Networking+ Domain 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following features do digital IP phones use to supply power through a switch port? Spanning Tree PoE 802.1x Trunking VPN

Power over Ethernet (PoE) supplies power to end devices through the RJ45 Ethernet switch port. Power to the phone is carried on unused wires within the drop cables.

What is the purpose of using Ethernet bonding? (Select two.) Provides a failover solution for network adapters. Increases network performance. Provides increased bus speeds. Enables Dual Remote Access (DRA) over a WAN link. Increases read and write operations between the system bus and network adapters.

Provides a failover solution for network adapters. Increases network performance.

You manage a single subnet with three switches. The switches are connected to provide redundant paths between themselves. Which feature allows the switches to pass VLAN traffic between themselves? PoE Spanning Tree 802.1x Trunking

Trunking

What are other names for a VoIP server? (Select two.) QoS Jitter VoIP PBX IP-PBX Hard phone

VoIP PBX IP-PBX

Which VoIP device helps establish the connection between two VoIP phones? VoIP endpoint VoIP server VoIP codec VoIP gateway

VoIP server

Which wireless networking component is used to connect multiple APs together? STA BSS IBSS WDS

WDS

How many total channels are available for 802.11g wireless networks? 3 11 12 23 54

11

Which network modes can typically be used for both 2.4 GHz and 5 GHz clients? (Select two.) 802.11g only 802.11b only 802.11n only 802-11a only 802.11ax only

802.11n only 802.11ax only

Larry is tasked with implementing a VoIP system in the office. He presents his research to his boss, who wants to use the current hard phones to save money. What BEST explains why this is not possible? Regular hard phones only work with SNMP, and VoIP hard phones use UDP and TCP. Hard phones don't conform to IEEE 805.3. A hard phone does not have the internal computing parts to accept VoIP transmissions. The old phones don't provide conferencing, but VoIP hard lines do.

A hard phone does not have the internal computing parts to accept VoIP transmissions.

Which of the following BEST describes the term auto-medium dependent crossover? A protocol that sends IPv6 ICMP messages to discover devices on an interface. An algorithm used with half-duplex devices to detect when a transmission can be sent. A phone designed to be used over an internet connection. A line-sensing port that detects which type of cable configuration is needed for connection.

A line-sensing port that detects which type of cable configuration is needed for connection.

What is a soft phone? A device that converts fax calls and other soft calls between the PSTN and an IP network. A traditional or VoIP phone that has a padded handset that is more comfortable for the user. A software algorithm that compresses VoIP data prior to transmission on an IP network. A software application that runs on a computer or other device that accesses a VoIP server to make real-time phone calls.

A software application that runs on a computer or other device that accesses a VoIP server to make real-time phone calls.

Which of the following is a characteristic of static routing in comparison to dynamic routing? All routes must be manually updated. Routers can only use static routing when not connected to the internet. Routers use the hop count to identify the distance to a destination network. Routers send packets to the next hop router.

All routes must be manually updated.

Which of the following is a device that can send and receive data simultaneously? Full-duplex Managed Honeypot Unmanaged

Full-duplex

Which of the following routing protocols do routers on the internet use to learn and share routes? EIGRP OSPF IS-IS BGP RIP

BGP is the protocol used on the internet, which ISPs use to identify routes between ASs (autonomous systems)

Which type of communication path-sharing technology do all 802.11 standards for wireless networking support? CSMA/CD Polling CSMA/CA Token passing

CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)

Which of the following protocols prescribes what to do when a data channel is in use on a half-duplex device? ARP CSMA/CD Auto-MDI-X NDP

CSMA/CD Carrier Sense Multiple Access/Collision Detection (CSMA/CD) is a protocol used to prescribe what to do when a data channel is in use on a half-duplex device.

What does the ip address dhcp command allow you to do? Send the DHCP server address for all connected devices. Specify the DHCP relay server for forwarding DHCP packets. Configure a switch to obtain an IP address from a DHCP server. Configure a switch to act as a DHCP server.

Configure a switch to obtain an IP address from a DHCP server.

