Network+_Chapter 4,6,7,8,9,10,10_MASTER DUMP

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which switch is used with the Windows netstat utility to show name of a running program?

-b

Which switch is used with the Windows netstat utility to show the process ID?

-o

Which term is an original top-level domain name?

.mil

A network with a subnet mask of 255.255.255.192 would have what prefix?

/26

When performing a binary XOR (eXclusive OR) calculation with a plainrtext value of 1 and a key value of 1, what is the result?

0

When performing a binary XOR (eXclusive OR) calculation with a plaintext value of 0 and a key value of 0, what is the result?

0

What is the range of decimal values in each of the four groups of an IPv4 address?

0 to 255

Which routing table gateway value indicates that there is no gateway needed for a network ID?

0.0.0.0

What is 15 in binary?

01111

Which could be a valid Autonomous System Number (ASN)?

1.33457

What was the maximum speed at which 10BASE-T Ethernet networks could communicate?

10 Mbps

Which IP address is a private IP address?

10.164.19.5

What is the maximum cable length on a segment of a 1000BASE-T network?

100 meters

What was the maximum distance between a hub and a node on a 10BASE-T network?

100 meters

How many host bits would you need to leave to provide for the given number of hosts?

1000:10, 200:8, 5:3, 30:5, 50:6

Of all the Gigabit Ethernet IEEE standards detailed in the chapter, which one maintains a signal over the greatest distance?

1000BASE-LX

Which version of Gigabit Ethernet is published under the 802.3ab standard?

1000BASE-T

The __________ version of Gigabit Ethernet, published under the 802.3z standard, is divided into a series of standards, with names such as 1000BASE-SX and 1000BASE-LX.

1000BASE-X

What is the binary equivalent of the decimal value 151?

10010111

How many hosts would be on each subnet if you borrow 10 bits of a Class B?

1022

How many subnets can you create if you borrow 10 bits of a Class B network?

1024

In 100BASE-T, what is the maximum number of nodes per hub/switch?

1024

What is the maximum number of nodes that could be attached to a 10BASE-T hub?

1024

Enter the network portion of 103.56.115.117

103.0.0.0

Enter the network address of 109.13.58.238 255.0.0.0

109.0.0.0

Which standard used multimode cabling?

10BASE-FL

Which Ethernet cabling standard defines an Ethernet network that uses Cat 3 or better UTP cabling, operating at 10 Mbps?

10BASE-T

Which 10 GbE standard features a multimode fiber type?

10GBASE-SR

What is the name of the IEEE standard for 10 GbE running on twisted pair cabling?

10GBASE-T

Enter the host portion of 111.112.207.194

112.207.194

Which wavelength is used by 1000BASE-LX fiber-optic cabling?

1300 nm

Which wavelength is used on 10GBASE-LW fiber-optic cabling?

1310 nm

Which port is used to receive e-mail messages from e-mail servers (IMAP4)?

143

What is the maximum number of hops allowed by RIP?

15

What is the broadcast of 150.5.0.96 /27?

150.5.0.127

Enter the network portion of 161.86.66.69

161.86.0.0

What is the network ID for 172.19.0.62/27?

172.19.0.32

What is the network ID of 172.19.0.94/27?

172.19.0.64

What is the host range of 172.19.0.64/27?

172.19.0.65 - 172.19.0.94

Which one of the IP addresses below is a network ID?

176.16.100.100 /30

Enter the network address of 183.227.161.249 255.255.0.0

183.227.0.0

Which of the following is a valid host on network 192.168.24 /29?

192.168.24.27 with a subnet mask 255.255.255.248

What is the host range for 192.168.32.32 /30?

192.168.32.33 -192.168.32.34

Which IP address is valid for an individual host expressed in dotted decimal notation?

192.168.4.2

Enter the network portion of 197.146.101.32

197.146.101.0

Which IP address is a public IP address?

198.192.100.3

Which TCP ports does the old active File Transfer Protocol (FTP) use by default?

20 and 21

Enter the network portion of 212.164.48.186

212.164.48.0

What is the decimal equivalent of the binary value 11010101?

