Network+ Master Set
802.11b
2.4 GHz DSSS 11 Mbps ~300' No backward compatibility
The IEEE 802.11a standard specifies a channel bandwidth of:
20 MHz
The IEEE 802.11g standard specifies a channel bandwidth of:
20 MHz
Which of the answers listed below refers to an IPv4 address range reserved for future use?
240.0.0.0 - 255.255.255.254 (240.0.0.0/4)
How many layers does the OSI model contain?
7
Which category (CAT) of UTP cabling is the fastest?
7
What wavelength is used on a 10GBaseSR network?
850
Which connector is currently used in wired networks?
8P8C
What is the maximum length for UTP cables allowed by the TIA/EIA 568 cabling specification?
90M
Which of the DNS database records listed below returns a 32-bit IP address?
A
What are you trying to discover when you test a cable for continuity?
A broken wire
A strong password that meets the password complexity requirement should contain: (Select best answer)
A combination of characters from at least 3 character groups
Which item is part of a wall outlet?
A female jack
In the newer Bluetooth 4.0 version, what is required during the pairing process?
A four-digit personal identification number (PIN)
What are the characteristic features of ATM? (Select all that apply)
A network technology used for connecting devices on a WAN Used in SONET networks 53-byte data transfer unit (a.k.a. ATM cell) Data transfer rates of up to 10 Gbps
A network protocol that allows for secure file transfer over SSL is called:
File Transfer Protocol Secure (FTPS)
Which routing metric determines the largest frame a particular technology can handle?
MTU (Maximum Transmission Unit)
Disabling SSID broadcast:
Makes a WLAN harder to discover
A type of technology that provides control over the usage of a mobile device within a designated area is referred to as:
Geofencing
What type of IPv6 address do you need to get on the Internet?
Global unicast address
If you provide support for, but do not install, UTP networks, which two tools are most important to use?
Good, medium-priced toner and a good, medium-priced cable tester
Which protocol allows for retrieving contents of an Internet page from a web server?
HTTP
Which of the protocols listed below enables remote access to another computer on the network via web browser?
HTTPS
__________ problems manifest themselves as intermittent problems.
Heat and power
Which vendor was one of the earliest PaaS providers?
Heroku
IPv6 addresses are expressed with the use of:
Hexadecimal numbers
What term best describes the way the DNS name space is organized?
Hierarchical
What are the characteristic features of satellite Internet connections? (Select 3 answers)
High signal latency Interference (weather dependent) Relatively high cost in comparison to terrestrial links
Which term refers to the passage of a packet through a router?
Hop
Which term describes the cabling that goes more or less horizontally from a work area to the telecommunications room?
Horizontal cabling run
Which alternate site allows for fastest disaster recovery?
Hot site
Which of the following terms refers to a duplicate of the original site, with fully operational computer systems as well as near-complete backups of user data?
Hot site
What is the meaning of the term "capacitance"?
How long it takes a wire to get a full charge
Border Gateway Protocol (BGP) falls into the category of:
Hybrid routing protocols
TCP port 80 is assigned to:
Hypertext Transfer Protocol (HTTP)
In virtualization technology, a software program that manages multiple operating systems (or multiple instances of the same operating system) on a single computer system is called:
Hypervisor
Which organization assigns Autonomous System Numbers (ASNs)?
IANA
Which organization has the authority to create new top-level domain names?
ICANN
Which protocol does the ping application use?
ICMP
Which of the answers listed below illustrates the difference between passive and active security breach response?
IDS vs. IPS (Intrusion Detection System vs. Intrusion Prevention System)
Which IEEE standard provides the implementation basis for most modern WLANs?
IEEE 802.11
In 802.11 networks, the term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth. Channel bonding was first introduced with the:
IEEE 802.11n standard
Which of the following standards implements PoE+?
IEEE 802.3at
The arp command can be used to perform what kind of resolution?
IP to MAC
The DNS database AAAA record creates a pointer that maps a hostname to:
IPv6 address
Which task is the first step in the troubleshooting process?
Identify the problem.
A type of layer 2 network switch with configuration features that can be modified through a user interface is referred to as:
Managed switch
What are the characteristic features of the 100BaseTX Ethernet standard? (Select 3 answers)
Maximum cable segment length of 100 meters Transfer rate of 100 Mbps over two-pair Cat 5 or better cable Twisted-pair copper cabling (Category 5 or higher)
Which of the password policy settings listed below prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?
Maximum password age setting
Which type of network topology provides the highest level of redundancy?
Mesh
Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?
Minimum password age setting
DNS record that specifies a list of additional name servers on a domain is called:
Name Server? (NS)
Which two tools dominate the vulnerability testing arena?
Nessus and OpenVAS
Which of the answers listed below refer to IMAP4? (Select 2 answers)
Offers improved functionality in comparison to POP3 Serves the same function as POP3
Which of the answers listed below refer to a very basic UPS type commonly used for protecting a single PC? (Select 2 answers)
Offline Standby
Which of the answers listed below refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments?
Omnidirectional antenna
If you suspect that a fiber-optic run has a break, which type of device would you use to determine if there is a break, and to identify the location of the break?
Optical Time Domain Reflectometer (OTDR)
EMI shielding protects the transferred data signals from: (Select 2 answers)
Outside interference Eavesdropping
Most PCs today have two types of expansion slots: PCI and __________.
PCIe
Which of the following terms refer to solutions used for controlling network resources and assigning priority to different types of traffic? (Select 2 answers)
Packet shaping Quality of Service (QoS)
Which of the following answers refer(s) to frame relay? (Select 3 answers)
Packet-switching method Data transfer rates of up to 45 Mbps A network technology used for connecting devices on a WAN
Which connection type is limited to point-to-point topology and uses a 25-pin female DB type?
Parallel
Which tool is used to create a baseline on Windows systems?
Performance Monitor
A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as:
Phishing
A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of: (Select 2 answers)
Phishing Social engineering
A solution that allows to supply electricity over standard Ethernet cables is known as: (Select 2 answers)
PoE IEEE 802.3af
IEEE 802.3at
PoE+. Power over Ethernet+.
Which network protocol enables encapsulation of PPP frames within 802.3 frames?
Point-to-Point Protocol over Ethernet (PPPoE)
Which of the following allows an administrator to inspect the traffic passing through a network switch?
Port mirroring
Which of the tools listed below would be used to identify running services on a networked host?
Port scanner
Which WAP configuration setting allows for adjusting the boundary range of a wireless signal?
Power level controls
What does the term "Blackout" refer to?
Power outage
Which advantage of virtualization provides substantial reduction in dollars spent and electricity used?
Power savings
Which device is an example of a peripheral device?
Printer
Which mode allows an intrusion detection system (IDS) to inspect a copy of every packet on a network?
Promiscuous
Which utility is categorized in the CompTIA Network+ exam as a hardware tool?
Protocol analyzer
Which of the answers listed below refers to a cloud computing delivery model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?
Infrastructure as a Service (IaaS)
Which term best describes disgruntled employees abusing legitimate access to company's internal resources?
Insider threat
Which column in a routing table tells the router which of its ports to use?
Interface
In a modern DCS, each of the local controllers connects (eventually) to a centralized controller—called the __________—where global changes can be managed.
Internet Connection Sharing (ICS) server
An emerging field of new technologies, such as wearable tech or home automation is known as:
IoT (Internet of Things)
Which term is another name for an optical power meter?
Light meter
When designing and building a network, which requirements define the network's needs?
List of requirements
Which technology is marketed as and now generally accepted as a true 4G technology?
Long Term Evolution (LTE)
Which free Web server was originally created for the UNIX/Linux platforms, but now runs on multiple operating systems (including Windows)?
Apache HTTP Server
What is the most common type of a DSL Internet access?
Asymmetric digital subscriber line (ADSL)
Which of the answers listed below refers to the process of granting or denying access to resources?
Authorization
Which term defines what an authenticated person can do with data?
Authorization
Which of the answers listed below refers to a possible symptom of exhausted DHCP scope?
Automatic Private IP Addressing (APIPA)
Which deployment model uses employees' existing mobile devices for use by the corporation?
BYOD
Bayonet Neill-Concelman (BNC) connector is used with:
Coaxial copper cabling
A lightly protected subnet consisting of publicly available servers placed on the outside of the company's firewall is referred to as:
DMZ
A wireless disassociation attack is a type of:
Denial of Service (DoS) attack
On a TCP/IP network, a router determines where an incoming packet should go by looking at the packet's __________.
Destination IP
Using the ping command, which message is displayed if your computer has no route to the address listed?
Destination host unreachable
A deauthentication (deauth) attack is a form of __________ attack.
DoS
Which of the terms listed below refers to a backup technique that allows for creating an exact copy of an entire drive and replicating the drive to a new computer or to another drive on the same computer in case of a hard drive failure?
Drive imaging
Which term refers to ports in the 49152 to 65535 range?
Dynamic
What is a better known name for dynamic IP addressing?
Dynamic Host Configuration Protocol (DHCP)
Which VPN type enables direct communication links between remote hosts on a WAN?
Dynamic Multipoint Virtual Private Network (DMVPN)
What is the European counterpart to a T1 line?
E1
What are the characteristic components of the OSI data link layer? (Select 3 answers)
MAC address Switch Frame
An Ethernet switch forwards LAN traffic from connected devices based on the information stored in:
MAC address table
A network access method whereby the 48-bit physical address assigned to each NIC is used to grant/deny network access is known as:
MAC filtering
A computer network connecting multiple LANs over an area of a city or campus is referred to as:
MAN
Every Web server must include "www" as part of its name.
False
For IPv6 networks to function, they need common network IDs.
False
Hardening IoT devices increases the danger of loss or downtime on the devices.
False
In a Windows system, a technician runs the ip utility.
False
Layer 2 Tunneling Protocol (L2TP) has authentication and encryption.
False
Microsoft introduced the first bare-metal hypervisor called ESX.
False
The TCP/IP model consists of six layers.
False
The term public cloud refers to the services and applications that are owned by the public.
False
The terms emulation and virtualization refer to the same technology.
False
The two types of meshed topologies are partially meshed and wholly meshed.
False
The vast majority of cabling problems occur long after a successful network installation.
False
To write IPv6 addresses containing strings of zeroes, you can use a pair of periods (..) to represent a string of consecutive groups with a value of zero.
False
Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol.
False
Twisting the fiber is a popular action with fiber-optic cables.
False
Two nearby wireless access points (WAPs) should use close channels like 6 and 7.
False
Two systems on the same network may have NICs with the same MAC address.
False
Unfortunately, routing tables in IPv6 offer a much larger footprint than routing tables in IPv4.
False
User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).
False
User Datagram Protocol (UDP) is a connection-oriented protocol.
False
Using class blocks enables a much more efficient use of IP addresses compared to subnetting.
False
When a collision occurs on an Ethernet network, the cable is reserved for the nodes whose data collided until they have finished retransmitting.
False
VoIP gateway is a network device that converts voice and fax calls, in real time, between an IP network and: (Select 2 answers)
Public Switched Telephone Network (PSTN) Plain Old Telephone System (POTS)
Which tool puts UTP wires into 66- and 110-blocks?
Punchdown tool
What is the functionality provided by the Class of Service (CoS) parameter? (Select 2 answers)
QoS Traffic management
Which standard offers authentication, authorization, and accounting?
RADIUS
Which core function is sent by the agent after the SNMP manager queries an agent with a GetRequest or GetNextRequest?
Response
Which term refers to the administrative account native to Linux?
Root
Which of the following terms refers to an agreement that specifies performance requirements for a vendor?
SLA
TCP port 25 is used by:
SMTP
Which of the protocols listed below enables secure remote access to another computer on the network via command line?
SSH
Examples of copper cabling types used in Ethernet networks include: (Select all that apply)
STP UTP Coax
A range of IP addresses that a DHCP server can lease out to DHCP clients is known as:
Scope
A network protocol that allows for secure file transfer over Secure Shell (SSH) is called:
Secure File Transfer Protocol (SFTP)
The SMTP protocol is used for: (Select 2 answers)
Sending email between mail servers Sending email from a client device
Who is responsible for the process of determining critical assets?
Senior management
Which industrial control system (ICS) device monitors characteristics like temperature?
Sensor
What cabling predates both networking and the personal computer?
Serial
Which of the following answers refers to a set of bug fixes or code enhancements available in the form of a single installable package?
Service pack
Layer 5 of the OSI model is also referred to as:
Session layer
Which OSI layer assumes the responsibility for managing network connections between applications?
Session layer
Which of the tools listed below allows for secure disposal of physical documents?
Shredder
Which term represents a measurement of how well a wireless device is connecting to other devices?
Signal strength
Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks?
Simple Mail Transfer Protocol (SMTP)
10GBaseLR/LW
Single-mode fiber 1310 nm LC Length of 10 km
Which of the answers listed below refer(s) to the feature(s) of SFP? (Select all that apply)
Small form factor transceiver Converts electrical signals to optical signals Newer transceiver type that replaces GBIC Modular (hot swappable) interface Converts optical signals to electrical signals Data transfer of 1 Gbps
Which of the following answers refers to a dedicated local network consisting of devices that provide data access?
Storage Area Network (SAN)
Spanning Tree Protocol (STP) provides protection against:
Switching loops
Port 109
TCP POP, Post Office Protocol, version 2
Port 995
TCP POP3 over SSL (encrypted transmission)
Port 648
TCP RRP, Registry Registrar Protocol
Port 556
TCP Remotefs, rfs, rfs_server
Port 115
TCP SFTP, Simple File Transfer Protocol
Port 706
TCP SILC, Secure Internet Live Conferencing
Port 720
TCP SMQP, Simple Message Queue Protocol
Port 465
TCP SMTP over SSL - CONFLICT with registered Cisco protocol
Port 901
TCP Samba Web Administration Tool (SWAT)
Port 981
TCP SofaWare Technologies Remote HTTPS management for firewall devices running embedded Checkpoint Firewall-1 software
Port 712
TCP TBRPF, Topology Broadcast based on Reverse-Path Forwarding
Port 711
TCP TDP, Tag Distribution Protocol
Port 604
TCP TUNNEL
Port 81
TCP Torpark - Onion routing ORport
Port 117
TCP UUCP-PATH
Secure Shell (SSH) protocol runs on:
TCP port 22
A network technician uses Remote Desktop Protocol (RDP) client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection?
