Questions network 007

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which statement about the User Datagram Protocols are correct? -It is a more reliable protocol than TCP -It is responsible for setting up, maintaining and termination the session -It is a connectionless protocol -It provides guaranteed delivery of packets -It is faster than TCP

-It is a connectionless protocol -It is faster than TCP

Which statements are correct about a virtual IP address? -It is a diagnostic address used to test your TCP/IP configuration -It is an address that is automatically assigned when you are unable to obtain an IP address -It is an address that does not correspond to a specific or physical interface -It is a value to determine the size of your network -It is a value assigned to a group of servers such as a cluster or a load-balanced set

-It is an address that does not correspond to a specific or physical interface -It is a value assigned to a group of servers such as a cluster or a load-balanced set

Which local storage characteristics would be considered to be benefits over cloud storage? -It is more accessible and scalable -It is less expensive -It is faster -It is better protected against disaster -It offers better control of backups and access

-It is faster -It offers better control of backups and access

Multiple Input Multiple Output (MIMO) is supported by which 802.11 specifications? -b -ac -n -g -ac

-n -ac

The most accurate time sources available by standard network connections reside at which stratum of the Network Time Protocol? -2 -1 -4 -0 -3

1

Which type of network configuration can be created with as little as a wireless router and a connection to an ISP? -Cellular -WAN -Ad-hoc -Infrastructure -MAN

Ad-hoc

IPAM is responsible for providing which type of network service? -Resolving host names to IP addresses -Synchronizing the time on network clients and servers -Assigning IP addresses to client systems -Administration and monitoring of DHCP and DNS servers -Statically configuring IP addresses

Administration and monitoring of DHCP and DNS servers

Which type of site survey is done without any actual field measurements? -Active -Passive -Predictive -Cellular

Predictive

Which copper cable connector is most commonly used in today's network connections? -DB-9 -RJ-11 -F-Type -RJ-45 -BNC

RJ-45

Which IP addresses are considered to be private addresses? -129.1.2.3 -10.0.01 -1.2.3.4 -169.254.0.1 -100.10.10.100 -192.168.0.1

-10.0.0.1 -169.254.0.1 -192.168.0.1

Which address is used as the loopback address in the TCP/IP diagnostics? -169.254.255.255 -169.254.0.1 -10.0.0.1 -1.2.0.7 -12.0.0.7 -127.0.0.1

-127.0.0.1

Which characteristics of a bridge distinguish it from a switch? -Bridges can connect dissimilar types of media -Bridges connect host systems together, switches connect network segments -Bridges can connect dissimilar architectures -Switches connect host systems together, bridges connect network segments -Switches operate at layer 2 of the OSI model, bridges operate at layer 3

-Bridges can connect dissimilar types of media -Bridges can connect dissimilar architectures -Switches connect host systems together, bridges connect network segments

Which type of network activities are handled bu the Presentation layer of the OSI Model? -Dialog control -Compression and encryption -Character code translation -Binary conversion to electrical signals -Connection oriented transmissions -Flow control

-Compression and encryption -Character code translation

The OSI Model was designed to facilitate which objective? -Improving security by implementing a multilayered approach to protecting data -Migration of data between incompatible versions or systems -Improved manageability of assets, resources, and users -Consistency and compatibility when developing new network applications, protocols, and devices -Increasing interoperability between operation systems and hardware

-Consistency and compatibility when developing new network applications, protocols, and devices

Which protocols are operated at the Application layer of the OSI Model? -DNS -UDP -HTTP -TCP -IP -FTP

-DNS -HTTP -FTP

Which types of wireless access points might be used by an attacker to gain access to confidential information? -Evil Twin -WLAN -Hot Spot -SSID -Rogue

-Evil Twin -Rogue

What is the range of addresses for the first subnet created by using the subnet mask of 255.255.255.192 in the 192.168.0.0 class C network? -192.168.0.0-192.168.0.192 -192.168.0.0-192.168.0.127 -192.168.0.0-192.168.0.255 -192.168.0.0-192.168.0.128 -192.168.0.0-192.168.0.64 -192.168.0.0-192.168.0.63

