Testout Chapter 6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What advantages do fibre optic cables offer over twisted pair or other media choices?

- Completely immune to EMI. - Highly resistant to eavesdropping. - Faster available transmission rates. - Allows greater cable distances without a repeater.

What are the disadvantages to implementing fibre optic cables?

- Very expensive. - Difficult to work with. - Special training required to attach connectors to cables.

Which of the following are characteristics of the 802.11g wireless standard?

-Backwards compatible with 802.11b devices. - Have a maximum bandwidth of 54 Mbps. - Are backwards compatible with 802.11b networks. Explanation 802.11b provides 11 Mbps bandwidth. 802.11a operates in the 5.75 GHz range. For this reason, 802.11a is not compatible with 802.11b or 802.11g.

What is the maximum range of the Bluetooth 2.0 specification for Class 1 devices?

100 M Explanation Bluetooth version 2.0 class 1 devices have a maximum range of about 100 meters. Earlier versions had a maximum range of only about 10 meters.

Your network follows the 1000Base-T specifications for Gigabit Ethernet. What is the maximum cable segment length allowed?

100 meters Explanation Gigabit Ethernet using twisted pair cables (either Cat 5e or Cat 6) has a maximum cable segment length of 100 meters. Tip: All Ethernet networks that use twisted pair cable (Ethernet, Fast Ethernet, and Gigabit Ethernet) have a distance limitation of 100 meters.

Which type of fiber optic cable supports 10 Gigabit Ethernet with a maximum segment length of up to 40 km?

10GBaseER single-mode Explanation 10GBaseER ("extended reach") is a port type for single-mode fiber optic cable that supports 10 Gigabit Ethernet with segment lengths up to 40 km. 10GBaseLR ("long reach") is a port type for single-mode fiber optic cable that supports 10 Gigabit Ethernet with segment lengths up to 10 km. 10GBaseLR ("short range") is a port type for multimode fiber optic cable that supports 10 Gigabit Ethernet with segment lengths up to 300 meters. !0GBaseT twisted pair Category 7 is a copper cable that supports 10 Gigabit Ethernet with segment lengths up to 100 meters.

Which of the following IP addresses belong to the Class A network 114.0.0.0? (Tip: Assume the network is indicated by the default Class A portion of the IP address.)

114.0.0.15 114.122.66.12 114.58.12.0 Explanation With a Class A network, the first octet indicates the network address. All hosts on the network must have the same value in the first octet (114).

You have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. The default gateway address in 192.168.1.254, and the router is providing DHCP on the network. The Wrk2 computer has been assigned the IP address of 192. 168.1..55. Which of the following is considered the loopback for the Wrk2 computer?

127.0.0.1 Explanation 127.0.0.1 is the loopback address for any device. This special address means "this host."If you ping the loopback address, the TCP/IP configuration will be tested. A successful test means that TCP/IP is correctly configured on the host. 192.168.1.55 is the current IP address assigned to the host. You can ping this address, but the address is not considered the loopback address. also, to pong the host's IP address, you must first know the address. Pinging the loopback address always tests the current host regardless of its current IP address. 192.168.1.255 is the broadcast address for the network meaning äny host"on the network.

Which of the following are valid IPv6 addresses?

141:0:0:0:15:0:1 6384:1319:7700:7631:446A:5511:8940:2552 Explanation An IPv6 IP address is a 128-bit address listed as eight 16-bit hexadecimal sections. Leading zeros can be omitted in each section. Therefore, 6384:1319:7700:7631:446A:5511:8940:2552 and 141:0:0:0:15:0:1 are both valid IPv6 IP addresses. A single set of all-zero sections can be abbreviated with two colons (::). Therefore, 141::15:0:0:1 would be a valid way of writing that address. Digits in a hexidecimal system range fro 0-9 and A-F. H is not a valid hexadecimal number. 343F:1EEE:ACDD:2034:1FF3:5012 is too short, having only six sections instead of eight.

Internet Message Access Protocol (IMAP)

143

Which of the following IP addresses have a default subnet mask of 255.255.0.0?

168.16.5.1 129.0.0.1 191.168.2.15 Explanation IP addresses are divided into classes. The most common of these are classes A, B, and C. Each address class has a different default subnet mask. To identify the class of an IP address, look at its first octet. Class A networks use a default subnet mask of 255.0.0.0 and have 9-126 as their first octet. Class B networks use a default subnet mask of 255.255.255.0 and have 192-223 as their first octet. In this question, the IP addresses that fall in the Class B IP address range are 191.168.2.15, 129.0.0.1, and 168.16.5.1.

Which of the following IP address ranges is reserved for Automatic Private IP Addressing?

169.254.0.1 - 169.254.255.254 Explanation The Internet Assigned Numbers Authority (IANA) has reserved 169.254.0.1 through 169.254.255.254 for Automatic Private IP Addressing (APIPA). APIPA also sets the subnet mask on the network to 255.255.0.0.

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT router?

169.254.0.1 - 169.255.254 Explanation 169.254.0.1 - 169. 254.255.254 is the range of IP addresses assigned to Windows DHCP clients if a DHCP server does not assign the client an IP address. This range is known as the Automatic Private IP Addressing (APIPA) range. The other three ranges listed in this question are defined as the private IP addresses from RFC 1918 which are commonly used behind a NAT server.

Which of the following is a valid IP address?

172. 16.1.26 2.2.2.2 Explanation A valid IPv4 address consists of 4 8-bit (1 byte) numbers separated by periods. For example, 10.0.0.65. Because they are 8 bits long, these numbers are frequently called octets. Even though we typically express these numbers using decimal notation, it's important to remember that these numbers are binary numbers. The lowest value one of these numbers can have is 00000000. The decimal equivalent for this number is simply 0. The highest value one these numbers can take is 11111111. The decimal equivalent of this number is 255. Therefore, in decimal notation, each octet must contain a number between 0 and 255 inclusively.

You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer?

172.18.188.67 192.168.12.253 10.0.12.15 Explanation Of the addresses listed here, the following are in the private IP address ranges: 10.0.12.15 (private range = 10.0.0.0 to 10.255.255.255) 172.18.188.67 (private range = 172.16.0.0 to 172.31.255.255)192.168.12.253 (private range = 192.168.0.0 to 192.168.255.255).

Which of the following are characteristics of Bluetooth?

2.4 GHz radio wireless. Ad hoc connecitons. Explanation Bluetooth is a wireless networking standard that uses 2.4 GHz radio waves. These are the same type of radio waves used with 802.11 wireless networking, so radio transmission can go through walls (not limited to line-of-sight connections). Bluetooth uses ad hoc connections between devices. Infrared uses red spectrum light waves and is limited to line-of-sight transmissions.

Secure Shell (SSH)

22

Which of the following IP addresses are Class C addresses?

222.55.0.0 223.16.5.0 192.15.5.55 Explanation The following are Class C addresses: 192.15.5.55, 222.55.0.0, and 223,16.5.0. The first octet of Class C addresses is in the range of 192 to 223. The first octet of Class A addresses range from 1-126. The first octet of Class B addresses range from 128-191.

What is the maximum transmission speed for Bluetooth v3 and v4 devices?

24 Mbps Explanation Bluetooth v3 and v4 devices have a maximum transmission speed of up to 24 Mbps. Bluetooth v1.2 devices have a maximum transmission speed of up to 1 Mbps. Bluetooth v2 devices have a maximum transmission speed of up to 3 Mbps. The wireless standard 802.11b transmits data at a rate of up to 11 Mbps.

Service Location Protocol (SLP)

427

HTTP over SSL (HTTPS)

443

Server Message Block (SMB/CIFS) directly over TCP

445

You've just installed the DNS service on a Windows server. Which port must be opened in the server's firewall to allow clients to access the service?

53 Explanation The DNS service runs on port 53 by default. Port 110 is used by the POP3 protocol. Port 143 is used by the IMAP protocol. Port 123 is used by the NTP protocol.

Apple Filing Protocol (AFP)

548

Hypertext Transfer Protocol (HTTP)

80

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standards will work best in this situation?

802.11a 802.11n Explanation 802.11a or 802.11n are the best choices for this client. While both 802.11a and 802.11g each operate at 54 Mbps, 802. 11g operates in the 2.4 GHz to 2.4835 GHz range, which will cause interference with the client's wireless phone system. 802.11a and 802.11n, on the other hand, operate in the 5.725 GHz to 5.850 GHz frequency range, which won't interfere with the phone system. 802.11n can operate at speeds up to 300 Mbps.

Which of the following wireless networking standards uses a frequency of 5 GHz and supports transmission speeds up to 1.3 Gbps.

802.11ac Explanation The 802.11ac standard uses the 5 GHz frequency and supports data transmission speeds up to 1.3 Gbps. 802.11n supports data transmission speeds up to 600 Mbps. 802.11g and 8022.11a both support data transmission speeds up to 54 Mbps. 802.11b supports data transmission speeds up to 11 Mbps.

Which wireless standard has the highest data transfer rates?

802.11n Explanation 802.11n has the highest data transfer rates, up to (theoretically) 600 Mbps. 802.11a and g have speeds up to 54 Mbps or 108 Mbps when using channel bonding. 802.11b has speeds up to 11 Mbps.

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

802.11n Explanation 802.11n is the best choice for this client. 802.11b and 802.11g both operate in the 2.4 GHz to 2.4835 GHz range, which will cause interference with the client's wireless phone system. 802.11a operates in the 5.725 GHz to 5.850 GHz frequency range, which won't interfere with the phone system. However, its maximum speed is limited to 54 Mbps.

You have been contacted by OsCorp to recommend a wireless Internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?

