Brainscape 1533 all lessons and test
What switch can you use to view help for a command?
/?
Which of the following is the unspecified address in IPv6?
0:0:0:0:0:0:0:0
A user Sam on the intranet is trying to access ucertify.com via the router. Choose and reorder the actions that Network Address Translation (NAT) will take to accomplish the task.
1. It receives the request and logs the source and destination IP address and port in an internal table. 2. It creates a new packet to forward the request to ucertify.com. 3. It changes the source IP address to its own public IP address and the source port to an unused port. 4. It sends the request to ucertify.com. ucertify.com returns the web page to the NAT server. 5. It looks at the source port and compares it to its internal NAT table and sends the page back to Sam's computer.
What frequency does 802.11g use?
2.4 GHz
What port is used by Kerberos?
88
Basic service set (BSS)
A group of computers connected with a WAP and share the same SSID.
What is used to resolve an IP address to a MAC address?
ARP
Extended service set (ESS)
An ESS is an extension of a basic service set (BSS). It connects multiple BSSs together using more than one WAP as wireless repeaters.
Perimeter network
An area between the Internet and an intranet hosting resources available to any Internet users.
Secure Shell (SSH)
An encryption protocol that transfers data over a secure channel. SSH is a recommended replacement for Telnet and is also used to encrypt other protocols such as FTP. SSH uses port 22.
Secure Sockets Layer (SSL)
An encryption protocol used to encrypt other protocols such as HTTP and LDAP. SSL uses port 443 with HTTPS. It uses port 636 with Secure LDAP.
Transport Layer Security (TLS)
An encryption that is the designated replacement for Secure Socket Layer protocol (SSL) protocol and currently coexists with SSL.
TCP/IP Layers
Application Layer Transportation Layer Internet Layer Network Interface Layer
Which of the following are service levels for ISDN?
BRI (Basic Rate Interface) PRI (Primary Rate Interface)
Which of the following defines the speed at which packets are transferred between modules in a modular switch?
Backplane speed
Which of the following DNS resource records is used to specify that the domain name is an alias of another?
CNAME
Which of the following channel access methods is used in IEEE 802.11 networks?
CSMA/CA
Which of the following is used by 802.11 wireless communications?
CSMA/CA
Name the proxy server functionalities whose descriptions are given in the following figure.
Caching Content Checking Filtering
Which of the following cables can be used to wire a 100BASET Ethernet network by using unshielded twisted pair (UTP)?
Cat 5
What class is the following IP address: 192.168.1.5?
Class C
A DHCP-assigned IP address is also known as a ____.
Dynamic address
What types of interference can cause problems for networks? (Choose all that apply.)
EMI RFI
Electromagnetic interference (EMI)
EMI is interference caused by machinery and electrical devices.
How can you view the host cache (or DNS resolver cache)?
Enter ipconfig /displaydns at the command prompt
True or false. The purpose of a UPS system is to provide long-term power when power fails.
False
Windows checks various components to resolve a host name into an IP address. Determine the sequence in which the various components are checked.
First: Host Cache Second: DNS Third: NetBIOS name cache Fourth: WINS server Fifth: Broadcast Sixth: Imhosts file
While designing a network, you choose 100BASE-TX over 100BASE-FX. Which of the following are likely reasons for your decision? Each correct answer represents a complete solution. Choose two.
Flexibility of cables Ease of installation
Which of the following is a data packet on Layer 2 of the OSI model?
Frame
Which of the following protocols is designed to efficiently handle high-speed data over WANs (wide area networks)?
Frame relay
In a complex network, a router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?
Frequency
What advantage does a CAT5 cable has over fiber-optic cables?
Immunity from EMI
Which of the following IPv6 addresses is similar to a private non-routable address in an IPv4 addressing scheme?
Local-link
Which type of cable is used for testing port interfaces?
Loopback
Which of the following is the function of a RADIUS server in a wireless network that is secured by using WPA?
Providing a user authentication
Proxy servers operate on which of the following layers of the OSI Model?
Proxy servers operate on the Application layer, layer 7
Which of the following hardware devices prevents broadcasts from crossing over subnets?
Router
Move packets between networks or subnets
Routers
Dynamic routing
Routers can have the routing table updated manually or dynamically. Dynamic routing means that a routing protocol automatically updates the routing table. Common routing protocols used in internal networks include RIPv2 and OSPF.
Routers operate on which of the following layers of the OSI Model?
Routers operate on the Network layer, layer 3.
Which of the following is a type of Digital Subscriber Line (DSL) that provides 1.544 Mbps full-duplex transmission on a single twisted pair line?
SDSL
Which of the following is a standardized multiplexing technology used for connecting fiber-optic transmission systems?
SONET
Which of the following is used in wireless networks to identify a wireless access point and its associated network?
SSID
Which of the following are configured on a user workstation for wireless networking?
SSID (Service Set Identifier) Encryption
Which of the following protocols uses an HTTP-over-SSL session between VPN clients and servers for exchanging encapsulated IPv4 or IPv6 packets?
SSTP
What is a unit of data called at the Transport layer?
Segment
Routing and Remote Access
Services (RRAS) A server role available in Windows Server 2008. When added, you can configure the server as a router or a remote access server.
Which of the following layers of the OSI model establishes a communication session between processes running on different communication entities in a network?
Session
Which of the following layers synchronizes data exchange between applications on separate devices?
Session
Match the modes of transmission of the Session layer with their descriptions.
Simplex: Data can be sent only one way. Full Duplex: Data can be sent and received at the same tie. Half Duplex: Data can be sent both ways but only one way at a time.
Single mode fiber
Single-mode fiber (SMF) uses a glass core and can transfer data at up to 10 Gbps and as far as 40 km. SMF doesn't support as many light sources as MMF.
Fill in the blank with the appropriate term. ____ routing is the process of manually entering routes into a device's routing table through a configuration file loaded when the routing device starts up. *Matching is case-insensitive.
Static
What type of traffic commonly uses UDP?
Streaming video Voice over IP Streaming audio
Which of the following is a Layer 2 device?
Switch
Which of the following is a computer networking device that is used to link network segments or network devices?
Switch
Improve the performance of a network since they isolate the computers into separate collision domains
Switches
Default gateway
The IP address on the near side of the router in a subnet. The default gateway usually provides a path to the Internet.
You work as a network administrator for McRoberts Inc. The company has a TCP/IP-based network. You install a new client computer. When you connect the computer to a hub, the activity LED of the NIC does not light up. You connect the computer to another hub, and the LED lights up. When you connect the computer to the first hub again, the activity LED of the NIC does not light again. What is the most likely cause?
The first hub's port on which the computer is connected is faulty.
Kerberos
The primary authentication protocol used in Microsoft networks. Kerberos uses time-stamped tickets and the Active Directory database for authentication. Kerberos is also used in non-Microsoft networks. Kerberos uses port 88.
Hypertext Transfer Protocol (HTTP)
The primary protocol used to transfer web pages and web elements such as pictures and audio files over the Internet. HTTP commonly transfers HTML files that are displayed in web browsers. HTTP uses port 80. HTTPS is a secure version of HTTP using port 443.
What is the basic function of a firewall?
To protect a network from unauthorized access
Which of the following cabling options is used by the 10BASET standard?
Twisted pair
How many B channels does an ISDN BRI use?
Two
Which of the following is a compact representation of a resource available to an application on the intranet/Internet?
URI
Which of the following types of cable will you use to connect a switch to a router?
UTP straight-through
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. Two routers have been configured on the network. A router receives a packet. Which of the following actions will the router take to route the incoming packet?
Use the routing table to determine the best path to the destination network address. Read the destination IP address.
Which of the following forms of DSL theoretically provides the fastest service?
VDSL
Which of the following is also known as a logical network?
VLAN
Match the security methods with their security levels.
Wired Equivalent Privacy (WEP): Low, cracked in 2001 Wi-Fi Protected Access (WPA): Medium, cracked in 2008 Wi-Fi Protected Access 2: Strong 802.1x: Strongest (when used with WPA2)
Which of the following is a directional antenna consisting of a driven element and additional parasitic elements?
Yagi
Write the command to identify the default gateway and routers.
ipconfig
Which of the following is used to troubleshoot a DNS server?
nslookup
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network. The network is connected to the Internet through a firewall. A user complains that he is unable to access the abc.com site. However, he can access all other sites. Which of the following tools will help you diagnose the problem?
tracert
Choose and place the actions that a router takes when it receives a packet.
1. Identifies the destination address of the packet 2. Compares the destination address to entries in the routing table 3. Selects the best path to the destination address 4. Forwards the packet to the interface connected to the destination address
You work as an intern at uCertify Inc. Your company uses the Microsoft Outlook application as its email client. You need to explore the process of sending an email via SMTP as it is a part of your training. Choose and reorder the steps that complete the process of sending an email.
1. When the SMTP server receives the data from the client, it recognizes the destination port 25 as SMTP. 2. It then forwards the data to the service handling SMTP. 3. The server sends back an acknowledgement to the computer using port 49152 to confirm the email was received. 4. When the computer receives the packet with port 49152, it sends it to the Microsoft Outlook application.
PRI, a form of ISDN, can provide transmission rates of up to ____.
1.544 Mbps
What is the speed of a T1 link?
1.544 Mbps
Enabling routing and remote access services
1.Click Start > Administrative Tools to open the Administrative Tools window. 2.In the list of tools, double-click Routing and Remote Access to open the Routing and Remote Access console. 3.In the left pane, expand Routing and Remote Access, right-click WIN-UCSRV-01 (local) and select Configure and Enable Routing and Remote Access to start its server setup wizard. 4.The RRAS setup wizard appears; click Next to advance to the Configuration step. 5.Select Custom Configuration to select any combination of the features available in Routing and Remote Access, and click Next to advance to the Custom Configuration step. 6.Check the LAN routing service to enable it on the server and click Next to complete the RRAS setup wizard. 7.Click Finish; the RRAS service is ready to use, click Start service to start the service. 8.Close all the windows.
Configure RRAS as a NAT server
1.Click Start > Administrative Tools to open the Administrative Tools window. 2.In the list of tools, double-click Routing and Remote Access to open the Routing and Remote Access console. 3.In the left pane, expand Routing and Remote Access, right-click WIN-UCSRV-01 and select Configure and Enable Routing and Remote Access to run the RRAS server setup wizard. 4.Read the information and click Next to advance to the Configuration step. 5.Select Network address translation to allow internal clients to connect to the Internet using one public IP address, and click Next to advance to the NAT Internet Connection step. 6.Select Create a new demand-dial interface to the Internet to create a new demand-dial interface for client computers to connect to the Internet, and click Next to advance to the Network Selection step. 7.Click Next to advance to the Read to Apply Selections step. 8.Click Next to start the Routing and Remote Access service and then start the Demand-Dial Interface wizard. 9.This wizard helps to create a demand-dial connection to connect this router to other routers; click Next to advance to the Interface Name step. 10.Verify that "Remote Router" is given as the interface name, and click Next to advance to the Connection Type step. 11.Verify that "Connect using virtual private networking" is selected, and click Next to advance to the VPN Type step. 12.Verify that "Automatic selection" is selected, and click Next to advance to the Destination Address step. 13.Type 192.168.1.100 as the IP address, and click Next to advance to the Protocols and Security step. 14.Verify that "Route IP packets on this interface" is selected, and click Next to advance to the Dial-Out Credentials step. 15.Type administrator as the user name, and click Next to complete the Demand-Dial Interface Wizard. 16.Click Finish to create the interface and enable it on the router. 17.Click Finish to close the wizard.18.Close all the windows.
