Chapter 11 practice questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following locations will contribute the greatest amount of interference to a wireless access point? -the top floor of a two story building -near exterior walls -near backup generators -near DHCP servers -Near cordless phones

-near backup generators -near cordless phones

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation and an application you are using is unable to connect to a Windows server named FileSvr2. Which commands can you use to test network connectivity between your workstation and the server? (Two)

-tracert (performs same function as ping but includes path information) -ping

What are 4 options for connecting a computing device, such as a notebook computer or tablet, to a cellular network?

-use the devices wifi to connect to the network through a cellular wifi hot spot -use a USB cable to connect the device to the network through a smartphone -use a USB cellular adapter to connect the device directly to the cellular network -use an integrated cellular antenna to connect the device directly to the cellular network

What is a Loopback address for any device?

127.0.0.1

What range is the first octet of a Class B address?

128-191

Apple Filing Protocol (AFP) port:

548

You are currently using a cellular network plan that provides maximum speeds of up to 10 Gbps for your smart phone. What cellular network type are you using

5G

How many sections are in a valid IPv6 address?

8

What is ARP?

Address Resolution Protocol

Smart device description: bulb

Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on

A technician is installing a new SOHO wireless router. What is the FIRST thing the technician should do to secure the router?

Change the router's default password

A technician is replacing a SOHO router and has configured the DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. What change to the SOHO router is most likely to restore internet connectivity?

Configure the SOHO router for NAT -configure NAT to translate the private IP addresses on the local network to public IP addresses on the internet. Will most likely restore internet connectivity

Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. What system would best meet your employers needs?

DCS (distributed control system): A DCS is a customized, all-in-one package that contains the needed PLCs, SCADA controller, and HMI.

You have just connected a new computer to your local network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having problems. Which configuration value would you most likely need to change?

Default gateway - used to send packets to other subnets, if the value is incorrect, the packets will not be sent to the correct router.

After several new computers are connected to a network device, every computer connected to the device begins to experience slow transfer speeds. What is the first step to troubleshoot this problem?

Determine whether the network device is a hub or a switch

A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate content while browsing the web. What action would help accomplish this goal?

Enable content filtering

What satellite technology is your service provider using if you sometimes lose your signal for a short period of time when going through long tunnels and heavily forested canyons?

GEO (geostationary satellite) - often used as a portable solution for use in cars or trucks to access a satellite signal when no other signal is available. GEO requires line of sight to the satellite which means the signal can be interrupted by tunnels or heavily covered canyons.

You are an IT technician for your company. Which of the following mechanisms would best allow you to resolve a host name to its associated IP address? -DNS -DHCP -FTP -BOOTP -hosts file

Hosts file and DNS (Domain Name System)

A user reports that they cannot browse to a specific website on the internet. From their computer, you find that a ping test to IP address of the web server succeeds. A tracert test shows 17 hood to the destination web server. What is the most likely cause of the problem?

Incorrect DNS server address (a ping test to the IP address of the website succeeds, while accessing the website through browser does not work. users type hostnames in the browser to go to websites and hostnames must be translated to IP addresses by a DNS server.)

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig and see the following: IPv4 Adress.......192.168.1.102 Subnet mask......255.255.255.0 Default gateway.....192.168.2.1 DNS Servers........192.168.2.20 What's the likely cause of the problem

Incorrect default gateway - not on the same subnet as the IP address for the host

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet, which uses the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: IPv4 Address......192.168.1.102 Subnet Mask.......255.255.0.0 Default gateway......192.168.1.1 DNS Servers.....192.168.1.20 192.168.1.27

Incorrect subnet mask - the network is using a mask of 255.255.255.0 (24 bits) but the workstation is configured to use a mask of 255.255.0.0

You are the computer specialist in a small business. Your company server is named FS1 and has an IP address of 10.0.0.2. The hardware in your company server started to experience intermittent failures, so you transferred the shares on the server to a spare server and took the main server offline. The spare server has an IP address of 10.0.0.3. You edit the existing A record for FS1 on your company's DNS server and redirect the hostname to the spare server's IP address of 10.0.0.3. Afterward, most users are able to access the shares on the spare server by hostname, but several users cannot. Instead, they see an error message indicating that the FS1 server could not be found. Enter the command you can run from the command prompt on these workstations that will allow them to access the shares on FS1 without performing a full restart.