802.11n Explanation Of the technologies listed, only the IEEE 802.11n wireless standard addresses the desired requirements. The 802.11a wireless standard offers maximum speeds of 54 Mbps and uses the 5 GHz frequency range. The 802.11g wireless standard offers maximum speeds of 54 Mbps. 802.11b uses he 2.4 GHz frequency range but supports only 11 Mbps transfer speeds.

You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment, which your client complains runs too slowly. She want to upgrade the network to run at 150 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation?

802.11n Explanation 802.11n is the best choice for this client. Both 802.11a and 802.11g each operate at a maximum speed of 54 Mbps. 802.11a isn't compatible with 802.11b network boards. 802.11n access points, on the other hand, are backwards-compatible with 802.11b equipment and run at speeds of up to 300 Mbps. using this type of access will allow the wireless network to continue to function during the transition.

Which of the following is the best definition for a LAN?

A network in a small geographic area, like in an office. Explanation A LAN is a network in a small geographic area, like in an office. A WAN is a network whose computers and servers are geographically far apart but still connected. A PAN (personal area network) is the interconnection of components, such as laptops, mobile devices, printers, mice, keyboards, and other Bluetooth equipped devices, using some form of wireless technology within a personal range (typically 10 meters or less). A VPN is the extension of a private network over a shared or public network such as the Internet.

Which of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true?

A workstation must request addressing information from a DHCP server. It can deliver a DNS server address in addition to the host IP address. Explanation DHCP servers deliver IP addresses as well as other host configuration information to network hosts. DHCP can be configured to assign any available address to a host, or it can assign a specific address to a specific host. DHCP clients, typically workstations, must send a request to a DHCP server before it will send IP addressing information to them.

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address?

ARP Explanation Hosts use the Address Resolution Protocol (ARP) to discover the hardware address of a host.

Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection?

Ad hoc Explanation Configure an ad hoc connection to connect one computer directly to another using a wireless connection. An infrastructure configuration users a Wireless Access Point (WAP) to create a network. Devices communicate with each other through the WAP. WEP is a security mechanism used for authentication.

You have a computer with an onboard LAN adapter. The LAN adapter has failed and you are unable to connect the computer to the network. What should you do?

Add a network card using a PCI slot. Explanation In this case, you should install a network adapter in a PCI slot. Your computer would then use the new network adapter instead of the one integrated on the motherboard. While installing the new card, you should disable the onboard LAN adapter to prevent it from showing in Device Manager. Replacing the motherboard is too expensive when compared to installing a new expansion card. AGP slots are used for video cards, not network cards. Clearing the CMOS settings erases the configuration information but does not fix the LAN adapter that is not functioning.

What are the advantages of using coaxial cable? Disadvantages?

Advantages: - Less susceptible to electromagnetic interference (EMI). - Resistant to physical damage. - Large existing infrastructure. Disadvantages: - Expensive - Not very flexible (difficult to bend around corners). - Using splitters degrades signal quality.

You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP address from the DHCP server so you configure it to obtain IP and DNS information automatically. When he's working from home, the laptop must use IP and DNS information that connects with his home network. Which IP addressing method can you use to make sure he gets a network connection at home?

Alternate IP Configuration Explanation With an Alternate IP Configuration, the system's IPv4 Properties are configured on the General tab to use DHCP to automatically obtain TCP/IP configuration information. If a DHCP server cannot be contacted, the static IP configuration information on the IPv4 Properties' Alternate Configuration tab is used.

A Windows workstation is configured to receive its IP configuration information from a DHCP server on the company network. The user at the workstation reports that she cannot use email and is unable to reach the Internet. Using the ipconfig command you see that the workstation has been assigned the following special IP configuration: - IP address: 169.254.0.1. - Subnet mask: 255.255.0.0 What is this special IP configuration called? Why did the workstation receive this type of configuration?

Automatic Private IP Addressing (APIPA) The workstation was unable to contact the DHCP Explanation If a Windows client is configured to receive an IP address from a DHCP server, but cannot contact a DHCP server, it will automatically assign itself an IP address within the range of 169.254.0.1 to 169.254.255.254 with the subnet mask 255.255.0.0. You can use APIPA instead of a DHCP server, but it should only be used on a small network that does not need default gateway or DNS server settings configured.

Which of the following is a rating of the amount of data that can be sent over a network in a period of time?

Bandwidth Explanation The network bandwidth is a rating of how much data can be sent over a network. Broadband is a signaling scheme that divides a single network media into multiple transmission channels. Latency measures the delay between transmission and reception of network data. Jitter measures how much variation occurs in a network''s latency measurement over time.

Up to 10 meters for Class 2 devices.

Bluetooth

Up to 100 meters for Class 1 devices.

Bluetooth

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which would be the best choice?

Bluetooth Explanation A Bluetooth connection would be the best choice because it automatically detects Bluetooth-enabled devices and creates a wireless PAN between them. It can be used for both voice and data signals, and it also provides 128-bit encryption to protect sensitive information in transit. Infrared is a line-of-sight medium so it may be difficult to maintain connectivity, it also doesn't provide encryption. Cellular WAN provides very little security for information in transit and requires a cellular connection for each device. Wireless Ethernet is used for transferring data, not connecting devices.

You want to use a wireless keyboard and mouse with your laptop computer. Which method you choose?

Bluetooth Explanation Bluetooth would be the best choice because it has a high transfer rate and because it automatically detects other Bluetooth devices in the area and creates an encrypted PAN between them. 802.11g is a wireless networking standard for communicating between computers, not for connecting wireless devices to a computer. PS/2, IEEE 1394 (FireWire), and USB are all wired connections standards.

Can be used to connect wireless clients to wired clients on the same network.

Bridge

Which of the following is a valid MAC address?

C0-34-FF-15-01-8E Explanation A MAC or hardware address is a unique identifier hard coded on every network adapter card. A valid MAC addresss has a total of 12 hexadecimal numbers. Hexadecimal numbers contain the numbers 0 to 9 and the letters A to F. Valid values in a MAC address range anywhere from 00 to FF. Note that one of the answers would be a valid MAC address except it uses a G value, which is beyond the range of a hexadecimal number.

What is the difference between Cat5 and Cat5e cable?

Cat: Supports up to 100 Mbps Ethernet. Cat5e: Similar to Cat 5 but provides better EMI protection. Supports gigabit Ethernet.

Which of the following types of Internet connection services can allow you to be truly mobile while maintaining your Internet connection?

Cellular Explanation Cellular networking uses the cellular phone infrastructure for Internet access. The computing device, such as a notebook or table, must have a cellular antennae to connect directly to the cellular network. You can travel anywhere and stay connected to the network, as long as you are within the coverage are of the cellular service provider. You can also connect a computing device to a cellular network by tethering it to a smartphone or by using a smartphone as a Wi-Fi hot-spot. Mobile hot-spots are devices that can be used to connect to a cellular network. Wi-Fi is a technology that provides wireless access to a computer network but is limited to the range of the wireless access point. Satellite networking requires a satellite dish, which is not truly mobile. ISDN is a land line based technology.

The 802.11ac wireless networking standard provides increased bandwidth and communication speeds by using which of the following technologies?

Channel bonding to combine more channels in the 5 GHz band to allow for up to 160 MHz wide channels. MU-MIMO to allow multiple users to use the same channel. Explanation The 802.11ac wireless network standard increases bandwidth and communication speeds by using the following technologies: - MU-MIMO is an enhancement to MIMO that allows multiple user to use the same channel. In addition to adding MU-MIMO, 802.11ac doubled the number of MIMO radio streams from four to eight. - Channel bonding is used to combine even more channels in the 5 GHz band, allowing for up to 160 MHz wide channels (Even though 160 MHz wide channels are supported, most 802.11ac networks use 80 MHz wide channels.)

You have a small wireless network with less than 50 client computers. You upgraded the hardware on two wireless devices so you can use a better security standard than WEP. Now you need to implement the new security standard. You need the greatest amount of security with the least amount of effort, and without replacing any of the wireless infrastructure. What should you do?

Configure each client with the same key. Implement WPA2-AES. Explanation In this case, implementing WPA2 with AES and using the same pre-shared key on each client provides the greatest amount of security with the least amount of effort, and does not require the replacement of any of the wireless infrastructure. WPA-2 Enterprise uses 802.1x for authentication and requires the configuration of an authentication server. WPA2 is more secure than WPA-PSK.

List the general steps that are used to configure a SOHO router and set up the network. (Assume that the wireless router does not also function as a modem.).

Configure the Internet connection. Configure the wireless router. Enable NAT. Configure DHCP Secure the SOHO network.

Which type of network medium is used by an Integrated Services Digital Network (ISDN)?

Copper telephone wire. Explanation ISDN is a set of standard that allow digital data to be sent and received over copper wiring.

Which service can you use on your network to automatically assign IP addresses to hosts and to help prevent the same address from being assigned to two different hosts?

DHCP Explanation You can use the Dynamic Host Configuration Protocol (DHCP) to set up a DHCP server that will assign IP addresses automatically to network hosts. DHCP servers will not assign the same IP address to two different hosts. ICMP is chiefly used by networked computers' operating systems to send error messages. The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. The Internet Group Management Protocol (IGMP) is a communications protocol used to manage the membership of Internet Protocol multicast groups.

You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this?

DNS Explanation You can use DNS name resolution for Linux workstations for Linux workstations (as well as for most other operating systems). NetBIOS name resolution (LMHOSTS files or WINS) is typically used on Windows-based networks. The Lmhosts file is a local text file that maps Internet Protocol (IP) addresses to NetBIOS names of remote servers with which you want to communicate over the TCP/IP protocol. A WINS server address is only needed if your have older Windows clients on multiple networks. Network Time Protocol (NTP) is a means of transmitting time signals over a computer network. Simple Mail Transfer Protocol (SMTP) is used to route electronic mail through the Internetwork. E-mail applicatons provide the interface to communicate with SMTP or mail servers.

