CompTIA Network+ Transcender Sample Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

192.168.44.24

During a recent network breach, a help desk technician identifies the IP address of the computer that is affected. When you ask for the address, he gives you the following binary address: 11000000 10101000 00101100 00011000 What is the IP address? 192.168.44.24 192.168.44.25 192.168.45.24 192.168.45.25

a brouter

During a recent network redesign meeting, one team member suggested that you implement a device that operates at both the Data Link layer and the Network layer of the OSI model. Which device operates at both of these layers? a bridge a brouter a hub a repeater a router

The route configured as a static route.

If a routing table contained multiple routes for the same destination, which were inserted by the following methods, which route will the router use to reach the destination network? The route inserted by RIP. The route inserted by OSPF. The route inserted by BGP. The route configured as a static route.

an issuer

In PKI, what is the entity that signs a certificate? an issuer a principal a verifier a subject

A - Maps a host name to an IPv4 address AAAA - Maps a host name to an IPv6 address CNAME - Maps an additional host name to an existing host record MX - Maps a mail server name to a domain PTR - Maps an IP address to a host name

Match the description on the left with the DNS resource record on the right.

Lease - a single IP address that is being used by a DHCP client Option - a parameter that can be used to assign router, DNS server, and other information to DHCP clients Scope - a range of possible IP addresses that a DHCP server can assign Reservation - an allocation of a single IP address to a MAC address

Match the descriptions on the left with the DHCP terms on the right.

Port 20 - FTP Port 23 - Telnet Port 25 - SMTP Port 53 - DNS Port 80 - HTTP

Match the protocol from the left with the default port it uses on the right. Move the correct items from the left column to the column on the right to match the protocol with the correct default port.

Port 21 - FTP Port 110 - POP3 Port 143 - IMAP Port 443 - HTTPS Port 3389 - RDP

Match the protocol from the left with the default port it uses on the right. Move the correct items from the left column to the column on the right to match the protocol with the correct default port.

Transport

Recently, you have noticed that segments of data are arriving at their destination with errors. You need to examine the appropriate OSI layer for the reliable delivery of segments without error. Which OSI layer is responsible for this? Network Transport Data Link Application

APIPA - fe80::/10 Private - fc00::/7 Loopback - ::1/128

The IPv6 address types should be matched with the given IPv6 addresses as follows:

Implement an HTTP proxy server.

Users on your network have access to the Internet. As more users access the Internet, bandwidth starts to diminish, causing Web pages to load slowly. After looking at the Web server logs, you have noticed that many of the same Web sites are being accessed by multiple users. What should you do to improve your company's Internet bandwidth? Implement a DNS server. Implement a WINS server. Implement an IP proxy server. Implement an HTTP proxy server.

RAS

What can a company use to allow remote users to access their Windows network remotely if their network is not connected to the Internet? SSL RAS PPTP DHCP

virtual SAN

What should you implement to isolate two of the devices that are located on a storage area network (SAN) fabric containing eight devices? SAN snapshots HBA allocation virtual SAN VLAN

VDSL

Which DSL technology provides the highest data rate? ADSL HDSL SDSL VDSL

AH protocol in tunnel mode

Which IPSec configuration can be used to digitally sign and encapsulate each packet within another packet? AH protocol in transport mode AH protocol in tunnel mode ESP protocol in transport mode ESP protocol in tunnel mode

Diameter

Which RADIUS implementation was created to deal with Voice over IP (VoIP) and wireless services? TACACS XTACACS TACACS+ Diameter

443

Which TCP port is the well-known port assigned to SSL? 20 80 119 443

T3

Which connection type allows for connections of up to 44.736 Mbps? T1 E1 T3 E3

QoS

Which feature provides varying levels of network bandwidth based on the traffic type? QoS traffic shaping load balancing fault tolerance

LC

Which fiber-optic connector is roughly half the size of other fiber-optic connectors? LC SC ST BNC

CSMA/CA

Which media-access method does the 802.11 standard specify for wireless networks? CSMA/CA CSMA/CD Token-passing Demand priority

an encapsulated packet that is digitally signed

Which payload is produced by using IPSec in tunnel mode with the AH protocol? an encapsulated packet that is encrypted an encapsulated packet that is digitally signed an unencapsulated packet that is encrypted an unencapsulated packet that is digitally signed

An NIDS cannot detect an intruder who is logged on to a host computer.

Which statement is true of a network-based intrusion detection system (NIDS)? An NIDS generates a finite number of alarms. An NIDS does not analyze real-time information. An NIDS is active while gathering data over the network. An NIDS cannot detect an intruder who is logged on to a host computer.