Which of the following routing protocols uses relative link cost as the metric? BGP RIP OSPF EIGRP

OSPF

Which of the following can become a critical point of failure in a large wireless network infrastructure? Controller Access point Backhaul Wireless bridge

Controller

Which protocol should you disable on a switch's user access ports? TCP DTP IPsec PPTP

DTP

Which OSI model layer is a switch associated with? Network Physical Data Link Transport

Data Link

You have configured a wireless access point to create a small network and configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do? Enable SSID broadcast. Change the channel on the access point to a lower number. Create a wireless profile on the client. Decrease the beacon interval.

Decrease the beacon interval.

Which of the following is true of a wireless network SSID? Is a 48-bit value that identifies an AP. Enables wireless interconnection of multiple APs. Coordinates all communications between wireless devices. Groups wireless devices together into the same logical network.

Groups wireless devices together into the same logical network.

Which of the following BEST describes the concept of a VLAN? Devices on the same network logically grouped as if they were on separate networks. Devices in separate networks logically grouped as if they were in the same network. Devices connected by a transmission medium other than a cable (such as microwave or radio transmissions). Devices connected through the internet that can communicate without using a network address.

Devices on the same network logically grouped as if they were on separate networks.

What are the four primary systems of IoT technology? Devices, gateway, data storage, and remote control Devices, sensors, apps, and internet Devices, gateway, sensors, and apps Devices, data storage, remote control, and internet

Devices, gateway, data storage, and remote control

Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow the creation of guest WLANs for keeping public wireless traffic separate from private traffic? Lightweight access point (LWAP) with wireless controller infrastructure Independent access points Distributed wireless mesh infrastructure Hub-and-spoke infrastructure

Distributed wireless mesh infrastructure

Which of the following routing protocols is a hybrid that uses a composite number for its metric based on bandwidth and delay? BGP RIP EIGRP OSPF

EIGRP

Which of the following routing protocols is classified as a hybrid routing protocol? IS-IS OSPF RIP EIGRP

EIGRP (Enhanced Interior Gateway Routing Protocol) uses a composite number for its metric.

Which networking device behaves similarly to an access point that conforms to the IEEE 802.11b standard? Gateway Router Terminal Hub

Hub

Which of the following hardware devices regenerate a signal out of all connected ports without examining the frame or packet contents? (Select two.) Repeater Bridge Hub Router Switch

Hub Repeater

Which of the following describe the EDGE cellular technology? (Select two.) Is the first internet-compatible technology. Uses MIMO. Is an extension to 3G. Offers speeds of 400 to 1,000 Kbps.

Is the first internet-compatible technology. Offers speeds of 400 to 1,000 Kbps.

Which of the following is true about an unmanaged switch? It allows port configuration. It can connect to all devices in a small area. It supports link aggregation. It is capable of VLAN creation.

It can connect to all devices in a small area.

Which of the following are true of the IS-IS routing protocol? (Select two.) A router is the boundary between one area and another. It divides large networks into areas. It is a classful protocol. It supports IPv6 routing. It uses bandwidth and delay for the metric. It is best suited for small networks.

It divides large networks into areas. It supports IPv6 routing.

What is used to select the BEST possible route when multiple routes to a destination exist? Autonomous system number Metric Distance vector EGP

Metric

Which of the following functions does a consumer-grade access point combine into a single device? (Select two.) NAT AES WPA SSID WAP

NAT WAP

Which of the following BEST describes OSPF? OSPF is a classless link state routing protocol. OSPF is a classful distance vector routing protocol. OSPF is a classful link state routing protocol. OSPF is a classless distance vector routing protocol.

OSPF is a classless link state routing protocol.

What are the main differences between the OSPF and IS-IS routing protocols? OSPF is a link state protocol, while IS-IS is not. OSPF requires an area 0, while IS-IS does not. OSPF is a classful protocol, while IS-IS is a classless protocol. OSPF is an IGP routing protocol, while IS-IS is a BGP routing protocol.

OSPF requires an area 0, while IS-IS does not.

