Network + Practice Questions
One of the differences between the UTP and STP cabling is that STP cable takes advantage of additional protective cover reducing signal interference from outside sources. true or false
true
The 66 block (older type/used in telephony) and the 110 block (newer type/used in networking) are examples of punch-down blocks. true or false
true
Which of the following answers refers to Generic Routing Encapsulation (GRE)? a tunneling protocol b IEEE 802.1Q c VLAN trunking protocol (VTP) d address resolution protocol (ARP)
Tunneling protocol
An IP PBX system is an example of: a UTM appliance b peer-to-peer (P2P) architecture c unified voice services d reverse proxy
Unified voice services
T1 lines support data transfer rates of up to: a 1.544 mbps b 2.048 mbps c 34.368 mbps d 44.736 mbps
1.544 mbps
What is the typical cable segment length for a copper twisted-pair Ethernet cable? a 33 meters b 55 meters c 100 meters d 250 meters
100 meters
T3 lines support data transfer rates of up to: a 1.544 mbps b 2.048 mbps c 34.368 mbps d 44.736 mbps
44.736 mbps
What type of standard is LTE? a 1G b 2G c 3G d 4G
4G
What is the size of an ATM cell? a 32 bits b 53 bytes c 48 bits d 56 bytes
53 bytes
Which of the answers listed below refers to the maximum data transfer rate of an OC-12 connection? a 622.08 mbps b 1244.16 mbps c 2488.32 mbps d 9953.28 mbps
622.08 mbps
Which of the DNS database records listed below returns a 32-bit IPv4 address? a MX b AAAA c CNAME d A e PTR
A
What is the most common type of a DSL Internet access? a VDSL b ADSL c SDSL d UDSL
ADSL
An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to as: a demarc b access point (AP) c intermediate distribution frame (IDF) d active hub
AP (access point)
Which of the answers listed below refer to examples of packet-switching communication methods? (Select 2 answers) A frame relay B POTS C T-carrier D ATM E E-carrier
ATM frame relay
Which of the following twisted-pair copper cabling types is most commonly used in modern Ethernet networks? a CAT3 b CAT4 c CAT5 d CAT5e
CAT5e
What is the minimum cabling requirement for a 10GBASE-T network? a CAT5 b CAT5e c CAT6 d CAT6A
CAT6
Which of the following answers refer to cellular technologies used in mobile networks? (Select 3 answers) a CDMA b GSM c CSMA d LTE e DWDM
CDMA GSM LTE
Which of the following solutions are used for implementing VPNs? (Select all that apply) a IPSec b GRE c SDLC d SSL/TLS e PPTP
IPSec GRE SSL/TLS PPTP
Which of the following connector types are used for connecting devices to a RS-232 port? (Select 2 answers) a RJ-11 b DB-9/DE-9 c ST d RJ-48C e DB-25 f LC
DB-25
Which of the following solutions provides an alternative to manual assignment of IP addresses? a DNS b SNMP c NAT d DHCP
DHCP (dynamic host configuration protocol)
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as for example numerical IP addresses? a TCP/IP b DNS c SQL d DHCP
DNS
In order to be able to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request? A ICS server B web server C DNS server D DHCP server
DNS server
Which of the answers listed below refers to a solution that allows for keeping a domain name linked to a changing IP address? a network address translation (NAT) b domain name system (DNS) c dynamic host configuration protocol (DHCP) d dynamic DNS (DDNS)
Dynamic DNS (DDNS)
Which of the following answers refers to a software or hardware that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through? a HIDS b firewall c load balancer d vulnerability scanner
Firewall
A security solution implemented on an individual computer monitoring that specific system for malicious activities or policy violations is referred to as: a NIPS b MAC filter c firewall d HIDS
HIDS
Which of the following answers lists an example of a protocol used for implementing control over multiple Access Points (APs)? a LDAP b LWAPP c RTSP d MGCP
LWAPP
The characteristic feature of the Evolved High-Speed Packet Access (HSPA+) standard is the use of: a SDLC b MIMO c CSMA/CD d KVM
MIMO
Which of the technologies listed below enables the use of different types of network protocols on the same network? a LWAPP b MPLS c MLPPP d MIBS
MPLS
