Net+ exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Simplify the following IPv6 address: 0AA0:0123:4040:0000:0000:000:000A:100B a. AA0::123:404:A:100B b. AA::123:404:A:1B c. AA0:123:4040::A:100B d. 0AA0:0123:4040::0:000A:100BSection

c. AA0:123:4040::A:100B, Breakdown: The repeating zeroes in digits 4-6 can be truncated with "::" and the leading zeroes in the 1st and 7th digits can be dropped to shorten the entire IPv6 address.

What routing protocol characteristic indicates the believably of the routing protocol? a. Weight b. Metric c. Administrative distance d. SPF algorithm

c.Administrative distance, Breakdown: The index of believability for a routing protocol is called administrative distance (AD). Lower AD values are more believable that higher values.

What kind of network is used by many cable companies to service their cable modems and contains both fiber-optic and coaxial cabling? a. Head-end b. DOCSIS c. Composite d. HFC

d. HFC, Breakdown: Hybrid Fiber-Coax (HFC) is a distribution network used by cable companies to distribute television and data to subscribers. Upstream and downstream traffic is assigned to specific frequency ranges and a cable modem is located on the subscriber's premises to send and receive data from the WAN.

Which of the following is a component that provides resources over a network? A.Client B.LAN C.Router D.Server

D.Server, Breakdown: A server provides or "serves" up resources to a network. Examples of resources are access to email, pages on a web server, or files on a file server.

A client with an IP address of 172.16.18.5/18 belongs to what network? a. 172.16.0.0/18 b. 172.16.4.0/18 c. 172.16.8.0/18 d. 172.16.16.0/18

a. 172.16.0.0/18, Breakdown: The first octet (172) indicates that this is a Class B network with a classful mask of /16. Applying this mask to the original IP address yields the 172.16.0.0./18 network.

Which are true about VLANs? (Choose all that apply.) a. A VLAN has a single broadcast domain. b. For traffic to pass between two VLANs, the traffic must be routed. c. Because a switch has a MAC address table, traffic does not need to be routed to pass between two VLANS. d. A VLAN has a single collision domain.

a. A VLAN has a single broadcast domain. b. For traffic to pass between two VLANs, the traffic must be routed. Breakdown: Like a switch, a VLAN has a single broadcast domain, however, a VLAN allows the grouping of ports on the switch into subnets with separate broadcast domains. For traffic to travel between two VLANs, that traffic must be routed. A more efficient way of connecting VLANs back to a router is to use a trunking standard such as IEEE 802.1Q.

In which range is the TCP port number for the HTTP protocol located? a. Below 1024 b. Between 1024 and 16,384 c. Above 16,384

a. Below 1024, Breakdown: The TCP port number for the HTTP protocol is in the range of the well-known TCP ports numbers (below 1024) at port 80.

What performance optimization technology uses a network appliance, which stores a copy of content sourced remotely such as from a Web server and serves up that content to local clients, thus reducing the bandwidth burden on an IP WAN? a. Content engine b. Load balancer c. LACP d. CARP

a. Content engine, Breakdown: A content engine is a network appliance that stores (caches) content from a remote source and serves the locally stored content to local clients. It reduces traffic on the WAN connection and also improves response time for content requests.

A lack of bandwidth can lead to which QoS issues? (Choose all that apply) a. Delay b. Jitter c. Prioritization d. Packet drops

a. Delay b. Jitter d. Packet drops Breakdown: A lack of bandwidth is the primary issue for most network quality problems. These issue may take the form of one or more of the following symptoms: Delay - longer time of arrival for packets sent from a source to a destination. Jitter - uneven arrival of packets. Drops - packets can get dropped if link congestion causes a router's interface queue to overflow. Subsequent retransmissions can greatly slow down data throughput.

What Microsoft Windows application allows you to view a variety of log types, including application, security, and system logs? a. Event Viewer b. Performance Monitor c. Microsoft Management Console d. Control Panel

a. Event Viewer, Breakdown: Operating systems such as Microsoft Windows also generate logs for both client and server editions of the OS. Microsoft's Event Viewer is an application that provides a graphical user interface (GUI) for viewing Windows log files. The Event Viewer allows you to view various types of logs including application, security, and system logs. Some of the information it provides are time stamps, severity levels, source of the event, and a detailed description of the event which sometimes includes an error code(s).

What are some of the common sources of wireless network radio frequency interference (RFI)? (Choose all that apply) a. Game consoles b. 900 MHz cordless phones c. Microwave ovens d. Baby monitors

a. Game consoles c. Microwave ovens d. Baby monitors Breakdown: Many electronic devices emit signals that overlap with the 2.4-GHz WLAN band and all of the devices listed above, with the exception of the 900 MHz cordless phone can potentially interfere with a 2.4-GHz WLAN. Though not immune, a 5-GHz WLAN is further separated from common sources of RFI.

Which of the network components below is purely physical (has no intelligence in the form of an embedded processing)? a. Hub b. Router c. Switch d. Server

a. Hub, Breakdown: A hub is an older technology that interconnects network components such as clients, servers, and printers. It operates purely at the physical level using electricity and is "dumb" in that it doesn't run software instructions.