Which mechanisms could you use to resolve a hostname into its associated IP address?

DNS hosts file Explanation You can use the Domain Name System (DNS) to get the IP address from a given host name. You can also use the local hosts file to map host names into IP addresses. On Windows systems, this file is located in C:\Windows\system32\drivers\etc\. You can use either the DHCP protocol or the BOOTP protocol to assign IP address and other configuration information to hosts automatically. Use FTP to transfer files.

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks?

Default gateway Explanation The default gateway identifies the router to which packets for remate networks are sent. The subnet mask identifies which portion of the IP address is the network address. The WINS server address identifies the WINS server that used to resolve NetBIOS host names to IP addresses. The DNS server address identifies the DNS server that is used to resolve host names to IP addresses. The alternate IP address identifies IP addressing information to be used in the event the DHCP server can't be reached. The host name identifies the logical name of the local system.

Which of the following are antenna types that are commonly used in wireless networks?

Directional antenna Omnidirectional antenna Explanation Directional and omnidirectional are two type of antennae commonly used in wireless networks. A directional antenna: - Creates a narrow, focused signal in a particular direction, which increases the signal strength and transmission distance. - Provides a stronger point-to-point connection; is better equipped to handle obstacles. An omnidirectional antenna: - Disperses the RF wave in an equal 360-degree pattern. - Provides access to many clients in a radius.

A customer has called and indicated that he thinks his neighbour is connecting to his wireless access point (WAP) to use his high-speed Internet connection. Which of the following will help resolve this issue?

Disable SSID broadcast on the WAP. Implement WPA2 Explanation You should disable SSID broadcast. Disabling SSID broadcast will make the WAP not appear when the unauthorized user is looking for available wireless networks. Implementing WPA2 will enable encryption and authentication on the WAP. Without the correct passphrase, the neighbour will not be able to connect to the wireless access point. Changing the signal channel sometimes helps eliminate interference problems with neighbouring wireless systems. however, network cards automatically detect the channel, so changing the channel offers no security benefits. By itself, 802.11g is no more secure than any other wireless networking standard.

Which of the following terms describes a group of computers and users that utilize centralized resources, administration, and security settings?

Domain Directory Explanation A domain and a directory both identify a group of computers that utilize centralized resources, administration, and security settings. For example, Active Directory is a service that provides a centralized database of resources for a domain. A Local Area Network (LAN) is a network in a small geographic area, like in an office. A peer-to-peer network is a decentralize network where each host has its own user accounts and shared network resources. A peer-to-peer network does not utilize centralized resources, administration, and security settings. A workgroup is an example of a peer-to-peer network. In a workgroup, each computer controls access to its own resources. Security controls on each computer identify who can have access to the computer's resources.

Which of the following describes an IPv6 address?

Eight hexadecimal quartets. 128-bit address Explanation IP version 6 addresses are 128-bit addresses. They are commonly written using 32 hexadecimal numbers, organized into 8 quartets. Each quartet is represented as a hexadecimal number between 0 and FFFF. The quartets are separated by colons. IP version 4 addresses are 32-bit addresses. They have four octets. each octet being a binary number of 8 digits. Each octet has a decimal value between 0 and 255.

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

Ethernet Explanation Ethernet is a wired, local area network (LAN) standard. Most laptops and desktop computers have built-in Ethernet network ports. Bluetooth is a wiresless standard that allows the creation of short-range Personal Area Networks (PANs). Token Ring and ArcNet are older wired network standards that are nearly obsolete and not commonly used in a modern LAN. 802.11n is a wireless standard used in local area networks.

Which of the following devices allows network communications to be transmitted over existing AC power lines?

Ethernet over Power Explanation An Ethernet over Power device allows for network communications to be transmitted over existing AC power lines. An Ethernet over Power device is plugged in to one AC power outlet, and a second Ethernet over Power device is connected to the same AC circuit. These devices multiplex the AC copper power lines to transmit digital network signals at a frequency higher than the AC electrical power already on the circuit.

Explanation

Ethernet uses a variety of connectivity devices, including the following: A hub provides a central connection for multiple media segments on the same subnet. When a hub receives a signal, it is repeated out to all other ports. Hubs operate in half-duplex mode, meaning devices can either send or receive data at any given time. A switch provides a central connection for multiple media segments on the same subnet. When a switch receives a signal, it forwards that signal only to the power where the destination device is connected. Switches operate in full-duplex mode, meaning devices can send and receive data at the same time because transmission paths are dedicated to only the communicating devices. A router connects two network segments that have different subnet addresses. Routers use the IP address within a packet to move packets between networks. A bridge connects two segments within the same subnet that use different media types. For example, use a bridge to connect wireless clients to wired clients on the same network.

Which connector type and cable grade is used to connect a cable modem to the Internet connection?

F-Type, Coaxial.

Which of the following is a valid IPv6 address?

FEC0::AB:9007 Explanation FEC0:: AB:9007 is a valid IPv6 address. The :: in the address replaces blocks of consecutive 0's. The longer form of this address would be FEC0:0000:0000:0000:0000:00AB:9007. Leading 0's within a quartet can also be omitted. You can only omit one block of 0's using the double colon. Each number in the IPv6 address must be between 0-9 or A-F; G is not a valid number for the IPv6 address. An address without double colons should have a total of 32 hexadecimal number in 8 blocks.

You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?

FTP Explanation You should implement the File Transfer Protocol (FTP). It enables file transfers and supports user authentication. The Trivial File Transfer Protocol (TFTP) also enables file transfer, but does not support user authentication. The Simple Mail Transfer Protocol (SMTP) is used to transfer email message from email clients to email servers. The Lightweight Directory Access Protocol is used to access information about network resources stored in a directory server. The Secure Shell Protocol (SSH) is used to securely access the console prompt of a remote computer system. The Simple Network Management Protocol (SNMP) is used to remotely monitor and manage network devices and hosts.

When you enable quality of service (QoS) on a SOHO network, which of the following is an example of a network feature that could be implemented?

Give VoIP network traffic higher priority and more bandwidth than HTTP (web browser) traffic. Explanation Enable quality of service (QoS) on a SOHO network allows you to prioritize certain network communications over others. For example, you could give VoIP network traffic higher priority and more bandwidth than HTTP (web browser) traffic. Enabling and configuring a demilitarized zone (DMZ) would allow you to cause all incoming port traffic to be forwarded to a specified DMZ host. Enabling the Universal Plug and Play (UPnP) and media content. Configuring content filtering and parental controls allows you to prevent hosts from accessing specific websites or using a specific Internet service, such as chat, torrent, or gaming applications.

Which IP protocol is used by Web browsers and Web servers to exchange files?

HTTP Explanation HTTP is used by Web browsers and Web servers to exchange files (such as Web pages) through the network. HTML is a data format that is used to create hypertext documents that can be viewed from multiple platforms. SSL secures messages being transmitted on the network. SMTP is used to route electronic mail through an internetwork.

Which protocols are used on the Internet to transmit Web pages from Web servers to Web browsers running on client workstations?

HTTPS HTTP Explanation The HyperText Transfer Protocol (HTTP) is used by Web servers and browsers to transmit Web pages over the internet. This is often confused with HTML or HyperText Markup Language, which is the markup language used to create Web content. XML is also a markup language. SMTP is used to route electronic mail through the internetwork. E-mail applications provide the interface to communicate with SMTP or mail servers. The Network News Transfer Protocol or NNTP is an Internet application protocol used primarily for reading and posting Usenet articles.

Which of the following correctly describe the most common format for expressing IPv6 addresses?

Hexadecimal numbers. 32 numbers, grouped using colons. Explanation IP version 6 addresses are made up of 32 hexadecimal numbers, organized into 8 quartets. The quartets are separated by colons. An IPv6 address is a 128-bit number (128 binary digits). IP version 4 addresses use decimal numbers, organized into 4 octets and separated by periods.

You have a Windows 7 computer connected to a small network that is not part of a domain. You want to see the computers and printers on the network. Which feature would you use?

HomeGroup Explanation HomeGroups are a simple way of sharing resources and managing authentication to resources on a home network. You can use the Home Group option in the Control Panel or Explorer to see computers. Shared files, and printers that are part of the HomeGroup. My Network Places is a feature of Windows XP that you would use to browse network devices. Use Devices and Printers or Device Manager to manage hardware devices connected to the local computer.

Connects segments on the same subnet. Repeats signals out to all other ports.

Hub

Operates in half-duplex mode, meaning devices can either send or receive data at any given time.

Hub

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?

Hub Explanation A hub and a repeater send receive signals out all other ports. These devices do not example the frame or the packet contents. A switch or a bridge use the MAC address in a frame for forwarding decisions. A router uses the IP address in a packet for forwarding decisions.

You want to use your Windows workstation to browse the web sites on the Internet. You use a broadband DSL connection to access the Internet. Which network protocol must be installed on your workstation to do this?

IP Explanation The IP is the protocol of the Internet. If you want to use the Internet, your computer must have the IP protocol installed and configured. The Serial Line Internet Protocol (SLIP) is a mostly obsolete encapsulated of the Internet Protocol designed to work over serial ports and modem connections. The Point-to-Point Protocol (PPP) is also commonly used with modem connections. IPX/SPX is the protocol suite used on legacy NetWare networks. NetBIOS is the term used to describe the combination of two protocols: NetBEUI and NetBIOS. NetBIOS was used in early Windows networks. Because NetBIOS is a non-routable protocol, it was often combined with TCP/IP or IPX/SPX to enable internetwork communications.

