NETWORKING FUNDAMENTALS

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are trying to access a music sharing service on the Internet. The service is located at the IP address 173.194.75.105. You are experiencing problems connecting. C:\>tracert -d 172.194.75.105 Tracing route to 172.194.75.105 over a maximum of 30 hops 1 <1 ms <1 ms <1 ms 10.0.0.1 2 25 ms 29 ms 29 ms 174.57.168.1 3 9 ms 9 ms 9 ms 68.85.76.249 4 10 ms 9 ms 9 ms 68.86.210.25 5 14 ms 15 ms 18 ms 68.86.92.161 6 15 ms 16 ms 13 ms 68.86.86.142 7 14 ms 14 ms 14 ms 75.149.231.62 8 14 ms 15 ms 15 ms 209.85.241.222 9 17 ms 16 ms 17 ms 72.14.236.146 10 27 ms 28 ms 28 ms 209.85.241.222 11 26 ms 25 ms 26 ms 216.239.48.157 12 * * * Request timed out. 13 27 ms 26 ms 25 ms 173.194.75.105 Trace complete. C:\> Questions:

(router) (successfully)

Match each IP address to its corresponding IPv4 address class. To answer, drag the appropriate IP address from the column on the left to its IPv4 address class on the right. Each IP address may be used once, more than once, or not at all. Each correct match is worth one point. IP Addresses 133.234.23.2 224.100.20.3 201.111.22.3 64.123.12.1 Answer Area: Class A Class B Class C Class D Explanation: Class A: 0.0.0.0 - 127.255.255.255 Class B: 128.0.0.0 - 191.255.255.255 Class C: 192.0.0.0 - 223.255.255.25 Class D: 224.0.0.0 - 239.255.255.255

Class A - 64.123.12.1 Class B - 133.234.23.2 Class C - 201.111.22.3 Class D - 224.100.20.3

Order the layers of the OSI model, starting at Layer 1, the Physical Layer. ____ Network ____ Transport ____ Application ____ Presentation ___ Datalink ____ Session ____ Physical Explanation: P(Physical)lease D(Datalink)o N(Network)ot T(Transport)ake S(Session)ussie's P(Presentation)izza A(Application)way. The correct order of the layers of the OSI model, starting at Layer 1, the Physical Layer, is: Physical Data Link Network Transport Session Presentation Application Physical Layer: The Physical Layer is responsible for transmitting raw bits over a communication channel. It defines the physical and electrical characteristics of the network, such as the voltage levels, cable types, and connector types. Data Link Layer: The Data Link Layer provides reliable data transfer across a physical link by breaking data up into frames and performing error detection and correction. It also manages access to the physical medium and resolves contention issues between multiple devices on the same network segment. Network Layer: The Network Layer provides logical addressing and routing functions for data packets. It defines how packets are routed from the source to the destination across multiple ne

Physical Data Link Network Transport Session Presentation Application

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. The TCP/IP model has four layers, which correspond with the OSI model's seven layers. (Y/N) The TCP/IP application layer corresponds with the top four layers of the OSI model. (Y/N) The TCP/IP transport and Internet layers correspond with layers 3 and 4 of the OSI model. (Y/N) Explanation: * Yes, the TCP/IP four layers corresponds to the OSI model's seven layers. * No, the TCP/IP application layer corresponds to only the three top OSI Layers. * Yes, TCP transport (host-to-host in diagram below) and Internet layers corresponds to layer 3 and layer 4 in the OSI model.

Y N Y

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. 21DA:D3:0:2F 3B:2AA:FF-FE28:9C 5A is a valid IPV6 unicast address. (Y/N) FE80::2AA-FF:FE28:9C 5A is a valid IPv6 address. (Y/N) 21DA=02AA::FF-FE28:9C5A is a valid IPv6 address. (Y/N) Explanation: Since the leftmost three bits are reserved as "001" for Global unicast IPv6 addresses, the range of Global Unicast Addresses available now are from 2000 to 3FFF. 21DA is a global unicast prefix.

Y Y N

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. IPsec can be used to secure network communications between two machines. (Y/N) IPsec can be used to secure network communication between two networks. (Y/N) IPsec network traffic is always encrypted. (Y/N) Explanation: Sometimes you will want to create a tunnel without encryption. The IPSEC protocols provide two ways to do this

Y Y N

Match each protocol to its description. To answer, drag the appropriate protocol from the column on the left to its description on the right. Each protocol may be used once, more than once, or not at all. Each correct match is worth one point. Protocols: TCP ICMP ARP UDP IGMP Answer Area: connectionless, message-based protocol with best-effort service [answer] connection-oriented protocol with guaranteed service [answer] resolves IP addresses to MAC addresses [answer] Explanation: * UDP uses a simple connectionless transmission model with a minimum of protocol mechanism. User datagram protocol (UDP) provides a thinner abstraction layer which only error-checks the datagrams. Note: Best-effort delivery describes a network service in which the network does not provide any guarantees that data is delivered or that a user is given a guaranteed quality of service level or a certain priority. * Transmission control protocol (TCP) provides a guaranteed delivery of an octet stream between a pair of hosts to the above layer, internally splitting the stream into packets and resending these when lost or corrupted. * Address Resolution Protocol (ARP) is a protocol for mapping an Internet Proto

connectionless, message-based protocol with best-effort service [answer] UDP connection-oriented protocol with guaranteed service [answer] TCP resolves IP addresses to MAC addresses [answer] ARP

