Networking Main Set Ch. 1-7
True or false? Network Map is enabled by default in Windows Vista computers within an Active Directory domain.
False
True or false? TACACS+ is backward compatible with TACACS and XTACACS.
False
True or false? The IP address 169.254.226.4 can be routed on the Internet.
False
Unlike cabling, female RJ-45 jacks used in wall outlets, do not have CAT ratings.
False
Virtualization is designed for testing and development purposes only.
False
When a computer gives itself an Automatic Private IP Address (APIPA) it also includes a valid default gateway address.
False
When a disk is formatted, it is impossible to recover the data that was on the disk.. Answer
False
When purchasing new equipment for a small business it is a good idea to invest in expandability features that will meet the company's needs for the next 10 to 15 years.
False
Windows can be installed on an extended partition that has been formatted with the NTFS file system.
False
You don't need to physically secure your servers as long as you use a good strong password for your accounts.
False
Most TCP/IP applications use TCP as the Transport layer protocol because it is a connectionless protocol designed to check for errors.
False (it is connection oriented)
A port number is an 8-bit value between 0 and 65,535.
False (it's 16 bit, same range)
BGP is used between routers inside a single Autonomous System.
False (it's used to connect autonomous systems)
True or false? A star Ethernet might be faster than a bus Ethernet, especially if there are many nodes on the network.
False. A star Ethernet might be slower than a bus Ethernet, because the hub generates a lot of data traffic that isn't used. It replicates all the data it receives from any source and sends it to every node.
True or false? To enable remote access to your network, you must provide services for authentication, authorization, and accounting.
False. Accounting functions are optional.
True or false? Events are collected in event reports.
False. Events are collect in event logs.
True or false? Firewalls are hardware devices.
False. Firewalls can be implemented as hardware or software.
True or false? The System Diagnostics Data Collector Set runs for exactly 5 minutes.
False. It runs for 1 minute.
True or false? Windows 2000 Professional clients have no way of supporting IEEE 802.1x authentication.
False. Microsoft provides an 802.1x Authentication Client download that allows Windows 2000 computers to use the 802.1x standard.
True or false? On the majority of today's laptop computers, the network adapters are PC Cards.
False. Network adapters are standard equipment on notebook computers now.
True or false? In Windows Vista, you use the software that comes with your modem to create dial-up connections to remote servers.
False. Once you've installed a modem on your computer, you establish a connection to an ISP's dial-up server or a company's remote access server by using Windows Vista's "Set up a connection or network" wizard.
True or false? PCI-based modems are less expensive to purchase because the CPU must handle all the processing, making them cheaper to produce.
False. The CPU handles all the processing for an AMR, CNR, or ACR modem, sound card, or network card.
True or false? The internetworking device used to connect computers on a Token Ring network is called a Token Ring hub.
False. Token Ring networks use Multistation Access Units (MSAUs).
True or false? The star topology uses a central networking device called a multistation access unit (MSAU).
False. Token Ring networks use a multistation access unit (MSAU).
True or false? A WINS server is necessary for address translation between IP addresses and network nodes' FQDNs.
False. WINS is used for NetBIOS names.
True or false? You must enable the Windows Event Collector service on the source computer when configuring event forwarding.
False. You must configure it on the collecting computer.
This term is used to refer to any of the several variations of ethernet that operate at 100 Mbps?
Fast Ethernet
What term is used to refer to any of the several variations of Ethernet that operate at 100 Mbps?
Fast ethernet
What general type of cabling is a tech most likely to use today when installing Ethernet cabling in areas with high Electrical Interference?
Fiber-optic
What kind of cabling does the 10BaseFL standard specify?
Fiber-optic
Why might you filter outgoing traffic between your DMZ and the Internet?
Filtering outgoing traffic that is initiated by a DMZ computer would prevent your systems from being used to take part in distributed denial-of-service attacks.
You support a large,complicated network. After experiencing problems and testing the cabling, you have discovered a bad horizontal cable. What should you do next?
Hire an experienced installer
Which of the following is a new file-sharing option that can be used on the network if all the computers have Windows 7 installed?
HomeGroup
a file sharing option in Windows 7
HomeGroup
What is the term used for the passage of a packet through a router?
Hop
What term is used for the cabling that runs from the telecommunications room to the PCs?
Horizontal cabling
It uses the same divisor as the sending station to find the same remainder
How does the receiving station on a network use the CRC to verify that it received accurate data?
B
How does the receiving station on a network use the CRC to verify that it received accurate data? A. It uses a new divisor to find a new reminder B. It uses the same divisor as the sending station to find the same remainder C. It uses the same divisor as the sending station to find a different remainder D. It adds its key to that of the sending station to find the total
A
How long is a Mac Address? A. 12 Hexidecimal Characters B. 48 bytes C. 12 bytes D. 32 bytes
B
How long is a subnet mask? A 24 bits B 32 bits C 32 bytes D 16 bits
D
How many basic pieces of information does an Ethernet frame contain? A 4 B 5 C 6 D 7
D
How many binary digits are in an IPv4 address? A. 4 B. 8 C. 16 D. 32
C
How many layers does the OSI model Contain? A. 3 B. 5 C. 7 D. 9
7
How many layers does the OSI model contain?
C
How many pins does an RJ-45 connector have? A 2 B 4 C 8 D 6
4
How many wires does the 10BaseT specification require in the cabling used?
A
How many wires does the 10BaseT specification require in the cabling used? A 4 B 8 C 64 D 6
For a network to function in full-duplex, which devices must support full duplex?
Hub, NIC, and Switch
Who assigns Autonomous System Numbers (ASNs)?
IANA
Which of the following is a standard developed by Citrix for use with a remote terminal connection?
ICA
What organization oversees the registration of domain names?
ICANN
A smurf attack overwhelms a host by flooding it with ____________ packets.
ICMP
What is the protocol of choice for very simple applications that never need more than a single packet?
ICMP
Which protocol does the ping application use?
ICMP
What is the protocol of choice for very simple applications that never need more than a single packet?
ICMP (The Internet Control Message Protocol)
Which protocol does the PING application use?
ICMP (The Internet Control Message Protocol)
Which of the following is the most popular wireless networking standard?
IEEE 802.11
This trunk standard enables you to connect switches from different manufacturers.
IEEE 802.1Q
Which standard includes secure authentication using a RADIUS server and password encryption using EAP?
IEEE 802.1x
What organization developed the new IPv6 standard?
IETF
Which protocol enables routers to communicate with hosts to determine a group membership for multicast communications?
IGMP
How does the code of ethics in a human resources policy relate to computer security?
It defines the stance of the organization on information security and demands that users act honestly, responsibly, and legally to protect the organization's information.
Which of the following is not a true statement regarding the function of a switch?
It determines the path used based on the destination IP address.
What is the statement that describes the preamble of an Ethernet frame?
It includes 64 bits of alternating 1s & 0s that ends with 11 to notify the receiving NIC.
Which of the following statements best describes the preamble of an Ethernet frame?
It includes 64 bits of alternating ones and zeroes that ends with 11 to notify the receiving NIC that a frame is starting.
What best describes the preamble of an Ethernet frame?
It includes 64-bits of alternating ones and zeros that ends with 11 to notify the receiving NIC that a frame is starting
Which of the following statements best describes an IP address?
It is a unique dotted decimal number assigned to every network node.
What does it usually mean when the activity light on a switch is blinking?
It is communicating with the network.
Why is a server in a client/server model called dedicated?
It is dedicated to serving over the network.
Which of the following is NOT an advantage of fiber-optic cabling over UTP?
It is easier and cheaper to install then UTP
Of the following are reasons to purchase name-brand NICs. (Choose all that apply)
It is easier to replace a missing driver./They often have extra features and utilities./It is easier to return them if they are defective.
Which of the following is an advantage of UTP cabling? (Choose all that apply)
It is inexpensive./It is easy to install./It provides protection against crosstalk.
What is NOT a reason for an organization to use 100BaseFX Ethernet?
It is more inexpensive & easier to install than the other 100-mbps standards
Which of the following is NOT an advantage of UTP cabling?
It is not susceptible to electro-magnetic interference.
Which of the following is not a valid statement about PCIe?
It is slower than USB
What is a disadvantage of UTP cabling?
It is susceptible to electro-magnetic interference
What is a PDU?
It is the name given to the unit of information used by each layer.
What is meant by operating system hardening?
It is the process of modifying an operating system's default configuration to make it more secure from outside threats.
What is the significance of the following Internet Protocol (IP) address: 127.0.0.1?
It is used for internal diagnostic purposes on IP hosts.
Which of the following would not be a reason to run the cabling outside the walls?
It looks neater than cabling that is inside the walls.
What does it mean if a NIC runs in promiscuous mode?
It processes all frames.
Which of the following is true of an Ethernet hub?
It reads a signal coming in from 1 port & repeats the signal out to the other ports.
Which of the following is true of an Ethernet hub?
It reads a signal coming in from one port and repeats the signal out to the other ports.
Select the functions below that a NIC performs. (Choose all that apply.)
It sends and receives binary data./It provides an interface between the PC and the network./It creates frames.
Which of the following attributes does not apply to the OSPF routing method?
It sends routing information at regular intervals even if there are no changes
What is the main disadvantage of cable modem networking?
It uses a bus topology.
A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent?
It's the organizationally unique identifier for the manufacturer of the device.
What is the purpose of the default route?
It's where the router sends all packets with destinations of which it has no knowledge.
Which of the following is an open-source virtual machine manager developed by Red Hat?
KVM
This authentication protocol is used in a TCP/IP network where many clients all connect to a single authenticating server with no point-to-point involved.
Kerberos
Which of the following was a Cisco proprietary protocol that was replaced by L2TP?
L2F
IPSec usually provides the security for this type of VPN.
L2TP
What two tunnel protocols enable tunnel endpoints to act like NICs on the same network? (Select all that apply.)
L2TP/PPTP
The "R" in the standard 10GBaseSR stands for which type of signaling?
LAN
What is the most common connector used in a 1000BaseSX network?
LC
What directory service protocol used in Linux systems is also supported by Windows?
LDAP
This proprietary EAP authentication is used almost exclusively by Cisco on their wireless products.
LEAP
Which of the following are vulnerabilities of a poorly managed network?
Lack of security, unnecessary cost, unnecessary redundancy & lack of efficiency
Anything that moves data from one system to another, such as cabling or radio waves, is part of this layer of the OSI model.
Layer 1
Which layer of the TCP/IP model is mapped to the bottom two layers of the OSI model?
Layer 1
Which of the following layers of the OSI model does NOT offer any commonly used encryption methods or technologies?
Layer 1
Which layer of the TCP/IP model performs IP addressing functions?
Layer 3
On the OSI model, where does Internet Protocol fall?
Layer 3, Network (TCP/IP hits Layers 3-5)
What is the term that describes an approach that uses tight control over what a user account can do on a network, allowing the user to only do what they need to do for their job, and no more?
Least privilege
What does LED stand for?
Light emitting diode
Of the following, select only those conditions that are issues when dealing with fiber-optic cabling. Select all that apply.
Light leakage, attenuation, modal distortion
What systems can NOT use the arping command?
Linux, Mac OS X, UNIX
C
Local connections do not use this, although every routing table has a column for it, and therefore, a value appears in this field for each route. A Netmask B Interface C Gateway D Network Destination
What identifies how wires in a network connect to various switches and other devices?
Logical network diagram
This device combines multiple circuits at one end of a connection into a single complex circuit on a single wire. The signal is then split into the individual connections on the other end.
Multiplexer
What is the solution manufactures devised to accommodate the need for switches to connect to a variety of 10 GbE connector types?
Multisource agreements
What is the solution manufactures devised to accomodate the need for switches to connect to a variety of 10-GbE connector types?
Multisource agreements (MSAs)
Which one of the following passwords meets Windows password complexity requirement?
N3tworking1O1
a device designed specifically for file sharing
NAS
What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device?
NAT
A popular option for load balancing is to hide all the Web servers behind a single IP address using a special multilayer switch that performs these two types of operations.
NAT and port forwarding
This is the "show me the endpoint" command.
NETSTAT
If your network consists mostly of computers with Linux operating systems, which file-sharing system can you use that is native to Linux?
NFS
What is the native file-sharing protocol in Linux?
NFS
the Linux native file sharing protocol
NFS
What component of the computer provides it with a MAC address?
NIC
What network component is built into most PCs today?
NIC
a full-dublex network, what devices must support full duplex?
NIC & Switch
Which part of the network communication process is responsible for sending and receiving data to and from the network media?
NIC driver
Frame
NICs encapsulate data into a _________ for sending that data over a network.
C
NICs send and receive binary data as pulses of all the following except ____. A. electricity B. radio waves C. gamma rays D. light
Which is more secure, an LM hash or an NTLM hash? Why?
NTLM hashes are more secure. LM hashes start by converting all characters to uppercase then storing the hash in two 7-byte strings; longer passwords are truncated and shorter passwords are padded with null characters.
A ___________________ name is a 16-character name, with the first 15 characters available for the name and the 16th character reserved to describe a particular service or functionality.
NetBIOS
At what layer of the OSI model does the IP live?
Network
At what layer of the OSI model does the Internet Protocol work?
Network
At which layer of the OSI model do routers work?
Network
Which layer is responsible for determining the best path a packet should travel across an internetwork?
Network
Which layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system?
Network
In what layer does the NIC operate?
Network Access
This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while hiding the actual addresses of internal network hosts.
Network Address Translation (NAT)
What is the only network protection provided by Windows Internet Connection Sharing (ICS)?
Network Address Translation (NAT)
Who assigns area IDs?
Network Administrators
What layer of the OSI model does the internet protocol work?
Network Layer
An administrator managing many routers should be using this type of tool in order to have an overall view of all the routers.
Network Management System (NMS)
For Windows Server 2008, Microsoft's RADIUS server is called __________.
Network Policy Services (NPS)
Which of the following is among the top three most important objective domains for the CompTIA Network+ exam, based on the percentage of the test that it represents?
Network Technologies
Whose job is it to create a network diagram?`
Network administrator
Fiber-optic cable
Network cabling can use either light or electricity to transmit data. The faster of these types uses light along _________.
Which of the following includes every router, switch, server, CSU/DSU, cable modem, and wireless access point, including the make and model and firmware upgrade?
Network diagram
The Lee family has three computers in the house: Mom's desktop, Dad's laptop, and another desktop shared by the kids. They decide to build a wired 100Base-T Ethernet network to connect their computers together so Dad and the kids can print documents on the printer in Mom's home office. Which of the following components will they need to achieve this goal? (Choose all that apply)
Network interface cards (NICs)/A switch/Straight-through UTP cables
You are working at the help desk and you get a message that a user cannot access the Internet. You open a command prompt, ping the workstation's IP address, and get a response. You ask the user to try the Internet again. He does so with the same result— no connection. Which type of device is most likely to be the problem?
Network layer device
This document describes the broadcast domains and individual IP addresses for all devices in a network with static IP addresses, sometimes showing individual computers, but rarely showing connections to individual computers.
Network map
Different parts of an IP address
Network segment, then host segment; depends on class where network segment ends and host segment begins
Which of the following statements about prioritizing help calls are true? (Choose all that apply)
Network-wide problems take precedence over departmental problems./Problems with shared resources take precedence over individual desktop problems.
What term refers to the process that guarantees that data remains as originally sent, and that it came from an appropriate source?
Nonrepudiation
Which of the following terms refers to the process that guarantees that data remains as originally sent, and that it came from an appropriate source?
Nonrepudiation
When a collision occurs on a network relying on the CSMA/CD access method, what alerts the NICs?
Nonstandard voltage
Which of the following is an example of a network operating system in a classic client/server network?
Novell NetWare
Which one of the following is NOT a typical SONET data rate?
OC-9001
Which of the following is the broadcasting method used by later implementations of 802.11 networks?
OFDM
Which of the following protocols would you expect to find used as an interior gateway protocol within an Autonomous System?
OSPF
Which of the following is a tool that can tell you where a cable break is on a fiber cable?
OTDR
1000BaseLX
Of all the Gigabit Ethernet standards detailed in the chapter, which maintains a signal over the greatest distance?
Repeaters retransmit all packets, while bridges examine the destination MAC address to determine which packets to forward onto the next segment
Of the following statements, which is the best comparison of repeaters and bridges?
One telecommunications room supporting the entire network
Of the following, which would probably not be true of a network that occupies multiple stories of a large building?
What is the only important measure of coax cabling?
Ohm rating
What rating defines how much a cable resists the flow of electricity?
Ohm rating
B
On a TCP/IP network, what information within a packet does a router use to determine where an incoming packet should go? A Destination MAC addresses B Destination IP Addresses C Source MAC address D Source IP Address
Transport layer
On a sending machine, data gets broken up at the __________ of the OSI seven-layer model.
Of the following, which would probably not be true of a network that occupies multiple stories of a large building?
One telecommunications room supporting the entire network
Which of the following is true of the Transport mode of IPSec?
Only the actual payload of an IP packet is encrypted.
Select the link state dynamic routing protocol from the following list. Select all that apply in alphabetical order.
Open Shortest Path First (OSPF), IS-IS
What is the status for a socket that is prepared to respond to any IP packets destined for that socket's port number?
Open port and listening port
If you suspect that a fiber-optic run has a break, which type of device would you use to determine if there is a break, and to identify the location of the break?
Optical time domain reflectometer (OTDR)
When a collision occurs on a network relying on the CSMA/CD access method, what alerts the NIC?
Overlapping signals
Which type of NAT is the most popular?
Overload NAT
What acronym is used to refer to modern peer-to-peer applications?
P2P
You are the network administrator for a company that uses a private addressing scheme for its internal network. You have 300 workstations that regularly access the Internet. What process must be in operation on your network to allow all the workstations to have access to the Internet using only one public IP address?
PAT
What types of expansion slots can you expect to see in most desktop PCs today (excluding laptops)? Select all that apply.
PCI, PCIe
You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboard. You need to make sure that you have the right connector available on your motherboard. What type of connector would be appropriate?
PCI-Express
In early Windows systems there were no user accounts, and permissions on a share could be set to one of two levels.
Read Only and Full Control
Network components will fail, and you can sum up the best protection against such failure in one word. Select that word from the following:
Redundancy
This type of port has a number in the 1024 to 49151 range.
Registered port
Comparision of repeaters and bridges?
Repeaters retansmit all packets, while bridges examine the destination MAC address to determine which packets to forward onto the next segment.
Of the following statements, which is the best comparison of repeaters and bridges?
Repeaters retransmit all packets, while bridges examine the destination MAC address to determine which packets to forward onto the next segment.
Subnet mask properties
Represented in dotted decimal, 32 bit binary numbers; if there is a dash after a subnet mask, such as "/16" (wac 16, or IP network prefix), that means fill a "1" in for 16 places of the subnet mask (11111111.11111111.00000000.00000000)
What enables a DNS server to determine an FQDN by knowing the IP address?
Reverse lookup zones
This cipher will probably be the only streaming symmetric-key algorithm you see.
Rivest Cipher 4 (RC4)
What Microsoft Windows command can you use to add a static route to an Internet Protocol (IP) host s routing table?
Route
What is another term for a Layer 3 switch?
Router
Network
Routers function at which layer of the OSI model?
C
Routers function at which layer of the OSI model? A. Physical B. Data Link C. Network D. Transport
Internet
Routers function at which layer of the TCP/IP model?
They allow you to connect networks with different types of cabling or frames
Routers have which of the following capabilities?
C
Routers have which of the following capabilities? A they allow you to assign a MAC address to each computer B. They allow you to assign an IP address to each computer C. They allow you to connect networks with different types of cabling or frames D. They allow you to set up wireless networks
A
Routers using the OSPF protocol are organized into these groups A Areas B Subnets C Autonomous Systems D Ports
Which of the following Internet Protocol (IP) routing protocols are distance vector? (Choose all that apply)
Routing Information Protocol version 1 (RIP v1)/Routing Information Protocol version 2 (RIP v2)/Border Gateway Protocol (BGP)
You have been asked to install a VPN remote access solution using Windows Server.What do you need to install?
Routing and Remote Access Service (RRAS)
Which of the following is NOT a Linux file system?
SFS
What protocol handles outgoing e-mail?
SMTP
Which of the following protocols is NOT used for Windows 7 VPN connections?
SMTP
This protocol offers a method for querying the state of certain network devices.
SNMP
Which of the following is the record type for an authoritative DNS server?
