Network Systems Exam 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

RSSI measures the power of the signal on the receiver's end and is displayed as negative dBm values. The scale used for RSSI measurement varies by manufacturer but typically, RSSI is displayed as negative numbers. What would be the best rating of the four numbers below?

-30 dBm

Each dB up or down represents a change in power. Typically, a 3 dB loss (i.e., -3 dB) indicates that the signal has lost half its power between the transmitter and receiver. However, it's important to note that dB loss or gain is a relative measure. Which of the following are correct answers for a loss of -3 dB? Choose all that apply.

-3dB on 2000 watts = 1000 watts -3 dB on 1500 watts = 750 watts

Jessie wants to check the status of all network adapters on a host. Which switch will they use with ipconfig?

/all

Joe works for a drug manufacturer with six buildings on campus. Each building has two floors, and each floor has an IDF (intermediate distribution frame) for a total of 12 IDFs. How many MDFs does that allow the company to have on campus?

1

Fiber-optic cable is the industry standard for high-speed networking. What are some of the benefits of fiber-optic cable? Select the benefits from the following list.1. Extremely high throughput2. Power over Ethernet (PoE)3. Very high resistance to noise4. Low latency5. Excellent (though not perfect) security6. Fast repair time7. Ability to carry signals for much longer distances before requiring repeaters8. Low cost

1, 3, 5, 7

When using IMAP4, email is downloaded to the client computer and then usually deleted from the server. In contrast, with POP3, the client application manages the email while it remains on the server, making it ideal for accessing email from multiple devices.

False

An MSA (master service agreement) is a contract that defines the terms of present contracts between parties, such as payment terms or arbitration arrangements.

False, it determines future contracts

What is fragmentation and why does it happen?

Fragmentation is the process of dividing packets that are too large for a network's hardware into smaller packets that can safely traverse the network.

Georgy's company has a policy of purchasing only one brand of hard drive when buying spare parts. When Georgy asked his supervisor about the reason, the supervisor explained that it is because the advertised mean time between failures rate of that particular brand is usually very reliable. Why is the reliability of the advertised mean time between failures rate important? Choose all that apply.

Giving devices an MTBF (mean time between failures) allows technicians and others with fiduciary responsibility to determine if a device is a worthwhile investment because of how often it might need replacement. While any single device might experience a failure much sooner or later, vendors and technicians budget for repairs or replacement of devices based on the advertised MTBF.

Master Service Agreement (MSA)

A contract that establishes precedence and guidelines for any business documents that are executed between two parties.

What is the essential difference between a block cipher and a stream cipher? Choose all that apply.

A stream cipher encrypts one bit or byte of data at a time. A block cipher encrypts large chunks or blocks of data at a time.

Anna has an access point that is compatible with Wi-Fi 1 through Wi-Fi 5. She just bought a new computer that is capable of using Wi-Fi 6, but when she tests the speed from her computer to her AP, she is only able to reach Wi-Fi 5 speeds. What is the reason?

Anna's device is not forward compatible.

What are the multiple types of Address Resolution Protocols (ARP) entries? Choose all that apply.

Dynamic ARP table entries Static ARP table entries

Windows 10 will no longer be serviced effective October 14, 2025, with the current version, 22H2, as the final version. All editions of Windows 10 will remain in support with monthly security update releases through that date. What is this date called?

EOS (end-of-support)

Jacqulyn is employed by the Jefferson County Unified School District, which comprises 15 schools. All these schools have duplicate mechanical systems that need constant monitoring to ensure immediate repair in case of any failures. One day, while Jacqulyn was at the district office, she noticed that the air conditioning system at Public School Number 5 was about to fail and would require repair within the next few days. She discovered this problem promptly and without any notification or intervention from either the school or the district. How did Jacqulyn make this discovery without any intervention?

Each school had its HVAC monitored by a SCADA (supervisory control and data acquisition) system. Jacqulyn was able to see the problem presenting in real time due to the HVAC company's dashboard that was tied into the SCADA system.

Landers is facing issues with his networked printer. Initially, it works properly, but after a while, users are unable to print. They receive an error message indicating that the printer cannot be found. How can Landers prevent this issue from occurring in the future?

Landers should use a persistent or static IP address.

Isabel has been a part of her company's IT team for several years. During her tenure, she has added some unusual items to the company's knowledge base. Some of the following answers are actual data in the knowledge base. Can you guess which ones are real knowledge base material?

LaserJet A only works with new paper; it jams if you try to use recycled paper. Inkjet printer B will not work on WiFi unless the SSID is on. It throws a cannot connect error message if the SSID is hidden

Katherine goes to her banking website to transfer money between her checking and savings accounts. Before she makes a transaction, she looks at the top left of her browser's navigation bar and sees that the website is using HTTP and not HTTPS. What should Kathrine do?

Leave the website since HTTPS is not secure.

If Address Resolution Protocol (ARP) is responsible for IPv4 network host discovery through Internet Control Message Protocol (ICMP),, how do IPv6 devices learn about other devices on their networks?

NDP (Neighbor Discovery Protocol)

What type of crosstalk occurs between wire pairs near the source of a signal?

NEXT

Emei has recently been hired as a technical assistant by a major network component manufacturer. She will be part of a quality control team responsible for checking network interface cards (NICs) for any damage or defects. However, before starting her actual work, her supervisor has asked her a basic question related to NICs. The question is: "On which layer or layers does the NIC operate, and what are some examples of the protocols that a NIC uses for communication?" Choose all that apply.

NICs work at the physical layer (Layer 1) and the data link layer (Layer 2) Ethernet protocol Wi-Fi protocol

Layer 3. of the OSI Model

Network layer. The Routing Layer- IP, ICMP and ARP protocols (Ex: IP Address, Router, Packet)

Erin was studying for her Network+ certification exam when she encountered this question, "Which OSI model layer is responsible for reformatting, compressing and encrypting data in a way that the application on the receiving end can read?" What is Erin's answer?

Presentation Layer (Layer 6)

Layer 6. of the OSI model

Presentation layer. Encoding/Encryption of information (Ex: SSL/TLS)

What forms of authentication are provided by Wired Equivalent Privacy (WEP)? Choose all that apply.

SKA (Shared Key Authentication) OSA (Open System Authentication)

Which fiber type consists of a narrow core of 8 to 10 microns in diameter and can accommodate the highest bandwidths and longest distances (without requiring repeaters) of all wired network transmission media?

SMF (single mode fiber)

Diana is seeking ways to effectively manage her network. There are protocols available that allow network managers to check, monitor, and gather information about network traffic. These protocols can alert network administrators about any adverse conditions that require attention to maintain the health of their network and host devices without relying on third-party software. Which protocol offers this capability?

SNMP (Simple Network Management Protocol)

Alvin is an independent contractor who works for a major book publishing company that specializes in scholastic books. His responsibility is to create test questions for some of those books. Before starting any project, Alvin has to sign a legal document that lays out his duties, including specific tasks, deliverables, standards, payment schedule, and project timeline. This document is legally binding, which means that it can be enforced in a court of law. What type of document is this?

