Exam Compass

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

An OC-3 line supports transmission rates of up to: 1.544 Mbps 44.736 Mbps 51.84 Mbps 155.52 Mbps

155.52 Mbps

The IEEE 802.11ac standard specifies a maximum channel bandwidth of: 20 MHz 22 MHz 40 MHz 80 MHz 160 MHz

160 MHz

Which network command-line utility in MS Windows combines the features of ping and tracert? nbtstat pathping nslookup netstat

pathping

Which of the following devices resides at the data link layer of the OSI model? Router Passive hub Ethernet switch Repeater

Ethernet switch

Which netstat parameter allows to display all active TCP connections and the TCP/UDP ports on which the computer is listening? -a -p -e -r

-a

Which netstat parameter allows to display the names of applications and executable file components that are accessing the network? -a -n -b -p

-b

Which of the netstat utility parameters listed below allows to display the contents of an IP routing table? -a -e -p -r

-r

What is the network address for the 192.168.223.15 255.255.255.252 host?

.252 is 11111100 which is /30 Everything past the 30th bit in 192.168.223.15 becomes a 0 so: .15 in binary is --> 00001111 past the 30th bit becomes 0: 192.168.223.00001100 The network address is: 192.168.223.12

Which of the choices listed below would allow for setting up three Wireless Access Points (WAPs) on non-overlapping channels? 1 5 6 9 11

1, 6, 11

T1 lines support data transfer rates of up to: 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps

1.544 Mbps

Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5 (Cat 5) cabling? (Select all that apply) Coaxial cabling 100 Mbps transfer rate over 2 pairs of cables (100BaseT networks) F-type connector 55-meter cable segment length 1 Gbps transfer rate over all 4 pairs of cables (1000BaseT networks) BNC connector 100-meter cable segment length 10 Gbps transfer rate over all 4 pairs of cables (10GBaseT networks) Twisted-pair copper cabling RJ-45 connector Fiber-optic cabling

100 Mbps transfer rate over 2 pairs of cables (100BaseT networks) 1 Gbps transfer rate over all 4 pairs of cables (1000BaseT networks) 100-meter cable segment length Twisted-pair copper cabling RJ-45 connector

What is the typical cable segment length for a copper twisted-pair Ethernet cable? 33 meters 55 meters 100 meters 250 meters

100 meters

Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5e (Cat 5e) cabling? (Select all that apply) BNC connector 100-meter cable segment length Coaxial cabling Twisted-pair copper cabling Fiber-optic cabling 1 Gbps transfer rate over 2 pairs of cables (1000BaseT networks) RJ-45 connector 55-meter cable segment length 1 Gbps transfer rate over 4 pairs of cables (1000BaseT networks) F-type connector

100-meter cable segment length Twisted-pair copper cabling 1 Gbps transfer rate over 4 pairs of cables (1000BaseT networks) RJ-45 connector

Which of the answers listed below refers to the maximum data transfer rate of E1 connection? 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps

2.048 Mbps

The characteristic features of the IEEE 802.11n wireless standard include: (Select all that apply) Multiple Input / Multiple Output (MIMO) Maximum data signaling rate of 54 Mbps 2.4 GHz frequency band Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method 5.0 GHz frequency band Multi-User Multiple Input / Multiple Output (MU-MIMO) Maximum data signaling rate of up to 600 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

2.4 GHz frequency band 5.0 GHz frequency band Multiple Input / Multiple Output (MIMO) Maximum data signaling rate of up to 600 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

Which of the following answers refer to the IEEE 802.11b wireless standard? (Select 3 answers) Maximum data signaling rate of 54 Mbps 5.0 GHz frequency range Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method 2.4 GHz frequency range Maximum data signaling rate of 11 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

2.4 GHz frequency range Maximum data signaling rate of 11 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

The IEEE 802.11a standard specifies a channel bandwidth of: 20 MHz 22 MHz 40 MHz 80 MHz

20 MHz

The IEEE 802.11g standard specifies a channel bandwidth of: 20 MHz 22 MHz 40 MHz 80 MHz

20 MHz

The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers) 20 MHz 22 MHz 40 MHz 80 MHz 160 MHz

20 MHz 40 MHz

Which of the answers listed below refers to a channel bandwidth used in 802.11b networks? 20 MHz 22 MHz 40 MHz 80 MHz

22 MHz

Which of the following answers refer to the IPv4 multicast address block? (Select 2 answers) 128 - 191 Class B 192 - 223 Class C 224 - 239 Class D

224 - 239 Class D

Which of the following answers refers to the maximum data transfer rate of E3 connection? 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps

34.368 Mbps

T3 lines support data transfer rates of up to: 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps

44.736 Mbps

Optical Carrier (OC) transmission rate specifications adhere to a pattern where the OC prefix is followed by a number designating a multiple of the base unit of: 1.544 Mbps 44.736 Mbps 51.84 Mbps 155.52 Mbps

