

When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the point where the receiving station can no longer interpret the signals correctly. What is the term for this phenomenon?

attenuation

What is a policy that defines the methods involved when a user logs on to the network called?

authentication

identifying who has access to network

authentication

Which of the following terms describes what rights, privileges, permissions, and actions a person has or can take with respect to a resource or system?

authorization

the process of granting or denying access to a user

authorization

Fiber optic cabling is often used as the ____________ for networks.

backbone

Compatibility issues stemming from newer equipment or applications when integrated with older or legacy ones are called:

backward compatibility

This nonrepudiation tool contains the digital signature of a third party guaranteeing the identity of the person who is passing out this digital tool.

certificate

When a file is encrypted, what color does the file name appear in Windows Explorer?

green

When monitoring a computer using Performance Monitor, you must add __________ to display real-time data on the line graph.

counters

War _____________ is the process of marking buildings, curbs, and other landmarks indicating the presence of an available access point and its connection details by utilizing a set of symbols and shorthand.

chalking

All of the following are considered good troubleshooting steps EXCEPT:

change multiple factors at once

Which of the following is used to describe a portion of available spectrum?

channel

Which settings should be modified when you have overlapping Wi-Fi signals?

channel and frequency

A wire map test checks for wiring errors and __________ faults.

cable

Which of the following is a tool that you can use to make UTP cables?

cable stripper

Which of the following is a tool that can tell you if there's a continuity problem or if a wire map isn't correct?

cable tester

What kind of DNS server has no responsibility for giving the names of its clients to other DNS servers?

cache-only server

This term applies to the process of storing data that someone asks for in the hope that someone else will ask for it again.

caching

What would an Asynchronous Transfer Mode (ATM) network be best suited for?

carrying voice data and time-sensitive information

In Linux, what is the command for viewing a file's contents onscreen?

cat

A clever administrator organizes users into this type of account.

group

What is the term used to explain what happens when packets are sent out on a network by two devices simultaneously, corrupting both packets?

collision

What events, characteristic to an Ethernet network using hubs, does using an Ethernet switch minimize or avoid?

collisions

What is the default status of IPv6 for Windows Server 2008?

complete support; active on default install

Which of the following is not a requirement for most small business networks?

complex WAN environment

_____________ cable has the best wiring value and expansion capability.

composite

What is the most common use of coaxial cable in networking today?

connecting a cable modem to an Internet Service Provider (ISP)

The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what?

convergence

Older OSs first used what type of multitasking, which allowed a process to monopolize the CPU's time until the process had completed its own task?

cooperative

Assigning permissions to this type of account makes keeping track of assigned permissions much easier.

group

This term describes an unauthorized person who is intentionally trying to access resources on your network.

hacker

copies all files changed the day the backup is made; doesn't mark files as backed up

daily backup

In spite of all attempts to protect networks, systems do fail, and when you rebuild a new system, you must have a recent one of these in order to get back up and running.

data backup

What is the main advantage of a point-to-point topology?

data travels on a dedicated link

The entrance facility is the place where the connection to a WAN is located. It is basically the point where the LAN begins and ends. What is another name for this point?

demarcation point

You position this lightly protected network between your firewall and the Internet, while your intranet is secure behind the firewall.

demilitarized zone

if the primary server fails, the secondary server takes over

failover cluster

Data backup, UPSes, backup generators, and redundant hardware all provide some form of this.

fault tolerance

Part of SONET's flexibility comes from its ability to be arranged in several different physical topologies. Which of the following is NOT a possible SONET topology?

fault tolerant bus

If a user is a member of more than one group, then the permissions to a single resource assigned to the different groups are combined. What is the term used to describe the resulting permissions.

effective

Minimize sharp bends in the cable, which can distort the _____________ characteristics of the cable.

electrical

When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called?

encapsulation

Which of the following is a compatibility issue with wireless networking?

encryption

In a NAT router, what is the name for an arbitrary number generated by the sending computer?

ephemeral port

What is the status of a port that is part of an active working endpoint pair?

established port

can only be divided into logical drives

extended partition

Security on a WLAN is accomplished by _______________ the MAC addresses of wireless NICs that are allowed to use the access point and by encrypting data sent over the wireless LAN.

filtering

This is a network's first line of defense against external threats.

