NEtwork + test 1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Copper wiring is used in which of the following cabling?

1000BaseT

Which cable standard is limited to 10 Mbps, has a maximum segment distance of 100 meters, and uses UTP cable?

10BaseT

A BRI ISDN circuit transmits data at what rate?

128 Kbps

Which of the following is the longest legitimate WEP key length?

128-bit

Which of the following is an example of a private IP address?

172.22.189.1

HTTPS requires you to open which additional port in your firewall?

443

Being able to access a Web site by its IP address, but not by its name, indicates a problem with what?

DNS

What two encryption applications work together to make a fully secure Web site? (Select two.)

HTTPS SSL

Jill wants to connect multiple devices into a network but has been cautioned not to segment her collision domain. What device would enable her to accomplish this goal?

Hub

Network technician Drew is installing a new 48-port switch. Drew needs to configure the switch to avoid switch looping. Which of the following should Drew enable?

Spanning tree

Which document defines services, products, and time frames for support provided by a vendor?

Statement of work

Which of the following methods of authentication will also provide AAA and uses TCP?

TACACS+

What technology enables VLANs to span multiple switches?

Trunking

Which of the following cable types is most vulnerable to EMI?

UTP

A rancher wants to use a wireless camera he has installed in his barn which is about 100 yards from his house. What kind of antennas should he use on the house and barn to get the best signal?

Unidirectional

Users must do their part to maintain network security. How can users know how to reduce risk factors?

Users should be trained in risk mitigation.

What do you call a snapshot of your systems and network when they are working correctly?

A Baseline

A network administrator wants to setup two-factor authentication. Which of the following will accomplish this?

A username, password, and a key fob

Marsha wants to place certain restrictions on communication between client computers and the main file server. Which of the following will enable her to accomplish her goal?

ACL

What can a network administrator configure to control specific IP addresses and ports access to the internal network? (Select TWO.)

ACLs Firewall

Which of the following is NOT an aspect of Asymmetric Digital Subscriber Line (ADSL)?

ADSL is a dial-up service.

A company has a network connection with an ISP. The company is going to add a second network connection with a different Internet service provider. In order to pass traffic between the two connections, which routing protocol is the BEST choice?

BGP

Your network administrator notices excessive traffic being used by P2P software such as torrents. What must the network administrator implement to optimize network efficiency?

Bandwidth shaper

Which of the following choices are numbering systems found in computer and network environments? (Select three.)

Binary Octal Hexadecimal

What does a network technician need to know in order to select the correct type of punch down tool?

Block type

A company has just three laptops that connect to the wireless network. The organization uses WEP encryption on their wireless network. They have noticed unauthorized connections to their WAP and want to take steps to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO.)

Change the encryption method to WPA Enable and configure MAC filtering.

A switch port can BEST be described by which of the following terms?

Collision domain

You are attempting to troubleshoot an issue between two computers that are both connected to a Layer 2 unmanaged switch. Of the following, which is the BEST way to find out if the switch is the problem?

Connect both of the PC's together with a crossover cable

A network technician is making custom cables for a new network room. You look at one of the newly made cables and notice that one end is wired to the TIA/EIA 568A standard while the other end is wired for TIA/EIA 568B. What is this type of cable called?

Crossover cable

It's an old story: a user is unable to access the Internet. The network administrator checks the workstation and sees that it has an APIPA address. What service is MOST likely not functioning correctly to have caused this?

DHCP

Melissa can connect remotely to her office through a VPN. The connection seems to be set up properly, but she can't access shared folders on any other computer by name. She can ping the other servers successfully. What could be the problem?

DNS is not configured correctly.

A network technician, Ellen, receives a support ticket. The ticket does not provide enough information for Ellen to determine the problem. Which of the following should she perform FIRST before responding to the ticket?

Determine if anything has changed.

A switch in the MDF has shut down at 5 PM every day this week. Which network tool should a technician use to troubleshoot this problem?

Environmental monitor

Network technician Raj has tested a theory of probable cause and discovered that the theory was incorrect. Which of the following would be the NEXT step in the troubleshooting process?

Escalate the issue

Upon notification of a computer crime, a first responder performs which tasks? (Select three.)