51.84Mbps

A limited IPv4-to-IPv6 transition mechanism that allows for encapsulation of IPv6 packets in IPv4 packets transmitted over IPv4 networks is known as: 6to4 802.3af eDiscovery Miredo

6to4

The IEEE 802.11g standard is backwards compatible with: 802.11n 802.11a 802.11b 802.11ac

802.11b

The IEEE 802.11n standard offers backward compatibility with which of the following standards? (Select all that apply) 802.11g 802.11ac 802.11b 802.11a

802.11g 802.11b 802.11a

Which of the answers listed below refers to the maximum data transfer rate of OC-192 connection? 622.08 Mbps 1244.16 Mbps (1.24 Gbps) 2488.32 Mbps (2.49 Gbps) 9953.28 Mbps (9.95 Gbps)

9953.28 Mbps (9.95 Gbps)

Which of the following answers refer to IPv6 loopback addresses? (Select 2 answers) 127.0.0.1 0:0:0:0:0:0:0:1 169.254/16 ::1 FE80::/10

::1 0:0:0:0:0:0:0:1

MPLS (Multiprotocol Label Switching)

A network technology defined by a set of IETF specifications that enable Layer 3 devices, such as routers, to establish and manage network traffic.

Which of the following answers refer(s) to frame relay? (Select 3 answers) A network technology used for connecting devices on a LAN Data transfer rates of up to 10 Gbps Packet-switching method Data transfer rates of up to 45 Mbps A network technology used for connecting devices on a WAN Circuit-switching method

A network technology used for connecting devices on a WAN Data transfer rates of up to 45 Mbps Packet-switching method

Which of the following answers refers to a wireless connectivity technology used for monitoring sensor data collected from low-powered sports and fitness equipment? CAN WTLS UAV ANT+

ANT+

An IPv6 link-local address is an equivalent of IPv4's: APIPA address Routable IP address Public IP address MAC address

APIPA address

An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker's IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario? ARP poisoning Replay attack Cross-site request forgery DNS poisoning

ARP poisoning

What is the most common type of a DSL Internet access? VDSL ADSL SDSL UDSL

ASDL

Which of the following can be the source of RFI and cause disruptions in network connectivity? Cordless phones Fluorescent lights Microwave ovens Bluetooth devices All of the above

All of the above cordless phones, fluorescent lights, microwave ovens, and bluetooth devices all cause some form of RFI and can disrupt network connectivity.

A type of Ethernet interface that automatically detects the required cable connection type (straight-through vs. crossover) and configures the connection appropriately is known as: GBIC Basic-Rate Interface (BRI) UC gateway Auto MDI-X

Auto MDI-X

Which of the answers listed below refers to a special type of frame used by STPs? MTU Jumbo frame BPDU ATM cell

BPDU

Which of the following answers refers to a fiber transceiver equipped with the capability to transmit and receive signals over a single fiber strand? Simplex Bidirectional Half duplex Unidirectional

Bidirectional

Which of the following reside at the physical layer of the OSI model? (Select 2 answers) IP address Switch Bit Router Network cabling Frame

Bit Network cabling

What is the name of an AES-based encryption mode implemented in WPA2? CCMP ECB CBC TKIP

CCMP

Which of the following answers refers to a channel access method used in 3G cellular networks? CDMA CSMA/CD TDMA CSMA/CA

CDMA

A solution that allows to control access to a shared transmission medium in 802.11 networks is known as: CWDM CSMA/CD CDMA CSMA/CA

CSMA/CA

Which of the following devices would be used for connecting a router to a T1 line? CSU/DSU Media converter IDF F-type connector

CSU/DSU (channel service unit/data service unit) is a digital-interface device used to connect data terminal equipment (DTE), such as a router, to a digital circuit, such as a Digital Signal 1 (DS1) T1 line.

Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard? (Select all that apply) Data signaling rate of up to 600 Mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method Maximum data signaling rate of up to 6.77 Gbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method Multi-User Multiple Input / Multiple Output (MU-MIMO) 2.4 GHz frequency band

Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method Multi-User Multiple Input / Multiple Output (MU-MIMO 5.0 GHz frequency band 6.77 Gbps

Which of the following answers refers to the minimum requirement for twisted-pair copper cabling in modern Ethernet networks? Cat 3 Cat 5 Cat 5e Cat 6 Cat 6A

Cat 5e

In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to the: Class A address space Class B address space Class C address space Class D address space

Class A space

In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to the: Class A address space Class B address space Class C address space Class D address space

Class C space

Which of the following answers refer to the RG-6 cabling specification? (Select 3 answers) Twisted-pair copper cabling Suitable for short-distance cable runs Used for analog video and CCTV installations Coaxial cabling Suitable for long-distance cable runs Used for cable television, satellite television and cable modems