Water Soda acid

Which suppression methods are recommended for a fire in a facility that involves paper, laminates, and wooden furniture? (Choose two.) Halon Water Soda acid Dry powder

IPS

Which system or device detects network intrusion attempts and controls access to the network for the intruders? firewall IDS IPS VPN

RADIUS

Which technology provides centralized remote user authentication, authorization, and accounting? VPN DMZ RADIUS Single sign-on

IPSec can work in either in tunnel mode or transport mode. IPSec uses encapsulation security payload (ESP) and authentication header (AH) as security protocols for encapsulation. The IPSec framework is used in a virtual private network (VPN) implementation to secure transmissions.

Which three statements are true of Internet Protocol Security (IPSec)? (Choose three.) IPSec can work in either in tunnel mode or transport mode. IPSec uses encapsulation security payload (ESP) and authentication header (AH) as security protocols for encapsulation. The IPsec framework uses L2TP as the encryption protocol. The IPSec framework is used in a virtual private network (VPN) implementation to secure transmissions. IPSec ensures availability of information as a part of the CIA triad.

signature-based IDS

Which type of intrusion detection system (IDS) relies upon a database that contains the identities of possible attacks? network-based IDS anomaly-based IDS behavior-based IDS signature-based IDS

fiber-optic

Which type of network media is the least susceptible to interference or signal capture? coaxial fiber-optic shielded twisted-pair unshielded twisted-pair

Category 5

Which unshielded twisted-pair (UTP) category consists of four twisted pairs of copper wire and is certified for transmission rates of up to 100 Mbps? Category 1 Category 2 Category 3 Category 4 Category 5

25

Which well-known port is used to forward e-mail on the Internet between e-mail servers?

Close ports 20, 21, and 80, and open ports 25 and 110.

You administer a 100BaseTX Ethernet network that is configured to use the TCP/IP network communications protocol. You have installed a firewall between the network and the Internet. Currently ports 80, 20, and 21 are open on the firewall. You want to allow only SMTP and POP3 communications between the network and the Internet. Which configurations should you make on the firewall? Close port 80 only. Close ports 20, 21, and 80, and open ports 25 and 110. Close ports 20 and 21, and open port 25. Close ports 21 and 80, and open port 110.

DHCP

You administer a TCP/IP network. You want to enable the hosts on your network to be automatically configured with IP configurations, such as IP address, subnet mask, and default gateway address. The IP configurations should be leased to the clients for a limited time. Which protocol should you use to accomplish this task? BOOTP DHCP HTTP IPP SMTP

SNMP

You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices? ARP SMTP SNMP Telnet

80

You administer your company's network, which is connected to the Internet. A firewall is configured between the company network and the Internet. You want to prevent users on the Internet from using HTTP to connect to computers on the company network. Which well-known TCP port should you block to prevent Internet users from entering the company's network on that port? 21 23 80 119

wire crimper

You are a desktop administrator for Nutex Corporation. A user reports that he is unable to access network resources. You notice a break in the network cable. You need to create a new network cable to connect the computer physically to the RJ-45 jack in the wall. What tool should you use to splice the end of the cable to an RJ-45 connector? time domain reflectometer optical tester wire crimper pliers

TCP port 143

You are analyzing communication over your network. You have captured all the packets sent to and from a server on your network. You need to filter the packet capture to only IMAP4 protocol communications. Which port does this protocol use? TCP port 25 TCP port 110 TCP port 143 UDP port 25 UDP port 110 UDP port 143

192.168.0.1

You are configuring a new small office home office (SOHO) at a small insurance office. After documenting the network requirements, you decide to use Network Address Translation (NAT) so that only one public address will be needed. You want to use the IANA-designated private IP address range that provides host IP addresses with a maximum of 16 bits. What is a valid host IP address in this range? 10.251.250.100 11.0.1.0 172.30.250.10 192.168.0.1

1000BaseCX

You are designing a SOHO network for your company. You want to use the Ethernet standard that supports a data transmission rate of 1 Gbps over copper cable. Which Ethernet standard should you use on the network? 10BaseT 100BaseFX 1000BaseCX 1000BaseSX

Telnet

You are examining the packets captured on your network. You notice some communication between your Cisco router and someone from outside your network. The packets indicate that the communication is occurring over TCP port 23. Which protocol is being used? FTP SSH Telnet TFTP