At which layer of the OSI model do hubs operate? Physical Data Link Internet Layer 3

Physical

Which of the following protocols has a limit of 15 hops between any two networks? IS-IS BGP EIGRP RIP OSPF

RIP

What is the main difference between RIP and RIPv2? RIP is a distance vector protocol, while RIPv2 is a link state protocol. RIP has a limit of 15 hops, while RIPv2 increases the hop count limit. RIP use hop count for the metric, while RIPv2 uses a relative link cost. RIP is a classful protocol, while RIPv2 is a classless protocol.

RIP is a classful protocol, while RIPv2 is a classless protocol.

Which of the following statements about RIP is true? RIP is a link state routing protocol. RIP is suitable for large networks. RIP is the routing protocol used on the internet. RIP uses hop count as its cost metric.

RIP uses hop count as its cost metric.

Your manager has asked you to set up four independent APs and configure them with the same SSID, channel, and IP subnet. What should you enable to accomplish this? A spectrum analyzer Roaming Channel bonding A basic service set

Roaming

Which of the following is a console cable also known as? Crossover cable Rollover cable Fiber optic cable Straight-through cable

Rollover cable

Which of the following protocols is used by VoIP to set up, maintain, and terminate a phone call? SIP TLS RTP SSH NTP

SIP

You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and have the ability to roam between them. How should you configure the access points? Different SSID and different channel Same SSID but different channel Different SSID but same channel Same SSID and same channel

Same SSID but different channel

An eight-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do? Send the frame out ports two through eight. Drop the frame. Send the frame out the destination port. Send the frame out all eight ports.

Send the frame out ports two through eight.

You manage a single subnet with three switches. The switches are connected to provide redundant paths between themselves. Which feature prevents switching loops and ensures that there is only a single active path between any two switches? Spanning Tree Trunking 802.1x PoE

Spanning Tree

Which of the following features dynamically places switch ports in blocking or forwarding states? Trunking Spanning Tree PoE Mirroring

Spanning Tree is a protocol on a switch that allows it to maintain multiple paths between other switches within a subnet.

Which of the following technologies does GSM use to allow multiple connections on the same frequency? Code-division multiple access Time-division multiple access Multiple-input, multiple-output Frequency-division multiple access

Time-division multiple access

When configuring VLANs on a switch, which type of switch ports are members of all the VLANs defined on the switch? Gigabit and higher Ethernet ports Trunk ports Any port not assigned to a VLAN Each port can only be a member of a single VLAN

Trunk ports

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch in VLAN 1. What should you configure to allow communication between these two devices through the switches? Trunking Layer 3 switching Bonding Spanning Tree

Trunking

What is the MOST common Transport layer protocol that VoIP uses? TCP UDP SMTP FTP

UDP

Upper management has asked you if there is a way to integrate phone calls, emails, and instant messaging into a single platform. Which of the following systems should you recommend? PSTN Unified communications Quality of Service Voice over IP

Unified communications

In which of the following situations would you use port security? You want to restrict the devices that could connect through a switch port. You want to prevent MAC address spoofing. You want to control the packets sent and received by a router. You want to prevent sniffing attacks on your network.

You want to restrict the devices that could connect through a switch port.

What are the two protocols used most often with IoT devices? (Select two.) Zensys Zerg Zigbee Z-Wave Zbot

Zigbee Z-Wave

Jake is a network administrator for a hospital. There is medical equipment that relies on having uninterrupted internet connectivity. Which of the following types of routing protocols should Jake focus on to ensure that the hospital's network connectivity remains reliable? Interior dynamic routing protocols Exterior dynamic routing protocols Distance vector routing protocols Link state routing protocols

Exterior dynamic routing protocols provide redundancy in internet connectivity and ensure that the medical equipment is constantly connected to the internet.

Under which of the following circumstances might you implement BGP on your company network and share routes with internet routers? If the network has over 15 areas and uses IPv6. If the network is connected to the internet using public addressing. If the network has over 15 hops. If the network is connected to the internet using multiple ISPs.

If the network is connected to the internet using multiple ISPs.

Which of the following are true about a MAC address? (Select two.) It is typically represented by hexadecimal numbers. It is typically represented by octets of decimal numbers between 0-255. It is a 32-bit address. It is a 48-bit address. It is a 64-bit address.

