Microsoft Networking Exam Study

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The loopback address of your computer is: 10.0.1.1 169.254.0.5 192.168.1.1 127.0.0.1

127.0.0.1; 127.0.0.1 is the IPv4 loopback address.

How many bits are in an Internet Protocol version 6 (IPv6) address? 32 64 128 256

128 bits

When a client computer is unable to reach a DHCP server, it will automatically assign an IP address in what range? 127.0.0.0-127.0.0.255 169.254.0.0-169.254.255.255 192.168.100.0-192.168.100.255 10.0.0.0-10.0.0.255

169.254.0.0-169.254.255.255; 169.254.0.0-169.254.255.255 is the APIPA address range. An APIPA address is used when the DHCP server is not available.

Your home computer is having problems accessing the Internet. You suspect that your Internet router's DHCP service is not functioning, so you check your computer's IP address. Which address indicates that your router's DHCP service is NOT functioning? 169.254.1.15 172.16.1.15 192.168.1.15 10.19.1.15

169.254.1.15; 169.254.1.15 is an APIPA address. An APIPA address is used when the DHCP server is not available.

Which of these is a public address space? 192.168.0.0/16 197.16.0.0/12 10.0.0.0/8 172.16.0.0/12

197.16.0.0

Which of these addresses is a multicast address? 127.0.0.1 169.254.0.1 192.168.0.1 224.0.0.1

224.0.0.1; The full range of multicast addresses is from 224.0.0.0 to 239.255.255.255.

Which subnet mask is valid? 255.255.255.240 255.255.255.228 255.255.255.164 255.255.255.245

255.255.255.240

The default port used for SMTP is: 23 25 80 8080

25; SMTP by default uses TCP port 25.

What is the bit rate for a North American T3 circuit? 6.312 Mbit/s 44.736 Mbit/s 274.176 Mbit/s 400.352 Mbit/s

44.736 Mbit/s; Data Rates. DS3/T3=44.7 Mbp

Which of the following is a public IP address? 10.156.89.1 68.243.78.221 172.16.152.48 192.168.25.101

68.24.78.221; Incorrect: The private address space specified in RFC 1918 is defined by the following three address blocks: not D: 192.168.0.0/16 The 192.168.0.0/16 private network can be interpreted either as a block of 256 class C network IDs or as a 16-bit assignable address space (16 host bits) that can be used for any subnetting scheme within the private organization. The 192.168.0.0/16 private network allows the following range of valid IP addresses: 192.168.0.1 to 192.168.255.254. Not A: 10.0.0.0/8 The 10.0.0.0/8 private network is a class A network ID that allows the following range of valid IP addresses: 10.0.0.1 to 10.255.255.254. The 10.0.0.0/8 private network has 24 host bits that can be used for any subnetting scheme within the private organization. Not C: 172.16.0.0/12 The 172.16.0.0/12 private network can be interpreted either as a block of 16 class B network IDs or as a 20-bit assignable address space (20 host bits) that can be used for any subnetting scheme within the private organization. The 172.16.0.0/12 private network allows the following range of valid IP addresses: 172.16.0.1 to 172.31.255.254. Reference: Technet, Public and Private Addresses.

Which two are published IEEE 802.11 wireless transmission standards? (Choose two.) 802.1 If 802.11g 802.11k 802.11m 802.11n

802.11g, 802.11n; The 802.11 family consists of a series of half-duplex over-the-air modulation techniques that use the same basic protocol. 802.11-1997 was the firs wireless networking standard in the family, but 802.11b was the first widely accepted one, followed by 802.11a, 802.11g, 802.11n and 802.11ac.

Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies? 802.11a 802.11b 802.11g 802.11n

802.11n; IEEE 802.11n-2009, commonly shorted to 802.11n, is a wireless networking standard that uses multiple antennas to increase data rates.

In a wireless network that requires an SSL certificate, what handles the SSL certificate? 802.1x WPA2-PSK WPA-PSK WEP

802.1x; This deployment scenario requires server certificates for each NPS server that performs 802.1x authentication.

