ITM 301
1. Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? a. 802.11g b. 802.11ac c. 802.11b d. 802.11n
802.11n
1. Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions? a. Telnet b. Remote Desktop c. SFTP d. SSH
: b. Remote Desktop
1. 802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size channels does 802.11ac support?
Answer: 20, 40, 80, and (optional) 160 MHz channels
1. FTP sometimes uses a random port for data transfer, but an FTP server always, unless programmed otherwise, listens to the same port for session requests from clients. What port does an FTP server listen on?
Answer: 21
1. Suppose you want to change the default port for RDP as a security precaution. What port does RDP use by default, and from what range of numbers should you select a private port number?
Answer: 3389; 49152 through 65535
1. Which Wi-Fi frequency band offers 24 unlicensed communications channels in the United States?
Answer: 5 GHz band
1. What is the fundamental distinction between a Layer 2 switch and a router?
Answer: A Layer 2 switch belongs only to its local network, and a router belongs to two or more networks.
1. What is the fundamental distinction between a MAN and a WAN?
Answer: A MAN covers a small geographical area, and a WAN covers a large geographical area.
1. You're setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they're waiting on the children. However, she's concerned about keeping her own data private. What wireless feature can you configure on her AP to meet her requests?
Answer: A guest network
1. What is the fundamental distinction between a node and a host?
Answer: A host is a computer that hosts a resource on the network, and a node is any computer or device that can be addressed on the network.
1. Why is it important to use plenum-rated cabling in the area above the ceiling tile?
Answer: A plenum-rated cable is coated with a flame-resistant jacket that produces less smoke than regular cable coated with PVC (polyvinyl chloride). In the event of a fire, smoke produced by plenum cabling is less toxic than that produced by PVC cabling.
1. What is the difference between short circuits and open circuits?
Answer: A short circuit is one where connections exist in places they shouldn't, while an open circuit is one where needed connections are missing.
1. Which IoT wireless standard is used to sync data from a smartwatch, bike computer, and smart phone to a single user account?
Answer: ANT+
What is the name of the domain controller database that Windows Server 2016 uses to store data about user access and resources on the network?
Answer: Active Directory
1. What kind of tool can measure the distance to the location of damage in a cable?
Answer: Answers may include cable performance tester, line tester, certifier, or network tester.
1. What are some elements that are typically included in network diagrams?
Answer: Answers may include: physical layout, logical topology, IP address reserves, names of major network devices, and types of transmission media
1. How can you go about gathering the information needed to assemble a thorough operations manual?
Answer: Answers may include: visits to data rooms, an examination of servers and desktops, a review of receipts for software and hardware purchases, and the use of a protocol analyzer or network management software package
1. A user complains that he cannot access a particular website, although he is able to access other websites. At which layer of the OSI model should you begin troubleshooting this problem?
Answer: Application layer
1. A user complains that Skype drops her videoconference calls and she must reconnect. At which layer of the OSI model should you begin troubleshooting? Which OSI layer is responsible for not dropping the Skype connection?
Answer: Application layer Answer: Session layer
1. How is latency measured, and in what unit?
Answer: By calculating a packet's RTT, or the length of time it takes for a packet to go from sender to receiver, then back from receiver to sender. RTT is usually measured in milliseconds.
1. For what time period should you schedule a network change?
Answer: During off-hours (unless it's an emergency)
1. What is the difference between dynamic ARP table entries and static ARP table entries?
Answer: Dynamic ARP table entries are created when a client makes an ARP request, whereas static ARP table entries are entered manually using the ARP utility.
