Networking 1, Networking...

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The default route in Internet Protocol Version 4 is designated as which of the following?

0.0.0.0/0.

What is the distance limitation of 10GBASE-LW?

10 km

What is the administrative distance of RIP in a Cisco network?

120

What is a DHCP reservation?

A DHCP reservation is a static addressing approach where a specific MAC address is mapped to a specific IP address, which will not be assigned to any other network device.

Question 65 :Which of the following is an open standard variant of HSRP? This

CARP

Which of the following statements are true of an Ethernet hub? Each correct answer represents a complete solution. Choose all that apply.

CSMA/CD needs to run on all attached devices. All connections need to be half-duplex.

Which of the following is mostly likely to cause EMI?

Cable placement

Which of the following pieces of equipment can be used to check the wires in a cable for continuity (that is, check to make sure there are no opens, or breaks, in a conductor)?

Cable tester

Asynchronous Transfer Mode is associated with which of the following?

Cell-switched connection

What class of address is used for multicast in IP?

Class D

What type of network has a dedicated file server, which provides shared access to files?

Client-server

Which of the following reflects the media type, bandwidth capacity, and distance limitation combination of 10BASE2 Ethernet?

Coax/10 Mbps/185 m

What metric is used by the OSPF routing protocol?

Cost

Which layer of the OSI Model is concerned with logical addressing?

Network

Which of the following is a publicly available network security scanner?

Nmap

Which of the following is a link-state routing protocol that uses a metric of cost, which is based on the link speed between two routers?

OSPF

Which MPLS network element is a service provider internal router that does not have a direct interface with the customer routers?

P

Which two of the following virtual private network (VPN) protocols lack native security features?

PPTP, L2TP

Which of the following Microsoft Windows® commands is primarily used to check reachability to a remote IP address? This

Ping

What Ethernet switch feature allows a PC running packet capture software and connected to one switch port to receive a copy of traffic seen on another switch port?

Port Mirroring

What is the name of Layer 6 in the OSI Model?

Presentation

Which of the following network appliances is used to restrict clients from accessing certain URLs on the Internet?

Proxy server

Which of the following user authentication technologies is used by Microsoft Windows® clients to remotely access a Microsoft Windows® network?

RAS

Which of the following standards specifies a type of coaxial cable commonly used by local cable companies to connect individual homes to the cable company's distribution network?

RG-6

Which NDP message type is used by a host to locate the IPv6 routers attached to the local network?

RS

Which of the following remote access security technologies is a UDP-based protocol used to communicate with an AAA server and does not encrypt an entire authentication packet, but only encrypts the password?

Radius

Which phase of an incident response plan focuses on the restoration of network devices and systems?

Recover

What topology could result in a lack of all communication capabilities with a single connection break?

Ring

What device would forward information using the following address as its primary information: 192.168.1.101?

Router

Which of the following is a voice over IP (VoIP) signaling protocol used to setup, maintain, and tear down VoIP phone calls?

SIP

Identify the Simple Network Management Protocol (SNMP) component that is also known as an NMS.

SNMP manager

Which type of fiber optic connector is often referred to as a bayonet connector?

ST

A DHCP server uses a pool of addresses (which typically corresponds to a single subnet) to assign IP address to DHCP clients on a specific network segment. What is a common name for this pool of addresses? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and al

Scope

Which of the following is a Microsoft Windows® log that would report events such as a failed login attempt?

Security

Which of the following IDS/IPS detection methods could trigger an alarm if a certain string of bytes, in a certain context, is observed?

Signature-based detection

Which of the following security attacks uses Internet Control Message Protocol (ICMP) traffic, directed to a subnet, to flood a target system with Ping replies?

Smurf Attack

What loop-prevention mechanism prevents a route learned on one interface from being advertised back out of that same interface?

Split Horizon

In the modern LAN, what topology is often used with LAN switches and Ethernet connections?

Star

What type of firewall inspects traffic leaving an inside network as it goes out to the Internet and allows returning traffic belonging to that session?

Stateful

Question 20 :Which DLP target activity level addresses data at rest?

Storage level

What device would forward traffic based on a MAC address?

Switch

What is a common reason for disabling SSID broadcast in a wireless LAN (WLAN)? This

To better conceal the SSID of a WLAN

Which of the following pieces of test equipment is sometimes called a "fox and hound?"

