Network

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A helpdesk technician is reviewing the network layout in various areas. What is the purpose of subnetting? Layer 2 tracking Layer 3 segments Port security Flow control

Layer 3 segments; broadcast domain segments with fewer hosts via subnetting.

A network engineer is planning static routes through an IPv6-enabled network. The engineer has configured the network so that each device or interface is represented by a 64 bit Interface ID. Which section of how many bits of a IPv6 address can the Interface ID be found? The first 64 bits The last 64 bits The first 10 bits Bits 49-64

last 64 bits

Interface

mechanical specifications like cable specs, pins, connector, or radio transceiver specifications

A network technician is trying to diagnose a network where something is consuming a lot of bandwidth and slowing down the network. Which of the following would point to this?

multicast transmissions

A systems administrator attempts to allow one host on the Internet to send content to other hosts that have identified themselves as interested in receiving the originating host's content. What should the administrator use to accomplish this? Multicast Anycast Broadcast Unicast

multicast; broadcast is to network's broadcast address and received by all

no light

not working or port shut down

Carrier Sense Multiple Access with Collision Detection CSMA/CD

o When collision is detected, node broadcasts jam signal and each not that was attempting to use the media waits for random period (backoff) before trying again o Means only half duplex is possible so can only send or receive, not both at same time

classless routing protocol

one that does not determine the network mask based on the first octet in the IP address

poison route

one that is advertised with hop count of 16 to prevent routing loop

flickering green

operating normal with traffic

Which Open Systems Interconnection (OSI) model layer is responsible for the transmission of bits of data? Physical Datalink Network Transport

physical bits of data from node to node compared to node to node on logical segment in data link

class b address

Class B: 255.255.0.0 (/16). The first octet for class B is from 128 - 191. The only remaining use of classful terminology is to describe the default subnet masks.

A network security engineer is performing network penetration testing. The engineer is using Nmap to make a map of all network devices and wants to identify all host addresses on the network more quickly by skipping OS fingerprinting until after a target machine is selected. Suggest an Nmap switch that will allow the engineer to perform host discovery only. -sT -p -sn -sU

-p

A network technician is using Nmap to map a corporate network. The technician does not have privileged access to the network driver to support packet crafting and decides to do a half-open scan. Select the Nmap argument that will perform a half-open scan. -sT -sS -sU -p

-sS

33.3% complete Question A network engineer is setting up MTU sizes to follow most Ether products. In normal conditions, what is the maximum size of a standard Ethernet frame, excluding the preamble?

1518

apipa address range

169.254.0.0 through 169.254.255.255

Local network has private range

192.168.1.0/24

routing loop

2 routers use one another as the path to a network

class A address

255.0.0.0 (/8). The first octet for class A is from 1 - 126. The default masks reengineer the classful scheme but allow network designers to create subnets of different numbers.

class c address

255.255.255.0 (/24). The first octet for class C is from 192 - 223.

A network administrator is working for a large company on a subnet that requires an 8 bit mask. Which of the following would that be? 255.255.0.0 255.255.255.0 255.255.255.255 255.0.0.0

255.255.255.0 8 bit mask

A network engineer oversees a network with 4 subnets of 16 IP addresses each. Each subnet will have the same Classless inter-domain routing (CIDR) range of 192.168.x.0/28, such that the first subnet has an IP range of 192.168.1.0-192.168.1.15, and so forth. If the engineer then needed 62 addresses on each subnet, how many mask bits would be represented in the CIDR notation of each subnet after the engineer has increased the IP range to 62? 26 27 32 22

26. A 26-bit mask contains 62 potential IP addresses in its range, from 1 to 62 in the last octet. The subnet mask would look like 255.255.255.192.