Coaxial cabling Suitable for long-distance cable runs Used for cable television, satellite television and cable modems

What are the characteristics of the RG-59 cabling specification? (Select 3 answers) Coaxial cabling Suitable for short-distance cable runs Used for analog video and CCTV installations Twisted-pair copper cabling Suitable for long-distance cable runs Used for cable television, satellite television and cable modems

Coaxial cabling Suitable for short-distance cable runs Used for analog video and CCTV installations

Which of the answers listed below refers to a security solution that allows to selectively block access to certain websites? Captive portal Firewall Content filter Proxy server

Content filter

Which of the answers listed below refer to the characteristic features of a modem? (Select 3 answers) Converts digital data into analog signal Allows a computer to send and receive information over telephone lines Forwards frames between network segments Converts analog signal into digital data Filters and transfers data packets between dissimilar types of computer networks

Converts analog signal into digital data Converts digital data into analog signal Allows a computer to send and receive information over telephone lines

What type of Ethernet cable would be used for establishing a direct communication link between two PCs? Patch cable Crossover cable Rollover cable Straight-through cable

Crossover cable

Which of the following attack types relies on amplification effect? Zero-day attack DDoS attack Brute-force attack MITM attack

DDoS attack

Which of the following connector types are used for RS-232 serial communications? (Select 2 answers) DE-9 RG-59 RJ-45 DB-25 RG-6 RJ-11

DE-9 DB-25 These are serial connectors

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as: DNS SNMP NAT DHCP

DHCP

A security feature of a network switch that provides countermeasures against rogue DHCP servers is called: DHCP scope DHCP reservation DHCP snooping DHCP relay agent

DHCP snooping

Which VPN type enables direct communication links between remote hosts on a WAN? Site-to-site VPN DMVPN Remote-access VPN Client-to-site VPN

DMVPN

Remapping a domain name to a rogue IP address is an example of what kind of exploit? DNS poisoning Domain hijacking ARP poisoning URL hijacking

DNS poisoning

Examples of protocols used for implementing secure VPN tunnels include: (Select 3 answers) DTLS bcrypt SCP IPsec SSL/TLS

DTLS IPsec SSL/TLS

In the OSI model, physical addressing takes place at the: Data link layer Layer 4 Physical layer Session layer

Data link layer

What are the characteristic features of ATM? (Select all that apply) A network technology used for connecting devices on a WAN Data transfer rates of up to 45 Mbps Used in SONET networks 53-byte data transfer unit (a.k.a. ATM cell) A network technology used for connecting devices on a LAN Data transfer rates of up to 10 Gbps

Data transfer rates of up to 10 Gbps 53-byte data transfer unit (a.k.a. ATM cell Used in SONET networks A network technology used for connecting devices on a WAN

A wireless disassociation attack is a type of: Downgrade attack Brute-force attack Denial of Service (DoS) attack Cryptographic attack

Denial of Service (DoS) attack

Which of the following antenna types provide a 360-degree horizontal signal coverage? (Select 2 answers) Unidirectional antenna Dipole antenna Yagi antenna Omnidirectional antenna Dish antenna

Dipole antenna Omnidirectional antenna

Which of the answers listed below refers to a type of routing protocol that determines the best route for data packets based on the lowest number of hops? Hybrid Link-state Distance-vector Dynamic

Distance-vector

Which type of switch simplifies virtual network configuration by enabling an option to configure switching for the entire network from a single interface? Managed switch Distributed switch Stackable switch Aggregation switch

Distributed switch

Which of the EAP methods listed below relies on client-side and server-side certificates for authentication? EAP-TLS PEAP EAP-TTLS EAP-FAST

EAP-TLS

Which of the following EAP methods offers the highest level of security? PEAP EAP-FAST EAP-TLS EAP-TTLS

EAP-TLS

Which of the following enables automatic configuration of an IPv6 address? EUI-64 UEFI APIPA MAC-48

EUI-64

Which of the answers listed below refer(s) to MPLS? (Select all that apply) Circuit-switching method Used for connecting devices on a LAN Enables delivery of various data packet types over the same network link Packet-switching method Used for connecting devices on a WAN Designed to simplify and improve the performance of routing process

Enables delivery of various data packet types over the same network link Packet-switching method Used for connecting devices on a WAN Designed to simplify and improve the performance of routing process

A type of coaxial connector commonly used for cable television and cable modems is called: RG-6 F-type DB-9 MT-RJ

F-type

Which of the following answers lists a valid address of FE80:00A7:0000:0000:02AA:0000:4C00:FE9A after compression? FE80:00A7::2AA:0:4C:FE9A FE80:A7::2AA::4C00:FE9A FE80:00A7::2AA:0:4C00:FE9A FE80:A7::2AA:0:4C00:FE9A