Pin 4 Pin 5 Pin 7 Pin 8

You are explaining the TIA/EIA 568A and 568B wiring specifications to a new employee. Which wiring pins contain the same colors across both specifications? (Choose all that apply.) Pin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8

All of them

You are explaining the function of a multi-layer switch to several junior administrators. On which data can multi-layer switches make routing decisions? (Choose all that apply.) MAC address IP address protocol port number

1000BaseT

You are implementing a SOHO network for a small business. The business owner has asked that you implement a 1 gigabit per second (Gbps) network. Which Ethernet standard specifies a data transfer rate of 1 Gbps? 10Base2 10BaseT 100BaseFX 1000BaseT

ESD

You are installing a known good NIC in a computer, and a spark jumps from your hand to the NIC. You install the NIC and discover that the NIC no longer operates correctly. What has most likely caused the NIC to malfunction? EMI ESD a power sag RFI

patch panel

You are installing the wiring for a small office. You want to connect the fifty computers in the office to the switch. The Cat6 cables that you plan to use have RJ-45 connectors on both ends. Which component should you use? 66 block 110 block patch panel demarcation extension

10GBaseER

You are looking at implementing several different 10GBase networks. You need to implement the one that offers the longest cable run because of the distances you must cover for your company's network. Which 10GBase specification should you select? 10GBaseER 10GBaseLR 10GBaseSR 10GBaseLX4

TCP UDP

You are responsible for ensuring that unnecessary protocols are not running on your network. You need to determine which protocols operate at the Transport layer of the OSI model. Which of the following protocols should you list? (Choose two.) HTTP IP IPX TCP UDP

Start each wireless access point at a separate time.

You are setting up an 802.11a wireless network in an office environment that includes three wireless access points. The wireless access points are at least 15 meters apart and are configured for automatic channel setting. Each time you turn the wireless access points on, they all choose the same channel. You need to ensure that the access points choose separate channels to prevent interference, using the least amount of administrative effort. What should you do? Increase the distance between the wireless access points to at least 20 meters. Manually configure each of the access points to use channels 1, 6, and 11, respectively. Start each wireless access point at a separate time. Reduce the signal strength on each access point.

MSDS

You are the network administrator for a manufacturing company. Technicians that work on computers used on the manufacturing floor may come into contact with dangerous chemicals. You need to understand which chemicals they will come into contact with and their associated safety issues. What should you consult? ACL ESD HVAC MSDS

Cost

You are the network administrator for an organization whose network uses the Open Shortest Path First (OSPF) routing protocol. Which metric does this protocol use for optimal path calculation? MTU Cost Delay Hop count

Layer 1 - Physical Layer 2 - Data Link Layer 3 - Network Layer 4 - Transport Layer 5 - Session Layer 6 - Presentation Layer 7 - Application

You are the network administrator for your company. As part of your job, you must understand how data is transmitted through the different OSI layers. Move the OSI layers from the left column to the right column, and place them in the correct order, starting with Layer 1 at the top.

The following allocations should be made for the networks: Administrative - /29 Sales - /26 Marketing - /27 Research - /28 Remainder - /25 For the Administrative network, the /29 designation will support up to 6 hosts. For the Sales network, the /26 designation will support up to 62 hosts. For the Marketing network, the /27 designation will support up to 30 hosts. For the Research network, the /28 designation will support up to 14 hosts. A total of 112 IP addresses will be used by the departments. The Remainder group uses a /25 notation, which supports up to 126 hosts.

You are the network administrator for your company. Recently, the company has decided to locate a small branch office in another state. You have decided to allocate a portion of the private IP address range to use at the new branch office. You assign the branch office the 192.168.103.0/24 IP address range. When you set up the new network, you need to configure separate subnets for each department in the branch office. You should allocate the addresses using CIDR notation such that each department has the minimum number of IP addresses. The departments require the following numbers of hosts on their subnets: Administrative - 4 Sales - 54 Marketing - 27 Research - 12 After you select the appropriate CIDR notation for each department, you must identify the unused portion of the subnet (identified as "Remainder"). Select the appropriate CIDR from the left, and drag it to the network on the right to which it applies. Then select the appropriate CIDR from the left for the unused portion of the network, and drag it to the Remainder field on the right.

Your firewall software is blocking port 53.

You are using DSL to connect to the Internet. You recently set up firewall software to protect your computer's resources from external users. After setting up the firewall software, you can no longer access Web sites by name. What is the problem? You do not have a static IP address. You have a DHCP server on the network. Your firewall software is blocking port 53. Your firewall software is blocking port 25.

