MTA Networking Fundamentals

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which subnet mask is valid? A. 255.255.255.240 B. 255.255.255.228 C. 255.255.255.164 D. 255.255.255.245

A. 255.255.255.240

The below protocol is used to automatically assign or configure an IP address to a client. DNS ARP RIP DHCP

(DHCP) is a network management protocol used on TCP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks

Which technology provides the highest bit rate? A. T1 B. El C. DS3 D. ISDN

C. DS3 A DS3 line (sometimes also referred to as T3) is a dedicated, high bandwidth, fiber circuit with a speed of 45 Mbps. Incorrect: Not A: T1, 1.544Mbps Not B: E1, 2.048Mbps Not D: SDN 30B+1D (all 64K) ~ E1: 1.930Mbps

At what layer in the OSI model are hardware addresses referenced? A. Network B. Application C. Data link D. Physical

C. Data link The data link layer is divided into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC). The LLC sublayer manages communications between devices over a single link of a network.

Two companies want to share data by using the Internet. Which type of network provides the solution? A. Ethernet B. Intranet C. Extranet D. Perimeter

C. Extranet An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.

What type of DNS record maps host names to addresses? A. Mail Exchanger (MX) DNS record B. Service (SRV) DNS record C. Host (A) DNS record D. Canonical (CNAME) DNS record

C. Host (A) DNS record

A node within a local area network (LAN) must have a network interface device and a: A. Network account B. Table of all network nodes C. Host address D. Resource to share

C. Host address In network addressing, the host address, or the host ID portion of an IP address, is the portion of the address used to identify hosts (any device requiring a Network Interface Card, such as a PC or networked printer) on the network.

A computer that has an IP address of 169.254.0.1 cannot access the network. Which of the following services should you confirm is available? A. WINS B. DNS C. DHCP D. TFTP

C. DHCP

A Media Access Control (MAC) address identifies a/an: A. UPnP device. B. Local broadcast domain. C. Network interface card (NIC). D. Local area network (LAN).

C. Network interface card (NIC).

Which command is used to verify that a server is connected to the network? A. IPCONFIG B. ROUTE C. PING D. CHECK

C. PING The ping command operates by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination computer and waiting for a response.

The subnet mask 255.255.255.240 can be written in slash notation as _______________ /30 /26 /28 /24

/28

Which if the below are loopback addresses. Choose all that apply. 128.0.0.1 127.0.0.1 127.31.0.1 192.127.0.0

127.0.0.1 127.31.0.1 The IP address range 127.0.0.0 - 127.255.255.255 is reserved for loopback, i.e. a Host's self-address, also known as localhost address. This loopback IP address is managed entirely by and within the operating system.

An IPv6 address is __________ in length 32 bit 64 byte 128 bts 128 bytes

128 bts Larger address space. The main advantage of IPv6 over IPv4 is its larger address space. The length of an IPv6 address is 128 bits, compared with 32 bits in IPv4.

Which of the below is a standard for Wireless devices? IEEE 802.1 q IEEE 802.3 IEEE 802.11 IEEE 802.3ab

802.11 IEEE 802.11 is a set of media access control and physical layer specifications for implementing wireless local area network computer communication in the 900 MHz and 2.4, 3.6, 5, and 60 GHz frequency bands.

The 802.3an Ethernet network runs at a speed of ____________ 10Mbps 100 Mbps 10 Gbps 1 Gbps

802.3an 2006 10GBASE-T 10 Gbit/s (1,250 MB/s) Ethernet over unshielded twisted pair (UTP)

Which network does the IP address 220.100.100.100 belong to? A. 220.100.100.0/24 B. 220.100.100.1/24 C. 255.255.255.0/24 D. 255.255.255.1/24

A. 220.100.100.0/24

In local area network (LAN) topologies, the primary media access methods are: (Choose two.) A. Contention B. Negotiation C. Kerberos D. Token passing

A. Contention D. Token passing Media contention occurs when two or more network devices have data to send at the same time. Because multiple devices cannot talk on the network simultaneously, some type of method must be used to allow one device access to the network media at a time. This is done in two main ways: carrier sense multiple access collision detect (CSMA/CD) and token passing.

A VPN is a/an: A. Encrypted connection across the Internet. B. Virtual network within your local area network (LAN). C. Communication tunnel between VLANs. D. Personal network for your use only.

