Chapter 2 - NETWORKING

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are troubleshooting a computer with an IPv6 address that is in the FE80::/10 range. Which of the following statements are true? (Choose two.) A. The computer will not be able to get on the Internet. B. The computer will be able to get on the Internet. C. The computer is configured with a link local unicast address. D. The computer is configured with a global unicast address.

A, C. Addresses in the FE80::/10 range are link local unicast addresses. A link local address is assigned to each IPv6 interface but is not routable on the Internet. If this is the only address the host has, it will not be able to get on the Internet.

For IPv6, which of the following statements are not true? (Choose two.) A. Each IPv6 interface can have only one address. B. Each IPv6 interface is required to have a link local address. C. IPv6 addresses are incompatible with IPv4 networks. D. IPv6 no longer uses broadcasts.

A, C. Each IPv6 interface can and often does have multiple addresses assigned to it. IPv6 is backward compatible with IPv4.

You have been asked to design a new network that requires 10Gbps transmission speeds. Which cable types will meet the minimum specifications? (Choose two.) A. MMF B. CAT5 C. CAT5e D. CAT7

A, D. Multimode fiber and UTP CAT6 and newer support 10Gbps transmission speeds.

Which of the following shorthand notations corresponds to the CIDR subnet mask 255.255.224.0? A. /19 B. /20 C. /21 D. /22

A. A subnet mask of 255.255.224.0 has eight bits in each of the first two octets set to on, and it has three bits in the third octet on. Therefore, it corresponds to /19 in shorthand.

You are installing network cable that will support digital cable television signals. What type of cable should you install? A. RG-6 B. RG-8 C. RG-58 A/U D. RG-59

A. Cable television installations typically use either RG-6 or RG-59 cable. RG-6 is slightly thicker, can run longer distances, and supports digital signals. RG-59 is suited only for analog TV signals.

You are installing a fiber-optic cable between two buildings. To install the cable, you must run it through a conduit between the buildings, and access to the conduit is not easy. Before you run the cable, you want to ensure it's working properly. Which tool should you use? A. Cable tester B. Multimeter C. Loopback plug D. Tone generator and probe

A. Cable testers are indispensable tools for any network technician. Usually you would use a cable tester before you install a cable to make sure it works. Of course, you can test them after they've been run as well.

Which TCP/IP protocol was developed by Microsoft and has been the default file and print sharing protocol on Windows-based computers since Windows 2000? A. CIFS B. SMB C. FTP D. LDAP

A. Common Internet File System (CIFS) is a Microsoft-developed enhancement of the SMB protocol, which was also developed by Microsoft. The intent behind CIFS is that it can be used to share files and printers between computers, regardless of the operating system that they run. It's been the default file and print sharing protocol on Windows-based computers since Windows 2000.

Which TCP/IP protocol, developed by Microsoft, allows users to connect to remote computers and run programs on them? A. RDP B. SMB C. CIFS D. Telnet

A. Developed by Microsoft, the Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. When you use RDP, you see the desktop of the computer you've signed into on your screen. It's like you're really there, even though you're not.

You are setting up a small network in your neighbor's house. She is concerned about wireless security, so she doesn't want to use wireless networking at all. She needs to connect two computers to each other, but it will be impossible to run a network cable between them. Which technology can help her network these computers? A. Ethernet over Power B. Power over Ethernet C. Firewall D. Access point

A. Ethernet over power can make Ethernet connections by using electrical outlets. For it to work, both devices must be on the same electrical circuit.

You are replacing a connector at the end of coaxial cable. What type of connector is threaded and screws into place? A. F-connector B. BNC C. SC D. ST

A. F-connectors are threaded and screw into place. The BNC connector locks by twisting one-quarter turn. SC and ST connectors are for fiber-optic cable.

You are installing network cabling in a highly secure facility. The cables need to be immune to electronic eavesdropping. What type of cable should you use? A. Fiber-optic B. UTP C. STP D. Coaxial

A. Fiber-optic cabling uses pulses of light instead of electric voltages to transmit data, so it is immune to electrical interference and to wiretapping.

You are installing UTP network cable for a client. The client's policies require that network cables do not produce poisonous gas when burned. What type of cable do you need to install? A. Plenum B. PVC C. STP D. CAT5e or higher

A. Most network cables are coated with a plastic PVC coating, which produces toxic gas when burned. Plenum-rated cables are coated with a Teflon-like material that is not poisonous when burned.