FE80:A7::2AA:0:4C00:FE9A

A network protocol that allows for secure file transfer over SSL is known as: TFTP SCP FTPS SFTP

FTPS

A dedicated communication channel used exclusively between two connected hosts is a characteristic feature of packet-switching networks. True False

False

Circuit-switching networks move data divided into small blocks over a shared connection. True False

False

What is the first valid host address for a node residing in the 10.119.136.143/20 network

First thing to do is get the network address. /20 is 11111111.11111111.11110000.00000000 136 in binary is 10001000 Since the CIDR notation is /20 everything past the 20th bit turns into a 0 10000000 = 128 The network address is: 10.119.128.0 The first available host address is adding 1 to the address so it is 10.119.128.1 <----

What is the name of a security mechanism that protects a network switch against populating its MAC table with invalid source addresses? BPDU guard UTM Flood guard Root guard

Flood guard

A type of technology that provides control over the usage of a mobile device within a designated area is referred to as: Geofencing Quarantine network Geolocation GPS tagging

Geofencing

TCP port 1720 is used by: H.323 SMB LDAPS SNMP

H.323

Which of the answers listed below refers to a protocol used for managing VoIP and VTC services? SMB H.323 SCP IGP

H.323

Which of the protocols listed below enables remote access to another computer on the network via web browser? RDP HTTPS SSH VNC

HTTPS

Which of the following reside at the physical layer of the OSI model? (Select 2 answers) Router Hub Switch Network cabling Bridge

Hub Network cabling

Border Gateway Protocol (BGP) falls into the category of: Hybrid routing protocols Link-state routing protocols Distance-vector routing protocols Static routing protocols

Hybrid routing protocols

Which network protocol enables detection of packet loss? SMB ICMP ARP SNTP

ICMP

Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets? CCMP RSTP ICMP SNMP

ICMP

In 802.11 networks, the term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth. Channel bonding was first introduced with the: IEEE 802.11a standard IEEE 802.11b standard IEEE 802.11g standard IEEE 802.11n standard IEEE 802.11ac standard

IEEE 802.11n standard

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? UDP IP TCP NetBIOS

IP

Which of the answers listed below refers to a means for executing reflective DOS attack? Phishing Logic bomb IP spoofing Man-in-the-middle

IP spoofing

The arp command can be used to perform what kind of resolution? IP to FQDN MAC to IP IP to MAC FQDN to IP

IP to MAC

Which of the answers listed below refers to a method for managing a network's IP address space? WMS SIEM UTM IPAM

IPAM IPAM (IP Address Management) is the administration of DNS and DHCP, which are the network services that assign and resolve IP addresses to machines in a TCP/IP network. Simply put, IPAM is a means of planning, tracking, and managing the Internet Protocol address space used in a network.

Which of following protocols reside(s) at the OSI network layer? (Select all that apply) IPv4 UDP IPsec TCP IPv6 ICMP

IPv4 IPsec IPv6 ICMP

Which of the following solutions enables simultaneous digital transmission of voice, video, data, and other network services over a PSTN? WiMAX PoE ISDN HSPA+

ISDN

What is the network address for 154.24.67.147 /22

It is a /22 IP, so the binary representation would be 1111111.11111111.11111100.00000000 past the /22, all bits turn to 0's and art not counted towards the Network address. Therefore, the binary representation of 67 is 01000011 Since we turned off the 23 and 24th bit, the binary representation is 01000000 which is 64. This network address is 154.24.67.147

Which of the answers listed below refers to a network authentication protocol that provides the single sign-on functionality? RADIUS MS-CHAP Kerberos TACACS+

Kerberos

Which of the following solutions enables combining several physical ports of a switching device into a single logical channel? RSTP VRRP LACP HSRP

LACP Link Aggregation Control Protocol. Within the IEEE specification, the Link Aggregation Control Protocol (LACP) provides a method to control the bundling of several physical ports together to form a single logical channel.

Which of the following answers refers to an SSL/TLS-based directory access protocol? H.323 PPTP Kerberos LDAPS

LDAPS

Which of the following answers refer to the characteristics of copper-based networks? (Select 3 answers) More expensive in comparison to optical fiber Used for last-mile cable runs Higher bandwidth and maximum cable segment length in comparison to fiber-optic links Used for network backbone cabling Less expensive in comparison to optical fiber Limited bandwidth and maximum cable segment length in comparison to fiber-optic links

Less expensive in comparison to optical fiber Limited bandwidth and maximum cable segment length in comparison to fiber-optic links Used for last-mile cable runs

