Network+ Exam 1, Network+ Exam 2, Network+ Exam 3
What is the Internet standard MTU?
1,500 bytes
Which of the following addresses can be identified as an APIPA address?
169.254.0.1
Wilson Breweries has called you to its office space to troubleshoot an error wherein there is an issue with outgoing email messages as a result of which the logistics are getting delayed. Which of the following ports would you troubleshoot to sort out this issue?
25
What decimal number corresponds to the binary number 11111111?
255
What is the secure port for HTTPS?
443
Which of the following manages the dynamic distribution of IP addresses to devices on a network?
A DHCP
Pisces Ltd. is a small logistics firm operating out of Los Angeles. The organization has a small array of seven computers for the functioning of its administration. They have requested a network engineer from Softnet Solutions to suggest why they should opt for a P2P network model instead of a client-server network model. In this scenario, which of the following statements would be the appropriate reason for Pisces Ltd. to opt for a peer-to-peer network model according to you?
A network operating system is much more expensive than a desktop operating system.
Which of these is considered a secure place to store a list of documented network passwords?
A password manager
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
All devices on your local network
Which of the following terms is also referred to as a "network of networks"?
Backbone
Which transmission characteristic is never fully achieved?
Bandwidth
The University of Kingston has hired you to install a private area network for its campus so that students and teachers from various departments can exchange data among themselves. Which of the following network models would be best suited for such an institution?
CAN
You are the DNS administrator and have been tasked to hold alternative names for a host that is a newly established start-up venturing into the business of ecommerce. The start-up wants its clients to be directed to the appropriate page whenever they request for alternative names. Which of the following resource records would you apply as a DNS administrator in such a case?
CNAME record
Which of these categories of twisted-pair cable can support Gigabit Ethernet?
Cat 5e, Cat 6a, Cat 7
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters?
Cat 6a
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Checksum
While analyzing an intermittent error, James, an independent contractor for HKV Infrastructures, finds that the destination host is constantly asking the source to retransmit the data. He finds that the bug might be related to the transport layer of the OSI model. Since the TCP provides reliable delivery protocols, analyze which of the following characteristics of the TCP protocol James should check to fix this error.
Checksum
The University of Philadelphia wants you to format an IPv4 address through which the dean of the university wants to go on a videoconference with the teaching staff about certain educational norms which they plan on implementing. Which of the following classes of classful addressing will you apply to deliver the requirement?
Class D
A network consists of five computers, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?
Client-server
What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network?
Default gateway
What is a small file containing verified users' identification information and public key known as?
Digital certificate
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?
EF
Which function of WPA/WPA2 security ensures data cannot be read in transit?
Encryption
When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself?
FE80::/64
You, as a network administrator, want to set up an FTP for remote file access. You also want to add an added layer of protection so that you can encrypt both the data and control channels. Which of the following technologies will you apply in such a case?
FTPS
In the event of a fire, the most appropriate failure policy is a ____ policy.
Fail-open
What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?
Fiber type mismatch
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
HTTPS
What is the purpose of the TXT (text) DNS resource record?
Holds any type of free-form text
Which two protocols manage neighbor discovery processes on IPv4 networks?
ICMP and ARP
Katy, a senior technician, wants to document all the devices that are connected to the network of Ford Industries, which has a large complex network. She wants to ensure that all information in the network, including the hostnames, manufacturer names, operating systems, and IP addresses, are well-documented. Which of the following tools should she opt for to carry this out?
IP scanner
Which encryption protocol does GRE use to increase the security of its transmissions?
IPsec
Which of the following would you use to provide a set of rules for encryption, authentication, and key management for TCP/IP transmissions?
IPsec
Which one of the following wireless transmission types requires a clear LOS to function?
IR
Hilary has been working on a pilot project for a start-up on which she has been testing the maximum bytes for the length of an IP packet. As her intended IP packets are larger than what the network allows, she has to break them up into smaller packets for transmission. Analyze and suggest which of the following fields Hilary should use in an IPv4 packet so that the receiving host is able to identify and reassemble the fragmented messages.
Identification
As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
Identify the problem.
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
Integrity
Which of the following devices are you likely to find in the MDF? Choose all that apply.
KVM switch Switches Routers
What is a collection of accumulated insights and solutions to problems encountered in a particular network known as?
Knowledge base
What other technical name or PDU can be used to represent the session presentation and application layer?
L7PDU
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Layer 3
What is the first step of inventory management?
List all components on the network.
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
Look at whether the device is located on the ISP's side of the demarc.
Which fiber connector contains two strands of fiber in each ferrule?
MT-RJ
Which type of DNS record identifies an email server?
MX record
Which kind of crosstalk occurs between wire pairs near the source of the signal?
NEXT
At which OSI layer does IP operate?
Network layer
Which of the following applications could be used to run a website from a server?
Ngnix
What is one advantage offered by VDI over RDS and VNC?
Offers access to multiple OSs in VMs
JV Enterprises is currently using terminal emulation software to remotely control the devices for its employees. The administration however wants to build a dedicated network connection that will allow network administrators to remotely troubleshoot boot problems. Analyze which of the following options should JV consider for its needs.
Out-of-band management
Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack?
Passive twinaxial cable
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
Patch cable
What is the data passed between utility programs or applications and the operating system known as?
Payload
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
Peer-to-peer
You, as a network administrator, want to set up a file transfer version of SSH so that you can use a single channel to control both inbound and outbound communications. Which of the following ports will you use to carry out this operation?