192.168.0.0-192.168.0.63

A multi-layered switch operates over which two layers? -3 and 4 -2 and 3 -1 and 2 -4 and 5 -5 and 6

2 and 3

Which statement best describes CDMA? -A multiplexing method based on detecting and avoiding collisions -A multiplexing method based on coded signals -A multiplexing method based on time divisions -A digital advanced mobile phone service -A global system for mobile communications

A multiplexing method based on coded signlas

Which fiber cable connector is preferred when the least amount of return loss (reflection) is required? -APC -SC -LC -UPC -MT-RJ

APC

Which process will automatically assign an address of 169.254.x.x to a system in the event it is unable to contact a DHCP server? -DHCP offer -APIPA -DHCP acknowledgement -IPconfig -Reservations -Ping

APIPA

Which routing protocol might send packets over a longer route if there is less traffic on that route? -RIP 2 -TCP -RIP 1 -EIGRP -OSPF

OSPF

Which 802.11 specification supports simultaneous connections of 2.4GHz and 5GHz transmissions? -n -a -b -ac -g

ac

A load balancer can provide which networking features? -Even distribution of traffic across servers performing the same function -Connecting dissimilar nework architectures -Improved performance and availability by ensuring servers do not become overwhelmed -Converting analog voice signals to IP data packets -Extended connectivity for wireless clients

-Even distribution of traffic across servers performing the same function -Improved performance and availability by ensuring servers do not become overwhelmed

What objects operate at the physical layer of the OSI Model? -Hubs -Repeaters -Routers -Firewalls -Switches -Cables

-Hubs -Repeaters -Cables

"Data Pooling" refers to which public cloud risk considerations? -Infrastructure is shared by multiple tenants -Disaster recovery/backup concerns -An attack on one tenant could impact other tenants -Legal trans-boarder requirements -No common concerns or interests for security

-Infrastructure is shared by multiple tenants -No common concerns or interests for security

Channel bonding refers to which process? -Assigning multiple wireless routers to use the same channel -Joining a client device to a wireless network -Combining the bandwidth of multiple channels to increase throughput -Assigning a channel for a wireless router to use -Spreading transmissions out across a broader range of frequencies

Combining the bandwidth of multiple channels to increase throughput

Which type of cloud service connectivity method would typically allow for unlimited data transfers once implemented? -VPN appliance -Pay as you go -Direct Connection -Native VPN -Remote Desktop

Direct Connection

Configuring a radio balancing in a wireless controller refers to which feature? -Using non-overlapping channels -Ensuring that all 802.11n clients are connected to 802.11n access points -Moving client connections to an adjacent access point when one becomes overwhelmed -Moving client connections to a neighboring access point when one becomes unavailable -Filtering connections by MAC address

Ensuring that all 802.11n clients are connected to 802.11n access points

Which property of a Start of Authority record indicates the validity period for the name registration? -Current zone -Expiration time -Time to live -Refresh time -Retry time

Expiration time

Which primary enhancement is offered by an SFP+ transceiver over an SFP or a GBIC transceiver? -It supports wavelength division multiplexing -Faster transmission rates -It can convert full duplex to half duplex and vice versa -Smaller size -More connections supported

Faster transmission rates

The DNS service is responsible for which type of resolution? -Host name to IP address -IP address to MAC address -MAC address to IP address -Host name to MAC address -IPv4 address to IPv6 address

Host name to IP address

A software firewall running on a Windows 10 PC is an example of which type of firewall? -Application Gateway -Circuit-level -Network-based -Proxy Server -Host-based

Host-based

Match each component to its appropriate cloud service type. -Software Development Environment -Virtual Machine -Enterprise Resource Planning application -Operating Systems -Customer Management application Iaas SaaS PaaS

IaaS: Virtual Machine and Operating Systems SaaS: Enterprise Resource Planning application and Customer Management application PaaS: Software Development Environment

Which device is able to stop activity that is considered to be suspicious based on historical traffic patterns? -Proxy Server -Intrusion Detection System -Anti-virus Server -Firewall -Intrusion Prevention System