Subnetting example

Let's say our address is 10.10.1.99/23 In Binary that becomes 00001010.00001010.00000001.01100011 The network portion is determined by the ones in the subnet mask.So /23 means the network portion is the first 23 bits as is, with the remainder of the bits set to 0 00001010.00001010.00000000.00000000 So 10.10.0.0 it the network address Broadcast address: set those last bits to 1's instead of 0's (everything after the 23 bits from subnet mask)00001010.00001010.00000001.11111111 So 10.10. 1.255 is the broadcast address 1st available host address - add one to the network adress00001010.00001010.00000000.00000001 So 10.10.0.1 Last available host address - subtract one from the broadcast address00001010.00001010.00000001.11111110 So 10.10.1.254 Range of host address is therefore 10.10.0.1 - 10.10.1.254

A type of routing protocol that calculates the best path between source and destination nodes based on a map of network connectivity between nodes is called: Dynamic Link-state Static Distance-vector

Link-state

Disabling SSID broadcast: Is one of the measures used in the process of securing wireless networks Makes a WLAN harder to discover Blocks access to a WAP Prevents wireless clients from accessing the network

Makes a WLAN harder to discover

What are the characteristic traits of a network switch? (Select all that apply) Makes forwarding decisions in hardware (ASIC) Typically capable of connecting more network segments than bridge (more physical ports) Older and less effective type of network device in comparison to network bridge Makes forwarding decisions in software Sometimes referred to as multiport bridge Newer and more effective type of network device in comparison to network bridge Typically capable of connecting fewer network segments than bridge (fewer physical ports)

Makes forwarding decisions in software Typically capable of connecting fewer network segments than switch (fewer physical ports) Older and less effective type of network device in comparison to network switch

A type of layer 2 network switch with configuration features that can be modified via a user interface is referred to as: Virtual switch Multilayer switch PoE switch Managed switch

Managed switch

Which of the answers listed below refer to the characteristic features of the IEEE 802.11a wireless standard? (Select 3 answers) Maximum data signaling rate of 54 Mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency band Maximum data signaling rate of 11 Mbps Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method

Maximum data signaling rate of 54 Mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

What are the characteristics of the IEEE 802.11g wireless standard? (Select 3 answers) Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method Maximum data signaling rate of 54 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency range Maximum data signaling rate of 11 Mbps 5.0 GHz frequency range

Maximum data signaling rate of 54 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency range

What are the characteristic traits of GBIC? (Select all that apply) Data transfer of 10 Gbps Modular (hot swappable) interface Converts optical signals to electrical signals Fixed physical interface Converts electrical signals to optical signals Data transfer of 1 Gbps

Modular (hot swappable) interface Converts optical signals to electrical signals Converts electrical signals to optical signals Data transfer of 1 Gbps

What are the characteristic traits of single-mode fiber optics? (Select 3 answers) Transmission distances of up to 2 km More expensive than multimode fiber optics Uses LED as the source of light Transmission distances of up to 100 km Uses laser as the source of light Less expensive than multimode fiber optics

More expensive than multimode fiber optics Uses laser as the source of light Transmission distances of up to 100 km

Which of the following answers refers to the new feature introduced with the IEEE 802.11ac standard? Multiple Input / Multiple Output (MIMO) 40 MHz channel width Multi-User MIMO (MU-MIMO) Maximum data signaling rate of up to 600 Mbps

Multi-User MIMO (MU-MIMO)

Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address? DNS APIPA NAT DHCP

NAT

Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device? QoS DHCP NAT DNS

NAT

Which IPv6 protocol is used by networked hosts to determine the link layer address of adjacent nodes, advertise the presence of routers, and locate routers? NTP NDR NCP NDP

NDP

A type of advanced firewall capable of more in-depth inspection of network traffic that enables detection of application-specific attacks is referred to as: (Select 2 answers) Packet filter Layer 4 firewall NGFW Second-generation firewall Layer 7 firewall

NGFW Layer 7 firewall

Internet Protocol Security (IPsec) resides at: Network layer of the OSI model Transport layer of the OSI model Session layer of the OSI model Presentation layer of the OSI model

Network layer of the OSI model

Which of the following command-line tools is used for discovering hosts and services on a network? Nmap netcat Zenmap tcpdump

Nmap

Which of the following answers refers to a link-state routing protocol? BGP EIGRP RIP OSPF

OSPF

Which of the answers listed below refer to IMAP4? (Select 2 answers) Offers improved functionality in comparison to POP3 Serves the same function as POP3 Enables sending email messages from client devices Offers less functions than POP3 Enables email exchange between mail servers

Offers improved functionality in comparison to POP3 Serves the same function as POP3

Which of the answers listed below refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments? Omnidirectional antenna Dish antenna Unidirectional antenna Yagi antenna

Omnidirectional antenna

VoIP gateway is a network device that converts voice and fax calls, in real time, between an IP network and: (Select 2 answers) T1/T3 lines Site-to-site VPN PSTN E1/E3 lines Remote-access VPN POTS

POTS PSTN

Which network protocol enables encapsulation of PPP frames within 802.3 frames? FCoE PPPoE EAP IPsec

