Learn 1.3 - CompTIA CertMaster

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A network uses a 10GBASE Ethernet solution. A switch on the network does not support Power over Ethernet (PoE). A network manager adds a power injector. Analyze POE and determine which pairs the network manager can use for the power injector. (Select two) A. 1/2 B. 3/6 C. 4/5 D. 7/8

A and B. 1/2 and 3/6 If a switch does not support Power over Ethernet (PoE), a device called a power injector can be used. There are two modes, Mode A and Mode B, that can be used for this solution. Gigabit Ethernet only uses the Mode A method (also called phantom power). The scenario uses a 10GBASE Ethernet solution which requires the Mode A method. Power runs over pairs 1/2 and 3/6 for the Mode A method.

A network manager adds a power injector to a switch that does not support Power over Ethernet (PoE). The only option available to the network manager is to use phantom power for the injector. Evaluate the characteristics of PoE and decide which pairs the network manager will use. (Select two). A. 1/2 B. 4/5 C. 3/6 D. 7/8

A and C: 1/2 and 3/6 If a switch does not support Power over Ethernet (PoE), a device called a power injector can be used. There are two modes, Mode A and Mode B, that can be used for this solution. Gigabit Ethernet only uses the Mode A method (also called phantom power). The scenario uses a 10GBASE Ethernet solution which requires the Mode A method. Power runs over pairs 1/2 and 3/6 for the Mode A method. *** I DO NOT UNDERSTAND THIS ***

An Ethernet frame is transmitting across the network. A network manager uses the Wireshark packet capture application to view the upper limit of the payload in the frame. Evaluate the format of an Ethernet frame and determine where the network manager will locate this information. A. Maximum Transmissions Unit (MTU) B. Error checking C. Addressing D. Preamble

A. Maximum Transmission Unit (MTU) The Maximum Transmission Unit (MTU) is the upper limit of the payload in an Ethernet frame. The official 802.3 standard defines a 2-byte field to specify the size of the data field or payload. The payload can normally be between 46 and 1500 bytes.

A host uses Internet Protocol version 6 (IPv6). The host sends a packet over the Internet. The IPv6 packets insert into Internet Protocol version 4 (IPv4) packets. The packets route over the IPv4 network to their destination. What is providing this function? A. Tunneling B. Dual-stack C. Multicast addressing D. Unique Local Addressing (ULA)

A. Tunneling Tunneling is an alternative to dual-stack routing. Tunneling can be used to deliver Internet Protocol version 6 (IPv6) packets across the Internet Protocol version 4 (IPv4) Internet. The IPv6 packets are inserted into IPv4 packets and routed over the IPv4 network to their destination. Tip: Imagine IPv6 is above ground and IPv4 is underground. In order for IPv6 to route packets through IPv4 it must go through an IPv4 TUNNEL to reach it's destination

What technology uses a router to rewrite an Internet Protocol version 6 (IPv6) packet to an Internet Protocol version 4 (IPv4) packet within the same network? A. IPv6 Tunneling B. Dual-stack C. Neighbor Discovery (ND) D. Router Advertisement (RA)

B. Dual-stack Dual-stack hosts can run both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) simultaneously and communicate with devices configured with either type of address. One technology is Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) which uses a dual-stack router to rewrite an IPv6 packet to an IPv4 packet. Tip: Two books in the same library that can translate each other's text

A host uses Internet Protocol version 6 (IPv6). The host sends a packet to another host and a router informs the host of a better route to take. Which protocol provides this function? A. Router Advertisement (RA) B. Neighbor Discovery Protocol (ND) C. Dynamic Host Configuration Protocol (DHCP) D. Dual-stack

B. Neighbor Discovery Protocol (ND) The Neighbor Discovery Protocol's (ND) main functions include redirection, which enables a router to inform a host of a better route to a particular destination.

What implementation will provide the ability for one host to forward information to another using any available path? A. Distributed switching B. Packet switching C. Network nodes D. Circuit-switched

B. Packet switching Packet switching provides the ability for one host to forward information to another using any available path.

