Total Seminars Test One Missed Questions
Rebecca needs to spec the equipment for the installation of a complete network system: cables, switches, PCs... everything. The network only needs to be 100BaseT but must be easy to upgrade to 1000BaseT in the future. Which one of the following, although good to have, would be the least important element for Rebecca to buy now?
100/100 Mbps switch
Employees have been bringing in WAPs and connecting them to your network to enable wireless access with their laptops. Which authentication method should be used to prevent this from happening?
802.1x
Which IPv6 address is the loopback address (using the :: rule)?
::1
Where would a patch antenna for 802.11 usually be placed?
Against a wall
HTTP can be used to transfer files, but it is not as reliable or as fast as what protocol?
FTP
Which protocol is used with the ping command?
ICMP
The boss has just read an article about zero-day attacks and rushes into your office in a panic, demanding to know what you'll do to save the company network. What security technique would best protect against such attacks?
Implement effective security policies
CHAP, MS-CHAP, and PAP are all authentication protocols for remote connectivity. However, the EAP authentication protocol offers something the other three do not. What is it?
It supports special authentication devices such as smart cards
Which of the following protocols enables tunneling and encryption?
L2TP
Which OSI layer adds unique identifiers to the packets, enabling the packets to be routed to the correct system?
Network layer
This authentication protocol is supported by most network operating systems, but is never used because it sends all passwords in clear text.
PAP
Why was PAP replaced by CHAP for PPP connections?
PAP sent the username and password in the clear
Emma is setting up a wireless network for her company. She wants to use an authentication method where the users must connect to a separate authentication server to gain access to the network. Which method would work BEST?
RADIUS
Which of the following requires connection to a separate authentication server?
RADIUS
Which of the following is the oldest routing protocol, rarely used anymore?
Routing Information Protocol (RIP)
Edward has read about secure polling of network devices and wants to implement this on his network. What protocol should he use?
SNMPv3
A home user is experiencing performance issues with her wireless network. She has checked the following issues: - Checked to make sure the laptop is within the appropriate wireless network range - Checked the connected SSID and wireless channel - Checked that the laptop is the only device connected to the wireless network Which is the MOST likely cause for the performance issues?
There are other wireless devices in the area that operate on the wireless band and on the same wireless channel.
UTP
Unshielded Twisted Pair
Brienne, an administrator, attempts to connect a laptop to a server with a length of CAT5 cable that has RJ-45 connectors on each end. She verified the IP settings as correct, but the two computers still cannot connect. Which of the following would MOST likely fix the connectivity problem?
Wire pairs 1/2 and 3/6 need to be swapped on one end of the connecting cables.
network layer adds _____ to packets
addresses (unique identifiers)
E-mail programs and FTP work on which layer of the OSI 7-layer model?
application layer
What would you use to create a direct connection between two client 10/100 network workstations?
crossover cable
Which two of the following should you do first when you are designing and implementing a new network? (Select two.)
determine the company's network needs and expectations, eegin documentation on your system and network
L2tp offers
encryption and tunneling
If John's boss asks him to install the networking technology defined by IEEE 802.3, what is he asking him to install?
ethernet
A NIC creates _____________ in the data link layer.
frames
Which of the following services is most likely to need an NTP server?
kerberos
Which of the following functions may be performed by a typical firewall? (Select all that apply.)
may block specified users, hides the LAN from unauthorized users on the outside, block specified TCP ports
If you run "route print" at a Windows command prompt, you will get a routing table. What other command will give you the exact same output?
netstat -r
What Windows utility enables you to query information from the DNS server and change how your system uses DNS?
nslookup
Which of the following are benefits of patch panels? (Select two.)
organizes the horizontal cabling, protects the horizontal cabling from over handling.
STP
shielded twisted pair
Continuously bombarding a remote computer with broadcast pings that contain a bogus return address is an example of what specific type of attack?
smurf
EAP offers
special authentication support for devices like smart cards
Mike wants to connect two hubs. Which of the following will work? (Select two.)
use a crossover cable between two normal ports, use a patch cable from an MDIX port to a normal port
A user that is connected to a wireless network moves a laptop from her desk to a conference room. When she arrives at the conference room, she notes that the laptop is trying to reconnect to the wireless network. Which of the following is a common wireless problem that can cause this issue?
weak signal strength
Steve in the shipping department reports that his office is having a hard time connecting to the Internet, but they are able to connect to the network. Which of the following pieces of documentation would be the most useful in figuring out his problem? (Select two.)
wire schemes, network maps