PPPoE (Point-to-Point over Ethernet)

Which of the protocols listed below resides at the session layer of the OSI model? HTTP UDP IP SMTP PPTP

PPTP

Which of the answers listed below refers to an ISDN service designed for larger organizations that take advantage of digital PBX systems? BRI N-ISDN PRI B-ISDN

PRI

Which of the following acronyms refers to a client authentication method used in WPA/WPA2 Personal modes? AES PSK RC4 IKE

PSK (generally used in small offices, homes, etc)

Which of the answers listed below refer to components that reside at the OSI network layer? (Select 3 answers) Router Network cabling IP address TCP/UDP protocols Switch Packet

Packet IP address Router

Which of the answers listed below refer to iptables? (Select 2 answers) Packet capturing utility MS Windows command-line tool Packet tracing utility Linux command-line tool Packet filtering utility

Packet filtering utility Linux command-line tool

Which of the following answers refer to common cabling type used for connecting workstations to network devices? (Select 2 answers) Patch cable RG-59 cable Crossover cable RG-6 cable Straight-through cable

Patch cable Straight-through cable Patch cable is the same thing as a straight-through cable

Which of the following allows an administrator to inspect the traffic passing through a network switch? Port mirroring VLAN tagging Fault-tolerant mode Port scanning

Port mirroring

Which WAP configuration setting allows for adjusting the boundary range of a wireless signal? SSID broadcast Power level controls Maximum Transmission Unit (MTU) Quality of Service (QoS)

Power level controls

What are the characteristic features of a RADIUS server? (Select 3 answers) Primarily used for network access Encrypts the entire payload of the access-request packet Combines authentication and authorization Encrypts only the password in the access-request packet Primarily used for device administration Separates authentication and authorization

Primarily used for network access Encrypts only the password in the access-request packet Combines authentication and authorization

What are the characteristic features of TFTP? (Select 2 answers) Provides no security features Typically used for exchanging files over the Internet A very basic form of file sharing protocol Provides authentication and encryption Directory access protocol

Provides no security features A very basic form of file sharing protocol

In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as: Bridge Active hub Server Proxy

Proxy

Which of the answers listed below refers to an encryption algorithm used in TKIP? DES 3DES AES RC4

RC4

Examples of distance-vector routing protocols include: (Select 2 answers) EGP OSPF RIP EIGRP BGP

RIP EIGRP

What are the characteristic features of satellite Internet connections? (Select 3 answers) High signal latency Lack of signal interference Cheaper in comparison to terrestrial links Interference (weather dependent) Low signal latency Relatively high cost in comparison to terrestrial link

Relatively high cost in comparison to terrestrial link High signal latency Interference (weather dependent)

Which of the terms listed below refers to permanent IP address assignment from a DHCP server? Scope Reservation DHCP relay Lease

Reservation

Which of the following enables VoIP calls between PBXs? VTP PSTN SIP trunk PPPoE

SIP trunk

Which of the following answers refers to a network protocol used in the most common types of spoofing attacks? SMTP RDP SNMP Telnet

SMTP

Which of the following protocols reside at the application layer of the OSI model? (Select 3 answers) ATM HTTP FTP IP SMTP TCP/UDP

SMTP HTTP FTP

A metric that compares the amount of usable data and the background noise that is being sent over a transmission channel is known as: BRI SNR RFI SVC

SNR (signal to noise ration) used to compare the amount of usable data and background noise being sent.

A unique WLAN identifier is commonly referred to as: EUI SSID OUI CNAME

SSID

Which of the following protocols provide protection against switching loops? (Select 2 answers) RTP SRTP RDP STP RSTP

STP RSTP

Which OSI layer assumes responsibility for managing network connections between applications? Network layer Data link layer Application layer Session layer

Session layer

Which of the answers listed below refer(s) to the feature(s) of SFP? (Select all that apply) Small form factor transceiver Converts electrical signals to optical signals Data transfer of 10 Gbps Newer transceiver type that replaces GBIC Modular (hot swappable) interface Converts optical signals to electrical signals Fixed physical interface Data transfer of 1 Gbps

Small form factor transceiver Converts electrical signals to optical signals Newer transceiver type that replaces GBIC Modular (hot swappable) interface Converts optical signals to electrical signals Data transfer of 1 Gbps

A remote-line diagnostic device placed at the joining point between an ISP's line and customer's premises wiring is known as: OTDR Line tester Loopback adapter Smart jack

Smart jack

What allows to determine which network segment an IP address belongs to? Physical address Dynamic Host Configuration Protocol (DHCP) Address Resolution Protocol (ARP) Subnet mask

Subnet Mask

What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers) Suitable for large corporate networks Does not require an authentication server Suitable for all types of wireless LANs Requires RADIUS authentication server

