CNIT 106 5
Which of the following approaches to wireless LAN security requires users to authenticate against an authentication server's database? A. WPA B. WEP C. WPA2 D. WPA Enterprise
D. WPA Enterprise
What is the name of the mechanism used by TCP to increase and decrease the number of segments that are sent between each other before an acknowledgment is required? A. Buffering B. Synchronizing C. Scaling D. Windowing
D. Windowing
Which of the following commands displays Layer 2 addresses that correspond to Layer 3 addresses? A. nbstat B. ipconfig C. netstat D. arp
D. arp
What is the following OSI Layer function? Transport Layer
Disassembles and reassembles segments
Describe the following TCP utility. netstat
Displays a list of a computers active incoming and outgoing connections
Describe the following TCP utility. getmac
Displays the NIC's MAC address
Describe the following TCP utility. ifconfig
Displays the hosts IP addressing information
A converged network is a network that has the capabilities of transporting multiple types of traffic such as voice, video, and data, which can offer significant cost savings to organizations. True or False
True
Broadband bandwidth usage divides the bandwidth into channels for use with multiple communications streams. True or False
True
Switching is associated with Layer 2 and Layer 3. True or False
True
The actual traffic flow determines the logical topology, while how components are physically interconnected determines the physical topology. True or False
True
T or f - switching is associated with layer 2 and layer 3
False (just the network layer)
What is the following OSI Layer function? Network Layer
Finds best possible route
Describe the following OSI layer. Datalink Layer
Packages bits of data from the physical layer into frames, transfers them from one computer to another, and receives acknowledgement from the addressed computer
What is the administrative distance for an internal EIGRP route? a. 1 b. 90 c. 110 d. 170
90
Describe the following protocol. RDP (Remote Desktop Protocol) TCP Port 3389
A Microsoft protocol that allows a user to view and control the desktop of a remote computer
Which of the following statements are true regarding VLANs? (Choose two.) a. A VLAN is a single Layer 2 broadcast domain. b. For traffic to pass between two VLANs, that traffic must be routed by a Layer 3 device. c. Because of a switch's MAC address table, traffic does not need to be routed in order to pass between two VLANs. d. A VLAN is a single collision domain.
A VLAN is a single Layer 2 broadcast domain. AND For traffic to pass between two VLANs, that traffic must be routed by a Layer 3 device.
Describe the following OSI layer. Application
Allows programs on a network node access network services, such as file transfers, electronic mail, and database access.
Describe the following TCP utility. telnet
Allows you to communicate with another computer on the network remotely
Which of the following is a common Layer 2 protocol that could not run over a dedicated leased line? A. transmission control protocol B. point-to-point protocol C. internetwork packet exchange protocol D. routing information protocol
B. point-to-point protocol
____ is intended to eliminate single points of failure. A. availability B. redundancy C. contingency D. integrity
B. redundancy
Transport layer protocols break large data units into ____. A. PDUs B. segments C. frames D. block IDs
B. segments
Which of the following are distance vector routing protocol features that can prevent routing loops? A. reverse path forwarding (RPF check) B. split horizon C. loopback /prevent loop D. rendezvous point
B. split horizon
What are the two methods used to prevent loops in a distance vector routing protocol? A. split horizon and hold down timer B. split horizon and poison reverse C. poison reverse and hop count D. split horizon and hop count
B. split horizon and poison reverse
How is a switch selected as a root bridge for spanning tree if the bridge priorities are the same? A. switch with the lowest IP address becomes the root bridge B. switch with the lowest MAC address becomes the root bridge C. switch with highest MAC address becomes the root bridge D. switch with the highest IP address becomes the root bridge
B. switch with the lowest MAC address becomes the root bridge
What is a common reason for disabling SSID broadcast in a wireless LAN? A. to use IP v6 subnetting B. to better conceal the SSID C. to allow the use of multiple access points in a single WLAN D. to be compatible with E1 standards
B. to better conceal the SSID
Many PDUs include a characteristic closing component called a ____ that provides data integrity checks for the data portion of the PDU, known as the payload. A. well-known protocol B. trailer C. network service D. host
B. trailer
Which of the following is an exterior gateway protocol? a. BGP b. RIP c. OSPF d. EIGRP
BGP
Which of the following routing protocols is an EGP? a. BGP b. IS-IS c. RIP d. OSPF
BGP
Which of the following are dynamic approaches to assigning routable IP addresses to networked devices? (Choose two.) a. BOOTP b. APIPA c. Zeroconf d. DHCP
BOOTP And DHCP
What factors are used to calculate the OSPF cost? a. Bandwidth, delay b. Bandwidth c. Delay d. Bandwidth, MTU
Bandwidth
What factors are used in the calculation of the default EIGRP metric? A) Delay B) Bandwidth C) Bandwidth, delay D) Bandwidth, MTU
Bandwidth, delay
____ are the distinct units of data that are exchanged between nodes on a network. A. segments B. data packets C. topologies D. protocols
B. data packets
What term is used to describe a loss of signal power? A. impedance B. db loss C. amplitude modulation D. capacitance
B. db loss
The port on a segment that is closest to the root of a switch is known as _________ A. root ports B. designated ports C. non-designated ports D. inactive ports
B. designated ports
____ ARP table entries are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table. A. static B. dynamic C. temporary D. on-demand
B. dynamic
You are troubleshooting an issue where a PC cannot reach a web server on the Internet. From the PC you can ping the IP address of devices on your local subnet. You cannot ping the DNS name off the web server. However, you have previously noted the IP address of the web server's IP address, and you notice that you can ping the IP address of the web server. Of the following potential troubleshooting issues, what is most likely causing the problem? A. incorrect DNS configuration on the PC B. incorrect gateway configuration on the PC C. incorrect subnet mask on the PC D. incorrect or missing routes in a router's routing table
B. incorrect gateway configuration on the PC
Which of the following is a Windows command that can be used to release and renew a DHCP lease on a PC? A. netstat B. ipconfig C. nbtstat D. arp
B. ipconfig
Which of the following security attacks occurs when an attacker causes traffic flowing between two devices on a network to flow through the attacker's device? A. packet sniffing attack B. man-in-the-middle attack C. reverse arp attack D. syn attack
B. man-in-the-middle attack
Which of the following is a common wireless network troubleshooting issue? A. looping data between MAC addresses B. multiple paths of propagation C. crosstalk D. faulty cabling
B. multiple paths of propagation
Which IEEE standard defines wired Ethernet as it is used on modern networks? A. 802.5 B. 802.16 C. 802.3 D. 802.1
C. 802.3
Network
Packets & messages. IP addresses. Handles routing of data across network segments.
What is the following OSI Layer function? Physical Layer
Passes data on to media
Describe the following protocol. NetBIOS (Network Basic Input/Output System) TCP Port 139, UDP Port 137, 138
Provides network communication services for LANs that use NetBIOS
Which of the following is a distance-vector routing protocol with a maximum usable hop count of 15? a. BGP b. IS-IS c. RIP d. OSPF
RIP
Which of the following is a link-state routing protocol that uses a metric of hops? a. IS-IS b. OSPF c. EIGRP d. RIP
RIP
What is the following OSI Layer function? Presentation Layer
Reformats, encrypts/decodes, compresses/decompresses
Describe the following protocol. DNS (Domain Name System) TCP and UDP Port 53
Resolves domain names to corresponding IP addresses
What does the Internet layer do?
Responsible for logical addressing and routing
What does the Transport layer do?
Responsible for preparing data to be transported across the network
Describe the following protocol. HTTP (Hypertext Transfer Protocol) TCP Port 80
Retrieves content from a web server
Describe the following protocol. IMAP (Internet Message Access Protocol) TCP Port 143
Retrieves e-mail from an e-mail server
Describe the following protocol. POP3 (Post Office Protocol Version 3) TCP Port 110
Retrieves e-mail from an e-mail server
Describe the following protocol. IMAP4 (Internet Message Access Protocol Version 4) TCP Port 143
Retrieves e-mail from e-mail server
DHCP discover, DHCP offer, DHCP request, DHCPACK
What are the steps a DHCP client goes through when requesting an IP address? Make sure these are in correct order -
Poison reverse and split horizon
What are the two methods used to prevent loops in a distance vector routing protocol? Poison reverse and split horizon, Poison reverse and hop count, Slept horizon and hop count
Everything is on the same IP subnet
What is One downside to a virtual switch? Everything is on the same IP subnet, Not enough switch ports Too many collision domains Too many broadcast domains
a virtualized server running on one physical device that could be running any iOS
What is a virtual server? A physical server running any iOS, a virtualized server running on one physical device that could be running any iOS, A Microsoft server A Linux server
IEEE 802.3af
What is the IEEE standard for PoE? IEEE 802. ___ what?
185
What is the actual distance of 10base 2? 185 10 200 2
A router forwards traffic based on IP addresses and a switch directs traffic to the correct port
What is the difference between a router and a switch
ARP resolves the IP address of a host to its MAC address
What is the purpose of ARP? ARP resolves the IP address of a host to its MAC address, ARP resolves an IP addy to a Hostname, ARP locates the default gateway of the network, ARP resolves the MAC address to a NetBIOS name
It carries voice and data
What is the purpose of RTP in VoIP? It connects the VoIP phone to an analog phone, It works with a PBX, IT MANAGES THE DATA PLAN, IT CARRIES VOICE AND DATA
It sets up the VoIP phone calls,
What is the purpose of SIP in VoIP? It works with a PBX, It connects the VoIP phone to an analog phone, It sets up the VoIP phone calls, It carries voice and data
To convert natural language to the IP address
What is the purpose of a DNS server?