Evaluate the severity of the situation. Collect information Documenting finding.

A company wants to connect several computers within a large warehouse. The warehouse has a single computer at the very far end of the warehouse that is 180 meters (590 feet) from the network switch. What kind of cable should a technician use for the long run?

Fiber

Sam is setting up two pieces of networking equipment that are identical. He can use them in conjunction for what purpose? (Select two.)

High availability Fault tolerance

Network administrator Zordon wants to ensure that the only remote users who access the corporate network come only from Zordon's own country. Which of the following security measures could he configure to accomplish this?

IP filtering

Sam calls in complaining that "the Internet is down," which probably means his computer has lost it's network connection. What should you do first to begin troubleshooting this problem?

Identify affected areas of the network.

Which command is used to display the current TCP/IP configuration on a UNIX or Linux system?

Ifconfig

Which of the following are aspects of IPSec?

It encapsulates the data payload. It is required for IPv6.

What is the BEST description of how a layer 2 switch works?

It switches packets within the same broadcast domain based on MAC addresses.

What is the NTP protocol used for?

Keeping clocks on a network synchronized

Which of the following standards is used by Windows for client authentication?

Kerberos

Of the following protocols, which are used to implement VPNs? (Select two.)

L2TP IPSec

Which kind of connector would you find on a fiber-optic cable?

LC

To verify a connection at Layer 1, which hardware tool would MOST likely be used?

Loopback plug

The Highland Gadget Corporation has a central office and five satellite offices. The lead network engineer wants to redo the company's network so that each satellite office connects to the central office and to every other satellite office. What topology would best suit such a network?

Mesh

Your company requires the use of a smart card, biometric device, and a user name/password to login to your system. What kind of authentication are they using?

Multifactor authentication

Routers provide which of the following benefits? (Select two.)

Multiple paths between segments. Connection to different types of networks

You are a network administrator attempting to troubleshooting a WINS server. Which tool would you most likely use to diagnose this?

Nbtstat

An office would like to set up an unsecured wireless network for their customers in their lounge area. Customers should be allowed to access the Internet, but should not have access to the office's internal network resources. Which firewall configuration can accomplish this?

Packet filtering

Horizontal cable is terminated at which device in the wiring closet?

Patch panel

Which of the following OSI layers converts the ones and zeros into the type of signals needed for the network cable, and then places these signals on the cable?

Physical layer

Network administrator Julius is going to install an 802.11n network. Which of the following should he consider FIRST?

Placement

You have just installed your recently purchased IDS. What must you do to your switch to allow your IDS to capture and record network traffic?

Port mirroring

What are three main considerations in a rack installation? (Select three.)

Power Mounting Environment

What is the value of a baseline performance analysis?

Provides a quantifiable reference to measure against current performance.

A network administrator wants to filter outgoing network requests. Which of the following choices will filter the outbound requests?

Proxy server

Which tool would a network technician need in order to install additional cables to an existing patch panel?

Punch down tool

VoIP is being implemented throughout a company and Habib needs to ensure that voice traffic does not take all the bandwidth from data users. Which feature on a layer 3 switch will ensure that the VOIP traffic gets a sufficient amount of bandwidth, but not all available bandwidth?

QoS

A device that connects two Ethernet segments but doesn't filter any packets is probably a hub or switch. If this device does filter packets based on the logical address, it is probably a ________?

Router

A SOHO that supports ten Wi-Fi equipped laptops is adding a new connection to the Internet. Which items would be used to set up the office using a new DSL line? (Select TWO.)

Router Wi-Fi access point

You are working with your Web development team in order to find a way for them to securely update their content from remote locations such as their home. Which of the following would you set up for them?

SFTP

Jim is wanting to transfer files between two computers. He asks the administrator which protocols would be able to do this while at the same time being secure. Which two will accomplish these goals? (Select two.)

SFTP SCP

Which of the following protocols is associated with monitoring devices on a network?

SNMP

What technology is used to inhibit Layer 2 switching loops within a LAN?

STP

The _______________ layer of the OSI model establishes, manages, and terminates multiple communications between computers.