SOA
What very high-speed fiber network was already in place before the IEEE developed the 10-GbE Ethernet standards?
SONET
What very high-speed fiber network was already in place before the IEEE developed the 10GbE Ethernet Standards?
SONET
The "W" in the standard 10GBaseSW stands for which type of signaling?
SONET/WAN
The W in the standard 10GbaseSW stands for which type of signaling?
SONET/WAN
d. ::1
26. Which of the following is the IPv6 loopback address? Select one: a. FEDC: 00CF: 1234 b. 1.0.0.127 c. 127.0.0.1 d. ::1
c. from their routers
27. Where do IPv6 addresses other than link-local get their subnet masks? Select one: a. EUI-64 b. IANA c. from their routers d. manually configured
d. FEDC::
28. Which part of this address, FEDC::CF:0:BA98:1234/64, is the network ID? Select one: a. CF:0:BA98:1234 b. FEDC c. BA98:1234 d. FEDC::
d. 2001:0000:0000:3210:0800:200C:00CF: 1234
29. Which of the following is an example of an IPv6 address? Select one: a. 197.169.94.82 b. 197.169.94.82/24 c. FEDC.BA98.7654.3210.0800.200C.00CF.1234.56AE.9512 d. 2001:0000:0000:3210:0800:200C:00CF: 1234
Which of the following speeds is the original maximum data transfer rate of the first Ethernet developed by Xerox?
3 Mbps
a. ISATAP
3. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one uses nonstandard addresses for the endpoints? Select one: a. ISATAP b. Teredo c. 6in4 d. 6to4
c. stateful
30. In what mode is a DHCPv6 server operating if it works much like an IPv4 DHCP server, passing out IPv6 addresses, subnet masks, and default gateways, plus optional items (DNS server addresses)? Select one: a. stateless b. passive c. stateful d. active
How many binary digits are in an IPV4?
32
How many binary digits are in an IPv4 address?
32
How long is a subnet mask?
32 bits
d. tunnels
32. What must you use to span the gap in IPv6 support and access the IPv6 Internet? Select one: a. IPv4-only routers b. DNS c. DHCP6 d. tunnels
d. multicast address
33. This is a set of reserved addresses designed to go only to certain systems. Select one: a. link-local address b. anycast address c. global unicast address d. multicast address
b. tunnel broker
34. An organization or person offering this service creates an IPv6 tunnel, and usually offers a custom-made endpoint client. Select one: a. TSP b. tunnel broker c. DHCPv6 d. TIC
What is the total bandwidth of an E3 line?
34.368 Mbps
Which of the following speeds is the original maximum data transfer rate of the first ethernet developed by Xerox?
3Mbps
How many disks are needed to implement a RAID 1 + 0?
4
How many wires does the 10BaseT specification require in the cabling used?
4
What is the norm today for the number of pairs in UTP cabling?
4
What is the decimal equivalent to the hexadecimal number D?
4-byte frame check sequence
d. AAAA
4. How does a DNS server today identify a record for a host with an IPv6 address? Select one: a. A b. NS c. IPv6 d. AAAA
What wavelength is used on a 10GBaseSR/SW network?
850nm
Which of the following ports does the Kerberos authentication protocol use?
88
Most WAPs use one of the following channels by default EXCEPT:
9
d. Teredo and 6in4
9. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which two can go through a NAT router? Select one: a. 6in4 and 6to4 b. ISATAP and 6to4 c. 6to4 and Teredo d. Teredo and 6in4
What is the maximum length for UTP cables allowed by the TIA/EIA 568 cabling specification?
90
C
A MAC address is composed of which two parts? A. The network address and the node address B. the computer name and the node address C.The organizationally unique identifier and the unique device ID of the NIC D. the IP address and the NICs serial number
In which network type does each host on the LAN has the same authority as other hosts? A Peer-to-peer network B Local area network C Client/server network D Wide area network
A Peer-to-peer network
The original four NAPs are called what? A Public Internet exchange points B Private Internet exchange points C Commercial Internet Exchange (CIX) points D Federal Internet Exchange (FIX) points
A Public Internet exchange points
Modems use which RJ connector? A RJ-11 B RJ-14 C RJ-25 D RJ-45
A RJ-11
If you're using copper cable, what type of cable do you use for user and patch cords? A Solid B Stranded
A Solid
Which standard specifies UTP standards for workstation runs? A TIA/EIA-568-C B TIA/EIA-569-A C TIA/EIA-606 D There is no standard for these components.
A TIA/EIA-568-C
What is the pinout difference between the T568A and T568B standards? (Select all that apply.) A The wire color attached to pin 1 B The wire color attached to pin 2 C The wire color attached to pin 3 D The wire color attached to pin 4 E The wire color attached to pin 5 F The wire color attached to pin 6 G The wire color attached to pin 7 H The wire color attached to pin 8
A The wire color attached to pin 1 B The wire color attached to pin 2 C The wire color attached to pin 3 F The wire color attached to pin 6
Define bastion host.
A bastion host is a computer that is located between the Internet and your intranet. It has two network cards, one for each network. Communications between the networks is typically blocked to prevent inbound access to intranet systems.
What are you trying to discover when you test a cable for continuity?
A broken wire
According to the 802.11 standard, an access point is _____________.
A device that acts as a transparent bridge between wireless clients and a wired network.
Which of the following is not part of a wall outlet?
A male jack
What does the information belowt convey? Active Connections Proto Local Address Foreign Address State TCP brcce3:ftp brcce3:0 LISTENING TCP brcce3:smtp brcce3:0 LISTENING TCP brcce3:http brcce3:0 LISTENING TCP brcce3:epmap brcce3:0 LISTENING TCP brcce3:https brcce3:0 LISTENING TCP brcce3:microsoft-ds brcce3:0 LISTENING TCP brcce3:1025 brcce3:0 LISTENING TCP brcce3:3389 brcce3:0 LISTENING TCP brcce3:netbios-ssn brcce3:0 LISTENING TCP brcce3:netbios-ssn brcce3:0 LISTENING TCP brcce3:1027 brcce3:0 LISTENING TCP brcce3:1210 localhost:1211 ESTABLISHED TCP brcce3:1211 localhost:1210 ESTABLISHED TCP brcce3:1215 localhost:1216 ESTABLISHED
A network delay using netstat
You recently completed a network overhaul over the weekend. Everything seems to be functioning properly until you receive a swarm of help desk support requests, all originating from one specific floor in your building. After a few minutes on the phone with those affected, you determine that no one has indicator lights active on their NICs. What is most likely the problem?
A network switch has not been powered on.
What two items does an IP address identify?
A network/A node (host)
What is a RADIUS realm?
A realm defines a namespace.
What does the ping message "Destination net unreachable" mean?
A router in the path from the source to the destination determined that the destination network does not exist.
On the Windows side of a PPTP connection, you run "Create a New Connection" with what result?
A virtual NIC is created
An IPv6 subnet ID is how many bits long? A 8 B 16 C 32 D 64
B 16
The standard BNC barrel connector is considered a how-many-pin connector? A 1 B 2 C 3 D 4
B 2
How many octets are in an IPv4 address? A 2 B 4 C 8 D 16
B 4
For which port must you create a Windows Firewall exception when using HTTP in event forwarding? A 45 B 80 C 180 D 443
B 80
Ratified in 2003, which standard is a combination of 802.11a and 802.11b? A 802.11c B 802.11g C 802.11h D 802.11n
B 802.11g
Of the four components to security on a wireless network, to which one does a RADIUS server belong? A Access control B Authentication C Encryption D Isolation
B Authentication
Which Ethernet standard designates fiber optic cabling as its required medium? (Choose all that apply.) A BASE-CX B BASE-R C BASE-T D BASE-W E BASE-X
B BASE-R E BASE-X
Which wireless protocol is a short-range wireless technology limited to transmission distances of about 100 meters or less? A 802.11a B Bluetooth C Wi-Fi D WiMAX
B Bluetooth
Which type of address is written in the standard 4-part dotted decimal address, followed by /N where N is a number from 0 to 32? A APIPA B CIDR C IPv4 D IPv6
B CIDR
Which WAN connection technology currently uses Enhanced Data rates for GSM Evolution (EDGE), Evolution-Data Optimized (EV-DO), or High-Speed Downlink Packet Access (HSDPA)? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless
B Cellular
What are two popular options for horizontal runs to modular office systems? (Select two.) A Cable trays B Consolidation points C Multiuser outlets D Straight runs E Splices
B Consolidation points C Multiuser outlets
Which occurs because alternating electrical current flowing through a wire creates an electromagnetic field around the wire? A Attenuation B Crosstalk C Interference D Shorts
B Crosstalk
The point at which the communications network owned by one company connects to the communications network owned by another company is called what? A Cross-connect B Demarc C Entrance facility D Main distribution frame
B Demarc
Which protocol do Web browsers and Web servers use most often? A FTP B HTTP C HTTP(S) D TFTP
B HTTP
When wiring Ethernet in a star topology, the internetworking device you use to take the signal transmitted from one computer and propagate it to all the other computers on the network is which of the following? A Bridge B Hub C Repeater D Switch
B Hub
The ping utility is the most common use of which protocol? A ARP B ICMP/ICMPv6 C IGMP D RIP
B ICMP/ICMPv6
A 16-byte address displayed in hexadecimal is called which of the following? A IPv4 address B IPv6 address C MAC address D Port address
B IPv6 address
Which type of hub is yet to be defined, but might include management features and support the TCP/IP Simple Network Management Protocol (SNMP)? A Active B Intelligent C Passive D Switching
B Intelligent
To which TCP/IP architecture layer do routing protocols belong? A Application B Internet C Network Interface D Transport
B Internet
Which command displays the IP address of the host and other configuration information? A Getmac B Ipconfig C Nslookup D Ping
B Ipconfig
Bridges operate at which OSI layer? A Layer 1 - Physical B Layer 2 - Data link. C Layer 3 - Network D Layer 4 - Transport
B Layer 2 - Data link.
Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server network D Wide area network
B Local area network
In which network topology do all nodes have independent connections to all other nodes? A Bus B Mesh C Ring D Star
B Mesh
The diameter of fiber optic cable is expressed in which measurement? A Centimeters B Microns C Millimeters D Ohms
B Microns
Which of the following event delivery optimization settings might you use when collecting events from a branch office that's connected over a slow WAN link? A Minimize Latency B Minimize Bandwidth C Maximize Bandwidth D Maximize Latency
B Minimize Bandwidth
The two most common Interior Gateway protocols are: A NAT B OSPF C RIP D SNMP
B OSPF C RIP
Impedance is measured in which of the following? A Nanoseconds B Ohms C Millimeters D Volts
B Ohms
Which connection type uses two directional antennas to make the wireless link? A Indoor point-to-multipoint LANs B Outdoor point-to-point links C Outdoor point-to-multipoint links D Wi-Fi E WiMAX
B Outdoor point-to-point links
Which terminating device has the following advantages? • It's a permanent link. • Channel testing is easier. • It's a solid connection. • Moves easily. A Connecting block B Patch panel
B Patch panel
__________ are designed to fix security vulnerabilities. A Hotfixes B Patches C Updates D BIOS updates
B Patches
Thicknet cables are which type? (Choose all that apply.) A RG-6 B RG-8 C RG-11 D RG-58 E RG-59
B RG-8 C RG-11
Which of the following Radio Guide cable categories is used for Ethernet networking? (Select all that apply.) A RG-6 B RG-8 C RG-9 D RG-11 E RG-58 F RG-59
B RG-8 D RG-11 E RG-58
Which standard addresses the entrance facility, equipment room, backbone pathways, telecommunications room, and horizontal pathways? A TIA/EIA-568-C B TIA/EIA-569-A C TIA/EIA-606 D There is no standard for these components.
B TIA/EIA-569-A
Which network medium is composed of four pairs of wires, where the pairs are twisted together and bundled within a covering? A Coaxial B Twisted pair C Fiber optic D Wireless
B Twisted pair
Which of the following cities hosts one of the four original NAPs? (Choose all that apply.) A San Francisco, CA B Washington, DC C New York, NY D Seattle, WA E Chicago, IL
B Washington, DC E Chicago, IL
Which utility enables you to reset a computer's network adapter? A Network Map B Windows Network Diagnostics C IPConfig D Local Area Connection
B Windows Network Diagnostics
In a UTP installation, you don't want to exceed what distance from the user's equipment to the final termination point in the telecommunications room? A 10 meters B 90 meters C 100 meters D 1000 meters
C 100 meters
What AWG gauge is most common for cross-connect jumpers? A 20 B 22 C 24 D 26
C 24
What is the default subnet mask for a Class C IP address? A 255.0.0.0 B 255.255.0.0 C 255.255.255.0 D 0.255.255.255
C 255.255.255.0
How many octets are part of the network ID when using the subnet mask 255.255.255.0? A 1 B 2 C 3 D 4
C 3
With VLAN trunking, a single network adapter can virtualize "n" number of network adapters. "n" has a theoretical limit of what? A 90 B 1000 C 4096 D 5012
C 4096
How many bits are in an octet? A 2 B 4 C 8 D 16
C 8
Which network type requires a network operating system (NOS)? A Peer-to-peer network B Local area network C Client/server network D Wide area network
C Client/server network
Which is WAN connection technology that uses high-speed connections made over regular analog phone lines? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless
C DSL
Which type of crosstalk is a calculated value of the crosstalk between pairs measured at the far end of the cable? A Near End Crosstalk (NEXT) B Far End Crosstalk (FEXT) C Equal Level Far End Crosstalk (ELFEXT) D Pair to Pair Crosstalk
C Equal Level Far End Crosstalk (ELFEXT)
Which of the following is the local group you can use to grant permissions to view event logs on a remote computer? A Event Log Managers B Event Log Admins C Event Log Readers D Event Log Browsers
C Event Log Readers
Which network medium carries light-based data through strands of glass or plastic no thicker than a human hair? A Coaxial B Twisted pair C Fiber optic D Wireless
C Fiber optic
Routers operate at which OSI layer? A Layer 1 - Physical B Layer 2 - Data link. C Layer 3 - Network D Layer 4 - Transport
C Layer 3 - Network
Which OSI layer addresses data messages, translates logical addresses into actual physical addresses, and routes data to addresses on the network? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application
C Layer 3—Network
The built-in identifying address coded into the NIC by the manufacturers is called which of the following? A IPv4 address B IPv6 address C MAC address D Port address
C MAC address
Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages
C Media access method
When the signal from one pair of wires interferes with the signal on another pair of wires, it's called what? A Attenuation B Impedance C Near End Crosstalk D Signal degradation
C Near End Crosstalk
To which TCP/IP architecture layer do the media access methods belong? A Application B Internet C Network Interface D Transport
C Network Interface
In which type of network is data is broken up into packets before it's sent over the network? A Point-to-point B Point-to-multipoint C Packet-switching D Circuit-switching
C Packet-switching
What are the two choices you have for terminating network wiring in the telecommunications room? (Choose two.) A Cross-connect B LAN router C Patch panel D Punchdown terminal
C Patch panel D Punchdown terminal
Backbones, workstation runs, and cross connects are part of what type of wiring? A Horizontal runs B Movable wiring C Permanent wiring D Vertical cabling
C Permanent wiring
Bridges filter based on which of the following? A Host name B Domain C Physical address D Signal quality
C Physical address
In which network topology is each node connected to a central device by two wires? A Bus B Mesh C Ring D Star
C Ring
Physically, Token Ring networks look like a star, but they operate like which topology? A Bus B Hybrid C Ring
C Ring
Which of the following is another name for default gateway? A Host B Hub C Router D Switch
C Router
Which e-mail protocol is used to send and receive e-mail messages between e-mail servers and used by e-mail client software to send messages to the server, but never used to retrieve e-mail from a server? A IMAP4 B POP3 C SMTP
C SMTP
What is the default lease length used by a wired scope created in the Windows Server 2008 DHCP Service? A Three hours B Three days C Six days D Eight days E 30 days
C Six days
Which is a simple software-based protocol analyzer? A The command-line utility ARP B The command-line utility IPCONFIG C The Windows Network Monitor utility D The Windows Network Control Panel utility
C The Windows Network Monitor utility
The interface on the access point used to connect to the existing wired network is typically called what? A Antenna B Transmitter C WAN port D Wireless NIC
C WAN port
Which of the following is the most widely used wireless technology at present? A 802.11a B Bluetooth C Wi-Fi D WiMAX
C Wi-Fi
Which network component is most vulnerable to performance problems caused by poor installation practices? A Clients B Servers C Wiring D Network transmission devices
C Wiring
Which command would you use to verify name resolution (DNS) settings? A ipconfig B ping C nslookup D tracert
C nslookup
Which Ethernet standard is the fastest? A Twisted Pair Ethernet B Fast Ethernet C Gigabyte Ethernet D 10GbE
D 10GbE
How many bits is an IPv6 address? A 8 B 32 C 64 D 128
D 128
Which is not a valid subnet mask? A 255.255.0.0 B 255.247.0.0 C 255.255.255.0 D 255.0.255.0
D 255.0.255.0
For which port must you create a Windows Firewall exception when using HTTPS in event forwarding? A 45 B 80 C 180 D 443
D 443
You should place your wireless LAN access points within how many meters of the wireless clients? A 40 to 125 B 55 to 200 C 60 to 90 D 90 to 400 E 115 to 550
D 90 to 400
Which of the following is a reason to revoke a certificate? A A newer certificate has been issued to the user or computer. B The private key has become known to someone other than the holder. C The user or computer is no longer employed by the company. D All of the above.
D All of the above.
An IPv4 packet sent to all workstations on the network is called a __________. A Directed packet B Unicast C Multicast D Broadcast
D Broadcast
What was introduced to make IPv4 Internet routing more efficient? A Subnet masks B Switches C DHCP D CIDR
D CIDR
IP address 227.43.76.109 is an example of which of the following classes of IP addresses? A Class A B Class B C Class C D Class D
D Class D
Which type of network cable transmits digital signals in the form of pulses of light? A Coaxial B Unshielded Twisted Pair (UTP) C Shield Twisted Pair (STP) D Fiber Optic
D Fiber Optic
For LAN cross-connects, how many pairs of wires are in the cable? A One B Two C Three D Four
D Four
Which OSI layer divides long communications into smaller data packages, handles error recognition and correction, and acknowledges the correct receipt of data? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application
D Layer 4—Transport
Which of the following are router protocols? (Choose all that apply.) A ATM B Frame relay C IPX D RIP E OSPF F TCP/IP G X-25
D RIP E OSPF
Twisted pair network cable uses which RJ connector? A RJ-11 B RJ-14 C RJ-25 D RJ-45
D RJ-45
In which network topology is each node connected to a central network transmission device such as a hub or a switch? A Bus B Mesh C Ring D Star
D Star
Which internetworking device makes computers that are connected to separate segments appear and behave as if they're on the same segment? A Bridge B Hub C Router D Switch
D Switch
The device on a NIC card that converts the data that it receives from the system into a signal that's appropriate to the network is called a ______________. A Port B PROM chip C Receiver D Transceiver
D Transceiver
To which TCP/IP architecture layer do TCP and UDP belong? A Application B Internet C Network Interface D Transport
D Transport
Which TCP/IP architecture layer makes use of ports? A Application B Internet C Network Interface D Transport
D Transport
Which encryption method uses Advanced Encryption System (AES) cipher for stronger encryption? A 802.11i B WEP C WPA Personal D WPA2
D WPA2
Which network medium is a popular choice for outdoors or in an historic building? A Coaxial B Twisted pair C Fiber optic D Wireless
D Wireless
In most cases, you can install a small business network and move on to the next job, leaving the company's IT staff to support the network.
False
In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.
False
It is a good idea to place an equipment room in a high humidity area.
False
It is a good idea to protect your Web server by using NAT on the Web server itself.
False
L2TP natively includes authentication and encryption.
False
Less efficient than RIP, OSPF sends routing information at regular intervals, even if nothing has changed.
False
Microsoft Exchange is an example of a dedicated e-mail client.
False
Most small businesses require a high level of security including encryption technologies and complex network connections.
False
On a /24 network you can have 256 hosts.
False
Patch cables should be solid core cables to provide extra strength and prevent the cables from breaking easily when you move them.
False
Patch panels allow you to connect only one kind of cabling; that is, they support only UTP, STP, or fiber but not a mixture of different types.
False
T-Carrier lines only require a CSU/DSU on the customer's side of the connection.