Which of the following network technologies is packaged as part of a BRI plan?

ISDN Explanation ISDN is a digital service operating over standard telephone company copper wiring offered in a variety of configurations. ISDN consists of multiple 64 Kbps channels. Basic Rate Interface (BRI) is a standard ISDN offering for household service.

Procedure

Important: Leave the Local Area Connection alone and only focus on the Connection. 1. Right-click on the Internet Icon in the Notification Area on Task Bar. 2. Click to Open Networking and Sharing. 3. Click on Change adapter settings. 4. Right-click on the Wireless Network Connection. 5. Click on Properties. 6. Select Internet Protocol Version 4 (TCP/IPv4). 7. Click Properties. 8. Copy the information from the Internet Protocol Version 4 (TCP/IPv4). 9. Select Obtain an IP address automatically. 10. Select Obtain DNS server address automatically. 11. Click on Alternate Configuration. 12. Select User configured. 13. In IP address type:192.168.2.13. 14. In Subnet mask type: 255.255.255.0. 15. In Default gateway type: 192.168.2.254. 16. In Preferred DNS Server type: 192.168.2.254. 17. Select Automatic private IP address. 18. Select OK to close Internet Protocol Version 4 (TCP/IPv4) Properties. 19. click Close to close Wireless Network Connection Properties. 20. Click the Back Button. 21. Exec-Laptop (This computer)- CorpNet.com-Internet. 22. Press the "X" to close the Network and Sharing Centre. 23. Press Done.

Your home computer belongs to a homegroup so that resources can be shared between other computers you have in your home. Where would you find the resources that are being shared from other computers?

In the Libraries container in Windows Explorer Explanation Each homegroup is displayed as a separate node in the Libraries container in Windows Explorer. Just open the homegroup node to see the resources, which are displayed by username and computer name within the homegroup node.

Explanation

In this example of an IPv6 address, FEC0:1319:7700:F631:446A:5511:CC40:25AB. - The prefix is FEC0:1319:7700:F631. - The quartet used to identify the subnet is F631 (the last quartets in the prefix). - The interface ID is 44A:5511:CC40:25AB.

A user reports that he can't browse to a specific website on the Internet. From his computer, you find that a ping test to the Web server succeeds. A trace route test shows 17 hops to the destination Web server. What is the most likely cause of the problem?

Incorrect DNS server address. Explanation In this scenario, a ping test to the Web site succeeds while accessing the Web site through the browser does not work. Users type host names in the browser to go to Web sites, and host names must be translated to IP addresses by a DNS server. Either the workstation is using the wrong address for the DNS server, the DNS server is not available, or the DNS server does not have an entry for the Web site. Because the ping and trace route tests works, you know that the IP address, subnet mask, and default gateway values are correct.

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix: mydomain.local. Description: Broadcom network adapter. Physical Address: 00-AA-BB-CC-74-EF DHCP Enabled: No Autoconfiguration Enabled: Yes IPv4 Address: 192.168.1.102 (Preferred). Subnet Mask: 255.255.255.0 Default Gateway: 192.168.2.1. DNS Servers: 192.168.2.20 What is the most likely cause of the problem?

Incorrect default gateway. Explanation In this example, the default gateway address is incorrect. The default gateway address must be on the same subnet as the IP address for the host. The host address is on the 192.168.1.0/24 subnet, but the default gateway address is on the 192.168.2.0 subnet.

You manage a network that has multiple internal subnets. You connect a workstation to the 192,168.1.0 subnt, which uses the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix: mydomain.local Description: Broadcom network adapter. Physical Address: 00-AA-BB-CC-74-EF. DHCP Enabled: No Autoconfiguration Enabled: Yes IPv4 Address: 192.168.1.102 (Preferred) Subnet Mask: 255.255.0.0 Default Gateway: 192.168.1.1 DNS Servers: 192.168.1.20 192.168.1.27. What is the most likely cause of the problem?

Incorrect subnet mask Explanation In this example, the network us using a mask of 255.255.255.0 (24-bits), but the workstation is configured to use a mask of 255.255.0.0.

Up to 30 meters in areas without interference.

Infrared

Which actions allow you to access the Internet on your laptop via a cellular network?

Install a cellular USB adapter in an open port on the laptop. Explanation To access content on your computer (laptop): - Install a cellular adapter in a PCMCIA, ExpressCard, or USB slot. - Install and configure the software to use the card. An RJ-11 connection is typically for analogue phones, and is used for DSL, ISDN, and Dial-up Internet connections. Dial-up Internet connections use two ports on the modem: - The LINE port connects the modem to the wall jack. - The PHONE port connect the modem to the anlogue phone. You can't typically connect a USB device, such as a cellular adapter, to a wireless access point.

You are setting up a small network in your office with one Windows server and 50 Windows workstations. You want to spend as little time as possible configuring the workstations with IP addressing information. What should you do?

Install the DHCP service on your server. Explanation The DHCP protocol allows you to assign IP addresses automatically. In this scenario, you should configure the DHCP service to run on the network server. The DHCP client on each workstation can then contact the DHCP server when the workstations connect to the network to be automatically assigned IP addressing information. You could instruct each user to manually enter IP addressing information but there is a higher chance of error and will likely require more administrative overhead.

Which of the following best describes how a switch functions?

It connects multiple cable segments (or devices), and forwards frames to the appropriate segment. Explanation Switches have multiple ports and can connect multiple segments or devices. The switch forwards frames to the appropriate port. They function similarly to a hub, except instead of sending packets to all ports, switches send packets only to the destination computer's port.

Which of the following statements accurately describes how a modem works?

It demodulates analogue data from a telephone network into digital PC data. It modulates digital data from the PC into analogue data and transmits it on a telephone network. Explanation Modem is shorthand for modulator/demodulator. Its job is to convert (or modulate) digital data from a PC into analogue telephone signals and transmit them through a telephone network. It also receives analogue data from the telephone network and converts (or demodulates) it into digital PC data.

You have a small network. All computers are running Windows 7. You have created a HomeGroup for your network. You have a laptop that you use at work that runs Windows 7 Professional. You connect the laptop to the network. You are unable to see shared files on other computers. What should you do?

Join the laptop to the HomeGroup. Explanation To access resources in a HomeGroup, the computer must join the HomeGroup. Setting the network type to Home and enabling Network Discovery are all necessary, but by themselves will not allow resource access until the HomeGroup is joined. You can only create a single HomeGroup on a LAN segment; because one already exists, you will not be able to create a new one on the laptop.

A network in a small geographic area that typically uses wires to connect systems together.

Local Area Network (LAN)

A set of subnets connected to each other, typically by wires, using at least one router.

Local Area Network (LAN)

Your workstation is unable to communicate with any other computer on the network. Which of the following tools should you use to test the ability of the network card to send and receive signals?

Loopback plug Explanation Use a loopback plug to test the network card's ability to send and receive signals. Pinging the local host (ping 127. 0.0.1) tests the TCP/IP protocol stack, but does not actually send signals out the network card. A cable tester tests continuity of all wires in a cable and ensures that wires are connected appropriately in the plugs. Use a multimeter and an ohmmeter to test the electrical properties of cables and signals.

Which of the following features on a wireless network allows or rejects client connections based on the hardware address?

MAC address filtering Explanation MAC address filtering allows or rejects client connections based on the hardware address. Wi-Fi Protected Access (WPA2) provides encryption and user authentication for wireless networks. Wired Equivalent Privacy (WEP) also provides security, but WPA2 is considered more secure than WEP. The SSID is the network name or identifier.

You have implemented an ad-hoc wireless network that doesn't employ a wireless access pint. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of networks?

Mesh Explanation This type of network uses a physical mesh topology. There's no central connecting point. any host can communicate directly with any other host on the network. A mesh network, such as this one, is usually impractical on a wired network. Each host would have to have a separate, dedicated network interface and cable for each host on the network. However, a mesh topology can be implemented with relative ease on a wireless network due to the lack of wires.

You have a network that uses a logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network. Explanation Messages sent using a physical bus topology are broadcast to all devices in the network. The device in the middle of the star (typically a hub), receives the message and forwards it on to all other devices.

You have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reach the destination device. Explanation In a logical ring topology, messages travel to each device in turn. If the message is not intended for that device, the message is forwarded to the next device on the network.

A network that is typically owned and managed by a city as a public utility.

Metropolitan Area Network (MAN)

A network that covers an area as small as a few city blocks to as large as an entire city.

Metropolitan Area Network (MAN).

To access the Internet through the Publicly Switched Telephone Network (PSTN), what kind of connectivity device must you use?

Modem Explanation To establish a connection to Internet through the PSTN/POTS you must use a modem (modulator/demodulator) which converts digital PC data into analogue signals that can be transmitted through standard telephone lines. A CSU/DSU (Channel Service Unit/Data SErvice line. Data terminal equipment (DTE) is an end instrument that converts user information into signals for transmission or reconverts received signals into user information. Time-Division Multiplexing (TDM) is a type of digital or (rarely) analogue multiplexing in which two or more signals or bit streams are transferred apparently simultaneously as sub-channels in one communication channel, but physically are taking turns on the channel. A switch is a device for changing the course (or flow) of a circuit.

A portable computer connected to a printer with an infrared interface works fine inside your office. However, when you go outside it works sporadically. How can you fix this?

