Network + Quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Your company is deploying a VoIP system on its premises at three locations. The internal VoIP system must to communicate with the existing PSTN network. Which device will be necessary to permit network-based calls to access the PSTN, and for PSTN-based calls to access the network? A)IP-PBX adapter gateway B)IP-ISDN adapter C)VoIP-PSTN gateway D)PBX system E)Internet modem

C)VoIP-PSTN gateway

You have recently been hired by a small company to assess its network security. You need to determine which TCP/IP ports are open on the network. Which tool should you use? A)a wardialer B)whois C)a port scanner D)a packet analyzer

C)a port scanner

You have decided to implement ISAKMP. What is provided by this technology? A)a Microsoft protocol that establishes sessions with other computers B)a Citrix protocol used in application server environments C)a protocol that works with IPSec to establish a secure session D)a protocol that encapsulates PPP within Ethernet frames

C)a protocol that works with IPSec to establish a secure session

The workstations on the network cannot connect to the Internet. You can ping the router from the Internet. The workstations and server can connect to each other. Where is the problem most likely to exist? A)between the server and the workstations B)between the router and the Internet C)between the router and the server D)between the server and the network

C)between the router and the server

You need to increase the area that is covered by your wireless network to include another building. You decide to use a signal bounce. All of the following could help with this issue EXCEPT: A)repeaters B)channel bonding C)encryption D)reflectors

C)encryption

Your company has decided to implement an acceptable use policy (AUP) that must be distributed to all users. You have been asked to write the preliminary policy to submit for management approval. What is defined in this policy? A)which users require access to certain company data B)which method administrators should use to back up network data C)how users are allowed to employ company hardware D)the sensitivity of company data

C)how users are allowed to employ company hardware

Which type of network would be set up in an office for computers and mobile devices that do NOT comply with the company's NAC policies? A)guest network B)wireless network C)quarantine network D)VPN

C)quarantine network

You need to perform some administrative maintenance on a Cisco router. You decide to connect your notebook computer to the console port on the router. Which type of cable should you use? A)straight-through cable B)crossover cable C)rollover cable D)patch cable

C)rollover cable

You need to implement a wireless network to provide users in an outdoor sitting area with Internet connections. Which signal-absorbing obstructions should be noted when performing a WLAN site survey? A)microwave ovens B)plastic material C)trees D)local telephone lines

C)trees

Class A

12.174.25.98

Loopback

127.0.0.1

Class B

162.58.123.84

APIPA

169.254.1.1

Private

172.16.2.3

Class C

219.214.211.167

Multicast

225.47.72.63

Evil twin

A rogue access point is configured with the same SSID as a valid access point

You are implementing a SOHO network for a small business. The business owner has asked that you implement a 1 gigabit per second (Gbps) network. Which Ethernet standard specifies a data transfer rate of 1 Gbps? A)1000BaseT B)100BaseFX C)10Base2 D)10BaseT

A)1000BaseT

You have been asked to implement a wireless network in a shared office building in a signal-rich environment. A wireless scan of the environment on your target floor shows you that the 5 GHz frequencies are not widely used in that building. Which of the following 802.11 WiFi networking technologies should you choose in this scenario? (Choose three.) A)802.11ac B)802.11g C)802.11n D)802.11a E)802.11b

A)802.11ac C)802.11n D)802.11a

Your company decides to implement a WLAN for usage by visitors. Management has requested that you implement a WLAN that supports a maximum of 11 Mbps data rate. Which WLAN technology supports this data transmission rate? A)802.11b B)802.11g C)802.11a D)802.11e

A)802.11b

You are troubleshooting a connectivity problem with a computer named Computer1 on a network that has a router with the IP address 192.168.10.1. The network uses a non-subnetted Class C IP address range. Computer1 is configured with an IP address of 192.168.10.255 and a default gateway address of 192.168.10.1. The computers on the network are configured with the subnet mask 255.255.255.0. Computer1 cannot connect to the other nodes on the network. The link lights on Computer1's network interface card (NIC) are lit. What is most likely causing the connectivity problem? A)Computer1's IP address B)Computer1's NIC C)the subnet mask used on the network D)the router's IP address E)Computer1's default gateway address

A)Computer1's IP address

You manage a network for your organization. The network contains one DNS server and three routers. You are setting up a new DHCP server. You configure separate scopes for each subnet on your network. The routers are configured to forward DHCP requests. You need to ensure that DHCP clients receive the appropriate settings using the least administrative effort. What else should you do? (Choose all that apply.) A)Configure the DNS server as a server option. B)Configure each router as a scope option for its appropriate scope. C)Configure the DNS server as a scope option for each scope. D)Configure each router as a server option.

