Network + Questions
hich of the protocols included with TCP/IP reports messages and errors regarding packet delivery? ARP IP ICMP IGMP
ICMP
On a UNIX host, which TCP/IP parameters must be defined for the host to be able to communicate with hosts on a remote network? (choose THREE) IP address Subnet mask Default gateway TTL Destination Address Loopback address
IP address Subnet mask Default gateway
What is the function of the protocol field in an IPv4 header? Indicate the type of data link protocol (such as Ethernet or Wi-Fi) Indicate the protocol type of the payload (such as TCP or UDP) Indicate the version of IP (iPv4 or IPv6) None of the above
Indicate the protocol type of the payload (such as TCP or UDP)
Which of the following network installation, management, or monitoring functions is supported by PoE? Supporting legacy hubs in a switched environment Supporting legacy bridges in a switched environment Supporting legacy Ethernet standards Monitoring network traffic Monitoring switch status Installing devices without separate power cabling
Installing devices without separate power cabling
What is the function of a network controller? Makes overall forwarding decisions for an entire network Interfaces with network appliances to configure them in accordance with software-defined networking policies Automates the provision of virtual network appliances Manages user access to network services
Interfaces with network appliances to configure them in accordance
What type of hybrid topology is in widespread use in modern local area networks (LANs)? Logical bus - physical star Logical star - physical bus Logical bus - physical partial mesh Logical bus - physical ring
Logical bus - physical star
What is attenuation? Loss of signal strength Corruption of signal Loss of frequency Loss of baud rate
Loss of signal strength
What network infrastructure implementation is larger than a LAN but smaller than a WAN? WLAN SAN PAN MAN
MAN
What uniquely identifies every NIC? IP address Media access control address ISO number Packet ID number
Media access control address
Which OSI layer handles the concept of logical addressing? Data Link Network Transport Session Presentation
Network
Which layer found in the OSI model relates to the Internet layer found in the TCP/IP model? Physical Data Link Network Transport Session
Network
What type of policy covers issuance of credentials and account privileges, issuance of computers and mobile devices, and acceptance of company policies? BYOD Onboarding Offboarding AUP PUA
Onboarding
Which of the following is MOST likely to be subject to international export controls? Commercial software licensing Remote access services BYOD Asset disposal PII
PII
Which of the following BEST describes the type of network established by TCP/IP? Packet switched network Circuit switched network Local Area Network Wide Area Network
Packet switched network
What term is used to describe a topology in which exactly two nodes share a single link? Bus Client-server Mesh Point-to-point Ring
Point-to-point
What is the difference between policy and best practice? Policy is a formal statement of intent while best practice represents a successful way of doing something (without violating policy). Policy is advisory while best practice should be followed because of its proven success. Policy is a list of procedures while best practice is a guide to implementing those procedures successfully. Policy establishes benchmarks while best practice establishes progress towards benchmarks.
Policy is a formal statement of intent while best practice represents a successful way of doing something (without violating policy).
What type of network operation or monitoring is supported by SPAN? STP MAC address table Root Guard Flood Guard Port mirroring PoE
Port mirroring
What is the function of STP? Prevent layer 2 loops Prevent flooding Prevent broadcasting Prevent port mirroring
Prevent layer 2 loops
What is the proper name for a "chunk" of information transmitted as a single unit at any layer of the OSI model? Frame Message Transmission Unit Payload Protocol Data Unit
Protocol Data Unit
Which MAC address begins in a frame. Receiving system Sending system Network Router
Receiving system
What is microsegmentation? Reducing the size of broadcast domains to a single switch port Reducing the size of collision domains to a single switch port Reducing the size of spanning tree domains to a single switch port All of the above
Reducing the size of collision domains to a single switch port
What type of policy governs use of a computer located at an employee's home to join the corporate network? Remote access Acceptable use Data loss prevention Bring your own device System lifecycle
Remote access
Which of the following terms is NOT used to describe an end system device, such as computer or smartphone, communicating on a wired or wireless network? Host Node Station Router
Router
What technology or technologies can you use to isolate broadcast domains? (choose TWO) Hub Bridge Switch (unmanaged) Router Switch (VLAN)
Router Switch (VLAN)
Which of the following statements BEST describes the concept of distributed switching? Reducing collision domains Reducing broadcast domains Segmenting traffic using physically separate switches Segmenting traffic using a hierarchical switch topology Segmenting traffic using a flat switch topology