You are configuring a wireless 802.11n router for a small network. When setting it up, which security option should you choose? A. WPA2 B. WPA C. WEP D. SSID

A. Of the wireless encryption methods listed, WPA2 is the newest and most secure. Some routers offer WPA2 Enterprise, which is a great choice as well.

Which of the following IP addresses is not routable on the Internet? A. 10.1.1.1 B. 11.1.1.1 C. 12.1.1.1 D. 13.1.1.1

A. Private IP addresses are not routable on the Internet. The private IP address range for class A networks is 10.0.0.0/8.

You are configuring a wireless 802.11n router. The office manager insists that you configure the router such that traffic from her computer receives higher priority on the network than other users' traffic. Which setting do you need to configure to enable this? A. QoS B. UPnP C. DMZ D. Port forwarding

A. Quality of Service (QoS) is a strategy that allows an administrator to control resources to maintain a certain service level. By using QoS, an administrator can set different priorities for one or more types of network traffic based on different applications, data flows, or users.

Which TCP/IP protocol is designed to send email from clients to mail servers? A. SMTP B. POP3 C. IMAP D. SMB

A. Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), and Internet Message Access Protocol (IMAP) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email.

Which TCP/IP protocol gathers and manages network performance information using devices called agents? A. SNMP B. SMTP C. LDAP D. SMB

A. Simple Network Management Protocol (SNMP) gathers and manages network performance information. A management device called an SNMP server can be set up to collect data from these devices (called agents) and ensure that your network is operating properly.

You are using your laptop on the company network. In your web browser, you type in www.google.com and press Enter. The computer will not find Google. You open the browser on your phone, and using your cellular connection, you can open Google without a problem. Your laptop finds internal servers and can print without any issues. What is the most likely reason you can't open Google? A. DNS server problem B. DHCP server problem C. Missing subnet mask D. Duplicate IP address

A. The Domain Name System (DNS) server is responsible for resolving host names, such as www.google.com, to IP addresses to enable communication. If it's not working properly or you can't connect to it, you won't be able to browse the Internet using friendly website names.

You have set up your web server to function as an FTP server as well. Users on the Internet complain that they are not able to access the server using FTP clients. What port number are they trying to access the server on? A. 21 B. 22 C. 23 D. 25 E. 80

A. The File Transfer Protocol (FTP) is optimized for downloading files from servers. It uses port 21.

You need to create several UTP cables from a roll of bulk cable. Your company uses the T568B standard. What is the correct order for wires in the connectors? A. White/orange, orange, white/green, blue, white/blue, green, white/brown, brown B. White/orange, orange, white/green, green, white/blue, blue, white/brown, brown C. White/orange, green, white/green, blue, white/blue, orange, white/brown, brown D. Orange, white/orange, white/green, blue, white/blue, green, white/brown, brown

A. The correct order for a T568B cable is white/orange, orange, white/green, blue, white/blue, green, white/brown, brown.

Which TCP/IP Internet layer protocol is responsible for delivering error messages if communication between two computers fails? A. ICMP B. IP C. TCP D. UDP

A. The main Internet layer protocol is Internet Protocol (IP), and it's the workhorse of TCP/IP. Another key protocol at this layer is Internet Control Message Protocol (ICMP), which is responsible for delivering error messages. If you're familiar with the ping utility, you'll know that it utilizes ICMP to send and receive packets.

Which of the following network architecture devices operate at Layer 1 of the OSI model? (Choose two.) A. Switch B. Hub C. Extender D. Router

B, C. A hub is a device used to link several computers together. Hubs are simple devices that possess no real intelligence, and they work at Layer 1 of the OSI model. Extenders simply allow a signal to propagate for a longer distance, and they also work at Layer 1. Switches are Layer 2 devices, and routers work at Layer 3.

Which of the following network connectivity devices operate at Layer 2 of the OSI model? (Choose two.) A. Hub B. Switch C. Bridge D. Router

B, C. Switches and bridges work at Layer 2. Switches are multiport bridges.

Which of the following IPv6 addresses is equivalent to 127.0.0.1 in IPv4? A. ::0 B. ::1 C. ::127 D. 2000::/3

B. 127.0.0.7 is the loopback address, used to ping the local network interface. The IPv6 equivalent is ::1.

What type of network covers large geographical areas and often supports thousands of users? A. LAN B. WAN C. PAN D. MAN

B. A wide area network (WAN) covers large geographical areas and often supports thousands of users.

A technician installed a UTP splitter on one of your network segments that has CAT6e cable. What is the maximum speed supported by this connection? A. 10Mbps B. 100Mbps C. 1Gbps D. 10Gbps

B. An Ethernet splitter will take the incoming signal on two pairs and then split it, so on the output end it produces two sets of signals using two pairs each. Because of this, Ethernet splitters are limited to 100Mbps connections. It is not recommended that you use Ethernet splitters on a network. If you need to connect multiple computers using UTP, use a hub or a switch.