A. Encrypted connection across the Internet. VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

The command-line tool used to list a host's active incoming connections is: A. NETSTAT B. IPCONFIG C. NSLOOKUP D. PING

A. NETSTAT, In computing, netstat is a command-line network utility tool that displays network connections for the Transmission Control Protocol, routing tables, and a number of network interface and network protocol statistics. Function: Print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships

Which of the following is a Layer 2 WAN protocol? A. Point-to-Point Protocol (PPP) B. Simple Network Management Protocol (SNMP) C. Transmission Control Protocol (TCP) D. Internet Protocol (IP)

A. Point-to-Point Protocol (PPP) Data Link Layer: WAN Protocols: HDLC, PPP, Frame Relay, Ethernet WANs, MPLS VSAT, Broadband

In addition to switching, multilayer switches also: A. Provide Layer 3 routing functions. B. Interface with CAT3, CATS, CAT5e, and fiber optics. C. Support 10 MB, 100 MB, and 1 GB local area network (LAN) ports. D. Operate by using only Layer 1 and 2 protocols.

A. Provide Layer 3 routing functions.

Which type of network covers the broadest area? A. WAN B. CAN C. LAN D. PAN

A. WAN A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines.

The protocol that maps IP addresses to a Media Access Control (MAC) address is: A. Internet Message Access Protocol (IMAP). B. Dynamic Host Configuration Protocol (DHCP). C. Routing Information Protocol (RIP). D. User Datagram Protocol (UDP). E. Address Resolution Protocol (ARP).

Address Resolution Protocol (ARP) The Address Resolution Protocol is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given network layer address, typically an IPv4 address.

Once the DHC server is installed in Windows Server, we activate it and one more step needs to be done. What is that important step? Get scope registered Authorized the server Get clients registered Get DNS IP registered

Authorized the server

Which two are published IEEE 802.11 wireless transmission standards? (Choose two.) A. 802.1 If B. 802.11g C. 802.11k D. 802.11m E. 802.11n

B. 802.11g E. 802.11n The 802.11 family consists of a series of half-duplex over-the-air modulation techniques that use the same basic protocol. 802.11-1997 was the first wireless networking standard in the family, but 802.11b was the first widely accepted one, followed by 802.11a, 802.11g, 802.11n, and 802.11ac.

What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point? A. The access point will transmit, but the node will be unable to receive. B. A connection will be established, C. Both the node and the access point will be unable to transmit. D. The node will transmit, but the access point will be unable to receive.

B. A connection will be established, 802.11g hardware is fully backward compatible with 802.11b hardware.

VPNs are implemented to provide: A. A secure connection within a private network. B. A secure connection through public networks. C. Additional encryption by using IPSec. D. Additional security for selected computers.

B. A secure connection through public networks.

Teredo tunneling is a protocol that: A. Translates Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6). B. Allows IPv6 connectivity through IPv4 devices. C. Provides VPN security. D. Dynamically allocates IPv6 addresses.

B. Allows IPv6 connectivity through IPv4 devices. Teredo tunneling is a transition technology that gives full IPv6 connectivity for IPv6-capable hosts which are on the IPv4 Internet but which have no direct native connection to an IPv6 network.

Which of the following uses pointer records and A records? A. IDS B. DNS Server C. NAT Server D. IPS

B. DNS Server DNS records include: * A Address record * PTR Pointer record

The ipconfig command will: A. Configure routers B. Display a client's address C. Display a client's broadcast mode D. Configure DHCP clients

B. Display a client's address

The ipconfig command will: A. Configure routers B. Display a client's address C. Display a client's broadcast mode D. Configure DHCP clients

B. Display a client's address ipconfig Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.

Attenuation in a wireless network signal is a result of: A. Number of wireless nodes connected. B. Distance from the access point. C. Interference from cellular phones. D. Encryption of the signal.

B. Distance from the access point. Attenuation is a general term that refers to any reduction in the strength of a signal. Attenuation occurs with any type of signal, whether digital or analog. attenuation is a natural consequence of signal transmission over long distances.

Which of these is an application layer protocol? A. TCP B. FTP C. IP D. UDP

B. FTP BGP-DHCP- DNS- FTP- HTTP- IMAP- LDAP- MGCP- NNTP- NTP- POP- RTP- RTSP- RIP- SIP SMTP- SNMP- SSH- Telnet- TLS/SSL

The topology of a local area network (LAN) is defined by the: A. Number of devices to connect. B. Physical and logical characteristics. C. Distance between workstations. D. Type of cable being used.