A)Configure the DNS server as a server option. B)Configure each router as a scope option for its appropriate scope.

Your organization has several wireless access points located in the building. Access point usage is based on department membership. Many users report that they are able to see multiple access points. You research this issue and discover that their computers are not connecting to the appropriate access point due to an SSID mismatch. You must ensure that the computers connect to the correct access point if that access point is available. Computers should be able to connect to other access points only if their main access point is down. What should you do? A)Configure the preferred wireless network on the user's computer. B)Configure MAC filtering on the wireless access points. C)Reduce the signal strength on the wireless access points. D)Ensure that the wireless access points in close proximity use different channels.

A)Configure the preferred wireless network on the user's computer.

An administrator would like to integrate DNS and DHCP so that each is aware of changes in the other. Which of the following would be the best method for him to do this? A)IPAM B)DHCP relay C)ARP table D)MAC reservations

A)IPAM

Your network uses a single switch that divides your network into three virtual LANs (VLANs). The devices in each VLAN are connected to a single port on the switch. You plan to implement a second switch on your network. You need to ensure that the VLANs that were originally implemented are spread across both switches. What should you do? A)Implement frame tagging on both switches. B)Create a port-based VLAN on both switches. C)Create a subnet-based VLAN on both switches. D)Create a protocol-based VLAN on both switches.

A)Implement frame tagging on both switches.

Your network contains several virtual LANs (VLANs). What is a benefit of using this technology? A)It allows networks to be segmented logically without being physically rewired. B)It connects small networks together to form a single large network. C)It allows users on a LAN to communicate with remote networks. D)It allows users from different segments to communicate with each other.

A)It allows networks to be segmented logically without being physically rewired.

You suspect that there is a problem with addressing that allows data to be sent throughout your network. Which addressing method is used at the OSI Network layer to allow this? A)Logical network addressing B)Physical device addressing C)Link-state addressing D)Distance vector addressing

A)Logical network addressing

Which of the following is a security implication if your company uses a public cloud deployment? A)Other tenants can gain physical access to the resources that store your company's data. B)Security issues are the sole responsibility of the company's personnel. C)The local ISP and power grid can impact the availability of resources stored on the cloud. D)Surges in demand require that company resources will need to be adjusted accordingly.

A)Other tenants can gain physical access to the resources that store your company's data.

Which technology provides centralized remote user authentication, authorization, and accounting? A)RADIUS B)VPN C)DMZ D)Single sign-on

A)RADIUS

You are a desktop administrator for Nutex Corporation. Your organization uses Ethernet cable to connect network resources. A user reports that he is unable to access network resources on his portable computer. The portable computer is connected to the company's network using an Ethernet cable. When you test the cable using a time domain reflectometer (TDR), the signal returns too soon. What should you do? A)Replace the network cable. B)Replace the network adapter. C)Reinstall the network adapter. D)Re-route the network cable.

A)Replace the network cable.

In the context of physical security, which statement related to security guard personnel is most appropriate? A)Security guard personnel are the most expensive countermeasure for reducing the physical security risk. B)Security guard personnel are a cost effective countermeasure to reduce physical security risk. C)Security guard personnel act as the last line of defense in securing the facility infrastructure. D)Security guard personnel are one of the administrative controls in a layered security architecture.

A)Security guard personnel are the most expensive countermeasure for reducing the physical security risk.

