Network+ Exam 1, Network+ Exam 2, Network+ Exam 3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the Internet standard MTU?

1,500 bytes

Which of the following addresses can be identified as an APIPA address?

169.254.0.1

Wilson Breweries has called you to its office space to troubleshoot an error wherein there is an issue with outgoing email messages as a result of which the logistics are getting delayed. Which of the following ports would you troubleshoot to sort out this issue?

25

What decimal number corresponds to the binary number 11111111?

255

What is the secure port for HTTPS?

443

Which of the following manages the dynamic distribution of IP addresses to devices on a network?

A DHCP

Pisces Ltd. is a small logistics firm operating out of Los Angeles. The organization has a small array of seven computers for the functioning of its administration. They have requested a network engineer from Softnet Solutions to suggest why they should opt for a P2P network model instead of a client-server network model. In this scenario, which of the following statements would be the appropriate reason for Pisces Ltd. to opt for a peer-to-peer network model according to you?

A network operating system is much more expensive than a desktop operating system.

Which of these is considered a secure place to store a list of documented network passwords?

A password manager

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

All devices on your local network

Which of the following terms is also referred to as a "network of networks"?

Backbone

Which transmission characteristic is never fully achieved?

Bandwidth

The University of Kingston has hired you to install a private area network for its campus so that students and teachers from various departments can exchange data among themselves. Which of the following network models would be best suited for such an institution?

CAN

You are the DNS administrator and have been tasked to hold alternative names for a host that is a newly established start-up venturing into the business of ecommerce. The start-up wants its clients to be directed to the appropriate page whenever they request for alternative names. Which of the following resource records would you apply as a DNS administrator in such a case?

CNAME record

Which of these categories of twisted-pair cable can support Gigabit Ethernet?

Cat 5e, Cat 6a, Cat 7

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters?

Cat 6a

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

Checksum

While analyzing an intermittent error, James, an independent contractor for HKV Infrastructures, finds that the destination host is constantly asking the source to retransmit the data. He finds that the bug might be related to the transport layer of the OSI model. Since the TCP provides reliable delivery protocols, analyze which of the following characteristics of the TCP protocol James should check to fix this error.

Checksum

The University of Philadelphia wants you to format an IPv4 address through which the dean of the university wants to go on a videoconference with the teaching staff about certain educational norms which they plan on implementing. Which of the following classes of classful addressing will you apply to deliver the requirement?

Class D

A network consists of five computers, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?

Client-server

What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network?

Default gateway

What is a small file containing verified users' identification information and public key known as?

Digital certificate

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?

EF

Which function of WPA/WPA2 security ensures data cannot be read in transit?

Encryption

When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself?

FE80::/64

You, as a network administrator, want to set up an FTP for remote file access. You also want to add an added layer of protection so that you can encrypt both the data and control channels. Which of the following technologies will you apply in such a case?

FTPS

In the event of a fire, the most appropriate failure policy is a ____ policy.

Fail-open

What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?

Fiber type mismatch

In the client-server model, what is the primary secure protocol used for communication between a browser and web server?

HTTPS

What is the purpose of the TXT (text) DNS resource record?

Holds any type of free-form text

Which two protocols manage neighbor discovery processes on IPv4 networks?

ICMP and ARP

Katy, a senior technician, wants to document all the devices that are connected to the network of Ford Industries, which has a large complex network. She wants to ensure that all information in the network, including the hostnames, manufacturer names, operating systems, and IP addresses, are well-documented. Which of the following tools should she opt for to carry this out?

IP scanner

Which encryption protocol does GRE use to increase the security of its transmissions?

IPsec

Which of the following would you use to provide a set of rules for encryption, authentication, and key management for TCP/IP transmissions?

IPsec

Which one of the following wireless transmission types requires a clear LOS to function?