SOW

To establish configuration management (CM), the first step is to take inventory of existing systems and their current configurations. Once a system functions effectively in a production environment, it is considered to be in its baseline configuration. The next step is to gather the data files into a central repository. What is this repository called?

SSOT (single source of truth)

Xander is the IT manager for SimCo, which has offices located in both San Francisco and New York. Today, he is planning to test a new employee on their knowledge of how the network connects between the two offices. This is a standard connection; no encryption is involved. So, new hire, what is involved in making the connections between the San Francisco and New York offices?

San Francisco LAN-WAN/ISP/WAN-New York LAN

Which layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?v

Session (Layer 5)

Layer 5. of the OSI Model

Session layer. Communication between devices. tasks are performed by the OS when an application makes an API call to the OS (Ex: Control Protocols, Tunneling Protocols)

Gael wants to remote into a client's computer using Telnet, but the client refuses. Why is the client refusing to allow Gael to use Telnet?

Telnet is not an encrypted application. Therefore, transmissions can be subject to spying.

Connie is configuring the network for a new restaurant that her company is about to open. She has five desktop computers, four LaserJet printers, and three laptops. She plans on using a peer-to-peer environment. What makes peer-to-peer suitable for Connie's restaurant? Choose all that apply.

The computers on a peer-to-peer network can share folders and files without the need for an expensive server. A peer-to-peer network is simple to configure and requires little technical expertise.

Billie is a systems administrator and recently installed new coaxial cable in his office due to issues with jitter with the exiting cable installation. He had some connectors left over from the last installation and ordered new cable. The cable was installed properly, However, after completing the installation, the jitter worsened, and employees were unable to host or participate in video meetings. How could Billie have avoided this situation?

The connectors should have been specific to the cable.

Joe recently purchased a new Wi-Fi router for his small company of 10 people. It's his first time using Wi-Fi, and he only needs one router to cover his entire office. Now he needs to name his network. His friends suggested that he should name it something recognizable, but when he connected and turned it on, it worked flawlessly, so he left it alone. Joe doesn't have a computer background and doesn't want to mess with it. Why is it a bad idea to keep the default name on a Wi-Fi router? Choose all that apply.

The default SSID is usually the router's make and model. Default password and username for routers can be found on the dark web.

Why are onboarding and offboarding policies especially critical in a BYOD (bring your own device) environment? Choose all that apply.

It gives the IT department permission to monitor device activity or to wipe data from the device with or without further notice. The IT staff can ensure the safety of the network while allowing access to a wide range of employee-owned devices using network resources. It allows for IT staff to monitor company data on personal devices to ensure that personal data is not commingled with the company's sensitive information, and to keep the company's intellectual property safe.

Stephen was installing a new patch bay in the server room. What's the purpose of a patch bay?

It is a panel of network connections that can be mounted to a wall or a rack and provides a central termination point where many patch cables converge in a single location.

What is the purpose of ping localhost?

It is another way of pinging your loopback address.

What is impedance, and how is it expressed? Choose all that apply.

It is expressed in ohms (Ω). It refers to the measure of opposition to a current's flow through a cable. It combines resistance, inductance, and capacitance.

What is the reason as to why ARP (Address Resolution Protocol) is sometimes said to function at layer 2.5?

It touches IP and MAC address information at both layers.

It is important to regularly rotate keys, replacing old keys with new ones and re-encrypting data previously encrypted with the old key using the new one. Why is it important to rotate keys?

Key rotation reduces the risk of data being compromised.

As in life, just as a journey starts with a first step, in troubleshooting that journey starts with the very first question. To identify the problem and its symptoms, you first have to ask one simple but very important question. What is that question?

What has recently changed?

In networking, "bandwidth" can be used in multiple contexts. What are they? Choose all that apply.

When discussing frequencies, bandwidth identifies the full range of available frequencies (the width of the band) for a specific application. When discussing data rates, bandwidth identifies the theoretical maximum number of bits per second.

Shawn previously worked for a small networking company but now works for a Fortune 500 firm. He wants to add some RAM to a server, but his supervisor told him that he would have to submit a change request form first. Shawn was surprised by this, as in his previous company, he could make changes without such formalities. When he asked his supervisor about this, he was told that a change request was needed because the server would have to be taken offline. However, Shawn was unsure why taking the server offline would require a change request. Why do you think taking a server offline requires a formal change request?

When making changes to a mission-critical device, such as a server, change request documents are needed to protect everyone involved by documenting the processes. This ensures changes will not disrupt workflow or blame a specific employee.

What type of analyzer can evaluate Wi-Fi network availability as well as help optimize Wi-Fi signal settings or help identify Wi-Fi security threats?

Wi-Fi analyzer

Katlin is working on a network map and needs the symbol that represents a firewall. What is that symbol?

a brick wall symbol

Shawn is a network technician and works in the server room for a Fortune 500 company. There are 20 racks of servers in the room, and all of them need to be monitored, controlled, updated, and occasionally rebooted. How does Shawn service those servers in all those racks?

Use KVM (keyboard, video, and mouse) switch to alternate between all servers on one console.

Marcelo is aware of the WPA3 Wi-Fi protocol and would like to switch to it. He bought his router in 2020, and the protocol was introduced in 2018, so his router should have it. However, when he tries to turn it on through the router's web interface, he can't find the setting. What could be the reason that WPA3 is not available on Marcelo's router? Choose all that apply.

The router is WPA3 compatible, but the firmware has not been updated. The mandate to make all routers WPA3 compatible did not apply to the router that Marcelo purchased.

Madian is having trouble with a computer communicating on the network. So, they check the NIC and the IP address to determine if there is an issue. Assuming the NIC is working properly, and the IP address is accurate, why does the computer not communicate with the rest of the network?

The subnet mask is not correct for this network.

Aloise is experiencing network issues. It appears that a workstation is showing an error message upon booting up, indicating that the IP address is already in use. What can be the issue? Choose all that apply.

Two workstations have the same static IP address. One IP address was not reserved by DHCP.

Bianca is live-streaming from her friend's birthday party. What Internet protocol is most likely being used for this service?

UDP

Jeremy was sitting in the network operations center (NOC) watching a live stream from the president of his company. As he was watching the feed, he noticed that the picture was a little "glitchy," occasionally patches of color would be missing from the feed. There was nothing he could do about it because of the way the feed was being transmitted. What protocol could the feed be transmitting in, and why would it look like there were errors in the feed?

UDP. It does not provide error checking or correction mechanisms, so if a packet is lost or corrupted during transmission, it will not be retransmitted, which is why the image had data packets dropping out of it.

