Network+ Practice
What is the binary representation of the 255.254.0.0 subnet mask?
11111111.11111110.00000000.00000000
What is the binary representation of the 255.255.128.0 subnet mask?
11111111.11111111.10000000.00000000
Which of the following port number is reserved for the NTP?
123
How many bits make up an IPv6 address?
128
Which of the following port numbers are reserved for NetBIOS services?
137 138 139
What is the network address for the 154.24.67.147/22 host?
154.24.64.0
How many networks can be created by borrowing four bits from hosts?
16
An SNMP agent receives requests on UDP port:
161
Which of the following UDP ports are reserved for the SNMP?
161 162
An SNMP management station receives SNMP notification on UDP port:
162
Route redistribution
A solution used to translate routing information between routers configured to use different routing protocols is known as:
The Data-Link layer is further subdivided into two other layers called ___ ___ ___ and ___ ___ ___
Logical Link Control Media Access Control
____ is a short-range radio tech that is often used for wireless printers, mice, keyboards, and scanners.
Bluetooth
The classful IP add. 200.200.200.200 is a Class ____ add.
C
A switch controls and segments traffic on your network by learning the ____ addresses of all the components connected to it.
MAC
ARP resolves IP addresses to _____ addresses.
MAC
7 layers
The Open Systems Interconnection (OSI) model consists of:
_____ is a dynamic database that resolves hostnames to IP addresses.
DNS (domain name system)
True/False: The Transport layer converts digital data into electronic signals to be put on a wire
False
True/False: Using DNS will segment a network.
False
True/False: VLANs create collision domains.
False
8 subnets, 30 hosts per subnet
What is the maximum number of subnets and hosts per subnet for the 192.168.50.247 255.255.255.224 network?
ipconfig
What is the name of a Windows command line utility that can be used to display TCP/IP configuration settings?
ping
What is the name of a command line utility used for checking the reachability of a remote host?
UDP port 67 is used by:
DHCP Boostrap Protocol (BOOTP)
Presentation layer
Layer 6 of the OSI model is also known as:
DNS runs on:
UDP port 53 TCP port 53
Trivial File Transfer Protocol (TFTP) uses:
UDP port 69
Transport layer Layer 4
User Datagram Protocol (UDP) resides at: (Select 2 answers)
172.45.121.254
What is the last usable host IP address for the 172.45.120.0/23 network?
The most common topology in use today is the _________ topology.
star
A UTP cable running 1000Mbps can be a maximum distance of
100 meters
Which TCP port is used by the POP3?
110
What is 192.168 in binary?
11000000.10101000
Which of the following answers lists the CIDR notation of the 255.192.0.0 subnet mask?
/10
Which of the following answers lists the CIDR notation for 255.255.224.0 subnet mask?
/19
Which of the following answers lists the CIDR notation of the 255.255.255.224 subnet mask?
/27
In the MAC address 00-05-1B-00-4B-F6, which part of the add. is the unique ID for the device?
00-4B-F6
Previously resolved IP-to-MAC addresses are stored in the ARP caches on a Microsoft client for about ____ minutes.
10
What is the maximum valid range for IP addresses that can be assigned to hosts on the 192.168.100.248 255.255.255.248 network?
192.168.100.249 - 192.168.100.254
What is the network address for the 192.168.223.15 255.255.255.252 host?
192.168.223.12
What is the last usable host IP address on the 192.168.32.9/30 network?
192.168.32.10
Which of the following answers lists the broadcast address for the 192.168.50.155/20 network?
192.168.63.255
The FTP Data Connection for sending file data is established through port:
20
Which of the following port numbers are used by the FTP
20 21
A fully meshed topology with five components would have _____ connections and require ____ cables.
20, 10
The FTP control connection for administering a session is established through port number:
21
Autonomous system
A collection of IP networks and routers under the control of one administrative entity is commonly referred to as:
netstat
A command line utility in MS Windows used for displaying protocol statistics and current TCP/IP network connections is called?
_____ is a term that refers to combining authentication, authorization, and accounting into the same system or server.
AAA
A DNS record that is the same as an A record but is specifically used on IPv6 is an ____ ____
AAAA record
_____ was developed along with WPA2 keys, used in wireless authentication.
AES (adv. encrypt. standard)
169.254.1.1 is an example of an ____ address.
