CompTIA Network+ wk 1 questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You've been asked to plan a mobile authentication system using a biometric factor. Which of the following would be appropriate? Choose the best response. A. Facial recognition B. Fingerprint scanner C. Geofencing D. Hardware token E. Smart card

A/B

You were distracted while configuring a switch, and now there's constant congestion from an overwhelming amount of traffic. As you go back through the settings you may have modified, which can you likely rule out as the cause of this problem? Choose all that apply. A. LACP B. MTU C. PoE+ D. STP E. VLAN

B and C

What feature primarily helps to protect against DoS attacks? Choose the best response. A. Authentication systems B. DMZ C. Loop protection D. SNMPv3

B/C

What kind of proxy would you use to mediate communications between Internetbased clients and LAN-based servers? A. Anonymous B. Forward C. Reverse D. Transparent

C

What kinds of traffic might you classify as "Best Effort?" Choose all that apply. A. FTP traffic B. NAS data C. Video streams D. Voice conversations E. Web applications

The correct answer is A. FTP traffic, B. NAS data, and E. Web applications.

An office uses a Wi-Fi network for peer-to-peer sharing between hosts, with no centralized WAP. Unfortunately, its performance is rather low. What kind of topology does it have? Choose the best response. A. Ad hoc B. Hotspot C. Infrastructure D. Mesh

A

What backup type might require specific operating system support? Choose the best response. A. Differential B. Full C. Incremental D. Snapshot

D

Experts agree that very demanding password policies are the best way to maintain security. True or false?

False

In modern networks there's very little reason to pick specialized single-function network devices over all-in-one multifunction models. True or false?

False

It's fairly inexpensive to upgrade wiring later if new standards require it. True or false?

False

You should start choosing an incident response team as soon as you've identified an incident. True or false?

False

As long as the host machine has anti-malware protection, VMs are protected as well. True or false?

False.

Which models assume two protocols on one layer will not communicate? Choose the best answer. A. OSI B. TCP/IP C. Both D. Neither

The correct answer is A. OSI.

How does the 5GHz band differ from the 2.4GHz band? Choose all that apply. A. Fewer non-overlapping channels B. Less interference from non-Wi-Fi sources C. Longer range D. More interference from non-Wi-Fi sources E. More non-overlapping channels F. Shorter range

The correct answer is B, E, and F.

How does Ethernet control multiple access? Choose the best response. A. CSMA/CA B. CSMA/CD C. Time-division multiplexing D. Token passing

The correct answer is B.

You know there's a fault somewhere on that 100m cable, but it looks fine from the outside. What tool would be the quickest way to guess exactly where the flaw is? Choose the best answer. A. Loopback plug B. Multimeter C. Time-domain reflectometer D. Toner Probe

The correct answer is C. Time-domain reflectometer.

User problem reports can't be entirely trusted. True or false?

The correct answer is True.

A service pack is generally a more major update than a maintenance release. True or false?

True

All else being equal, bare metal hypervisors are more efficient than hosted ones. True or false?

True.

At 100m from a transmitter, your radio signal is only 25% as strong as what you'd like. What's the furthest you can be while still getting the signal strength you want? A. 25m B. 33m C. 50m D. 66m

The correct answer is C. 50m.

There are straightforward standards for centrally managing multiple APs on a WLAN, but letting a device easily roam from one AP to another can be tricky. True or false?

True

Even though Syslog has been around a very long time, it hasn't always been a welldefined standard. True or false?

False

What is an example of a media transmission protocol? Choose the best response. A. G.722 B. H.323 C. RTP D. SIP

C. RTP.

What internet connection technology uses the same wires as your analog phone line, but a separate communications channel? A. Cable B. Dialup C. DSL D. ISDN

C. DSL.

What aspect of security does a keylogger primarily attack? Choose the best response. A. Confidentiality B. Integrity C. Availability

A

What physical control relies on RFID technology? Choose the best response. A. Asset tracking tags B. Motion detection sensors C. Surveillance cameras D. Tamper detection systems

A

You're setting up a new fiber-optic network using existing fiber that's been laid on your campus. You need SFP+ transceivers to plug into it, but you see there are both duplex and bidirectional transceivers available. Which should you keep in mind when planning your purchase? Choose the best answer. A. Bidirectional transceivers require fewer fibers but are more expensive. B. Bidirectional transceivers require more fibers but give higher bandwidth. C. Duplex transceivers require fewer fibers but are more expensive. D. Duplex transceivers require more fibers but give higher bandwidth.

