INWT 120 Midterm

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

After installing a new DHCP server on the network, you need to verify that network devices are receiving IP addressing via DHCP. You reboot a Windows XP client system and using the ipconfig command, receive the following information: Ethernet adapter Local Area Connection 1: Description . . . . . . . . . . . : CardBus-II 10/100 PC Card Physical Address. . . . . . . . . : 02-00-4C-4F-3F-50 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Autoconfiguration IP Address. . : 169.254.25.129 Subnet Mask . . . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . . . : DNS Servers . . . . . . . . . . : Which of the following statements are true? (Select 2). - DHCP is disabled on the client system. - The network is configured to use static IP addressing. - The client system is configured to use DHCP. - The client system is unable to reach the DHCP server. - The Default gateway address needs to point to the DHCP server. - The network subnet mask is incorrect.

1). The client system is unable to reach the DHCP server. 2). The client system is configured to use DHCP.

You are troubleshooting a network connectivity issue on a Unix system. You are able to connect to remote systems by using their IP address, but unable to connect using the hostname. You check the TCP/IP configuration, and note that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Choose two.) - dig - nslookup - tracert - traceroute

1). dig 2). nslookup

You want to be able to view the address of the default gateway that a computer is using. Which of the following utilities could you use? (Select two.) - ipconfig - ifconfig - host - dig - netstat

1). ipconfig 2). ifconfig

With an Ethernet 10BaseT network, the maximum cable length between a computer and the hub is: - 100 meters - 185 meters - 100 feet - 500 feet

100 meters

What is the binary format for the following decimal IP address? 131.9.202.111 - 10000011.00001001.11001010.01101111 - 10000110.00001011.11000101.10101110 - 10000111.00001101.11001110.01011101 - 10000001.00001010.11000011.01010111

10000011.00001001.11001010.01101111

Which of the following IP addresses is a valid IP address for a host on a public network? - 10.3.125.2 - 172.16.254.12 - 192.168.16.45 - 142.15.6.1

142.15.6.1

Which of the following IP address ranges is reserved for Automatic Private IP Addressing? - 192.168.0.0 - 192.168.255.254 - 169.168.0.1 - 169.168.255.255 - 192.168.0.1 - 192.168.254.255 - 169.254.0.1 - 169.254.255.254 - 169.192.0.0 - 169.192.254.255

169.254.0.1 - 169.254.255.254

Consider the following output from a dig command run on a Linux system. ; <<>> DiG 8.2 <<>> westsim111.com ;;res options:init recurs defnam dnsrch ;;got answer: ;;->>HEADER<<-opcode:QUERY, status: NOERROR, id:4 ;;flags: qr rd ra; QUERY:1, ANSWER:1, AUTHORITY:2, ADDITIONAL:0 ;;QUERY SECTION: ;; westsim111.com, type = A, class = IN ;;ANSWER SECTION: westsim111.com. 7h33m IN A 76.141.43.129 ;;AUTHORITY SECTION: westsim111.com. 7h33m IN NS dns1.deriatct111.com. westsim111.com. 7h33m IN NS dns2.deriatct222.com. ;;Total query time: 78 msec ;;FROM: localhost.localdomain to SERVER:default -- 202.64.49.150 ;;WHEN: Tue Feb 16 23:21:24 2005 ;;MSG SIZE sent: 30 rcvd:103 What is the IP address of the DNS server that performed this name resolution? - 76.141.43.129 - 202.64.49.150 - 16.23.21.24 - 192.168.1.100

202.64.49.150

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server? 10.0.0.1 - 10.255.255.254 172.16.0.1 - 172.31.255.254 169.254.0.1 - 169.254.255.254 192.168.0.1 - 192.168.255.254

3). 169.254.0.1 - 169.254.255.254

Your network follows the 100BaseFX specifications for Fast Ethernet, and uses half-duplex, multimode cable. What is the maximum cable segment length allowed? - 100 meters - 412 meters - 550 meters - 1,000 meters - 2,000 meters

412 meters

You want to maintain tight security on your internal network, so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable? - 53 - 80 - 42 - 443 - 21

53

Select the statement that best describes a broadcast storm. - A broadcast storm occurs when a network server loses its connection to the network, and the disconnected cable sends feedback messages that overwhelm the network cable capacity. - A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth. - A broadcast storm occurs when the amount of electrical interference on a cable exceeds acceptable levels, broadcasting a storm of noise, and preventing accurate data transfer. - A broadcast storm occurs when the level of TCP/IP transfers overwhelm a gateway.

A Broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth..

How does a proxy server differ from a packet filtering firewall? - A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer. - A proxy server includes filters for the session ID as well as the IP address and port number. - A proxy server can prevent unknown network attacks, while a packet filtering firewall can only prevent known attacks. - A proxy server is used to create a DMZ, while a packet filtering firewall can only be used for screened subnets.

A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.

An all-in-one security appliance is best suited for which type of implementation? - A remote office with no on-site technician. - An office with a dedicated network closet. - A company that transmits large amounts of time-sensitive data. - A credit card company that stores customer data.

A remote office with no on-site technician.

You have a network connected using a physical star topology. One of the drop cables connecting a workstation is removed. Which of the following best describes what happens to network communications? -No devices will be able to communicate. - All devices except the device connected with the drop cable will be able to communicate. - Devices on one side of the missing cable will be able to communicate with each other; devices on the other side of the missing cable will be able to communicate with each other. - Devices on one side of the missing cable will be able to communicate with each other; devices on the other side of the missing cable will not be able to communicate. - All devices will be able to communicate.

All devices except the device connected to the drop cable will be able to communicate.

Which of the following routing protocols is used by routers on the Internet for learning and sharing routes? - OSPF - IS-IS - EIGRP - BGP - RIP

BGP BGP (border gateway protocol) is the protocol used on the internet. ISPs use BGP to identify routes between ASs. Very large networks can use BGP internally, but typically only share routes on the internet if the AS has two (or more) connection to the internet through different ISPs.

The media access control method of all Ethernet networks is __________. - CSMA/CD - CSMA/CA - Token passing - Polling

CSMA/CD Carrier sense multiple access with collision detection (CSMA/CD) is the media access control method of all Ethernet networks. Click again to see term 👆

What is the minimum cable specification that supports 1000 Mbps Ethernet? - Cat 3 - Cat 4 - Cat 5 - Cat 5e - Cat 6 - Cat 7

Cat 5

Consider the following IP addresses. 1. 124.77.8.5 2. 131.11.0.9 3. 190.66.250.10 4. 196.5.89.44 Which list represents the IP address class of each listed IP address? - Class A, Class B, Class B, Class C - Class B, Class B, Class C, Class C - Class A, Class B, Class C, Class C - Class B, Class B, Class C, Class D

Class A, Class B, Class B, Class C.

You manage a network with a single switch. On each switch port, a hub connects multiple devices to the switch. Which condition are you most likely to experience on the network? - Collisions - Crosstalk - Attenuation - Echo - Interference

Collisions

Which of the following is a characteristic of static routing when compared to dynamic routing? - Routers use the hop count to identify the distance to a destination network. - All routes must be manually updated on the router. - Routers send packets for destination networks to the next hop router. - Routers can only use static routing when not connected to the Internet.

- All routes must be manually updated on the router. (static routing requires that entries in the routing table are configured manually. Network entries remain in the routing table until manually removed. WHen changes to the network occur, static entries must be added or removed. The next hop router is used with most routes to identify the next router in the path to the destination, regardless of whether the route is a static or dynamically-learned route. The hop count can be used by static or dynamic routes, depending on the routing protocol used. static routing can be used for private and public networks whether they are connected to the internet or not)

DRAG/DROP - Listed below are several DNS record types. Match the record type on the left with its function on the right. DRAG - A - CNAME - MX - PTR - AAAA DROP - Points a hostname to an IPv4 address. - Provides alternate names to hosts that already have a host record. - Points an IP address to a hostname. - Points a hostname to an IPv6 address. - Identifies servers that can be used to deliver mail.