APIPA (auto. private internet protocol address)
What is a firewall's list of rules, which it uses to block traffic?
Access control list (ACL)
SMTP works at the _____ layer of the OSI model
Application
TFTP is connectionless protocol that works at the ____ layer of the OSI model.
Application
Layer 7
Application layer of the OSI model is known as:
What does SNMP provide?
Automated alerts and reports on network devices
The classful IP add. 139.2.1.2 is a Class ____ add.
B
Sending unsolicited messages over a bluetooth-enabled device is referred to as
Bluejacking
The hacking of a smartphone or other bluetooth-enabled device through an open bluetooth connection is called
Bluesnarfing
192.168.10.0/28 is an example of which kind of notation?
CIDR
_____ is used as a carrier access method on 802.11a/b/g/n networks.
CSMA/CA
Original (legacy) ethernet uses a carrier access method referred to as
CSMA/CD (carrier sense multiple access with collision detection
A ____ is used to convert LAN signal to WAN signal and vice versa.
CSU/DSU
What device connects a LAN to a T1 circuit?
Channel Service unit/data service unit (CSU/DSU)
What device connects a local area network (LAN) to a T1 circuit?
Channel service unit/data service unit (CSU/DSU)
In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to the:
Class A address space
Which of the following answers refer to the characteristic features of the 10.0.0.0 10.255.255.255 IPv4 address space? (Select 2 answers)
Class A range Non-routable (private) IP address range
Which of the following answers list the characteristic features of the 172.16.0.0 172.31.255.255 IPv4 address space? (Select 2 answers)
Class B range Non-routable (private) IP address range
In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to the:
Class C address space
What tool is used to connect an RJ-45 to a UTP?
Crimper
The ____ protocol is used for smart cards.
EAP (extensible authentication protocol)
An interference caused by wires running past speakers, fluorescent light ballasts, or electric motors is referred as ____ ____ .
EMI (electromagnetic interference)
____ is a type of DSL that provides the same upload speed as its download speed.
SDSL (symmetric digital subscriber line)
Which of the following protocols runs on TCP port 445?
SMB
____ ____ ____ ____ is a management protocol that you can use to gather info about the network and the components it contains.
SNMP (simple network management protocol)
The unique ID that an admin can assign to a WAP is called the
SSID
When configuring a wireless AP, what should you consider when selecting a channel?
Select a channel farthest from that of any other AP in the area.
Which networking topology connects computers via a central device?
Star
DNS resolved ____ to IP addresses.
hostnames
An _____ allows users to access shared company info with their browsers w/o accessing the internet.
intranet
OSPF is an example of a ____ ____ routing protocol
link state
_____ ____ increases throughput by allowing multiple paths for traffic on the same session.
load balancing
The IP address 127.0.0.1 is referred to as the ____ add.
loopback
A physical barrier that consists of a two-door system that requires authentication to open each door and often even to return to the first door is called a ____
mantrap
A packet that has one source add. and a list or range of destination addresses is referred to as a ____ .
multicast
The _____ command displays the NetBIOS name cache showing recently resolved NetBIOS names and IP addresses.
nbtstat -c
Which two commands can you type to see the DNS servers that your computer is using?
nslookup ipconfig
You can test general connectivity between computers using the _____ tool.
ping
Static route
A manually configured routing entry is known as:
Layer 6 of the OSI model
Presentation layer is another term for:
Which type of firewall keeps track of existing connections passing through it?
Stateful
/all
Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)?
-a
Which netstat parameter allows to display all active TCP connections and the TCP and UDP ports on which the computer is listening?
IPv4 IPsec IPv6 ICMP
Which of following protocols reside(s) at the OSI network layer? (Select all that apply)
Router
Which of the devices listed below is used for separating broadcast domains?
route print
Which of the following command line commands in MS Windows is used to display the contents of a routing table?
route print
Which of the following command line commands in MS Windows is used to display the contents of a routing table?
tracert -6
Which of the following commands in MS Windows displays the route taken by IPv6 packets on their way to another host?
[command] /?
Which of the following commands in MS Windows is used to display help information related to a specific network command line utility?
True/False: Firewalls are not usually combination of hardware and software.
