IT-212 Module 3 - NP6.0 Exam
Which of the following is the open standard for tagging Layer 2 frames? 802.1q NDP RFC1918 ARP
802.1q
Which of the following is true about a network-based firewall? A network-based firewall is installed at the edge of a private network or network segment. A network-based firewall is less expensive and easier to use than host-based firewalls. A network-based firewall is installed on a single computer. A network-based firewall are considered software firewalls.
A network-based firewall is installed at the edge of a private network or network segment.
How does a proxy server differ from a packet-filtering firewall? A proxy server operates at the Application layer, while a packet-filtering firewall operates at the Network layer. A proxy server includes filters for the session ID as well as the IP address and port number. A proxy server is used to create a screened subnet, while a packet-filtering firewall can only be used with screened subnets. A proxy server can prevent unknown network attacks, while a packet-filtering firewall can only prevent known attacks.
A proxy server operates at the Application layer, while a packet-filtering firewall operates at the Network layer.
Which of the following protocols prescribes what to do when a data channel is in use on a half-duplex device? NDP Auto-MDI-X CSMA/CD ARP
CSMA/CD
What does the ip address dhcp command allow you to do? Configure a switch to obtain an IP address from a DHCP server. Configure a switch to act as a DHCP server. Specify the DHCP relay server for forwarding DHCP packets. Send the DHCP server address for all connected devices.
Configure a switch to obtain an IP address from a DHCP server.
Which level of the OSI model does a Layer 2 switch operate at? Session layer Data Link layer Transportation layer Network layer
Data Link layer
Which of the following routing protocols is a hybrid that uses a composite number for its metric based on bandwidth and delay? RIP BGP EIGRP OSPF
EIGRP
Jake is a network administrator for a hospital. There is medical equipment that relies on having uninterrupted internet connectivity. Which of the following types of routing protocols should Jake focus on to ensure that the hospital's network connectivity remains reliable? Distance vector routing protocols Link state routing protocols Interior dynamic routing protocols Exterior dynamic routing protocols
Exterior dynamic routing protocols
Which of the following chains is used for incoming connections that aren't delivered locally? Output Forward Drop Reject
Forward
You have been given a laptop to use for work. You connect the laptop to your company network, use the laptop from home, and use it while traveling. You want to protect the laptop from internet-based attacks. Which solution should you use? Proxy server Host-based firewall VPN concentrator Network-based firewall
Host-based firewall
Under which of the following circumstances might you implement BGP on your company network and share routes with internet routers? If the network is connected to the internet using public addressing. If the network is connected to the internet using multiple ISPs. If the network has over 15 areas and uses IPv6. If the network has over 15 hops.
If the network is connected to the internet using multiple ISPs.
Match each switch management method on the left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all. Drag In-band management Out-of-band management Drop Competes with normal network traffic for bandwidth. Uses a dedicated communication channel. Must be encrypted to protect communications from sniffing. Does not compete with normal network traffic for bandwidth. Affected by network outages.
In-Band Management -Competes with normal network traffic for bandwidth. -Must be encrypted to protect communications from sniffing. -Affected by network outages. Out-of-band management -Uses a dedicated communication channel. -Does not compete with normal network traffic for bandwidth.
As a network administrator, you have 10 VLANs on your network that need to communicate with each other. Which of the following network devices is the BEST choice for allowing communication between 10 VLANs? Layer 2 switch Load balancer Repeater Layer 3 switch
Layer 3 switch
On your network, you have a VLAN for the sales staff and a VLAN for the production staff. Both need to be able to communicate over the network. Which of the following devices would work BEST for communication between VLANs? Load balancer Layer 3 switch Repeater Layer 2 switch
Layer 3 switch
Match each type of switch on the left with its corresponding characteristics on the right. Each switch type may be used once, more than once, or not at all. Unmanaged switch Managed switch Commonly sold at retail stores. Provides port security features. Supports VLANs. Provides very few configuration options. Can be configured over a network connection. Can be configured over a dedicated communication channel.
Managed Switch -Provide port security features.-Support VLANs. -Can be configured over a network connection. -Can be configured over a dedicated communication channel. Unmanaged switch -Commonly sold at retail stores. -Provide very few configuration options.
Which of the following is the protocol used for address resolution when you switch from IPv4 to IPv6? NDP CSMA/CD ARP Auto-MDIX
NDP
You are configuring a switch so that you can manage it using PuTTY from the same network segment. On the switch, you enter the following commands: switch#config terminal switch(config)#interface vlan 1 switch(config-if)#ip address 192.168.1.10 255.255.255.0 Will this configuration work? Answer No. The no shutdown command needs to be entered. No. The ip default-gateway command needs to be set. No. The switch needs to obtain an IP address from the DHCP server using the ip address dhcp command. Yes. The switch can now be accessed by PuTTY using the IP address 192.168.1.10.
No. The no shutdown command needs to be entered.
Which of the following is required to establish a new network switch and configure its IP address for the first time? Client-to-site VPN Site-to-site VPN Out-of-band management In-band management
Out-of-band management
Which of the following methods is best to have when a network goes down? Out-of-band management Site-to-site VPN Client-to-site VPN In-band management
Out-of-band management
Which options are you able to set on a firewall? (Select three.) Port number Digital signature Checksum Acknowledgement number Sequence number Packet source address Packet destination address
Port number Packet source address Packet destination address
Based on the diagram, which type of proxy server is handling the client's request? Reverse proxy server Open proxy server Circuit-level proxy server Forward proxy server
Reverse proxy server
Which of the following BEST describes dynamic routing? Routing entries are manually added to routing tables. Routing is done within an autonomous system. Routers learn about networks by sharing routing information with each other. Routing is done between autonomous systems.
Routers learn about networks by sharing routing information with each other.
Which of the following has the least default administrative distance? Static route to an IP address RIP External BGP OSPF
Static route to an IP address
You have only one physical interface but want to connect two IP networks. Which of the following would allow you to do so? The sticky feature A loopback address Virtual IPs Subinterfaces
Subinterfaces
A switch receives a frame with a destination MAC address that is not found in its MAC address table. What happens next? The frame stops at the switch and is not forwarded until the destination MAC address is manually added to the MAC address table. The frame is rejected and returned to the source host. The frame is replicated and sent to every active port on the switch except the source port. The frame is replicated and sent to every active port on the switch.
The frame is replicated and sent to every active port on the switch except the source port.
You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer Which of the following should you use in this situation? VPN Spanning Tree Port security VLAN
VLAN
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned both networks. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do? Stop and restart the RIP protocol on the router. Manually reconfigure the default route to point to the new next hop router. Wait for convergence to take place. Force RIP to perform an immediate update.
Wait for convergence to take place.
Which of the following is true about a firewall? Firewalls protect against email spoofing attacks. Host-based firewalls and network-based firewalls can be installed separately, but they cannot be placed together to provide multiple layers of protection. You must manually specify which traffic you want to allow through the firewall. Everything else is blocked. Implicit deny is used to deny permissions to a specific user even when the rest of the user's group is allowed access.
You must manually specify which traffic you want to allow through the firewall. Everything else is blocked.