Which of the following represents a Media Access Control (MAC) address? o GV:ZC:KK:DK:FZ:CA o 255.255.255.0 o 05:35:AB:6E:Al:25 o 127.0.0.1 Explanation: The standard (IEEE 802) format for printing MAC-48 addresses in human-friendly form is six groups of two hexadecimal digits, separated by hyphens (-) or colons (:), in transmission order (e.g. 01-23-45-67-89-ab or 01:23:45:67:89:ab ).

o 05:35:AB:6E:Al:25

A cable that meets the l000BaseT standard has a maximum length of: o 100 m o 250 m o 500 m o 1,000 m Explanation: When used for 10/100/1000BASE-T, the maximum allowed length of a Cat 6 cable is 100 meters or 328 feet.

o 100 m

How many bits are there in an Internet Protocol version 6 (IPv6) address? o 32 o 64 o 128 o 256 Explanation: IPv6 uses a 128-bit address, allowing 2**128, or approximately 3.4×10**38 addresses, or more than 7.9×10**28 times as many as IPv4, which uses 32-bit addresses

o 128

To which IP configuration does the CIDR notation 192.168.1.1/25 refer? o 192.168.1.1 255.255.255.64 o 192.168.1.1 255.255.255.1 o 192.168.1.1 255.255.255.32 o 192.168.1.1 255.255.255.256 o 192.168.1.1 255.255.255.128 Explanation: The CIDR notation "192.168.1.1/25" refers to an IP address with a subnet mask of 255.255.255.128, which means that the first 25 bits of the IP address identify the network, and the remaining 7 bits identify the host within the network. To determine the subnet mask in dotted decimal notation, you can use the following formula: subnet mask = 11111111 11111111 11111111 10000000 (binary representation of /25)= 255 255 255 128 (dotted decimal notation) Therefore, the correct answer is: 192.168.1.1 255.255.255.128

o 192.168.1.1 255.255.255.128

Which network does the IP address 220.100.100.100 belong to? o 220.100.100.0/24 o 220.100.100.1/24 o 255.255.255.0/24 o 255.255.255.1/24 Explanation: The last octet of a network will start as 0.

o 220.100.100.0/24

This question requires that you evaluate the underlined text to determine if it is correct. IPv4 multicast addresses range from "192.168.0.0 to 192.168.255.255". Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct. o 127.0.0.0 to 127.255.255.255 o 172.16.0.0 to 172.31.255.255 o 224.0.0.0 to 239.255.255.255 o No change is needed Explanation: Class D is multicast. Class A: 0.0.0.0 - 127.255.255.255 Class B: 128.0.0.0 - 191.255.255.255 Class C: 192.0.0.0 - 223.255.255.25 Class D: 224.0.0.0 - 239.255.255.255

o 224.0.0.0 to 239.255.255.255

Which of these addresses is a multicast address? o 127.0.0.1 o 169.254.0.1 o 192.168.0.1 o 224.0.0.1 Explanation: The full range of multicast addresses is from 224.0.0.0 to 239.255.255.255.

o 224.0.0.1

The default port used for telnet is: o 23 o 25 o 80 o 8080 Explanation: The telnet protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23, where a Telnet server application (telnetd) is listening.

o 23

The default port used for SMTP is: o 23 o 25 o 80 o 8080 Explanation: SMTP by default uses TCP port 25.

o 25

The default subnet mask for a Class B network is: o 0.0.0.255 o 0.0.255.255 o 255.0.0.0 o 255.255.0.0 Explanation: Class A default subnet mask is 255.0.0.0. Class B default subnet mask is 255.255.0.0. Class C default subnet mask is 255.255.255.0.

o 255.255.0.0

What is the default subnet mask for a Class C Internet network? o 255.255.255.252 o 255.255.255.240 o 255.255.255.192 o 255.255.255.0 Explanation: Class A default subnet mask is 255.0.0.0. Class B default subnet mask is 255.255.0.0. Class C default subnet mask is 255.255.255.0.

o 255.255.255.0

Which subnet mask is valid? o 255.255.255.240 o 255.255.255.228 o 255.255.255.164 o 255.255.255.245 Explanation: These are valid: 255.255.255.0 255.255.255.128 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.252

o 255.255.255.240

The maximum throughput of an 802.llg network is: o 2.4 GHz. o 54 GHz. o 2.4 Mbps o 54 Mbps. Explanation: The 802.11g standard for wireless networking supports a maximum bandwidth of 54 Mbps.

o 54 Mbps.