firewall

An IP address consists of four octets separated by periods. Which part of this address denotes its class?

first octet

On an authoritative DNS server, what are the storage areas called that hold the IP addresses and names of systems for a particular domain or domains?

forward lookup zones

a point-to-point permanent virtual circuit (PVC) technology that offers WAN communications over a fast, reliable, digital packet-switching network

frame relay

Where do IPv6 addresses other than link-local get their subnet masks?

from their routers

a backup that copies all selected files to the selected media and marks files as backed up; also called a normal backup

full backup

NICs send and receive binary data as pulses of all of the following EXCEPT ___________.

gamma rays

Local connections do not use this, although every routing table has a column for it, and therefore, a value appears in this field for each route.

gateway

VPN connection between two routers

gateway-to-gateway

You are creating a new group for the Sales department. All of the users that will be in this group will need to have access to the same resources. What scope would you use for this group?

global

What term describes a practical application of a topology and other critical technologies that provide a method to get data from one computer to another on a network?

network technology

Hybrid topology

networks use more than one type of basic network topology.

When subnetting, will you always come out with the exact number you need?

no

When a collision occurs on a network relying on the CSMA/CD access method, what alerts the NICs?

nonstandard voltage

A junior network administrator tells you that he can ping a DNS server successfully, but he has not tested domain name lookups. What utility on the command line would you suggest your colleague use next?

nslookup

What is a network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS)?

nslookup

What program, available with Windows (except 9x), Linux, and NetWare, provides all types of information from a DNS server and allows you to change how your system uses DNS?

nslookup

Which of the following commands can you use to diagnose DNS problems on a Windows computer?

nslookup

Which of the following is a system component that can be measured in Windows Performance Monitor?

object

Category

of a cable will determine its speed.

D

of the following, which is fastest of UTP cabling? A. CAT5 B. CAT3 C. CAT5e D CAT6

a program that is loaded into memory

process

What is the name for the number used by the operating system to track all running programs?

process ID (PID)

Which of the following appear in the output from the netstat command when the command is run without switches?

proto, foreign address, local address, & state

Which of the following is not a function typically provided by the centralized management of a server-based network?

protocol analysis

A good one of these will give you Application, Session, Transport, Network, and Data Link layer information from every frame traveling through your network.

protocol analyzer

What kind of software would you use to view and troubleshoot protocol specific problems such as TCP retries caused by missed acknowledgements, or duplicate acknowledgements that cause network slow-down?

protocol analyzer

TCP/IP

provides an excellent tool for conceptualizing how a TCP/IP network works.

Which of the following is NOT an advantage of a physical star?

provides redundancy and fault tolerance

Network Interface Card (NIC)

provides the physical connection between the PC and the network.

What is the most popular form of e-mail encryption?

public-key cryptography

In event forwarding, under normal settings, the collecting computer uses a __________ method to obtain events from a source computer.

pull

Which of the following is a tool that positions UTP wires into a 66- or 110-block?

punchdown tool

You use the wecutil __________ command to enable and configure the Windows Event Collector service on a collecting computer.

qc

You use the winrm __________ command to enable and configure the Windows Remote Management service on a source computer.

quickconfig

Which of the following is not a form of electromagnetic interference, or EMI?

rain/fog

List four physical cable tests you can perform using a cable testing device.

• Locating miswired cables • Locating missing cables • Locating cables that don't support your network type (for example, 100 Base-T) • Testing hub connections • Testing PC connections • Testing installed cables • Testing patch cables • Locating and tracing inactive cables

Compare one-, two-, and three-factor authentication.

• One-factor authentication typically uses just something you know-a username and password. • Two-factor authentication adds something you have or something you are—the username and password are combined with a token or a biometric reading. • Three-factor authentication combines something you know, something you have, and something you are—typically a username and password, a token, and a biometric reading.


Conjuntos de estudio relacionados

ACCT 2100 Survey in Accounting Ch 2

View Set

NURB 3060 Heart and Neck Vessels Chp 19 Jarvis

View Set

The Musical Comedy of Murders of 1940: Marjorie Baverstock Lines

View Set

Ch. 32: Skin Integrity and wound care

View Set

TX GOVT 2306, Chap. 11, Homework, Prof. Clark, DMC

View Set

Chapter 3: Legal, Ethical, and Professional Issues in Information Security

View Set