Configure the VPN server
1.Click Start > Administrative Tools to open the Administrative Tools window. 2.In the list of tools, double-click Routing and Remote Access to open the Routing and Remote Access console. 3.In the left pane, expand Routing and Remote Access, right-click the WIN-UCSRV-01 (local) server and select Configure and Enable Routing and Remote Access to start the wizard. 4.Click Next to advance to the Configuration step; select Virtual Private Network (VPN) access and NAT, and click Next to advance to the Custom Configuration step. 5.Check the VPN access service to enable it on the server, and click Next to complete the Routing and Remote Access Server (RRAS) setup wizard. 6.Click Finish; the RRAS service is ready to use; click Start Service to start the service.7.Close all the windows.
Configuring NPS to provide RADIUS authentication
1.Click Start > Administrative Tools, and then double-click Network Policy Server. 2.From the Standard Configuration list, select RADIUS Server for Dial-Up or VPN Connections. 3.Click Configure VPN or Dial-Up. 4.Select Virtual Private Network (VPN) Connections, and click Next. 5.Click Add to add remote VPN servers as RADIUS clients. 6.In the Friendly name box, type ##secplusRAS. 7.In the Address box, type 172.20.35.1 and click OK. 8.Note that the ##secplusRAS RADIUS client is now displayed in the list; click Next. 9.Check Extensible Authentication Protocol; "Microsoft: Protected EAP (PEAP)" appears in the Type list. 10.Click Next four times to advance through the settings and display the Specify a Realm Name screen. 11.In the Realm name box, type Outlander; click Next, and click Finish. 12.In the console tree (in the left pane), expand RADIUS Clients and Servers. 13.Select RADIUS Clients. Notice that your new RADIUS client is displayed in the main pane. 14.Close all the windows.
Accessing command prompt
1.Click Start > All Programs > Accessories > Command Prompt. The uCertify terminal Simulator command prompt is displayed in its own window. 2.Close the terminal window.
Analyzing domain names with nslookup
1.Open the command prompt window. 2.At command prompt, type the following commands and press Enter: i.nslookup google.com; displays google.com's corresponding IP address, which is an external domain. ii.nslookup ucertify.com; displays the corresponding IP address of ucertify.com, which is an internal domain. iii.nslookup; shows Default server as Unknown and IP Address as 193.168.1.1 and brings you to the nslookup shell where you can enact more commands. iv.?; displays the various commands you can use in the nslookup shell. v.exit; exits the nslookup shell program. vi.exit; closes the command prompt window.
What fraction of the IPv6 address space is reserved for link-local unicast addresses?
1/1024
Which of the following addresses is a valid IPv4 address?
10.1.25.2
You are designing a network. The conditions require Ethernet implementation over fiber. You decide to choose 100BASE-TF cables. What will be the maximum transmission speed supported by the 100BASE-TF cable?
100 Mbps
What is the maximum cable segment length supported by a 10BASET network?
100 meters
What is the maximum length of a 100BASE-TX?
100 meters
What is the maximum transmission distance supported by 1000BASE-TX?
100 meters
Which of the following is the maximum segment length of a 10BASET Ethernet network?
100 meters
Which of the following is the maximum segment length when wiring a 100BASET network with Cat 5 cable?
100 meters
You are designing a TCP/IP-based network for Net Perfect Inc. The company's offices are in different buildings within local premises. You decide to use 100BASETX cabling to interconnect the offices. What is the maximum length of cable that you can use per segment?
100 meters
You work as a Network Administrator for Perfect World Inc. You are configuring a network that will include 1000BASET network interface cards in servers and client computers. What is the maximum segment length that a 1000BASET network supports?
100 meters
A 100 Mbps switch is configured to combine five ports using LACP with full-duplex. What is the effective throughput at the uplink?
1000 Mbps
What is the speed of a CAT 6 cable?
1000 Mbps
Drag the maximum cable lengths supported by their networking technologies from the right onto their matching locations on the left.
1000BasSX: 550 100BaseFX: 2000 100BaseTX: 100 1000BaseCX: 25 1000BaseT: 100
Uses a single strand of SMF
100BASE-BX
Uses two strands, one for reception and one for transmission, and is not compatible with 10BASE-FL
100BASE-FX
Which of the following media is immune to electromagnetic interference (EMI)?
100BASE-FX
Uses two strands of MMF, one for reception and one for transmission, and is a lower cost alternative to using 100BASE-FX
100BASE-SX
Requires four pairs of twisted wires: one for transmission, one for reception, and the remaining two will switch directions as negotiated
100BASE-T4
Runs over two pairs: one pair of twisted wires in each direction
100BASE-TX
_______ networks are known as Fast Ethernet networks.
100BASETX
Each twisted pair category operates on a specific frequency. Match each frequency to its twisted pair category.
100Mhz: CAT, CAT 5E 600Mhz: CAT 7 250Mhz: CAT 6 500MHz: CAT6A
Which of the following types of networks uses terminators?
10BASE2
Which of the following Ethernet specifications can transmit data up to a distance of 500 meters?
10BASE5
Wavelength beams of 1550nm are used by the ____ Ethernet standard.
10GBASE-ER
Which of the following standards supports a maximum transmission distance of 40km?
10GBASE-ER
Arrange the following IEEE standards in descending order according to the maximum transmission distances they cover.
10GBASE-ER 10GBASE-LR 1000BASE-SX 10GBASE-SR
What is the maximum speed of an IEEE 802.11b network?
11 Mbps
Which of the following ports is used for POP3?
110
How many bits are there in an IPv6 address?
128
Fill in the blank with the appropriate facts regarding IP version 6 (IPv6). IP addressing version 6 uses ____-bit address. Its ______ IP address assigned to a single host allows the host to send and receive data.
128 unicast
Ipv6 addresses are _______ long.
128 bits
Which of the following is a valid IPv6 IP address?
12ED:0:63E2:21BA:0: 3:FACE:F25F
What is the maximum upstream throughput speed supported by VDSL?
16 Mbps
Mark works as a Network Administrator for TechMart Inc. He wants to ensure that the computers on his internal LAN cannot use their assigned IP addresses to communicate directly on the Internet. Which of the following is the valid address range for this purpose?
172.16.20.1 through 172.16.20.254
Which of the following are private IP addresses?
172.16.255.20 10.1.23.225 192.168.1.125
Which of the following IP addresses is in one of the reserved IP address ranges defined by RFC 1918?
172.17.34.14
A computer is configured as shown in the table below: Parameter Value IP Address 192.198.32.4 Subnet Mask 255.255.0.0 Identify the network address part of the IP address in the above configuration.
192.198
You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. The company's office has an ISDN connection. This connection is used to connect the network to the Internet. How many channels does an ISDN BRI connection use to send data?
2
Drag and drop the appropriate E-Carrier systems in front of their respective data transfer rates.
2.048 Mbps: E1 8.448 Mbps: E2 34.368 Mbps: E3 139.264 Mbps: E4 565.148 Mbps: E5
Which of the following frequency ranges does 802.11b use?
2.4 GHz
You work as a Network Administrator for Tech Perfect Inc. The company has offices at different locations in a city. You decide to use 100BASEFX full-duplex Multimode Fiber-optic cabling for interconnecting the offices. What is the maximum length of cable you can use for this network?
2000 meters
Which of the following addresses is a valid IPv6 address?
2001:0000:4137:9e76:3c2b:05ad:3f57:fe98
Which of the following is a multicast address?
224.0.0.1
A switch has 48 ports. How many VLANs can you create with it?
24
Which of the following ports is used for SMTP?
25
Which of the following is the default subnet mask for an IPv4 Class B address?
255.255.0.0
The CIDR notation of an IP address depends on its subnet mask. If the IP address of your computer in a network is 192.168.1.5, then match each subnet mask for this IP address to its CIDR notation.
255.255.0.0: 192.168.1.5 /16 255.0.0.0: 192.168.1.5 /8 255.255.255.0: 192.168.1.6 /24
Mark works as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 R2 domain-based network. The network uses only IPv4 as the network protocol. The network has twenty-five subnets. Each subnet has 1000 Windows 7 client computers. In the future, the company's network may expand to include up to sixty subnets with 1000 hosts per subnet. Mark wants to assign a subnet mask to the network to accommodate the future requirements. Which of the following subnet masks will he assign to the network to accomplish this?
255.255.252.0
What is the subnet mask for the following IP address: 192.168.1.5 /26?
255.255.255.192
A computer is configured as shown in the table below: Parameter Value IP Address 192.198.32.4 Subnet Mask 255.255.0.0 Identify the node address part of the IP address in the above configuration.
32.4
What port is used by RDS?
3389
What port is used by LDAP?
389
How many layers are in the TCP/IP model?
4
What is the data transmission rate of a T3 line?
44.736 Mbps
What connection speed can be reached by using a T3 line?
44.74 Mbps
Which of the following is a valid IPv6 address?
45CF: 6D53: 12CD: AFC7: E654: BB32: 543C: FACE
Which of the following is NOT a valid IPv4 to IPv6 transition technology?
4to6
What frequency does an 802.11a network use?
5 GHz
What frequency does an 802.11n network use?
5 GHz 2.4 MHz
By default, which of the following ports is used by the DNS service?
53
Which of the following is the highest bit rate supported by 802.11g?
54 Mbps
You work as a Network Administrator for Net World International. You are configuring a LAN (local area network) spanning various buildings in the company's premises. You decide to use a 1000BASE-SX network. What is the maximum length of the cable segment that can be used?
550 meters
What is the speed (data rate) of a dial-up connection over a standard dial-up analog line in the United States?
56 Kbps
A TCP/IP-based routed network is configured as shown in the figure below: How many collision domains are there in the network?
6
Which of the following is the maximum throughput of an 802.11n network?
600 Mbps
How many hosts are supported in subnet with a network ID of 192.168.1.128 /26?
62
Select the correct configuration of the two base types of ISDN service in the following figure.
64 kBPS 16 kBPS 2364 kBPS 64 kBPS
IPv6 addresses are composed of two logical parts: a 64-bit network prefix and a ______ interface identifier.
64-bit
How many channels does a T3 connection use?
672
Which of the following ports is used for HTTP?
80
Select the correct combinations of speed and frequency for the following wireless standards.
802.11a: 54Mbps & 5GHz 802.11b: 11Mbps & 2.4GHz 802.11g: 54Mbps & 2.4GHz 8021.11n: 300Mbps & 2.4GHz
Which of the following WLAN standards operate at the frequency of 2.4GHz? Each correct answer represents a complete solution
802.11b 802.11g
Which of the following standards has a maximum data transmission speed of 600 Mbps?
802.11n
Which of the following is an Institute of the Electrical and Electronics Engineering (IEEE) specification that defines standards for Ethernet?
802.3
Which of the following specifications of IEEE (Institute of Electrical and Electronic Engineers) defines the standard for fiber-optic cables?
802.8
Which of the following is the IPv6 loopback address?
::1
A computer is unable to communicate with other computers on the network. You use ipconfig and see the following information: IP address: 169.254.5.7 Subnet mask: 255.255.0.0 Default gateway: blank DNS server: blank
A DHCP server can't be reached.
Local area network (LAN)
A LAN is a group of computers and/or other devices that are connected in a network.
Domain
A LAN with a domain controller hosting Active Directory Domain Services (AD DS). AD DS includes user and computer accounts for all users and computers that are granted access on the LAN.
What does a switch maintain to track the location of computers?