Which of these represents the Internet Protocol version 6 (IPv6) loopback address? 127.0.0.1 192.168.0.1 FECO:A8C0::AA01 ::1

::1; The localhost (loopback) address, 0:0:0:0:0:0:0:1, and the IPv6 unspecified address, 0:0:0:0:0:0:0:0, are reduced to ::1 and ::, respectively.

What are two advantages of using star topology rather than ring topology in a computer lab workgroup? Failure of a central connectivity device does not bring down the entire network A central connection point allows for flexibility and scalability Data travels on redundant paths, so one cable cannot stop its transmission A cable problem within the group affects two nodes, at most

A central connection point allows for flexibility and scalability, A cable problem within the group affects two nodes, at most.

What happens when an 802.11b node starts broadcasting within the range of an 802.11g access point? The access point will transmit, but the node will be unable to receive A connection will be established Both the node and the access point will be unable to transmit The node will transmit, but the access point will be unable to receive

A connection will be established; 802.11g hardware is fully backward compatible with 802.11b hardware.

VPNs are implemented to provide: A secure connection within a private network A secure connection through public networks Additional encryption by using IPSec Additional security for selected computers

A secure connection through public networks; VPN is a network that is constructed by using public wires -- usually the internet -- to connect to a private network, such as a company's internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized uses can access the network and that the data cannot be intercepted.

Teredo tunneling is a protocol that: Translates Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6) Allows IPv6 connectivity through IPv4 devices Provides VPN security Dynamically allocates IPv6 addresses

Allows IPv6 connectivity through IPv4 devices; Teredo alleviates this problem by encapsulating IPv6 packets within UDP/IPv4 datagrams, which most NATs can forward properly. Thus, IPv6-aware hosts behind NATs can be used as Teredo tunnel endpoints even when they don't have a dedicated public IPv4 address.

One advantage of dynamic routing is that it: Automatically maintains routing tables Limits traffic derived from routing protocols Reduces broadcast traffic Automatically enables DHCP

Automatically maintains routing tables; Dynamic Routing, also called adaptive routing, describes the capability of a system, through which routes are characterized by their destination, to alter the path that the route takes through the system in response to a change in conditions. The adaptation is intended to allow as many routes as possible to remain valid (that is, have destinations that can be reached) in response to the change.

If a router is installed so that it separates DHCP server from its clients, the clients will: Immediately lose connectivity to all segments Be unable to obtain their leases from the server Immediately lose connectivity to the local segment Receive an immediate renewal of their lease

Be unable to obtain their leases from the server.

What is a similarity between Layer 2 and Layer 3 switches? Both provide a high level of security to the network Both use logical addressing to forward transmissions Both forward packets onto the network Both allow the implementations of VLANs

Both allow the implementations of VLANs; A single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers; such a domain is referred to as a virtual local area network, virtual LAN or VLAN. LANs are layer 2 constructs, so they can be supported by both Layer 2 and Layer 3 switches. Incorrect: Not A: Layer 2 switches do not provide high level security. Not B: Another name for logical address is IP address. Only Layer 3 switches uses IP address. Layer 2 switches uses MAC addresses. Not C: only Layer 3 switches forward packets on the network (like routers).

What is the DNS record type that specifies an alias name of another address record? MX CNAME NS SOA

CNAME; stands for Canonical Name. CNAME records can be used to alias one name to another.

What is the minimum cabling requirement for a 100BaseTX network? Category 3 UTP cable Category 5 UTP cable Category 6 UTP cable Multimode fiber cable

Category 5 UTP cable; 100BaseTX is the predominant form of Fast Ethernet, and runs over two wire-pairs inside a category 5 or above cable. 100BaseTX and 1000BaseT were both designed to require a minimum of Category 5 cable and also specify a maximum cable length of 100 meters. Category 5 cable has since been deprecated and new installations use category 5e.

Plain old telephone service (POTS), most ISDN lines, and switched T1 lines are all examples of what? Circuit switching Packet switching FDDI switching Message switching

Circuit switching; Examples of circuit-switched networks Public switched telephone (PSTN), ISDN B-channel. You can get a circuit-switched T1, while frames clouds on T1s are usually packet switched.

