[Chapter 11 - Networking] TestOut PC Pro

Ace your homework & exams now with Quizwiz!

Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select three.)

191.168.2.15 168.16.5.1 129.0.0.1

Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select two.)

32 numbers, grouped using colons Hexadecimal numbers

To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol?

3389

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following is the BEST choice for this wireless connection?

Bluetooth

Examine the following output: 4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [205.171.205.29] 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1] Which command produced this output?

tracert

Which of the following is a specialized controller that you can use to remotely manage all your network devices?

SDN

You are currently learning about networking devices and have just learned about MAC addresses. You look up your device's MAC address, and it comes back as 00-B0-D0-06-BC-AC. Which portion of this MAC address can tell you who the manufacturer is?

00-B0-D0

Which of the following IP addresses are Class B addresses? (Select three.)

129.0.0.0 190.65.2.0 132.12.0.0

You are currently using a cellular network plan that provides maximum speeds of up to 10 Gbps for your smart phone. Which of the following cellular network types are you using?

5G

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions should you recommend?

802.11g

You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share?

SMB

You have recently purchased a toll pass for a bridge that you cross each day on your way to work. Which of the following wireless technologies is MOST likely being used for this pass?

Active RFID

A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. Which of the following changes to the SOHO router is MOST likely to restore internet connectivity?

Configure the SOHO router for NAT.

Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. Which of the following would BEST meet your emoloyer's needs?

DCS

A technician has configured a client computer's network interface with server addresses to which the client will send requests for translating fully qualified domain names (FQDNs) to IP addresses and IP addresses to FQDNs. Which of the following TCP/IP suite protocols is used by the client to perform the request and also used by a server to respond to those requests?

Domain Name System (DNS)

A technician has configured a client computer's network interface to request an IP address. Which of the following TCP/IP suite protocols does the client computer use to perform the request and receive an IP address from a server?

Dynamic Host Configuration Protocol (DHCP)

A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate content while browsing the web. Which of the following actions would help accomplish this goal?

Enable content filtering.

When using TCP, two hosts first establish a connection through a three-way handshake. From the items on the left, drag the three valid steps in the three-way handshake process to the right in the appropriate order.

First step - The first host sends a SYN packet asking to create a new session. Second step - The receiving host replies with a SYN-ACK packet acknowledging that the session can be created. Third step - The first host replies with the ACK packet, which then opens the session.

You are the network administrator for a small consulting firm. The firm has recently rolled out a new intranet site, and you are responsible for configuring the DNS. You are able to connect to the intranet site by using the IP address, but you cannot connect by using the hostname. Which of the following do you need to configure to access the site with the hostname?

Forward lookup zone

You have subscribed to a satellite radio service that you use in your car to access music and news on long trips through areas where cellular service is not available. However, when going through long tunnels and heavily forested canyons, you sometimes lose your signal for a short period of time. Which of the following satellite technologies is your service provider using?

GEO

Which of the following hardware devices regenerates a signal out to all connected ports without examining the frame or packet contents?

Hub

Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server?

IMAP

Which of the following UTM appliances monitors all network traffic and blocks malicious traffic while notifying the network security team?

IPS

Which of the following is a network that uses internet technologies, but the data and services are only available to the hosts connected to the private network?

Intranet

Which of the following issues causes variations in the latency of VoIP packets?

Jitter

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections by hardware address?

MAC address filtering

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols. Which of the following network types is in use?

Personal Area Network (PAN)

Currently, your company is in the process of upgrading security in the company headquarters building by installing biometric sensors to limit access to specific rooms. Your network switches are PoE-enabled, which allows biometric sensors to connect to switches without an external power source. Which of the following PoE standards is designed for use with biometric sensors?

PoE+

A technician is installing a network-enabled smart home control system in a SOHO. Which of the following configurations is MOST likely required on the SOHO router in order to access the system from the internet?

Port forwarding

You want to connect your internal network to an external network in order to provide internet access to your employees. Which of the following network components is designed to make this type of connection?

Router

Which of the following identifies the network name on a wireless network?