Which of the following is a public IP address? o 10.156.89.1 o 68.24.78.221 o 172.16.152.48 o 192.168.25.101 Explanation: Incorrect: The private address space specified in RFC 1918 is defined by the following three address blocks: not D: 192.168.0.0/16 The 192.168.0.0/16 private network can be interpreted either as a block of 256 class C network IDs or as a 16-bit assignable address space (16 host bits) that can be used for any subnetting scheme within the private organization. The 192.168.0.0/16 private network allows the following range of valid IP addresses: 192.168.0.1 to 192.168.255.254. Not A: 10.0.0.0/8 The 10.0.0.0/8 private network is a class A network ID that allows the following range of valid IP addresses: 10.0.0.1 to 10.255.255.254. The 10.0.0.0/8 private network has 24 host bits that can be used for any subnetting scheme within the private organization. Not C: 172.16.0.0/12 The 172.16.0.0/12 private network can be interpreted either as a block of 16 class B network IDs or as a 20-bit assignable address space (20 host bits) that can be used for any subnetting scheme within the private organization. The 172.16.0.0/12 private network allows the following range of

o 68.24.78.221

Which two are published IEEE 802.11 wireless transmission standards? (Choose two.) o 802.1 If o 802.11g o 802.11k o 802.11m o 802.11n Explanation: The 802.11 family consists of a series of half-duplex over-the-air modulation techniques that use the same basic protocol. 802.11-1997 was the first wireless networking standard in the family, but 802.11b was the first widely accepted one, followed by 802.11a, 802.11g, 802.11n, and 802.11ac.

o 802.11g o 802.11n

Which of these represents the Internet Protocol version 6 (IPv6) loopback address? o 127.0.0.1 o 192.168.0.1 o FEC0:A8C0::AA01 o ::1 Explanation: The localhost (loopback) address, 0:0:0:0:0:0:0:1, and the IPv6 unspecified address, 0:0:0:0:0:0:0:0, are reduced to ::1 and ::, respectively.

o ::1

What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point? o The access point will transmit, but the node will be unable to receive. o A connection will be established. o Both the node and the access point will be unable to transmit. o The node will transmit, but the access point will be unable to receive. Explanation: 802.11g hardware is fully backward compatible with 802.11b hardware.

o A connection will be established.

VPNs are implemented to provide: o A secure connection within a private network. o A secure connection through public networks. o Additional encryption by using IPSec. o Additional security for selected computers. Explanation: VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

o A secure connection through public networks.

The protocol that maps IP addresses to a Media Access Control (MAC) address is: o Internet Message Access Protocol (IMAP). o Dynamic Host Configuration Protocol (DHCP). o Routing Information Protocol (RIP). o User Datagram Protocol (UDP). o Address Resolution Protocol (ARP). Explanation: Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address (MAC address) that is recognized in the local network.

o Address Resolution Protocol (ARP).

Which of the following are features of DHCP? (Choose two.) o IP address resolution to canonical names o Secure shell connections o Address reservation o Network file transfer o IP address exclusion Explanation: * The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services. * Some network devices need to use statically assigned IP addresses rather than addresses dynamically assigned through DHCP. For example, DHCP servers must have statically configured IP addresses. Also, some devices (such as legacy network printers) do not support DHCP. For the devices that need static IP assignments, the company creates an exclusion range from each IP address range.

o Address reservation o IP address exclusion

Teredo tunneling is a protocol that: o Translates Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6). o Allows IPv6 connectivity through IPv4 devices. o Provides VPN security. o Dynamically allocates IPv6 addresses. Explanation: Teredo alleviates this problem by encapsulating IPv6 packets within UDP/IPv4 datagrams, which most NATs can forward properly. Thus, IPv6-aware hosts behind NATs can be used as Teredo tunnel endpoints even when they don't have a dedicated public IPv4 address.

o Allows IPv6 connectivity through IPv4 devices.

When a client's DHCP-issued address expires, the client will: o Select a new address and request approval from the DHCP server. o Require manual configuration with a static IP address. o Attempt to obtain a new address by broadcasting. o Continue to use the address until it is notified to stop. Explanation: Rebinding would occur. Rebinding If the DHCP client is unable to communicate with the DHCP server from which it obtained its lease, and 87.5 percent of its lease time has expired, it will attempt to contact any available DHCP server by broadcasting DHCPRequest messages. Any DHCP server can respond with a DHCPAck message, renewing the lease, or a DHCPNak message, forcing the DHCP client to initialize and restart the lease process. Note: Renewing IP addressing information is leased to a client, and the client is responsible for renewing the lease. By default, DHCP clients try to renew their lease when 50 percent of the lease time has expired. To renew its lease, a DHCP client sends a DHCPRequest message to the DHCP server from which it originally obtained the lease.

o Attempt to obtain a new address by broadcasting.

One advantage of dynamic routing is that it: o Automatically maintains routing tables. o Limits traffic derived from routing protocols. o Reduces broadcast traffic. o Automatically enables DHCP Explanation: Dynamic Routing, also called adaptive routing, describes the capability of a system, through which routes are characterized by their destination, to alter the path that the route takes through the system in response to a change in conditions. The adaptation is intended to allow as many routes as possible to remain valid (that is, have destinations that can be reached) in response to the change.

o Automatically maintains routing tables.

