NET+ Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.) Input the authentication password. Enter the network SSID. Choose the correct security type. Set the IP address. Activate the Bluetooth antenna. Change the MAC address.

-Input the authentication password. -Enter the network SSID. -Choose the correct security type. In order to connect an Android or IOS device to a Wi-Fi network manually, perform these steps: Enter the network SSID of the wireless network. Choose the security type used by the wireless network. Input the password to authenticate successfully.

Which three items should be documented after troubleshooting an internal web server crash? (Choose three.) -when the problem occurred -the dialogue with the user -the configuration of all networking devices on the LAN at the time of the crash -the configuration of all hosts on the LAN at the time of the crash -steps that were performed to identify the cause of the problem -steps that were performed that failed to identify the cause of the problem

-steps that were performed to identify the cause of the problem -steps that were performed that failed to identify the cause of the problem -when the problem occurred Proper documentation is a very important step in troubleshooting. The proper documentation can help troubleshoot the same or similar problems in the future. The documentation should include as much information as possible about the following: the problem encountered steps taken to determine the cause of the problem steps to correct the problem and ensure that it will not reoccur

Match the router prompt to the configuration task. 1. configure vty lines 2. configure a WAN interface 3. enter configuration mode 3. add a password required to access the privileged EXEC mode

1. RouterA(config-line)# 2. RouterA(config-if)# 3. RouterA# 4. RouterA(config)#

1. Displays IP settings on host 2. Displays network connections 3. tests end to end connectivity bw hosts 4. displays the route that is taken to the destination 5. asks the name server for information on the destination

1. ipconfig 2. netstat 3. ping 4. tracert 5. nslookup

A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude these two IP addresses? -192.168.30.0/24 and 192.168.30.255/24 IP addresses are reserved for the email and DNS servers. -192.168.30.0/24 and 192.168.30.255/24 IP addresses are reserved for outside Internet connectivity. -192.168.30.0/24 is the network IP address and 192.168.30.255/24 is the IP broadcast address. -192.168.30.0/24 is the IP address reserved for the default gateway, and 192.168.30.255/24 is the IP address reserved for the DHCP server.

192.168.30.0/24 is the network IP address and 192.168.30.255/24 is the IP broadcast address. The IPv4 addressing system is a hierarchical addressing system. An IPv4 address is made up of two parts, the network address and the host address. When the host portion is all "0s" in binary, it is designated as a network address. When the host portion is all "1s" in binary, it is designated as a broadcast address. These two addresses cannot be assigned to individual hosts.

Which address prefix range is reserved for IPv4 multicast? 240.0.0.0 - 254.255.255.255 224.0.0.0 - 239.255.255.255 169.254.0.0 - 169.254.255.255 127.0.0.0 - 127.255.255.255

224.0.0.0 - 239.255.255.255 Multicast IPv4 addresses use the reserved class D address range of 224.0.0.0 to 239.255.255.255.

What is the minimum size of a valid Ethernet frame? 48 bytes 64 bytes 96 bytes 128 bytes

64 bytes Ethernet standards define a frame with a minimum of 64 bytes and a maximum of 1518 bytes including fields of destination MAC address, source MAC, Length/Type, data payload, and FCS.

Which two ports can be used for the initial configuration of a Cisco router? (Choose two.) AUX console flash slot LAN interface WAN interface

AUX console The AUX and console ports on a Cisco 1941 router can be used to perform initial setup. The initial setup does not require that the router be connected to a network. A network administrator uses a computer to connect to the console ports directly. A network administrator can also access the router remotely through a dialup phone line and a modem connected to the AUX port. LAN and WAN interfaces are used to connect to networks. The flash slots expand storage capability through the use of a compact flash card.

An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?

Brute Force

Which protocol is used to automatically assign IP addresses to hosts? DNS NAT DHCP HTTP

DHCP DHCP, or Dynamic Host Configuration Protocol, is used to automatically assign IP addresses to hosts that are configured as DHCP clients

What are two advantages of using fiber-optic cabling to interconnect devices? (Choose two.) Fiber-optic cable is immune from EMI and RFI. Fiber-optic cables can extend several miles. Fiber-optic cables use extra shielding to protect copper wires. Fiber-optic cables are easy to install.. Fiber-optic cables are commonly found in both homes and small businesses

Fiber-optic cable is immune from EMI and RFI. Fiber-optic cables can extend several miles. Fiber-optic cables provide immunity to both EMI and RFI and a single cable can extend for several miles before regeneration is needed.