Providing an IP address for a fully qualified domain name
What is the purpose of a DNS server? Providing an IP address for a fully qualified domain name Routing packets to the Internet Blocking packets to the Internet Connecting devices at layer 2 of the OSI
Route packets to a different subnet
What is the purpose of a default gateway? Route packets to a different subnet, Route packets to the same subnet, black packets, forward frames
List the features of the following OSI Layer. Transport Layer
Windowing TCP/UDP Buffering
Your company has been assigned the 192.168.30.0/24 network for use at one of its sites. You need to use a subnet mask that will accommodate seven subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask should you use? a. /24 b. /26 c. /27 d. /28
/27
What is the prefix notation for a subnet mask of 255.255.255.240? a. /20 b. /24 c. /28 d. /29
/28
You have a subnet mask of 255.255.255.248. What is the prefix notation? a. /29 b. /28 c. /27 d. /26
/29
What is the administrative distance of a directly connected network? a. 0 b. 90 c. 110 d. 170
0
What is the network address and subnet mask of a default route? a. 255.255.255.255/32 b. 0.0.0.0/32 c. 255.255.255.255/0 d. 0.0.0.0/0
0.0.0.0/0
What is the binary version of the decimal number 49? a. 10110001 b. 00110001 c. 00110010 d. 00111010
00110001
What is the binary representation of the decimal number 117? a. 10110101 b. 01110101 c. 10110110 d. 01101001
01110101
How many bits per octet in an IPv4 address? a. 2 b. 4 c. 6 d. 8
8
Describe the following protocol. rsh (Remote Shell) TCP Port 514
Allows commands to be executed on a computer from a remote user
How many bits are used for an IPv6 address? a. 256 b. 128 c. 64 d. 32
128
What is the result of the binary conversion in the example shown here? 128 64 32 16 8 4 2 1 1 0 0 0 0 0 0 0 a. 128 b. 256 c. 32 d. 127
128
How many hosts can you have with a subnet of 192.168.1.0/28? a. 30 b. 14 c. 16 d. 6
14
What is the result of the binary conversion in the example shown here? 128 64 32 16 8 4 2 1 1 0 0 1 0 1 1 0 a. 105 b. 256 c. 128 d. 150
150
How many subnets do you get with a subnet of 192.168.1.0/28? a. 12 b. 13 c. 16 d. 20
16
What is the hop count that is used by RIP to indicate an unreachable metric? a. 16 b. 0 c. 15 d. 255
16
What is the network address for APIPA? a. 169.254.0.0/16 b. 172.16.0.0/16 c. 192.168.0.0/24 d. 10.0.0.0/8
169.254.0.0/16
A client with an IP address of 172.16.18.5/18 belongs to what network? a. 172.16.0.0/18 b. 172.16.64.0/18 c. 172.16.96.0/18 d. 172.16.128.0/18
172.16.0.0/18
The binary number 10110100 has what decimal equivalent? a. 114 b. 190 c. 172 d. 180
180
Which option is NOT a valid representation of the 2001:0000:35d0:0000:5600:abed:e930:0001 address? a. 2001:0000:35d0::5600:abed:e930:0001 b. 2001::35d0:0:56:abed:e930:0001 c. 2001:0:35d0:0:5600:abed:e930:1 d. 2001::35d0:0:5600:abed:e930:1
2001::35d0:0:56:abed:e930:0001
How can the following IPv6 address be condensed? 2009:0123:4040:0000:0000:000:000A:100B a. 2009::123:404:A:100B b. 2009::123:404:A:1B c. 2009:123:4040::A:100B d. 2009:0123:4040::0::000A:100B
2009:123:4040::A:100B
You have an IP address with a prefix notation of /27. What is the dotted-decimal form of the subnet mask? a. 255.255.255.0 b. 255.255.255.128 c. 255.255.255.192 d. 255.255.255.224
255.255.255.224
How many assignable IP addresses exist in the 172.16.1.10/27 network? a. 30 b. 32 c. 14 d. 64
30
How many bits are in an IPv4 address? a. 32 b. 64 c. 128 d. 256
32
How many octets are in an IPv4 address? a. 2 b. 4 c. 6 d. 8
4
WAN link
A ___ is The link that interconnects networks Media Server WAN link
True
A converged network is a network that has the capability of transferring multiple types of traffic such as voice data video, and can offer significant cost savings to organizations. True or false?
What metric is used by OSPF routing protocol? A. load B. cost C. hop count D. return on investment
B. cost
VLAN virtual local area network
A more Efficient design which involves the logical separation of a switch port into different broadcast domains is known as a Subnet, (VLAN) Virtual local area network, Collision domain, LAN
A converged network
A network that transports multiple types of traffic. Ex - voice, video, and data
Describe the following protocol. SNMP Trap (Simple Network Management Protocol Trap) TCP and UDP Port 162
A notification sent from an SNMP agent to an SNMP manager
True
A service-level agreement (SLA), which specifies performance metrics, (for example, available bandwidth and maximum delay) guaranteed for a certain percentage of time. True or false?
Client
A workstation, laptop, smart phone with wireless capabilities, or a variety of other in user terminal devices. Hub Client Server
Which of the following user authentication technologies uses digital certificates? A. PKI B. RAS C. MS-CHAP D. 802.1X
A. PKI
A common Layer 2 protocol used on dedicated leased lines is _____________? A. PPP B. CHAP C. TCP-IP D. IPSEC
A. PPP
What is the administrative distance of a directly connected network? A. 0 B. 90 C.110 D. 170
A. 0
The average geographic range for an 802.11a antenna is ____ meters. A. 20 meters B. 100 meters C. 330 meters D. 600 meters
A. 20 meters
What is the common TCP port used by HTTP? A. 80 B. 443 C. 123 D. 110
A. 80
Which of the following is an Exterior Gateway Protocol? A. BGP B. RIP C. OSPF D. EIGRP
A. BGP
Which of the following routing protocols is an EGP? A. BGP B. IS-IS C. RIP D. OSPF
A. BGP
Which of the following is a VPN protocol that lacks native security features? A. PPTP B. TLS C. SSL D. Clear Text Protocol
A. PPTP
Which of the following statements is true? (Choose two) A. Client/server networks can easily scale, which might require the purchase of additional client licenses. B. Client/server networks can cost more than peer-to-peer networks. For example, client/server networks might require the purchase of dedicated server hardware and a network OS with an appropriate number of licenses. C. Peer-to-peer networks can be very difficult to install. D. Peer-to-peer networks typically cost more than client/server networks because there is no requirement for dedicated server resources or advanced NOS software.
A. Client/server networks can easily scale, which might require the purchase of additional client licenses. B. Client/server networks can cost more than peer-to-peer networks. For example, client/server networks might require the purchase of dedicated server hardware and a network OS with an appropriate number of licenses.
A DHCP reservation involves the exchange of four messages between a DHCP client and a DHCP server. What is the first of these messages? A. DHCPDISCOVER B. DHCPACK C. DHCPREQUEST D. DHCPOFFER
A. DHCPDISCOVER
It is the job of the ____ to enable reliable transmission of data through the Physical layer at the sending end, and to check such reliability upon reception at the receiving end. A. Data Link B. Physical Layer C. Network Layer D. Transport Layer
A. Data Link
An FDDI network uses which type of topology? A. Dual ring B. Ring C. Star D. Bus
A. Dual ring
Which of the following protocols is used for transferring files with a remote host in a non-secure fashion? A. FTP B. SSH C. SFTP D. SCP
A. FTP
Which of the following security attacks leverages the PORT command? A. FTP bounce attack B. smurf attack C. DoS attack D. DDoS attack
A. FTP bounce attack
Which of the following topologies offers the highest level of redundancy? A. Full mesh B. Hub and spoke C. Bus D. Partial mesh
A. Full mesh
Which of the following protocols is used to retrieve email from an email server? A. IMAP4 B. NNTP C. SMTP D. MAILX
A. IMAP4
Which of the following is an advantage of fiber-optic cable? A. Immunity from electromagnetic interference B. prevent network problems C. use in dial-up analog modem D. protect networks from hackers
A. Immunity from electromagnetic interference
Which Data Link sublayer manages flow control? A. LLC B. MAC C. Management Layer D. Addressing Layer
A. LLC
Which of the following is a sublayer of the Data Link Layer of the OSI Model? A. LLC B. LEC C. ACK D. VPN layer
A. LLC
On which OSI layer is encryption performed? A. Layer 6 B. Layer 5 C. Layer 7 D. Layer 4
A. Layer 6
Identify two advantages of a hub and spoke WAN topology as compared to a full mesh WAN topology. A. Lower cost B. Optimal routes C. More scalable D. More redundancy
A. Lower cost C. More scalable
What is the name of the address that is used by a switch to identify specific devices? A. MAC B. IP C. LLC D. ARP
A. MAC
Which of the following is used by IEEE 802.11n to achieve high throughput through the use of multiple antennas for transmission and reception? A. MIMO B. DSSS C. FHSS D. LACP
A. MIMO
Which type of fiber optic connector contains two fiber strands in a single connector? A. MTRJ B. ST C. SC D. LC
A. MTRJ
Which of the following WAN technology types provides the FASTEST speeds? A. OC3 B. SDSL C. ADSL D. T3
A. OC3
Which of the following is a multicast routing protocol? A. PIM B. IGMP C. IS-IS D. OSPF
A. PIM
____ is the process of reconstructing segmented data. A. Reassembly B. Reengineering C. Resegmenting D. Realigning
A. Reassembly
What variation of network address translation allows you to statically configure the inside global address assigned to a specific device inside your network? A. SNAT B. DNAT C. PAT D. Both DNAT and PAT
A. SNAT
Identify the SNMP component that is a piece of software which runs on a managed device? A. SNMP trap B. SNMP agent C. MIB D. SNMP manager
A. SNMP trap
The ____ is where ongoing communications between a sender and a receiver, somewhat like a telephone conversation, are set up, maintained, and then terminated, or torn down, as needed. A. Session Layer B. Physical Layer C. Network Layer D. Presentation Layer
A. Session Layer
In the modern LAN, what type of device is typically used at the center of a star topology? A. Switch B. Hub C. Router D. Firewall
A. Switch
What device is a Layer 2 device that uses MAC address learning to intelligently forward traffic? A. Switch B. Hub C. Router D. WAN link
A. Switch
What device is know for a large number of interfaces and its ability to create separate collision domains for each end device? A. Switch B. Hub C. Router D. WAN link
A. Switch
Which of the following requires two types of authentication (but no more) from a user seeking admission to a network? A. TFA B. EAP C. SSO D. multifactor authentication
