5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which two devices are commonly powered by PoE? (Choose two.) access point core switch IP phone modular switch router

access point, IP phone

What is the correct order of the layers of the TCP/IP model from the top layer to the bottom? application, session, network, data link, physical application, internet, network access, transport network access, transport, internet, application application, transport, internet, network access

application, transport, internet, network access

When would a printer be considered a network host?

when it is connected to a switch

Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz ranges? 802.11n 802.11g 802.11b 802.11a

802.11n

Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.) 802.11n 802.11ac 802.11g 802.11a 802.11b

802.11n 802.11g 802.11b

Which technology is most often used to connect devices to a PAN?

Bluetooth

What are two common media used in networks? (Choose two.) copper nylon water fiber wood

Copper fiber

Which network service automatically assigns IP addresses to devices on the network? Select one: traceroute DNS DHCP Telnet Feedback

DHCP

A client packet is received by a server. The packet has a destination port number of 53. What service application is the client requesting? DNS NetBIOS (NetBT) POP3 IMAP

DNS

A user needs to access the Internet from home. Which device is needed if a user connects to an ISP through the telephone network? switch server DSL modem wireless access point

DSL modem

A client packet is received by a server. The packet has a destination port number of 21. What service application is the client requesting? FTP LDAP SLP SNMP

FTP

A client packet is received by a server. The packet has a destination port number of 389. What service application is the client requesting? LDAP SMB/CIFS HTTPS SLP

LDAP

A client packet is received by a server. The packet has a destination port number of 389. What service application is the client requesting? POP3 HTTP LDAP NetBIOS (NetBT)

LDAP

A client packet is received by a server. The packet has a destination port number of 137. What service application is the client requesting? SMB/CIFS HTTPS NetBIOS (NetBT) SLP

NetBIOS (NetBT)

Which two types of signal interference are reduced more by STP than by UTP? (Choose two.) RFI white noise MDF dispersion EMI

RFI, EMI

A client packet is received by a server. The packet has a destination port number of 161. What service application is the client requesting? SNMP SMB/CIFS HTTPS SLP

SNMP

A client packet is received by a server. The packet has a destination port number of 22. What service application is the client requesting? SMB/CIFS SSH HTTPS SLP

SSH

Which device provides wireless connectivity to users as its primary function? switch router access point modem

access point

Which well-known port number is used by the DHCP (client) protocol? 67 68 20 80 53

68

How many devices can a Bluetooth device connect to simultaneously?

7

A technician has captured packets on a network that has been running slowly when accessing the internet. Which port number should the technician look for within the captured material to locate HTTP packets? 20 21 53 110 80

80

Which technology uses existing electrical wiring to connect devices to a network? Select one: 802.11 Ethernet over Power Z-Wave IPS

Ethernet over Power

Which security technology is used to passively monitor network traffic with the objective of detecting a possible attack? IPS IDS proxy server firewall

IDS

A client packet is received by a server. The packet has a destination port number of 143. What service application is the client requesting? SMB/CIFS HTTPS SLP IMAP

IMAP

A technician is searching through a storage locker and finds a cable modem. What is the purpose of this device? It is placed between two or more networks and protects data and equipment from unauthorized access. It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services. It connects a home or business network to a company that provides internet connectivity as well as television signals. It connects networks and forwards traffic to remote networks by using IP addressing information.

It connects a home or business network to a company that provides internet connectivity as well as television signals.

A technician is searching through a storage locker and finds a managed switch. What is the purpose of this device? It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services. It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals. It connects multiple end devices and can be configured for VLANs and port security. It is placed between two or more networks and protects data and equipment from unauthorized access.

It connects multiple end devices and can be configured for VLANs and port security.

What is a characteristic of a WAN? It connects multiple networks that are geographically separated. It spans across a campus or city to enable sharing of regional resources. It is typically owned and managed by a single home or business. It requires a wireless access point to connect users to the network.

It connects multiple networks that are geographically separated.

A technician is searching through a storage locker and finds a router. What is the purpose of this device? It connects networks and forwards traffic to remote networks by using IP addressing information. It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services. It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals. It is placed between two or more networks and protects data and equipment from unauthorized access.