Intrusion Prevention System

Which type of network configuration is typically implemented for a large company with multiple branch offices in the same general geographic region such as a city? -CAN -LAN -MAN -WAN -WLAN

MAN

Which type of DNS record must be created to be able to send and receive internet email? -CNAME -TXT -SRV -MX -NS -A

MX

Which network topology is the most complex, but also the most reliable? -Ring -Star -Mesh -Bus

Mesh

IP resides at which layer of the OSI model? -Transport -Network -Data link -Physical -Session

Network

Routers operate at which layer of the OSI model? -Network -Data Link -Physical -Session -Transport

Network

Which termination point uses standard RJ-45 connections? -66 block -110 block -Patch panel -Fiber patch panel -Punch-down

Patch panel

Performance concepts such as traffic shaping, QoS and DiffServ are primarily concerned with providing what kind of service? -Guaranteed delivery of packets -Prioritizing packets by importance -Control flow and error correction -Media access control -Security and encryption

Prioritizing packets by importance

Which type of cloud service typically offers the highest levels of control, customization and data transfer rates? -Public -Private -Community -Hybrid

Private

In which scenario would you implement a modem? -To connect a host to the Internet over a phone line -To connect host systems to a wireless access point -To connect host systems together in the same LAN -To connect 2 adjacent network segments together -To connect 2 adjacent networks together

To connect a host to the Internet over a phone line

The "T" in 100BaseT stands for which cable characteristic? -Transfer rate of 100 megabits per second -Ten times faster -Two pairs of wires -Transmission type of baseband -Twisted pair cabling

Twisted pair cabling

Which device could be classified as a next generation firewall? -Proxy server -IPS -Router -IDS -UTM

UTM

Which scenario would best warrant the implementation of a RADIUS server? -When you have a single network access server, with multiple authentication policies -When you have multiple access servers, with multiple authentication policies -When you have a single network access server, with a single authentication policy -When you have multiple network access servers, with a single authentication policy

When you have multiple network access servers, with a single authentication policy

Which type of antenna is the most precise in terms of directional communications? -Semi-directional -Omni-directional -Bi-directional -Yagi-Uda -Parabolic

Yagi-Uda

Which Internet of Things (IoT) protocol is typically used for home automation? -NFC -RFID -IR -Z-Wave -ANT -Bluetooth

Z-Wave

Which part of the full qualified domain name of "mailserv1.east.brocadero.com." indicates the subdomain? -mailsrv1 -"." -brocadero -east -com

east

Which 802.11 specification uses 2.4GHz transmissions and offers a speed up to 54 Mbps over a distance of approximately 150 feet? -a -ac -n -g -b

g

Which statements about connectionless protocols are correct? -It is less reliable but faster -It is more reliable but slower -TCP is the preferred transport protocol -UDP is the preferred transport protocol -No prior arrangements are made between endpoints before sending data

-It is less reliable but faster -UDP is the preferred transport protocol -No prior arrangements are made between endpoints before sending data

Which statements about the Transmission Control Protocol are correct? -It is a connectionless protocol -It uses acknowledgements -It operates at the network layer of the OSI -It is responsible for routing and addressing -It provides guaranteed delivery of packets

-It uses acknowledgements -It provides guaranteed delivery of packets

Which type of network activities are handled by the Session layer of the OSI Model? -Connectionless transmissions -Address assignment -Logins -Compression and encryption -Physical to logical address conversion -Name recognition

-Logins -Name recognition

The Data Link layer of the OSI Model is subdivided into which other layers? -MAC -TCP -LLC -Physical -Network -Transport

-MAC -LLC

Which type of conversions can be performed by media converters? -Switching to Routing -Physical address to logical address -Protocol X to protocol Y -Multi-mode fiber to single mode fiber -Electrical signals (copper wire) to light signals (fiber optic)

-Multi-mode fiber to single mode fiber -Electrical signals (copper wire) to light signals (fiber optic)

Which security functions can be performed by a proxy server? -Packet examination and filtering -Shielding internal addresses from the public internet -Connecting dissimilar network architectures -Malware detection -Virus scanning