A network specialist is installing a new WiFi 6 access point in a dentists office lobby. The office is a small space with few physical obstacles, and only patients waiting in the lobby are expected to use the AP. There is a lot of interference from legacy devices used by the offices directly above, mostly on the lower channels of the lowest frequencies. Recommend a frequency and channel for the network. 5 Ghz, channel 40 5 Ghz, channel 128 (DFS) 2.4 Ghz, channel 3 2.4 Ghz, channel 11

5 Ghz channel 40

how many addresses? 255.255.255.192

64

ethernet frame size

64 and 1518 bytes; data payload is 46 and 1500

Which IEEE wireless standard is designated as using high efficiency (HE), allowing throughput speeds of up to approximately 4800 Mbps over a 5 Ghz channel using Orthogonal Frequency Division Multiplexing with Multiple Access (OFDMA) modulation and UL-MIMO beamforming and can potentially reach approximate 10G speeds using a 6 Ghz frequency? 802.11ah 802.11n 802.11ac 802.11ax

802.11ax

A security engineer is looking at IPv6 packets and observes packets for a default route. Which of the following represent a default route? Starts with 001 Starts with 1111 1111 ::/0 Starts with fe80

::/0

holddown timer

> if node declares network unreachable, neighbors start holddown timer and any updates that route received from other nodes are discarded for duration of time. Ensures all nodes have converged info about unreachable network

A network operator is trying to troubleshoot kinks and imperfections in cabling that could affect performance. What should the network operator use to test the cabling?

A cable tester might incorporate the function of a time domain reflectometer (TDR). A TDR measures the length of a cable run and locates kinks and other imperfections in cables that could affect performance.

A network architect is reviewing a network where application services and resources are centrally provisioned, managed, and secured. What is this called? Client server Peer to peer Point to point SOHO

A client-server network is one where some nodes, such as PCs, laptops, and smartphones, act mostly as clients. Application services and resources are centrally provisioned, managed, and secured.

What advantage does Collision Detection (CD) bring to the carrier-sense multiple access (CSMA) media access control method? Separate collision domains for each port 10 Gbps speeds Instant termination upon collision Full-duplex transmission CSMA Collision Detection utiliz

A. Separate collision domain

100BASE-TX Fast Ethernet Standard

CSMA/CD; Twisted pair; 100 m Cat 5 or better

A network cable installer is installing copper cabling in an office for a new network. The installer needs to close a gap of about 150 ft. ending in an RJ-45 termination. What is the lowest possible category of cable needed to maintain 10 Gigabit Ethernet speeds? Cat 5e Cat 6 Cat 8 Cat 7

Cat 7

A network architect is planning a new setup for a new company that has yet to build buildings. Which of the following would the architect set up for a /16 network?

Class B: 255.255.0.0 (/16). The first octet for class B is from 128 - 191. The only remaining use of classful terminology is to describe the default subnet masks. IPv4 multicasting allows one host on the Internet (or private IP network) to send content to other hosts that have identified themselves as interested in receiving the originating host's content.

A service provider has terminated a T1 link to a mid-sized company using the T-carrier system. After patching from where the service provider terminated their connection, where would the customer connect for connectivity? Demarc point DSU RJ-48X interface PBX

DSU

13.3% complete Question A network technician is setting up a connection between switches, but the switches cannot establish a connection. Which of the following would be the most likely cause of the switch's inability to establish a connection?

Dual MDI-X ports

A team of network engineers are refurbishing copper Ethernet cabling in a FEMA office. The federal government requires that copper twisted pair cabling be terminated according to the T568A standard. To ensure termination is being done according to standard, what color conductor will be wired to the second pin? Brown Blue Orange Green

Green

A server administrator needs to allow a server to instruct the switch to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames. What should the server administrator set up?

Flow Control Allows server to instruct switch to pause traffic

A network architect is comparing RIP vs. EIGRP. What is a key difference between the two? Simple vs complex One is IGP and the other EGP Full vs incremental routing updates Only one is distance vector

Full vs incremental routing updates Where one sends periodic updates of its entire routing information base, the other sends a full update when it first establishes contact with a neighbor, and afterward, only sends updates when there is a topology change.