A

Which of the following is true of a work instruction but not a standard operating procedure? A. Defines what criteria must be met to complete the task successfully. B. Defines who is responsible for each step of the operation. C. Leaves little room for error or interpretation D. Provides a step by step procedure for completing a task.

C/D

A cloud provider hosts your enterprise network, but you want to centrally manage all authentication, encryption, activity logging, and other security policies for connections between local computers and the cloud. What security solution would address these issues? A. On-premise policies B. Private deployment C. Security as a Service D. Security broker

D

What kind of an attack targets a vulnerability you don't even have a way to anticipate? Choose the best response. A. DDoS B. Man-in-the-middle C. Spoofing D. Zero-day

D

What kind of update should you always install unless you have a good reason not to? A. Compatibility B. Firmware C. Performance D. Security

D

You want to set up a wireless network to control your household lighting, thermostat, and security system. What technology would you most likely use? Choose the best response. A. ANT+ B. Bluetooth C. RFID D. Z-Wave

D

As a beginning network technician, what scope of network are you most likely to install or maintain? Choose the best answer. A. CAN B. LAN C. PAN D. WAN

The best answer is B. LAN.

What Transport layer protocols carry network data? A. TCP B. UDP C. Both D. Neither

The correct answer is C. Both.

You've taken up a contract helping to upgrade the existing industrial control network for an oil refinery. What network type should you expect to work with? Choose the best response. A. DCS B. FCoE C. IoT D. SCADA

A

Your company allows users to use their own smartphones for company business and to join them to the office network. After several security incidents, management is considering a new policy that involves company-issued phones. What term describes the original policy? Choose the best response. A. BYOD B. COBO C. COPE D. CYOD

A

What security feature is especially important for preventing rogue devices on the network? Choose the best response. A. DMZ B. Loop protection C. Port security D. VPN

C

Your company rents a spare server room in a secondary location. It has all necessary hardware, software, and network services, and you just need to load the latest backups to get it in operation. What is it? Choose the best answer. A. Hot site B. Hot spare C. Cold site D. Cold spare

A

What qualities should a high-performance network have? Choose all that apply. A. High latency B. Low latency C. High scalability D. High throughput

A high-performance network has B. Low latency(low delay) and D. High throughput.

Which of the following are true about ATM cells? Choose all that apply. A. They are always the same size. B. They are generally smaller than Ethernet frames. C. They are generally larger than Ethernet frames. D. They limit the MTU of higher level protocols. E. They are identical regardless of physical medium.

A, B, and E.

What might a router using PAT change on packets passing through? Choose all that apply. A. Destination port for incoming packets B. Destination port for outgoing packets C. Destination address for incoming packets D. Source address for incoming packets E. Source port for incoming packets F. Source port for outgoing packets

A, C, and F.

Which of the following statements are true? Choose all that apply. A. Circuit-switched networks are better for emulating dedicated point-to-point connections than packetswitched networks are. B. Packet-switched networks are better for emulating dedicated point-to-point connections than circuitswitched networks are. C. Early Ethernet standards were circuit-switched. D. Historical telephone networks were circuit-switched. E. The right protocols can help a packet-switched network emulate a circuit-switched network.

A, D, E

What kind of attack is most likely when you're doing sensitive work on your laptop at a coffee shop? Choose the best response. A. Piggybacking B. Shoulder surfing C. Smurfing D. Wardriving

B

How many data channels are there in a BRI ISDN connection? A. 2 B. 3 C. 23 D. 30

A. 2.

What technology was designed for use over ISDN links? Choose the best reply. A. ATM B. Frame Relay C. MPLS D. X.25

B

It's a safe assumption that an attacker with physical access to a system can compromise any other security measures given time. True or false?