What multicast protocol is used between clients and routers to let routers know which of their interfaces are connected to a multicast receiver? a. IGMP b. PIM-DM c. PIM-SM d. SPT switchover

a. IGMP, Breakdown: Internet Group Management Procol (IGMP) is the protocol used between clients and routers to let routers know which of their interfaces have multicast receivers attached. Protocols such as PIM, PIM-DM, and PIM-SM are multicast routing protocols that route multicast traffic between multicast-enabled routers.

What are some of the advantages of a peer-to-peer network when compared with a client-server network? a. Less Expensive b. Simplified administration c. More scalable d. Better performance

a. Less Expensive, Breakdown: A peer-to-peer network is less expensive to setup than a client-server network since it relies on lower cost computers and doesn't require special server or network operating system software. The lower cost is traded off for more complex administration, decreased performance, and lower scalability when compared to a client-server network.

What Ethernet switch feature allows a port to automatically determine which leads are for transmitting data and which are for receiving data? a. MDIX b. STP c. LAPD d. UTP

a. MDIX, Breakdown: Some Ethernet switchessupport medium dependent interface crossover (MDIX), which allows a switch port to properly configure its leads as transmit (Tx) or receive (Rx) leads. It is then possible to interconnect such switches with a straight-through cable as opposed to a crossover cable.

Which of the following comprise a simplified troubleshooting flow? (Choose all that apply) a. Problem report b. Problem deferral c. Problem diagnosis d. Problem resolution

a. Problem report c. Problem diagnosis d. Problem resolution Breakdown: The basic steps in network troubleshooting are as follows: Problem report - user submits a trouble ticket for a problem and admin collects additional information in order to fully define the nature of the problem before proceeding to the next step. Problem diagnosis - hypotheses are developed as to the cause of the problem and then subsequently logically tested to see if they hold up to scrutiny. Problem resolution - a procedure is devised for resolving the problem. The resolution itself may need to be postponed for off-hours in order to minimize a disruption to business activities. A temporary fix or workaround may need to be implemented until the actual repair can be made.

What type of delay is the amount of time required for a packet to exit a router's serial interface? a. Serialization delay b. Packetization delay c. Propagation delay d. Queuing delay

a. Serialization delay, Breakdown: LFI addresses the issue of serialization delay, which is the amount of time required for a packet to exit an interface. A technique for reducing the delay of voice data on a slower-speed link is to interleave voice packets with fragments of larger data packets in order to improve the effective throughput of voice data over the link.

Which detection methods are commonly used by IPS sensors? (Choose all that apply) a. Signature-based b. Distribution-based c. Policy-based d. Behavior-based

a. Signature-based c. Policy-based d. Behavior-based Breakdown: An Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) are technologies that are often able to recognize an attack and respond appropriately. These systems utilize three main mechanisms for identifying attacks: Signature-based - potential attacks are identified by examining the bytes within data packets and comparing data sequences with stored sequences associated with known attacks. Policy-based - network traffic is checked against manually-configure security policies to look for suspicious traffic. Anomaly-based or behavior-based - a baseline of normal traffic patterns is established and significant variations from baseline are flagged as anomalous.

What is the best practice for preventing accidental damage to the sensitive components on a circuit board due to static from your body? a. Wear an ESD wrist strap. b. Apply antistatic spray to the circuit board. c. Ground the circuit board d. Stand on a carpeted floor (or a rug) when working on a circuit board to provide insulation between your body and an electric ground potential.

a. Wear an ESD wrist strap, Breakdown: The static that accumulates on your body, especially under dry air conditions such as during the winter months, isn't enough to harm you (just a few milliamps), however, it's often enough to damage sensitive solid state components on a circuit board that you may be handling. As a precaution, you should wear an electrostatic discharge (ESD) wrist strap. The strap is equipped with a clip that you attach to something with ground potential such as a metal desk or metal button that is wired to a grounding point. This will channel any electrostatic discharge produced on your body to the grounding point and away from the circuit board.

Which of the following routing protocols is an EGP? a. BGP b. IS-IS c. RIP d. OSPF

a.BGP, Breakdown: Border Gateway Protocol is used to exchange routing information between the service provider's autonomous system (AS) and each of the other autonomous systems. BGP is the only EGP in widespread use today and is considered to be the routing protocol that runs the Internet.

Which of the following are dynamic methods for assigning IP addresses to networked devices? a. BOOTP b. APIPA c. Zeroconf d. DHCP

a.BOOTP and d.DHCP, Breakdown: Both BOOTP and DHCP involve a broadcast from an attached network device to request an IP address. BOOTP is an obsolete protocol that relied on mapping the MAC address of a device to an IP address. DHCP is a more robust solution that has a wide variety of options beyond basic IP address, subnet mask, and default gateway parameters.