Which of these is NOT an example of multifactor authentication? A)Username and password B)Signature dynamics and geolocation C)Smart card and password D)PIN and iris scan

A)Username and password

What is typically used to conceal the nature of a social engineering attack? A)believable language B)excess bandwidth C)encryption D)users' good intentions

A)believable language

You need to check for open circuits and short circuits on your network. Which tool should you use? A)cable tester B)protocol analyzer C)butt set D)toner probe

A)cable tester

Which of the following can be manipulated to reduce network traffic? A)increased lease time B)NTP C)MAC reservations D)lower TTL

A)increased lease time

You have implemented a new 802.11b 2.4-GHz WLAN. Which of the following devices can cause interference with this network? (Choose all that apply.) A)microwave ovens B)cordless phones C)electrical wiring D)cable TV cabling

A)microwave ovens B)cordless phones

You are installing the wiring for a small office. You want to connect the fifty computers in the office to the switch. The Cat6 cables that you plan to use have RJ-45 connectors on both ends. Which component should you use? A)patch panel B)110 block C)66 block D)demarcation extension

A)patch panel

You need to copy the traffic from a single port to a different port, but prevent bidirectional traffic on the port. Which switch feature should you use? A)port mirroring B)trunking C)PoE D)spanning tree

A)port mirroring

You are the network administrator for your company. You are in the process of verifying the configuration of the network devices to ensure smooth network connectivity. You want information on the routes taken by packets from a Cisco router so that you are able to identify the network points where packets are being dropped.Which command should you use to accomplish this task in the most efficient manner? A)traceroute B)extended ping C)tracert D)ping

A)traceroute

You are asked to acquire address space for a new network that must accommodate at least 12 subnets, each with at least 2,048 nodes. A total of 25,576 IP addresses are needed, but the available address space should leave some room for growth in each subnet, and for the number of subnets to double (or more). The network must also support IPsec to the endpoints for security reasons. Which of the following options provides the best fit while minimizing costs? A)Private IPv4 Class A network (10.0.0.0) B)IPv6 network with a /56 global routing prefix C)Public IPv4 Class B network, purchased on the open market D)IPv6 network with a /64 global routing prefix E)IPv6 network with a /48 global routing prefix

B)IPv6 network with a /56 global routing prefix

You are setting up a 10-Mbps SOHO network at a residence. What is the lowest category or level of UTP cable that you should use as transmission medium for a small LAN communicating in the 10-Mbps range? A)Category 4 B)Category 3 C)Category 5 D)Category 2 E)Category 1

B)Category 3

Which of the following would be used to help defend against a man-in-the-middle attack? A)Flood guard B)DHCP snooping C)BPDU guard D)Root guard

B)DHCP snooping

You use HTTPS to secure your e-commerce website. You suspect an external breach has occurred. What should you do to enhance transaction security? A)Disabling IP ports B)Generating new keys C)Avoiding common passwords D)Hashing files

B)Generating new keys

You have an 802.11g wireless network that uses a single wireless access point. For security purposes, you do not broadcast the SSID. You have noticed wireless latency issues on your wireless network. What should you do to fix this issue? A)Install another wireless access point that uses the same non-overlapping channel and a different SSID. B)Install another wireless access point that uses a different non-overlapping channel and the same SSID. C)Enable channel bonding. D)Disable channel bonding.

B)Install another wireless access point that uses a different non-overlapping channel and the same SSID.

You have replaced all of the routers on your network with switches. You then decide to turn off CSMA/CD. What is the BEST description of the result of your actions? A)The switch ports will now operate at a higher port speed. B)Network devices will now operate in full-duplex mode. C)The switch ports will now operate at a lower port speed. D)Network devices will now operate in half-duplex mode.

B)Network devices will now operate in full-duplex mode.

As a network administrator, you decide to replace a hub on your network with an active hub. At which OSI layer does the new device function? A)Network B)Physical C)Session D)Transport

B)Physical

Which of the following provides both authentication and authorization using UDP? A)TACACS+ B)RADIUS C)LDAP D)SSO

B)RADIUS

Your company is building a new facility, and you are tasked with designing the new network at that site. You will need multiple servers, switches, patch panels, UPS equipment, and other equipment. You need to plan and document the placement of the equipment in the site's network data center. Which tool should you use? A)Network diagram B)Rack diagrams C)Standard operating procedures/work instructions D)Logical diagram

B)Rack diagrams

Which of the following options are relevant to network segmentation when using switches? (Choose all that apply.) A)MAC address tables B)Tagging and untagging ports C)VLANs D)ARP tables

B)Tagging and untagging ports C)VLANs

A contractor is unable to connect to your wireless network using his 802.11g wireless adapter. What is the most likely problem? A)You have an 802.11b network. B)You have an 802.11a network. C)You are using an incorrect channel on your network. D)You have an 802.11n network.