False
True
True or False: A command line network administration utility that operates by sending Internet Control Message Protocol (ICMP) echo request packets to the destination host and waiting for a reply in order to test the communication with another computer on an Internet Protocol (IP) network is called ping.
True
True or False: Used without any parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.
RIPv2
Which of the answers listed below refers to a distance vector routing protocol?
Rollover cable
Which of the cable types listed below is often used to connect a computer terminal to a router's console port?
ping6 host1
Which of the command line commands listed below allows for sending an ICMPv6 echo request to another network node (host1) in Linux OS?
nbtstat
Which of the following answers lists a Windows command line utility designed to be of help in troubleshooting NetBIOS name resolution problems?
BGP
Which of the following answers lists an example of a hybrid routing protocol?
/all
Which of the following answers lists an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters?
MTU
Which of the following metrics describes the largest allowable data unit that can be transmitted across the network?
nslookup
Which of the following network administration command line utilities can be used for DNS queries?
VRRP HSRP
Which of the following networking protocols provide(s) redundancy? (Select all that apply)
EGP
Which of the following protocol types is used for sharing routing information between autonomous systems (routing domains)?
HTTP FTP SMTP
Which of the following protocols reside(s) at the application layer of the OSI model? (Select all that apply)
SPB
Which of the following provides a replacement for the Spanning Tree Protocol (STP)?
HUB Network cabling
Which of the following reside(s) at the physical layer of the OSI model? (Select all that apply)
Layer 3
Which of the following terms refers to the OSI network layer?
nslookup
Which of the following tools allows for obtaining a domain name to IP address mapping?
nbtstat -A 192.168.1.10
Which of the nbtstat parameters allows to resolve remote host (192.168.1.10) by its IP address?
nbtstat -1 host1
Which of the nbtstat parameters allows to resolve remote host (host1) by its name?
-r
Which of the netstat utility parameters listed below allows to display the contents of the IP routing table?
pathping
Which of the network command line utilities in MS Windows combines the features of ping and tracert?
Run as administrator
Which of the options listed below allows for execution of a command if the requested operation in the command line interface in MS Windows requires elevation?
VRRP HSRP
Which of the protocols listed below are used for designating a backup router in the event of an active router failure? (Select 2 answers)
NetBIOS
Which of the protocols listed below resides at the session layer of the OSI model?
Maximum hop count Time to live (TTL)
Which of the following can be used to prevent routing loops? (Select 2 answers)
netstat -r
Which of the following command line commands in MS Windows is used to display the contents of a routing table?
ipconfig /release ipconfig /renew
Which of the following command line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers)
What wire pairs connect to a 66 block from the telecom company?
25 pair
In a Class C address, a network ID is how many bits?
24
Which of the following port numbers are assigned to the Media Gateway Control Protocol (MGCP)? (Select 2 answers)
2427 2727
SMTP operates with the use of TCP port:
25
Which TCP/IP port number identifies SMTP?
25
You need to provide inter-VLAN comm. What device do you need?
A Layer 3 switch (router)
____ _____ can be defined as the ability to lose a network component w/o losing data and/or functionality
Fault tolerance
What protocol is used within a ping command?
ICMP
____ are specific logical address to which applications are assigned in a computer.
Ports
TCP port 119 is used by:
Network News Transfer Protocol (NNTP)
Compared to the number of all IPv4 addresses available per subnet, the total number of usable IPv4 addresses that can be assigned to hosts from that pool is reduced by two. Those two addresses that cannot be assigned to hosts are used as: (Select 2 answers)
Network address Broadcast address
A packet-filtering firewall operates at which layers of the OSI model?
Network and Transport
True/False: 156.144.226.123 is a valid IP address
True
True/False: A DMZ is a network segment that is neither public nor local but halfway between.
True
True/False: A bridge can selectively forward data packets
True
True/False: A bridge is a network device that operates at Layer 2 of the OSI model
True
True/False: A dipole is an omnidirectional antenna
True
True/False: A firewall can permit, deny, encrypt, decrypt, and proxy all computer traffic that flows through it.
True
True/False: A network collision happens when two devices attempt to communicate on the same physical segment at the same time
True
True/False: A proxy service can be used to cache web pages for future retrieval.
True
True/False: A switch is a network device that operates at Layer 2 of the OSI model
True
True/False: An intrusion detection system (IDS) monitors network traffic, looking for signs of an intrustion.