In local area network (LAN) topologies, the primary media access methods are: (Choose 2) Contention Negotiation Kerberos Token passing

Contention, Token passing; Media contention occurs when two or more network devices have data to send at the same time. Because multiple devices cannot talk on the network simultaneously, some type of method must be used to allow one device access to the network media at a time. This is done in two main ways: carrier sense multiple access collision detect (CSMA/CD) and token passing.

To directly connect the Ethernet network interface cards (NICs) of two computer, you should use a: Crossover cable Straight cable Rollover cable Coaxial cable

Crossover cable; An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices together directly. Normal straight through cables were used to connect from a host network interface controller (a computer or similar device) to a network switch, hub, or router.

Which two of the following are connectivity options for wide area networks (WANs)? (choose 2) Token ring Ethernet Dial-up Leased line

Dial-up, Leased line; Token ring and Ethernet is used in LANs.

Which protocol is responsible for automatically assigning IP addresses? HTTP DHCP DNS WINS

DHCP; Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network.

A computer that has an IP address of 169.254.0.1 cannot access the network. Which of the following services should you confirm is available WINS DNS DHCP TFTP

DHCP; 169.254.0.1 is an APIPA address. An APIPA address is used when the DHCP server is not available.

Which of the following uses pointer records and A records IDS DNS servers NAT servers IPS

DNS server; DNS records include: A address record, PTR pointer record.

The service that resolves fully qualified domain names (FQDN) to IP addresses is: Windows Internet Name Service (WINS) Domain Name Service (DNS) Internet Service Provider (ISP) Address Resolution Protocol (ARP)

DNS; The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites.

For which two reasons should you use IPsec between computers? (Choose 2) Data compression Data integrity Data redundancy Data confidentiality

Data integrity, Data confidentiality; IPSEC (Internet Protocol Security) is a security protocol that provides encryption and authentication over the Internet. IPSEC supports network-level data integrity, data confidentiality, data origin authentication, and replay protection.

At what layer in the OSI model are hardware addresses referenced? Network Application Data link Physical

Data link

The default gateway address identifies the: Device that will connect the computer to the local network Device that will connect the computer to a remote network Server that will provide name services for the computer Server that will authenticate the user of the computer

Device that will connect the computer to a remote network; A default gateway is the node on the computer network that the network software uses when an IP address does not match any other routes in the routing table. In home computing configurations, an ISP often provides a physical device which both connects local hardware to the Internet and serves as a gateway.

The ipconfig command will: Configure routers Display a client's address Display a client's broadcast mode Configure DHCP clients

Display a client's address; Displays all current TCP/IP network configuration values and refreshed Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.

What kind of routing is fault tolerant? Static routing Default route Least cost routing Dynamic routing

Dynamic routing; Dynamic routing protocols can be fault tolerant.

Which of these is an application layer protocol TCP FTP IP UDP

FTP; FTP is an application layer protocol.

(T/F) You use a perimeter network to grant internal clients access to external resources? A LAN has no access to the perimeter network? A perimeter network typically contains servers that require Internet access, such as web or email servers?

False, False, True; In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network.

(T/F) When an iterative query cannot be resolved from local data, such as local zone files or a cache of previous queries, the query needs to be escalated to a root DNS server. A DNS server makes an iterative query as it tries to find names outside of its local domain when it is not configured with a forwarder.

False, True; An iterative name query is one in which a DNS client allows the DNS server to return the best answer it can give based on its cache or zone data. If the queried DNS server does not have an exact match for the queried name, the best possible information it can return is a referral (that is, a pointer to a DNS server authoritative for a lower level of the domain namespace). The DNS client can then query the DNS server for which it obtained a referral. It continues this process until it locates a DNS server that is authoritative for the queried name, or until an error or time-out condition is met.

(T/F) Wireless bridges always works in pairs

False; In Wi-Fi networking, bridging mode allows two ore more wireless access points (APs) to communicate with each for the purpose of joining multiple LANs.

(T/F) A wireless bridge connects Ethernet-based devices to the network

False; Network bridging is the action taken by network equipment to create an aggregate network from either two or more communication networks, or two or more network segments. If one or more segments of the bridged networks are wireless, it is known as wireless bridging.