A systems administrator is setting up servers with standard network interface cards (NICs). Which of the following do most standard NICs support? (Select all that apply.)

Gigabit and Fast Ethernet 10 and 40 are fiber

How can an IPv4 host send packets to all addresses in a particular subnet? Using a unicast packet, addressed to the IP address of the destination host Send packets to the closest node in a group By sending a packet to the network or subnet's last possible IP address according to the last octet Sending packets to subscribed nodes

How can an IPv4 host send packets to all addresses in a particular subnet? Using a unicast packet, addressed to the IP address of the destination host Send packets to the closest node in a group By sending a packet to the network or subnet's last possible IP address according to the last octet Sending packets to subscribed nodes

A systems administrator attempts to allow one host on the Internet to send content to other hosts that have identified themselves as interested in receiving the originating host's content. What should the administrator use to accomplish this?

IPv4 multicasting allows one host on the Internet (or private IP network) to send content to other hosts that have identified themselves as interested in receiving the originating host's content.

A military installation is upgrading its network infrastructure. Which fiber optic connector type developed by AT&T used to be very common for multimode networks in commercial or military installations due to its quick-connecting bayonet, but is no longer considered standard when retrofitting? Mechanical Transfer Registered Jack (MTRJ) Local Connector (LC) Straight Tip (ST) Subscriber Connector (SC)

MTRJ

A network engineer is testing an application over the IPv6 protocol. Determine how the server can cast packets to an entire local subnet. Broadcast packets to a broadcast domain Unicast to all Link-Local Multicast Name Resolution hosts Anycast to Interface ID Multicast to associated private topology

Multicast to associated private topology

A data center network administrator working for a cloud services company is configuring an SDN that is optimized for east-west traffic. The SDN must be loop-free so that spanning tree protocol is not required, instead utilizing a protocol called Equal Cost Multipathing (ECMP) to distribute traffic between the links to the top-tier switches. Most importantly, all server resources will be on-premises, so the solution should avoid the use of the public Internet and the use of Protocol-Independent Multicast (PIM) protocols, instead establishing private links with guaranteed service levels to operate as an overlay network and configure point-to-point or point-to-multipoint links between nodes without respect to the underlying physical and data link topologies (in other words, tunneling through the network layer). The SDN must also feature multipath redundancy to allow for load balancing and failover. Choose a multipath routing protocol that will best fulfill these requirements. Generic Routing Encapsulation (GRE) with OSPF Multiprotocol Label Switching (MPLS) with Shortest Path Bridging (SPB) Multipoint Generic Routing Encapsulation (mGRE) with BGP VXLAN encapsulation

Multiprotocol Label Switching (MPLS) with Shortest Path Bridging (SPB)

A help desk operator is trying to identify the vendor for a piece of equipment. What could the help desk operator check to determine the vendor?

Organizationally Unique ID (OUI)

A network architect is assessing network performance. Which of the following is part of the CSMA/CD protocol to identify collisions early? (Select all that apply.)

Preamble and SFD preamble is part of CSMA/CD and both are used for clock sync and to detect collisions early.

A network architect is researching distance vector protocols for use in the environment. Which of the following should the architect look into? (Select all that apply.) RIP OSPF BGP EIGRP

RIP and EIGRP

A company has been advised by a network consultant to have extra lengths of copper twisted-pair cables with 4 pairs of wires as well as 8-position/8-contact connectors. Assess what type of connector will be required. RJ-11 RJ-45 MTRJ F-type

RJ45

A network consultant is considering potential upgrades for a network that utilizes an edge router that connects to a layer 2 switch, which has ports subinterfaced into multiple VLANs per port. Suggest an upgrade that will increase the efficiency of routing between VLANs by mapping IP addresses to MAC addresses for hardware forwarding. Replace the Layer 2 switch with a hub Replace the Layer 2 switch with a bridge Replace the Layer 2 switch with a Layer 3 switch Replace the edge router with a router/firewall combination device

