6

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Given a host IP address of 172.16.1.154 and a subnet mask of 255.255.254.0, what is the network ID for this host?

172.16.0.0

Equipment data racks most commonly are a standard width of what measurement?

19 inches

An IP address of 192.168.18.73/28 has what network ID?

192.168.18.64

Which of the following IPv6 addresses represents a global unicast address?

2000::/3

What scenario describes an evil twin attack?

A malicious access point is configured with the SSID of a non-malicious public access point.

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service? a. Active Directory Domain Services (AD DS) b. Windows Named Resource Services (WN RS) c. Automated Directory Network Services (AD NS) d. Active Directory Federated Users (AD FU)

A) Active Directory Domain Services (AD DS)

What is the most popular web server application? a. Apache b. Microsoft Internet Information Services c. NGINX d. Lighttpd

A) Apache

Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company? a. master license agreement b. master service agreement c. memorandum of understanding d. service-level agreement

A) master license agreement

If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used? a. star topology b. star bus topology c. mesh topology d. bus topology

A) star topology

What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs? a. vertical cross connect b. diagonal cabling c. horizontal cross connect d. patch cable

A) vertical cross connect

What command can be used to check a domain computer's time source from a Command Prompt window? a. w32tm /query /source b. time --source c. ntpd show source d. date /source

A) w32tm /query /source

In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses?

AAAA record

Of all the DSL standards, which is the most commonly in use today?

ADSL

What mail protocol is used to send mail messages to a server?

SMTP

What mail protocol is used to send mail messages to a server?​

SMTP

Which of the following Layer 1 WAN technologies is not normally used as last mile service, but rather traverses multiple ISP networks, connecting these networks to the Internet backbone?

SONET (Synchronous Optical Network)

What statement regarding the SSH (Secure Shell) collection of protocols is accurate?

SSH supports port forwarding.

When using Spanning Tree Protocol, what is the first step in selecting paths through a network?

STP must first select the root bridge, or master bridge.

When using satellite services for your WAN connection, what statement is accurate?

Satellite services suffer more latency and jitter issues.

What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?​

Session Layer

When creating network diagrams, what icon description typically represents a network firewall?

An icon that resembles a brick wall.

What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system? a. ISO 9001 b. TIA/EIA-568 c. IEEE 802.3 d. ITU 922

B) TIA/EIA-568

What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? a. Transport Layer b. Application Layer c. Session Layer d. Presentation Layer

C) Session Layer

What type of documentation tool is a website that can be edited by users, allowing them to add files and photos and links between pages? a. spreadsheet b. workgroup c. co-op d. wiki

D) wiki

What type of diagram is a graphical representation of a network's wired infrastructure? a. topology map b. network diagram c. system diagram d. wiring schematic

D) wiring schematic

Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients. True False

False

Static electricity is an electrical charge in motion. True False

False

TCP uses a four-step process called a four-way handshake to establish a TCP connection.

False

The 1024 - 65535 range of ports is also known as the "well-known" range. True False

False

The Data Link layer attaches a trailer to the end of a packet, and does not include a header. True False

False

The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. True False

False

The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol. True False

False

The protocol data unit for the Physical layer of the OSI model is payload, or data. True False

False

True of False: UDP provides error checking, but not sequencing.

False

True or False: As a network support technician, you only need to know how to support IPv6.

False

True or False: IPv4 and IPv6 use the same packet format.

False

UDP provides error checking, but not sequencing.

False

In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?

Flow label

When using public and private keys to connect to an SSH server from a Linux device, where must your public key be placed before you can connect?

In an authorization file on the host where the SSH server is

What does the Common Address Redundancy Protocol do?

It allows a pool of computers or interfaces to share the same IP address.

What is the purpose of the checksum TCP field?

It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

At what point is a packet considered to be a giant?

It becomes a giant when it exceeds the medium's maximum packet size.

How does a line conditioning UPS protect network equipment?

It filters line noise from incoming power.

What does the MX record do in a forward DNS zone?

It identifies the e-mail server to be used for e-mail traffic for the domain.

A differential backup covers what data on a system?

It includes data that has changed since the last full backup.

What is the Nmap utility used for?

It is a port scanning utility that can identify open ports on a host.

What is a SIEM (Security Information and Event Management) system utilized for?

It is a system used to evaluate data from security devices and generate alerts.

When using RFID, what is an ARPT (Active Reader Passive Tag)?

It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.

When using Kerberos, what is the purpose of a ticket?

It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.

When an 802.1Q tag is added to an Ethernet frame, where is it placed?

It is inserted between the source address and the Ethernet type field.

What is routing protocol convergence time defined as?

It is the time it takes for the protocol to recognize the best path in the event of a network change.

What statement regarding the Server Message Block protocol is accurate?

It is used by Windows and UNIX-based operating systems to share files.

What is a data-link connection identifier (DLCI) utilized for?

It is used by routers to determine which circuit to forward a frame to in a frame relay network.

What is the ARPA domain suffix utilized for?

It is used for reverse DNS queries, and holds PTR records.

What is the purpose of the Layer 2 LLC sublayer?

It is used to handle multiplexing, flow and error control, and reliability.

What statement correctly describes "jitter"?

Jitter is what happens when packets experience varying amounts of delay and arrive out of order.

What routing metric affects a path's potential performance due to delay?

Latency

A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model?

Layer 2

At what layer of the OSI model does a network switch normally operate?

Layer 2

​A standard network switch operates at what layer of the OSI model?

Layer 2

​At what layer of the OSI model would a TCP or UDP header be added to a payload?

Layer 4

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?

Layer 7

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?​

Layer 7

Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read:​

Presentation

What 3-bit field in a 802.1Q tag is modified to set a frame's Class of Service (CoS)?

Priority Code Point (PCP)

Which adaptation of EAP utilizes EAP-MSCHAPv2 inside of an encrypted TLS tunnel?

Protected EAP (PEAP)

Which protocol designed to replace STP operates at Layer 3 of the OSI model?

Shortest Path Bridging (SPB)

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver while acknowledgement for the segment is outstanding?​

Sliding Window

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?

Sliding-window

Which of the following is an example of proxy server software?

Squid

​What physical network topology consists of all connected devices connecting to one central device, such as a switch?

Star Topology

You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information?

TXT record

You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?

The MTU for the network can be as high as 9198 bytes

You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?

The MTU for the network can be as high as 9198 bytes.

