Competency 5 Practice Test Question Bank

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The IEEE standard 802.3af states the specifications for which of the following?

Power over Ethernet

You have created multiple virtual machines on your workstation to test different unified communications programs. You want these machines to be available to your IT colleagues for testing, but you do not want the traffic generated by their use to interfere with routine business LAN traffic. Meanwhile, on another workstation a coworker has installed additional communications programs for review. You decide to create a new VLAN devoted to software evaluation. Where do you add your coworker's virtual machines to the new VLAN?

On your friend's host workstation, where the virtual machines reside

By far, the most popular expansion board NIC today is one that uses a(n) ____ bus.

PCIe

Which of the following backbone types is the most fault-tolerant?

Parallel backbone

You are a network technician working on a 100Base-T network. A coworker has been having trouble logging on to the server and asks whether you can quickly tell her if her workstation's NIC is operating properly. You do not have the NIC's utility disk on hand, but you look at the back of her workstation and learn that although the NIC is properly installed and connected to the network, something's wrong with it. What might you have seen that causes you to come to this conclusion?

None of its LEDs are lit.

You work second shift and share a desktop workstation with your colleagues who work on the first and third shifts. Each of you has a separate virtual machine on the workstation. When your third-shift coworker installs a new program on his VM, it causes the machine's operating system to stop working. What happens as a consequence?

Nothing changes for your VM.

You are setting up a new Windows 7 client to connect with your LAN, which relies on DHCP. You made certain that the client has the TCP/IP protocol installed and is bound to its NIC. Which of the following must you do next to ensure that the client obtains correct TCP/IP information via DHCP?

Nothing; in Windows 7, the DHCP option is selected by default, and the client will obtain IP addressing information upon connecting to the network.

To transmit and receive signals to and from multiple nodes in a three-story office building, what type of antenna should an access point use?

Omnidirectional

Which technology can be used to provide electrical power to a wireless access point that is not located new any AC power outlets.

PoE

____ is a command-line function for viewing and setting wireless interface parameters and it is common to nearly all versions of Linux and UNIX.

iwconfig

PCIe slots vary depending on the number of ____ they support.

lanes

A(n) ____________________ NIC is integrated into the motherboard.

on-board*

Which utility can be used to check the status of an IP connection?

ping

Which of the following allows a protocol analyzer on your network's backbone switch to monitor all the traffic on a VLAN?

port mirroring

You are configuring a DHCP server. Which of the following variables refers to the range of IP addresses that you will make available to all nodes on a segment?

scope

Collectively, MPLS labels are sometimes called a ____.

shim

A directional antenna issues wireless signals along a(n) ____ direction.

single

A(n) ____________________ assesses client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area.

site survey*

The use of multiple frequencies to transmit a signal is known as ____________________ technology.

spread-spectrum*

Due to popular demand from employees who need to roam from one floor of your office building to another, you are expanding your wireless network. You want to ensure that mobile users enjoy uninterrupted network connectivity without having to reconfigure their workstations' wireless network connection settings. Which of the following variables must you configure on your new access points to match the settings on existing access points?

SSID

The ____________________ is a unique character string used to identify an access point.

SSID (service set identifier)* or service set identifier * or SSID*

What is the preferred SSID for an access point that is part of an ESS?

SSID should match its ESSID

____ is the most widely implemented virtualization software today.

VMware

A(n) ____________________ is software that enables an attached device to communicate with the computer's operating system.

driver*

Which term best describes the capability of cloud computer to dynamically resize service and storage capabilities?

elastic

CompactFlash is an example of a peripheral device attached to the computer's ____ bus.

external

A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on.

false

An ad hoc arrangement would work well for a WLAN with many users.

false

The smallest LANs do not have a backbone.

false

Wireless networks are laid out using the same topologies as wired networks.

false

In ____ wireless systems, the transmitting antenna focuses its energy directly toward the receiving antenna which results in a point-to-point link.

fixed

In wireless communication, to exchange information, two antennas must be tuned to the same ____.

frequency

Each VM is known as a ____.

guest

To install a NIC, you must first install the ____.

hardware

The physical computer on a virtual machine is known as a ____.

host

You and a friend decide to set up Fast Ethernet networks in your respective houses to connect a half-dozen computers at each location. Both of you will connect your networks to high-speed Internet connections. As the connectivity device for end nodes, you purchase a router, whereas your friend uses an old, but functional, 12-port hub he found at a garage sale. Which of the following will your network do that your friend's network won't do?