A. TFA
Which of the following transport layer protocols of the OSI reference model is a connection oriented protocol that provides reliable transport between two communicating hosts? A. Transmission Control Protocol (TCP) B. Transport Control Protocol (TCP) C. User Datagram Protocol (UDP) D. Internetwork Packet Exchange (IPX)
A. Transmission Control Protocol (TCP)
Which of the following is a common wireless security standard? A. WPA B. WAP C. WUP D. CHAP
A. WPA
Which of the following statements is true regarding VLANs? A. a VLAN is a single broadcast domain B. for traffic to pass between two VLANS, the traffic must be layer 7 traffic C. because of a switches MAC address table, traffic does not need to be routed in order to pass between two VLANs D. a VLAN is a single collision domain
A. a VLAN is a single broadcast domain
In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range. A. active B. passive C. fixed D. open
A. active
An archive ____ is a file attribute that can be checked or unchecked to indicate whether the file must be archived. A. bit B. byte C. flag D. field
A. bit
Which of the following are dynamic approaches to assigning routable IP addresses to a networked device? A. boot P B. APIPA C. zeroconf D. dynamic MAC
A. boot P
____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel. A. channel bonding B. channel aggregation C. packet bonding D. data bonding
A. channel bonding
On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time. A. collision domain B. domain network C. interference domain D. duplicate domain
A. collision domain
Random Early Detection (RED) is an example of which of the following QOS functions? A. congestion avoidance B. marking C. classification D. congestion management
A. congestion avoidance
Which of the following conditions would most likely result in corrupted data? A. exceeding the distance limitation of a cable B. a short in a cable C. an open in a cable D. a VLAN mismatch
A. exceeding the distance limitation of a cable
In wireless communication, to exchange information, two antennas must be tuned to the same ____. A. frequency B. variance C. attenuation D. port
A. frequency
You are troubleshooting an issue where a PC can reach some hosts on the Internet while several other hosts on the Internet are not reachable. From the PC you can Ping all devices on your local subnet. What is most likely causing the problem? A. incorrect or missing routes in a routers routing table B. incorrect DNS configuration on the PC C. duplicate IP addresses D. incorrect gateway configuration on the PC
A. incorrect or missing routes in a routers routing table
What name is given to a VLAN on an IEEE 802.1 Q trunk whose frames are not tagged? A. native VLAN B. default VLAN C. management VLAN D. VLAN
A. native VLAN
What type of network allows interconnected devices to share their resources with one another but would have issues regarding scalability? A. peer-to-peer B. client-server C. hub and spoke D. MPLS
A. peer-to-peer
In which OSI model layer do hubs operate? A. physical B. network C. data link D. physical data link
A. physical
Which of the following is a WLAN authentication method? A. pre-shared key B. RC 24 bit initialization vector C. Advanced Encryption Standard D. triple key ack
A. pre-shared key
Which of the following can often be categorized as an encryption device (in other words it is capable of participating in an encrypted session)? A. router B. smart-jack C. demarc D. repeater
A. router
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes. A. static B. dynamic C. best path D. link state
A. static
What is the name of the location within a building where network cables terminate? A. wiring closet B. access point C. multi-station access unit D. central office
A. wiring closet
Match the type of NAT on the left with the correct definition on the right. (A) NAT IP Address Definition (B) Inside local (C) Inside global (D) Outside local (1) Outside global A public IP address referencing an outside device (2) A public IP address referencing an inside device (3) A private IP address referencing an outside device (4) A private IP address referencing an inside device a. A1 B2 C3 D4 b. A4 B2 C3 D1 c. A3 B2 C4 D1 d. A2 B1 C4 D3
A4 B2 C3 D1
What protocol is used to request a MAC address that corresponds to a known IPv4 address on the local network? a. IGMP b. TTL c. ICMP d. ARP
ARP
What is the purpose of ARP? a. ARP resolves the MAC address to a NetBIOS name. b. ARP resolves an IP address to a hostname. c. ARP locates the default gateway of the network. d. ARP resolves the IP address of a Host to its MAC address.
ARP resolves the IP address of a Host to its MAC address.
Describe the following OSI layer. Network Layer
Addresses data messages, translates logical addresses into actual physical addresses, and routes data to addresses on the network
What routing protocol characteristic indicates the believability of the routing protocol (as opposed to other routing protocols)? a. Weight b. Metric c. Administrative distance d. SPF algorithm
Administrative distance
Hub
An older technology that interconnect network components such as clients and servers. It has a variable number of available Ports. Switch Hub Router
False
An omnidirectional antenna radiates power at relatively unequal power levels in all directions somewhat similar to the theoretical isotopic antenna. True or false?
Which of the following is an advantage of a peer-to-peer network, as compared with a client/server network? A. More scalable B. Less expensive C. Better performance D. Simplified administration
B. Less expensive
Which of the following are sublayers of the Data Link Layer of the OSI Model? A. PPP B. MAC C. LLC D. LAPD
B. MAC C. LLC
While an IPsec tunnel is being established, which type of session is initially formed to protect the exchange of parameters used to form the IPsec session? A. perfect forward secrecy (PFS) B. Internet security association and key management protocol C. Diffie-Helman D. Security Association
B. Internet security association and key management protocol
(True or False) The routes on R1 and R2 are directly connected routes.
Answer: TRUE Explanation: Because interfaces are physically attached to each network, they are directly connected.
What are the layers of the TCP/IP stack?
Application, transport, Internet, network interface
True
At the upper layer of the OSI MODEL, bits are grouped together into PDU's or data service units. True or false?
The IP address range of 172.16.0.0 - 172.31.255.255 is what address class? a. A b. B c. C d. D
B
An Ethernet workgroup switch resides at which layer of the OSI Model? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
B. Layer 2
How many WAN links are required to create a full mesh of connections between five remote sites? A. 5 B. 10 C. 15 D. 20
B. 10
What percentage of WLAN overlapping coverage should there be between cells to avoid dropping connections? A. 5-10% B. 10-15% C. 15-20% D. 20-25%
B. 10-15%
Which of the following allows the LONGEST distance using single-mode fiber? A. 10GBaseSR B. 10GBaseER C. 10GBaseSW D. 10GBaseLW
B. 10GBaseER
You are configuring a wireless LAN with 3 wireless access points having overlapping coverage areas. The wireless access points are using 2.4 GHz frequency band, and are located in the United States. What three non-overlapping channels in the 2.4 GHz band should you select? A. 128,64,32 B. 11,6,1 C. 1.2, 2.4, 4.8 D. 2.6,2.4,2.2
B. 11,6,1
What is the distance limitation of 10GBase-sw? A. 10 km B. 300 m C. 25 km D. 40 km
B. 300 m
What is the maximum range of the IEEE 802.11b wireless standard? A. 20m indoors / 100 m outdoors B. 32 m indoors / 140 m outdoors C. 35 m indoors / 120 m outdoors D. 70 m indoors / 150 m outdoors
B. 32 m indoors / 140 m outdoors
Direct sequence spread spectrum (DSSS) is a wireless transmission method? Which of the follow WLAN standards supports DSSS? A. 802.11a B. 802.11b C. 802.11n D. chip protocol
B. 802.11b
Which of the following approaches to wireless LAN security involves the use of an authentication server? A. pre-shared key B. 802.1x C. MAC address filtering D. disabling SSID broadcast
B. 802.1x
Which IEEE standard describes Ethernet? A. 802.1 B. 802.3 C. 802.5 D. 802.11
B. 802.3
What is the IEEE standard for link aggregation? A. 802.1Q B. 802.3ad C. 802.1d D. 802.3af
B. 802.3ad
What is the IEEE standard for the version of Power over Ethernet that offers a maximum of 15.4 watts of power to an attached device? A. 802.3at B. 802.3af C. 802.1d D. 802.1q
B. 802.3af
What is the administrative distance for an internal EIGRP route? A. 1 B. 90 C. 110 D. 170
B. 90
Match the Type of NAT on the left with the correct definition on the right? A Inside local 1 Public IP address referencing an outside device B Inside global 2 Public IP address referencing an inside device C Outside local 3 Private IP address referencing an outside device D Outside global 4 Private IP address referencing an inside device A. A1, B2, C3, D4 B. A4, B2, C3, D1 C. A3, B2, C4, D1 D. A2, B1, C4, D3
B. A4, B2, C3, D1
If an IP address range is 172.16.0.0 to 172.31.255.255 what is the address class? A. A B. B C. C D. D
B. B
Subnetting extends a classful subnet mask of an IP network to create additional subnets. However, what IP addressing approach removes bits from a classful subnet mask to summarize multiple classful networks? A. anycast B. CIDR C. EUI-64 D. APIPA
B. CIDR
What class of IP address is 172.0.0.2? A. Class A B. Class B C. loopcheck D. Class D
B. Class B
A toner probe is also known as what? A. TDR B. Fox and hound C. Tip and ring D. OTDR
B. Fox and hound
What WAN topology uses the formula n(n - 1)/2 to calculate the number of links required? A. Ring B. Full mesh C. Partial mesh D. Hub and spoke
B. Full mesh
What device operates at Layer 1 of the OSI model? A. Switch B. Hub C. Router D. WAN link
B. Hub
How does a switch prevent loops? A. IEEE 802.1Q B. IEEE 802.1D C. IEEE 802.11 D. IEEE 802.3
B. IEEE 802.1D
What is the name of the address that is used by a router to identify specific devices? A. MAC B. IP C. LLC D. ARP
B. IP
In the absence of STP what issues might result from a Layer 2 loop in a network? A. a router interface's MTU decrementing B. MAC address table corruption C. DHCP broadcasts D. packet fragmentation
B. MAC address table corruption
A dedicated network device that acts as an IDS sensor is called a _________ ? A. HIDS B. NIDS C. NIPS D. HIPS