True

You want to host three virtual web servers on one host computer. Which VM adapter setting will allow both to appear as entirely different addresses from the outside? A. Bridged adapter B. Internal subnet C. Either, provided they're on the same subnet D. Neither, unless you use special router configuration

A. Bridge adapter

When configuring an IDS you might want to allow a few false positives to make sure you never get any false negatives, but not the opposite. True or false?

True.

What would you find in a PKI certificate that you wouldn't in either a web of trust or selfsigned certificate? Choose the best response. A. Its owner's signature B. A CA signature C. Revocation information D. X.509 formatting

B

Which of the following is true of carrier lines? Choose the best response. A. T-carriers and E-carriers use identical protocols and data rates but use incompatible hardware. B. E-carriers offer greater data rates on similar hardware than T-carriers. C. T-carriers offer greater data rates on similar hardware than E-carriers. D. T-carriers are copper-based while E-carriers are optical.

B

You're at a meeting discussing whether to deploy singlemode or multimode fiber in a new installation. Which of the following arguments should you make? Choose all that apply. A. Multimode is a better choice if you want to use WDM. B. Multimode transceivers are less expensive. C. Multimode works over longer distances. D. Single-mode is a better choice if you want to use WDM. E. Single-mode transceivers are less expensive. F. Single-mode works over longer distances.

B, D, F

What is a simulated network attack performed by a security expert with detailed knowledge of the network? A. Black box B. Vulnerability scan C. White box D. White hat

C

light and an amber light. What does it mean? Choose the most likely answer. A. It is operating at 10Mbps B. It is operating at 100Mbps C. It is operating in full duplex mode D. It is operating in half-duplex mode

B. It is operating at 100Mbps.

What is most likely to be part of an AUP? Choose the best response. A. How often employee evaluations should be conducted B. What to do when a workstation shows signs of malware infection C. Whether you can access streaming music services from your workstation D. Who is in charge of a critical database

C

What kind of network tool is also known as a sniffer? A. Network mapper B. Port scanner C. Protocol analyzer D. Wireless scanner

C

What qualifies as both a preventive and a detective control? Choose the best response. A. A locked door B. A motion detector C. A security guard D. A surveillance camera

C

Which of the following is NOT true of a Kerberos network? A. Kerberos enables mutual authentication and encryption on an untrusted network. B. Secure authentication does not require public key cryptography. C. The KDC directly relays communications between clients and resource servers. D. You need a ticket-granting ticket before you communicate with the ticket-granting server.

C

You have a Bluetooth keyboard that can pair with a compatible phone or tablet simply by touching the two devices together. What technology does the feature likely use? A. ANT+ B. IrDA C. NFC D. Z-WAVE

C

You receive an email about a new feature for an online service you use, and click the link for more information. Just before you sign into your account you notice the URL is wrong: it's actually a different site made to imitate the one you belong to. What attack were you targeted by? Choose the best response. A. DoS B. Evil twin C. Phishing D. Spoofing

C

You're doing network consulting for a small research firm, and there's more paperwork to the deal than you ever expected. Of the documents you have to sign, which one covers your obligations to protect any trade secrets or proprietary information they share with you? Choose the best response. A. BPA B. MOU C. NDA D. SLA

C

Which twisted-pair Ethernet standards require use of all four wire pairs? Choose all that apply. A. 10BASE-T B. 100BASE-TX C. 1000BASE-T D. 1000BASE-TX E. 10GBASE-T

C. 1000BASE-T and E. 10GBASE-T.

Which storage option is just a refinement of traditional file servers? A. DAS B. iSCSI C. NAS D. SAN

C. NAS

A NIC has the MAC address 08-00-27-DE-36- 02. What would be the corresponding EUI- 64 address? Choose the best response. A. A0-00-27-DE-36-02 B. 08-00-27-FF-FE-DE-36-02 C. AO-00-27-FF-FE-DE-36-02 D. 08-00-27-FF-FF-DE-36-02

The correct answer is C.