SSID

A healthcare organization provides mobile clinics throughout the world and needs to transfer patients' statistical data to a central database via the internet. Which network technology would be BEST to use to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

Match each port number on the left with its associated protocol on the right.

Secure Shell (SSH) - 22 Apple Filling Protocol (AFP) - 548 HyperText Transfer Protocol Secure (HTTPS) - 443 HyperText Transfer Protocol (HTTP) - 80 Server Message Block (SMB/CIFS) directly over TCP - 445 Service Location Protocol (SLP) - 427 Internet Message Access Protocol (IMAP) - 143

Which of the following network types uses special hardware to provide high-speed access to storage across the network?

Storage area network

Which of the following defines which network a device is connected to?

Subnet mask

A laptop has a wired connection to a network and is configured with a static IP address. The link light on the NIC is lit, but the laptop cannot communicate with any hosts on the local network. Which of the following is the MOST likely cause of the issue?

The IP address conflicts with another host on the local network.

Which of the following identifies the interface ID component of an IPv6 address? (Select two.)

The last 64 bits of an IPv6 address. The last four quartets of an IPv6 address.

Match each smart device with its description.

Thermostat - Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions. Switch - Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. Bulb - Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. Plug - Easy solution for making small appliances such as lamps, coffee makers, and toasters smart. Security camera - Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. Door lock - Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to a device's status. Speaker/digital assistant - Uses voice recognition software and activates through a Wake Word or Hot Word.

Which of the following is an inherent vulnerability of embedded devices?

Unknown environments

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which of the following Transport layer IP suite protocols is MOST likely used for this service?

User Datagram Protocol (UDP)

Which of the following authentication methods allows you to securely connect a printer to the wireless network with the least amount of effort?

WPS

What are the two mesh protocols that are used most often with IoT devices? (Select two.)

Zigbee Z-Wave

You are troubleshooting network connectivity issues on a Windows workstation. Which command would you use to view the network adapter's MAC address?

ipconfig /all

Which utility can you use to view a computer's current connections, active sessions, and ports?

netstat

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation, and an application you are using is unable to connect to a Windows server named FileSrv2. Which of the following commands would work BEST to test network connectivity between your workstation and the server? (Select two.)

ping tracert

Match each utility on the left with its corresponding description on the right. (Each utility may be used once, more than once, or not at all.)

ping - Sends an ICMP echo request/reply packet to a remote host. A few simple replies to this request from the remote host indicates that a connection exists between sender and receiver. Performs a continuous connection test when used with the -t option. tracert - Tests connectivity between devices and shows the routers in the path between the two devices. nslookup - Resolves (looks up) a speficied hostname's IP address. netstat - Displays current connections and incoming and outgoing connections. Displays active sessions, ports, sockets, and the local routing table.

Drag each wireless networking technology on the left to its associated transmission distance limitation on the right. Each technology may be used more than once.

Infrared - Up to 2 meters with a few obstacles in between. Bluetooth - Up to 100 meters for Class 1 devices. Up to 10 meters for Class 2 devices. Near Field Communication - A few centimeters.

Match each network type on the left with the appropriate description on the right. Each network type may be used once, more than once, or not at all.

Local Area Network (LAN) - A network in a small geographic area that typically uses wires to connect systems together. A set of subnets connected to each other, typically by wires, using at least one router. Personal Area Network (PAN) - A small network used for connecting devices, such as a notebook computer, a wireless headset, a wireless printer, and a smartphone. Metropolitan Area Network (MAN) - A network that is typically owned and managed by a city as a public utility. A network that covers an area as small as a few city blocks to as large as an entire city. Wide Area Network (WAN) - A group of networks that are geographically isolated, but are connected to form a large internetwork. Wireless Local Area Network (WLAN) - Similar to a standard LAN, but uses radio signals instead of wires to connect systems together.

Which Windows network location enables network discovery and allows files and printers to be easily shared?

Private

You have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. The default gateway address is 192.168.1.254, and the router is providing DHCP on the network. The Wrk2 computer has been assigned the IP address of 192.168.1.55. Which of the following is considered the loopback address for the Wrk2 computer?