False
The Network+ exam is administered over the Internet.
False
The first thing you should do with a new router is to plug it into an existing network.
False
The part of the IP address that is the same for all computers on a network is called the Host ID.
False
The ping command is used to determine the path between two devices.
False
The preset address in a managed switch is assigned to a single port.
False
The process of installing a large structured cabling system is so simple and logical that even a novice network tech can do it, following the published guidelines.
False
Which of the following characters is not permitted in a DNS domain or host name?
Spaces (only upper and lowercase letters numbers 0-9 and the hyphen may be used)
The addresses 127.0.0.1, 10.1.1.50, 172.16.200.1, and 192.168.35.44 are examples of what?
Special IP addresses
The adress 127.0.0.1, 10.1.1.50, 172.16.200.1, & 192.168.35.44 are all examples of what?
Special IP addresses
What type of bus does 10BASET use?
Star Bus
In what mode is a DHCPv6 server operating if it works much like an IPv4 DHCP server, passing out IPv6 addresses, subnet masks, and default gateways, plus optional items (DNS server addresses)?
Stateful
In what mode is a DHCPv6 server operating if it only passes out optional information?
Stateless
What type of filtering is employed when traffic is blocked just based on IP address?
Stateless
When a NAT router uses this in conjunction with IP addresses, it solves the two problems of security and limited IP addresses
TCP/IP port numbers
Which of the following is a tool that can tell you where a cable break is on a copper cable?
TDR
What file transfer protocol uses UDP port 69, and does not use user names and passwords?
TFTP
Which protocol, not appropriate for use over the Internet, is used for transferring files between servers and clients without requiring a user login?
TFTP
What are the standards for creating ends for 100baseT cables? (Choose all that apply)
TIA/EIA 568A/TIA/EIA 568B
Clustered servers can balance the load when there is heavy usage.
TRUE
The Internet backbone is comprised of technologies designed over 20 years ago to support telephone traffic.
TRUE
Which of the following are automatic tunnel configuration protocols?
TSP and TIC
List at least three primary causes for compromised security.
Technology weaknesses, configuration weaknesses, policy weaknesses, human error or malice.
After you have set up a network for a small business, you may need to access the network remotely to provide support for the users. Which remote access option should not be used unless a secure connection can be established first?
Telnet
Almost every server application has a way for you to access and administer it using this older protocol.
Telnet
SSH was designed as a replacement for ________________ and other insecure remote shells, which sent data (including passwords) in plaintext.
Telnet
What protocol, replaced in recent years by a more secure protocol, was for many years the primary protocol used to allow a user to log in remotely and execute text-based commands on a remote host?
Telnet
Which of the following are considerations when considering electrical and environmental issues in equipment rooms? (Choose all that apply)
Temperature/humidity/electrical load capacity
Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one is built into Microsoft Windows?
Teredo
Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which two can go through a NAT router?
Teredo and 6in4
Which of the following is a standard that offers authentication, authorization, and accounting?
Terminal Access Control Access Control System Plus (TACACS+) and Remote Authentication Dial-in User Service (RADIUS)
Which of the following is a standard that offers authentication, authorization, and accounting? (Select all that apply.)
Terminal Access Control Access Control System Plus (TACACS+)/Remote Authentication Dial-in User Service (RADIUS)
You cannot connect to a network server. The light in the back of the NIC card is not flashing. You change the patch cable and it is still not flashing. You go into the wiring closet and switch the connector from one connection on the switch to another. You check the NIC light and it is blinking. What should you do next?
Test the solution
What can the command PING do?
Tests connectivity two IP devices.
Which of the following would be a reason for an organization to use 100BaseFX Ethernet? (Choose all that apply)
The 100 meter distance limitation of the other standards may be inadequate./The network will be installed in an environment that has a high level of electrical interference./The network requires higher security than that provided by UTP.
Which of the following is not part of the fully qualified domain name (FQDN)?
The IP address
Which of the following is not a share attribute of all members of the ethernet family of networking technologies?
The same kind of cablingj
The trial-and-error method should NOT be used under which of the following situations?
The server is your public Web server and is currently hosting all of your business.
Which of the following are advantages of fiber-optic cabling over UTP? (Choose all that apply)
The signals travel farther./It has a longer maximum distance/It is immune to electrical interference.
Group accounts make it easier for an administrator to manage user rights and permissions.
True
ICMP is a transport layer protocol used for applications that are always connectionless and never need more than a single packet.
True
Ideally, once you install horizontal cabling, you should never move it.
True
If the first octet of the IP address begins with 110 (110xxxxx), the system belongs to a Class C network.
True
If the network is not visible on the internet, the DNS naming convention does not require top-level domain names such as .com or .org
True
In Windows, you can start the Task Manager by simply right-clicking the taskbar and choosing Start Task Manager.
True
In a file system that uses FAT or FAT32, the only file security option that is available is the sharing permissions.
True
In a routing table, whenever the gateway address and the interface address are the same, it's a local connection.
True
In a small business network, the router usually takes on the responsibilities of many roles, which include a firewall as well as a DHCP server.
True
Most SNMP managers allow the configuration of thresholds for generating alert messages to network administrators when those thresholds are exceeded.
True
Most operating systems, including server versions of Windows, come with built-in DNS server software.
True
Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols.
True
NAT is not routing.
True
One critical difference between a client OS and a server OS is the addition of directory services on some server OSs.
True
Packet switched WANs use virtual circuits to ensure that packets are delivered reliably and at the agreed-on bandwidth level.
True
SSH is a replacement for Telnet.
True
Secure shell (SSH) is a terminal emulation program that is usable over a LAN connection.
True
The Network+ exam is vendor-neutral.
True
The creator of a HomeGroup has the ability to change the randomly generated password to a more user-friendly password.
True
Ethernet _____________ combines the bandwidth of two network interface cards as a cost-effective way to increase bandwidth available for data transfers for critical servers, such as firewalls and production servers.
bonding
The partition that contains the Windows OS files is known as the what type of partition?
boot
What is another term for a switching loop?
bridging loop
If the computers on the network connect via the same piece of cable, what topology is employed?
bus
The benefit of a ___________ topology is that it's simple and inexpensive to set up.
bus
Which of the following topologies provide no fault tolerance?
bus ring
Which tool do you use to tap into a 66-block or 110-block to see if a particular line is working?
butt set
You are working on a workstation and the operator complains that they cannot log into server1 after lunch. They logged in ok in the morning. What is your first step?
check the logon error message
Which of the following is a term used for a way to encrypt data?
cipher
Which of the following is the result of running cleartext through an algorithm using a key?
ciphertext
The plain old telephone service is a good example of what kind of WAN technology?
circuit switched
The Internet Assigned Numbers Authority (IANA) implemented _____________ IPv4 addresses in order to differentiate between the portion of the IP address that identifies a particular network and the portion that identifies a specific host on that network.
classful
Which of the following is a VPN mode that is usually implemented to give mobile users access to the network?
client-to-gateway
connection between a desktop and a VPN device
client-to-gateway
What status indicates that a connection has made a graceful closure?
close_wait
What storage solution involves a third-party company that provides off-site hosting of data?
cloud-based storage
This term describes multiple servers or groups of servers representing a single server, distributing the load and protecting from the failure of a single server.
cluster
What kind of cable is described as a central conductor wire, surrounded by insulating materials, placed inside a braided metal shield?
coaxial
What will display when you run netstat without any switches?
current sessions
Which of the following is the fastest switching mode?
cut-through
What does the frame trailer consist of in an Ethernet frame?
cyclic redundancy check
Combined permissions that lead to conflicting permissions, where a user does not get access to a needed resource, are usually caused by:
deny permissions
On a TCP/IP network, what information within a packet does a router use to determine where an incoming packet should go?
destination IP address
All of the following help to identify a problem during the troubleshooting process EXCEPT?
determine next steps to resolve problem
This command is not available on Windows, but on a computer running Linux or Mac OS X, this command will let you diagnose DNS problems.
dig
True or false? 802.11b, 802.11a, and 802.11g are all considered Wi-Fi.
True
True or false? A LAN becomes a WAN when you expand the network configuration beyond your own premises and must lease data communication lines from a public carrier.
True
True or false? A computer will use a default gateway if the destination IP address is on a different network.
True
True or false? A traffic shaper can limit the amount of bandwidth a certain type of traffic is allowed to use.
True
True or false? Brouters operate at both the network layer for routable protocols and at the data link layer for non-routable protocols.
True
True or false? Event Viewer is a Computer Management component.
True
True or false? It is important when training users to alert them to ways that attackers attempt to gather personally identifiable information and information about the organization's network.
True
True or false? Kerberos authenticates users and servers over an open multi-platform network using a single login procedure.
True
True or false? Routers were designed to prevent unnecessary broadcasts in bridged networks
True
True or false? Wireless Zero Configuration enables Windows Vista and Windows XP computers to automatically connect to available wireless networks.
True
True or false? You can safely distribute your public key to others.
True
Using TCP, if a receiving computer detects a missing packet, it just asks for a resend of the packet.
True
When performing name resolution, every operating system that supports TCP/IP will look in the local HOSTS file before sending a DNS query.
True
While most of the Network+ exam is extremely practical and deals with real-world scenarios, you can also expect conceptual questions about the OSI seven-layer model.
True
Windows Server 2008 R2 can be installed only on a 64-bit system
True
True or false? Routers have a lower throughput than bridges.
True. A router activity needs more processor time, more memory, and multiple network connections.
True or false? In a star topology, when a single connection fails, it doesn't affect the communication ability of other computers.
True. In the star topology, when a single connection fails, it doesn't affect the communication ability of other computers connected to the same network transmission device.
True or false? The purpose of a modem is to convert digital data signals from the computer into analog signals for transmission over the phone line.
True. It also converts analog signals received from the phone line back into digital signals for the computer.
True or false? TCP is a connection-oriented protocol that creates and verifies a connection with a remote host before sending information.
True. UDP is connectionless.
True or false? You terminate both workstation drops and backbone wiring using the same device.
True. You can use the same patch panel or punchdown to terminate both workstation drops and backbone wiring.
In order to have a VLAN span two switches, you must configure a port on each switch to carry all data, regardless of VLAN number, between the switches. What is the term for this port?
Trunk port
This is an encrypted link between two programs (or endpoints) on two separate computers.
Tunnel
An organization or person offering this service creates an IPv6 tunnel, and usually offers a custom-made endpoint client.
Tunnel broker
How many pairs of pins in an RJ-45 connector does a 10BaseT device actually use?
Two
Which of the following is the most common WINS/NetBIOS problem?
Two systems share the same name
What device converts 8-bit-wide parallel data from a computer into 1-bit-wide serial data to send to a modem where it is converted to an analog signal before being sent over phone lines?
UART
What Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?
UDP
Which protocol uses datagrams as its Protocol Data Unit
UDP
Which protocol uses datagrams as its protocol data unit?
UDP
This keeps your servers running for a short period of time after an electrical brownout or blackout.
UPS
E
What are the two names for dynamic IP addressing? Select the two correct answers. A. Bootstrap Protocol ( BOOTP) B. IPCONFIG C. Dynamic Host Configuration Protocol (DHCP) D. IPv4 E. A and C
A
What basis do bridges use to determine whether to forward traffic? A MAC addresses B IP addresses C traffic conditions at the time D nothing because bridges forward all traffic
C
What command can you use to test the NIC's ability to send and receive packets? A ARP -a B PING 255.255.255.255 C PING 127.0.0.1 D IPCONFIG
D
What command would you run from a windows command line to verify that a NIC can send and receive IPv4 packets? A arp-a B ipconfig /all C ping gateway D ping 127.0.0.1
Router
What device do you need to split a large network into smaller ones?
It processes all frames
What does it mean if a NIC runs in promiscuous mode?
B
What events, characteristic to an Ethernet network using hubs, does using an Ethernet switch minimize or avoid? A resends B collisions C termination D frame checking
Collisions
What events, characteristics to an Ethernet network using hubs, does using an Ethernet switch minimize or avoid?
Fiber-optic
What general type of cabling is a tech most likely to use today when installing Ethernet cabling in areas with high electrical interference?
C
What general type of cabling is a tech most likely to use today when installing ethernet cabling in areas with high electrical interference? A shielded twisted pair (STP) B coaxial C fiber optic D twinaxial copper
C
What is the MAC broadcast address? A 0.0.0.0 B 127.0.0.1 C FF-FF-FF-FF-FF-FF D 1.1.1.1
A
What is the Network layer unique identifier assigned to each device on a TCP/IP network? A. IP address B. MAC address C. Router name D. Port Number
The number of ports
What is the biggest differentiator among Ethernet hubs?
C
What is the biggest differentiator among Ethernet hubs? A the size of power supply B the types of connectors C the number of ports D the price
E
What is the binary equivalent of the decimal value 97? A 0110001 B 1001110 C 01000001 D 01101010 E None of the above
B
Which of the following attributes does not apply to those OSPF routing method? A It uses a link state algorithm B IT sends routing information at regular intervals even if there are no changes C It sends tiny messages called "Hellos" to its neighbors D It shares detailed information through link state advertisments
B
When a NAT router uses this in conjunction with IP addresses, it solves the two problems of security and limited IP addresses A source addresses B TCP/IP port numbers C Autonomous System Numbers D Area ID
Overlapping signals
When a collision occurs on a network relying on the CSMA/CD access method, what alerts the NICs?
C
Which of the following automatically gives out IP information to computers that request it? A DNS B PING C DHCP D ARP
It is a sublayer of the Data Link Layer
Which of the following best describes Logical Link Control (LLC)?
B
Which of the following best describes Logical Link Control (LLC)? A. It is a layer 1 protocol B. It is a sublayer of the Data Link layer C. It remembers the NICs MAC Address D. It controls open network sessions
B
Which of the following could be a valid Autonomous System Number (ASN)? A 0.0.0.0 B 1.33457 C 192.168.30.1 D 255
It is not susceptible to electro-magnetic interference
Which of the following is NOT an advantage of UTP cabling?
It is easier and cheaper to install than UTP
Which of the following is NOT an advantage of fiber-optic cabling over UTP?
FF-FF-FF-FF-FF-FF
Which of the following is a broadcast MAC address?
B
Which of the following is a broadcast MAC address? A. 255.255.255.255 B.FF-FF-FF-FF-FF-FF C. 256 D. 1,000
D
Which of the following is a valid IP address for an individual system expressed in dotted-deciaml notation? A 0.0.0.0 B 255.255.255.255 C 128-5EF-297 D 215.233.32.91
A
Which of the following is another a name for a MAC address? A. Physical B. Logical C. IP D. computer
Physical
Which of the following is another name for a MAC address?
C
Which of the following is not a designated private IP addresses? A 192.168.64.7 B 172.28.16.48 C 153.6.2.1 D 10.164.19.5
Network
When it receives data from the upper layers, which layer of the OSI model assembles the data into smaller pieces called packets?
D
When it recieves data from the upper layers, which layer of the OSI model assembles the data into smaller pieces called packets? A. Data Link B. Physical C. Network D. Transport
Stranded core is UTP while solid core is fiber-optic cabling
Which of the following is not an accurate description of the differences between stranded core and solid core cabling?
C
When subnetting, do not think of each subnet mask in dotted decimal, rather work with it in binary and another notation that uses a slash and is named for the method of generating blocks of IP addresses. A DHCP B BOOTP C CIDR D IANA
D
When viewed in binary, what value is always on the far left in the first octet of a class A address? A 00 B 10 C 110 D 0
All equipment racks are floor-to-ceiling and should be bolted into the wall.
Which of the following is not true about standard equipment racks?
B
Which of the following is the distance vector routing protocol used on the internet? A RIP B BGP C OSPF D IGRP
A
Where does the CRC come from in a network frame? A the sending NIC attaches it B. The receiving NIC attaches it C. The network operating system generates it and attaches it D. the network administrator attaches it
802.11
Which IEEE subcommittee sets the standards for WIreless LAN networks?
D
Which IEEE subcommittee sets the standards for Wireless LAN networks? A 802.2 B 802.3 C 802.5 D 802.11
Transport
Which TCP/IP model layer uses connection-oriented protocols?
D
Which connector is used for UTP cabling on a network? A RF-11 B BNC C RS-232 D RJ-45
B
Which ethernet cabling standard defines an Ethernet network that uses CAT3 or better UTP cabling, operating at 10Mbps? A 10BaseFL B 10BaseT C 10Base2 D 100BaseTX
A
Which kind of cable does not provide any protection against EMI? A UTP B STP C Fiber D Coax
D
Which kind of cable works best for long distance transmissions? A coax B UTP C STP D fiber-optic
B
Which layer of OSI model adds source of destination MAC addresses to frames? A. Network B. Data Link C. Transport D. Presentation
Data Link
Which layer of the OSI model adds source and destination MAC addresses to frames?
C
Which layer of the OSI model is the only layer divided into two sublayers? A transport B Network C data link D physical
B
Which layer of the OSI model manages the connections between machines on the network?
Session
Which layer of the OSI model manages the connections between machines on the network?
Application
Which layer of the OSI model refers to the code built into operating systems that enables network-aware applications?
C
Which layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system? A. Presentation B. Application C. Network D. Data Link
Mesh
Which network topology offers the greates level of fault tolerance?
D
Which network topology offers the greatest level of fault tolerance? A bus B ring C star D mesh
A D
Which of the following is true of OSPF routers? Select all that apply in alphabetical order. A They send Hello messages every 30 minutes to routers in their area B They do not support CIDR C they have a 15-hop limit D They converge almost instantly
It reads a signal coming in from one port and repeats the signal out to the other ports.
Which of the following is true of an Ethernet hub?
D
Which of the following protocols would you expect to find used as an interior gateway protocol within an Autonomous System? A IS-IS B BGP C RIPv2 D OSPF
The cable
With both bus and ring networks, where is the single point of failure that will bring down the entire network?
What is Extensible Authentication Protocol (EAP) if it is not a protocol?