Which of the following network devices receives network traffic and makes a decision on whether to send it on based on the destination hardware address? A. Hub B. Bridge C. Access point D. Repeater

B. Because bridges work at the Data Link layer, they are aware of only hardware (MAC) addresses. They are not aware of and do not deal with IP addresses. Bridges are more intelligent than repeaters, but they are unable to move data across multiple networks simultaneously.

While cleaning out a storage room, a technician finds several rolls of CAT5e network cable. He thinks that he might be able to use it to create replacement cables for his network. What is the maximum speed that this cable will support? A. 100Mbps B. 1Gbps C. 10Gbps D. 20Gbps

B. CAT5e cable can support speeds of 1Gbps. CAT5 has a maximum of 100Mbps. CAT6 and newer can support 10Gbps, but no UTP cabling can currently support 20Gbps.

You are installing UTP network cabling. The network has a mixture of network cards, but the minimum required speed is 100Mbps. What is the minimum grade of cable you can install to meet this requirement? A. CAT3 B. CAT5 C. CAT5e D. CAT6a

B. Cat 5 UTP can transmit data at speeds up to 100Mbps, for a distance of 100 meters.

Because of a recent security breach, your IT team shut down several ports on the external firewall. Now, users can't get to websites by using their URLs, but they can get there by using IP addresses. What port does the IT team need to open back up to enable Internet access via URLs? A. 21 B. 53 C. 67 D. 80

B. Clients are unable to get to the DNS server, which resolves host names (or URLs) to IP addresses. DNS uses port 53.

In IPv4, what is the function of the subnet mask? A. It tells hosts where to route packets. B. It differentiates between the network ID and host ID. C. It determines which subnet the host is on. D. It masks external networks from the host.

B. Computers are able to differentiate where the network ID ends and the host address begins through the use of a subnet mask.

Which TCP/IP protocol is responsible for dynamically assigning IP addresses to client computers? A. DNS B. DHCP C. RDP D. LDAP

B. Dynamic Host Configuration Protocol (DHCP) dynamically assigns IP addresses and other IP configuration information to network clients.

Which TCP/IP port number will an email client use to push email to its email server? A. 23 B. 25 C. 110 D. 143

B. Email is pushed from clients to servers using the Simple Mail Transfer Protocol (SMTP). SMTP uses port 25.

You have been asked to create a UTP crossover cable. Which pins need to be crossed over to make the cable work properly? A. 1 and 2, 3 and 6 B. 1 and 3, 2 and 6 C. 1 and 6, 2 and 3 D. None of the above

B. In a crossover cable, pin 1 to pin 3 and pin 2 to pin 6 are crossed on one side of the cable only. This is to get the "send" pins matched up with the "receive" pins on the other side, and vice versa.

A technician is configuring a wireless 802.11ac router for a home network. For security purposes, he enables the firewall. He wants to configure it so that if a computer makes an outbound request on a specific port, subsequent inbound traffic on that port would be allowed through the firewall. Which option does he need to configure to manage these settings? A. Port forwarding B. Port triggering C. NAT D. QoS

B. Port triggering allows traffic to enter the network on a specific port after a computer makes an outbound request on that specific port. For example, if a computer on your internal network makes an outbound Telnet request (port 23), subsequent inbound traffic destined for the originating computer on port 23 would be allowed through.

You need to install a wireless hub in a drop ceiling where there is no access to a power source. Which technology will allow you to get power to that device? A. Ethernet over Power B. Power over Ethernet C. Wireless access point D. Repeater/extender

B. Power over Ethernet (PoE) allows you to power an Ethernet device (such as a switch) through one of the Ethernet ports. For it to work, the access point and the device it plugs into both need to support PoE.

You have been asked to install a run of RG-59 cable from one end of a building to the other. What is the maximum distance for this type of cable run? A. 100 meters (328 feet) B. 228 meters (750 feet) C. 304 meters (1,000 feet) D. 500 meters (1,645 feet)

B. RG-59 network cable can run for about 228 meters (750 feet). The slightly thicker RG-6 can run for about 304 meters (1,000 feet).

Which one of the following TCP/IP protocols was designed as a replacement for Telnet? A. SMB B. SSH C. SFTP D. FTPS

B. Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. Because it's secure, it was originally designed to be a replacement for the unsecure telnet command.

