Net+ Exam Notes

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

If you run "route print" at a Windows command prompt, you will get this output: Route Table =========================================================================== Interface List 0x1 ........................... MS TCP Loopback interface 0x10003 ...00 11 d8 30 16 c0 ...... NVIDIA nForce Networking Controller - Virt l Machine Network Services Driver =========================================================================== =========================================================================== Active Routes: Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 10.12.14.1 10.12.14.101 1 10.12.14.0 255.255.255.0 10.12.14.101 10.12.14.101 1 10.12.14.101 255.255.255.255 127.0.0.1 127.0.0.1 1 10.255.255.255 255.255.255.255 10.12.14.101 10.12.14.101 1 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 169.254.0.0 255.255.0.0 10.12.14.101 10.12.14.101 30 224.0.0.0 240.0.0.0 10.12.14.101 10.12.14.101 1 255.255.255.255 255.255.255.255 10.12.14.101 10.12.14.101 1 Default Gateway: 10.12.14.1 =========================================================================== Persistent Routes: None What other command will give you the exact same output? netstat -a netstat -p netstat -n netstat -r

-r

Where would a patch antenna for 802.11 usually be placed? Pointing at another patch antenna on another building 802.11 does not use patch antennas In the middle of a room Against a wall

Against a wall

Smurf Attack

Attacker sends a ping to subnet broadcast address and devices reply to spoofed IP (victim server), using up bandwidth and processing

Employees have been bringing in WAPs and connecting them to your network to enable wireless access with their laptops. Which authentication method should be used to prevent this from happening? 802.3ad WPA2 802.1x TKIP

Correct Answer: 802.1x is also known as Network Access Control, an IEEE method developed to provide port-based authentication. In this scenario, the users will not be able to use their WAPs to connect to the network. The WAPs won't be authenticated to access network resources. Incorrect Answers: 802.3ad is bonding or link aggregation, the process of taking two NICs and doubling the bandwidth between them. This is also called teaming. TKIP is an encryption algorithm used with WPA. WPA2 is 802.11i and it defines the security mechanisms for the most secure wireless networks.

Which IPv6 address is the loopback address (using the :: rule)? :: 127:0:0:1 (Incorrect) 1080::8:800:200C:417A ::1

Correct Answer: ::1 is the loopback address for IPv6, which is shorthand for 0:0:0:0:0:0:0:1. Incorrect Answers: Answer A is an IPv6 address, but not for loopback. Answer C is nothing, and D is the IPv4 loopback address.

Clark is troubleshooting a user's PC. They are using their browser to visit Web sites such as PayPal, eBay, and Newegg. They begin seeing SSL certificate mismatch warnings. Which of the following attacks could be happening? MitM Smurf Zombie Honeypot

Correct Answer: A Man in the Middle is a form of eavesdropping in which the attacker makes a connection with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. Incorrect Answers: Smurf and Zombie attacks are variations of DoS and DDoS attacks. A Honey Pot is a fake network that is setup to attract a hacker.

Users are seeing messages and warnings on their computers about duplicate IP addresses and are encountering connectivity problems. A quick check of the change management log shows that network technician Ursula installed a new DHCP server on the network last week. Which of the following would cause duplicate IP addresses on the network? The DNS record A pointers are incorrect. The DHCP server has run out of IP addresses to issue to clients. A second DHCP server is on the network. The network IP leases are expiring and not renewing.

Correct Answer: A second DHCP server is on the network. - When there are two DHCP servers on a network, you can never tell which one will answer a request. Incorrect Answers: Expired IP leases do not cause duplicate IP addresses to be issued by DHCP servers. 'Incorrect A records cause misdirected traffic, but not duplicate IP addresses. Not having enough IP addresses is a problem, but not one that causes duplicate addresses.

CHAP, MS-CHAP, and PAP are all authentication protocols for remote connectivity. However, the EAP authentication protocol offers something the other three do not. What is it? It scans the encrypted data for viruses It requires two passwords for extra security It supports special authentication devices such as smart cards It uses a strong 512-bit encryption

Correct Answer: Although the other authentication protocols are good, Extensible Authentication Protocol (EAP) takes authentication a step further by offering support for "special" methods of authentication. Examples would be the use of smarts cards, or electronic certificates that are required to identify the source of the encryption. Incorrect Answers: EAP does not do/use these techniques.

Network administrator Kwan suspects that one of the copper network cables is faulty. When examining the suspect cable, Kwan notices that some of the pairs are untwisted too much. This is MOST likely causing which of the following? Cross-talk Collisions Dispersion dB loss

Correct Answer: Cross-talk - Twisting the wires around each other helps prevent the signal from bleeding between the wires. Incorrect Answers: dB loss is probably minimal unless the untwisted wires go back many feet. Collisions are not impacted by wire twist. Dispersion is not a characteristic of copper network cables.

A network technician, Ellen, receives a support ticket. The ticket does not provide enough information for Ellen to determine the problem. Which of the following should she perform FIRST before responding to the ticket?

Correct Answer: Determine if anything has changed. - The best starting place in troubleshooting is knowing what's new or different. Incorrect Answers: Testing a theory comes after determining a cause. Establishing a plan of action comes after testing a theory. Escalation happens when the solution can't be determined.

