Network Pro Most ++++++++

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values.

DHCP server

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54Mbps. In addition, the client already has a wirelesss telephone system installed that operates 2.4GHz. Which 802.11 standard will work best in this situation?

802.11a

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

802.11n

You are building network cables and attaching RJ-45 connectors to each end. Which tool do you need for this task? A Crimping tool B Punch down tool C Vampire taps D Needle nose pliers

A Crimping tool

You have a network that occupies the top floor of a three story building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. What would you use to relocate the WAN line into a wiring closet on your floor? A Demarc extension B Horizontal cross connect C 66 block D 110 block E Smart jack

A Demarc extension

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two.) A Greater cable distances without a repeater B Immunity to electromagnetic interference C Lower installation cost D Faster installation

A Greater cable distances without a repeater B Immunity to electromagnetic interference

Which of the following are characteristics of coaxial network cable? (Choose three.) A It uses two concentric metallic conductors. B It uses two concentric conductors made from plastic or glass which conduct light signals. C It uses RJ-45 connectors D It has a conductor made from copper in the center of the cable. E The ends of the cable must be terminated. F It is composed of four pairs of 22—gauge copper wire. G The conductors within the cable are twisted around each other to eliminate cross—talk.

A It uses two concentric metallic conductors. D It has a conductor made from copper in the center of the cable. E The ends of the cable must be terminated.

Which of the following connectors are used with fiber optic cables and include both cables in a single connector? (Select two.) A LC B ST C sc D MT-RJ E Bixlc

A LC D MT-RJ

You are installing networking wiring for a new Ethernet network at your company's main office building. The project specifications call for Category 5 UTP network cabling and RJ-45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of Category 3 network cable in storage. Upon investigation, it appears very similar to Category 5 wiring. Should you substitute Category 3 cabling for Category 5 cabling to finish the project? A No, Category 5 cabling has more twists per inch than Category 3 cabling to reduce cross—talk and support higher data rates. B No, Category 3 cabling doesn't support RJ-45 connectors. C No, Category 5 cabling uses a thicker copper wire than Category 3 cable; enabling higher data transmission rates. D No, the sheath surrounding Category 5 cable is much thicker; creating an extra layer of shielding to reduce cross—talk and support higher data rates. E Yes, you can substitute Category 5 wiring with Category 3 wiring, as they are electrically identical

A No, Category 5 cabling has more twists per inch than Category 3 cabling to reduce cross—talk and support higher data rates.

You have a small home network connected to the Internet using an RG-6 cable. You need to move the router connecting the network to the Internet, but can't find any RG-6 cable. Which cable types could you use instead? A RG-59 B RG-8 C RG-8, RG-58, or RG—59 D RG-58 or RG-59 E RG-58 F RG-8 or RG-58

A RG-59

F—type connectors are typically used with cables using which of the following standards? (Select two.) A RG-59 B RG-6 C RG-58 D cat 5 E Cat 5e F Cat 6e

A RG-59 B RG-6

Which of the following cable classifications are typically used for cable and satellite networking with coaxial cables? (Select two.) A RG-6 B RG-8 C RG-58 D RG-59

A RG-6 D RG-59

Which of the following connectors usually require polishing as part of the assembly process? (Select two.) A ST B AUI C IDC D SC E BNC

A ST D SC

You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. Which of the following best describes what happens to network communications?

No device will be able to communicate

Which of the following is true about single mode fiber optic network cabling? A The central core is smaller than that of multimode fiber optic cabling. B It transmits multiple rays of light concurrently. C It doesn't support segment lengths as long as that supported by multimode fiber optic cabling. D It's less expensive than multimode fiber optic cabling. E The central core is composed of braided plastic or glass fibers.

A The central core is smaller than that of multimode fiber optic cabling.

Which of the following are characteristics of an LC fiber optic connector? (Choose two.) A They use a housing and latch system similar to an RJ-45 UTP connector. B They are threaded. C They use a one—piece bayonet connecting system. D They are half the size of standard connectors. E They can be used with either fiber optic or copper cabling. F They use a stainless steel housing.