Move the printer closer to the computer. Block any direct and reflected sunlight from the pathway between the PC and the printer. Explanation Infrared light is light that is near visible in the electromagnetic spectrum. Therefore very bright lights and in particular sunlight may cause interference with infrared interfaces. The best way to manage this interference is to minimize the distance between the connected devices and minimize interfering sunlight.

A medical center wants to upgrade their network backbone to 10 Gigabit Ethernet (10 Gbps) so they can perform daily backups of large amounts of data to the secure on-site storage area network (SAN) without bogging down the network. Some of the back bone segments will have to reach between buildings that are close to 300 meters apart. Which of the following cable types will support 10 Gigabit Ethernet at the necessary segments lengths while keeping costs as low as possible?

Multimode fiber optic Explanation Multimode fiber optic cable is the only option that meets all the requirements. It supports 10 Gigabit Ethernet speeds with maximum segment lengths up to 300 meters. Single-mode fiber optic cable can also support the 10 Gigabit Ethernet speeds and the segment lengths that are needed, but the cable and the connection equipment is more expensive than multimode fiber optic cable and connection equipment. Twisted pair Category 6 and 7 cable can support 10 Gigabit Ethernet speeds but the maximum segment length is 100 meters-- not long enough for this scenario.

Which of the following wireless communication technologies can be described as follows? - Has a very limited transmission range, of less than two inches. - Used with credit cards and passports. - Slower than other wireless technologies. - Constantly emitting a signal.

NFC Explanation Near Field Communication, or NFC, uses the 13.56 MHz frequency and has a very short range- in order for devices to communicate, they have to be within two inches of each other. NFC chips are being used for such applications as passports and credit cards to contain all the information about the passport holder or the credit card account. NFC chips use encryption algorithms to secure the connection but are constantly emitting a signal and use a much slower transmission speed than other wireless technologies.

Which of the following locations will contribute the greatest amount of interference for a wireless access point.

Near backup generators. Near cordless phones. Explanation Other wireless transmitting devices (such as cordless phones or microwaves) and generators cause interference for wireless access points. In general, place access points higher up to avoid interference problems caused by going through building foundations. DHCP servers provide IP information for clients and will not cause interference.

Displays active sessions, ports, and sockets, and the local routing table.

Netstat

Displays current connecitons and incoming and outgoing connections.

Netstat

Which utility would you use to view current connections and active sessions and ports on a computer?

Netstat Explanation Netstat shows IP-related statistics including: - Incoming and outgoing connections. - Active sessions, ports, and sockets. - The local routing table. Ipconfig displays IP configuration information for network adapters. Use ipconfig to view IP address, subnet mask, and default gateway configuration. Nslookup resolves (looks up) the IP address of a host name. Ping sends an ICMP echo request/reply packet to a remote host. A response from the remote host indicates that both hosts are correctly configured and a connection exists between them.

Which tool would you use in Windows Vista/7 to manage network connections?

Network and Sharing Centre. Explanation Use the Network and Sharing Centre in Windows Vista/7 to view and manage network connections. My Network Places is in Windows XP and Network Neighbourhood is in Windows 98. Use Internet Options to configure Internet and Internet Explorer settings.

Which network component connects a device to the transmission media and allows it to send and receive messages?

Network interface card Explanation The network interface card (NIC) allows a device to send and receive messages over the transmission media.

Resolves (look ups) the IP address of the specified hostname.

Nslookup

When configuring an ADSL installation, where should you install the DSL filters?

On connections leading to an analogue phone. Explanation For ADSL installations, place filters (splitters) on the line everywhere that an analogue phone is used. Do not install a filter on the line connected to the DSL router or DSL card. An F-type connector is used in cable Internet and TV connections.

Which of the following protocol do e-mail clients use to download messages from a remote mail server?

POP3 Explanation The POP3 protocol is part of the IP protocol suite and used to retrieve e-mail from a remote server to a local client over a network connection. SNMP is a protocol used to monitor network traffic. SMTP is an IP protocol used to send e-mail. FTP is used to transfer files.

A small network used for connecting devices, such as a notebook computer, a wireless headset, a wireless-printer, and a smartphone.

Personal Area Network (PAN).

A few simple replies to this reques from the remote host indicates that a connection exists between sender and receiver.

Ping

Sends an ICMP echo request/reply packet to a remote host.

Ping

When used with the -t option, performs a continues connection test.

Ping

Examine the following output: Reply from 64.78.193.84: bytes=32 time=86ms TTL=115. Reply from 64.78.193.84: bytes=32 time=86ms TTL=115. Reply from 64.78.193.84: bytes=32 time=86ms TTL=115. Reply from 64.78.193.84: bytes=32 time=86ms TTL=115. Which utility produced this?

Ping Explanation The output shown was produced by the ping utility. Specifically, the information output was created using the ping -t command. The -t switch causes packets to be sent to the remote hots continuously until stopped manually. Ping is a useful tool for testing connectivity between devices on a network. Using the -t switch with ping can be useful in determining whether the network is congested, as such a condition will cause sporadic failures in the ping stream. Tracert is similar to ping in that it tests connectivity between two hosts on the network. The difference is the tracert reports information on all intermediate devices between the host system and the target system. Ping, on the other hand, does not report information on intermediate devices. Nslookup is a tool provided on Linux, Unix, and Windows systems that allows manual name resolution requests to be made to a DNS server. This can be useful when troubleshooting name resolution problems. Ifconfig is a tool used on Unix, Linux, and Macintosh systems to view the configuration of network interfaces, including TCP/IP network settings.

Explanation

Ping sends an ICMP echo request/reply packet to a remote host. A response from the remote host indicates that both hosts are correctly configured and a connection exists between them. Using ping -t performs a continuous connection test (press Ctrl+C to stop sending the ping requests). Tracert is similar to the ping utility in that it tests connectivity between devices; however, tracert also shows the routers in the path between the two devices. Responses from each hop on the route are measured three times to provide an accurate representation of how long the packet takes to reach, and be returned by the specific host. Nslookup resolves (looks up) the IP address of the specified hostname. It also displays additional name resolution information, such as the DNS server used for the lookup request. Netstat displays the following IP-related statistics: - Current connections. - Incoming and outgoing connections. - Active sessions, ports, and sockets. - The local routing table. Ipconfig displays IP configuration information for network adapters.

Which of the following recommendations should you follow when placing wireless access points (WAPs) to provide wireless access for users within your company building?

Place WAPs above where most clients are. Explanation Devices often get better reception from WAPs that are above or below. If possible, place WAPs higher up to avoid interference problems caused by going through building foundations. For security reasons, do not place WAPs near outside walls. The signal will extend outside beyond the walls. Placing the WAP in the centre of the building decreases the range of the signals available outside of the building. When using multiple WAPs, place access points evenly through the area, taking care to minimize the overlap of the broadcast area while ensuring adequate coverage for all areas.

Which of the following devices can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher)?

Power over Ethernet Explanation Power over Ethernet (PoE) technology can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher). Power is usually supplied by a PoE-enabled Ethernet switch. PoE is commonly used to power network devices that are located where physical access to a power outlet may not be available. For example, a PoE-enabled surveillance camera mounted on a tall pole can be powered via its Ethernet cabling.

The following is an example of an IPv6 address: FEC0:1319:7700:F631:446A:5511:CC40:25AB Which part of the example IPv6 address is the prefix? Which quartet in the example IPv6 prefix is used to identify the subnet? Which part of the example IPv6 address is the interface ID?

Prefix: FEC0:1319:7700:F631. Subnet: F631. Interface ID: 446A:5511:CC40:25AB.

Which of the following are used to connect a cable modem the Internet connection?

RG-6 coaxial cable. F-Type connectors Explanation Cable modems connect to the service provider using coaxial cable (RG-6) and an F-Type connector. DSL routers and dial-up modems use RJ-11 connectors. Ethernet uses Cat5 and Cat6 UTP cables and RJ-45 connectors.

You are configuring an ADSL connection. Which of the following will be part of the configuration?

RJ-11 connectors. Filters or splitters. Explanation To connect to the internet through a DSL connection: - Install an Internal DSL card in a single computer, or connect a DSL router to the phone line. - Use a phone cable with an RJ-11 connector to connect the DSL or router to the phone line. For ADSL, place filters (splitters) on the line everywhere that an analogue phone is used. - Do not install a filter on the line connected to the DSL router. Analogue modems are used for dial-up Internet access. F-type connectors and RG-6 cables are used for cable Internet access.

Explanation

Radio frequency wireless transmissions can reach up to 356 meters, depending upon the 802.11 standard used and interference present in the environment. Infrared wireless transmission work best for devices within 1 meter, but can operate up to 30 meters in areas without ambient light interference. The maximum Bluetooth transmission distance depends on the device class: - Class 3 devices transmit up to 1 meter. - Class 2 devices transmit up to 10 meters. - Class 1 devices transmit up to 100 meters.

Scenario

Recently, you created a wireless network at your home to allow laptops and mobile devices to make a connection to the wired network and the Internet. However, without additional configuration, the wireless access point will allow connections from any laptop or mobile device. Because you recognize this as a vulnerability, you now need to secure the wireless network from unauthorized connections. Your task in this lab is to secure the wireless networks as follows: - Change the settings on the wireless access point: - Use PoliceSurveillanceVan for the SSId. Note: The SSID name is case sensitive. - Use WPA2-PSK authentication, with AES for encryption. - Configure S3CuR31! as the security key. Note: The security key is case sensitive. - Change the administrator authentication credentials on the wireless access point to: - Username: @dm1n. - Password: p@SSw@Rd To view and configure the wireless access point, use Internet Explorer and go to 192.168.0.100. Enter username: admin and password: password.