B. Physical and logical characteristics. Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network and may be depicted physically or logically.

The type of connector used on a 100BaseT Ethernet cable is: A. RJ-11 B. RJ-45. C. TNC. D. BNC.

B. RJ-45.

The ping tool is used to: (Choose two.) A. Determine the network portion of a host address. B. Self-test a host's own network interface. C. Determine whether a host is reachable. D. Manage a host's session when UDP is used.

B. Self-test a host's own network interface. C. Determine whether a host is reachable.

One reason to replace an unmanaged switch with a managed switch is to: A. Manage the routing tables. B. Support multiple VLANS. C. Reduce collision domains. D. Route between networks,

B. Support multiple VLANS. A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers. The major difference between the packet switching operation of a router and that of a Layer 3 switch is the physical implementation. In general-purpose routers, packet switching takes place using software that runs on a microprocessor, whereas a Layer 3 switch performs this using dedicated application- specific integrated circuit (ASIC) hardware.

You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on the first attempt? A. PING is improperly configured. B. The DNS is not resolving. C. The DHCP server is offline. D. NSLOOKUP is stopped.

B. The DNS is not resolving.

Which of these factors has the biggest impact on data transmission speed in a wireless network? A. The access method used for the network B. The transmission standard of the equipment used C. The use of strong encryption for transmissions D. The transmission wattage rating used on the NIC

B. The transmission standard of the equipment used

Which of the following uses a tunneling protocol? A. Internet B. VPN C. Extranet D. VLAN

B. VPN

Which type of network is most vulnerable to intrusion? A. Dial-up B. Wireless C. Broadband D. Leased line

B. Wireless Insecure Wi-Fi is the easiest way for people to access your home network, gleech your internet, and cause you serious headaches with more malicious behavior.

You work at a coffee shop. Your supervisor asks you to help set up a computer network. The network needs to have the following items: ✑ A public facing web server ✑ A Wi-Fi network for customers ✑ A private network for the point of sale terminals ✑ An office PC ✑ A file/print server ✑ A network printer You need to set up a perimeter network to protect the network. Which two items should you include in the perimeter network? (Choose two.) A. Network printer B. Web server C. File server D. Wi-Fi network E. Point of sale terminals

B: Web Server D: Wi-Fi network

In a twisted pair cable, the wires are in pairs and something of BOGB is referred. What does this BOGB in reference to the cable represent? Blue, Orange, Green, Black Black, Orange, Green, Brown Blue, Orange, Green, Brown Brown, Orange, Green, Black

BOGB Blue Orange Green Brown

When a client's DHCP-issued address expires, the client will: A. Select a new address and request approval from the DHCP server. B. Require manual configuration with a static IP address. C. Attempt to obtain a new address by broadcasting. D. Continue to use the address until it is notified to stop.

C. Attempt to obtain a new address by broadcasting.

The top-level domain of www.adventureworks.com is: A. www B. adventureworks C. adventureworks.com D. com

D. com

Which of the following are features of DHCP? (Choose two.) A. IP address resolution to canonical names B. Secure shell connections C. Address reservation D. Network file transfer E. IP address exclusion

C. Address reservation E. IP address exclusion

A network that separates an organization's private network from a public network is a/an: A. Firewall B. Extranet C. Perimeter D. Internet

C. Perimeter In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually a larger network such as the Internet.

You need to divide a network into three subnets. Which device should you use? A. Hub B. Bridge C. Router D. Segmenter

C. Router You can use a router to divide your network into subnets.

Which type of port is used to support VLAN traffic between two switches? A. Virtual port B. WAN port C. Trunk port D. LAN port

C. Trunk port Trunk links are required to pass VLAN information between switches.

Which wireless authentication method provides the highest level of security? A. Wired Equivalency Privacy (WEP) B. IEEE 802.lln C. WI-FI Protected Access (WPA) D. IEEE 802.11a

C. WI-FI Protected Access (WPA) WPA aims to provide stronger wireless data encryption than WEP. Wi-Fi Protected Access (WPA) is a security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.