Filter traffic based on IP address.

In ____ wireless systems, the transmitting antenna focuses its energy directly toward the receiving antenna which results in a point-to-point link.

Fixed

In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device.

host machine

A hardware component that can be changed without disrupting operations is known as ____.

hot-swappable

The software that allows you to define VMs and manages resource allocation and sharing among them is known as a(n) ____________________.

hypervisor*

You are implementing DHCP in a LAN environment that previously used static addresses. The DHCP server is configured to assign addresses in the same address ranges as are currently being used. You reconfigure most of the workstations to use DHCP. Several are now inaccessible and cannot be reconfigured. What is the cause of the problem?

IP Address conflicts are occurring

A user receives an information message on their computer stating a duplicate address exists. A technician would discover that which of the following is true?

IP address conflict

If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit.

interference

What potential problem does STP (Spanning Tree Protocol) address?

A broadcast storm

Which of the following would you use to get a MAC address without opening the computer case?

ipconfig

A network ____________________ is the part of a network to which segments and significant shared devices connect.

Backbone*

You have decided to use PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP in order for all five clients in your office to be able to access servers on the Internet?

1

Your workstation's IP address is 10.35.88.12, and your supervisor's workstation's IP address is 10.35.91.4. When you send data from your workstation to your supervisor's workstation, what is the most likely IP address of the first default gateway that will accept and interpret your transmission?

10.35.88.1

The result from ANDing 11001111 with 10010001 is ____.

10000001

On a network with an IP address of 140.133.28.72 (or 10001100 10000101 0001110001001000) and a subnet mask of 255.248.0.0 (or 11111111 11111000 0000000000000000), what is the network ID?

140.128.0.0 (or 10001100 10000000 00000000 0000000)

You are running KVM on a Fedora Linux computer and have configured a virtual server to use the bridged networking type. The IP address of your host machine's NIC is 192.168.25.71. Assuming your physical LAN uses DHCP, which of the following addresses is most likely the one assigned to your virtual server?

192.168.25.83

You have enabled NAT on your small office's router. The router's private network IP address is 198.162.6.1. Which of the following IP addresses is the most likely to be automatically assigned to one of the workstations that uses this router as its default gateway?

192.168.6.6

Your company has leased a Class C network whose network ID is 205.61.128.0. You want to create 16 subnets within this network. One of the subnets will have an extended network prefix of 205.61.128.64. What will be the broadcast address for this subnet? (Hint: If you know the number of hosts per subnet, you can easily determine the broadcast address.)

205.61.128.79

If you subdivide your Class B network into 254 subnets, what is the maximum number of hosts you can assign to any single subnet?

254

If you worked on a network that could not interpret classless addressing, and your network ID was 145.27.0.0, what is the theoretical maximum number of different subnets you could create on this network?

254

Convert the subnet mask into its dotted-decimal equivalent: 11111111 11111111 11111000 00000000.

255.255.248.0

You have decided to create 254 subnets on your Class B network. What subnet mask will you use to accomplish this?

255.255.255.0

Suppose you have created six subnets on your network, which leases a group of Class C IPv4 addresses. What subnet mask must you specify in your clients' configurations to adhere to your subnetting scheme?

255.255.255.224

As a networking consultant, you've been asked to help expand a client's TCP/IP network. The network administrator tells you that the network ID is subnetted as 185.27.54.0/26. On this network, how many bits of each IP address are devoted to NETWORK information?