What is the class of IP address 10.1.2.3? a. Class A b. Class B c. Class C d. Class D

a.Class A, Breakdown: Class A IP addresses are in the range of 10.0.0.0-10.255.255.255

Which command line switch for the arp command displays whether the arp table entry was dynamically learned or statically configured? a. -v b. -a c. -d d. -s

b. -a, The -a switch for the Windows arp command shows what MAC addresses have been learned for the listed IP addresses. The dynamically learned addresses display dynamic under the Type column, while statically configured addresses are listed as static under the Type column.

What is the binary representation of the decimal number 117? a. 10110101 b. 01110101 c. 10110110 d. 01101001

b. 01110101, Breakdown: 2^6 + 2^5 + 2^4 + 2^2 + 2^0 = 64 + 32 + 16 + 4 + 1 = 117

When using the 2.4-GHz band for multiple access points in a WLAN located in the United States, which nonoverlapping channels should you select? (Choose all available channels) a. 0 b. 1 c. 5 d. 6 e. 10 f. 11 g. 14

b. 1 d. 6 f. 11 Breakdown: For the 2.4-GHz band, channel frequencies are separated by 5 MHz, but a single channel's transmission can spread over a frequency range of 22 MHz. As a result, channels must have five channels of separation (5 * 5 MHz = 25 MHz, which is great than 22 MHz). In the US, you could select nonoverlapping channels of 1, 6, and 11. Channel 14 is a nonoverlapping channel, but is not supported in the US.

What percentage of overlap is recommended for adjacent to cells in order to prevent connection dropping as a user roams when extending the range of a 2.4-GHz WLAN? a. 5-10 percent b. 10-15 percent c. 15-20 percent d. 2-25 percent

b. 10-15 percent, Breakdown: Nonoverlapping channels in a 2.4-GHz WLAN can overlap their coverage area in order to provide seamless roaming between AP coverage areas. It is commonly recommended to have a 10-15 percent overlap of coverage between adjoining cells.

RTP header compression can compress the combined Layer 3 and Layer 4 headers from 40 bytes down to how many bytes? a. 1-3 bytes b. 2-4 bytes c. 3-5 bytes d. 4-6 bytes

b. 2-4 bytes, Breakdown: RTP header compression (cRTP) can take Layer 3 and Layer 4 headers and compress them down to only 2 or 4 bytes in order to make better use of bandwidth on slower-speed links. This is part of the link fragmentation and interleaving (LFI) process.

How big is the payload portion of an ATM cell? a. 5 bytes b. 48 bytes c. 53 bytes d. 64 bytes

b. 48 bytes, Breakdown: An ATM cell contains a 48-byte payload and a 5-byte header. This payload size is the result of a compromise between the countries that participated in developing the international standard for ATM.

Which device on a IEEE 802.1X is responsible for checking the credentials of a device seeking to gain access to the network? a. Supplicant b. Authentication server c. Access point d. Authenticator

b. Authentication server, Breakdown: The authentication server is a network component that runs a particular authentication protocol such as RADIUS and checks the supplicant's (device wishing network access) against a database of stored credentials. The authentication server also provides the authenticator (switch) with an authenticator key that is used to securely transmit data between the client and the switch using some form of data encryption.

What technology do WLANs use to determine when they can gain access to the wireless media? a. SPF b. CSMA/CA c. RSTP d. DUAL

b. CSMA/CA, Breakdown: WLANs use a similar technology to CSMA/CD used for Ehternet called Carrier Sense Multiple Access Collision Avoidance (CSMA/CA). Due to the half-duplex nature of WLANs like with Ethernet, devices only transmit in one direction at a time and must wait until the media is clear. A WLAN listens for a transmission to determine if it is safe to transmit. A collision avoidance algorithm causes wireless devices to wait for a random backoff time before transmitting.

Which of the following categories of UTP cabling are suitable are 1000BASE-T networks? (Choose all that apply) a. Cat 5 b. Cat 5e c. Cat 6 d. Cat 6e

b. Cat 5e c. Cat 6 Breakdown: The reduced crosstalk and higher data capacity of Cat 5e and Cat 6 cabling make them suitable choices for 1000BASE-T networks.

ISDN is considered to be what type of WAN connection? a. Dedicated leased line b. Circuit-switched connection c. Packet-switched connection d. Cell-switched connection

b. Circuit-switched connection, Breakdown: ISDN provides periodic connectivity to customers using a circuit-switched connection very much like placing a phone call.

What are the possible benefits of a proxy server? (Choose all that apply). a. Load balancing b. Content filtering c. Data caching d. Security

b. Content filtering c. Data caching d. Security Breakdown: A proxy server is a specialized network device that sits between clients and the external network (Internet). It can cache frequently requested content to improve performance, security by hiding internal IP addresses from the outside network, and filtering content in order to block access to internal users to unauthorized sites based on corporate policies.

Which WLAN transmission method achieves enhanced security where participants hop over a range of predetermined frequencies? a. DSSS b. FHSS c. OFDM d. MIMO

b. FHSS, Breakdown: Frequency-hopping spread spectrum (FHSS) allows participants on a wireless network to "hop" between predetermined frequencies for their communications. This enhances security since participants can predict the next frequency to be used while this is very difficult for a third party to predict. FHSS can also provision extra bandwidth by simultaneously using more than one frequency. FHSS is not in common use today and DSSS and OFDM are now the prominent technologies.