A MAC address table
International Telecommunication Union (ITU)
A United Nations agency that focuses on information and communication technology issues on a global scale.
VLAN
A VLAN is a LAN environment that is created on managed switches. VLANs offer improved security, increased performance, and the ability to add clients to a network segment regardless of their physical location.
Virtual Private Network (VPN)
A VPN provides access to a private internal network over a public network such as the Internet. It uses tunneling protocols such as PPTP, L2TP, or SSTP.
Leased line
A WAN link circuited contracted through a communications provider for an organization's use. The organization pays to lease the line instead of running an independent cable between two offices.
Wireless Access Point (WAP)
A WAP is a device that is located between a wired LAN and a group of wireless clients. It bridges the wireless devices to the wired LAN.
Wireless router
A WAP with additional components. It provides connectivity for wireless devices using a switch component and includes routing components to route traffic between networks.
Which of the following is required to be placed in a perimeter network?
A Web server that can be accessed by external users
Unmanaged switch
A basic Layer 2 switch. This will work simply by plugging it in and connecting it. It is not configurable.
Fiber-optic cable
A cable type that uses light pulses instead of electrical signals to send data down a glass or plastic core cable. Fiber is immune to EMI, RFI, and crosstalk.
Telnet
A command-line interface that allows bidirectional communication with network devices.
ipconfig
A command-line tool that can display TCP/IP configuration information for a system. It can also change some of the configuration settings.
ping
A command-line tool that checks connectivity with a remote system. It sends out four packets, and if the target computer is up, it can send back four echo packets back, indicating it's up. Ping uses ICMP, which is often blocked.
pathping
A command-line tool that combines the features of ping and tracert. It measures packet loss for each router between the source and destination.
tracert
A command-line tool that identifies all the routers between a source computer and a destination computer.
netstat
A command-line tool that measures network statistics for a computer. It can also show all open ports and identify applications that are using the ports.
Twisted pair
A commonly used transmission media type. Current versions include four twisted pair within a single cable.
Managed switch
A configurable switch. It can be configured to create VLANs, to modify specific settings on individual ports, to send alerts via SNMP, and much more.
Transmission Control Protocol (TCP)
A connection-oriented protocol that provides guaranteed delivery. TCP uses a three-way handshake to begin a session, uses sequence numbers to track packets, and includes regular acknowledgments. The alternative is UDP, which is a connectionless protocol that provides best-effort delivery.
User Datagram Protocol (UDP)
A connectionless protocol that provides a best-effort delivery. The alternative is TCP, which is a connection-oriented protocol that provides guaranteed delivery.
T1
A data transmission line used for WAN links in the United States. A T1 includes 24 DS0 channels for a total of 1.544 Mbps. It is connected with Channel Service Unit/Data Service Unit (CSU/DSU) at each end. E1 lines are used in Europe, and they are 2.048 Mbps.
T3
A data transmission line used for WAN links similar to a T3. A T3 includes 28 DS1 channels for a total of 44.736 Mbps. E3 lines are used in Europe, and they are 34.368 Mbps.
Remote Desktop Services (RDS)
A group of Microsoft technologies previously known as Terminal Services. RDS uses the Remote Desktop Protocol and allows users to access desktops of remote computers over the network. RDS uses port 3389.
Broadcast Domain
A group of devices on a network that can receive broadcast traffic from each other. Routers create separate broadcast domains.
Collision Domain
A group of devices on the same segment that are subject to collisions. Switches create separate collision domains.
Integrated Services Digital Network (ISDN)
A group of standards used for transmission of voice, data, and video and can be used as a WAN link. ISDN is commonly bundled as a BRI with two B channels and one D channel or as a PRI with 23 B channels and one D channel.
IEEE 802.1x
A group of technologies that increases security with a network. It ensures that clients are authenticated before granting access to a network. WPA2 Enterprise mode uses an 802.1x server for authentication.
Ethernet
A group of technologies used to connect networks using media such as twisted-pair and fiber-optic connections. Ethernet is defined by IEEE 802.3.
Firewall
A host-based or network-based device that filters inbound and outbound traffic. Firewalls use rules to define the filters.
Hub
A hub is a layer 1 device that connects multiple devices in an Ethernet environment. Data sent in one port goes out all other ports, creating a single collision domain for all connected devices.
Hypertext Markup Language (HTML)
A language used to define how web pages are formatted. HTML pages are transferred over the Internet using HTTP. HTML pages are displayed in web browsers.
The following address is an example of which type of IPv6 address?
A link-local ISATAP address
Routing table
A logical table maintained in router memory that. The routing table lists all known routes and the paths to these routes. Routing tables consume memory and can be updated either manually (static) or automatically (dynamic).
You work as a network administrator for McRoberts Inc. You're configuring a wireless network for the company. You decide to use 802.11b WAPS (wireless access points) for the network. Which of the following could affect the network range?
A long length of antenna extension cable The 2.4GHz interference
Internet Message Access Protocol (IMAP)
A mail protocol used to store email messages and download them to clients when requested. Users can view email message headers and choose whether to download the email messages or not. This differs from POP servers which download the messages as soon as the client connects. Clients use SMTP to send email. IMAP4 uses port 143.
Simple Network Management Protocol (SNMP)
A management protocol used to query and manage network devices such as routers and switches. SNMP uses ports 161 and 162.
Digital subscriber line (DSL)
A method of connecting to the Internet in urban areas using digital signals over standard telephone lines. Users must be relatively close to the telephone company's central office. The central office can be as far away as 2 miles, but some equipment requires users to be closer.
Dial-up
A method of connecting to the Internet. Dial-up uses regular phone lines and an analog modem. The modem modulates and demodulates the signals. Dial-up is also a method used for remote access servers where the user dials the remote access server instead of using a VPN.
Broadband cable
A method of connecting to the Internet. It uses the same cable used by cable TV and splits the TV and Internet signals. The computer is connected to a cable modem to provide Internet access.
Nonpromiscuous mode
A mode of a protocol analyzer that allows it only to capture traffic going to or coming from the system. Promiscuous mode allows it to capture any traffic that reaches its network interface card, no matter what the source or destination IP address is.
Promiscuous mode
A mode of a protocol analyzer that allows it to capture any traffic that reaches its network interface card. Nonpromiscuous mode only allows the system to capture traffic going to or coming from the system.
Switch
A network device that connects computers and keeps track of computers connected to the switch. A switch creates separate collision domains. A traditional switch is a layer 2 device that tracks the location of computers based on their MAC addresses. It uses this information to internally switch traffic to only the destination device instead of all devices connected to the switch. Advanced switches can also operate on layer 3.
Router
A network device that connects networks and routes traffic between the networks. A router creates separate broadcast domains.
Wide area network (WAN)
A network spanning a large physical area. Typically it is a group of two or more LANs connected from separate geographical locations. The connection between the LANs is almost always slower than the speed within the LANs themselves.
Directly connected route
A path to a subnet that is directly connected to a router. Routers automatically know the patch for any directly connected subnets as directly connected routes.
Access link
A port on a switch that is used to link to an individual device. Most ports on switches are access links.
Cross talk
A potential problem that occurs when copper cables (such as twisted pair) are close to each other. Data from one cable crosses over to the other cable causing collisions or resulting in loss of confidentiality.
Simple Mail Transfer Protocol (SMTP)
A primary protocol used to send email on the Internet and internal networks. Clients use SMTP to send email to email servers. Email servers use SMTP to send and receive email between other email servers. SMTP uses port 25.
Institute of Electrical and Electronics Engineers (IEEE)
A professional association that creates standards for networking. It created the IEEE 802.3 standard used for Ethernet and the IEEE 802.11 standard used for wireless.
Internet Control Message Protocol (ICMP)
A protocol used to carry error messages and messages about the availability of services. Troubleshooting tools such as Ping, PathPing, and tracert use ICMP. ICMP uses IP directly and doesn't use either TCP or UDP.
Dynamic Host Configuration Protocol (DHCP)
A protocol used to dynamically assign TCP/IP configuration information such as the IP address, subnet mask, default gateway, and address of a DNS server. Windows Server 2008 servers can be configured as DHCP servers.Four Steps:IP DiscoveryIP offerIP request - Once offer made.IP acknowledgement - When request was accepted.
Internet Group Management Protocol (IGMP)
A protocol used to multicast data to a group of computers. This is in contrast to unicast, which sends data from one computer to one computer, and broadcast, which sends data from one computer to all other computers in a subnet.
Lightweight Directory Access Protocol (LDAP)
A protocol used to query directories such as Microsoft's Active Directory Domain Services. LDAP uses port 389. LDAP can be secured with either SSL or TLS. Secure LDAP uses port 636.
File Transfer Protocol (FTP)
A protocol used to transfer files over the Internet using TCP. Many operating systems such as Windows 7 include an FTP command-line tool. FTP uses ports 20 and 21.
Plenum safe
A rating for cable indicating that is safe to use within a plenum (an open space between walls, below floors, or above ceilings). Nonplenum safe cable can release toxic fumes if it catches fire.
Which of the following statements are true regarding VLAN? Each correct answer represents a complete solution. Choose all that apply.
A router is required to connect two VLANs. A switch is required to create a VLAN.
Open Shortest Path First (OSPF)
A routing protocol added to a router. Routing protocols allow routers to exchange routing information between each other. OSPF is used in place of RIPv2 on many hardware routers.
Routing Information Protocol
A routing protocol added to a router. Routing protocols allow routers to exchange routing information between each other. RIPv2 is the current version and has replaced RIPv1 in most applications.
Trivial File Transfer Protocol (TFTP)
A scaled-down version of File Transfer Protocol (FTP). TFTP uses UDP as the transport protocol and can't be used on the Internet.
Proxy server
A server that acts as on behalf of private clients to retrieve web pages from the Internet. Proxy servers include NAT, can cache requests, filter requests, and check some of the retrieved web page's content. A reverse proxy isolates web servers from direct access on the Internet by receiving requests from Internet clients and forwarding them to the web server.
Windows Internet Naming Service (WINS)
A service that runs on a server to resolve NetBIOS names. WINS servers are used on internal Microsoft networks.
Domain Naming System (DNS)
A service that runs on a server to resolve host names. DNS servers are used on the Internet and on internal networks.
TCP/IP
A suite of protocols used on the Internet and Microsoft networks. It includes TCP, IP, and many other protocols.
What is the difference between a switch and a router?
A switch connects devices together, and a router connects subnets together.
Remote access
A technology used to allow remote users to access private networks using either dial-up or VPN remote access servers.
Hosts file
A text file in the c:\windows\system32\drivers\etc folder by default. The hosts file maps the names of computers to IP addresses.
Command prompt
A text-based command window. Users can enter commands in this window such as ping, ipconfig, netstat, and more.
Layer 2 Tunneling Protocol (L2TP)
A tunneling protocol used for VPNs. L2TP is commonly used with IPSec (as L2TP/IPSec) when used in a VPN. L2TP uses port 1723.
Teredo
A tunneling protocol used to encapsulate IPv6 packets within IPv4 datagrams. It allows IPv6 packets to transit through devices that aren't IPv6 capable.
Point-to-Point Tunneling Protocol (PPTP)
A tunneling protocol used with VPNs. PPTP uses Microsoft Point-to-Point Encryption (MPPE) for security. It is largely replaced with L2TP/IPSec or SSL as a tunneling protocol. PPTP uses port 1701.
Straight-through cable
A twisted-pair Ethernet cable with all the wires going to the same pins on both connections of the cable. Straight-through cables connect computers to networking devices such as switches.
