Net+ exam 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which type of network establishes a dedicated physical connection between two hosts who need to communicate on the network, not allowing any other host to use the medium until the communication is complete?

Circuit-switched

You manage a network with a single switch. On each switch port, a hub connects multiple devices to the switch. which condition are you most likely to experience on the network?

Collisions

You have decided to implement a remote access solution that uses multiple access servers. You want to implement RADIUS to centralize remote access authentication and authorization. Which of the following would be a required part of your configuration?

Configure the remote access servers as RADIUS clients.

You want to create a loopback plug using a single RJ-45 connector. How should you connect the wires in the connector?

Connect pin 1 to pin 3 and pin 2 to pin 6.

You have a web site that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware and not just a software configuration. In addition, SSL sessions should use the hardware components in the device to create the SSL sessions. Which type of device should you choose?

Content switch

Which of the following applications typically use 802.1x authentication?

Controlling access through a switch. Controlling access through a wireless access point.

A user reports that she can't connect to the internet. After some investigation, you find that the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point. What should you do next?

Create an action plan

You have decided to implement Gigabit Ethernet on your network. Each switch port is connected to a single device. Following the installation, you find one device connected to a switch that is only running at 100 Mbps. Which of the following are likely causes?

Crosstalk

Which of the following internet connection technologies requires that the location be within a limited distance of the telephone company central office?

DSL

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would you most likely need to change?

Default gateway

Which of the following best describes the concept of a virtual LAN?

Devices on the same network logically grouped as if they were on separate networks.

You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of a broadcast storm?

Enable spanning tree on the switches.

Which of the following devices accepts incoming client requests and distributes those requests to specific servers?

Load balancer

You have a web server on your network that hosts the public web site for your company. You want to make sure that the web site will continue to be available even if a NIC, hard drive, or other problem prevents the server from responding. Which solution?

Load balancing

You manage a server that runs your company web site. The web server has reached its capacity and the number of client requests is greater than the server can handle. You would like to find a solution so that a second server can respond to requests for web site content. What should you implement?

Load balancing

You have a Web site that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted. Which tool should you use?

Load tester

Which of the following do switches and wireless access points use to control access through the device?

MAC filtering

Which of the following technologies uses variable-length packets and adds labels to packets as they enter the WAN cloud, with the labels being used to switch packets and prioritize traffic?

MLPS

Capturing packets as they travel from one host to another with the intent of altering the contents of the packets is a form of which security concern?

Man-in-the-middle attack

Which of the following best describes the condition where a signal sent on one wire received on another wire within the same connector?

NEXT

QoS provides which of the following on a network?

Reduces latency of time-sensitive traffic.

You need to find out what kid of laws might apply to the design and operation of your network. Which type of document would you consult?

Regulation

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need?

Remote access

You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat 6e cable to connect the wiring closet to the shipping building. Which of the following should you include in your plan?

Repeater

Which of the following solutions would you implement to eliminate switching loops?

Spanning tree

You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support?

Spanning tree

Which of the following documents would likely identify that drop cables on your network use the T568A standard?

Wiring schematic

Which type of documentation would you consult to find the location of RJ-45 wall jacks and their endpoints in the intermediate distribution closet?

Wiring schematic

You are troubleshooting a workstation connection to the network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update?

Wiring schematic

You are troubleshooting the connection of a computer in an office to the punchdown block in the distribution closet. Which document would you consult to identify the termination of the cable on the punchdown block based on the wall jack location in the office?

Wiring schematic

Which TCP/IP utility gives you the following output? Ethernet adapter Local Area Connect: Connection-specific DNS Suffix: testout.com IP address: 192.168.1.111 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.1.1

ipconfig

Haley configures a Web site using Windows 2000 default values. What are the HTTP port and SSL port settings?

80 for HTTP; 443 for SSL

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using?

802.11b Bluetooth

After installing a new 2.4GHz cordless phone system in your office, you notice that wireless network performance is adversely affected. Which of the following wireless networking standards are you most likely to be using?

802.11b 802.11g

You want to increase the security of your network by allowing only authenticated users to be able to access network devices through switch. Which of the following should you implement?

802.1x

Select the statement that best describes a broadcast storm.

A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth..

Which of the following describes a man-in-the-middle attack?

A false server intercepts communications from a client by impersonating the intended server.

Which of the following functions are performed by proxies?

Cache web pages. Block employees from accessing certain Web sites.

You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100 Mbps. Which tool should you use test the drop cable and the connection to the network?

Certifier

You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable connecting the computer to the network. Which type of document should you update?

Change documentation

You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?

Circuit-level

You have recently installed a new Windows Server 2003 system. To ensure the accuracy of the system time, you have loaded an application that synchronizes the hardware clock on the server with an external time source on the internet. Now you must configure the firewall on your network to allow time synchronization traffic through. Which of the following ports are you most likely to open on the firewall?

123

What is the maximum data rate of an ISDN BRI line?

128 Kbps

What is the speed of an OC-3 connection?

155 mbps

Which port number is used by SNMP?