What will cause a switch to act like a hub and transmit a frame out of all ports, except the source port? A. When capturing the analyzing network traffic occurs B. When the MAC address table cannot find the MAC address C. When frames begin to circulate the network perpetually D. When the bridges in a network organize themselves into a hierarchy

B. When the MAC address table cannot find the MAC address If a Media Access Control (MAC) address cannot be found in the MAC address table, then the switch acts like a hub and transmits the frame out of all of the ports, except for the source port.

Compare and differentiate the features of tagged and untagged ports. (Select two) A. A switch receiving a tagged frame on an access port will block the frame. B. An untagged port will normally be one that is operating as a trunk C. A frame will get tagged if it goes over a trunk port. D. A frame with an address to a port in the same Virtual Local Area Network (VLAN) is untagged.

C. A frame will get tagged if it goes over a trunk port and D. A frame with an address to a port in the same Virtual Local Area Network (VLAN) is untagged Why? (to C) If a frame needs to be transported over a trunk link, the switch adds the relevant 802.1Q tag to identify the VLAN, and then forwards the frame over the trunk port. Why? (to D): If a is frame addressed to a port in the same Virtual Local Area Network (VLAN) on the same switch, no tag needs to be added to the frame.

Simulate the use of Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). A. Two nodes send communications on the same media and the node sends a jam signal B. Multiple layer 2 broadcast domains are on the same switch C. A node waits until media is clear before transmitting packets D. Nodes share the same broadcast address

C. A node waits until media is clear before transmitting packets Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol uses schemes such as "request to send" to gain access to the media. Nodes listen to the media before transmitting, and transmit when the media is clear. A node wanting to transmit, but detecting activity, must wait and try later.

Simulate the use of port forwarding on a network. A. A company has a single public Internet Protocol (IP) address that forwards packets to private IP addresses within the network B. A network has a 1:1 mapping between private network address and public addresses C. A router, configured like a web server, accepts incoming packets and changes the destination address to a designated host D. A firewall allows a host access based on the Internet Protocol (IP) address and the port the host uses.

C. A router, configured like a web server accepts incoming packets and changes the destination address to a designated host Port forwarding uses a router's public address for something like a web server. The router forwards incoming requests to a different Internet Protocol (IP) address. Port forwarding means that the router takes requests from the Internet for a specific application and changes the destination address to send the packet to a designated host.

The same hub has Host A1 and Host B1 connected. Host A1 sends a request to communicate with Host C2. Host B1 is communicating with Host C3. There is a delay in communications between Hosts A1 and C2, until the media is clear. Which Ethernet Protocol is providing this function? A. Carrier Sense Multiple Access/Collision Detection (CSMA/CD) B. Virtual Local Area Network (VLAN) C. Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) D. Broadcast Domain

C. Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol uses schemes such as "request to send" to gain access to the media. Nodes listen to the media before transmitting, and transmit when the media is clear. A node wanting to transmit, but detecting activity, must wait and try later.

Which routing protocol uses the destination address 0.0.0.0/0? A. Static B. Dynamic C. Default D. Learned

C. Default A default route is a type of static route that identifies the next hop router for an unknown destination. The destination address 0.0.0.0/0 is used for Internet Protocol version 4 (IPv4) and the address ::/0 is used for Internet Protocol version 6 (IPv6).

A network uses a dynamic routing protocol that requires the administrator to provide weighted elements such as reliability, bandwidth, and load. Which routing protocol is in use? A. Routing Information Protocol (RIP) B. Open Shortest Path First (OSPF) C. Enhanced Interior Gateway Routing (EIGRP) D. Border Gateway Protocol (BGP)

C. Enhanced Interior Gateway Routing The Enhanced Interior Gateway Routing Protocol (EIGRP) is a distance vector-based routing protocol and uses a metric composed of several administrator weighted elements.