When a PC on an Ethernet network attempts to communicate with a host on a different subnet, what destination IP address and destination MAC address are placed in the packet/frame header transmitted by the client PC? a. IP address of the default gateway and MAC address of the default gateway. b. IP address of the remote host and MAC address of the default gateway. c. IP address of the remote host and the MAC address of the remote host. d. IP address of the remote host and the MAC address of the local PC.

b. IP address of the remote host and MAC address of the default gateway., Breakdown: IP address of the remote host and MAC address of the default gateway.

Which of the following WAN technologies commonly use UTP cabling? (Choose all that apply) a. Cable modem b. ISDN c. DSL modem d. POTS dial-up modem

b. ISDN c. DSL modem d. POTS dial-up modem Breakdown: ISDN, DSL, and POTS cabling all use UTP. Coaxial cable is used to connect a cable modem to the WAN interface.

If you can successfully ping from host A to host B, what can you conclude about host A? a. Its OSI Layers 1-4 are functional. b. Its OSI Layers 1-3 are functional. c. Its OSI Layers 1-7 are functional. d. You can only conclude that ICMP traffic can reach host B.

b. Its OSI Layers 1-3 are functional, Breakdown: For IP-based networks, the network layer (Layer 3) is a good place to begin troubleshooting. If pings are successful, which use the Layer 4 ICMP protocol, you can assume the Layers 1-3 are operational even if one or more Layer 4 protocols are having issues.

Which two statements are true with regards to a Hub-and-Spoke topology? a. Lower cost and high redundancy b. Lower cost and easy to add remote sites c. Higher cost and lower redundancy d. Lower cost and remote sites directly connected

b. Lower cost and easy to add remote sites, Breakdown: Since remote sites are not directly connected to one another, lower cost is achieved using fewer WAN links. Adding a remote site is as simple as establishing a new WAN link between the remote site and the hub. This reduced cost and simplicity comes at the cost of suboptimal routes and a single point of failure situated at the hub.

In the absence of STP, what issue(s) might cause a Layer 2 loop to exist in a network? (Choose all that apply) a. A router interface's MTU decrementing b. MAC address table corruption c. Broadcast storms d. Packet fragmentation

b. MAC address table corruption c. Broadcast storms Breakdown: Layer 2 loops can be caused in a network from either MAC address table corruption or from broadcast storms. These loops can greatly degrade network performance and even affect its availability. A mechanism to mitigate Layer 2 loops is the use of Spanning Tree Protocol (STP), however, STP can fail or perform suboptimally. Therefore, STP is something that should be examined when troubleshooting Layer 2 loops if it's implemented on switches on the network.

What is the object structure called that SNMP uses to collect information about a managed device? a. RIB b. MIB c. DUAL d. LSA

b. MIB, Breakdown: Simple Network Management Protocol (SNMP) maintains information about managed devices in a series of data objects. The structure of these objects is defined by a managed device's Management Information Base (MIB).

Which type of cable would you choose for installation in a drop ceiling that is used as an open air return duct? a. Riser b. Plenum c. Multimode d. Twin-axial

b. Plenum, Breakdown: The location of cable sometimes requires adherence to fire codes, where in the event of fire, toxic fumes could be spread throughout a building. Plenum grade cabling is manufactured to be fire retardant, and in some cases, uses a low-smoke PVC insulation to minimize the emission of dangerous fumes.

Which of these QoS mechanisms are considered to be an IntServ mechanism. (Choose all that apply) a. LLQ b. RSVP c. RED d. cRTP

b. RSVP Breakdown: IntServ is often referred to as a hard QoS since its bandwidth reservations are strict and must be configured on every router. Resource Reservation Protocol (RSVP) is an example of an IntServ approach to QoS.

Which protocols are most commonly use to provide security for an HTTPS connection? (Choose all that apply) a. L2TP b. SSL c. PPTP d. TLS

b. SSL d. TLS Breakdown: A secure Web browsing connection is provided by Hypertext Transfer Protocol Secure (HTTPS). Two security protocols can be used for this secure connection: Secure Sockets Layer (SSL) or Transport Layer Security (TLS). TSL has largely replace SSL as the VPN protocol of choice for providing encryption and reliability to upper layers of the OSI model. In most cases, when you securely connect to a website these days using HTTPS, you are using TLS.

What feature allows a firewall to permit traffic to flow from a trusted network (e.g. corporate intranet) to an untrusted network (e.g. Internet) and then allow return traffic for that same session while blocking sessions originating from the untrusted network? a. Packet filtering b. Stateful inspection c. Demilitarized zone d. Implicit deny all instruction

b. Stateful inspection, Breakdown: A stateful firewall inspects traffic leaving and entering a private network and keeps track of sessions via source and destination IP addresses and port numbers. This method of stateful inspection is used by such a firewall to allow traffic from the inside network to exit and returning traffic for the same session to enter the inside network. A stateful firewall offers more flexibility than a packet-filtering firewall.