161

Following output from a dig command run on a Linux system. ; <<> Dig B.2 <<>> westsim111.com ;;res options:init recurs defnam dnsrch ;;got answer: ;;->>HEADER<-opcode:QUERY, status: NOERROR, id:4 ;;flags: qr rd ra; QUERY:1, ANSWER:1, AUTHORITY:2, ADDITIONAL:0 ;;QUERY SECTION: ;; westsim111.com, typpe = A, class = IN ;;ANSWER SECTION westsim111.com. 7h33m IN A 76.141.43.129 ;;AUTHORITY SECTION: westim111.com. 7h33m IN NS dns1.deriatct111.com. westsim111.com. 7h33m IN NS dns2.deriatct222.com. ;;Total query time: 78 msec ;;FROM: localhost.localdomain to SERVER:default -- 202.64.49.150 ;;WHEN: Tue Feb 16 23:21:24 2005 ;;MSG SIZE sent: 30 rcvd:103 What is the IP address of the DNS server that performed this name resolution?

202.64.49.150 when the dig command is used to perform a manual DNS lookup, a range of info is provided. The IP address of the DNS server that performed the name resolution is shown in the bottom area of the output, on the end of the ;FROM line. The IP address shown in the answer section denotes to resolved IP address for the domain or host for which the resolution was requested. In this case, that address is 76.141.43.129. The other two answers are invalid.

You are configuring a network firewall to allow SMTP outbound e-mail traffic, and POP3 inbound e-mail traffic. Which of the following TCP/IP ports should you open on the firewall?

25 110

To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?

443

If the SONET (OC-1) base data rate is 51.84 Mbps, how much data can the Optical Carrier level 12 (OC-12) transfer in one second?

622.08 Mb

An intrusion detection system (IDS) is a special network device that can detect suspicious activity and attacks. But it doesn't react to them. An Intrusion protection system (IPS) does the same but it actually takes measures to stop the attacks.

A packet sniffer is special software that captures (records) frames that are transmitted on the network. A packet sniffer would tell you the frames and packets sent to the device, but would not identify the actions the firewall took. A load tester simulates the load on a server or service.

How does a proxy server differ from a packet filtering firewall?

A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.

Which of the following information are you likely to find in a policy document?

A requirement for using encrypted communications for Web transactions.

Which of the following correctly describes the T1 carrier system?

A single T1 channel can transfer data at 64 Kbps. T1 lines use two pares of copper wire.

What is the main difference between a worm and a virus?

A worm can replicate itself and does not need a host for distribution.

Which of the following does a router acting as a firewall use to control which packets are forwarded or dropped?

ACL

Which of the following are characteristics of ATM?

Adds labels to data units. Uses fixed-length cells of 53-bytes.

You have a network connected using a physical star topology. One of the drop cables connecting a workstation removed. Which of the following best describes what happens to network communications?

All devices except the device connected with the drop cable will be able to communicate.

During a network infrastructure upgrade, you have replaced two 10 Mbps hubs with switches and upgraded from Category 3 UTP cable to Category 5e. During the process, you accidentally cut the Cat 5e patch cable that stretches from the network printer to the upgraded switch. What is the impact on the network?

All network nodes, with the exception of the printer, will be available.

What must you install between your network and a T1 line for your network to use the T1 line?

CSU/DSU

Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?

CSU/DSU

Which of the following services are available regardless of whether the telephone company network is available?

Cable modem

You are concerned about protecting your network from network-based attacks from the Internet. Specifically, your are concerned about "zero day" attacks (attacks that have not yet been identified or that do not have prescribed protections). Which type of device should you use?

Anomaly based IDS.

What is the most common form of host based IDS that employs signature or pattern matching detection methods?

Anti-virus software

Which of the following measures are you most likely to implement in order to protect against a worm or Trojan horse?

Anti-virus software

Which of the following statements about the use of anti-virus software is correct?

Anti-virus software should be configured to download updated virus definition files as soon as they become available.

You provide internet access for a local school. You want to control internet access based on user, and prevent access to specific URLs. Which type of firewall should you install?

Application level

You have installed a new application on a network device. During testing, it appears as if the software is causing other services running on the device to stop responding. Which tool should you consult to identify the problem?

Application log

You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building. Which of the following conditions are you most likely to experience?

Attenuation

Which of the following are improvements to SNMP that are included within SNMP version 3?

Authentication for agents and managers Encryption of SNMP messages.

What is the primary countermeasure to social engineering?

Awareness

You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help in identifying past average network traffic?

Baseline

You are in the habit of regularly monitoring performance statistics for your devices. You find that this month a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect the change?

Baseline

The phone line to one office is not working. You have identified the location of the phone line in a 66 block in the wiring closet. Which tool would you use to connect to the phone line at the punchdown block to see if you can make and receive calls?

Butt set

Which of the following authentication protocols uses a three-way handshake to authenticate users to the network?

CHAP MS-CHAP

You want to make sure that the correct ports on a firewall have been opened or closed. Which document should you check?

Configuration documentation

An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?

Denial of Service

Which is a form of attack that either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Denial of service attack

Which of the following information are you likely to find in a procedure document?

Details on how to test a deploy patches.

Users report that the network is down. After some investigation, you determine that a specific router is configured such that a routing loop exists. What should you do next?