TCP port 3389
Which of the following ports is used by HTTPS?
TCP port 443
Which of the ports listed below are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers)
TCP port 5060 TCP port 5061
Port 513
TCP, UDP Login Who
Port 0
TCP, UDP Reserved; do not use (but is a permissible source port value if the sending process does not expect messages in response)
Port 512
TCP, UDP exec, Remote Process Execution comsat, together with biff: notifies users of new c.q. yet unread e-mail
Port 152
TCP, UDP BFTP, Background File Transfer Program
Port 547
TCP, UDP DHCPv6 server
Port 9
TCP, UDP DISCARD protocol
Port 53
TCP, UDP DNS (Domain Name System)
Port 7
TCP, UDP ECHO protocol
Port 135
TCP, UDP EPMAP / Microsoft RPC Locator Service
Port 259
TCP, UDP ESRO, Efficient Short Remote Operations
Port 989/990
TCP, UDP FTP Protocol (data and control) over TLS/SSL
Port 41
TCP, UDP Graphics
Port 11
TCP, UDP SYSTAT protocol
What is the de facto protocol suite of the Internet?
TCP/IP
What network protocol do Apple systems use today?
TCP/IP
UDP port 69 is assigned to:
TFTP
What does the term "Miredo" refer to?
Teredo tunneling software
What information is included in the data portion of an Ethernet frame on an IP network?
The IP addresses of both systems
UTP category ratings are based on what criteria?
The highest frequency the cable can handle
What is a shared attribute of all members of the Ethernet family of networking technologies?
The network access method
A Trojan can appear as a game, like poker.
True
A network protocol is special software that allows a network to use logical addressing in order to move data from one subnet to another.
True
A physical point where an ISP's network ends and connects with the customer's on-premises wiring (which also defines where the ISP's responsibility for maintenance ends and the consumer's responsibility begins) is referred to as demarcation point, or demarc.
True
A properly grounded, 20-amp dedicated circuit will suffice for a single small rack.
True
A single non-standard Ethernet frame that allows for much larger maximum payload size is commonly referred to as jumbo frame.
True
A single switch configured into two VLANs is the simplest form of VLAN possible.
True
A special type of cabling with fire-retardant jacket placed inside the space between structural floor and dropped ceiling or inside walls is known as a plenum-rated cabling.
True
A type of IDS that relies on predetermined attack patterns to detect intrusions is referred to as a signature-based IDS.
True
Almost all network technologies that use fiber-optic cable require pairs of fibers.
True
An IP address that doesn't correspond to any actual physical network interface is called a virtual IP address (VIP/VIPA).
True
Every serving application has an open port.
True
Fiber-optic cable is attractive for use in high electromagnetic interference (EMI) areas.
True
For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP).
True
Glass is notorious for bending radio waves as the waves pass through them causing refraction.
True
What are the characteristics of SMB/CIFS? (Select 2 answers)
Provides shared access to files, directories, and devices Used mainly by computers running Microsoft Windows operating systems
Setting up a wireless connection in Network and Sharing Center Control Panel applet in MS Windows requires: (Select 3 answers)
Providing the wireless network name Selecting security/encryption type Typing in the network security key (Wi-Fi password)
Lots of operating systems come with built-in DNS server software, including Windows Server.
True
NetBIOS was suitable only for small networks.
True
Network Address Translation (NAT) provides an IP proxy between a private LAN and a public network such as the Internet.
True
Networked clients not residing on the same subnet as the DHCP server can still obtain an IP address from the server through a DHCP relay agent (a.k.a. IP helper).
True
No two systems on the same network can share the same IP address.
True
One nice aspect of DSL is that you do not have to run new phone lines.
True
The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a shared medium before transmitting to prevent collisions and loss of data.
True
With full-duplex, a NIC can send and receive data at the same time.
True
How many copper wires are used by a T1 line?
Two pairs
Port 518
UDP NTalk
Port 67/68
UDP DHCP (Dynamic Host Configuration Protocol)
Port 666
UDP Doom, First online FPS
Port 750
UDP Kerberos version IV
Port 123
UDP NTP (Network Time Protocol) - used for time synchronization
Port 69
UDP TFTP (Trivial File Transfer Protocol)
Port 82
UDP Torpark - Control Port
Port 533
UDP netwall, For Emergency Broadcasts
Dynamic Host Configuration Protocol (DHCP) runs on: (Select 2 answers)
UDP port 67 UDP port 68
Which of the following answers refer to the characteristics of copper-based networks? (Select 3 answers)
Used for last-mile cable runs Less expensive in comparison to optical fiber Limited bandwidth and maximum cable segment length in comparison to fiber-optic links
What are the characteristics of fiber-optic cabling? (Select all that apply)
Used for network backbone cabling Immunity to electromagnetic interference Provides higher level of security than copper cabling (difficult to tap into) More suitable for carrying digital information than copper cabling
What are the characteristic features of the RJ-45 connector? (Select 2 answers)
Used with Ethernet network cabling Copper cabling connector
Which program is an example of bare-metal virtualization software?
VMware ESXi
Which tool is an example of a Type 1 hypervisor?
VMware ESXi
Which of the following answers refers to a non-proprietary RDP alternative that enables control over another computer on the network with the use of a graphical user interface?
VNC (Virtual Network Computing)
Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network through the Internet?
VPN
Which of the terms listed below does not fall into the category of preventive physical security controls?
Video surveillance
Which of the terms listed below refers to a solution that allows multiple operating systems to work simultaneously on the same hardware?
Virtualization
Which term refers to taking the hardware of the host system and segmenting it into individual virtual machines?
Virtualization
A system administrator has identified a server that may not have been updated with the latest security patches. Which of these would be the best way to determine if any known vulnerabilities exist on this server?
Vulnerability scan
Which of the following answers lists an example of a modern network bridging device?
WAP
Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices?
Wireless Wide Area Network (WWAN)
A type of network device used for improving wireless signal strength within homes and small offices is called:
Wireless range extender
Which type of malware replicates exclusively through networks?
Worm
Which term refers to the first generation of packet-switching technology?
X.25
Which of the answers listed below refer to highly directional antenna type used for long-range point-to-point bridging links? (Select 3 answers)
Yagi antenna Dish antenna Parabolic antenna
In NetFlow, single flows are stored in a __________.
flow cache
A packet sniffer is a program that queries a network interface and collects packets in a file called a __________ file.
capture
What entry is made at the command prompt in UNIX/Linux to display DNS server information?
cat /etc/resolv.conf
Time-division multiple access (TDMA) enabled multiple users to share the same __________ more or less at the same time.
channel
Which of the following devices would be used for connecting a router to a T1 line?
channel service unit/data service unit (CSU/DSU)
Which unit is used to measure signal loss in networking?
dB
Both near-end crosstalk (NEXT) and far-end crosstalk (FEXT) are measured in __________.
decibels
With misconfigured proxy ARP settings, the VPN concentrator can send what looks like a __________ attack on the LAN?
denial of service (DoS)
An access control list (ACL) is a rule applied to an interface that allows or denies traffic based on things like source or __________.
destination IP address
Which command, while not available on Windows, can be used on macOS/UNIX/Linux systems to diagnose DNS problems?
dig
Which of the tools listed below enable troubleshooting of problems related to name resolution? (Select 2 answers)
dig nslookup
A __________ is when a port intentionally drops a well-formed frame.
discard
In response to the demand for two-pair cabling, manufacturers often connect two fibers together to create __________ fiber-optic cabling.
duplex
Which of the following DNS database records maps a domain name to a list of mail servers for that domain?
mail exchanger record (MX)
ARP poisoning is a common method for __________ attacks.
man in the middle
Which of the following is an example of active eavesdropping?
man-in-the-middle attack (MITM)
Cat ratings are officially rated in __________, indicating the highest frequency the cable can handle.
megahertz (MHz)
Which command is a dynamic (keeps running) equivalent to traceroute?
mtr
If you are using NetBIOS, which command allows you to see if other local systems are visible?
net view
A command-line utility in MS Windows used for displaying protocol statistics and current TCP/IP network connections is called:
netstat
Software defined networking (SDN) cuts the control plane of individual devices out of the picture and lets an all-knowing program called a __________ controller dictate how both physical and virtual network components move traffic through the network.
network
Which tool is an example of a GUI port scanner and protocol analyzer?
nmap
Which of the following network administration command-line utilities can be used for DNS queries?
nslookup
A MAC address is also known as a(n) __________ address.
physical
Which utility uses Internet Message Control Protocol (ICMP) packets to query by IP or by name?
ping
What command can you use to tell a device to send packets to itself?
ping 127.0.0.1
Which utilities are excellent examples of connectivity software, applications that enable you to determine if a connection can be made between two computers?
ping and traceroute
The space between the acoustical tile ceiling in an office building and the actual concrete ceiling above is called the __________.
plenum
Which command-line command in MS Windows is used to display the contents of a routing table?
route print
Which tool is used to create, configure, and maintain virtual machines on the host from the comfort of a client computer running the tool?
vSphere Client
The different colors of the laser signals feature different __________.
wavelengths
When testing for continuity using a multimeter set it to Ohms; if you have a connection you will see a(n) __________ reading.
zero Ohms
What is the result of running "Add a VPN connection" in Settings in the Control Panel on the Windows client side of a PPTP VPN connection?
A virtual NIC is created.
The IEEE 802.11ac standard specifies a maximum channel bandwidth of:
160 MHz
SNMP runs on UDP port:
161
What User Datagram Protocol (UDP) ports does SNMP use for unsecure communication?
161 and 162
Evolved High-Speed Packet Access (HSPA+) provided theoretical speeds up to __________, although most HSPA+ implementations rarely exceeded 10 Mbps.
168 Mbps
Which of the following answers lists the broadcast address for the 192.168.50.155/20 network?
192.168.63.255
A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:
ACL
Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
ACL
Which of the answers listed below refers to a rule-based network access control mechanism implemented on routers, switches, and firewalls that allows to filter network traffic by IP address or port number?
ACL
Which of the following answers refers to a wireless connectivity technology used for monitoring sensor data collected from low-powered sports and fitness equipment?
ANT+
Which type of firewall is built into most consumer-grade routers?
A small office/home office (SOHO) firewall
Which safety issue is considered to be a physical safety issue?
A technician lifting equipment
An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker's IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario?
ARP poisoning
An Ethernet switch table containing IP-to-MAC address mappings is called:
ARP table
A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as:
Acceptable Use Policy (AUP)
In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:
Accounting
Which type of domain allows all of the domain controllers to be equal partners, such that any domain controller can take over if one domain controller fails?
Active Directory
Which NIC light turns on when the card detects network traffic and intermittently flickers when operating properly?
Activity
Which industrial control system (ICS) device makes changes that modify a characteristic such as temperature?
Actuator
A wireless networking topology in which client devices communicate directly with each other without the use of a controlling Access Point (AP) is called:
Ad hoc mode
Which term refers to a program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows?
Adware
According to the troubleshooting theory, verification of full system functionality and implementation of applicable preventative measures should be performed:
After implementing the solution
Which term refers to physically separating your network from every other network?
Air gap
Which tool is an open-source tool for penetration testing pretty much every aspect of wireless networks?
Aircrack-ng
Which term refers to a cipher's underlying mathematical formula?
Algorithm
Restoring data from an incremental backup requires: (Select 2 answers)
All copies of incremental backups made since the last full backup Copy of the last full backup
Which type of algorithm is used when two different keys, one to encrypt and one to decrypt, are used in encryption?
Asymmetric-key
Which part of the AAA security architecture deals with the verification of the identity of a person or process?
Authentication
A type of Ethernet interface that automatically detects the required cable connection type (straight-through vs. crossover) and configures the connection appropriately is known as:
Auto MDI-X
An IPv6 link-local address is an equivalent of IPv4's:
Automatic Private IP Addressing (APIPA) address
Shielded Twisted-Pair (STP) cabling reduces what kind of interference? (Select 2 answers)
Crosstalk EMI
Which of the following attack types relies on amplification effect?
DDoS attack
Which of the following connector types are used for RS-232 serial communications? (Select 2 answers)
DE-9 DB-25
A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:
DHCP
APIPA addresses are valid only for communications within a network segment that a given host is connected to. A host with APIPA-assigned address (i.e. an IP address in the range between 169.254.0.1 and 169.254.255.254) cannot connect to the Internet. The assignment of APIPA address typically indicates a problem related to:
DHCP
An expired IP address indicates a problem with:
DHCP
Which tool automatically assigns an IP address whenever a computer connects to the network?
DHCP
A security feature of a network switch that provides countermeasures against rogue DHCP servers is called:
DHCP snooping
A security administrator is concerned that documents and spreadsheets containing credit card information may be transmitted to the Internet. Which of these would be the best way to identify the transmission of this sensitive information?
DLP (Data Loss Prevention)
A network engineer is designing a WAN that would connect all remote locations to each other using encrypted tunnels. Which of these WAN technologies best fits this description?
DMVPN (Dynamic Multpoint VPN)
A network admin can ping remote host by its IP address, but not by FQDN (Fully Qualified Domain Name). Which of the following is the most probable source of the problem?
DNS
Remapping a domain name to a rogue IP address is an example of what kind of exploit?
DNS poisoning
In order to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?
DNS server
Each analog voice call gets converted into a __________ signal at the telephone company's central office before being multiplexed into larger circuits.
DS0
What is the most basic data chunk you get in the telephone world?
DS1
Layer 2 of the OSI model is known as:
Data link layer
Examples of protocols used for implementing secure VPN tunnels include: (Select 3 answers)
Datagram Transport Layer Security (DTLS) Internet Protocol Security (IPsec) Secure Sockets Layer/Transport Layer Security (SSL/TLS)
IPv4 addresses are expressed with the use of:
Decimal numbers
Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?
Degaussing
A network manager has asked you to coordinate the installation of a new smartjack. What location should you use for this installation?
Demarc point
Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets?
ICMP
Which network protocol enables detection of packet loss?
ICMP (Internet Control Message Protocol)
Which protocol is best for simple, connectionless applications that never need more than a single packet?
ICMP (Internet Control Message Protocol)
Which IEEE committee defines frames, speeds, distances, and types of cabling to use in a network environment?
IEEE 802
Which of the answers listed below applies to a situation where an Ethernet switch acts as an authenticator for devices connecting to a network through one of its ports?
