Net Essentials Midterm Study Guide
flow label
In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to? a. group ID b. traffic exchange c. flow label d. traffic class
AAAA record
In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? a. AAAA record b. PTR record c. TXT record d. A record
sliding-window
In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?
a. registered jack 11 (RJ-11)
Telephone connections follow what registered jack standard? a. registered jack 11 (RJ-11) b. registered jack 45 (RJ-45) c. registered jack 12 (RJ-12) d. registered jack 100 (RJ-100)
wiring schematic
What type of diagram is a graphical representation of a network's wired infrastructure? a. topology map b. wiring schematic c. network diagram d. system diagram
ping
What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?
SIP
Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session? a. LDAP b. TFTP c. SIP d. NTP
c. The signal is split into secondary waves that continue in the direction in which they split.
Diffraction has what affect on a wireless signal's propagation? a. The signal is completely absorbed by the diffracting material. b. The signal is returned back towards the source of the original signal. c. The signal is split into secondary waves that continue in the direction in which they split. d. The signal is redirected into multiple directions
Layer 7
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? a. Layer 4 b. Layer 6 c. Layer 7 d. Layer 5
d. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
How can you determine the manufacturer of a NIC card based on the MAC address? a. The last 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. b. The middle 24 bits, known as the Organization Universal Identifier, identify the manufacturer. c. The first 12 bits and last 12 bits combined are known as the Organizationally Unique Identifier. d. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer
Material Safety Data Sheet (MSDS)
The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options? a. Material Safety Data Sheet (MSDS) b. Toxic Chemical Safety Procedure (TCSP) c. Dangerous and Hazardous Waste Disposal Sheet (DHWDS) d. Environmental Chemical Hazard Sheet (ECHS)
a. 10 Gbps
What is the maximum supported throughput of a CAT6 cable? a. 10 Gbps b. 100 Gbps c. 100 Mbps d. 1 Gbps
d. 1, 2, 3, 6
A Fast Ethernet connection utilizes what pins on an RJ-45 plug? a. 1, 2, 4, 5 b. 1, 2, 3, 5 c. 1, 2, 7, 8 d. 1, 2, 3, 6
ipconfig /flushdns
A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem? a. ipconfig /renew b. ipconfig /release c. ipconfig /flushdns d. ipconfig /refresh
Project manager
A change coordinator functions as what type of manager? a. project manager b. inventory manager c. human resources manager d. time manager
c. VoIP PBX (private branch exchange)
A dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway, is known by what term? a. VoIP ATB (analog telephone branch) b. VoIP router c. VoIP PBX (private branch exchange) d. VoIP LEC (local exchange carrier)
Star Topology
If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used? a. mesh topology b. star bus topology c. bus topology d. star topology
a. The cable must be a rollover cable.
A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue? a. The cable must be a rollover cable. b. The router console port is providing an Ethernet connection, instead of a serial connection. c. The USB standard is incompatible with the serial connection used by the console port. d. Router console ports are only used when connected to other routers.
Fail Open
A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy? a. fail-oriented b. fail-open c. fail-close d. fail-tolerant
c. fail-close
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? a. fail-dynamic b. fail-tolerant c. fail-close d. fail-open
domain names
At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host? a. port numbers b. MAC addresses c. IP addresses d. domain names
Network
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?
d. Layer 2
At what layer of the OSI model does a network switch normally operate? a. Layer 4 b. Layer 3 c. Layer 5 d. Layer 2
No more than 1 inch of the cable should be exposed.
During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced? a. Each pair should be twisted around another pair to reduce cross talk. b. Each pair should be stripped of insulation so that it doesn't get caught in the jack. c. No more than 1 inch of the cable should be exposed. d. No less than 1 inch of the cable should be exposed.
TCP 3389
Encrypted control of remote computers using the RDP protocol is accomplished using what port number? a. TCP 3389 b. UDP 10000 c. UDP 161 d. TCP 22
19 inches
Equipment data racks most commonly are a standard width of what measurement? a. 19 inches b. 25 inches c. 20 inches d. 30 inches
Active Directory Domain Services (AD DS)
In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service? a. Active Directory Domain Services (AD DS) b. Windows Named Resource Services (WN RS) c. Active Directory Federated Users (AD FU) d. Automated Directory Network Services (AD NS)
fire suppression agent
In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire? a. extinguishing medium b. fire extinction agent c. eliminating factor d. fire suppression agent
VoIP gateway
In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines?
The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.