A They use a housing and latch system similar to an RJ-45 UTP connector. D They are half the size of standard connectors.

Which of the following are characteristics of an MT-RJ fiber optic connector? (Select two.) A They use metal guide pins to ensure accurate alignment. B They use a keyed bayonet. C They use a nickel-plated housing. D They can be used with multimode fiber optic cables. E They must never be used with single-mode fiber-optic cables. F They are used with multifiber fiber optic ribbon cables.

A They use metal guide pins to ensure accurate alignment. D They can be used with multimode fiber optic cables.

While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of CRC errors on one interface. This interface is connected to a user's workstation located in a cubicle on the 2nd floor. What could be causing this to happen?

A strong EMI emitter near the cable run connected to that interface.

You manage several Windows systems. Deskstop users access an in-house application that is hosted on you intranet Web server. When a user clicks a specific option in the application, they receive an error message that the popup was blocked. You need to configure the security settings so that users can see the pop-up without compromising overall security. What should you do?

Add the URL of the Web site to the Local Intranet zone.

You want to allow e-commerce Web site that you visit to keep track of your browsing history for shopping carts and other information, but want to prevent that information from being tracked by sites linked to the sites you explicitly visit. How should you configure the browser settings?

Allow first party cookies but block third-party cookies

You have been getting a lot of phishing e-mails sent from the domain Kenyan.msn.pl. Links within these e-mails open new browser windows at youneedit.com.pl You want to make sure that these e-mails never reach your Inbox, but the e-mails from other senders are not affected. What should you do?

Add Kenyan.msn.pl to the e-mail blacklist.

an attacker inserts SQL database commands into a data input field of an order form used by a web-based application

implementing client-side validation

In which of the following situations might you use an RJ-11 connector? A You want to connect the 10BaseT network card in your computer to a switch. B You want to connect your computer to the Internet with a dial-up connection. C You want to upgrade your 10BaseT network to 10OBaseT. D You want to test a network cable to see if there is a break in the line.

B You want to connect your computer to the Internet with a dial-up connection.

You are making Ethernet drop cables using Cat5e cable and RJ-45 connectors. You need to remove the plastic coating over the cable to expose the individual wires. Which tool should you use? A Snips B Punchdown tool C Cable stripper D Butt set

C Cable stripper

When using 110 blocks for connecting Cat5 and higher data cables, which recommendation should you follow? A Use C-5 connectors. B Connect wires using the T568A standard. C Keep wire pairs twisted up to within one—half of an inch of the connector. D Connect wires using the T568B standard.

C Keep wire pairs twisted up to within one—half of an inch of the connector.

Of the following cables, which offer the best protection against EMI? A cat 5 B RG-6 C Single mode fiber optic D Cat 5e

C Single mode fiber optic

When would you typically use an RJ-11 connector? A When using single mode fiber optic cables. B When using Cat 3 cables. C When connecting a phone to a phone line. D When using multimode fiber optic cables. E When using Cat 5 or higher cables. F When using RG—6 cables.

C When connecting a phone to a phone line.

Which of the ff. is specifically meant to ensure that a program operates on clean, correct and useful data?

input validation

Of the following cables, which offer the best protection against EMI? A Cat 5e B Cat 6e C cat 5 D RG-6

D RG-6

Which of the following connectors is used with fiber optic cables and connects using a twisting motion? A F-type B LC C sc D ST E Bixlc

D ST

Which of the following forms of optical fiber would usually be used to connect two buildings across campus from each other, which are several kilometers apart? A Dual mode B Fibre Channel mode C Multimode D Single mode

D Single mode

You have installed a new application on a network device. During testing, it appears as if the software is causing other services running on the device to stop responding. Which tool should you consult to identify the problem?

Application log.

You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building. Which of the following are you most likely to experience?

Attenuation.

What are the most common network traffic packets captured and used in a replay attack? DNS query File transfer Authentication Session termination

Authentication

What tool should you use to extend network services beyond the demarc? A Tone generator B Punchdown tool C Crimper D Media certifier

B Punchdown tool

Which of the following applications is more likely to justify the investment in Category 6 cable? A E-maiI B Instant Messaging C Printing D Streaming video

D Streaming video

Which of the following cable types often includes a solid plastic core? A cat 5 B cat 3 C Cat 5e D cat 6

D cat 6

Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?