- Points a hostname to an IPv4 address. = A - Provides alternate names to hosts that already have a host record. = CNAME - Points an IP address to a hostname. = PTR - Points a hostname to an IPv6 address. = AAAA - Identifies servers that can be used to deliver mail. = MX

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches? - Trunking - Spanning tree - PoE - 802.1x - Bonding

- Spanning tree

How do switches and bridges learn where devices are located on a network? - When a frame enters a port, the destination MAC address is copied from frame header. - When a frame enters a port, the source MAC address is copied from the frame header. - When a frame enters a port, the source IP address is copied from the frame header. - When a frame enters a port, the destination IP address is copied from the frame header.

- When a frame enters a port, the source MAC address is copied from the frame header. Bridges and switches learn addresses by copying the MAC address of the source device and placing it into the MAC address table. The port number which the frame entered is also recorded in the table and associated with the source MAC address. The switch or the bridge cannot record the destination MAC address because it does not know the port that is used to reach the destination device. Bridges and switches operate at Layer 2 and do not use IP addresses (which exist at Layer 3).

You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings; some of which are around 300 m apart. Multimode fiber-optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guidelines? (Choose two.) - 10GBaseSR - 10BaseFL - 10GBaseER - 1000BaseSX - 1000BaseCX - 1000BaseT

1). 1000BaseSX. 2). 10GBaseSR.

Which of the following use the CSMA/CD access method? Select all that apply. - 1000BaseT - 10BaseT - Token Ring - FDDI

1). 10BaseT 2). 1000BaseT CSMA/CD stands for Carrier Sense Multiple Access/Collision Detection. It defines the steps network devices take when two devies attempt to use a data channel simultaneously. Thernet networks use CSMA/CD, including 10BaseT, 10Base2 and 1000BaseT.

You would like to implement 10 Gbps Ethernet over a distance of 1 kilometer or greater. Which of the following would be the minimum requirement for the implementation? (Select two.) - Single mode fiber - Multimode fiber - 10GBaseSR standards - 10GBaseLR standards - 10GBaseER standards

1). 10GBaseLR standards 2). Single mode fiber

Which of the following is a valid IPv4 address? (Select two.) - 256.0.0.1 - 10.384.0.3 - 192.168.1.512 - 172.16.1.26 - 2.2.2.2 - 1.254.1.1024 - 254.7.1.417

1). 172.16.1.26 1). 2.2.2.2

You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select all that apply.) - 10.0.12.15 - 127.0.0.1 - 192.168.12.253 - 224.15.166.12 - 172.18.188.67 - 240.12.188.1 - 32.188.99.10

1). 172.18.188.67 2). 10.0.12.15 3). 192.168.12.253

What is the network address and subnet mask used by APIPA? (Select two.) - 169.254.0.0 - 255.255.0.0 - 255.0.0.0 - 255.255.255.0 - 169.255.0.0 - 169.0.250.0

1). 255.255.0.0 2). 169.254.0.0

Which of the following functions are performed by proxies? (Select two.) - Block employees from accessing certain websites - Cache web pages - Block unwanted packets from entering your private network - Store client files - Filter unwanted email - Give users the ability to participate in real-time text-based Internet discussions

1). Block employees from accessing certain Web sites 2). Cache web pages

Which of the following statements describe how VLANs affect broadcast traffic within an internetwork? (Select two.) - Devices on the same VLAN have the same subnet address. - Broadcast traffic is transmitted to all devices on all VLANs. - Broadcast traffic is only transmitted on VLAN1. Devices on separate VLANs share the same subnet address. - Broadcast traffic is transmitted only within a VLAN.

1). Broadcast traffic is transmitted only within a VLAN. 2). Devices on the same VLAN have the same subnet address.

You recently installed a new all-in-one security appliance in a remote office. You are in the process of configuring the device. You need to: • Increase the security of the device. • Enable remote management from the main office. • Allow users to be managed through Active Directory. You want to configure the device so you can access it from the main office. You also want to make sure the device is as secure as possible. Which of the following tasks should you carry out? (Select two.) - Change the default username and password. - Deny login from the device's WAN interface. - Configure the device's authentication type to use Active Directory. - Deny login from all external IP addresses. - Create an Active Directory user group and add all users to the group.