Jai is responsible for ensuring that his company's network hardware remains operational at all times. He oversees network operations, which include managing servers, routers, and everything in between. To ensure that these devices function properly, Jai and his team make sure that each mission-critical hardware device has at least one duplicate critical component, such as a NIC, fan, or processor. Then, if a component fails, another one will take over without any loss of connectivity. What is this an example of?

fault tolerance

What are some examples of IoT devices? Choose all that apply.

garage doors bathroom scale

Shaunda is the owner of a café and wants to provide Internet access for her customers. However, she does not want them to access the company network, go beyond the café's perimeter, or engage in any illegal activities on the network. What security configurations should she make to her Wi-Fi network to ensure that it is set up securely? Choose all that apply.

geofencing guest network captive portal

Which address can be routed on the Internet and is similar to public IPv4 addresses? Most begin with the prefix 2000::/3.

global address

Jeremy's company follows a yearly procedure of updating and maintaining a network inventory of all important assets that it owns. The nonconfidential information is then transferred to an internal wiki, which allows the IT department to access it throughout the year and make necessary changes as hardware and software are retired and replaced. What are some examples of items that would be included in the network inventory documentation? Choose all that apply.

network configuration software procedures

Jill was conducting her weekly network check when she observed an unfamiliar IP address. She resolved to investigate the origin of the IP address. Which network tool would be most suitable for her investigation on a Windows network?

nslookup

Shielded twisted pair (STP) cable and unshielded twisted pair (UTP) cable can both transmit data at the same speeds up to a point. At what speed does STP surpass UTP?

over 10 Gbps

Whitley was watching their favorite show on one of the streaming services when suddenly the image started to jump, and the sound began to cut in and out. What is this problem known as? Choose all that apply.

packet delay variation (PDV) jitter

Jamee has been asked to install an update that fixes a few bugs and zero-day vulnerabilities in the latest version of Windows. What type of software change is this?

patch

Dixon wants to confirm that the new NIC (network interface card) that he installed on a Windows computer is working properly. What command-line utility will he use to test it?

ping

The Telnet protocol is a utility used for terminal emulation in Telnet client-server applications that permit an administrator or another user to remotely control a computer. However, it is no longer considered safe to use Telnet for controlling other computers. What are the reasons for this issue? Choose all that apply.

poor authentication no encryption

What are some of the factors that influence the effective range of wireless technology? Choose all that apply.

power of the antenna physical barriers interference in the environment

Ingrid is in charge of managing one division of her company's IT department, which is responsible for out-of-band management. The other division of the department handles in-band management help desk issues. Ingrid likes to work in the out-of-band management division since it provides remote options that are not accessible when working in-band. What are some of the functions that are unique to an out-of-band scenario?

power up a device reinstall an operating system troubleshoot boot problems

Which DNS server is contacted by clients, both local and over the Internet, to resolve DNS queries for the organization's domains?

primary DNS server

In order for an application or service to receive data, a port number must be assigned to it. What is it?

process

What is the term for the geographic area that can be covered by an antenna or wireless system?

range

Gino has two power supplies for each mission critical server. What is this an example of?

redundancy

When the wave encounters an obstacle and reflects, or bounces back, toward its source, a wireless signal will bounce off objects whose surface dimensions are large compared with the signal's average wavelength. What is this phenomena called?

reflection

As a wave travels into and through a different transmission medium, such as when traveling through glass or other solids, the wave's direction, speed, and wavelength are altered. What is this phenomenon called?

refraction

Port numbers range from 0 to 65535 and are categorized by IANA into three types. What is the port range called ranging from 1024 to 49151 and can be used temporarily by processes for nonstandard assignments to increase security?

registered ports

Gavin just lost his company phone and reported the loss to the IT department. Since IT does not have physical access to the device, what will they do to ensure that their data does not fall into the wrong hands?

remote wipe

When an employee leaves a company, IT is responsible for offboarding. What is IT's role in offboarding?

revoking access to company data and removing company-related software from the employee's devices

Edsel's electrical engineering firm is collaborating with an architectural firm to create a new twenty-story building. At present, they are in the process of determining where the cable and wire locations will be for the building. What type of cable will Edsel's firm use when running it between floors?

riser-rated

Adrian is a new employee and as per company policy, he must undergo emergency training for the building, regardless of the company he works for. During the training, he was shown around the building and saw the fire sprinklers and fire extinguishers. He was also shown the gas system suppression system and saw how it is activated. Later, when he reached his department, they discussed targeted fire suppression and detection methods. They explained how they suppress fire without damaging sensitive electronics. Adrian is then given a test about the emergency systems. The question asked was "At what level to you find gas suppression systems?" How did Adrian answer?

room level

Maddox is setting up two separate networks on different floors of a building for the sales and marketing departments. Although the networks are completely separate, they need to be able to communicate with each other. Which device should be used so the networks can communicate?

router

At the beginning of a Transmission Control Protocol (TCP) segment, TCP manages several elements by posting data to fields in the TCP headers. What are some of these elements? Choose all that apply.

sequencing checksum flow control

What is established when a host receives a request to communicate on a port?

session

What network interface card (NIC) setting allows travel in only one direction?

simplex

Hesperia's company does not have uninterruptible power supplies (UPSs) on their server racks. If the power goes out, the power to the racks goes out too. What is this an example of?

single point of failure (SPoF)

What is the combination of a host's IP address and a process's TCP or UDP port, separated by a colon called?

socket

What is the term used to describe what happens when speed and duplex settings are not supported by a neighboring device and result in a slow or failed transmission?

speed and duplex mismatch

Garry recently upgraded to Windows Server 2022 for his small business. Like many small businesses, he was using outdated versions until now. During his exploration, he came across a new feature called DNS server, which is a built-in DNS service that works in conjunction with Active Directory Services. In the past, he needed two DNS servers-one for internal clients and one for external clients. However, now he can handle both types of clients with a single DNS server. What is this configuration known as? Choose all that apply.

split-brain split-horizon

Jacoby arranged five computers and two network-capable Laserjet printers in his office and connected them to a switch. What is this physical topology called?

star topology

What command is used to elevate privileges in Linux?

sudo

Antonella wants to send a private email to her friend Margaret. To ensure the privacy of the email, she uses GnuPG (GNU Privacy Guard) to create a key. She then sends the email to Margaret, and later sends the key to her. What type of encryption is Antonella using in this scenario?

symmetric encryption

Diya, a network administrator, prefers using command-line tools to monitor traffic on Linux servers in her network. What utility would Diya use to do this?

tcpdump

Alfredo visits a client's site to work on their network equipment. What is the name of the room designated for this equipment? Choose all that apply.

telecommunications room data closet

Ron received a call from one of his clients, who was experiencing issues with a workstation and needed assistance. However, due to the distance between Ron's location and the client's office, which was over 50 miles away, Ron couldn't make it to the client's office on the same day. To solve the problem, Ron requested the client's permission to log into their computer so he could troubleshoot the issue. This is an example of what type of function?

terminal emulation

Fabian was requested to help resolve a wiring issue for one of his clients. It turns out that the new network technician that they hired had manually made the cables, but the company discovered that these cables were not functional with the devices. What's the first thing that should be examined in this scenario?

that the cables were wired to their plugs properly to T568A or T568B standards

Noise, or interference, can distort a signal on a network. Signal strength changes are measured to determine signal loss (negative) or gain (positive). How is signal strength measured?

the change in signal strength is measured in dB (decibels)

True story: Fred was the marketing manager for a non-profit organization that collected donations through an online portal. One day, he received a message from a donor reporting an error message that appeared when attempting to make a donation: "NET::ERR_CERT_DATE_INVALID."The donor expressed their regret that they could not donate online due to this problem, which caused the organization to lose money. Fred was uncertain about the cause of the error and involved the IT team in investigating the issue. What did the IT team discover?

expired SSL certificate

What is the difference between an Address Resolution Protocol (ARP) table and a Media Access Control (MAC) table? Choose all that apply.