Determine if escalation is needed

A user report that she can't connect to a server on your network. You check the problem and find out that all users are having the same problem. What should you do next?

Determine what has changed?

Which of the following functions can a port scanner provide?

Determining which ports are open on a firewall. Discovering unadvertised servers.

You have a network connected using a full physical mesh topology. The link between device A and device B is broken. Which of the following best describes what happens to network communications?

Device A will be able to communicate with all other devices.

Which of the following are characteristics of SONET?

Dual counter-rotating fiber optic rings. Transport protocol used for other traffic types (such as ATM)

Which of the following are examples of social engineering?

Dumpster diving Shoulder surfing.

A user reports that network access from her workstation is very slow. The problem does not seem to be affect any other users. Which of the following conditions is the most likely cause?

Duplex mismatch

You have been contracted by a firm to implement anew remote access solution based on a Windows Server 2003 system. The customer wants to purchase and install a smartcard system to provide a high level of security to the implementation. Which of the following authentication protocols are you most likely to recommend to the client?

EAP

You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use?

EAP

You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the UTP patch cable is run 75 feet from the wall outlet, passes though the ceiling and over several florescent light fixtures before reaching the client system. Which of the following may be a cause of the connectivity problem?

EMI interference.

IPSec is implemented through two separate protocols. What are these protocols called?

ESP AH

You have a cable Internet connection at home. The installer had connected the router near the outside wall of your house with RG-6 cable. You move the cable router a distance of 50 meters using RG-8 cables and special connector adapters. Which condition are you most likely to experience?

Echo

You have configured a remote access server to accept dial-up connections for remote access clients. Remote clients are able to connect successfully and access resources on the remote access server. However, the remote clients are not able to connect to other devices located on the same subnet where the remote access server is located. Which action would likely correct the problem?

Enable proxy arp on the LAN connection for the remote access server.

Which protocol is used for securely browsing a Web site?

HTTPS

You are a network administrator for your company. A frantic user calls you one morning exclaiming that "nothing is working." What should you do next in your troubleshooting strategy?

Establish the symptoms.

You have a network server with two network interface cards. You want both network adapters to be used at the same time to connect to the same network to double the amount of data the server can send. Which feature would you use?

Ethernet bonding

You have a web server on your network that hosts the public web site for your company. You want to make sure that a failure of the NIC in the server does not prevent the Web site from being accessible on the Internet. Which solution?

Ethernet bonding.

You manage a firewall that connects your private network to the Internet. You would like to see a record of every packet that has been rejected by the firewall in the past month. Which tool should you use?

Event log.

You are moving a client to a new location within an Ethernet network. Previous to the move, the client system did not have difficulty accessing the network. During the relocation, you attach a patch cable from the client system to the wall jack and from the patch panel to the switch. Once connected you do not get a link light on the network card or the switch. You swap out the cable running between the patch panel and the switch with a know working one but you still not connect. Which of the following might you suspect as the problem?

Failed patch cable between the client system and the wall jack.

You have just connected four new computer system to an Ethernet switch using spare patch cables. After the installation only three systems are able to access the network. You verify all client network settings and replace the network card in the failed system. The client is still unable to access the network. Which of the following might you suspect as the real cause of the problem?

Failed patch cable.

Upon conducting a visual inspection of the server room, you see that a switch displays LED collision lights that are continually lit. You check the LED on the corresponding workstation and see that it is flashing rapidly even though it is not sending or receiving network traffic at that time. What is the cause of the network collisions?

Faulty network card

Which of the following are characteristics of a circuit-level gateway?

Filters based on sessions Stateful

As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement?

Host based IDS

Which of the following devices does not segment the network?

Hub

What security mechanism can be used to detect attacks originating on the internet or from within an internal trusted subnet?

IDS

Which of the following devices can monitor a network and detect potential security attacks?

IDS

Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?

IDS

You have a router that is configured as a firewall. The router is a layer 3 device only. Which of the following does the router use for identifying allowed or denied packets?

IP address

Which of the following devices is capable of detecting and responding to security threats?

IPS

You are concerned about attacks directed at your network firewall. You want to be able identify and be notified of any attacks. In addition, you want the system to take immediate action when possible to stop or prevent the attack. Which tool should you use?

IPS

Which of the following is the best countermeasure against man-in-the middle attacks?

IPSec

Which of the following network layer protocols provides authentication and encryption services for IP based network traffic?

IPSec

Which WAN connection types use digital communications over POTS?

ISDN DSL

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem.

Identify possible effects of the solution.

A user reports that he can't connect to a specific web site. You go to the user's computer and reproduce the problem. What should you do next?

Identify the affected areas of the network.

Which of the following tests can be performed by a TDR?

Identify the location of a fault on a cable. Measure the length of a cable.

A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective You replace the network adapter and verify that it works. What should you do next?

Identify the results and effects of the solution.

You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do?

Implement version 3 of SNMP

A user reports that he can't browse to a specific web site on the Internet. From his computer, you find that a ping test to the web server succeeds. A trace route test shows 17 hops to the destination web server. What is the most likely cause of the problem?

