INWT 120 FINAL

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Listed below are several DNS record types. Match the record type on the left with its function on the right. DRAG/DROP

- Points a host name to an IPv4 address/A record - Provides alternate names to hosts that already have a host record/CNAME Record aka alias record - Points an IP address to a host name/PTR (reverse DNS record) - Points a hostname to an IPv6 address/AAAA - Id's servers that can be used to deliver mail/MX record (mail exchange)

You are investigating the use of website and URL content filtering to prevent users from visiting certain websites. Which benefits are the result of implementing this technology in your organization? (Choose two.) - Enforcing the organization's internet usage policy - An increase in bandwidth availability - Preventing emails containing threats - Identifying and disposing of infected content - Preventing phishing attempts

1) Enforcing the organization's internet usage policy 2). An increase in bandwidth availability

Which of the following connectors are used with fiber optic cables and include both cables in a single connector? (Select two.) - LC - SC - MTRJ - BNC

1) LC 2). MTRJ

You have a computer that is connected to the internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select all that apply.) - 10.0.12.15 - 127.0.0.1 - 192.168.12.253 - 224.15.166.12 - 172.18.188.67 - 240.12.188.1 - 32.188.99.10

1). 10.0.12.15 2). 192.168.12.253

You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings, some of which are around 300 meters apart. Multi-mode fiber optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guidelines? (Choose two.) - 10GBaseSR - 10BaseFL - 10GBaseER - 1000BaseSX - 1000BaseCX - 1000BaseT

1). 10GBaseSR 2). 1000BaseSX

Which of the following is a valid IPv4 address? (Select two.) - 256.0.0.1 - 10.384.0.3 - 192.168.1.512 - 172.16.1.26 - 2.2.2.2 - 1.254.1.1024 - 254.7.1.417

1). 172.16.1.26 2). 2.2.2.2

What is the network address and subnet mask used by APIPA? (Select two.) - 169.254.0.0 - 255.255.0.0 - 255.0.0.0 - 255.255.255.0 - 169.255.0.0 - 169.0.250.0

1). 255.255.0.0 2). 169.255.0.0

Which of the following are not valid IP addresses? (Select three.) - 257.0.122.55 - 122.0.0.0 - 1.55.254.3 - 145.8.260.7 - 132.64.32.8 - 116.0.0.116 - 45.22.156.256

1). 257.0.122.55 2). 145.8.260.7 3). 45.22.156.256 (Octet must be Between 1 - 255)

Which of the following functions are performed by proxies? - Block employees from accessing certain websites - Cache web pages - Block unwanted packets from entering your private network - Store client files - Filter unwanted email - Give users the ability to participate in real-time text- based internet discussions

1). Block employees from accessing certain websites 2). Cache web pages

You recently installed a new all-in-one security appliance in a remote office. You are in the process of configuring the device. You need to: ¥ Increase the security of the device. ¥ Enable remote management from the main office. ¥ Allow users to be managed through Active Directory. You want to configure the device so you can access it from the main office. You also want to make sure the device is as secure as possible. Which of the following tasks should you carry out? (Select two.) - Change the default username and password. - Deny login from the device's WAN interface. - Configure the device's authentication type to use Active Directory. - Deny login from all external IP addresses. - Create an Active Directory user group and add all users to the group.

1). Change the default username and password. 2). Configure the device's authentication type to use Active Directory.

Which of the following functions are performed by the OSI Transport layer? (Select three.) - Data segmentation and reassembly - Reliable message delivery - End-to-end flow control - Consistent data formatting between dissimilar systems - Control media access, logical topology, and device identification - Format packets for delivery through the media - Path identification and selection

1). Data segmentation and reassembly 2). Reliable message delivery 3). End-to-end flow control

Which of the following statements describe how VLANs affect broadcast traffic within an internetwork? (Select two.) - Devices on the same VLAN have the same subnet address. - Broadcast traffic is transmitted to all devices on all VLANs. - Broadcast traffic is only transmitted on VLAN1. - Devices on separate VLANs share the same subnet address. - Broadcast traffic is transmitted only within a VLAN

1). Devices on the same VLAN have the same subnet address. 2). Broadcast traffic is transmitted only within a VLAN