What model would describe a cloud accounting service? Choose the best response. A. IaaS B. PaaS C. SaaS D. SDN

C. Saas.

You're supposed to buy some Cat 6 cable to install new network drops, but the site you're buying from lists cables by ISO standards. Which kind should you buy? Choose the best answer. A. Class C B. Class D C. Class E D. Class F

The correct answer is C.

What cable length is supported by most twisted-pair Ethernet standards? A. 25m B. 50m C. 100m D. 200m

The correct answer is C. 100m.

Why is it necessary that each pair of electrical signals on a twisted-pair cable corresponds to one physical wire pair? Choose the best answer. A. Because each pair has a slightly different length. B. Because otherwise it would be difficult to terminate the cable. C. Because otherwise it won't reduce crosstalk. D. Because the shielding won't be grounded properly otherwise.

The correct answer is C. Because otherwise it won't reduce crosstalk.

You can't ping any other hosts, even on the local subnet. What should you check next? Choose the best response. A. Application settings B. DNS server C. IP address settings D. MTU settings

The correct answer is C. IP address settings.

You want to create a point-to-point wireless link between two buildings. Your goals are to keep a strong signal between the two transceivers without sending too much signal elsewhere. What antenna style should you use for each? Choose the best response. A. Dipole B. MIMO C. Monopole D. Yagi

D

Order the following encryption ciphers from weakest to strongest. A. 3DES B. AES C. Blowfish D. DES

D, A, C, B

Order WAP encryption methods from most to least secure. A. WEP B. WPA-AES C. WPA-TKIP D. WPA2-AES E. WPA2-TKIP

D, B, E, C, A

Which modulation technology is used by newer, faster Wi-Fi standards? A. CDMA B. DSSS C. FHSS D. ODFM

D. ODFM.

Given the choice between the two, why would you choose tracert over pathping? Choose the best response. A. pathping doesn't support IPv6. B. tracert is faster. C. tracert is more likely to pass through firewalls. D. tracert produces more information.

The correct answer is B. tracert is faster.

You're about to purchase some new network hardware, but you have a couple of old computers you'd like to repurpose as network devices to save a little money. Which of the following would be a useful plan? Choose the best response. A. Configure them as routers B. Configure them as switches C. Configure them as either routers or switches D. They would only be appropriate in certain specialized networks

The correct answer is A.

The IPv4 DHCP leasing process is sometimes called A. DORA B. DUID C. IPIPA D. SARR

The correct answer is A. DORA.

What happens to a non-tagged frame on a VLAN trunk? A. It's flooded to all VLANs the trunk carries. B. It's forwarded to the lowest-numbered VLAN. C. It's forwarded to the trunk's native VLAN. D. It's dropped without an error message.

The correct answer is C. It's forwarded on the trunk's native VLAN.

What kind of DNS record is important if you want to find the FQDN associated with a given IPv4 address? Choose the best response. A. A B. AAAA C. PTR D. SOA

The correct answer is C. PTR.

What protocol would you most likely use to connect to remote network drives? Choose the best response. A. FTP B. LDAP C. SMB D. NTP

The correct answer is C. SMB.

What DMZ topology is displayed? Choose the best response. A. Bastion Host B. Dual firewall C. Three-homed firewall D. UTM firewall

The correct answer is C. Three-homed firewall.

Your company's custom server software application needs a TCP port to listen on. What port range should it be configured to use? A. Private B. System C. User

The correct answer is C. User.

What will any link-local IPv6 address begin with? Choose the best answer. A. 0000: B. 2000: C. fe80: D. ff0e:

The correct answer is C. fe80:.

Order the following cellular data technologies from slowest to fastest, in general terms.