Toner Probe

Which of the following tools best helps you determine which wires on a punch down block connect back to a specific user's office?

Toner probe

Identify the quality of service (QoS) mechanism that can set a bandwidth limit on traffic and delays packets, rather than drops packets, attempting to exceed that bandwidth limit.

Traffic Shaping

What command enables you to view the ARP cache entries on a Windows workstation?

arp -a

Which of the following UNIX commands is primarily used to resolve a fully-qualified domain name (FQDN) to an IP address and lacks an interactivity mode (that is, the entire command and all of the appropriate parameters are entered with a single command)?

dig

What command would you use to verify the DNS server to be used by your Windows workstation?

ipconfig /all

What command enables you to view the NetBIOS name cache on your Windows workstation?

nbtstat

Why might a network using DHCP for IP address assignment need a DHCP relay agent?

A router resides between a DHCP client and a DHCP server.

Which policy is also referred to as a fair use policy?

Acceptable use policy

Refer to the exhibit. Consider the network topology. Which (if any) device in the topology has an incorrect IP address? (Assume that if two devices belong to one subnet, and another device belongs to a different subnet, that device (belonging to a different subnet than the other two devices) has an incorrect IP address.)

All devices have valid IP addresses.

What is the name of the wireless protocol used in a sensor to relay information such as a person's heart rate or a car's tire pressure?

Ant+

If a network has "five nines" of availability, what is its maximum downtime per year?

Approximately five minutes

If a packet cannot be forwarded by a router interface due to the packet's size exceeding the interface's maximum transmission unit (MTU), the router attempts to fragment the packet, unless the packet's header has the don't fragment (DF) bit set. If the DF bit is set, the router usually drops the packet and sends an ICMP message back to the sender, to let the sender know that the packet was dropped. If a router does not send such a notification, what is that router called?

Black hole router

When following a structured troubleshooting methodology, what should you do if you test a hypothesis, and the hypothesis is determined to be invalid?

Hypothesize another probable cause of the issue.

Which of the following are examples of interior gateway protocols? Each correct answer represents a complete solution. Choose all that apply.

IS-IS, OSPF, RIP

What protocol is used to synchronize a network device's clock with a time server?

NTP

What is an acceptable one-way latency in a typical VoIP network?

150 ms

What is the bandwidth of an OC-3?

155.52 Mbps

Which of the following is a valid value of the first octet for a Class B IP address?

172

What are the common TCP ports (that is, "well-known" ports) used by FTP? Each correct answer represents a complete solution. Choose two.

20,21

Given a subnet mask of /19, what is the corresponding dotted decimal notation?

255.255.224.0

What is the common TCP port (that is, "well-known" port) used by HTTPS?

443

If you need to create at least 30 subnets, how many bits must you use for subnetting?

5

In a wireless LAN (WLAN) operating in the 2.4 GHz band, access points (APs) with adjacent coverage areas should have how many channels of separation to avoid interfering with one another?

5

The IEEE 802.11a wireless standard has which of the following frequency band / maximum bandwidth parameters?

5 GHz / 54 Mbps

Question 81 :What is the maximum bandwidth of an 802.11a wireless LAN (WLAN)?

544 Mbps

Consider the following wireless network (WLAN) topology. A wireless client running IEEE 802.11a is having connectivity issues when attempting to roam between access points (APs). What is the most likely issue?

802.11 standards

Direct-Sequence Spread Spectrum (DSSS) is a wireless LAN (WLAN) transmission method. Which two of the following WLAN standards use the DSSS transmission method?

802.11g 802.11b

Which of the following features allows a network device without an IP address to dynamically be assigned IP address information (for example, IP address, subnet mask, DNS server, and WINS server) from a network server?

DHCP

What service is typically used to resolve a FQDN?

DNS

Which QoS mechanism is often called soft QoS?

Differentiated services

While an IPsec tunnel is being established, which of the following securely establishes a shared secret key, over the unsecured medium?

Diffie-Hellman (DH)

Which of the following is a valid representation of the IPv6 address of 0E50:0002:0000:0000:0000:4000:0000:0001?