Wrapper
The first generation of packet-switching technology was called:
X.25
What is RAID level 1 also called?
disk mirroring
If you need to limit the amount of data users can store on a volume, you would implement which of the following?
disk quotas
What type of routing protocol are RIP and RIPv2?
distance-vector protocol
In response to demand for the most common configuration of fiber-optic cable, manufacturers created this type of fiber-optic cabling.
duplex
A disk must be formatted as what type of disk if you want to access additional features such as disk spanning?
dynamic
can be used to create a RAID
dynamic disk
What general type of cabling is a tech most likely to use today when installing Ethernet cabling in areas with high electrical interference?
fiber-optic
What kind of cabling does the 10BaseFL standard specify?
fiber-optic
Which kind of cable works best for long distance transmissions?
fiber-optic
Which kind of cable works best for long-distance transmissions?
fiber-optic
Which kind of cabling would you select when you need to cover distances that span kilometers?
fiber-optic
What type of wiring should be used for a high-speed connection between two buildings?
fiber-optic cabling
Which of the following statistics should a network baseline report include?
hard drive utilization
This is a mathematical function that creates a checksum, and which is used by most forms of nonrepudiation.
hash
What term best describes the way the DNS name space is organized?
hierarchical
This term applies to the result of techniques that make sure a shared resource is available in a timely manner when clients request.
high availability
This is a clever way to lure potential hackers in and log their behavior.
honeypot
What term is used for the cabling that runs from the telecommunications room to the PCs?
horizontal cabling
You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware workstation?
host-only
What is the correct sequence according to the DNS naming convention?
host.domain.root
Which is the correct sequence according to the DNS naming convention?
host.domain.root
Which cloud computing category refers to the use of software hosted on a service provider's network, and is usually subscription based?
hosted applications
Which cloud computing category allows a company to quickly provision additional disk space?
hosted infrastructure
Which of the following terms describes the category of cloud computing in which a customer develops applications using development tools and infrastructure provided by the service provider?
hosted platforms
hypervisor installed in a general-purpose OS
hosted virtualization
Which of the following should not be a concern when discerning the level of security that is required in a network?
how difficult it would be to enforce a password policy
A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers?
hub
With a star-bus network, where is the single point of failure that will bring down the entire network?
hub
creates and monitors the guest operating systems
hypervisor
Which of the following is the first step in troubleshooting?
identify the problem
Which of the following is NOT a good practice for performing upgrades?
ignoring updates to new releases
You have just connected a brand new workstation to your local network. As per company policy, you have used a static IP configuration. However, all attempts to reach the Internet from the workstation fail. You have verified that you can communicate with servers and other workstations on the local network, and that you are the only one having an issue reaching the Internet. What is most likely the issue?
incorrectly configured gateway address
copies all files changed since the last full or incremental backup and marks files as backed up
incremental backup
In a(n) ______________ site survey, you temporarily set up your WAPs at the locations you're considering for permanent placement.
informal
This term describes how permissions pass down from folder to folder.
inheritance
This term describes the predetermined silence period that is added to the length of a packet to determine the waiting period for a network device after it has detected traffic on the media.
interframe gap
Structured cabling is a design consideration related to which of the following?
internal connections
This system adds the capability to react to an attack detected by another component.
intrusion prevention system (IPS)
What is a potential problem a browser looks for after it receives a certificate from a secure HTTP site?
invalid certificate and revoked certificate
What is a potential problem a browser looks for after it receives a certificate from a secure HTTP site? (Select all that apply.)
invalid certificate/revoked certificate
You have just finished building a small home network. You find that you cannot access the Internet. You ping the DSL router successfully. You suspect that the default gateway is not set on the workstation. Which utility should you use to confirm your diagnosis?
ipconfig
What command should you enter to view the Host Name and DNS Server address?
ipconfig /all
Which command will display the configured IP address, default gateway, and DNS servers for a Windows workstation?
ipconfig /all
To test that a tunnel has been created, and to see the tunnel adapter, open a command prompt and enter this command.
ipconfig/all
Which of the following is not an advantage of fiber-optic cabling over UTP?
it is easier and cheaper to install than UTP
What does it mean if a NIC runs in promiscuous mode?
it processes all frames
What is the term that describes an approach that uses tight control over what a user account can do on a network, allowing the user to only do what he or she needs to do for the job, and no more?
least privilege
Of the following, select only those conditions that are issues when dealing with fiber-optic cabling. (Choose all that apply.)
light leakage/attenuation/modal distortion
Which status term applies to whether your wireless device is connected?
link state
This is the address a computer running IPv6 gives itself when it first boots up.
link-local
multiple servers acting as a single server
load-balancing cluster
When a bridge has a LAN link directly attached on each side, it's known as a ___________ bridge.
local
defines a user's environment
local profile
How is the address 127.0.0.1 listed in the HOSTS file?
localhost
Traceroute would be best suited for which of the following tasks?
locating bottlenecks in a network
Use this capability of Performance Monitor to save data collected on system and network performance.
log
What type of logical topology does a Wireless LAN use?
logical bus
What is the generic term used to describe programs that are designed to cause harm or disruption to a computer system?
malware
Which type of attack involves the attacker inserting him - or herself into a conversation between two others?
man in the middle
a set of objects containing information about a networking device that SNMP uses to manage that device
management information base (MIB)
A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, when she logs off and logs back on, the desktop reverts to its original configuration. What type of user profile does this user have?
mandatory
What is the meaning of the "10" in 10BaseT?
maximum speed of 10Mbps
The ___________ topology is extremely fault tolerant, but expensive to implement.
mesh
Which network topology offers the greatest level of fault tolerance?
mesh
a device computers use to convert digital signals to analog signals
modem
What device converts an analog signal to digital and a digital signal to analog?
modulator-demodulator
This command keeps running, providing a dynamic trace of the route a packet is taking. It is not available in Windows.
mtr
This is a set of reserved addresses designed to go only to certain systems.
multicast address
Most network technologies that use fiber-optics use which type of fiber-optic cables?
multimode
What type of fiber-optic cabling and connectors does a 100BaseFX network use?
multimode with ST or SC connectors
two or more threads being executed simultaneously
multiprocessing
In a token ring network, what is the central device called?
multistation access unit
This Windows-only program must be run with a switch (such as -n) and lets you see the NetBIOS names of systems on your Windows network (it will also see SAMBA systems).
nbtstat
What command can you use to check the current NetBIOS name cache to see if it has provided inaccurate addresses to the WINS client?
nbtstat -c
Least privilege refers to employees having only information that they _____________.
need to know
What command would you issue from a command prompt to see a listing of the computers in your workgroup?
net view
What command-line command allows you to see other NetBIOS systems?
net view
This is the "show me the endpoint" command.
netstat
This tool displays information on the current status of all running IP processes, showing what sessions are active, and shows more information when run with certain switches.
netstat
You are troubleshooting at Workstation B. You suspect that there is a TCP session connected from Workstation A. Which command should you issue at Workstation B to see if there is an established TCP connection?
netstat
Whose job is it to create a network diagram?
network administrator
Quantifying the need for equipment, operating systems, and network applications is a function of which of the following?
network design
Which of the following identifies how wires in a network connect to various switches and other devices?
network diagram
This type of configuration document goes deeper into the individual components of the network:
network map
Airwaves are an example of what type of network component?
network medium
software that monitors network traffic and gathers information about packet types, errors, and packet traffic to and from each computer
network monitors
What is the term or terms for the second level of naming in a Wi-Fi network that can be applied in either ad hoc mode or infrastructure mode? (Select all that apply.)
network name/Service Set Identifier (SSID)/Extended Service Set Identifier (ESSID)
If you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?
network policy and access services
When a collision occurs on a network relying on the CSMA/CD access method, what alerts the NICs?
overlapping signals
Which type of NAT is the most popular?
overloaded NAT
These firewall technologies block traffic based on the IP address.
packet filtering and port filtering
These firewall technologies block traffic based on the IP address. (Select all that apply.)
packet filtering/port filtering/IP filtering
This type of tool, also called a protocol analyzer, intercepts and logs network packets.
packet sniffer
The patch panel is then connected to the multiport hub by __________ cables.
patch
You have just started a new business. You need to have three to four workstations available for your employees who simply need to share some files and a printer, but you don't have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation?
peer-to-peer network
What is the name for the most recent and more nefarious form of social engineering tactics?
phishing
Door locks, deadbolts, and motion sensors that protect equipment rooms are all forms of which type of security?
physical
Which of the following is another name for a MAC address?
physical
Which of the following is the physical topology that is daisy-chained like a bus and in which the cabling is brought around from the last device to the first device?
physical ring
What is the best tool for testing DNS?
ping
What command can you use to test the NICs ability to send and receive packets?
ping 127.0.0.1
What command would you run from a Windows command line to verify that a NIC can send and receive IPv4 packets?
ping 127.0.0.1
What command would you run from a windows command line to verify that a NIC can send & recieve IPv4 packets?
ping 127.0.0.1
What command would you run from a windows command line to verify that a NIC can send and receive IPv4 packets?
ping 127.0.0.1
What command on Windows verifies a NIC can send and receive IPv4 packets
pinging the loopback address ("ping 127.0.0.1")
Cables that run in _______________ must meet applicable fire protection and environmental requirements.
plenums
An example of a ________________ connection is the dial-up connection from a computer to an ISP.
point-to-point
Which of the following describes a type of wireless bridge that can only communicate with a single other bridge, and therefore is used to connect just two wireless network segments?
point-to-point
a remote access protocol that supports many protocols and is used to carry data over a variety of network connections
point-to-point protocol
If your company has a Web site that customers need to access, you will need to allow unsolicited communications from outside the network. In this situation, you need to install a router that supports what type of forwarding?
port
What technique is used to guard against hackers looking for ways to send unauthorized TCP or UDP packets into your network?
port filtering
If your company has a single server on the private LAN that they want to make accessible from the Internet, which of the following would give the server the protection of NAT while allowing access to that server from the Internet?
port forwarding
the process by which a router forwards a request for a TCP or UDP port to a specified computer.
port forwarding
This type of tool probes ports on another system, and logs the state of the scanned ports
port scanner
power device that provides fault tolerance through battery backup
power device that provides fault tolerance through battery backup
Which of the following advantages to virtualization provides significant cost savings in utility usage?
power savings
Which form of authentication involves the exchange of a password-like key that must be entered on both devices?
preshared key
can be made the active partition
primary partition
When you run the route command, what switch must you use if you wish to see the current routing table on your computer?
Where are the waiting print jobs stored until they can be sent to the print device?
print queue
You're the network administrator for a large bean-bag chair company. You are presenting to your supervisor several reasons to make use of cloud computing for handling data processing. Which answer would be a valid benefit of using cloud computing?
reduced physical plant costs
Network components will fail, and you can sum up the best protection against such failure in one word. Select that word from the following:
redundancy
specialized software that gathers network data and provides statistics to a network management console
remote monitoring (RMON)
What enables a DNS server to determine a FQDN by knowing the IP address?
reverse lookup zones
action that a user can perform on a computer
right
part of an upgrade plan that provides instructions on how to undo the upgrade if problems occur during or after the upgrade
rollback plan
Which of the following is the "super" account native to Linux and Macintosh OS X?
root
This type of Trojan takes advantage of very low-level operating system functions to hide itself from most less-sophisticated anti-malware tools.
rootkit
What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?
rootkit
Which of the following commands displays the metrics for each router?
route
What device do you need to split a large network into smaller ones?
router
What is another term for a Layer 3 switch?
router
Which of the following are the devices on the customer's side of a WAN connection to a building, not including the actual connection point?
router and CSU/DSU
When a router's interface is configured with multiple IP addresses with each address belonging to different networks, what is it called?
router on a stick
When a router also acts as a firewall, it's called a _____________ router.
screening
Which type of forward lookup zone exists on a DNS server that acts as a backup?
secondary
What are the chunks called into which the available storage space on a disk drive is broken?
sectors
This log records events such as logon successes and failures.
security
Which of the following are policies that affect most users?
security and acceptable use
How to deal with a virus attack would be detailed under which of the following?
security policy
Which of the following describes exactly where and how a password will be used?
security policy
Large networks are frequently broken down into manageable pieces called _______________.
segments
While there are many e-mail server programs, this one is the leader among those used on Linux and UNIX systems, controlling about 20 percent of all e-mail servers, and only running the SMTP protocol.
sendmail
What happens every time a DHCP client boots up?
sends out a special discovery packet
What does the Transport layer use to make sure that a message is reassembled correctly on the receiving device?
sequence number
runs in the background
service
How many basic pieces of information does an Ethernet frame contain?
seven
You are a network architect for an IT consulting company. One of your clients needs a WAN connection and has asked you about the disadvantage of a packet-switched WAN method. Which of the following is a disadvantage that applies?
shared bandwidth
In a WLAN, the wireless NIC allows nodes to communicate over ____________ distances using radio waves, which it sends to, and receives, from the hub.
short
Almost every Cisco device has a command a network tech can use to document that configuration of that document. What is that command?
show startup-config
Which term applies to how well your wireless device is connecting to other devices?
signal strength
What type of fiber-optic cable uses lasers to send signals?
single-mode
Which of the following types of VPNs is used to connect two LANs separated by a WAN or the cloud?
site-to-site VPN
Which of the following are weaknesses in WEP that allow it to be easily cracked?
size of the encryption key and faulty implementation of the RC4 protocol
What type of device you can insert into a PC in lieu of entering a password?
smart
Which of the following are alternatives to passwords for authentication?
smart devices and biometric devices
Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?
smurf attack
What is a partial copy of a VM that is used to restore it to a previous state? Answer
snapshot
partial copy of a virtual machine
snapshot
part of the SNMP structure loaded on to each device to be monitored
software agents
What is CRM software?
software that is used to keep track of customer information, including contact information and appointments
What type of wireless technology is used for 802.11b /g /n networks?
spread-spectrum radio
Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.
spyware
Which hybrid topology is the dominant wired network topology?
star-bus
What type of filtering is employed when all packets are examined as a stream, and when a stream is disrupted or packets get corrupted, the firewall acts accordingly?
stateful
What type of filtering is employed when traffic is blocked just based on IP address?
stateless
What is the term used that defines network cabling in the work area and between telecommunications closets and equipment rooms?
structured cabling
Which part of a computer's IP address configuration indicates the portion of the address that specifies the network ID?
subnet mask
This is done by an organization when it takes a block of addresses received from an ISP and breaks the single block of addresses into multiple sub networks?
subnetting
To collect events on the collecting computer, you must create a __________.
subscription
Which of the following is not included in any edition of Windows Small Business Server?
support for up to 500 users
When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port?
switch
Which of the following connections might require a crossover cable?
switch to switch
This log records events related to services, device drivers, and configuration changes.
system
In Windows, you use Task Manager to view the processes running on your computer. What do you use to view the running processes on some Linux systems?
system monitor
partition that contains the boot loader
system partition
Which of these statements best describes an Application Program Interface?
t is a set of commands, provided by the manufacturer of an operating system, which allows programmers to create applications.
Subnetting
taking a single class of IP addresses and chopping it up to multiple smaller groups
What distance can a signal travel on a fiber-optic cable?
tens of kilometers
You are currently troubleshooting a network issue with your ISP's customer support agent. The agent requests that you open up command prompt and type "ping 127.0.0.1". What does this accomplish?
tests that the local IP stack is functioning
PING
tests the reachability of a host on an IP network and measures the round-trip time for messages sent
Which of the following is not part of a fully qualified domain name (FQDN)?
the IP address
The last 64 bits of an IPv6 address are the interface identifier. Where is that number derived from?
the MAC address
What is used as the BSSID for a BSS?
the MAC address of the WAP
Which of the following should you consider when choosing a wireless network instead of a wired network?
the ability of unauthorized users to receive a signal
With both bus and ring networks, where is the single point of failure that will bring down the entire network?
the cable
What is the local loop, or last mile?
the connection between the demarcation point and the CO
Which of the following is part of a fully qualified domain name (FQDN)? (Choose all that apply)
the host name/the second-level domain name/the top-level domain name
What would not be included in the data portion of an Ethernet frame on an IP network?
the length of the data being transmitted
Which of the following would NOT be included in the data portion of an Ethernet frame on an IP network?
the length of the data being transmitted
Which of the following is not identified in a cabling specification such as 10BaseT?
the maximum number of routers
What do most professional cable installers use to quote the price for an installation?
the number of drops
What is the biggest differentiator among Ethernet hubs?
the number of ports
A MAC address is composed of which two parts?
the organizationally unique identifier and the unique device ID of the NIC
A MAC address is composed of which two parts? (Choose all that apply)
the organizationally unique identifier/the unique device ID of the NIC
What is NOT a shared attribute of all members of the Ethernet family of networking technologies?
the same kind of cabling
Which of the following is NOT a shared attribute of all members of the Ethernet family of networking technologies?
the same kind of cabling
Where does the CRC come from in a network frame?
the sending NIC attaches it
Which of the following are identified in a cabling specification such as 10BaseT? (Choose all that apply)
the signal type/the speed/the maximum length
Which of the following describes the numeric designator on fiber-optic cables?
the size of the fiber and the size of the cladding measured in millionths of a meter (microns)
What does a switch store in its switching table?
the source MAC address of a frame and the port it was received on
When discussing Ethernet standards, what does the XBaseY terminology refer to?
the transmission speed, the type of transmissions, and the length or type of cabling
smallest unit of software that can be scheduled
thread
TCP establishes a connection with the destination device using which process?
three-way handshake
What method does the CPU use to divide its computing cycles between more than one process?
time slicing
a network troubleshooting device that can determine whether there's a break or short in the cable, and, if so, approximately how far down the cable it's located
time-domain reflectometer (TDR)
What is the purpose of a crimper?
to connect a RJ-45 connector to the cable
In order to transmit data on a Token Ring network, a node must have possession of the _____________.
token
Tripplet Corporation manufactures a very popular tool called a "Fox and Hound." What type of tool is this?
toner
What is the term for the servers just below the DNS root servers?
top-level domain server
What is the term for the servers just below the DNS root servers?
top-level domain servers
Which of the following commands enable you to determine if a connection can be made between 2 computers?
traceroute
Which of the following is a software tool you would use to discover just where a problem exists when you have problems reaching a remote system?
tracert
Which of the following is not a category of logs?
traffic
Which of the following is malware that pretends to do one thing, or looks as if it's doing one thing, while doing something evil?
trojan
What must you use to span the gap in IPv6 support and access the IPv6 Internet?
tunnels
Which of the following describes a link-local address?
unicast
What does UTP stand for?
unshielded twisted pair
Network backbone cabling run from floor to floor connecting the main cross-connect to intermediate cross-connects on each floor is referred to as ___________ cabling.
vertical
Which of the following is a way of presenting information in Performance Monitor?
view
a logical sequence of connections with bandwidth allocated for a specific transmission pathway
virtual circuit
What types of networks supply a great deal of complexity, security, and power, and are made possible through the use of advanced networking devices?
virtual private networks (VPNs) and virtual LANs
What types of networks supply a great deal of complexity, security, and power, and are made possible through the use of advanced networking devices? (Select all that apply.)
virtual private networks (VPNs)/virtual LANs
Which of the following allows all VMs to communicate with each other, the host, and the network?
virtual switches
Which of the following creates a complete environment for a guest operating system to function as though that operating system were installed on its own computer?
virtualization
Utility programs that can scan a network to determine things like open ports or passive applications are called:
vulnerability scanners
What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?
wardriver
What function is being used if a packet is sent to port 80?
web browsing
When would you most likely NOT choose to use a leased line connection?
when a nondedicated link is needed for backups
Star topology
when your network has all computers connected to a centrally located wiring closet, you have a physical _____ network.
What information would you find in the header of a Transport layer PDU?
window size
Which of the following is NOT a technique used to deal with malware?
wireless encryption
Which of the following documents the cabling runs of a network, defining the type of connections, such as Gigabit Ethernet, T1, and so on?
wiring scheme
Which of the following includes diagrams of individual structured cabling connections, including the actual designation for each cable run, such as the wiring details for an EIA/TIA 568B connection?
wiring scheme
Which of the following terms describes cabling and connectors in network wiring standards used (CAT53, 568A, fiber, and so on)?
wiring scheme
B
with a star-bus network, where is the single point of failure that will bring down the entire network? A the cable B the hub C the server D the client
This type of malware replicates through networks.
worm
Which of the following is NOT a version of DSL service?
xDSL
This term describes a single computer under the control of a (usually) remote operator.
zombie
The target systems in a DDoS attack use ____________ which are later woken up to launch the attack.
zombies or agents
This is one example of the many programs that use the BitTorrent file-sharing protocol in modern peer-to-peer implementations.
µTorrent
What are the four components of wireless security?
• Access control • Encryption • Authentication • Isolation
A network analyzer can detect problems with what four pieces of hardware?
• Cabling • Jacks • Network cards • Hubs
What information does the command ipconfig report?
• Connection-specific DNS Suffix • IP Address • Subnet Mask • Default Gateway
Which of the following is included in the output from the arping command?
"Unicast reply from ..."
In the US, what is the typical cost of a network cable installation?
$150 per drop
Every ip node on a network has a routing table.
True
What is the IP range for Class C private IP?
192.168.0.0 - 192.168.255.255
Which of the following represents a network layer address?
192.168.3.24
What is the default subnet mask for a class B network?
255.255.0.0
How many cable fibers are normally required by almost all network technologies that use fiber-optic cable?
2
How many cables are used inmost fiber-optic runs?
2
How many pairs of pins in an RJ-45 connector does a 10BaseT device actually use?
2
What is the default subnet mask for a Class C network?
255.255.255.0
What wavelength is used on a 10GBaseSR/SW network?
850 nm
Including the separators, what is the maximum number of characters allowed by the DNS naming convention?
255
What is the default subnet mask for a class A network?
255.0.0.0
Which of the following are wireless network modes
***
What type of multicast address is FF02::1?
***All nodes address
Which of the following are not dynamic routing protocols
***Dynamic routes are automatically added into the routing table and routing scales well in large networks. These include (link state, RIP, IS-IS)
Which one of the following NAT technologies uses port numbers to map traffic
***Port forwarding or PAT?
When you run the nbtstat command, what switch must you use if you wish to see the NetBIOS names on the local network?
-n
When you run the netstat command, what switch must you use if you wish to see the current routing table on your computer?
-r
When sending a PING packet which switch allow the ping to be continuous?
-t
In the syntax for a domain, what character or characters separates a domain name from its sub domains.
.
Which of the following is not a top-level domain name?
.html
Which of the following subnet masks is an example of classless subnetting?
/12
Which of the following subnet masks is an example of classless subnetting??
/12
When you run the ipconfig command, what switch must you use if you wish to see detailed information?
/all
What level of RAID does not provide fault tolerance?
0
When viewed in binary, what value is always on the far left in the first octet of a Class A address?
0
What is the range of decimal values in each of the 4 groups of an IPV4?