Incorrect DNS server address.

you manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation cannot communciate with any other host on the network. You run the ipconfig /all and see the following IP address 192.168.2.102 (preferred)

Incorrect IP address

You manage a local area network with several switches. A new employee has started today so you connect her workstation to a switch port. After connecting the workstation, you find that the workstation cannot get an IP address from the DHCP server. You check the link and status lights and the connection is working properly. A ping to the loopback address on the workstation succeeds. No other computers seem to have the problem.

Incorrect VLAN assignment

What is the purpose of using Ethernet bonding?

Increases network performance. Provides a failover solution for network adapters.

You have worked as the network administrator for a company for seven months. One day all picture files on the server become corrupted. You discover that a user downloaded a virus from the Internet onto his workstation, and it propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation does not reoccur. What should you do?

Install a network virus detection software solution.

Your company leases a very fast internet connection and pays for it based on usage. You have been asked by the company president to reduce internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection, without decreasing performance. What is the best way to do this?

Install a proxy server

Which of the following is not a primary characteristic of a worm?

It infects the MVR of a hard drive.

Which three of the following are characteristics of ISDN?

It provides enough bandwidth to transmit data much higher speeds than standard modems and analog lines. It lets you transmit voice, video, and data over the same lines. It is a dial-up service that uses existing copper wires for the local loop.

Which of the following authentication methods uses tickets to provide single sign-on?

Kerberos

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the Internet?

L2TP PPTP

Which of the following devices is capable of performing routing of IP packets at wire speeds using an ASIC module instead of the CPU or software?

Layer 3 switch

You are troubleshooting an IP addressing issue, and so issue a command to view the TCP/IP configuration of the system. The command you use produces the following output: fxp0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 inet6 fe80::2a0:83ff:fe30:57a%fxp0 prefixlen 64 scopeid 0x1 inet 192.168.1.235 netmask 0xfffffc00 broadcast 255.255.255.255 ether 00:a0:83:30:05:7a media: Ethernet autoselect (100baseTX <full-duplex>) status: active 1o0: flags-8049<UP, LOOPBACK, RUNNING, MULTICAST> mtu 16384 inet6 ::1 prefixlen 128 inet6 fe80::1%1o0 prefixlen 64 scopeid 0x7 inet 127.0.0.1 netmask 0xff000000 Which of the following operating systems are you working on?

Linux

You connect a packet sniffer to a switch to monitor frames on your local area network. However, the packet sniffer is only able to see broadcast frames and frames addressed specifically to the host device. Which feature should you enable on the switch so you can see frames from all devices connected to the switch?

Mirroring

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device which is connected to a hub with three other computers. The hub is connected to the same switch that is connected to the router. When you run the software, you only see frames addressed to the four workstations but not to the router. Which feature should you configure?

Mirroring

You manage a network with multiple subnets connected to the internet. A user reports that she can't access the Internet. You investigate the problem and find that she can access all hosts on the private network, but no hosts on the internet. Which of the following is likely the cause of the problem?

Missing default route on router.

You manage a network with multiple subnets connected to the internet. a user reports that she can't access the new server used in the accounting department. you check the problem and find out that her computer cannot access any server on that subnet, however the computer does access other computers on other subnets as well as the internet. which of the following is most likely the cause of the problem?

Missing route on the default gateway router

To access the internet through the PSTN, what kind of connectivity device must you use?

Modem

You want to measure the voltage, amps, and ohms of various devices. Which tool should you use?

Multimeter

Which of the following is a feature of MS-CHAP v2 that is not included in CHAP?

Mutual authentication

You manage a small network at work. Users use workstations connected to your network. No portable computers are allowed. As part of your security plan, you would like to implement scanning of emails for all users. You want to scan the emails and prevent any emails with malicious attachments from being received by users. Your solution should minimize administration, allowing you to centrally manage the scan settings. Which solution should you use?

Network based firewall

In troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information?

Network diagram

You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. Which of the following best describes what happens to network communications?

No devices will be able to communicate.

You are working with an existing fiber optic installation in your building. You want to know how long each length of cable is that runs through walls. Which tool should you use?

OTDR

You have Web server that will be used for secure transactions for customers who access the Web site over the Internet. The Web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?

Obtain a certificate from a public PKI.

You are setting up a wireless hotspot in a local coffee shop. For best results, you want to disperse the radio signals evenly throughout the coffee shop. Which of the following types of antennas would you use on the AP to provide a 360-dispersed wave pattern?

Omni-directional

Which two of the following describe the channels and data transfer rates used for ISDN BRI?

One D channel operating at 16 Kbps. Two B channels operating at 64 Kbps each.

You are the administrator for a secure network that uses firewall filtering. Several network users have requested to access internet Usenet groups but are unable. What needs to be done to allow users to access the newsgroups?

Open port 119 to allow NNTP service.

After blocking a number of ports to secure your server, you are unable to send email. To allow email service which of the following needs to be done?

Open port 25 to allow SMTP service.

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer and all settings, with the exception of SSIDs, remain configured to the default. Which of the following might you suspect at the cause of the connectivity problems?

Overlapping channels

Which of the following is a mechanism for granting and validating certificates?

PKI

Which of the following describes the lines used in the local loop for dial-up telephone access?