True
True/False: Antivirus software will help protect a computer from Trojan horses.
True
True/False: TCP is a connection-oriented, and UDP is reliable.
True
Ctrl+C
Which of the following key combinations allows to stop the execution of the current command run in Windows Command Prompt?
Ethernet switch
Which of the following devices resides at the data link layer of the OSI model?
Port number 3389 is reserved for:
Remote Desktop Protocol (RDP)
The ____ layer of the OSI model is responsible for establishing, synchronizing, maintaining, and then terminating the communication channels between computers.
Session
You add a new cable to your network. What document do you update?
Wiring schematics
A _____ _____ can be used to verify connectivity in a cable w/o attaching the cable network.
cable tester
The ipconfig command with no switches displays the IP address, subnet mask, and ___ ____ of the computer interfaces.
default gateway
FTPS is an extension to the SSH and runs by default on port number 22
False
True/False: A cable modem selectively forwards data packets
False
True/False: A hub and a repeater operate at Layer 2 of the OSI model.
False
True/False: A hub and a switch operate at the same layer of the OSI model
False
True/False: A hub and router operate at the same layer of the OSI model.
False
True/False: A multimode fiber-optic cable (MMF) is terminated on a punch-down block.
False
True/False: A network admin wants all computers protected from Trojan horses and worms. Implementing a firewall will accomplish this requirement.
False
True/False: A packet-filtering firewall operates at the Network and Data Link layers of the OSI model.
False
True/False: A parabolic is a type of omnidirectional antenna
False
True/False: A repeater can be used to cache web pages for future retrieval.
False
True/False: A ring networking topology connects computers via a cetral hub.
False
True/False: A router and bridge operate at the same layer of the OSI model.
False
True/False: An intrusion detection system (IDS) can detect attacks within encrypted traffic.
False
True/False: An intrusion detection system replaces a firewall on your network.
False
True/False: Antivirus software will help protect a computer from hackers.
False
True/False: IPSec encrypts data between web browers and web servers
False
True or False: 100BASE-TX Ethernet can send a signal 10 times as far as 10BASE-T Ethernet without the use of repeaters.
False. It can send it 10 times as fast but not 10 times as far.
True or False: There is no real difference between a logical network topology and a physical network topology.
False. Logical topology describes traffic flow, and physical topology is how the computers are physically connected to each other.
True or False: Telnet is more more secure than SSH
False. SSH is more secure than Telnet
True or False: Computers in a star topology use T connector's to attach the computer's network card to the cable.
False. Star topologies use a hub or a switch, and computers connected to them commonly use RJ-45 connectors (for twisted-pair cabling).
What is the first valid host address for a node residing in the 10.119.136.143/20 network?
10.119.128.1
Which of the following answers lists the binary notation of the decimal number 252?
11111100
What is the leading octet value range for an IPv4 address belonging to a class B network?
128 - 191
What is the maximum valid range for IP addresses that can be assigned to hosts on the 134.170.185.46 255.255.128.0 network?
134.170.128.1 - 134.170.255.254
What is the first usable host IP address on the 172.26.56.110/27 network?
172.26.56.97
What port number does Secure Shell (SSH) use by default?
22
Which of the following answers lists the decimal notation of the binary number 11100000?
224
Which of the following answers refer to the leading octet value range and class of the IPv4 multicast address block? (Select 2 answers)
224 - 239 Class D
The default subnet mask for a Class B network is ____
255.255.0.0
What is the maximum number of hosts per subnet for the 10.47.255.1/20 network?
4094 hosts
HTTPS uses what TCP destination port number?
443
a network admin is going to implement a packet filter on a network for internet connections. What must port be allowed dthorugh the fireqall for user to connct to secure websites?
443
Which of the following answers lists the broadcast address for the 46.28.247.109/10 network?
46.63.255.255
Terminal Access Controller access-Control System remote authentication protocol runs by default on port:
49
Registered ports range from 1024 to
49151
Ports referred to as dynamic, or private, or ephemeral ports have numbers in the range of:
49152 - 65535
RTP Control Protocol (RTCP) runs by default on port:
5005
Which of the port numbers listed below is commonly used for Session Initiation Protocol (SIP) non-encrypted traffic?