Crossover Cable
A twisted-pair cable with specific wires swapped or crossed over on one of the two cable connections. Crossover cables connect similar networking devices such as a switch to a switch, a switch to a router, or a cable modem to a router.
NetBIOS name
A user-friendly name for a computer or other device. NetBIOS names are used on internal networks but never on the Internet. The primary name resolution method for NetBIOS names is WINS.
Host name
A user-friendly name for a computer or other network device. Host names are on the Internet and most internal networks. The primary name resolution method for host names is DNS.
IEEE 802.1b
A wireless standard that uses a frequency of 2.4 GHz and supports speeds as high as 11 Mbps.
IEEE 802.1g
A wireless standard that uses a frequency of 2.4 GHz and supports speeds as high as 54 Mbps.
IEEE 802.1a
A wireless standard that uses a frequency of 5 GHz and supports speeds as high as 54 Mbps.
IEEE 802.1n
A wireless standard that uses frequencies of 2.4 GHz and 5 GHz and supports speeds as high as 300 Mbps.
Workgroup
A workgroup is a group of networked computers where user accounts are located on each individual computer.
Which of the following could be a valid MAC address for a server named Server 1?
A4-BA-DB-FA-60-AD
Match the DNS record types with their usages.
A: It resolves host names to IPv4 IP addresses. PTR: It resolves IP addresses to host names. SRV: It is required by Active Directory to locate servers running specific services. AAAA: It resolves host names to IPv6 addresses. MX: It is used for mail exchange servers. NS: It identifies DNS name servers.
Click to mark the incorrect IPv6 address representation in the figure below.
AA::12:AF::23
Which of the following DNS records is used for translating host name to IPv6 address resolution?
AAAA
Which of the following DNS resource records contains the IPv6 addresses of IPv6 nodes?
AAAA
Your client wants to choose a DSL connection with the fastest download rate possible. Which DSL would you recommend?
ADSL
Which of the following network technologies uses 53-byte cells to transfer data?
ATM (Asynchronous Transfer Mode)
Which of the following connectivity devices is used to extend a network on a purely mechanical basis?
Active hub
You have added a second router to your network that includes three subnets. What's the easiest way to ensure that both routers know the routes to all subnets?
Add static routes.
Global unicast address
An IPv6 address used on the Internet similar to IPv4 public IP addresses. Global unicast addresses start with the first three bits as 001 or as 2 with the first number. Most have a prefix of 2001, but others are also in use.
Neighbour discovery
An IPv6 protocol that uses ICMPv6 to discover details about the network. It can discover routers and other IPv6 parameters used on the local network.
Layer 3 switch
An advanced switch that can operate on layer 3 similar to a router. Layer 3 switches function just like a router but perform routing using internal hardware instead of software.
Extranet
An area between the Internet and an intranet hosting resources for trusted entities. Trusted entities are able to access these resources through the Internet.
Host cache
An area of memory on any computer that stores previously resolved host names and their IP addresses. It's also called the DNS resolver cache since many of the entries are created when DNS is queried to resolve a host name. You can view the host cache with ipconfig /displaydns and flush the cache with ipconfig /flushdns.
Post Office Protocol version 3 (POP3)
An email protocol used to download email to clients as soon as the client connects to the email server. Clients use SMTP to send email. POP3 uses port 110.
Internet Protocol Security (IPSec)
An encryption protocol that includes an Authentication Header (AH) for authentication and Encapsulating Security Payload (ESP) for encryption. IPSec is used with L2TP/IPSec for VPNs.
Which of the following statements correctly describes centralized computing?
An environment in which a central server provides data storage and computational abilities
Internet Engineering Task Force (IETF)
An internal network using the same TCP/IP protocols used on the Internet.
Internet Assigned Numbers Authority (IANA)
An organization that assigns port numbers to protocols including the well-known ports from 0 to 1023. IANA also manages the public IP address assignments.
World Wide Web Consortium (W3C)
An organization that defines standards for the World Wide Web (WWW).
Uplink port
An uplink port is used between two devices so that they may share in the communication process on the LAN. Uplink ports may be utilized by either hubs or switches.
Mark works as a Network Administrator for TechMart Inc. He has assigned an IPv6 address to multiple nodes. When he sends a message to that address, it is sent to only one node. Which of the following addresses has Mark used?
Anycast
Which of the following IPv6 addresses is a single address that can be assigned to multiple interfaces?
Anycast
The ____ layer provides access to the network for applications and certain user functions. It displays incoming information and prepares outgoing information for network access.
Application
Select the devices and protocols for the layers of the TCP/OSI model.
Application Layer: Proxy server: DNS Network Layer: Router: IPv4 Data Link Layer: Bridge: Token ring Physical: Hub: Ethernet
Which of the following is a type of firewall used to filter traffic on the basis of packet content?
Application-layer
Which of the following is used to provide the highest possible level of protection to the network while managing traffic via a router?
Application-layer filtering
Identifying DSL (Digital Subscriber Line) variations
Asymmetric DSL Symmetric DSL ISDN DSL Rate-Adaptive DSL Very High-bit-rate DSL High Bit Rate DSL
DHCP clients automatically assign themselves an APIPA address if they are unable to get an IP address from a DHCP server. An APIPA address always starts with 169.254 in the IP address. It can be any address in the range of 169.254.0.1 to 169.254.255.254.
Automatic Private Internet Protocol Addressing (APIPA)
Link-local addresses
Automatically created IPv6 addresses used on local subnets. These are similar to the APIPA addresses used in IPv4. Link-local addresses start with a prefix of fe80.
Mark works as a Network Administrator for TechMart Inc. He has a routed network with a single DHCP server. He does not find any DHCP relay agents on the network. Which of the following would Mark use to enable them on the router?
BOOTP forwarding
You work as a Network Administrator for McRoberts Inc. The company has a TCP/IP-based network. The company has two offices within the city limits of Chicago. Both office networks are directly connected to the Internet. You are required to accomplish the following tasks: •Users at either office location should be able to access the resources on both networks. •Data traveling across the network should be secured. You decide to establish a virtual private network (VPN) between the offices. Which of the assigned tasks will you be able to accomplish?
Both tasks will be accomplished.
Connect two or more network segments together
Bridges
What type of traffic always goes to all devices in a subnet?
Broadcast
Which of the following does a DHCP client use to locate a DHCP server?
Broadcast
Which of the following have the same specifications as a VLAN? Each correct answer represents a complete solution. Choose two.
Broadcast domain IP subnet
Which of the following functions is NOT performed by a router?
Broadcast forwarding
Which of the following is the client tool used to navigate and access information on the Internet or an intranet?
Browser
You have two desktop computers having 100Base-T Ethernet network cards. You want to connect the computers with a cable without using a hub or switch. Drag the appropriate cable from the bottom required for the connection onto the box provided on the top.
CAT5 Crossover
Which of the following types of patch cables is used in a 100BASET network?
CAT5 UTP
You are a Network Consultant for Tech Perfect Inc. You are designing a network for the company and required to accomplish the following: •The cabling must support data transfer speeds up to 50 Mbps. •The cost of cabling must be as low as possible. Which of the following cables will you use?
CAT5e
Which of the following cables support transmission speeds of 1000Mbps? Each correct answer represents a complete solution. Choose all that apply.
CAT6 CAT5e
Which of the following is a "listen before talk" method used to minimize collisions caused by simultaneous transmission by multiple radios?
CSMA/CA
Which of the following access methods is used by Ethernet standard networks?
CSMA/CD
Select the VPN tunneling protocols according to their attributes.
Can traverse NAT: PPTP Cannot traverse NAT: L2TP Can traverse NAT: SSTP
Which of the following statements are true about a CAT5 cable? Each correct answer represents a complete solution. Choose all that apply.
Capable of transferring data at 100Mbps Uses a 24-gauge copper wire Has three twists per inch of each twisted pair
CSMA/CA
Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) is the transmission type used with wireless networks. CSMA/CA prevents collisions, whereas CSMA/CD contends with the collision after it happens.
CSMA/CD
Carrier Sense Multiple Access/Collision Detection (CSMA/CD) defines the rules for network communication on an Ethernet LAN. It detects collisions and dictates how data is resent after a collision.
Which of the following cables will you use to create a network based on the 100BASE-TX standard?
Category 5 UTP
What is the primary purpose of RADIUS?
Central authentication
Match the authentication methods used by Microsoft RAS servers with their usages.
Challenge Handshake Authentication Protocol: rovides encrypted authentication The Challenge Handshake Authentication Protocol version 2: Provides mutual authentication Extensible Authentication Protocol: Supports additional methods including Protected EAP (PEAP) and smart cards Password Authentication Protocol: Passes the password across the wire in clear text
You work as a Network Administrator for Tech Perfect Inc. The company has a 100Mbps TCP/IP-based Windows Server 2003 network shown in the figure below:
Change the CAT5 cable to a CAT6 cable.
Users in the network have to remember an average of five usernames and passwords to access different computers. How can you reduce the number of passwords remembered by users?
Change the network to domain
Which of the following is the first step for a host to resolve a fully qualified domain name (FQDN) on a network that has an authoritative Domain Name System (DNS) server?
Check the FQDN against the local host name.
Which of the following describes the methodology of implementing a telecommunication network where two network nodes establish a dedicated communication channel through the network before the nodes may communicate?
Circuit switching
An upgrade of classful IP addressing. IP addresses are accompanied with a subnet mask, and the subnet mask doesn't have to comply with conventional classful IP addressing rules. CIDR notation identifies the subnet mask with a slash (/) and the number of 1s in the subnet mask such as 192.168.1.20/26 to represent a subnet mask of 255.255.255.192.
Classless Inter-Domain Routing (CIDR)
You to configure telnet to Switch-1 from Client1. Which of the following are required to accomplish the task? You to configure telnet to Switch-1 from Client1. Which of the following are required to accomplish the task?
Configure 192.168.2.100 as the default gateway address at Switch-1. Configure 192.168.2.100 as the default gateway address at Switch-1.
You work as a Network Administrator for Perfect World Inc. The company has a TCP/IP-based routed network. Subnet X and Subnet Y are configured with DHCP servers to provide automatic IP addresses to the client computers in their respective segments. The DHCP server on Subnet Y crashes. You have to immediately configure the network so that the DHCP server in Subnet X can provide DHCP services to the client computers of Subnet Y. The router on the network is not BOOTP enabled. Your solution must involve minimum administrative effort and cost. What will you do to resolve the issue?
Configure a DHCP relay agent on Subnet Y.
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows-based network. You have to configure a wireless LAN on your network. Two separate buildings across from each other are to be connected wirelessly. Which of the following steps will you choose to accomplish the task?
Configure one Wireless Access Point (WAP) in each building. Place one outdoor Yagi-Uda antenna in each building facing towards each other.
Your company is planning to lease a second building, which is about 2 miles away. You're asked how the networks between the two buildings can be connected. What would you suggest?
Connect the buildings with a P2P bridge.
Click to select the steps you'll take to install a router on the SOHO network.
Connect the router and the switch through a UTP straight-through cable. Connect the router and the cable modem through a UTP straight-through cable. Connect the router's console port to a PC using a rollover cable. Connect the power cable from a power outlet to the power port on the router. Turn on the router.
Which of the following tasks are performed by the session layer of the OSI model?
Connection establishment Connection release
Which of the following is a function of a WINS server on a network?
Converting NetBIOS names to IP addresses
In an Ethernet peer-to-peer network, which of the following cables is used to connect two computers, using RJ-45 connectors and Category 5 UTP cable?
