Udemy Network+ Practice Exam Review

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

C. Crosstalk NEXT - With near end cross talk, signal from wire(s) at the near end of the cable are being induced onto other wire(s).

A computer user, Zaphod, is unable to log on to the domain from his desktop computer. A cable certifier is used to check his network cable and it shows a high value of NEXT. Which of the following is most likely the cause? A. TX/RX reversed B. Split cables C. Crosstalk D. DB loss

B. Kerberos Kerberos is very time sensitive. For a user to gain access to the network, Kerberos requires that a token be passed between the user, the Authentication Server, and the Ticket Granting Server. If the time isn't synched up correctly using NTP, your network may experiences problems. 802.1x is the IEEE name for port-based network access control.

Which of the following services is most likely to need an NTP server? A. 802.1x B. Kerberos C. PKI D. EAP-TLS

A. Proxy Server B. Packet filtering C. Network Address Translation (NAT) E. Port filtering NAT, proxy servers, port filtering, and packet filtering can all be considered firewall technologies.

Which of the following would be considered firewall technology? (Select all that apply.) A. Proxy Server B. Packet filtering C. Network Address Translation (NAT) D. Dynamic routing E. Port filtering

A. A An A record is the typical source of IP addresses a host can access on a DNS server PTR is a pointer record used in reverse DNS lookups

Which type of DNS record would a host check to learn the IP address of a particular Web site? A. A B. PTR C. CNAME D. MX

B. Allow TCP port 110 D. Allow TCP port 25 TCP ports 25 and 110 - POP uses port 110 and SMTP uses port 25. Mail transfers use TCP.

A company has recently installed a network firewall. Users need to access a POP3 server in order to send and receive their e-mail. What must the network technician configure on the firewall to allow access to the e-mail server? (Select TWO.) A. Allow TCP port 23 B. Allow TCP port 110 C. Allow UDP port 110 D. Allow TCP port 25 E. Allow UDP port 25

A. It uses a shared secret to encrypt messages between the client and server RADIUS servers use a shared secret along with MD5 hashing for authentication. Some operating systems may call this a "Pre-Shared Key." This is the generally known as Symmetric-key algorithms. Note: In any normal situation, it would be a great idea to use anything except for PAP as your authentication method because the password could still be intercepted in certain scenarios. It can't use Public or Private keys, because that insinuates you'll be using Asymmetric-key algorithms

A user is concerned that his password is being sent in clear text when he connects to the RADIUS server using PAP. Which of the following is true about security using RADIUS? A. It uses a shared secret to encrypt messages between the client and server B. It uses a Public key to encrypt messages between the client and server C. It uses a Private key to encrypt messages between the client and server D. It uses a CSU/DSU to encrypt the data between the client and server

C. 172.16.0.0/12 172.16.0.0/12 - 172.16.0.0 through 172.31.255.255 is the class B private IP address range, and therefore the router will block/drop the request. All the other addresses are routable and should not be blocked/dropped by the router.

Certain IP addresses are not supposed to exist on the public Internet. Which block of IP addresses would MOST likely be prevented from crossing a border router? A. 8.0.0.0/8 B. 238.0.0.0/8 C. 172.16.0.0/12 D. 122.0.0.0/24

A. 802.1x 802.1x is also known as Network Access Control, an IEEE method developed to provide port-based authentication. In this scenario, the users will not be able to use their WAPs to connect to the network. The WAPs won't be authenticated to access network resources. WPA2 is 802.11i and it defines the security mechanisms for the most secure wireless networks.

Employees have been bringing in WAPs and connecting them to your network to enable wireless access with their laptops. Which authentication method should be used to prevent this from happening? A. 802.1x B. WPA2 C. 802.3ad D. TKIP

C. TX/RX reversed TX/RX reversed is easy to do with ST fiber connectors Cable length is a possibility, but there is a more likely answer

Network technician Kyle is troubleshooting a connectivity problem with a new data circuit. Kyle confirms that the ST fiber jumper is good. Which of the following is the problem? A. Bad connectors B. Cable length C. TX/RX reversed D. Interference

D. Proxy Caching Proxy Caching - As the name implies, a proxy server can, among other things, cache Web pages for users. If a user calls up a Web page that the proxy already has, then ISP bandwidth is not used.

On the corporate network, many users report that Web pages are slow to load. The network administrator has checked the network and has determined that the Internet connection is saturated. Which technique would be BEST to decrease the traffic due to Web surfing? A. Load balancing B. Traffic analyzer C. Port filtering D. Proxy Caching

C. MPLS MPLS - MPLS allows us to label packets so that all of the packets labeled "X" go a particular route. VLANs can segregate traffic within a network, but not outside on a fiber link.

What technology could a telecom carrier use to segregate customer traffic over long runs of fiber-optic connections? A. VPN B. PSTN C. MPLS D. VLAN

C. The router discards it Routers do not forward broadcast traffic. Instead, they discard it. Routers only discard broadcast traffic, nothing else.

You have just installed a new router in your MDF and are now monitoring traffic with a packet analyzer. What do you notice about how a router treats a broadcast packet on your network? A. The router forwards it B. The router sends it back to its origin C. The router discards it D. The router records it for later analysis

C. The user moved out of range of the access point You have to be within the range of the access point to use a wireless LAN. IEEE 802.11 networks are designed to work in a local area of approximately 300 feet.

You recently installed wireless network cards for laptop users. The help desk receives a call from a user who couldn't access the network with a laptop while on a business trip, although the laptop worked fine when he tested it on his desk. What is the likely cause of the problem? A. The Cat 5 cable may be defective B. The user is using the wrong encryption key for remote access to the remote point C. The user moved out of range of the access point D. The modem was unplugged


संबंधित स्टडी सेट्स

Chapter 22: Health Risks Across the Life Span

View Set

大神版 GRE要你命3000 list 1-15

View Set

Surgical Technologist: Skeletal and Muscular System Quiz Review

View Set

Special Issues of Women's Health Care and Reproduction

View Set