Ipconfig /flushdns (deletes the local DNS name cache)

What issue causes variations in the latency of VoIP packets?

Jitter

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. What feature lets you allow or reject client connections by hardware address?

MAC address filtering

Several of your employees are experiencing limited connectivity issues when trying to access some websites on the internet from their workstations. However, they can access the local company network without any problems. You have already tried using the ip and ipconfig commands to determine that the websites can be reached and that the IP information on the workstations is configured properly. You know that the connection to your internet service provider is working properly as well. What should you do next?

Make sure the DNS server is functioning properly - you already know the DNS server information is correct when you ran the ip and ipconfig commands.

What does MAN stand for?

Metropolitan Area Network

A network that covers an area as small as a few city blocks to as large as an entire city.

Metropolitan Area Network (MAN)

You have just installed a wireless network, but the network is experiencing slow speeds, especially when accessing the internet from your workstation. Which action should you try first to resolve the issue?

Move the wireless access point

A user pays for a retail purchase by placing a smart phone next to the merchant's reader. What wireless mobile device connection is being used?

NFC

What wireless communication technology can be described as follows: *it has a limited transmission range of less than two inches *it is used with credit cards and passports *it is slower than other wireless technologies *it constantly emits a signal

NFC

What does NFC stand for?

Near Field Communication

What does PAN stand for?

Personal Area Network

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols. What type of network is in use?

Personal Area Network (PAN)

Currently, your company is in the process of upgrading security in the company headquarters building by installing biometric sensors to limit access to specific rooms. Your network switches are PoE-enabled, which allows biometric sensors to connect to switches without an external power source. What PoE standard is designed for use with biometric sensors?

PoE+

What is a common cause for high latency on a network?

Port flapping - occurs when a port on the network switch continuously turns off and on three or more times per second for at least 10 seconds

A technician is installing a network-enabled smart home control system in a SOHO. What configuration is most likely required on the SOHO router in order to access the system from the internet?

Port forwarding

What does PoE stand for?

Power over Ethernet

What Windows network location enables network discovery and allows files and printers to be easily shared?

Private (the private network location is designed for use on networks where all other users and devices are known and trusted.

What does QoS stand for?

Quality of Service

You want to connect your internal network to an external network in order to provide internet access to your employees. What network component is designed to make this connection?

Router

What identifies the network name on a wireless network?

SSID (service set identifier) is used by the wireless device to identify network name. All devices on a wireless network use the same SSID

A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patients statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

What is a specialized controller that you can use to remotely manage all your network devices?

Software-defined networking (SDN)

What type of network uses special hardware to provide high-speed access to storage across the network?

Storage area network (SAN)

A technician determines that an older network hub that connects 24 workstations is performing poorly due to excessive network collisions. Which network device would be the BEST replacement?

Switch - a switch maintains a table of MAC addresses by port and forwards network data packets to only the port that matches the MAC address. This would significantly reduce collisions

A laptop has a wired connection to the network and is configured with a static IP address. The link light on the NIC is lit, but the laptop can't communicate with any hosts on the local network. Which of the following is the MOST likely cause of the issue?

The IP address conflicts with another host on the local network.

What does a reverse lookup zone match?

The IP address to the hostname (you have the hostname)

True/False: the host ID is a unique value that is different for each device.

True

What does UTM stand for?

Unified Threat Management

What does WAN stand for?

Wide Area Network

A group of networks that are geographically isolated, but are connected to form a large internetwork.

Wide Area Network (WAN)

What does WLAN stand for?

Wireless Local Area Network

Similar to a standard LAN, but uses radio signals instead of wires to connect systems together.

Wireless local area network (WLAN)

Can 141:0:0:0:15:0:0:1 be abbreviated to 141::15:0:0:1

Yes

You are using a patch panel to connect the computers in your building to the appropriate switches, and you need to connect the Ethernet wires from the building network port cables to the patch panel. Where do you connect the wires on a patch panel?

Yon connect the wires to the backside of the panel.

