Network + Questions

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

hich of the protocols included with TCP/IP reports messages and errors regarding packet delivery? ARP IP ICMP IGMP

ICMP

On a UNIX host, which TCP/IP parameters must be defined for the host to be able to communicate with hosts on a remote network? (choose THREE) IP address Subnet mask Default gateway TTL Destination Address Loopback address

IP address Subnet mask Default gateway

What is the function of the protocol field in an IPv4 header? Indicate the type of data link protocol (such as Ethernet or Wi-Fi) Indicate the protocol type of the payload (such as TCP or UDP) Indicate the version of IP (iPv4 or IPv6) None of the above

Indicate the protocol type of the payload (such as TCP or UDP)

Which of the following network installation, management, or monitoring functions is supported by PoE? Supporting legacy hubs in a switched environment Supporting legacy bridges in a switched environment Supporting legacy Ethernet standards Monitoring network traffic Monitoring switch status Installing devices without separate power cabling

Installing devices without separate power cabling

What is the function of a network controller? Makes overall forwarding decisions for an entire network Interfaces with network appliances to configure them in accordance with software-defined networking policies Automates the provision of virtual network appliances Manages user access to network services

Interfaces with network appliances to configure them in accordance

What type of hybrid topology is in widespread use in modern local area networks (LANs)? Logical bus - physical star Logical star - physical bus Logical bus - physical partial mesh Logical bus - physical ring

Logical bus - physical star

What is attenuation? Loss of signal strength Corruption of signal Loss of frequency Loss of baud rate

Loss of signal strength

What network infrastructure implementation is larger than a LAN but smaller than a WAN? WLAN SAN PAN MAN

MAN

What uniquely identifies every NIC? IP address Media access control address ISO number Packet ID number

Media access control address

Which OSI layer handles the concept of logical addressing? Data Link Network Transport Session Presentation

Network

Which layer found in the OSI model relates to the Internet layer found in the TCP/IP model? Physical Data Link Network Transport Session

Network

What type of policy covers issuance of credentials and account privileges, issuance of computers and mobile devices, and acceptance of company policies? BYOD Onboarding Offboarding AUP PUA

Onboarding

Which of the following is MOST likely to be subject to international export controls? Commercial software licensing Remote access services BYOD Asset disposal PII

PII

Which of the following BEST describes the type of network established by TCP/IP? Packet switched network Circuit switched network Local Area Network Wide Area Network

Packet switched network

What term is used to describe a topology in which exactly two nodes share a single link? Bus Client-server Mesh Point-to-point Ring

Point-to-point

What is the difference between policy and best practice? Policy is a formal statement of intent while best practice represents a successful way of doing something (without violating policy). Policy is advisory while best practice should be followed because of its proven success. Policy is a list of procedures while best practice is a guide to implementing those procedures successfully. Policy establishes benchmarks while best practice establishes progress towards benchmarks.

Policy is a formal statement of intent while best practice represents a successful way of doing something (without violating policy).

What type of network operation or monitoring is supported by SPAN? STP MAC address table Root Guard Flood Guard Port mirroring PoE

Port mirroring

What is the function of STP? Prevent layer 2 loops Prevent flooding Prevent broadcasting Prevent port mirroring

Prevent layer 2 loops

What is the proper name for a "chunk" of information transmitted as a single unit at any layer of the OSI model? Frame Message Transmission Unit Payload Protocol Data Unit

Protocol Data Unit

Which MAC address begins in a frame. Receiving system Sending system Network Router

Receiving system

What is microsegmentation? Reducing the size of broadcast domains to a single switch port Reducing the size of collision domains to a single switch port Reducing the size of spanning tree domains to a single switch port All of the above

Reducing the size of collision domains to a single switch port

What type of policy governs use of a computer located at an employee's home to join the corporate network? Remote access Acceptable use Data loss prevention Bring your own device System lifecycle

Remote access

Which of the following terms is NOT used to describe an end system device, such as computer or smartphone, communicating on a wired or wireless network? Host Node Station Router

Router

What technology or technologies can you use to isolate broadcast domains? (choose TWO) Hub Bridge Switch (unmanaged) Router Switch (VLAN)

Router Switch (VLAN)

Which of the following statements BEST describes the concept of distributed switching? Reducing collision domains Reducing broadcast domains Segmenting traffic using physically separate switches Segmenting traffic using a hierarchical switch topology Segmenting traffic using a flat switch topology

Segmenting traffic using a hierarchical switch topology

A systems engineer troubleshoots communications between devices on a network. When troubleshooting, the engineer focuses on full-duplex communications and reliable delivery. Which layers represent the areas the engineer troubleshoots? (Choose 2) Physical Data Link Network Transport Session Presentation Application