In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer? a. The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application. b. The Presentation layer describes the interface between two applications, each on separate computers. c. The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read. d. The Presentation layer is responsible for transporting Application layer payloads from one application to another.
a. No more than four times the diameter of the cable
In general, how much can a twisted-pair's cable be bent before data transmission may be impeded? a. No more than four times the diameter of the cable. b. Twisted pair cable has a near infinite bend radius. c. No more than two times the diameter of the cable. d. No more than ten times the diameter of the cable.
at least 3 feet
In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting?
On the DNS root servers.
In the DNS hierarchy, where is information about how to find the top-level domain servers held? a. On the DNS root servers. b. In the organization's forward lookup zone. c. In the hosts file on the local machine. d. On DNS caching-only servers.
Application
In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Application b. Link c. Transport d. Internet
d. Physical
In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Application c. Data Link d. Physical
The hosts will still send and receive traffic, but traffic may not always reach the correct destination.
In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate? a. The hosts that share the same MAC addresses will be completely unable to communicate with any other devices. b. The hosts will generate new MAC addresses until the conflict is resolved. c. The network switch will eventually crash due to being unable to properly forward traffic. d. The hosts will still send and receive traffic, but traffic may not always reach the correct destination.
d. 13.56 MHz
Near-field communication devices send data at what fixed frequency? a. 8.65 MHz b. 21.39 MHz c. 47.1 MHz d. 13.56 MHz
d. decibels
Noise that can degrade or distort a signal on a network is measured with what unit? a. volts b. joules c. farads d. decibels
ifconfig -a
On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? a. ipconfig /all b. if status c. ip show d. ifconfig -a
Link State
Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols? A) distance vector B) link state C) exterior gateway D) map extension
d. simplex
Signals that can travel in only one direction on a medium are referred to as what type of signal? a. duplex b. full-duplex c. half-duplex d. simplex
Frame
The Data Link Layer utilizes what name for its protocol data unit (PDU)? a. bit b. frame c. packet d. data
TCP
The IP connectionless protocol relies on what other protocol to guarantee delivery of data? a. ARP b. TCP c. ICMP d. UDP
Transport
The TCP and UDP protocols both exist at what layer of the OSI model? a. Application b. Presentation c. Transport d. Network
Remote Desktop Protocol (RDP)
The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions? a. File Transfer Protocol (FTP) b. Secure Shell (SSH) c. Remote Desktop Protocol (RDP) d. Secure Sockets Layer (SSL)
a. multiple input-multiple output (MIMO)
The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation? a. multiple input-multiple output (MIMO) b. frame aggregation c. channel bonding d. spread spectrum frequency hopping
a. captive portal
Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of? a. captive portal b. WPA2-Enterprise c. guest network profile d. browser hijacking
c. Cat 5e
What is the minimum category of UTP cable required in order to support Gigabit speeds? a. Cat 6 b. Cat 3 c. Cat 5e d. Cat 5
SNMP (Simple Network Management Protocol)
What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention?
c. ipconfig /all
What command can you utilize to display TCP/IP configuration information for each network adapter installed? a. ipconfig /show b. ipconfig /list c. ipconfig /all d. ipconfig /full
netstat -n
What command will list only current connections, including IP addresses and port numbers? a. netstat -s b. portstat c. show ip stats d. netstat -n
b. vertical cross connect
What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs? a. patch cable b. vertical cross connect c. horizontal cross connect d. diagonal cabling
The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.
What does backbone cabling consist of? a. The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs. b. It is cabling that connects workstations to the closest data room and to switches housed in the room. c. The shielded cables that are used for high data transmission rates between an organization and an ISP. d. Short length cables with connectors at both ends.
The router drops the packet and sends an ICMP TTL expired message back to the host
What happens when a router receives a packet with a TTL of 0? a. The router drops the packet and sends an ICMP TTL expired message back to the host. b. The router attempts to forward the traffic on a local network. c. The router resets the TTL to 128. d. The router marks the packet as corrupted and forwards it to the next hop.
Framing
What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol? a. Framing b. Flow Control c. Sequencing and checksums d. Connection-oriented Protocol
Devices are daisy-chained together in a single line.
What is a defining characteristic of a bus topology based network? a. Devices are connected to two adjacent devices, and communication priority is granted by a token. b. Devices are connected directly to a centralized networking device, known as a network switch. c. Devices are directly attached to a network router, which forwards data to intended destinations. d. Devices are daisy-chained together in a single line.
It allows the receiving node to determine whether the TCP segment became corrupted during transmission.
What is the purpose of the checksum TCP field? a. It allows the receiving node to determine whether the TCP segment became corrupted during transmission. b. It specifies special options, such as the maximum segment size a network can handle. c. It confirms receipt of data via a return message to the sender. d. It identifies the data segment's position in the stream of data segments being sent.
a. multimeter
What kind of tool can you use to measure voltage on a cable length? a. multimeter b. light meter c. time domain reflectometer d. continuity tester
Session Layer
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? a. Transport Layer b. Application Layer c. Session Layer d. Presentation Laye
SMTP (Simple Mail Transfer Protocol)
What mail protocol is used to send mail messages to a server?