It connects networks and forwards traffic to remote networks by using IP addressing information.

A technician is searching through a storage locker and finds a DSL modem. What is the purpose of this device? It connects the network of a user to the digital infrastructure of a phone company, providing always-on service. It is placed between two or more networks and protects data and equipment from unauthorized access. It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services. It connects networks and forwards traffic to remote networks by using IP addressing information.

It connects the network of a user to the digital infrastructure of a phone company, providing always-on service.

A technician is searching through a storage locker and finds a cloud-based network controller. What is the purpose of this device? It is a device that allows a network administrator to manage many remote networking devices from a central location. It transfers small amounts of DC current over Ethernet cables to power low voltage devices such as wireless access points and surveillance cameras. It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals. It is a device that can be inserted in the middle of a cable run to add power.

It is a device that allows a network administrator to manage many remote networking devices from a central location.

A technician is searching through a storage locker and finds a PoE injector. What is the purpose of this device? It is a device that can be inserted in the middle of a cable run to add power. It is a device that allows a network administrator to manage many remote networking devices from a central location. It connects the network of a user to the digital infrastructure of a phone company, providing always-on service. It connects a home or business network to a company that provides internet connectivity as well as television signals.

It is a device that can be inserted in the middle of a cable run to add power.

A technician is searching through a storage locker and finds a Powerline networking connector. What is the purpose of this device? It is a device that uses existing electrical wiring to connect devices and sends data using specific frequencies. It is placed between two or more networks and protects data and equipment from unauthorized access. It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services. It connects networks and forwards traffic to remote networks by using IP addressing information.

It is a device that uses existing electrical wiring to connect devices and sends data using specific frequencies.

A technician is searching through a storage locker and finds an unmanaged switch. What is the purpose of this device? It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services. It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals. It is placed between two or more networks and protects data and equipment from unauthorized access. It is a device whose sole purpose is to connect end devices and to microsegment a LAN.

It is a device whose sole purpose is to connect end devices and to microsegment a LAN.

A technician is searching through a storage locker and finds a Cisco ASA 5505-X (UTM). What is the purpose of this device? It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services. It connects a home or business network to a company that provides internet connectivity as well as television signals. It is a device that uses existing electrical wiring to connect devices and sends data using specific frequencies. It is a device that can be inserted in the middle of a cable run to add power.

It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services.

A technician is searching through a storage locker and finds an Ethernet NIC. What is the purpose of this device? It connects a home or business network to a company that provides internet connectivity as well as television signals. It is a device that uses existing electrical wiring to connect devices and sends data using specific frequencies. It is a device that can be inserted in the middle of a cable run to add power. It is needed to connect a computer to a wired local-area network.

It is needed to connect a computer to a wired local-area network.

A technician is searching through a storage locker and finds a firewall. What is the purpose of this device? It is placed between two or more networks and protects data and equipment from unauthorized access. It is a device that can be inserted in the middle of a cable run to add power. It transfers small amounts of DC current over Ethernet cables to power low voltage devices such as wireless access points and surveillance cameras. It is a device that uses existing electrical wiring to connect devices and sends data using specific frequencies.

It is placed between two or more networks and protects data and equipment from unauthorized access.

A technician is searching through a storage locker and finds a patch panel. What is the purpose of this device? It is a device that can be inserted in the middle of a cable run to add power. It is a device that uses existing electrical wiring to connect devices and sends data using specific frequencies. It connects a home or business network to a company that provides internet connectivity as well as television signals. It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals.

It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals.

A technician is searching through a storage locker and finds an access point. What is the purpose of this device? It is an all-in-one security appliance that includes IDS/IPS functionality as well as stateful firewall services. It provides a wired or wireless connection between end devices, switches, and routers and in some cases, can regenerate weak signals. It uses radio waves to provide network access to wireless devices. It is placed between two or more networks and protects data and equipment from unauthorized access.

It uses radio waves to provide network access to wireless devices.