A network manager cannot communicate with a system on the network that has an Internet Protocol (IP) address of 192.150.060.024. The network manager enters the command arp -a 192.150.060.024. What will be the result of this command? A. It will add an entry to the Address Resolution Protocol (ARP) table B. It will delete the entry for the IP address in the Address Resolution Protocol (ARP) table. C. It will display the Address Resolution Protocol (ARP) cache contents for the IP address D. An error result will occur due to an invalid command

C. It will display the Address Resolution Protocol (ARP) cache contents for the IP address The command arp -a 192.150.060.024 will provide the contents of the Address Resolution Protocol (ARP) cache. The command will only show the contents for this Internet Protocol (IP) address. The command can also be used without an IP address to view the entire table.

A system uses a private address to send a packet within the internal network. The address is ff02::1. Compare private address types and determine what type of address the system is using. A. Broadcast B. Unicast C. Multicast D. Internet Protocol (IP)

C. Multicast A multicast address identifies multiple network interfaces. Unlike Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6) must support multicast. The first 8 bits indicate the address is within the multicast scope (1111 1111 or ff). The address ff02::1 has a target of all link-local nodes. ***I DO NOT UNDERSTAND THIS***

An Ethernet frame is transmitting across the network. A network manager uses the Wireshark packet capture application to view the Maximum Transmission Unit (MTU). What information will the network manager gain? A. Verification that the contents of the frame matches at the sending and receiving node. B. The Media Access Control (MAC) addresses of the sending and receiving nodes C. The upper limit of the payload in the frame D. The Start Frame Delimiter (SFD) for clock synchronization

C. The upper limit of the payload in the frame The Maximum Transmission Unit (MTU) is the upper limit of the payload in an Ethernet frame. The official 802.3 standard defines a 2-byte field to specify the size of the data field or payload. The payload can normally be between 46 and 1500 bytes.

A network manager adds a new switch to the network. The switch will interconnect with the other switches already in place. What does the network manager need to complete the interconnection between switches? A. Access Port B. Tagged Port C. Trunks D. Virtual Local Area Network (VLAN) tag

C. Trunks A trunk is used for interconnections between switches on large networks. Each switch will be configured as a trunk port for this purpose.

A network manager is designing a network for a new company. The company will have over 300 hosts and will interconnect multiple switches to build the network fabric. What will the network manager use to connect the switches? A. Virtual Local Area Network (VLAN) tag B. Tagged port C. Trunks D. Access port

C. Trunks A trunk is used for interconnections between switches on large networks. Each switch will be configured as a trunk port for this purpose.

A network manager cannot communicate with a system on the network that has an Internet Protocol (IP) address of 192.150.060.024. The manager uses the ping command and can reach the IP address. Recommend a command the network manager can use for troubleshooting the issue. A. arp -d 192.150.060.024 B. arp -s 192.150.060.024 C. arp -a 192.150.060.024 D. arp 192.150.060.024

C. arp -a 192.150.060.024 It is possible that two systems on the network have the same Internet Protocol (IP) address and the Address Resolution Protocol (ARP) table has the other system stored in the cache. This can be verified by using the command arp -a 192.150.060.024 and reviewing the returned Media Access Control (MAC) address.

A system sends a message to all link-local nodes via a multicast address. Compare private address types and conclude which address the system will use. A. ff:ff:ff:ff:ff:ff B. 00.5a:3b:08:5c:02 C. ff02:11 D. 192.152.160.120

C. ff02:11 A multicast address identifies multiple network interfaces. Unlike Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6) must support multicast. The first 8 bits indicate the address is within the multicast scope (1111 1111 or ff). The address ff02::1 has a target of all link-local nodes.

A packet passes through a router and the router classifies the packet using the Type of Service field. The classification prioritizes delivery. What framework provides this service? A. Traffic shaping B. Class of Service (CoS) C. Quality of Service (QoS) D. Differentiated Services (DiffServ)

D. Differentiated Services (DiffServ) The Differentiated Services (DiffServ) framework classifies each packet passing through a device. DiffServ is a service tagging mechanism. It uses the Type of Service field in the Internet Protocol version 4 (IPv4) header and renames it the Differentiated Services field.