Crossover
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. Two departments, Sales and Marketing, have separate networks. All network components are centrally connected to a hub in their respective departments. Management wants to connect both the departments. Which of the following cables will you use to connect both hubs?
Crossover
Which of the following is described in the statement below? "It is used to connect one Personal Computer (PC) to another without using a hub or a switch."
Crossover cable
Which of the following protocols is used to automatically assign IP addresses to host computers from a predefined address range?
DHCP
You work as a Network Administrator for McNeil Inc. The company has a TCP-based network. You want to connect a new client computer to the network. You have configured the computer to automatically receive IP addresses. Which of the following services is required to be running on the network?
DHCP
A network includes a router that is not RFC 1542 compliant. Computers on one subnet use DHCP. What should you add to ensure computers on other subnets connected to the router can use DHCP
DHCP relay agent
Which of the following networking components is described in the statement below? "It forwards the DHCP broadcast messages generated by clients to DHCP servers on other networks."
DHCP relay agent
Which of the following services is required in a routed network to communicate with the DHCP server on another segment?
DHCP relay agent
A perimeter network is also known as a:
DMZ
Which of the following networks provides an extra layer of security for an organization's internal network?
DMZ
Users on a TCP/IP network are able to ping resources using IP addresses. However, they're unable to connect to those resources through their host names. A malfunction or failure of which of the following servers may be the cause of the issue?
DNS
Which of the following is a type of server that must be associated with a name server record?
DNS
You have been hired to design a TCP/IP-based network that will contain both Unix and Windows computers. You are planning a name resolution strategy. Which of the following services will best suit the requirements of the network?
DNS
Which of the following is used to resolve a fully-qualified domain name (FQDN) to an IP address?
DNS query
Which of the following connection methods requires the client to be close to the central office of a telephone company?
DSL
Which of the following is defined as a telecommunication service used to transform an ordinary phone line into a high-speed medium for data, voice, and video transmission?
DSL
Which of the following methods can be used by small offices and home offices (SOHOs) for Internet access? (Choose all that apply.)
DSL Dial-up Broadband cable
Identifying WAN technology
DSL: A family of technologies that provides data transmissions over local telephone networks T-carrier: A cabling and interface system designed to carry data at high speeds ATM: A cell-based switching technology FDDI: A standard for transmitting data on optical fiber cables ISDN: A digital technology developed to combat the limitations of PSTN
What is the basic unit of the T-carrier system?
DSO
Which of the following are functions of the presentation layer of the OSI model?
Data encryption Character-code translation Data compression
Which of the following units of data does the data-link layer send from the network layer to the physical layer of the OSI model?
Data frames
A router is configured in a network that includes multiple other routers. What routes does a router know by default?
Directly connected routes
You are configuring a wireless network for a home user. You do not want neighbors to detect the wireless network. What should you do?
Disable SSID broadcast.
The router has a static routing table and is not configured with a default route. What will the router do if it receives a packet that does not match any routes?
Discard the packet
Network Address Translation (NAT)
Documents created by the IETF to define Internet communications standards. Published RFCs go through a standards track before actually being considered a standard.
Requests for comments (RFCs)
Documents created by the IETF to define Internet communications standards. Published RFCs go through a standards track before actually being considered a standard.
Drag and drop the correct type of Small Offices and Home Offices (SOHOs) network according to its features in the figure.
Domain: Centralized administration, More concurrent connections, Numbers of users are between 10 to 20.Workgroup: Distributive administration, Less concurrent connections, Numbers of users are less than 10.
Which of the following techniques allows the existence of both the Ipv6 and Ipv4 protocols in a device or network?
Dual stack
Interception
Eavesdropping, or capturing traffic as it crosses a network. Protocol analyzers or sniffers, such as Microsoft's Network Monitor, can capture the traffic.
What is one way to protect data from unauthorized network clients prior to transferring it across the Internet?
Encryption
What command can you enter at the command prompt to remove DNS resolved entries from the host cache?
Enter ipconfig /flushdns at the command prompt.
Which of the following statements are true about a UTP crossover cable with RJ-45 connectors?
Establishes a connection between a broadband modem and a PC/router Establishes a connection between two PCs without a hub
Identify the devices and type of ports in the following figure.
Ethernet port (10 mbps) Router Switch Faster Ethernet ports (100 Mbps) Gigabit port (1000 Mbps)
Drag the maximum transmission speed supported by the types of Ethernet network from the right onto their matching locations on the left.
Ethernet: 10Mbps Fast Ethernet: 100Mbps Gigabit Ethernet: 1000Mbps 10Gigabit Ethernet: 10Gbps
Test remote access client connectivity.
Explanation: Here's how to test remote access client connectivity: 1.On the taskbar, in the notification area, click the Network icon, and click Open Network and Sharing Center. 2.In the left pane, click Change Adapter Settings; a list of network connections appears. 3.Right click Demo VPN and select Properties to open its properties. 4.Click on the Networking tab, select Internet Protocol Version 4 (TCP/IPv4), and select Properties. 5.Click Advanced to open Advanced TCP/IP Settings.6.Clear the Use default gateway on remote network option, and click OK; click OK to close the IPv4 properties window. 7.Click OK to close the Demo VPN Properties window.8.Right-click Demo VPN and select Connect to establish the VPN connection. 9.Type ucertifylabs as the user name, P@$$w0rd as the password, and click Connect; Demo VPN is connected.10.Close the window.
You work as a Network Administrator for On Dot Inc. The company has a Windows 2000-based network. You are asked to install Internet Security and Acceleration (ISA) Server 2000 on the network. This server will connect to the Internet through a T1 line. Which of the following components needs to be installed on the server to accomplish this?
External network adapter
Mark works as a Network Administrator for uCertify Inc. He wants to permit a few of the company's vendors to access the resources from his internal network via VPN connections. Which of the following will Mark use to accomplish the task?
Extranet
Servers on this network are accessible only to trusted entities such as trusted business partners or specific customers or vendors.
Extranet
Which of the following is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses?
Extranet
Which of the following is an intranet that is partially accessible to authorized outsiders?
Extranet
You work as a Web Developer for WebCrunch Inc. You create a web site that contains information about the company's products and services. The web site is to be used only by the company's suppliers. Which of the following options will you use to specify the nature of access to the web site?
Extranet
Drag and drop the appropriate VPN types in their respective placeholders.
Extranet: It connects computers at two sites of different organizations or corporate intranets. Access VPN: It enables users to access corporate network resources from home or other location whenever required. Intranet VPN: It connects computers at two sites of the same organization.
You are looking at a drawing of a 100 Mbps switch and want to identify what device is connected to the first port. How will the port be labelled?
F0
Which of the following is an incorrect IPv6 notation?
FACE::344:0::3389
Which of the following is the IPv6 address prefix for a link-local unicast address?
FE80
Identify the OUI portion of the MAC address by clicking it.
FF:12:22
In a TCP/IP-based network, you are required to set up a new network in a department named Research. The department's network will be configured with IPv6.
FP 1111 1111 : 8-bit Flags : 4-bit Scope : 4-bit Group ID : 112-bit
Match the protocols to their port numbers.
FTP: 20, 21 Telnet: 23 HTTP: 80 Secure HTTPS: 443 POP: 110 SMTP: 25
A group of computers are connected in a single location. What is this called?
False
Identify whether the given statement is true or false. "When DHCP reservations are used, each host system receives a random IP address from the scope of available IP addresses for its subnet."
False
True or False. A crossover cable is used to connect a computer to a switch.
False
True or False. Windows Server 2008 server supports RIPv2 and OSPF routing protocols.
False
True or false. 802.11 networks use CSMA/CD.
False
True or false. A WAP and a wireless router are the same thing.
False
True or false. A managed switch requires less administrative overhead than an unmanaged switch.
False
True or false. A router determines the best path to another subnet based on the highest cost metric.
False
True or false. A switch blocks broadcasts
False
True or false. An IPv6 address with a prefix of fd is a link-local address.
False
True or false. Layer 2 switches create separate broadcast domains.
False
True or false. T1 and T3 lines are used in Europe.
False
True or false. TCP is a connectionless protocol.
False
True or false. The Telnet client is installed by default in Windows Server 2008
False
True or false. The Windows Internet Naming Service (WINS) operates on the Internet.
False
True or false. The following two classful IP addresses have the same network ID: 192.168.1.5 and 192.168.2.6.
False
True or false. The following two classless IP addresses have the same network ID: 192.168.1.105 /26 and 192.168.1.136 /26.
False
True or false. The primary name resolution method for NetBIOS names is DNS.
False
True or false. You can measure packet loss using the tracert command.
False
Which of the following cables does not use copper wire to conduct the signals electronically?
Fiber-optic
Which of the following cables offers the best resistance to crosstalk?
Fiber-optic
Which of the following cables offers the highest resistance to EMI?
Fiber-optic
Which of the following media types is least susceptible to electromagnetic interference (EMI)?
Fiber-optic
You work as a Network Administrator for McRobert Inc. The company's branch office is approximately 1.5 miles away from its main office. You want to connect the branch office to the main office network without using repeaters. Which of the following cables will you use?
Fiber-optic
You work as a Network Administrator for Net World International. The Sales office and head office of the company are located in different buildings. You want to connect the Sales office network to the Head office network. The company's management is concerned about the electromagnetic interference (EMI) in the surrounding locality. Which of the following cables will you use?
Fiber-optic
Which of the following media types is used for high-speed, high-capacity data transmission and is immune to electromagnetic interference?
Fiber-optic cable
Which of the following media types transmits data in the form of light?
Fiber-optic cable
Which of the following are application layer protocols in the TCP/IP reference model?
File Transfer Protocol (FTP) Simple Network Management Protocol (SNMP)
John works as a Network Administrator for uCertify Inc. The employees of the company frequently use the Internet and make the company's resources susceptible to attacks from unauthorized access. Which of the following will John use in order to protect the company's network from unauthorized access?
Firewall
What should be enabled on a computer that has direct connection to the Internet?
Firewall
Which of the following is used to separate an internal network from the internet?
Firewall
You need to configure a computer in your IPv6 based network with an IPv6 address which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?
Global unicast
Sandra is setting up a home wireless network for a writer. She wants to choose a DSL connection. As she frequently uploads manuscripts to her publisher, she wants the fastest upload rate possible. Which DSLs would work?
HDSL SDSL
Mark works as a Network Administrator for TechMart Inc. He finds that after starting up a computer, it cannot communicate with any other computers on the network. The IP address of the computer is 169.254.19.21. Which of the following is the likely reason for this issue?
His computer cannot locate a Dynamic Host Configuration Protocol (DHCP) server.
What is the type of name used for computers on the Internet?
Host name
What type of computer names are assigned to Microsoft systems on a Microsoft network? (Choose all that apply.)
Host names NetBIOS names
Select the protocols of the Application layer according to their descriptions.
Http: To transmit data across the internet for web pages DHCP: To dynamically assigning TCP/IP configuration information IMAP: To receive email messages SMB: To transfer files on Microsoft networks DNS: To resolve host names to IP addresses
In a wireless topology, the behavior of an access point is similar to a ____.
Hub
Which of the following are network connectivity devices? Each correct answer represents a complete solution. Choose all that apply.
Hub Brouter Bridge Repeater
Do not have any intelligence, and any data that is sent to one port is forwarded to all ports
Hubs
Determine the differences between a hub and a switch.
Hubs: Share a single broadcast domain. Create a single collision domain. Data sent into one port goes out all other ports. Switches: Share a single broadcast domain. Create multiple collision domains. Data sent into one port goes to it's intended port.