An ARP table maps layer 3 IP addresses to layer 2 MAC addresses. A MAC address table maps layer 2 MAC addresses to layer 1 physical interfaces on a device.

There are several computers on the network that are not keeping time properly. Since it is more than one, it is most likely that it isn't the CMOS battery. So going from the simplest issue to the more complex, in what order should you try to resolve the issue? Trying changing to a different NTP server in case there is a network bottleneck. Check to make sure NTP port 123 is open on any relevant firewalls. Confirm the system is configured to set its time from a valid NTP server.

2, 3, 1

In what order were the Wi-Fi standards released? 1. 802.11a 2. 802.11g 3. 802.11b 4. 802.11ac 5. 802.11n 6. 802.11ax 7. 802.11be

3, 1, 2, 5, 4, 6, 7

IPSec creates secure connections in five steps. Put the following steps in order of operation. 1. Key management 2. Data transfer 3. Security negotiations 4. IPSec initiation 5. Termination

4, 1, 3, 2, 5

Which impedance rating is better for computer networks?

50 ohms

Devon needs to purchase new racks for his server room. The industry standard measures racks in rack units (RU or U). He plans to buy racks that are 42U tall, and one rack unit is equivalent to 1.75 inches. How tall are the racks Devon plans on purchasing?

6ft

DoT (DNS over TLS), pronounced dot, is the practice of securing DNS resolution requests directly using SSL/TLS. What port does DoT use by default?

853

The wireless spectrum is defined by the Federal Communication Commission (FCC) as a range of frequencies or bands. What is the range of frequencies?

9 kHz and 300 GHz

Hal is deciding whether to use the switch or hub in his network. So, he asks his best friend, a network technician, for advice. Hal asks his friend, "What's the main difference between a switch and a hub?" How does his friend answer?

A hub broadcasts incoming data to all ports, while a switch directs incoming data to the port(s) that will send it to its intended destination within the local network.

Tommy is currently in the process of selecting a firewall to purchase. With several options available, each specializing in different layers of the OSI model, he has decided to opt for a layer 7 firewall over a layer 4 firewall. Why would Tommy choose a layer 7 firewall?

A layer 7 firewall can read through the entire message to check for signs of malware.

Statement of Work (SOW)

A narrative description of products, services, or results to be delivered by the project.

Hennessy is studying for the Network+ certification exam. The question asked is, "What is the definition of a network?" How does Hennessy answer?

A network is a group of computers and other devices (such as printers) that are connected by some type of transmission media.

Memorandum of Understanding (MOU)

A non-binding agreement between two or more organizations to detail an intended common line of action

Nan is the IT manager for a company that's expanding into new offices. She has three business units in different offices: sales, engineering, and accounting. She wants to keep the networks separate but also wants the devices on each network to communicate with each other in the same office. How should the office be set up?

A router with three routing ports serving the three offices and a switch for the hosts.

During the data transfer step in IPSec, a secure channel is established to facilitate secure transmissions and then the data is encrypted before transmission. Which types of encryption can be used? Choose all that apply.

AH (authentication header) encryption ESP (Encapsulating Security Payload) encryption

Layer 7. of the OSI Model

Application layer. Layer We See (Ex: Gmail, Twitter, Facebook)

Authentication and authorization are two distinct processes. What distinguishes these two processes? Choose all that apply.

Authentication is the sign-in process. Authorization determines what the entity can do once it gets into the resource.

What is the most popular DNS server software on the market today?

BIND (Berkeley Internet Name Domain)

What is the reason for pinging the IP address 127.0.0.1? Choose all that apply.

Check to see if the NIC in the host is working. Check to see if TCP/IP services are running on the host.

Emmi is her company's IT manager. Since her company is growing, she wants to switch from a peer-to-peer (P2P) networking architecture to a client-server architecture. The company has grown to 30 users, so why is it better for her to use a client-server architecture over peer-to-peer? Choose all that apply.

Client-server users can sign on to the network from any computer and get access to the resources that Active Directory allows. This process is managed by AD DS (Active Directory Domain Services). Sharing files on a peer-to-peer network means creating 30 user accounts to share documents and then set up each workstation with the same user accounts. In a client-server network, an administrator can ensure only authorized users can access the network. In a client-server network, an administrator can control what files a user can open, read, or edit.

Mark was hired as a network technician for a major technology firm. On his first day at work, he received an ID badge that was a swipe card on a lanyard and a PIN. He was informed that, to enter any restricted area on campus, he must use his swipe card and the assigned PIN. Moreover, he was told that every swipe with his card and PIN would be logged and kept. It was emphasized that he must not allow anyone to enter behind him. He should always close the door behind him, and the next person must use their swipe card to enter. Any violation of this policy could lead to suspension without pay. A couple of months later, Mark enters a meeting room with his swipe card when a person walked up behind him and asked him to hold the door. This person had boxes in their hands. If you were Mark, what would you do?

Close the door on the person without any acknowledgement.

When setting up a network router, the first step that any networking professional should take is to change the default SSID, username, and password of the device. These are crucial steps that should be followed whether setting up a SOHO network or a corporate network. Why are these steps so crucial?

Default SSIDs and their accompanying usernames and passwords are easily found.

Patty was having an issue with one of her computers at the office. She was unable to access the Internet despite having a correct DNS and static IP set up on the workstation. What could be causing the issue?

Default gateway was not set.

Garrett is a network administrator for a business that has 200 employees with approximately thirty employees offsite at any given time. Lately, Garrett has noticed that some employees are having trouble logging into the network, particularly during the later part of the day when more people are trying to log in. Garrett is working with a class C address scheme. What may be causing this problem? Choose all that apply.

DHCP pool exhaustion leases are set too long

Pacheco is setting up a new router for his network. The router will also work as the DHCP server. Normally, most routers use a Class C block of IP addresses for devices on a network, as most networks do not have more than 254 devices connected to them. However, Pacheco wants to limit the amount of IP addresses available to the network without the use of CIDR notation. Thus, he decides to define a specific range of IP addresses for the router to use. What is the defined range of IP addresses called? Choose all that apply.

DHCP scope DHCP pool

Darwin is planning to set up five different networks for five different offices for the same company and in the same building, all of which will be connected to a single ISP. Each network will be confined to a single large office, which will have five computers and a LaserJet printer. All devices within the individual offices will be interconnected. Darwin needs to know how many NICs in the router and how many switches will be needed for his plan to work? For the time being, there will be no communication between networks.