Which of the following DNS database records maps a domain name to a list of mail servers for that domain? a AAAA b MX c PTR d CNAME e A
MX
Which of the following solutions alleviates the problem of depleting number of routable IPv4 addresses? a DNS b NAT c GRE d VPN
NAT
Which of the following solutions provide(s) the AAA functionality? (Select all that apply) a PAP b RADIUS c TACACS+ d PPTP e MSCHAP
RADIUS TACACS
A dial-up or VPN connection allowing remote users to access corporate network requires what type of service? a RAS b PoE c NAS d WPS
RAS
Which of the following answers list examples of coaxial cabling types? (Select 2 answers) a STP b RG-59 c multimode fiber d UTP e RG-6 f single mode fiber
RG-59 RG-6
Which of the following connector types would be used for terminating a T-1 line? a RJ-45 b RJ-48C c UTP d RJ-11
RJ-48C
Which of the following answers refers to an international standard for high-speed data communications over fiber-optic media? a ISDN b HSPA+ c LTE d SONET
SONET
Which of the following answers refers to a dedicated device for managing encrypted connections established over an untrusted network, such as the Internet? a VPN concentrator b load balancer c managed switch d multilayer switch
VPN concentrator
A system that uses public network (e.g. Internet) as a means for creating private encrypted connections between remote locations is known as: a Personal area network (PAN) b Virtual local area network (VLAN) c integrated services digital network (ISDN) d virtual private network (VPN)
Virtual private network (VPN)
A type of network covering large geographic areas is commonly referred to as: a LAN b MAN c WLAN d WAN
WAN (wide area network)
The IEEE 802.16 standards defining high-speed, long-distance wireless communication are also commonly referred to as: a ISDN b SONET c WiMAX d HSPA+
WiMAX
In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called: a authentication b authorization c accounting
accounting
Which of the following statements describe the function of a forward proxy? (Select 2 answers) a acts on behalf of a client b hides the identity of a client c acts on behalf of a server d hides the identity of a server
acts on behalf of a client hides the identity of a client
Which of the statements listed below describe the function of a reverse proxy? (Select 2 answers) a acts on behalf of a client b hides the identity of a client c acts on behalf of a server d hides the identity of a server
acts on behalf of a server hides the identity of a server
Which of the devices listed below allows for establishing a communication channel over a PSTN? a analog modem b ICS server c multilayer switch d default gateway
analog modem
Which part of the AAA security architecture deals with the verification of the identity of a person or process? a authentication b authorization c accounting
authentication
Which of the answers listed below refers to the process of granting or denying access to resources? a authentication b authorization c accounting
authorization
Which of the following answers list(s) the characteristic feature(s) of fiber-optic cabling? (Select all that apply) a high signal attenuation b immunity to electromagnetic interference c provides higher level of security than copper cabling (difficult to tap into d low bandwidth capacity e more suitable for carrying digital information than copper cabling
b immunity to electromagnetic interference Provides higher level of security than copper cabling (difficult to tap into) More suitable for carrying digital information than copper cabling
The use of cable modems within a standard cable television infrastructure for Internet access is commonly referred to as: a broadband cable b frame relay c metro-ethernet d dial-up
broadband cable
Which of the following statements describing the function of a DNS PTR record are true? (Select 2 answers) a PTR record creates a pointer that maps a hostname to an IP address for reverse lookups. b The functionality provided by a PTR record allows multiple domain names to resolve to the same IP address. c PTR record resolves an IP address to a hostname for reverse lookups. d The functionality provided by a PTR record is the opposite of A and AAAA DNS records ePTR record maps a domain name to a list of mail servers for that domain.