Which of the following protocols is a connectionless transport layer protocol? a. IP b. UDP c. TCP d. 802.11g

b. UDP, Breakdown: User Datagram Protocol (UDP) is a connectionless transport protocol. It is an unreliable transport protocol meaning that if a segment is dropped, the sender is unaware and no retransmission occurs.

Which Windows command is used to display NetBIOS over TCP/IP information? a. route b. nbtstat c. dig d. netstat

b. nbtstat, Breakdown: The nbtstat command displays NetBIOS information for IP-based networks. The nbt prefix of the command refers to NetBIOS over TCP/IP, which is called NBT or NetBT. This command can display a listing of NetBIOS device names learned by a Windows PC.

Which of the following commands would you issue on a UNIX host to send five ICMP echo messages to a device with an IP address of 10.1.1.1? a. ping 10.1.1.1 b. ping -c 5 10.1.1.1. c. ping -t 5 10.1.1.1 d. ping 10.1.1.1 -t 5

b. ping -c 5 10.1.1.1., Breakdown: The UNIX ping command performs the same basic function as its counterpart under Windows, however, the UNIX ping command sends continuous pings as opposed to the Windows default of four. You can use the -c command switch followed by a count follow to limit the number of pings issued to the destination target.

What is the maximum amount of power a switch is allowed to provide over any one port as specified by the IEEE 802.3af standard for PoE? a. 7.7 W b. 15.4 W c. 26.4 W d. 32.4 W

b.15.4 W, Breakdown: The IEEE 803.af standard can supply a maximum of 15.4 W of power over each switch port in order to power attached devices. The newer IEEE 802.3at standard can supply as much as 32.4 W, thus offering the ability to power a wider range of devices.

What NAT variation automatically assigns an inside global address to a device on the private network from a pool of available addresses? a. SNAT b. DNAT c. PAT d. GNAT

b.DNAT, Breakdown: Dynamic NAT (DNAT) automatically assigns inside global IP addresses from a pool of addresses as opposed to Static NAT (SNAT) where manual (static) assignment is performed.

On a network running STP, what is the port within each segment that is closest to the root bridge (in terms of cost) called? a. Root b. Designated c. Non-designated d. Non-root

b.Designated, Breakdown: Every network segment has a single designated port, which is the port on that segment that is closest to the root bridge, in terms of cost. Therefore, all ports on a root bridge are designated ports.

A peer-to-peer network requires that all connected computers be running the same OS in order to share resources? a. True b. False

b.False, Though it's much easier to setup and configure peer-to-peer resource sharing between computers running the same OS, it is possible to install software to enable sharing between computers running different types of operating systems such as Windows and Mac.

How many broadcast domains does a 12-port switch have? a. None b. One c. Two d. Twelve

b.One, Breakdown: A switch is a layer 2 device with a single broadcast domain.

Which are features of distance-vector routing protocols that are used to prevent routing loops? a. Reverse path forwarding (RPF) check b. Split horizon c. Poison reverse d. Rendezvous point

b.Split horizon and c.Poison reverse, Split horizon: The split horizon feature prevents a route learned on one interface from being advertised back out of that same interface. Poison reverse: The poison reverse feature causes a route received on one interface to be advertised back out of that same interface with a metric considered to be infinite.

Which network infrastructure device primarily makes forwarding decisions based on MAC addresses? a. Router b. Switch c. Hub d. Multilayer switch

b.Switch, Breakdown: A switch is able to dynamically learn the MAC addresses of the devices attached to its ports. It maintains these addresses in a MAC address table. Subsequent segments are then transmitted only to the port associated with the MAC address contained in the segment.

What NAT IP address is a public address that references an inside device? a. Inside local b. Inside global c. Outside local d. Outside global

b.inside global, Breakdown: An inside global address is a public IP address that references an inside device such as an email or Web server.

One error occurred during the transmission of 8 bits. What is the BER? a. .0125 b. .025 c. .125 d. .25

c. .125, Breakdown: BER = 1 / 8 = .125

To what subnet does a host with an IP address of 172.16.155.10/18 belong? a. 172.16.0.0/18 b. 172.16.96.0/18 c. 172.16.128.0/18 d. 172.16.154.0/18

c. 172.16.128.0/18, Breakdown: The interesting octet for a 18-bit subnet mask is the third octet: 11111111.11111111.11000000.00000000, which can be also written as 255.255.192.0. The decimal value of the third octet in the subnet mask is 192. Therefore, the block size is 64 (256 - 192 = 64). The subnets are then as follows: 172.16.0.0/18 172.16.64.0/18 172.16.128.0/18 172.16.192.0/18 The IP address 172.16.155.10/18 therefor belongs to the 172.16.128.0/18 subnet.

How many channels on an E1 circuit are available for voice, video, or data? a. 23 b. 24 c. 30 d. 32

c. 30, Breakdown: An E1 circuit contains 32 channels, but only 30 can transmit data (or voice or video). Channel 1 is reserved for framing and synchronization and channel 17 is reserved for signaling (call setup, maintenance, and tear down). E1 circuits are popular outside of North America and Japan.