E50:2::4000:0:1

Which of the following conditions would most likely result in corrupted data?

Exceeding the distance limitation of a cable

Drag the routing information sources to match them with their administrative distances.

Explanation: The routing information sources with their administrative distances are given below: Statically configured network: 1 EIGRP: 90 OSPF: 110 RIP: 120 External EIGRP: 170

Drag the network attacks to match them with their descriptions.

Explanation: Types of network attacks are described below: Malware: A software program designed to damage or take other unwanted actions on a computer system EMI interception: An attacker copies information traveling over the wire Man-in-the-middle: An attacker gets in the direct path between a client and a server and eavesdrops on their conversation FTP bounce: An attacker sends a PORT command specifying the IP address of a third party Dumpster diving: A technique used to retrieve information that could be used to carry out an attack on a network

What WAN topology permits the highest degree of failover and redundancy?

Full Mesh

The steps that occur as a DHCP client obtains IP address information from a DHCP server are:

HCPDISCOVER: When a DHCP client initially boots, it has no IP address, default gateway, or other such configuration information. Therefore, a DHCP client initially communicates by sending a broadcast message in an attempt to discover a DHCP server. DHCPOFFER: When a DHCP server receives a DHCPDISCOVER message, it can respond with a unicast DHCPOFFER message. DHCPREQUEST: The DHCP client communicates with the selected server by sending a unicast DHCPREQUEST message asking the DHCP server to provide IP configuration parameters. DHCPACK: The DHCP server responds to the client with a unicast DHCPACK message. This DHCPACK message contains a collection of IP configuration parameters

You are troubleshooting an issue where a PC can reach some hosts on the Internet (using either DNS name or IP address), while several other hosts on the Internet are not reachable. From the PC you can Ping all devices on your local subnet. What is most likely causing the problem?

Incorrect (or missing) routes ina router's routing table

What is typically the problem when a host is unable to reach devices outside the local network?

Incorrect default gateway

Which three of the following are features of IPsec?

Integrity Confidentiality Authentication

A building might have multiple patch panels (for example, on different floors of a building). These common locations, where cables from nearby offices terminate, are often called what?

Intermediate distribution frames

Which of the following is a Microsoft Windows® command that can be used release and renew a DHCP lease on a PC?

Ipconfig

What technology enables you to assign multiple physical links to a logical interface, which appears as a single link to a route processor?

LACP

What term defines a delay of packets in the network?

Latency

An Ethernet hub resides at which layer of the OSI Model?

Layer 1

Which of the following approaches to wireless LAN (WLAN) security restricts access to a WLAN based on a computer's wireless interface card? This

MAC address filtering

Which of the following features allows an Ethernet switch port to automatically detect which of its pins should be used for transmitting and which pins should be used for receiving? This

MDIX

Which of the following DNS record types is used for an e-mail server?

MX

A dedicated network device that acts as an intrusion prevention system (IPS) sensor is called a ________.

NIPS

Which of the following usually offers the highest bandwidth?

VDSL

Refer to the exhibit. In the topology, what type of network appliance is located at each of the sites?

VPN concentrator

Which Ethernet switch feature allows you to create a VLAN on one switch and have that VLAN be automatically created on other switches?

VTP

What virtual network service stores user data and the GUI in a data center, as opposed to the hard drive in a user's computer?

Virtual desktop

Which of the following security threats is a piece of code (for example, a program or a script) that infects a system, because an end-user executed a program?

Virus

Which two of the following are common wireless security standards?

WEP, WPA

Which of the following approaches to wireless LAN (WLAN) security requires users to authenticate against an authentication server's database, rather than a client being configured with a PSK?

WPA Enterprise

Which of the following wireless LAN (WLAN) security threats involves a user writing a symbol in a public place, letting other users know about the existence of a WLAN, and possibly information about how to access that WLAN?

Warchalking


Ensembles d'études connexes

AP Psychology Thinking and Language Terms to Know

View Set

Unit 2 Nutrition Chapter Questions

View Set

PRINCIPLES Real Estate Practice Chapter 8

View Set

Wills, Trusts & Probate Admin: Mod. 1-8 Quizzes

View Set

Teorya ng Pinagmulan ng Pilipinas

View Set

Chapter 24: Pediatric Examination Quiz

View Set