IEEE 802.1X
What type of unit is formed by two or more wireless nodes communicating in ad hoc mode?
Independent Basic Service Set (IBSS)
Which of the solutions listed below would be used to provide redundant power source for datacenter server racks?
Independent power circuits
What is the function of archive bit?
Indicating whether a file has been modified since the last backup
Which of the answers listed below refers to a high-speed alternative to Fibre Channel technology?
InfiniBand
Which of the answers listed below refers to a short distance, line-of-sight technology used for example in home remote controls?
Infrared Radiation (IR)
Which cloud service model is used by Amazon Web Services (AWS)?
Infrastructure as a Service (IaaS)
A wireless networking topology consisting of at least one Access Point (AP) is referred to as:
Infrastructure mode
Which of the following terms refers to the OSI network layer?
Layer 3
The term "Presentation layer" refers to:
Layer 6 of the OSI model
The application layer of the OSI model is also known as:
Layer 7
The duration of time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as:
Lease
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
Domain Name System (DNS)
The term "Brownout" refers to what kind of situation?
Drop in voltage
Which of the following would add power redundancy on a server box?
Dual-power supply
Which type of NAT allows many computers to share a pool of routable IP addresses that number fewer than the computers?
Dynamic
Automatic routing table update is a feature of:
Dynamic routing
What is another name for electronic discovery?
E-discovery
Which hypervisor is considered to be the industry leader?
ESXi
Which of the following enables automatic configuration of an IPv6 address?
EUI-64
A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker's attention from the actual corporate network is known as:
Honeypot
A network segment utilizing only this type of device is the most prone to network performance degradation due to large number of network collisions.
Hub
The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance.
Hub
Which of the following examples meets the requirement of multifactor authentication?
Password and biometric scan
Which of the following password policy settings determines the number of unique new passwords that must be associated with a user account before an old password can be reused?
Password history setting
The two factors that are considered important for creating strong passwords are: (Select 2 answers)
Password length Password complexity
An Ethernet straight-through cable is also commonly referred to as:
Patch cable
Which of the following answers refer to common cabling type used for connecting workstations to network devices? (Select 2 answers)
Patch cable Straight-through cable
A simple device consisting of multiple connector blocks and ports used for cable management is known as:
Patch panel
What type of agent is composed of modules that perform a thorough inventory of each security-oriented element in the computer?
Persistent agent
Which layer of the OSI model defines a method of moving radio waves?
Physical
Which of the following cloud service types would provide the best solution for a web developer intending to create a web app?
Platform as a Service (PaaS)
A type of enclosed space in a building (such as the one between a dropped ceiling and the structural ceiling) used for air handling is commonly referred to as:
Plenum
What is another name for dynamic NAT?
Pooled NAT
Your company has a single server on a private LAN that it wants to make accessible from the Internet. Which of the following would give the server the protection of NAT, while allowing access to that server from the Internet?
Port Forwarding
Which technology is incredibly useful for any type of situation where an administrator needs to inspect packets coming to or from certain computers?
Port Mirroring
A server with a private IP address has been set up to handle requests from an outside (public) network. Which of the solutions listed below would enable this function?
Port forwarding
Which of the following acronyms refers to a client authentication method used in WPA/WPA2 Personal modes?
Pre-shared key (PSK)
Character encoding, data compression and encryption/decryption take place at the:
Presentation layer of the OSI model
What are the characteristic features of RADIUS? (Select 3 answers)
Primarily used for network access Combines authentication and authorization Encrypts only the password in the access-request packet
Which of the answers listed below refers to an ISDN (Integrated Services Digital Network) service designed for larger organizations that take advantage of digital PBX systems?
Primary Rate Interface (PRI)
A type of cloud infrastructure available solely for a single organization is known as:
Private cloud
Which type of agreement would be the most suitable for regulating responsibilities of users with administrative rights on a network?
Product Usage Agreement (PUA)
A type of server used for collecting diagnostic and monitoring data from networked devices is known as:
Syslog server
Which of the answers listed below describe the function of DiffServ architecture? (Select 2 answers)
QoS Traffic management
Which of the solutions listed below add(s) redundancy in areas identified as single points of failure? (Select all that apply)
RAID Dual-power supply Failover clustering Load balancing
Which type of RAID does not offer fault tolerance?
RAID 0
Which term refers to the most common limiting factor in a host's ability to run virtual machine?
RAM
Which of the answers listed below refers to an encryption algorithm used in TKIP?
RC4
A Microsoft-proprietary protocol providing a user with graphical interface for connecting to another networked host is known as:
RDP
Which of the following answers refer(s) to authentication protocol(s) providing the AAA functionality? (Select all that apply)
TACACS+ (Terminal Access Controller Access-Control System Plus) RADIUS (Remote Authentication Dial-In User Service)
Which protocol is by far the most common type of session on a typical TCP/IP network?
TCP
Which protocol is connection-oriented?
TCP
Port 20/21
TCP FTP
A network administrator needs to configure a firewall rule to allow FTPS traffic from a remote location. Which of these port numbers would allow this traffic?
TCP Port 443
Port 170
TCP Print-srv
Port 517
TCP Talk
Port 532
TCP netnews
Port 674
TCP ACAP, Application Configuration Access Protocol
Port 548
TCP AFP (Apple Filing Protocol)
Port 654
TCP AODV, Ad hoc On-Demand Distance Vector
Port 699
TCP Access Network
Port 311
TCP Apple Server-Admin-Tool, Workgroup-Manager-Tool
Port 179
TCP BGP (Border Gateway Protocol)
Port 829
TCP CMP (Certificate Management Protocol)
Port 782
TCP Conserver serial-console management server
Port 647
TCP DHCP Failover Protocol
Port 652
TCP DTCP, Dynamic Tunnel Configuration Protocol
Port 411
TCP Direct Connect Hub port
Port 700
TCP EPP, Extensible Provisioning Protocol
Port 591
TCP FileMaker 6.0 Web Sharing (HTTP Alternate, see port 80)
Port 79
TCP Finger protocol
Port 70
TCP Gopher protocol
Port 101
TCP HOSTNAME
Port 80
TCP HTTP (HyperText Transfer Protocol) - used for transferring web pages
Port 443
TCP HTTPS - HTTP Protocol over TLS/SSL (encrypted transmission)
Port 692
TCP Hyperwave-ISP
Port 695
TCP IEEE-MMS-SSL
Port 993
TCP IMAP4 over SSL (encrypted transmission)
Port 194
TCP IRC (Internet Relay Chat)
Port 702
TCP IRIS over BEEP
Port 102
TCP ISO-TSAP protocol
Port 88
TCP Kerberos - authenticating agent
Port 646
TCP LDP, Label Distribution Protocol
Port 701
TCP LMP, Link Management Protocol.
Port 515
TCP Line Printer Daemon protocol - used in LPD printer servers
Port 691
TCP MS Exchange Routing
Port 57
TCP MTP, Mail Transfer Protocol
Port 119
TCP NNTP (Network News Transfer Protocol) - used for retrieving newsgroups messages
Port 911
TCP Network Console on Acid (NCA) - local tty redirection over OpenSSH
Port 698
TCP OLSR, Optimized Link State Routing
Port 110
TCP POP3 (Post Office Protocol version 3) - used for retrieving E-mails
Port 107
TCP Remote Telnet Service
Port 540
TCP UUCP (Unix-to-Unix Copy Protocol)
Port 43
TCP WHOIS protocol
Port 587
TCP email message submission (SMTP) (RFC 2476)
Port 860
TCP iSCSI
Port 113
TCP ident - old server identification system, still used by IRC servers to identify its users
Port 543
TCP klogin, Kerberos login
Port 544
TCP kshell, Kerberos Remote shell
Port 873
TCP rsync File synchronisation protocol
Port 665
TCP sun-dr, Remote Dynamic Reconfiguration
Post Office Protocol v3 (POP3) uses:
TCP port 110
Which port enables the FTP's Data Connection for sending file data?
TCP port 20
The File Transfer Protocol (FTP) Control Connection for administering a session is established through:
TCP port 21
Port 137-139
TCP, UDP NetBIOS
Port 3389
TCP, UDP RDP (Remote Desktop Protocol)
Port 530
TCP, UDP RPC
Port 1
TCP, UDP TCPMUX
Port 902
TCP, UDP VMware Server
Port 520
TCP, UDP efs Routing - RIP
Port 514
TCP, UDP rsh protocol - used to execute non-interactive command line commands on a remote system and see the screen return syslog protocol - used for system logging
Port 384
TCP, UDP A Remote Network Server System
Port 531
TCP, UDP AOL Instant Messenger, IRC
Port 387
TCP, UDP AURP, AppleTalk Update-based Routing Protocol
Port 201
TCP, UDP AppleTalk Routing Maintenance
Port 264
TCP, UDP BGMP, Border Gateway Multicast Protocol
Port 19
TCP, UDP CHARGEN (Character Generator) protocol
Port 371
TCP, UDP ClearCase albd
Port 13
TCP, UDP DAYTIME protocol
Port 546
TCP, UDP DHCPv6 client
Port 383
TCP, UDP HP OpenView HTTPs Operations Agent
Port 593
TCP, UDP HTTP RPC Ep Map
Port 42
TCP, UDP Host Name Server
Port 220
TCP, UDP IMAP, Interactive Mail Access Protocol, version 3
Port 143
TCP, UDP IMAP4 (Internet Message Access Protocol 4) - used for retrieving E-mails
Port 323
TCP, UDP IMMP, Internet Message Mapping Protocol
Port 631
TCP, UDP IPP, Internet Printing Protocol
Port 213
TCP, UDP IPX
Port 500
TCP, UDP ISAKMP, IKE-Internet Key Exchange
Port 464
TCP, UDP Kerberos Change/Set password
Port 389
TCP, UDP LDAP (Lightweight Directory Access Protocol)
Port 636
TCP, UDP LDAP over SSL (encrypted transmission)
Port 218
TCP, UDP MPP, Message Posting Protocol
Port 639
TCP, UDP MSDP, Multicast Source Discovery Protocol
Port 18
TCP, UDP Message Send Protocol
Port 445
TCP, UDP Microsoft-DS (Active Directory, Windows shares, Sasser worm, Agobot, Zobotworm) Microsoft-DS SMB file sharing
Port 991
TCP, UDP NAS (Netnews Admin System)
Port 524
TCP, UDP NCP (NetWare Core Protocol) is used for a variety things such as access to primary NetWare server resources, Time Synchronization, etc.
Port 563
TCP, UDP NNTP protocol over TLS/SSL (NNTPS)
Port 366
TCP, UDP ODMR, On-Demand Mail Relay
Port 35
TCP, UDP QMS Magicolor 2 printer
Port 17
TCP, UDP QOTD (Quote of the Day) protocol
Port 5
TCP, UDP RJE (Remote Job Entry)
Port 26
TCP, UDP RSFTP - A simple FTP-like protocol
Port 554
TCP, UDP RTSP (Real Time Streaming Protocol)
Port 39
TCP, UDP Resource Location Protocol
Port 38
TCP, UDP Route Access Protocol
Port 369
TCP, UDP Rpc2portmap
Port 153
TCP, UDP SGMP, Simple Gateway Monitoring Protocol
Port 427
TCP, UDP SLP (Service Location Protocol)
Port 25
TCP, UDP SMTP (Simple Mail Transport Protocol) - used for e-mail routing between mailservers
Port 161/162
TCP, UDP SNMP (Simple Network Management Protocol)
Port 444
TCP, UDP SNPP, Simple Network Paging Protocol
Port 156
TCP, UDP SQL Service
Port 118
TCP, UDP SQL Services
Port 22
TCP, UDP SSH (Secure Shell) - used for secure logins, file transfers (scp, sftp) and port forwarding
Port 111
TCP, UDP SUNRPC protocol
Port 49
TCP, UDP TACACS Login Host protocol
Port 37
TCP, UDP TIME protocol
Port 318
TCP, UDP TSP, Time Stamp Protocol
Port 23
TCP, UDP Telnet protocol - unencrypted text communications
Port 992
TCP, UDP Telnet protocol over TLS/SSL
Port 209
TCP, UDP The Quick Mail Transfer Protocol
Port 401
TCP, UDP UPS Uninterruptible Power Supply
Examples of distance-vector routing protocols include: (Select 2 answers)
RIP (Routing Information Protocol) EIGRP (Enhanced Interior Gateway Routing Protocol)
Port 542
TCP, UDP commerce (Commerce Applications)
Port 749
TCP, UDP kerberos-adm, Kerberos administration
Port 158
TCP, UDP DMSP, Distributed Mail Service Protocol
Which of the answers listed below refers to a channel access method used in 2G GSM networks?
TDMA (Time-Division Multiple Access)
What series of standards does the U.S National Security Agency (NSA) define to block RF emanation?
TEMPEST
What protocol was adopted in 1994, and is now considered obsolete except for small, private WANs?
RIPv2
What type of connector is used by all UTP Ethernet NICs?
RJ-45
Which type of network documentation would be of help in determining the physical location of a network server?
Rack diagram
Which of the following wireless technologies enables identification and tracking of tags attached to objects?
Radio-frequency identification (RFID)
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is called:
Ransomware
Which type of port has a number in the 1024 to 49151 range?
Registered
Which of the following answers refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network?
Remote Desktop Protocol (RDP)
Which VPN type is used for connecting computers to a network? (Select all that apply)
Remote-access Client-to-site
In computer networking, the term "Attenuation" refers to a loss in signal strength during transmission caused by increasing distance and obstacles encountered on the signal path. The problem of attenuating circuit on the network can be solved by adding a device that boosts the signal strength. This type of device is known as:
Repeater
Which statement is an accurate comparison between repeaters and bridges?
Repeaters retransmit all packets, while bridges filter and forward traffic based on the MAC addresses of the computers on the network.
In the Kerberos-based authentication process, the purpose of the client's timestamp is to provide countermeasure against:
Replay attacks
Which of the terms listed below refers to permanent IP address assignment from a DHCP server?
Reservation
A network topology in which each node connects to exactly two other nodes is referred to as:
Ring topology
An authentication subsystem in which a single set of authentication credentials provides access to multiple systems within a single organization is referred to as:
SSO (Single sign-on)
A type of protocol used in network management systems for monitoring network-attached devices is called:
Simple Network Management Protocol (SNMP)
Which protocol offers a method for querying the state of certain network devices?