Segmenting traffic using a hierarchical switch topology
A systems engineer troubleshoots communications between devices on a network. When troubleshooting, the engineer focuses on full-duplex communications and reliable delivery. Which layers represent the areas the engineer troubleshoots? (Choose 2) Physical Data Link Network Transport Session Presentation Application
Session Transport
Which layer of the OSI seven layer model keeps track of a systems's connections to send the right response to the right computer? Application Layer Presentation Layer Session Layer Transport Layer
Session Layer
In IPv6, how could you distinguish a unicast address with global scope from other addresses? (choose TWO) Starts with binary 001 Starts with binary 1 Starts with binary 111 Starts with hex 2 or 3 Starts with hex 1
Starts with binary 001 Starts with hex 2 or 3
What is the purpose of a SAN? Storage Services Distributed switching SDN automation
Storage
What type of device isolates the use of the CSMA/CD protocol to a single port? Hub Bridge Switch Repeater
Switch
Which of the following devices would you select to implement layer 2 connectivity on a modern Ethernet network? Hub Bridge Switch Router
Switch
What type of device is used to implement a star topology (select TWO)? Modem Repeater Switch Wireless Access Point
Switch Wireless Access Point
A technician is troubleshooting a network and has asked your advice. He is trying to ping 192.168.16.225. The network has a subnet ID of 192.168.16.192 and has been subnetted with the custom mask 255.255.255.224. Why might this return a "Destination host unreachable" message? The IP address is out of range. The IP address resolves to the subnet broadcast address, not a host address. The IP address resolves to the subnet network address, not a host address. The IP address is in a private range.
The IP address is out of range.
If a packet is addressed to a remote network, what destination MAC address will the sending node use? The broadcast address (ff:ff:ff:ff:ff:ff) The broadcast address (ff:ff:ff:ff:ff:ff:ff:ff) The broadcast address (00:00:00:00:00:00) The MAC address of the default gateway.
The MAC address of the default gateway.
With CSMA/CD, what will happen if a computer has data to transmit and there is already data on the cable? The computer will transmit Request to Send messages until the media is clear. The computer will continue to attempt to send the message. The computer will delay the message for a random period before retrying. None of the above
The computer will delay the message for a random period before retrying.
What is an MTU? The minimum size of an Ethernet frame. The maximum size of a frame's payload. The maximum size of a frame. The technical name for a data link PDU.
The maximum size of a frame's payload.
You need operations to continue if one link fails. What is the minimum number of links required to connect three sites for continuous operation? Two Three Four Five
Three
Where does a hub send data? Only to the receiving system Only to the sending system To all the systems connected to the hub Only to the server
To all the systems connected to the hub
You are installing a workgroup laser printer and toner cartridge using an existing patch cable and wall port. Which of the following safety elements is LEAST relevant to the installation? Electrical safety Tool safety Fire safety Lifting equipment MSDS
Tool safety
Which component is responsible for translating the computer's digital signals into electrical or optical signals that travel on network cable? Media Converter Modem Repeater Transceiver
Transceiver
At which OSI layer is the concept of a port number introduced? Data Link Network Transport Session Presentation
Transport
Which layer of the TCP/IP model controls the segmentation and reassembly of the data? Application Layer Presentation Layer Session Layer Transport Layer
Transport Layer
True or false? A router will not forward a packet when the TTL field is zero. True False
True
True or false? DLP technology can assist with managing PII. True False
True
True or false? Receiving an echo reply message indicates that the link between two hosts is operational. True False
True
True or false? Switch ports should normally be set to autonegotiate speed and duplex settings. True False
True
True or false? The ipconfig utility can be used to empty the DNS cache. True False
True
Why can't the 0.0.0.0/8 block be assigned to hosts? Used for loopback addressing Used for unknown addresses on the local network Used for unknown addresses on remote networks Used for documentation and examples None of the above
Used for unknown addresses on the local network
Which of the following is NOT an appropriate password policy? User passwords must be 12 characters or longer. User passwords must not be simple dictionary words or word combinations. User passwords must be changed every 60 days. User passwords must not be written down or saved to a computer file. User passwords must be reused for different systems within the same company.
User passwords must be reused for different systems within the same company.