It is a 48-bit address. It is typically represented by hexadecimal numbers.

Which type of switch optimizes network performance by using ASIC to perform switching at wire speed? Unmanaged switch Multilayer switch Layer 2 switch Layer 1 switch

Multilayer switch A multilayer switch uses specialized hardware called an application-specific integrated circuit (ASIC) to perform switching functions in hardware rather than using the CPU and software. ASIC allows switches to perform the switching function at wire speed.

You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support? Spanning Tree PoE OSPF Mirroring

Spanning Tree

Which of the following devices operates at the OSI model Layer 2? Switch Firewall Hub Router

Switch

Which of the following BEST describes roaming? The name of the wireless network that is broadcasted from an AP. A model that connects wired and/or wireless networks. The ability to broadcast the same SSID across multiple APs. A deployment model used by newer wireless networks.

The ability to broadcast the same SSID across multiple APs.

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned both networks. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do? Manually reconfigure the default route to point to the new next hop router. Force RIP to perform an immediate update. Wait for convergence to take place. Stop and restart the RIP protocol on the router.

Wait for convergence to take place.

How do switches and bridges learn where devices are located on a network? When a frame enters a port, the destination MAC address is copied from frame header. When a frame enters a port, the destination IP address is copied from the frame header. When a frame enters a port, the source IP address is copied from the frame header. When a frame enters a port, the source MAC address is copied from the frame header.

When a frame enters a port, the source MAC address is copied from the frame header.

When would you consider changing the codec in your VoIP system? (Select two.) When sound quality is poor. When network latency causes callers to talk over each other. When VoIP data consumes too much of your network bandwidth. When excessive jitter causes unusual sound effects in VoIP calls. When an open-source VoIP protocol requires a different codec.

When sound quality is poor When VoIP data consumes too much of your network bandwidth.

Which data transmission rate is defined by the IEEE 802.11b wireless standard? 2 Mbps 10 Mbps 11 Mbps 56 Mbps

11 Mbps

Which technologies are used by the 802.11ac standard to increase network bandwidth? (Select two.) 40 MHz bonded channels 160 MHz bonded channels Data compression Four MIMO radio streams Eight MIMO radio streams

160 MHz bonded channels Eight MIMO radio streams

Which frequencies does Zigbee operate on? 2.7 GHz, 400 MHz, and 865 MHz 2.4 GHz, 500 MHz, and 818 MHz 1.4 GHz, 90 MHz, and 500 MHz 2.4 GHz, 900 MHz, and 868 MHz

2.4 GHz, 900 MHz, and 868 MHz

What is the maximum number of nodes Z-Wave allows on its mesh network? 231 223 322 232

232

How many total channels (non-overlapping) are available for 802.11a wireless networks? 3 11 12 24 54

24

What is the frequency of 802.11a networking? 900 MHz 1.2 GHz 2.4 GHz 5.75 GHz

5.75 GHz

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz. Which 802.11 standard will work BEST in this situation? 802.11b 802.11c 802.11a 802.11g 802.11d

802.11a

You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment, which your client complains runs too slowly. She wants to upgrade the network to run up to 600 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work BEST in this situation? 802.11b 802.11a 802.11n 802.11c 802.11d

802.11n

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 1,200 feet, use a frequency range of 5 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend? 802.11n 802.11b 802.11a Bluetooth

802.11n

Which of the following is the IEEE network standard that supports virtual LANs in an Ethernet network and is used in port tagging? 802.1AX 802.1Q 802.1Qbb 802.3

802.1Q

Which of the following is the open standard for tagging Layer 2 frames? 802.1q NDP ARP RFC1918

802.1q

You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components should be part of your design? (Select two.) Pre-shared keys TKIP encryption Open authentication 802.1x WEP encryption AES encryption

802.1x AES encryption

Which of the following must each device's MTU be set to for jumbo frames to transverse the network without risk of fragmentation? 9,000 1,500 3,000 6,000

9,000

A switch running STP is classified as a backup bridge. Which state is it in? Forwarding Listening Learning Disabled Blocking

Blocking

Which of the following routing protocols uses paths, rules, and policies instead of a metric to make routing decisions? BGP OSPF RIP EIGRP

Border Gateway Protocol (BGP) uses paths, rules, and policies instead of a metric to make routing decisions

You want to connect a laptop computer running Windows to a wireless network. The wireless network uses multiple access points and WPA2-Personal. You want to use the strongest authentication and encryption possible. SSID broadcast has been disabled. What should you do? Configure the connection with a pre-shared key and TKIP encryption. Configure the connection to use 802.1x authentication and AES encryption. Configure the connection to use 802.1x authentication and TKIP encryption. Configure the connection with a pre-shared key and AES encryption.