Session Transport

Which layer of the OSI seven layer model keeps track of a systems's connections to send the right response to the right computer? Application Layer Presentation Layer Session Layer Transport Layer

Session Layer

In IPv6, how could you distinguish a unicast address with global scope from other addresses? (choose TWO) Starts with binary 001 Starts with binary 1 Starts with binary 111 Starts with hex 2 or 3 Starts with hex 1

Starts with binary 001 Starts with hex 2 or 3

What is the purpose of a SAN? Storage Services Distributed switching SDN automation

Storage

What type of device isolates the use of the CSMA/CD protocol to a single port? Hub Bridge Switch Repeater

Switch

Which of the following devices would you select to implement layer 2 connectivity on a modern Ethernet network? Hub Bridge Switch Router

Switch

What type of device is used to implement a star topology (select TWO)? Modem Repeater Switch Wireless Access Point

Switch Wireless Access Point

A technician is troubleshooting a network and has asked your advice. He is trying to ping 192.168.16.225. The network has a subnet ID of 192.168.16.192 and has been subnetted with the custom mask 255.255.255.224. Why might this return a "Destination host unreachable" message? The IP address is out of range. The IP address resolves to the subnet broadcast address, not a host address. The IP address resolves to the subnet network address, not a host address. The IP address is in a private range.

The IP address is out of range.

If a packet is addressed to a remote network, what destination MAC address will the sending node use? The broadcast address (ff:ff:ff:ff:ff:ff) The broadcast address (ff:ff:ff:ff:ff:ff:ff:ff) The broadcast address (00:00:00:00:00:00) The MAC address of the default gateway.

The MAC address of the default gateway.

With CSMA/CD, what will happen if a computer has data to transmit and there is already data on the cable? The computer will transmit Request to Send messages until the media is clear. The computer will continue to attempt to send the message. The computer will delay the message for a random period before retrying. None of the above

The computer will delay the message for a random period before retrying.

What is an MTU? The minimum size of an Ethernet frame. The maximum size of a frame's payload. The maximum size of a frame. The technical name for a data link PDU.

The maximum size of a frame's payload.

You need operations to continue if one link fails. What is the minimum number of links required to connect three sites for continuous operation? Two Three Four Five

Three

Where does a hub send data? Only to the receiving system Only to the sending system To all the systems connected to the hub Only to the server

To all the systems connected to the hub

You are installing a workgroup laser printer and toner cartridge using an existing patch cable and wall port. Which of the following safety elements is LEAST relevant to the installation? Electrical safety Tool safety Fire safety Lifting equipment MSDS

Tool safety

Which component is responsible for translating the computer's digital signals into electrical or optical signals that travel on network cable? Media Converter Modem Repeater Transceiver

Transceiver

At which OSI layer is the concept of a port number introduced? Data Link Network Transport Session Presentation

Transport

Which layer of the TCP/IP model controls the segmentation and reassembly of the data? Application Layer Presentation Layer Session Layer Transport Layer

Transport Layer

True or false? A router will not forward a packet when the TTL field is zero. True False

True

True or false? DLP technology can assist with managing PII. True False

True

True or false? Receiving an echo reply message indicates that the link between two hosts is operational. True False

True

True or false? Switch ports should normally be set to autonegotiate speed and duplex settings. True False

True

True or false? The ipconfig utility can be used to empty the DNS cache. True False

True

Why can't the 0.0.0.0/8 block be assigned to hosts? Used for loopback addressing Used for unknown addresses on the local network Used for unknown addresses on remote networks Used for documentation and examples None of the above

Used for unknown addresses on the local network

Which of the following is NOT an appropriate password policy? User passwords must be 12 characters or longer. User passwords must not be simple dictionary words or word combinations. User passwords must be changed every 60 days. User passwords must not be written down or saved to a computer file. User passwords must be reused for different systems within the same company.

User passwords must be reused for different systems within the same company.

A frame ends with a special bit called the Fram check sequence (FCS). What does the FCS do? Cycles the data across the network Verifies the MAC addresses are correct Verifies the data arrived correctly Verifies the IP address is correct

Verifies the data arrived correctly

What type of network infrastructure is MOST likely to make use of leasing or service provider networks? LAN PAN SAN WAN WLAN

WAN

Your network ID is currently 192.168.1.0/24. You need to create two subnets within this network. What subnet mask do you need to use? /1 /2 /12 /25 /26

/25

When using VLSM, which network prefix is MOST appropriate for a point-to-point WAN link? /1 /28 /30 /32

/30

Which of the following is an example of a MAC address? 0-255 00-50-56-A3-04-0C SBY3M7 192.168.4.13