A frame ends with a special bit called the Fram check sequence (FCS). What does the FCS do? Cycles the data across the network Verifies the MAC addresses are correct Verifies the data arrived correctly Verifies the IP address is correct
Verifies the data arrived correctly
What type of network infrastructure is MOST likely to make use of leasing or service provider networks? LAN PAN SAN WAN WLAN
WAN
Your network ID is currently 192.168.1.0/24. You need to create two subnets within this network. What subnet mask do you need to use? /1 /2 /12 /25 /26
/25
When using VLSM, which network prefix is MOST appropriate for a point-to-point WAN link? /1 /28 /30 /32
/30
Which of the following is an example of a MAC address? 0-255 00-50-56-A3-04-0C SBY3M7 192.168.4.13
00-50-56-A3-04-0C
Which of the following values shows the decimal value "72" in binary? 01001000 00101000 01000100 10010010
01001000
Convert the binary value "1010 0001 1000 1100" to hex. 0x918B 0x908B 0x918C 0xA18B 0xA18C 0xA18D
0xA18C
If a host is configured with the IP address 10.0.10.22 and mask 255.255.255.192, what is the broadcast address of the subnet? 10.0.10.31 10.0.10.47 10.0.10.63 10.0.10.191 10.0.10.254
10.0.10.63
Which of the following values shows the decimal value "137" in binary? 01111001 01111000 01110111 10001001 10001000
10001001
You want to use fiber optic cabling to support 1 Gigabit Ethernet in a LAN. Which Ethernet standard should you use? 100BASE-FX 1000BASE-FX 1000BASE-SX Any of these options
1000BASE-SX
If the IP address 10.0.10.22 were used with an /18 mask, how many subnets and hosts per subnet would be available? 256 subnets each with 65,534 hosts 512 subnets each with 32,766 hosts 1024 subnets each with 16,382 hosts 2048 subnets each with 8,190 hosts
1024 subnets each with 16,382 hosts
Using VLSM, the 192.168.1.0 network has been divided into four subnets. The first subnet uses a /25 netmask and the remainder use a /27 netmask. It is intended to use the remaining address space to create additional subnets for WAN links. What is the first usable host address for a WAN link (assuming a subnetwork ID cannot be used as a host address, even in a point-to-point link)? 192.168.1.127 192.168.1.193 192.168.1.223 192.168.1.225 192.168.1.228 192.168.1.229 192.168.1.253 192.168.1.254
192.168.1.225
Which of the following are class C IP addresses? (Choose FOUR) 195.243.67.51 165.247.200.100 190.234.24.6 11001101 01110100 00000100 00101110 11001111 10000001 01111110 10010010 213.54.53.52 233.168.24.6
195.243.67.51 11001101 01110100 00000100 00101110 11001111 10000001 01111110 10010010 213.54.53.52
Which of the following values shows the binary value "11000101" in decimal? 127 163 185 193 197
197
Which of the following values shows the binary value "11110010" in decimal? 242 240 252 250
242
A host is configured with the IP address 10.0.10.22 and subnet mask 255.255.255.192. How many hosts per subnet would this addressing scheme support? 14 30 32 60 62 64 127 128
62
In IPv6, how is the loopback address best expressed? ::0 ::1 :: Any of the above
::1
hich of the following is NOT used to conceptualize network design hierarchy? Access Core Distribution Aggregation
Aggregation
What is a "Class D" address? A reserved address space used for loopback testing An address space reserved for experimental use A private address space designed for small subnets (up to 254 hosts) An address space used for multicasting
An address space used for multicasting
Which of the following BEST describes an NDA? An agreement to keep information revealed in confidence secret An agreement to use technical controls to protect data managed by an employee An agreement to allow corporate data on a smartphone to be managed by enterprise security controls An agreement to ensure employees do not reveal personal information obtained from customers
An agreement to keep information revealed in confidence secret
If a mapping for a local destination host is not found in a source host ARP cache, how does the source host send an ARP request? As a broadcast to all local hosts As a unicast to all hosts on the same subnet As a multicast to all local hosts Using the arp command
As a broadcast to all local hosts
Which of the following mechanisms protect the STP topology from malicious STP traffic? (choose TWO) BPDU guard Root guard Flood guard Storm guard Port fast
BPDU guard Root guard
Which of the following device types is MOST likely to be part of a PAN rather than any other type of network? Bluetooth headset Wireless printer Wireless Access Point Firewall Laptop
Bluetooth headset
How does a switch keep track of the hardware addresses of hosts connected to its ports? By broadcasting ARP requests By storing MAC addresses in an ARP table By multicasting ARP requests By storing addresses in a MAC address table
By storing addresses in a MAC address table
On a switched network, what configuration changes must be made to allow a host to sniff unicast traffic from all hosts connected to a switch? Configure a mirrored port on the switch Configure promiscuous mode on the switch Configure tcpdump on the switch Configure pcap on the switch
Configure a mirrored port on the switch
Which of the following is NOT a recognized type of network? CAN DAN LAN MAN PAN WAN
DAN
In which layer of the OSI model do network adapter cards operate? Physical Data Link Network MAC LLC
Data Link
Which of the following account types should be governed by a PUA? (choose TWO) Database Administrator Visitor with Internet access Data Entry Technician Systems Architect Software Tester
Database Administrator Systems Architect
What is an EUI-64 and how might it be used by IPv6? Derives a 64-bit host identifier from the interface MAC address or from a random token Derives a 64-bit host identifier from a random token Derives a 64-bit host identifier from the interface MAC address Derives an IPv6 subnet ID from an existing IPv4 subnet None of the above
Derives a 64-bit host identifier from the interface MAC address
What is an I/G bit? Determines whether the "burned-in" address has been replaced with an arbitrary address Determines whether the frame is addressed to a single node or group of nodes Determines whether the frame can be routed outside the local network None of the above
Determines whether the frame is addressed to a single node or group of nodes
Why might the baud rate be different from the bit rate? Encoding might represent more than one bit per symbol. Baud rate does not measure frequency of transmission. Encoding might represent more symbols per bit. Baud rate is susceptible to attenuation while bit rate is not. Bit rate is susceptible to attenuation while baud rate is not. Baud rate is susceptible to noise while bit rate is not. Bit rate is susceptible to noise while baud rate is not.