What happens when an NMS uses the SNMP walk command?

The NMS uses get requests to move through sequential rows in the MIB database.

What is NOT a variable that an network access control list can filter traffic with?

The operating system used by the source or destination device.

What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network?

The packet will be divided into smaller packets using fragmentation.

Considering that multiple users occupy the same channel when using CDMA, how are various calls using this technology kept separate?

The packets are coded such that individual calls can be distinguished.

What happens when a router receives a packet with a TTL of 0?

The router drops the packet and sends an ICMP TTL expired message back to the host

What happens when a router receives a packet with a TTL of 0?​

The router drops the packet and sends an ICMP TTL expired message back to the host

What happens when a router receives a packet with a TTL of 0? The router marks the packet as corrupted and forwards it to the next hop. The router attempts to forward the traffic on a local network The router drops the packet and sends an ICMP TTL expired message back to the host. The router resets the TTL to 128.

The router drops the packet and sends an ICMP TTL expired message back to the host.

How does the 802.11 data frame indicate how a large packet should be fragmented?

The sequence control field indicates how packets will be subdivided.

Diffraction has what affect on a wireless signal's propagation?

The signal is split into secondary waves that continue in the direction in which they split.

A port number, which identifies an application on a host, exists at what level of the OSI model?​

Transport

The segment or datagram protocol data unit exists at what layer of the OSI model?

Trasnport Layer

Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?

Trivial FTP (TFTP)

A hexadecimal number is a number written in the base 16 number system. True False

True

A master service agreement (MSA) is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements. True False

True

After a problem and its symptoms have been identified, a theory regarding a probable cause should be established. True False

True

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers. True False

True

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. True False

True

Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission. True False

True

Fiber-optic cable comes in two types: single-mode fiber (SMF) or multimode fiber (MMF). True False

True

IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets.

True

In general, a Layer 3 or Layer 4 switch is still optimized for fast Layer 2 data handling.

True

In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS. True False

True

The Border Gateway Protocol is considered to be a hybrid routing protocol.

True

The TIA/EIA standard for wall jacks in a work area require that at least one outlet be provided for data and one for voice. True False

True

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks. True False

True

The industry standard height for a rack in rack units is 42U. True False

True

The process of designing, implementing, and maintaining an entire network is called the system life cycle. True False

True

The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed. True False

True

True of False: On IPv4 networks, IGMP operates at the Network layer of the OSI model to manage multicasting.

True

True or False: IP is an unreliable, connectionless protocol.

True

UDP port 123 is utilized by the Network Time Protocol service. True False

True

When using IPv6, two or more nodes on the same link are said to be neighbors. True False

True

VMware Player and Linux KVM are both examples of what type of hypervisor?

Type 2 hypervisor

When viewing the routing table on a UNIX system, what flag indicates if a route is a usable route? H U G I

U

___'s lack of sophistication makes it more efficient than TCP.

UDP

​The Network Time Protocol service uses what port number?

UDP 123

You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?

Use the switchport port-security command to enable MAC filtering.

When dealing with a Cisco switch, what is NOT one of the pre-established VLANs?

VLAN 1001

Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?

VNC is open source, allowing companies to develop their own software based on VNC.

What is NOT a potential disadvantage of utilizing virtualization?

Virtualization software increases the complexity of backups, making creation of usable backups difficult.

A dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway, is known by what term?

VoIP PBX (private branch exchange)

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines?

VoIP gateway

When is it appropriate to utilize the NAT network connection type?

Whenever the VM does not need to be access at a known address by other network nodes.

Which of the following is an advantage of leasing a frame relay circuit over leasing a dedicated circuit?

You pay only for the bandwidth you require.

What scenario might be ideal for the use of root guard in configuring a switch?

You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP.

Which of the following scenarios would necessitate the use of a non-disclosure agreement?

Your company needs to prevent a new contractor from sharing information with a potential competitor.

Healing messages are a feature of what smart home protocol?

Z-Wave

What is the name of the GUI front end that is available for the Nmap utility?

Zenmap

If multiple honeypots are connected to form a larger network, what term is used to describe the network?

honeynet

What IPv6 field is similar to the TTL field in IPv4 packets?

hop limit

What command on Linux will display TCP/IP information associated with every interface on the device?​

ifconfig -a

Where is a demarc located in relation to the structured cabling of an enterprise environment?

in the Main Distribution Frame (MDF)

A snapshot is most similar to which type of backup scheme?

incremental backup

Which type of backup scheme only covers data that has changed since the last backup?

incremental backup

14. Equipment data racks most commonly are a standard width of what measurement?

a. 19 inches

4. What statement accurately describes what a cable bend radius determines?

a. A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data.

7. What statement correctly identifies the purpose of a software patch?

a. A software patch is a correction, improvement, or enhancement to software.

10. When creating network diagrams, what icon description typically represents a network router?

a. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.

3. What does a statement of work document do?

a. It documents in detail the work that must be completed for a particular object, and includes specifics such as tasks, deliverables, standards, payment schedule, and work timeline.

13. During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?

a. No more than 1 inch of the cable should be exposed.

24. What is NOT a TIA/EIA recognized cabling type that can be used for horizontal cabling?

a. RG-6 Coaxial

21. Where is a demarc located in relation to the structured cabling of an enterprise environment?

a. in the Main Distribution Frame (MDF)

1. A change coordinator functions as what type of manager?

a. project manager

Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?

acceptable use policy document

On certain Cisco products, what command can be used to create and send helper messages that support several types of UDP traffic, including DHCP, TFTP, DNS, and TACACS+?

ip helper-address

What command below can be used to display ​a complete summary of all network interfaces in a Windows computer?

ipconfig /all

A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem?

ipconfig /flushdns

On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?

iptables

What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP?

beacon frame

In Linux, what command can be used for viewing and setting wireless interface parameters?

iwconfig

When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?

jabber

Where are MPLS labels placed within a frame?

between the layer 2 header and the layer 3 header

What is NOT one of the ways in which networks are commonly segmented?

by device manufacturer

11. Which of the following is NOT a best practice when performing cable management?

c. Cable ties should be pulled tightly to keep cables from moving around in a bundle.