B. NIDS
What protocol is used to synchronize a network device's clock with a time server? A. NNTP B. NTP C. RTSP D. LDAP
B. NTP
Which of the following is a link-state routing protocol that uses a metric of cost? A. IS-IS B. OSPF C. EIGRP D. RIP
B. OSPF
A network administrator can use which of the following to locate a break in a fiber optic cable? A. environmental monitor B. OTDR C. mulitmeter D. TDR
B. OTDR
Which layer of the OSI Model is concerned with how bits are represented on the medium? A. Presentation B. Physical C. Data Link D. Network
B. Physical
Which of the following remote access security technologies is a UDP based protocol used to communicate with a AAA server and does not encrypt an entire authentication packet, but only encrypts the password? A. Kerberos B. RADIUS C. TACACS+ D. CHAP
B. RADIUS
Which of the following standards specifies a type of coaxial cable commonly used by local cable companies to connect individual homes to the cable company's distribution network? A. RG 59 B. RG 6 C. MMF D. RG 58
B. RG 6
What topology was used in an early Lan technology that used the passing of a token to transmit? A. Star B. Ring C. Dual Ring D. Bus
B. Ring
Identify the SNMP component that is also known as an NMS? A. SNMP agent B. SNMP manager C. SNMP trap D. MIB
B. SNMP manager
A technician is troubleshooting a UTP cable that has been suspected of having problems due to EMI. Which of the following cables should the technician use without adding new equipment to the network? A. Singlemode fiber B. STP C. Plenum D. Multimode fiber
B. STP
Which of the following technologies is used by an application service provider to give subscribers access to application software? A. PaaS B. SaaS C. NaaS D. HaaS
B. SaaS
Which list of PDU names is in the correct OSI order starting with Layer 4? A. Bits, Packets, Datagrams, Frames B. Segments, Datagrams. Frames, Bits C. Datagrams, Frames, Bits, Segments D. Frames, Bits, Segments, Packets
B. Segments, Datagrams. Frames, Bits
Which of the following security attacks uses ICMP traffic, directed to a subnet, to flood target system with ping replies? A. DoS attack B. Smurf attack C. DDoS attack D. FTP bounce attack
B. Smurf attack
What is the most popular topology that is used on modern LANs? A. Bus B. Star C. Ring D. Partial mesh
B. Star
A network administrator can use which of the following to locate a break in copper cable? A. environmental monitor B. TDR C. multimeter D. volt meter
B. TDR
Which of the following VPN tunneling protocols can be used to provide security for HTTPS? A. CHAP B. TLS C. L2TP D. PPTP
B. TLS
Which type of protocol is useful when data must be transferred quickly? A. connection oriented B. connectionless C. TCP D. IP
B. connectionless
____ is more efficient than TCP for carrying messages that fit within one data packet. A. IP B. UDP C. ICMP D. IGMP
B. UDP
Which of the following approaches to wireless LAN security uses RC4 encryption algorithm? A. WPA2 B. WEP C. WPA D. WPA Enterprise
B. WEP
Which of the following is not a network category based on the geographic dispersion of network components? A. Local-area network B. World-area network C. Campus-area network D. Metropolitan-area network E. Personal-area network
B. World-area network
What is a DHCP reservation? A. a DHCP reservation is a temporary assignment of IP address information to a DHCP client B. a DHCP reservation is a static mapping of an IP address to a specific MAC address C. a DHCP reservation is a pool of IP addresses used by a DHCP server to assign IP addresses to DHCP clients D. a DHCP reservation is an IP address parameter that a DHCP server assigns a DHCP client
B. a DHCP reservation is a static mapping of an IP address to a specific MAC address
Which of the following is a way a route can be injected into a router's IP routing table? A. a route that is mirrored by a SAN B. a route that is dynamically learned C. a route that is interpolated from existing routes D. a route that is provided by the DNS routing service
B. a route that is dynamically learned
RSVP is _________ A. a protocol for recreating packets B. a way to reserve space on the server C. a hard QoS makes strict bandwidth reservations D. easily scalable for system changes
B. a way to reserve space on the server
Which of the following statements are true of an Ethernet hub? A. all connections need to be full-duplex B. all connections need to be half-duplex C. Appletalk needs to run on all attached devices D. attached devices do not need to run CSMA/CD
B. all connections need to be half-duplex
What is the purpose of the trunk in the diagram? A. limiting collision domains B. allowing VLAN traffic C. allowing subnet traffic D. forwarding packets
B. allowing VLAN traffic
RADIUS and TACACS belong to a category of protocols known as AAA (____). A. access, authorization, and accounting B. authentication, authorization, and accounting C. authentication, authorization, and authority D. authentication, authorization, and access
B. authentication, authorization, and accounting
Which of the following reflects the media type, bandwidth capacity, and distance limitation combination of 10base2 Ethernet? A. Cat 5 UTP / 100 Mbps / 100 m B. coax / 10 Mbps / 185 m C. coax / 10 Mbps / 500 m D. Cat 3 UTP / 10 Mbps / 100 m
B. coax / 10 Mbps / 185 m
A ____ occurs when two transmissions interfere with each other. A. jam B. collision C. carrier sense D. multiple access
B. collision
Physical layer
Binary or bits represent data. Concerned with physical and electrical network issues.
Which data flow is NOT supported by IPv6? a. Broadcast b. Anycast c. Unicast d. Multicast
Broadcast
Which of the following is a type of coaxial cable? A. 10 base T B. 100 base FX C. 10 base 5 D. 1000 base FX
C. 10 base 5
What is the maximum range of the IEEE 802.11a wireless standard? A. 20m indoors / 100 m outdoors B. 32 m indoors / 140 m outdoors C. 35 m indoors / 120 m outdoors D. 70 m indoors / 150 m outdoors
C. 35 m indoors / 120 m outdoors
The data rate for T3 link is ______? A. 45.736 Mbps, 51.84 Mbps B. 44.736 Mbps, 52.84 Mbps C. 44.736 Mbps D. 40 Mbps, 50 Mbps
C. 44.736 Mbps
What is the common TCP port used by HTTPS? A. 80 B. 110 C. 443 D. 128
C. 443
The IEEE 802.11a wireless standard has which of the following frequency band / maximum bandwidth parameters? A. 5 GHz / 11 Mbps B. 2.4 GHz / 11 Mbps C. 5 GHz / 54 Mbps D. 2.4 GHz / 54 Mbps
C. 5 GHz / 54 Mbps
What is a native VLAN? A. A native VLAN is the VLAN used to identify the virtual port created by an EtherChannel B. A native VLAN is an out of band management VLAN C. A native VLAN is the VLAN on an IEEE 802.1Q trunk that does not have any tag bytes added D. A native VLAN is the VLAN on an IEEE802.1Q trunk that has tag bytes added to each frame
C. A native VLAN is the VLAN on an IEEE 802.1Q trunk that does not have any tag bytes added
Match the link speeds on the left with the correct STP port cost on the right Link Speed STP Port Cost A 10 Mbps Ethernet 1 2 B 100 Mbps Fast Ethernet 2 19 C 1 Gbps Gigabit Ethernet 3 100 D 10 Gbps Ten Gig Ethernet 4 4 A. A1, B2, C3, D4 B. A2, B3, C4, D1 C. A3, B2, C4, D1 D. A3, B4, C1, D2
C. A3, B2, C4, D1
Which type of transmission synchronization technique uses start and stop bits at the beginning and end of a data frame? A. Synchronous B. Isochronous C. Asynchronous D. Biochronous
C. Asyncronous
The term packet is used fairly generically to refer to protocol data unit. There are PDU equivalent names in the different OSI layers. What is the name of the unit in the physical layer of the OSI reference model? A. Segment B. Frames C. Bits D. Packet
C. Bits
Which of the following is an open standard variant of HSRP? A. LFI B. DSCP C. CARP D. cRTP
C. CARP
What media type is 1000 Base - T A. Cat 3 B. Cat 5 C. Cat 5e D. 10 base 2
C. Cat 5e
Which device makes traffic forwarding decisions based on MAC addresses? A. Hub B. Router C. Switch D. Multiplexer
C. Switch
A firewall might use what configuration option to prevent users on the Internet from initiating sessions with devices inside a corporate network, while still allowing users on the Internet to initiate sessions with publically available corporate servers? A. packet filtering B. NAT C. DMZ D. stateful inspection
C. DMZ
While an IPsec tunnel is being established which of the following securely establishes a shared secret key over the unsecured medium? A. Internet security association and key management protocol B. perfect forward secrecy C. Diffie-Helman D. security association
C. Diffie-Helman
Which of the following is a layer 3 redundancy mechanism? A. LFI B. Address routing protocol (ARP) C. HSRP D. DSCP
C. HSRP
Which list of protocols and standards is in the correct OSI order starting with the highest layer? A. DHCP, SSL, ICMP, UDP B. DNS, PPTP, ARP, 802.11 C. HTTP, SSL, CSMA/CD, 802.3 D. SNMP, TLS, L2TP, ARP
C. HTTP, SSL, CSMA/CD, 802.3
What Layer 4 protocol is used by the ping command? A. IGMP B. UTP C. ICMP D. RTP
C. ICMP
Which of the following best defines and IDS sensor? A. IDS sensor secures communication between two sites over an untrusted network B. IDS sensor defines a set of rules dictating which types of traffic are permitted or denied as that traffic enters or exits a firewall interface C. IDS sensor receives a copy of traffic being analyzed, can recognize the signature of well-known attack, and respond appropriately D. IDS sensor sits in-line with traffic being analyzed, can recognize the signature of a well-known attack, and respond appropriately
C. IDS sensor receives a copy of traffic being analyzed, can recognize the signature of well-known attack, and respond appropriately
Internet Protocol resides at what layer of the OSI Model? (all that apply) A. Layer 4 B. Transport C. Layer 3 D Network
C. Layer 3 D Network
You are designing a network and need to interconnect two Ethernet switches. Cost is the primary design consideration? The link speed you need is 10 Gbps and the switches are separated by a distance of 70 m. You decide to use 10GBASE-SR. What media type should you select? A. Cat 5 UTP B. SMF C. MMF D. Cat 6 UTP
C. MMF
What layer of the OSI model is concerned with logical addressing? A. Transport B. Data Link C. Network D. Layer 2
C. Network
Which of the following layers of the OSI reference model is primarily concerned with fowarding data based on logical addresses? A. Physical layer B. Data link layer C. Network layer D. Presentation layer
C. Network layer