Replace the Layer 2 switch with a Layer 3 switch

A network engineer is looking at a local area network (LAN) which uses structured cabling, two 24-port switches and a router to provide connectivity. What type of LAN is this most likely? Residential SOHO PAN SME

SME

A systems administrator is configuring a server for email services. Which protocol or protocol command is also referred to as implicit TLS? SMTPS IMAP SMTP STARTTLS

SMTPS

A network administrator is installing hundreds of Internet of Things (IoT) sensor devices at a corporate facility. While each sensor device can be accessed and configured separately, the administrator requires a centralized remote management framework that can perform regular device polling as well as configurable thresholds for triggering notifications when events like port failure occur. Suggest an agent-based framework the administrator can use to fulfill these monitoring and remote management requirements. Secure Shell Remote Desktop Protocol Simple Network Management Protocol Telnet

Simple Network Management Protocol

A network engineer has configured a network with a tiered mesh topology with multiple redundant links, causing an entire switch segment to become unusable until being reset. What layer 2 protocol packages data into bridge protocol data unit (BPDU) multicast frames and routes based on a ranked hierarchy of switches in order to prevent loops? Neighbor Discovery Protocol (NDP) Spanning Tree Protocol (STP) Address Resolution Protocol (ARP) Routing information protocol (RIP)

Spanning Tree Protocol

A mid-sized company is looking at the ability for workers to work from home more often after a recent pandemic. They want the users to be able to connect back to the corporate network but don't want to overwhelm the internal network with all traffic from the remote users. Which of the following connections would be the best option? RDP VNC Split tunnel VPN Full tunnel VPN

Split tunnel VPN

A network technician is setting up IPv6 global addressing. Which of the following is NOT part of an IPv6 unicast address?

Starts with fe80

BGP port

TCP 179

A network engineer is configuring a local intranet for a large manufacturing company that uses a DNS server on its network to resolve internal and external queries while keeping internal IP addresses private. The engineer sets both UDP port 53 and TCP port 53 on the primary name resolution server to allow larger DNS record transfers. Select the situations that would require larger DNS record transfers over TCP. (Select all that apply.) Link aggregation is used on the network. The DNS server is utilizing a security protocol such as DNSSEC. The network makes heavy use of VoIP traffic. The network deploys IPv6 addressing.

The DNS server is utilizing a security protocol such as DNSSEC. The network deploys IPv6 addressing.

binary 00110011

The IP address 00110011 would be 51 in decimal. The place values are powers of 2 (2^1=2, 2^2=4, 2^3=8, 2^4=16, and so on). The technician should memorize these values to perform binary/decimal conversions using the columnar method.

encapsulation

is how data messages are packaged for transmission. Like envelope for letter but each layer needs its own envelope

A security engineer is analyzing IPv6 packets. Which of the following header fields is for quality of service?

The flow label is for quality of service (QoS) management, such as for real-time streams. The security engineer sets the flow label to 0 for packets not part of any delivery sequence or structure.

A helpdesk operator is troubleshooting issues on a Windows client and wants to try to flush their dynamic IP address so that they can pull another one. Which command will help the helpdesk operator do this?

The ipconfig /release interface command releases the IP address obtained from a Dynamic Host Configuration Protocol (DHCP) server so that the interface(s) will no longer have an IP address.

A security analyst is looking at traffic directed to 0.0.0.0/8. For what purpose is this IP range typically used?

The system uses the subnet 0.0.0.0/8 when a specific address is unknown and typically used as a source address by a client seeking a Dynamic Host Configuration Protocol (DHCP) lease.

A security analyst is looking at traffic directed to 0.0.0.0/8. For what purpose is this IP range typically used? Variety of special purposes To check that TCP/IP is correctly installed on the local host Source address by client seeking a DHCP lease Examples

The system uses the subnet 0.0.0.0/8 when a specific address is unknown and typically used as a source address by a client seeking a Dynamic Host Configuration Protocol (DHCP) lease.