Which of the following are advantages of using fiber optic cabling for a network? (Select two.) - Greater cable distances without a repeater - Immunity to electromagnetic interference - Lower installation cost - No special training or equipment is required

1). Greater cable distances without a repeater 2). Immunity to electromagnetic interference

Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs? (Select two.) - Increased number of broadcast domains - Allowing broadcast traffic between subnets - Increased number of collision domains - Increased security - Redundant paths between two hosts

1). Increased number of broadcast domains 2). Increased security

Which of the following routing protocols are classified as link state routing protocols? (Select two.) - OSPF - IS-IS - RIP - RIPv2 - EIGRP

1). OSPF 2). IS-IS

Which pins in an RJ45 connector are used to transmit data when used on a 100BaseT Ethernet network? (Select two.) - Pin 1 - Pin 2 - Pin 3 - Pin 4 - Pin 5 - Pin 6 - Pin 7 - Pin 8

1). Pin 1 2). Pin 2

Which of the following are advantages of using the spanning tree protocol (STP) in network segmented bridges? (Select three.) - Prevents switching loops from forming. - Lets you provide redundancy by using more than one connection between devices, making your network more reliable. - Identifies the optimal path between network devices. - Calculates all the possible paths through the network and performs load balancing. - Minimizes the convergence time required for bridges to share network information.

1). Prevents switching loops from forming. 2). Lets you provide redundancy by using more than one connection between devices, making your network more reliable. 3). Identifies the optimal path between network devices.

Which of the following tasks do routers perform? (Select two.) - Route data based on logical network addresses. - Maintain information about paths through an internetwork. - Control access to the transmission media. - Identify devices through hardware addresses. - Multiplex signals onto the same transmission media. - Route data based on hardware device addresses.

1). Route data based on logical network addresses. 2). Maintain information about paths through an internetwork.

You would like to implement 10 Gbps Ethernet over a distance of 1 kilometer or greater. Which of the following would be the minimum requirement for the implementation? (Select two.) - Single-mode fiber - Multi-mode fiber - 10GBaseSR standards - 10GBaseLR standards - 10GBaseER standards

1). Single-mode fiber 2). 10GBaseLR standards

Which of the following features are common functions of an all-in-one security appliance? (Select two.) - Spam filtering - Bandwidth shaping - Password complexity - Content caching - Quality of Service

1). Spam Filtering 2). Bandwidth Shaping

After installing a new DHCP server on the network, you need to verify that network devices are receiving IP addressing via DHCP. You reboot a Windows 10 client system and using the ipconfig /all command, receive the following information: Ethernet adapter Local Area Connection 1: Description . . . . . . . . . . . : Intel(R) Ethernet Connection Physical Address. . . . . . . . . : 02-00-4C-4F-3F-50 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Autoconfiguration IPv4 Address. . : 169.254.25.129 Subnet Mask . . . . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . . . . : DNS Servers . . . . . . . . . . . : Which of the following statements are true? (Select two). - DHCP is disabled on the client system. - The network is configured to use static IP addressing. - The client system is configured to use DHCP. - The client system is unable to reach the DHCP server. - The default gateway address needs to point to the DHCP server. - The network subnet mask is incorrect

1). The client system is configured to use DHCP. 2). The client system is unable to reach the DHCP server.

Which of the following are true regarding using multiple VLANs on a single switch? (Select two.) - The number of collision domains remains the same. - The number of broadcast domains remains the same. - The number of broadcast domains increases. - The number of broadcast domains decreases. - The number of collision domains increases. - The number of collision domains decreases.

1). The number of collision domains remains the same. 2). The number of broadcast domains increases.

You are troubleshooting a network connectivity issue on a Unix system. You are able to connect to remote systems by using their IP address, but unable to connect using the host name. You check the TCP/IP configuration and note that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Choose two.) - dig - nslookup - tracert - traceroute

1). dig 2). nslookup

Your office has both Windows and Linux computers. You want to be able to view the address of the default gateway that a computer is using. Which of the following utilities could you use? (Select two.) - ipconfig - route - host - dig - netstat

1). ipconfig 2). ifconfig/host?