0 - 255
What is the range of decimal values in each of the four groups of an IPv4 address?
0 to 255
What is the decimal range in each octet?
0-255
Which of the following would be a valid Area ID?
0.0.0.0
Which of the following is a correct MAC address?
00-02-3F-6B-25-13
Which of the following is the IPv6 loopback address?
0000: 0000: 0000: 0000: 0000: 0000: 0001 OR 127.0.0.1
What is the binary equivalent of the decimal value 97?
01100001
If you want to implement fault-tolerance on your network, what type of RAID would you use on the drives that contain the OS and applications?
1
Which layer is responsible for the encoding of signals?
1
In an MDI device, on which two pins does the device use to transmit?
1 and 2
Which of the channels defined by the 802.11 standard may be used in the United States?
1 through 11
a. Teredo
1. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one is built into Microsoft Windows? Select one: a. Teredo b. 6in4 c. ISATAP d. 6to4
Which of the following could be a valid Autonomous System Number (ASN)?
1.33457
Your local ISP has provided you with a dedicated line that has a Committed Information Rate of 1.54 Mbps. What does this mean?
1.54 Mbps is the guaranteed minimum transmission rate.
What is the data transfer speed for DS1?
1.544 Mbps
What is the size of a U, the equipment rack unit of measure, used for specifying height?
1.75 inches
What is the IP Range for Class A Private IP?
10
What is the maximum speed at which 10BaseT Ethernet networks communicate?
10 Mbps
When a multispeed, auto-sensing 100BaseT NIC connects to a 10BaseT Ethernet hub, at what speed will the NIC function?
10 Mbps sending and receiving
What is an acceptable maximum collision rate on a properly running Ethernet network?
10%
a. rare but normal
10. With IPv6, how should we regard Internet address changes? Select one: a. rare but normal b. common, and disruptive c. impossible d. a manual task
What are the private address ranges for Class A, Class B, and Class C networks? (Choose all that apply)
10.0.0.0 through 10.255.255.255/172.16.0.0 through 172.31.255.255/192.168.0.0 through 192.168.255.255
If you have a 100BaseT switched Ethernet network, what is the theoretical maximum bandwidth using full duplex NICs?
100 Mbps
What is the maximum distance between a hub & a node on a 10BAseT network?
100 Meters
What is the maximum cable length for both category 5e and category 6 UTP cable?
100 m
What is the maximum cable length for a 1000BaseT network?
100 meters
What is the maximum distance between a hub and a node on a 10BaseT network?
100 meters
When using UTP cabling, what is the maximum cable length that can be used from the NIC to a hub or switch?
100 meters
Which version of Gigabit Ethernet uses a unique cable known as twinaxial?
1000BaseCX
Which version of gigabit Ethernet uses an unique cable know as twinaxial?
1000BaseCX
Which versions of Gigabit Ethernet are published under the 802.3z standard?
1000BaseCX ,1000BaseLX, 1000BaseSX
OF all the gigabit Ethernet standards detailed in the chapter, which maintains a signal over the greatest distance?
1000BaseLX
Of all the gigabit Ethernet standards detailed in the chapter, which maintains a signal over the greatest distance?
1000BaseLX
What version of Gigabit Ethernet is being positioned as the Ethernet Backbone of the future?
1000BaseLX
What version of Gigabit Ethernet is being positioned as the Ethernet backbone of the future?
1000BaseLX
Which version of Gigabit Ethernet is published under the 802.3ab standard?
1000BaseT
Together, 3 versions of Gigabit Ethernet, publised under the 802.3z standard, are known by what name?
1000BaseX
b. 224.0.0.0/4
19. Which address range does multicast use in IPv4? Select one: a. 192.168.0.0/24 b. 224.0.0.0/4 c. 172.16.0.0/16 d. 127.0.0.0/8
The decimal value 151 converts to what binary value?
10010111
Which version of gigabit ethernet are published under the 802.3z Standard?
100BaseCX, SX, & 100baseLX
What is the limit to the number of nodes in every version of Ethernet?
1024
What is the maximum number of nodes that can be attached to a 10BaseT segment or hub?
1024
Which of the following key sizes does WEP use?
104 bits and 40 bits
Which standard specifies multimode cabling?
10BaseFL
Which Ethernet cabling standard defines an Ethernet network that uses CAT3 or better UTP cabling, operating at 10Mbps?
10BaseT
Which version of Ethernet was introduced in 1990?
10BaseT
Which is the cheapest & most popular 10GbE media type?
10GBaseLR
Of all the 10 GbE standards described in the chapter, which one was most recently released?
10GBaseT
Of all the 10-GbE standards described in the chapter, which one was most recently released?
10GBaseT
Of all the 10 GBE standards described in the chapter, which one was most recently released?
10GbaseT
What is the maximum speed at which 10baseT Ethernet networks communicate?
10Mbps
b. forward packets
11. Presently, almost all the tier 1ISP routers properly perform what function for IPv6? Select one: a. resolve names to addresses b. forward packets c. provide DNS addresses to clients d. host DNS servers
What is the hexadecimal number F equal to in binary?
1111
How long is a MAC address?
12 hexadecimal characters
a. 128 bits
12. What is the length of addresses in IPv6? Select one: a. 128 bits b. 64 bits c. 32 bits d. 256 bits
What is the loopback address?
127.0.0.1 OR 0000: 0000: 0000: 0000: 0000: 0000: 0001
In Windows 7, what is the maximum length that a password can be?
128
What is the length of addresses in IPv6?
128 bits
What is the valid decimal range for the first byte of a Class B address?
128 through 191
What is the decimal equivalent to the hexadecimal number D?
13
a. 32
13. How many binary digits are in an IPv4 address? Select one: a. 32 b. 16 c. 4 d. 8
What is the size of the wavelenth used by 1000BaseLX fiber-optic cabling?
1300 nm
What wavelength is used on 10GBaseLW fiber-optic cabling?
1310
What wavelenth is used on 10GB base LW fiber optic cabling?
1310
How many channels were defined by the 802.11 standard?
14
b. 6to4
14. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one is presently the dominant one? Select one: a. ISATAP b. 6to4 c. Teredo d. 6in4
Which of the following is something X.25 does NOT offer?
144 Mbps maximum throughput
What is the maximum number of hops allowed by RIP?
15
b. 0000: 0000: 0000: 0000: 0000: 0000: 0001
15. Which of the following is the IPv6 loopback address? Select one: a. 1.0.0.127 b. 0000: 0000: 0000: 0000: 0000: 0000: 0001 c. FEDC: 00CF: 1234 d. 127.0.0.1
What is the length of the typical frame?
1500 bytes of data
Which of the following is not a designated private IP address?
153.6.2.1
What wavelength is used on a 10GBaseEy network?
1550
How many bits are available in an IPv6 network for creating subnets when the prefix is /48 and the host ID is 64 bits?
16
How many host can Class A IP address have?
16,227,214
d. TSP and TIC
16. Which of the following are automatic tunnel configuration protocols? Select one: a. ISATAP and Teredo b. TIC and ISATAP c. Teredo and TSP d. TSP and TIC
c. FF02::2
17. Which of the following multicast addresses will only reach routers? Select one: a. FF02::1 b. FF02::1:FFXX:XXXX c. FF02::2 d. FE80::.
What is the IP range for Class B private IP?
172.16.0.0 - 172.31.255.255
What is the maximum distance between a user's demarc and the central office for all versions of DSL?
18,000 feet
b. global unicast address
18. What type of IPv6 address do you need to get on the Internet? Select one: a. link-local address b. global unicast address c. anycast address d. global multicast address
What is the gain of the typical WAP antenna?
2 dB
What formula is used for calculating the number of new subnets?
2(number of network ID extension digits) -2
Which of the following isthe correct formula for calculating the number of new subnets?
2(number of network ID extension digits) -2
What formula would you use to arrive at the number of hosts on a subnet.
2(number of zeroes in the subnet mask) - 2
Which of the following isthe formula you would use to arrive at the number of hosts on a subnet.
2(number of zeroes in the subnet mask) - 2
Which of the following is the formula you would use to arrive at the number of hosts on a subnet?
2(number of zeros in the subnet mask)-2
A signal has just been received from the WAN link on your network. Using the given components, which of the following shows the path that the signal would take from the WAN to a workstation on your network? Assume all components are used at least once and that some components may be used more than once. 1—backbone cabling 2—entrance facility 3—equipment room 4—horizontal wiring 5—telecommunications closet 6—work area
2, 1, 3, 1, 5, 4, 6
How many copper wires are used by a T1 line?
2-pair
d. IPv4-to-IPv6 tunnel
2. This type of tunnel allows you to connect your IPv6 client to an IPv6 router over an IPv4 network. Select one: a. IPv6-to-IPv6 tunnel b. IPv6-to-IPv4 tunnel c. IPv4-to-IPv4 tunnel d. IPv4-to-IPv6 tunnel
Which TCP port(s) does File Transfer Protocol (FTP) use?
20 and 21
d. 6to4
20. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one does not require a tunnel broker? Select one: a. ISATAP b. 6in4 c. Teredo d. 6to4
If you have a 100BaseT switched Ethernet network, what is the theoretical maximum bandwidth using full duplex NICs?
200 Mbps
If you have a 100BaseT switched Ethernet network, what is the theoretical maximum bandwidth using full-duplex NICs?
200 Mbps
Which of the following is an example of an IPv6 address?
2001:0000:0000:3210:0800:200C:00CF:1234
d. stateless
21. In what mode is a DHCPv6 server operating if it only passes out optional information? Select one: a. passive b. active c. stateful d. stateless
Convert the binary value 11010101 to decimal.
213
Which of the following is a valid IP address for an individual system expressed in dotted-deciaml notation?
215.233.32.91
a. IETF
22. What organization developed the new IPv6 standard? Select one: a. IETF b. ICANN c. IEEE d. IANA
Which address range does multicast use in IPv4?
224.0.0.0/4
An ISDN PRI setup consists of which of the following?
23 B channels over T1
d. ipconfig/all
23. To test that a tunnel has been created, and to see the tunnel adapter, open a command prompt and enter this command. Select one: a. netsh b. ping Microsoft.com c. netstat d. ipconfig/all
How many channels are in a T1 bundle?
24
d. link-local
24. This is the address a computer running IPv6 gives itself when it first boots up. Select one: a. EUI-64 b. CIDR c. global d. link-local
a. 64 bits
25. What is the maximum length of an IPv6 subnet mask? Select one: a. 64 bits b. 16 bits c. 8 bits d. 32 bits
How Many host can Class C IP address have?
254
What is the maximum number of host you may have on a network if the first decimal value of the ip address is between 192 and 223 and the subnet mask is /24?
254
What is the maximum number of hosts you can have on a network if the first decimal value of the IP address is between 192 & 223 & the subnet mask is /24?
254
What is the maximum number of hosts you may have on a network if the first decimal value of the IP address is between 192 and 223 and the subnet mask is /24?
254
If you want to implement fault-tolerance on your network, what type of RAID would you use on the drives that contain data?
5
d. all nodes address
5. What type of multicast address is FF02::1? Select one: a. broadcast address b. all routers address c. solicited node address d. all nodes address
What is the speed of the low end of the Optical Carrier (OC) specification, OC-1?
51.8 Mbps
What layer is responsible for making sure that the data that it sends and receives is in a format that the receiving and sending computers can understand?
6
a. complete support; active on default install
6. What is the default status of IPv6 for Windows Server 2008? Select one: a. complete support; active on default install b. complete support; not installed by default c. rudimentary IPv6 support d. developmental support
What is the maximum length of an IPv6 subnet mask?
64 bits
What is the minimum size of an Ethernet frame?
64 bytes
How many host can Class B IP address have?
65,534
If your network subnet mask is /16, what is the maximum number of host IDs available for this network?
65,534
Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one does not require a tunnel broker?
6to4
Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one is presently the dominant one?
6to4
How many basic pieces of information does an Ethernet frame contain?
7
How many layers does the OSI model contain?
7
c. FE00::0250:8DFF:FE86:0A07
7. Given that your MAC address is 00-50-8D-86-0A-07, calculate a link-local address for a non-Windows system. Select one: a. FF02::2:0050:8D86:0A07 b. FF02::2:0250:8DFF:FE86:0A07 c. FE00::0250:8DFF:FE86:0A07 d. FE00::0050:8D86:0A07
How many pins does an RJ-45 connector have?
8
How many wires does the 100BaseT cable have?
8
a. unicast
8. Which of the following describes a link-local address? Select one: a. unicast b. multicast c. stateful d. broadcast
You'll know that you are ready to schedule your Network+ exam when you consistently make a minimum of what score on the practice exams?
80-85%
What is the IEEE standard governing wireless networking?
802.11
Which IEEE subcommittee sets the standards for Wireless LAN networks?
802.11
Which Wi-Fi standard offers speeds of up to 54 Mbps, a range of up to about 300 feet, operates in the 2.4 GHz frequency, and is downward compatible with an earlier, popular Wi-Fi standard?
802.11g
Which of the following is a port-authentication network access control standard that forces devices to go through a full AAA process to get past the gateway to a network?
802.1x
Which 802.x is The Logical Link Control related to?
802.2
Which Wi-Fi standard offers speeds of up to 100 Mbps (or higher), a range of up to about 300 feet, and operates in the 2.4-GHz and 5.0-GHz frequencies?
802.n
What wavelength is used on 10GBase SW fiber optic cabling?
850
Which of the following display types can you use to display data in Performance Monitor? A Line graph B Pie chart C Histogram D Pictogram
A Line graph C Histogram
The organizationally unique identifier and the unique device ID of the NIC
A MAC address is composed of which two parts?
Routers work primarily with the source IP address of each packet.
F
Which OSI layer transmits bits from one computer to another and regulates the transmission stream over a medium? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application
A Layer 1—Physical
Which content switch load balancing method indirectly accounts for differences in server processor speeds? A Least connections B Round robin C Weighting
A Least connections
The part of the IP address that is the same for all computers on a network is called the Host ID.
F
Two systems on the same network may share the same MAC address.
F
Every operating system's VPN client fully supports L2TP/IPSec VPNs.
True
What type of IPv6 address do you need to get on the Internet?
global unicast address
Which of the following statements about subnet masks is NOT true?
A 0 in the subnet mask indicates part of the network ID.
Which of the following statements about subnet masks is NOT true?
A 0 on the subnet mask indicates part of the network ID
To obtain the IEEE speed designated as high, clients are within how many meters of the AP? A 40 to 125 B 55 to 200 C 60 to 90 D 90 to 400 E 115 to 550
A 40 to 125
An RJ-11 connector is which type? A 6P2C B 6P4C C 6P6C D 8P8C
A 6P2C
Which IEEE standard defines the communication protocol for Ethernet? A 802.3 B 802.5 C 802.11 D 802.15
A 802.3
Which protocol is used to convert logical IP addresses to physical MAC addresses? A ARP B DNS C IMAP4 D RIP
A ARP
Which WAN technology that's used to connect a small ISP or large business to a regional ISP, and a regional ISP to an Internet backbone, uses fixed-length packets, called cells, to transmit data, voice, video, and frame relay traffic? A ATM B E1/E3 C Frame relay D T1/T3 E X.25
A ATM
Which type of hubs repairs weak signals by actually retransmitting the data with proper transmission voltage and current? A Active B Intelligent C Passive D Switching
A Active
To which TCP/IP architecture layer do e-mail and Web browser protocols belong? A Application B Internet C Network Interface D Transport
A Application
Which of the following are default Windows Logs? (Choose all that apply.) A Application B Hardware C Media Player D Security
A Application D Security
Multilayer switches combine Layer 2 data switching with Layer 3 routing using which of the following? A Application-specific integrated circuit (ASIC) B MPLS C Round robin D Specialized software
A Application-specific integrated circuit (ASIC)
The 802.1x standard requires which roles in the authentication process? (Select all that apply.)
A Authentication server B Authenticator D Requesting access device
After installing the DHCP Server service on a domain member server, what must be done in Active Directory before it begins delivering leased IP addresses? A Authorize it. B Reinstall Active Directory. C Activate it. D Modify the firewall rules.
A Authorize it.
Which wireless technology is used to create a connection between two devices? (Select all that apply.) A Bluetooth B Infrared C Radio D Wi-Fi E WiMAX
A Bluetooth B Infrared
In which network topology is each node connected to the next by a direct line so that a continuous line is formed? A Bus B Mesh C Ring D Star
A Bus
Repeaters are typically used on what type of network? A Bus B Star C Ring D Hybrid
A Bus
Which network topologies can you use with Ethernet networks? (Choose all that apply.) A Bus B Mesh C Ring D Star
A Bus D Star
Which TCP/IP-based management protocol implemented on routers provides for security? A CMIP over TCP/IP (CMOT) B Common Management Information Protocol (CMIP) C Simple Network Management Protocol (SNMP) D SNMPv3
A CMIP over TCP/IP (CMOT)
Before data gets onto a T1 line, it must be cleaned and formatted by a device called what? A CSU/DSU B Router C Hub D Demarc device
A CSU/DSU
Which network medium contains a layer of braided wire or foil between the core and the outside insulating layer, plus another layer of plastic or rubberized material that separates the central core from the shielding layer? A Coaxial B Twisted pair C Fiber optic D Wireless
A Coaxial
Which of the following are types of events reported in Event Viewer? (Choose all that apply.) A Critical B Error C Logon D Logoff
A Critical B Error
Which of the following are client options that can be set at the scope level? (Choose all that apply.) A DNS B WINS C ROUTER D MAC address
A DNS B WINS C ROUTER
What type of bridge can package frames of one format into the format of another? A Encapsulating B Heterogeneous C Translating D Transparent
A Encapsulating
Many companies run what type of cabling as their backbone media? A Fiber optic B Solid twisted pair C Stranded twisted pair D Coaxial
A Fiber optic
Which protocol is responsible for the logical addressing of each packet created by the transport layer? A IP B RIP C TCP D UDP
A IP
At a minimum, which IPv4 address components must you configure in order to communicate on your local subnet? A IP address B Subnet mask C Default gateway D DNS server address
A IP address B Subnet mask
Repeaters operate at which OSI layer? A Layer 1 - Physical B Layer 2 - Data link. C Layer 3 - Network D Layer 4 - Transport
A Layer 1 - Physical
If a problem occurs after a successful login, Last Known Good Configuration will fix the issue.
False
If a user gets a "No server is found" error, it usually points to a problem with the network software.
False
_____________ policies address the use of computer equipment and network resources for personal use or use that doesn't benefit the organization.
Acceptable use
Which type of DNS allows the zone information to be stored across multiple domain controllers?
Active Directory-integrated zones
If this light is on a NIC,it turns on and flickers when the NIC detects network traffic.
Activity light
ARP
Address Resolution Protocol; how TCP/IP networks figure out the MAC address based on their destination IP address
Why would an administrator use password cracking tools?
Administrators often use them as well to test how vulnerable their network is to attacks. They might also use the tools to access systems or devices where the password has been lost.
In DNS load balancing, all Web servers share the same IP address.
False
Which of the following is the block cipher used by most TCP/IP applications that use that type of cipher?
Advanced Encryption Standard (AES)
How does a DNS server today identify a record for a host with an IPv6 address?
AAAA
Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses?
ARP
Which of the following best describes the function of the Address Resolution Protocol (ARP)?
ARP allows computers to resolve the IP addresses of systems to which they must transmit data into hardware addresses.
Worldwide, most voice and data SONET rings use this cell-based packet-switching standard.
ATM
Which of the following is not true about standard equipment racks?
All equipment racks are floor-to-ceiling and should be bolted into the wall.
Why is the use of a switch preferred over a hub?
All of the above.
B
An administrator managing many routers should be using this type of tool in order to have an overall view of all the routers. A TRACEROUTE B Network Management System (NMS) C PING D MTR
Select the true statement regarding analog and digital signals.
Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels.
What might be the cause if you are unable to connect to radio wireless device?
Answers include: • Out of range • Interference from electrical motors or equipment • Drivers not installed • Wireless router turned off • Security settings preventing connections
List four network function tests you can perform with a cable testing device.
Answers include: • Verifying if PC is ON, if it appears as a PC and maximum speed • Verifying if hub is ON, if it appears as a hub and maximum speed • Verifying PC to hub speed and data transmission • Verifying hub to hub data transmission • Determining if straight thru or crossover patch cable is required • Finding speed bottlenecks on LANs • Monitoring LAN link between two devices
Name at least two actions you should take to limit risk of attacks on your network devices (switches, routers, and so forth).