Darwin needs six NICs for the router. One for each network and one for the ISP connection, and he needs five switches; one port on each switch will be dedicated to the NIC on the router.

layer 2. of the OSI Model

Data Link layer: deals with Frames, and translation from hardware to data, Switches operate here. (Ex: Frame, MAC Address, EUI-48, EUI-64)

Why is it important to understand the difference between bits and bytes when describing data quantities versus throughput? Choose all that apply.

Data storage quantities are typically expressed in multiples of bytes and use a capital "B" as in GB for gigabytes. Data transmission quantities (in other words, throughput) are more commonly expressed in multiples of bits per second with a small "b" as in Gbps, such as 1 Gbps (gigabits per second).

Francisco worked in a Network Operations Center (NOC) for a medium-sized business. Everything was working fine on Friday, but on Monday, he received some technical service tickets complaining about the Internet being down. He started investigating the issue by looking through the visitor logs. He knew that a cleaning crew comes once a week to clean the floors of the NOC and make sure there is no dust around the desks. He discovered that the cleaning crew had been inside the NOC on Saturday. Francisco then checked every rack and noticed that some cables were unplugged, which were connected to a router connected to the WAN. He plugged the cable back in, and the Internet came back online. What troubleshooting step was Francisco on?

Establish a plan for resolving the problem.

Orien has recently discovered that two ports on one of his company's managed Layer 3 switches are intermittently failing. Since all ports on the switch are already in use, replacing the switch would cause significant disruption to the majority of the office staff. Orien must adhere to the change management policy in place and develop a plan that will minimize any potential disruption to the staff. What troubleshooting step is Orien on?

Establish a plan for resolving the problem.

What type of connector is most often used with RG-6 cables?

F-type

Which wireless technology transmits short bursts of data on a particular frequency within the band and then moves to the next frequency in the sequence?

FHSS (frequency hopping spread spectrum)

A common application layer protocol used by voice gateways to initiate and maintain connections is the TCP/IP protocol.

False

A physical address is embedded on every network adapter on the globe. This is called a NAC (Network Access Control) address.

False

Fiber-optic cable only requires one strand of cable for full-duplex communications.

False

IPSec is an enhancement to IPv6.

False

TCP/IP is a suite of protocols, or standards, that includes TCP, IP (IPv4 and IPv6), UDP, ARP, and many others. Many of these protocols function by adding information at the end of messages transported across the network in fields called footers.

False

The MAC (Media Access Control) address is on the physical layer (layer 1) of the OSI Model. It is embedded in every NIC and is assumed to be unique to that NIC.

False

Rayco just finished repairing a company laptop. There seemed to be a memory chip issue. Sometimes, while the user traveled with the laptop, the system would randomly crash and get a blue screen of death (BSOD), and occasionally the system became unstable or would sometimes lose data. This only happened when the laptop was traveling, such as in an airplane, or was just taken out of luggage after traveling. When the laptop was at the office, everything was fine. After the user explained the symptoms to Rayco, he believed he knew most likely what the problem was. So, he took apart the laptop and checked the memory modules. One of the chips was not all the way pressed into its slot. So, he pushed the chip back in its slot and checked the other chips; everything else was fine. Rayco then put the machine back together. What is a good way for Rayco to test the laptop to see if he can get the same errors to happen again?

Handle it like you would if you were on a trip. Roll it over different terrain in a suitcase for a couple of days, put it in and take it out of the car, and then check it again for errors by using the onboard diagnostic utilities.

Anwar was working on his desktop computer and left it on while he worked on it. Suddenly, the screen went blank, and the computer restarted. Just before this happened, Anwar felt a slight shock. What might have caused the computer to restart? Choose all that apply.

He discharged static electricity onto the motherboard because he wasn't grounded, which shocked the board and caused it to reboot.

Besides IP, what other protocol plays a significant role on both IPv4 and IPv6 networks?

ICMP

What is the protocol that can traverse (internetwork) more than one LAN segment and more than one type of network through a router?

IP

What type of address is used only at the network layer for routing purposes?

IP address

Roberto is a specialist in creating complex layer 3 network diagrams. His company sends him to clients during the design phase of network infrastructure projects. What does a layer 3 network diagram usually contain? Choose all that apply.

IP addressing schemes subnetting router configuration

Why is there no fragment offset field in an IPv6 packet?

IPv6 hosts adjust their packet sizes to fit the requirements of the network.

What are the main differences between TLS and SSL? Choose all that apply.

TLS uses slightly different encryption algorithms than SSL. TLS operates at the transport layer and SSL operates at the application layer.

Jackson is currently preparing for his Network+ certification exam and has encountered a question regarding the communication of computers on a network via common protocols. The question asks about the two primary network protocols that are used for communication. What are those primary protocols?

TCP/IP

What are the differences between data storage and data throughput measurements? Choose all that apply.

In data throughput, the prefix "kilo" means 10 to the 3rd power (written as 103), or 1000. In data storage, the prefix "kilo" means 2 to the 10th power (written and 210), or 1024.

Jirair wants to display all IP addresses associated with a Linux device. He types "Ip address show" and gets the message "Ip: command not found." What is the reason for this response?

Linux/UNIX commands are case sensitive.

David is new at his networking job, and his supervisor quizzes him on the differences between physical and logical network topology. What is the correct answer?

Logical network topology refers to how data is transmitted between devices in a network. Physical topology deals with the actual layout of devices and cables.

The data link layer is unique because it can be divided into sublayers. What are those sublayers? Choose all that apply.

MAC sublayer LLC (logical link control) sublayer

What defines the maximum payload size that a layer 2 frame can encapsulate?

MTU (maximum transmission unit)

Benjamin, who works in the IT department, is receiving multiple calls about LCD monitors flickering intermittently. He sends out a technician to adjust the controls, and the issue stops for a while but keeps happening. When they checked the inventory list, they discovered that 10 people have the same make and model of monitor, and three of those employees have been experiencing the same problem. This means that 30% of the user base is having issues with those monitors. What should Benjamin do?

Notify the network administrators to see if all 10 monitors should be replaced.

Lani just started working at a Network Operations Center (NOC) and must follow certain guidelines whenever she uses tools in her job. Which government agency provides these guidelines?

OSHA

Joel is experiencing problems with a segment of his fiber-optic network. He had some work done on one of the cables recently and the cable had to be spliced. However, he suspects that the splice might be faulty and wants to test it to confirm. Which tool should Joel use to determine if there is a faulty splice or any other issues with his fiber-optic network?

OTDR (optical time domain reflectometers)

Which wireless technology divides data streams and encodes them into small chunks called chips, which are spread over all available frequencies at the same time?

Omnidirectional sequence

Tia is using a smartwatch, a Bluetooth headset, and carrying her phone. What type of network is this an example of?

PAN (personal area network)

Layer 1. of the OSI Model

Physical layer. Hardware, Cabling, Connectors. (Ex: Cable, Network Interface Card, Hub)

Jonas is laying cable in the ceiling (space above the tile) of an office space for a client. Because of the location, it has to be a specific type of cable. What type of cable is it, and why is this type of cable used? Choose all that apply.