5060
What is 01100011.00011010 in decimal?
99.26
If you want to allow remote access to 500 users, which type of device is recommended?
A VPN concentrator
If you wanted to ensure that your firewall could block inflammatory email, which type of service would you look for?
Content filtering
Wen all routers in an AS agree bout the path from one point to another, the network is said to be what?
Converged
When all routers in an autonomous system agree about the path from one point to another, the network is said to be what?
Converged
IP addresses can be auto assigned to clients in a network used special servers called ____ servers
DHCP (dynamic host configuration protocol)
What is a security zone that allows public traffic but is isolated from the private network called?
DMZ = demilitarized zone
A _____ server is used to resolve hostnames to IP addresses.
DNS
Presentation layer of the OSI model
Data encryption and decryption typically takes place at the:
The ping tool creates special packets called _____ packets.
Echo request
100BaseTF uses what type of cable medium?
Ethernet over fiber
True or False: WEP is now considered to be the most secure standard for wireless networking.
False. WPA2 is the most secure standard.
An OTDR is used to test what?
Fiber
TCP port 1720 is the default port number for:
H.323
If port 80 is blocked on the firewall, then the ____ protocol will not function through the firewall.
HTTP
TCP port number 80 is used by:
HTTP
Which unsecure protocol uses port 80 by default?
HTTP
Which device monitors inbound and outbound network connections in order to identify suspect activity?
IDS
_____ is the protocol standard used for multicasting on intranets.
IGMP
TCP port 143 is used by:
IMAP
Which devise or software can identify and react to an attack by shutting down a port or dropping certain types of packets?
IPS
An ____ ____ ____ is a system that can detect malicious traffic and close ports or reset connections.
IPS - intrusion prevention system
____ is a flexible protocol that can be used to secure practically all TCP/IP-related communication.
IPSec
A company wants to have an intranet. Where would the intranet web server be located in the network?
In the LAN, usually behind the firewall to the WAN
Presentation layer
In the OSI model, data compression takes place at the:
_____ is the local authentication protocol that is used by default for Microsoft Active Directory and Novell Directory Services.
Kerberos
Data link layer
Layer 2 of the OSI model is also known as:
Network layer
Layer 3 of the OSI model is also referred to as:
Transport layer
Layer 4 of the OSI model is also known as:
Session layer
Layer 5 of the OSI model is called:
The length of time a computer is allowed to use a dynamic IP add. provided by a DHCP server is known as the
Lease time
____ ____ ____ ____ is a protocol that has become the standard for info directories such as Microsoft Active Directory
Litghtweight Directory Access Protocol (LDAP)
____ ____ ____ ____ is a modern protocol that combines the advantages of Frame Relay and ATM and speeds routing by using labels so that decision can be made much more quickly.
MPLS (multi-protocol label switching)
A DNS record that indicates a mail server is an ____ record.
MX (mail exchange)
Which network topology has the most physical connections per host, which means it will have the least collisions?
Mesh
____ ____ ____ is a service that translates one set of addresses to another set of addresses.
NAT (network add. translation)
____ is a type of system that translates one set of address to another one a one-to-one basis.
NAT (network add. translation)
At what layer of the OSI model does a router function?
Network
ICMP is a protocol that works at the _____ layer of the OSI model.
Network
IP is a connectionless protocol that works at the _____ layer of the OSI model
Network
What three elements must computers have in common to form a network?
Network media and topology, protocol, software client or service
Which of the following answers list the characteristic features of the 192.168.0.0 192.168.255.255 IP address space? (Select 2 answers)
Non-routable (private) IP address range Class C range
Which of the following is an example of a valid subnet mask?
None of the above is a valid subnet mask
_____ is one of the protocols used to retrieve mail from SMTP servers
POP3 or IMAPv4
Which two protocol allow secure access to a VPN?
PPTP and IPsec
A _____ record provides reverse lookups in DNS.
PTR
____ ____ is a tech whereby each packet of data can take a separate route to its destination.
Packet switching
Port number 5004 is used by:
RTP
Logging, notification, and shunning are what types of reactions from what type of security device?
Passive reactions from an IDS
A WAP operates at the ____ layer of the OSI model.
Physical
Which of the following statements are true?