23. In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines?

c. VoIP gateway

25. What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer?

c. service-level agreement

8. What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs?

c. vertical cross connect

What TCP field below allows the receiving node to determine whether a TCP segment is corrupted during transmission?​

checksum

What type of door access control is a physical or electronic lock that requires a code in order to open the door?

cipher lock

The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?

clustering

22. What component of enterprise level structured cabling serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling?

d. entrance facility

15. Which of the following is a document that is sent as a request to vendors to submit a proposal for a product or service that your company wants to purchase?

d. request for proposal

Noise that can degrade or distort a signal on a network is measured with what unit?

decibels

The device where a telecommunications service provider network ends and an organization's network begins is referred to as what option below?​

demarc

Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?

denial-of-service attack

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?​

ping

When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on?

port 547

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

port numbers

The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?

principle of least privilege

What document addresses the specific concerns related to special access given to administrators and certain support staff?

privileged user agreement

A wireless node that is in active scanning mode transmits what special type of frame in order to find available access points?

probe frame

A change coordinator functions as what type of manager?

project manager

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

tailgating

What IEEE standard includes an encryption key generation and management scheme known as TKIP?

802.11i

What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?

802.1Q

PoE+ devices are defined by what IEEE standard?

802.3at

The wireless spectrum, as defined by the FCC, spans between which two frequencies?

9 kHz and 300 GHz

A highly available server is available what percentage of the time?

99.999%

What statement regarding the use of a network attached storage device is accurate?

A NAS can be easily expanded without interrupting service.

What statement describes a transmission flaw that is occurring due to attenuation?

A customer modem is continuously losing signal due to large distance from the transmitting device.

What statement regarding denial-of-service (DoS) attacks is accurate?

A denial-of-service attack prevents legitimate users from accessing normal network resources.

What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?

A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.

DNS follows a centralized database model, allowing for easier management of DNS records. True False

False

F5 Networks set the standard for the diagram symbols used to represent routers, switches, firewalls, and other devices. True False

False

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs. True False

False

5. What type of diagram is a graphical representation of a network's wired infrastructure?

b. wiring schematic

Ethernet is an example of what type of technology?​

baseband

Using the same network to deliver multiple types of communications services, such as video, voice, and fax, is known as:

Convergence

What is the minimal amount of voltage required to damage an electrical component? a. 100 volts b. 5 volts c. 1500 volts d. 10 volts

D) 10 volts

In the classful addressing scheme, what range of network addresses is considered a Class B? a. 192.0.0.x to 223.255.255.x b. 1.x.y.z to 126.x.y.z c. 224.x.y.z to 255.x.y.z d. 128.0.x.y to 191.255.x.y

D) 128.0.x.y to 191.255.x.y

Equipment data racks most commonly are a standard width of what measurement? a. 20 inches b. 30 inches c. 25 inches d. 19 inches

D) 19 inches

When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors? a. catastrophic failure b. interrupting failure c. temporary failure d. upset failure

D) upset failure

In a rack setup, a device called a KVM allows multiple consoles to connect to a single device on the rack. True False

False

During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?

No more than 1 inch of the cable should be exposed.

Any computer or device on a network that can be addressed on the local network is referred to as a:

Node

What OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises?

OC-48

Which statement does NOT accurately describe characteristics of the OSPF protocol?

OSPF requires very little CPU or memory resources

Which statement does NOT accurately describe characteristics of the OSPF protocol?

OSPF requires very little CPU or memory resources.

What federal agency is charged with safety and health in the workplace?

Occupational Safety and Health Administration (OSHA)

With VTP, where is the VLAN database stored?

On the switch that is known as the stack master.

What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?

OpenVPN

What do the first 24 bits of a MAC address represent?​

Organizationally Unique Identifier

Which of the following statements regarding the Point-to-Point (PPP) protocol is NOT accurate?

PPP can support strong encryption, such as AH or ESP.

In the TCP/IP model, what layer is considered so simple that it is ignored entirely?

Physical

What routing protocol criteria is defined as the time it takes to recognize a best path change in the event of a network outage?

convergence time

What routing protocol criteria is defined as the time it takes to recognize a best path change in the event of a network outage? administrative distance detection overhead calculation convergence time downed path detection

convergence time

20. When planning horizontal cabling, what is the maximum allowable distance that can be used?

d. 100 meters

9. When creating network diagrams, what icon description typically represents a network switch?

d. An icon that is rectangular, which contains four arrows pointing in opposite directions.

18. What statement regarding main distribution frame or main distribution facilities is accurate?

d. The MDF is the centralized point of interconnection for an organization's LAN or WAN.

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?

fail-open

A typical fiber termination kit should include what tool for cutting a clean slice through fiber strands?

fiber cleaver

When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change?

file integrity monitoring (FIM)

In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?

flow label

The Data Link Layer utilizes what name for its protocol data unit (PDU)?

frame

Enforcing a virtual security perimeter using a client's geographic location is known by what term?

geofencing

The Group Policy utility can be opened by typing what name into a Run box?

gpedit.msc

What term below is used to describe the outer-most layer of protective covering of a coaxial cable?

heath

Which of the following scenarios represents a phishing attempt?

An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.

Encrypted control of remote computers using the RDP protocol is accomplished using what port number? a. UDP 10000 b. TCP 3389 c. TCP 22 d. UDP 161

B) TCP 3389

At what layer of the OSI model does a network switch normally operate? a. Layer 3 b. Layer 4 c. Layer 2 d. Layer 5

C) Layer 2

What parameter can be combined with the traceroute command to instruct it to use ICMP echo requests instead of UDP datagrams?​

-I

What netstat command option lists only current connections, including IP addresses and port numbers?

-n

What top level domain is used for the air-transport industry?​

.aero

​What range of ports is referred to as the "well-known" range of ports?

0-1023

By default, what is the MTU size on a typical Ethernet network?

1500 bytes

A change coordinator functions as what type of manager? a. human resources manager b. time manager c. inventory manager d. project manager

D) project manager

What is the maximum supported throughput of a CAT6 cable?​

10 Gbps

By default, the pathping command sends how many pings per hop?​

100

When planning horizontal cabling, what is the maximum allowable distance that can be used?

100 meters

On a Cisco switch, what would the security association identifier be for VLAN 13?

100013

When using SNMP with TLS, what port do agents receive requests on?

10161

A network with 10 bits remaining for the host portion will have how many usable host addresses?

1022

What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling?

10GBase-T

A loopback IP address begins with what ​number?

127

An IPv6 address consists of how many bits?​

128

In the classful addressing scheme, what range of network addresses is considered a Class B?

128.0.x.y to 191.255.x.y

How many clusters of root servers exist?​

13

Near-field communication devices send data at what fixed frequency?