A network formed by interconnecting a PC to a digital camera via a USB cable is considered what type of network? A. WAN B. CAN C. PAN D. MAN
C. PAN
Which PPP authentication method provides one-way authentication and sends credentials in clear trust? A. WEP B. MS-CHAP C. PAP D. CHAP
C. PAP
What topology aims to balance redundancy with easier management and cost effectiveness? A. Ring B. Full mesh C. Partial mesh D. Dual ring
C. Partial mesh
Which type of network is based on network clients sharing resources with one another? A. Client/server B. Client-peer C. Peer-to-peer D. Peer-to-server
C. Peer-to-peer
Which of the following protocols is used for transferring files with a remote host in a non-secure fashion and without requiring credentials? A. SFTP B. SSH C. TFTP D. SCP
C. TFTP
Which of the following protocols is used for transferring files with a remote host in a non-secure fashion and without requiring user credentials? A. SFTP B. SSH C. TFTP D. SCP
C. TFTP
What Ethernet switch feature allows a PC running packet capture software and connected to one switch port to receive a copy of traffic seen on another switch port? A. STP B. IEEE 802.1X C. port mirroring D. EtherChannel
C. port mirroring
What is the purpose of a default gateway? A. block packets B. forward packets C. route packets to a remote subnet or to the Internet D. route packets to the same subnet
C. route packets to a remote subnet or to the Internet
Which of the following tools best helps you determine which wires on a punch down block connect to a specific users office? A. loop back plug B. punch down tool C. toner probe D. protocol analyzer
C. toner probe
Which of the following remote access technologies is a protocol that allows a user to view and control the desktop of a remote computer? A. PPP B. RAS C. RDP D. ICA
C. RDP
Identify the congestion avoidance mechanism from the following list of QOS tools. A. LLQ B. RSVP C. RED D. cRTP
C. RED
What device is a Layer 3 device that is used to make forwarding decisions based on a Layer 3 address? A. Switch B. Hub C. Router D. WAN link
C. Router
____ are distinct networks of storage devices that communicate directly with each other and with other networks. A. NAS B. RAID C. SANs D. Optical media
C. SANs
Which of the following media types supports the longest transmission distance? A. Cat 6 UTP B. MMF C. SMF D. Cat 5 UTP
C. SMF
Which options are a benefit of implementing a client/server arrangement over a peer to peer arrangment? A. Easy installation B. Cheaper C. Simplified administration D. Easy scalability
C. Simplified administration D. Easy scalability
Which of the following LAN topologies requires the most cabling? A. Bus B. Ring C. Star D. WLAN
C. Star
Which of the following physical LAN topologies requires the most cabling? A. Bus B. Ring C. Star D. WLAN
C. Star
Which of the following is a connectionless transport layer protocol? A. IP B. TCP C. UDP D. H.323
C. UDP
Why might a network using DHCP for IP address assignment need a DHCP relay agent? A. the DHCP server is not configured to assign a default gateway to DHCP clients B. you are load balancing between two DHCP servers C. a router resides between a DHCP client and a DHCP server D. you have configured a static reservation
C. a router resides between a DHCP client and a DHCP server
What is the purpose of introducing NAT in a network design? A. block hackers on the internet B. route packets to the internet C. allows private IP address (RFC 1918) to be translated into Internet routable IP addresses (public IP addresses) D. translate public addresses to private addresses
C. allows private IP address (RFC 1918) to be translated into Internet routable IP addresses (public IP addresses)
Which OSI model layer initiates the flow of information? A. MAC Layer B. LLC C. application D. Layer 5
C. application
Which list of the TCP/IP stack is in the correct OSI order starting with Layer 4? A. application, internet, transport, network interface B. internet, application, transport, network interface C. application, transport, internet, network interface D. internet, transport, application, network interface
C. application, transport, internet, network interface
There are four states that a port goes through when transitioning to the forwarding state. What is the correct order? A. blocking, learning, listening, forwarding B. learning, listening, blocking, forwarding C. blocking, listening, learning, forwarding D. listening, blocking, learning, forwarding
C. blocking, listening, learning, forwarding
Which of the following reflect the media type, bandwidth capacity, and distance limitation combination of 10Base5 Ethernet? A. Cat 3 UTP/10 Mbps/100 m B. coax/10 Mbps/185 m C. coax/10 Mbps/ 500 m D. Cat 5 UTP / 100 Mbps /100 m
C. coax/10 Mbps/ 500 m
Which of the following is the point in a telephone network where the maintenance responsibility passes from a telephony company to a subscriber? A. NT1 B. tip and ring C. demarc D. smart jack
C. demarc
In ____, a wireless signal splits into secondary waves when it encounters an obstruction. A. reflection B. scattering C. diffraction D. bounceback
C. diffraction
____ is an 802.11n network feature allowing the combination of multiple frames into one larger frame. A. channel bonding B. channel aggregation C. frame aggregation D. frame bonding
C. frame aggregation
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks. A. routers B. switches C. gateways D. broadcast domains
C. gateways
Which of the following is a common OSI Layer 3 troubleshooting issue? A. looping data between MAC addresses B. distance limitations exceeded C. incorrect subnet mask D. crosstalk
C. incorrect subnet mask
An Ethernet switch resides at which layer of the OSI model? A. layer 1 B. layer 4 C. layer 2 D. layer 3
C. layer 2
The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____. A. demarcation point B. NIU (Network Interface Unit) C. local loop D. central office
C. local loop
Identify the quality of service function that alters bits in a frame, cell, or packet? A. congestion avoidance B. classification C. marking D. congestion management
C. marking
What type of antenna radiates power at relatively equal power levels in all directions? A. Yagi antenna B. unidirectional antenna C. omnidirectional antenna D. sector antenna
C. omnidirectional antenna
Identify the QOS mechanism that can set bandwidth limit on traffic and drop packets attempting to exceed that bandwidth limit? A. Link fragmentation and interleaving B. cRTP C. policing D. traffic shaping
C. policing
32
How many bits are in an IPv4 address? 256, 128, 32, 64
A more efficient design which involves the logical separation of switch ports into different broadcast domains is known as __________ A. subnet B. collision domain C. virtual local area network D. LAN
C. virtual local area network
What virtual network device allows Microsoft Active Directory (AD) services, Unix based web services and DNS services to be co-resident on the same network device? A. SOHO server B. virtual switch C. virtual server D. Storage Area Network
C. virtual server
What is the class of IP address 10.1.2.3/24? a. Class A b. Class B c. Class C d. Class D
Class A
Describe the following TCP utility. mtr
Combines the functionality of ping and traceroute
Describe the following protocol. RTSP (Real Time Streaming Protocol) TCP and UDP Port 554
Communicates with a media server and controls the playback of the servers media files
If multiple wireless access points exist in a wireless LAN, what percentage of coverage overlap should the access points have? A. 20-30% B. approximately 50% C. 0 percent D. 10-15%
D. 10-15%
What is the distance limitation of 10GBASE-LW? A. 40 km B. 328ft C. 25km D. 10km
D. 10km
What is the maximum recommended one-way delay for voice traffic? A. 25ms B. 75ms C. 125ms D. 150ms
D. 150ms
What is the bandwidth of a E1 circuit? A. 1000 mbps B. 1.54 mbps C. 2.4 mbps D. 2.048 mbps
D. 2.048 mbps
The IEEE 802.11n wireless standard has which of the following frequency band / maximum bandwidth parameters? A. 2.4 GHz / 54 Mbps B. 2.4 GHz / 11 Mbps C. 5 GHz / 54 Mbps D. 2.4 GHz or 5 GHz / > 300 Mbps
D. 2.4 GHz or 5 GHz / > 300 Mbps
What is the common TCP port used by SMTP? A. 21 B. 22 C. 23 D. 25
D. 25
Which IEEE standard describes specifications for wireless transmissions? A. 802.1 B. 802.3 C. 802.5 D. 802.11
D. 802.11
Which of the following remote access security technologies a is a client server authentication protocol and uses a the concept of a trusted third party that hands out tickets that are used instead of user name and password? A. CHAP B. RADIUS C. TACACS+ D. Kerberos
D. Kerberos
8
How many bits per octet in an IPv4 address? 6, 2, 8, 4
What is the purpose of ARP? A. ARP resolves the MAC address to a NetBios name B. ARP resolves an IP address to a Hostname C. ARP locates the default gateway of the network D. ARP resolves the IP address of a Host to its MAC address
D. ARP resolves the IP address of a Host to its MAC address
Which of the following is NOT an example of wireless media? A. cellular phone B. wimax C. HSPA+ D. DSL
D. DSL
A router has learned a network via three different routing protocols: OSPF, EIGRP, and RIP. Which route will the router believe and place into the router's IP routing table? A. a route entry from each routing protocol will be injected into the router's IP routing table, and the router will load-balance across the three routes B. RIP C. OSPF D. EIGRP
D. EIGRP
What kind of network is used by many cable companies to service their cable modems, and contains both fiber-optic and coaxial cabling? A. head-end B. DOCSIS C. composite D. HFC
D. HFC
What WAN topology enables you to minimize WAN expenses by not directly connecting any two remote locations? A. Ring B. Full mesh C. Partial mesh D. Hub and spoke
D. Hub and spoke
What topology features a central location that connects to each remote connection but does not feature connections between those remote locations directly? A. Ring B. Full mesh C. Dual ring D. Hub and spoke
D. Hub and spoke
Which statement accurately describes the OSI model? A. It describes how software programs interact with humans. B. It prescribes the type of hardware or software that should support each layer. C. It describes how software programs interact with other software programs. D. It describes a theoretical representation of what happens between two nodes communicating on a network.