Point to Point tunneling Protocol (PPTP) runs on port 1723 Port number 88 is reserved for Kerberos Port 1701 is used by Layer 2 Forwarding Protocol (L2F) and Layer 2 Tunneling Protocol (L2TP)
Your boss tells you to block certain ports on your firewall. What documentation do you need to update?
Policies, procedures, and configurations
Remote Authentication Dial In User Service (RADIUS) protocol run on:
Port 1813 Port 1812
A tech that allows a switch or other device to use and distribute Ethernet current to power the devices is called _____.
Power over Ethernet (PoE)
At the ____ layer of the OSI model, data is compressed (or decompresed) and encrypted or (decrypted).
Presentation (Layer 6)
_____ is a the protocol on which Microsoft Terminal Services operations
RDP (remote desktop protocol)
Which routing protocol uses a next hop as a metric in deciding how to route traffic?
RIP
Implementing policies and procedure that define how corporate info is kept confidential and training employees on these procedures can help prevent what?
Social Engineering
What type of cable would you use to connect a CSU/DSU to another CSU/DSU?
T-1 crossover
____ is a secure remote access and remote control system developed by Cisco.
TACACS+
The two protocols at the Transport layer of the TCP/IP suite are ____ and ____
TCP UDP
The Secure Shell (SSH) protocol uses:
TCP port 22
Lightweight Directory Access Protocol (LDAP) uses:
TCP port 389
HTTP over TLS/SSL runs on:
TCP port 443
What device can measure the time a signal goes down and back on a cable?
TDR
Port number 23 is assigned to:
Telent
Which terminal emulation program is insecure bc it does not encrypt any data, including usernames and passwords?
Telnet
How can you verify that your DMZ is allowing TCP ports throught?
Telnet to the ports in question on the DMZ server
True or False: A mesh topology offers fault tolerance through redundant routes
True
TCP is a connection-oriented protocol that works at the ____ layer of the OSI model
Transport (layer 4)
Network and Session
Transport layer resides between which two other layers of the OSI model?
Port number 5061 is typically used for SIP traffic encrypted with Transport Layer Security (TLS)
True
The add. 192.168.2.1 with a subnet mask of 255.255.255.0 could be a host add. in a private network.
True
Port numbers in the range from 1024 to 49151 are referred as:
User ports Registered ports
A protocol used with VLANs that reduces admin effort and increases accuracy when multiple switches are used, by allowing one switch to propagate info to many other, is referred to as _____
VLAN Trunking Protocol (VTP)
Attacking a network by posing as a trunked interface is an example of
VLAN hopping
_____ are logical subnets that are formed using switches.
VLANs (virtual local area networks)
A _____ is a secure connection that is transmitted through a nonsecure medium, usually the internet.
VPN (virtual private network)
A device that is used specifically to create a tunnel for communication through an inherently unsecure medium is a _____.
VPN concentrator.
A ____ ____ ____ is a used to connect computers using wireless NICs to a wired network
WAP (wireless access point)
Ports between 0 and 1023 are known as:
Well-known ports System ports
You can view the ARP cache on computer by typing ____ on a command line.
arp -a
In the acronym, ASDL when referring to a digital subscriber line, the letter A stands for _____
asymmetric
____ ____ ____ uses 53-byte cells rather than variable-length packets.
asynchronous transfer mode (ATM)
Sophisticated authentication methods that rely on body measurements such as fingerprints, hand prints, and voice prints, retina scans, and so on are types of ____ authentication.
biometric
____ ____ is a tech whereby a single channel is opened at the start of a session and that single channel is used throughout the communication.
circuit switching
An interference caused by wires that run parallel to each other and not twisted together is called _____ .
crosstalk
The networking tech that defines standards for controlling data and that is defined by the IEEE 802.3 standard is
ethernet
ST and SC are both type of ____ connectors.
fiber-optics
A ____ is a hardware device and/or software package that prevents packets from flowing through an interface form one network to another unless they meet a specified criterion.
firewall
RJ-45 connectors can contain up to ____ pairs of wires
four
Whereas IPv4 addresses are formatted in dotted decimal, IPv6 addresses are formatted in
hexadecimal
A device that poses as a server with sensitive data to distract or even trap an attacker is referred to as a ______ .
honeypot
If you are installing cables in between the ceiling tiles of a building, you may be required by a law to use a special type of cable called a _____ cable.