213

Enter the network portion of 213.182.97.137

213.182.97.0

Enter the host portion of 72.245.102.133

245.102.133

Enter the default, classful mask for ip address 100.208.112.164

255.0.0.0

Enter the default, classful mask for ip address 138.166.116.229

255.255.0.0

A network with a subnet mask of 255.255.255.240 would have what prefix?

28

Which formula would you use to arrive at the number of hosts on a subnet?

2x- 2, where x represents the number of zeroes in the subnet mask

How many binary digits are in an IPv4 address?

32

How many subnets can you create if you borrow 5 bits of a Class C network?

32

What is the increment for a /27?

32

How long is a subnet mask?

32 bits

Server Message Block uses TCP port __________ by default.

445

Which TCP port does Terminal Access Controller Access Control System Plus (TACACS+) use by default?

49

If you needed a network that would provide for 20 hosts, how many host bits would you have to have?

5

What UDP port do DNS servers primarily use?

53

When using the newer Rapid Spanning Tree Protocol (RSTP), how long does it take a network to return to convergence?

6 seconds

What is the minimum size of an Ethernet frame?

64 bytes

If you needed a network that would provide for 200 hosts, how many host bits would you have to have?

8

What is the increment of a /29?

8

Which port do HTTP Web servers use?

80

What wavelength is used on 10GBASE-SW fiber-optic cabling?

850 nm

What wavelength is used on a 10GBASE-SR network?

850 nm

Enter the class (capital letter) for 124.106.208.77

A

Which is an accurate statement about repeaters and bridges?

A bridge may act like a repeater to connect two networks, but then goes a step further—filtering and forwarding traffic between those segments based on MAC addresses.

The most-common block cipher, __________, is so fast even applications that traditionally used stream ciphers are switching to it.

Advanced Encryption Standard (AES)

Which statement about subnet masks is true?

All machines on the same network have the same subnet mask.

Apple called its protocol suite ___________________.

AppleTalk

Which protocol is a path vector routing protocol?

BGP

The most popular DNS server used in UNIX/Linux systems is called ____________________.

BIND

Enter the class (capital letter) for 201.191.108.62

C

Enter the class (capital letter) for 206.162.134.1

C

The specification for 100BASE-T calls for UTP cabling using __________ or better rated cabling.

Cat 5

What is the name of Cisco's proprietary operating system?

Cisco IOS

If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong?

Class B

A particular multicast called an IGMP group is assigned an address in which class range?

Class D range

Which statement best describes a Class E address ID?

Class E is considered to be experimental.

Active Directory leans heavily on __________; Active Directory uses it for the DHCP server to talk to the DNS server.

DDNS

Any network using ____________________ consists of a DHCP server and DHCP clients.

DHCP

Which term does CompTIA use for a relay agent that is enabled and configured within a router?

DHCP relay

Which term refers to an authentication and integrity protocol designed to prevent bad guys from impersonating legitimate DNS servers?

DNSSEC

Using the ping command, which message is displayed if your computer has no route to the address listed?

Destination host unreachable

What tasks should be performed as soon as an administrator finishes configuring a router?

Document how you configured the router and backup the router configuration.

Enter the class (capital letter) for 254.56.228.213

E

Which authentication method is commonly used for more-secure wireless networks?

EAP-TLS

Which e-mail server type has over 50 percent market share and runs on just about everything, from Unix/Linux to Windows?

Exim

The protocol used by Autonomous Systems to communicate with each other is a(n) __________.

Exterior Gateway Protocol (EGP)

What is the universal MAC address for broadcast?

FF-FF-FF-FF-FF-FF

Which is the best RADIUS server choice for UNIX/Linux?

FreeRADIUS

Web servers and Web browsers use ____________________ to communicate.

HTTP

Which is the most common type of proxy server?

HTTP

Which protocol is the underlying protocol used by the World Wide Web?

HTTP

Which protocol is the secure counterpart of HTTP used to enable connections between clients and servers that hackers can't break?