D. It describes a theoretical representation of what happens between two nodes communicating on a network.
Which of the following is a primary benefit of a proxy server, assuming the proxy server is only performing proxy services? A. It reduces bandwidth demand on an IP WAN B. It allows a server farm to scale C. It allows traffic to travel securely over an untrusted network such as the Internet D. It hides inside addresses from the public internet
D. It hides inside addresses from the public internet
Which of the following approaches to wire LAN security restricts access to a WLAN based on a computer's wireless interface card? A. disabling SSID broadcast B. TCP filtering C. pre-shared key D. MAC address filtering
D. MAC address filtering
A company has various locations in a city interconnected using Metro Ethernet connections. This is an example of what type of network? A. WAN B. CAN C. PAN D. MAN
D. MAN
Which of the following DNS record types is used for an email server? A. mail.txt B. cname C. PTR D. MX
D. MX
A bluetooth connection between a mobile phone and a headset is an example of what type of network category? A. CAN B. LAN C. MAN D. PAN
D. PAN
In which OSI model layer(s) do NICs operate? A. Physical B. Network and Physical C. Data Link D. Physical and Data Link
D. Physical and Data Link
The IEEE standard 802.3af states the specifications for which of the following? A. Quality of Service B. VLANs C. Routing tables D. Power over Ethernet
D. Power over Ethernet
The ____ manages the way data is presented to the network (on its way down the protocol stack), and to a specific machine/application combination (on its way up the protocol stack). A. Session Layer B. Physical Layer C. Network Layer D. Presentation Layer
D. Presentation Layer
What is the measure of a wireless signals strength? A. AP B. RFI C. latency D. RSSI
D. RSSI
Which of the following is a voice over IP signaling protocol used to setup, maintain, and tear down VOIP calls? A. SNMP B. RTP C. IGMP D. SIP
D. SIP
Which of the following is not a characteristic of the Media Access Control sublayer of the data link layer of the OSI reference layered model? A. The MAC sublayer uses a physical address called a MAC address, which is a 48-bit address assigned to a device network interface card. B. Layer 2 devices view a network as a logical topology. C. Method of transmitting on the media. D. The use of flow control on a network to prevent a receiver from being overwhelmed.
D. The use of flow control on a network to prevent a receiver from being overwhelmed.
Which of the following network appliances performs the most processor intensive tasks? A. load balancer B. content filter C. proxy server D. VPN concentrator
D. VPN concentrator
Which Ethernet switch feature allows you to create a VLAN on one switch and have that VLAN be automatically created on other switches? A. v-mirroring B. port mirroring C. POE D. VTP
D. VTP
4
How many bytes in an IEEE 802.1Q VLAN tag? 2 4 8 6
If a packet cannot be forwarded by a router due to the packets size exceeding the interface's maximum transmission unit, the router attempts to fragment the packet, unless the packet's header has the don't fragment bit set. If the DF bit is set, the router usually drops the packet and sends an ICMP message back to the sender, to let the sender know that the packet was dropped. If a router does not send such a notification, what is the router called? A. next-hop router B. next adjacent router C. area border router D. black hole router
D. black hole router
Which of the following attacks occurs when an attacker exploits a known vulnerability in an application that allow that application to write to an area of memory? A. packet sniffing attack B. man-in-the-middle attack C. spoofing D. buffer overflow attack
D. buffer overflow attack
Which of the following pieces of equipment can be used to determine the supported frequency range of a cable? A. crimper B. butt set C. cable tester D. cable certifier
D. cable certifier
Which of the following is most likely to cause EMI? A. the MDIX feature B. an open in a cable C. a short in cable D. cable placement
D. cable placement
What is the root domain in the FQDN, http://test.pearsoncertification.com? A. test B. http C. pearsoncertification D. com
D. com
____ management refers to the detection and signaling of device, link, or component faults. A. performance B. fault C. network D. configuration
D. configuration
A router primarily makes its forwarding decisions based on what address? A. destination MAC address B. source IP address C. source MAC D. destination IP address
D. destination IP address
Which of the following commands is primarily used to resolve FQDN to an IP address and lacks an interactivity mode? A. man B. nslookup C. ifconfig D. dig
D. dig
Which list of OSI model functions is in the correct OSI order starting with the highest layer? A. tearing down a session, physical addressing, switching, synchronizing bits B. service advertisement, route discovery, buffering, switching C. application services, synchronizing transmissions, windowing, switching D. encryption, setting up a session, buffering, logical addressing
D. encryption, setting up a session, buffering, logical addressing
Which of the following is a telephony solution that is typically based on a traditional privately owned telephone system? A. PBX-VPN call mux B. VOIP C. IP telephony D. hosted PBX
D. hosted PBX
When following a structured troubleshooting methodology, what should you do if you test a hypothesis, and the hypothesis is determined to be invalid? A. redefine the problem B. create an action plan that does not involve the failed hypothesis C. notify management and escalate the problem D. hypothesize another probable cause of the issue
D. hypothesize another probable cause of the issue
A building might have multiple patch panels. These common locations where cables from nearby office home back to, are often called what? A. central offices B. multi-station access units C. access points D. intermediate distribution frames
D. intermediate distribution frames
In which OSI model layer does IP operate? A. layer 6 B. layer 5 C. layer 4 D. layer 3
D. layer 3
____ is an automatic distribution of traffic over multiple links or processors to optimize response. A. redundancy B. failover C. RAID D. load balancing
D. load balancing
Combining the various sources of outgoing data into a single output data stream is called ____. A. segmentation B. Reassembly C. Resegmenting D. multiplexing
D. multiplexing
An Extended Service Set __________ A. is used in SOHO Applications B. provides protection from electromagnetic interference C. operates in ad-hoc fashion D. must be configured to prevent overlapping channels
D. must be configured to prevent overlapping channels
Which of the following commands is primarily used to resolve a FQDN to an IP address and can operate in an interactive mode? A. man B. dig C. ifconfig D. nslookup
D. nslookup
Which of the following are characteristics of RADIUS? A. TCP based B. encrypts both request and the ack C. encrypts an entire authentication packet D. only encrypts the password in an authentication packet
D. only encrypts the password in an authentication packet
Which is NOT a primary feature offered by Link Control Protocol? A. looped link detection B. error detection C. authentication D. packet detection
D. packet detection
The ____ is a fixed number associated with a device's NIC. A. LLC address B. framer address C. logical address D. physical address
D. physical address
Which of the following IDS detection methods needs a very specific declaration of a security policy? A. statistical anomaly detection B. signature based detection C. non-statistical anomaly detection D. policy based detection
D. policy based detection
Which OSI model layer manages data encryption? A. physical B. session C. application D. presentation
D. presentation
In a ____ cable, the usual wire positions are exactly reversed in one of the two RJ-45 terminations. A. crossover B. cross-through C. straight-through D. rollover
D. rollover
The process of determining the best path from Point A on one network to Point B on another is known as ____. A. mapping B. enhancing C. reconfiguring D. routing
D. routing
Which of the following MS Windows log files would report failed login attempts? A. system B. application C. syslog D. security
D. security
MPLS inserts a 32 bit header between Layer 2 and Layer 3 headers. Because this header is _________ between the Layer 2 and Layer 3 headers, it is sometimes referred to as a _________ header A. inserted, insert B. added, addon C. inserted, proxy D. shimmed, shim
D. shimmed, shim
You have an Ethernet switch with port 1 assigned to VLAN A and port 2 assigned to VLAN B. How can traffic from a device connected to port 1 be forwarded to port 2? A. an etherchannel must be configured which creates a logical path B. since both ports share the same Ethernet switch backplane, they can communicate with one another without any further configuration C. spanning tree protocol should be configured D. traffic must be routed to flow between VLANS
D. traffic must be routed to flow between VLANS
____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment. A. traffic monitoring B. traffic routing C. traffic polling D. traffic shaping
D. traffic shaping
Which IP addresses assignment method leads to less administrative efforts for Information Technology professionals? a. Statically b. Manually c. BOOTP d. DHCP
DHCP
What NAT variation automatically assigns an inside global address from a pool of available addresses? a. SNAT b. DNAT c. PAT d. GNAT
DNAT
Presentation
Data formatting & encryption. ASCII, JPG, PNG, etc. convert data in the way we are able to see it (abc's).