13.56 MHz

The 1000Base-LX utilizes light with what wavelength?

1300 nanometers

When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?

15

A network with a CIDR notation of /26 would have what subnet mask?

255.255.255.192

802.11ac Wave 2 devices can theoretically support how much maximum throughput?

3.47 Gbps

When terminating an Ethernet cable, about how far should the cable sheath extend into the plug?

3/8 inch

A modern ASN consists of how many bits?

32

How many cable pairs are needed for 1000Base-T transmission over CAT5e cable?​

4

How large is the 802.1Q tag that is added to an Ethernet frame when using VLANs?

4 bytes

How many data streams are used in 802.11ac Wave 2 devices?

4 data streams

WDM divides a beam of light into how many different wavelengths or colors?

40

Both 10GBase-ER and 10GBase-EW have what maximum distance limitation on a segment of single mode fiber?

40km

What is the maximum distance for 10GBase-ER and 10GBase-EW on a segment of single mode fiber?​

40km

What is the size of an ATM cell, including the header?

53 bytes

In an 802.11 data frame, what is the size of the frame check sequence field?

6 bytes

A fractional T1's bandwidth can be leased multiples of what data rate?

64 Kbps

In an ISDN connection, what amount of throughput did a single B channel provide?

64 Kbps

What is the maximum number of host IP addresses that can exist in a Class B network?

65,534

How many subnets can a /48 site prefix support?

65,536 subnets

​Which option below reflects the standard impedance of an RG-6 cable?

75 ohms

What is the industry standard angle for an Angle Polished Connector (APC)?

8 degrees

If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day?

8 seconds

Which of the following statements regarding the 802.11ac standard is NOT accurate?

802.11ac access points function more like a hub than a switch.

Which of the following statements describes a worm?

A program that runs independently of other software and travels between computers and across networks.

Which of the following is not a task handled by a router?

A router forwards broadcasts over the network

Which of the following is not a task handled by a router?

A router forwards broadcasts over the network.

What statement correctly identifies the purpose of a software patch?

A software patch is a correction, improvement, or enhancement to software

What statement correctly describes a stateless firewall?

A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.

Which of the following is NOT a range of IP addresses recommended for use in private networks? a. 127.0.0.0 through 127.255.255.255 b. 10.0.0.0 through 10.255.255.255 c. 172.16.0.0 through 172.31.255.255 d. 192.168.0.0 through 192.168.255.255

A) 127.0.0.0 through 127.255.255.255

What text editor can be used on Linux to view and edit the contents of a configuration file? a. Notepad b. edit c. Microsoft Word d. vim

D) vim

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? a. Both IPv4 and IPv6 protocols will be used on the network. b. The router serving the network will have a redundant spare. c. Two different IPv4 address spaces will exist on the same network segment. d. The network will exist on two separate segments, separated by a proxy.

A) Both IPv4 and IPv6 protocols will be used on the network.

What is a defining characteristic of a bus topology based network? a. Devices are daisy-chained together in a single line. b. Devices are connected to two adjacent devices, and communication priority is granted by a token. c. Devices are connected directly to a centralized networking device, known as a network switch. d. Devices are directly attached to a network router, which forwards data to intended destinations.

A) Devices are daisy-chained together in a single line.

If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used? a. EUI-64 b. UUID-128 c. MACin6 d. IEEE 802.36

A) EUI-64

What federal agency is charged with safety and health in the workplace? a. Occupational Safety and Health Administration (OSHA) b. Hazardous Materials and Safety Management (HMSM) c. Office Safety and Standards Department (OSSD) d. Workplace Safety and Hazard Administration (WSHA)

A) Occupational Safety and Health Administration (OSHA)

In the DNS hierarchy, where is information about how to find the top-level domain servers held? a. On the DNS root servers. b. On DNS caching-only servers. c. In the organization's forward lookup zone. d. In the hosts file on the local machine.

A) On the DNS root servers.

Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session? a. SIP b. LDAP c. TFTP d. NTP

A) SIP

What mail protocol is used to send mail messages to a server? a. SMTP b. POP3 c. IMAP4 d. HTTPS

A) SMTP

You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information? a. TXT record b. PTR record c. SRV record d. CNAME record

A) TXT record

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer? a. The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read. b. The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application. c. The Presentation layer describes the interface between two applications, each on separate computers. d. The Presentation layer is responsible for transporting Application layer payloads from one application to another.

A) The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem? a. ipconfig /flushdns b. ipconfig /refresh c. ipconfig /renew d. ipconfig /release

A) ipconfig /flushdns

What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention? a. POP3 b. SNMP c. SMTP d. HTTP

B) SNMP

When troubleshooting wireless issues, what statement is accurate?

Access points that use overlapping channels can cause interference with each other if they are too close.

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?

Active Directory Domain Services (AD DS)

Originally codified by ISO, what does the "intermediate system" in IS-IS (Intermediate System to Intermediate System) stand for?

An IS-IS capable network router

What is the most popular web server application?

Apache

In general, how much can a twisted-pair's cable be bent before data transmission may be impeded? a. No more than two times the diameter of the cable. b. No more than four times the diameter of the cable. c. No more than ten times the diameter of the cable. d. Twisted pair cable has a near infinite bend radius.

B)

When planning horizontal cabling, what is the maximum allowable distance that can be used? a. 1,000 feet b. 100 meters c. 100 feet d. 300 meters

B) 100 meters

Which of the following IPv6 addresses represents a global unicast address? a. FD00::/8 b. 2000::/3 c. FE80::10 d. FC00::/7

B) 2000::/3

When creating network diagrams, what icon description typically represents a network router? a. An icon that resembles a brick wall. b. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. c. An icon that is rectangular in shape, with squiggly lines on the front. d. An icon that is rectangular, which contains four arrows pointing in opposite directions.

B) An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.

When creating network diagrams, what icon description typically represents a network firewall? a. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. b. An icon that resembles a brick wall. c. An icon that is rectangular, which contains four arrows pointing in opposite directions. d. An icon that is rectangular in shape, with squiggly lines on the front.

B) An icon that resembles a brick wall.

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? a. fail-close b. fail-open c. fail-tolerant d. fail-dynamic

B) Fail-Close

What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node? a. MAC address b. IP address c. autonomous system address d. port address

B) IP address

What statement regarding the Server Message Block protocol is accurate? a. It is a protocol used for accessing network-based LDAP directories. b. It is used by Windows and UNIX-based operating systems to share files. c. It is a simple protocol used to synchronize block messages written to iSCSI drives on a network. d. It is a signaling protocol used to make a connection between hosts prior to data transfer.