B)You have an 802.11a network.

You need to determine the length of a network cable. Which device should you use? A)a hardware loopback B)a TDR C)a tone generator D)a crossover cable

B)a TDR

What is a correct description of a honeypot system? A)a tool used to detect alterations in system files B)a computer used to entice an attacker C)a test methodology used to reveal vulnerabilities D)a type of attack in which the target system is flooded with unauthorized service requests

B)a computer used to entice an attacker

Which malicious software relies on other applications to execute and infect the system? A)a logic bomb B)a virus C)a Trojan horse D)a worm

B)a virus

A consultant recommends that your company implements an appliance firewall. To which type of firewall is this referring? A)application B)hardware C)embedded D)software

B)hardware

You need to obtain the current protocol statistics and port connections for Windows and UNIX/Linux computers. Which tool should you use? A)tracert B)netstat C)ping D)nbtstat

B)netstat

Which component of a computer use policy should state that the data stored on a company computer is not guaranteed to remain confidential? A)information ownership B)no expectation of privacy C)acceptable use D)computer ownership

B)no expectation of privacy

A user reports that a legacy system is no longer responding. After researching, a technician reports that the system has been flooded with ICMP packets larger than 65,535 bytes. This is most likely the result of which type of attack? A)malware B)ping of death C)ARP issues D)backdoor access

B)ping of death

You have been given a drawing that shows the flow of network communication with symbols to indicate equipment function. Which type of configuration management documentation have you been given? A)physical network diagram B)wiring schematic C)logical network diagram D)network baseline

B)wiring schematic

Which protocol is categorized as an Exterior Gateway Protocol (EGP)? A)RIP B)IS-IS C)BGP D)OSPF

C)BGP

You administer a 100BaseTX Ethernet network that is configured to use the TCP/IP network communications protocol. You have installed a firewall between the network and the Internet. Currently ports 80, 20, and 21 are open on the firewall. You want to allow only SMTP and POP3 communications between the network and the Internet. Which configurations should you make on the firewall? A)Close ports 21 and 80, and open port 110. B)Close port 80 only. C)Close ports 20, 21, and 80, and open ports 25 and 110. D)Close ports 20 and 21, and open port 25.

C)Close ports 20, 21, and 80, and open ports 25 and 110.

Which of the following computing technologies is most likely to fall under the U.S. government's export administration regulations designed to protect the sale or transfer of commodities, technology, information, or software considered of strategic importance to the U.S.? A)Web page design tools B)Deduplication software C)Encryption tools D)File compression techniques

C)Encryption tools

A user in the Engineering department is unable to log on to the network. The network has eight subnets and uses TCP/IP. There have been no other complaints from other departments. Which steps should help you isolate the cause of the problem? (Choose two.) A)Configure a WINS server. B)Replace all the patch cables. C)Establish whether other local-segment users are having the same problem. D)Ping the server.

C)Establish whether other local-segment users are having the same problem. D)Ping the server.

You have two Web servers, named WebSrv1 and WebSrv2. You need to configure the Web servers so that they share the Web request load equally. What should you do? A)Implement an active/passive cluster. B)Implement traffic shaping. C)Implement an active/active cluster. D)Implement Quality of Service (QoS).

C)Implement an active/active cluster.

A new file server is configured to allow personnel within the company to store files. Users are reporting that they cannot upload files to the file server. What might be the areas you should examine? (Choose two.) A)Hardware failure B)Duplicate IP addresses C)Incorrect ACL settings D)Blocked TCP/UDP ports

C)Incorrect ACL settings D)Blocked TCP/UDP ports

Which of the following relies on credentials stored and authenticated on the device being used? A)RADIUS B)Certificates C)Local authentication D)Kerberos

C)Local authentication

Management has asked you to investigate upgrading your company's network from IPv4 to IPv6. What are valid reasons you should give for performing this upgrade? (Choose two.) A)IPv4 is too slow for Internet traffic. B)IPv6 provides approximately 10 times more host addresses than IPv4. C)Routing traffic is increasingly difficult due to the rapid growth of the Internet. D)IPv4 addresses are being depleted at an increasing rate.