Simple Network Management Protocol (SNMP)
What type of fiber-optic cable uses lasers to send signals?
Single Mode Fiber (SMF)
What type of fiber-optic cable is used in a 1000BaseLX network?
Single-mode fiber
1000BaseLX
Single-mode fiber 1300 nm LC and SC 5 km
10GBaseER/EW
Single-mode fiber 1550 nm LC and SC Length of 40 km
Which type of VPN enables connectivity between two networks?
Site-to-site
Which switch and network equipment modular transceivers have replaced gigabit interface converters (GBICs) as the modular connector of choice?
Small form-factor pluggable (SFP)
How do many small networks avoid using a full-blown file server?
Small networks take advantage of network attached storage (NAS).
Which preventive physical security control would provide basic means for securing door access?
Smart card reader
Which of the answers listed below refer to implementations of certificate-based authentication? (Select 2 answers)
Smart cards 802.1X
A remote-line diagnostic device placed at the joining point between an ISP's line and customer's premises wiring is known as:
Smart jack
What type of backups are commonly used with virtual machines?
Snapshot
An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:
Social engineering
All modern NICs are multispeed and auto-sensing.
True
All network technologies break data transmitted between computers into smaller pieces called frames.
True
All operating systems come with some form of baseline tools.
True
As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack are the secondary victims of the DDoS attack; they are often referred to as zombies, and collectively as a botnet.
True
One of the features of the Dynamic Host Configuration Protocol (DHCP) is the capability for static allocation of an IP address based on the IP-to-MAC address mapping.
True
Optical Carrier (OC) transmission rate specifications adhere to a pattern where the OC prefix is followed by a number designating a multiple of the base unit of 51.84 Mbps.
True
Optical Time-Domain Reflectometer (OTDR) is a type of specialized cable tester that allows for locating faults and breaks in fiber-optic cabling.
True
Patch panels serve as your first line of defense in organizing cables.
True
PerfMon is a unique Linux tool for performance monitoring.
True
Physical and logical network diagrams provide visual representation of network architecture. A physical network diagram contains information on hardware devices and physical links between them. A logical network diagram describes the actual traffic flow on a network and provides information related to IP addressing schemes, subnets, device roles or protocols that are in use on the network.
True
Which of the answers listed below refer to the RJ-11 connector? (Select 2 answers)
Used with telephone cabling Copper cabling connector
Which of the terms listed below refers to a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain regardless of their physical location?
VLAN
Switch spoofing and double tagging are attack methods used in:
VLAN hopping attacks
IEEE 802.3ac
VLAN tag (frame size extension to 1522 bytes)
NTP enables:
Synchronization of clocks over a computer network
What hardware component was the first type of popular virtual machine seen in the PC world?
Virtual desktop
Which of the answers listed below refer(s) to reversed TX/RX? (Select 2 answers)
Wrong TIA/EIA cable standard type used Wrong pin/pair assignments on cable ends
Which type of backups are really just redundant servers?
real-time
Installing backup power in case of electrical failure is a form of __________.
redundancy
CIDR for 255.252.0.0
/14
CIDR for 255.254.0.0
/15
CIDR for 255.255.0.0
/16
CIDR for 255.255.128.0
/17
CIDR for 255.255.192.0
/18
CIDR for 255.255.224.0
/19
CIDR for 192.0.0.0
/2
CIDR for 255.255.240.0
/20
CIDR for 255.255.255.255
/32
CIDR for 240.0.0.0
/4
CIDR for 248.0.0.0
/5
CIDR for 252.0.0.0
/6
CIDR for 254.0.0.0
/7
CIDR for 255.0.0.0
/8
CIDR for 255.128.0.0
/9
Which ipconfig command switch would a technician use to display detailed information (such as DNS servers and MAC addresses)?
/all
Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)?
/all
Disaster recovery is a critical part of change management.
False
IEEE 802.3ab
1000Base-T (Gigabit Ethernet over twisted pair)
All IPv6 addresses have a record type of __________.
AAAA
Which term refers to another name for a session?
Connection
RADIUS is an Authentication, Authorization, and Accounting (AAA) standard.
True
Rootkits can strike firmware.
True
Which network device enables centralized management of WAPs?
Wireless LAN controller
Which of the answers listed below refers to a wireless protocol designed to provide communication between appliances in a home automation network?
Z-Wave
Which tool is the best choice for testing DNS?
ping
ANT is the most commonly used network technologies today.
False
What is the range of decimal values in each of the four groups of an IPv4 address?
0-255
What value will most routers insert into the routing table Destination LAN IP column if there is no gateway needed?
0.0.0.0
Which value of the ECN field is the default, indicating "not QoS aware"?
00
What is the binary equivalent of the decimal value 97?
01100001
Which of the following answers refer to IPv6 loopback addresses? (Select 2 answers)
0:0:0:0:0:0:0:1 ::1
Which layer of the OSI model is associated with moving data between computers?
1
Which of the choices listed below would allow for setting up three Wireless Access Points (WAPs) on non-overlapping channels?
1 6 11
RFID (Radio-frequency identification) devices generally communicate within __________.
1 meter
Which of the channels defined by the 802.11 standard may be used by a WAP using the 2.4-GHz band in the United States?
1 through 11
Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5 (Cat 5) cabling? (Select all that apply)
100 Mbps transfer rate over 2 pairs of cables (100BaseT networks) 1 Gbps transfer rate over all 4 pairs of cables (1000BaseT networks) 100-meter cable segment length Twisted-pair copper cabling RJ-45 connector
What is the maximum cable length on a segment of a 1000BaseT network?
100 meters
What is the typical cable segment length for a copper twisted-pair Ethernet cable?
100 meters
Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5e (Cat 5e) cabling? (Select all that apply)
100-meter cable segment length Twisted-pair copper cabling RJ-45 connector 1 Gbps transfer rate over 4 pairs of cables (1000BaseT networks)
IEEE 802.3z
1000Base-X (Gigabit Ethernet)
What is the binary equivalent of the decimal value 151?
10010111
IEEE 802.3u
100Base-T (Fast Ethernet and auto-negotiation)
In 100BaseT, what is the maximum number of nodes per hub/switch?
1024
What is the maximum number of nodes that could be attached to a 10BaseT segment or hub?
1024
IEEE 802.3a
10Base-2 (thin Ethernet)
IEEE 802.3j
10Base-F (fiber optic)
IEEE 802.3i
10Base-T (twisted pair)
Which is the least expensive and most popular 10 GbE media type?
10GBaseLR
What is the name of the IEEE standard for 10 GbE running on twisted pair cabling?
10GBaseT
Which value of the ECN field indicates "QoS aware, congestion encountered"?
11
How long is a MAC address?
12 hexadecimal characters
Network Time Protocol (NTP) runs on UDP port:
123
Which of the following answers refers to an IPv4 address range used for loopback addresses?
127.0.0.0 - 127.255.255.255 (127.0.0.0/8)
Which of the answers listed below refer to an IPv4 loopback address?
127.0.0.1
What is the leading octet value range for an IPv4 address belonging to a class B network?
128 - 191
An IPv6 address consists of:
128 bits
How many powerful DNS server clusters, scattered all over the world, does the DNS root contain?
13
Which wavelength is used by 1000BaseLX fiber-optic cabling?
1300nm
Which wavelength is used on 10GBaseLW fiber-optic cabling?
1310
How many channels were defined by the 802.11 standard?
14
Which of the TCP port numbers listed below is assigned to the Internet Message Access Protocol (IMAP)?
143
Which port is used to receive e-mail messages from e-mail servers (IMAP4)?
143
What is the maximum number of hops allowed by RIP?
15
What is the network address for a 154.24.67.147/22 host?
154.24.64.0
An OC-3 line supports transmission rates of up to:
155.52 Mbps
What is the range of transfer speed for ATM?
155.52 to 622.08 Mbps and beyond
What wavelength is used on a 10GBaseEy network?
1550
Compared to SFP, SFP+ offers enhanced data transfer rates of up to:
16 Gpbs
What wavelength is used on 10GBaseSW fiber-optic cabling?
850
Almost all multimode fiber cables transmit __________ wavelengths.
850nm
Jumbo frames are usually __________ bytes long—though technically, anything over 1500 counts—and they reduce the total number of frames moving through the network.
9000
Which of the answers listed below refers to the maximum data transfer rate of OC-192 connection?
9953.28 Mbps (9.95 Gbps)
Which type of link light is found on older NICs?
Collision
What is the primary use of coaxial cable in networking today?
Connecting a cable modem to an Internet Service Provider (ISP)
An application software used to selectively block access to certain websites is an example of:
Content filter
Which industrial control system (ICS) device knows enough to manage a process?
Controller
Which of the following answers refers to a bus topology network first developed for use in vehicles?
Controller Area Network (CAN)
Which of the answers listed below refer to the characteristic features of a modem? (Select 3 answers)
Converts digital data into analog signal Allows a computer to send and receive information over telephone lines Converts analog signal into digital data
Which of the following can be the source of RFI and cause disruptions in network connectivity?
Cordless phones Fluorescent lights Microwave ovens Bluetooth devices
Anycasting starts by giving a number of computers (or clusters of computers) unique IP addresses.
False
Bluetooth is designed to defend against aggressive, sophisticated attacks.
False
Circuit-switching networks move data divided into small blocks over a shared connection.
False
Connectionless sessions are designed to check for errors.
False
Domain information groper (dig) and nslookup are command-line tools used for DNS queries. Both utilities are available on Windows and Linux. Of the two, nslookup is the preferred tool on UNIX-like systems; dig is the default DNS query tool for MS Windows.
False
Dynamic Network Address Translation (DNAT) provides a permanent mapping between a private IP address and a public IP address on a one-to-one basis.
False
Encryption is a process that guarantees that the data received is the same as originally sent.
False
Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research based on symptoms may also involve asking for assistance of a more experienced tech.
False
High MTBF (mean time between failures) value indicates that a component or system provides low reliability and is more likely to fail.
False
In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup.
False
In a wired network, a charge on a wire represents a zero while no charge represents a one.
False
It is a good idea to give root access to critical log files for performance reasons.
False
It is difficult to add LTE to almost any device that does not have it built in.
False
Modern switches with auto-sensing ports require a crossover cable.
False
Most new cabling installations use category 3 (CAT 3) unshielded twisted pair (UTP) cable.
False
Multicast is a new idea introduced with IPv6.
False
Multicast traffic enables multiple unique signals.
False
Multimeters test frequency.
False
NAT is essentially the same process as routing.
False
NetFlow is another name for SNMP.
False
Patch panels allow you to connect only one kind of cabling; that is, they support only UTP, STP, or fiber, but not a mixture of different types.
False
Plenum cable provides less protection than riser-rated cable.
False
Point Coordination Function (PCF) is the currently implemented collision avoidance system.
False
Powerful hypervisors like ESXi and Hyper-V are administered directly at the box.
False
RFID tags often hold personally identifiable information (PII).
False
Routers forward broadcast messages to other networks.
False
Routers work with the source IP address of each packet.
False
Setting up an IPv6 tunnel is easy.
False
Social engineering attacks are considered an example of classic hacking.
False
Static Network Address Translation (SNAT) provides a mapping between a private IP address and any of the IP addresses belonging to the available public IP address pool.
False
TCP and UDP both offer encryption methods at Layer 4 of the OSI model.
False
The Ethernet community would like to position 1000BaseSX as the Ethernet backbone of the future.
False
The Ethernet networking technology standard was based on a ring topology.
False
The Internet Control Message Protocol (ICMP) works at Layer 3 to deliver connection-oriented
False
The Internet Protocol (IP) works at the Link layer.
False
The Link layer of the TCP/IP model combines features of the top three layers of the OSI model.
False
The Network Interface layer of the TCP/IP model maps to the Network layer of the OSI model.
False
The cornerstone of a firewall is its demilitarized zone (DMZ).
False
The most common type of cabling used in networks today consists of fiber-optic cables.
False
The notion of an industrial control system (ICS) is a new concept stemming from the development of digital monitors and controls.
False
The ping utility uses Simple Network Management Protocol (SNMP) packets to query by IP address or by name.
False
The term "DHCP snooping" refers to an exploit that enables operation of a rogue DHCP network server.
False
When a computer gives itself an Automatic Private IP Address (APIPA), it also includes a valid default gateway address.
False
When a frame arrives at the switch, the switch makes an exact copy of the frame and sends it to every other system on the network.
False
When crimping an RJ-45 onto a UTP cable, be sure to slide each boot onto the patch cable after you crimp both ends.
False
When following standard safety practices while installing equipment, use a band saw to miter joints.
False
With an omnidirectional antenna, the radio wave flows outward from the wireless access point (WAP) in one direction.
False
You can have more than two CSU/DSUs on a single T1 line.
False
Which term refers to the 100-Mbps standards, even though there are now newer versions of Ethernet available?
Fast Ethernet
What general type of cabling is a technician most likely to use today when installing Ethernet cabling in areas with high electrical interference?
Fiber
What kind of cabling did the 10BaseFL standard specify?
Fiber
Which type of cable uses a two-number designator consisting of core and cladding measurements?
Fiber
Which type of cable works best for long-distance transmissions?
Fiber
Which of the answers listed below refers to a technology designed to provide connectivity between servers and data storage devices over fiber-optic or copper cable links?
Fiber channel
IEEE 802.8
Fiber optic connection
Which type of cabling provides the best protection against EMI/RFI?
Fiber-optic cabling
Which technology refers to an infrastructure that can be utilized to support a SAN?
Fibre Channel over Ethernet (FCoE)
What is the function of FTP?
File exchange
What is the function of a Time-Domain Reflectometer (TDR)?
Finding breaks in copper network cables
Which of the following answers refers to a software or hardware that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through?
Firewall
Which of the answers listed below refers to a type of software embedded into a hardware chip?
Firmware
What is the name of a security mechanism that protects a network switch against populating its MAC table with invalid source addresses?
Flood guard
IEEE 802.9
For services like voice and data
Which technology acts on behalf of clients, getting information from various sources and handing that info to the clients?
Forward Proxy Server
IEEE 802.3as
Frame expansion
What characteristic does spread-spectrum transmission change for each user?
Frequency
IEEE 802.3x
Full duplex
A network topology in which each node has a direct physical connection to every other node is known as:
Full mesh
Which of the following would require troubleshooting if a network connectivity problem originates from mismatched transceiver types? (Select 2 answers)
GBIC (Gigabit Interface Converter) SFP (Small Form-Factor Pluggable)
What does the letter "G' stand for in the 2G, 3G and 4G technologies?