CSU/DSU

A user reports that she can't connect to the internet. After some investigation, you find the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point. What should you do next?

Create an action plan.

You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use? A RJ-45 B RJ-11 C sc D F-type E ST F smc

D F-type

You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights. You would like to run your Ethernet cables in this area. Which type of cable must you use? A Fiber optic B pvc C srp D Plenum E Cat 5e or Cat 6e

D Plenum

Which of the following describes the point where the service provider's responsibility ends and the customer's responsibility begins for installing and maintaining wiring and equipment? A Smart jack B tor C Punchdown block D Vertical cross connect E Demarc

Demarc

Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?

Deploy a mantrap

Users report that the network is down. After some investigation, you determine that a specific router is configured such that a routing loop exists. What should you do next?

Determine if escalation is needed.

A user reports that she can't connect to a server on your network. You check the problem and find out that all users are having the same problem. What should you do next?

Determine what has changed.

You are a network administrator for your computer. A frantic user calls you one morning exclaiming that "nothing is working." What should you do next in your troubleshooting strategy?

Establish the symptoms.

You manage a firewall that connects your private network to the Internet. You would like to see a record of every packet that has been rejected by the firewall in the past month. Which tool should you use?

Event log.

Which of the following terms describes a Windows operating system patch that corrects a specific problem and is release on a short-term, periodic basis (typically monthly)? A. Targeted software patch B. Hotfix C. Kernel fix kit D. Service pack

Hotfix Explanation: A hotfix is an operating system patch that corrects a specific known problem. Microsoft typically releases hotfixes monthly. Service packs include a collection of hotfixes and other system updates. Service packs are not released as Often, but contain all hotfixes released to that time.

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the most likely cause of the problem is a bug in the router's software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next?

Identify possible effects of the solution.

A user reports that he can't connect to a specific Web site. You go to the user's computer and reproduce the problem. What should you do next?

Identify the affected areas of the network.

A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works. What should you do next?

Identify the results and effects of the solution

You have a Web site that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before the performance is negatively impacted. Which tool should you use?

Load tester

What is the primary goal of business continuity planning?

Maintaining business operations with reduced or restricted infrastructure capabilities or resources.

You connect a packet sniffer to a switch to monitor frames on your local area network. However, the packet sniffer is only able to see broadcast frames and frames addressed specifically to the host device. Which feature should you enable on the switch so you can see frames from all devices connected to the switch?

Mirroring.

You decide to use a packet sniffer to identify the type of traffic sent to the router. You run the packet sniffing software on a device which is connected to a hub with three other computers. The hub is connected to the same switch that is connected to the router. When you run the software, you only see frames addressed to the four workstations but not to the router. Which feature should you configure?

Mirroring.

You manage a network with multiple subnets connected to the Internet. A user reports that she can't access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on the subnet, however the computer does access other computers on other subnets as well as the Internet. Which of the following is most likely the cause of the problem?

Missing route on the default gateway router.

Which of the following is a firewall function?

Packet filtering

You are concerned about attacks directed against your firewall on your network. You would like to examine the content of individual frames sent to the network. Which tool should you use?

Packet sniffer.

You want to know what protocols are being used on your network. You'd like to monitor network traffic and sort traffic based on protocol. Which tool should you use?

Packet sniffer.

You have discovered a computer that is connected to your network that was used for an attack. You have disconnected the computer from the network to isolate it from the network and stop the attack. What should you do next?

Perform a memory dump

You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, that she can no longer access the network. You go to the office and see that one of the user's stiletto heels has broken and exposed some of the wiring in the Cat 5 network cable. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy?

Test the solution.

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffer software on a device which is connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation and not other devices. Which feature should you configure?

Promiscuous mode.

Which of the ff. is an advantage of virtual browser?

Protects the operating system from malicious downloads

You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use?