(T/F) Are all session data encrypted between all machines while using telnet?

False; Telnet, by default, does not encrypt any data sent over the connection (including passwords) and so it is often practical to eavesdrop on the communications and use the password later for malicious purposes; anybody who has access to a router, switch, hub, or gateway located on the network between the two hosts where Telnet is being used can intercept the packets passing by and obtain login, password, and whatever else is typed with a packet analyzer.

(T/F) With a recursive DNS query, the DNS server will contact any other DNS servers it knows about to resolve the request.

False; With a recursive name query, the DNS client requires that the DNS server respond to the client with either the requested resource record or an error message stating that the record or domain name does not exist. The DNS server cannot just refer the DNS client to a different DNS server.

To protect a network when it is connected to the Internet, you should use a: Bridge Firewall Switch Router

Firewall; A firewall is software or hardware that checks information coming from the Internet or a Network, and then either blocks it or allows it to pass through to your computer depending on your firewall settings.

Which of the following protects a network's perimeter by monitoring traffic as it enters and leaves? Extranet Firewall Intranet Virtual Private Network (VPN)

Firewall; A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings.

If a router cannot determine the next hop for a packet, the router will: Forward the packet to the default route Send the packet back to the packet's source Broadcast the packet Store the packet in the memory buffer

Forward the packet to the default route; If there is no next hop, the packets are not policy routed. A default route of a computer that is participating in computer networking is the packet forwarding rule (route) taking effect when no other route can be determined for a given Internet Protocol (IP) destination address.

The function of a router is to Provide IP subnet masks for hosts Forward traffic to other networks Broadcast routing tables to clients Store tables for name resolution

Forward traffic to other networks; A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.

Which protocol can be used to encrypt packets on the Internet? SNMP HTTPS TFTP HTTP

HTTPS; HTTPS, which stands for Hypertext Transfer Protocol Secure, makes it more difficult for hackers, the NSA, and others to track users. The protocol makes sure the data isn't being transmitted in plain-text format, which is much easier to eavesdrop on.

Which metric does Routing Information Protocol (RIP) use to determine the least costly route? Delay Host ID Hop count Interface

Hop count; RIP uses a single routing metric (hop count) to measure the distance between the source and destination network.

You are helping a friend set up a public-facing web server for a home office. Your friend wants to protect the internal network from intrusion. What should you do? Set the web server up in a perimeter network Set up the web server to block access on ports 80 and 443 Configure the firewall to block access on ports 80 and 443 Set the IP address of the web server to be within the LAN

IN computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network.

Which wireless communication problem is caused by electromagnetic waves? Fading Attenuation Interference Diffratction

Interference; Because the air is shared by all transmitters, transmissions by any device at the same frequency as an access point's radio can cause interference. Because 802.11 wireless network operates in unlicensed bands used by many technologies, such as microwave ovens, video surveillance cameras, cordless phones, they are subject to interference.

A private network that allows members of an organization to exchange data is an: Extranet Ethernet Intranet Internet

Intranet; An intranet is a computer network that uses Internet Protocol technology to share information, operational systems, or computing services within an organization. This term is used to contrast to extranet, a network between organizations, and instead refers to a network within an organization.

What are two characteristics of the CSMA/CD access method? (Choose 2) It checks to see if a collision has been detected It does a round robin search for requests to transmit from all nodes on the network It signals its intent to transmit on the network It waits until the transmission medium is idle

It checks to see if a collision has been detected, It waits until the transmission medium is idle; Main procedure for the CSMA/CD: 1. Is my frame ready for transmission? If yes, it goes on to the next point. 2. Is medium idle? If not, wait until it becomes ready 3. Start transmitting. 4. Did a collision occur? If so, go to collision detected procedure. 5. Reset retransmission counters and end frame transmission. Note: Carrier Sense Multiple Access With Collision Detection (CSMA/CD) is a media access control method used most notably in local area networking using early Ethernet technology. It uses a carrier sensing scheme in which a transmitting data station detects other signals while transmitting a frame, and stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame.