Which of the following organizations is responsible for developing network standards?
IEEE
Match the networking standards to the method of transmitting data on various bands used by them.
IEEE 802.11g: Orthogonal frequency division multiplexing IEEE 802.11b: Direct sequence spread spectrum IEEE 802.11: Frequency hopping spread spectrum IEEE 802.11a: Orthogonal frequency division multiplexing
True or false. You are adding a Windows Media Services server to your network that is using a Windows Server 2008 server as a router. You want to ensure that IP multicast traffic passes through the router. What would you add?
IGMP Router and Proxy service
Internet Protocol (IP)
IP is a logical addressing scheme used with networking. IPv4 has been around since the 1980s, and IPv6 is the newer version. Both are currently being used on the Internet and in internal networks. Eventually, IPv6 will replace IPv4.
Which of the following features is built into IPv6 to provide extra security?
IPSec
Which of the following is used to encrypt and authenticate packets?
IPSec
Which of the following commands is used to delete the entries in the Domain Name System (DNS) cache on a client computer?
IPconfig
Which of the following commands is used to view the detailed TCP/IP configuration information on a computer?
IPconfig
Match the following properties to the protocol they belong.
IPv4 : 32-bit - Less efficient routing - unicast, multicast, and broadcast IPv6 : Unicast, multicast, anycast - 128bit - Native support for IPSec
Unique local address
IPv6 addresses assigned to hosts in internal networks. This is similar to private IPv4 addresses. Unique local IPv6 addresses start with fd
Which of the following connection mediums operates at a maximum speed of 128 Kbps?
ISDN
Which of the following is a WAN carrier that uses 23 B channels and one D channel?
ISDN-PRI
Which of the following statements are true about fiber-optic cables? Each correct answer represents a complete solution. Choose three.
Immune to electromagnetic interference (EMI) Transmits signals over great distances Uses light pulses for signal transmission
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network as shown in the image below: You have configured a DHCP server on Subnet X. This server will provide DHCP lease to the client computers on both the subnets. You find that the clients in Subnet Y are not getting IP address leases from the DHCP server. Which of the following steps will you take to resolve the issue?
Install the DHCP relay agent in Subnet Y.
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You configure two Virtual LANs (VLANs) on your network. A router is configured to connect the two VLANs. What will happen if the router fails?
Inter VLAN communication will be affected.
Which network security zone represents the highest risk?
Internet
Which of the following includes all external Web sites that are not listed in the Restricted or Trusted Sites zone?
Internet security zone
Users on the Internet are not able to communicate directly with computers in it.
Intranet
Which of the following helps in providing company information to internal employees?
Intranet
Which of the following is used to connect computers within a single company?
Intranet
Which of the following security zones is internal to the company, as well as closest to its internal network?
Intranet
You work as a Web Designer for Blue Well Inc. You have to create a Web site for the company. The website will be for internal use only and will contain information about policies and procedures of the company. What will be the scope of the website?
Intranet
Which of the following statements are true about the session layer of the OSI model
It establishes a virtual-circuit session. It manages and terminates connections between applications.
Which of the following statements is true about VLAN?
It increases the number of interfaces available to the network.
Link aggregation control protocol (LACP)
LACP is defined by IEEE 802.3ax and is responsible for allowing bundled links on switches to linked devices. Bundled links allows higher throughput between devices.
A data network that is restricted to a single geographical location and that typically encompasses a relatively small area such as an office or school building is known as:
LAN
Which of the following networks helps in connecting local computers together in a small geographical area?
LAN
Match UDP port numbers to their services
LDAP: 389 SSH and SCP: 22 DNS name queries: 53 SNMP: 161 IMAP: 143 FTPS (data channel): 989
Physical layer
Layer 1 of the OSI Model. Hubs and repeaters are examples of devices at this layer. Ethernet and Token Rink are examples of protocols on this layer.
Data Link layer
Layer 2 of the OSI Model. It has two sublayers: Logical Link Control (LLC) and Media Access Control (MAC).
Network layer
Layer 3 of the OSI Model. It maps to the Internet layer of the TCP/IP Model. The Network layer of the OSI is responsible for routing and selecting the best path to another network. Routers and layer 3 switches operate on this layer. IPv4, IPv6, ARP, and ICPM operate on this layer.
Transport layer
Layer 4 of the OSI Model and one of the layers of the TCP/IP Model. The Transport layer is responsible for flow control, reliability, and error checking. TCP and UDP protocols operate here.
Which of the following layers of the OSI model is responsible for establishing a communication session between the processes running on different communication entities in a network?
Layer 5 (session layer)
Session layer
Layer 5 of the OSI Model. The Session layer establishes, maintains, and terminates the session between two devices.
Presentation layer
Layer 6 of OSI Model. It is responsible for translation between different formats, encryption, decryption, compression, and decompression.
Application Layer
Layer 7 of the OSI Model and the top layer of the TCP/IP Model. Protocols such as DNS, DHCP, and SMTP operate on the Application layer. Proxy servers and advanced firewalls operate on the Application layer.
Which of the following is a service contract between a provider and a customer, whereby the provider agrees to deliver a symmetric telecommunications line connecting two or more locations in exchange for a monthly rent?
Leased line
Which of the following is a unique 48-bit address assigned to a network interface card (NIC)?
MAC address
Which of the following is used by the layer 2 switch to direct packets?
MAC address
Which of the following can be used to configure a virtual area network (VLAN)?
Managed switches
Your company decides to implement T1 on the network. The company's network is configured as shown below. Mark the area where T1 will be implemented in the network map.
Mark to the left of the lightning bolt
What is the default security level for Local Intranet in Internet Explorer Security Zones?
Medium-low
Match the static routing information to their descriptions.
Metric: This represents a cost value to the route Netmask: This is the subnet mask of the network ID. Interface: This identifies the NIC that should be utilized to connect to the specified destination by name. Gateway: This is the IP address of the destination router's network interface. Destination: This identifies the destination subnetwork.
What tool can you use to capture traffic going across a network? (Choose all that apply.)
Microsoft's Network Monitor A network sniffer A protocol analyzer
Network Monitor
Microsoft's version of a protocol analyzer. It captures frames of data going across a network so that the data can be analyzed. Protocol analyzers are also known as sniffers.
Which of the following cables will you use to configure a network based on the 100GBASE-SR standard?
Multi-mode fiber
In a Windows Server 2008 R2-based network, a test domain for testing IPv6 addressing is created. Which of the following types of addresses are supported by IPv6?
Multicast Unicast Anycast
Multimode fiber
Multimode fiber (MMF) uses a plastic core and can transfer data at up to 100 Mbps and as far as 2 km, or up to 10 Gbps for shorter distances. MMF supports a wider variety of light sources than SMF.
Drag and drop the two primary types of fiber optic cable according to their properties.
Multimode: Uses a plastic core, Supports 100Mbpa for distances up to 2 km Single Mode: Uses a glass core, Supports 10 Gbps for distances up to 40 km.
Which of the following systems provides a mechanism to load multiple voice and data channels into the digital line while connecting a T1 line to a LAN?
Multiplexer
Fill in the blank with the appropriate term (Use acronym only). ____ permits a private address to be translated into a public address for Internet access.
NAT
Which of the following permits a private address to be translated to a public address for Internet access?
NAT
The ____ utility displays the statistics and state of current TCP/IP connections?
NETSTAT
Which of the following is used to connect computers together in a LAN?
NIC
You use the ping command to check connectivity with a server named DC1 and receive the following error: "Ping request could not find host dc1. Please check the name and try again." What does this error mean?
Name resolution didn't work.
You use the ping command to check connectivity with a server named FS1 and receive the following error: "Destination Host Unreachable." What is the most likely reason for this error?
Name resolution didn't work.
IP operates at which of the following layers?
Network
What IPv6 protocol is used to identify routers on the same network?
Network Discovery
Which of the following are parts of an IP address?
Network ID Host ID
What allows computers to locate each other in a Microsoft network?
Network discovery
Unicast
Network traffic from one device on a network to one other device on a network.
Broadcast
Network traffic from one network device to all other network devices on a subnet.
Multicast
Network traffic from one network device to multiple other network devices on a network.
What is the IPv6 equivalent of a static IP address in IPv4?
Non-temporary
Which of the following is used to characterize and standardize the functions of a communications system in terms of abstraction layers?
OSI
Which of the following is a routing protocol used to send a multicast packet as soon as a change in the network configuration is deleted?
OSPF
Your network includes more than 50 hardware routers. What can you configure on these routers so that they will share routing information with each other? (Choose all that apply.)
OSPF Routing protocols RIPv2
An octet is 8 bits. An IPv4 address includes 32 bits that can be represented as four decimals in dotted decimal format. Each decimal can also be represented as an octet of eight bits, with four octets giving a total of 32 bits.
Octet
Ad hoc wireless network
Offers equal sharing between devices without the use of a wireless access point (WAP).
Segment
On the physical network, a segment is a common connection between multiple computers. On the OSI Model, a segment is the name of data traveling on the Transport layer. Packets travel on the Network layer and frames travel on the Data Link layer.
How many firewalls are required in a three-homed perimeter network configuration?
One
How many firewalls are used to create a perimeter network? (Choose all that apply.)
One Two
Internet layer
One of the layers on the TCP/IP Model that maps to the Network layer of the OSI Model. Routers operate on this layer.
Which of the following uses port 110 as a well-known port?
POP3
When a router is powered on, which of the following steps is performed first?
POST is run.
Which of the following technologies is not used to access the Internet through a broadband connection?
POTS ISDN
Which of the following are valid tunneling protocols?
PPTP SSTP L2TP
Which of the following is a digital networking communication method that groups all transmitted data regardless of the content, type, or structure into suitably sized blocks?
Packet switching
Select the layers that are related to the packaged data
Packet: Network Layer PDU: Application, Presentation, and Session Layers Frame: Data Link Layer
Types of hub
Passive Hubs: Take incoming electrical signals on one port and pass them down the cable on their other ports. Active hubs: Simply rebroadcast the incoming traffic Switching hubs: Listen to each port and make records of attached NIC hardware addresses Intelligent hubs: Hubs with advanced features.
Match the commands with their usages.
Pathping: To check the route between the two computers and then to check for connectivity at each router Tracert: To verify the path throughout an entire network Netstat: To display information on any TCP/IP connections on a computer Ping: To check connectivity with other computers
"Entities in a network can both request and provide network services." Which of the following network models does this quote describe?
Peer-to-peer
Servers in this network may be accessible by a user on the Internet.
Perimeter Network
Mark works as a Network Administrator for TechMart Inc. He wants to permit external users' access to a specific Web server, but block access to resources o`n his intranet. Which of the following will he configure on his network to accomplish the task?
Perimeter network
Which of the following is a small network that lies between the Internet and a private network?
Perimeter network , Demilitarized zone
Which of the following OSI model layers identifies the topology used in a network?
Physical
Which of the following layers of the OSI model is responsible for transmitting data on the cable?
Physical
Which of the following are layers of the OSI model?
Physical Transport Session
Select the various ping switch commands according to their usages in the following figure.
Ping 4 Ping t Ping a Ping w Ping 6
What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?
Ping the source host with its computer name.
You are a Network Administrator and currently planning for LAN cabling for a new area of your office building. The cable will run between the structural and drop-down ceilings. Which of the following cables will be best suited in this environment?
Plenum-rated
Port
Ports can be logical or physical. A port is a logical connection point that is associated with a protocol or an application. Physical ports are the connections to devices such as the port on a switch.
Select the equipment which are used to resolve the following problems with connectivity.