Which of the following services is most likely to need an NTP server? EAP-TLS PKI 802.1x Kerberos

Correct Answer: Kerberos is very time sensitive. For a user to gain access to the network, Kerberos requires that a token be passed between the user, the Authentication Server, and the Ticket Granting Server. If the time isn't synched up correctly using NTP, your network may experiences problems. Incorrect Answers: EAP-TLS is often considered the original, standard wireless authentication protocol. Public Key Infrastructure (PKI) defines the standards for all digital certificates. It gives nonrepudiation for strangers. 802.1x is the IEEE name for port-based network access control.

Ripley is a corporate network tech. She receives a report in the morning about Internet service being down at the site. Ripley got an e-mail yesterday that there was a water main break in front of the site, and repair work was going to be performed. On arrival at the site, she sees that there are workers performing repairs to the water system. She performs a test to make sure there are no internal network issues. The internal network is functional, but the laptop fails to connect to the Internet. Which of the following should be performed according to the network troubleshooting methodology? Ask the accounting department if all bills were paid to the Internet service provider. Notify employees of the outage and contact the service provider of the demarc. Question the employees of the severity of the Internet outages by e-mail. Verify the Internet is fully-restored and notify employees of the restoration.

Correct Answer: Notify employees of the outage and contact the service provider of the demarc - We know the problem. Now we have to get help from someone with the expertise to fix it. Incorrect Answers: Put two and two together - it isn't an unpaid ISP bill! The net is still down, so we can't notify the employees that it's been restored. The employees have already notified Kim of the outage severity—plus e-mail may require access to the Internet.

Rebecca needs to spec the equipment for the installation of a complete network system: cables, switches, PCs... everything. The network only needs to be 100BaseT but must be easy to upgrade to 1000BaseT in the future. Which one of the following, although good to have, would be the least important element for Rebecca to buy now? 100/1000 Mbps switch CAT5e UTP horizontal cabling CAT5e patch panel 100/1000 Mbps NICs

Correct Answer: Rebecca should install CAT 5e horizontal cables and a CAT 5e patch panel now as reinstalling cabling later would be very expensive. She should also use 100/1000 Mbps NICs for the same reasons. Incorrect Answer: Although a 100/1000 Mbps switch would be good to have, a simple 10/100 Mbps switch would be fine at this point. Upgrading the switch to a 100/1000 Mbps switch in the future would be a very simple process and would usually not cost a lot.

Which routing protocol allows a gateway host to send its entire routing table to the next closest host? OSPF RIP v2 EIGRP IS-IS

Correct Answer: Routing Information Protocol (RIP) is the oldest routing method used for dynamic routing. The fact that it said the entire routing table would be sent indicates that it is a Distance Vector Routing Protocol, not a Link-State Routing Protocol. Incorrect Answers: All the other choices listed are Link-State or Hybrid routing protocols.

Which of the following routing methods is the most difficult to manage? Protocols Static IP Dynamic

Correct Answer: Static routing is the most difficult to manage because you must enter all the routes manually in the routing table for each system. Incorrect Answers Dynamic routing automatically creates the routing table, so it's much easier. Protocols and IP are not routing methods.

Your network administrator has decided to remove WINS from the network and replace it with DNS. Your WINS server resolves requests to 20 address locations on your network segment. What's the BEST way to ensure that users can reach those addresses by host name automatically? Enter the three hostnames and addresses in the LMHOSTS file. Add a WINS proxy to your network segment. Request that the hostnames and addresses be added into DNS. Enter the three hostnames and addresses in the HOSTS files of the other systems on the network.

Correct Answer: The best way would be to add the entries to the DNS server. Incorrect Answers: Adding the entries to the HOSTS files would work, but this would need to be done on every workstation. Adding a WINS proxy is not an option since the WINS server is being taken out of the network. Entering the hostnames into the LMHOSTS file wouldn't do much good because LMHOSTS is for NetBIOS resolution, not domain name resolution.

What would you use to create a direct connection between two client 10/100 network workstations? Fiber Optic Cable Coaxial Cable Straight-through cable Crossover Cable

Correct Answer: To directly connect two workstations, you must use a crossover cable. This type of UTP cable crosses the transmit and receive wires so each workstation receives on the other workstation's transmit wire. Incorrect Answers: Straight through won't work because you're hooking the send wires (1&2) on one system to the sending wires on the other. Coaxial and fiber optic wont work.

A user that is connected to a wireless network moves a laptop from her desk to a conference room. When she arrives at the conference room, she notes that the laptop is trying to reconnect to the wireless network. Which of the following is a common wireless problem that can cause this issue? Mismatched SSID Increased latency Weak signal strength Incorrect encryption type

Correct Answer: Weak signal - This is perhaps due to more structure between her laptop and the WAP. Regardless, her system dropped the network and is trying to re-acquire it. Incorrect Answers: Because she is not changing networks, the SSID and encryption type didn't change, so they can't be the cause. This isn't a latency issue.