C)Routing traffic is increasingly difficult due to the rapid growth of the Internet. D)IPv4 addresses are being depleted at an increasing rate.

You are setting up your company's VoIP infrastructure. One remote office location has audio problems when placing or receiving calls. At times, speech quality is poor, or there is a noticeable and distinct echo for call audio. In troubleshooting a possible system configuration issue, which of the following possibilities do you want to eliminate first? A)Echo cancellation has been misconfigured or has not been applied. B)Check to make sure system updates have been applied. C)The call terminates on an analog endpoint. D)Compression mode setting differs between caller and receiver devices. E)H.323 protocol support has not been selected.

C)The call terminates on an analog endpoint.

You are the network administrator for a corporate network that includes a DNS server, a DHCP server, a file/print server, and a wireless subnet. Computers on the wireless subnet are having trouble connecting to internal resources and to the Internet. Upon troubleshooting the problem, you discover that some of the wireless computers can only access resources on other wireless computers. However, some of the wireless computers can access internal resources and the Internet. What is causing some of the wireless computers to be able to access other wireless computers only? A)The computers are configured to operate in infrastructure mode. B)The computers are configured with the wrong subnet mask. C)The computers are configured to operate in ad hoc mode. D)The computers are configured with static IP addresses.

C)The computers are configured to operate in ad hoc mode.

Your company's IT department needs to provide field engineers with remote GUI-based access to their in-office desktop PCs over the Internet. Engineers could use Windows, Linux, iOS, and Android on their remote devices with a mix of MacOS and Windows on the in-office desktops. Which of the following remote access tools offers the best no-cost option? A)Telnet B)RDC C)VNC D)SSH E)ARD

C)VNC

You have recently implemented DNS on a small company network. However, you discover that the internal DNS server is having trouble communicating with external DNS servers. Which well-known UDP port does this protocol use? A)110 B)80 C)161 D)53

D)53

Which of these is NOT associated with data conversion between the ISP and the customer premise equipment? A)Demarcation point B)CSU/DSU C)Smart jack D)ATM

D)ATM

Your organization has several VLANs implemented on its network. The VLANs operate across several switches. What do all users on a VLAN have in common? A)Cable segment B)Collision domain C)TCP/IP subnet D)Broadcast domain

D)Broadcast domain

After a data breach occurs at a client's site, you determine that some of the switches, routers, and servers in the network were updated with the most current security patches, and some have never been updated. When you examine the network diagram, you notice that many of the same types of devices do not look the same in the diagram. What type of documentation should you provide to the client to ensure all devices are consistently identified by their type? A)Inventory management B)Change management documentation C)Network configuration and performance baselines D)Diagram symbols

D)Diagram symbols

You have expanded the number of nodes on your network and have added a second 24-port switch. The new switch is in place and has sufficient port capacity for another six nodes in the future. What should you do to increase the security of the switch? A)Install patches and updates B)Use secure protocols C)Upgrade firmware D)Disable unused ports

D)Disable unused ports

You work for a company that deploys wireless networks for your customers. You have been asked to deploy wireless range extenders for several companies. For which of the following situations does deploying a wireless range extender make sense? A)For a new branch office opening 7 km away from the main office, where 5-10 users will need wireless network access at the same time B)To add wireless coverage for an office expansion to 10th floor, where up to 40 users might need wireless access at the same time C)For the back porch of a coffee shop where as many as 30 users might need wireless network access at the same time D)For a sprawling small office/home office layout with no more than 10 devices active at any given time, but with two dead spots in need of improved wireless network access E)For a deli dining area in a grocery store, where up to 35 patrons may need wireless access at the same time

D)For a sprawling small office/home office layout with no more than 10 devices active at any given time, but with two dead spots in need of improved wireless network access

Which of these devices can be used to divert incoming web traffic to specific servers based on its content? A)Wireless controller B)AAA server C)VPN concentrator D)Load balancer