1). Configure the device's authentication type to use Active Directory 2). Change the default name and password

You are investigating the use of website and URL content filtering to prevent users from visiting certain websites. Which benefits are the result of implementing this technology in your organization? (Choose two.) - Enforcement of organization's Internet usage policy - An increase in bandwidth availability - Prevention of emails containing threats - Identification and disposal of infected content - Prevention of phishing attempts

1). Enforcement of the organization's Internet usage policy. 2). An increase in bandwidth availability.

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two.) - Greater cable distances without a repeater - Immunity to electromagnetic interference - Lower installation cost - Faster installation

1). Immunity to electromagnetic interference 2). Greater cable distances without a repeater

Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs? (Select two.) - Increased number of broadcast domains - Allowing broadcast traffic between subnets - Increased number of collision domains - Increased security - Redundant paths between two hosts

1). Increased security 2). Increased Number of broadcast domains

Which of the following connectors are used with fiber optic cables and include both cables in a single connector? (Select two.) - LC - ST - SC - MT-RJ - BNC

1). LC 2). MT-RJ

Which two of the following tasks do routers perform? - Route data based on logical network addresses - Maintain information about paths through an internetwork - Control access to the transmission media - Identify devices through hardware addresses - Multiplex signals onto the same transmission media - Route data based on hardware device addresses

1). Maintain information about paths through an internetwork. 2). Route data based on logical network addresses.

Which of the following routing protocols are classified as link state routing protocols? (Select two.) - OSPF - IS-IS - RIP - RIPv2 - EIGRP

1). OSPF 2). IS-IS

Which pins in an RJ45 connector are used to transmit data when used on a 100BaseT Ethernet network? (Select two.) - Pin 1 - Pin 2 - Pin 3 - Pin 4 - Pin 5 - Pin 6 - Pin 7 - Pin 8

1). Pin 1 2). Pin 2

Which of the following are advantages of using the Spanning Tree Protocol (STP) in network segmented bridges? (Select three.) - Prevents switching loops from forming. - Lets you provide redundancy by using more than one connection between devices, making your network more reliable. - Identifies the optimal path between network devices. - Calculates all the possible paths through the network and performs load balancing. - Minimizes the convergence time required for bridges to share network information.

1). Prevents message loops from forming 2). Identifies the optimal path between network devices. 3). Lets you provide redundancy by using more then one connection between devices, making your network more reliable.

Which three of the following functions are performed by the OSI Transport layer? - Data segmentation and reassembly - Reliable message delivery - End-to-end flow control - Consistent data formatting between dissimilar systems - Control media access, logical topology, and device identification - Format packets for delivery through the media - Path identification and selection

1). Reliable message delivery 2). Data segmentaion and reassembly 3). End-to-end flow control

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents? (Select two.) - Router - Bridge - Switch - Gateway - Hub -Repeater

1). Repeater 2). Hub A hub and a repeater send signals out all other ports. These devices do not examine the frame or the packet contents. A switch or a bridge use the MAC address in a frame for forwarding decisions. A router uses the IP address in a packet for forwarding decisions.

Which of the following features are common functions of an all-in-one security appliance? (Select two.) - Spam filtering - Bandwidth shaping - Password complexity - Content caching - Quality of Service

1). Spam filtering 2). Bandwidth shaping

Which of the following prevents access based on website ratings and classifications? - Content filter - Packet-filtering firewall - DMZ - NIDS

Content filter

You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use? - Rollover - Crossover - Straight-through - Loopback

Crossover

You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com. Which device would you use? - DNS server - Bandwidth shaper IDS - IPS - Load balancer

DNS server

Using the Netstat command, you notice that a remote system has made a connection to your Windows Server 2012 system using TCP/IP port 21. Which of the following actions is the remote system most likely to be performing? - Downloading a file - Downloading email - Downloading a web page - Performing a name resolution request

Downloading a file

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet? - Drop the packet. - Send the packet out both of its directly-connected networks as a broadcast frame. - Send the packet to both networks 192.168.3.0 and 192.168.4.0 to the next hop router. - Hold the packet in cache until a matching route is learned or configured.