§ 3G § 4G LTE § EDGE § HSPA+ 1. EDGE 2. 3G 3. HSPA+ 4. 4G LTE

What VPN type is secure, compatible with nearly any application, and natively supported by most operating systems? A. L2TP/IPsec B. PPTP C. SSH D. SSL/TLS

A/B

What portable fire extinguishers are suitable for a network closet? A. Carbon dioxide B. Dry chemical C. Foam D. Water E. Wet chemical

A/B

What secure protocols add SSL/TLS security to protocols which were insecure on their own? Choose all that apply. A. FTPS B. HTTPS C. SFTP D. SNMPv3 E. SSH

A/B

Your remote access system currently uses RADIUS, but one administrator is proposing replacing it with TACACS+. What benefits might this provide? Choose all that apply. A. Better able to support non-IP protocols B. Better suited to large networks C. Less complicated to administer D. More secure E. More focused on user authentication

A/B/D

Which of the following statements are true about wireless signals? Choose all that apply. A. In general, denser materials attenuate Wi-Fi signals more severely. B. In general, materials transparent to visible light will also be transparent to Wi-Fi signals. C. Metal barriers tend to strongly absorb or reflect Wi- Fi signals. D. Microwave ovens can cause interference, primarily on the 5 GHz Wi-Fi band. E. Small changes of transceiver position will only cause small changes in signal strength.

A/C

Your office has a single WAP, but even with a strong antenna it can't cover the whole office. Your boss wants you to compare options for expanding the network. What points might you include on your report? Choose all correct answers. A. A wireless range extender would be a low-maintenance option but might impact network performance. B. A wireless range extender would be a high-performance option but requires a controller using LWAPP or CAPWAP. C. Multiple thin WAPs would be a low-maintenance option but might impact network performance. D. Multiple thin WAPs would be a high-performance option, but require a controller using LWAPP or CAPWAP. E. Since it's a secured network, reconfiguring all wireless hosts as an ad hoc network would increase coverage without significant drawbacks.

A/C

A user logs into their computer and is presented with a screen showing a Department of Justice logo indicating the computer has been locked due to the user being in violation of federal law. The screen gives several details of the violation and indicates that the user must pay a fine of $500 within 72 hours or a warrant will be issued for their arrest. The user cannot unlock their system. What type of malware is likely infecting the computer? Choose the best response. A. Logic bomb B. Ransomware C. Rootkit D. Trojan

B

A. Enabling WPS could increase security, but enabling 802.1X would reduce it. B. Enabling 802.1X could increase security, but enabling WPS would reduce it. C. Enabling either WPS or 802.1X could increase security. D. Enabling either WPS or 802.1X would reduce security.

B

Evil twins are mostly used as part of what kind of attack? Choose the best response. A. Denial of service B. Man-in-the-middle C. Phishing D. Trojan horse

B

What SIEM software feature finds broader trends and relationships formed by individually insignificant events? Choose the best response. A. Aggregation B. Correlation C. Deduplication D. Synchronization

B

What are the core protocols used by Active Directory? A. 802.1X, DNS, and Kerberos B. LDAP, DNS, and Kerberos C. 802.1X, EAP, and LDAP D. LDAP, Kerberos, and RADIUS

B

What cloud model is likely to provide access to a software environment you can use to develop and host web-based applications, but not the applications themselves? Choose the best response. A. IaaS B. PaaS C. SaaS D. Any of the above

B

What interface metric would suggest congestion rather than physical or configuration problems on a fully switched network? Choose the best response. A. High collision rate B. High discard rate C. High error rate D. High discard and collision rate

B

What is eDiscovery? Choose the best answer. A. A process for identifying security incidents. B. A process for sharing electronic forensic data. C. A standard for forensic backup software. D. A software application used to track security incidents.

B

What's the most essential tool for segmenting broadcast domains? Choose the best response. A. Bridges B. Routers C. Switches D. VLANs

B

Which protocol is more of a message framework than an authentication method in itself? Choose the best response. A. CHAP B. EAP C. MS-CHAP D. PAP

B

While examining network metrics you see a very high discard rate on a router interface. What does this most likely signify? Choose the best response. A. The destination host isn't responding to the router. B. The router is receiving intact packets that it can't use. C. The router is receiving packets with data errors. D. The router is trying to transmit simultaneously with another device on the same collision domain.