Which protocol is used by web servers to serve up a web page? FTP HTTP IMAP POP

HTTP Hypertext Transfer Protocol (HTTP) is a protocol that is used by web servers to serve up a web page.​

Which protocol is used to transfer web pages from a server to a client device? HTML SMTP HTTP SSH POP

HTTP The Hypertext Transfer Protocol (HTTP) provides services between a web browser requesting web pages and a web server responding to the requests. HTML (Hypertext Markup Language) is a markup language to instruct a web browser how to interpret and display a web page.

What is a purpose of an IP address? It identifies the physical location of a data center. It identifies a location in memory from which a program runs. It identifies a return address for replying to email messages. It identifies the source and destination of data packets.

It identifies the source and destination of data packets. Packets that are routed across the Internet contain source and destination IP addresses. These addresses are used to determine how the packets should be routed from source to destination by intermediate devices.

Which type of device filtering can be enabled on some wireless access points or wireless routers? authentication IP address user ID MAC address

MAC address On wireless access points, MAC addresses can be manually entered to filter which devices are allowed on the wireless network

A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used? Bluetooth NFC Wi-Fi 3G

NFC NFC is a wireless technology that allows data to be exchanged between devices that are in very close proximity to each other.

Which technology is used to uniquely identify a WLAN network? MAC address table SSID WEP WPA

SSID When a wireless AP or router is being set up, an SSID is configured to uniquely identify the WLAN that is managed by the device.

What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?​ ping of death SYN flooding phishing brute force

SYN Flooding SYN flooding is a type of denial of services attack where the attacker sends fake session requests to a target host in an attempt to prevent the host from responding to legitimate session requests.​

What type of Internet connection would be best for a residence in a remote area without mobile phone coverage or wired connectivity? dial-up cellular satellite DSL

Satellite Satellite Internet service provides the best option for a home user that would otherwise have no Internet connectivity at all. Cellular Internet is only available in areas with mobile phone coverage.

Why do streaming audio and video applications use UDP instead of TCP? -Streaming audio and video applications require receipt of all packets regardless of delay. -The three-way handshake used in UDP speeds up the audio and video streams. -Streaming audio and video applications cannot tolerate the delay caused by retransmission. -UDP provides guaranteed segment delivery to provide reliable audio and video streams..

Streaming audio and video applications cannot tolerate the delay caused by retransmission. UDP is a 'best effort' delivery system that does not require acknowledgment of receipt and is the preferred transport service for streaming audio and video. UDP provides low overhead and does not implement as much delay as TCP. Streaming audio and video cannot tolerate network traffic congestion and long delays.

Which type of network cable is commonly used to connect office computers to the local network? coaxial cable twisted-pair cable glass fiber-optic cable plastic fiber-optic cable

Twisted Pair Cable Twisted-pair is a type of copper cable used to interconnect devices on a local network.

A ________ is a computer that is infected with malicious software and instructed to join a botnet.

Zombie

What advantage does SSH offer over Telnet? -encryption -more connection lines -connection-oriented services -username and password authentication

encryption Both Telnet and SSH are used to remotely connect to a network device for management tasks. However, Telnet uses plaintext communications, whereas SSH provides security for remote connections by providing encryption of all transmitted data between devices.

Which advanced wireless security measure allows a network administrator to keep sensitive data secure as it travels over the air in a wireless network? encryption authentication traffic filtering MAC address filtering

encryption Encryption is used to secure plaintext data that would be viewable traveling over a wireless network.