HTTPS

Which trunk standard enables you to connect switches from different manufacturers?

IEEE 802.1Q

Which protocol is the preferred alternative to POP3 and runs on TCP port 143?

IMAP4

A managed switch needs a(n) __________ to enable configuration through the network.

IP address

Which is true of hosts on the Internet?

IP addresses must be unique.

What information is included in the data portion of an Ethernet frame on an IP network?

IP addresses of the source and destination systems

Which tool does Cisco use to implement DHCP relay?

IP helper

Which is an authentication and encryption protocol suite that works at the Network layer of the OSI seven-layer model?

IPSec

Which protocol is a link state dynamic routing protocol?

IS-IS

The network or networks within an AS communicate with protocols called __________.

Interior Gateway Protocols (IGPs)

Which entity assigns Autonomous System Numbers (ASNs)?

Internet Assigned Numbers Authority (IANA)

Which attribute applies to the OSPF routing method?

It corrects link failures and creates convergence almost immediately.

Which statement best describes the preamble of an Ethernet frame?

It includes a 7-byte series of alternating ones and zeroes followed by a start frame delimiter.

Which authentication protocol is used in a TCP/IP network where many clients all connect to a single authenticating server with no point-to-point involved?

Kerberos

What is the most common connector used in a 1000BASE-SX network?

LC

Which protocol is the tool that programs use to query and change a database used by the network?

LDAP

The Internet Control Message Protocol (ICMP) works at __________ to deliver connectionless packets.

Layer 3

What OSI model layer supports content switches?

Layer 7

__________ specifies a number of features and options to automate the negotiation, management, load balancing, and failure modes of aggregated ports.

Link Aggregation Control Protocol (LACP)

VLANs based on __________ are called dynamic VLANs, although they are never used these days.

MAC addresses

Which authentication method is the most common authentication method for dial-up connections?

MS-CHAPv2

Although you can use it independently if you like, Windows DNS server is the default resolver and name server for ____________________—Microsoft's batteries-included approach to managing enterprise networks.

NULL

At which layer of the OSI model do routers work?

NULL

How long is the start frame delimiter?

NULL

If you can't see the network using ____________________, you may have a problem with your NetBIOS settings.

NULL

Manufacturers have accommodated the need for switches to connect to a variety of 10 GbE connector types by devising which concept?

NULL

The "R" in the standard 10GBASE-SR stands for which type of signaling?

NULL

The "W" in the standard 10GBASE-SW stands for which type of signaling?

NULL

The default VLAN on a switch has been assigned an IP address of 172.19.0.62/27 with a default gateway of 172.19.0.94. You can't ping the switch from your workstation which has address 172.19.0.66/27 but you can ping your default gateway which is 172.19.0.94. Why can't you ping the switch?

NULL

The foundation of which technique involves taking a single class of IP addresses and chopping it up into multiple smaller groups?

NULL

The vast majority of network rollouts in offices use 1000BASE-T connections, or __________, as you'll hear them called.

NULL

What TCP/IP application uses port 80?

NULL

What command would you run from a Windows command line to test a computer's network stack?

NULL

What general type of cabling is a technician most likely to use today when installing Ethernet cabling in areas with high electrical interference?

NULL

What information is kept in the DNS resolver cache?

NULL

What is the increment of 150.5.100.32 /21?

NULL

What is the network ID of 176.16.100.1 /20?

NULL

What was the original maximum data transfer rate of the first Ethernet developed by Xerox?

NULL

What wavelength is used on a 10GBASE-Ey network?

NULL

When a router has more than one route to the same network using the same routing protocol, the _______________ is used to determine the better route.

NULL

When a router is accessed remotely using SSH, which command displays its routing table?

NULL

Which column in a routing table tells the router which of its ports to use?

NULL

Which command is used to force a Windows client to update its records on the Active Directory's DNS server?

NULL

Which companies were involved in the 1979 introduction of the DIX Ethernet standard?

NULL

Which formula would you use to calculate the number of new subnets?

NULL

Which of the addresses below are valid hosts on network 192.168.1.64 /26? Pick two.