What is the binary format for the following decimal IP address? 131.9.202.111

10000011.00001001.11001010.01101111

Which of the following use the CSMA/CD access method? - 1000BaseT - 10BaseFL - Token Ring - FDDI

1000BaseT

Which of the following IP addresses is a valid IP address for a host on a public network? - 10.3.125.2 - 172.16.254.12 - 192.168.16.45 - 142.15.6.1

142.15.6.1

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server? - 10.0.0.1 - 10.255.255.254 - 172.16.0.1 - 172.31.255.254 - 169.254.0.1 - 169.254.255.254 - 192.168.0.1 - 192.168.255.254

169.254.0.1 - 169.254.255.254 (Microsoft APIPA range (they automatically assign themselves when they can't find a DHCP server). Never used for valid network systems, basically just a warning sign for you to figure out what the problem is. Helpful for troubleshooting.)

Which of the following IP address ranges is reserved for automatic private IP addressing? - 192.168.0.0 - 192.168.255.254 - 169.168.0.1 - 169.168.255.255 - 192.168.0.1 - 192.168.254.255 - 169.254.0.1 - 169.254.255.254 - 169.192.0.0 - 169.192.254.255

169.254.0.1 - 169.254.255.254 (APIPA)

Consider the following output from a dig command run on a Linux system. ; <<>> DiG 8.2 <<>> westsim111.com ;;res options:init recurs defnam dnsrch ;;got answer: ;;->>HEADER<<-opcode:QUERY, status: NOERROR, id:4 ;;flags: qr rd ra; QUERY:1, ANSWER:1, AUTHORITY:2, ADDITIONAL:0 ;;QUERY SECTION: ;; westsim111.com, type = A, class = IN ;;ANSWER SECTION: westsim111.com. 7h33m IN A 76.141.43.129 ;;AUTHORITY SECTION: westsim111.com. 7h33m IN NS dns1.deriatct111.com. westsim111.com. 7h33m IN NS dns2.deriatct222.com. ;;Total query time: 78 msec ;;FROM: localhost.localdomain to SERVER:default -- 202.64.49.150 ;;WHEN: Tue Feb 16 23:21:24 2005 ;;MSG SIZE sent: 30 rcvd:103 What is the IP address of the DNS server that performed this name resolution? - 76.141.43.129 - 202.64.49.150 - 16.23.21.24 - 192.168.1.100

202.64.49.150

Your network follows the 100BaseFX specifications for Fast Ethernet and uses half-duplex multi-mode cable. What is the maximum cable segment length allowed? - 100 meters - 412 meters - 550 meters - 1,000 meters - 2,000 meters

412 meters

You want to maintain tight security on your internal network, so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable? - 53 - 80 - 42 - 443 - 21

53

Select the statement that best describes a broadcast storm. - A broadcast storm occurs when a network server loses its connection to the network, and the disconnected cable sends feedback messages that overwhelm the network cable capacity. - A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth. - A broadcast storm occurs when the amount of electrical interference on a cable exceeds acceptable levels, broadcasting a storm of noise and preventing accurate data transfer. - A broadcast storm occurs when the level of TCP/IP transfers overwhelm a gateway.

A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth.

An all-in-one security appliance is best suited for which type of implementation? - A remote office with no on-site technician. - An office with a dedicated network closet. - A company that transmits large amounts of time- sensitive data. - A credit card company that stores customer data.

A remote office with no on-site technician.

You have a network connected using a physical STAR topology. One of the drop cables connecting a workstation has been removed. Which of the following best describes what affect this will have on network communications? - No devices will be able to communicate. - All devices except the device connected with the drop cable will be able to communicate. - Devices on one side of the break will be able to communicate with each other; devices on the other side of the break will be able to communicate with each other. - Devices on one side of the break will be able to communicate with each other; devices on the other side will not be able to communicate. - All devices will be able to communicate.

All devices except the device connected with the drop cable will be able to communicate.

Which of the following is a characteristic of static routing when compared to dynamic routing? - Routers use the hop count to identify the distance to a destination network. - All routes must be manually updated on the router. - Routers send packets for destination networks to the next hop router. - Routers can only use static routing when not connected to the internet.

All routes must be manually updated on the router.

Consider the following IP addresses. 1. 124.77.8.5 2. 131.11.0.9 3. 190.66.250.10 4. 196.5.89.44 Which list represents the IP address class of each listed IP address?