What are two characteristics of a mesh network topology? (Choose 2) It is fault tolerant because of redundant connections Every node connects to every other node on the network It works best for networks with a large number of nodes It requires less cabling than either a star or ring topology

It is fault tolerant because of redundant connections, Every node connect to every other node on the network; In a (full) mesh network topology, each of the network node, computer and other devices, are interconnected with one another. Every node not only sends its own signals but also relays data from other nodes. In face a true mesh topology is the one where every node is connected to every other node in the network. This type of topology is very expensive as there are many redundant connections, thus it is not mostly used in computer networks. It is commonly used in wireless networks.

The query protocol used to locate resources on a network is: User Datagram Protocol (UDP) Lightweight Directory Access Protocol (LDAP) Tracert Telnet

Lightweight Directory Access Protocol (LDAP); The Lightweight Directory Address Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network.

An Address Resolution Protocol (ARP) table is used to associate IP addresses with what? MAC addresses HomeGroup membership Preferred routers Hostnames

MAC addresses; Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address (MAC address) that is recognized in the local network.

What type of record does DNS use to find a mail service? Service (SRV) DNS record Canonical (CNAME) DNS record Mail Exchanger (MX) DNS record Host (A) DNS record

Mail Exchanger (MX) DNS record; A mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a domain name specifies how email should be routed with the Simple Mail Transfer Protocol (SMTP).

The host name of the fully qualified domain name (FQDN) mail.exchang.corp.nwtraders.com is: Corp Com Nwtraders Exchange Mail

Mail; Hostnames are composed of series of labels concatenated with dots, as are all domain names. For example, let's break mail.google.com into component parts: mail is the host or local hostname; and google.com is the domain or parent domain name.

One purpose of a perimeter network is to: Make resources available to the intranet Link campus area networks (CANs) Link local area networks (LANs) Make resources available to the Internet

Make resources available to the Internet; In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network.

Which of the following services mask internal IP addresses from outside the network? DHCP WINS NAT DNS

NAT; The majority of NATs map multiple private hosts to one publicly exposed IP address. IN a typical configuration, a local network uses one of the designated "private" IP address subnets (RFC 1918). A router on that network has a private address in that address space. The router is also connected to the Internet with a "public" address assigned by and Internet service provider.

The command-line tool used to list a host's active incoming connections is: NETSTAT IPCONFIG NSLOOKUP PING

NETSTAT; Used without parameters, netstat displays active TCP connections. Note: Netstat displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols).

A node within a local area network (LAN) must have which two of the following? (Choose two) Username and password Share name NIC IP address Table of all network nodes.

NIC, IP address; A node must be able to access the LAN through a network interface. A node must also have an IP address.

Which setting is used to determine the Domain Name System (DNS) setting on a client computer? TELNET NSLOOKUP PATHPING NETSTAT

NSLOOKUP; nslookup is a network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record.

Internet Key Exchange (IKE) is responsible for which two functions? (choose 2) Establishing network speed parameters Verifying the client's patch level Negotiating algorithms to use Exchanging key information

Negotiating algorithms to use, Exchanging key information; Internet Key Exchange (IKE) negotiates the IPSec security associations (SAs). This process requires that the IPSec systems first authenticate themselves to each other and establish ISAKMP (IKE) shared keys. In phase 1 of this process, IKE creates an authenticated, secure channel between the two IKE peers, called the IKE security association. The Diffie-Hellman key agreement is always performed in this phase. In phase 2, IKE negotiates the IPSec security associations and generates the required key material for IPSec. The sender offers one or more transform sets that are used to specify an allowed combination of transforms with their respective settings. The sender also indicates the data flow to which the transform set is to be applied. The sender must offer at least one transform set. The receiver then sends back a single transform set, which indicates the mutually agreedupon transforms and algorithms for this particular IPSec session.

A router's static route is set by the Adjacent Network Next upstream router Network administrator Routing protocol

Network Administrator; Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from a dynamic routing protocol to forward traffic.

Each IPv4 address consists of what? Network ID and a host ID DNS record and a default route 64-bit binary number divided into octets MAC address and data-link layer address

Network ID and host ID; Each IP address is separated internally into two parts -- a network ID and a host ID.

Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router? (choose 2) Network Policy and Access Services Routing and Remote Access Services Remote Administration DirectAccess

Network Policy and Access Services, Routing and Remote Access Services; To install the Routing and Remote Access service 1. In the Server Manager main window, under Roles Summary, click Add roles. --OR-- In the Initial Configuration Tasks window, under Customize This Server, click Add roles. 2. In the Add Roles Wizard, click Next. 3. In the list of roles, select Network Policy and Access Services. Click Next twice. 4. In the list of role services, select Routing and Remote Access services to select all of the role services. You can also select individual server roles. 5. Proceed through the steps in the add Roles Wizard to complete the installation. Reference: Install and Enable the Routing and Remote Access Service.

Connecting to a private network address from a public network requires: Network address translation (NAT) Dynamic Host Configuration Protocol (DHCP) Network Access Protection (NAP) Dynamic domain name system (DDNS)

Network address translation (NAT); The majority of NATs map multiple private hosts to one publicly exposed IP address. In a typical configuration, a local network uses one of the designated "private" IP address subnets (RFC 1918). A router on that network has a private address in that address space. The router is also connected to the Internet with a "public" address assigned by an Internet service provider.

You work at a coffee shop. Your supervisor asks you to help set up a computer network. The network needs to have the following items: - A public facing web server - A Wi-Fi network for customers - A private network for the point of sale terminals An office PC - A file/print server - A network printer You need to set up a perimeter network to protect the network. Which two items should you include in the perimeter network? (choose two) Network printer Web server File server Wi-Fi network Point of sale terminals

Network printer and Web server; Put the web server and the network printer on the perimeter network. The file server, wifi-network, and the Point of sale terminals should not be accessible from the internet. Note: A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.

In which OSI layer does routing occur? Transport Network Data Link Physical

Network; In the seven-layer OSI model of computer networking, the network layer is layer 3. The network layer is responsible for packet forwarding including routing through intermediate routers.

Which command is used to verify that a server is connected to the network? IPCONFIG ROUTE PING CHECK

Ping; Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.

Which of the following is a Layer 2 WAN protocol? Point-to-Point Protocol (PPP) Simple Network Management Protocol (SNMP) Transmission control Protocol (TCP) Internet Protocol (IP)

Point-to-Point Protocol (PPP)

An Action Center alert recommends that you enable Windows Firewall. After enabling the firewall, you can no longer access websites. Which two TCP ports should you add exceptions for on the firewall? (Choose two.) Port 21 Port 23 Port 25 Port 80 Port 443

Port 80, Port 443; Port 80: HTTP Port 443: HTTPS

According to the OSI model, encryption takes place on which layer? Presentation Network Application Transport

Presentation Layer; SSL or TLS encryption takes place at the presentation layer, Layer 6 of the OSI model.

What is the first DNS zone to which all updates for the records that belong to that zone are written? Primary zone Stub zone Conditional forwarding zone Secondary zone

Primary zone; When a zone that this DNS server hosts is a primary zone, the DNS server is the primary source for information about this zone, and it stores the master copy of zone data in a local file or in AD DS.

The type of connector used on a 100BaseT Ethernet cable is: RJ-11 Rj-45 TNC. BNC.

RJ-45

Tracert is used to: Manage routing tables dynamically Manage session-oriented connections between nodes Report the route taken by packets across an IP network Report the shortest route between different networks

Report the route taken by packets across an IP network; In computing, traceroute (tracert) is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network.

What is an example of a network device that associates a network address within a port? Switch Router Hub DSL modem

Router; A router is a Layer 3 gateway device, meaning that it connects two or more networks and that the router operates at the network layer of the OSI model. Incorrect: not switch: Any switch that provides this 'basic' functionality, operates at the 2nd OSI layer also known as the Datalink Layer. Not hub: A network hub, or a repeater, is a simple network device that does not manage any of the traffic coming through it. Any packet entering a port is flooded out or "repeated" on every other port, except for the port of entry.

You need to divide a network into three subnets. Which device should you use? Hub Bridge Router Segmenter

Router; You can use a router to divide your network into subnets.