-Packet examination and filtering -Shielding internal addresses from the public internet

Which statements about connection-oriented protocols are correct? -Preliminary negotiations are used to setup and establish end-to-end communication -Data arrives in any order -TCP is the preferred transport protocol -Communications are more error prone -UDP is the preferred transport protocol

-Preliminary negotiations are used to setup and establish end-to-end communication -TCP is the preferred transport protocol

Which statements are correct about isolating networks using a router vs. isolating segments using a switch? -Routers isolate each network by filtering based on the MAC address -Switches are not concerned with directly connecting hosts, only networks -Switches isolate each segment by filtering based on the IP address -Routers are not concerned with directly connecting hosts, only networks -Routers isolate each network by filtering based on the IP address -Switches isolate each segment by filtering based on the MAC address

-Routers are not concerned with directly connecting hosts, only networks -Routers isolate each network by filtering based on the IP address -Switches isolate each segment by filtering based on the MAC address

Which networking functions occur at the Network layer of the OSI Model? -Switching -Routing -Logical addressing -Fragmentation -Physical addressing -Framing

-Routing -Logical addressing -Fragmentation

Which characteristics of a switch distinguish it from a hub? -Data coming in one port of a switch is copied out all other ports -Hubs forward traffic based on the MAC address -Switches operate at layer 1 of the OSI model, hubs operate at layer 2 -Switches forward traffic based on the MAC address -Switches operate at layer 2 of the OSI model, hubs operate at layer 1

-Switches forward traffic based on the MAC address -Switches operate at layer 2 of the OSI model, hubs operate at layer 1

Which statements about default gateways and subnet masks are correct? -The default subnet mask is dependent on the class of your network -A default gateway is only required if access to external networks is necessary -The default subnet mask is always the same for all networks -A default gateway is always required -A subnet mask is always required -The default gateway must always use the first available address on the network

-The default subnet mask is dependent on the class of your network -A default gateway is only required if access to external networks is necessary -A subnet mask is always required

Which advantages do 2.4GHz transmission have over 5 GHz transmissions? -They support higher speeds -They have a wider signal coverage area -They are more compatible with older devices -They are better at penetrating obstacles and barriers -They are less susceptible to interference

-They have a wider signal coverage area -They are more compatible with older devices -They are better at penetrating obstacles and barriers

Access control lists are used for which purposes in network communications? -To specify which users are able to configure devices such as routers -To minimize traffic between network segments -To control which device is able to access the transmission media -To enable basic security for a network -To restrict updates for routers to only specific interfaces

-To enable basic security for a network -To restrict updates for routers to only specific interfaces

Which TCP/IP diagnostic utilities make use of ICMP? -Traceroute -Route -Ping -Ipconfig -Nslookup

-Traceroute -Ping

Which of the following are characteristics of a VoIP gateway? -Voice and fax compression -Packetization -Intrusion detection -Intrusion prevention -Billing

-Voice and fax compression -Packetization -Billing

Port forwarding is commonly used in which types of applications? -Voice over IP applications -Peer to peer downloading -File copies from servers to clients within a LAN -Online gaming servers -Print jobs from clients to servers within a LAN

-Voice over IP applications -Peer to peer downloading -Online gaming servers

Which conversion is an example of Network Address Translation? -9C-B6-D0-D2-44-9F to 10.0.0.3 -00001010.00000000.00000000.00000011 to 10.0.0.3 -10.0.0.3 to 129.1.2.3 -129.1.2.3:1003 to 10.0.0.3 -www.mywebsite to 129.1.2.3

10.0.0.3 to 129.1.2.3

If one wireless router is using channel 6 and you want to setup an additional router using a different channel, which would be the best channel to use? -8 -4 -6 -5 -10 -11

11

What binary value represents the decimal value of 192? -11000000 -00000000 -11100000 -10101000 -00000001 -11111111

11000000

Which subnet mask is required to create subnets capable of hosting approximately 2000 hosts? -255.255.255.248 -255.255.248.248 -255.255.248.0 -248.255.255.255 -255.255.255.0 -255.255.0.0