Potential Problems with Connectivity Fire Hazards: Plenum safe cable Interception of Signals: Network monitor Power Spikes: Surge protector Cross Talk: Shielded twisted pair cable
Spot the extranet network
Private Connection or VPN on Internet image
Which of the following correctly defines an intranet?
Private internal network
You have planned to use a plenum-rated cable for extending your existing LAN. For which of the following reasons is plenum-rated cable used?
Produces less toxic gas than a normal cable in case of fire Outer surface is more resistant to flame than a normal cable
Determine the primary stages for preparing an RFC document by the Internet Engineering Task Force in the Standards Track category.
Proposed, StandardsDraft, StandardsStandard
Which of the following is a set of rules that provide guidelines for computer communication?
Protocol
Routing protocols
Protocols added to routers that allow the router to communicate with other routers on a network. Information exchanged between routers with these protocols update the routers routing tables without administrator intervention.
Protocol
Protocols provide the rules that computers and other devices use to communicate with others on networks.
What is the function of the session layer of the OSI model?
Provide dialog management. Assist the upper layers in connecting to services on the network.
What are the advantages of an ISDN connection over a PSTN connection?
Provides end-to-end digital communications Offers more bandwidth Provides a faster connection
Which of the following statements are true of an IPv6 network?
Provides improved authentication and security IPv4 addresses use the last 32 bits of IPv6 addresses for interoperability Uses 128-bit addresses Increases the number of available IP addresses
Identifying types of firewall
Proxy firewall: Examines the data and decides whether the requests should be forwarded or refused Packet filter firewall: Blocks traffic to specific addresses, depending on the type of application Stateful inspection firewall: Tracks the state of every network communication channel and records it in a state table
An organization wants to restrict which web pages employees can access on the Internet using company computers. What should be implemented?
Proxy server
Which network service below is used to provide authentication and authorization?
RADIUS
Radio frequency interference (RFI)
RFI is interference caused by radio signals broadcasted over the air.
Which of following is a distance-vector routing protocol that employs the hop count as a routing metric?
RIP
Which of the following protocols prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to the destination?
RIP
Which of the following connectors is used to connect a twisted-pair cable to a network adapter card?
RJ-45
Which of the following connectors is used to connect a network interface card to the network using UTP cables?
RJ45
Which of the following amplifies signals so that they can travel longer distances without suffering from signal degradation?
Repeater
Which of the following is a Layer 1 device?
Repeater
You want to connect two computers by using the 10BASET Ethernet cable. The computers are located more than 300 meters apart. Which device will you use?
Repeater
You've installed a small network at an accounting office. All the computers have gigabit Ethernet NICs. Your router works at 1000 Mbps. Yet, when you measure the Internet speed, you see it is at a max of 100 Mbps. What should you do to fix this?
Replace the cable with a Category 6 cable.
Address Resolution Protocol (ARP)
Resolves IP addresses to Media Access Control (MAC) addresses. MAC addressees are also known as physical addresses. The arp -a command (issued at the command prompt) can retrieve the contents of the ARP cache.
Which of the following devices is required to connect two subnets that are created through VLAN?
Router
Which of the following devices operates at the network layer of the OSI model?
Router
Which of the following is a Layer 3 device?
Router
Which of the following is also known as the default gateway?
Router
Which of the following devices can use IP addresses to control network traffic? Each correct answer represents a complete solution. Choose all that apply.
Router Layer 3 switch
You work as a Network Administrator for Net World Inc. You are required to configure inter-VLAN routing for the company. Which of the following devices will you use to physically connect the computers for inter-VLAN routing? Each correct answer represents a complete solution. Choose two.
Router Switch
Static routing
Routers can have the routing table updated manually or dynamically. Static routing means that an administrator manually updates the routing table.
What would you add to a Windows Server 2008 server to use it as a VPN server?
Routing and Remote Access Services
Match TCP ports with their services
SMTP: 26 SFTP: 116 POP3: 110 Telnet: 23 NNTP: 119 FTP (data channel): 20
Which of the following DNS resource records identifies the primary DNS server for a DNS zone?
SOA
Identifying wireless acronyms
SSID: The network name needed to connect to a wireless AP. ESSID: The network name used with an ESS wireless network design. BSA: The APs coverage area, which depends on the AP antenna and any interference in the area. ESS: Two or more connected BSSs that use multiple APs.
Which of the following is the difference between STP and UTP cable?
STP has outer shielding - UTP does not.
Select appropriate options to map an IPv4 address to IPv6 in the following figure and also determine the correct format to express an IPv4 mapped IPv6 address.
Set first 80 bits to zero Set second 16 bits to zero Last 32 bits IPv4 address IPV4-mapped IPv6 address ::ffff:192:168:1:5
Which of the following is the reason to avoid fluorescent lights when running unshielded twisted pair (UTP) cable?
Signal degradation
Which of the following IPv6 addresses is used to identify a node on a site or an intranet?
Site-local unicast
Select the steps involved in the DHCPv6 process to assign TCP/IP information for IPv6 clients.
Solicit Advertise Request Reply
Determine the classes of the following source and destination IP addresses and also find whether they are local or remote.
Source IP : Destination IP : Local or Remote : Class 192.168.1.5 : 192.168.1.254 : Local : C 255.255.255.0 : 255.255.255.0 : Remote : A
In a DoD model, also known as a TCP/IP model, a TCP or UDP header is added to a message at different layers. Which of the following information is added to the source and destination port fields of the TCP header?
Source and destination port numbers identifying the upper layer protocol
Match the router's terminologies to their descriptions.
Static routing: It means that routes to different subnets in the network are manually added to the router. Routing interface: This is the interface where packets are received and transmitted Dynamic routing: It means that routes to different subnets in the network are automatically updated on the router. Routing table: This is maintained within a router that identifies all known subnetworks.
Determine the steps involved in the process used by a DHCP client to obtain an IP address and other IP information from a DHCP server.
Step 1: Discover Packet Step 2: Offer Lease Step 3: Request the lease Step 4: Acknowledge
A subnet is a group of computers separated from other computers by one or more routers.
Subnet
The subnet mask is used with the IP address to determine which portion of the IP address is the network ID and which portion is the host ID.
Subnet mask
Which of the following devices is used to create VLANs in a small network?
Switch
Which of the following devices works at the data link layer (layer 2) of the OSI model?
Switch
Which of the following devices are used for communication between the hosts of two different VLANs configured in a network? Each correct answer represents a complete solution. Choose two.
Switch Router
Which of the following devices work at the data link layer of the OSI reference model?
Switches Bridges
Click on the area where you will find the options to edit the Inbound rule of a firewall.
System and Security
Identifying T-carrier line transmission speeds
T1: 1.544 Mbps. T2: 6.312 Mbps. T3: Up to 44.736 Mbps. T4: Up to 274.176 Mbps.
Andrew works as a Network Administrator for NetTech Inc. He wants to install an Internet connection having a data transmission rate of at least 10 Mbps at the headquarters facility. Which of the following types of connections will be most suitable?
T3
Which of the following T-carrier lines supports transmission speeds of up to 274.176 Mbps?
T4
Which of the following standards define how twisted-pair cables should be wired
T568B
Which of the following protocols is considered connection-oriented?
TCP
Point-to-point (P2P) wireless
Technology used to bridge wired networks in two buildings with wireless methods. A P2P bridge is useful when a wired connection is not feasible or affordable.
MAC address
The MAC address is a 48-bit hardware address that is required by every device on a LAN to communicate on that segment. The switch uses the MAC address in the MAC table.
MAC table
The MAC table is a table created within a switch that maps device MAC addresses to switch ports. The MAC table is normally built after the switch is first turned on. Managed switches support static entries in the MAC table created by an administrator. As traffic is sent through a switch, the MAC address is recorded, and the port is noted in the table.
Open Systems Interconnect (OSI) model
The Open Systems Interconnection (OSI) model is a framework for network communication. It includes seven layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical.
Which of the following statements about the service set identifier (SSID) are true?
The SSID is an alphanumeric information field with a maximum value of 32 bits. The SSID is a logical network name for a wireless network.
Service set identifier (SSID)
The SSID is the logical name of the wireless network. All wireless devices must be in the same SSID to communicate.
TCP/IP Model
The TCP/IP Model describes a virtual networking model that was created by the U.S. Department of Defense in the 1970s. It includes four layers known as Application, Transport, Internet, and Link.
War driving
The act of driving a car through an area and scanning for wireless networks. Attackers war drive to locate wireless networks and tap into wireless networks with weak security.
You work as a Network Administrator for Blue Well Inc. The company's network contains Windows-based clients and servers. The network is connected to the Internet through a slow dial-up connection. You decide to install a DNS server on the network. What effect will it have on the network?
The amount of DNS traffic on the Internet connection will decrease. The time taken for name resolution will decrease.
Mark works as a Network Administrator for TechMart Inc. He has a managed switch with servers connected to ports 1, 2, 3, and 4 . An attacker gains access to the server on port 2 and installs software for monitoring and recording communications on the network. Which of the following statements describes the impact to network security?
The attacker can access traffic to and from the server on port 2 only.
IPv6 prefix
The first numbers in an IPv6 address that identify the type of IPv6 address. For example, it can be a global unicast address (prefix of 2), a link-local address (prefix of fe80), a unique local address (prefix of fd), or a Teredo address (prefix of 2001:000).
Link layer
The lowest layer of the TCP/IP Model. It maps to the Data Link and Physical layers of the OSI Model.
You are designing a network for Perfect Wear Inc. You need to make a choice between 100BASE-FX and 100BASE-TX. What are the two prime differences between 100BASE-FX and 100BASE-TX?
The maximum segment length of 100BASE-FX is longer than that of 100BASE-TX. 100BASE-FX is fiber-based, whereas 100BASE-TX is copper-based.
Protocol data unit (PDU)
The name of data traveling at layers 5, 6, and 7 of the OSI Model. Data is called a segment on the Transport layer (layer 4), packets are on the Network layer (layer 3), and frames are on the Data Link layer (layer 2)
Frame
The name of data traveling on the Data Link layer of the OSI Model. Packets travel on the Network layer, and segments travel on the Transport layer.
Packet
The name of data traveling on the Network layer of the OSI Model. Frames travel on the Data Link layer, and segments travel on the Transport layer.
Which of the following conclusions can be drawn from viewing the given output generated by the ping command-line utility? "Requested timed out."
There is no connectivity between the source and the destination computer.
Which of the following is a function of ADSL?
To allocate more bandwidth for download traffic than for upload traffic
Which of the following is a function of Windows Routing and Remote Access (RRAS) services?
To configure a VPN site-to-site connection
Which of the following is the function of an infrastructure mode WLAN?
To connect wireless clients to a wired network
Which of the following are functions of a switch? Each correct answer represents a complete solution. Choose all that apply.
To direct the packets to specific computers To reduce the collisions on the Ethernet network
Which of the following is a function of routing protocols? Each correct answer represents a complete solution. Choose all that apply.
To dynamically update information To determine the best path to deliver packets by disseminating information about other routers connected to the network
Which of the following is a function of Network Address Translation (NAT)?
To enable local computers with private addresses to connect to the Internet
Which of the following is the reason of using ad hoc networking in a wireless network?
To enable wireless computers to form a network when none of the wireless access points is present
Which of the following is a function of the transport layer in the OSI model?
To manage a packet sequence
Which of the following is a basic reason to use VLAN?
To manage bandwidth allocation based on the type of use
Which of the following is a function of Windows Internet Names Service (WINS)?