Suitable for large corporate networks Requires RADIUS authentication server

What are the characteristic components of the OSI data link layer? (Select 3 answers) MAC address Packet Switch Network cabling Router Frame

Switch MAC address Frame

Which port enables the FTP's Data Connection for sending file data? UDP port 20 TCP port 20 UDP port 21 TCP port 21

TCP PORT 20

The File Transfer Protocol (FTP) Control Connection for administering a session is established through: TCP port 20 UDP port 20 TCP port 21 UDP port 21

TCP PORT 21

Which of the answers listed below refers to a channel access method used in 2G GSM networks? CSMA/CA TDMA CSMA/CD CDMA

TDMA

A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called: PEAP TKIP CCMP WPA2

TKIP

An IPv4-to-IPv6 transition mechanism with native support for Network Address Translation (NAT) is called: 6to4 Teredo eDiscovery Miredo

Teredo

broadcast address for the 46.28.247.109/10 network?

The CIDR notation is /10 so in binary it is 11111111.11000000.0000000.0000000 .28 in binary is 00011100 everything past the 10th bit becomes a 1 (use the subnet mask for /10 as reference to where everything becomes 1) so .28 becomes 0011111111.11111111.11111111 .63.255.255 the broadcast address is 46.63.255.255

Which of the answers listed below refer to the characteristics of multimode fiber optics? (Select 3 answers) Uses laser as the source of light Transmission distances of up to 2 km More expensive than single-mode fiber optics Transmission distances of up to 100 km Less expensive than single-mode fiber optics Uses LED as the source of light

Transmission distances of up to 2 km Uses laser as the source of light Less expensive than single-mode fiber optics

Telnet: (Select 3 answers) Encrypts network connection Provides password authentication Transmits data in an unencrypted form Does not provide authentication Enables remote login and command execution

Transmits data in an unencrypted form Does not provide authentication Enables remote login and command execution

Which OSI layer is responsible for breaking up data into segments? Network layer Transport layer Presentation layer Data link layer

Transport layer

A network device that apart from the function of an ordinary network switch can also provide additional functions at higher levels of the OSI reference model is known as a multilayer switch. T OR F

True

A physical point where an ISP's network ends and connects with the customer's on-premises wiring (which also defines where the ISP's responsibility for maintenance ends and the consumer's responsibility begins) is referred to as demarcation point, or demarc. True False

True

An IP address that doesn't correspond to any actual physical network interface is called a virtual IP address (VIP/VIPA). True or False

True

Category 3 (Cat 3) cable is a 10 Mbps twisted-pair copper cable used in telephone wiring and older Ethernet (10BaseT) networks. True False

True

Category 7 is a twisted-pair cabling standard featuring improved specifications for canceling crosstalk and system noise. As in Cat 6A, Cat 7 cabling offers 10 Gbps data transfer rate over a cable segment length of 100 meters in 10GBaseT networks. Category 7 standard introduces new connector types (the GG45 and TERA connector). Cat 7 cabling hasn't seen a widespread market adoption yet, because all manufacturers of active equipment and network cards prefer Cat 6A standard which offers similar performance and takes advantage of the traditional RJ-45 connector. True False

True

Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4. T OR F

True

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS. True or False

True

In 10GBaseT networks, Category 6 (Cat 6) cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas Cat 6A (Augmented) cabling allows for 10 Gbps data transfer rate over a cable segment length of 100 meters. True False

True

In STP network topology, the term "Root guard" refers to a security mechanism designed to protect integrity of the designated main switch. True False

True

Private Branch Exchange (PBX) is an internal telephone exchange or switching system implemented in a business or office. PBX allows for handling of internal communications without the use of paid Public Switched Telephone Network (PSTN) service. T OR F

True

The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate access point to connecting hosts. True False

True

Wi-Fi Protected Setup (WPS) is a network security standard which simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network. WPS has known vulnerabilities and disabling this functionality is one of the recommended ways of securing wireless networks. True False

True

What are the characteristic traits of a network switch? (Select all that apply) Makes forwarding decisions in hardware (ASIC) Typically capable of connecting more network segments than bridge (more physical ports) Older and less effective type of network device in comparison to network bridge Makes forwarding decisions in software Sometimes referred to as multiport bridge Newer and more effective type of network device in comparison to network bridge Typically capable of connecting fewer network segments than bridge (fewer physical ports)

Typically capable of connecting more network segments than bridge (more physical ports Makes forwarding decisions in hardware (ASIC) Sometimes referred to as multiport bridge Newer and more effective type of network device in comparison to network bridge

Which of the answers listed below refer(s) to PPP? (Select all that apply) (Point-to-Point) Network protocol used for connecting devices on a WAN Transport layer (layer 4) protocol Enables encapsulation of IP traffic Used for establishing a direct connection between two networked devices Application layer (layer 7 protocol)

Used for establishing a direct connection between two networked devices Enables encapsulation of IP traffic Network protocol used for connecting devices on a WAN