c PTR record resolves an IP address to a hostname for reverse lookups. d The functionality provided by a PTR record is the opposite of A and AAAA DNS records
Which of the cabling types listed below provide(s) protection against an outside signal interference? (Select all that apply) a UTP b coaxial c fiber-optic d STP
coaxial fiber-optic STP
Which of the following answers list(s) the characteristic feature(s) of a Category 5 (CAT5) cabling? (Select all that apply) a copper cable b RJ-45 connector c fiber optic cable d 10 gbps ethernet e 100 mbps ethernet
copper cable RJ-45 connector 100 mbps ethernet
A device used for the purpose of extending the length of various types of network cable runs is commonly referred to as: a coupler b media converter c amplifier d cable certifier
coupler
In twisted-pair cabling wires are grouped into pairs and wires in each pair are twisted around each other in order to reduce: a cross-talk b cable diameter c collisions d bend radius
cross-talk
Which of the following Internet access types takes advantage of the traditional PSTN lines? a fiber-optic b mobile broadband c dial-up d WiMAX
dial-up
An SSL VPN connection typically requires a dedicated VPN client application. true or false
false
Which of the connector types listed below are used with coaxial cabling? (Select 2 answers) a ST b MT-RJ c BNC d LC e F- connector
BNC F-connector
The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance. a router b switch c bridge d hub
Hub
Which of the following answers illustrates the difference between passive and active security breach response? a HIPS vs NIPS b UTM vs Firewall c CSMA/CD vs CSMA/CA d IDS vs IPS
IDS vs IPS
The DNS database AAAA record creates a pointer that maps a hostname to: a IPv4 address b mail server c IPv6 address d canonical name
IPv6
Which of the following solutions allows for simultaneous digital transmission of voice, video, data, and other network services over a PSTN? a WiMAX b PoE c ISDN d HSPA+
ISDN
Which of the following answers refers to a Network Address Translation (NAT) method that binds a combination of private IP address and port number with a corresponding public IP address and port information? a PAT b RAS c GPG d EAP
PAT
Which of the answers listed below refer(s) to example(s) of circuit-switching communication method(s)? (Select all that apply) a frame relay b POTS c t-carrier d ATM e e- carrier
POTS T-carrier E-carrier
Which of the following answers refers to a method for establishing a dedicated point-to-point link between two networked devices? a PSK b PTR c PKI d PPP
PPP
A technology that allows for prioritizing certain types of network traffic in order to improve the overall network effectiveness and performance is known as: a AAA framework b packet shaping c content filtering d port forwarding
Packet shaping
A device designed to filter and transfer data packets between dissimilar types of computer networks is called: a: hub b: load balancer c: Router d: Switch
Router
Which of the following answers refers to a data link layer (Layer 2) device designed to forward data packets between Local Area Network (LAN) segments? a switch b firewall c router d hub
Switch
Dynamic Network Address Translation (DNAT) provides a permanent mapping between a private IP address and a public IP address on a one-to-one basis. true or false
false
Static Network Address Translation (SNAT) provides a mapping between private IP address and any of the IP addresses belonging to the available public IP address pool. true or false
false
The RS-232 standard defines an interface for parallel data transmission method. true or false
false
The duration of time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as: a option b resercation c scope d lease
lease
Which of the following answers lists a more costly alternative to VPN? a dial-up b leased line c broadband cable d satelite
leased line
A network device designed for managing the optimal distribution of workloads across multiple computing resources is called: a layer 3 switch b access point (AP) c load balancer d domain controller
load balancer
A method that allows to combine multiple analog or digital data streams for transmission over a shared medium is known as: a multiplexing b load balancing c packet shaping d frame aggregation
multiplexing
DHCP allows for passing additional configuration settings to DHCP clients on a network. The additional settings might include (among other types of configuration info) the default gateway IP address, or DNS server IP address. Which of the answers listed below refers to the part of a DHCP message containing those settings? a options b scope c reservation d lease
options
A type of enclosed space in a building (such as the one between a dropped ceiling and the structural ceiling) used for air handling is commonly referred to as: a plenum b access point c cable tray d HVAC system