Generation
The snmpwalk utility tells the SNMP manager to perform a series of __________ commands.
Get
Which core function is sent when an SNMP manager wants to query an agent?
Get
Which term is another name for a virtual machine?
Guest environment
TCP port 1720 is used by:
H.323
Which of the answers listed below refers to a protocol used for managing VoIP and VTC services?
H.323
Which CISCO protocol will help prevent downtime due to failures on the default gateway?
HSRP (Hot Standby Router Protocol)
Which protocol is the underlying protocol used by the World Wide Web?
HTTP
Which of the following protocols reside at the application layer of the OSI model? (Select 3 answers)
HTTP FTP SMTP
What is the name of a network protocol that secures web traffic via SSL/TLS encryption?
HTTPS
Which protocol is the secure counterpart of HTTP?
HTTPS
Which standards organization is named for the Greek word for "equal"?
ISO
An incident is an event in which the integrity of a(n) __________ is compromised.
IT infrastructure
Vulnerability scanning: (Select 3 answers)
Identifies lack of security controls Identifies common misconfigurations Passively tests security controls
Which of the following actions should be the first step in the troubleshooting process?
Identifying the problem
What statement describes the advantage of fault tolerance?
If one cable break, all of the other computers can still communicate.
Once a plan of action to resolve a problem has been established, the next step in the troubleshooting methodology process is to:
Implement the solution
Which of the following typically applies to a request that doesn't match the criteria defined in an ACL?
Implicit deny rule
Which of the following answers refers to a network authentication protocol that provides the single sign-on functionality?
Kerberos
Which hypervisor is closely integrated with Linux's kernel?
Kernel-based Virtual Machine (KVM)
A network connecting computers within a small geographical area such as a building or group of buildings is known as:
LAN
IEEE 802.1
LAN/MAN bridging, remote MAC bridging
What is the most common connector used in a 1000BaseSX network?
LC
Which of the answers listed below refer(s) to example(s) of fiber-optic connectors (Select all that apply)
LC ST SC MT-RJ
Physical layer of the OSI model is also known as:
Layer 1
1000BaseSX
Multimode fiber 850 nm LC 220-500m
10GBaseSR/SW
Multimode fiber 850 nm No connectors defined Length of 26-300 m
What type of fiber-optic cabling and connectors does a 100BaseFX network use?
Multimode with ST or SC connectors
The characteristic features of the IEEE 802.11n wireless standard include:
Multiple Input / Multiple Output (MIMO) 2.4 GHz frequency band 5.0 GHz frequency band Maximum data signaling rate of up to 600 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
A type of computer security solution that allows to define and enforce network access policies is referred to as:
NAC
Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address?
NAT
Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?
NAT
A legal contract between the holder of confidential information and another person to whom that information is disclosed prohibiting that other person from disclosing the confidential information to any other party is known as:
NDA
Which of the IPv6 protocols listed below is used by networked nodes for locating routers?
NDP
A network administrator has configured two Ethernet adapters in a database server to operate as a single connection. Which of these would best describe this configuration?
NIC teaming
The process of combining multiple physical network adapters into a single logical interface for increased throughput and redundancy is known as:
NIC teaming
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network?
NTP
Which type of technology enables contactless payment transactions?
Near-field communication (NFC)
An IPv6 protocol performing the function of IPv4's Address Resolution Protocol (ARP) is called:
Neighbor Discovery Protocol (NDP)
An IPv6 protocol used by routers to advertise their presence on a network is known as:
Neighbor Discovery Protocol (NDP)
Which IPv6 protocol is used by networked hosts to determine the link layer address of adjacent nodes?
Neighbor Discovery Protocol (NDP)
Which protocol makes the IPv6 automation magic work?
Neighbor Discovery Protocol (NDP)
At which layer of the OSI model do routers work?
Network
Routers function at which layer of the OSI model?
Network
Which layer of the OSI model assembles the data it receives into pieces called packets?
Network
Which layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system?
Network
__________ is a type of dedicated file server used in many networks.
Network Attached Storage (NAS)
Which tool is used by an administrator to manage many routers and provide an overall view of all the network?
Network Management System (NMS)
Which term describes a practical application of a topology and other critical technologies that provides a method to get data from one computer to another on a network?
Network Technology
Which protocol ensures the reliability of the Kerberos authentication process?
Network Time Protocol (NTP)
Which of the answers listed below refer(s) to PPP? (Select all that apply)
Network protocol used for connecting devices on a WAN Enables encapsulation of IP traffic Used for establishing a direct connection between two networked devices
A dedicated storage appliance that can be added to a local network is known as:
Network-attached storage (NAS)
A type of advanced firewall capable of more in-depth inspection of network traffic that enables detection of application-specific attacks is referred to as: (Select 2 answers)
Next-generation firewall (NGFW) Layer 7 firewall
Which of the following command-line tools is used for discovering hosts and services on a network?
Nmap
A network topology in which each node connects to a central switching device is called:
Star topology
Which of the following network topologies is most commonly used in contemporary Ethernet LANs?
Star topology
A DHCPv6 server is operating very similarly to an IPv4 DHCP server by passing out complete IPv6 information: addresses and default gateways, as well as items like DNS server addresses. In which mode is this server?
Stateful
Which type of firewall packet inspection is aware of the packet's state, as it relates to other packets?
Stateful
Which document defines the services and products the vendor agrees to supply and the time frames in which to supply them?
Statement of Work (SOW)
Which of the answers listed below refers to a permanent assignment of an IP address?
Static IP address
A manually-configured routing table entry is known as:
Static route
Which of the following allows to determine which network segment an IP address belongs to?
Subnet mask
What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers)
Suitable for large corporate networks Requires RADIUS authentication server
Which device improves network performance by dividing a given network segment into separate collision domains?
Switch
Which of the answers listed below refers to a data link layer (layer 2) device designed to forward frames between network segments?
Switch
Which of the answers listed below refer to the characteristics of multimode fiber optics? (Select 3 answers)
Transmission distances of up to 2 km Less expensive than single-mode fiber optics Uses LED as the source of light
Layer 4 of the OSI model is also referred to as:
Transport layer
Which of the following answers refers to a modular network device designed to provide a seamless link between different types of network interfaces (e.g. copper and fiber, or vice versa)?
Transreciver
An agent can solicit information from an NMS with the __________ protocol data unit (PDU).
Trap
A DHCP server's IP exclusion configuration option allows network administrators to remove a single IP address or a range of IP addresses from the pool of addresses being assigned automatically to the requesting DHCP client computers. IP exclusion prevents other DHCP clients from requesting an IP address statically assigned to other essential network hosts (e.g. servers, or a wireless printers) via DHCP reservation.
True
A VPN is a classic example of a situation in which Proxy ARP is used.
True
A cloud delivery model consisting of two or more interlinked cloud infrastructures (private, community, or public) is referred to as a hybrid cloud.
True
A distributed control system (DCS) makes sense for a process that requires a continuous flow.
True
A double colon in an IPv6 address indicates that part of the address containing only zeros has been compressed to make the address shorter.
True
A host-based firewall is software installed on a "host" that provides firewall services for just that machine.
True
A hybrid routing protocol combines the features of distance-vector and link-state routing protocols.
True
A network device that apart from the function of an ordinary network switch can also provide additional functions at higher levels of the OSI reference model is known as a multilayer switch.
True
The power of DNS comes from its incredible flexibility.
True
The process of securing networking devices should include the practice of disabling unused physical ports.
True
The shape and angle of the tip of a fiber-optic connector can have an impact on the performance of a fiber-optic communication link. The two basic types of fiber end are Ultra Physical Contact (UPC) and Angled Physical Contact (APC). In the UPC-type connector, the connector end is polished with no angle, while APC connectors feature a fiber end polished at an 8-degree angle. Besides additional labeling (UPC or APC) that helps in identifying further details about a given connector type, fiber-optic connectors can also have different colors. The rule of thumb is that a UPC-type connector typically would be blue while APC connector would have a green color.
True
The technology advancements used in mobile devices enable almost any type of device to connect to the Internet.
True
The term "Default route" refers to a "last resort" network path used by a router for forwarding all packets with destination addresses not listed in its routing table.
True
The term "Dual-stack IP" refers to a solution that relies on implementing both IPv4 and IPv6 protocol stacks on various network devices to facilitate seamless migration from IPv4 to IPv6.
True
The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate access point to connecting hosts.
True
The term "Intrusion Detection System" (IDS) refers to a device or software application designed to detect malicious activities and violations of security policies on a network or computer host. An IDS designed to monitor networks is known as Network Intrusion Detection System (NIDS). A type of IDS installed on a host monitoring only that host is called Host Intrusion Detection System (HIDS). IDSs do not take any active steps to prevent or stop the intrusion relying only on passive response which may include sending an alert to a management console or saving information about the event in logs.
True
The term "Metropolitan Ethernet" refers to an Ethernet-based Metropolitan Area Network (MAN).
True
The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection.
True
You can use a brute force attack to search for open ports.
True
Zigbee is a completely open standard.
True
A type of port assigned to carry traffic from all the VLANs connected to a specific network switch is known as:
Trunk port
What is the only way to ensure Bluetooth security in a high-security environment?
Turn it off
Which of the answers listed below refer(s) to UTP cabling? (Select all that apply)
Twisted-pair copper cabling Used in Ethernet networks and telephone systems Low cost and ease of installation Not surrounded by any shielding that would provide protection against interference from outside sources In Ethernet networks, installed with RJ-45 connector type
Which type of hypervisor relies on an underlying operating system?
Type-2
Which Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?
UDP
Which of the protocols listed below reside at the OSI transport layer? (Select 2 answers)
UDP TCP
Port 525
UDP Timed, Timesaver
Port 561
UDP monitor
Port 550
UDP new-rwho, new-who
Port 560
UDP rmonitor, Remote Monitor
Which cable type suffers most from electromagnetic interference (EMI)?
UTP
Which type of cabling does the 10BaseT standard specify?
UTP
Which of the cabling types listed below is the most susceptible to EMI/RFI?
UTP cabling
A type of network traffic intended for a single host identified by a unique IP address is referred to as:
Unicast
Which method of sending a packet allows one computer to send a message directly to another user?
Unicast
Which device provides the benefit of acting like an inverter?
Uninterruptible Power Supply (UPS)
CAT5e
Up to 1 Gbps Ethernet, FastEthernet, Gigabit Ethernet
CAT1
Up to 1 Mbps Old telephone cable
CAT7
Up to 10 Gbps Gigabit Ethernet, 10G Ethernet (100 meters)
CAT6
Up to 10 Gbps Gigabit Ethernet, 10G Ethernet (55 meters)
CAT6a
Up to 10 Gbps Gigabit Ethernet, 10G Ethernet (55 meters)
CAT3
Up to 10 Mbps Token ring and 10BASE-T Ethernet
CAT5
Up to 100 Mbps Ethernet, FastEthernet, Token ring
CAT4
Up to 16 Mbps Token Ring Networks
CAT2
Up to 4Mbps Token ring networks
What is the name of an AES-based encryption mode implemented in WPA2?
Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP)
Which term does PerfMon use when referring to the monitored aspect of the system?
Counters
Which of the tools listed below would be used for attaching RJ-45 connectors to a twisted-pair Ethernet cable?
Crimper
What type of Ethernet cable would be used for establishing a direct communication link between two PCs?
Crossover cable
A modem running at 56 Kbps is actually running at 56 kilobaud.
False
A network's physical topology describes how signals travel electronically.
False
A reverse DNS lookup zone is used for finding an IP address associated with a given domain name.
False
A system's IPv6 link-local address is a multicast address.
False
A popular, short-range wireless technology used for connecting various personal devices in a WPAN is called:
Bluetooth
Which protocol is a path vector routing protocol?
Border Gateway Protocol (BGP)
A solution that allows to control access to a shared transmission medium in 802.11 networks is known as:
CSMA/CD
Which term describes a portion of the available spectrum available for Wi-Fi network communication?
Channel
Which netstat parameter allows to display all active TCP connections and the TCP/UDP ports on which the computer is listening?
-a
Which netstat parameter allows to display the names of applications and executable file components that are accessing the network?
-b
Which switch is used with the Windows netstat utility to show name of a running program?
-b
Which switch is used with the Windows netstat utility to show the process ID?
-o
Which of the netstat utility parameters listed below allows to display the contents of an IP routing table?
-r
Which term is an original top-level domain name?
.mil
CIDR for 0.0.0.0
/0
CIDR for 128.0.0.0
/1
CIDR for 255.192.0.0
/10
CIDR for 255.224.0.0
/11
CIDR for 255.240.0.0
/12
CIDR for 255.248.0.0
/13
CIDR for 255.255.248.0
/21
CIDR for 255.255.252.0
/22
CIDR for 255.255.254.0
/23
CIDR for 255.255.255.0
/24
CIDR for 255.255.255.128
/25
CIDR for 255.255.255.192
/26
CIDR for 255.255.255.224
/27
Which of the following answers lists the CIDR notation of the 255.255.255.224 subnet mask?
/27
CIDR for 255.255.255.240
/28
CIDR for 255.255.255.248
/29
CIDR for 224.0.0.0
/3
CIDR for 255.255.255.252
/30
CIDR for 255.255.255.254
/31
Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters?
/all
Which of the following could be a valid Autonomous System Number (ASN)?
1.33457
T1 lines support data transfer rates of up to:
1.544 Mbps
What is the size of a U, the equipment rack unit of measure, used for specifying height?
1.75in
Which of the answers listed below refer to the 10GBaseT Ethernet standard? (Select 3 answers)
10 Gbps transfer rate over a maximum cable segment length of 55 meters (Cat 6 cable) 10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6A and Cat 7 cable) Twisted-pair copper cabling
IEEE 802.3c
10 Mb/s repeater specifications (clause 9)
When a multispeed, auto-sensing 100BaseT NIC connects to a 10BaseT Ethernet hub, at what speed will the NIC function?
10 Mbps sending and receiving
IEEE 802.3ae
10-Gigabit Ethernet
What is the first valid host address that can be assigned to a node residing in the 10.119.136.143/20 network?
10.119.128.1
Which of the answers listed below refers to the maximum data transfer rate of E1 connection?