You are home for vacation, and a family member wants your help to purchase and install network cable for a home office. The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement? A. Cat3 B. CAT5 C. Cat5e D. Cat6

CAT 5e The Cat 5e standard provides performance of up to 100 MHz and can be used up to a maximum length of 100 meters It was made to support 1000 Mbps

In IP address v4 the 1st octet in the range of 224-239 indicates which Class IP address? A C E D

Class D: A 1 - 126* B 128 - 191 C 192 - 223 D 224 - 239

Which of the below is a valid Private IP address in the B class? Choose all that Apply 172.33.20. 20 172.26.20.20 172. 16.20.20 192.168.0.0

Class Private IP Address Subnet Mask A 10.0.0.0 to 10.255.255.255 255.0.0.0 B 172.16.0.0 to 172.31.255.255 255.240.0.0 C 192.168.0.0 to 192.168.255.255 255.255.0.0

Switches store the MAC to port translation mapping in a table know as MAC table. It is also known as CAM table. What does CAM stand for? Content Addressable Memory Control Access Media Converged Address Memory Control Address Memory

Content Addressable Memory CAM stands for Content Addressable Memory. It is a type of table where fixed-length addresses are kept for fast lookups. Since MAC addresses are fixed length, CAM tables are used to store MAC addresses and their related information. For most purposes, you can think of them as the same thing called by different names.

The default subnet mask for a Class B network is: A. 0.0.0.255 B. 0.0.255.255 C. 255.0.0.0 D. 255.255.0.0

Correct Answer: D 255.255.0.0

To connect similar devices like, switch to switch, what type of cable is used ? Console Crossover Cable Straight through Rolled Cable

Crossover Cable used to connect like devices to each other, for example, a computer to another computer, or a switch to another switch.

Which of these addresses is a multicast address? A. 127.0.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 224.0.0.1

D. 224.0.0.1 A. 127.0.0.1 = loopback B. 169.254.0.1 = APIPA C. 192.168.0.1 = Class C D. 224.0.0.1 = Multicast

What is the default subnet mask for a Class C Internet network? A. 255.255.255.252 B. 255.255.255.240 C. 255.255.255.192 D. 255.255.255.0

D. 255.255.255.0

The maximum throughput of an 802.llg network is: A. 2.4 GHz. B. 54 GHz. C. 2.4 Mbps D. 54 Mbps.

D. 54 Mbps. The 802.11g standard for wireless networking supports a maximum bandwidth of 54 Mbps.

Which of these represents the Internet Protocol version 6 (IPv6) loopback address? A. 127.0.0.1 B. 192.168.0.1 C. FEC0:A8C0::AA01 D. ::1

D. ::1 The IPv4 addresses we are all used to seeing are made up of four numerical octets that combine to form a 32-bit address. IPv6 addresses look nothing like IPv4 addresses. IPv6 addresses are 128 bits in length and are made up of hexadecimal characters.

If an 802.llg Internet connection has connectivity problems, what may be the cause? A. A cordless phone B. A cellular phone C. Incandescent lights D. Electromagnetic interference (EMI)

D. Electromagnetic interference (EMI) The 802.11g specification is a standard for (WLANs) that offers transmission over relatively short distances at up to 54(Mbps), 2.4 GHz

In a physical star topology, the central device is referred to as a: A. Bridge B. Server C. segmenter D. Hub

D. Hub In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection.

One reason to incorporate VLANs in a network is to: A. Increase the number of available IP addresses. B. Increase the number of available Media Access Control (MAC) addresses. C. Reduce the number of broadcast domains. D. Reduce the number of nodes in a broadcast domain.

D. Reduce the number of nodes in a broadcast domain. Explanation/Reference: VLANs provide the following advantages: * VLANs enable logical grouping of end-stations that are physically dispersed on a network. ... * VLANs reduce the need to have routers deployed on a network to contain broadcast traffic. ... * Confinement of broadcast domains on a network significantly reduces traffic. By confining the broadcast domains, end-stations on a VLAN are prevented from listening to or receiving broadcasts not intended for them. Moreover, if a router is not connected between the VLANs, the end-stations of a VLAN cannot communicate with the end-stations of the other VLANs.

One reason to incorporate VLANs in a network is to: A. Increase the number of available IP addresses. B. Increase the number of available Media Access Control (MAC) addresses. C. Reduce the number of broadcast domains. D. Reduce the number of nodes in a broadcast domain.