Each node on the network waits a random amount of time and then resends the transmission.
What occurs when a collision happens on a network? a. The collision will create an error in the network switch, but otherwise, no issues will occur as a result. b. Each node on the network stops transmitting, until manually told to reconnect and transmit. c. The collision goes undetected, and data transmission continues. d. Each node on the network waits a random amount of time and then resends the transmission.
The last 24 bits of the MAC address.
What part of a MAC address serves as the extension identifier, or device ID? a. The last 24 bits of the MAC address. b. The first 24 bits of the MAC address. c. The first 12 bits of the MAC address. d. The last 12 bits of the MAC address.
latency
What routing metric affects a path's potential performance due to delay?
TIA/EIA 568A
What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system?
c. A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data
What statement accurately describes what a cable bend radius determines? a. A cable bend radius is the radius of the minimum arc into which you can loop the cable without impairing data. b. A cable bend radius determines the total number of bends that can exist in an overall cable before data is impaired. c. A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data. d. A cable bend radius defines the twist rate of the cable inside of the insulation.
The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).
What statement accurately reflects what occurs when a message is too large to transport on a network? a. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP). b. The message is discarded and must be sent again. c. An ICMP error is generated, and the application must reformat the data for transmission. d. The message is sent anyway, and is received by the destination as garbage data.
c. Jitter is what happens when packets experience varying amounts of delay and arrive out of order.
What statement correctly describes "jitter"? a. Jitter is the fluctuation of a signal's strength as it travels away from its source. b. Jitter is the loss of 50% or more packets in a given data stream, causing a connection to falter. c. Jitter is what happens when packets experience varying amounts of delay and arrive out of order. d. Jitter is the transmission of signal onto unintended pairs in a copper cable.
d. A customer modem is continuously losing signal due to large distance from the transmitting device.
What statement describes a transmission flaw that is occurring due to attenuation? a. A customer's video conferencing application is experiencing delay in audio and video that comes and goes. b. A network switch interface is dropping due to a powerful radio transmitter in the adjacent room. c. Two network interfaces are experiencing problems at the same time due to the cables having adjacent runs. d. A customer modem is continuously losing signal due to large distance from the transmitting device.
It is used by Windows and UNIX-based operating systems to share files.
What statement regarding the Server Message Block protocol is accurate?
b. tcpdump port 22
What tcpdump command can be used to filter out all traffic except SSH traffic? a. tcpdump -p 22 b. tcpdump port 22 c. tcpdump -f +ssh d. tcpdump only ssh
vim
What text editor can be used on Linux to view and edit the contents of a configuration file?
b. link local address
What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c? a. multicast address b. link local address c. anycast address d. global addres
An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.
When creating network diagrams, what icon description typically represents a network router? a. An icon that is rectangular in shape, with squiggly lines on the front. b. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. c. An icon that is rectangular, which contains four arrows pointing in opposite directions. d. An icon that resembles a brick wall.
An icon that is rectangular, which contains four arrows pointing in opposite directions
When creating network diagrams, what icon description typically represents a network switch? a. An icon that is rectangular, which contains four arrows pointing in opposite directions. b. An icon that is rectangular in shape, with squiggly lines on the front. c. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. d. An icon that resembles a brick wall.
Upset Failure
When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors? a. temporary failure b. interrupting failure c. catastrophic failure d. upset failure
100 meters
When planning horizontal cabling, what is the maximum allowable distance that can be used? a. 300 meters b. 100 meters c. 100 feet d. 1,000 feet
c. 3/8 inch
When terminating an Ethernet cable, about how far should the cable sheath extend into the plug? a. 4/5 inch b. 1/5 inch c. 3/8 inch d. 1/2 inch
a. port 546
When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on? a. port 546 b. port 67 c. port 68 d. port 547
in the Main Distribution Frame (MDF)
Where is a demarc located in relation to the structured cabling of an enterprise environment? a. at the Intermediate Distribution Frame (IDF) b. between the MDF and the IDF c. in the work area d. in the Main Distribution Frame (MDF)
netstat -s
Which command will produce statistics about each message transmitted by a host, separated according to protocol type? a. ipconfig -s b. netstat -s c. netstat -an d. ipstat -a
127.0.0.1
Which of the following IP addresses would be a loopback IP address?