What port number does the SSH protocol use? A. 21 B. 22 C. 23 D. 25

B. Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. SSH uses port 22.

Which networking device works at Layer 2 of the OSI model, has multiple ports in which each is its own collision domain, and examines the header of the incoming packet to determine which port it gets sent to? A. Hub B. Switch C. Bridge D. Router

B. Switches work at Layer 2 as do bridges, and they provide centralized connectivity just like hubs. Switches examine the Layer 2 header of the incoming packet and forward it properly to the right port and only that port. Switches are multiport bridges.

You have been asked to install a Wi-Fi network in a building that is approximately 100 meters long and 25 meters wide. Because of cost considerations, you will need to use 802.11g. At a minimum, how many wireless access points will you need? A. 2 B. 3 C. 4 D. 6

B. The 802.11g standard has an indoor range of approximately 40 meters. At a minimum, you will need three access points. Depending on coverage and indoor interference, such as thick walls, you might need more, though.

Which TCP/IP protocol was developed by Apple and used to transfer files between computers? A. FTP B. AFP C. ATP D. SMB

B. The Apple Filing Protocol (AFP) was developed by Apple as a file transfer protocol similar to FTP and Server Message Block (SMB). It was the default file transfer protocol on Mac OS until Apple changed to SMB2 in 2013.

Which type of coaxial cable connector locks by twisting the connector one-quarter turn? A. F-connector B. BNC C. SC D. ST

B. The BNC connector locks by twisting one-quarter turn. F-connectors are threaded and screw into place. SC and ST connectors are for fiber-optic cable.

You are configuring network hosts with static IP addresses. You have chosen to use a class B network address. What is the default subnet mask that you should configure on the hosts? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255

B. The default subnet mask for class B networks is 255.255.0.0, or written in shorthand, /16.

A technician is trying to establish a dial-up network connection using a legacy modem. What is the fastest data throughput for a modem? A. 28.8Kbps B. 56Kbps C. 1Mbps D. 4Mbps

B. The fastest modems produced had a data rate of 56Kbps. At the time, they were considered fast. Today, not so much.

You are configuring hosts on a network running IPv4. Which elements are required for the computer to connect to the network? A. IP address B. IP address and subnet mask C. IP address, subnet mask, and default gateway D. IP address, subnet mask, default gateway, and DNS server address

B. To communicate on an IPv4 network, a host must be configured with a valid IP address and a subnet mask. A default gateway is needed only if the host will connect to a remote network. DNS servers are optional but useful, because they resolve host names to IP addresses.

Which of the following TCP/IP protocols is connection oriented and attempts to guarantee packet delivery? A. IP B. TCP C. UDP D. ICMP

B. Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.

Which Wi-Fi encryption standard was the first to include the use of a 128-bit dynamic per-packet encryption key? A. WEP B. WPA C. WPA2 D. AES

B. Wi-Fi Protected Access (WPA) was the first Wi-Fi encryption standard to implement the use of the Temporal Key Integrity Protocol (TKIP). Whereas WEP used a static 40- or 128-bit key, TKIP uses a 128-bit dynamic per-packet key. It generates a new key for each packet sent.

Your network uses UTP cabling. Which of the following types of network connections require the use of a crossover cable? (Choose two.) A. Computer to hub B. Computer to switch C. Computer to router D. Switch to switch

C, D. If you are going to make a connection from hub to hub, switch to switch, hub to switch, or a computer directly to a router, you need a crossover cable. Otherwise, you need a regular patch cable.

You want to ensure that client computers can download email from external email servers, regardless of the protocol their email client uses. Which ports do you open on the firewall to enable this? (Choose two.) A. 23 B. 25 C. 110 D. 143

C, D. Simple Mail Transfer Protocol (SMTP, port 25), Post Office Protocol 3 (POP3, port 110), and Internet Message Access Protocol (IMAP, port 143) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email.

Which Wi-Fi standard specifies a maximum of 54Mbps transmissions in the 2.4GHz frequency range? A. 802.11a B. 802.11b C. 802.11g D. 802.11n

C. 802.11g specifies a maximum of 54Mbps transmissions in the 2.4GHz frequency range.

You are given a network configuration of 155.100.63.0/26 from your ISP. When you configure your network hosts, what subnet mask should you assign them? A. 255.255.0.0 B. 255.255.255.0 C. 255.255.255.192 D. 255.255.255.240

C. A CIDR shorthand notation of /26 corresponds to the subnet mask 255.255.255.192.

Which network device is designed to be a security guard, blocking malicious data from entering your network? A. PoE injector B. Bridge C. Firewall D. Router

C. A firewall is a hardware or software solution that serves as your network's security guard. Firewalls can protect you in two ways: they protect your network resources from hackers lurking in the dark corners of the Internet, and they can simultaneously prevent computers on your network from accessing undesirable content on the Internet.