Plenum cabling This cable is coated with a flame-resistant jacket that produces less smoke than regular cable coated with PVC (polyvinyl chloride), which is made from a cheaper plastic that is toxic when burned.

Martin's company is in the market for a new printing press, and given that these machines cost over $500,000, the chosen company must be vetted carefully. There are certain requirements that must be met before a decision can be made. Here are some of the things that Martin's company is looking for: smart sensors that can notify the repair company when a repair is needed, a machine that fits within a specific size footprint, and when running at full speed, produces no more than 45 dB of noise. What is the document Martin is sending to vendors?

RFP

Willanda had a passion for working with computers. In fact, she loved it so much that she would occasionally build them from scratch for her friends. One of her golden rules was to never work without an ESD wrist strap, which protects the computer from static electricity. However, one day a friend called her in need of help because a memory chip had died. Willanda went to her friend's house to fix it, but she realized that she had forgotten her ESD wrist strap at home. Despite this, she was still determined to complete the task. She proceeded very carefully, taking all necessary precautions to avoid any potential damage to the computer. How was Willanda able to accomplish her task without damaging the computer or injuring herself even though she did not have the wrist strap?

She unplugged the computer and grounded herself by touching the metal chassis and sometimes the power supply.

True life story: Allan was an employee of a small company that had 15 people, five desktops and 10 laptops. One of the laptop's OEM management software systems had recently notified Allan about the availability of a new BIOS update that needed to be installed. The first step was to save a copy of the old BIOS, and then the ROM was flashed with the new BIOS firmware. However, after installing the new BIOS firmware, the laptop would not turn off automatically, so the old BIOS firmware had to be reflashed. The problem was that there were 10 laptops of the same make and model in the office, all of which needed a firmware update, according to the OEM management software. Now, Allan was facing a risk. Should he update the firmware of the remaining laptops and hope the same problem doesn't occur? Or should he disable BIOS updates for all the affected laptops to prevent this problem from happening altogether?

Since there are only 10 laptops, shut off BIOS updates for the ones with the issue and continue to update for the rest of the laptops.

What does a switch learn when it stores a device's MAC address in its MAC address table?

Switches use MAC addresses to identify devices on the local area network.

Melanie is currently preparing for her Network+ certification exam, and she has been presented with the following question, "What are the primary transport layer protocols, and what is their function in transporting application layer payloads from one application to another?" How does Melanie answer? Choose all that apply.

TCP (Transmission Control Protocol) is a connection-oriented protocol used by apps like web browsers and email. It ensures data delivery by making a connection with the end host, checking if the data is received, and resending it if required. UDP (User Datagram Protocol) is a connectionless protocol that doesn't guarantee delivery and is used for broadcasting, streaming video/audio over the web, and monitoring network traffic where guaranteed delivery is not as important as fast transmission. UDP is called a connectionless protocol or best-effort protocol and is also referred to as the fire-and-forget protocol.

Marica purchased a new doorbell camera that broadcasts on the 2.4 GHz band. However, the new AP she purchased only broadcasts on the 5 GHz band. What issue will arise from this scenario?

The AP and doorbell camera will not be able to communicate.

Jaymes is told by his supervisor that he needs to go to the ER to check the LAN connections. What's the ER?

The ER or equipment room is also known as the MDF (main distribution frame). It is the centralized point of interconnect for an organization's LAN, CAN, or WAN.

Why is the ISN (Initial Sequence Number) of the first SYN message in the three-way handshake considered a security risk?

The ISN is calculated by a predictable clock-based algorithm.

While conducting a network audit, Hamid discovered that the Media Access Control (MAC) address of a workstation had changed since the previous audit. What could be the explanation for this change?

The NIC was replaced.

Mace is in the process of setting up his email account and is being prompted for his POP3 server address. What does the POP3 server do when email is sent to it?

The POP3 server is responsible for receiving email on a mail server. When Mace logs on, the POP3 server will download the email to his email client, such as Outlook, and then typically remove it from the server.

Larkyn is in the process of setting up his email account and is being prompted for his SMTP server address. What is the SMTP server address for?

The SMTP server address is used whenever Larkin's sends email.

Jaklyn attempted to access a website but was unsuccessful. Even after trying the website's name, the website couldn't be found. However, when Jaklyn used the IP address, the website was accessible. What could be the reason that a website can be accessed using an IP address but not its name?

The DNS servers were offline.

Christina works for a managed service provider specializing in network infrastructure for medium-to-large-size companies. The first thing she does when she arrives at a client's site is to look for the EF (entrance facility). What is the purpose of the EF?

The EF is where the telecom company accepts responsibility for the external connection.

Gale is using Wireshark to inspect their network and has identified an IP address of 192.168.1.10:8080. What does this address signify?

The host with that address is using its web browser, and the network is utilizing PAT (Port Address Translation).

Kimberly has just started her new job on Patch Tuesday. In her previous job, she always allowed her systems to auto-update, but her new supervisor has instructed her not to do so. Why would it be better, in some circumstances, not to allow auto-updating? Choose all that apply.

The impact of the change must be fully understood before it is allowed to happen. A determination needs to be made as to whether the patch or upgrade is necessary. Simply adding new features or functionality to software might cause more work than it's worth in time and money

Debbie is trying to connect to her router. She has the SSID correct but still cannot log in. What could be the problem?

The passphrase is case sensitive, and she accidentally left her caps lock on.

True story of another ATM scam. This has been reported happening in California and involves a wireless technology called near-field communications (NFC). A customer goes to an ATM to withdraw cash. However, they find that the ATM card slot is jammed. At this point, a outwardly kind individual suggests that they use the tap function on their card to withdraw the money. The customer then uses the tap function to withdraw their money. They successfully complete their transaction and leave the ATM. However, when they receive their bank statement at the end of the month, they discover that an additional $3,000 has been taken from their account. How could that have happened? Choose all that apply.

The tap function requires that the transaction be closed manually. The customer did not close out the transaction. The outwardly kind person is really the bad actor.

Layer 4. of the OSI Model

Transport layer. Transport-layer protocols add control information in an area at the beginning ofthe payload (Ex: TCP Segment, UDP Datagram)

An IP address is an address assigned to each node on a network, which the network layer uses to uniquely identify them across multiple networks.

True

Authentication is a process of ensuring that an entity is who they say they are.

True

DNS (Domain Name System) helps clients find web servers over a network such as the Internet. It translates domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) that computers use to communicate with each other over a network.

True

DNS servers can coexist on the same machine depending on the needs of the network

True

IPv6 is not the protocol used most for communications over the Internet.

True

Project management is the application of specific skills, tools, and techniques to manage projects within the planned project scope, scheduled time, and budgeted cost.

True

Protocols are rules used between networked devices for communication.

True

SSIDs are case sensitive. MYCAR does not equal MyCar.

True

Servers and switches contain temperature sensors within each device's chassis, which can alert network technicians if a device is becoming overheated.