Session

Which layer of the OSI seven layer model ensures reliable communication?

Session

An accountant for a large corporation receives a call from an individual claiming to be John, a network technician in HQ. John tells the accountant that they have been having some problems with the active directory for a few employees and her account is one of the accounts experiencing problems. John then asks for her username and password so that he can resolve the problem with the account. What is this scenario an example of?

Social engineering

You have two computers on the Internet and you wish to transfer a file between them. Which of the following protocols would most probably be the fastest to do this transfer?

TFTP

Which of the following types of protocols might lead to a user's credentials being disclosed to possible attackers if a protocol analyzer is used?

Telenet FTP

Which of the following types of protocols might lead to a user's credentials being disclosed to possible attackers if a protocol analyzer is used?

Telnet FTP

Given a network problem scenario, a technician should identify the problem, then establish a theory for the cause of the problem. What is the next logical troubleshooting step?

Test the theory to determine the cause.

A wireless network is secured with WPA2 Enterprise. Clients are unable to connect to the network. What is the MOST likely explanation for this problem?

The RADIUS server is down

Thelma is trying to send an e-mail from her server at Thelma.scoobydoobydo.com to her friend Josie at Josie.Pussycats.au. In what order is the request routed through the relevant DNS servers to resolve the names?

The Scoobydoobydo.com DNS server; the root DNS server; the .AU DNS server; the Pussycats.au DNS server

Your company has to move the heavily-used intranet Web server from one computer to a new, faster system. You make the changeover and send out an e-mail to let everyone know. You then start getting a number of e-mails back saying users cannot access the new Web site by DNS name, even though you updated the "A" record in the DNS server. What's the most likely problem?

The users DNS cache still holds the old IP address to name association.

Everyday at the office, we play Counter Strike Source over the Internet (only during lunch hour, of course). Today, however, there is a lot of lag in the action--our mutual connection is bogged down somewhere. What could I use in Windows to find out where the bottleneck is occurring?

Tracert

A company is setting up a VoIP system. Which performance optimization techniques would be MOST beneficial to ensure sufficient bandwidth for telecommunications? (Select TWO.)

Traffic shaping Quality of service

A company's network consists of a primary switch at one end of the office building and a secondary switch at the other end of the building. These switches are networked together. The office experiences a brownout only affecting the half of the building connected to the secondary switch. When power is restored, users connected to the secondary switch report no network or Internet connectivity. Which of the following should be verified on the secondary switch to resolve this issue?

Verify that the switch has power

Which of the following virtual devices keeps track of a MAC-to-port forwarding table?

Virtual switch

Preparation for incidents is a multifaceted process that includes which tasks?

Vulnerability scanning Penetration testing

As the network administrator for a small college, you have been asked to install and configure an 802.11g network. Which of the following protocols will provide maximum security for the students using the network?

WPA

The Highland Gadget Corporation wants to install wireless networking in its satellite offices, but wants to make them as secure as possible. What security protocol should they use?

WPA2

Brienne, an administrator, is attempting to connect a laptop to a server with a length of CAT5 cable that has RJ-45 connectors on each end. All of the IP settings have been verified to be correct, but the two computers can't connect. Which of the following would MOST likely fix the IP connectivity problem?

Wire pairs 1/ 2 and 3/ 6 need to be swapped on one end of the connecting cables.

Red is a farmer who has a home office and also works at a workstation in a barn on his property. The barn is located 150 feet (45 meters) from the house. Red wants to extend his home Internet connection to the barn. Which of the following technologies would MOST likely accommodate this range?

Wireless

Select the answer that completes this true statement: "A DHCP server..."

automatically assigns IP configuration parameters to TCP/IP hosts.

While working on your LAN, you notice that you cannot access your file server. Which of the following utilities would you use FIRST to troubleshoot the problem?

ipconfig


Kaugnay na mga set ng pag-aaral

BIOL 1030 Chapter 13 Homework Questions

View Set

Conduction, Convection, and Radiation

View Set

RN Individual Influences Assessment

View Set

GI NCLEX REVIEW QUESTIONS for ADULT GI

View Set

Spinal Cord Injury - Management of Neurological Disorders

View Set