TDR (Time-Domain Reflectometer)

Troubleshoot kinks and imperfections in cabling that could affect performance

A network operator is troubleshooting connectivity issues and suspects the transceiver. What should the network operator perform?

Use a loopback tool.

BiDi

WDM transceivers support transmit and receive over same strand of fiber over slightly shifted wavelength; installed in opposite pairs

A network administrator is configuring a switching network based on the three-tiered hierarchy model used by Cisco. Which tier of Cisco's modular design principles would the administrator most likely install a Layer 2 LAN switch? Distribution Layer Access Layer Core Layer Transport Layer

access layer

A manufacturing company utilizes multiple access points (APs) spread across its factory. The APs all share an SSID to allow client roaming. Since there are areas where it is difficult to run cabling, a wireless distribution system is used, where the main router is connected to the Internet and the rest are set in repeater mode. What is true about the channels used by the APs? Each AP must have a different channel APs should avoid using channels that overlap All APs must use the same channel Roaming channel aggressiveness should be set as high as possible

all APs must use the same channel

flow control

allows server to instruct switch to pause traffic temporarily to avoid overwhelming buffer without distinguishing traffic types

throughput

average data transfer rate achieved over period of time, excluding encoding, errors, or other losses

solid amber

blocked by algorithm

A manufacturing plant, that is closed on weekends, employs a full-time network administrator to oversee the network at the plant. The network administrator is testing and recording network performance baselines and notices a throughput bottleneck is occurring on the same network when a team is using analytical software to retrieve volumes of data for testing. Provide the best guess for diagnosing the bottleneck? The bottleneck is being caused by a specific user using a single application The bottleneck is being caused by a hardware problem with a server device on the network The bottleneck is being caused by a hardware problem with a client device on the network The bottleneck is being caused by usage patterns of an entire group of users

bottleneck caused by usage patterns of entire group of users

A network administrator wants to be able to address multiple address hosts. Which of the following would accomplish this task? (Select all that apply.) Broadcast ff:ff:ff:ff:ff:ff Unicast 255.255.240.0

broadcast or ff; all hosts will receive messages if sent to MAC ff

A network cabling installer is installing cable in a senior care center. A distance of about 80 meters (262 feet) must be connected with a single copper twisted-pair Ethernet cable. What is the minimum acceptable class of cable for covering the distance at 10GBASE-T without repeaters? Cat 6a Cat 6 Cat 5e Cat 7

cat 6a

solid green LED

connected but no traffic

A network security practitioner is hardening a corporate network to mitigate the risk from route processor vulnerabilities. Which quality of service (QoS) stack operational layer comprises traffic that keeps the network itself operational, including routing updates, ARP traffic, STP notifications, NTP updates, QoS classification, and link reservation requests? Management plane Control plane Data plane Access plane

control plane

punchdown block

copper wiring termination

Fast Link Pulse

fast ethernet codes 16 bit data packet into signal advertising service capabilities so autonegotiation can occur; legacy

blinking amber

fault detected

switching loop

flooded frames circulate the network perpetually leading to broadcast storm

How does the TCP/IP protocol suite resolve the machine hardware address of the target IP if the target IP is on a remote network? The Internet Group Management Protocol (IGMP) From the host ID portion of the IP address From the subnet ID portion of the IP address Determine the MAC address of the default gateway using ARP cache

from the subnet ID portion of IP address

A network administrator is setting up connection points for multiple devices to connect. Which of the following cannot be configured?