If a router is installed so that it separates a DHCP server from its clients, the clients will: o Immediately lose connectivity to all segments. o Be unable to obtain their leases from the server. o Immediately lose connectivity to the local segment. o Receive an immediate renewal of their lease. Explanation: If a router is installed so that it separates a DHCP server from its clients, the clients will be unable to obtain their leases from the server. DHCP (Dynamic Host Configuration Protocol) is a network protocol used to automatically assign IP addresses and other network configuration parameters to devices on a network. When a device initially connects to the network, it sends a broadcast message requesting an IP address lease from a DHCP server. The DHCP server responds with an offer of an IP address lease, which the device can accept and use. If a router is installed between the DHCP server and the clients, and the router is not configured to forward DHCP traffic, the clients will not be able to receive the DHCP offers from the server. As a result, they will not be able to obtain IP addresses and other network configuration parameters, which will prevent them from communicating

o Be unable to obtain their leases from the server.

What is the minimum cabling requirement for a 100BaseTX network? o Category 3 UTP cable o Category 5 UTP cable o Category 6 UTP cable o Multimode fiber cable Explanation: 100BASE-TX is the predominant form of Fast Ethernet, and runs over two wire-pairs inside a category 5 or above cable. 100BASE-TX and 1000BASE-T were both designed to require a minimum of Category 5 cable and also specify a maximum cable length of 100 meters. Category 5 cable has since been deprecated and new installations use Category 5e.

o Category 5 UTP cable

In local area network (LAN) topologies, the primary media access methods are: (Choose two.) o Contention o Negotiation o Kerberos o Token passing Explanation: Media contention occurs when two or more network devices have data to send at the same time. Because multiple devices cannot talk on the network simultaneously, some type of method must be used to allow one device access to the network media at a time. This is done in two main ways: carrier sense multiple access collision detect (CSMA/CD) and token passing.

o Contention o Token passing

To directly connect the Ethernet network interface cards (NICs) of two computers, you should use a: o Crossover cable o Straight cable o Rollover cable o Coaxial cable Explanation: An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices together directly. Normal straight through cables were used to connect from a host network interface controller (a computer or similar device) to a network switch, hub or router.

o Crossover cable

A computer that has an IP address of 169.254.0.1 cannot access the network. Which of the following services should you confirm is available? o WINS o DNS o DHCP o TFTP Explanation: 169.254.0.1 is an APIPA address. An APIPA address is used when the DHCP server is not available.

o DHCP

Which of the following uses pointer records and A records? o IDS o DNS Server o NAT Server o IPS Explanation: DNS records include: * A Address record * PTR Pointer record

o DNS Server

Which technology provides the highest bit rate? o T1 o El o DS3 o ISDN Explanation: A DS3 line (sometimes also referred to as T3) is a dedicated, high bandwidth, fiber circuit with a speed of 45 Mbps. Incorrect: Not A: T1, 1.544Mbps Not B: E1, 2.048Mbps Not D: SDN 30B+1D (all 64K) ~ E1: 1.930Mbps

o DS3

At what layer in the OSI model are hardware addresses referenced? o Network o Application o Data link o Physical Explanation: Hardware addresses are referenced at the Data Link layer of the OSI model. This layer is responsible for the reliable transfer of data between adjacent network nodes and provides the means for error detection and correction. The Data Link layer encapsulates network layer packets into frames and adds a header containing the hardware or MAC addresses of the source and destination devices. The hardware addresses are used by the Data Link layer to identify individual devices on the same physical network segment and to route frames to their intended recipients. Examples of Data Link layer protocols include Ethernet, Wi-Fi, and Bluetooth.

o Data link

The default gateway address identifies the: o Device that will connect the computer to the local network. o Device that will connect the computer to a remote network. o Server that will provide name services for the computer. o Server that will authenticate the user of the computer. Explanation: A default gateway is the node on the computer network that the network software uses when an IP address does not match any other routes in the routing table. In home computing configurations, an ISP often provides a physical device which both connects local hardware to the Internet and serves as a gateway.

o Device that will connect the computer to a remote network.

Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.) o Token ring o Ethernet o Dial-up o Leased line Explanation: Token ring and Ethernet are used in LANs.

o Dial-up o Leased line

The ipconfig command will: o Configure routers o Display a client's address o Display a client's broadcast mode o Configure DHCP clients Explanation: ipconfig Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.

o Display a client's address

Attenuation in a wireless network signal is a result of: o Number of wireless nodes connected. o Distance from the access point. o Interference from cellular phones. o Encryption of the signal. Explanation: Solid objects greatly attenuate (reduce) Wi-Fi radio signals, so clear line of sight is best.

o Distance from the access point.

The service that resolves fully qualified domain names (FQDN) to IP addresses is: o Windows Internet Name Service (WINS). o Domain Name Service (DNS). o Internet Service Provider (ISP). o Address Resolution Protocol (ARP). Explanation: The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites.

o Domain Name Service (DNS).