B

You have a critical database server that constantly backs its files up to the cloud, but its software environment is so finicky that if it encountered a critical failure it would take a long time to get it working again. How would you describe your recovery plan for that service? A. High RPO and high RTO B. High RPO and low RTO C. Low RPO and high RTO D. Low RPO and low RTO

B

You're creating a network of industrial control systems distributed through a chemical processing plant, where even a brief unplanned outage would be costly and possibly dangerous. Your boss wants systems guaranteed to operate despite component failures. What availability strategy does this describe? A. Clustering B. Fault tolerance C. High availability D. Load balancing

B

You're shopping for a new A/C unit for your server room, and are comparing manufacturer ratings. Which combination will minimize the time you'll have to go without sufficient cooling? Choose the best response. A. High MTBF and high MTTR B. High MTBF and low MTTR C. Low MTBF and high MTTR D. Low MTBF and low MTTR

B

You've configured several independent APs on different channels with identical SSIDs and passwords. What happens when a mobile client tries to connect with saved credentials? A. It connects only to the AP on the channel it was configured to use, regardless of its location. B. It connects to the AP with the strongest signal, and stays on it until connection is lost. C. It generates an error on detecting multiple identical APs. D. It periodically switches (or roams) to the AP with the strongest signal.

B

Your wireless network is configured in 802.1X mode. What kind of server does it most likely use as a backend? Choose the best response. A. KERBEROS B. RADIUS C. TACACS+ D. TKIP

B

compression features you'd like to use it to carry TCP/IP traffic over an Ethernet network. Can you do this? Choose the best answer. A. Yes, PPP is designed for exactly that. B. Yes, but PPP needs additional protocols to interface with IP and Ethernet. C. Not unless you have special Ethernet hardware supporting PPP. D. No, PPP is designed strictly for circuitswitched networks

B

What are good examples of two-factor authentication? Choose all that apply. A. A credit card and a photo ID B. A credit card and a security code C. A credit card and a signature D. A password followed by a security question E. A password followed by a PIN texted to your phone

B, C, E

Which of the following statements are true? Choose all that apply. A. By definition, you are responsible for all devices on your side of the demarc. B. By definition, your ISP is responsible for all devices outside of the demarc. C. Sometimes devices on your side of the demarc might still be your ISP's responsibility. D. "The local loop" refers to the customer side of the demarc. E. "The local loop" refers to the ISP side of the demarc.

B, C, E

You're designing a set of role-based policy documents for different people in your company. Which of the following should definitely be in policies for managerial staff? Choose all that apply. A. A complete list of technological standards used in the network B. A list of who is responsible for which network assets C. Legal and regulatory requirements applicable to company IT functions D. Procedures for conducting a server backup E. Procedures for revising or changing security policies

B/C/E

Where are you most likely to use a two-post rack instead of a four-post? Choose all that apply. A. For improved cable management B. For lightweight equipment C. Inside a security enclosure D. When cost is a primary concern E. To increase accessibility

B/D/E

Where are you most likely to use a two-post rack instead of a four-post? Choose all that apply. A. For improved cable management B. For lightweight equipment C. Inside a security enclosure D. When cost is a primary concern E. To increase accessibility

B/D/E

In terms of time, how does a differential backup plan generally differ from an incremental backup plan? A. It's quicker both to create backups and to restore data B. It's quicker to create backups, but slower to restore data C. It's slower to create backups, but quicker to restore data D. It's slower both to create backups and to restore data

C

On an IPsec VPN, what protocol negotiates security associations? A. AH B. ESP C. IKE D. L2TP

C

Right after you install an endpoint security suite it scans your computer and generates a database it can later use to detect any alterations to critical system files. What cryptographic method is it most likely using? Choose the best response. A. Asymmetric encryption B. Certificates C. Hashing D. Symmetric encryption

C

What AAA element specifies the exact resources a given principal is allowed to access? Choose the best response. A. Accounting B. Authentication C. Authorization D. Identification

C

What SNMP component is a database for a particular device? Choose the best response. A. Agent B. Manager C. MIB D. OID

C

What Wi-Fi standard can operate in either the 2.4GHz or 5GHz band? Choose the best response. A. 802.11a B. 802.11b C. 802.11g D. 802.11n E. 802.11ac

The correct answer is D. 802.11n.