00-50-56-A3-04-0C

Which of the following values shows the decimal value "72" in binary? 01001000 00101000 01000100 10010010

01001000

Convert the binary value "1010 0001 1000 1100" to hex. 0x918B 0x908B 0x918C 0xA18B 0xA18C 0xA18D

0xA18C

If a host is configured with the IP address 10.0.10.22 and mask 255.255.255.192, what is the broadcast address of the subnet? 10.0.10.31 10.0.10.47 10.0.10.63 10.0.10.191 10.0.10.254

10.0.10.63

Which of the following values shows the decimal value "137" in binary? 01111001 01111000 01110111 10001001 10001000

10001001

You want to use fiber optic cabling to support 1 Gigabit Ethernet in a LAN. Which Ethernet standard should you use? 100BASE-FX 1000BASE-FX 1000BASE-SX Any of these options

1000BASE-SX

If the IP address 10.0.10.22 were used with an /18 mask, how many subnets and hosts per subnet would be available? 256 subnets each with 65,534 hosts 512 subnets each with 32,766 hosts 1024 subnets each with 16,382 hosts 2048 subnets each with 8,190 hosts

1024 subnets each with 16,382 hosts

Using VLSM, the 192.168.1.0 network has been divided into four subnets. The first subnet uses a /25 netmask and the remainder use a /27 netmask. It is intended to use the remaining address space to create additional subnets for WAN links. What is the first usable host address for a WAN link (assuming a subnetwork ID cannot be used as a host address, even in a point-to-point link)? 192.168.1.127 192.168.1.193 192.168.1.223 192.168.1.225 192.168.1.228 192.168.1.229 192.168.1.253 192.168.1.254

192.168.1.225

Which of the following are class C IP addresses? (Choose FOUR) 195.243.67.51 165.247.200.100 190.234.24.6 11001101 01110100 00000100 00101110 11001111 10000001 01111110 10010010 213.54.53.52 233.168.24.6

195.243.67.51 11001101 01110100 00000100 00101110 11001111 10000001 01111110 10010010 213.54.53.52

Which of the following values shows the binary value "11000101" in decimal? 127 163 185 193 197

197

Which of the following values shows the binary value "11110010" in decimal? 242 240 252 250

242

A host is configured with the IP address 10.0.10.22 and subnet mask 255.255.255.192. How many hosts per subnet would this addressing scheme support? 14 30 32 60 62 64 127 128

62

In IPv6, how is the loopback address best expressed? ::0 ::1 :: Any of the above

::1

hich of the following is NOT used to conceptualize network design hierarchy? Access Core Distribution Aggregation

Aggregation

What is a "Class D" address? A reserved address space used for loopback testing An address space reserved for experimental use A private address space designed for small subnets (up to 254 hosts) An address space used for multicasting

An address space used for multicasting

Which of the following BEST describes an NDA? An agreement to keep information revealed in confidence secret An agreement to use technical controls to protect data managed by an employee An agreement to allow corporate data on a smartphone to be managed by enterprise security controls An agreement to ensure employees do not reveal personal information obtained from customers

An agreement to keep information revealed in confidence secret

If a mapping for a local destination host is not found in a source host ARP cache, how does the source host send an ARP request? As a broadcast to all local hosts As a unicast to all hosts on the same subnet As a multicast to all local hosts Using the arp command

As a broadcast to all local hosts

Which of the following mechanisms protect the STP topology from malicious STP traffic? (choose TWO) BPDU guard Root guard Flood guard Storm guard Port fast

BPDU guard Root guard

Which of the following device types is MOST likely to be part of a PAN rather than any other type of network? Bluetooth headset Wireless printer Wireless Access Point Firewall Laptop

Bluetooth headset

How does a switch keep track of the hardware addresses of hosts connected to its ports? By broadcasting ARP requests By storing MAC addresses in an ARP table By multicasting ARP requests By storing addresses in a MAC address table

By storing addresses in a MAC address table

On a switched network, what configuration changes must be made to allow a host to sniff unicast traffic from all hosts connected to a switch? Configure a mirrored port on the switch Configure promiscuous mode on the switch Configure tcpdump on the switch Configure pcap on the switch

Configure a mirrored port on the switch

Which of the following is NOT a recognized type of network? CAN DAN LAN MAN PAN WAN

DAN

In which layer of the OSI model do network adapter cards operate? Physical Data Link Network MAC LLC

Data Link

Which of the following account types should be governed by a PUA? (choose TWO) Database Administrator Visitor with Internet access Data Entry Technician Systems Architect Software Tester

Database Administrator Systems Architect

What is an EUI-64 and how might it be used by IPv6? Derives a 64-bit host identifier from the interface MAC address or from a random token Derives a 64-bit host identifier from a random token Derives a 64-bit host identifier from the interface MAC address Derives an IPv6 subnet ID from an existing IPv4 subnet None of the above