If an 802.llg Internet connection has connectivity problems, what may be the cause? o A cordless phone o A cellular phone o Incandescent lights o Electromagnetic interference (EMI) Explanation: Over the last 10 years 802.11 technology has made remarkable strides — getting faster, stronger and more scalable. But one problem still haunts Wi-Fi: reliability. Nothing is more frustrating for network managers than users complaining about flaky Wi-Fi performance, spotty coverage and dropped connections. Dealing with a Wi-Fi environment that you can't see and that is constantly changing is the problem. And radio frequency interference is the culprit.

o Electromagnetic interference (EMI)

A VPN is a/an: o Encrypted connection across the Internet. o Virtual network within your local area network (LAN). o Communication tunnel between VLANs. o Personal network for your use only. Explanation: VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

o Encrypted connection across the Internet.

Two companies want to share data by using the Internet. Which type of network provides the solution? o Ethernet o Intranet o Extranet o Perimeter Explanation: An extranet is a computer network that allows controlled access from outside of an organization's intranet. Extranets are used for specific use cases including business-to-business (B2B).

o Extranet

Which of these is an application layer protocol? o TCP o FTP o IP o UDP Explanation: FTP is an application layer protocol.

o FTP

To protect a network when it is connected to the Internet, you should use a: o Bridge o Firewall o Switch o Router Explanation: A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings.

o Firewall

If a router cannot determine the next hop for a packet, the router will: o Forward the packet to the default route. o Send the packet back to the packet's source. o Broadcast the packet. o Store the packet in the memory buffer. Explanation: If there is no next hop, the packets are not policy routed. A default route of a computer that is participating in computer networking is the packet forwarding rule (route) taking effect when no other route can be determined for a given Internet Protocol (IP) destination address.

o Forward the packet to the default route.

The function of a router is to: o Provide IP subnet masks for hosts. o Forward traffic to other networks. o Broadcast routing tables to clients. o Store tables for name resolution. Explanation: A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.

o Forward traffic to other networks.

Which protocol can be used to encrypt packets on the Internet? o SNMP o HTTPS o TFTP o HTTP Explanation: HTTPS, which stands for Hypertext Transfer Protocol Secure, makes it more difficult for hackers, the NSA, and others to track users. The protocol makes sure the data isn't being transmitted in plain-text format, which is much easier to eavesdrop on.

o HTTPS

What type of DNS record maps host names to addresses? o Mail Exchanger (MX) DNS record o Service (SRV) DNS record o Host (A) DNS record o Canonical (CNAME) DNS record Explanation: An A or Address record (also known as a host record) links a domain to the physical IP address of a computer hosting that domain's services.

o Host (A) DNS record

A node within a local area network (LAN) must have a network interface device and a: o Network account o Table of all network nodes o Host address o Resource to share Explanation: In network addressing, the host address, or the host ID portion of an IP address, is the portion of the address used to identify hosts (any device requiring a Network Interface Card, such as a PC or networked printer) on the network.

o Host address

In a physical star topology, the central device is referred to as a: o Bridge o Server o segmenter o Hub Explanation: In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection.

o Hub

A private network that allows members of an organization to exchange data is an: o Extranet o Ethernet o Intranet o Internet Explanation: An intranet is a computer network that uses Internet Protocol technology to share information, operational systems, or computing services within an organization. This term is used in contrast to extranet, a network between organizations, and instead refers to a network within an organization.

o Intranet

The query protocol used to locate resources on a network is: o User Datagram Protocol (UDP). o Lightweight Directory Access Protocol (LDAP) o Tracert o Telnet. Explanation: The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network.

o Lightweight Directory Access Protocol (LDAP)

What type of record does DNS use to find a mail service? o Service (SRV) DNS record o Canonical (CNAME) DNS record o Mail Exchanger (MX) DNS record o Host (A) DNS record Explanation: A mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a domain name specifies how email should be routed with the Simple Mail Transfer Protocol (SMTP).

o Mail Exchanger (MX) DNS record

One purpose of a perimeter network is to: o Make resources available to the intranet. o Link campus area networks (CANs). o Link local area networks (LANs). o Make resources available to the Internet. Explanation: In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network.

o Make resources available to the Internet.