POTS (Plain Old Telephone Service)

You are configuring your computer to dial up to the internet. What protocol should you use?

PPP

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPP

Which of the following protocols or services is commonly used on cable internet connections for user authentication?

PPPoE

You have just signed up for internet access using a local provider that gives you a fiber optic line into your house. From there, Ethernet and wireless connections are used to create a small network within your home. Which of the following protocols would be used to provide authentication, authorization, and accounting for the internet connection?

PPPoE

Which of the following terms identifies the network of dial-up telephone and the long distance lines?

PSTN

You are traveling throughout North America to many metropolitan and rural areas. Which single form of internet connectivity provides the greatest potential connectivity wherever you travel?

PSTN

Which of the following is a firewall function?

Packet filtering

Which of the following features dynamically places switch ports in blocking or forwarding states?

Spanning tree

You are concerned about attacks directed against the firewall on your network. You would like to examine the content of individual frames sent to the firewall. Which tool should you use?

Packet sniffer

You want to know what protocols are being used on your network. You'd like to monitor network traffic and sort traffic based on protocol. Which tool should you use?

Packet sniffer

Which type of network divides data to be transmitted into small units and then routes these units from the originating system to the destination system, allowing multiple, concurrent communications on the network medium?

Packet-switched

A smurf attack requires all but which of the following elements to be implemented?

Padded cell

Users on your network that they have received an e-mail stating that the company has just launched a new Web site for employees, and to access the Web site they need to go there and enter their username and password information. No one in your company has sent this e-mail.

Phishing

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

Place access points above where most clients are.

You have a site in your network that is connected to multiple other sites. A single virtual circuit is used to connect to all other sites. What type of connection is being used?

Point-to-multipoint

You have a series of WAN links that connects your site to multiple other sites. Each remote site is connected to your site using a dedicated link.

Point-to-point

A new law was recently passed that states that all businesses must keep a history of all emails sent between members of the board of directors. You need to ensure that your organization complies with this laws. Which document type would you update first in response to this new law?

Policy

You manage an network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. You want to make sure that visitors cannot plug in their computers to the free network jacks and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure?

Port authentication

You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use?

Port scanner

CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use APIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other but you are having trouble configuring Internet access?

Private addresses cannot directly communicate to hosts outside the local subnet.

You decide to use a packet sniffer to identify the type of traffic sent to a router. You the packet sniffing software on a device which is connect to the same hub that is connected to the router. When you run the software, you only frames addressed to the workstation and not other devices. Which feature should you configure?

Promiscuous mode

You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use?

Protocol analyzer.

Which of the following allows you to save frequently-accessed web sites on your local network for later retrieval?

Proxy

You manage a server that runs your company web site. The web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that static web content can be offloaded to a different server, while the web server continues to process dynamic content. Which solution?

Proxy server

How can an organization help prevent social engineering attacks?

Publish and enforce clearly-written security policies. Educate employees on the risks and countermeasures.

Your network conducts training sessions for high-profile clients. As part of the training, clients connect to get a video feed of the instructor and other class activities. You want to make sure that video traffic related to the training is not delayed on the network. Which solution should you implement?

QoS

Which of the following solutions are most likely implemented with VoIP to ensure timely delivery of voice data?

QoS Traffic shaper

Which of the following is a platform independent authentication system that maintains a database of user accounts and passwords that centralizes the maintenance of those accounts?

RADIUS

Which of the following are differences between RADIUS and TACACS+?

RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers.

Which type of device is required to implement port authentication through a switch?

RADIUS server

You want to set up a service to allow multiple users to dial in to the office server from modems on their home computers. What service should you implement?

RAS

Which of the following protocols or services would you associate with Window's Remote Desktop Services network traffic?

RDP

You are in the middle of a big project at work. All of your files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer connected to a computer at home. Which protocol should you use?

RDP

You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installed, the signal between the two systems is weak as many obstacles interfere with signal. Which of the following strategies could you try to increase signal strength?

Replace the Omni-directional antenna with a directional antenna.

A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server. Which of the following troubleshooting actions are you most likely to perform first?

Replace the network card in the user's computer

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?

Rogue access point.

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch VLAN 1 needs to communicate with a device on the same switch which is in VLAN 2. What should you configure so that the two devices can communicate?

Routing

You are troubleshooting access to a server in a remote network. You use to tracert command and see the following Tracing route to 1922.168.2.250 over a maximum of 30 hops: 1 2 ms 2 ms 2 ms 192.168.12.11 2 2 ms 2 ms 2 ms 192.168.11.1 3 5 ms 5 ms 3 ms 192.168.10.15 4 2 ms 2 ms 2 ms 192.168.9.1 5 5 ms 5 ms 3 ms 192.168.11.1 6 2 ms 2 ms 2 ms 192.168.10.15 7 5 ms 5 ms 3 ms 192.168.9.1 .... additional output omitted what is the problem?

Routing loop

You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B. On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packets between Host A and Host B. What should you do?

Run the packet sniffer application on Host B.

Which of the follow internet services provides equal upload and download bandwidth?

SDSL

Because of an unexplained network slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host. What protocol will the software use to detect the problem?