Use only the 568A wall jacks.

You are wiring a small office for a client. The client has purchased several 568A and 568B wall jacks and enough 568A wiring cables to attach all devices correctly. You want to configure the network for ease of administration. What should you do? Use only the 568A wall jacks. Use only the 568B wall jacks. Use both the 568A and 568B wall jacks. Purchase 568B wiring cables.

Implement port labeling. Implement patch panel labeling.

You are working to convert a 10BaseT network to a 1000BaseT network. This conversion includes replacing all cabling, network devices, and network interface cards (NICs). Next year, you also have a planned building renovation where departments will be relocated to different areas within the building. However, that renovation should involve minimal network hardware changes. When you start the conversion, you have a hard time determining where each wall plate terminates at the patch panels. You decide to follow better design procedures to make future upgrades or troubleshooting easier and also to ensure that next year's move goes more smoothly. However, your solutions should minimally impact the current network structure. Which best practices should you implement during the conversion? (Choose two.) Create a logical network diagram. Implement port labeling. Implement device naming conventions. Implement patch panel labeling. Implement an SLA. Create a physical network diagram.

100 Mbps data-transmission rate Two pairs of Category 5 UTP cabling Maximum segment length of 100 meters (328 feet)

You are working with a company that has a Fast Ethernet 100Base-TX network. You will be adding several new network segments to the current network. Which standards apply to this company's network? (Choose three.) 100 Mbps data-transmission rate Two pairs of Category 5 UTP cabling Four pairs of Category 3, 4, or 5 UTP cabling Maximum segment length of 100 meters (328 feet) Maximum segment length of 412 meters (1,352 feet) half-duplex Media interface connectors (MIC) or Subscriber connectors (SC)

128 Kbps

You connect a home computer to a BRI ISDN line. The Bandwidth On Demand Interoperability Group (BONDING) protocol is used to combine the channels. What is the maximum data transfer rate of the B channels? 56 Kbps 128 Kbps 1.544 Mbps 44.736 Mbps

Green/White

You have been asked to create several TIA/EIA 568A wiring cables for your network. Which color wire should be placed in Pin 1? Green Green/White Orange Orange/White

DNS

You have been asked to implement a protocol that will manage the fully qualified domain name (FQDN) to IP address mappings. Which protocol should you implement? DHCP DNS WINS SSH

procedures

You have been handed a document that details the steps to take to update the network drivers. Which type of change management document do you have? baselines policies procedures regulations

to increase network security to reduce congestion by decreasing network traffic

You have been hired as a contractor to implement a small office home office (SOHO) network for a small business. While gathering the requirements and constraints regarding the network, you decide to implement two subnets on the network. What are valid reasons for implementing subnets on an IP network? (Choose two.) to increase network security to configure a greater number of hosts to reduce congestion by decreasing network traffic to use more than one server on each segment of an IP LAN to reduce congestion by increasing network media bandwidth

10GBaseSW

You have been hired as a network administrator. The company wants to implement a 10 Gigabit Ethernet designation for use with a SONET network. Which of the following should you implement? 10GBaseSR 10GBaseSW 10GBaseLX4 10GBaseLR

collisions

You have implemented an Ethernet CSMA/CD network for your company. Users complain of delays. When you research the issues, you discover that the network has low throughput. What is the most likely cause of delay on this network? collisions switching loops broadcast storms improper termination

the Physical layer

You have installed a new MAU on your Token Ring network because the old one is no longer supported by the product vendor. At what layer of the OSI model does this device operate? the Data Link layer the Network layer the Physical layer the Transport layer

2001:DB8::1::F00D

You have recently added a new Windows 8 computer to your IPv6 network. Because your network is small, you currently use static IP addressing. You record the IPv6 address of the new Windows 8 computer. What is the shortest possible notation of it IPv6 address as shown below? 2001:0DB8:0000:0001:0000:0000:0000:F00D 2001:DB8::1::F00D 2001:DB8:0:1::F00D 2001:DB8:0:1:0:0:0:F00D 2001:0DB8:0:1::F00D

53

You have recently implemented DNS on a small company network. However, you discover that the internal DNS server is having trouble communicating with external DNS servers. Which well-known UDP port does this protocol use? 53 80 110 161

UDP port 67

You have several computers in your network that are located behind a firewall. The computers are unable to obtain a dynamic IP address from the DHCP server. You suspect that the firewall is configured to block the DHCP traffic. Which port must be open on the firewall to allow the traffic? TCP port 53 UDP port 53 TCP port 67 UDP port 67