Which of the answers listed below refer to the characteristics of multimode fiber optics? (Select 3 answers) Uses laser as the source of light Transmission distances of up to 2 km More expensive than single-mode fiber optics Transmission distances of up to 100 km Less expensive than single-mode fiber optics Uses LED as the source of light

Uses LED as the source of light Transmission distances of up to 2 km Less expensive than single-mode fiber optics

What are the characteristic traits of single-mode fiber optics? (Select 3 answers) Transmission distances of up to 2 km More expensive than multimode fiber optics Uses LED as the source of light Transmission distances of up to 100 km Uses laser as the source of light Less expensive than multimode fiber optics

Uses laser as the source of light Transmission distances of up to 100 km More expensive than multimode fiber optics

Switch spoofing and double tagging are attack methods used in: DDoS attacks Downgrade attacks VLAN hopping attacks Wireless disassociation attacks

VLAN hopping attacks

What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes? DNAT VLSM MPLS VLAN

VLSM Variable-Length Subnet Masking (VLSM) amounts to "subnetting subnets," which means that VLSM allows network engineers to divide an IP address space into a hierarchy of subnets of different sizes, making it possible to create subnets with very different host counts without wasting large numbers of addresses.

A non-proprietary alternative to RDP that enables control over another computer on the network with the use of a graphical user interface is called: VTP VRF VTC VNC

VNC

Which of the following answers lists an example of a modern network bridging device? WAP Active hub VoIP endpoint Wireless range extender

WAP

Which of the following tools would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? Protocol analyzer WAP power level controls Logical network diagram Network mapper

WAP power level controls

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is known as: MAN WLAN LAN VLAN

WLAN

Which of the following would be the best solution for securing a small network lacking an authentication server? WPA-PSK WPA2-Enterprise WPA2-PSK WPA-Enterprise

WPA2-PSK

Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices? WAP WWAN Satellite WLAN

WWAN

What is the maximum valid range for IP addresses that can be assigned to hosts on the 134.170.185.46 255.255.128.0 network?

We must first get the network address to find the first valid host This is a /17 network, everything past the 17th bit becomes a 0 134.170.10000000.00000000 134.170.128.0 <--- network address plus 1 = the host address 134.170.128.1 <--- first available host address We must then find the broadcast address to get the last valid host everything past the 17th bit becomes a 1 134.170.11111111.11111111 <-- broadcast address minus 1 = the last valid host address 134.170.255.254 <-- last valid host address The range is 134.170.128.1 - 134.170.255.254

Which network device enables centralized management of WAPs? VPN concentrator Load balancer Multilayer switch Wireless LAN controller

Wireless LAN controller

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves: Penetration testing Wireless site survey Vulnerability scanning End user awareness and training

Wireless site survey

Which of the answers listed below refer to highly directional antenna type used for long-range point-to-point bridging links? (Select 3 answers) Yagi antenna Omnidirectional antenna Dish antenna Non-directional antenna Parabolic antenna Dipole antenna

Yagi antenna Parabolic antenna Dish antenna (Dish and Parabolic antenna are the same thing!)

Which of the answers listed below refers to a wireless protocol designed to provide communication between appliances in a home automation network? FCoE SDN Z-Wave SIEM

Z-Wave

Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses? arp -e netstat -n nslookup arp -a

arp -a

Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers) ifconfig eth0 down ipconfig /release ifconfig eth0 up ipconfig /renew

ipconfig /renew ipconfig /release

What are the characteristics of fiber-optic cabling? (Select all that apply) High signal attenuation Used for network backbone cabling Immunity to electromagnetic interference Less suitable for carrying digital information than copper cabling Limited bandwidth and maximum cable segment length in comparison to copper cabling Used for last-mile cable runs Provides higher level of security than copper cabling (difficult to tap into) More suitable for carrying digital information than copper cabling

provides higher level of security than copper cabling (difficult to tap into) More suitable for carrying digital information than copper cabling Immunity to electromagnetic interference Used for network backbone cabling

Which of the following answers refers to a command-line packet capturing utility? netcat Zenmap tcpdump Nmap

tcpdump

Which of the following answers refers to a modular network device designed to provide a seamless link between different types of network interfaces (e.g. copper and fiber, or vice versa)? Bridge Transceiver Active hub Managed switch

transceiver such as a GBIC and a SFP


Set pelajaran terkait

Abeka American Literature App Quiz HH

View Set

NUR 424 MEDSURG QUIZ on Immune Deficiency (chapter 36)

View Set

Nurse Practice Act and Legal Liability

View Set

Geology Chapter 7 - Sedimentary environments and rocks

View Set

Change Management - ITSM Fundamentals (Module 6)

View Set

WWCC Nursing Practice Calculations

View Set

Wireless Access Point Application

View Set