26

As a networking consultant, you've been asked to help expand a client's TCP/IP network. The network administrator tells you that the network ID is subnetted as 185.27.54.0/26. On this network, how many bits of each IP address are devoted to HOST information?

6

802.11g is backward compatible with which other 802.11 specification?

802.11b

Your office currently runs a mix of 802.11b and 802.11g clients. Rumor has it that your company is about to merge with another company that uses a different wireless technology. Which of the following would be compatible with what your WLAN currently runs?

802.11n

You are administering a small 10BaseT network. Users are experiencing slow response. You examine the transmit and collision lights on the hub and notice that there is not much traffic and that the collision light is flashing as often as the transmit light. What is the most likely problem?

A network card on one of the clients is set for full-duplex

Which two of the following might cause excessive data collisions on an Ethernet network?

A server on the network contains a faulty NIC. The overall network length exceeds IEEE 802.3 standards for that network type.

You are using your wireless LAN connection to copy documents to a shared folder on your company's file server, when suddenly the connection stalls out. You check your wireless connection status, which indicates that you are still associated with your AP. Next, you run a protocol analyzer program on your workstation, which indicates an excessive number of lost or dropped packets between your workstation and the AP. Which of the following causes could be at fault?

A source of excessive EMI has been introduced.

Which of the following identifies the VLAN to which each piece of data belongs?

A tag added to each frame's header

You have decided to create four virtual Web servers on a Windows 2008 R2 server using Hyper-V R2. Which of the following configuration options would you use to make sure the Web servers are accessible to users across the Internet?

External virtual network

Continuity testers can only be used to test copper cable.

False

Cut-through switches can detect corrupt packets.

False

It is best to perform connectivity tests on a computer connected to a live network.

False

As a business owner, you have decided to outsource all of your company's IT services to a cloud computing service provider. How can your clients and employees access these services?

All of the above

Concrete walls and large metal object reduce the communication range of which communication types:

All of the above

Suppose a user on your organization's network has changed the subnet mask value in his network interface's TCP/IP properties. Which of the following symptoms might he report when he calls the help desk?

All of the above

Your organization is expanding and plans to lease 3000 square feet of space in a nearby building. Your supervisor asks you to conduct a site survey of the space. If conducted properly, which of the following will your site survey reveal?

All of the above

How must a physical NIC be configured so that it can connect its host's VMs to multiple VLANs?

As a trunk

Which of the following will help an access point's transmissions reach farther?

Boosting its signal strength

Which of the following network configuration types is best used for a company's e-mail server?

Bridged

You have installed and configured two virtual Web servers and a virtual mail server on a physical server. What networking mode will you assign to each server's vNIC to ensure that the virtual machines hosts on the Internet can access the virtual machines?

Bridged

You are rearranging nodes on your Fast Ethernet network. Due to a necessarily hasty expansion, you have decided to supply power to a wireless router in a makeshift telco room using PoE. What is the minimum cabling standard you must use to connect this wireless router to the network's backbone?

Cat 5

A colleague calls you for help with his home office Internet connection. He is using an 802.11n access point/router connected to a DSL modem. The access point/router's private IP address is 192.168.1.1 and it has been assigned an Internet routable IP address of 76.83.124.35. Your friend cannot connect to any resources on the Internet using his new Windows workstation. You ask him to run the ipconfig command and read the results to you. He says his workstation's IP address is 192.168.1.3, the subnet mask is 255.255.255.0, and the default gateway address is 192.168.1.3. What do you advise him to do next?

Change his gateway address.

An administrator works for a law firm in an office building in a major city. After installing a new wireless access point, the administrator secures the device using WPA and then connects to it using a laptop. Which of the following would be the logical NEXT step in securing the device?

Check neighboring offices for connectivity and reduce the signal strength appropriately

____________________ refers to the flexible provision of data storage, applications, or services to multiple clients over a network.

Cloud computing*

Which choice would be best for connecting to and performing the initial configuration on an 802.11g wireless router from your laptop? The laptop has both wired and wireless capability.