Which mode of PIM uses a source distribution tree? a. Sparse mode b. Dense mode c. Broadcast mode d. Source mode
Dense mode
If a PC on an Ethernet network attempts to communicate with a host on a different subnet, what destination IP address and destination MAC address will be placed in the packet/frame header sent by the PC? a. Dest. IP: IP address of default gateway. Dest. MAC: MAC address of default gateway. b. Dest. IP: IP address of remote host. Dest. MAC: MAC address of default gateway. c. Dest. IP: IP address of remote host. Dest. MAC: MAC address of remote host. d. Dest. IP: IP address of remote host. Dest. MAC: MAC address of local PC.
Dest. IP: IP address of remote host. Dest. MAC: MAC address of default gateway.
Describe the following OSI layer. Transport Layer
Divides long communications into smalled data packages, handles error recognition and correction, and acknowledges the correct receipt of data.
What symbol can be used to represent a group of consecutive 0s in an IPv6 address? a. Semicolon b. Double semicolon c. Double colon d. Period
Double colon
Describe the following protocol. DHCP (Dynamic Host Configuration Protocol) UDP Port 67, 68
Dynamically assigns IP address information to a network device
List the features of the following OSI Layer. Presentation Layer
Encryption Data formatting
What is the following OSI Layer function? Data Link Layer
Error correction
Session
Establishes a session between devices on the network. A phone call or sending something to the printer.
Describe the following OSI layer. Session Layer
Establishes and controls data communication between applications operating on two computers
What format can be used to represent the low order 64 bits of an IPv6 address by reformatting a devices MAC address? a. EUI-48 b. IEEE 802.3ar c. IEEE 802.3ab d. EUI-64
Extended Unique Identifier (EUI-64)
Describe the following protocol. H.323 TCP Port 1720
H.323 is a signaling protocol used to provide multimedia communications over a network
What ports are associated with the following? Http, SMTP simple mail transfer protocol, DNS, telnet, SSH, FTP.
HTTP is 80. FTP is 20 and 21. SSH (secure shell) is 22. Telnet is 23. SMTP is 25. DNS is 53.
Application
HTTP, FTP, SMTP. Serves as a window for the users
Power over Ethernet uses an Ethernet switch to provide power to a device. It is used because of its scalability and flexibility; devices can be installed where they are most needed
How does POE work and why do we use it
10 mbps
How fast is standard Ethernet? 1 gbps, 10 gbps, 10mbps, 100 mbps
4
How many octets are in an IPv4 address? 6 2 8 4
What multicast protocol is used between clients and routers to let routers know which of their interfaces are connected to a multicast receiver? a. IGMP b. PIM-DM c. PIM-SM d. SPT switchover
IGMP
Mirroring
In order to have active monitoring and see all traffic on the network, which of the following needs to be configured? Root bridge STP mirroring Listening
What NAT IP address is a public IP address that maps to an inside device? a. Inside local b. Inside global c. Outside local d. Outside global
Inside local
Switch
It Interconnects network components, and it has a variety of port Destinies. It does not simply take traffic in on one port and blast that traffic out on all other ports, rather, it learns which devices reside off of which ports. Router Switch Hub
Which message type was added with IGMP Version 2? a. Join b. Prune c. Combine d. Leave
Leave
List the features of the following OSI Layer. Network Layer
Logical addressing Switching Route discovery and selection Connection services Bandwidth usage Multiplexing Strategy
What is the following OSI Layer function? Session Layer
Makes connection at both ends
Which of the following layers of the OSI reference model are primarily concerned with forwarding data based on logical addresses?
Network layer
Describe the following protocol. LDAP (Lightweight Directory Access Protocol) TCP Port 389
Provides directory services to network clients
At the moment, PC1 cannot reach the Internet. You add a static default route to R1 that sends all traffic to an unknown destination out S1/1. Can a user on PC1 access the Internet? a. Yes, PC1 has Internet access. b. No, packets will not make it past R1. c. No, packets can make it to the Internet, but they will never make it back to PC1. d. No, packets will stop at R2.
No, packets can make it to the Internet, but they will never make it back to PC1.
For static NAT to work, how many inside global addresses are needed for inside local addresses? a. One inside global addresses for unlimited inside local addresses b. Two inside global addresses for every inside local address c. Ten inside global addresses for unlimited inside local addresses d. One inside global address for every inside local address
One inside global address for every inside local address
R1 is using both NAT and PAT. What is the purpose of the port numbers in the translation table? a. Basic NAT uses the port numbers to track separate communication flows. b. PAT uses the port numbers to track separate communication flows. c. The port numbers are not used. d. PAT only uses the destination port to track separate communication flows.
PAT uses the port numbers to track separate communication flows.
Which of the following is a multicast routing protocol? a. PIM b. IGMP c. IS-IS d. OSPF
PIM
What is the difference between a logical and physical topology?
Physical is wiring, how it is physically connected to one another. Logical is how data gets around the network
Please do not throw sausage pizza away & some people fear birthdays
Physical, data link, network,transport, session presentation, application. Segments, packets, frames and bits.
John is interested in changing the form of text for ASCII to extended binary code decimal interchange code. His manager requested that all sensitive and confidential info on the sever should be protected by applying the appropriate ENCRYPTION. what OSI model layer is responsible for a data format such as encryption?
Presentation layer
Subnetting
Protected segments of a network used for specific purposes.
Describe the following protocol. SFTP (Secure File Transfer Protocol) TCP Port 22
Provides FTP file transfer service over a SSH connection
Describe the following protocol. SCP (Secure Copy) TCP Port 22
Provides a secure file transfer service over a SSH connection and offers a files original date and time information, which is not available with FTP
What does the Application layer do?
Provides access to network resources
Both PC1 and Server 1 have a default gateway. What is the purpose of a default gateway? a. Block packets b. Forward frames c. Route packets to a different subnet d. Route packets to the same subnet
Route packets to a different subnet
Which feature was added with IGMPv3 that allowed a client to specify the joining of a group and a specific source server? a. SSM b. SRM c. SME d. SMJ
SSM
What are sections A and B of the IP address? a. Section A are used bits, and Section B are unused bits. b. Section A is the network portion, and Section B is the host portion. c. Section A equals 8 bits, and Section B equals 0 bits. d. Section A equals 255, and Section B are all 0s.
Section A is the network portion, and Section B is the host portion.
Describe the following protocol. SSH (Secure Shell) TCP Port 22
Securely connect to a remote host (Typically via a terminal emulator)
Transport
Segments. Transport protocols, TCP. Buffering. Ensures that messages are delivered error free and received in sequence.
List the features of the following OSI Layer. Application Layer
Service advertisement Application Services
Which mode of PIM uses a rendezvous point (RP)? a. Broadcast mode b. Dense mode c. Sparse mode d. Source mode
Sparse mode
Which of the following are distance-vector routing protocol features that can prevent routing loops? (Choose two.) a. Reverse path forwarding (RPF) check b. Split horizon c. Poison reverse d. Rendezvous point
Split horizon AND Poison reverse
What are the two methods used to prevent loops in a distance vector routing protocol? a. Split horizon and hold-down timer b. Split horizon and poison reverse c. Poison reverse and hop count d. Split horizon and hop count
Split horizon and poison reverse
Describe the following protocol. NNTP (Network News Transport Protocol) TCP Port 119
Supports the posting and reading of articles on Usenet news servers
Describe the following protocol. SNTP (Simple Network Time Protocol) UDP Port 123
Supports time synchronization among network devices, similar to Network Time Protocol, although SNTP uses a less complex algorith in its calculation and is slighty less accurate than NTP
List the features of the following OSI Layer. Physical Layer
Synchronizing bits How bits are represented on the medium Wiring standards for connectors and jacks Physical topology Bandwidth usage Multiplexing strategy
List the features of the following OSI Layer. Data Link Layer
Synchronizing transmissions Physical addressing Logical topology Method of transmitting on the media Connection services
Which of the following transport layer protocols of the OSI model is a connection oriented protocol that provides reliable transport to two communicating hosts
TCP (transport control protocol)
What is the following OSI Layer function? Application Layer
Talks to application software
List the features of the following OSI Layer. Session Layer
Tearing down a session Setting up a session Maintaining a session
A trunk
This allows traffic for multiple VLANs to travel over a single connection
Name a few protocols that correspond to the following TCP/IP architecture. Application layer
The Application layer provides access to network resources. It defines the rules, commands, and procedures that client software uses to talk to a service running on a server. It makes use of the following protocols: HTTP FTP Telnet SMTP POP3 IMAP4
Name a few protocols that correspond to the following TCP/IP architecture. Internet layer
The Internet layer is responsible for logical addressing and routing. It makes use of the following protocols: RIP OSPF IGMP ICMP
Name a few protocols that correspond to the following TCP/IP architecture. Network Access layer
The Network Access layer consists of the network card driver and the circuitry on the network card itself. It makes use of only the following protocol: ARP
Name a few protocols that correspond to the following TCP/IP architecture. Transport layer
The Transport layer is responsible for preparing data to be transported across the network. This layer breaks large messages into smaller packets of information and tracks whether they arrived at their destination. It makes use of the following protocols: TCP UDP
Media
This device can be copper or fiber optic cable. Router Media WAN Link
Designated port
The port on a segment that is closest to the root of a switch is known as Root ports Designated port Inactive ports Non-designated ports
blocking, listening, learning, forwarding
There are four states that a port goes through when transitioning to the forwarding state. What is the correct order? Listening, learning, forwarding, blocking (put in order)
Router
This is a device which makes it forwarding decisions based on logical network addresses. Switch Router Hub
Quality of service (QOS)
This is a suite of technologies that allows you to strategically optimize network performance for select traffic types
Enabling SSID broadcast (you want to disable, not enable
To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following instead: Enabling SSID broadcast IEEE 802.1X MAC address filtering Pre shared key
Describe the following protocol. FTP (File Transfer Protocol) TCP Port 20 and 21
Transfers files with a remote host (Typically requires authentication of user credentials)
Describe the following protocol. TFTP (Trivial File Transfer Protocol) UDP Port 69
Transfers files with a remote host (doesnt require authentication of user credentials)
Describe the following OSI layer. Presentation Layer
Translates application layer data to an intermediate form that provides security, encyption, and compression for the data
What does the Network Access layer?