255.255.248.0

Which subnet mask would be used to supernet 2 class C networks together into a single subnet with 512 hosts? -255.255.0.0 -255.255.255.254 -254.254.254.0 -255.255.254.0 -255.255.255.0 -255.255.255.128

255.255.254.0

Which subnet mask is commonly used in class A networks to make them the size of a class C network? -0.255.255.255 -0.0.0.255 -255.255.255.255 -255.255.255.0 -255.255.0.0 -255.0.0.0

255.255.255.0

How many subnets are created by the subnet mask 255.255.255.192? -4 -2 -1 -192 -16 -8

4

Which Ethernet cable category was the first to support gigabit transfer rates? -5 -6a -3 -5e -6

5e

If there are 6 bits available to address host systems in a network, how many hosts can you accommodate? -6 -64 -12 -128 -32 -252

64

Which statement best describes a Unified Threat Management device? -An all-in-one security device -A server that shields internal systems and addresses from the public internet -A device to filter spam/undesirable email -A system that analyses network traffic patterns and reports suspicious activity -A security appliance that filters network traffic based on port numbers and protocol type

An all-in-one security device

Which type of transmission would be used if an application needed to send packets to every other host on your network? -Simplex -Duplex -Unicast -Multicast -Broadcast

Broadcast

Content filtering uses which primary method to screen objectionable content? -Virus/Malware detection -Character strings -Browser history -Traffic patters -Certificates

Character strings

Which network communication characteristic is determined a the Transport layer of the OSI Model? -Conversion of physical to logical address -The best route to the destination -Half duplex vs full duplex -Connection oriented vs connectionless communication -Establishment and termination of communications -Data flow rate

Connection oriented vs connectionless communication

A DHCP client will not begin using its assigned IP address until which type of transmission has been received? -DHCPDiscover -DHCPOffer -DHCPNack -DHCPRequest -DHCPAck

DHCPAck

Which network segmentation method uses a combination of firewalls to protect internal resources from external threats? -Port Mirroring -DMZ -Trunking -Tagged ports -VLAN

DMZ

A range extender is the wireless equivalent to which wired device? -Modem -Access Point -Repeater -Hub -Switch

Repeater

Plenum cable is sometimes used over PVC cable because of which characteristic? -Resistance to fire -Faster transmission rates -Longer transmission distance -Less susceptible to interference -Easier to run

Resistance to fire

A broadcast domain is ended by which object? -Computer -Hub -Collision -Router -Switch

Router

Which type of cabling consists of 4 pairs of twisted copper wire covered by a protective shielding? -Multimode Fiber -Coaxial -Single Mode Fiber -UTP -STP

STP

A persistent VPN that is established between two physical locations such as a branch office to headquarters with VPN concentrators on both ends is an example of which type of VPN? -Point-to-point -Point-to-site -Site-to-point -Site-to-site

Site-to-site

Match the protocol to its appropriate port -TFTP 443 -RDP 80 -SMTP 69 -HTTP 25 -HTTPS 53 -DNS 3389

TFTP-69 RDP-3389 SMTP-25 HTTP-80 HTTPS-443 DNS-53

The term "dual stack" refers to which feature of the TCP/IP? -That both version 4 and 6 are installed, and either can be used -That both version 4 and 6 are installed, but only one can be used -That neither version is supported -That systems only using version 4 can communication with systems only using version 6 -That both version 4 and 6 must be used simultaneously to communicate

That both versions 4 and 6 are installed, and either can be used

VoIP phones make use of which transmission media? -WLANs -The PSTN -Cellular Networks -The Internet

The Internet


Ensembles d'études connexes

Advanced Physical assessment Exam 1- Non-Reassuring Findings

View Set

U.S 1- Chapter 1 Sec. 1,2,4 Review

View Set

CHAPTER EXAM INTERNATIONAL BUSINESS LAW

View Set

LabSim Linux+ Chapters 1-12 Quiz Questions

View Set

POL California Life: The Insurance Marketplace

View Set

CCNA 1 v7 Modules 4 - 7: Ethernet Concepts

View Set