Which is a symmetric encryption algorithm available in 128-bit, 192-bit, and 256-bit key versions? a. RSA b. 3DES c. AES d. TKIP

c. AES, Breakdown: Advanced Encryption Standard (AES) is the most secure of the three primary symmetric encryption algorithms and is available in 128-bit, 192-bit, and 256-bit key versions.

What mode of NIC redundancy has only one NIC active at a time? a. Publisher-subscriber b. Client-server c. Active-standby d. Active-subscriber

c. Active-standby, Breakdown: Active-standby is the method where only one NIC is active at a time. This approach allows the client to appear to have a single MAC address and IP address even in the event of a NIC failure. Because of added expense, NIC redundancy is most often utilized in strategic network hosts rather than in end-user client computers.

Which layer of the OSI reference model is responsible for providing email services? a. Physical layer b. Transport layer c. Application layer d. Network layer

c. Application layer, Breakdown: The application layer of the OSI reference model for providing application services such as email and file sharing. Note: do not confuse software applications such as Microsoft Outlook with application services.

Which approach to bandwidth usage on a network utilizes all available frequencies on a medium for data transmission? a. Broadband b. Time-division multiplexing c. Baseband d. Simplex

c. Baseband, Breakdown: Baseband bandwidth usage utilizes all available frequencies on the wire. Ethernet is an example of a baseband technology. Broadband, on the other hand, divides up the medium into separate channels of different frequencies for the transmission of various kinds of information such as voice and data.

Which device allows traffic to enter and exit a private corporate network? a. VPN Concentrator b. DHCP Server c. Firewall d. Proxy Server

c. Firewall, Breakdown: A firewall allows traffic to enter and exit a private network using various strategies such as packet inspection or security rules.

What Layer 4 protocol is used by the ping command? a. IGMP b. PIM c. ICMP d. RTP

c. ICMP, Breakdown: The ping command uses Internet Control Message Protocol (ICMP), which is a Layer 4 protocol. The ping command directs the PC to send an ICMP echo message to the specified destination host. If the destination host is reachable, then it responds with an ICMP echo reply message. Other ICMP messages can also be returned.

What type of authentication is said to be in use if users are not required to provide any credentials to associate with a wireless AP in order to access the WLAN? a. WEP b. SSID c. Open d. IV

c. Open, Breakdown: A WLAN that does not require any authentication or provide any encryption for wireless devices is said to be using open authentication. Publicly available WLANs such as those found in airports and coffee shops often use open authentication. This type of authentication is often exploited by hackers who set up open access points to trick users into connecting to them. From there, they employ packet sniffing software to steal credentials and other personal information from unsuspecting victims.

Which PPP authentication method provides one-way authentication and sends credentials in clear text? a. WEP b. MS-CHAP c. PAP d. CHAP

c. PAP, Breakdown: Password Authentication Protocol (PAP) performs one-way authentication between a client and server. Since the client's credentials are sent in clear text, it presents a security vulnerability in the event of eavesdroppers listening in.

In a basic WLAN topology, how do connected clients on the network obtain IP addresses? a. DHCP b. BOOTP c. PAT d. Statically configured on client

c. PAT, Breakdown: On a WLAN, the router obtains an IP address via DHCP from the ISP. The router then uses Port Address Translation (PAT) to provide IP addresses to devices attaching to it either wirelessly or through a wired connection.

You want to monitor traffic between two ports on a switch with a laptop running the Wireshark packet sniffing software connected to a third port. What feature on the switch would you enable to allow you to monitor the traffic between the other two ports? a. Port interception b. Port duplexing c. Port mirroring d. Port redirect

c. Port mirroring, Breakdown: The port mirroring feature on supported switches allows traffic passing between ports to be "mirrored" out another port for diagnostic purposes.

What piece of equipment would you use to examine the headers of Ethernet packets being transmitted from a device attached to a network? a. OTDR b. Multimeter c. Protocol analyzer d. Butt set

c. Protocol analyzer, Breakdown: A protocol analyzer or network sniffer can be used to examine details of the packets traversing a network. A protocol analyzer can be either a standalone device or a software application running on a PC or laptop. By examining captured packets, a network administrator can gain valuable insights about the nature of the traffic on the network.

Your company has been assigned the following network: 192.168.30.0/24. Come up with a subnet mask that will accommodate seven subnets while also accommodating the maximum number of hosts per subnet. a. /24 b. /26 c. /27 d. /28

c./27, Breakdown: To achieve 7 subnets the number of borrowed bits must be greater than 2 (2^2 = 4), hence 2^3 = 8. The network is a class C making the classful mask: /24. Hence, 24 + 3 gives us a subnet mask of /27. The number of hosts per subnet are: 2^3 - 2 = 6.

What is the prefix notation for a subnet mask of 255.255.255.240? a. /20 b. /24 c. /28 d. /29

c./28, Breakdown: The subnet mask for 255.255.255 has the following prefix notation /24. The remaining contiguous left justified ones is 4. The resulting prefix notation is then /24 + /4 = /28.