D. Reduce the number of nodes in a broadcast domain. VLANs provide the following advantages: * VLANs enable logical grouping of end-stations that are physically dispersed on a network. ... * VLANs reduce the need to have routers deployed on a network to contain broadcast traffic. ... * Confinement of broadcast domains on a network significantly reduces traffic. By confining the broadcast domains, end-stations on a VLAN are prevented from listening to or receiving broadcasts not intended for them. Moreover, if a router is not connected between the VLANs, the end-stations of a VLAN cannot communicate with the end-stations of the other VLANs.

Which of the following determines the media access method that is used in a network? A. Number of hosts connected to the network B. Number of domain servers on the segment C. Maximum speed of the media D. Topology and protocols

D. Topology and protocols

Which technology can you use to extend an internal network across shared or public networks? A. VLAN B. Microsoft ASP-NET C. Microsoft .NET Framework D. VPN

D. VPN VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network.

A service that resolves NetBIOS names to IP addresses is: A. Domain Name Service (DNS). B. Internet Service Provider (ISP). C. Address Resolution Protocol (ARP). D. Windows Internet Name Service (WINS).

D. Windows Internet Name Service (WINS). Windows Internet Name Service is Microsoft's implementation of NetBIOS Name Service, a name server and service for NetBIOS computer names.

To which IP configuration does the CIDR notation 192.168.1.1/25 refer? A. 192.168.1.1 255.255.255.64 B. 192.168.1.1 255.255.255.1 C. 192.168.1.1 255.255.255.32 D. 192.168.1.1 255.255.255.256 E. 192.168.1.1 255.255.255.128

E. 192.168.1.1 255.255.255.128

The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is: A. corp B. com C. nwtraders D. exchange E. mail

E. mail

The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is: A. corp B. com C. nwtraders D. exchange E. mail

E. mail Hostnames are composed of series of labels concatenated with dots, as are all domain names. For example, let's break mail.google.com into its component parts: mail is the host or local hostname; and google.com is the domain or parent domain name.

Frame Relay is associated with FECN / BECN, what does FECN stand for________________ Frame Elastic Check Notification Forward Explicit Congestion Notification Frame Explict Compression Notification Forward Explict Compression Notification

FECN: Forward Explicit Congestion Notification tells the receiving device that the path is congested so that the upper layer protocols should expect some delay. BECN: backward explicit congestion notification tells the transmitting device that the Frame Relay network is congested and that it should "back off" to allow better throughput.

Which if the below is a valoid MAC for broadcast? FFFF FFFF FFFF EEEE EEEE EEEE ABAB ABAB ABAB ABCD ABCD ABCD

FFFF FFFF FFFF When a device sends a packet to the broadcast MAC address (FF:FF:FF:FF:FF:FF), it is delivered to all stations on the local network. It needs to be used in order for all devices to receive your packet at the datalink layer. For IP, 255.255.255.255 is the broadcast address for local networks.

The IEEE standard 802.3j is used for Thin Coaxial Fiber Optic Thick Coaxial Twisted Pair

Fiber Optic 10BASE-F 10 Mbit/s (1.25 MB/s) over Fiber-Optic

Frame Relay and X.25 are a type of ___________________ WAN technology? Packet Switching Circuit Switching Network Switching Console switching

Frame relay is based on the older X.25 packet-switching technology that was designed for transmitting analog data such as voice conversations. Unlike X.25, which was designed for analog signals, frame relay is a fast packet technology, which means that the protocol does not attempt to correct errors.

The unit of measurement on a data link layer is _________________ Frames Bits Packets Segments

Frames FramesA frame is a digital data transmission unit in computer networking and telecommunication.

In Windows to configure VPN which options do you need to go to? CLI command -> start vpn Control Panel VPN From Administrative Tools Routing and Remote Access None of the above

From Administrative Tools Routing and Remote Access

________________ is a device that regenerates the signal and every time data is sent via broadcast to other connected devices. Hub Router Firewall Switch

Hub A hub, also called a network hub, is a common connection point for devices in a network. Hubs are devices commonly used to connect segments of a LAN. The hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.

Ping is used to check network connectivity and it makes use of the _____________ protocol. IGMP RARP Proxy ARP ICMP

ICMP The Internet Control Message Protocol is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information .