Encoding might represent more than one bit per symbol.
What technology provides data security assurance during the asset disposal phase of system lifecycle? (choose TWO) DLP Encryption PUA AUP Mechanical Shredding NDA
Encryption Mechanical Shredding
True or false? A bridge does not forward broadcast or multicast traffic. True False
False
True or false? A computer with a 10BASE-T Ethernet adapter cannot be joined to a 100BASE-T network. True False
False
True or false? An ESD wrist strap is designed to provide a personal ground to protect a technician from electrocution when working on energized electrical devices. True False
False
True or false? Devices can only transmit on an Ethernet network when it is free and the opportunity to transmit becomes less frequent as more devices are added. Also, the probability of collisions increases. These problems can be overcome by installing a hub. True False
False
True or false? The CRC mechanism in Ethernet allows for the retransmission of damaged frames. True False
False
True or false? The IP address 172.24.0.1 is routable over the Internet. True False
False
True or false? The Session Layer is responsible for passing data to the Network Layer at the lower bound and the Presentation Layer at the upper bound. True False
False
Who is the first person to receive notification of a potential security incident? Witness CSIRT Responsible Person DLP AUP First Responder
First Responder
Under STP, if a host port is working as normal, what state is it in? Forwarding Filtering Guarding Learning Listening Looping
Forwarding
A NIC sends data in discrete chunks called ____. Segments Sections Frames Layers
Frames
What is happening if a switch is flooding? All network traffic is halted until the spanning tree topology converges. Frames for that MAC address are issued across all ports until the MAC address is learned. All network traffic is halted until the Denial of Service attack is prevented. Frames for that MAC address are issued across all ports until the MAC:IP address mapping is learned.
Frames for that MAC address are issued across all ports until the MAC address is learned.
Which of the following commands clears the ARP table? arp -d arp -e arp -s arp -x
arp -d
Which of the following IPv6 addresses is a valid unicast host address? fe80::218:8bff:fea7:bd37 fe80::219:d2ff::7850 ff02::219:d2ff:fea7:7850 ::/128
fe80::218:8bff:fea7:bd37
What windows utility do you use to find the MAC address for a system? ipconfig /all ipcfg /all ping mac
ipconfig /all
A Mac address is known as a(n) ______ address IP Logical Physical OEM
physical
A user's workstation cannot connect to a server. You check that IP is installed and that settings are correct. What is the first test you could perform to establish whether network connectivity is OK? ping the loopback address ping the local host's IP address ping the default gateway None of the above
ping the default gateway
Once installed, how would you report the current TCP/IP configuration? ping the loopback address ping the local host's IP address ping the default gateway run ipconfig
run ipconfig
Which of the following commands will capture traffic from the IP address 172.16.16.254 on the interface eth0, and output the results to the file router.pcap? libpcap -E eth0 -o 'router.pcap' src host 172.16.16.254 tcpdump -C eth0 -w 'router.pcap' src host 172.16.16.254 tcpdump -I eth0 -w 'router.pcap' src host 172.16.16.254 tcpdump -I eth0 -r 'router.pcap' src host 172.16.16.254
tcpdump -I eth0 -w 'router.pcap' src host 172.16.16.254
Which of the following is a valid format for a MAC address? xxx.xxx.xxx.xxx xx:xx:xx:xx:xx:xx xx:xx:xx:xx:xx:xx:xx:xx None of the above
xx:xx:xx:xx:xx:xx