1. To exchange information, two antennas must be tuned to the same __________.
Answer: Frequency or channel
1. What feature of a site survey maps the Wi-Fi signals and other noise in your location?
Answer: Heat map
1. At the Network layer, what type of address is used to identify the receiving host?
Answer: IP address
1. What database does a router consult before determining the most efficient path for delivering a message?
Answer: Its routing table
1. What fiber is used in fiber-optic cabling to protect the inner core and prevent the cable from stretching?
Answer: Kevlar, a polymeric fiber
1. You've decided to run an Nmap scan on your network. What app could you open to perform this task? Choose all that apply. a. Zenmap b. Microsoft Edge c. Command Prompt d. PowerShell
Answer: a. Zenmap, c. Command Prompt, and d. PowerShell
1. Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting? a. All devices on the Internet b. All devices on your local network c. The one device that is configured with this IP address d. No devices
Answer: b. All devices on your local network
1. In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2016. Which networking model can the network now support that it could not support without the upgrade? a. Hybrid b. Client-server c. Star-bus d. Ring
Answer: b. Client-server
1. What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? a. Layer 4 b. Layer 3 c. Layer 2 d. Layer 1
Answer: b. Layer 3
1. Which type of address is used at the Transport layer to identify the receiving application? a. IP address b. Port c. MAC address d. Protocol
Answer: b. Port
1. If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack? a. AC adapter b. Rack ears c. Padded feet d. Large fans
Answer: b. Rack ears
1. Which protocol's header would a Layer 4 device read and process? a. IP b. TCP c. ARP d. HTTP
Answer: b. TCP
1. Which one of the following wireless transmission types requires a clear LOS to function? a. Bluetooth b. NFC c. Infrared d. Wi-Fi
Infrared
1.What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV? a. Coaxial cable, F-connector b. Twisted-pair cable, RJ-11 c. Copper cable, RJ-45 d. Fiber-optic cable, MTRJ
a. Coaxial cable, F-connector
1. What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network? a. Default gateway b. DNS server c. Root server d. DHCP server
a. Default gateway
1. Which two protocols manage neighbor discovery processes on IPv4 networks? a. ICMP and ARP b. IPv4 and IPv6 c. TCP and UDP d. BGP and OSPF
a. ICMP and ARP
1. Which email protocol allows an email client to read mail stored on the mail server? a. IMAP4 b. SMTP c. TCP d. POP3
a. IMAP4
1. Which fiber connector contains two strands of fiber in each ferrule? a. MTRJ b. SC c. ST d. LC
a. MTRJ
1. You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss? a. Rogue AP b. War driving c. Bluesnarfing d. Hidden node
a. Rogue AP
1. Which computers are the highest authorities in the Domain Name System hierarchy? a. Authoritative name servers b. Root servers c. Top-level domain servers d. Primary DNS servers
a. Root servers
1. Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin? a. White/orange b. White/green c. Brown d. Blue
a. White/green
1. If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use? a. ipconfig /release b. ipconfig /renew c. ifconfig /release d. ifconfig /renew
a. ipconfig /release
1. Which routing protocol does an exterior router use to collect data to build its routing tables? a. RIPv2 b. BGP c. OSPF d. IP
b. BGP
1. Which OSI layer is responsible for directing data from one LAN to another? a. Transport layer b. Network layer c. Data Link layer d. Physical layer
b. Network layer
1. You need to connect a new network printer to a nearby wall jack. What kind of cable should you use? a. Fiber-optic cable b. Patch cable c. Backbone cable d. Plenum-rated cable
b. Patch cable
Which two encryption protocols might be used to provide secure transmissions for browser and Web server communications? a. HTTP and HTTPS b. SSL and TLS c. SSL and HTTP d. TCP and UDP
b. SSL and TLS
1. Which kind of multiplexing assigns slots to nodes according to priority and need? a. WDM (wavelength division multiplexing) b. STDM (statistical time division multiplexing) c. TDM (time division multiplexing) d. CWDM (coarse wavelength division multiplexing)
b. STDM (statistical time division multiplexing)
1. What kind of route is created when a network administrator configures a router to use a specific path between nodes? a. Trace route b. Static route c. Default route d. Best path
b. Static route
1. Which part of a MAC address is unique to each manufacturer? a. The network identifier b. The OUI c. The device identifier d. The physical address
b. The OUI
1. A routing protocol's reliability and priority are rated by what measurement? a. Routing table b. MTU c. Latency d. AD
AD
1. Give three examples of routing metrics used by routers to determine the best of various available routing paths.
Answer: (Any three) Hop count, theoretical bandwidth, actual throughput, path latency (or delay), path load, MTU, cost, reliability, network topology
1. List three IGPs (interior gateway protocols).
Answer: (Any three) RIP, RIPv2, OSPF, IS-IS, EIGRP
1. You have decided to use SNAT and PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP for all five clients in your office to be able to access servers on the Internet?
Answer: 1
1. What four functions do all routers perform?
Answer: 1. Connect dissimilar networks. 2. Interpret Layers 3 and 4 addressing and other information. 3. Determine the best path for data to follow. 4. Reroute traffic if a primary path is down but another path is available.
1. How many bits does an IPv6 address contain?
Answer: 128 bits
1. What is the range of addresses that might be assigned by APIPA?
Answer: 169.254.0.1 through 169.254.255.254
1. You are the network manager for a computer training center that allows students to bring their own laptops to class for learning and taking notes. Students need access to the Internet, so you have configured your network's DHCP server to issue IP addresses automatically. Which DHCP option should you modify to make sure you are not wasting addresses used by students who have left for the day?