You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to troubleshoot the network adapter? A. Multimeter B. Tone generator and probe C. Loopback plug D. Cable tester

C. A loopback plug is for testing the ability of a network adapter to send and receive. The plug gets plugged into the NIC, and then a loopback test is performed using troubleshooting software. You can then tell whether the card is working properly.

What type of network is most commonly associated with Bluetooth devices and covers a small area? A. LAN B. WAN C. PAN D. MAN

C. A personal area network (PAN) is a small-scale network designed around one person within a limited boundary area. The term generally refers to networks that use Bluetooth technology.

Which of the following Internet connection types offers the fastest download speeds? A. Cable B. DSL C. Fiber-optic D. ISDN

C. Fiber-optic broadband Internet offers fast speeds (often in the 1Gbps range) but is also the most expensive.

You are consulting with a small field office that needs a dedicated, digital point-to-point network connection to its parent office. Which Internet connection type will meet this requirement? A. Dial-up B. Cable C. DSL D. ISDN

D. Integrated Services Digital Network (ISDN) is a digital, point-to-point network capable of maximum transmission speeds of about 2Mbps, although speeds of 128Kbps are more common.

Which TCP/IP protocol, designed to download email, allows for multiple clients to be simultaneously connected to the same mailbox? A. SMTP B. POP3 C. IMAP D. SMB

C. Internet Message Access Protocol (IMAP) is a secure protocol designed to download email. It has several advantages over the older Post Office Protocol 3 (POP3). First, IMAP4 works in connected and disconnected modes. Second, it lets you store the email on the server, as opposed to POP3, which requires you to download it. Third, IMAP4 allows multiple clients to be simultaneously connected to the same inbox.

Some of your network users are concerned about submitting confidential information to an online website. What should you tell them? A. It's fine, because all Internet traffic is encrypted. B. If the website address starts with TLS://, it should be OK to submit confidential information to a trusted site. C. If the website address starts with HTTPS://, it should be OK to submit confidential information to a trusted site. D. Don't ever submit confidential information to any online website.

C. Internet traffic is not encrypted by default. Websites that are secure and encrypt their transmissions will start with HTTPS://rather than HTTP://. These sites can be trusted to encrypt the data, and their identity is verified.

You are troubleshooting an intermittently failing CAT7 network connection. You suspect that there is a short in the connection. Which tool can you use to determine this? A. Tone generator and probe B. Loopback plug C. Multimeter D. Crimper

C. Multimeters are versatile electronic measuring tools. A multimeter can measure voltage, current, and resistance on a wire.

You have reason to believe that several network users are actively browsing prohibited content on unsecured sites on the Internet. Which port can you disable on the firewall to immediately stop access to these web sites? A. 53 B. 67 C. 80 D. 443

C. Normal (unsecured) websites are accessed on port 80, which is the port that Hypertext Transfer Protocol (HTTP) uses. Shut it down, and no one will be able to access web sites, except secure sites that use HTTPS, which is on port 443.

A technician is going to set up a Wi-Fi network using standard omnidirectional antennae. Because of the building configuration, transmitting signals for the greatest distance is his primary criterion. Which standard should he choose? A. 802.11a B. 802.11g C. 802.11n D. 802.11ac

C. Of the Wi-Fi standards, 802.11n has the longest range by default, at roughly 70 meters indoors and 250 meters outdoors. 802.11ac is newer and faster than 802.11n, but it transmits exclusively in the 5GHz range, which restricts its functional distance.

Which Internet connection type, popular for home use, offers asymmetrical download and upload speeds and is implemented over common phone lines? A. POTS B. Cable C. DSL D. ISDN

C. One of the two most popular broadband choices for home use is Digital Subscriber Line (DSL). It utilizes existing phone lines and provides fairly reliable high-speed access. Most DSL subscriptions are asymmetrical, meaning they offer faster download speeds than upload speeds.

Which TCP/IP protocol is used to provide shared access to files and printers on the network? A. FTP B. SSH C. SMB D. SNMP

C. Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. In a way, it functions a bit like FTP only with a few more options, such as the ability to connect to printers, and more management commands.

Which TCP/IP protocol uses TCP ports 137-139 and 445 by default? A. FTP B. SSH C. SMB D. SNMP

C. Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. It uses TCP ports 137-139 and 445.