D)Load balancer

Which of these would a hospital group use to connect its various neighborhood offices to the main facility when all are located within the same city or region? A)WLAN B)LAN C)WAN D)MAN

D)MAN

Your company's WAN connects networks in New York, Atlanta, Dallas, and Boston. Each city is directly connected to every other city. Which physical topology is used for your WAN? A)Star B)Ring C)Bus D)Mesh

D)Mesh

You recently built a virtual network for testing purposes that is parallel to your existing network. When users attempt to log on to the existing network, they get a different IP address than expected. In addition, some users report receiving a duplicate IP address error. What could be the issue? A)Incorrect netmask B)Exhausted DHCP scope C)Incorrect host-based firewall settings D)Rogue DHCP server

D)Rogue DHCP server

You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices? A)Telnet B)SMTP C)ARP D)SNMP

D)SNMP

You need to collect management information on the routers and switches used on your company's network. You decide to use SNMP. What is the name of the software component that runs on a managed device when you deploy this technology? A)MIB B)SNMP manager C)NMS D)SNMP agent

D)SNMP agent

You are setting up an 802.11a wireless network in an office environment that includes three wireless access points. The wireless access points are at least 15 meters apart and are configured for automatic channel setting. Each time you turn the wireless access points on, they all choose the same channel. You need to ensure that the access points choose separate channels to prevent interference, using the least amount of administrative effort. What should you do? A)Reduce the signal strength on each access point. B)Increase the distance between the wireless access points to at least 20 meters. C)Manually configure each of the access points to use channels 1, 6, and 11, respectively. D)Start each wireless access point at a separate time.

D)Start each wireless access point at a separate time.

You are analyzing communication over your network. You have captured all the packets sent to and from a server on your network. You need to filter the packet capture to only IMAP4 protocol communications. Which port does this protocol use? A)TCP port 25 B)UDP port 25 C)TCP port 110 D)TCP port 143 E)UDP port 143 F)UDP port 110

D)TCP port 143

If a routing table contained multiple routes for the same destination, which were inserted by the following methods, which route will the router use to reach the destination network? A)The route inserted by BGP. B)The route inserted by RIP. C)The route inserted by OSPF. D)The route configured as a static route.

D)The route configured as a static route.

What can be used by a hacker to implement a social engineering attack on a network? A)a multimeter B)a remote control package C)a packet sniffer D)a telephone

D)a telephone

Which wireless communications mode enables wireless devices to communicate directly with each other? A)transport B)infrastructure C)tunnel D)ad hoc

D)ad hoc

You are documenting the network layout for your company. You have discovered a firewall that has two network interfaces. Which firewall architecture have you discovered? A)screened subnet B)screened host C)bastion host D)dual-homed firewall

D)dual-homed firewall

You are implementing several switches on your network. The network contains client computers that run both Internet Protocol (IP) and Internetwork Packet Exchange (IPX). To increase network efficiency, you need to configure the switches so that the two different types of traffic are isolated. Which type of virtual local area network (VLAN) should you implement? A)port-based VLAN B)frame-tagging VLAN C)subnet-based VLAN D)protocol-based VLAN

D)protocol-based VLAN

What should you implement to isolate two of the devices that are located on a storage area network (SAN) fabric containing eight devices? A)SAN snapshots B)HBA allocation C)VLAN D)virtual SAN

D)virtual SAN

A

Maps a host name to an IPv4 address

AAAA

Maps a host name to an IPv6 address

MX

Maps a mail server name to a domain

PTR

Maps an IP address to a host name

CNAME

Maps an additional host name to an existing host record

WEP/WPA cracking

Mathematical algorithms are used to determine the pre-shared key used on the access point.

Warchalking

SSID and other authentication details regarding a wireless network are written down in a prominent public place

Option

a parameter that can be used to assign router, DNS server, and other information to DHCP clients

Scope

a range of possible IP addresses that a DHCP server can assign

Lease

a single IP address that is being used by a DHCP client

Reservation

an allocation of a single IP address to a MAC address


Kaugnay na mga set ng pag-aaral

Ch. 1 Quiz - Intro to Real Estate

View Set

Cardio_Dyslipidemia practice questions

View Set

Financial Literacy, Section 1 Unit 1

View Set