NULL

Which of the following is a network ID? Pick 2.

NULL

Which organization has added hundreds of generic TLDs, such as .biz for businesses and .rodeo?

NULL

Which pins on an RJ-45 connector are used to receive data?

NULL

Which protocol is used on the Internet for communication between Autonomous Systems?

NULL

Which protocol was originally Cisco's proprietary protocol?

NULL

Which protocol, used to handle low-level housekeeping tasks such as router advertisements, involves simple, single sessions that consist of a packet or a series of packets?

NULL

Which record points to the server that holds the records (zone) for a part of the DNS tree?

NULL

Which statement is true about DNS root servers?

NULL

Which switch is used with the Windows netstat utility to show name of a running program?

NULL

Which version of Ethernet was introduced in 1990?

NULL

Which very high-speed fiber network was already in place and being used for wide area networking (WAN) transmissions before the IEEE developed the 10 GbE Ethernet standards?

NULL

When a computer using NetBIOS booted up, it broadcasted its ____________________ along with its MAC address.

NetBIOS name

To what layer does the Internet Protocol correspond?

Network

Which tool is used by an administrator to manage many routers and provide an overall view of all the network?

Network Management Software (NMS)

__________ defines a newer series of protection applications that combine the features of what traditionally was done by separate applications.

Network access control (NAC)

__________ is a type of dedicated file server used in many networks.

Network attached storage (NAS)

Which routing protocol is the choice in most large enterprise's internal networks?

OSPF

Which statement is true of the Transport mode of IPSec?

Only the actual payload of an IP packet is encrypted.

Which would confirm that you have a DNS problem?

Ping works with the IP address but not the name associated with that address.

Which protocol is the Cisco protocol for accomplishing aggregation?

Port Aggregation Protocol (PAgP)

Which standard offers authentication, authorization, and accounting?

RADIUS

Which vector routing protocol is considered the granddaddy of all distance vector routing protocols?

RIP

Which routing protocol does not support variable-length subnet masking (VLSM)?

RIPv1

What protocol was adopted in 1994 and is now considered obsolete except for small, private WANs?

RIPv2

Which protocol is a distance vector routing protocol?

RIPv2

IANA has grown dramatically and now oversees five __________ that parcel out IP addresses to large ISPs and major corporations.

Regional Internet Registries (RIRs)

Which protocol is used to send e-mail from clients and between e-mail servers over TCP port 25?

SMTP

Which protocol offers a method for querying the state of certain network devices?

SNMP

Which term refers an encrypted link between SSH processes on two separate computers?

SSH tunnel

Which enables secure data transfers between two hosts and thus might have replaced FTP?

Secure Copy Protocol (SCP)

Which cryptographic hash function comes in several variants?

Secure Hash Algorithm (SHA)

Which protocol was developed as a secure replacement for Telnet?

Secure Shell (SSH)

__________ maps a single routable (that is, not private) IP address to a single machine, enabling you to access that machine from outside the network.

Static NAT

Which protocol involves a three-way handshake?

TCP

Which protocol is connection-oriented?

TCP

What network protocol do Apple systems use today?

TCP/IP

Which option is a free GUI tool written by Mark Russinovich (the Guru of Windows utilities)?

TCPView

Which protocol is popular for moving files between computers on the same LAN, where the chances of losing packets are very small?

TFTP

Which is a freeform type of DNS record that can be used for anything and allows any text to be added to a zone?

TXT record

Which protocol enables you to administer a server remotely and communicate with other servers on your network?

Telnet

Which standard offers authentication, authorization, and accounting?

Terminal Access Control Access Control System Plus (TACACS+)

Which Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?

UDP

Which protocol do Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) use?

UDP

Which process allows you to assign ports to VLANs after you create the VLANs?

VLAN assignment

Mozilla Firefox is an example of a __________ application.

Web client

What is the name of the classic Cisco console cable, more commonly called a rollover cable?

