Total Seminars Test Two Missed Questions
Which of the following ports are MOST commonly used by communications applications to interactively manage network devices? (Select TWO.)
22, 23
When enabled on an Aruba wireless access point, 802.11a-ht and 802.11g-ht is more commonly known as what?
Mixed mode
Which options represent recommended approaches to troubleshooting? (Select three.)
-Top-to-bottom of the OSI Model -Divide and conquer -Bottom-to-top of the OSI Model
Switches operate at the ________________ layer in the OSI model.
Data Link Layer
Which term describes the rate at which usable information bits are delivered from one node to a destination?
Goodput
At which layer of the OSI model does an unmanaged switch operate?
Layer 2
Which layer of the OSI model deal with MAC addresses?
Layer 2(Data Link)
Which layer of the OSI model deals with IP addresses?
Layer 3 (Network)
Which of the following connectors would be found on a fiber-optic cable?
MT-RJ
Buck needs to provide connectivity to computers within a SOHO that is over 850 feet (259 meters) away from the main switch. Which of the following would he install to provide connectivity without using repeaters?
Multimode fiber
Of the technologies listed, which would be the BEST when protecting your large corporate network from outside attacks?
Network-based firewall
You are concerned with security at your company and want to implement a technology that requires no configuring on the user's side and will filter out specified port ranges. Which technology will enable this?
Network-based firewall
Which layer converts the 1s and 0s into the type of pulses needed for a cable, such as a copper cable?
Physical Layer
Which of the following OSI layers converts the ones and zeros into the type of signals needed for the network cable, and then places these signals on the cable?
Physical layer
Which of the following methods of authentication will also provide AAA and uses UDP?
RADIUS
What is port 22?
SSH
What can you change on your WAP to help limit war driving?
Signal Strength
Network technician Kyle is troubleshooting a connectivity problem with a new data circuit. Kyle confirms that the ST fiber jumper is good. Which of the following is the problem?
TX/RX reversed
Some switches can have more than one VLAN assigned to a single port. What kind of VLANs are these?
Tagged VLAN
What is port 23?
Telnet
You have just installed a new router in your MDF and are now monitoring traffic with a packet analyzer. What do you notice about how a router treats a broadcast packet on your network?
The router discards it.
How can a single NIC in a server transmit packets from multiple different source MAC addresses?
The server contains several virtual machines and the MAC addresses are from the virtual machines.
Media Dependent Interface Crossover ports (MDIX)
a port on a switch, router or network hub connecting to another switch or hub using a straight-through cable rather than a crossover cable
MUMIMO mode
a wireless technology that was introduced in the 802.11ac Wave 2 standard
You recently installed a keypad lock on the door to the telecom room. You only give the code to authorized network administrators. What type of prevention is this?
access control hardware
What elements would be found in a change request? (Select three.)
configuration procedures, rollback process, notification
Elsa needs to connect two switches together with no MDIX ports. Which of the following might she use?
crossover cable
Network technician John Watson, needs to check if the domain name resolution system is functioning properly. Which of the following software tools would he use to accomplish this? (Select TWO).
dig, nslookup
Mixed mode
enables 802.11a stations to connect to the 5GHz circuits of a WAP while 802.11b/g nodes connect to the 2.4GHz section.
Network technician Raj has tested a theory of probable cause and discovered that the theory was incorrect. Which of the following would be the NEXT step in the troubleshooting process?
escalate the issue
A __________ enables the hosts on Boris's TCP/IP network to get the moose report from www.moosesightings.com more efficiently, because the information can be downloaded once for use by multiple hosts.
proxy server
Which of the following would be considered firewall technology? (Select all that apply.)
proxy server, network address translation (NAT), port filtering, packet filtering
A firewall that checks out all the incoming traffic and decides if the traffic is going to be allowed or filtered out is an example of which of the following?
stateful inspecting
Indira, an administrator, just installed a new switch. She has connected two servers with IP addresses of 192.168.105.20 and 192.168.105.30. The servers are able to communicate with each other, but are unable to reach the Internet. Indira checks the switch configuration and sees the following information: - Interface: VLAN 105 - IP address: 192.168.105.5 255.255.255.0 Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem?
the server is missing default gateway information
You recently installed wireless network cards for laptop users. The help desk receives a call from a user who couldn't access the network with a laptop while on a business trip, although the laptop worked fine when he tested it on his desk. What is the likely cause of the problem?
the user moved out of range of the access point