What hardware device regenerates a signal out to all connected ports without examining the frame or packet contents?

hub

Which command would you enter at the command line to see the following information: IP address, subnet mask, default gateway configuration, network cards MAC address and the addresses of the DHCP and DNS servers the workstation is communicating with?

ipconfig /all

You are troubleshooting network connectivity issues on a Windows workstation. Which command would you use to view the MAC address of the network adapter?

ipconfig /all

When you see the DNS server address, you realize that this information needs to be updated. Earlier in the day, you implemented a new DNS server with a new IP address. The workstation will update this information in 24 hours. Which command can you enter at the command line to update the DNS server information right away?

ipconfig /flushdns

You are troubleshooting a network connectivity issues on a workstation. Which command would you use to request new IP configuration information from a DHCP server?

ipconfig /renew

What utility displays active sessions, ports, sockets and the local routing table?

netstat

What utility displays current connections and incoming and outgoing connections?

netstat

Which utility can you use to view a computer's current connections, active sessions, and ports?

netstat

What utility resolves (looks up) a specified hostname's IP address?

nslookup

(What utility?)A few simple replies to this request from the remote host indicates that a connection exists between sender and receiver.

ping

What utility performs a continuous connection test when used with the -t option?

ping

What utility sends an ICMP echo request/reply packet to a remote host?

ping

You have had several employees call the help desk where you work, complaining that they are not able to reach the www.widgets.com server. To help troubleshoot this issue, you decide to run a variety of commands. What command is MOST likely to return the IP address of the desired server? (Select THREE).

ping www.widgets.com

What does SOHO stand for?

small office/home office

4 22 ms 21 ms 22 ms sttlawa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 Ms plalca01gr00.bb.ispxy.com [154.11.12.11] Which command produced this output?

tracert

What utility tests connectivity between devices and shows the routers in the path between the two devices?

tracert

You are the network administrator of a branch office for your company. The branch office network is part of a WAN that covers most of the United States. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. Which TCP/IP utility would be best to troubleshoot the routers and why?

tracert because it shows you the series of routers that are used between the source and destination computers. If a router isn't functioning, tracert would show you the last router the command was able to contact.

What does VoIP stand for?

voice over internet protocol

What network component is responsible for converting digital data into a signal that can be transmitted?

Network interface (NIC)

Is 343F:1EEE:ACDD:2034:1FF3:5012 a valid IPv6 address and why?

No because it only has 6 sections

Which of the following IP addresses have a default subnet mask of 255.255.0.0? -191.168.2.15 -123.254.19.6 -228.62.18.6 -129.0.0.1 -1.6.45.254 -168.16.5.1

-191.168.2.15 -129.0.0.1 -168.16.5.1 (Class B has numbers between 128 and 191 as their first octet)

What correctly describes the most common format for expressing IPv6 addresses?

-hexadecimal numbers -32 numbers, grouped using colons

What is the range of digits in a hexadecimal system?

0-9 and A-F

What wireless networking technology has a range of up to 2 meters with a few obstacles in between?

Infrared

What type of network uses internet technologies, but the data and services are only available to the hosts connected to the private network?

Intranet (ex: a company might have a website that only employees can access)

Which authentication protocol is a key component of Windows Active Directory?

Kerberos

Which authentication protocol provides a trusted Key Distribution Center (KDC)?

Kerberos

Smart device description: thermostat

Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions.

What does LAN stand for?

Local Area Network

You are currently learning about networking devices and have just learned about MAC addresses. You look up your device's MAC address, and it comes back as 00-B0-D0-06-BC-AC. What portion of this MAC address can tell you who the manufacturer is?

00-B0-D0 (first 6 digits of a MAC address is assigned to each manufacturer)

What range is the first octet of a Class A address?

1-126

What three pieces of information does a packet header contain?

1. Sender 2. Data chunk order 3. Receiver

When using TCP, two hosts first establish a connection through a three-way handshake. List the 3 valid steps in the three-way handshake process.

1. The first host sends a SYN packet asking to create a new session. 2. The receiving host replies with a SYN-ACK packet acknowledging that the session can be created. 3. The first host replies with the ACK packet, which then opens the session.

Internet Message Access Protocol (IMAP) port:

143

What is the default address range used by APIPHA?

169.254.0.1 to 169.254.255.254

Your Windows has Automatic Private IP Addressing (APIPHA) implemented with default settings. Which of the following TCP/IP addresses could you automatically assign to the system, should your DHCP server go down or become inaccessible? -192.168.1.22 -10.0.0.65 -169.198.1.23 -169.254.1.26 -168.254.10.25 -172.16.1.26

169.254.1.26

What range is the first octet of a Class C address?