Connect direct to a data port with an RJ-45 patch cable.

Which of the following does NOT represent a problem for a wireless signal?

Cross-talk

What types of switches propagate flawed packets and, therefore, can contribute to greater network congestion?

Cut-through switches

Which statement is most true:

DHCP leases can be terminated by either the client or the server.

You can access your web server by its IP address but not by its host name. What is the problem?

DNS problem

A(n) ____________________ is software that enables an attached device to communicate with the computer's operating system.

Device Driver*

A user is unable to connect to a network with encryption. The user is able to see the network and has the correct passphrase. Which of the following is MOST likely the problem?

Encryption type

On your Linux workstation, you open a terminal window and type at the command prompt iwconfig eth0 key 5c00951b22. What have you done?

Established the credentials the wireless interface will use to communicate securely with the access point

Which of the following symptoms would probably be present if a client's NIC was set to transmit data in half-duplex mode while the switch port to which it was attached was configured for full-duplex mode?

Excessive late collisions

Each of the VMs on your host computer is configured to use the NAT networking type. They can still pick up e-mail and surf the Web. How are they getting their IP addresses?

From the host machine's virtualization software

What device can you use to check if the network card is working?

Hardware loopback

Which of the following network configuration types prevents VMs from exchanging traffic with nodes other than the workstation they are installed on?

Host-only

____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host's operating system.

Host-only

You have created a virtual machine on your workstation so that you can test some new applications. You configured the VM's hard disk space to be dynamically allocated. Which of the following will allocate more space for the VM when it needs it?

Hypervisor

What are some common problems with TCP/IP? (Choose all that apply)

Incorrect DNS and WINS information Incorrect subnet masks Incorrect or missing default gateway Duplicate IP addresses

You are working on a small network that has frequent troubles at night. The network almost never has trouble in the daytime while the lights are off. This problem is most likely __________________

Incorrect cable routing

You are setting up a WLAN for an insurance agency. The network includes 32 clients, three printers, two servers, and a DSL modem for Internet connectivity. What type of WLAN architecture would best suit this office?

Infrastructure

____ is a significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves.

Interference

You manage a data center for a large ISP that hosts virtual Web and mail servers for many customers. One of your physical servers has four NICs and hosts four mail servers. How many vNICs can you assign to each of the mail servers?

It depends on the virtualization software.

A customer is considering upgrades his office to wireless. He wants the WAP place in his corner office to be sure he gets the highest bandwidth. What suggestions would you make to this customer? (Choose all that apply)

Point out that WAPs place at edges of areas provide opportunity for eavesdropping. Point out that multiple WAPs could be used to tailor the wireless environment this needs. Point out that WAPs should be placed as close to the center of the coverage area as possible.

In NAT, how does an IP gateway ensure that outgoing traffic can traverse public networks?

It replaces each outgoing packet's Source address field with a valid IP address.

In general, a steady or blinking green LED, sometimes labeled ____, indicates that the NIC is functional and has a connection to the network.

LNK

Which of the following defines the length of time a device retains its IP address for?

Lease

You have placed a new NIC in your workstations. Everything appears configured correctly although the LED on the back of the NIC is not lit and the NIC does not work. What can you use to check to see it the NIC is sending data?

Loop back plug

At which layer of the OSI model is error-checking and packet fragmentation handled in 802.11 networks.

MAC

Upon creation, each vNIC is automatically assigned a ____.

MAC address

You are part of a team of engineers who work for an ISP that connects large data centers, telephone companies, and their customers throughout California and Oregon. Management has decided that the company can make large profits by promising the utmost QoS to certain high-profile customers. Which of the following switching methods will best guarantee the promised QoS?

MPLS

Your company allows support-call employees to work from home. The company supplies employees with wireless laptops, wireless routers and DSL connections at their homes. One employee complains of an intermittent connection. The problem only occurs just before lunch and before their afternoon snack of fresh popcorn. What is the likely cause of the problem?