A technician needs to run a network cable to a remote building, which is approximately 15 kilometers from his base station. He's not sure if any cable will span that distance. What is the maximum distance of SMF cable? A. 300 meters B. 550 meters C. 40 kilometers D. 100 kilometers

C. Single-mode fiber (SMF) can provide data throughput rates of 10Gbps at a distance of 40 kilometers.

What port number does the Telnet protocol use? A. 21 B. 22 C. 23 D. 25

C. Telnet lets users log into another machine and "see" the remote computer in a window on their screen. Although this vision is text only, the user can manage files on that remote machine just as if they were logged in locally. Telnet uses port 23.

Which of the following IPv6 addresses is equivalent to an address in the 169.254.0.0/16 range in IPv4? A. 2000::/3 B. FC00::/7 C. FE80::/10 D. FF00::/8

C. The 169.254.0.0/16 range in IPv4 is the APIPA range, used for automatic configuration if the host can't locate a DHCP server. The same task in IPv6 is accomplished with a link local address in the FE80::/10 range.

Which of the following IP addresses is not a private address and therefore is routable on the Internet? A. 10.1.2.3 B. 172.18.31.54 C. 172.168.38.155 D. 192.168.38.155

C. The private IP address ranges are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. The address 172.168.38.155 is outside the private IP address range and is a public address.

Which type of IPv6 address identifies a single node on the network? A. Multicast B. Anycast C. Unicast D. Localcast

C. There are three types of addresses in IPv6: unicast, anycast, and multicast. A unicast address identifies a single node on the network. An anycast address refers to one that has been assigned to multiple nodes. A multicast address is one used by multiple hosts.

You are installing an 802.11n Wi-Fi network with five wireless access points. The access points are set up so their ranges overlap each other. To avoid communications issues, what principle should you follow when configuring them? A. Configure all access points to use the same channel. B. Configure all access points to use adjacent channels. C. Configure all access points to use non-overlapping channels. D. Channel configuration will not cause communications issues.

C. When setting up wireless access points, it's good practice to have their ranges overlap to ensure there is no loss of communication when roaming in the network's area. However, to avoid problems, it's best to set up the access points with nonoverlapping channels.

What type of network spans multiple buildings or offices but is confined to a relatively small geographical area? A. LAN B. WAN C. PAN D. MAN

D. Networks that are larger than a LAN but confined to a relatively small geographical area are metropolitan area networks (MANs). A MAN is generally defined as a network that spans a city or a large campus.

Your network is currently running a mix of 802.11b and 802.11g devices. At the end of the year, you have extra budget to upgrade some, but not all, of the wireless infrastructure. You want to upgrade to the newest technology but still maintain backward compatibility. Which standard should you choose? A. 802.11g B. 802.11ac C. 802.11r D. 802.11n

D. 802.11b/g transmit in the 2.4GHz frequency, as does 802.11n, so they are compatible. The newer 802.11ac is a 5GHz standard and therefore is not backward compatible with 802.11b/g. 802.11r is not a standard related to Wi-Fi speed and is not in the A+ test objectives.

You have just installed a wireless 802.11ac network for a client. The IT manager is concerned about competitors intercepting the wireless signal from outside the building. Which tool is designed to test how far your wireless signal travels? A. Tone generator and probe B. Protocol analyzer C. Packet sniffer D. Wi-Fi analyzer

D. A wireless locator or a Wi-Fi analyzer can be either a handheld hardware device or specialized software that is installed on a laptop and whose purpose is to detect and analyze Wi-Fi signals. It can detect where signals are strong or weak to determine whether there are potential security issues.

Which of the following statements regarding IPv4 configuration is true? A. All hosts on a network must have a unique subnet mask. B. All hosts on a network must have their network ID set to all 1s. C. All hosts on a network must have a default gateway. D. All hosts on a network must have a unique host address.

D. All hosts on a network must have a unique IP address. The subnet mask should be the same for all computers on a local network. The network ID can't be set to all 1s; otherwise, it replicates the subnet mask. Default gateways, or router address, are needed only if hosts will communicate with hosts outside their local network.

Which TCP/IP Internet layer protocol is responsible for resolving physical MAC addresses to logical IP addresses? A. IP B. ICMP C. ARP D. RARP

D. At the Internet layer of TCP/IP, Address Resolution Protocol (ARP) resolves logical IP addresses to physical MAC addresses built into network cards. Reverse ARP (RARP) resolves MAC addresses to IP addresses.