________is a feature in Windows that can used when want to make a server act like a router. RDP IP Sec DNS IP forwarding

IP forwarding

The _________protocol is used to encrypt data in L2TP. PAP MS-CHAP IPSec DHCP

IPSec L2TP Layer 2 Tunneling Protocol

The three main types of IPv6 addresses are _________________ Unicast Anycast Multicast Broadcast

IPv6 has three types of addresses, which can be categorized by type and scope: Unicast addresses. A packet is delivered to one interface. Multicast addresses. A packet is delivered to multiple interfaces. Anycast addresses. A packet is delivered to the nearest of multiple interfaces (in terms of routing distance).

Basic Rate Interface( BRI) and Primary Rate Interface(PRI) in Digital technology is associated with _______________ IPSec ISDN PSTN Frame Relay

ISDN Integrated Services Digital Network is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.

Port number 88 is used for which of the below protocols? NetBIOS Kerberos IMAP POP3

Kerberos Is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

To install IPv6 on your windows computer you need to _____________ LAN connection Properties-> Check IPv6 using CLI : enable ipv6 From Web Browser Properties using CLI: ipv6 enable

LAN connection Properties-> Check IPv6

L2TP uses port ________________ 443 500 89 1723

Layer Two Tunneling Protocol (L2TP) uses TCP port 1701 and is an extension of the Point-to-Point Tunneling Protocol. L2TP is often used with IPSec to establish a Virtual Private Network (VPN). Point-to-Point Tunneling Protocol (PPTP) uses TCP port 1723 and IP port 47 Generic Routing Encapsulation (GRE)

_______________ is a unique identifier assigned by the manufacturer to a network adapter. This is written in hexadecimal and is of 6 octets. Gateway Address IP address MAC Address None of the above

MAC Address A media access control address of a device is a unique identifier assigned to network interface controllers for communications at the data link layer of a network segment.

One purpose of a perimeter network is to: A. Make resources available to the intranet. B. Link campus area networks (CANs). C. Link local area networks (LANs). D. Make resources available to the Internet.

Make resources available to the Internet.

The _________________ technology is used to mask and Private IP address from the outside world. We can use this and have multiple computers with Private IP address browse the Internet. WINS DHCP Network Address Translation FTP

Network Address Translation It enables private IP networks that use unregistered IP addresses to connect to the Internet. NAT operates on a router, usually connecting two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network.

The transmission rate of an Optical Carrier OC-24 is 51.84 Mbps 1.244 Gbps 9.953 Gbps 2.488Gbps

OC Data Rate OC-1 51.84 Mbps OC-3 155.52 Mbps OC-12 622.08 Mbps OC-24 1.244 Gbps OC-48 2.488 Gbps

Which of the below is a Link state routing protocol? Choose the best fit RIP IGRP EIGRP OSPF

OSPF Open Shortest Path First is a routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior gateway protocols, operating within a single autonomous system.

To configure a DHCP server in Windows which of the below is a correct step. On Server Manager Roles Add RolesSelect DHCP Server and Click Next ipconfig /dhcp On control Panel DHCP Server None of the above

On Server Manager Roles Add RolesSelect DHCP Server and Click Next

Which of the below are tunneling protocol used by VPN? PPTP L2TP SFTP NNTP

PPTP: The Point-to-Point Tunneling Protocol is an obsolete method for implementing virtual private networks, with many known security issues. PPTP uses a TCP control channel and a GRE tunnel to encapsulate PPP packets L2TP: In computer networking, Layer 2 Tunneling Protocol is a tunneling protocol used to support virtual private networks or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself.

__________Layer of the OSI takes care of the compression and encryption. Physical Session Presentation Transport

Presentation layer, Layer 6, which is primarily responsible for managing protocol and architecture. ... Some functions of the presentation layer include character-code translation, data conversion, data encryption and decryption, and data translation.

What is the frame that is smaller than 64 bytes called? JUMBO RUNT TINY MICRO

RUNT In networks, a runt is a packet that is too small. For example, the Ethernet protocol requires that each packet be at least 64 bytes long. In Ethernet, which operates on the idea that two parties can attempt to get use of the line at the same time and sometimes do, runts are usually the fragments of packet collisions.

Which of the below is not a process in the DHCP DORA? Discover Offer Response Acknowledge

Response Discovery Offer Request Acknowledgement

You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters. An interference exists along the path of each drop. You need to ensure that interference is reduced. Which cable type should you use? A. STP Cat5e B. UTPCat5e C. Cat3 D. UTPCat6

STP Cat5e Cat5e, is an improvement on Cat5 cabling. It was made to support 1000 Mbps "gigabit" speeds, so in theory, it's faster than Cat5. It it also cuts down on crosstalk, the interference you can sometimes get between wires inside the cable.