Microwave oven interference

Which of the following is not true about multipath signaling?

Multipath signaling uses less energy and results in clearer reception than line-of-sight signaling.

Which of the following is the default networking type assigned to vNICs in most virtualization programs?

NAT

Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.

RAM

When a mobile WLAN user roams from access point A's range into access point B's range, what does it do automatically to maintain network connectivity?

Reassociate with access point B

You are connected to a wireless network with multiple APs in an ESS. Which term describes the process that occurs when you connect to a new access point after leaving the range of the previous one?

Reassociation

Suppose your company's network contains two separate VLANs. Computer A is on the Customer Service VLAN and Computer B is on the Warehouse VLAN. Besides a Layer 2 switch, what device is required for Computer A and Computer B to exchange data?

Router

An administrator is asked to set up a home office for a user who would like to connect to the Internet and share files with all six computers in the home. Which of the following are the MINIMUM requirements if the user refuses to install wireless devices and all computers contain working network cards?

Router, Switch, Cables

Which of the following virtual devices is the BEST to use to host a company's website?

Server

Which of the following is false, regarding virtualization?

Simple backup are possible, but recoveries are not 100% reliable

You are asked to configure a backbone switch that connects servers supplying oceanic and atmospheric data to mariners and pilots around the world. Your network's traffic load is very high at all times, day and night. What type of switching do you configure the switch to use?

Store-and-forward switching

A user calls the help desk after dialing into the RRAS server. The user is unable to connect to the Internet with a Windows laptop. Their IP address is 0.0.0.0 What is the most likely problem?

The DHCP server cannot be reached.

Which of the following is a significant advantage to using an SFP interface on a router rather than an on-board NIC?

The SFP can be added or removed without affecting operations, thus allowing for customization and future upgrades.

An employee is complaining that when he turn his lights on in the office, he can't connect to the network. With the lights off, his system works fine. What is the problem?

The cabling system is faulty

On a client/server network running TCP/IPv4, what computer initiates the process of assigning an IP address through DHCP?

The client

All non-local communications will be directed to the ________.

The default gateway

When the route for an IP message to reach a destination is not known, the message is forwarded to _____________.

The default gateway

You have just completed the installation of a network. During testing, you find that you cannot access the Internet from you workstations. You can ping from one workstation to the other. What is the most likely cause of this problem?

The default gateway is not set

Suppose a user on your office network has changed the channel on which his wireless NIC communicates. Assuming the wireless connection is his only access to the LAN, what will happen when he next tries to send an e-mail?

The e-mail program will respond with a message indicating it could not connect to the mail server.

The data services company you work for has decided to become an ISP and supply high-capacity Internet connections from its data center. Currently, the data center relies on a 100-BaseFX backbone, but your boss demands that the backbone be upgraded to 10GBase-LR. What kind of infrastructure changes would this require?

The fiber-optic cabling, connectivity devices, and multiplexers must be replaced.

You are the network manager for a computer training center that allows clients to bring their own laptops to class for learning and taking notes. Clients need access to the Internet, so you have configured your network's DHCP server to issue them IP addresses automatically. What DHCP option should you modify to make sure you are not wasting addresses that were used by clients who have completed a class and no longer need them?

The lease duration for client computers

You're working on a school district's 802.11n WLAN. Within each school, several access points serve students, teachers, and administrators. So that users can move about the school with their laptops and not lose network connectivity, each of the access points must share which of the following?

The same ESSID

You have just rearranged the access points on your small office network. Now a group of employees often cannot get their workstations to connect with a new 802.11n access point. You have confirmed that the workstations are using the correct SSID, security type, and passphrase. You have also confirmed that the access point is on and functioning properly because when you stand in the computer room where it's located, you can connect to the access point from your smartphone. Which of the following is likely preventing the other users' workstations from associating with the new access point?

Their workstations are located beyond the access point's range.

Which of the following applies to virtual machines, no matter what type of virtualization software they are created with?