192-223

Secure Shell (SSH) port:

22

To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol?

3389 - Remote Desktop Protocol (RDP) uses port 3389 by default

Service Location Protocol (SLP) port:

427

Hypertext Transfer Protocol Secure (HTTPS) port:

443

Server Message Block (SMB/CIFS) directly over TCP port:

445

IPv4 address: 192.168.0.52 Subnet mask: 255.255.255.0 Default gateway: 192.168.0.1 What is the host ID?

52

Hypertext Transfer Protocol (HTTP) port:

80

A customer is experiencing a sporadic interruption of their WiFi network in one area of their building. A technician investigates and discovers interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased. What wifi standard should the replacement device support to best fulfill the customers needs?

802.11ac (the microwave oven interferes with wireless signals that operate at 2.4GHz- 802.11ac is 5GHz)

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency of 2.4 GHz, and provide the highest possible transmission speeds. What wireless solution should you recommend?

802.11g

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

802.11n

What does a forward lookup zone match?

A host name to the IP address (you have the IP address)

What is the default subnet mask for Class A, B, and C networks?

A: 255.0.0.0 B: 255.255.0.0 C: 255.255.255.0

You install a new computer on a network, and verify network connectivity by pinging the network server. Before this can happen, the new device needs to know the MAC address of the network server so it can match it to the IP address. The computer sends a broadcast message, asking who has the IP address. The network server responds with its MAC address, and now the computer can communicate with the server. Which protocol is being used when sending the broadcast message to match the MAC address to the IP address?

ARP

You have recently purchased a toll pass for a bridge that you cross each day on your way to work. What wireless technology is most likely being used for this pass?

Active RFID

Smart device description: switch

Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals

Which wireless networking technology has a range of up to 100 meters for Class 1 devices and up to 10 meters for Class 2 devices?

Bluetooth

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. What would be the best choice for this wireless connection?

Bluetooth - provides 128-bit encryption to protect information in transit

A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when one person in the office streams video from the internet. Which configuration change on the SOHO router is MOST likely to improve VoIP performance?

Change QoS settings to give VoIP traffic more priority

A technician receives a notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over routers. The technician verifies the settings outlined in the notification. Which action should the technician take next?

Check for and apply firmware updates

Which wireless networking technology has a range of up to a few centimeters?

Near Field Communication

Which of the following are IoT systems that work together to make communication between two endpoints possible? -middleware -Data Storage -Wi-Fi -Gateway system -Access gateway

Data storage and Gateway system. The gateway system connects an IoT device to the cloud, while data storage is the system in the cloud that stores, processes, and analyzes the data.

A technician has configured a client computer's network interface with server addresses to which the client will send requests for translating fully qualified domain names (FQDNs) to IP addresses and IP addresses to FQDNs. What TCP/IP suite protocol is used by the client to perform the request and also used by the server to respond to those requests?

Domain Name System (DNS)

A technician has configured a client computer's network interface to request an IP address. What TCP/IP suite protocol does the client computer use to perform the request and receive an IP address from a server?

Dynamic Host Configuration Protocol (DHCP)

Smart device description: plug

Easy solution for making small appliances such as lamps, coffee makers, and toasters smart

You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?

FTP (File Transfer Protocol) which enables file transfers and supports user authentication

True/False: if devices are using different networking protocols, they can only communicate in certain ways?

False: if devices are using different protocols, they will be unable to communicate. Networking protocol defines how the data is formatted and transmitted.

You are the network administrator for a small consulting firm. The firm has recently rolled out a new intranet site, and you are responsible for configuring the DNS. You are able to connect to the intranet by using the IP address, but cannot connect by using the hostname. What would you need to configure to access the site with the hostname?

Forward lookup zone

What protocol is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server?

IMAP

What UTM applicable monitors all network traffic and blocks malicious traffic while notifying the network security team?

IPS (intrusion prevention system)

A network that is typically owned and managed by a city as a public utility.

Metropolitan Area Network (MAN)

A small network used for connecting devices, such as a notebook computer, a wireless headset, a wireless-printer, and a smartphone.

Personal Area Network (PAN)

What are two major concerns regarding IoT devices?