hub

ethernet frame format

preamble > SFD > Destination MAC > Source MAC > Ether Type > Payload > FCS

split horizon

prevents routing update from being copies back to the source

tracert (windows)

same as traceroute in linux

An internet user types a fully qualified domain name (FQDN) into the URL bar of the Google Chrome web browser. Chrome then checks its local cache for the correct mapping before querying the local name server. Evaluate the role of the Chrome web browser in this scenario. Stub resolver Authoritative name server Root server Recursive resolver

stub resolver

traceroute (linux)

test whole path between 2 nodes with a view to isolating node or link causing problem

border gateway protocol

to be used between routing domains in mesh internetwork and used as routing protocol on internet, primarily between ISPs; path vector routing protocol

asymmetrical routing

topology where the return path is different to the forward path; common with load balancers

administrative distance

value used to express relative trustworthiness of the protocol supplyinig the route

A security analyst is reviewing malicious packets and trying to understand the IPv4 header. What is the first field in an IPv4 header? Header Length Version Protocol Source address

version; 4 or 6?

WDM

wavelength division multiplexing; using strand to transmit and/or receive more than one channel at a time

broadcast storm

will cause network utilization to go to near max capacity and CPU utilization of the switches to jump to 80% or more so segments are unstable

Session Layer

· Application protocol requires exchange of multiple messages between client and server called session or dialog · Functions that administer the process of establishing dialog, managing data transfer, and ending session

Application Layer

· Doesn't encapsulate any other protocols or provide services to any protocol · Provide interface for software programs on network hosts that have established a communications channel through lower level protocols to exchange data

Transport Layer

· End to end or host to host layer · Content of packets becomes significant · Any host on network will be communicating with many other hosts using different types of networking data · Transport layer IDs each type of network application by assigning port number · EX: data requested from HTTP web app on port 80 and email server port 25 · On sending host, data from upper layers is packaged as a series of layer 4 Protocol Data Units (PDU) called segments · Segment has port number and passed to network layer for delivery · Port number ignored in network and data link layers and becomes part of data payload invisible to routers and switches (that do addressing and forwarding) · Devices: multilayer switches (load balancers) and IDS

Network Layer

· Moving data around a network of networks (internet) · Data link forwards data using hardware addresses and network layer moves info around an internetwork by using logical network and host IDs · Networks often heterogenous; uses variety of physical layer media and data link protocols · Main appliance is router · Forwards info between networks by examining destination network-layer address or logical network address · Packet is forwarded, router by router or hop by hop, through internetwork to target network · Once it reaches destination network, hardware address used to deliver packet to target node · Filtered through firewall. Basic firewall enforces ACL that are permitted or blocked

Data Link Layer

· Transferring data between nodes on same logical segment · Segment is one where all nodes can send traffic to one another using hardware addresses even if they don't share access to same media. May include multiple physical segments called logical topology · Instead of having hosts directly linked to each other, they link to central node like switch or WAP which has forwarding function. Addresses are local addresses or hardware addresses · Nodes that send and receive are end systems or host nodes. If can only forward, called intermediate system or infrastructure node · Organizes stream of bits arriving from physical layer into structured units called frames. Each frame has network layer packet as its payload · Data link layer adds control info to the payload in the form of header fields o Includes source and destination hardware addresses plus basic error check to see if frame received intact · Devices are NIC or network adapter, bridge, switch, WAP

Presentation Layer

· Transforms data between format required for network and format required for application · EX: character set conversion like ASCII and Unicode


संबंधित स्टडी सेट्स

MAN3025- Lesson 03- Organizational and Social Responsibility

View Set

Preterite of stem-changing -ir verbs

View Set

Series 65 Midterm - Incorrect Questions

View Set

Ch. 7 Review of Buddhism, Confucianism, Daoism and Legalism

View Set

Insurance Policies - Provisions, riders, and options

View Set

Chapter 6 Exam: Life Insurance Premiums, Proceeds, and Beneficiaries

View Set

Chapter 1: An Overview of Special Education

View Set

Module4: Operating systems and file management

View Set

BADM Quiz 4 The mean and Standard Deviation Multiple Choice

View Set

Chapter 38: Caring for Clients With Cerebrovascular Disorders

View Set