Scenario

Recently, you implemented a wireless network at your home. However, without additional configuration, the wireless access point will allow connections from any laptop or mobile device. You need to secure the wireless network from unauthorized connections. In addition, you suspect that wireless access points used by your neighbours are interfering with your access point. You've discovered that they are using channels 2 and 5 for their wireless networks. Your task in this lab is to secure the wireless network as follows: - Use PoliceSurveillanceVan for the SSID. Note: The SSID name is case sensitive. - Disable SSID broadcasts. - Set the channel such that it doesn't conflict with access points in neighbouring homes. - Use WPA2-PSK authentication, with AES for encryption. Configure S3CuR31! as the security key. Note: The security key is case sensitive. - Only allow devices with following hardware addresses to connect to the wireless network: - 00:87:FC:E2:E5:D2. - 00:50:56:C0:00:08. - 00:87:FC:E2:E5:F2 - Change the administrator authentication credentials on the wireless access point to: - Username: @dm1n - Password: p@SSw@Rd To view and configure the wireless access point, use Internet Explorer and go to 192.168.0.100. Enter username admin and password: password

Connects two network segments that have different subnet addresses.

Router

Uses the IP address within a packet to move packets between networks.

Router

What protocol is used to send e-mail messages from a mail client to a mail server?

SMTP Explanation SMTP sends e-mail from a mail client to a mail server. FTP provides a generic method of transferring files. SNMP is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention. POP3 and IMAP are both e-mail; protocols used by mail clients to retrieve e-mail from a mail server; however they can't be used to send mail from the client to the server. The Trivial File Transfer Protocol (TFTP) is used for network file transfers.

What is name of the utility which is similar to Telnet, that you can use to establish a secure remote server management session?

SSH Explanation Similar to Telnet, the SSH utility is used for remote server management; however, SSH encrypts all communications and is much more secure.

Which of the following tools allow for remote management of servers?

SSH Telnet Explanation Both Telnet and SSH are tools for remote management of servers. However, you should avoid using Telnet as it sends all data, including authentication information, clear text on the network. POP3 is for retrieving e-mail from a remote server, and FTP is for transferring files. LDAP is a protocol used to access information about network resources from a directory service.

Which of the following is used on a wireless network to identify the network name?

SSID Explanation Wireless devices use the SSID (Service Set Identification) to identify the network name. All devices on a wireless network use the same SSID. The MAC address is a unique physical device address. The WPA2 Personal passphrase and the WEP key are both mechanisms used to secure wireless communications.

How can you tell the difference between an ST and an SC connector?

ST connector: - Used with single mode and multi-mode cabling. - Keyed bayonet-type connector. - Also called a push in and twist connector. - Each wire has a separate connector. - Nickel plated with a ceramic ferrule to ensure proper core alignment and prevent light ray deflection. SC connector: - Used with single mode and multi-mode cabling. - Push on, pull off connector type that uses a locking tab to main connection. - Each wire has a separate connector. - Uses a ceramic ferrule to ensure proper core alignment and prevent light ray deflection. - As part of the assembly process, it is necessary to polish the exposed fibre tip.

What is the difference between STP and UTP cabling?

STP cabling: Has a grounded outer copper shield around the entire wire bundle or around each wire pair. STP provides additional EMI protection, but costs considerably more than UTP. UTP cabling: Has only an outer plastic sheath. UTP cables are easier to work with and are less expensive than shielded cables.

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should you select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite Explanation Satellite capability is available even in areas that do not have a local network infrastructure. Satellite requires a local portable transmitter with an antenna directed skywards to a satellite. Satellite service providers offer nearly 100% global network coverage by maintaining a series of satellites circling the earth in geosynchronous orbit. Dial-up, ISDN and cable modem, require a local network infrastructure provided by either the telephone company or cable television company.

Which of the following are advantages of using a domain to manage a network?

Scalability Centralized administration. Explanation A domain is an example of client/server networking where shared resources reside on special computers called servers. Other computers, called clients, connect to the server to access resources. Security controls on the server identify which clients can have resource access. Advantages of client/server networks include: - Scalability - Centralized administration. - Centralized network services and resources. Setup with little or no configuration is a characteristic of a peer-to-peer network as is decentralized administration. -

An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?

Send the frame out ports 2-8. Explanation Because the switch does not know the port that is used to reach the destination device, it will send the frame out all ports except for the port on which the frame was received. After the switch learns the port that is used to reach the destination device, it will send the frame out only that port.

What is the difference between single-mode and multi-mode cables?

Single-mode cables: - Transfers data through the core using a single light ray (the ray is also called a mode). - The core diameter is around 10 microns. - Supports a large amount of data. - Cable lengths can extend a great distance. Multi-mode cables: - Transfers data through the core using multiple light rays. - The core diameter is around 50 to 100 microns. - Cable lengths are limited in distance.

Which of the following topologies connects each network device to a central hub?

Star Explanation Star topologies connect each device on the network to a central hub.

You have a host on your network that provides a service that requires the server to always use a specific IP address. Which IP addressing method can you use to manually assign the specific IP address?

Static IP Addressing Explanation With static IP addressing, you manually assign all configuration values. Static addressing is prone to error and should only be used under the following conditions: - The network has a small number of hosts. - The network will not change or grow. - You have some hosts that must always use the same IP address.

Connects segments on the same subnet. Forwards signals to only the port connected to the destination device.

Switch

Operate in full-duplex mode, meaning devices can both send and receive data at the same time.

Switch

What device is used to create a physical star topology?

Switch Explanation A physical star topology uses a switch or a hub. Routers are used to connect multiple subnets together. A repeater regenerates a network signal so that it can be transmitted for longer distances.

Which of the following LAN devices receives a signal on one port, and forwards that signal only to the port where the destination device is connected?

Switch Explanation A switch offers guaranteed bandwidth to each port; unlike a hub which shares bandwidth among all the network ports.

You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop?

TKIP encryption. Preshared key. Explanation To connect to the wireless network using WPA, you will need to use a preshared key and TKIP encryption. When using a preshared key with WPA, it is known as WPA-PSK or WPA Personal. AES encryption is used by WPA2. The channel is automatically detected by the client. The Basic Service Set Identifier (BSSID) is a 48-bit value that identifies an AP in an infrastructure network or a STP in an ad hoc network. The client automatically reads this and uses it to keep track of APs when roaming between cells.

Lab Report

Task Summary Change the wireless network settings. Use PoliceSurveillanceVan for the SSID. Set the wireless channel to 7 or higher. Use WPA2-PSK authentication, with AES for encryption. Configure S3CuR31! as the security key. Filter access by MAC address. Enable MAC address filtering. Add 00:87:FC:E2:E5:D2 to the allow list. Add 00:56:C0:00:08 to the allow list. Add 00:87:FC:E2:E5:F2 to the allow list. Change the wireless access point's default administrator authentication credentials. Set the username to @dm1n. Set the password to p@SSw@Rd. Explanation Complete the following steps: 1. In the Windows Security pop-up dialogue, click OK. 2. Click Wireless > Basic on the left of the web page. 3. Change the SSID name. 4. Disable SSID broadcasts. 5. Set the wireless channel to 7 or higher. 6. Scroll down and click Apply. 7. In the pop-up dialogue, Click OK. 8. Click Wireless > Security on the left of the web page. 9. Change the authentication (Security Mode) for the PoliceSurveillanceVan SSID. 10. Enter the security key (Pass Phrase), and click Apply. 11. Click Wireless > MAC Filer on the left of the web page. 12. Set the policy to Allow all, then click Apply. 13. In the pop-up dialogue, click OK. 14. In the MAC Address field, enter the first allowed MAC address, then click Apply. 15. Add the remaining allowed MAC addresses in the same manner. 16. Click Administrator > Management on the left of the web page. 17. Change the administrator authentication credentials, and click Apply.

Lab Report

Task Summary Configure the Wireless Network connection to use DHCP. Use DHCP for addressing information. Use DHCP for DNS server information. Configure an alternate IP configuration. Configure an alternate configuration. Use 192.168.2.13 for the IP address. Use 255.255.255.0 for the subnet mask. Use 192.168.2.254 for the default gateway. Use 192.168.2.254 for the preferred DNS server. Explanation Complete the following steps: 1. Click on the network icon in the Task Bar and select Open Network and Sharing Centre. 2. Click the Wireless Network Connection link and select Properties. 3. Select Internet Protocol Version 4 (TCP/IPv4), then click the Properties button. 4. Record the current static values for the IP address subnet mask, default gateway, and DNS server addresses. 5. To use DHCP, select the following: - Obtain an IP address automatically. - Obtain DNS server address automatically. 6. Click the Alternate Configuration tab. 7. Select User configured, then fill in the values you recorded in step 4. Click OK. 8. Click Close.

Lab Report

Task Summary Explanation Complete the following steps: 1. In the Windows Security pop-up dialogue, click OK. 2. Click Wireless > Basic on the left of the Web page. 3. Change the SSID. 4. Scroll down and click Apply. 5. In the pop-up dialogue, click OK. 6. Click Wireless > Security on the left of the Web page. 7. Change the authentication (Security Mode) for the PoliceSurveillanceVan SSID. 8. Enter the security key (Pass Phrase), and click Apply. 9. Click Administrator > Management on the left of the Web page. 10. Change the administrator authentication credentials, and click Apply.

Which of the following utilities would you use to do the following? - Establish a remote server management session. - Send unencrypted (clear text) transmissions to the remote server. - Use mostly to manage specialized industrial and scientific devices.

Telnet Explanation The Telnet utilities is used to do the following: - Establish a remote server management session. - Send unencrypted (clear text) transmission to the remote server. - Use mostly to manage specialized industrial and scientific devices. SSH is similar to Telnet. It is used for remote server management, however, SSH encrypts all communications and is much more secure. PuTTY,xterm, and RUMBA are all terminal emulators.