To map the NetBIOS names to IP addresses
Which of the following is the function of CIDR?
To permit a range of class C addresses to be represented by a single entry in the routing table
Which of the following is a function of NAT?
To permit multiple computers with private addresses to access the Internet using a single public address
Which of the following is a function of layer 3?
To provide address information required to route data between different networks
Which of the following are functions of the application layer of the OSI model?
To provide file, print, and message services To provide protocols for service use To provide protocols for service advertisement
Which of the following is the reason to configure VLAN?
To reduce broadcast overhead on a network
Which of the following is a function of the TCP/IP arp command?
To resolve IP addresses to MAC addresses
A router does not have an entry in its routing table for a packet. Which of the following is the next default location for the packet?
To the default next router
Which of the following is an access method defined in the 802.5 specification?
Token passing
Which of the following LAN protocols use token passing for exchanging signals among various stations on the network?
Token ring (IEEE 802.5) Fiber Distributed Data Interface (FDDI)
What is the function of the tracert utility?
Trace the path taken by TCP/IP packets to a remote computer.
Mark works as a Network Administrator for TechMart Inc. He uses a firewall to separate a management workstation from a router. He wants to manage the router by using telnet without specifying a port. Which of the following must be permitted by the firewall?
Traffic on port 23
__________ techniques allow IPv6-only devices to communicate with IPv4-only devices.
Translation
Which of the following operates at the transport layer of the TCP/IP reference model?
Transmission Control Protocol (TCP)
On which OSI layer does the UDP protocol work?
Transport
TCP operates at which of the following layers?
Transport
Which of the following layers of the OSI model defines the functions of TCP and UDP?
Transport
Which of the following layers provides mechanisms to transport data between network devices through error checking, service addressing, and segmentation?
Transport
Which of the following layers of the OSI reference model contains TCP?
Transport layer
Which of the following OSI layers is responsible for a reliable connection between two hosts on a TCP/IP network?
Transport layer (layer 4)
Match OSI layers to with their descriptions.
Transport: Divides long communications into smaller data packages, and handles error recognition and correction Datalink: Packages bits of data from the physical layer into frames Network: Addresses data messages and translates logical addresses into physical ones Physical: Transmits bits from one computer to another and regulates the transmission stream over a medium Presentation: Translates application layer data to an intermediate form that provides security, encryption, and compression for the data Application: Allows programs on a network node (computer) access network services, such as file transfers, electronic mail, and database access Session: Establishes and controls data communication between applications operating on two computers
Identify whether the given statement is true or false. "IPSec is a necessary requirement for configuring the IPv6 protocol suite."
True
Identify whether the given statement is true or false. "In a segmented network, the router prevents broadcasts from being transferred from one segment to another."
True
Identify whether the given statement is true or false. "In a token ring network, a patch cable is used to connect two MAUs."
True
Identify whether the given statement is true or false. "Link-Local Multicast Name Resolution (LLMNR) works with both IPv4 and IPv6 addressing schemes."
True
Identify whether the given statement is true or false. "An IPv6 anycast address can be assigned to routers only."
True
True or false. A DMZ provides a layer of security for Internet-facing servers.
True
True or false. A WAP often provides access to the Internet.
True
True or false. Any entries in the Windows hosts file automatically appears in the host cache.
True
True or false. Bridges can connect dissimilar physical topologies
True
True or false. Devices that operate on layer 7 of the OSI Model are more intelligent than devices that operate on layer 1.
True
True or false. IEEE 802.11n networks can operate at speeds as high as 300 Mbps
True
True or false. STP provides protection against interference and cross talk.
True
True or false. The following two classful IP addresses have the same network ID: 10.80.4.2 and 10.81.15.2.
True
True or false. UDP traffic accepts the loss of some data.
True
Which of the following statements are true regarding plenum-rated cables? Each correct answer represents a complete solution. Choose all that apply.
Used in an enclosed environment Often coated with Teflon Produce less toxic gas than normal cables in case of fire
Which of the following are implemented at the transport layer?
User Datagram Protocol (UDP) Transmission Control Protocol (TCP)
Mark works as a Network Administrator for TechMart Inc. He wants to configure computers in various locations as if they were all part of the same network. Which of the following will Mark set up to accomplish the task?
VLAN
Which of the following is created to segment broadcast traffic and increase network performance?
VLAN
Which of the following is used to isolate hosts and segments, and to control broadcast traffic?
VLAN
Which of the following technologies or services can be used to isolate hosts and segments and to control broadcast traffic?
VLAN
You are the Network Administrator for an organization that has several departments including the marketing and finance departments. Recently financial data was leaked. Traffic from the computers in the financial department needs to be isolated with the least cost. Click on the type of network in the following figure which you will choose to accomplish the task.
VLAN
An employee is able to connect to the employer's private network over the Internet. What is the employee using?
VPN
Which of the following networks allows users to use the Internet as a secure pipeline to their corporate local area networks (LANs)?
VPN
Which of the following networks creates a private network and provides a secure tunnel across the Internet?
VPN
Which of the following technologies is used to permit a client computer to securely connect to a remote private network across the Internet?
VPN
Which of the following will you use for home-based telecommuters requiring intermittent connections over the Internet to the company's internal network?
VPN
What are two types of remote access servers?
VPN, Dial-up
It is a network that connects two or more LANs over a larger distance.
WAN
Which of the following is a set of interconnected local area networks (LANs)?
WAN
Which of the following networks spans a relatively large geographical area?
WAN
Wireless networks use a centralized device known as a ____, which transmits signals to devices with wireless NICs installed on them.
WAP
Wired Equivalent Privacy (WEP)
WEP was the first encryption model offered for wireless network. It is insecure and should be used only in current wireless networks as a last resort.
Which of the following is a WLAN security standard that supports AES encryption?
WPA
Wi-Fi Protected Access (WPA)
WPA was introduced as an interim replacement for WEP until WPA2 could be finalized. WPA offers significantly improved security over WEP without requiring additional hardware. WPA can be used in WPA Personal mode with a preshared key or WPA Enterprise mode with an 802.1x server.
Which of the following security encryption protection techniques is designed for home and small office networks and does not require an authentication server?
WPA-Personal
Of the following security methods, which one is the most secure?
WPA2 Enterprise Mode
Wi-Fi Protected Access version 2 (WPA2)
WPA2 provides a permanent fix for the security problems of WEP and is standardized as IEEE 802.11i. WPA2 requires different hardware than that used by WEP and uses the Advanced Encrypted Standard (AES) encryption method. WPA2 can be used in WPA Personal mode with a preshared key or WPA2 Enterprise mode with an 802.1x server.
Identifying wireless protocols
Wi-Fi: Began as the 802.11b IEEE standard and has an indoor transmission range of up to 35 meters. WiMax: Point-to-multipoint broadband wireless access standard that is an emerging standard for long distances. Bluetooth: A short-range wireless technology limited to transmission distances of about 100 meters, which confines it to connecting nodes within a single room or adjacent rooms. 802.11a: Improved version of the original Wi-Fi technology based on the same IEEE 802 standard. Has an indoor transmission range of up to 35 meters.
Mark works as a Network Administrator for TechMart Inc. His Windows computer is configured to automatically receive an IP address. It also has APIPA enabled. Mark is using the IP command to check the TCP/IP on his computer. He wants to check whether the computer has connectivity with a server on the same subnetwork. He observes that it has an IP address of 0.0.0.0. Which of the following is the reason of this problem?
Windows is unable to detect a connection to the network media.
Which of the following is used by wireless devices to connect to a network?
Wireless access point
Which of the following is used to connect a wireless LAN segment to a wired LAN segment?
Wireless access point (WAP)
Your network includes computers connected via hubs. You want to reduce the number of collisions to the least number possible. What should you do?
You should replace the hubs with switches.
You need to manually assign an IPv6 address to a client computer for use within a private network. Which one of the following addresses should you use?
fd00:: a123:4567:89ab:cdef
Match TCP utilities with their descriptions
getmac: Displays the NIC's MAC address netstat: Displays a list of a computer's active incoming and outgoing connections ifconfig: Displays the host's IP addressing information telnet: Allows you to communicate with another computer on the network remotely mtr: Combines the functionality of ping and traceroute
Communication within layers is logical or virtual
https://imgur.com/39KU7IN
Which OSI model which is responsible for connectionless communication, host address, and message forwarding
https://imgur.com/a/05Pwfca
Sally and Bob are the two users on the Internet. Sally wants to download a video file from Bob's computer. Select the flags which will be used by them while establishing session using the TCP Handshake process and downloading the file.
https://imgur.com/a/h6OVnl6
Match protocols used in those layers of the TCP/IP architecture.
https://imgur.com/a/jjzv77s
Match OSI and TCP/IP models to reference points for the devices used on a network.
https://imgur.com/a/wG7YHIU
Which of the following utilities produces the output displayed in the figure below? Host Name......: Client 1 Primary DNS Suffix.....: zen.com
ipconfig
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You want to know the current TCP/IP network configuration settings, DHCP server IP address, and DHCP lease expiration date of your network. Which of the following utilities will you use?
ipconfig
What command can you use to determine a computer's default gateway? (Choose all that apply.)
ipconfig ipconfig /all
You work as a network administrator for Tech Perfect Inc. Rick, a new colleague, needs information regarding his computer's IP address lease start date and expiry date. Which of the following commands will help him?
ipconfig /all
You work as a Network Administrator for uCertify Inc. You want to verify whether your computer is using Teredo for IPv6 compatibility and also want to remove the contents of the host cache. What command will you type in the cmd prompt to accomplish the task?
ipconfig /all ipconfig /flushdns
Identifying TCP/IP commands
ipconfig: Displays information pertaining to your network adapter, namely TCP/IP configurations. •ping: Tests the existence of other hosts on the network. •netstat: Displays active TCP (or UDP) connections. •nbtstat: Displays NetBIOS over TCP/IP statistics for local and remote computers. •tracert: Shows paths to a destination on another network by pinging each step along the way three times
Which of the following command-line utilities is used to show the state of current TCP/IP connections?
netstat
Which of the following is used to find problems in the network and to determine the amount of traffic on the network as a performance measurement?
netstat
Which of the following utilities will produce the output as shown in the image below? Active Connections Proto Local Address Foreign Address TCP LAPTOP5:1093 cs31.msg.dcn.yahoo.com:5050
netstat
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You want to get the protocol statistics and the active TCP/IP network connections of your computer. Which of the following will you use?
netstat
What is the command to view all open ports including known applications on a Windows Server 2008 system?
netstat -b
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You want to know the statistics of each protocol installed on your computer. Which of the following commands will you use?
netstat -s
Which of the following are used to identify a router that is facing problems?
pathping tracert
Which of the following is used to test connectivity by sending data and receiving it back?
ping
Which of the following utilities is used to verify the existence of a host in a network?
ping
Which of the following utilities produces the output shown in the figure below? Reply from 127.0.0.1: bytes=32 time
ping
Which of the following utilities will produce the output shown in the figure below? Reply from 205.138.192.8: bytes=32 time=337ms TTL=53 Ping statistics for 205.138.192.8 ....
ping
Which of the following utilities are similar in function?
ping tracert
You work as a technician for Net Perfect Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want to send larger sized packets than the usual 32-byte ones. Which of the following commands will you use?
ping -l
You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP's DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command. Which of the following commands will you use?
ping -t
You want to verify a computer can connect with the default gateway. It has an IP address of 192.168.1.1. What command should you use?
ping 192.168.1.1
A short-duration increase in AC power is a _____________.
power spike