Answers should include: • Changing default passwords • Disabling features, protocols, and options you do not need • Applying firmware and software updates regularly • Monitoring physical and virtual access to your network and devices
A
Anything that moves data from one system to another is part of this layer of the OSI model. A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
Layer 1
Anything that moves data from one system to another, such as cabling or radio waves, is part of this layer of the OSI model.
This Web server was originally created for the UNIX/Linux platforms, but now comes in a version for Windows.
Apache HTTP Server
At which layer of the TCP/IP protocol stack do HTTP, FTP, and DNS reside?
Application
What layer of the OSI model refers to the code built into operating systems that enables network-aware applications?
Application
Routers using the OSPF protocol are organized into these groups
Areas
C
At what layer f the OSI model does the Internet Protocol work? A session B transport C network D data link
C
At what layer of the OSI model does the IP protocol work? A presentation B session C network D data link
D
At which layer of the OSI model do routers work? A transport B session C data link D network
A
At which layer os the OSI model does network cabling belong? A physical B data link C network D transport
What are the three VPN security models?
Authentication before connection, trusted delivery network, and Secure VPN
What are the three steps of the AAA model?
Authentication, authorization, and accounting
VPNs generally use __________, __________, and __________ to enable secure remote connections across insecure networks.
Authentication, tunneling, and encryption
Which of the following terms describes what rights, privileges, permissions, and actions a person has or can take with respect to a resource or system?
Authorization
APIPA
Automatic Private IP Addressing; all DHCP clients are designed to generate an APIPA address automatically if there is no response to a DHCP discovery message
In Linux, every user that is created automatically belongs to a default group named Users.
False
Which of the following protocols uses TCP as its transport layer protocol?
HTTP
This is the secure counterpart of HTTP
HTTPS
What term best describes the way the DNS name space is organized?
Hierarchical
Presently, where is 10 GbE equipment employed?
High bandwidth LANS & Wans
Presently, where is 10-GbE equipment employed?
High-bandwidth LANs and WANs
Which Windows utility can you use to find the ip network information on a Windows machine?
Ipconfig.exe
On a TCP/IP network, what information within a packet does a router use to determine where an incoming packet should go?
Destination IP addresses
Internet Protocol (IP)
Is an example of software that creates packets for moving data across networks.
Which of the following is a situation in which a network with NetBIOS clients would not need to use WINS?
It can broadcast across it's entire network
What test should a network administrator know how to run on a CSU/DSU to test a WAN connection?
BERT
Which of the following is the distance vector routing protocol used on the Internet?
BGP
Which of the following is the distance vector routing protocol used on the internet?
BGP
Which of the following newer technologies proposes to provide networking over the existing power line infrastructure?
BPL
What causes the most common problems with HTTPS?
Bad certificates
CompTIA uses this term to refer to routers and switches that can perform traffic shaping.
Bandwidth shapers
The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have?
Basic Rate Interface (BRI)
an ISDN version that provides two 64 Kbps B-Channels
Basic Rate Interface (BRI)
What type of unit is formed by a single WAP servicing a given area?
Basic Service Set (BSS)
What is the term for the name attached to an infrastructure mode wireless network serviced by a single WAP and including at least one wireless node?
Basic Service Set Identifier (BSSID)
What is the name for the practice of using multiple NICs for a single machine in order to double (or more) the speed between that machine and a switch? Hint: another term for this is link aggregation.
Bonding
What are the two names for dynamic IP addressing?
Bootstrap Protocol ( BOOTP), Dynamic Host Configuration Protocol (DHCP)
What are the 2 names for dynamic IP addressing?
Bootstrap Protocol (BOOTP) & Dynamic host configuration protocol (DHCP)
BOOTP
Bootstrap Protocol; alternate and older version of DHCP, common on Linux and Mac; DHCP has more specific limitations
What is the one protocol used on the internet for communication between Autonomous Systems?
Border Gateway Protocol (BGP-4)
What is the best way to eliminate the possibility of collisions in a network?
Both a and c
___________ combine the characteristics of bridges and routers.
Brouters
Which of the following topologies provide no fault tolerance? Select all correct answers.
Bus and Ring
How does NetBIOS identify a computer system on the network? Select all that apply.
By using a computer name
The problem of modal distortion, involving light bouncing back and forth at a sharp angle as it travels down a cable, is unique to which type of fiber-optic cable?
Multimode
What type of fiber-optic cabling & connectors does a 100BaseFX network use?
Multimode with ST or SC connectors
What type of fiber-optic cabling and connectors does a 100BaseFX network use?
Multimode with ST or SC connectors
What name is given to the port numbers in the range of 0 to 1023?
Well-known port numbers
Which of the following routing metrics, administratively assigned to links, affect which routes are chosen?
Cost
Unshielded twisted pair (UTP)
CAT 5e cable is a type of ______ wiring.
The specification for 100BaseTX calls for UTP cabling using ________ or better rated cabling.
CAT5e
What is the minimum category rating of UTP cabling you would need for a network that runs at 1000 Mbps?
CAT5e
What are the category rating of UTP cabling you could use for a network that that needs to run at 1000 Mbps? (Choose all that apply)
CAT5e/CAT6
Of the following, which is the fastest category of UTP cabling?
CAT6
This is done by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller individual subnets to customers.
CIDR
This is done by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller indiviual subnets to customers?
CIDR
What is an IP addressing notation that uses a slash and is named for the method of generating blocks of IP addresses?
CIDR
what is an IP addressing notation that uses a slash and is named for the method of generating blocks of IP addresses?
CIDR
Which of the following is the latest version of Microsoft's folder- and printer-sharing protocol?
CIFS
software designed to help business owners
CRM
In wireless networks, what type of media access control is used?
CSMA/CA
What is the media access method used by Ethernet?
CSMA/CD
______________ is an acronym for the channel access method that avoids collisions rather than detecting them.
CSMA/CD
What device connects to each end of a T1 connection?
CSU/DSU
What device connects to each end of a T3 connection?
CSU/DSU
Which of the following are the devices on the customer's side of a WAN connection to a building, not including the actual connection point? (Select all that apply.)
CSU/DSU/demarc
What cable type has a maximum cable length of 100 meters? (Choose all that apply)
Cat3/Cat5/Cat5e
_____________ policies describe the set of procedures followed whenever a network change is made.
Change management
You are having problems with wireless clients losing their connections to the wireless network. What could you do? (Choose all that apply)
Change the channel on the access point and client/Reboot the access point
A user complains that they can't log onto a server. What troubleshooting steps would you likely take to resolve the problem? (Select 3)
Check connectivity to the server from your system/Find out if a user on the same segment can connect/Find out if a user on a remote segment can connect
You install a new virus suite in your network of 120 computers. In the same afternoon, you configure RAID on a server. You are experiencing system crashes throughout your network. What would be the first step to correct the problem?
Check the virus vendor for system patches or service packs.
What IP Class is 1 - 126?
Class A
Different properties of each class
Class A: 1-126, first octet, 16,277,214 hosts; Class B: 128-191, second octet, 65,534 hosts; Class C: 192-223, third octet, 254 hosts; Class D: 224-239, multicast for hosts; Class E: 240-255, reserved host
Default subnet masks for Class A, Class B, and Class C
Class A: 255.0.0.0; Class B: 255.255.0.0; Class C: 255.255.255.0
If the first decimal value of an IP address is between 128 & 191, to what IP class does the network belong?
Class B
If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong?
Class B
What IP class is 128 - 191?
Class B
What IP class is 192 - 223?
Class C
What IP Class is 224 - 239?
Class D
What IP class is 240 - 254?
Class E
CIDR
Classless Inter-Domain Routing; based on subnetting; a single IP address can be used to designate many unique IP addresses; subnetting can be done by an organization, but CIDR has to be done by the ISP; looks like "172.200.0.0/16," which shows how many addresses are covered by the CIDR address
Electromagnetic interference (EMI)
Coaxial cable uses a braided metal shield to protect data from _________.
What events, characteristic to an Ethernet network using hubs, does using an Ethernet switch minimize or avoid?
Collisions
What events, characteristic to an Ethernet network, using hubs, does using an Ethernet switch minimize or avoid?
Collisions
a guaranteed minimum transmission rate offered by the service provider
Committed Information Rate (CIR)
What is the overall term for the set of documents, policies, and procedures for maintaining and updating a network with the objective of lessening vulnerabilities?
Configuration management
This is another name for a session.
Connection
A communication between computers that begins with an acknowledgement, followed by a message, and ending with a closing acknowledgement is which type of communication?
Connection-oriented
What two types of protocols exist at the transport layer? (Choose two)
Connection-oriented/Connectionless
Explain "same subnetting" (ESSAY)
Convert subnet mask to binary; find how many consecutive "1"s there are; convert the addresses to binary; find the octet that is unique for each address, which is different for each class type; only evaluate the amount of numbers that coincides with the number of consecutive "1"s in the subnet mask (if there were 4 consecutive "1"s in the subnet mask, only evaluate the first 4 numbers of each unique octet in the addresses); if one set of binary numbers in an address matches another set of binary numbers in another address, then those addresses are on the same subnet
D
Convert the binary value 11010101 to decimal. A. 221 B. 198 C. 245 D. 213
Which of the following routing metrics is the ability of a connection to handle more traffic than others?
bandwidth
What begins an Ethernet Frame?
Preamble
Which layer of the OSI model is responsible for encryption and decryption?
Presentation
an ISDN version that provides 23 64-Kbps B-channels
Primary Rate Interface (PRI)
Which of the following are considered network peripherals? (Select all that apply.)
Printer/scanner
CompTIA's Network+ exam consists of two tests.
False
DNS is a protocol for the automatic allocation of IP addresses to DNS clients.
False
Each column in a routing table defines a single route.
False
What type of attack uses zombie computers to bring a network down under a massive number of requests?
DDOS
For a computer to connect to a HomeGroup, it must have certain features enabled or configured correctly. Which of the following is not necessary to join a HomeGroup?
DHCP
Which of the following automatically gives out IP information to computers that request it?
DHCP
which of the following automatically gives out IP information to computers that request it?
DHCP
_______________ servers match host names to IP addresses.
DNS
In this type of load balancing, one domain name is assigned to many servers, using different IP addresses.
DNS load balancing
Almost immediately after a server migration project, employees are complaining that they can't reach the Internet. You sit down at a machine and try to ping a well-known website, which fails. You then try to ping a known-public IP address, which succeeds. What is most likely the issue?
DNS settings are incorrect
If you have cable Internet service, what protocol is used between the head end connection and the cable company's network?
DOCSIS
What is the digital signal used to which a central office converts analog voice signals before sending them across trunk lines?
DS0
Which of the following is the digital signal to which a central office converts analog voice signals before sending them across trunk lines?
DS0
The frame for this signaling method has a framing bit, plus 24 channels, each holding a single 8-bit data sample.
DS1
What is the T1 signaling method?
DS1
In a DSL connection, what device is used between your computer (or router) and the wall jack?
DSL modem
Which of the following is the DSL device that is located in a central office, connecting multiple DSL customers to the Internet?
DSLAM
the device that sends data to (and receives data from) the local loop, usually a CSU/DSU or modem
Data Circuit-terminating Equipment (DCE)
What is the oldest of the TCP/IP symmetric-key algorithms?
Data Encryption Standard (DES)
Which layer has been subdivided into the Logical Link Control sublayer and the Media Access Control sublayer?
Data Link
Which layer of the OSI model adds source and destination MAC addresses to frames?
Data Link
Which layer of the OSI model is the only layer divided into two sublayers?
Data Link
Which layers of the OSI model are mapped to the Link layer of the TCP/IP DOD model? (Choose all that apply)
Data Link/Physical
the device that passes data from the customer LAN to the DCE, usually a router.
Data Terminal Equipment (DTE)
Which edition of Windows Server 2008 includes support for up to 64 processors and provides unlimited virtual instances?
Datacenter Edition
Analytical and __________ logs are hidden by default and generally used only by developers.
Debug
What is the signs of APIPA?
Default IP of 169.254.XX.XX with a subnet of 255.255. Everything works except for internet
A client using a PPTP VPN to connect to a private LAN will have an IP address of that network, just as if it were directly connected to the LAN, right down to this IP configuration setting, which will control where that client's packets with destination addresses beyond the LAN will be sent.
Default gateway
You receive a phone call from a co-worker telling you that "the network is down." Just as you are about to look into the issue, you receive several more phone calls from other co-workers. Using the problem-solving process, what must be done first to effectively troubleshoot the issue?
Determine what the problem is, and then figure out who has been affected on your network.
When troubleshooting a potential wireless hardware problem, open this Windows utility to see if there is an error or conflict with the wireless adapter.
Device manager
With Windows, what can you use to verify that Windows recognizes a NIC and is ready to use it?
Device manager
You'd use the LAN __________ Data Collector Set to troubleshoot network performance.
Diagnostics
What is a potential problem a browser looks for after it receives a certificate from a secure HTTP site? Select all that apply.
Disconnected certificate and Invalid certificate
Rather than destroying or stealing data, a ____________ attack is designed to disrupt daily standard operation.
DoS
Man-in-the-middle attacks can be used for what types of attacks?
DoS, Web spoofing, information theft, and TCP session hijacking
What task(s) should you perform as soon as you finish configuring a router? Select all the correct answers
Document, backup
DNS
Domain Name System; translates domain name into IP addresses
What is true and what is not true about subnets?
Don't always get exact number of subnets; efficient; *just think of the basics you already know*
_____________ means that reasonable precautions are being taken which indicates that the organization is being responsible.
Due care
Which service would allow home or office networks that may change IP addresses to be contacted via domain names?
Dynamic DNS
Which technology allows DNS clients to automatically update DNS servers?
Dynamic DNS
Which technology allows DNS servers to query DHCP servers for host IP addresses?
Dynamic DNS
Which of the following automatically gives out IP information to computers that request it?
Dynamic Host Configuration Protocol (DHCP)
DHCP
Dynamic Host Configuration Protocol; automatically assigns an IP address whenever a computer connects to a network
With this type of NAT, many computers can share a pool of routable IP addresses that number fewer than the computers.
Dynamic NAT
What is the common term for a VLAN based on MAC addresses?
Dynamic VLAN
Each domain in DNS must have it's own dedicated authoritative DNS server that cannot be shared with other domains.
False
Which categories of UTP cabling can be used in Gigabit Ethernet networks? (Select all that apply.) A CAT 1 B CAT 2 C CAT 3 D CAT 4 E CAT 5 F CAT 5e G CAT 6 H CAT 6e I CAT 7
E CAT 5 F CAT 5e G CAT 6 H CAT 6e
Which type of coaxial cable is used for low-power video and RF signal connections? A RG-6 B RG-8 C RG-11 D RG-58 E RG-59
E RG-59
Every Web server must include www as part of its name.
False
If Windows installs the driver for a NIC, you should use it rather than using a driver that comes from the manufacturer of the NIC.
False
A 0 in the subnet mask indicates part of the network ID
F
hypervisor installed directly onto the server
bare-metal virtualization
What is the European counterpart to a T1 line?
E1
802.1X combines RADIUS-style AAA with which of the following to make a complete authentication solution?
EAP
Which of the following technologies is not a true protocol, but enables the use of different authentication methods?
EAP
This is the most popular form of authentication used in wireless networks today.
EAP-PSK (Personal Shared Key)
What is the protocol developed by Cisco for enterprise-wide routing environments?
EIGRP
Which of the following are examples of hypervisors? (Choose all that apply)
ESX/Hyper-V/Oracle VM Server
agreement regarding the use of an application
EULA
Which of the following is true of the names in a flat name space?
Each must be unique
What is the goal of subnetting?
Efficiency; more efficient use of IP addresses
NICs send and receive binary data as pulses for all of the following? (Choose all that apply.)
Electricity/radio waves/light
Hub
Enables multiple machines to connect over a network.
This term means to scramble, to mix up, to change data in such a way that the wrong people can't read it, but so the right people can unscramble it.
Encryption
In a NAT router, what is the name for an arbitrary number generated by the sending computer?
Ephemeral port
When a Web browser sends a message to a Web server, it generates this type of port number pseudo-randomly as the source port for the packet.
Ephemeral port number
What is the status of a port that is part of an active working endpoint pair?
Established port
What is the Ethernet frame type that is used by TCP/IP?
Ethernet II
What is the name of the Windows utility for viewing log files?
Event Viewer
What tool would you use to view error messages that are generated by system services or applications?
Event Viewer
What is the name of the Windows utility for viewing log files?
Event viewer
MAC address
Every NIC has a hard-coded identifier called ___________.
What is Class E IP address used?
Experimental
What type of unit is formed by two or more WAPs servicing a given area?
Extended Service Set (ESS)
If a collision has occurred on an Ethernet network, the cable is restricted to the nodes whose data collided until they have finished retransmitting.
F
Which OSI layer provides security, encryption, and compression for the data? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application
F Layer 6—Presentation
Which is WAN connection technology that uses encryption and security protocols to create a private network over a public network? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless
F VPN
RAID technology provides backup for data stored on hard drives.
FALSE
Given that your MAC address is 00-50-8D-86-0A-07, calculate a link-local address for a non-Windows system.
FE00::0250:8DFF:FE86:0A07
Which part of the address, FEDC::CF:0:BA98:1234/64, is the network ID?
FEDC::
Which part of this address, FEDC::CF:0:BA98:1234/64, is the network ID?
FEDC::
What is the MAC broadcast address?
FF-FF-FF-FF-FF-FF
Which of the following is a broadcast MAC address?
FF-FF-FF-FF-FF-FF
what is the MAC broadcast address?
FF-FF-FF-FF-FF-FF
Which of the following multicast addresses will only reach routers?
FF02::2
All of the following items can cause interference to wireless networks in the 2.4-GHz range EXCEPT:
FM radios
All of the following are attacks on wireless connections EXCEPT:
FTP bounce
A RAID that is configured as a level 0 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.
False
A Trojan is a self-replicating program that masks itself as a useful program but is actually a type of malware.
False
A security policy should clearly state the desired rules, even if they cannot be enforced
False
Apache HTTP Server is Microsoft's Web Server.
False
As the internet grew, HOSTS replaced DNS.
False
At any given time your computer can only have one communication session open.
False
Both Cisco and Microsoft treat CompTIA Network+ as a prerequisite toward at least some of their own certifications.
False
Browsers request HTML pages from mail servers.
False
CompTIA requires A+ certification before you can take the Network+ exam.
False
NIC and Switch
For a network to function in full-duplex, which of those devices must support full-duplex? (Select all that apply)
C
For network tech, one benefit of understanding the OSI seven-layer model and how traffic in an actual network works through the model is applying this knowledge to ___ networks. A. Purchasing NICs B. connecting to the Internet C. troubleshooting D. securing a PC
On an authoritative DNS server, what are the storage areas called that hold the IP addresses and names of systems for a particular domain or domains?
Forward lookup zones
Presently, almost all the tier 1ISP routers properly perform what function for IPv6?
Forward packets
What packet-switching standard designed for and used primarily with T-carrier lines is very fast, but does not guarantee data integrity?
Frame relay
Multiplexers used this technology to keep individual calls separate.
Frequency Division Multiplexing
Given the following information: • Your company's regular business hours are from 8 a.m. to 5 p.m. Monday to Friday. • Your supervisor instructed you to run backups only after business hours to avoid impacting network performance. • You have a 50 GB tape drive with a data transfer rate of 3600 KB/min, allowing transfer of 2.1 GB per hour. • You have 40 GB to backup. On which day(s) can you do full backups? (Choose all that apply.)
Friday/Saturday
How can you remove an update from Windows Vista?
From the Windows Update window, click View update history. Click the Installed Updates link on the Review your update history page. If the update can be removed, Uninstall is displayed in the toolbar. Click Uninstall to remove the update.
Local connections do not use this, although every routing table has a column for it, and therefore, a value appears in this field for each route.
Gateway
What type of IPv6 address do you need to get on the Internet?
Global unicast address
If you support, but do not install UTP networks, which two of the following are the most important tools you should use?
Good, medium-priced toner & good, medium-priced cable tester
Which protocol will help prevent downtime due to failures on the default gateway?
HSRP
This is the most common type of proxy server.
HTTP
This is the underlying protocol on the World Wide Web.
HTTP
This protocol is an alternative to POP3, with special enhancements.