B) It is used by Windows and UNIX-based operating systems to share files.

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? a. Layer 6 b. Layer 7 c. Layer 4 d. Layer 5

B) Layer 7

What statement accurately reflects what occurs when a message is too large to transport on a network? a. An ICMP error is generated, and the application must reformat the data for transmission. b. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP). c. The message is sent anyway, and is received by the destination as garbage data. d. The message is discarded and must be sent again.

B) The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting? a. at least 6 feet b. at least 3 feet c. at least 12 feet d. at least 3 inches

B) at least 3 feet

What component of enterprise level structured cabling serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling? a. intermediate distribution frame b. entrance facility c. network interface device d. main distribution frame

B) entrance facility

What type of tool would you utilize to terminate twisted pair wire on a 66 or 110 block? a. wire cinching tool b. punchdown tool c. block trimmer tool d. wire crimper tool

B) punchdown tool

Which of the following is a document that is sent as a request to vendors to submit a proposal for a product or service that your company wants to purchase? a. request for quote b. request for proposal c. memorandum of understanding d. statement of work

B) request for proposal

What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer? a. memorandum of understanding b. service-level agreement c. statement of work d. master service agreement

B) service-level agreement

​Which network routing protocol is a path vector protocol that sends updates between routers using TCP?

BGP

Which statement regarding the Border Gateway Protocol (BGP) is accurate?

BGP utilizes TCP for communicating updates.

Select the name of the free, open source software that is by far the most popular DNS server software:

BIND

In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

BPDU guard

In North America, what ISDN connection type used two B channels and one D channel?

Basic Rate Interface (BRI)

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

Both IPv4 and IPv6 protocols will be used on the network.

In what network topology are devices daisy-chained together in a single line?​

Bus Topology

What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate?

By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages.

Which of the following IP addresses would be a loopback IP address? a. 192.168.1.1 b. 169.254.0.1 c. 127.0.0.1 d. 224.0.0.1

C) 127.0.0.1

In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? a. PTR record b. A record c. AAAA record d. TXT record

C) AAAA record

When creating network diagrams, what icon description typically represents a network switch? a. An icon that resembles a brick wall. b. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. c. An icon that is rectangular, which contains four arrows pointing in opposite directions. d. An icon that is rectangular in shape, with squiggly lines on the front.

C) An icon that is rectangular, which contains four arrows pointing in opposite directions.

In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Transport c. Application d. Link

C) Application

Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination? a. The cable will lose its conductive properties. b. The termination will fail over time due to oxidation. c. The exposure of the cable can cause transmission interference between wires. d. Exposing more cable than necessary can cause corrosion of the copper wire.

C) The exposure of the cable can cause transmission interference between wires.

How do routers create a broadcast domain boundary? a. They listen to and direct broadcast traffic. b. They forward broadcasts only to necessary segments. c. They do not forward broadcast traffic. d. They only forward broadcasts that are intended for multiple subnets.

C) They do not forward broadcast traffic.

The TCP and UDP protocols both exist at what layer of the OSI model? a. Presentation b. Network c. Transport d. Application

C) Transport

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? a. if status b. ipconfig /all c. ifconfig -a d. ip show

C) ifconfig -a

Where is a demarc located in relation to the structured cabling of an enterprise environment? a. in the work area b. between the MDF and the IDF c. in the Main Distribution Frame (MDF) d. at the Intermediate Distribution Frame (IDF)

C) in the Main Distribution Frame (MDF)

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c? a. global address b. anycast address c. link local address d. multicast address

C) link local address

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name? a. ftp1.dallas b. ftp1 c. mycompany.com d. ftp1.dallas.mycompany.

C) mycompany.com

The DTE or endpoint device for a leased line is known as which device below?

CSU/DSU

Which type of multiplexing is defined by wavelength instead of frequency?​

CWDM

Which statement regarding the use of cable modems is NOT accurate?

Cable modems only operate at the Physical layer of the OSI model.

Which of the following is NOT a best practice when performing cable management?

Cable ties should be pulled tightly to keep cables from moving around in a bundle.

In metro settings, end-to-end, carrier-grade Ethernet networks can be established via what protocol?

Carrier Ethernet Transport

What is the minimum category of UTP cable required in order to support Gigabit speeds?

Cat 5e

What is the minimum category of UTP cable required in order to support Gigabit speeds?​

Cat 5e

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

Citrix Xen

Which of the following virtualization products is an example of a bare-metal hypervisor?

Citrix XenServer

Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m?

Class 1

When Comcast was found to be interfering with BitTorrent traffic, what method was being used?

Comcast was interjecting TCP segments with the RST (reset) field set.

Which of the following is NOT a best practice when performing cable management? a. A cable tester should be used to verify that each segment of cable is transmitting reliably. b. Cable should not be placed across a floor where they might be damaged by traffic. c. Grounding requirements should be followed when running cables. d. Cable ties should be pulled tightly to keep cables from moving around in a bundle.

D) Cable ties should be pulled tightly to keep cables from moving around in a bundle.

During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced? a. Each pair should be stripped of insulation so that it doesn't get caught in the jack. b. No less than 1 inch of the cable should be exposed. c. Each pair should be twisted around another pair to reduce cross talk. d. No more than 1 inch of the cable should be exposed.

D) No more than 1 inch of the cable should be exposed.

Which of the following is an example of encapsulation? a. The subtraction of a header from data inherited from the layer below in the OSI model. b. The modification of headers from a higher layer in the OSI model. c. The addition of a trailer to data inherited from the layer above in the OSI model. d. The addition of a header to data inherited from the layer above in the OSI model.

D) The addition of a header to data inherited from the layer above in the OSI model.

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines? a. VoIP MTA b. VoIP translator c. VoIP PBX d. VoIP gateway

D) VoIP gateway

What is the name of the GUI front end that is available for the Nmap utility? a. iMap b. VizMap c. GUINmap d. Zenmap

D) Zenmap

What command can you utilize to display TCP/IP configuration information for each network adapter installed? a. ipconfig /show b. ipconfig /full c. ipconfig /list d. ipconfig /all

D) ipconfig /all

When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on? a. port 546 b. port 67 c. port 68 d. port 547

D) port 547

What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet?