2000::/3
Which of the following IPv6 addresses represents a global unicast address? a. FC00::/7 b. FD00::/8 c. 2000::/3 d. FE80::10
Cable ties should be pulled tightly to keep cables from moving around in a bundle.
Which of the following is NOT a best practice when performing cable management?
a. 127.0.0.0 through 127.255.255.255
Which of the following is NOT a range of IP addresses recommended for use in private networks? a. 127.0.0.0 through 127.255.255.255 b. 172.16.0.0 through 172.31.255.255 c. 192.168.0.0 through 192.168.255.255 d. 10.0.0.0 through 10.255.255.255
a. request for proposal
Which of the following is a document that is sent as a request to vendors to submit a proposal for a product or service that your company wants to purchase? a. request for proposal b. request for quote c. statement of work d. memorandum of understanding
The addition of a header to data inherited from the layer above in the OSI model.
Which of the following is an example of encapsulation? a. The addition of a trailer to data inherited from the layer above in the OSI model. b. The modification of headers from a higher layer in the OSI model. c. The subtraction of a header from data inherited from the layer below in the OSI model. d. The addition of a header to data inherited from the layer above in the OSI model.
A router forwards broadcasts over the network.
Which of the following is not a task handled by a router? a. A router forwards broadcasts over the network. b. A router can connect dissimilar networks. c. A router can interpret Layer 3 and often Layer 4 addressing. d. A router can reroute traffic if the path of first choice is down but a second path is available.
They centralize user account logins.
Which of the following is not one of the disadvantages of peer-to-peer networks? a. They are not necessarily secure. b. They are impractical for connecting large numbers of computers. c. They lack scalability. d. They centralize user account logins
d. Light experiences virtually no resistance when traveling through glass.
Which of the following statements about fiber-optic cabling is accurate? a. The maximum length for a fiber segment is 20km. b. Fiber-optic cabling has a low resistance to signal noise. c. Fiber-optic cable is cheaper than shielded twisted pair cabling. d. Light experiences virtually no resistance when traveling through glass.
b. NEXT is crosstalk that occurs between wire pairs near the source of a signal
Which statement accurately describes what near end crosstalk (NEXT) is? a. NEXT is crosstalk that occurs near the opposite end of a signal source. b. NEXT is crosstalk that occurs between wire pairs near the source of a signal. c. NEXT is crosstalk that occurs when an EMI source is near the data signal source. d. NEXT is crosstalk that occurs only when a cable segment exceeds the bend radius.
OSPF requires very little CPU or memory resources.
Which statement does NOT accurately describe characteristics of the OSPF protocol? a. OSPF requires very little CPU or memory resources. b. OSPF provides low network overhead. c. OSPF maintains a database of other routers' links. d. OSPF has no hop limits on a transmission path.
BGP utilizes TCP for communicating updates.
Which statement regarding the Border Gateway Protocol (BGP) is accurate? a. BGP is a more advanced version of OSPF. b. BGP utilizes TCP for communicating updates. c. BGP is exclusively a distance-vector protocol. d. BGP is limited to a single autonomous system.
c. traceroute -I srv1.mycompany.com
Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com? a. traceroute -o ICMP srv1.mycompany.com b. traceroute -i srv1.mycompany.com c. traceroute -I srv1.mycompany.com d. traceroute -w srv1.mycompany.com
The exposure of the cable can cause transmission interference between wires.
Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination?
b. A mismatched connector will have different impedance ratings, causing data errors
Why should you terminate coaxial cable with connectors that are rated for the exact cable type? a. A mismatched connector will destroy the equipment it is connected to. b. A mismatched connector will have different impedance ratings, causing data errors. c. A mismatched connector will not fit the coaxial cable for termination. d. A mismatched connector will work fine, but breaks cabling standards.
b. A mismatched connector will have different impedance ratings, causing data errors.
Why should you terminate coaxial cable with connectors that are rated for the exact cable type? a. A mismatched connector will not fit the coaxial cable for termination. b. A mismatched connector will have different impedance ratings, causing data errors. c. A mismatched connector will destroy the equipment it is connected to. d. A mismatched connector will work fine, but breaks cabling standards
dig query 8.8.8.8 domain mycompany.com type mx
You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this?
c. TIA/EIA 568A
You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use? a. TIA/EIA 568B b. TIA/EIA 568F c. TIA/EIA 568A d. TIA/EIA rollover
Master License Agreement
Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company? a. service-level agreement b. master license agreement c. master service agreement d. memorandum of understanding
Both IPv4 and IPv6 protocols will be used on the network.
Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? a. The router serving the network will have a redundant spare. b. Two different IPv4 address spaces will exist on the same network segment. c. Both IPv4 and IPv6 protocols will be used on the network. d. The network will exist on two separate segments, separated by a proxy.