Translates the logical network address into physical machine address.
Describe the following OSI layer. Physical Layer
Transmits bit from one computer to another and regulates the transmission over a medium
(True or False) A router can support more than one routing protocol through the process of route redistribution.
True
(True or False) IPv6 no longer supports the ability to fragment packets.
True
Describe the following protocol. MGCP (Media Gateway Control Protocol) UDP Port 2427, 2727
Used as a call control and communication protocol for Voice over IP networks
Describe the following protocol. NTP (Network Time Protocol) UDP Port 123
Used by a network device to synchronize its clock with a time server
Describe the following protocol. RTP (Real-time Transport Protocol) TCP and UDP Port 5004, 5005
Used for delivering media-based data over networks, such as Voice over IP
Describe the following protocol. SMTP (Simple Mail Transfer Protocol) TCP Port 25
Used for sending e-mail
Describe the following protocol. Telnet TCP Port 23
Used to connect to a remote host (Typically via a teminal emulator)
Describe the following protocol. SIP (Session Initiation Protocol) TCP Port 5061, UDP Port 5060
Used to create and end sessions for one or more media connections, including Voice over IP calls
Describe the following protocol. SNMP (Simple Network Management Protocol) UDP Port 161
Used to monitor and manage network devices
Describe the following protocol. HTTPS (Hypertext Transfer Protocol Secure) TCP Port 443
Used to securely retrieve content from a web sever
Describe the following protocol. SMB (Server Message Block) TCP Port 445
Used to share files, printers, and other network resources
IBSS, BSS, ESS
WLANs can be categorized based on their use of wireless APs. The three main categories are ____, ____, and ____. IBSS, BSS, RSS IBSS, BSS, ESS HBSS, BSS, ESS
Receive clients request, and forward them onto the Internet
What is the purpose of a proxy server? Receive clients requests and forward them onto the Internet Route packets to the Internet Block requests from the Internet Provide an IP address to a FQDN
To give users access to their data from any device or location
What is the purpose of a virtual desktop? To save money, To store users info in a data center, Better authentication and security, To give users access to their data from any device or location
Network
What layer is switching associated with?
Cat 5e
What media type is 100BASE-T? Cat 3, Cat 5, A10 base 2, Cat 5e
Spread
When a wireless channel uses more than one frequency the transmission method called _____ spectrum. Spread Long Multi Broad
Packet detection
Which is not a primary feature offered by link control protocol (LCP)? Authentication, Looped link dedication, Packet detection, Error detection
immunity from electromagnetic interference, high bandwidth capacity
Which of th following is an advantage of fiber-optic cable? (CHOOSE 2) Using dial-up analog modem, prevent network problems, high band with capacity, protect networks from hackers, immunity from electromagnetic interference
PPP Point to point protocol
Which of the following is a common layer to protocol that could run over a dedicated leaseline? Internetwork packet exchange/sequenced packet exchange (IPX/SPX), Routing information protocol (RIP), Point to point protocol, Transmission Control Protocol
DSSS, OFDM, FHSS
Which of the following is a variation of spread spectrum technology use in Wireless Local Area Networks? (CHOOSE 3) Wifi Direct sequence spread spectrum (DSSS) Orthogonal frequency division multiplexing (OFDM) Frequency hopping spread spectrum (FHSS) WPA - 2 WEP
WAP
Which of the following is not a WLAN security standard? WPA WAP WEP WPA2
World area network
Which of the following is not a network category based on the geographical dispersion of network components? Campus area network (CAN) Local area network (LAN) Personal area network (PAN) World Area network (WAN) Metropolitan area network (MAN)
DFSS
Which of the following is not a variation of spread-spectrum technology? OFDM, FHSS, DSSS, DFSS
Presentation
Which of the following layers is not part of the TCP/IP protocol stack? Internet access layer Transport Presentation Application
A broadcast storm is when a broadcast is received by a switch and the switch floods its ports with the broadcast. Clients receive endless copies of the broadcast which consumes resources
Why are broadcast storms detrimental?
WAN
Wide area network. State, country or global. Fiber wired.
True
Worldwide interoperability for microwave access (WiMAX) provides wireless broadband access to fixed locations ( as an alternative to technologies such as DSL) and mobile devices. True or false?
Server
___ serves up resources to a network. Router Server Switch
What is a virtual server? a. A virtualized server running on one physical device. It could be running any OS. b. A Microsoft Server c. A physical server running any OS d. A Linux Server
a. A virtualized server running on one physical device. It could be running any OS.
The term packet is used fairly generically to refer to protocol data unit (PDU). However, PDU might have additional names based on their OSI layer. What is the name of the PDU in the physical layer of the OSI reference Model? a. Bits b. Segment c. Packet d. Frames
a. Bits
Which of the following statements is TRUE? (Choose 2) a. Client-server networks can easily scale, which might require the purchase of additional client licenses. b. Client-server networks can cost more than peer-to-peer networks. For example, client-server networks might require the purchase of dedicated server hardware and a network OS with an appropriate number of licenses. c. Peer-to-peer networks typically cost more than client-server networks because there is no requirement for dedicated server resources or advanced NOS software. d. Client-server networks can easily scale, which might require the purchase of additional client licenses.
a. Client-server networks can easily scale, which might require the purchase of additional client licenses. b. Client-server networks can cost more than peer-to-peer networks. For example, client-server networks might require the purchase of dedicated server hardware and a network OS with an appropriate number of licenses.
What are the steps a DHCP client goes through when requesting an IP address? Make sure they are in the correct order. a. DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK b.DHCPACK, DHCPDISCOVER, DHCPREQUEST, DHCPOFFER c.DHCPOFFER, DHCPDISCOVER, DHCPREQUEST, DHCPACK d.DHCPDISCOVER, DHCPREQUEST, DHCPOFFER, DHCPACK
a. DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK
Which of the following layers of the OSI reference model is primarily concerned with forwarding data based on logical addresses? a. Network Layer b. Presentation Layer c. Physical Layer d. Data Link Layer
a. Network Layer
A converged network is a network that has the capabilities of transporting multiple types of traffic such as voice, video, and data, which can offer significant cost savings to organizations a. True b. False
a. True
How fast is standard Ethernet? a. 10 Gbps b. 10 Mbps c. 1 Gbps d. 100 Mbps
b. 10 Mbps
What is the actual distance of 10Base 2? a. 200 b. 185 c. 2 d. 10
b. 185
What media type is 1000BASE-T? a. Cat 5 b. Cat 5e c. Cat 3 d. 10 Base 2
b. Cat 5e
IEEE stands for Institute of Electronic and Electrical Engineer, and it is an internationally recognized standards body. a. True b. False
b. False
How many bytes in an IEEE 802.1Q VLAN tag? a. 8 b. 6 c. 4 d. 2
c. 4
There are four states that a port goes through when transitioning to the forwarding state. What is the correct order? a. Learning, Listening, Blocking, Forwarding b. Listening, Blocking, Learning, Forwarding c. Blocking, Listening, Learning, Forwarding d. Blocking, Learning, Listening, Forwarding
c. Blocking, Listening, Learning, Forwarding
Which of the following is NOT a layer of the Open Systems Interconnect (OSI) reference model? a. Physical Layer b. Presentation Layer c. Internet Access Layer d. Data Link Layer
c. Internet Access Layer
Which of the following layers is NOT part of the TCP/IP protocol stack? a. Internet b. Transport c. Presentation d. Application
c. Presentation
What is the purpose of a DNS server? a. Blocking packets from the Internet b. Routing packets to the Internet c. Providing an IP address for an Fully Qualified Domain Name d. Connecting devices at Layer 2 of the OSI
c. Providing an IP address for an Fully Qualified Domain Name
What is the purpose of a proxy server? a. Block requests from the Internet b. Route packets to the Internet c. Receive client's requests, and forward them on to the Internet d. Provide an IP address to an FQDN
c. Receive client's requests, and forward them on to the Internet
Which of the following is NOT an example of an application that can travel over a network's connections? a. Email b. File sharing between computers c. Voice over IP (VoiceIP) d. Local Area Network
d. Local Area Network
Which two categories of media are twisted-pair cable? a. RG-59 and RG-58 b. MMF and SMF c. RJ-11 and RJ-45 d. STP and UTP
d. STP and UTP
Which of the following transport layer protocol of the OSI reference model is a connection-oriented protocol that provides reliable transport between two communicating hosts? a. Internetwork Packet Exchange (IPX) b. Transport Center Protocol (TCP) c. User datagram Protocol (UDP) Correct d. Transmission Control Protocol (TCP)
d. Transmission Control Protocol (TCP)
Which of the following is a NOT a network category based on the geographical dispersion of network components? a. Personal-area network (PAN) b. Metropolitan-area network (MAN) c. Local-area network (LAN) d. World-area network (WAN)
d. World-area network (WAN)
Data link layer
packaging data into frames, uniquely identifying network devices with an address. MAC (media access control) and LLC
Test 3 #41, is a diagram
see test
Test 3 #43, is a diagram
see test