Answer 1. - Class A, Class B, Class B, Class C

Which of the following routing protocols is used by routers on the internet for learning and sharing routes? - OSPF - IS-IS - EIGRP - BGP - RIP

BGP

The media access control method of all Ethernet networks is __________. - CSMA/CD - - CSMA/CA - Token passing - Polling

CSMA/CD (with collision detection)

What is the minimum cable specification that supports 1000 Mbps Ethernet? Cat 3 Cat 4 Cat 5 - never! Limits you to 100 mgps Cat 5e Cat 6 - bare minimum for cable plan infrastructure Cat 7

Cat 5e

You manage a network with a single switch. On each switch port, a hub connects multiple devices to the switch. Which condition are you most likely to experience on the network? - Collisions - Crosstalk - Attenuation - Echo - Interference

Collisions

Which of the following prevents access based on website ratings and classifications? - Content filter - Packet-filtering firewall - DMZ - NIDS

Content Filter

You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use? - Rollover - Crossover - Straight-through - Loopback

Crossover

You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com. Which device would you use? - DNS server - Bandwidth shaper - IDS - IPS - Load balancer

DNS Server

In the output of the netstat command, you notice that a remote system has made a connection to your Windows Server 2016 system using TCP/IP port 21. Which of the following actions is the remote system most likely performing? - Downloading a file - Downloading email - Downloading a web page - Performing a name resolution request

Downloading a file

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?

Drop the packet

Which of the following is a valid IPv6 address? - 199.12.254.11 - FEC0::AB:9007 - FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A - FEC0:AB98::A7::9845:4567 - FEC0:AB04:899A

FEC0::AB:9007

You want to allow users to download files from a server running the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability? - TCP - FTP - IP - TFTP - HTTP - HTML

FTP

Ethernet 100BaseFX networks use what type of cabling? - Fiber optic - Coaxial - Unshielded twisted pair - Shielded twisted pair

Fiber optic

Which of the following is the best device to deploy to protect your private network from a public untrusted network? - Firewall - Router - Hub - Gateway

Firewall

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?

Forward the packet to the next hop router specified by the route to network 0.0.0.0.

Which protocol is used on the World Wide Web to transmit web pages to web browsers? - HTTP - HTML - SMTP - NNTP

HTTP

Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers? - If the network has over 15 hops. - If the network is connected to the Internet using public addressing. - If the network is connected to the Internet using multiple ISPs. - If the network has over 15 areas and uses IPv6.

If the network is connected to the Internet using multiple ISPs

At which of the following OSI layers does a router operate? - Layer 1 - Layer 2 - Layer 3 - Layer 4

Layer 3 (network layer)

Which of the following address types is shared by multiple hosts and used to form groups of computers that receive the same data stream? - Unicast - Multicast - Broadcast - Simplex - Half-duplex

Multicast

Which type of address is the IP address 232.111.255.250? - Unicast - Multicast - Broadcast - Private

Multicast

You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use? - NTP - SNMP - SMTP - NNTP - SAP

NTP

You have a network connected using a physical BUS topology. One of the cables that connects a workstation to the bus breaks. Which of the following best describes what effect this will have on network communications? - No devices will be able to communicate. - All devices except the device connected with the drop cable will be able to communicate. - Devices on one side of the break will be able to communicate with each other; devices on the other side of the break will be able to communicate with each other. - Devices on one side of the break will be able to communicate with each other; devices on the other side will not be able to communicate. - All devices will be able to communicate.

No devices will be able to communicate.

You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single-mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You connect each module to the switch with 1-meter multimode patch cables. Will this implementation work?

No. You shouldn't use multi-mode patch cables with single-mode GBIC modules.

Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)? - RIP - EIGRP - OSPF - IS-IS

OSPF

Which of the following best describes OSPF? - OSPF is a classless distance vector routing protocol. - OSPF is a classful distance vector routing protocol. - OSPF is a classless link state routing protocol. - OSPF is a classful link state routing protocol.

OSPF is a classless link state routing protocol.