In the IP Sec the __________ generates encryption and authentication keys. SA AH ARP ESP

Security Associations (SA) provides the bundle of algorithms and data that provide the parameters necessary for AH and/or ESP operations. (ESP) Encapsulating Security Payloads

Which of the below modes are related to Fiber Optic Cable? Single Mode Multi Mode Fiber Mode RJ Mode

Single Mode Multi Mode

Which of these protocols is not a Network Layer Protocol? IP ICMP HTTP ARP

The Hypertext Transfer Protocol is an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Standard port: 80

A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97. You need to restore access to network resources. What should you do next? A. Flush the cache on the DNS server. B. Reset the user's password on the server. C. Check your router's current routing tables. D. Verify that the DHCP service is available.

Verify that the DHCP service is available

Which of the below is a 64 bit Wireless Encryption Protocol? AES TKIP WPA 2 WEP

WEP Wired Equivalent Privacy (WEP), and its weaker security level is discussed here. Wired Equivalent Privacy (WEP) is a security protocol for wireless networks that encrypts transmitted data . ... (40-bit and 64-bit WEP encryption are the same thing — 40-bit devices can communicate with 64-bit devices.)

Service in Windows resolves NetBIOS names to IP addresses. WINS DHCP DNS ARP

WINS: Windows Internet Name Service is Microsoft's implementation of NetBIOS Name Service, a name server and service for NetBIOS computer names.

Which of the below two tools can be used to capture and analyze traffic? Wireshark Kiwi syslog dumpster diving tcpdump

Wireshark/tshark /dumpcap can use tcpdump filter syntax as capture filter. As tcpdump is available on most *NIX system I usually use tcpdump. Depending on the problem I sometimes use tcpdump to capture traffic and write it to a file, and then later use wireshark to analyze it.

After you configure an IP address and subnet mask on a Windows 7 PC, you want to check the configuration and confirm that the IP and subnet is configured, which of the below command is used. ifconfig traceroute ping ipconfig

ipconfig In computing, ipconfig in Microsoft Windows is a console application that displays all current TCP/IP network configuration values and can modify Dynamic Host Configuration Protocol and Domain Name System settings.

The ______________ command in Windows CLI will remove the IP address learnt from DHCP. ipconfig /renew ipconfig / release netstat / release ping -a

ipconfig / release First, ipconfig /release is executed to force the client to immediately give up its lease by sending the server a DHCP release notification which updates the server's status information and marks the old client's IP address as "available". Then, the command ipconfig /renew is executed to request a new IP address.

You are required to find the MAC address of you own computer. Which of the below command is used? ipconfig /all ipconfig -an netstat -an ipconfig

ipconfig /all Ipconfig (sometimes written as IPCONFIG) is a command line tool used to control the network connections on Windows NT/2000/XP machines. ... Ipconfig displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.

Which of the below command will help remove IP address from CLI? ipconfig removeIP netdom netsh

netdom Netdom is a command-line tool that is built into Windows Server 2008 and Windows Server 2008 R2.

The ___________ command is used to check the connection status to and from your computer. netstat -an ping -t arp -a tcpdump

netstat -an However this can provide you with more information than you need. Therefore if you are looking for specific port then you can filter that information. For example to find a connection to web sites or other services using port 80 use this command: netstat -an | findstr :80 Will show all connections on port 80

PVCs are associated with Frame Relay, what does PVC stand for _________________________ Permanent Virtual Circuit Permanent Virtual Class Preferable Volunteer Circuit Passive Virtual Circuit

permanent virtual circuit (PVC) is a connection that is permanently established between two or more nodes in frame relay and asynchronous transfer mode (ATM) based networks. It enables the creation of a logical connection on top of a physical connection between nodes that communicate frequently or continuously.


Set pelajaran terkait

Carbon Dioxide and the Greenhouse Effect

View Set

Othello - Act and scene summaries

View Set

Exam 3-Gen OCT 9 (Bacterial Conjugation)

View Set

Intermediate Accounting II - C249 - Ch. 18 Quiz

View Set

Introduction To Statistics Chapter 1

View Set

Schizophrenia ATI Practice Questions

View Set

IFT 100 Tech in Action (Chapter 1-13)

View Set

Chapter 33: Management of Patients With Nonmalignant Hematologic Disorders 5

View Set