Privacy and Hacking

Which authentication protocol only encrypts the password?

Remote Authentication Dial-In Service (RADIUS)

Which authentication protocol send a user's credentials over UDP?

Remote Authentication Dial-In Service (RADIUS)

Which DHCP scope option will assign a static IP configuration to a device using the device's MAC address?

Reservation

You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share?

SMB (Server Message Block) - used by Windows system to access shared resources over the network

What does SNMP stand for?

Simple Network Management Protocol

What does SAN stand for?

Storage Area Network

What identifies both the host computer and the network to which it belongs?

Subnet mask

Which authentication protocol sends a user's credentials over TCP?

Terminal Access Controller Access-Control System (TACACS+)

Which of the following identifies the interface ID component of an IPv6 address? -the first four quartets of an IPv6 address -the last 64 bits of an IPv6 address -the first quartet of an IPv6 address -the last quartet of an IPv6 address -the last four quartets of an IPv6 address -the fourth quarter of an IPv6 address

The last 4 quartets of an IPv6 address The last 64 bits of an IPv6 address An IPv6 address is a 128-bit binary number that uses the first 64 bits as the address prefix and the last 64 bits of the address as the interface ID. The 128-bit binary number is organized into 32 hexadecimal numbers that are organized further into 8 quartets. The last 4 quartets correspond with the last 64 bits of the IPv6 address.

You work at a company in the IT department. You have split each department into smaller subnets. Jaclyn in HR is trying to access shared files from Tom's computer in the Sales department but can't. You verify they can both access the network printer in their departments. What is the most likely reason Jaclyn is unable to access files on Tom's computer?

Tom and Jaclyn are no longer on the same subnet

You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees from visiting certain types of websites. The client also needs a VPN. Which internet appliance should you install?

Unified Threat Management (UTM) - combines multiple functions into one device, including the firewall, IPS, content filtering, VPN support, and more.

What is an inherent vulnerability of embedded devices?

Unknown environments: embedded devices are sealed systems- won't always know which hardware is in the device

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. What Transport layer IP suite protocols is MOST likely used for this service?

User Datagram Protocol (UDP)

Smart device description: door lock

Uses a wireless protocol and cryptographic key to execute the authorization process. It can also monitor access and send alerts related to a device's status

Smart device description: security camera

Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage

Smart device description: speaker/digital assistant

Uses voice recognition software and activated through a Wake word or Hot Word

Which authentication method allows you to securely connect a printer to the wireless network with the least amount of effort?

WPS (Wi-Fi Protected Setup) -allows you to connect a device to the wireless network simply by pushing a button on the wireless access point.

You are working as an installer for a small IT company. One of your residential clients has purchased some IoT devices and you have been tasked with installing them for the client. These IoT devices will be networked together in a small network. Each device will connect to each other and act as a relay for the network signal so additional network infrastructure will not be needed. What best describes this type of network?

Wireless mesh network

Is 6384:1319:7700:7631:446A:5511:8940:2552 a valid IPv6 address and why?

Yes because it has 8 sections and follows the range of 0-9 and A-F

Is 141:0:0:0:15:0:0:1 a valid IP address and why?

Yes because the numbers fall in the hexadecimal range and there are 8 sections

What are the two mesh protocols that are used most often with IoT devices?

Z-Wave and Zigbee: are two radio protocols that many IoT devices work with because they are designed for low-data rate, low-power applications. These protocols link all IoT devices to form a mesh network.

A network in a small geographic area that typically uses wires to connect systems together.

local area network (LAN)

A set of subnets connected to each other, typically by wires, using at least one router.

local area network (LAN)

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer? -peer-to-peer -extranet -intranet -client/server

peer-to-peer


Set pelajaran terkait

C-11 (CR-11) Electrical (Commercial) Learning Mode

View Set

Set A Volume 1 - Chapter Three: Critical Thinking

View Set

Complementary, Supplementary, Vertical, and Adjacent Angles - BW

View Set

EXAM 1 TOPICS (Ch. 1, 4-9; Labs 1-4)

View Set

6. REPASO Y EXAMEN SEMESTRAL Spanish I B

View Set

Taylor chapter-39 Review Questions. Fluid, Electrolyte, and Acid Base Balance

View Set

Chapter 28 Head & Spine Injuries

View Set