A user on your network has been moved to another office down the hall. After the move she calls you, complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?

The client system has moved too far away for the access point. Explanation In this case, the wireless client system has had no problems accessing the wireless access point until the move to the new office. In some cases moving a system will cause signal loss either from the increased distance away from the WAP or from unexpected interference by such things as concrete wall or steel doors. There are several ways to correct the problem including reducing the physical distance to the client, using a wireless amplifier, upgrading the antennas on the wireless devices or adding another WAP to the infrastructure. Because the client could previously access the WAP and still has occasional access, it is likely that the move was the cause of the problem rather than any configuration setting on the client system.

Explanation

The default ports match with the following protocols: Port 22: Secure Shell (SSH) Port 80: Hypertext Transfer Protocol (HTTP) Port 443: HTTP over SSL (HTTPS) Port 445: Server Message Block (SMB/CIFS) directly over TCP. Port 143: Internet Message Access Protocol (IMAP) Port 427: Service Location )SLP) Port 548: Apple Filing Protocol

Which of the following identifies the prefix component of an IPv6 address?

The first 4 quartets of an IPv6 address. The first 64 bits of an IPv6 address. Explanation An IPv6 address is a 128-bit binary number that uses the first 64 bits as the address prefix and the last 64 bits of the address as the interface ID. The 128-bit binary number is organized into 32 hexadecimal numbers that are organized further into 8 quartets. The first 4 quartets correspond with the first 64 bits of the IPv6 address.

Explanation

The following network types are defined by the geographical area they cover: Personal Area Network (PAN): A very small network used for communicating between personal devices. For example, a PAN may include a notebook computer, a wireless headset, a wireless printer, and a smartphone. A PAN is limited in range to only a few feet. Local Area Network (LAN): A network in a small geographic area, like an office. A LAN typically uses wires to connect systems together. For example, a LAN is usually a set of subnets connected to each other using routers to connect the subnets. Wireless Local Area Network (WLAN): A network that covers an area that is roughly the same size as a standard LAN. However, it uses radio signals instead of wires to connect systems together. Metropolitan Area Network (MAN): A network that covers an area as small as a few city blocks to as large as an entire metropolitan city. MANs are typically owned and managed by a city as a public utility. Wide Area Network (WAN): A group of LANs that are geographically isolated, but are connected to form a large internetwork.

Explanation

The general steps you would use to configure a SOHO router and set up the network are as follows: - Configure the Internet connection- Begin by connecting the wireless router to the DSL or cable modem that provides the Internet connection, using the router's WAN port. If the router does not automatically detect and configure the Internet connection follow the configuration instructions provided by the Internet Service Provider. - Configure the wireless router- Before setting up the network, the default administrator username and password should be changed and the firmware on the router should be updated to fix bugs or security vulnerabilities. - Enable NAT- Before the network host devices (computers, mobile devices, and printers) can receive IP addresses, NAT must be enabled on the router. NAT allows multiple computers to share a single public IP address used on the Internet. The host devices will communicate with each other using private network addresses from of the private address ranges. - Configure DHCP- After NAT is configured to use a range of private network addresses, DHCP can be configured to assign IP addresses from that range to the host devices. - Secure the SOHO network- Secure the SOHO network by; configuring the firewall on the router, configuring content filtering and parental controls, and physically securing the router. There are other wireless communication technologies, but Wi-Fi based on the 802.11 standard is the only practical option for the typical SOHO environment. A SOHO network does not need a server so you will generally not configure a network server. A SOHO network only uses one subnet, so there is no need to design a subnetting scheme. Using a wireless router means the physical network star topology is already determined.

Which of the following identifies the Interface ID component of an IPv6 address?

The last 4 quartets of an IPv6 address. The last 64 bits of an IPv6 address. Explanation An IPv6 address is a 128-bit binary number that uses the first 64 bits as the address prefix and the last 64 bits of the address as the interface ID. The 128-bit binary number is organized into 32 hexadecimal numbers that are organized further into 8 quartets. The last 4 quartets correspond with the last 64 bits of the IPv6 address.

Which of the following describes the part of the IPv6 address that identifies the subnet address?

The last quartet in the IPv6 address prefix. Explanation The part of the IPv6 address that identifies the subnet address is the quartet in the prefix. For example in the following address, FEC0:1319:7700:F631:446A:5511:CC40:25AB, the quartet used to identify the subnet is F631.

You want to join your computer to a homegroup but you don't see any homegroups on your home network. You know they have been set up on other computers at home, so what might be preventing you from seeing the homegroups that have been created?

The network location is not set to Home Network. Network Discovery has been disabled on your computer. Explanation Your network location must be set to Home Network before you can see homegroups that have been set up on your home network. Network Discovery is enabled by default on your computer, but it's one of the settings you should check if you cannot see homegroups when you know they have been created. It could have been disabled inadvertently. You will not have the option to share resources until find the homegroup can click the Join Now link. The next step will be to enter the homegroup password. There is no homegroup administrator.

Which of the following is true of a network using the 1000Base-T standard?

The network uses copper UTP cables. The network operates at one gigabit per second. Explanation The 1000Base-T standard for Ethernet uses copper UTP cables (Cat5e or higher) and operates at 1000 Mbps (or 1 Gbps). With the exception of 10GBase designations, the number in Ethernet standards is based on megabits per second. Ethernet specifications with F, L, S, or E use fiber optic cables.

You are installing a satellite connection so your home office can connect to the Internet. Which of the following statements is true?

The satellite disk must be pointed in the correct direction for communicating with the satellite. Explanation During the installation, the satellite dish must be pointed in the correct direction for communicating with the satellite. With a single line satellite installation, the satellite connection is used for downloads and a phone line with a modem is used for uploads. Connect a satellite modem/router to the satellite disk using coaxial cable (RG-6) and a F-type connector. Connect the modem/router to your computer using a USB or Ethernet connection.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the break room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor. Explanation Because the user is only experiencing intermittent problems, the most likely cause is that she is out of the effective range of the wireless network access point. All of the other answers listed may be appropriate if the user was unable to connect to the network at all. However, as the user is experiencing only intermittent problems, none of the other answers is likely to be the cause of the problem.

Which of the following are good reasons to enable NAT?

To translate between Internet IP addresses and the IP address on your private network. Explanation NAT translates the Internet IP addresses and the IP addresses on your private network. This allows for multiple computers to share the single IP address used on the Internet. Firewalls prevent unauthorized users from accessing private networks connected to the Internet, including the DHCP server. A proxy server caches web pages.

Tests connectivity between devices and shows the routers in the path between the two devices.

Tracert

Examine the following output: 4 22 ms 21 ms 22 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwestplalca01gr00.bb.ispxy.net [205. 171.205.29] 8 75 ms 117 ms 63 dia-core-01.inet.ispxy.net [205.171.142.1] Which command produced this output?

Tracert Explanation The output is from a tracert command run on a Windows Server system. The tracert command provides information on each step in the route a packet takes to reach a remote host. Responses from each hop on the route are measured three times to provides an accurate representation of how long the packet takes to reach, and be returned by that host. This information can be useful in locating congestion points on a network, or when verifying that network routing is operating as expected. The ping command is used to test connectivity between devices on a network. Like tracert, ping sends three packets to the target host, but it does not report information on any intermediate devices it traverses to reach the target. Nslookup is a tool provided on Linux, Unix, and Windows systems that allows manual name resolution requests to be made to a DNS server. This can be useful when troubleshooting name resolution problems.

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation and an application you are using is unable to connect to a Windows server named FiledSrv2. Which commands can you use to test network connectivity between your workstation and the server?

Tracert Ping Explanation On an IP based network, you can use the ping command to check connectivity between a source and destination computer.. You can also use tracert on a Windows system to check the routing path between two hosts. The tracert command performs the same function as ping, but includes the path information. Use nslookup and dig on Windows and Linux to resolve the IP addresses of host names using DNS lookups. Use Arp to view information about MAC addresses and their corresponding IP addresses.

Which of the following are features of Basic Rate ISDN (BRI)?

Two data Channels. One control channel. Dial-up connection. Explanation Basic Rate ISDN service is a dial-up service consisting of two 64 Kbps data (bearer) channels and a single control (delta) channel. the two data channels can be used independently of each other or bonded together to provide a total bandwidth of 128 Kbps. Primary Rate ISDN (PRI) shares many of the features of BRI, but includes up to 24 data channels.

You recently installed a small office home office wireless router. To avoid security holes and bugs, what should you do to the router?

Update the firmware. Explanation You should update the firmware on the router to fix bugs or security holes. You will typically download the firmware and use a Web browser to update the firmware. Enable the DHCP service to assign IP addresses to hosts on the private network. Enable NAT so multiple computers can share the single IP address used on the Internet. Configure port triggering to dynamically open incoming ports based on outgoing traffic from a specific private IP address and port.

Which of the following are options for connecting a computing device, such as a notebook computer or a tablet, to a cellular network?

Use a USB cable to connect the device to the network through a smartphone. Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hot spot. Use an integrated cellular antennae to connect the device directly to the cellular network. Use a USB cellular antennae to connect the device directly to the cellular network. Explanation You can connect a computing device, such as notebook computer or a tablet, to a cellular network by using any of these four options: - Use a USB cable to connect the device to the network through the smartphone. - Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hot spot. - Use a USB cellular antennae to connect the device directly to the cellular network. - Use an integrated cellular antennae to connect the device directly to the cellular network. A transmitter antennae, or a dish, to communicate with a satellite will connect you to a satellite network, not a cellular network. Connecting to the cable service will also not connect you to a cellular network. Cable is a separate type of networking service.