Port 22
HCL Industries are keen on allowing its employees with a work-from-home option for its respective jobs. You have been hired to establish a secure and encrypted control for remote Windows computers. Which of the following ports will you use to establish this connection?
Port 3389
You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.
PowerShell Command Prompt Zenmap
You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply?
Presentation layer
Which DNS server offers the most current resolution to a DNS query?
Primary DNS server
Joffrey plans on installing a terminal emulator for a small organization so that he can control the office computers for troubleshooting issues. Joffrey is working as an intern for IVP Internet Solutions, which is an ISP. Analyze which of the following terminal emulators will be more suitable for James as he is new to his job and not well-equipped to handle complex layers of programming.
RDP
Which of the following is an application layer protocol?
RDP
As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?
RSSI
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
Rack ears
JK Group of Industries is planning a complete revamp of the office infrastructure, and so it has hired Infrared Solutions to upgrade its network connections. It has also requested Infrared Solutions to ensure that this upgrade should not affect the day-to-day functionality within the office premises. Analyze what would be a proper option to carry out this upgrade.
Roll out changes in stages.
A client recently contacted Katie, a networking engineer, at IHP solutions to troubleshoot a connectivity issue. On inspecting the issue, she gets to know that there is a missing default route, which is preventing the network nodes from reaching the DNS servers outside the local network. Analyze which of the following gateway devices she should use to sort this issue.
Router
Which of the following network devices does not fall under the category of "end devices" as certified by CISCO?
Router
Which remote file access protocol is an extension of SSH?
SFTP
Which of the following protocols is used to send an email message to the first server?
SMTP
You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
SQL
Which of the following protocols will an Oracle Database use to communicate with other Oracle Databases?
SQLnet
Which two encryption protocols might be used to provide secure transmissions for email services?
SSL and TLS
Which kind of multiplexing assigns slots to nodes according to priority and need?
STDM (statistical time division multiplexing)
You, as a network engineer, are working on setting up a data delivery service. While creating the TCP segment for this purpose, you wish to set up a command requesting a synchronization of the sequence numbers between two nodes. Which of the following flags will you apply with a 1-bit field so that you can set this up?
SYN
Raqeeb is an employee working for Deloitte Corporation. He has been allowed to work from home because of the COVID-19 outbreak. You have been asked to establish a VPN so that Raqeeb can access a file server from the office while he operates from his workstation at home. It also has to be kept in mind that Raqeeb wants to stream music alongside when he does this. Which of the following VPN types will you apply so that the necessary requirements are met?
Split Tunnel VPN
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Star
Which protocol's header would a layer 4 device read and process?
TCP
Meredith and Co. provides ISP services to a bulk of the corporates in the Silicon Valley. However, due to the recent COVID outbreak, a lot of the firms have started to allow their employees to work from home. Ceratrix is one such company that wants to allow its employees to work from home; however, certain features are only available to the employees when they have access to their workstations in the organization. This basically means that they would have to command the host computer. What remote access method should be provided to Ceratrix to fulfill this requirement?
Terminal Emulation
Which part of a MAC address is unique to each manufacturer?
The OUI
James, a supporting technician, is trying to resolve an issue pertaining to the router. On inspecting the issue, he figured that the router was unable to move packages from one node to another. As a resolution to this problem, he intends to follow the OSI model for troubleshooting. What layer of the OSI model should he inspect to understand the issue relating to the router?
The network layer
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server
You have successfully implemented a solution to a bug reported by one of the employees of your organization. You also want to ensure that the process has been well documented in the knowledge base of the organization. Which of the following information is not relevant in such a scenario when you put the data into the record books?
The total number of computers functioning in the organization
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
Tone locator
Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario?
Transmission Control Protocol
Xhang Pho, a senior network engineer, has been tasked with developing an application to channel live music festivals across the world with the help of the web. Given such a situation, which of the following protocols should he opt for?
UDP
Joseph is the managing director of Ideakt Cellular World Pvt Ltd., and he wants you to create an IPv6 network that has one-to-one type of data transmission between his personal department and the company's administration office. Which of the following types of IPv6 addresses would you apply in such a situation?
Unicast address
You are a freelance software engineer who has been hired to troubleshoot an error with the antivirus software of a particular computer of an employee where he gets an invalid password message. Which of the following methods will you use in such a scenario?
Use a top-to-bottom OSI layers approach
Which of the following remote access methods requires a virtual connection to remotely access resources between a client and a network?
VPN
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
Voice gateway
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?
White/green
You have been recently appointed by Jaylabs Internet Solutions to verify the TCP/IP protocols that have been set up at Heroku Industries for interorganizational purposes. On examining the TCP header segment, you want to get a sense of the limit of the maximum bytes of data that a computer can receive before returning an acknowledgment. Which of the following fields in a TCP segment should you check in such a situation?
Window size
What type of diagram shows a graphical representation of a network's wired infrastructure?
Wiring diagram
Which of the following wireless technologies does not use the 2.4 GHz band?
Z-Wave
Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to install dig on the Window operating system?
apt-get install dnsutils
You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address?
arp -a
Which of these commands has no parameters in Windows?
hostname
Which of the following command-line tools is used to display current TCP/IP addressing and domain name information on a Windows computer?
ipconfig
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?
ipconfig /release
Which of the following utilities would you use to display TCP/IP components and connections on a host?
netstat
JusDial Telecommunications has requested your help to set up a new hostname on a couple of devices. On inspection, you find out that the devices are operating under LINUX systems. Which of the following command lines would you apply to set up a new hostname for the required network devices?
sudo hostname
Which of the following utilities is also known as a packet sniffer?
tcpdump