plenum
A _____ service makes a connection to the internet on behalf of a user.
proxy
A WAP in an org. that was not installed by the admin team of that org is referred to as a
rogue access point
____ are Layer 3 devices that can move packets from one subnet to another.
routers
A situation that allows current to flow on a different path than was oringinally intended in the circuit is a(n) _____ ____
short circuit
A device that can be installed into a network with pre-configurations of normal network traffic so that it can determine what is normal and block or even terminate sessions when something is not normal is a ____ ____ .
signature-based IPS
_____-mode fiber is used for very high-speed, very high-distance network apps.
single
NTP is an Application layer that synchronizes _____ between computers on a network.
time
In the media-testing duo referred to as the fox and hound, the hound is actually a _____ and a _____ .
tone generator tone locator
The ____ tool works like the ping tool, but it can be used to determine which router is not able to forward a packet.
tracert
VLANs use special ports between switched called _____ .
trunks
A packet that has one source add. and one destination add. is referred to as a ____
unicast
traceroute
A Linux command line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as:
Router
A device designed to filter and transfer data packets between different types of computer networks is called:
TTL
A field in an IP datagram that specifies how many more hops a packet can travel before being discarded is called:
True
A loopback interface on a router provides the means for basic testing whether the router is on and operational.
traceroute6 traceroute -6
A network command line utility in Linux that tracks and displays the route taken by IPv6 packets on their way to another network node is known as: (Select 2 answers)
tracert
A network command line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called:
Routing table
A set of rules stored on a Layer 3 switch or a networked host that allows to determine the topology of the surrounding network is commonly referred to as:
Route aggregation
A solution used to optimize and decrease the size of a routing table is known as:
Layer 3
At which of the OSI layers IP addressing takes place?
True
Autonomous System Number (ASN) is a globally unique number allocated for a collection of networked systems that operate common routing protocols and are under control of a single administrative authority.
62
How many usable IP addresses can be assigned to hosts on a /26 subnet?
RIPv2 OSPF IS-IS
Examples of interior gateway routing protocols include: (Select all that apply)
OSPF IS-IS
Examples of link-state routing protocols include: (Select 2 answers)
ifconfig
What is the name of a Linux command line utility that can be used to display TCP/IP configuration settings?
Hop count
In computer routing, a rough measure of distance between two networked hosts is commonly referred to as:
Data link layer
In the OSI model, Media Access Control (MAC) and Logical Link Control (LLC) sublayers are the components of:
Transport layer Layer 4
In the OSI model, Transmission Control Protocol (TCP) resides at: (Select all that apply)
Data link layer
In the OSI model, physical addressing takes place at the:
Layer 5
In the OSI model, session layer is also known as:
Network layer of the OSI model
Internet Protocol Security (IPsec) resides at:
Which type of security device or software employs a redirection device known as honeypot?
Intrusion Prevention System (IPS)
Application layer
OSI layer 7 is also referred to as:
Layer 1
Physical layer of the OSI model is also referred to as:
Layer 3 of the OSI model Network layer of the OSI model
Routers operate at: (Select two answers)
False
Routing Information Protocol (RIP) is an example of a link state routing protocol.
Executing the ping command in a loop
The -t switch in the MS Windows' ping utility is used for:
All routers have finished updating their routing tables
The term "Convergence state" refers to a situation where:
True
The term "Default route" refers to the network path used by a router for forwarding all packets with destination addresses not listed in its routing table.
Exterior Gateway Protocol (EGP) Hybrid routing protocol
What are the characteristic features of the Border Gateway Protocol (BGP)? (Select 2 answers)
ping host1 -6 ping -6 host1
What is the correct syntax for checking the IPv6 connectivity with another network node (host1) in MS Windows? (Select 2 answers)
255.248.0.0
What is the do-tdecimal representation of a /13 subnet mask?
Bit
What is the name of a data unit used at the OSI physical layer?
Sessinon layer
Which OSI layer assumes responsibility for managing network connections between applications?
Transport layer
Which OSI layer is responsible for breaking up data into segments?
arp -a
Which command in MS Windows displays a table consisting of IP addresses and their resolved Ethernet or Token Ring physical addresses?
-b
Which netstat parameter allows to display the names of applications and executable file components that are accessing the network?