True

The process of designing, implementing, and maintaining any of the systems including operating systems, network services, databases, and applications is called the system life cycle.

True

The term inventory management refers to the monitoring and maintaining of all assets that make up a network.

True

Irene enjoys working with a client-server architecture. Although it is typically more complex in design and maintenance than its peer-to-peer counterpart, a client-server architecture offers many advantages. What are some of the benefits of working in a client-server environment? Choose all that apply.

User accounts and passwords to the network are assigned in one place. Problems on the network can be monitored, diagnosed, and often fixed from one location. Access to multiple shared resources (such as data files or printers) can be centrally granted to individual users or groups of users.

In an enterprise setting, configuring wireless access for clients to the network can be a complex process. What is involved in the onboarding process? Choose all that apply.

Users or network technicians install a specific app called an agent on a user's device, which gives the device trusted access to certain portions of the network. Certain network administrative features might all be controlled by the device's permission levels enabled by on boarding that device. The agent might also scan the device for any needed OS or security updates, required security settings (such as timeouts or sign-in requirements), and any existing malware.

Warda just finished repairing a company desktop computer. There seemed to be a power supply issue. The user told Warda that sometimes the computer would shut down for no reason and occasionally they would hear strange noises coming from the power supply fan. Once there was a burning smell coming from the computer. So after hearing those symptoms, Warda replaced the power supply with a new, more powerful one. She then ran tests on the power supply through the CMOS utilities, and the problem disappeared. What troubleshooting step was she on?

Verify functionality and implement preventive measures.

Randy is setting up security for his home network. Which Wi-Fi security protocol will he use for his home network environment?

WPA2-PSK

Warda is planning to install fiber optic cables throughout her campus. However, there are several issues that she needs to address before executing the installation. One of the main issues is deciding whether to use multimode or single-mode fiber. If she considers price, multimode would be the cheaper option. However, if she wants to cover a longer distance, single-mode fiber would be the best choice. Warda's campus is extensive, so it requires a long distance to be covered. Moreover, there has been a significant increase in data traffic since the addition of new programs like robotics, ethical hacking, and networking to the curriculum. Lastly, legacy systems are still in place, which is an important factor to consider when deciding which product to use. Which option do you think Warda should choose, and why?

Warda should opt for multimode fiber since there are some existing legacy systems in place. Choosing this option would mean that only the cable would need to be upgraded without having to replace the legacy systems, which would otherwise increase the project cost. Although there may be some signal fade issues with multimode fiber over long distances, a signal booster can be used to address this, and the installation process is relatively simple compared to single-mode fiber installation.

Axel is the network administrator for a mid-sized company that has offices on five nonconsecutive floors in a 50-story building. The company is located on floors 30, 35, 36, 40, and 41, and each floor has a "telecom closet" where all of the switches and routers are located. However, the "telecom closets" on floors 30 and 41 are vacant. The company also has an actual server room situated on the 35th floor. Lately, Axel has been receiving complaints about data errors from the 30th and 41st floors. On the 41st floor, Wi-Fi users have noticed their signal strength dropping to almost zero, and their network connections frequently drop. They must resend emails because they fail to send the first time.On the30th floor, file transfers slow down significantly and sometimes time out. Additionally, employees experience a lot of jitter in the signal when they are streaming live presentations.

add 2 repeaters

What type of crosstalk occurs between two cables?

alien crosstalk

A network signal may weaken as it travels due to interference. What device strengthens it?

amplifier

Which IPv6 address identifies multiple destinations, with packets delivered to the closest destination?

anycast address

Which OSI layer protocols collaborate with User Datagram Protocol (UDP) to emulate some of the reliability provided Transmission Control Protocol (TCP)?

application layer

Danika frequently uses online banking to check her account balance, transfer funds, and pay bills. However, she has never paid attention to the mechanism that authenticates her identity when logging in or how the system recognizes that she is using a different computer. For instance, she wonders why she receives a notification on her phone when she logs in from a new browser on a different device than she has previously used. What is this a function of?

asymmetric encryption

As a wireless signal moves away from the transmission source, it becomes weaker. What is this phenomenon called?

attenuation

What is the transmission flaw that is the loss of a signal's strength as it travels away from its source?

attenuation

What factors can cause signal degradation? Choose all that apply.

attenuation noise latency

Briar needs to look up the port on which a TCP/IP service is running. Which utility should they use?

netstat

Kenneth toured the new building's telecom room and saw a dozen switches connected with a fiber connection on one port and the rest of the ports connected to Cat 8 cable. What is the fiber conduit called?

backbone

What is the purpose of the Link Layer Discovery Protocol (LLDP)? Choose all that apply.

discover neighboring networking devices discover information about neighboring networking devices such as configurations or capabilities

What is the network interface card (NIC) setting that allows signals to travel in both directions over a medium simultaneously?

duplex

As a standard procedure, Kim checks cable connections before she plugs anything into her network. As she is checking a cable, she discovers that the wire has a crossed pair. Which is the tool she is using to make this determination?

cable continuity tester

What is the most common way to measure latency on a data network?

calculating a packet's RTT (round trip time)

What are digital certificates primarily used for?

certifying and securing web servers where sensitive information is exchanged

Eric is a sales manager at a local TV station. During conference calls with clients, he faces a frustrating problem: he cannot have two-way conversations with them. The communication is one-sided, where he speaks first, and then the client speaks. Unfortunately, this often creates a challenge for Eric, as he sometimes needs to interrupt his clients while they are talking. Since his calls go through his computer, how can this issue be fixed?

change his NIC settings to duplex

Delilah is experiencing difficulty with one of the workstations on her network. Although the workstation has connectivity with other devices on the network and the Internet, most devices on the network are unable to detect it. How can this issue be resolved?

change subnet mask

Jenine was having issues with her home network, i.e., getting one segment of her wireless network to connect to her wired network. One segment worked fine, but the other would not connect, even though the network name on both segments and the wired network were the same. What can be causing this issue? Choose all that apply.

channel mismatch password is incorrect

Effective and secure key management is critical to the safety of an organization's data, which is encrypted using keys. Where should keys never be kept? Choose all that apply.

code documents scripts

What is the process called that efficiently, effectively, and securely handles system configurations to maintain a desired state and to track configuration changes over time?

configuration management

Service License Agreement (SLA)

contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.