IMAP4
If a switch contains a Web page that you must connect to in order to configure it, then the switch must also have this type of address for accessing that Web page.
IP address
What is the Network layer unique identifier assigned to each device on a TCP/IP network?
IP address
You can use the command-line utility _______________ to retrieve a computer's IP configuration.
IPCONFIG
What is the most convenient means of determining what the Internet Protocol (IP) address is on a Microsoft Windows 7 machine is using?
IPCONFIG.EXE
A(n) _________ device can terminate a network connection or user session.
IPS
You install a(n) ____________ device on the perimeter of your network to monitor for and stop threats before they are passed on your network.
IPS
Which of the following is an authentication and encryption protocol that works at the Network layer of the OSI seven-layer model?
IPSec
Which protocol is used to encrypt data as it travels a network?
IPSec
Diameter provides better security than RADIUS by providing end-toend security using __________ or __________.
IPsec or TLS
Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one uses nonstandard addresses for the endpoints?
ISATAP
Which standards organization is named for the Greek word for "equal"?
ISO
Smaller companies and individuals use a(n) ____________ to make the connection to a commercial backbone.
ISP
Which of the following design considerations affects the bandwidth and reliability of external connections?
ISP selection
A
If the computer on the network connect via the same piece of cable, what topology is employed? A bus B ring C star D mesh
Bus
If the computers on the network connect via the same piece of cable, what topology is employed?
B
If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong? A Class A B Class B C Class C D Class D
Activity light
If this light is on a NIC, it turns on and flickers when the NIC detects network traffic.
200 Mbps
If you have a 100BaseT switched Ethernet network, what is the theoretical maximum bandwidth using full-duplex NICs?
B
If your company has a single server on the private LAN that they want to make accessible from the Internet, which of the following would give the server the protection of NAT while allowing access to that server from the Internet? A Source NAT B Port forwarding C Overload NAT D Network Address Translation (NAT)
B
If your network subnet mask is /16, what is the maximum number of host IDs available for this network? A 62 B 65,534 C 254 D 16,227,214
B
In a NAT router, what is the name for an arbitrary number generated by the sending computer? A Destination port B Ephemeral port C ASN number D Area ID
D
In some networks data moves over radio waves, which fall into which layer of the OSI model? A. Application B. Session C. Presentation D. Physical
_____________ policies detail how a security break or disaster is dealt with.
Incident response
Which statement is true regarding differential / incremental backups?
Incremental backups copy all files changed since the last full or incremental backup and marks files as backed up.
What type of unit is formed by one or more wireless nodes communicating in ad hoc mode?
Independent Basic Service Set (IBSS)
This term describes how permissions pass down from folder to folder.
Inheritance
Following a massive infection of your network by a virus, you have been tasked with developing preventive measures for keeping the network infection free. What would be an effective preventive measure?
Install an enterprise-based anti-virus solution.
What steps can you take to minimize electrical interference on your wired LAN?
Install cables in separate conduits away from items such as electric motors (like those found in lifts/elevators), fluorescent lights, and air conditioners. In areas where there's an abundance of electrical noise, use shielded cables or other technologies such as fiber optic cables to avoid interference.
What is the Cisco term for a feature in a special switch that will provide routing between VLANs?
InterVLAN routing
List some of the items a dumpster diver seeks.
Internal phone directories, organizational charts, policy manuals, calendars, outdated hardware, systems manuals, network diagrams, other technical information sources.
The three main zones into which you can divide a network are the _________, _________, and _________.
Intranet, perimeter network (or DMZ), and extranet (or Internet)
Each interface on a router must have an IP address and what else to be able to communicate on the network?
MAC address
What is a method for limiting access to your wireless network based on the physical addresses of wireless NICs?
MAC address filtering
Which of the following is a method for limiting access to your wireless network based on the physical addresses of wireless NICs?
MAC address filtering
What basis do bridges use to determine whether to forward traffic?
MAC addresses
What firewall technology allows or denies access to a network according to the MAC address of the computer seeking access?
MAC filtering
Which statement about Multiprotocol Label Switching (MPLS) is true?
MPLS works with any network layer protocol.
Which of the following is the most common authentication method for dial-up connections?
MS-CHAP
The Transport layer segments data into smaller chunks, the size of which is determined by which of the following?
MTU
Which one of the following routing metrics determines the largest frame a particular technology can handle?
MTU
You're configuring your network switch to improve its security. You have changed the default password for the unit's Web interface. What else should you configure to be sure all management interfaces have been locked down?
Make sure to secure TELNET and SNMP interfaces. Also, if available, block access to management interfaces from all external network locations. In the case of wireless devices, block access to management interfaces over wireless connections (allow wired connections only).
Why can't computer equipment just be thrown in with the regular trash?
Many pieces of computer equipment contain hazardous materials and heavy metals. Also, you want to make sure that any information stored on the equipment is not able to be retrieved.
Which of the following is NOT a state that VLAN Trunk Protocol (VTP) uses?
Master
What is the meaning of the "10" in 10BaseT?
Maximum speed of 10 MBps
What is the meaning of the "10" in 10BaseT?
Maximum speed of 10 Mbps
What company was not involved in the 1979 introduction of the DIX ethernet standard?
Microsoft
Which of the following companies was NOT involved in the 1979 introduction of the DIX Ethernet standard?
Microsoft
What device converts an analog signal to digital and a digital signal to analog?
Modulator-demodulator
Multimode
Most network technologies that use fiber-optics use which type of fiver-optic cables?
_____________ fiber optic cable is used mostly for short distances (up to 500 m).
Multi-mode
What is Class D IP address used?
Multicast
This is a set of reserved addresses designed to go only to certain systems.
Multicast address
You are troubleshooting a TCP/IP network and want to test a network adapter on a client computer. What TCP/IP utility could be used to find out if TCP/IP is configured correctly on the system, and to find out if the host can contact a host at another location?
PING
What command can you use to test the NIC's ability to send and receive packets?
PING 127.0.0.1
Which of the following would confirm that you have a DNS problem?
PING works with the IP address but not with the FQDN
If you cannot receive e-mail, which of the following protocols should you suspect is not working properly?
POP3
Which of the following common terms describe a regular phone line designed to work only with analog sound and that uses an RJ-11 connector?
POTS and PSTN
CHAP is an authentication scheme used by _________ servers to validate the identity of the remote user.
PPP
This type of connection is always used for dial-up.
PPP
What two tunnel protocols enable tunnel endpoints to act like NICs on the same network?
PPTP and L2TP
Which of the following are the two tunneling protocols used by the majority of VPNs?
PPTP and L2TP
Name two VPN protocols.
PPTP and L2TP are the most common. IPsec can be used with VPNs, though it is a general network protocol.
Which of the following common terms describe a regular phone line designed to work only with analog sound and that uses an RJ-11 connector? (Select all that apply.)
PSTN/POTS
Most fiber-to-the-home technologies employ a version of:
Passive optical network
Computers that both serve and access data participate in which kind of network?
Peer-to-peer
This Windows utility will allow you to gather information on many aspects of a computer and network, which you can save in log files to serve as a baseline.
Performance monitor
At which layer of the OSI model does network cabling belong?
Physical
At which layer would you find errors that were caused by EMI?
Physical
In some networks data moves over radio waves, which fall into which layer of the OSI model?
Physical
Which of the following would confirm that you have a DNS problem?
Ping works with the IP address but not with the FQDN.
Which of the following choices are collision avoidance methods defined by the 802.11 standard?
Point Coordination Function (PCF) and Distributed Coordination Function (DCF)
Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?
Port
Some manufacturers, such as Cisco, use this term to refer to either overloaded NAT or port forwarding.
Port Address Translation (PAT)
If your company has a single server on the private LAN that they want to make accessible from the Internet, which of the following would give the server the protection of NAT while allowing access to that server from the Internet?
Port forwarding
Some IDS/IPS products will use this advanced switch capability so that administrators can examine all the packet traffic for certain ports.
Port mirroring
Some advanced switches have this ability to mirror data from any or all physical ports to a single physical port in order to monitor traffic.
Port mirroring
This is a name used for ports in the 49152 to 65535 range.
Private port, dynamic port
Private vs. Public IP address
Private: IP addresses that help hide a system from the Internet, which means that the system cannot access the internet (fall in the 10, 172, and 192 range); Public: an IP address that allows the system access the Internet
A network _________ is a language that is used by systems that which to communicate.
Protocol
Data Link Layer
Provides the key interface between the Physical and Network layers.
When configuring a Web client to use a proxy server, you must tell the Web client not to use the usual DNS resolution, and give it this setting.
Proxy server IP address
This term describes several methods for spreading data across multiple drives.
RAID
Which of the following RAID levels has no fault tolerance?
RAID 0
This form of redundancy uses multiple hard drives working together in such a way that if one drive fails, the others will continue without interruption.
RAID 1
Which of the following is the most limiting factor in a host's ability to run virtual machines?
RAM
Which of these routing protocols is the oldest?
RIP
Which one of the following routing protocols did not support Variable-Length Subnet Masking (VLSM)?
RIPv1
Select the distance vector protocols from the following list. Select all that apply in alphabetical order.
RIPv1, RIPv2, BGP
What protocol (including version number) was adopted in 1994, and is now considered obsolete execept for small, private WANS
RIPv2
What type of connector is used by all UTP Ethernet NICs?
RJ-45
Which of the following is the most heavily adopted VoiP standard?
RTP
Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to the AP?
RTS
Which of the following protocols is commonly used to stream video?
RTSP
With IPv6, how should we regard Internet address changes?
Rare but normal
Telnet is rarely used on the Internet, having been replaced by _______________, which looks just like Telnet, but encrypts data.
SSH
An AP typically broadcasts its _____________ so clients can discover its presence.
SSID
When configuring a WAP, set this to something unique and easily identified, and follow up by giving this same name on all wireless hosts that should connect to this network.
SSID
The two most common types of SSL VPNs are:
SSL portal VPNs and SSL tunnel VPNs
In which type of VPN does the client browser run an active control, such as Java or Flash?
SSL tunnel
Which VPN implementation needs no additional configuration to be allowed access through a firewall?
SSTP
____________ attacks flood a server with half open TCP connections which prevent users from being able to access the server.
SYN flood
the Linux file sharing protocol that is compatible with Windows
Samba
Which of the following is an SSH-enabled program?
Secure Copy Protocol (SCP)
This cryptographic hash comes in two versions, but is not the most popular cryptographic hash.
Secure Hash Algorithm (SHA)
Which of the following was developed as a secure replacement for Telnet?
Secure Shell (SSH)
B C D
Select the distance vector protocols from the following list. Select all that apply in alphabetical order. A. Open Shortest Part First (OSPF) B RIPv1 C RIPv2 D BGP
A B
Select the link state dynamic routing protocol from the following list. Select all that apply in alphabetical order. A Open Shortest Path First (OSPF) B IS-IS C RIPv2 D BGP
D
Select the one function below that NIC does NOT perform. A. It sends and receives binary data B. It provides an interface between the PC and the Network C. It creates frames D. It routes data across the most efficient route on the network
If you are installing a new WAP, and it is near another WAP, what is one way to reduce interference?
Separate channels should be used
Which of the following are NOT contained in a UDP header?
Sequence number, window size, acknowledgment number
When you configure an ISDN terminal adapter (TA), you must enter the telephone number for the other end of the ISDN connection, as well as this special number, provided by the telephone company.
Service Profile ID (SPID)
Which of the following is a term for the second level of naming in a Wi-Fi network that can be applied in either ad hoc mode or infrastructure mode?
Service Set Identifier (SSID), Extended Service Set Identifier (ESSID), network name
Which layer is responsible for establishing a connection between the source and destination?
Session
Which layer of the OSI model manages the connections between machines on the network?
Session
What are the three LDAP Bind methods?
Simple Bind, SASL (Simple Authentication and Security Layer), and Anonymous BIND
an industry-standard protocol used for network management and monitoring
Simple Network Management Protocol (SNMP)
What type of fiber-optic cable is used in a 1000BaseLX network?
Single-mode fiber
What is the name for the session information stored in RAM by a computer on one side of a session?
Socket and endpoint
C
Some manufacturers, such as cisco, use this ter m to refer to either overloaded NAT or port forwarding. A Static NAT B Dynamic NAT C Port Address Translation (PAT) D Source NAT
To organize your diagnostic process when tracing cabling, use these very simple aids to keep track of your progress on the patch panel.
Stickers
Which of the following is not an accurate description of the differences between stranded core and solid core cabling?
Stranded core is UTP while solid core is fiber-optic cabling
This is done by an organization when it takes a block of addresses received from an ISP and breaks the single block of addresses into multiple subnetworks.
Subnetting
What are some examples of Physical security? (Choose all that apply)
Swipe cards/Servers in locked closets./Biometrics as input devices
What type of advanced network device is used to create VLANs?
Switch
Which networkign devices can use the spanning Tree Protocol?
Switches
a high-speed, baseband digital networking standard that specifies incrementally increasing data rates across fiber-optic links.
Synchronous Optical Network (SONET)
Which of the following is a Unix/Linux logging program?
Syslog
Select the utility inside of Windows that allows the user to recover a previous system state. This utility monitors drives and partitions, as well as registry settings and system files.
System Restore
A NIC is not concerned about the contents of the data part of a frame.
T
Adding a digital signature to an encrypted message ensures that you are getting the message from the person you expect it to be from.
T
All implementations of Ethernet use the same frame type as the original Ethernet networks.
T
Before encryption, we consider all data as being plaintext (also called cleartext). This does not necessarily mean that the data is simple text format, but it can be any type of data.
T
One function that an NIC does not perform is that it routes data across the most efficient route on the network.
T
When a frame arrives at the hub, the hub makes an exact copy of the frame and sends it to every other system on the network.
T
When the NIC sends a frame that contains the broadcast address, every NIC on the network processes that frame.
T
Although a frame relay connection is established in much the same way that a T1 connection is, which of the following is an important distinction between the two technologies?
T1 uses point to point, while frame relay makes use of virtual circuits.
how much something costs when intangibles are factored in
TCO
Most computer connections use this Transport layer protocol.
TCP
TACACS+ uses __________ rather than UDP for messages.
TCP
Which of the following is not an Application layer protocol?
TCP
Which of the following protocols are connection-oriented?
TCP
What is the de facto protocol suite of the Internet?
TCP/IP
What network protocol do Linux and Apple (Macintosh) systems most commonly use today?
TCP/IP
What network protocol do linux & apple systems most commonly use today?
TCP/IP
what is the De Facto protocol suite of the internet?
TCP/IP
You have a small network with 25 users, 2 Fast Ethernet switches, and 1 router that connects the network to the Internet. Users on all of the internal local area networks (LANs) are complaining that when they came in this morning they could not access the Internet. Users can access resources on their own LAN and other internal LANs with no problem. What network component is the most likely problem in this scenario? (Choose all that apply)
The Internet router/The Domain Name Service (DNS) server
If the Network Administrator needs an IP address, where do they go, and why would the Network Administrator want to subnet this address? (ESSAY)
The Network Administrator will go the ISP for a new IP address; The Network Administrator will subnet for efficiency and organization (grouping), such as if there are many departments, subnetting could allot a certain amount of the network to that department (this also allows for more address usage from one IP address)
Which of the following statements are true about the OSI model? (Choose all that apply)
The OSI model encourages modular design in networking./The OSI model provides a common jargon to describe the function of any network protocol./Each layer of the OSI model addresses an essential network task.
In RADIUS terminology, what is the name given to the system that provides connectivity services for remote computers?
The RADIUS client
In RADIUS terminology, what is the name given to the system that provides authentication services for remote computers?
The RADIUS server
Identify each of the four layers in the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack and the layer it maps to in the Open Systems Interconnection (OSI) model. (Choose all that apply)
The TCP/IP application layer maps to the OSI session, presentation and application layers./The TCP/IP transport layer maps to the OSI transport layer./The TCP/IP internet layer maps to the OSI network layer./The TCP/IP link layer maps to the OSI physical and data-link layers.
In regards to a user account, what does a white circle with a black arrow indicate?
The account is disabled.
C
The addresses 127.0.0.1, 10.1.1.50, 172.16.200.1, and 192.168.35.44 are examples of what? A DHCP lease addresses B APIPA addresses C Special IP addresses D Class A addresses
How do WINS servers learn the NetBIOS names of computers on the network?
The computers register their names with the WINS server.
A
The decimal value 151 converts to what binary value? A 10010111 B 11010001 C 10010110 D 10010101
TACACS+ provides better message security than RADIUS because it encrypts __________.
The entire message and not just the message body.
What happens to frames when the hub sends them to the NICs on the network?
The frames are received by every NIC, but only the NIC with the matching MAC address processes the frame
Your current backup schedule involves incremental backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?
The full backup must be restored first, followed by all incremental backups in sequential order leading up to the day of failure.
UTP category ratings are based on what?
The highest frequency and bandwidth that the cable can handle
Which statement is true about NetBIOS name broadcasts?
The host sends the message to all machines on the local network.
Your current backup schedule involves differential backups of all data Monday through Saturday, with a full backup on Sunday. Last Saturday, one of your storage drives failed prior to running the daily backup. What must be done to recover the data on the failed drive?
The last full backup should be restored first, followed by the last successful differential backup prior to the drive failure.
What would not be included in the data portion of an Ethernet frame on an IP network?
The length of the data being transmitted
Which of the following is not identified in a cabling specification such as 10BaseT?
The maximum number of routers
At which layer of the OSI model does NAT operate?
The network layer
What do most professional cable installers use to quote the price for an installation?
The number of drops
What is the biggest differentiator among Ethernet hubs?
The number of ports
What does the ping message "Destination host unreachable" message mean?
The pinged IP address is on the same network, but an ARP reply was not received.
CAT 5e
The specification for 100BaseTX calls for UTP cabling using _______ or better rated cabling.
C
The specification for 100BaseTX calls ofr UTP cabling using ___ or better rated cabling. A CAT 1 A CAT 3 C CAT 5e D CAT 6
How does a switch "learn" MAC addresses?
The switch reads each frame and makes a note of where each MAC address came from.
Crosstalk
The twisting of the cables in UTP and STP reduces _________.
If the minimum password length on a Windows system is set to zero, what does that mean?
The user can use a blank password.
Routers have which of the following capabilities?
They allow you to connect networks with different types of cabling or frames.
All of the following are reasons to purchase name-brand NICs, with one exception. Which one is the exception?
They are less expensive
Which of the following is not a characteristic of cheap cable testers?
They come with a small loopback device
Which of the following statements about routers are true? (Choose all that apply)
They develop tables based on IP addresses to determine routes./Each port of a router must have a separate network address or subnet.
Which of the following statements is true about DNS root servers?
They have the complete definitive name resolution table.
Which of the following is true of OSPF routers? Select all that apply
They send Hello messages every 30 minutes to routers in their area, they converge almost instantly
B
This is done by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller individual subnets to customers. A dynamic addressing B CIDR C static addressing D BOOTP
D
This is done by an organization when it takes a block of addresses received from an ISP and breaks the single block of addresses into multiple subnetworks. A dynamic addressing B CIDR C static addressing D subnetting
Fast Ethernet
This term is used to refer to any of the several variations of Ethernet that operate at 100 Mbps.
A
This terms is used to refer to any of the serval variation of the Ethernet that operate at 100 Mbps. A fast ethernet B full-duplex Ethernet C gigabit Ethernet D switched Ethernet
Even if you do not wish to take the CompTIA Network+ exam, the information in the Study Guide will be valuable to you.
True
What is the signaling method used to allocate time slots for each channel in a T-carrier line called?
Time Division Multiplexing (TDM)
What status indicates that a connection has been lost to the other side, and has not yet closed?
Time-wait
What is the purpose of a crimper?
To connect a RJ-45 connector to the cable
In a Microsoft domain using Kerberos authentication, after a client has been authenticated and received a TGT, the client presents this to a Ticket-Granting Service to receive something that allows authorization to resources for up to 8 hours. What is a common name for this last item?
Token
Tripplet Corporation manufactures a very popular tool called a "Fox and Hound." What type of tool is this?
Toner
What is the term for servers just below the DNS root servers?
Top-level domain servers
How are QoS policies often implemented?
Traffic shaping
What is one of the most overlooked security measures?
Training and awareness
At what layer of the OSI model does the set of protocols indicated by the TCP part of TCP/IP work?
Transport
Which TCP/IP model layer uses connection-oriented protocols?
Transport
What are the two IPsec encryption modes?