What are three advantages of using private IP addresses and NAT? (Choose three.) -conserves registered public IP addresses -reduces CPU usage on customer routers -creates multiple public IP addresses -hides private LAN addressing from outside devices that are connected to the Internet -permits LAN expansion without additional public IP addresses -improves the performance of the router that is connected to the Internet

hides private LAN addressing from outside devices that are connected to the Internet permits LAN expansion without additional public IP addresses conserves registered public IP addresses Private IP addresses are designed to be exclusively used for internal networks and they cannot be used on the Internet. Thus they are not visible directly from the Internet and they can be used freely by network administrators for internal networks. In order for the internal hosts to access the Internet, NAT is used to translate between private and public IP addresses. NAT takes an internal private IP address and translates it to a global public IP address before the packet is forwarded.

What is a disadvantage of deploying a peer-to-peer network model? difficulty of setup lack of centralized administration high degree of complexity high cost

lack of centralized administration The simplest peer-to-peer network consists of two computers that are directly connected to each other through the use of a wired or wireless connection. The primary disadvantages of a peer-to-peer network are its lack of central administration, minimal security, and its lack of scalability.

The functions of which two layers of the OSI model are matched to the network access layer of the TCP/IP model? (Choose two.) application physical transport network data link

physical data link The application layer of the TCP/IP model is composed of the application, presentation, and session layers of the OSI model and is used by network applications to complete specific tasks. The network access layer of the TCP/IP model is composed of the physical and data link layers of the OSI model and describes how a device accesses and sends data over the network media.

Which three attacks exploit human behavior? (Choose three.) pretexting brute force phishing zombies vishing malware

pretexting phishing vishing

Which three pieces of information are revealed by the ipconfig command (without the /all switch)? (Choose three.) IP address DHCP server subnet mask default gateway DNS server MAC address

subnet mask default gateway IP address The ipconfig command is used to display the current TCP/IP network configuration values of the device. This includes the IP address; the subnet mask and the default gateway addresses. Using the ipconfig /all switch displays additional information like the physical address of the device and the DHCP server address among other things.

Which three pieces of information are identified by a URL? (Choose three.) the MAC address of the web server the protocol that is being used the domain name that is being accessed the IP address of the gateway the version of the browser the location of the resource

the protocol that is being used the domain name that is being accessed the location of the resource URLs are used to access specific content on a web server through a web browser. The URL identifies the protocol that is being used such as HTTP or FTP, the domain of the server, and the location of the resource on the server.

What was the reason for the creation and implementation of IPv6? to make reading a 32-bit address easier to relieve IPv4 address depletion to provide more address space in the Internet Names Registry to allow NAT support for private addressing

to relieve IPv4 address depletion IPv4 addressing space is exhausted by the rapid growth of the Internet and the devices connected to the Internet. IPv6 expands the IP addressing space by increasing the address length from the 32 bits to 128 bits, which should provide sufficient addresses for future Internet growth needs for many years to come.

At which layer of the TCP/IP model does TCP operate? transport application internetwork network access

transport TCP is the Transmission Control Protocol and it operates at the transport layer of the TCP/IP model. TCP ensures that IP packets are delivered reliably.

Which step should be taken next once a problem is resolved during a troubleshooting process? Consult an FAQ. Escalate the problem. Update the documentation. Run remote access software.

update the documentation Proper documentation can help troubleshoot the same or similar problems in the future. Proper documentation should include the type of error encountered, the steps taken to determine the cause of the problem, and the steps taken to correct the problem.

When is an IP address required to be configured on a Cisco LAN switch? -when the switch is connected to another switch - when the switch must forward LAN traffic - when the switch needs to be managed through an in-band connection - when the switch is configured from a computer connected to the console port

when the switch needs to be managed through an in-band connection A LAN switch uses Layer 2 addresses to determine how to forward packets. An IP address is only necessary if the switch needs to be remotely managed through an in-band connection on the network.


Kaugnay na mga set ng pag-aaral

BOC Exam Review--Section 6: Acute Care of Injuries & Illnesses (Long & Hale)

View Set

AP Chemistry Mid Term Multiple Choice

View Set

QQ - Sacrament Vocabulary Review

View Set

Understanding Business Chapter 7

View Set

Chapter 23 - IPv4 Troubleshooting Tools

View Set

Solving Systems of Linear Equations

View Set

NUR 210 ATI Custom Practice Quiz No 3

View Set

The Accounting Cycle: Accruals and Deferrals Quiz

View Set