Which of the following services masks internal IP addresses from outside the network? o DHCP o WINS o NAT o DNS Explanation: The majority of NATs map multiple private hosts to one publicly exposed IP address. In a typical configuration, a local network uses one of the designated "private" IP address subnets (RFC 1918). A router on that network has a private address in that address space. The router is also connected to the Internet with a "public" address assigned by an Internet service provider.

o NAT

The command-line tool used to list a host's active incoming connections is: o NETSTAT o IPCONFIG o NSLOOKUP o PING Explanation: Used without parameters, netstat displays active TCP connections. Note: Netstat displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols).

o NETSTAT

Which setting is used to determine the Domain Name System (DNS) settings on a client computer? o TELNET o NSLOOKUP o PATHPING o NETSTAT Explanation: nslookup is a network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record.

o NSLOOKUP

Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.) o Establishing network speed parameters o Verifying the client's patch level o Negotiating algorithms to use o Exchanging key information Explanation: Internet Key Exchange (IKE) negotiates the IPSec security associations (SAs). This process requires that the IPSec systems first authenticate themselves to each other and establish ISAKMP (IKE) shared keys. In phase 1 of this process, IKE creates an authenticated, secure channel between the two IKE peers, called the IKE security association. The Diffie-Hellman key agreement is always performed in this phase. In phase 2, IKE negotiates the IPSec security associations and generates the required key material for IPSec. The sender offers one or more transform sets that are used to specify an allowed combination of transforms with their respective settings. The sender also indicates the data flow to which the transform set is to be applied. The sender must offer at least one transform set. The receiver then sends back a single transform set, which indicates the mutually agreed-upon transforms and algorithms for this particular IPSec session.

o Negotiating algorithms to use o Exchanging key information

In which OSI layer does routing occur? o Transport o Network o Data Link o Physical Explanation: In the seven-layer OSI model of computer networking, the network layer is layer 3. The network layer is responsible for packet forwarding including routing through intermediate routers.

o Network

Connecting to a private network address from a public network requires: o Network address translation (NAT). o Dynamic Host Configuration Protocol (DHCP). o Network Access Protection (NAP). o Dynamic domain name system (DDNS). Explanation: The majority of NATs map multiple private hosts to one publicly exposed IP address. In a typical configuration, a local network uses one of the designated "private" IP address subnets (RFC 1918). A router on that network has a private address in that address space. The router is also connected to the Internet with a "public" address assigned by an Internet service provider.

o Network address translation (NAT).

A router's static route is set by the: o Adjacent network o Next upstream router o Network administrator o Routing protocol Explanation: Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from a dynamic routing protocol to forward traffic.

o Network administrator

A Media Access Control (MAC) address identifies a/an: o UPnP device. o Local broadcast domain. o Network interface card (NIC). o Local area network (LAN). Explanation: A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment.

o Network interface card (NIC).

This question requires that you evaluate the underlined text to determine if it is correct. All session data is "encrypted between all machines" while using telnet. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. o Not encrypted o Encrypted between any Windows machines o Encrypted only to any non-Windows machines o No change is needed Explanation: Telnet, by default, does not encrypt any data sent over the connection (including passwords), and so it is often practical to eavesdrop on the communications and use the password later for malicious purposes; anybody who has access to a router, switch, hub or gateway located on the network between the two hosts where Telnet is being used can intercept the packets passing by and obtain login, password and whatever else is typed with a packet analyzer.

o Not encrypted

Which command is used to verify that a server is connected to the network? o IPCONFIG o ROUTE o PING o CHECK Explanation: Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.

o PING

A network that separates an organization's private network from a public network is a/an: o Firewall o Extranet o Perimeter o Internet Explanation: A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.

o Perimeter

The topology of a local area network (LAN) is defined by the: o Number of devices to connect. o Physical and logical characteristics. o Distance between workstations. o Type of cable being used. Explanation: Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network and may be depicted physically or logically.

o Physical and logical characteristics.

Which of the following is a Layer 2 WAN protocol? o Point-to-Point Protocol (PPP) o Simple Network Management Protocol (SNMP) o Transmission Control Protocol (TCP) o Internet Protocol (IP) Explanation: WAN Protocols and Their Corresponding OSI Layers

o Point-to-Point Protocol (PPP)

In addition to switching, multilayer switches also: o Provide Layer 3 routing functions. o Interface with CAT3, CATS, CAT5e, and fiber optics. o Support 10 MB, 100 MB, and 1 GB local area network (LAN) ports. o Operate by using only Layer 1 and 2 protocols. Explanation: In addition to switching, multilayer switches also provide Layer 3 routing functions. Multilayer switches, also known as Layer 3 switches, are network devices that can perform both Layer 2 switching and Layer 3 routing functions. They operate at both the Data Link layer (Layer 2) and the Network layer (Layer 3) of the OSI model, and can switch traffic based on both MAC addresses (Layer 2) and IP addresses (Layer 3). This allows them to make forwarding decisions based on Layer 3 information, making them more efficient than traditional routers. Multilayer switches typically have faster switching speeds than routers, as they perform switching in hardware rather than in software. They also often support a range of LAN port speeds, including 10 MB, 100 MB, 1 GB, and higher. Additionally, they can interface with a variety of network media, including copper (such as CAT3, CAT5e), and fiber optics. Therefore, the correct an

o Provide Layer 3 routing functions.