2.048 Mbps
802.11
2.4 GHz DSSS 2 Mbps ~300' Compatible with 802.11
802.11g
2.4 GHz OFDM 54 Mbps ~300' Compatible with 802.11b
802.11n
2.4 GHz OFDM (QAM) 100+ Mbps ~300' Compatible with 802.11b/g
Which of the following answers refer to the IEEE 802.11b wireless standard? (Select 3 answers)
2.4 GHz frequency range Maximum data signaling rate of 11 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers)
20 MHz 40 MHz
What is the decimal equivalent of the binary value 11010101?
213
Which of the answers listed below refers to a channel bandwidth used in 802.11b networks?
22 MHz
Which of the following answers refer to the IPv4 multicast address block? (Select 2 answers)
224 - 239 Class D range
Which of the TCP ports listed below is used by Telnet?
23
How many channels are in a DS1 frame?
24
Which TCP/IP ports does MGCP (Media Gateway Control Protocol) use?
2427 and 2727
Which of the following answers lists the default (classful) subnet mask for a class A network?
255.0.0.0
Which of the following answers lists the default (classful) subnet mask for a class B network?
255.255.0.0
Which of the answers listed below refers to the default (classful) subnet mask for a class C network?
255.255.255.0
Which formula would you use to arrive at the number of hosts on a subnet?
2x - 2, where x represents the number of zeroes in the subnet mask
Which formula would you use to calculate the number of new subnets?
2y, where y is the number of bits you add to the subnet mask
What was the original maximum data transfer rate of the first Ethernet developed by Xerox?
3 Mbps
Which pins on an RJ-45 connector are used to receive data?
3 and 6
How many binary digits are in an IPv4 address?
32
An IPv4 address consists of:
32 bits
What is the approximate total bandwidth of an E3 line?
34 Mbps
Which of the following answers refers to the maximum data transfer rate of E3 connection?
34.368 Mbps
One of the last GSM technologies, Enhanced Data rates for GSM Evolution (EDGE), offered data speeds up to __________.
384 Kbps
What is the norm today for the number of pairs in UTP cabling?
4
QSFP offers data transfer rates of up to:
4 Gbps
T3 lines support data transfer rates of up to:
44.736 Mbps
Which of the following answers lists the number of connections in a full mesh network consisting of 10 nodes?
45
The nodes that connect in an IBSS randomly generate a __________ string of numbers that looks and functions just like a MAC address.
48-bit
Without the preamble, how many basic pieces of information does an Ethernet frame contain?
5
802.11a
5 GHz OFDM 54 Mbps ~150' No backward compatibility
802.11ac
5 GHz OFDM (QAM) Up to 1 Gbps ~300' Compatible with 802.11a
Frequency bands used by 802.11 networks include:
5.0 GHz 2.4 GHz
Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard?
5.0 GHz frequency band Maximum data signaling rate of up to 6.77 Gbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method Multi-User Multiple Input / Multiple Output (MU-MIMO)
Which TCP/IP ports does the Real-time Transport Protocol (RTP) use for VoIP systems?
5004 and 5005
Which of the following UDP ports is assigned to the Domain Name System (DNS)?
53
What is the minimum category rating of UTP cabling you would need for a network that runs at 1000 Mbps?
5e
Which category rating uses a bandwidth of 250 MHz to accommodate 10000 Mbps?
6
When using the newer Rapid Spanning Tree Protocol (RSTP), how long does it take a network to return to convergence?
6 seconds
A limited IPv4-to-IPv6 transition mechanism that allows for encapsulation of IPv6 packets in IPv4 packets transmitted over IPv4 networks is referred to as:
6 to 4
A network administrator wants to secure the existing access to a directory service with SSL/TLS encryption. Which of the following TCP ports needs to be opened to implement this change?
636
What is the minimum size of an Ethernet frame?
64B
What temperature is considered to be ideal for a server room?
68 degrees farenheit
Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one is one of the most popular IPv6 tunneling standards?
6in4
Which now deprecated tunneling protocol enabled IPv6 traffic over the IPv4 Internet?
6to4
LTE networks feature speeds of __________ upload.
75 Mbps
An SNMP system has up to __________ core functions (depending on the version of SNMP).
8
How many pins does an RJ-45 connector have?
8
Which port do HTTP Web servers use?
80
In reality, Wi-Fi is really __________.
802.11
Which IEEE subcommittee sets the standards for Wireless LAN networks
802.11
The IEEE 802.11g standard is backwards compatible with:
802.11b
The IEEE 802.11n standard offers backward compatibility with which of the following standards? (Select all that apply)
802.11g 802.11b 802.11a
Which of the acronyms listed below refers to a policy of permitting employees to bring personal mobile devices and to use those devices for accessing privileged company information and applications?
BYOD
What causes the most common problems with HTTPS connection?
Bad certificates
Which routing metric refers to the ability of a connection to handle more data than others?
Bandwidth
Which term is synonymous with traffic shaping?
Bandwidth Shaping
A type of historical network data kept as a reference for resolving future performance issues is referred to as:
Baseline
Which term defines the most basic infrastructure mode network - a BSS of one WAP and one or more wireless nodes?
Basic Service Set Identifier (BSSID)
Which of the following answers refers to a fiber transceiver equipped with the capability to transmit and receive signals over a single fiber strand?
Bidirectional
Which of the following terms does not fall into the category of detective physical security controls?
Biometrics
Which of the following reside at the physical layer of the OSI model?
Bit Network cabling
Which term is another name for a switching loop?
Bridging loop
IEEE 802.7
Broadband LAN cabling
A networked host with unknown address can be reached via:
Broadcast
Which method of sending a packet allows every computer on the LAN to hear the message?
Broadcast
An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is referred to as:
Brute-force attack
In which type of network topology, the main network cable becomes a single point of failure?
Bus
Which first generation network topology used a single cable that connected all the computers in a line?
Bus
Penetration testing: (Select all that apply)
Bypasses security controls Actively tests security controls Exploits vulnerabilities
Which of the following answers refers to a security policy enforcement software tool or service placed between cloud service users and cloud applications?
CASB (Cloud Access Security Brokers)
Which of the following answers refers to a channel access method used in 3G cellular networks?
CDMA
The use of cable modems within a standard cable television infrastructure for Internet access is commonly referred to as:
Cable broadband
Which tool helps a technician make unshielded twisted pair (UTP) cables?
Cable stripper
A type of tool used for verifying correct electrical connections of wires in a cable is known as:
Cable tester
Which tool can be used to notify a technician of a continuity problem or if a wire map is not correct?
Cable tester
Which tool would be used for detecting incorrect cabling pin-out assignments?
Cable tester
Which fire cable rating has no significant fire protection?
Cable with a polyvinyl chloride (PVC) rating
Which of the DNS database records listed below allows multiple domain names to resolve to the same IP address?
Canonical Name record (CNAME)
Which of the following answers refers to a solution allowing administrators to block network access for users until they perform required action?
Captive portal
Which of the following allows for verifying the absence of traffic on a shared transmission medium in 802.3 networks?
Carrier Sense Multiple Access/Collision Detect (CSMA/CD)
Which of the following answers refers to the minimum requirement for twisted-pair copper cabling in modern Ethernet networks?
Cat 5e
10GBaseT
Cat 6/6a UTP Four-pair/full-duplex RJ-45 Length of 55/100 km
1000BaseT
Cat5e/6 UTP Four-pair/full-duplex RJ-45 100 m
What are the three dominant mobile network technologies?
Cellular WANs, 802.11, and Bluetooth
Which term refers to a standardized type of file that includes a public key with a digital signature, and the digital signature of a trusted third party?
Certificate
Which tool tests a cable to ensure that it can handle its rated amount of capacity?
Certifier
A network device hardening process should include:
Changing default credentials / Avoiding common passwords Firmware upgrades / Patching and updates File hashing Disabling unnecessary services and unused ports (physical and virtual) Implementation of secure protocols Cryptographic key renewal
Which hypervisor serves as the foundation for massive cloud offerings by Amazon, IBM, and RackSpace?
Citrix XenServer
In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to the:
Class A address space
Which of the following answers refer to the characteristic features of the 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) IPv4 address space? (Select 2 answers)
Class A range Non-routable (private) IP address range
Which of the answers listed below refer to the 172.16.0.0 - 172.31.255.255 (172.16.0.0/12) IPv4 address space? (Select 2 answers)
Class B range Non-routable (private) IP address range
In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to the:
Class C address space
Which optional field in an Ethernet frame header can be used to enable the Quality of Service (QoS) functionality?
Class of Service (CoS)
Which of the answers listed below refers to a solution that replaces the classful network design?
Classless Inter-Domain Routing (CIDR)
Which type of cable is described as a central conductor wire that is surrounded by insulating materials and placed inside a braided metal shield?
Coax
Which of the following answers refer to the RG-6 cabling specification? (Select 3 answers)
Coaxial cabling Suitable for long-distance cable runs Used for cable television, satellite television and cable modems
What are the characteristics of the RG-59 cabling specification? (Select 3 answers)
Coaxial cabling Suitable for short-distance cable runs Used for analog video and CCTV installations
A disaster recovery facility that provides only the physical space for recovery operations is called:
Cold site
Within a Windows OS, which tool can you use to verify that Windows recognizes a NIC and is ready to use it?
Device Manager
Which of the following Internet access types takes advantage of the traditional analog telephone lines?
Dial-up
Which of the following antenna types provide a 360-degree horizontal signal coverage? (Select 2 answers)
Dipole antenna Omnidirectional antenna
LDAP (Lightweight Directory Access Protocol) is an example of:
Directory access protocol
Which of the answers listed below refers to a type of routing protocol that determines the best route for data packets based on the lowest number of hops?
Distance-vector
Which type of switch simplifies virtual network configuration by enabling an option to configure switching for the entire network from a single interface?
Distributed switch
An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn't have time or resources to handle legitimate requests is known as:
DoS attack
A type of wiring closet that interconnects WAN links coming into the building with the internal network is known as Intermediate Distribution Frame (IDF).
False
POP3 is used for:
Email retrieval
Which of the answers listed below refer(s) to MPLS (Multiprotocol Label Switching)? (Select all that apply)
Enables delivery of various data packet types over the same network link Packet-switching method Used for connecting devices on a WAN Designed to simplify and improve the performance of routing process
Which term means to scramble, mix up, or change data in such a way that bad guys cannot read it; however, the person receiving the data can descramble it.
Encryption
What are the characteristics of TACACS+? (Select 3 answers)
Encrypts the entire payload of the access-request packet Primarily used for device administration Separates authentication and authorization
A Web client's source port number, generated pseudo-randomly by the Web client computer, is classically assigned as a(n) __________.
Ephemeral
CRC allows for collecting metrics that provide information on
Error rates
IEEE 802.3
Ethernet standards for CSMA/CD
What type of unit is formed by a single wireless access point servicing a given area that has been extended by adding more access points?
Extended Service Set (ESS)
A zombie is an operator of a botnet.
False
Which of the following EAP methods offers the highest level of security?
Extensible Authentication Protocol - Transport Layer Security (EAP-TLS)
Which of the EAP methods listed below relies on client-side and server-side certificates for authentication?
Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)
A type of coaxial connector commonly used for cable television and cable modems is called:
F-type
Examples of technologies used for SAN connectivity include:
FCoE InfiniBand iSCSI Fiber channel
Which of the answers listed below refers to an IPv6 link-local address?
FE80::/10
Which of the following answers lists a valid address of FE80:00A7:0000:0000:02AA:0000:4C00:FE9A after compression?
FE80:A7::2AA:0:4C00:FE9A
What is the universal MAC address for broadcast?
FF-FF-FF-FF-FF-FF
Which multicast reserved address is designed to reach solicited-node addresses?
FF02::1:FFXX:XXXX
IEEE 802.3d
FOIRL (fiber link)
Which of the following remote file-access protocols do not offer encryption? (Select 2 answers)
FTP TFTP
Which term refers to doors that default to open in case of emergency?
Fail open
A 2U rack-mounted server measures 7 inches.
False
A NIC reads the data portion of a frame to determine the address of the receiving system.
False
A cold site is the most expensive type of backup site for an organization to operate.
False
A dedicated communication channel used exclusively between two connected hosts is a characteristic feature of packet-switching networks.
False
A dedicated connection uses a dial-up connection to another private network or the Internet.
False
A dedicated telephone line has a phone number.
False
A forward DNS lookup zone returns a domain name for a given IP address.
False
A logical network diagram is a document that describes the detailed layout of the building and the way devices are connected to the network through the actual cabling that transmits data.
False
A managed switch needs a MAC address to enable configuration on Layer 3.
False
A manufacturer selling boxed reels of unshielded twisted pair (UTP) cabling will clearly mark the cable's category rating on the connectors at the end of the cable.
False
Which protocol is the preferred alternative to POP3 and runs on TCP port 143?
IMAP4
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?
IP
Which of the following answers refers to a method for managing a network's IP address space?
IP address management (IPAM)
Which of the answers listed below refers to a means for executing reflective DOS attack?
IP spoofing
Which of the answers listed below refer to methods for creating secure connections between clients and cloud service providers? (Select 3 answers)
IPsec SSL/TLS encryption VPN
Which of the following answers refers to a cable rack that interconnects wiring between an MDF and workstation devices?
Intermediate Distribution Frame (IDF)
Which protocol is a link state dynamic routing protocol?
Intermediate System - Intermediate System (IS-IS)
Before plugging in RJ 45 cables, what should you determine to save a lot of time and effort once the system installation starts?
Internal IP addressing scheme
Which of the following solutions enables simultaneous digital transmission of voice, video, data, and other network services over a PSTN?
Internet Services Digital Network (ISDN)
Which of the following answers refers to a lower-cost alternative to Fibre Channel technology?
Internet Small Computer System Interface (iSCSI)
What is an advantage of fiber-optic cabling over Unshielded Twisted Pair (UTP)?
It has a longer maximum distance
Which statement best describes the importance of virtualization?
It increases flexibility as the scale of an operation increases.
Which statement describes an IP address?
It is a unique dotted decimal number assigned to every network device
Assigning a unique encrypted key, called a ticket, to each user that logs on to the network is a characteristic feature of:
Kerberos
A type of diagnostic tool that allows to measure signal strength in fiber-optic cabling is called:
Light meter
TCP port 389 is the default network port for:
Lightweight Directory Access Protocol (LDAP)
Which of the following answers refers to an SSL/TLS-based directory access protocol?