What are the common sources of noise that can cause interference on a network during transmission? Choose all that apply.

crosstalk EMI (electromagnetic interference)

What are some of the possible reasons for an AP association to get stuck? Choose all that apply

edge of the network's coverage range environmental factors MAC address filtering

What is the best way to ensure a strong signal and eliminate, or at least mitigate, noise from signal transmissions? Choose all that apply.

ensure that the strength of the signal exceeds the strength of the noise proper cable design and installation

Electrical signals travel at a speed supported by the conductor material, such as copper, and can approach the speed of light. However, there are other factors that can affect the rate of data transfer. What are some of these factors? Choose all that apply.

data transmission methods shielding signal frequency

What are some of the life cycle phases that network components progress through so that the network is constantly being improved? Choose all that apply.

design planning requirements analysis development and testing evaluation

Which of the following devices have NICs (network interface cards) either on board or attached to an expansion slot not including wireless adapters? Choose all that apply.

desktop computer printer router

Which utility is used by default to perform a DNS lookup in Ubuntu?

dig

What is the network interface card (NIC) setting that allows signals to travel in both directions over a medium but only in one direction at a time?

half-duplex

What information does the CNAME record hold in a DNS resource record?

holds alternative names for a host, such as blog.mycompany.com or shop.mycompany.com

What is the one command that is common to Windows, UNIX, and Linux systems?

hostname

When working on a UNIX/Linux device and needing to display basic TCP/IP information, which commands can be used? Choose all that apply.

ifconfig ip

In terms of security, data exists generally in three states. In what state is data being moved?

in transit

Roger is troubleshooting a computer that cannot connect to the Internet, even though the IP and subnet mask are correct. What could be the issue?

incorrect default gateway IP address DNS issues

Nathan's wireless network is located in a busy company that employs about 50 people. Every day around noon, when the lunch rush starts, he notices that the wireless signal becomes spotty. Sometimes it drops to barely any signal, and sometimes it drops altogether. However, after the lunch rush, the network works normally again. What might be causing this issue?

interference from electromagnetic interference (EMI)

To see an abbreviated summary of configuration information, what tool is used?

ipconfig

Alice worked with both Linux and Windows environments and required help with TCP/IP settings. What commands should she use to obtain help documentation? Choose all that apply.

ipconfig /? man ifconfig

Ifconfig has been deprecated in many Linux distros. What does deprecate mean in this instance?

is not installed by default

What is the purpose of encryption?

keep information private

Temporal Key Integrity Protocol (TKIP) was added to address the encryption issues of WEP. What were the significant improvements of adding TKIP? Choose all that apply.

key distribution encryption message integrity

How is data transmitted through fiber-optic cable? Choose all that apply.

laser light-emitting diode (LED)

If a router that reads and processes the network layer header and leaves alone the transport layer header. At what layer is the router working?

layer 3

Jessica and her team received a notice stating that the router they had purchased a year ago had a security vulnerability with a Common Vulnerabilities and Exposures (CVE) score of 9.0 out of 10. Due to the severity of the rating, it was recommended that they immediately update the firmware to fix the problem. While updating the firmware, they also accessed the inventory control system to gather more information. What are some additional details about the router that Jessica and her team discover by reviewing the inventory list?

location of where the routers are installed how many of those routers they have

Vasyl resides on the first floor of an apartment building just above the garage. Recently, he noticed that whenever he enters the garage from the street or is parked outside his unit, he can easily log in to his home network. He is concerned about the security of his network and wants to know how he can prevent any unauthorized access from outside the apartment or from within the underground garage. How can Vasyl fix this issue? Choose all that apply.

lower the power levels on the router move APs away from exterior walls

Jenney wants to connect all her devices to one another without a central device, creating a fully interconnected network. What is this physical topology called?

mesh topology

In WPA, TKIP aimed for backwards-compatibility, but WPA2's CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) ensures future-focused data confidentiality. How does CCMP provide encryption and packet authentication? Choose all that apply.

message encryption message integrity

Given the same maximum frequency, what new technologies offer innovative methods for increasing theoretical bandwidth and effective data throughput? Choose all that apply.

modulation (sending data over an analog signal) encoding (converting data into a digital signal for transmission)

Which IPv6 address delivers packets to all nodes in a targeted, multicast group?

multicast address

Madison was summoned to a client's office due to cable connection issues. Upon arrival, Madison identified that one of the cables had been rolled over and had acquired a dent. Therefore, she decided to measure the voltage before proceeding with the troubleshooting process. Which tool will Madison use to measure the voltage on the cable?

multimeter

What form of transmission allows many signals to travel simultaneously over one medium?

multiplexing

Jason has a problem with his network. He recently switched to Wi-Fi from Ethernet since he thought it would be much easier to manage, as he would add workstations with Wi-Fi NICs as his company grew, instead of adding a cable drop for each new employee that needed a computer. He has a large office space that was not a standard shape and had many out-of-the way offices that needed coverage. As he started adding people, but not nodes, he noticed his network was having many more packet collisions issues than during his original baseline network assessment. What is this problem called, and how can he fix it?

the hidden node problem

Idris has recently started as an intern at a network outsourcing firm. His supervisor is conducting a quiz for all the new interns to test their understanding of networking and the OSI model. One of the questions posed to the interns is: "Which OSI layer is responsible for transmitting messages from one node to another until they reach their intended destination host?" How should Idris answer?

the network layer (Layer 3)

When multiple wireless devices transmit a signal at the same time on the same frequency, signals can interfere with one another, which is called a collision. Why do collisions reduce network performance?

the signal must be retransmitted

Jeremy has recently moved to a new office space. During his visit to the network room, he noticed that none of the cables were labeled to indicate which port they were connected to in the wall sockets located around the rooms. Which tool will Jeremy use to find the correct connections?

toner and probe

Although electrons travel rapidly, they still must travel, and a brief delay takes place between the instant when data leaves the source and when it arrives at its destination. This delay is called latency. What are some of the factors that can cause latency? Choose all that apply.

transmission conversions processing delays network traffic congestion

Lynn is sending a message to a colleague, who is located on the other side of the country. The message contains information about some intellectual property that their company has recently designed. It is crucial that the data remains confidential and is not leaked to anyone. In this scenario, which IPSec transmission mode would be the most suitable for ensuring secure communication

tunnel mode

Jackson needs to set up a dedicated Wi-Fi signal for his company's conference room using a point-to-point transmission. Which antenna should he use?

unidirectional

A local school district is in the process of installing new ceiling-mounted projectors in each classroom. However, some of the classrooms have drop ceilings, and there is no power outlet in close proximity to where the projectors will be placed. How should the IT department install projectors in these rooms that lack a close proximity to a power outlet?

use PoE (Power over Ethernet)

What are some common security threats to Wi-Fi networks? Choose all that apply.

war driving evil twin WPS/brute force attack

Port numbers range from 0 to 65535 and are categorized by IANA into three types: What is the port range called ranging from 0 to 1023 and is assigned by IANA to widely used and well-known utilities and applications, such as SSH, Telnet, FTP, and HTTP?

well-known ports

What are some common reasons why a Wi-Fi client cannot connect to the AP? Choose all that apply.

wrong SSID encryption protocol mismatch incorrect passphrase


Set pelajaran terkait

Ankle and Foot: Part 4 (Insufficient Dorsiflexion)

View Set

The Endocrine Pancreas and Glucose Regulation

View Set

Chapter 43: Assessment of Digestive and GI function Prep-U

View Set

Peds - Chapter 31: Health Supervision

View Set

Chapter 16: Public Choices, Public Goods, and Healthcare

View Set

Ch 43 Hepatitis, cirrhosis, pancreatitis *

View Set