They exist as files on the hard drive of their host.

Most cloud service providers use virtualization software to supply multiple platforms to multiple users

True

Most cloud service providers use virtualization software to supply multiple platforms to multiple users.

True

You want to add the five virtual machines that exist on your host machine to the Staff VLAN at your office. Which of the following must your host machine's NIC support?

Trunking

You install a new NIC in a workstation. You cannot connect to the network. There don't appear to be any resource conflicts. Everything seems configured and install correctly. What should you try?

Use a hardware loopback adapter

A switch can separate different subnets by configuring:

VLANs throughout the ports

A virtual switch includes several virtual ports, each of which can be considered a:

Virtual bridge

____ connect vNICs with a network, whether virtual or physical.

Virtual bridges

_______________ is the emulation of a computer, operating system or application on a physical system.

Virtualization

A network administrator needs to implement a new wireless network for a coffee shop. The shop wants to allow users wireless access from anywhere in the shop, but not outside. Which of the following should be the GREATEST concern for the administrator?

WAP placement

Your company allows support-call employees to work from home. The company supplies employees with wireless laptops, wireless routers and DSL connections at their homes. One employee complains of an intermittent connection. The connection is fine until the employee gets a call and attempts to access the online database thorough his DSL connection. What is the first question you would ask the employee?

What type of phone are you using?

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which of the following commands would you use?

ipconfig /release

When you use the mtr command to assess the path from your office workstation to a server on your company's WAN that's located in Spain, what is the first hop the mtr command will display?

Your default gateway's IP address

Suppose your Windows workstation's wireless network adapter is configured to use the 802.11b wireless networking standard. Also, suppose a café you visit has an 802.11g access point. Assuming you have the correct SSID and logon credentials, what will happen when you attempt to associate with the cafés wireless network?

Your wireless networking client will be able to see the access point and successfully associate with it.

In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range.

active

RDP (Remote Desktop Protocol) operates at which OSI layer?

application

In this mode the vNIC access the network through the host's adapter. It receives it own IP address, default gateway and netmask from the DHCP server.

bridged

A computer's ____________________ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory, processor, hard disk, and NIC.

bus*

Buses differ according to their ____.

capacity

On network diagrams, the Internet is frequently depicted as a ____.

cloud

The gateways that make up the Internet backbone are called ____ gateways.

core

The.backbone are called ____________________ gateways.

core*

A ____ is simply a linked series of devices.

daisy-chain

NICs contain a(n) ____, which transmits and receives data signals.

data transceiver

The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.

default

In ____, a wireless signal splits into secondary waves when it encounters an obstruction.

diffraction

Suppose your office's only DNS server was down, and you wanted to view the DNS address record for your company's domain. Which of the following TCP/IP utilities would allow you to do this?

dig

A serial backbone is the simplest kind of backbone.

true

Advances in NIC technology are making this hardware smarter than ever.

true

Spread spectrum is a popular way of making wireless transmissions more secure.

true

Using a virtualization program, you can create dozens of different VMs.

true

Wireless signals experience attenuation.

true

What switching technique allows you to funnel traffic belonging to more than one VLAN through a single switch interface?

trunking

In bridged mode, a(n) ____________________ accesses a physical network using the host machine's NIC.

vNIC*

____ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.

virtual

To connect to a network, a virtual machine requires a ____.

virtual adapter

Because of the functions it performs, each port on a virtual switch can also be considered a:

virtual bridge

A(n) ____________________ is a logically defined device that operates at the Data Link layer to pass frames between nodes.

virtual switch*

Which of the following is an advantage to virtualizing many servers in your data center, compared to running each server on a separate physical machine?

virtualiztion will conserve resources


Set pelajaran terkait

Managerial Accounting Textbook Notes + Q&As

View Set

MS Life, Health and Sickness Insurance Test

View Set

Thermal Energy and Heat Transfer

View Set

Biology launchpad chapter 14 questions USM

View Set

Properties of Water Assignment and Quiz

View Set