All of your network hosts are configured to use DHCP. Which IP address would indicate that a host has been unable to locate a DHCP server? A. 192.168.1.1 B. 10.1.1.1 C. 172.16.1.1 D. 169.254.1.1

D. Automatic Private IP Addressing (APIPA) is a TCP/IP standard used to configure automatically IP-based hosts that are unable to reach a DHCP server. APIPA addresses are in the 169.254.0.0/16 range. If you see a computer that has an IP address beginning with 169.254, you know that it has configured itself.

You are asked to perform consulting work for a mediumsized company that is having network connectivity issues. When you examine the patch panel, you notice that none of the dozens of UTP cables are labeled. Which tool can you use to identify which cable goes to which workstation? A. Cable tester B. Loopback plug C. Punchdown tool D. Tone generator and probe

D. If you need to trace a wire in a wall from one location to another, a tone generator and probe is the right tool to use. It consists of two pieces: a tone generator and a probe. To use it, attach one end to one end of the cable, such as the end at the computer. Then go to the patch panel with the other end of the probe to locate the cable. These are lifesavers when the cables are not properly labeled.

You are installing a new network and working in a wiring closet. You need to attach several network cables to a 110 block. Which tool should you use to perform this task? A. Crimper B. Cable stripper C. Cable tester D. Punchdown tool

D. If you're working on a larger network installation, you might use a punchdown tool. It's not a testing tool but one that allows you to connect (that is, punch down) the exposed ends of a wire into wiring harnesses, such as a 110 block.

Which network connectivity device does not forward broadcast messages, thereby creating multiple broadcast domains? A. Hub B. Switch C. Bridge D. Router

D. One of the key features of routers is that they break up broadcast domains. Broadcast traffic on one side of the router will not get passed to the other side, which greatly reduces network traffic.

You need to replace a faulty 250-foot section of RG-6 cable, but all you have available is RG-59. Which of the following statements is true? A. The replacement cable will not work because the distance exceeds RG-59 specifications. B. The replacement cable will not work because RG-6 and RG-59 use different connectors. C. The replacement cable will not work because RG-6 and RG-59 have different impedance. D. The replacement cable should work.

D. RG-6 and RG-59 can, in many cases, be used interchangeably. RG-6 is a better choice because it supports digital signals and has a longer range (304 meters or 1,000 feet). RG-59 can run up to 228 meters (750 feet). Both have impedance of 75 ohms, and both use BNC connectors or F-connectors.

Which networking device is capable of reading IP addresses and forwarding packets based on the destination IP address? A. Hub B. Switch C. Bridge D. Router

D. Routers operate at the Network layer (Layer 3) of the OSI model. Because of this, they make their decisions on what to do with traffic based on logical addresses, such as an IP address.

What characteristic differentiates STP from UTP? A. It uses RJ-45s connectors instead of RJ-45. B. It follows the T568A wiring standard. C. It does not produce poisonous gas when burned. D. It has a layer of foil shielding.

D. Shielded twisted pair (STP) cabling has a foil shield surrounding the wire pairs to decrease electrical interference. Some STP cables also shield individual wire pairs. Unshielded twisted pair (UTP) does not have the shielding. Both types use RJ-45 connectors, can follow the T568A wiring standard, and can be produced as plenum-rated cable that does not produce poisonous gas when burned.

Which TCP/IP port number does SNMP use? A. TCP 143 B. UDP 143 C. TCP 161 D. UDP 161

D. Simple Network Management Protocol (SNMP) is a noncritical service, so it uses UDP. It's assigned port 161. IMAP4 uses port 143.

Which TCP/IP protocol allows a user to log into a remote computer and manage files as if they were logged in locally? A. FTP B. SFTP C. SMB D. Telnet

D. Telnet lets users log into another machine and "see" the remote computer in a window on their screen. Although this vision is text only, the user can manage files on that remote machine just as if they were logged in locally.

Which TCP/IP protocol is designed to help resolve host names to IP addresses? A. ARP B. RARP C. DHCP D. DNS

D. The Domain Name System (DNS) is responsible for resolving host names to IP addresses. This is used millions of times daily on the Internet; when someone types in a website name, such as www.sybex.com, DNS will resolve that to an IP address to enable communication.

Which TCP/IP protocol allows you to access data such as employee phone numbers and email addresses that are stored within an information directory? A. SNMP B. SMTP C. CIFS D. LDAP

D. The Lightweight Directory Access Protocol (LDAP) is a directory services protocol based on the X.500 standard. LDAP is designed to access information stored in an information directory typically known as an LDAP directory or LDAP database. This often includes employee phone numbers and email addresses.