The type of connector used on a 100BaseT Ethernet cable is: o RJ-11 o RJ-45. o TNC. o BNC. Explanation: The type of connector used on a 100BaseT Ethernet cable is RJ-45. RJ-45 (Registered Jack-45) is a type of connector commonly used for Ethernet networking. It has eight pins and is designed to work with twisted-pair cables, such as the Category 5 (Cat5) and Category 6 (Cat6) cables used for 100BaseT Ethernet. RJ-45 connectors are used to plug Ethernet cables into network devices such as switches, routers, and network interface cards (NICs) on computers. RJ-11 is a smaller connector used for telephone cables, while TNC (Threaded Neill-Concelman) and BNC (Bayonet Neill-Concelman) are connectors used for coaxial cables, which were commonly used in older Ethernet networks but are now less common.

o RJ-45.

One reason to incorporate VLANs in a network is to: o Increase the number of available IP addresses. o Increase the number of available Media Access Control (MAC) addresses. o Reduce the number of broadcast domains. o Reduce the number of nodes in a broadcast domain. Explanation: VLANs provide the following advantages: * VLANs enable logical grouping of end-stations that are physically dispersed on a network. ... * VLANs reduce the need to have routers deployed on a network to contain broadcast traffic. ... * Confinement of broadcast domains on a network significantly reduces traffic. By confining the broadcast domains, end-stations on a VLAN are prevented from listening to or receiving broadcasts not intended for them. Moreover, if a router is not connected between the VLANs, the end-stations of a VLAN cannot communicate with the end-stations of the other VLANs.

o Reduce the number of nodes in a broadcast domain.

Tracert is used to: o Manage routing tables dynamically. o Manage session-oriented connections between nodes. o Report the route taken by packets across an IP network. o Report the shortest route between different networks. Explanation: In computing, traceroute (treacert) is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network.

o Report the route taken by packets across an IP network.

You need to divide a network into three subnets. Which device should you use? o Hub o Bridge o Router o Segmenter Explanation: You can use a router to divide your network into subnets.

o Router

Which DNS record type specifies the host that is the authority for a given domain? o NS o MX o CNAME o SOA Explanation: The start of authority (SOA) resource record indicates the name of origin for the zone and contains the name of the server that is the primary source for information about the zone. It also indicates other basic properties of the zone.

o SOA

The ping tool is used to: (Choose two.) o Determine the network portion of a host address. o Self-test a host's own network interface. o Determine whether a host is reachable. o Manage a host's session when UDP is used. Explanation: Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. To have your PC ping itself, type ping 127.0.0.1.

o Self-test a host's own network interface. o Determine whether a host is reachable.

In which physical network topology is each computer connected to a central point? o Star o Mesh o Ring o Bus Explanation: In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection.

o Star

One reason to replace an unmanaged switch with a managed switch is to: o Manage the routing tables. o Support multiple VLANS. o Reduce collision domains. o Route between networks, Explanation: A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers. The major difference between the packet-switching operation of a router and that of a Layer 3 switch is the physical implementation. In general-purpose routers, packet switching takes place using software that runs on a microprocessor, whereas a Layer 3 switch performs this using dedicated application-specific integrated circuit (ASIC) hardware.

o Support multiple VLANS.

A Layer 2 device that connects multiple computers within a network is a: o Repeater o Switch o Router o Packet Explanation: Layer 2 switching uses the media access control address (MAC address) from the host's network interface cards (NICs) to decide where to forward frames.

o Switch

A network device that associates a Media Access Control (MAC) address with a port is a: o DSL modem o Hub o Router o Switch Explanation: A switch begins learning the local MAC addresses as soon as it is connected to other devices or to a network. This learning capability makes switches easy to use on a network. The switch learning process works like this: 1. As a PC or other networked device sends a frame to another device through the switch, the switch captures the source MAC address of the frame and the interface that received it. 2. The switch confirms or adds the MAC address and the port to the lookup table.

o Switch

You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on the first attempt? o PING is improperly configured. o The DNS is not resolving. o The DHCP server is offline. o NSLOOKUP is stopped. Explanation: DNS is not working.

o The DNS is not resolving.

Security is a concern on wireless networks due to: o The radio broadcast access method. o Spread spectrum issues. o Frequency modulation issues. o The potential for cross-talk. Explanation: Security is a concern on wireless networks due to the radio broadcast access method. Wireless networks use radio waves to transmit data between devices, which makes them more vulnerable to eavesdropping and unauthorized access than wired networks. Radio waves can pass through walls and other physical barriers, which means that they can be intercepted by unauthorized users who are outside of the intended network. In addition, most wireless networks use the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) protocol to control access to the wireless channel. This protocol allows multiple devices to share the same frequency band by taking turns transmitting data. However, it also means that packets from different devices can collide with each other, leading to packet loss and retransmission. To address these issues, wireless networks use encryption protocols such as WEP, WPA, and WPA2 to protect data as it is transmitted over the airwaves. They also use authentication mechanisms such

o The radio broadcast access method.