Drop the packet

Which of the following is a valid IPv6 address? - 199.12.254.11 - FEC0::AB:9007 - FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A - FEC0:AB98::A7::9845:4567 - FEC0:AB04:899A

FEC0::AB:9007

You want to allow your users to download files from a server running the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability? - TCP - FTP - IP - TFTP - HTTP - HTML

FTP You should implement the File Transfer Protocol (FTP). It enables file transfers and supports user authentication. The Trivial File Transfer Protocol (TFTP) also enables file transfer, but does not support user authentication. The Simple Mail Transfer Protocol (SMTP) is used to transfer email message from email clients to email servers. The Lightweight Directory Access Protocol is used to access information about network resources stored in a directory server. The Secure Shell Protocol (SSH) is used to securely access the console prompt of a remote computer system. The Simple Network Management Protocol (SNMP) is used to remotely monitor and manage network devices and hosts.

Ethernet 100BaseFX networks use what type of cabling? - Fiber optic - Coaxial - Unshielded twisted pair - Shielded twisted pair

Fiber optic

Which of the following is the best device to deploy to protect your private network from a public untrusted network? - Firewall - Router - Hub - Gateway

Firewall

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet? - Drop the packet. - Forward the packet to the next hop router specified by the route to network 0.0.0.0. - Send the packet out both of its directly-connected networks as a broadcast frame. - Send the packet out both of its directly-connected networks to the next hop router.

Forward the packet to the next hop router specified by the route network 0.0.0.0

Which protocol is used on the World Wide Web to transmit Web pages to Web browsers? - HTTP - HTML - SMTP - NNTP

HTTP

Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers? - If the network has over 15 hops. - If the network is connected to the Internet using public addressing. - If the network is connected to the Internet using multiple ISPs. - If the network has over 15 areas and uses IPv6.

If the network is connected to the internet using multiple ISPs

At which of the following OSI layers does a router operate? - Layer 1 - Layer 2 - Layer 3 - Layer 4

Layer 3, network layer

Which of the following address types is shared by multiple hosts, and is used to form groups of computers that should receive the same data stream? -Unicast - Multicast - Broadcast - Simplex - Half-duplex

Multicast

Which type of address is the IP address 232.111.255.250? - Unicast - Multicast - Broadcast - Private

Multicast

You have a large TCP/IP network and want to keep hosts' real time clock synchronized. What protocol should you use? - NTP - SNMP - SMTP - NNTP - SAP

NTP

Which command displays network activity statistics for TCP, UDP, and IP? - netstat -s - telnet - nbtstat -s - nslookup - ping -s

Netstat -s

You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. Which of the following best describes what happens to network communications? - No devices will be able to communicate. - All devices except the device connected with the drop cable will be able to communicate. - Devices on one side of the break will be able to communicate with each other; devices on the other side of the break will be able to communicate with each other. - Devices on one side of the break will be able to communicate with each other; devices on the other side will not be able to communicate. - All devices will be able to communicate.

No devices will be able to communicate

You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MT-RJ connectors. You connect each module to the switch with 1 meter multimode patch cables. Will this implementation work? - Yes, all of the requirements for implementing a fiber optic network have been met. - No, standard fiber optic switches should not be used to create a backbone network for routers. - No, you should purchase fiber optic equipment that use FC connectors. - No, you shouldn't use multimode patch cables with single mode GBIC modules.

No, you shouldn't use multimode patch cables with single mode GBIC modules

Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)? - RIP - EIGRP - OSPF - IS-IS

OSPF

Which of the following best describes OSPF? - OSPF is a classless distance vector routing protocol. - OSPF is a classful distance vector routing protocol. - OSPF is a classless link-state routing protocol. - OSPF is a classful link-state routing protocol.

OSPF is a classless link-state routing protocol.

Which of the following is a firewall function? - Packet filtering - FTP hosting - Encrypting - Frame filtering - Protocol conversion

Packet filtering

You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights. You would like to run your Ethernet cables in this area.Which type of cable must you use? - Plenum - Cat 5e or Cat 6e - PVC - Fiber optic - STP

Plenum

You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the Internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the Internet. Why can't you access the server? - Private addresses are not accessible through the Internet. - The server has been assigned a multicast address. - The server must have an entry on a DNS server that exists on the Internet. - The server isn't using the default subnet mask.