IR

Hilary has been working on a pilot project for a start-up on which she has been testing the maximum bytes for the length of an IP packet. As her intended IP packets are larger than what the network allows, she has to break them up into smaller packets for transmission. Analyze and suggest which of the following fields Hilary should use in an IPv4 packet so that the receiving host is able to identify and reassemble the fragmented messages.

Identification

As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?

Identify the problem.

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

Integrity

Which of the following devices are you likely to find in the MDF? Choose all that apply.

KVM switch Switches Routers

What is a collection of accumulated insights and solutions to problems encountered in a particular network known as?

Knowledge base

What other technical name or PDU can be used to represent the session presentation and application layer?

L7PDU

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?

Layer 3

What is the first step of inventory management?

List all components on the network.

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?

Look at whether the device is located on the ISP's side of the demarc.

Which fiber connector contains two strands of fiber in each ferrule?

MT-RJ

Which type of DNS record identifies an email server?

MX record

Which kind of crosstalk occurs between wire pairs near the source of the signal?

NEXT

At which OSI layer does IP operate?

Network layer

Which of the following applications could be used to run a website from a server?

Ngnix

What is one advantage offered by VDI over RDS and VNC?

Offers access to multiple OSs in VMs

JV Enterprises is currently using terminal emulation software to remotely control the devices for its employees. The administration however wants to build a dedicated network connection that will allow network administrators to remotely troubleshoot boot problems. Analyze which of the following options should JV consider for its needs.

Out-of-band management

Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack?

Passive twinaxial cable

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?

Patch cable

What is the data passed between utility programs or applications and the operating system known as?

Payload

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?

Peer-to-peer

You, as a network administrator, want to set up a file transfer version of SSH so that you can use a single channel to control both inbound and outbound communications. Which of the following ports will you use to carry out this operation?

Port 22

HCL Industries are keen on allowing its employees with a work-from-home option for its respective jobs. You have been hired to establish a secure and encrypted control for remote Windows computers. Which of the following ports will you use to establish this connection?

Port 3389

You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.

PowerShell Command Prompt Zenmap

You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply?

Presentation layer

Which DNS server offers the most current resolution to a DNS query?

Primary DNS server

Joffrey plans on installing a terminal emulator for a small organization so that he can control the office computers for troubleshooting issues. Joffrey is working as an intern for IVP Internet Solutions, which is an ISP. Analyze which of the following terminal emulators will be more suitable for James as he is new to his job and not well-equipped to handle complex layers of programming.

RDP

Which of the following is an application layer protocol?

RDP

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?

RSSI

If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?

Rack ears

JK Group of Industries is planning a complete revamp of the office infrastructure, and so it has hired Infrared Solutions to upgrade its network connections. It has also requested Infrared Solutions to ensure that this upgrade should not affect the day-to-day functionality within the office premises. Analyze what would be a proper option to carry out this upgrade.

Roll out changes in stages.

A client recently contacted Katie, a networking engineer, at IHP solutions to troubleshoot a connectivity issue. On inspecting the issue, she gets to know that there is a missing default route, which is preventing the network nodes from reaching the DNS servers outside the local network. Analyze which of the following gateway devices she should use to sort this issue.

Router

Which of the following network devices does not fall under the category of "end devices" as certified by CISCO?

Router

Which remote file access protocol is an extension of SSH?

SFTP

Which of the following protocols is used to send an email message to the first server?

SMTP

You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?

SQL

Which of the following protocols will an Oracle Database use to communicate with other Oracle Databases?

SQLnet

Which two encryption protocols might be used to provide secure transmissions for email services?

SSL and TLS

Which kind of multiplexing assigns slots to nodes according to priority and need?

STDM (statistical time division multiplexing)

You, as a network engineer, are working on setting up a data delivery service. While creating the TCP segment for this purpose, you wish to set up a command requesting a synchronization of the sequence numbers between two nodes. Which of the following flags will you apply with a 1-bit field so that you can set this up?