Which of the following network geographies would you expect to see deployed to connect the LANs of multiple office buildings within an industrial park? a. MAN b. PAN c. CAN d. WAN

c.CAN, Breakdown: A Campus Area Network (CAN) is the most appropriate network category to implement when connecting together geographically close LANs.

What option would you specify after the ipconfig command to display a Windows PC's DNS server's IP address? a. No option is needed because the ipconfig command displays DNS server information by default. b. /full c. /fqdn d. /all

d. /all, Breakdown: The ipconfig command entered by itself displays a summary of a PC's IP address configuration. The /all option gives more verbose information including the DNS and WINS server IP addresses among other additional information beyond the default command.

Which Ethernet implementation uses UTP? a. IEEE 802.3 b. 10BASE5 c. 10BASE2 d. 10BASE-T

d. 10BASE-T, Breakdown: 10BASE-T is a 10-Mbps implementation of Ethernet that relied on UTP cabling. 10BASE5 and 10BASE2 used different thicknesses of coaxial cable ("thicknet" and "thinnet" or "cheapernet" respectively). IEEE-802.3 is the overall standard for Ethernet that includes all implementations.

What is the maximum recommended one-way delay for voice traffic? a. 25 ms b. 75 ms c. 125 ms d. 150 ms

d. 150 ms, Breakdown: When implementing a QoS policy it's important to determine the network performance requirements for various traffic types. For voice traffic the following requirements are recommended: no more than 150 ms of one-way delay; no more than 30 ms of jitter; and no more than 1 percent packet loss. These minimums are required in order to ensure that voice communications always remain intelligible.

What is the size of an MPLS header? a. 4 bits b. 8 bits c. 16 bits d. 32 bits

d. 32 bits, Breakdown: Multiprotocol Label Switching (MPLS) inserts a 32-bit header between Layer 2 and Layer 3 headers. This is known as a shim header. Because this header resides between Layers 2 and 3, MPLS is considered to be a Layer 2 1/2 technology.

Which best describes the windowing flow control service? a. A buffering technique where a chunk of memory is allocated to store segments when bandwidth is not sufficient to transmit all of the segments. b. An application layer service that allows connected clients to remotely run Microsoft Windows. c. A network layer protocol that restricts data delivery based on IP address. d. A transport layer flow control service that exponentially increases the number of segments transmitted for each successfully acknowledged transmission reception.

d. A transport layer flow control service that exponentially increases the number of segments transmitted for each successfully acknowledged transmission reception. Breakdown: Windowing is a dynamic form of flow control implemented at the transport layer. The window is reset if an acknowledgement is not received with the specified timeout period (RTT).

When a router drops a packet exceeding a router interface's MTU size when that packet has its "do not fragment" bit set is called what? a. Route reflector b. Null hop c. Zero-point router d. Black-hole router

d. Black-hole router, Breakdown: The router interface parameter maximum transmission unit (MTU) defines the largest packet size the interface will forward. If a packet exceeds the the MTU, then the router attempts to fragment the packet. In the case where the packet has its don't fragment (DF) bit set, then the router will drop the packet. Typically, the router sends a response to the sender with an ICMP message indicating why the packet was dropped, however, in the case where the router is configured to not response to such a condition, then the packet is dropped without notifying the sender. Such a router is called a black-hole router. The traceroute utility can assist locating a black-hole router.

What piece of test equipment can be used to test the throughput of a Cat 5 cable? a. OTDR b. Multimeter c. BERT d. Cable certifier

d. Cable certifier, Breakdown: If you are working with existing cable and wish to determine it category (e.g. Cat 3, Cat 5, etc.) or if you would like to test the supported frequency range of a cable, then you can use a cable certifier.

In what type of attack does an attacker compromise multiple systems and then instruct those compromised systems (zombies) to simultaneously flood a target system with traffic? a. DoS b. TCP SYN flood c. Buffer overflow d. DDos

d. DDos, Breakdown: A distributed denial of service attack is a DoS attack that organizes a large collection of infected computers often referred to as zombies or bots into an ad hoc network referred to as a botnet. The attacker then can remotely command the bots to flood a target device with bogus traffic in the form of a TCP SYN flood or the "ping of death" or other form of availability attack.

Which of the following should be the most likely first step in a structured network troubleshooting methodology? a. Hypothesize the probably cause. b. Create an action plan. c. Create a port-mortem report. d. Define the problem.

d. Define the problem., Breakdown: A structured approach to network troubleshooting should begin with fully defining the problem. Only once the reported problem is defined as completely as possible from interviewing users, observing the problem, and using any other means available to characterize the nature of the problem, is it advisable to proceed with the next steps in the troubleshooting process.

When two devices simultaneously transmit data on an Ethernet network and a collision is detected, what happens? a. Each device compares the other device's priority value (determined by IP address) with its won and the device with the highest priority attempts to resend its data first. b. Each device waits for a clear to send (CTS) sign from the switch before resending its data. c. Each device randomly picks a priority value and the device choosing the highest value resends its data first. d. Each devices sets a random back off timer and the device will attempt to resend its data after its timer expires.

d. Each devices sets a random back off timer and the device will attempt to resend its data after its timer expires. Breakdown: Each devices sets a random back off timer and the device will attempt to resend its data after its timer expires.