Which of the following is a firewall function? - Packet filtering - FTP hosting - Encrypting - Frame filtering - Protocol conversion

Packet filtering

You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the internet. Why can't you access the server? - Private addresses are not accessible through the internet. - The server has been assigned a multicast address. - The server must have an entry on a DNS server that exists on the internet. - The server isn't using the default subnet mask.

Private addresses are not accessible through the internet.

Your computer has an IP address of 161.13.5.15. Your computer is on a: - Public network - Private network - Class C network - Multi-cast network

Public network

Which of the following protocols has a limit of 15 hops between any two networks? - RIP - EIGRP - OSPF - IS-IS - BGP

RIP

Which of the following statements about RIP is true? - RIP is the routing protocol used on the internet. - RIP is a link state routing protocol. - RIP uses hop counts as the cost metric. - RIP is suitable for large networks.

RIP uses hop counts as the cost metric.

Which of the following standards is typically used in a rollover cable? - RS232 - RG6 - RG58 - RJ11

RS232 (used to connect to a console port)

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents? (Select two.) - Router - Bridge - Switch - Gateway - Hub - Repeater

Repeater

Which of the following hardware devices links multiple networks and directs traffic between networks? - Router - Bridge - Hub - Repeater

Router

In the OSI model, what is the primary function of the Network layer? - Allows applications to establish, use, and end a connection - Transmits data frames - Ensures that packets are delivered with no loss or duplication - Routes messages between networks

Routes messages between networks

Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between the email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol will enable message exchange between systems? - SMTP - ICMP - IMAP4 - FTP - POP3

SMTP

An eight-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do? - Send the frame out all eight ports. - Send the frame out ports two through eight. - Send the frame out the destination port. - Drop the frame.

Send the frame out ports two through eight. (Will send to all since it doesn't know where to go "unknown unicast plumbing")

Of the following cables, which offer the best protection against EMI? - Cat 5 - Cat 5e - RG-6 - Single-mode fiber optic

Single-mode fiber optic

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches? - Trunking - Spanning tree - PoE - 802.1x - Bonding

Spanning Tree

You are configuring the DHCP Relay Agent role on a Windows server. Which of the following is a required step for the configuration? - Specify which server network interface the agent listens on for DHCP messages. - Use the ip helper-address command to specify the remote DHCP server. - Connect an RFC 1542 compliant router to the Windows server. - Configure the Windows server to be on the same subnet as the DHCP server.

Specify which server network interface the agent listens on for DHCP messages.

You can create a virtual LAN using which of the following? - Switch - Router - Gateway - Hub

Switch

Which of the following statements accurately describes a VLAN ID? - Switches append a VLAN ID to the header of each frame to identify the virtual network it belongs to. - VLAN IDs identify the VLAN where the frame originated so the receiving host can reply. - VLAN IDs are defined at the Network layer and help route the frame through the switch fabric. - VLAN IDs identify both the source and destination VLAN. They are like network addresses, except they exist at the Data Link layer.

Switches append a VLAN ID to the header of each frame to identify the virtual network it belongs to.

Which problem does the spanning tree protocol prevent? - Switching loops from developing when redundant paths are implemented between switches. - Buffer overflows by defining source-quench messages that a receiving device sends to the transmitting device. - Routing tables from becoming outdated by decreasing the convergence time on a network. - Packet blocking on backup bridge ports to allow switches to forward frames to all BPDUs.

Switching loops from developing when redundant paths are implemented between switches.

You are an application developer, and you are writing a program for exchanging video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol provides this capability? - TCP - UDP - IP - RIP - FTP - TFTP

TCP (has handshake process)

You are an administrator for a large company. You are setting up a computer at a worker's home so he can telecommute while he recovers from surgery. You want to connect to the UNIX server at the office to update his account information. Which utility should you use to accomplish this task? HE PROBABLY WON'T ASK!!!!!!!!!! - Telnet - Traceroute - FTP - Ping

Telnet - insecure practice, you should be using a VPN or SSH

A network is connected following the IEEE 802.3 specifications. Which of the following best describes when a device can transmit messages? - The device with the token can use the transmission media. - The device listens to determine if the transmission media is free. - The device is notified of its turn to send messages. - The device requests permission from a controlling device. - The device transmits whenever it is ready.

The device listens to determine if the transmission media is free. (CSMA/CD protocol)

What information does the next hop entry in a routing table identify?