Brienne, an administrator, attempts to connect a laptop to a server with a length of CAT5 cable that has RJ-45 connectors on each end. She verified the IP settings as correct, but the two computers still cannot connect. Which of the following would MOST likely fix the connectivity problem? Use the DB-9 port with a DB-9 to RJ-45 adapter on the server. Manually adjust the duplex mode on the server's link. Wire pairs 1/2 and 3/6 need to be swapped on one end of the connecting cables. Configure the laptop to receive a DHCP address from the server, rather than manually setting one.

Correct Answer: Wire pairs 1/2 and 3/6 need to be swapped on one end of the connecting cables. - When connecting similar devices (such as two computers) directly with a network cable, you need a crossover cable instead of a straight-through cable. In other words, the cable needs both a TIA/EIA-568A configuration and a TIA/EIA-568B configuration, each of which have different wire pairs at 1/2 and 3/6. Incorrect Answers: Use the DB-9 port with a DB-9 to RJ-45 adapter on the server. - DB-9 ports are serial—too slow for effective communications these days. Configure the laptop to receive a DHCP address from the server, rather than manually setting one. - DHCP does not affect the cable links, it only affects IP addresses. Manually adjust the duplex mode on the server's link. - It is likely that the laptop and server are already defaulted to full duplex.

Mike wants to connect two hubs. Which of the following will work? (Select two.) Use a patch cable from an MDIX port to a normal port. Use a crossover cable from an MDIX port to a normal port. Use a patch cable between two normal ports. Use a crossover cable between two normal ports. Use a straight-through cable between two normal ports.

Correct Answers: When connecting two hubs, the send and receive wires must be reversed. This is what MDIX (uplink) ports and crossover cables do. So, if using a straight-through cable, it must be connected to an MDIX port on one hub and normal port on the other hub. If using a crossover cable, it must be connected to normal ports on both hubs. Incorrect Answers: If you took a crossover cable and plugged it into an MDIX port, it will be a double crossover (not an actual term). It just won't work due to incorrect pin-outs. Using a patch cable between two normal ports would work just fine on modern switches, but not on old school hubs! A straight-through cable is the same as a patch cable and it won't get the job done.

Patch antenna

Flat, plate-shaped antenna that generates a half-sphere beam; used for broadcasting to a select area. A directional antenna that has a planar surface and is usually mounted on a wall or column.

Which two of the following settings must be set correctly before a TCP/IP host can communicate with another host on the same network? (Select two.) Default gateway IP address Subnet mask DNS server

IP address and subnet mask. Correct Answers: To communicate with other hosts on the SAME network, a TCP/IP host needs only the IP address and the Subnet Mask. Incorrect Answers: The Default Gateway is the address of the router used to connect to hosts on OTHER networks, and the DNS Server setting specifies a DNS server to use for name resolution, which isn't required to communicate on the same network.

ESD (Electrostatic Discharge)

Static electricity that can build up and discharge causing damage to electronic components. Antistatic devices help prevent ESD damage.

A large office has a group of 15 users. Some of the users complain of poor performance. After scanning the network's performance, the network engineer discovers that many of the computers show moderate to weak signals even though there are two APs less than 15 feet (4 meters) away in either direction. Which of the following is MOST likely the cause? The receiver sensitivity is too high. There is an SSID mismatch. The closest APs are down. The local antennas are not powerful enough.

The closest APs are down. - The farther a client is from an AP, the slower it will transfer data.

Connie has a typical home network that consists of a Linksys WRT54G wireless router and two systems: one is wirelessly connected, and the other is wired. The internal network ID is 192.168.16.0/24. Both systems can access the Internet. While trying to determine why she cannot access a known Web site, Connie decides to run a tracert. The tracert stops at a particular router: 14.21.343.6. She tries to ping the router but gets no response. Which of the following is the most likely problem? 1. The Linksys router is not passing ping commands to the internet. 2. The router isn't using OSPF 3. That router is down.

The router is down

Your company has to move the heavily-used intranet Web server from one computer to a new, faster system. You make the changeover and send out an e-mail to let everyone know. You then start getting a number of e-mails back saying users cannot access the new Web site by DNS name, even though you updated the "A" record in the DNS server. What's the most likely problem? The users DNS cache still holds the old IP address to name association. The DNS server hasn't broadcast the new DNA name yet. The users must update their DHCP settings. The users must manually query the DNS server.

The users need to flush their DNS caches! Your systems will always look first in the cache to see if they've already resolved this query. If so, no need to go out and re-resolve it.

If I wanted to find my IP address and subnet mask on a Linux PC, which command would I use? Netstat Ifconfig Ipconfig Dig

ifconfig


Ensembles d'études connexes

Small Test - Economics EOC (GSE) UPDATED Domain: Macroeconomic Concepts

View Set

chapter 14 vision and perception

View Set

NURS 3270 Fundamentals Evolve -- Mod 9

View Set

Micro Chapter 3 Demand Launchpad Questions

View Set

Systems of Equations with 3 Variables

View Set

9.0 Module Objective: Explain how ARP and ND enable communication on a network.

View Set

Chapter 4: The Economy & Family Life

View Set

Ch 11: Exploring Earth's Interior

View Set