Identify the function that copies packets sent to one or more source ports to a destination port. A. Bridge Protocol Data Unit (BPDU) B. Spanning Tree C. Switching loops D. Port mirroring

D. Port mirroring Port mirroring copies all of the packets sent to one or more source ports to a mirror (or destination) port. On a Cisco switch, this is referred to as a Switched Port Analyzer (SPAN).

What allows fine-grained control over traffic parameters? A. Class of Server (Cos) B. Differentiated Services (DiffServ) C. Traffic Shaping D. Quality of Server (QoS)

D. Quality of Service (QoS) Quality of Service (QoS) allows fine-grained control over traffic parameters. Protocols, such as Multiprotocol Label Switching (MPLS), provides QoS. MPLS can reserve the required bandwidth and pre-determine statistics when configuring the link.

A network manager configures a dynamic routing protocol on the network. The protocol considers only one route to a given destination network. To prevent looping, the protocol limits the number of hops to 15. Compare dynamic routing protocols to determine which protocol the manager is implementing. A. Enhanced Interior Gateway Routing Protocol (EIGRP) B. Open Shortest Path First (OSPF) Protocol C. Border Gateway Protocol (BGP) D. Routing Information Protocol (RIP)

D. Routing Information Protocol (RIP) Routing Information Protocol (RIP) is a distance vector-based routing protocol. It uses a hop count metric to determine the distance to the destination network. To help prevent looping, the maximum hop count allowed is 15.

What application can define policy decisions on the control plane? A. Storage Area Network (SAN) B. Distributed switching C. Network Controller D. Software Defined Networking (SDN)

D. Software Defined Networking (SDN) A Software Defined Networking (SDN) application, or suite of applications, can be used to define policy decisions on the control plane.

A network manager configures a Routing Information Protocol (RIP) on the network. Consider the types of dynamic routing protocols to determine what features the protocol will provide. A. The protocol will perform routing between domains and is the routing protocol Internet Service Providers (ISPs) use. B. The protocol will group networks, their connected hosts and routers within an autonomous system C. The protocol will use a metric composed of several administrator weighted elements D. The protocol will consider only one route to a given destination network

D. The protocol will consider only one route to a given destination network Routing Information Protocol (RIP) is a distance vector-based routing protocol. It uses a hop count metric to determine the distance to the destination network. To help prevent looping, the maximum hop count allowed is 15.

A user goes to the website www.shopping.com. A bastion host reviews the request to enter the site to verify the safety of the request. What has the company established to enable clients access to data on the private system without compromising the security of the internal network?

Demilitarized Zone (DMZ) The company is using a Demilitarized Zone (DMZ), also referred to as a perimeter network. The idea of a DMZ is that traffic cannot pass through it directly. If communication is required between hosts on either side of a DMZ, a bastion host will take the request and check it.

Host A communicates with Host B via a web application. A router on Host B's network is configured to accept incoming requests for this application. The router takes the request over port 80 and changes the destination address to route the packet to Host B. What does this scenario simulate?

Port forwarding Port forwarding uses a router's public address for something like a web server. The router forwards incoming requests to a different Internet Protocol (IP) address. Port forwarding means that the router takes requests from the Internet for a specific application and changes the destination address to send the packet to a designated host.


Set pelajaran terkait

BUS312: Ch.5: Consumer Markets and Buyer Behavior (REVIEW)

View Set

Major components of gastric juice

View Set

Science Chapter 14+15 / Matching

View Set

Study set 16 for RN NCLEX (Kaplan)

View Set

AP Psychology Segment 1 Exam Part 1

View Set

3-2 igneous rocks form from molten rock

View Set

Penny Review Chapter 8: Adrenal Glands

View Set