Answer: Lease time
1. There is only one ________ per network, but there can be many ________ connecting internal portions of the network.
Answer: MDF, IDFs
1. Which protocol is supported by ICMPv6 to facilitate neighbor discovery on an IPv6 network?
Answer: NDP (Neighbor Discovery Protocol)
1. What characteristic of optical transmissions is primarily responsible for the distance limitations of fiber-optic cabling?
Answer: Optical loss
1. You issue a transmission from your workstation to the following socket on your LAN: 10.1.1.145:110. Assuming your network uses standard port designations, what Application layer protocol handles your transmission?
Answer: POP3
1. At the Data Link layer, which type of network address is used to identify the receiving node?
Answer: Physical address, MAC address, hardware address, or Data Link layer address
1. A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?
Answer: Physical layer Answer: Data Link layer and Physical layer
1. When running a scan on your computer, you find that a session has been established with a host at the address 208.85.40.44:80. Which Application layer protocol is in use for this session? What command-line utility might you use to determine which computer is the host?
Answer: Port 80 indicates this an HTTP session. Answer: nslookup can identify the domain name of the host at that IP address
1. Which two fields in an Ethernet frame help synchronize device communications but are not counted toward the frame's size?
Answer: Preamble and SFD
1. What is the unit of measurement that defines the space available in a rack? How tall are standard racks?
Answer: Rack unit; the industry standard height is 42U (about 6 feet)
1. Which fiber transceiver is the same size as SFP transceivers, but can support network speeds over 10 Gbps?
Answer: SFP+
1. Suppose you're assisting with a cable installation using fiber-optic cabling that will support Gigabit Ethernet. You're approved to install segments up to 4000 m in length. What kind of cable are you using?
Answer: SMF
1. What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At which layer do the two protocols work?
Answer: Segment Answer: Datagram Answer: Transport layer
1. Signals traveling through areas in which many wireless communications systems are in use will exhibit a lower _______________ due to the higher proportion of noise.
Answer: Signal-to-noise ratio
1. In a large organization, how do you typically request permission to perform a network change?
Answer: Submit a change request document.
1. What three characteristics about TCP distinguish it from UDP?
Answer: TCP is connection-oriented, uses sequencing and checksums, and provides flow control.
1. Why is SMF more efficient over long distances than MMF?
Answer: The core of SMF is much narrower than that of MMF, and reflects very little. The light does not disperse as much along the fiber.
1. Why do APC ferrules create less back reflection than UPC ferrules?
Answer: The end faces are placed at an angle to each other, so the reflection is sent back in a different direction than the source of the signal.
1. When a wireless signal encounters a large obstacle, what happens to the signal?
Answer: The signal reflects, or bounces back, toward its source.
1. Why is it important to use a structured cabling standard when installing and managing cabling systems?
Answer: The standard suggests how networking media can best be installed to maximize performance and minimize upkeep.
1. What process is used to establish a TCP connection?
Answer: Three-way handshake
1. Why is it important to minimize cable clutter in a rack?
Answer: To help prevent airflow blockages and heat buildup
1. What is a twist ratio, and why is it important?
Answer: Twist ratio is the number of twists per meter or foot. The more twists per foot in a pair of wires, the more resistant the pair will be to crosstalk or noise.
1. Which kind of antenna is used in a point-to-point link, especially over long distances?
Answer: Unidirectional or directional
1. Why do wireless networks experience a greater reduction in throughput compared with wired networks?
Answer: Wireless networks experience a high number of collisions and require greater overhead on each transmission, resulting in a significant reduction in throughput compared to wired networks.
1. A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill? a. Look at whether the device is located on the ISP's side of the demarc. b. Look at the manufacturer information on the device's label. c. Look at purchase records for the device to determine when it was acquired. d. Look at what kinds of cables are connected to this device.
Answer: a. Look at whether the device is located on the ISP's side of the demarc.