Network

You have several switches and routers on your company's network. The switches aren't experiencing any problems. However, one of the routers is not correctly routing packets based on IP addresses. At which layer of the OSI model does the problem device operate? Session Network Physical Data Link Transport

Twisted-pair

You must propose a cabling scheme for your company's new location. Several departments are located on the same floor with a maximum distance of 61 meters (200 feet) between departments. You want a relatively easy, low-cost installation with simple connections. Which type of cabling would you propose? ThinNet ThickNet Fiber-optic Twisted-pair

CAT5 UTP cable RJ-45 connectors

You need to connect a computer to a 100BaseTX Fast Ethernet network. Which of the two following elements are required? (Choose two.) CAT5 UTP cable fiber-optic cable RG-58 cable BNC T connectors RJ-11 connectors RJ-45 connectors

MDF

You need to connect a public line coming into your office with the internal network. Which device should you use? IDF MDF 66 block 110 block

802.11a

You need to deploy wireless access points in a college environment. You want to deploy a solution that will provide the shortest range and the most non-overlapping channels to prevent interference. Which wireless standard should you deploy? 802.11a 802.11b 802.11g 802.11x

Create a DHCP reservation.

You need to ensure that the Web server always receives the same IP address from the DHCP server. What should you do? Create a DHCP scope. Create a DHCP exclusion. Create a DHCP reservation. Create a scope option.

1000Base-CX

You need to implement a data center for your company. In this data center, you plan to implement inter-rack connections that are limited to 25 meters (82 feet). Which Ethernet standard should you implement? 100Base-T4 100Base-FX 1000Base-TX 1000Base-CX

rollover cable

You need to perform some administrative maintenance on a Cisco router. You decide to connect your notebook computer to the console port on the router. Which type of cable should you use? crossover cable patch cable straight-through cable rollover cable

ICMP

You notice that several ping requests have been issued on your network in the past couple of hours. Which protocol responds to these requests? ARP TCP ICMP RARP

Logical network addressing

You suspect that there is a problem with addressing that allows data to be sent throughout your network. Which addressing method is used at the OSI Network layer to allow this? Link-state addressing Logical network addressing Physical device addressing Distance vector addressing

The protocol will drop the packets. The application will automatically retransmit the packets.

You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission? (Choose two.) The protocol will drop the packets. The application will drop the packets. The protocol will automatically retransmit the packets. The application will automatically retransmit the packets.

HTTP

You use a computer on a TCP/IP network to transfer data through well-known TCP port 80. Which protocol is most likely being used to transfer data? FTP HTTP POP3 SMTP

Physical layer - Network cable Data Link layer - Frame relay Network layer - IPSec Transport layer - TCP Session layer - SSL Presentation layer - MIME Application layer - DHCP

You utilize different components, protocols, and technologies on your company's network. You need to determine the layer of the OSI model on which these function. Match the components on the left with the layer from the OSI model on the right within which they operate.

802.11a - 5 GHz, up to 54 Mbps 802.11b - 2.4 GHz, up to 11 Mbps 802.11g - 2.4 GHz, up to 54 Mbps 802.11n - 2.4 or 5 GHz, up to 600 Mbps

You work for a company that specializes in setting up WLANs. You have to implement the appropriate 802.11 network based on the needs of each organization. Match the frequency and speed characteristics on the left to the wireless specification on the right.

T1

Your company consists of 75 employees. Your company has entered into a partnership with another company that is located across the country. Your company's users must be able to connect to the partner's network quickly and reliably. Support for voice, data, and imaging transmissions and a dedicated 24-hour link are required. Your solution must be as inexpensive as possible while providing enough bandwidth for your company's employees. What should you implement? T1 ATM FDDI ISDN POTS

how users are allowed to employ company hardware

Your company has decided to implement an acceptable use policy that must be distributed to all users. You have been asked to write the preliminary policy to submit for management approval. What is defined in this policy? which method administrators should use to back up network data the sensitivity of company data which users require access to certain company data how users are allowed to employ company hardware

fiber optic

Your company has decided to implement either a 1000Base-LX or 1000-Base-SX network. Which type of cable should you use? UTP STP coaxial fiber optic

UC gateway

Your company has decided to implement unified communication. You have been asked to implement a VoIP network. You need to connect the VoIP network to your company's PBX. What should you implement? UC server UC gateway QoS multicast unicast DSCP

floor distributor

Your company has recently implemented a horizontal cross-connect in its data center. What is another term for this? backbone wiring main cross-connect floor distributor transition point

media converter

Your company has recently leased the office next door to the one currently being used. Both offices will be used. The current office has a Cat 6 network installed. The new office has a fiber network installed. You need to connect the networks of the two offices. Which device should you use? gateway CSU/DSU modem media converter

Some header fields have been dropped or made optional. The IP header options allow more efficient forwarding and less rigid length limits.