SYN

Raqeeb is an employee working for Deloitte Corporation. He has been allowed to work from home because of the COVID-19 outbreak. You have been asked to establish a VPN so that Raqeeb can access a file server from the office while he operates from his workstation at home. It also has to be kept in mind that Raqeeb wants to stream music alongside when he does this. Which of the following VPN types will you apply so that the necessary requirements are met?

Split Tunnel VPN

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

Star

Which protocol's header would a layer 4 device read and process?

TCP

Meredith and Co. provides ISP services to a bulk of the corporates in the Silicon Valley. However, due to the recent COVID outbreak, a lot of the firms have started to allow their employees to work from home. Ceratrix is one such company that wants to allow its employees to work from home; however, certain features are only available to the employees when they have access to their workstations in the organization. This basically means that they would have to command the host computer. What remote access method should be provided to Ceratrix to fulfill this requirement?

Terminal Emulation

Which part of a MAC address is unique to each manufacturer?

The OUI

James, a supporting technician, is trying to resolve an issue pertaining to the router. On inspecting the issue, he figured that the router was unable to move packages from one node to another. As a resolution to this problem, he intends to follow the OSI model for troubleshooting. What layer of the OSI model should he inspect to understand the issue relating to the router?

The network layer

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server

You have successfully implemented a solution to a bug reported by one of the employees of your organization. You also want to ensure that the process has been well documented in the knowledge base of the organization. Which of the following information is not relevant in such a scenario when you put the data into the record books?

The total number of computers functioning in the organization

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?

Tone locator

Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario?

Transmission Control Protocol

Xhang Pho, a senior network engineer, has been tasked with developing an application to channel live music festivals across the world with the help of the web. Given such a situation, which of the following protocols should he opt for?

UDP

Joseph is the managing director of Ideakt Cellular World Pvt Ltd., and he wants you to create an IPv6 network that has one-to-one type of data transmission between his personal department and the company's administration office. Which of the following types of IPv6 addresses would you apply in such a situation?

Unicast address

You are a freelance software engineer who has been hired to troubleshoot an error with the antivirus software of a particular computer of an employee where he gets an invalid password message. Which of the following methods will you use in such a scenario?

Use a top-to-bottom OSI layers approach

Which of the following remote access methods requires a virtual connection to remotely access resources between a client and a network?

VPN

Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?

Voice gateway

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?

White/green

You have been recently appointed by Jaylabs Internet Solutions to verify the TCP/IP protocols that have been set up at Heroku Industries for interorganizational purposes. On examining the TCP header segment, you want to get a sense of the limit of the maximum bytes of data that a computer can receive before returning an acknowledgment. Which of the following fields in a TCP segment should you check in such a situation?

Window size

What type of diagram shows a graphical representation of a network's wired infrastructure?

Wiring diagram

Which of the following wireless technologies does not use the 2.4 GHz band?

Z-Wave

Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to install dig on the Window operating system?

apt-get install dnsutils

You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address?

arp -a

Which of these commands has no parameters in Windows?

hostname

Which of the following command-line tools is used to display current TCP/IP addressing and domain name information on a Windows computer?

ipconfig

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?

ipconfig /release

Which of the following utilities would you use to display TCP/IP components and connections on a host?

netstat

JusDial Telecommunications has requested your help to set up a new hostname on a couple of devices. On inspection, you find out that the devices are operating under LINUX systems. Which of the following command lines would you apply to set up a new hostname for the required network devices?

sudo hostname

Which of the following utilities is also known as a packet sniffer?

tcpdump


Kaugnay na mga set ng pag-aaral

Nissan Rogue Variable Compression Turbo Engine

View Set

Chapter 3. Job-Order Costing: Cost Flows and External Reporting

View Set

Binary Numbers and Denary Numbers

View Set

ethical hacking quizzes, CEH ch4, CEH ch5, CEH ch6, CH 4-6 Practice Test, CEH CH 5: Key Terms, Midterm study 2, CISSP Vocabulary

View Set

Orbicularis Oris Muscle- facial expression

View Set