Transport and tunnel
A __________ is a program that poses as something else, causing the user to 'willingly' inflict the attack on himself or herself.
Trojan horse
A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.
True
A protocol analyzer, such as Wireshark, gives the ability to listen in on network traffic as it moves through the Application layer to the Data Link layer and vice versa..
True
An Ethernet network uses the CSMA/CD access method.
True
An application actively providing a service to a network client has an open port.
True
An event log entry that is an error is marked with a red circle with a white exclamation point in the center.
True
Before Secure methods were created for making connections over the internet, the biggest drawback to private remote connections was the cost to connect.
True
CompTIA periodically updates the Network+ test objectives, domains, and test questions to keep up with newer technological changes.
True
When using BitLocker to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?
USB key mode
When using to encrypt your entire disk, which mode must you use if your system is not configured for TPM support?
USB key mode
Which kind of cable does not provide any protection against EMI?
UTP
Which type of cabling does the 10BaseT standard specify?
UTP
The highest frequency and bandwidth that the cable can handle
UTP category ratings are based on what?
How does antivirus software recognize new viruses and worms?
Updated virus definitions are downloaded.
You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords but that they must change their password every 30 days. You have just received a call from a user who can't log on because she forgot her password. After you change her password, which of the password options listed would you set in the user's account so that she will have to change the password when she logs on using the password you assigned?
User must change password at next logon.
All of the following are true concerning LTE (Long-Term Evolution), EXCEPT:
Uses satellite technology
Broadcast address
Using the __________ enables a computer to send a packet that every other PC on the network will process.
What is the current V standard for modems?
V.92
Which of the following would be included in a network diagram?
VLAN, gateway router, IP addresses
Which of the following virtualization products provides hosted virtualization?
VMware Workstation
Which of the following is not a feature that you should consider when choosing a new switch for a small business?
VPN support
What organization is a very popular certificate authority?
VeriSign
You just set up a new workstation on a TCP/IP network. You configure the IP settings, but the computer cannot access anything on the network. Which of the following is the first step to troubleshoot this problem?
Verify connection to the systems IP configuration
When using tape backup, what should be done to ensure that the backups are viable?
Verify data can be restored.
Where do you need to look to determine whether a service pack has been installed?
View Computer Properties, and in the Windows edition portion of the page it will indicate if a Service Pack has been installed.
A form of virtualization that eliminates telephone switching hardware is called a:
Virtual PBX
Using an encrypted tunnel between a computer (or remote network) and a private network is an example of using this type of network.
Virtual Private Network (VPN)
Using an encrypted tunnel between a computer (or remote network) and a private network is an example of using this type of network.
Virtual private network (VPN)
What type of server resolves NetBIOS names to IP addresses?
WINS
Which two of the following represent two strategies Microsoft used to solve the problem of resolving NetBIOS names to IP addresses without using broadcasting?
WINS and LMHOSTS
The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?
WPA2
Which is the strongest form of wireless security?
WPA2
Which function is being used if a packet is sent to port 80?
Web browsing
Microsoft Internet Explorer and Mozilla Firefox are examples of this type of TCP/IP application.
Web client
C
What is the de facto protocol suite of the Internet? A netBEUI B IPX/SPx C TCP/IP D UNIX
B
What is the default subnet mask for a class C network? A 255.0.0.0 B 255.255.255.0 C 255.255.0.0 D 255.255.255.255
1500 bytes of data
What is the length of the typical frame?
C
What is the length of the typical frame? A. 150 bytes of data B 1024 bytes of data C 1500 bytes of data D 48 bytes of data
1024
What is the limit to the number of nodes in every version of Ethernet?
A
What is the maximum cable length for a 1000BaseT network? A 100 meters B 200 meters C 400 meters D 2000 meters
100 meters
What is the maximum distance between a hub and a node on a 10BaseT network?
B
What is the maximum distance between a hub and a node on a 10BaseT network? A 2.5 meters B 100 meters C 50 meters D 500 meters
90
What is the maximum length for UTP cables allowed by the TIA/EIA 568 cabling specification?
D
What is the maximum number of hops allowed by RIP? A 4 B 8 C 12 D 15
C
What is the maximum number of host you may have on a network if the first decimal value of the ip address is between 192 and 223 and the subnet mask is /24? A 16.7 million B 65,546 C 254 D 64
1024
What is the maximum number of nodes that can be attached to a 10BaseT segment or hub?
D
What is the minimum category rating of UTP cabling you would need for a network that runs at 1000 Mbps? A. CAT1 B CAT2 C CAT5 D CAT5e
64 bytes
What is the minimum size of an Ethernet frame?
C
What is the name of the proprietary cable designed by Cisco for connecting to their routers? A Port B Parallel C Yost D Crossover
IP Address
What is the network layer unique identifier assigned to each device on a TCP/IP network?
4
What is the norm today for the number of pairs in UTP cabling?
B
What is the norm today for the number of pairs in UTP cabling? A 2 B 4 C 25 D 8
A
What is the one protocol used on the internet for communication between Autonomous Systems? A border gateway Protocol (BGP-4) B Open Shortest Path First (OSPF) C Overloaded NAT D RIPv2
D
What is the protocol developed by Cisco for enterprise-wide routing environments? A RIP B OSPF C BGP D EIGRP
C
What is the purpose of a crimper? A to attach the RJ-45 connector to the NIC B to connect a NIC to a hub C to connect a RJ-45 connector to the cable D to install a NIC in a PC
B
What is the range of decimal values in each of the four groups of an IPv4 address? A 1 to 256 B 0 to 255 C 1 to 1024 D 0 to 1023
C
What is the range of numbers normally used for ephemeral ports? A 0-255 B 0-1023 C 1024-5000 D 0.0.0.0-255.255.255.255
1.75 inches
What is the size of a U, the equipment rack unit of measure, used for specifying height?
A
What is the term used for the passage of a packet through a router? A hop B gateway C jump D metric
C
What kind of cable is described as a central conductor wire, surrounded by insulating materials, placed inside a braided metal shield? A unshielded twisted pair B shielded twisted pair C coaxial D fiber-optic
A
What layer of the OSI model refers to the code built into operating systems that enables network- aware applications? A. application B.Transport C.Session D.Presentation
Frame Type
What must match in the communications between all NICs on a network?
D
What network component is built into most PCs today? A Switch B router C Patch Panel D NIC
D
What network protocol do Linux and Apple (Macintosh) systems most commonly use today? A AppleTalk B NetBIOS/NetBEUI C IPX/SPX D TCP/IP
B
What oragnization provides a vvariety of industry wide cabling standards, such as those for serial, parallel, and FireWire? A IBM B IEEE C ISO D ARPA
D
What protocol (including version number) was adopted in 1994, and is now considered obsolete execept for small, private WANS A Border Gateway Protocol (BGP-4) B Open Shortest path first (OSPF) C Overloaded NAT D RIPv2
C B
What task(s) should you perform as soon as you finish configuring a router? Select all the correct answers in alphabetical order. A TRACEROUTE B Backup C Document D Turn on dynamic routing
Horizontal cabling
What term is used for the cabling that runs from the telecommunications room to the PCs?
C
What type of connector is used by all UTP Ethernet NICS A SC B RJ-11 C RJ-45 D ST
RJ-45
What type of connector is used by all UTP Ethernet NICs?
Multimode with ST or SC connectors
What type of fiber-optic cabling and connectors does a 100BaseFX network use?
1000BaseLX
What version of Gigabit Ethernet is being positioned as the Ethernet backbone of the future?
A
Which of the following statements about subnet masks is not true? A A 0 on the subnet mask indicates part of the network ID B All machines on the same network have the same subnet mask C the subnet mask can be expressed either in a dotted decimal or in the /x notation ( EX: 192.168.14.3 /24) D The subnet mask is the same length as the IP address
B
Which of the following statements best describes an IP address? A. It is a unique identifier burned into the NIC when it is manufactured B. It is a unique dotted decimal number assigned to ever network node C. It is a number shared by all computers on the same network D. It is a number assigned only to routes, identifying their priority ratings
It includes 64 bits of alternating ones and zeroes that ends with 11 to notify the receiving NIC that a frame is starting
Which of the following statements best describes the preamble of an Ethernet frame?
B
Which of the following subnet masks is an example of classless subnetting? A /8 B /12 C /16 D /24
It is more inexpensive, but is easier to install than the other 100 Mbps standards
Which of the following would NOT be a reason for an organization to use 100BaseFX Ethernet?
B
Which of the following would be a valid Area ID? A 192.168.30.4 B 0.0.0.0 C 192.168.30.0/24 D 1.33457
A
Which of these routing protocols is the oldest? A RIP B OSPF C BGP D IGRP
The frames are received by every NIC, but only the NIC with the matching MAC address processes the frame
Which statement best describes what happens to frames when the hub sends them to the NICs on the network?
UTP has a category rating
Which statement is true about Category ratings for cables?
B
Which statement is true about Category ratings for cables? A only cables used for networking receive a category rating B UTP has a category rating C Only STP has a category rating D only coaxial has a category rating
C
Which type of NAT is the most popular? A Source NAT B Static NAT C Overload NAT D Destination NAT
UTP
Which type of cabling does the 10BaseT standard specify?
D
Which type of cabling does the 10BaseT standard specify? A coaxial B fiber-optic C STP D UTP
A
Who assigns Autonomous System Numbers (ASNs)? A IANA B IETF C Autonomous System Administrator D Network Administrator
D
Who assigns area IDs A IANA B IETF C Autonomous System Administrator D Network Administrators
This encryption standard uses a 128-bit block cipher that is more difficult to crack than the 128-bit TKIP wrapper of the previous standard.
Wi-Fi Protected Access 2 (WPA2)
Which of the following installations of Windows can be used to create a HomeGroup?
Windows 7 Home Premium
Which of the following is a common example of an operating system designed for peer-to-peer networking?
Windows 98
What is the Windows Vista built-in spyware protection function called?
Windows Defender
You have been contracted to set up a network for a small business. The company currently has 100 users, and they are looking to expand. They want to use Microsoft Exchange Server for their e-mail and shared calendar feature What version of Windows Server would you suggest that they purchase?
Windows Essential Business Server
How do you renew a DHCP address on Windows, Mac, and Linux?
Windows: IPCONFIG renew ("ipconfig /renew"); Linux/Mac: IFCONFIG renew ("sudo ifconfig eth0 up")
This data encryption standard is the weakest of the wireless encryption standards, with many problems, including encryption that is easy to break; it only encrypts the Data Link and Physical layers, the key is static and shared, and there is no mechanism for performing user authentication.
Wired Equivalent Privacy (WEP)
Device Manager
With Windows, what can you use to verify that Windows recognizes a NIC and is ready to use it?
Does the Internet run on TCP/IP?
Yes
What is the name of the proprietary cable designed by Cisco for connecting to their routers?
Yost
Router
You can connect two very different networks by using ______.
Which of the following statements is true about Network+ certification?
You must pay a fee and sit for the test.
Why would you need to use a repeater?
You need to add a group of computers to your network, and the distance is too far for normal means of communication.
Why is it necessary to have a disposal and destruction of computer equipment policy?
You should have a disposal and destruction policy for computer equipment so that when equipment is decommissioned that the information on the components cannot compromise the security of the network and the organization.
Which file requires manual updates if Dynamic DNS is not used?
Zone files
What are you trying to discover when you test a cable for continuity?
a broken wire
What do wireless nodes in an IBSS use in place of the BSSID value in each packet?
a randomly generated value
While not malware, strictly speaking, this type of program monitors the types of Web sites you frequent and uses that information to create targeted advertisements, often pop-up windows.
adware
This type of device accepts something of the user, such as a fingerprint, retina scan, or voiceprint in place of a password.
biometric devices
Which of the following is a term that describes a log of performance and other indicators taken of a network and its server during normal operations?
baseline
can be divided in up to four primary partitions
basic disk
Which of the following describes exactly what a user can and cannot do with the organization's computers and network?
acceptable use policy
One job that a router performs is that of gatekeeper, which means that it can be configured to only allow certain packets access into the network based on a list of rules. What is that process called?
access control
Which of the following are not contained in a UDP Header?
ack number
When a wireless computer uses a peer-to-peer connection to directly connect to another wireless computer, it is operating in what mode?
ad hoc
What method of extending a wireless network creates an Extended Service Set?
adding a WAP
What is an example of classless subnetting?
anything with a wap/IP Network Prefix other than a multiple of 8 (ex. "/12")
This log records events related to a program, including starts, stops, and failures.
application
Which of the following commands displays lines that include both the IP address and MAC address of the target system?
arping
Which type of algorithm is used when two different keys are used in encryption?
asymmetric-key
When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the point where the receiving station can no longer interpret the signals correctly. What is the term for this phenomenon?
attenuation
What is a policy that defines the methods involved when a user logs on to the network called?
authentication
identifying who has access to network
authentication
Which of the following terms describes what rights, privileges, permissions, and actions a person has or can take with respect to a resource or system?
authorization
the process of granting or denying access to a user
authorization
Fiber optic cabling is often used as the ____________ for networks.
backbone
Compatibility issues stemming from newer equipment or applications when integrated with older or legacy ones are called:
backward compatibility
This nonrepudiation tool contains the digital signature of a third party guaranteeing the identity of the person who is passing out this digital tool.
certificate
When a file is encrypted, what color does the file name appear in Windows Explorer?
green
When monitoring a computer using Performance Monitor, you must add __________ to display real-time data on the line graph.
counters
War _____________ is the process of marking buildings, curbs, and other landmarks indicating the presence of an available access point and its connection details by utilizing a set of symbols and shorthand.
chalking
All of the following are considered good troubleshooting steps EXCEPT:
change multiple factors at once
Which of the following is used to describe a portion of available spectrum?
channel
Which settings should be modified when you have overlapping Wi-Fi signals?
channel and frequency
A wire map test checks for wiring errors and __________ faults.
cable
Which of the following is a tool that you can use to make UTP cables?
cable stripper
Which of the following is a tool that can tell you if there's a continuity problem or if a wire map isn't correct?
cable tester
What kind of DNS server has no responsibility for giving the names of its clients to other DNS servers?
cache-only server
This term applies to the process of storing data that someone asks for in the hope that someone else will ask for it again.
caching
What would an Asynchronous Transfer Mode (ATM) network be best suited for?
carrying voice data and time-sensitive information
In Linux, what is the command for viewing a file's contents onscreen?
cat
A clever administrator organizes users into this type of account.
group
What is the term used to explain what happens when packets are sent out on a network by two devices simultaneously, corrupting both packets?
collision
What events, characteristic to an Ethernet network using hubs, does using an Ethernet switch minimize or avoid?
collisions
What is the default status of IPv6 for Windows Server 2008?
complete support; active on default install
Which of the following is not a requirement for most small business networks?
complex WAN environment
_____________ cable has the best wiring value and expansion capability.
composite
What is the most common use of coaxial cable in networking today?
connecting a cable modem to an Internet Service Provider (ISP)
The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what?
convergence
Older OSs first used what type of multitasking, which allowed a process to monopolize the CPU's time until the process had completed its own task?
cooperative
Assigning permissions to this type of account makes keeping track of assigned permissions much easier.
group
This term describes an unauthorized person who is intentionally trying to access resources on your network.
hacker
copies all files changed the day the backup is made; doesn't mark files as backed up
daily backup
In spite of all attempts to protect networks, systems do fail, and when you rebuild a new system, you must have a recent one of these in order to get back up and running.
data backup
What is the main advantage of a point-to-point topology?
data travels on a dedicated link
The entrance facility is the place where the connection to a WAN is located. It is basically the point where the LAN begins and ends. What is another name for this point?
demarcation point
You position this lightly protected network between your firewall and the Internet, while your intranet is secure behind the firewall.
demilitarized zone
if the primary server fails, the secondary server takes over
failover cluster
Data backup, UPSes, backup generators, and redundant hardware all provide some form of this.
fault tolerance
Part of SONET's flexibility comes from its ability to be arranged in several different physical topologies. Which of the following is NOT a possible SONET topology?
fault tolerant bus
If a user is a member of more than one group, then the permissions to a single resource assigned to the different groups are combined. What is the term used to describe the resulting permissions.
effective
Minimize sharp bends in the cable, which can distort the _____________ characteristics of the cable.
electrical
When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called?
encapsulation
Which of the following is a compatibility issue with wireless networking?
encryption
In a NAT router, what is the name for an arbitrary number generated by the sending computer?
ephemeral port
What is the status of a port that is part of an active working endpoint pair?
established port
can only be divided into logical drives
extended partition
Security on a WLAN is accomplished by _______________ the MAC addresses of wireless NICs that are allowed to use the access point and by encrypting data sent over the wireless LAN.
filtering
This is a network's first line of defense against external threats.
firewall
An IP address consists of four octets separated by periods. Which part of this address denotes its class?
first octet
On an authoritative DNS server, what are the storage areas called that hold the IP addresses and names of systems for a particular domain or domains?
forward lookup zones
a point-to-point permanent virtual circuit (PVC) technology that offers WAN communications over a fast, reliable, digital packet-switching network
frame relay
Where do IPv6 addresses other than link-local get their subnet masks?
from their routers
a backup that copies all selected files to the selected media and marks files as backed up; also called a normal backup
full backup
NICs send and receive binary data as pulses of all of the following EXCEPT ___________.
gamma rays
Local connections do not use this, although every routing table has a column for it, and therefore, a value appears in this field for each route.
gateway
VPN connection between two routers
gateway-to-gateway
You are creating a new group for the Sales department. All of the users that will be in this group will need to have access to the same resources. What scope would you use for this group?
global
What term describes a practical application of a topology and other critical technologies that provide a method to get data from one computer to another on a network?
network technology
Hybrid topology
networks use more than one type of basic network topology.
When subnetting, will you always come out with the exact number you need?
no
When a collision occurs on a network relying on the CSMA/CD access method, what alerts the NICs?
nonstandard voltage
A junior network administrator tells you that he can ping a DNS server successfully, but he has not tested domain name lookups. What utility on the command line would you suggest your colleague use next?
nslookup
What is a network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS)?
nslookup
What program, available with Windows (except 9x), Linux, and NetWare, provides all types of information from a DNS server and allows you to change how your system uses DNS?
nslookup
Which of the following commands can you use to diagnose DNS problems on a Windows computer?
nslookup
Which of the following is a system component that can be measured in Windows Performance Monitor?
object
Category
of a cable will determine its speed.
D
of the following, which is fastest of UTP cabling? A. CAT5 B. CAT3 C. CAT5e D CAT6
a program that is loaded into memory
process
What is the name for the number used by the operating system to track all running programs?
process ID (PID)
Which of the following appear in the output from the netstat command when the command is run without switches?
proto, foreign address, local address, & state
Which of the following is not a function typically provided by the centralized management of a server-based network?
protocol analysis
A good one of these will give you Application, Session, Transport, Network, and Data Link layer information from every frame traveling through your network.
protocol analyzer
What kind of software would you use to view and troubleshoot protocol specific problems such as TCP retries caused by missed acknowledgements, or duplicate acknowledgements that cause network slow-down?
protocol analyzer
TCP/IP
provides an excellent tool for conceptualizing how a TCP/IP network works.
Which of the following is NOT an advantage of a physical star?
provides redundancy and fault tolerance
Network Interface Card (NIC)
provides the physical connection between the PC and the network.
What is the most popular form of e-mail encryption?
public-key cryptography
In event forwarding, under normal settings, the collecting computer uses a __________ method to obtain events from a source computer.
pull
Which of the following is a tool that positions UTP wires into a 66- or 110-block?
punchdown tool
You use the wecutil __________ command to enable and configure the Windows Event Collector service on a collecting computer.
qc
You use the winrm __________ command to enable and configure the Windows Remote Management service on a source computer.
quickconfig
Which of the following is not a form of electromagnetic interference, or EMI?
rain/fog
List four physical cable tests you can perform using a cable testing device.
• Locating miswired cables • Locating missing cables • Locating cables that don't support your network type (for example, 100 Base-T) • Testing hub connections • Testing PC connections • Testing installed cables • Testing patch cables • Locating and tracing inactive cables
Compare one-, two-, and three-factor authentication.
• One-factor authentication typically uses just something you know-a username and password. • Two-factor authentication adds something you have or something you are—the username and password are combined with a token or a biometric reading. • Three-factor authentication combines something you know, something you have, and something you are—typically a username and password, a token, and a biometric reading.