If your computer fails a posture assessment, where might it be connected? Choose the best response. A. A DMZ B. A guest network C. A honeynet D. A quarantine network

The correct answer is D. A quarantine network

While the optical cables in the closet are outwardly identical, some have green connectors, and some have blue. Which is likely true? Choose the best response. A. Blue is APC, and green is UPC B. Blue is MMF, and green is SMF C. Blue is SMF, and green is MMF D. Blue is UPC, and green is APC

The correct answer is D. Blue is UPC, and green is APC.

ACLs are based on which assumption? Choose the best response. A. Explicit Allow B. Explicit Deny C. Implicit Allow D. Implicit Deny

The correct answer is D. Implicit Deny.

You're using LACP to handle link aggregation between Switch A and Switch B, and you're just setting all the ports the same on each switch. Which combinations will lead to successful autonegotiation? Choose all that apply. A. A: Active; B: Active B. A: Active; B: Passive C. A: Passive; B: Active D. A: Passive: B: Passive

The correct answer is A. A: Active; B: Active, B. A: Active; B: Passive, and C. A: Passive; B: Active.

What protocol is used to find the MAC address of a given IP address? Choose the best response. A. ARP B. DHCP C. APIPA D. DNS

The correct answer is A. ARP.

Your company network is a multihomed AS. What protocol would your gateway routers need to learn Internet paths? A. BGP B. IS-IS C. OSPF D. RIP

The correct answer is A. BGP.

What kind of signaling is generally used by Ethernet? Choose the best answer. A. Baseband B. Broadband C. Frequency-division multiplexing D. Time-division multiplexing

The correct answer is A. Baseband.

Which of the following are valid MAC addresses? Choose all that apply. A. D0-21-75-46-88-F5 B. 22-B9-E9-35-05 C. 20-22-16-XN-23-FC D. 70-B6-6C-4E-60-AD E. 43-75-BA-10-89-86

The correct answer is A. D0-21-75-46-88-F5, D. 20-22-16-XN-23-FC, and E. 43-75-BA-10-89-86.

What kind of communications would be suitable for UDP? Choose all that apply. A. DNS requests B. File transfers C. Online games D. Streaming video E. Website connections

The correct answer is A. DNS requests, C. Online games, and D. Streaming video. Copyright © 2016

You're in the process of migrating the corporate network to IPv6, but it's going to take a while. You've been told to configure the network such that any two hosts will communicate via IPv6 if the path between them is compatible, but they'll automatically use IPv4 if it isn't. What migration strategy does this describe? Choose the best answer. A. Dual stack B. IPAM C. NAT D. Tunneling

The correct answer is A. Dual stack.

Which of the following devices would segment the network into multiple broadcast domains? Choose all that apply. A. Gateway B. Hub C. Repeater D. Router E. Switch

The correct answer is A. Gateway and D. Router.

Which of the following devices would segment the network into multiple collision domains? Choose all that apply. A. Gateway B. Hub C. Repeater D. Router E. Switch

The correct answer is A. Gateway, D. Router, and E. Switch.

You need to set up a long-distance full-duplex connection between two points, but you'd rather not run two cables all that distance. One technology you're evaluating lists FDM as one of its features. Will it do the job with a single cable? Choose the best response. A. No, you need SDM for full duplex. B. Maybe, but you need to know more. C. Yes, FDM is just another term for full duplex. D. Yes, FDM is one way of achieving full duplex.

The correct answer is B.

Which IPv4 address might be valid on the Internet? Choose the best response. A. 127.0.0.1 B. 150.50.101.32 C. 169.254.121.68 D. 192.168.52.52

The correct answer is B. 150.50.101.32.

How many MAC addresses are in an Ethernet frame header? A. 1 B. 2 C. 3 D. 4

The correct answer is B. 2.

How many total packets need to be exchanged for a TCP handshake? Choose the best response. A. 2 B. 3 C. 4 D. 5

The correct answer is B. 3.