A senior administrator calls you and tells you that she is working from home and trying to use RDP, but it won't let her. What port do you need to ensure is open on the firewall to grant her access? A. 143 B. 443 C. 548 D. 3389

D. The Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. It uses port 3389.

You are installing network cabling in a drop ceiling of an office space. The ceiling area is used to circulate breathable air. What type of cable do you need to install? A. Coaxial B. UTP C. Fiber-optic D. Plenum

D. The cable can be any of the three major types, coaxial, twisted pair, or fiber, but it needs to be plenum rated. Normal cables have a PVC coating, which produces a poisonous gas when burned. Plenum-rated cables have a Teflon coating, which is not toxic when burned.

You are manually configuring TCP/IP hosts on the network. What configuration parameter specifies the address of the router that enables Internet access? A. Subnet mask B. DHCP server C. DNS server D. Default gateway

D. The default gateway is the address to the network's router, which will allow the host to communicate with hosts not on the local network.

If you are connecting to a website that encrypts its connection using TLS, what port number does that traffic travel on? A. 21 B. 80 C. 143 D. 443

D. To encrypt traffic between a web server and client securely, Hypertext Transfer Protocol Secure (HTTPS) can be used. HTTPS connections are secured using either Secure Sockets Layer (SSL) or Transport Layer Security (TLS). HTTPS uses port 443.

Your company just expanded and is leasing additional space in an adjacent office building. You need to extend the network to the new building. Fortunately, there is a conduit between the two. You estimate that the cable you need to run will be about 300 meters long. What type of cable should you use? A. CAT5 B. CAT5e C. CAT7 D. MMF

D. UTP cables are limited to 100 meters, so CAT5 and CAT7 will not work. You need fiber, and multimode fiber (MMF) can span distances of 300 meters.

You need to configure a wireless router for an office network. The office manager wants new devices to be able to automatically join the network and announce their presence to other networked devices. Which service should you enable to allow this? A. DHCP B. NAT C. QoS D. UPnP

D. Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and to enable those devices to automatically announce their presence to other devices on the network.

Which Wi-Fi encryption standard uses a static key, which is commonly 10, 26, or 58 characters long? A. WPA B. WPA2 C. TKIP D. WEP

D. Wired Equivalent Privacy (WEP) was one of the first security standards for wireless devices. It uses a static key; the keys are commonly 10, 26, or 58 hexadecimal characters long.

A. F-connectors are threaded and screw into place. The BNC connector locks by twisting one-quarter turn. SC and ST connectors are for fiber-optic cable.

Identify the cable connector in the picture. A. F-connector B. BNC C. SC D. ST

B. The connector shown is a subscriber connector (SC), also known as a square connector because of its shape. It's a fiberoptic cable connector.

Identify the connector shown here. A. ST B. SC C. LC D. MFF

C. The connector shown is a type of mini form factor (MFF) fiber-optic connector called a local connector (LC). It's especially popular for use with Fibre-Channel adapters, fast storage area networks, and Gigabit Ethernet adapters.

Identify the connector shown here. A. ST B. SC C. LC D. MFF

D. The connectors are a four-pin RJ-11, typically used for telephone installations, and an eight-pin RJ-45 connector, used on UTP and STP for network transmissions.

Identify the connectors shown here, from left to right. A. ST and SC B. SC and ST C. RJ-45 and RJ-11 D. RJ-11 and RJ-45

B. The connectors pictured are BNC connectors. They are identifiable by their groove-and-notch fastening mechanism that locks by twisting one-quarter turn. F-connectors are easily identifiable because they are threaded. SC and ST connectors are for fiber-optic cable.

Identify the type of cable connectors shown here. A. F-connector B. BNC C. SC D. ST

D. The connectors shown are ST connectors, which are used with fiber-optic cable. ST connectors are the most popular fiber connector, and they attach with a BNC-like locking mechanism.

You are investigating remnants of an old network setup in an unused building. At the end of a conduit, all you see are the connectors shown here. What type of cable do you expect these connectors to be attached to? A. Coaxial B. STP C. UTP D. Fiber-optic


Ensembles d'études connexes

Testout Security Pro Chapter 3 - Policies, Procedures & Awareness

View Set

Adaptive Quizzing Foundations of Nursing

View Set

What best describes the Mexican National Era?

View Set

Chapter 3: Describing Data: Numerical Measures

View Set

Chapter 8 -Corporate Strategy Diversification

View Set

Sports and Entertainment Marketing

View Set