Derives a 64-bit host identifier from the interface MAC address

What is an I/G bit? Determines whether the "burned-in" address has been replaced with an arbitrary address Determines whether the frame is addressed to a single node or group of nodes Determines whether the frame can be routed outside the local network None of the above

Determines whether the frame is addressed to a single node or group of nodes

Why might the baud rate be different from the bit rate? Encoding might represent more than one bit per symbol. Baud rate does not measure frequency of transmission. Encoding might represent more symbols per bit. Baud rate is susceptible to attenuation while bit rate is not. Bit rate is susceptible to attenuation while baud rate is not. Baud rate is susceptible to noise while bit rate is not. Bit rate is susceptible to noise while baud rate is not.

Encoding might represent more than one bit per symbol.

What technology provides data security assurance during the asset disposal phase of system lifecycle? (choose TWO) DLP Encryption PUA AUP Mechanical Shredding NDA

Encryption Mechanical Shredding

True or false? A bridge does not forward broadcast or multicast traffic. True False

False

True or false? A computer with a 10BASE-T Ethernet adapter cannot be joined to a 100BASE-T network. True False

False

True or false? An ESD wrist strap is designed to provide a personal ground to protect a technician from electrocution when working on energized electrical devices. True False

False

True or false? Devices can only transmit on an Ethernet network when it is free and the opportunity to transmit becomes less frequent as more devices are added. Also, the probability of collisions increases. These problems can be overcome by installing a hub. True False

False

True or false? The CRC mechanism in Ethernet allows for the retransmission of damaged frames. True False

False

True or false? The IP address 172.24.0.1 is routable over the Internet. True False

False

True or false? The Session Layer is responsible for passing data to the Network Layer at the lower bound and the Presentation Layer at the upper bound. True False

False

Who is the first person to receive notification of a potential security incident? Witness CSIRT Responsible Person DLP AUP First Responder

First Responder

Under STP, if a host port is working as normal, what state is it in? Forwarding Filtering Guarding Learning Listening Looping

Forwarding

A NIC sends data in discrete chunks called ____. Segments Sections Frames Layers

Frames

What is happening if a switch is flooding? All network traffic is halted until the spanning tree topology converges. Frames for that MAC address are issued across all ports until the MAC address is learned. All network traffic is halted until the Denial of Service attack is prevented. Frames for that MAC address are issued across all ports until the MAC:IP address mapping is learned.

Frames for that MAC address are issued across all ports until the MAC address is learned.

Which of the following commands clears the ARP table? arp -d arp -e arp -s arp -x

arp -d

Which of the following IPv6 addresses is a valid unicast host address? fe80::218:8bff:fea7:bd37 fe80::219:d2ff::7850 ff02::219:d2ff:fea7:7850 ::/128

fe80::218:8bff:fea7:bd37

What windows utility do you use to find the MAC address for a system? ipconfig /all ipcfg /all ping mac

ipconfig /all

A Mac address is known as a(n) ______ address IP Logical Physical OEM

physical

A user's workstation cannot connect to a server. You check that IP is installed and that settings are correct. What is the first test you could perform to establish whether network connectivity is OK? ping the loopback address ping the local host's IP address ping the default gateway None of the above

ping the default gateway

Once installed, how would you report the current TCP/IP configuration? ping the loopback address ping the local host's IP address ping the default gateway run ipconfig

run ipconfig

Which of the following commands will capture traffic from the IP address 172.16.16.254 on the interface eth0, and output the results to the file router.pcap? libpcap -E eth0 -o 'router.pcap' src host 172.16.16.254 tcpdump -C eth0 -w 'router.pcap' src host 172.16.16.254 tcpdump -I eth0 -w 'router.pcap' src host 172.16.16.254 tcpdump -I eth0 -r 'router.pcap' src host 172.16.16.254

tcpdump -I eth0 -w 'router.pcap' src host 172.16.16.254

Which of the following is a valid format for a MAC address? xxx.xxx.xxx.xxx xx:xx:xx:xx:xx:xx xx:xx:xx:xx:xx:xx:xx:xx None of the above

xx:xx:xx:xx:xx:xx


Kaugnay na mga set ng pag-aaral

Business Law Ch. 19 (Corporations)

View Set

macro: the Phillips curve: foundational concepts

View Set

Chapter 9. Section 1. Jefferson Takes Office

View Set

College American History 2 Chapter 10

View Set

Special Education and Processing Midterm

View Set

Chapter 9: Annuities (Life Only)

View Set

Level 1 - Chap 5: Leasehold Estates

View Set