Differentiated Services (DiffServ)

​What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet?

Differentiated Services (DiffServ)

What makes up the first 6 bits of the 8-bit DiffServ field?

Differentiated Services Code Point (DSCP)

Which of the following suggestions can help prevent VLAN hopping attacks on a network?

Disable auto trunking and move native VLANs to unused VLANs.

What are the last two parts of a host name known as?​

Domain Name

What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?

Dynamic Multipoint VPN

Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols?

EIGRP

You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate?

EIGRP may not be available on non-Cisco routers

Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas. True False

False

What occurs when a collision happens on a network?

Each node on the network waits a random amount of time and then resends the transmission

What occurs when a collision happens on a network?

Each node on the network waits a random amount of time and then resends the transmission.

The process of adding a header to the data inherited from the layer above is called what option below?

Encapsulation

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?

FCS

Phone companies make use of what type of multiplexing in order to allow for phone services and DSL services over the same line?​

FDM

Select the IPv6 address below that indicates a global unicast address:

FE80::10

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?

Fail-Close

A 66 block is more suitable for data connections than the older 110 block. True False

False

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons. True False

False

If a Network layer protocol is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in a process known as:​

Fragmentation

What is the name for the protocol data unit (PDU) ​of the Data Link layer?

Frame

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?

Framing

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol

Framing. Three characteristics: Connection-oriented protocol, Sequencing and Checksums, Flow Control.

When using a Windows domain, what is the domain-level account for each user known as?

Global Account

What IPv6 field is similar to the TTL field in IPv4 packets?

Hop limit

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

IaaS

What protocol replaces ARP, IGMP, and ICMPv4 on IPv6 based networks?

ICMPv6

What protocol replaces ARP, IGMP, and ICMPv4 on IPv6 based networks? ICMPv6 BGPv6 IGMPv6 ARPng

ICMPv6

What IPv4 protocol handles multicasting for tasks such as videoconferencing or teleconferencing? ARP TCP IGMP ICMP

IGMP

What IPv4 protocol handles multicasting for tasks such as videoconferencing or teleconferencing?​

IGMP

What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?

IP address

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?​

Network

Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols?

Link-State protocols

Which of the following connectors is the most common for multimode fiber?​

MT-RJ

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

Material Safety Data Sheet (MSDS)

Which legacy authentication protocol requires mutual authentication?

Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)

What utility is the equivalent to the pathping command on a Linux system?

Mtr

What is the name for a client-server model with one server and many clients, such as when an application is used to watch a live sports event?​

Multicast Distribution

By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM?

NAT mode

Which statement accurately describes what near end crosstalk (NEXT) is?

NEXT is crosstalk that occurs between wire pairs near the source of a signal.

Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers?

Nessus

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?

Network

By far the most popular AAA service, what open-source service runs in the Application layer and can use UDP or TCP in the Transport layer?

RADIUS

What RFC outlines recommendations for private IP addresses?​

RFC 1918

Broadband cable Internet service and cable TV are most commonly delivered over long distances via what type of cable?

RG-6

The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?

Remote Desktop Protocol (RDP)

In a software defined network, what is responsible for controlling the flow of data?

SDN controller

Which type of DSL technology has equal download and upload speeds maxing out at around 2 Mbps?

SDSL

Which of the following statements correctly describes the SFP+ transceiver?

SFP+ is the same size as SFP, and supports a theoretical maximum transmission speed of 16 Gbps.

What statement regarding the different versions of the SHA hashing algorithm is accurate?

SHA-2 and SHA-3 both support the same hash lengths.

Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?

SIP

​Which protocol below is used to make an initial connection between hosts for transferring multimedia data, relying on other protocols once a connection is established?

SIP

On an ATM network, how is the path that data will take determined?

Switches determine the optimal path between sender and receiver, and then establish the path before transmission.

The IP connectionless protocol relies on what other protocol to guarantee delivery of data? ARP UDP ICMP TCP

TCP

​The IP connectionless protocol relies on what other protocol to guarantee delivery of data?

TCP

Encrypted control of remote computers using the RDP protocol is accomplished using what port number?

TCP 3389

What protocol is commonly used to request configuration files from another computer?​

TFTP

You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use?

TIA/EIA 568A

What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system?

TIA/EIA-568

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?

The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

Which of the following is an example of encapsulation?

The addition of a header to data inherited from the layer above in the OSI model.

In the typical social engineering attack cycle, what occurs at Phase 3?

The attacker exploits an action undertaken by the victim in order to gain access.

In a red team-blue team exercise, what is the purpose of the blue team?

The blue team is charged with the defense of the network.

A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue?

The cable must be a rollover cable.

What does backbone cabling consist of?

The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.

In Open System Authentication, how does authentication occur?

The client "authenticates" using only the SSID name. In other words, no real authentication occurs.

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

The computer is configured to use DHCP, but was unable to lease an address.

Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination?

The exposure of the cable can cause transmission interference between wires.

How can you determine the manufacturer of a NIC card based on the MAC address?

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?

The hosts will still send and receive traffic, but traffic may not always reach the correct destination

In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?

The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

Which of the following statements regarding IPv6 subnetting is NOT accurate?

The largest IPv6 subnet capable of being created is a /64.

If the EUI-64 standard is used, what part of an IPv6 address is affected?

The last four blocks of the address.

When viewing a syslog message, what does a level of 0 indicate?

The message is an emergency situation on the system.

What statement accurately reflects what occurs when a message is too large to transport on a network?

The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

Which statement regarding the use of a bridged mode vNIC is accurate?

The vNIC will its own IP address on the physical LAN.

A variant of BYOD, what does CYOD allow employees or students to do?

They can choose a device from a limited number of options.

Which of the following is not one of the disadvantages of peer-to-peer networks?

They centralize user account logins

​Which of the following is not one of the disadvantages of peer-to-peer networks?

They centralize user account logins. They do have scalability, are secure, and are practical for connecting large computers.

In a cellular network, where does each wireless base station connect to?

They connect to a mobile switching center.

How do routers create a broadcast domain boundary?

They do not forward broadcast traffic.

The TCP ___________________ is performed before TCP transmits the actual data

Three-way handshake

In IEEE terminology, a group of stations that share an access point are said to be part of which of the following?

basic service set

​A measure of a signal's strength at any given time is known as which term below?

amplitude

An RFID label on a box is an example of what type of physical security detection method?

asset tracking tagging

In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting?

at least 3 feet

What aspect of AAA is responsible for determining what a user can and cannot do with network resources?

authorization

19. In general, how much can a twisted-pair's cable be bent before data transmission may be impeded?

b. No more than four times the diameter of the cable.

6. Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination?

b. The exposure of the cable can cause transmission interference between wires.

17. A dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway, is known by what term?

b. VoIP PBX (private branch exchange)

12. What is the name of the GUI front end that is available for the Nmap utility?

b. Zenmap

16. In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting?

b. at least 3 feet

2. Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company?

b. master license agreement

​In Linux systems, what file contains the settings for the DHCP service?

dhcpd.conf

You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this?

dig @8.8.8.8 mycompany.com MX

How often should you require users to change their passwords?

every 60 days

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?

fail-close

What routing metric affects a path's potential performance due to delay?

latency

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

link local address

Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols?

link-state protocols

You've been handed a fiber with a 1.25-mm ferrule that requires a connector. What is the most commonly used connector for this ferrule size?

local connector (LC)

An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack?

man-in-the-middle attack

What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?

management frames

Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company?

master license agreement

Once a device has failed, what metric measures the average amount of time to repair?

mean time to repair (MTTR)

Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?

online UPS

What kind of tool can you use to measure voltage on a cable length?

multimeter

The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?

multiple input-multiple output (MIMO)

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?

mycompany.com

Select the protocol below that is used to synchronize clocks on computers on a network:

neighbors

The use of certificate authorities to associate public keys with certain users is known by what term?

public-key infrastructure

What type of tool would you utilize to terminate twisted pair wire on a 66 or 110 block?

punchdown tool

Telephone connections follow what registered jack standard?

registered jack 11 (RJ-11)

Which of the following is a document that is sent as a request to vendors to submit a proposal for a product or service that your company wants to purchase?

request for proposal

Packets that are smaller than a medium's minimum packet size are known by what term below?

runts

What command will set the native VLAN on a Juniper switch port?

set native-vlan-id

​What command can be used on a Cisco router to view the routing table?

show ip route

You are working on a Cisco switch and need to learn what VLANs exist on the switch. Which command will list the current VLANs recognized by the switch?

show vlan

What type of virtual circuit allows connections to be established when parties need to transmit, then terminated after the transmission is complete?

switched virtual circuit (SVC)

What type of cross-talk occurs between wire pairs near the source of a signal? ​

​near end cross talk

The Global System for Mobile Communications (GSM) utilizes what technology to create timeslots on a channel?

time division multiple access (TDMA)

Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com?

traceroute -I srv1.mycompany.com

An interface that manages traffic from multiple VLANs is known by what term?

trunk port

When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors?

upset failure

What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs?

vertical cross connect

What command can be used to check a domain computer's time source from a Command Prompt window?

w32tm /query /source

The number of times that a wave's amplitude cycles from its starting point, through its highest amplitude and its lowest amplitude, and back to its starting point over a fixed period of time, is known as ​what term below?

wavelength

When viewing the pinout for T568B, what is the correct order of wire colors, starting at pin 1?

white/orange, orange, white/green, blue, white/blue, green, white/brown, brown

What type of diagram is a graphical representation of a network's wired infrastructure?

wiring schematic

What Ethernet standard below is also referred to as "thinnet"?​

​10Base2

Standard PoE devices ​must be provided with how much power in order to function?

​15.4 watts

A device that is responsible for modulating digital signals into analog signals, and demodulating analog signals into digital signals at the receiving end, is known as?​

​A modem

The most common multiplexing technology used in conjunction with fiber optics is which option below

​DWDM

Since cable TV and cable ​Internet can share the same coaxial cable, they are considered to be what type of technology?

​broadband

In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?​

​flow label

What type of routing protocol enables routers to communicate beyond neighboring routers, allowing each router to create a map of an entire network?​

​link state

Using a form of transmission that allows multiple signals to travel simultaneously over one medium is known as which of the following options?​

​multiplexing

What parameter can be combined with the traceroute command to instruct it to use ICMP echo requests instead of UDP datagrams? -I -d -p -n

-I

In the United States, who is able to activate the Emergency Alert System at the national level? a. The Federal Bureau of Investigation b. Local law enforcement c. The President d. Any U.S. state or territory

C) The President

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? a. Network b. Transport c. Session d. Application

A) Network

What statement regarding main distribution frame or main distribution facilities is accurate? a. The MDF is the centralized point of interconnection for an organization's LAN or WAN. b. The MDF provides intermediate connection between the IDF and end-user equipment on each floor. c. The MDF refers to the racks holding network equipment in an organization. d. The MDF and entrance facility are always in separate rooms.

A) The MDF is the centralized point of interconnection for an organization's LAN or WAN.

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? a. The computer is configured to use DHCP, but was unable to lease an address. b. The computer has been assigned a routed public IP address. c. The network card is set up for multicast communication. d. The network card has been erroneously assigned a loopback address.

A) The computer is configured to use DHCP, but was unable to lease an address.

What part of a MAC address serves as the extension identifier, or device ID? a. The last 24 bits of the MAC address. b. The last 12 bits of the MAC address. c. The first 12 bits of the MAC address. d. The first 24 bits of the MAC address.

A) The last 24 bits of the MAC address.

When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?

15 hops

If the VLAN tag is present in an Ethernet frame, what is the maximum frame size?

1522 bytes

What is the ARPA domain suffix utilized for? a. It is used for reverse DNS queries, and holds PTR records. b. It is used to announce records for other TLDs such as .com and .net. c. It is a specialized government restricted TLD. d. It is a private TLD used for synchronization of zones between servers.

A) It is used for reverse DNS queries, and holds PTR records.

Which of the following is not a task handled by a router? A router can connect dissimilar networks. A router can reroute traffic if the path of first choice is down but a second path is available. A router forwards broadcasts over the network. A router can interpret Layer 3 and often Layer 4 addressing.

A router forwards broadcasts over the network.

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options? a. Material Safety Data Sheet (MSDS) b. Dangerous and Hazardous Waste Disposal Sheet (DHWDS) c. Environmental Chemical Hazard Sheet (ECHS) d. Toxic Chemical Safety Procedure (TCSP)

A) Material Safety Data Sheet (MSDS)

Which of the following is not one of the disadvantages of peer-to-peer networks? a. They centralize user account logins. b. They lack scalability. c. They are not necessarily secure. d. They are impractical for connecting large numbers of computers.