Configure the connection with a pre-shared key and AES encryption.

You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware, not just software configurations. In addition, SSL sessions should use the hardware components in the device to create the sessions. Which type of device should you use to accomplish this? Content switch Bandwidth shaper Proxy server Circuit-level gateway

Content switch

A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the website from being accessible on the internet. Which solution should you implement? Traffic shaping QoS Ethernet bonding Spanning Tree

Ethernet bonding Ethernet bonding (also called NIC teaming) logically groups two or more physical connections to the same network. If one NIC fails, the second one with a connection to the same network can still be used.

You have a private network connected to the internet. You do not want your routers to share routing information about your private network with internet routers. Which of the following BEST describes the type of routing protocol you should use? Distance vector IGP BGP Link state

IGP

Which of the following cellular network types use MIMO to increase 3G data throughput? (Select two.) WiMAX LTE CDMA2000 EDGE HSPA+

LTE HSPA+

At which OSI model layer does a media converter operate? Layer 1 Layer 2 Layer 3 Layer 4

Layer 1

Which of the following is a dynamic routing algorithm in which each router floods all the other routers in the network with information about its own neighbors and then shares again only when a change occurs? Link state routing Static routing Distance vector routing Routing Information Protocol

Link state routing

Which of the following BEST describes port aggregation? Multiple ports linked together and used as a single logical port. IEEE network standard 802.3. Multiple VLANs traveling through a single port. A priority-based flow control that allows you to prioritize network traffic.

Multiple ports linked together and used as a single logical port.

Which of the following is the protocol used for address resolution when you switch from IPv4 to IPv6? ARP NDP CSMA/CD Auto-MDIX

NDP Neighbor Discovery Protocol (NDP) is the protocol that replaced ARP in IPv6 and is used for address resolution.

Which of the following devices operate at the Data Link layer of the OSI model? (Select three.) Hubs Network interface cards (NICs) Routers Repeaters Gateways Bridges Switches

Network interface cards (NICs) Bridges Switches

Which of the following routing protocols divides the network into areas with all networks required to have an area 0 (to identify the backbone area)? RIP IS-IS OSPF EIGRP

OSPF

Which of the following routing protocols are classified as link state routing protocols? (Select two.) OSPF RIPv2 RIP EIGRP IS-IS

OSPF IS-IS

Which of the following has the least default administrative distance? External BGP OSPF RIP Static route to an IP address

Static route to an IP address has a default administrative distance of 1

You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters do you need to configure on the laptop? (Select two.) Channel TKIP encryption BSSID AES encryption Pre-shared key

TKIP encryption Pre-shared key

Which switch features are typically used with VoIP? (Select two.) VLAN Mirroring PoE Bonding Spanning Tree

VLAN PoE

Which of the following benefits applies only to creating VLANs with switches and not to segmenting the network with regular switches? You can create multiple collision domains. You can create multiple broadcast domains. You can provide guaranteed bandwidth between two devices. You can segment the network based on physical location.

You can create multiple broadcast domains.


Kaugnay na mga set ng pag-aaral

Chapter 24: Management of Patients With Chronic Pulmonary Disease

View Set

MGMT Practice, MGMT 300 FINAL, Mgt 330 Final, CHAPTER 17, Management 1310 Ch. 17 (Dickens), test 3

View Set

Completing the Application, Underwriting, and Delivering the Policy

View Set

Trauma and Stressor-Related Disorders

View Set

marketing channels, Marketing Quiz

View Set

Adding and Subtracting Fractions

View Set