Yost

When the DNS name space is compared to a computer's file system, a domain is like ____________________.

a folder

In order for a VLAN to get its name, what is typically appended to the word "VLAN"?

a number

Which term refers to a cipher's underlying mathematical formula?

algorithm

Which type of algorithm is used when two different keys, one to encrypt and one to decrypt, are used in encryption?

asymmetric-key

Which term is refers to any encryption that uses different keys for encryption and decryption?

asymmetric-key encryption

Which process defines what an authenticated person can do with data?

authorization

By convention, what is the name given to Area ID 0 (zero) of an Open Shortest Path First (OSPF) network?

backbone

What causes the most common problems with HTTPS connection?

bad certificates

Which term refers to the ability of one connection to handle more data than others?

bandwidth

Which method of sending a packet allows every computer on the LAN to hear the message?

broadcast

What entry is made at the command prompt in UNIX/Linux to display DNS server information?

cat /etc/resolv.conf

Which term refers to a standardized type of file that includes a public key and the digital signature of a trusted third party?

certificate

You won't get an HTTPS connection without a good __________ exchange.

certificate

Which term refers to the result of running plaintext through a cipher algorithm using a key?

ciphertext

CompTIA and many techs refer to a CIDR address as a ___________________ address, meaning the subnet used does not conform to the big three: A, B, or C)

classless

Which term is used for data hasn't been encrypted yet?

cleartext

What is the purpose of a crimper?

connect an RJ-45 connector to the cable

Two computers first acknowledge the other, after which they conduct their communication. They end by closing the communication. Which term describes this communication process?

connection-oriented

A router determines where an incoming packet should go by looking at the packet's __________.

destination IP addresses

Those using UNIX/Linux have an extra DNS tool called _____________________; it is similar to nslookup, but it only runs noninteractively—you ask it a question, it answers the question, and it puts you back at a regular command prompt.

domain information groper

A Web client's source port number, generated pseudo-randomly by the Web client computer, is classically assigned as a(n) __________ ports.

dynamic

What file transfer protocol uses UDP port 69?

dynamic

Which type of NAT allows many computers to share a pool of routable IP addresses that number fewer than the computers?

dynamic NAT

How many pins does an RJ-45 connector have?

eight

Which term means to scramble, mix up, or change data in such a way that bad guys cannot read it but the intended recipient of the data can descramble it.

encryption

Which term refers to session information stored by a computer on one side of a session?

endpoint

Which term refers to ports in the 49152 to 65535 range?

ephemeral

Which term describes the status of a port that is part of an active, working endpoint pair?

established port

A Class C network block uses the __________ octets to define only the network ID.

first three

How many fields does a basic Ethernet frame contain?

five

What general type of cabling is a technician most likely to use today when installing Ethernet cabling in areas with high electrical interference?

flow-band

Dynamic DNS (DDNS) enabled DNS servers to get automatic updates of IP addresses of computers in their __________________.

forward lookup zones

Which technology acts on behalf of clients, getting information from various sources and handing that info to the clients?

forward proxy server

What is an advantage of fiber-optic cabling?

greater maximum distance

Which term describes a mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length?

hash

What term best describes the way the DNS is organized?

hierarchical

Which term refers to the passage of a packet through a router?

hop

Which item is part of a fully qualified domain name (FQDN)?

host name

In the DNS naming convention, what is the correct sequence for writing a fully qualified domain name (FQDN)?

host.domain.root

Cryptographic hash functions have a huge number of uses, but a common one is for verifying file __________.

integrity

Which command is used in Windows to eliminate any DNS caches on the local system?

ipconfig /flushdns

Which command is used to force a Windows client to update its records on the Active Directory's DNS server?

ipconfig /registerdns

Which is the oldest ACL access model?

mandatory access control

What is the meaning of the "10" in 10BASE-T?

maximum speed of 10 Mbps

Which is used to determine the largest frame a particular technology can handle?

maximum transmission unit

Which method of sending a packet allows a single computer to send a packet to a group of interested computers?

multicast

What type of fiber-optic cabling and connectors does a 100BASE-FX network use?

multimode with ST or SC connectors

The VLAN ID a trunk port associates untagged traffic with its __________VLAN.