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2 Explanation Wi-Fi Protected Access 2 (WPA2) is currently the most secure wireless security specification. WPA2 includes specifications for both encryption and authentication. WPA was an earlier implementation of security specified by the 802.11i committee. WEP was the original security method for wireless networks. WPA is more secure than WEP, but less secure than WPA2. Kerberos is an authentication method, not a wireless security method.

How do switches and bridges learn where devices are located on a network?

When a frame enters a port, the source MAC address is copied from the frame header. Explanation Bridges and switches learn addresses by copying the MAC address of the source device and placing it into the MAC address table. The port number which the frame entered is also recorded in the table and associated with the source MAC address. The switch or the bridge cannot record the destination MAC address because it does not know the port that is used to reach the destination device. Bridges and switches operate at Layer 2 and do not use IP addresses (which exist at Layer 3).

A group of networks that are geographically isolated, but are connected to form a large internetwork.

Wide Area Network (WAN)

You want to use a wireless printer at home. The printer will be used by two computers in two different rooms. Which interfaces could be used to do this?

Wireless Ethernet Explanation You could use an 801.11 wireless Ethernet connection for the printer. 802.11 wireless Ethernet has a greater range than infrared, and will go through walls. The other interfaces are wired interfaces. IEEE 1394 is Firewire. IEEE 1284 is parallel.

Similar to a standard LAN, but uses radio signals instead of wires to connect systems together.

Wireless Local Area Network (WLAN)

Which of the following is the primary device needed to set up a SOHO network?

Wireless router Explanation A wireless router, or wireless access point is the primary device that is needed to set up a SOHO network. The router is the device that provides the connection that computers, printers, and mobile devices use to communicate with each other. (A wireless router can be a multi functioning device that also function as a modem, 4 port switch, NAT router, DHCP server, and a firewall.). A cable or DSL modem provides the needed Internet connection, but a modem only gives one device access to the Internet. A SOHO network isn't possible unless the device you connect to the modem is a wireless router. A NAT router, a DHCP server, and a firewall are all very useful SOHO network services; wireless routers are available that include these functions.

Why are wires twisted together in twisted pair cables?

Wires are twisted into pairs to reduce the effects of electromagnetic interference and crosstalk.

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer?

Workgroup Peer-to-peer Explanation Access to shared resources are controlled separately on each computer in the workgroup or peer-to-peer models. For example, each computer in a peer-to-peer network maintains its own set of user accounts. A domain is a collection of computers that share a common security database. Access is controlled by maintaining access control lists in a centralized directory. The client/server model places shared resources on a server. Resources are accessed by clients.

You are talking with a customer support technician on the telephone. The technician recommends downloading a particular driver from Internet. When you try to connect to the Internet using your modem, you can't. What is the problem?

You need to hang up. Explanation You cannot talk on the telephone over the same line that the modem needs to use. When you try to connect with the modem, the line will be in use and the connection will fail because the modem can't dial the destination device. When troubleshooting a modem connection: Verify that the modem gets a dial tone. Verify that the modem dials the correct number. Verify that the receiving device answers the call. Verify network connection parameters (such as TCP/IP settings or connection settings). Verify any authentication or logon parameters.

Scenario

You work as the IT Administrator for a small corporate network. The network uses a DHCP server for IP address configuration for most clients. While in the Executive Office, the manager asked you to configure her laptop for use in both her small office/home office (SOHO) and at work. The laptop is currently configured with a static wireless connection for her SOHO, but the laptop is not connecting to the network while at the office. You need to configure the TCP/IP properties on the laptop to work on both networks. Your task in this lab is to do the following: - Record the laptops static IP and DNS configuration settings. - Configure the laptop to obtain IP and DNS addresses automatically. -Create an alternate TCP/IP connection with the static settings.

You're trying to access your office network with your Windows workstation from home using your organization's virtual private network (VPN). Your DSL modem has connected to your ISP, but you cannot connect to your office network. You issue the ipconfig command from the command prompt and learn that your system has been assigned an IP address of 169.254.1.12. What's causing the problem?

Your ISP'S DHCP server isn't working properly. Explanation Anytime you see a network interface assigned an IP address in the 169.254.0.1 to 169.254.255.254 range, you know that it was unable to acquire an IP address from a DHCP server. Automatic Private IP Addressing (APIPA) on the workstation automatically took over and assigned an IP address in the range listed above. Because of this, the workstation isn't configured with the correct router and DNS server addresses, and can't access the company's VPN.

Because of how simple they are to set up, you want to create a homegroup at the office. What is most likely to prevent you from setting up a homegroup at work?

Your computer belongs to a domain. Your network location is not set to Home Network. Explanation You are going to have trouble creating a homegroup at work, where there is likely to be a work network set up and running because. Your network location must be set to Home Network, but Work Network is selected as the default network location. You cannot create a homegroup on a computer that belongs to a domain. Home groups are designed to be an easy way to share resources on a home network. You are not likely to need a homegroup at work because all the resources you need for sharing are part of a typical work network. Network Discovery is enabled by default so that is not likely to prevent from creating a homegroup. There is no homegroup administrator role that could be used to prevent you from creating a homegroup. Libraries are needed for homegroups but they cannot be disabled.

Which of the following utilities can you use from the command line on a Linux system to see a list of the installed network interfaces, along with their current status and configuration?

ifconfig Explanation ifconfig is used on Linux (and Mac OS) systems to display the installed network interfaces, their current status, and the current configuration settings for each interface, including the MAC address, IP address, broadcast address, and subnet address. Ipconfig is used on Windows systems to view the installed network interfaces and their IP address, subnet mask, and default gatewar configuration. Netstat is used on a Windows. system to display IP-related statistics, netconfig, if lookup and netinfo are not the names of real networking utilities.

You need to view detailed IP configuration information on Windows workstation. In addition to the IP address, subnet mask, and default gateway configuration, you need to now see the network card's MAC address and the addresses of the DHCP and DNS servers the workstation is communicating with. What command would you enter at the command line to see this detailed information?

ipconfig /all Use ipconfig /all to view detailed configuration information including the MAC address and the DHCP and DNS servers the workstation is communicating with.

When you see the address of the DNS server, you realize that this information needs to be updated. Earlier in the day, you implemented a new DNS server with a new IP address. The workstation will update this information in 24 hours. What command can you enter at the command line to update the DNS server information right away?

ipconfig /flushdns Explanation Use ipconfig /flushdns to flush (or remove) all the entries in the workstations' current DNS cache. If the IP address of a network server is changed, your local cache will contain the old IP address until the cache is updated (every 24 hours) or the flushdns option is used.

You are the computer specialist in a small business. Your company server is named FS1 and has an IP address of 10.0.2. The hardware in your company server has started to experience intermittent failure, so you transferred the shares on the server to a spare server and took the main server offline. The spare server has an IP address of 10.0.0.3. You edit the existing A record for FS1 on your company;s DNS server and redirect the hostname to the spare server's IP address of 10.0.03. After doing so, most users are able to access the shares on the spare server by hostname, but several users cannot. Instead, they see an error message indicating the FS1 server could not be found. Enter the command you can run from the command prompt on these workstations that will allow them to access the shares on FS1 without performing a full restart.

ipconfig /flushdns Explanation Workstations maintain a cache of recently resolved DNS names. When you use a DNS name, the computer first checks its cache. If the name is in the cache, the corresponding IP address will be used. This can sometimes cause problems if the IP address of a host has changed. Old values in the cache might continue to be used for a time, making communication using the DNS name impossible. To correct this problem on a Windows computer, tun ipconfig /flushdns to delete the local DNS name cache.

Which command would you use to have a workstation stop using an IP address that it obtained from a DHCP server?

ipconfig /release Explanation Use ipconfig /release to release the IP configuration information obtained from the DHCP server. Use ipconfig /renew to request new IP configuration information from the DHCP server. Use net stop to stop a network service. Use net logoff to break the connection between your computer and a shared resource.

A user is having problems connecting to other computers using host names. Which of the following commands will help you troubleshoot this problem?

nslookup Explanation Use Nslookup to troubleshoot DnS name resolution problems. Use Arp to view information about MAC addresses and their corresponding IP addresses. Netstat 9network statistics is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. Use Nbtstat to help troubleshoot NetBIOS name resolution problems.

You suspect large packets are being dropped on your network because of their large size. Which utility can you use to confirm your suspicion?

ping -l Explanation Use ping -l to configure the payload size to identify when packets above a certain size are being lost. Ping -t continuously sends pings to a specific device. Tracert tests connectivity between devices while showing the path between the two devices. Nslookup resolves (looks up) the IP address of a host name. Netstat shows IP-related statistics.

You are troubleshooting connectivity between your computer and the www.widgets.com server, whose IP address is 192.168.1.1. Which of the following commands tests connectivity to the device as well as name resolution?

ping www.widgets.com Explanation To test both name resolution and communication with the server, use the ping command with the host name. The first step in the ping test is to find the IP address of the specified host. Using ping with just the IP address will not test name resolution. Using nslookup only tests name resolution, it does not test communication with the end device.


Ensembles d'études connexes

Chapter 3 Security+: Understanding Devices & Infrastructure

View Set

Fruits and Types of Inflorescence

View Set

RN Targeted Medical Surgical Neurosensory and Musculoskeletal 2019

View Set

Med Surg Prep U Chapter 23: Caring for Clients with Infectious and Inflammatory Disorders of the Heart and Blood Vessels - ML5

View Set

Five Steps of the scientific method

View Set

Ch 2 - Operations Strategy and Competitiveness

View Set