You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters. An interference exists along the path of each drop. You need to ensure that interference is reduced. Which cable type should you use? STP Cat5e UTPCat5e Cat3 UTPCat6

STP Cat5e; Shielded cable, here STP Cat5e, would reduce interference.

The ping tool is used to: (Choose 2) Determine the network portion of a host address Self-test a host's own network interface Determine whether a host is reachable Manage a host's session when UDP is used

Self-test a host's own network interface. Determine whether a host is reachable; Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. To have your PC ping itself, type ping 127.0.0.1.

In which physical network topology is each computer connected to a central point? Star Mesh Ring Bus

Star; In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection.

What is a route that must be manually defined on each router? Static Dynamic Persistent Global

Static

One reason to replace an unmanaged switch with a managed switch is to Manage the routing tables Support multiple VLANS Reduce collision domains Route between networks

Support multiple VLANs; A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers. The major difference between the packet switching operation of a router and that of a Layer 3 switch is the physical implementation. In general-purpose routers, packet switching takes place using software that runs on a microprocessor, whereas a Layer 3 switch performs this using dedicated application-specific integrated circuit (ASIC) hardware.

What are two characteristics of fiber optic cables? (Choose two.) Conducts electricity Requires metal conduit Supports splicing Requires a polish for end connectors

Supports splicing, Requires a polish for end connectors; Fiber optic cable DOES NOT conduct electricity, it is glass. You can use plastic conduit in addition to metal conduit. Most fiber is ran in plastic conduit. You can fusion weld or fusion splice a broken fiber optic cable together if it is cut or needs to be joined. Lastly, all fiber optics need to have the ends polished to allow the light to clearly leave the fiber optics into the sensor that is detecting the light or the laser injecting light into the fiber optics.

What are two differences between switches and hubs? (Choose two) Switches are slower than hubs because of the extra addressing functions that switches perform Switches send data to all of the computers that are connected to them for efficiency Switches are capable of sending and receiving data at the same time. Switches identify the intended destination of the data that they receive.

Switches are slower than hubs because of the extra addressing functions that switches perform, Switches identify the intended destination of the data that they receive; Hubs repeat everything they receive and can be used to extend the network. Switches control the flow of network traffic based on the address information in each packet. A switch learns which devices are connected to its ports (by monitoring the packets it receives), and then forwards on packets to the appropriate port only. This allows simultaneous communication across the switch, improving bandwidth.

Which value in a resource record indicates a length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it? TTL GPS SOA RR NTP

TTL; Time to live (TTL) is what dictates how long it will be until your computer refreshes its DNS related information.

You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on the first attempt? PING is improperly configured The DNS is not resolving The DHCP server is offline NSLOOKUP is stopped

The DNS is not resolving; DNS is not working

What happens when an 802.11a node broadcasts within the range of an 802.11g access point? The access point transmits, but the node is unable to recieve A connection occurs Both the node and the access point are unable to transmit The node transmits, but the access point is unable to receive

The node transmits, but the access point is unable to receive; Because 802.11a and 802.11b utilize different frequencies, the two technologies are incompatible with each other. A huge problem with 802.11a is that it's not directly compatible with 802.11b or 802.11g networks. In other words, a user equipped with an 802.11b or 802.11g radio card will not be able to interface directly to an 802.11a access point. Reference: Making the choice: 802.11a or 802.11g.

Security is a concern on wireless networks due to: The radio broadcast access method Spread spectrum issues Frequency modulation issues The potential for cross-talk

The radio broadcast access method

Which of these factors has the biggest impact on data transmission speed in a wireless network? The access method used for the network The transmission standard of the equipment used The use of strong encryption for transmissions The transmission wattage rating used on the NIC

The transmission standard of the equipment used; The speed of a Wi-Fi wireless network connection depends on several factors. Like most kinds of computer networks, Wi-Fi supports varying levels of performance depending on which technology standards it supports. Each Wi-Fi standard is rated according to its maximum theoretical network bandwidth: A Wi-Fi network connection operates at the highest possible speed that both devices (endpoints) can support. An 802.11g laptop connected to an 802.11n router, for example, will network at the lower speeds of 'g'.