The first router in the path to the destination network.

Which device sends signals from a computer onto a network? - Transceiver - Router - Cable - Gateway

Transceiver (network card)

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch? - Trunk ports. - Uplink ports. - Any port not assigned to a VLAN. - Gigabit and higher Ethernet ports. - Each port can only be a member of a single VLAN.

Trunk ports (The port that carries traffic from one switch to a network device is a trunk port)

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches? - Trunking - Spanning tree - PoE - 802.1x - Bonding

Trunking (combining multiple VLANS into a single port)

Which type of address is the IP address 198.162.12.254/24? - Unicast - Broadcast - Multicast - Private

Unicast

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement? - Port authentication - VLANs - Spanning tree - PoE

VLANs (ports are on dedicated VLANS for guest internet access)

How do switches and bridges learn where devices are located on a network? - When a frame enters a port, the destination MAC address is copied from frame header. - When a frame enters a port, the source MAC address is copied from the frame header. - When a frame enters a port, the source IP address is copied from the frame header. - When a frame enters a port, the destination IP address is copied from the frame header.

When a frame enters a port, the source MAC address is copied from the frame header.

When would you typically use an RJ11 connector? - When using Cat 3 cables - When using Cat 5 or higher cables - When using RG-6 cables - When connecting a phone to a phone line - When using single-mode fiber optic cables - When using multi-mode fiber optic cables

When connecting a phone to a phone line (RJ45 - Ethernet) (RJ11 - phone lines)

Which of the following benefits apply only to creating VLANs with switches and not to segmenting the network with regular switches? - You can create multiple collision domains. - You can create multiple broadcast domains. - You can provide guaranteed bandwidth between two devices. - You can segment the network based on physical location.

You can create multiple broadcast domains.

You are implementing a DHCP server for your segment. Your segment's IP address is 192.168.1.0. Your default gateway address is 192.168.1.254. Your DNS server address is 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments. You configured the 03 Router option on your DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP addressing information dynamically, your users complain that they are unable to access websites on the internet. How can you resolve this problem?

You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06).

Why might you use an RJ11 connector? - You want to connect the 10BaseT network card in your computer to a switch. - You want to connect your computer to the internet with a DSL modem. - You want to upgrade your 10BaseT network to 100BaseTX. - You want to test a network cable to see if there is a break in the line.

You want to connect your computer to the internet with a DSL modem.

You work in an office that uses Linux servers and Windows servers. The network uses both the TCP/IP protocol. The Linux server is used as an FTP server. Today you have received several calls from people who are unable to contact the Linux server at its known IP address. You are sitting at the Linux server and want to check its IP address. Which command should you use? - ipconfig - ifconfig - winipcfg - route

ifconfig

Your computer is sharing information with a remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection? - netstat - nbtstat - ipconfig - arp - ping

netstat

Which command displays network activity statistics for TCP, UDP, and IP? - netstat-s - telnet - nbtstat -s - nslookup - ping -s

netstat-s

Mary calls to tell you that she can't connect to an intranet server called WebSrv1. From her computer, you ping the server's IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem? - nslookup - nbtstat - arp - netstat - tracert

nslookup

You work in an office that uses Linux servers and Windows servers. The network uses the TCP/IP protocol. You are sitting at a workstation that uses Windows 10. An application you are using is unable to contact a Windows server named FileSrv2. Which command can you use to determine whether your computer can still contact the server? - ping - tracert - nwlookup - arp

ping

Which of the following commands would display the output shown here? (BLACK GRAPHIC)

route print

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. The office has two Windows 2000 servers, two UNIX servers, one Windows NT server, 90 Windows 98 clients, 40 Windows 2000 Professional clients, and five Macintosh clients. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is working properly? - tracert - netstat - nbtstat - nslookup

tracert


Set pelajaran terkait

Advanced Multiplication Table (50 x 50)

View Set

Ch.4 quiz: Social structure & social integration

View Set

CHAPTER 5 Cybersecurity and Risk Management Technology

View Set

Unit 1: Human Ingenuity vocabulary

View Set

1968: A Tumultuous Year Guided Reading

View Set

Nursing 115 Comprehensive Study Guide 1

View Set