Private addresses are not accessible through the internet.

Your computer has an IP address of 161.13.5.15. Your computer is on a: - Public network - Private network - Class C network - Multicast network

Public network

Of the following cables, which offer the best protection against EMI? - Cat 5 - Cat 5e - RG-6 - Single mode fiber optic

RG-6

Which of the following protocols has a limit of 15 hops between any two networks? - RIP - EIGRP - OSPF - IS-IS - BGP

RIP

Which of the following statements about RIP is true? - RIP is the routing protocol used on the Internet. - RIP is a link state routing protocol. - RIP uses hop counts as the cost metric. - RIP is suitable for large networks.

RIP uses hop counts as the cost metric

Which of the following standards is typically used in a rollover cable? - RS-232 - RG-6 - RG-58 - RJ-11

RS-232

Which process reduces the size of the routing table by advertising a single route as the destination for a group of contiguous subnets? - Route summarization - Route redistribution - First Hop Redundancy - Protocol EIGRP

Route summarization

Which of the following hardware devices links multiple networks and directs traffic between networks? - Router - Bridge - Hub - Repeater

Router A router is a device that links multiple networks and directs traffic between networks. Each network linked by routers has its own unique identifier called the "network number" or "network address."

In the OSI model, what is the primary function of the Network layer? - Allows applications to establish, use, and end a connection - Transmits data frames - Ensures that packets are delivered with no loss or duplication - Routes messages between networks

Routes messages between networks

Your company has just acquired another company in the same city. You are given the task of integrating the two e-mail systems so that messages can be exchanged between the e-mail servers. However, each network uses an e-mail package from a different vendor. Which TCP/IP protocol will enable messages to be exchanged between systems? - SMTP - ICMP - IMAP4 - FTP - POP3

SMTP

An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do? - Send the frame out all 8 ports. - Send the frame out ports 2-8. - Send the frame out the destination port. - Drop the frame.

Send the frame out ports 2-8.

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches? - Trunking - Spanning tree - PoE - 802.1x - Bonding

Spanning tree

You are configuring the DHCP Relay Agent role service on a Windows server. Which of the following is a required step for the configuration? - Specify which server network interface the agent listens on for DHCP messages. - Use the ip helper-address command to specify the remote DHCP server. - Connect an RFC 1542 compliant router to the Windows server. - Configure the Windows server to be on the same subnet as the DHCP server.

Specify which server network interface the agent listens on for DHCP messages.

You are an application developer and are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability? - TCP - UDP - IP - RIP - FTP - TFTP

TCP

You are an administrator for a large company. You are setting up a computer at a worker's home so he can telecommute while he recovers from surgery. You want to connect to the UNIX server at the office to update his account information. Which utility should you use to accomplish this task? - Telnet - Traceroute - FTP - Ping

Telnet

A network is connected following the IEEE 802.3 specifications. Which of the following best describes when a device can transmit messages? - The device with the token can use the transmission media. - The device listens to determine if the transmission media is free. - The device is notified of its turn to send messages. - The device requests permission from a controlling device. - The device transmits whenever it is ready.

The device listens to determine if the transmission media is free.

What information does the next hop entry in a routing table identify? - The first router in the path to the destination network. - The last router in the path to the destination network. - The number of routers that the packet must go through to reach the destination network. - A backup router that is used for forwarding packets addressed to unknown networks.

The first router in the path to the destination network.

What is the primary purpose of gateway redundancy? - To overcome a single point of failure on the next hop router. - To provide a default gateway so hosts may communicate outside their local subnet. - To prevent the overloading of the default gateway's CPU. - To overcome the limitations of IPv4 and provide a redundant IP addressing scheme for the local subnet.

To overcome a single point of failure on the next hop router.

What device sends signals from a computer onto a network? - Transceiver - Router - Cable - Gateway

Transceiver A transceiver (short for transmitter/receiver) sends signals to and receives signals from the network. It translates the parallel data stream of the computer to the serial data stream of the network and vice versa. Most transceivers are now built into network interface cards (NICs).