Which of the following are the four layers of the TCP/IP stack? a. Network Interface, Internet, Session, Application b. Physical, Internet, Transport, Application c. Network Interface, Datalink, Presentation, Application d. Network Interface, Internet, Transport, Application

d. Network Interface, Internet, Transport, Application

What type of WLAN antenna radiates relatively equal power in all directions? a. Unidirectional b. Yagi c. Parabolic d. Omnidirectional

d. Omnidirectional, Breakdown: An omnidirectional antenna radiates power at relatively equal power levels in all directions, which is somewhat similar to the theoretical isotropic antenna. It is typically deployed in small office/home office (SOHO) locations. Conversely, an unidirectional antenna focuses power in a specific direction in order to avoid potential interference and is often used to connect WLANs between two nearby buildings.

A network that connects a wireless headset to a PC using Bluetooth is considered what type of network? a. WAN b. CAN c. MAN d. PAN

d. PAN, Breakdown: A Personal Area Network (PAN) is a network with a very small scale (smaller than a LAN). It's range is typically limited to just a few meters. In the case above, a Bluetooth connection (wireless) is more specifically referred to as a WPAN.

Which network topology offers both an optimal route between selected sites as well as avoiding the expense of interconnecting every site to every other site? a. Full mesh b. Hub and spoke c. Bus d. Partial mesh

d. Partial mesh, Breakdown: A partial mesh topology combines the advantages of redundancy and lower cost by optimizing routes between sites with higher intersite traffic. While not as fault-tolerant as a full mesh topology or as inexpensive as a hub-and-spoke topology, it's a reasonable compromise to consider under appropriate circumstances and requirements.

What application would you use to verify the security of a network and also check for any weaknesses? a. Honey pot b. Posture monitor c. Profile scanner d. Vulnerability scanner

d. Vulnerability scanner, Breakdown: It's vital that the network security solution of a deployed network be checked on a periodic basis to verify that things work as expected and to also identify and secure any discovered weaknesses. Applications known as security scanners are used for this purpose. Two such applications are Nessus and Nmap. These scanners employ many of the same scanning features that attackers utilize in order to discover network vulnerabilities.

What standard developed by the Wi-Fi Alliance implements the requirements of IEEE 802.11i? a. TKIP b. MIC c. WEP d. WPA2

d. WPA2, Breakdown: In 2004, the IEEE 802.11i standard was approved requiring stronger algorithms for encryption and integrity checking than those previously used in the WEP and WPA security protocols. These enhanced requirements are implemented in the Wi-Fi Alliance's WPA version 2 (WPA2) security standard.

A notification that a specific operation failed to complete successfully is classified as what syslog severity level? a. Informational (1) b. Critical (2) c. Errors (5) d. Warnings (4)

d. Warnings (4), Breakdown: Many network devices such as servers, routers, switches, etc. can send their log information to a common syslog server. By maintaining logs from multiple devices in a common log, network admins can better correlate events occurring on one device with events occurring on another by examining time stamps. Events are categorized by severity levels. An event with a severity level set to warning such as an operation failing to complete successfully is worth taking note of but generally does not threaten the availability of the network such as a higher severity level event would.

What would you type at a UNIX command prompt to display detailed help for the UNIX host command? a. host help b. host /? c. manual host d. man host

d. man host, Breakdown: One of the benefits of UNIX is its extensive syntax reference in the form of manual pages (man pages). Detailed help for any command can be invoked with the following syntax: HOST# man [command]

Which command is used on a UNIX host to display information about each router hop along the path from a source to a destination? a. ping -t b. tracert c. ping -r d. traceroute

d. traceroute, Breakdown: On UNIX systems the traceroute command is the equivalent of the tracert Windows command. It can help isolate which router hop along the path from a source to a destination is having issues. In addition, based on the round-trip response time reported for each hop, it can help isolate which network segment might be causing excessive delay due to congestion.

What is the network address and subnet mask of a default route? a. 255.255.255.255/32 b. 0.0.0.0/32 c. 255.255.255.255/0 d. 0.0.0.0/0

d.0.0.0.0/0, Breakdown: The default fault route is a statically configured route.

What is the decimal representation for this binary number: 10110100? a. 114 b. 190 c. 172 d. 180

d.180, Breakdown: 2^7 + 2^5 + 2^4 + 2^2 = 128 + 32 + 16 + 4 = 180

How many broadcast domains does a 12-port router have? a. None b. One c. Two d. Twelve

d.twelve, Breakdown: A router has a separate broadcast and collision domain for each port.


संबंधित स्टडी सेट्स

Management Chapter 6 - Strategic Planning

View Set

Chapter 6, Values, Ethics, and Advocacy

View Set

Chapter 12 Planning Nutritious Meals and Snacks (working with young children)

View Set

The Right of Survivorship Among Co-Owners (ch49)

View Set

Managerial Accounting: Chapter 6

View Set

Organizational Behavior Final Exam

View Set