Your company is considering using IPv6 instead of IPv4. Which improvements does IPv6 provide over IPv4? (Choose two.) Some header fields have been dropped or made optional. Header fields have been made mandatory to reduce processing requirements. A new type of address is used to deliver a packet to a specific address node. The IP header options allow more efficient forwarding and less rigid length limits. The IP address size increased from 128 bits to 156 bits with simpler auto-configuration of addresses. The IP address size is increased from 64 bits to 128 bits with simpler auto-configuration of addresses.

server rail or sliding racks

Your company needs to purchase a rack to hold some network devices. However, the area designated to store the rack is a small closet. You are concerned with appropriate access to the devices in the rack. Which rack should you recommend? two-post racks four-post racks server rail or sliding racks stand-alone racks

Implement virtual servers and switches.

Your company owns a single physical server. You need to ensure that Web services are hosted in a Linux environment while Active Directory services are hosted in a Windows environment. In addition, you need to ensure that these services are hosted on different broadcast domains. What should you do? Implement virtual desktops and servers. Implement virtual desktops and switches. Implement virtual servers and PBXs. Implement virtual servers and switches.

Network Address Translation (NAT)

Your company uses a single global IP address that maps to the company's local IP addresses. When requests are sent from the internal network to destinations outside the company, those requests are mapped from the IP address of the local host that made the request to the global IP address. Which term describes this process? Network File System (NFS) Network Access Point (NAP) Network Access Server (NAS) Network Address Translation (NAT)

802.11a 802.11g

Your company wants to implement a WLAN. You are researching the different wireless options and want to implement the WLAN technologies that are least affected by multipath distortion. Which WLAN transmission technologies are least affected by multipath distortion? (Choose two.) Wi-Fi 802.11a 802.11b 802.11g

reserved client options

Your network contains a DHCP server. While performing routine maintenance, you discover that the DHCP server has the following types of options configured: server options, scope options, reserved client options, and class options. Which of these types of options takes precedence? server options scope options class options reserved client options

Mesh

Your network is shown in the exhibit. Which type of topology is shown? Bus Star Ring Mesh Wireless

Shielding

Your organization has both UTP and STP cabling available for wiring a new building. What is the main difference in the physical composition of these cables? Wire gauge Shielding Number of twists in the wires Separators between the wire pairs

PPTP L2TP

Your organization has decided to implement a virtual private network (VPN) to allow remote employees to access internal resources. Which two protocols are used to create VPNs over TCP/IP? (Choose two.) PPP SSL RAS PPTP L2TP

NTP

A network technician contacts you regarding what he believes is suspicious behavior on the network. He has noticed communication over TCP port 123 between his computer and a server on the Internet. Which protocol is causing this communication? FTP SSH SMTP NTP

It transmits data from multiple IP addresses.

A server on your network contains several virtual servers. However, the server contains a single NIC. Which statement MOST likely describes the communication from this server? It transmits data from multiple IP addresses. It transmits data from multiple MAC addresses. It transmits data using IPv6. It transmits data using IPv4.

Physical

As a network administrator, you decide to replace a hub on your network with an active hub. At which OSI layer does the new device function? Network Session Physical Transport

Data Link layer addresses are MAC addresses for unique identification, whereas network addresses are a Network layer component.

As a network administrator, you understand that there are many types of addresses used in networks, including Data Link layer addresses and network addresses. You need to explain to a new network technician the difference between these two types of addresses. What is the most significant difference? Data Link layer addresses use fewer bytes of memory than network addresses. Data Link layer addresses refer to logical devices, whereas network addresses refer to physical devices. Data Link layer addresses are MAC addresses for unique identification, whereas network addresses are a Network layer component. The Data Link layer address of a device is configured by the network administrator, whereas the network address is set by the IEEE.


संबंधित स्टडी सेट्स

Q/World History - Unit 6: The Age of Revolution

View Set

world religions exam (MULTIPLE CHOICE AND MATCHING ONLY)

View Set

Chapter 7 Practice Quiz Positive Organizational Behavior

View Set

ГЛАВА 32 Патофізіологія кровоносних судин (Не дороблені)

View Set