A) They centralize user account logins.

In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire? a. fire suppression agent b. fire extinction agent c. extinguishing medium d. eliminating factor

A) fire suppression agent

What does a statement of work document do? a. It is a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer, such as the service provided by an ISP. b. It documents in detail the work that must be completed for a particular object, and includes specifics such as tasks, deliverables, standards, payment schedule, and work timeline. c. It documents the intentions of two or more parties to enter into a binding agreement, or contract, and is sometimes used between an informal handshake and the legally binding signatures on contracts. d. It is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements.

B) It documents in detail the work that must be completed for a particular object, and includes specifics such as tasks, deliverables, standards, payment schedule, and work timeline.

In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Application c. Physical d. Data Link

C) Physical

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy? a. fail-tolerant b. fail-open c. fail-close d. fail-oriented

B) fail-open

The Data Link Layer utilizes what name for its protocol data unit (PDU)? a. bit b. frame c. packet d. data

B) frame

Which network routing protocol is a path vector protocol that sends updates between routers using TCP? BGP OSPF RIP IS-IS

BGP

What does the MX record do in a forward DNS zone? a. It holds the alternative names for a host. b. It identifies the authoritative name server for a domain. c. It identifies the e-mail server to be used for e-mail traffic for the domain. d. It identifies the hostname and port of a computer that hosts a specific network service, such as FTP or SIP.

C) It identifies the e-mail server to be used for e-mail traffic for the domain.

What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate?

By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host? a. domain names b. MAC addresses c. port numbers d. IP addresses

C) port numbers

What statement accurately describes what a cable bend radius determines? a. A cable bend radius determines the total number of bends that can exist in an overall cable before data is impaired. b. A cable bend radius is the radius of the minimum arc into which you can loop the cable without impairing data. c. A cable bend radius defines the twist rate of the cable inside of the insulation. d. A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data.

D) A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data.

What is by far the most popular DNS server software available? a. Oracle Resolver b. Microsoft DNS c. Dnsmasq d. BIND

D) BIND

The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address? a. DAC (Data Access Control) address b. DAC (Digital Access Control) address c. PAC (Packet Access Control) address d. MAC (Media Access Control) address

D) MAC (Media Access Control) address

What is NOT a TIA/EIA recognized cabling type that can be used for horizontal cabling? a. shielded twisted pair (STP) b. unshielded twisted pair (UTP) c. fiber-optic d. RG-6 Coaxial

D) RG-6 Coaxial

The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions? a. File Transfer Protocol (FTP) b. Secure Shell (SSH) c. Secure Sockets Layer (SSL) d. Remote Desktop Protocol (RDP)

D) Remote Desktop Protocol (RDP)

What does backbone cabling consist of? a. It is cabling that connects workstations to the closest data room and to switches housed in the room. b. Short length cables with connectors at both ends. c. The shielded cables that are used for high data transmission rates between an organization and an ISP. d. The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.

D) The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.

How can you determine the manufacturer of a NIC card based on the MAC address? a. The first 12 bits and last 12 bits combined are known as the Organizationally Unique Identifier. b. The last 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. c. The middle 24 bits, known as the Organization Universal Identifier, identify the manufacturer. d. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

D) The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network? a. The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination. b. The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed. c. The packet will be dropped silently, requiring the communicating application try again. d. The packet will be divided into smaller packets using fragmentation.

D) The packet will be divided into smaller packets using fragmentation.

A dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway, is known by what term? a. VoIP router b. VoIP ATB (analog telephone branch) c. VoIP LEC (local exchange carrier) d. VoIP PBX (private branch exchange)

D) VoIP PBX (private branch exchange)

You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this? a. dig --server 8.8.8.8 --type=mx mycompany.com b. dig -s 8.8.8.8 -t mx mycompany.com c. dig query 8.8.8.8 domain mycompany.com type mx d. dig @8.8.8.8 mycompany.com MX

D) dig @8.8.8.8 mycompany.com MX

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? a. ifconfig b. route c. traceroute d. ping

D) ping

IPv4 and IPv6 use the same packet format.

False

Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm.

False

The Transport layer header addresses a receiving application by a number called a MAC address. True False

False

What is routing protocol convergence time defined as?

It is the time it takes for the protocol to recognize the best path in the event of a network change

At what layer of the OSI model would a TCP or UDP header be added to a payload? Layer 4 Layer 1 Layer 7 Layer 2

Layer 4

ICMP (Internet Control Message Protocol) is a _______ layer core protocol that reports on the success or failure of data delivery.

Network

What tcpdump command can be used to filter out all traffic except SSH traffic?

tcpdump port 22

What command can be used on a Cisco router to view the routing table? route print netstat -r route show ip route

show ip route

What statement correctly identifies the purpose of a software patch? a. A software patch is a major change to a software package that enhances the functionality and features of the software, while also correcting bugs and vulnerabilities. b. A software patch involves the process of reverting to a previous version of software after attempting to upgrade it. c. A software patch is a container for new software, and must be installed on relevant devices and incorporated with network resources. d. A software patch is a correction, improvement, or enhancement to software.

d) A software patch is a correction, improvement, or enhancement to software.

What TCP field below allows the receiving node to determine whether a TCP segment is corrupted during transmission? checksum TCP header length sliding window acknowledgement number

checksum

In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to? traffic exchange flow label group ID traffic class

flow label

What type of routing protocol enables routers to communicate beyond neighboring routers, allowing each router to create a map of an entire network? link state distance vector map extension exterior gateway

link state

What command will list only current connections, including IP addresses and port numbers?

netstat -n

Which command will produce statistics about each message transmitted by a host, separated according to protocol type?

netstat -s

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver while acknowledgement for the segment is outstanding? urgent pointer URG flag sliding window sequence number

sliding window

The receiving host de-encapsulates the message at each layer in _______ order and then presents the payload to the receiving application.

reverse

A _______ joins two or more networks and passes packets from one network to another.

router


Kaugnay na mga set ng pag-aaral

BUS 491 (Business Intelligence Resources)

View Set

Disability Income and Related Insurance - Health/Dis WA State

View Set

Chapter 22, Immune System, TTC Objectives Bio 211

View Set

PEDS Green Book Questions Chapters 7 and 8

View Set

Phase 1A PRACTICE QUESTIONS for Dog Social Development

View Set

Administrative Medical Assisting Ch5

View Set