1. Which of the following devices are you likely to find in the MDF? Choose all that apply. a. Routers b. Switches c. Network printer d. KVM switch
Answer: a. Routers, b. Switches, and d. KVM switch
1. You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why? a. The caching and primary DNS servers, because the caching server is requesting zone transfers from the primary server b. The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server c. The root and primary DNS servers, because the primary server is requesting zone transfers from the root server d. The web server and primary DNS server, because the web server is requesting zone transfers from the primary DNS server
Answer: b. The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server
1. What type of diagram shows a graphical representation of a network's wired infrastructure? a. Rack diagram b. Wiring schematic c. Network map d. Network topology
Answer: b. Wiring schematic
1. Which of these is considered a secure place to store a list of documented network passwords? a. The CEO's smartphone b. A sticky note under the keyboard c. A password manager d. The MDF
Answer: c. A password manager
1. Which of these categories of twisted-pair cable can support Gigabit Ethernet? a. Cat 5, Cat 6, Cat 7 b. Cat 5e, Cat 6, Cat 3 c. Cat 5e, Cat 6a, Cat 7 d. Cat 6, Cat 7a, Cat 5
Answer: c. Cat 5e, Cat 6a, Cat 7
1. In Question 8, suppose a new switch is connected to the first switch by way of a network cable, and three computers are connected to the new switch. Which network topology is now used? a. Hybrid b. Mesh c. Star-bus d. Star
Answer: c. Star-bus
1. Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet? a. VoIP PBX b. VoIP endpoint c. VoIP gateway d. VoIP switch
Answer: c. VoIP gateway
1. What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source? a. Source port b. Acknowledgement number c. DiffServ d. Checksum
Answer: d. Checksum
1. A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her? a. DF b. Work area c. CEO's office d. Entrance facility
Answer: d. Entrance facility
1. When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself? a. FF00::/8 b. 2001::/64 c. 2001::/3 d. FE80::/10
Answer: d. FE80::/10
1. What is the first step of inventory management? a. Interview users. b. Back up network data. c. List an administrative account's username and password for each device on a network. d. List all components on the network.
Answer: d. List all components on the network.
1. A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use? a. Star-bus b. Ring c. Hybrid d. Peer-to-peer
Answer: d. Peer-to-peer
1. A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use? a. Hybrid b. Mesh c. Star-bus d. Star
Answer: d. Star
1. You have just set up a new wireless network at your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. What command will give you the information you need?
Answer: ifconfig -a
1. While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS server. What command-line utility can you use to assign the correct DNS server IP address?
Answer: nslookup (in interactive mode)
1. Which Linux utility provides output similar to Wireshark's?
Answer: tcpdump
1. Which transmission characteristic is never fully achieved? a. Latency b. Throughput c. Bit rate d. Bandwidth
Bandwidth
1. A hacker takes advantage of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred? a. Data breach b. Bluejacking c. War driving d. Bluesnarfing
Bluesnarfing
In the client server model, what is the primary protocol used for communication? A. FTP B. TCP C.HTTP D.SSL
C. HTTP
1. Which kind of crosstalk occurs between wire pairs near the source of the signal? a. Alien b. Tx/Rx reverse c. FEXT d. NEXT
NEXT
1. A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data? a. NFC b. Bluetooth c. Z-Wave d. ANT+
NFC
1. What decimal number corresponds to the binary number 11111111? a. 255 b. 256 c. 127 d. 11,111,111
a. 256
1. Which Carrier Sense technology is used on wireless networks to reduce collisions? a. CSMA/CD b. 802.11 c. CSMA/CA d. SSID
a. CSMA/CD
1. Which Bluetooth class has the highest power output? a. Class 1 b. Class 2 c. Class 3 d. They all have equal power output
a. Class 1
1. What is the Internet standard MTU? a. 65,535 bytes b. 1,522 bytes c. 1,500 bytes d. 9,198 bytes
c. 1,500 bytes
1. What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions? a. Cat 5e b. Cat 5 c. Cat 6a d. Cat 7
c. Cat 6a
1. You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for? a. Guest network b. Bluejacking c. Evil twin d. Brute force attack
c. Evil twin
1. hat type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable? a. Dirty connectors b. Wavelength mismatch c. Fiber type mismatch d. Tx/Rx reverse
c. Fiber type mismatch
1. Which type of DNS record identifies an email server? a. AAAA record b. CNAME record c. MX record d. PTR record
c. MX record
1. At which OSI layer does IP operate? a. Application layer b. Transport layer c. Network layer d. Data Link layer
c. Network layer
1. Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair? a. TDR b. Tone generator c. Tone locator d. Toner
c. Tone locator
1. Which of these commands is available only in Linux? a. ping b. ipconfig c. dig d. nslookup
c. dig
1. What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band? a. ZigBee b. DSSS c. RTS/CTS d. FHSS
d. FHSS
1. When a router can't determine a path to a message's destination, where does it send the message? a. Default gateway b. Routing table c. Administrative distance d. Gateway of last resort
d. Gateway of last resort
1. Which email protocol allows an email client to download email messages to the local computer? a. IMAP4 b. SMTP c. TCP d. POP3
d. POP3