Network+ Chapter 14

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which Class of Service (CoS) priority value should be assigned to a video conference call? Answer - 6 - 3 - 2 - 4 - 7 - 1 - 0 - 5

- 4

You have been asked to perform a penetration test for a company to see if any sensitive information can be captured by a potential hacker. You used Wireshark to capture a series of packets. Using the tcp contains Invoice filter, you found one packet. Using the captured information shown, which of the following is the name of the company requesting payment? Answer -ACME, Inc -Home Shop -Big 7, Inc -Wood Specialist

-ACME, Inc

Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software? Answer -A traffic shaper -An application-specific integrated circuit -Ethernet bonding -A caching engine

-An application-specific integrated circuit

-Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN. -Create a dedicated network for the Windows 2000 workstations that's completely isolated from the rest of the network, including a separate internet connection. -Install antivirus software on the Windows 2000 workstations, and configure them to automatically download and install updates. -Implement a host-based firewall on each Windows 2000 workstation, and configure them to automatically download and install

-Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.

A user reports that she can't connect to the internet. After some investigation, you find that the wireless router has been misconfigured. You're responsible for managing and maintaining the wireless access point. What should you do next? Answer -Determine if escalation is needed. -Create an action plan. -Document the problem. -Fix the problem.

-Create an action plan.

Users report that the network is down. As a help desk technician, you investigate and determine that a specific router is configured so that a routing loop exists. What should you do next? Answer -Create an action plan. -Document the problem. -Fix the problem. -Determine if escalation is needed.

-Determine if escalation is needed.

A user reports that she can't connect to a server on your network. You check the problem and find out that all users are having the same problem. What should you do next? Answer -Create an action plan. -Establish the most probable cause. -Identify the affected areas of the network. -Determine what has changed.

-Determine what has changed.

You are a network administrator for your company. A frantic user calls you one morning exclaiming that nothing is working. What should you do next in your troubleshooting strategy? Answer -Establish what has changed. -Identify the affected area. -Establish the symptoms. -Recognize the potential side effects of the problem.

-Establish the symptoms.

A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the website from being accessible on the internet. Which solution should you implement? Answer -Spanning Tree -Traffic shaping -Ethernet bonding -QoS

-Ethernet bonding

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the MOST likely cause is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next? Answer -Document the problem and the solution. -Apply the patch to the router. -Identify possible side effects of the solution. -Identify the affected areas.

-Identify possible side effects of the solution.

A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem. What should you do next? Answer -Identify the affected areas of the network. -Determine if anything has changed. -Determine if escalation is necessary. -Establish the most probable cause.

-Identify the affected areas of the network.

A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works. What should you do next? Answer -Document the problem and solution. -Create an action plan. -Identify the results and side effects of the solution. -Determine if escalation is necessary.

-Identify the results and side effects of the solution.

Which of the following statements about DSCP are true? (Select two.) Answer -Classification occurs at Layer 2. -It uses the DiffServ field to add precedence values. -The network switch assigns priority values. -Classification occurs at Layer 3. -It uses a priority value between 0 and 7.

-It uses the DiffServ field to add precedence values. -Classification occurs at Layer 3.

Which type of switch optimizes network performance by using ASIC to perform switching at wire speed? Answer -Layer 1 switch -Multilayer switch -Unmanaged switch -Layer 2 switch

-Multilayer switch

You are in the process of implementing a network access protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. You need to isolate the remediation network from the secure network. Which technology should you implement to accomplish this task? Answer -Network segmentation -Virtual private network (VPN) -Data encryption using PKI -Port security

-Network segmentation

With Wireshark, you've used a filter to capture only the desired packet types. Using the information shown in the image, which of the following BEST describes the effects of using the host 192.168.0.34 fil? Answer -Only packets with 192.168.0.34 in either the source or destination address are captured. -Only packets on the 192.168.0.34 network are captured. -Only packets with 192.168.0.34 in the destination address are captured. -Only packets with 192.168.0.34 in the source address are captured.

-Only packets with 192.168.0.34 in either the source or destination address are captured.