plenum
A server with a private IP address has been set up to handle requests from an outside (public) network. Which of the solutions listed below would enable this function? a port bonding b port labeling c port forwarding d port mirroring
port forwarding
In computer networking, a system or an application processing requests on behalf of another system is commonly referred to as a proxy b web server c main-in-the-middle (MITM) d first responder
proxy
Which of the following terms refers to permanent IP address assignment from a DHCP server? a scope b reservation c DHCP relay d lease
reservation
A range of IP addresses assigned to hosts requesting dynamic IP address from a DHCP server is known as: a lease b DHCP relay c scope d reservation
scope
What are the characteristic features of satellite Internet connections? (Select all that apply) a lack of signal interface b signal latency c high connection speed d interference (weather dependent) e low connection speed
signal latency interference (weather dependent) low connection speed
A device that apart from the function of an ordinary network switch can also provide additional functions at higher levels of the OSI reference model is known as a multilayer switch. true or false
true
A mechanism that allows for connecting one set of wires with another set of wires in telecommunications closets or local area networks (LANs) is commonly referred to as a punch-down block true or false
true
A special type of cabling with a fire-retardant jacket placed inside the space between structural floor and dropped ceiling or inside walls is known as a plenum-rated cabling. true or false
true
Category 3 (CAT3) cable is a 10 Mbps twisted-pair copper cable used in telephone wiring. true or false
true
In terms of size and reach, a Metropolitan Area Network (MAN) can be placed between a LAN (smaller type of network) and a WAN (larger type of network). true or false
true
MLPPP provides a method for combining two or more physical communication links into one logical interface for the purpose of improved speed and redundancy. true or false
true
Materials from which the plenum-rated cable's cover is made include low-smoke polyvinyl chloride (PVC) and fluorinated ethylene polymer (FEP). true or false
true
Metro-Ethernet" is a general term for a computer network larger than a Local Area Network (LAN) and based on Ethernet standards. true or false
true
Networked clients not residing on the same subnet as the DHCP server can still obtain an IP address from the server through a DHCP relay agent. true or false
true
One of the features of the Dynamic Host Configuration Protocol (DHCP) is the capability for static allocation of an IP address based on the IP-to-MAC address mapping. true or false
true
Optical Carrier (OC) transmission rate specifications adhere to a pattern whereby OC prefix is followed by a number designating a multiple of the base unit of 51.84 Mbps. true or false
true
The Category 6 (CAT6) cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas CAT6A (Augmented) cabling allows for 10 Gbps data transfer rate over a cable segment length of 100 meters. true or false
true
Which of the following answers refer to the RJ-45 connector? (Select 2 answers) a used with telephone cabling b copper cabling connector c used with ethernet network cabling d fiber-optic cabling connector e coaxial cabling connector
used with ethernet network cabling copper cabling connector
What are the characteristic features of the RJ-11 connector? (Select 2 answers) a used with telephone cabling b copper cabling connector c used with ethernet network cabling d fiber-optic cabling connector e coaxial cabling connector
used with telephone cabling copper cabling connector
A software solution designed to enable interaction between two devices over a network is generally referred to as: a proxy b web service c software as a service (SaaS) d virtual switch
web service
An OC-3 line supports transmission rates of up to: a 1.544 mbps b 51.54 mbps c 44.736 mbps d 155.52 mbps
155.52 mbps
Which of the following answers lists the maximum data transfer rate of an E1 connection? a 1.544 mbps b 2.048 mbps c 34.368 mbps d 44.736 mbps
2.048 mbps
Which of the answers listed below refers to the maximum data transfer rate of an E3 connection? a 1.544 mbps b 2.048 mbps c 34.368 mbps d 44.736 mbps
34.368 mbps
Which of the DNS database records listed below allows multiple domain names to resolve to the same IP address? a MX b CNAME c AAAA d PTR e A
CNAME
Which of the following answers refer(s) to the multiplexing method(s) used in fiber-optic communication? (Select all that apply) a CDMA b CWDM c CSMA d DWDM
CWDM DWDM
An application software used to selectively block access to certain websites is an example of: a captive portal b media converter c content filter d proxy server
Content filter