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches? - Trunking - Spanning tree - PoE - 802.1x - Bonding

Trunking

You administer a network with Windows 2000 and UNIX servers, and Windows 2000 Professional, Windows 98, and Macintosh clients. A user of a Windows 98 computer calls you one day and says he is unable to access resources on the network. You type ipconfig on the user's computer and receive the following output: 0 Ethernet adapter: IP address. . . . . . . . . : 169.254.1.17 Subnet Mask . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . : You also check your NIC and see the link light on. What might the problem be? - Unavailable DHCP server - The user changed the configuration of the computer - Bad NIC - Missing default gateway - Misconfigured DNS server

Unavailable DHCP server

Which type of address is the IP address 198.162.12.254/24? - Unicast - Broadcast - Multicast - Private

Unicast

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to the switch. You want to allow visitors to plug into these ports to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. Which feature should you implement? - Port authentication - VLANs - Spanning tree - PoE

VLANs

When would you typically use an RJ-11 connector? - When using Cat 3 cables. - When using Cat 5 or higher cables. - When using RG-6 cables. - When connecting a phone to a phone line. - When using single mode fiber optic cables. - When using multimode fiber optic cables.

When connecting a phone to a phone line.

You are implementing a DHCP server for your segment. Your segment's IP address is 192.168.1.0. Your default gateway address is 192.168.1.254. Your DNS server address is 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments. You configured the 03 Router option on your DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP addressing information dynamically, your users complain that they are unable to access websites on the Internet. How can you resolve this problem? - You can't implement a DHCP server in conjunction with a NAT router. - You must configure Automatic Private IP Addressing (APIPA) on each workstation using default settings. - You must configure your DHCP server with an option that enables IP forwarding (Option19). - You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06). - You must implement a BOOTP server instead of a DHCP server. - You must configure your DHCP server with an option that delivers the IP address of the default World Wide Web server (Option 72).

You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06).

In which of the following situations might you use an RJ-11 connector? - You want to connect the 10BaseT network card in your computer to a switch. - You want to connect your computer to the Internet with a dial-up connection. - You want to upgrade your 10BaseT network to 100BaseT. - You want to test a network cable to see if there is a break in the line.

You want to connect your computer to the Internet with a dialup connection.

You work in an office that uses Linux servers, NetWare servers, and Windows NT 4.0 servers. The network uses both the TCP/IP and IPX/SPX protocols. The Linux server is used as an FTP server. Today you have received several calls from people who are unable to contact the Linux server at its known IP address. You are sitting at the Linux server and want to check its IP address. Which command should you use? - ipconfig - ifconfig - winipcfg - route

ifconfig

Your computer is sharing information with a remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection? - netstat - nbtstat - ipconfig - arp - ping

netstat (checks the status of a TCP connection)

Mary calls to tell you that she can't connect to an intranet server called WebSrv1. From her computer, you ping the server's IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem? - nslookup - nbtstat - arp - netstat - tracert

nslookup

You work in an office that uses NetWare servers and Windows NT 4.0 servers. The network uses both the TCP/IP and IPX/SPX protocols. You are sitting at a workstation that uses Windows 95 OSR2. An application you are using is unable to contact a Windows NT server named FileSrv2. Which command can you use to determine whether your computer can still contact the server? - ping - tracert - nwlookup - arp

ping

Which of the following commands would display the output shown here? BLACK AND WHITE GRAPHIC - route print - mtr - host - ifconfig

route print

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. The office has two Windows 2000 servers, two UNIX servers, one Windows NT server, 90 Windows 98 clients, 40 Windows 2000 Professional clients, and five Macintosh clients. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is not working properly? - tracert - netstat - nbtstat - nslookup

tracert


Ensembles d'études connexes

French Oral Presentation: Les Fausses Nouvelles (Fake news) - A qui la faute?

View Set

Economics Chapter 5 practice quiz BYUH

View Set

Chapter 8 Health- Multiple Choice

View Set

Emperical Formula of Copper Oxide

View Set

PR Writing Quiz Questions/Answers

View Set