Which of these factors has the biggest impact on data transmission speed in a wireless network? o The access method used for the network o The transmission standard of the equipment used o The use of strong encryption for transmissions o The transmission wattage rating used on the NIC Explanation: The speed of a Wi-Fi wireless network connection depends on several factors. Like most kinds of computer networks, Wi-Fi supports varying levels of performance depending on which technology standards it supports. Each Wi-Fi standard is rated according to its maximum theoretical network bandwidth: A Wi-Fi network connection operates at the highest possible speed that both devices (endpoints) can support. An 802.11g laptop connected to an 802.11n router, for example, will network at the lower speeds of 'g'.

o The transmission standard of the equipment used

Which of the following determines the media access method that is used in a network? o Number of hosts connected to the network o Number of domain servers on the segment o Maximum speed of the media o Topology and protocols

o Topology and protocols

Which type of port is used to support VLAN traffic between two switches? o Virtual port o WAN port o Trunk port o LAN port Explanation: Trunk links are required to pass VLAN information between switches.

o Trunk port

Which protocol is a transport layer protocol? o FTP o IP o UDP o ASCII Explanation: Transport layer protocols include: UDP, TCP

o UDP

A characteristic of the mesh topology is that it: o Uses a central hub. o Cannot use wired connections. o Uses redundant paths. o Cannot use wireless connections. Explanation: Mesh network topology is one of the key network architectures in which devices are connected with many redundant interconnections between network nodes such as routers and switches. In a mesh topology, if any cable or node fails, there are many other ways for two nodes to communicate.

o Uses redundant paths.

Which of the following uses a tunneling protocol? o Internet o VPN o Extranet o VLAN Explanation: Tunneling enables the encapsulation of a packet from one type of protocol within the datagram of a different protocol. For example, VPN uses PPTP to encapsulate IP packets over a public network, such as the Internet.

o VPN

Which technology can you use to extend an internal network across shared or public networks? o VLAN o Microsoft ASP-NET o Microsoft .NET Framework o VPN Explanation: VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network.

o VPN

A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97. You need to restore access to network resources. What should you do next? o Flush the cache on the DNS server. o Reset the user's password on the server. o Check your router's current routing tables. o Verify that the DHCP service is available. Explanation: 169.254.48.97 is an APIPA address. An APIPA address is used when the DHCP server is not available.

o Verify that the DHCP service is available.

Which type of network covers the broadest area? o WAN o CAN o LAN o PAN Explanation: A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines.

o WAN

Which wireless authentication method provides the highest level of security? o Wired Equivalency Privacy (WEP) o IEEE 802.lln o WI-FI Protected Access (WPA) o IEEE 802.11a Explanation: WPA aims to provide stronger wireless data encryption than WEP. Wi-Fi Protected Access (WPA) is a security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.

o WI-FI Protected Access (WPA)

This question requires that you evaluate the underlined text to determine if it is correct. The four IEEE standards, 802.11a, b, g, and n, are collectively known as "mobile ad hoc" networks. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. o WiMAX o Bluetooth o WiFi o No change is needed Explanation: IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5, and 60 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The base version of the standard was released in 1997, and has had subsequent amendments. The standard and amendments provide the basis for wireless network products using the Wi-Fi brand.

o WiFi

A service that resolves NetBIOS names to IP addresses is: o Domain Name Service (DNS). o Internet Service Provider (ISP). o Address Resolution Protocol (ARP). o Windows Internet Name Service (WINS). Explanation: Windows Internet Name Service (WINS) is Microsoft's implementation of NetBIOS Name Service (NBNS), a name server and service for NetBIOS computer names. Effectively, WINS is to NetBIOS names what DNS is to domain names — a central mapping of host names to network addresses.

o Windows Internet Name Service (WINS).

Which type of network is most vulnerable to intrusion? o Dial-up o Wireless o Broadband o Leased line Explanation: Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior.

o Wireless

This question requires that you evaluate the underlined text to determine if it is correct. The process of replicating a zone file to multiple DNS servers is called "zone replication". Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. o Zone transfer o Zone synchronization o Start of authority o No change is needed Explanation: DNS zone transfer, also sometimes known by the inducing DNS query type AXFR, is a type of DNS transaction. It is one of the many mechanisms available for administrators to replicate DNS databases across a set of DNS servers

o Zone transfer

The top-level domain of www.adventureworks.com is: o www o adventureworks o adventureworks.com o com Explanation: A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet.

o com

The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is: o corp o com o nwtraders o exchange o mail Explanation: Hostnames are composed of series of labels concatenated with dots, as are all domain names. For example, let's break mail.google.com into its component parts: mail is the host or local hostname; and google.com is the domain or parent domain name.

o mail


Ensembles d'études connexes

The Scientific Method By: Miss. Thomas

View Set

Wk 5 - Practice: Ch. 13, Weighing Net Present Value and Other... [due Day 5]

View Set

Physiology: Adrenergic Agonists Review Questions

View Set

Bio 123 Lecture Test 1 Chapter 1-5

View Set

Unit: 9. THE UNITED STATES IN A CHANGING WORLD-Test 8th Grade

View Set

Globalization and Diversity - Chapter 12, Globalization and Diversity - Chapter 13, Globalization and Diversity Chapter 11, Globalization and Diversity Chapter 11

View Set

NCLEX Prep - Respiratory Disorders

View Set