Which type of network will extend a short distance and connects printers, mice, and keyboards to an individual host? PAN LAN MAN WLAN

PAN

Which device acts as a termination point for cable runs and keeps cables secure and safely out of walkways? Patch Panel UTM KVM Switch Access Point

Patch Panel

What type of connector is used to connect an analog modem to a telephone line socket? ST RJ-11 RJ-45 BNC

RJ-11

A client packet is received by a server. The packet has a destination port number of 25. What service application is the client requesting? SMB/CIFS SMTP HTTPS SLP

SMTP

A technician has been asked to assist with some LAN cabling. What are two standards that the technician should research before this project begins? (Choose two.) Select one or more: 802.11n 802.11c Z-Wave T568B Zigbee T568A

T568B T568A

Which two protocols operate at the transport layer of the TCP/IP model? (Choose two.) Select one or more: FTP ICMP TCP UDP IP

TCP UDP

A client packet is received by a server. The packet has a destination port number of 23. What service application is the client requesting?

Telnet

A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows? The data flow is being tracked based on the destination MAC address of the technician PC. The data flow is being tracked based on the source port number that is used by each application. The data flow is being tracked based on the source IP address that is used by the PC of the technician. The data flow is being tracked based on the destination IP address that is used by the PC of the technician.

The data flow is being tracked based on the source port number that is used by each application.

Which network device would be the most appropriate to provide stateful packet filtering, email filtering, and VPN services? router endpoint management server proxy server UTM TPM

UTM

A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this scenario? LAN MAN WAN WLAN

WAN

Which smart home wireless technology has an open standard that allows up to 232 devices to be connected? 802.11ac 802.11n Z-Wave Zigbee

Z-Wave

Which smart home technology requires the use of a device, known as a coordinator, to create a wireless PAN? 802.11ac 802.11n Zigbee Z-Wave

Zigbee

Which network device allows administrators to remotely manage many devices through one dashboard interface? cloud-based network controller Power over Ethernet switch that supports VLANs powerline networking

cloud-based network controller

Which type of server would support the SMTP, POP, and IMAP protocols?

email

Which type of connection to the Internet is capable of the fastest transfer rates? ISDN POTS satellite cable fiber

fiber

A network specialist has been hired to install a network in a company that assembles airplane engines. Because of the nature of the business, the area is highly affected by electromagnetic interference. Which type of network media should be recommended so that the data communication will not be affected by EMI?

fiber optic

Which pairs of wires change termination order between the 568A and 568B standards? green and orange green and brown blue and brown brown and orange

green and orange

Which network device regenerates the data signal without segmenting the network? router modem switch hub

hub

Which internet connection type is an always-on service that uses radio signals sent from a tower to a receiver in a home or business? satellite hotspot cellular line of sight wireless

line of sight wireless

Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame? repeater hub switch router

switch

A customer is considering a multipurpose device to create a home network. Which three devices are usually integrated into a multipurpose network device? (Choose three.) web server switch router email server wireless access point print server

switch router wireless access point

Which type of server would be used to keep a historical record of messages from monitored network devices? DHCP DNS print authentication syslog

syslog

What is a feature of a dial-up connection? the use of multiple channels which can carry different types of services the use of different frequencies to carry voice and data signals on the copper telephone wire the use of an analog modem to transmit data over voice telephone lines the use of different frequencies to send multiple signals over the same medium

the use of an analog modem to transmit data over voice telephone lines

What is a common function of a proxy server? to store frequently accessed web pages on the internal network to control who is permitted to access the internal network to detect malicious signatures by monitoring traffic that is entering the internal network to provide access to a shared pool of configurable computing resources

to store frequently accessed web pages on the internal network


Ensembles d'études connexes

Chapter 15 State building and search for order

View Set

Excel Chapter 1: End-of-Chapter Quiz

View Set

Nursing Care of the Child With an Alteration in Tissue Integrity/Integumentary Disorder

View Set

ECON 11 (THEORY OF CONSUMER BEHAVIOR)

View Set

Ch 10 abnormal, ch 9 abnormal, ch 8 abnormal

View Set

Phlebotomy: Chapter 17 Self Study

View Set