SNMP

Which protocol uses traps to send notifications from network devices?

SNMP

Which of the following is a WAN technology that allows for interoperability of vendor hardware for fiber optic networking?

SONET

Telnet is inherently insecure because its communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?

SSH

Which of the following protocols can be used to securely manage a network device from a remote connection?

SSH

Which protocol does HTTPS use to offer greater security in Web transactions?

SSL

You want to allow traveling users to connect to your private network through the Internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations. Which of the following protocols would be most likely to be allowed through the widest number of firewalls?

SSL

Which of the following protocols are often added to other protocols to provide secure transmission of data?

SSL TLS

A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

Which of the following is most susceptible to interference related to atmospheric conditions?

Satellite

A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame?

Send it out all ports except for the port it was received on.

You're responsible for implementing network cabling in a new network installation. The cabling will be installed in a manufacturing environment where there is a great deal of electromagnetic interference (EMI). Which type of cabling would operate best in this environment?

Shielded twisted pair cable. Fiber-optic cable.

You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wall to hang a picture and pierces the cable such that a signal sent on pin 1 arrives on the cable connected to pin 7. What term describes this connection?

Short circuit

Which IDS method searches for intrusion or attack attempts by recognizing patterns or identities listed in a database?

Signature based

Users report that the internet is no longer accessible. You suspect that the line connecting your building to the internet is not working properly. Which of the following allows the services provider to remotely test the local loop?

Smart jack

Which of the following is a form denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network?

Smurf

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops an ensures there is only a single active path between any two switches?

Spannig tree

A VPN is used primarily for what purpose?

Support secured communications over an untrusted network.

Which of the following is a characteristic of SDSL?

Supports data traffic only (no voice)

Which of the following are characteristics of MPLS?

Supports variable-length data units. Adds labels to data units.

Which of the following connectivity hardware used to create a VLAN?

Switch

You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose?

Switch

When configuring VLANs on a switch, what is used to identify VLAN membership of a device?

Switch port

Angela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. In a check of network traffic, Angela discovers a high number of collisions. Which connectivity device would best reduce the number of collisions and provide for future growth?

Swithc

You are implementing Internet connectivity for a new start-up company. Your client will provide on-line storefronts for retailers. To do this, they have calculated that their Internet connection musts provide a data rate of at least 20 - 30 Mbps.

T3

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access?

TACACS+ RADIUS

You have been asked to document the wiring in your building. You would like to identify the length of each Cat5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use?

TDR

You are an administrator for a large company. You are setting up a computer at a worker's home so he can telecommute while he recovers from surgery. You want to connect to the UNIX server at the office to update his account information Which utility should you use to accomplish this task?

Telnet

You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, that she can no longer access the network. You go to the office and see that one of the user's stiletto heels has broken and exposed some of the wires in the Cat 5 network cable. You make another cable and attach it from the wall plate to the user's computer. What should you do next?

Test the solution

You administrator a Web server on your network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer www.westsim.com. You configured the Web site as follows: IP address: 192.168.23.8 HTTP port: 1030 SSL port: 443 Users complain that they can't connect to the web site when they type www.westsim.com. What is the most likely source of the problem?

The HTTP port should be changed to 80.

What actions can a typical passive Intrusion Detection System (IDS) take when it detects an attack?

The IDS logs all pertinent data about the intrusion. An alert is generated and delivered via Emal, the console, or an SNMP trap.

A user on your network has been moved to another office down the hall. After the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?

The client system has moved too far away from the access point.

After installing a new DHCP server on the network, you need to verify that network devices are receiving IP addressing via DHCP. You reboot a Windows XP client system and using the ipconfig command, receive the following information: Description: CardBus-II 10/100 PC Card Physical address: 02-00-4C-4F-3F-50 DHCP enabled: Yes Autoconfig enabled: Yes Autoconfig IP address: 169.254.25.129 Subnet mask: 255.255.0.0 Default gateway: DNS Servers:

The client system is configured to use DHCP. The client system is unable to reach the DHCP server.

Due to widespread netowork expansion you have decided to upgrade the network by configuring a DHCP server for the network. The network uses Linux, Windows, and Mac OS X client systems. You configure the server to distribute IP addresses from 192.168.2.1 to address 192.168.2.100. You use the subnet mask of 255.255.255.0 After making all the settings changes on the DHCP server, you repboot each client system but they are not able to obtain an IP address from the DHCP server. Which of the following would explain the failure?

The clients must be configured to obtain IP addressing from a DHCP server.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor.

Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: -a wireless television distribution system running at 2.4 GHz -a wireless phone system running at 5.8 GHz -a wireless phone running at 900 MHz -an 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range. -an 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range. since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?

The wireless TV system?

You have a WAN link that connects two sites.The WAN link is supposed to provide 1.5 Mbps of bandwidth. You want a test to see the actual bandwidth of the link. Which tool should you use?

Throughput tester

When using Kerberos authentication, which of the following terms is used to describe the token that verifies the identity of the user to the target system?

Ticket

Which of the following are used when implementing Kerberos for authentication and authorization?

Time server. Ticket granting server.