Lightweight Directory Access Protocol (LDAPS)
Which of the following solutions enables combining several physical ports of a switching device into a single logical channel?
Link Aggregation Control Protocol (LACP)
A type of routing protocol that calculates the best path between source and destination nodes based on a map of network connectivity between nodes is called:
Link-state
Which of the answers listed below refer to iptables? (Select 2 answers)
Linux-command line tool Packet filtering utility
Which term refers to making a bunch of servers look like a single server, thereby creating a server cluster?
Load Balancing
A network device designed for managing the optimal distribution of workloads across multiple computing resources is referred to as:
Load balancer
Which of the actions listed below can be taken by an IDS? (Select 2 answers)
Logging Sending an alert
Malicious code activated by a specific event is known as:
Logic bomb
IEEE 802.2
Logical Link control standards for connectivity
While troubleshooting problems with a Network Interface Card (NIC), connector pins on the NIC's port can be tested with the use of:
Loopback plug
Which of the following are hashing algorithms? (Select 2 answers)
MD5 SHA
A type of attack that relies on intercepting and altering data sent between two networked hosts is known as:
MITM attack
Manufacturers have accommodated the need for switches to connect to a variety of 10 GbE connector types by devising which solution?
MSAs
Which of the following answers refers to a connector type not used with copper cabling?
MT-RJ
What are the characteristic traits of a network switch? (Select all that apply)
Makes forwarding decisions in hardware (ASIC) Typically capable of connecting more network segments than bridge (more physical ports) Sometimes referred to as multiport bridge Newer and more effective type of network device in comparison to network bridge
Which of the following answers describe the features of a network bridge? (Select 3 answers)
Makes forwarding decisions in software Typically capable of connecting fewer network segments than switch (fewer physical ports) Older and less effective type of network device in comparison to network switch
An SNMP-compliant device includes a virtual database containing information about configuration and state of the device that can be queried by an SNMP management station. This type of data repository is referred to as:
Management Information Base (MIB)
A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called:
Material Safety Data Sheet (MSDS)
Which guideline applies to racks and network components?
Material safeties data sheet (MSDS)
What is the meaning of the "10" in 10BaseT?
Max speed of 10Mbps
Which of the following metrics is used to describe the largest allowable data unit that can be transmitted across a network?
Maximum Transmission Unit (MTU)
Which of the following answers refer to the 1000BaseSX Ethernet standard? (Select 2 answers)
Maximum cable segment length between 220 and 500 meters Multimode fiber-optic cabling
What are the characteristic features of the 1000BaseT Ethernet standard?
Maximum cable segment length of 100 meters Twisted-pair copper cabling (Cat 5 or higher) Uses all four pairs of wires in a cable for data transmission
Which of the answers listed below refer to the 1000BaseLX Ethernet standard? (Select 3 answers)
Maximum cable segment length of up to 5 km over single-mode fiber Fiber-optic cabling Maximum cable segment length of up to 500 m over multimode mode fiber
Which of the answers listed below refer to the characteristic features of the IEEE 802.11a wireless standard? (Select 3 answers)
Maximum data signaling rate of 54 Mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
What are the characteristics of the IEEE 802.11g wireless standard? (Select 3 answers)
Maximum data signaling rate of 54 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency range
Which of the following terms is used to describe an average time required to repair a failed component or device?
Mean time to repair (MTTR)
A network link consisting of two dissimilar transmission medium types requires an intermediary device known as:
Media converter
What are the characteristic features of the 192.168.0.0 - 192.168.255.255 (192.0.0.0/24) IPv4 address space? (Select 2 answers)
Non-routable (private) IP address range Class C range
A dedicated software tool used for monitoring and examining contents of a network traffic is called: (Select 2 answers)
Packet sniffer Protocol analyzer
IEEE 802.3ad
Parallel links (link aggregation)
What are the characteristic traits of GBIC (Gigabit interface converter)? (Select all that apply)
Modular (hot swappable) interface Converts optical signals to electrical signals Converts electrical signals to optical signals Data transfer of 1 Gbps
What are the characteristic traits of single-mode fiber optics? (Select 3 answers)
More expensive than multimode fiber optics Transmission distances of up to 100 km Uses laser as the source of light
Which of the following answers refers to the new feature introduced with the IEEE 802.11ac standard?
Multi-User MIMO (MU-MIMO)
A type of network traffic intended for a particular group of hosts is called:
Multicast
Which method of sending a packet allows a single computer to send a packet to a group of interested computers?
Multicast
Which of the tools listed below would be used for testing power supply voltage output?
Multimeter
What is the only important measure of coax cabling?
Ohm Rating
Which term refers to a relative measure of the resistance (or more precisely, characteristic impedance) on a cable?
Ohm Rating
What network component is built into most motherboards today?
Onboard NIC
A system administrator has configured an incremental tape backup system that begins each week on Sunday morning. On Sunday night, an imaging server failed and needs to be immediately recovered. How many tape sets would be required to fully restore this server?
One
Which type of UPS provides the best power outage protection? (Select 2 answers)
Online Double-conversion
What is the fastest way for validating a digital certificate?
Online Certificate Status Protocol (OCSP)
Which of the following answers refers to a link-state routing protocol?
Open Shortest Path First (OSPF)
Which tool can be used to notify a technician where a cable break is occurring on a fiber cable?
Optical Time Domain Reflectometer (OTDR)
When a collision occurs on a network relying on the CSMA/CD access method, what alerts the network interface cards (NICs)?
Overlapping signals
A type of limited-range computer network used for data transmission among various types of personal devices is generally referred to as:
PAN
Which form of NAT typically handles the one-to-many connections?
PAT
Which of the following answers refers to a Network Address Translation (NAT) method that binds a combination of private IP address and port number with a corresponding public IP address and port information?
PAT (Port Address Translation)
Which tools are tunneling protocols?
PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol)
Which of the following statements describing the function of a DNS PTR record are true? (Select 2 answers)
PTR record resolves an IP address to a hostname for reverse lookups. The functionality provided by a PTR record is the opposite of A and AAAA DNS records.
Which tool intercepts and logs network packets?
Packet sniffer
What are the characteristic features of TFTP? (Select 2 answers)
Provides no security features A very basic form of file sharing protocol
What is the function of a DNS TXT record? (Select 2 answers)
Provides outside services with additional information about a domain Not used to direct any traffic
Telnet: (Select 3 answers)
Provides username & password authentication Transmits data in an unencrypted form Enables remote login and command execution
In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as:
Proxy
Which tool can be used to access a Cisco router remotely from a Windows system?
PuTTY
Which of the following answers refers to a cloud computing delivery model in which the cloud infrastructure is provisioned for open use by the general public?
Public cloud
Which of the tools listed below is used for attaching wires to a patch panel?
Punchdown tool
Which mechanism will move a port into a root-inconsistent state if BPDUs coming from a certain direction indicate another switch is trying to become the root bridge?
Root guard
Which type of malware takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools?
Rootkit
A device designed to filter and transfer data packets between dissimilar types of computer networks is called:
Router
Which of the devices listed below is used for separating broadcast domains?
Router
Which of the answers listed below refer to the components that can be found at the OSI network layer? (Select 3 answers)
Router IP Address Packet
An agreement between a service provider and users defining the nature, availability, quality, and scope of the service to be provided is referred to as:
SLA
Which of the following protocols runs on TCP port 445?
SMB/CIFS (Server Message Block/Common Internet File System)
A system administrator has asked the security team for a firewall rule that will allow them to "walk the MIB." What service should be allowed through the firewall?
SNMP
Which underlying protocol enables network monitoring tools to work?
SNMP (Simple Network Management Protocol)
Which DNS record specifies a host and port information that allow to find specific services on a network?
SRV
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:
SSH
Which of the answers listed below refers to a secure replacement for Telnet?
SSH
Unblocking TCP port 22 enables what type of traffic? (Select 2 answers)
Secure Shell (SSH) Secure File Transfer Protocol (SFTP)
Which written document defines how an organization will protect its IT infrastructure?
Security policy
Which DNS records are commonly used with the DNS TXT record? (Select 2 answers)
Sender Policy Framework (SPF) DomainKeys Identified Mail (DKIM)
Which DNS records are used to protect a domain from being wrongfully identified as a source of email spam? (Select 2 answers)
Sender Policy Framework (SPF) DomainKeys Identified Mail (DKIM)
Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services?
Session Initiation Protocol (SIP)
Unified communication leans heavily on ___________ for transmission.
Session Initiation Protocol (SIP) and Real-time Transport (RTP)
Which of the following enables VoIP calls between PBXs?
Session Initiation Protocol (SIP) trunk
An NMS can tell an agent to make changes to the information it queries and sends, called variables, through a __________ protocol data unit (PDU).
Set
A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called:
Software as a Service (SaaS)
Which of the answers listed below refers to a technology designed to simplify network infrastructure management?
Software-defined networking (SDN)
Which characters are not permitted in a DNS domain or host name?
Spaces
Which of the protocols listed below provide protection against switching loops? (Select 2 answers)
Spanning Tree Protocol (STP) Rapid Spanning Tree Protocol (RSTP)
A type of diagnostic tool used for measuring the strength of a wireless signal is referred to as:
Spectrum analyzer
An email sent from unknown source disguised as the source known to the message receiver is an example of: (Select 2 answers)
Spoofing Social engineering
__________ broadcasts data in small, discrete chunks over the different frequencies available within a certain frequency range.
Spread-spectrum
IEEE 802.6
Standards for information exchange
IEEE 802.4
Standards for token passing bus access
IEEE 802.5
Standards for token rings and LAN/MAN communication
Which first generation network topology provided fault tolerance?
Star
Which of the answers listed below refer to copper cabling termination specifications? (Select 2 answers)
TIA/EIA 568a TIA/EIA 568b
An IPv4 packet header field that specifies how many more hops a packet can travel before being discarded is called:
TTL
What are the characteristic features of FCoE? (Select all that apply)
Takes advantage of copper cabling Enables connectivity between servers and data storage devices Does not require any specialized hardware Does not require separate cabling infrastructure
Who is often a supporter of first responders to a security incident and should follow good forensic practices?
Technician
Which protocol enables you to control a remote computer from a local computer over a network?
Telnet
Which unencrypted remote-access method enables control over another computer on the network via command line?
Telnet
A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called:
Temporal Key Integrity Protocol (TKIP)
An IPv4-to-IPv6 transition mechanism with native support for Network Address Translation (NAT) is known as:
Teredo
Once the theory of probable cause of the problem has been established, the next troubleshooting step should be:
Testing the theory to determine the problem cause
You've just started your computer, and you find that you have access to some local servers but no access to the Internet. Which of these is the most likely reason for this issue?
The DHCP server is down
What item do most professional cable installers use to quote the price for an installation?
The number of drops
In a specification such as 10BaseT, what does the word "base" identify?
The signal type
Which tool is falls into the category of a third-party software tool?
Throughput tester
What kind of tool would be used for troubleshooting short/open circuits inside a copper cable?
Time-Domain Reflector (TDR)
Which tool can be used to notify a technician where a cable break is occurring on a copper cable?
Time-domain reflectometer (TDR)
What is the purpose of a crimper?
To connect a RJ-45 connector to the cable
What is another name for a timestamped service ticket?
Token
Which tool has only one job: to help a technician locate a particular cable?
Tone generator
Which of the following tools would be used for locating a cable in a cabling bundle or tracing individual wires in a cable?
Toner and probe kit
Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or user names and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns, such as keyboard typing style ("something you do"). Multifactor authentication systems require implementation of authentication factors from two or more different categories.
True
BYOD requires tight controls and separation of employee personal data from corporate data.
True
Before the Internet existed, the biggest drawback to remote connections was the cost to connect.
True
Business continuity planning deals with the concept of backup sites.
True
Cabling, physical addresses, NICs, and switches are included in the Link layer of the TCP/IP model.
True
Category 3 (Cat 3) cable is a 10 Mbps twisted-pair copper cable used in telephone wiring and older Ethernet (10BaseT) networks.
True
Category 7 is a twisted-pair cabling standard featuring improved specifications for canceling crosstalk and system noise. As in Cat 6A, Cat 7 cabling offers 10 Gbps data transfer rate over a cable segment length of 100 meters in 10GBaseT networks. Category 7 standard introduces new connector types (the GG45 and TERA connector). Cat 7 cabling hasn't seen a widespread market adoption yet, because all manufacturers of active equipment and network cards prefer Cat 6A standard which offers similar performance and takes advantage of the traditional RJ-45 connector.
True
Changing the native VLAN on all trunk ports to an unused VLAN ID is one of the countermeasures against VLAN hopping.
True
Chassis intrusion detection is an option that can be enabled/disabled in the BIOS setup utility (if a BIOS comes equipped with this feature). Coupled with a hardware sensor mounted inside the computer case, this functionality can be used to check if the case was opened and display a notification alert during next boot.
True
CompTIA calls regularly updating operating systems and applications to avoid security threats patch management.
True
Computers use the Address Resolution Protocol (ARP) utility to resolve IP addresses to MAC addresses.
True
Different networking jobs require wildly different tools.
True
Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4.
True
E1 and SONET use a derivative of the High-Level Data Link Control (HDLC) protocol as the control channel.
True
E1 and T1 lines can interconnect for international use.
True
End users are probably the primary source of security problems for any organization.
True
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS.
True
Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams.
True
Network design quantifies the equipment, operating systems, and applications used by the network.
True
Hash functions allow for mapping large amounts of data content to a small string of characters. The result of hash function provides the exact "content in a nutshell" (in the form of a string of characters) derived from the main content. In case there's any change to the data after the original hash was taken, the next time when hash function is applied, the resulting hash value calculated after content modification will be different from the original hash. In computer forensics procedures, comparing hashes taken at different stages of evidence handling process ensures that the evidence hasn't been tampered with and retains its integrity.
True
Hot Standby Router Protocol (HSRP) is a Cisco feature.
True
IR blasters can emulate any IR remote control, turning any Android into a universal remote.
True
If your network consists of only two, three, or four routers, RIP's easy configuration often makes it worth putting up with slower convergence.
True
In 10GBaseT networks, Category 6 (Cat 6) cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas Cat 6A (Augmented) cabling allows for 10 Gbps data transfer rate over a cable segment length of 100 meters.