(T/F) A wireless bridge increases the wireless signal strength of the access point

True; In Wi-Fi, repeater mode is a variation on bridging. Rather than join multiple LANs, repeater mode is intended mainly to increase the range of a single wireless LAN by extending the same wireless signal.

Fill in the blank To set lower security settings in Internet Explorer for a ______, add the site's URL to the Local Intranet zone. Internet Trusted Sites Extranet Sites Extranet site

Trusted Sites; The level of security set for Trusted sites is applied to sites that you have specifically indicated to be ones that you trust not to damage your computer or information. Reference: Change Internet Explorer Security Settings.

Which feature of Category 5e STP cable reduces external interference? Crosstalk Shielding Length Twisting

Twisting; Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources.

Which protocol is a transport layer protocol? FTP IP UDP ASCII

UDP; Transport layer protocols include: UDP, TCP

A characteristic of the mesh topology is that it: Uses a central hub Cannot use wired connections Uses redundant paths Cannot use wireless connections

Uses redundant paths; Mesh network topology is one of the key network architectures in which devices are connected with many redundant interconnections between network nodes such as routers and switches. In a mesh topology, if any cable or node fails, there are many other ways for two nodes to communicate.

Which technology can you use to extend an internal network across shared or public networks/ VLAN Microsoft ADP-NET Microsoft .NET Framework VPN

VPN; VPN is a network that is constructed by using public wires -- usually to the Internet -- to connect to a private network, such as a company's internal network.

A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97. You need to restore access to network resources. What should you do next? Flush the cache on the DNS server Reset the user's password on the server Check your router's current routing tables Verify that the DHCP service is available

Verify that the DHCP service is available; 169.254.48.97 is an APIPA address. An APIPA address is used when the DHCP server is not available.

What is the wireless encryption that is the most susceptible to interception and decryption? WPA-AES WPA2 WPA-PSK WEP

WEP; Several weaknesses have been discovered using WEP encryption that allows an attacker using readily available software to crack the key within minutes.

Which wireless authentication method provides the highest level of security? Wired Equivalency Privacy (WEP) IEE 802.11n WI-FI Protected Access (WPA) IEE 802.11a

WI-FI Protected Access (WPA); WPA aims to provide stronger wireless data encryption than WEP. Wi-Fi Protected Access (WPA) is a security protocol an security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.

The IPSec policies for two machines on a LAN can be modified by where on Windows 7? Windows Firewall with Advanced Security snap-in LAN adapters Remote Access snap-in IPSec policy snap-in

Windows Firewall and Advanced Security snap-in; Windows Firewall with Advanced Security is an advanced interface for IT professionals to use to configure both Windows Firewall and Internet Protocol Security (IPSec) settings for the computers on their networks. Applies To: Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows Vista. Reference: Windows Firewall with Advanced Security and IPSec.

Which type of network is most vulnerable to intrusion Dial-up Wireless Broadband Leasedline

Wireless; Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior.

What is the process of replicating a zone file to multiple DNS servers called? Zone transfer Zone synchronization Start of authority Zone replication

Zone transfer; DNS zone transfer, also sometimes known by the inducing DNS query type AXFR, is a type of DNS transaction. It is one of the many mechanisms available for administrators to replicate DNS databases around a set of DNS servers.

The top-level domain of www.adventureworks.com is: www adventureworks adventureworks.com com

com; a top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet.

You are setting up a network computer game. You need to open up ports on your firewall so your friends can join the network. Which command displays the ports that your computer is listening for? nslookup nbstat ping netstat

netstat; Netstat (network statistics) is a command-line tool that displays network connections for the Transmission Control Protocol (both incoming and outgoing), routing tables, and a number of network interface (network interface controller or software-defined network interface) and network protocol statistics. Incorrect: Not A: nslookup is used for DNS troubleshooting. Not B: nbtstat is designed to help troubleshoot NetBIOS name resolution problems. Not C: ping is used to troubleshoot network connectivity.


Ensembles d'études connexes

International Management Chapter 15

View Set

EMT Chapter 12: Shock Quizzes and Tests

View Set

Неправельные глаголы (s-)

View Set

Les adjectifs numéraux ordinaux

View Set

American Federal Government: Chapter 11

View Set