Which of the following is a good reason to install a firewall?

To prevent hackers from accessing your network.

You manage a server that runs your company web site. The web site includes streaming video that shows features of some of your products. The link connecting your server to the internet charges based on bandwidth use. When the bandwidth spikes, so does your bill. You would like to implement a solution to prevent the amount of traffic sent over the WAN link from exceeding a specific level. Which solution should you implement?

Traffic shaper

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?

Trunk ports

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1. What should you configure to allow communication between these two devices through the switches?

Trunking

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches?

Trunking

Which of the following are characteristics of VDSL?

Unequal download and upload speeds. Supports both data and voice at the same time.

While configuring a new 802.11g wireless network within range that uses the same channel ID that intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?

Use a different Channel ID.

You are troubleshooting a connectivity problem in which one client system is unable to connect to a server. Both the server and client are connected to the same Ethernet network switch. No other users have complained of a problem, and you suspect that faulty network cabling might be to blame. Which of the following troubleshooting steps are you most likely to perform first?

Use a media test to test the cable between the computer system and the network switch.

You have just been hired as a network administrator. A user has just changed offices and needs you to activate the network and telephone connections in his office. However, the wiring at the punch down block is labeled poorly and you are unable to tell which wires go to the user's office. What should you do?

Use a tone generator to locate the correct wiring.

You have a company network that is connected to the Internet. You want all users to have internet access, but need to protect your private network and users. You also need to make a Web server publicly available to internet users. Which solution should you use?

Use firewalls to create a DMZ. Place the Web server inside the DMZ, and the private network behind the DMZ.

Which of the following are characteristics of TACACS+?

Uses TCP Allows for a possible of three different servers, one each for authentication, authorization, and accounting.

You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?

VLAN

Your company is a small start-up company that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented?

VLAN

Which switch features are typically used with VoIP?

VLAN PoE

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connects to the switch. You want to allow visitors to plug, into these ports to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. Which feature should you implement?

VLANs

You manage a server at work that has just been configured with a new application. Consequently, the server has crashed several times during the last week. You think you have the problem resolved, but you would like to be able to manage the server remotely in cases there is a problem. Which of the following protocols would you use for remote management?

VNC ICA

You have a group of salesman who would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?

VPN concentrator.

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

Virus

You are implementing a DHCP server for your segment. Your segment's IP address 192.168.1.0. Your default gateway is 192.168.1.254. Your DNS server address 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments. You configured the 03 Router option on your DHCP server so it can deliver the IP address of the default gateway to workstation. After configuring your workstaions to get their IP addressing information dynamically, your users complain that they are unable to access web sites on the Internet.

You must configure your DHCP server with an option that delivers the IP address of the DNS server (option 06).

You're trying to access your office network with your Windows XP workstation from home using your organization's virtual private network (VPN) Your modem has dialed and connected to your ISP, but you can't connect to your office network. You issue the ipconfig command from the shell prompt and learn that your system has been assigned an IP address of 169.254.1.12.

Your ISP's DHCP server isn't working properly.

nslookup

a tool provided on Linux, Unix, and Windows systems that allows manual name resolution requests to be made to an DNS server. This can be useful when troubleshooting name resolution problems.

ifconfig

a tool used on Unix

Which TCP/IP utility gives you the following output?

an image showed a few lines from tracert command, which shows you each host a packet must pass through to reach its destination.

Which TCP/IP utility gives you the following output? Interface: 192.168.4.101 on Interface 0x3 Internet Address Physical Address Type 192.168.1.23 00-d1-b7-c2-af dynamic.

arp

Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently?

arp

A user reports that she can't connect to the Internet. After some investigation, you find that the wireles router has been misconfigured. You are responsible for managing and maintaining the wireless access point

create an action plan

;;res options:init recurs defnam dnsrch ;;got answer: ;;->&gto;HEADER&lt:&lt-opcode:QUERY, status NOERROR, id:4 ;;flags: qr rd ra; QUERY:1, ANSWER:1, AUTHORITY:2, ADDITIONAL:0 ;;QUERY SECTION: ;;westsim111.com, type = A, class = IN ;;ANSWER SECTION: westsim111com 7h33m IN A 76.141.43.129 ;;AUTHORITY SECTION: westsim111.com 7h33m IN NS dns1.deriatct111.com. westsim111.com 7h33m dns2.deriatct222.com. ;;Total query time: 78 msec ;;FROM: localhost.localdomain to SERVER: default -- 202.64.49.150 ;;When: Tue Feb 16 23:2124 2005 ;;MSG SIZE sent: 30 rcvd: 103

dig

You are troubleshooting a connectivity problem on a Linux server. You are able to connect to another system on the system on the local network, but are not able to connect to a server on a remote network. you suspect that the default gateway information for the system may be configured incorrectly. which of the following commands would you use to view the default gateway information on the Linux server?

ifconfig

You want to be able to view the DNS server address that a computer is using. Which of the following utilities would you use?