You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use? Answer -Packet sniffer -System logs -Port scanner -IPS -IDS

-Port scanner

What is the purpose of using Ethernet bonding? (Select two.) Answer -Provides a failover solution for network adapters. -Provides increased bus speeds. -Increases read and write operations between the system bus and network adapters. -Increases network performance. -Enables Dual Remote Access (DRA) over a WAN link.

-Provides a failover solution for network adapters. -Increases network performance.

A new assistant network administrator was recently hired by your organization to relieve some of your workload. You assigned the -Replace the patch cables connecting the switches together with red crossover cables. -Enable port security on each switch port. -Remove the patch cable connecting the first switch to the third switch. -Enable STP on each switch. -Connect the patch panel to the switches with red crossover cables. -Consolidate all patch cables from the patch panel to a single switch.

-Remove the patch cable connecting the first switch to the third switch. -Enable STP on each switch.

You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, she can no longer access the network. You go to the office and see that some of the wires in the Cat 5 network cable are now exposed. You make another cable and attach it fro What should you do next in your troubleshooting strategy? Answer -Test the solution. -Establish what has changed. -Document the solution. -Recognize the potential side effects of the solution.

-Test the solution.

Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently? Answer -netstat -arping -SSH -arp

-arp

You are troubleshooting a connectivity problem on a Linux server. You're able to connect to another system on the local network but not to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server? Answer -ifconfig -dig -ipconfig -Telnet

-ifconfig

Which TCP/IP utility gives you the following output? -netstat -a -arp -a -ping -ipconfig

-ipconfig

Examine the following output: Active ConnectionsProto Local Address Foreign Address State TCP SERVER1:1036 localhost:4832 TIME_WAIT TCP SERVER1:4798 localhost:1032 TIME_WAIT TCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAIT TCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHED TCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHED TCP SERVER1:2995 Which of the following utilities produced this output? Answer -nslookup -dig -ifconfig -netstat

-netstat

Which TCP/IP utility gives the following output? Reply from 192.168.1.168: bytes = 32 time < 10ms TTL = 128 Reply from 192.168.1.168: bytes = 32<10ms TTL = 128 Packets: Sent = 4, Received = 4, Lost = 0 <0% loss> -ping -ifconfig -ipconfig -arp -a

-ping

While working on a Linux server, you're unable to connect to the Windows Server system on the internet. You are able to ping the default gateway on your own network, so you suspect that the problem lies outside the local network. Which utility would you use to track the route a packet takes as it crosses the network? Answer -traceroute -nslookup -ifconfig -tracert

-traceroute

Match the Class of Service (CoS) priority on the left with its corresponding value on the right.

0 - Background 1 - Best effort 2 - Excellent effort 3 - Critical applications 4 - Video (< 100ms latency) 5 - Voice (< 10ms latency) 6 - Internetwork control 7 - Network control

A security analyst is using tcpdump to capture suspicious traffic detected on port 443 of a server. The analyst wants to capture the entire packet with hexadecimal and ASCII output only. Which of the following tcpdump options will achieve this output? Answer A. -SA port 443 B. src port 443 C. -SX port 443 D. -SXX port 443

C. -SX port 443

When troubleshooting network issues, it's important to carry out tasks in a specific order. Drag each trouble shooting task on the left to the correct step on the right.

Step 1 - Identify the problem. Step 2 - Establish a theory of probable cause. Step 3 - Test the theory to determine the cause. Step 4 - Establish a plan of action. Step 5 - Implement the solution or escalate. Step 6 - Verify full system functionality. Step 7 - Document findings, actions, and outcomes.

-Content switch

You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware, not just software configurations. In addition, SSL sessions should use the hardware components in the device to create the sessions. Which type of device should you use to accomplish this? Answer -Content switch -Proxy server -Circuit-level gateway -Bandwidth shaper


Ensembles d'études connexes

PrepU Chapter 29: Drug Therapy for Shock and Hypotension

View Set

Chapter 26 - Secondary growth in stems; Effects of secondary growth on the primary body of the stem (2)

View Set

Chapter 36 Musculoskeletal Disorders

View Set

Compensation Management Chapter 7

View Set

NC Property & Casualty Exam Practice Questions

View Set

Deductive Arguments vs. Inductive Arguments

View Set