Protocol analyzer.

Which of the following are differences between RADIUS and TACACS+?

RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers.

A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server. Which of the following troubleshooting actions are you most likely to perform first?

Replace the network card in the user's computer.

You have a development machine contains sensitive information relative to your business. You are concerned that spyware and malware installed while browsing websites could compromise your system or pose a confidentiality risk. Which of the ff. would best protect your system?

Run the browser within a virtual environment

You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B. On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packets between Host A and Host B. What should you do?

Run the packet sniffer application on Host B.

you want to use a protocol for encrypting e-mails that uses a PKI with x.509 certificates. which method should you choose

S/MIME

What type of attack is most likely to succeed against communications between Instant Messaging clients?

SNIFFING

You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You watn wireless users to be able to connect to either access point, and to be able to raom between the two access points. How should you configure the access points?

Same SSID, different channel

Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes?

TCP

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer.While talk to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor.

You have a WAN link that connects two sites. The WAN link is supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the actual bandwidth of the link. Which tool should you use?

Throughput tester.

You are the network administrator for a growing business. When you were initially hired, the organization was small and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. However, the organization has grown considerably in recent months. You now must manage 8 individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do?

Use syslog to implement centralized logging.

Which of the ff. are disadvantages to server virtualization?

a compromise of the host system might affect multiple servers;

you manage several windows systems. all computers are members of domain. you use an internal website that uses integrated windows authentication. you attempt to connect the website and are promted for authentication

add the internal website to the local intranet zone

A programmer that fails to check the length of input before processing leaves his code vulnerable to what form of common attack?

buffer overflow

Having poor software development practices and failing to program input validation checks during development of custom software can result in a system vulnerable to which type of attack?

buffer overflow

Which type of attack is the act of exploiting a software program's free acceptance of input in order to execute arbitrary code on a target?

buffer overflow

while using a web-based order form, an attacker enters an unusually large value in the quantity field. the value she entered is so large that it exceeds the maximum value supported by the variable type used to store the quantity in the web application.

integer overflow

To help prevent browser attacks, users of public computers should do which of the ff.?

clear the browser cache

You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this?

client-side scripts

during the application dev cycle, a developer asks serveral of his peers to asses the portion of the application he was assigned to write

code review

during the application development cycle, an application tester creates multiple virtual machines on a hypervisor, each with a different version

configuration testing

Which of the ff. is a text file provided by a Web site to client that is stored on a user's hard drive in order to track and record information about the user?

cookie

Use of which of the ff. is a possible violation of privacy?

cookies

when you browse to a website, a pop-up window tells you that your computer has been infected with a virus. You click on the window to see what the problem is.

drive-by download

What is the most common means of virus distribution

e-mail

Which of the ff. will enter random data to the inputs of an application?

fuzzing

flash explotation

lso exploit

you install a new linux distribution on a server in your network.

open SMTP relay

What common design feature among Instant Messaging clients make them more insecure than other means of communicating over the Internet?

peer-to-peer networking

users in your organization receive email messages informing them that suspicious activity has be detected on their bank account

phishing

Instant Messaging does not provide which of the ff.?

privacy

an attacker sends an unwanted and unsolicited email message to multiple recipients with an attachment that contains malware

spam

Which type of malicious activity can be described as numerous unwanted and unsolicited e-mail messages sent to a wide range of victims?

spamming

Which of the ff. is not true regarding cookies?

they operate within a security sandbox

While working on a Linux server, you are unable to connect to Windows Server 2003 system across the Internet. You are able to ping the default gateway on your own network, so you suspect the problem lies outside the local network. Which utility would you use to trace the route a packet takes as it crosses the network?

traceroute.

Which of the following is an attack that injects malicious scripts into Web pages to redirect users to fake websites or gather personal information?

xss


संबंधित स्टडी सेट्स

Review for Unit 1 Assessment Quizlet

View Set

PREP U CH.16 Documentation & Communication

View Set

The Three Branches of Government

View Set

Behavioral Neuroscience - Final Exam

View Set

College Math Prep. A (2021) Unit Exam One

View Set