native

Which command is universally known as the "show me the endpoint" utility?

netstat

The 802.3 working group defines wired network standards that share the same basic frame type and __________.

network access method

A(n) __________ consists of multiple sensors placed around the network, often on one or both sides of the gateway router.

network-based IDS (NIDS)

All operating systems have a version of the __________ tool that enables DNS server queries.

nslookup

Which term describes the status for a socket that is prepared to respond to any traffic destined for that socket's port number?

open port

When a collision occurs on a network relying on the CSMA/CD access method, what alerts the network interface cards (NICs)?

overlapping signals

Every Fully Qualified Domain Name (FQDN) will always have a(n) __________ on the end to signify the root.

period (.)

In the DNS naming convention, what is each name separated by?

period (.)

Which is your best friend when testing DNS?

ping

What command can you use to tell a device to send packets to itself?

ping 127.0.0.1

What is another name for dynamic NAT?

pooled NAT

Telnet runs on TCP __________.

port 23

Which form of NAT typically handles the one-to-many connections?

port address translation (PAT)

Another name for port bonding is __________.

port aggregation

Which is used to designate a specific local address for various network services?

port forwarding

Which technology is incredibly useful for any type of situation where an administrator needs to inspect packets coming to or from certain computers?

port mirroring

Which mode allows an intrusion detection system (IDS) to inspect a copy of every packet on a network?

promiscuous

Which type of port has a number in the 1024 to 49151 range?

registered

If you ping a device and no echo reply comes back before the default time, ping will respond with a __________ message.

request timed out

What enables a system to determine an FQDN by knowing the IP address?

reverse lookup zones

Which mechanism will move a port into a root-inconsistent state if BPDUs coming from a certain direction indicate another switch is trying to become the root bridge?

root guard

Which servers are subordinate to the primary server, but all support the same domain?

secondary

Which term is used for any single communication between a computer and another computer?

session

In a specification such as 10BASE-T, what does the word "BASE" identify?

signaling type

Which modular transceivers have replaced gigabit interface converters (GBICs) as the modular transceiver of choice?

small form-factor pluggable (SFP)

The NIC and the attached __________ determine full- or half-duplex during the auto-negotiation process.

switch

Dynamic IP addressing via ____________________ automatically assigns an IP address whenever a computer connects to the network.

the Dynamic Host Configuration Protocol (DHCP)

Many years ago, the ping command had a bug that allowed malicious users to send malformed ping packets to a destination, causing __________.

the ping of death issue

What is the cornerstone of subnetting?

the subnet mask

What is another name for a timestamped service ticket?

token

Within the DNS hierarchy, which term refers to the DNS servers just below the DNS root?

top-level domain servers

Which tool records the route between any two hosts on a network?

traceroute

Which three states can be applied to switches using VLAN Trunking Protocol (VTP)?

transparent, server, and client

Which term describes a port on a switch that is configured to carry all traffic, regardless of VLAN number, between all switches in a LAN?

trunk port

Which method of sending a packet allows one computer to send a message directly to another?

unicast

Which type of cabling was used with 10BASE-T?

unshielded twisted pair (UTP)

Which type of network enables you to segment a physical network into multiple discreet networks without adding additional hardware?

virtual local area network (VLAN)

The different colors of the laser signals transmitted over fiber-optic cables feature different __________.

wavelengths

What name is given to the port numbers in the range of 0 to 1023?

well-known port numbers


Kaugnay na mga set ng pag-aaral

AUT 125 - Chapter 21 Coolant System Operation and Diagnosis

View Set

Fluid Volume Excess (Overload)/Hypervolemia

View Set

AC Sys, Lvl I - Lesson 2: Understanding Vectors and How to Use Them Effectively

View Set

Physical Science (PSY151) Chapter 7: Les Thomas

View Set

[Exam 3] Pearson Questions: Ch. 10, 11, 12, 14 [MKT 381]

View Set

Nutrition Chapter 6 Fats Cengage

View Set

Science 1091, 4th Edition, Self Test

View Set