What sort of a device may or may not be a host, depending on context? A. A file server B. A printer C. A switch D. A user workstation

The correct answer is B. A printer.

What tools let an individual attacker mount a DoS attack on a powerful network? Choose all that apply. A. Bluesnarfing B. Botnets C. Malformed packets D. Reflection E. VLAN hopping

The correct answer is B. Botnets, C. Malformed packets, and D. Reflection.

What protocol would an echo request packet use? A. ARP B. ICMP C. TCP D. UDP

The correct answer is B. ICMP.

What connectors are small form-factor types? Choose all that apply. A. FC B. LC C. MT-RJ D. SC E. ST

The correct answer is B. LC and C. MT-RJ.

What topology would you use when fault tolerance is the greatest concern? Choose the best result. A. Bus B. Mesh C. Ring D. Star

The correct answer is B. Mesh.

How large are jumbo frames? A. Over 500 bytes B. Over 1500 bytes C. Over 2500 bytes D. Over 4500 bytes

The correct answer is B. Over 1500 bytes.

What cables use balanced-pair signaling? Choose the best answer. A. Coaxial B. Twisted-pair C. Both D. Neither

The correct answer is B. Twisted-pair.

A switch you're considering purchasing is marketed as a "smart switch." What kind of interface do you expect it to have? Choose the best answer. A. Command-line B. Web-based C. Both D. Neither

The correct answer is B. Web-based.

Which network tools are found in Windows but not in Unix-like operating systems? Choose all that apply. A. ifconfig B. ipconfig C. pathping D. ping E. traceroute

The correct answer is B. ipconfig and C. pathping.

What limitation of the spanning tree family do protocols like SPB and TRILL try to overcome? A. Complex VLAN arrangements B. Convergence time C. Management overhead D. Multiple active paths

The correct answer is D. Multiple active paths.

Your company's network is too big to use static routing, but the topology is simple and doesn't change very often. What routing protocol would be the easiest to use while still meeting your needs? Choose the best reply. A. BGP B. IS-IS C. OSPF D. RIP

The correct answer is D. RIP.

What would be reasonable termination methods for a patch cable between a PC and a switch? Choose all that apply. A. Crossover B. RJ-11 C. RJ-25 D. T568A E. T568B

The correct answer is D. T568A and E. T568B.

What is part of an IP packet but not an Ethernet frame? A. Destination address B. Payload C. Source address D. TTL

The correct answer is D. TTL.

A user reports being able to access web sites, but not send and receive email. What troubleshooting approach would probably be quickest? A. Bottom-up B. Divide-and-conquer C. Move-the-problem D. Top-down

The correct answer is D. Top-down.

A coworker frequently uses the same application both to remotely access her home desktop while on business trips, and to share her screen during online presentations. What protocol does it most likely use? Choose the best response. A. RDP B. SSH C. Telnet D. VNC

The correct answer is D. User.

You can use a coupler to join two optical inputs to one output, but only if they're the same wavelength. True or false?

The correct answer is False.

A Layer 2 switch is essentially a bridge with more than two ports. True or false?

The correct answer is True.

Compared to routing tables, ACLs allow you to check a lot more properties of incoming traffic. True or false?

The correct answer is True.

For a local server, you might not need the full domain name to perform a DNS lookup. True or false?

The correct answer is True.

Most small LANs today incorporate both peer-to-peer and client-server elements. True or false?

The correct answer is True.

The physical and logical network can't be totally separated from one another. True or false?

The correct answer is True.

The user who first reported a problem is often the best person to verify that it's fixed. True or false?

The correct answer is True.

Even with modern routing protocols, you still might want to set static route entries. True or false?

True

Clustering is similar to load balancing, but tends to use tighter integration between redundant systems. True or false?

True

Downgrades are often more difficult than upgrades. True or false?

True


Ensembles d'études connexes

Chapter 15: Christianity and the Formation of Europe

View Set

Types of reasoning, fallacies, and tactics

View Set

TEPC 5800: EC-12 PRACTICE TEST #2

View Set