ifconfig ipconfig

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet This workstation can communicate with some hosts on the private network, but not with others. You run ipconfig /all

incorrect default gateway

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with the other hosts. You run ipconfig /all and see the following: Ethernet adapter local area connection connection-specific DNS Suffix . : mydomain.local Physical address: 00-AA-BB-CC-74-EF DHCP enabled: no autoconfig: yes IPv4 address:192.168.1.102(preferred) mask: 255.255.0.0 dns: 192.168.1.20 192.168.1.27

incorrect subnet mask

You have been called in to troubleshoot a connectivity problem on a newly installed Windows Server 2003 system. The system is operating satisfactorily and is able to communicate with other systems on the local net. However it is unable to access any systems on the other segments of the corporate network. You suspect that the default gateway parameter for the system has not been configured, or may be configured incorrectly. Which of the following utilities are you most likely to use to view the default gateway information for the sysm?

ipconfig

Throughput tester

measures the amount of data that can be transferred through a network or processed by a device (such as the amount of data that can be retrieved from disk in a specific period of time.

You administer a NetBIOS-based network that uses the TCP/IP protocol. You are trying to troubleshoot a computer that is unable to contact a server by its NetBIOS name. Which command can you use to check the connection?

nbtstat

Which TCP/IP utility gives you the following output? local area connection: node IpAddress: [192.168.1.111] Scope Id: [] NetBios Remote Cache Name Table

nbtstat -c

Your computer is sharing information with a remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection.

netstat

examine the following: Active Connections Proto Local Address Foreign Address State TCP SERVER1:1036 localhost:4831 TIME_WAIT TCP SERVER1:4798 localhost:1032 TIME_WAIT TCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAIT TCP SERVER:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHED TCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHED TCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net.23135 ESTABLISHED which of the following utilities produced this output?

netstat

Which TCP/IP utility gives you the following output? Proto local ad foreign state TCP me:epmap me:0 LISTENING

netstat -a

Interface List 0x1..... MS TCO Loopback interface 0x2... 00 10 4b 73 0e 0e..... 3com 3G90x Ethernet Adapter ============================= ============================ Active Routes Network Destination

netstat -r

Which command displays network activity statistics TCP, UDP, and IP?

netstat -s

Examine the following output: Server: helicuplar.xct.takro.net Address: 209.53.4.130 Name: westsim.com Address: 64.78.193.84

nslookup

Mary calls to tell you that she can't connect to an intranet server called WebSrv1. From her computer, you ping the server's IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem?

nslookup

You are troubleshooting a network connectivity issue on a Unix system. You are able to remote systems by using their IP address, but unable to connect using the hostname. You check the TCP/IP configuration, and note that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communication between the Unix system the DNS server are working correctly. Which utilities can you use to do this?

nslookup dig

Examine the following output. Reply from 64.78.193.84: bytes=32 time=86ms TTL=115

ping

You work in an office that uses NetWare servers and Windows NT 4.0 servers. The network uses both the TCP/IP and IPX/SPX protocols. You are siting at a workstation that uses Windows 95 OSR2. An application you are using is unable to contact a Windows NT server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?

ping

which TCP/IP utility gives you the following output? Reply from 192.168.1.168: bytes=32 time<10ms TTL=128

ping

tracert is similar to ping in that it tests connectivity between two hosts on network. The difference is that tracert reports information on all intermediate devices between the host system and the target system.

ping does not report information on intermediate devices. ping -t command causes packets to be sent to remote host continuously until stopped manually. -t switch with ping can be useful in determining whether the network is congest, as such a condition will cause sporadic failures in the ping stream.

Which of the following utilities would you use to view the routing table?

route

While troubleshooting a problem on a Linux system, you run a utility that generates the following output 5 s3232.g.Seatsomeisp.net

traceroute

While working on a Linux server, you are unable to connect to Windows Server 2003 system across the internet. You are able to ping the default gateway on your own network, so you suspect that the problem lies outside of the local network. Which utility would you use to track the route a packet takes as it crosses the network?

traceroute

4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [205.171.205.29] 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1]

tracert

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the US. The office has two Windows 2000 servers, two UNIX servers, one Windows NT server, 90 Windows 98 clients, 20 Windows 2000 Professional clients, and five Macintosh clients. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is not working properly?

tracert

You administer a network with 2000 and UNIX servers, and Windows 2000 Professional, Windows 98, and Macintosh clients. A user of a Windows 98 computer calls you one day and says he is unable to access resources on the network. You type ipconfig on the user's computer and receive the following the following output: 0 Ethernet adapter: IP address: 169.254.1.17 Subnet Mask: 255.255.0.0 no gateway check NIC for power light

unavailable DHCP server

Which of the follow commands would display the output shown here?

use the route print or netstat -r commands to display the contents of the routing table.


संबंधित स्टडी सेट्स

Chapter 16 - Electrolyte Balance and Imbalance

View Set

Art 100 Ch 17. The 17th and 18th Centuries

View Set

Astronomy 1101 LSU Final combination of test 1 and 2

View Set

Personal Finance Ch 1,2,3 learnsmart

View Set

IT Security: Defense against the digital dark arts. Week2: Pelcgbybtl (Cryptology)

View Set

4.09: Uncertainty in the Postwar World

View Set

bio 102 unit 3 cumulative practice

View Set

Pain Assessment and Management: Fundamentals Midterm

View Set