True
In STP network topology, the term "Root guard" refers to a security mechanism designed to protect integrity of the designated main switch.
True
In a network using subnets, the term "Default gateway" refers to a network device (e.g. router) that enables exchange of data between hosts residing in different subnets.
True
In a partially meshed topology network, at least two machines have redundant connections.
True
In computer networking, the term "Collision" refers to a situation in which two or more demands are made simultaneously on an equipment that can handle only one request at any given moment.
True
In computer networking, the term "Out-of-band management" refers to a network device management technique that enables device access through a dedicated communication channel separate from the network where a given device operates. Managing access can be established either locally by installing an out-of-band management card on the device, or remotely by establishing a dedicated connection to the device with the use of a modem or console router.
True
In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes.
True
In computer security, the term "Exploit" refers to a any method that allows malicious users to take advantage of a vulnerability found in computer systems.
True
In telecommunications, Protocol Data Unit (PDU) is a term used for describing a specific unit of data passed across a network.
True
In terms of size and reach, a Metropolitan Area Network (MAN) can be placed between a LAN (smaller type of network) and a WAN (larger type of network).
True
In the patch management process, an unwanted change introduced by an update can typically be reverted via rollback feature which allows for restoring an application or system to a state prior to the update.
True
Installing structured cabling properly takes a startlingly high degree of skill.
True
Lightweight EAP (LEAP) is a proprietary EAP authentication used almost exclusively by Cisco wireless products.
True
Long Term Evolution (LTE) is a wireless communications standard for mobile devices and wireless hotspots. LTE offers significant improvements in terms of speed when compared to the older generation of 3G cellular networks. LTE and its later revision LTE-Advanced (LTE-A) are often marketed as 4G standards.
True
Materials from which the plenum-rated cable's cover is made include low-smoke polyvinyl chloride (PVC) and fluorinated ethylene polymer (FEP).
True
Most of the connections that make up the high-speed backbone of the Internet use technologies designed at least 20 years ago to support telephone calls.
True
Preparing for incidents is the cornerstone of managing risk.
True
Private Branch Exchange (PBX) is an internal telephone exchange or switching system implemented in a business or office. PBX allows for handling of internal communications without the use of paid Public Switched Telephone Network (PSTN) service. A Voice over Internet Protocol (VoIP) PBX, which takes advantage of existing LAN cables, can further reduce costs by removing the need for separate telephone cabling infrastructure in a building or office.
True
Regardless of the implementation of an Ethernet network, the design of the frames remains the same.
True
Routers use logical addresses to forward data.
True
Secure File Transfer Protocol (SFTP) is an extension to the Secure Shell protocol (SSH) and runs by default on TCP port 22.
True
Secure Shell (SSH) is a more secure replacement for Telnet.
True
Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the same area without causing interference.
True
Switching loops are rare.
True
Symmetric-key encryption uses the same key for both encryption and decryption.
True
TCP is a connection-oriented protocol.
True
The 66 block (older type/primarily used in analog telephone systems) and the 110 block (newer type/used in computer networks) are examples of punch-down blocks used for connecting sets of wires.
True
The 802.11 standard defines both how wireless devices communicate and how to secure that communication.
True
The FCS uses a type of binary math called a cyclic redundancy check (CRC) that the receiving NIC uses to verify that the data arrived intact.
True
The Internet is an example of a large public WAN.
True
The Mechanical Transfer Registered Jack (MT-RJ) is a type of Small Form Factor (SFF) connector.
True
The Transport layer of the TCP/IP model uses both connection-oriented and connectionless protocols.
True
The best example of nonrepudiation is a digital signature.
True
The current version of SNMP is SNMPv3.
True
The default Wireshark screen has become the standard most other protocol analyzers are based on.
True
The general feature of all twisted-pair cabling types is that wires inside the cable are grouped into pairs and wires in each pair are twisted around each other to reduce signal interference from adjacent wire pairs (effect known as crosstalk).
True
The importance of changing default user names and passwords can be illustrated on the example of certain network devices (e.g. routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.
True
The main difference between the UTP and STP cabling is that STP cable takes advantage of additional protective cover reducing signal interference from outside sources.
True
The main method by which a first responder secures an area is by having their presence at the scene.
True
The only time a technician would use a punchdown tool in a diagnostic environment is a quick repunch of a connection to make sure all the contacts are properly set.
True
The term "VoIP endpoint" refers to a dedicated hardware device or an application program that enables Voice over Internet Protocol (VoIP) telephone calls from computing devices.
True
The traceroute command defaults to IPv4.
True
The traceroute utility is used to trace all of the routers between two points.
True
The very last step of the troubleshooting process involves documenting findings, actions and outcomes. This step comes after verification of full system functionality and implementation of applicable preventive measures.
True
To allow traffic from multiple VLANs on a single communication link, frames from individual VLANs must be identified. The most common and preferred method, IEEE 802.1Q, adds a tag to the Ethernet frame header, labeling it as belonging to a certain VLAN.
True
Transmission carried out in one direction only is described as simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes.
True
Unshielded twisted pair (UTP) category (CAT) ratings are officially rated in megahertz (MHz), indicating the highest frequency the cable can handle.
True
VLANs based on ports are the most common type of VLAN.
True
Virtualization provides a virtualized BIOS and System Setup for every virtual machine.
True
Viruses need human action to spread.
True
WAPs use an access control list (ACL) to enable or deny specific MAC addresses.
True
Web browsers are designed to request HTML pages from Web servers and then open them.
True
When a DHCP client boots up, it automatically sends out a special DHCP Discover message using the broadcast address.
True
When a NIC sends a frame that contains the broadcast address, every NIC on the network processes that frame.
True
When a cable is not broken but it's not moving data the way it should, turn to a certifier for diagnostics.
True
When troubleshooting a network, consider other issues first because routers do not fail very often.
True
When troubleshooting a problem, a technician needs to select the most probable cause from all the possible causes.
True
Whitelisting and blacklisting are labor-intensive processes, with whitelisting requiring far more work.
True
Wi-Fi Protected Setup (WPS) is a network security standard which simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network. WPS has known vulnerabilities and disabling this functionality is one of the recommended ways of securing wireless networks.
True
Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three.
True
With complete Internet services, such as Skype, all of the interconnections to the PSTN are handled in the Cloud.
True
With distance vector routing protocols, the simplest total cost sums the hops (the hop count) between a router and a network.
True
You can think of a link-local address as IPv6's equivalent to IPv4's APIPA/zeroconf address.
True
Which of the following answers refers to a dedicated device designed to manage encrypted connections established over an untrusted network, such as the Internet?
VPN concentrator
What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes?
Variable-Length Subnet Masks (VLSM)
Which of the following tools would be of help in troubleshooting wireless signal loss and low wireless network signal coverage?
WAP power level controls
A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called:
WLAN
Which of the following would be the best solution for securing a small network lacking an authentication server?
WPA2-PSK
An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:
War driving
Which secondary location lacks current data and may not have functioning Internet/network links?
Warm
An organization is creating a disaster recovery plan that includes a remote recovery site. This site contains the hardware necessary to recover all IT services, but none of the software or data is installed prior to the disaster event. Which of the following would best describe this site?
Warm site
Google Chrome and Mozilla Firefox are examples of __________ applications.
Web Client
What function uses port 80?
Web Server
What name is given to the port numbers in the range of 0 to 1023?
Well-known
Which of the following tools would be of help in determining the optimal placement of a WAP?
Wi-Fi analyzer
A computer network connecting multiple smaller networks over very large geographical areas is known as:
Wide Area Network (WAN)
When designing and building a network, which requirements help in determining how to connect to the Internet?
Wired/wireless considerations
The process of planning and designing new WLANs for optimal performance, security and compliance typically involves:
Wireless site survey
Why are crossover cables rarely used nowadays?
Wireless technology has superseded the need for crossover cables.
Which tool is an example of a packet sniffer?
Wireshark
Which of the tools listed below can provide information on network latency problems? (Select 3 answers)
ping Packet analyzer tracert or traceroute
Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses?
arp -a
Which process allows you to assign ports to VLANs after you create the VLANs?
assignment
Fingerprint readers, facial recognition cameras, voice analyzers, retinal blood vessel scanners or other more exotic characteristics are all examples of __________.
biometric devices
Most switches enable you to use multiple NICs for a single machine, a process called __________ or link aggregation.
bonding
Which of the answers listed below refers to a special type of frame used by STPs?
bridge protocol data unit (BPDU)
If the disaster requires actions offsite from the primary infrastructure, it is under the jurisdiction of__________.
business continuity
You won't get an HTTPS connection without a good __________ exchange.
certificate
When talking about QoS for medianets, an administrator needs to develop the concept of __________.
differentiated Services (DiffServ)
The Internet was founded on the __________ principle.
end-to-end
A __________ cable that uses LEDs is known as multimode fiber (MMF).
fiber-optic
The older __________ connector left a little gap between the connection points due to imperfections in the glass.
flat-surface connector
What is the name of a Linux command-line utility that can be used to display TCP/IP configuration settings?
ifconfig
Many years ago, the ping command had a bug that allowed malicious users to send malformed ping packets to a destination causing the __________ issue.
ping of death
A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy.
honeypot
Virtualization enables one machine called the __________, to run multiple operating systems simultaneously.
host
A __________ VPN deals with a specific single connection between two machines using VPN software or hardware.
host-to-host
The first and last bastion of defense for an entire infrastructure's security is at the individual __________.
hosts
Which of the network diagram symbols listed below represents an access point?
https://www.examcompass.com/media/communityquiz/images/amfslpkq73npm9pez6inpitmo.png
Which of the network diagram symbols listed below depicts a router?
https://www.examcompass.com/media/communityquiz/images/l1jhwkj82qvzdnkjljkds8kpa.png
Which network diagram symbol would be used to represent a firewall?
https://www.examcompass.com/media/communityquiz/images/n2c9vhvnagq1k4b8poh2pgcbv.png
Which of the following symbols would be used to depict a network switch?
https://www.examcompass.com/media/communityquiz/images/zy37i2eu08edkuojfd6k1e3cz.png
Both Z-Wave and Zigbee use a mesh networking topology to facilitate communication in homes, yet both also have __________ that act as the network interconnect.
hubs
To reduce fire hazards, most city ordinances require the use of __________ cable for network
plenum
Access control lists (ACLs) consider traffic as either __________.
inbound or outbound
A supervisory control and data acquisition (SCADA) system is a subset of the __________.
industrial control system (ICS)
If you want to know how hard your network is working, use a(n) __________.
interface monitor
A cable might experience crosstalk, where the electrical signal bleeds from one wire pair to another, creating __________.
interference
Which Linux command can be used to view IP settings?
ip
What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings?
ipconfig
Which command can be used on a Windows computer to view the IP settings?
ipconfig
Which command is used to force a DNS server to update its records?
ipconfig /registerdns
Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers)
ipconfig /release ipconfig /renew
The SNMP manager requests and processes information from the __________ devices.
managed
A command-line utility used for checking the reachability of a remote network host is called:
ping
The __________ defines who may access the network, how they may access the network, and what they can access.
network access policy
A __________ consists of multiple sensors placed around the network, often on one or both sides of the gateway router.
network intrusion detection system (NIDS)
All operating systems have a version of the __________ tool that enables DNS server queries.
nslookup
Which command would a technician use to diagnose DNS problems on a Windows computer?
nslookup
Which of the software tools listed below allows for obtaining a domain name to IP address mapping?
nslookup
The __________ watches some kind of monitor—the interface—and intervenes if necessary.
operator
In NetFlow, a single flow is a flow of __________ from one specific place to another.
packets
Microsoft has a utility called __________ that combines the functions of ping and tracert and adds some additional functions.
pathping
Which network command-line utility in MS Windows combines the features of ping and tracert?
pathping
Virtual servers and virtual network components can be created in the cloud using Infrastructure as a Service (IaaS) providers, often at rates measured in __________ per hour.
pennies
Connected Bluetooth devices create a __________.
personal area network (PAN)
Packet sniffers need to capture all the packets they can so it is typical for them to connect to an interface in __________ mode.
promiscuous
Most packet sniffers come bundled with a __________, the tool that takes the sniffed information and figures out what's happening on the network.
protocol analyzer
Training users to recognize social-engineering tactics assists in __________.
risk management
Configuration bridge protocol data units (BPDUs) establish the topology, where one switch is elected __________ and acts as the center of the STP universe.
root bridge
Which utility enables you to display and edit the local system's routing table?
route
Instead of NAT and private network IDs, IPv6 relies on __________.
router advertisements
Which of the acronyms listed below refers to a technology that allows for real-time analysis of security alerts generated by network hardware and applications?
security information and event management (SIEM)
ICS/DCS/SCADA and other networks are traditionally good candidates for network __________.
segmentation
A unique WLAN identifier (a.k.a. wireless network name) is commonly referred to as:
service set identifier (SSID)
A wireless hotspot is a feature that enables a device to share its cellular WAN connection by setting up a(n) __________ via its own 802.11 wireless.
service set identifier (SSID)
A metric that compares the amount of usable data and the background noise that is being sent over a transmission channel is known as:
signal-to-noise ratio (SNR)
Managed devices run specialized __________ called agents.
software
Code-division multiple access (CDMA) came out not long after GSM, and used a __________form of transmission.
spread-spectrum
Which command used in Linux is faster and more powerful than netstat?
ss
A dedicated local network consisting of devices providing data access is called:
storage area network (SAN)
The NIC and the attached __________ determine full- or half-duplex during the auto-negotiation process.
switch
Which of the following answers refers to a command-line packet capturing utility?
tcpdump
Which tool is a command line alternative to Wireshark?
tcpdump
A __________ is an example of something to monitor.
temperature
What distance can a signal travel on a fiber-optic cable?
tens of kilometers
Within the DNS hierarchy, which term refers to the DNS servers just below the DNS root?
top-level domain (TLD) servers
A Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as:
traceroute
Which software tool is built into operating systems?
traceroute
Which tool records the route between any two hosts on a network and can be used to troubleshoot routing problems?
traceroute
Which utility can be used to diagnose where a problem lies when you have problems reaching a remote system?
traceroute
A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called:
tracert
On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control the flow of packets into or out of the network according to the type of packet or other rules.
traffic shaping
Biometric access calls for using a(n) __________ physical characteristic of a person to permit access to a controlled IT resource.
unique