127.0.0.1

Your Windows workstation has Automatic Private IP Addressing (APIPA) implemented with default settings. Which of the following TCP/IP addresses could you automatically assign to the system, should your DHCP server go down or become inaccessible?

169.254.1.26

You are a junior network technician for a small consulting firm. You have recently learned about IP addressing and run the ipconfig command on your local computer. The output from the command is: IPv4 Address..... 192.168.0.52 Subnet Mask..255.255.255.0 Default Gateway..192.168.0.1 Which of the following is the host ID?

52

Which of the following are valid IPv6 addresses? (Select two.)

6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1

A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased. Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs?

802.11ac

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard works BEST in this situation?

802.11n

You are working as a junior technician for a small consulting firm. You have been tasked with installing a new computer on the network. You have performed this task and connected the computer to the network. To verify network connectivity, you decide to ping the network server. Before this can happen, the new device needs to know the MAC address of the network server so it can match it to the IP address. The computer sends a broadcast message, asking who has the IP address. The network server responds with its MAC address, and now the computer can communicate with the server. Which protocol is being used when sending the broadcast message to match the MAC address to the IP address?

ARP

A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when one person in the office streams video from the internet. Which of the following configuration changes on the SOHO router is MOST likely to improve the VoIP performance?

Change QoS settings to give VoIP traffic more priority.

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router?

Change the router's default password.

A technician receives a notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over routers. The technician verifies the settings outlined in the notification. Which of the following actions should the technician take NEXT?

Check for and apply firmware updates.

You are the IT technician for your company. Which of the following mechanisms would BEST allow you to resolve a hostname to its associated IP address? (Select two.)

DNS hosts file

Which of the following are IoT systems that work together to make communication between two endpoints possible? (Select two.)

Data storage Gateway system

You have just connected a new computer to your local network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having problems. Which of the configuration values would you most likely need to change?

Default gateway

After several new computers are connected to a network device, every computer connected to the device begins to experience slow transfer speeds. Which of the following is the FIRST step to troubleshoot this problem?

Determine whether the network device is a hub or a switch.

Which of the following locations will contribute the greatest amount of interference to a wireless access point? (Select two.)

Near backup generators Near cordless phones

You want to allow your users to download files from a server running the IP protocol. You also want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?

FTP

A user reports that they cannot browse to a specific website on the internet. From their computer, you find that a ping test to IP address of the web server succeeds. A tracert test shows 17 hops to the destination web server. What is the most likely cause of the problem?

Incorrect DNS server address

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20 Which of the following is the MOST likely cause of the problem?

Incorrect default gateway

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet, which uses the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask. . . . . . . . : 255.255.0.0 Default Gateway . . . . . . : 192.168.1.1 DNS Servers . . . . . . . : 192.168.1.20 192.168.1.27 Which of the following is the MOST likely cause of the problem?

Incorrect subnet mask

Several of your employees are experiencing limited connectivity issues when trying to access some websites on the internet from their workstations. However, they can access the local company network without any problems. You have already tried using the ip and ipconfig commands to determine that the websites can be reached and that the IP information on the workstations is configured properly. You know that the connection to your internet service provider is working properly as well. What should you do next?

Make sure that the DNS server is functioning properly.

You have just installed a wireless network, but the network is experiencing slow speeds, especially when accessing the internet from your workstation. Which action should you try FIRST to resolve the issue?

Move the wireless access point.

A user pays for a retail purchase by placing a smartphone next to the merchant's reader. Which of the following wireless mobile device connections is this?

NFC

Which of the following wireless communication technologies can be described as follows? It has a limited transmission range of less than two inches. It is used with credit cards and passports. It is slower than other wireless technologies. It constantly emits a signal.

NFC

Which of the following network components is responsible for converting digital data into a signal that can be transmitted?

Network interface

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer?

Peer-to-peer

Which of the following is a common cause for high latency issues on a network?

Port flapping

What are two major concerns regarding IoT devices? (Select two.)

Privacy Hacking

Match each authentication protocol on the left with its unique characteristic on the right. (Each protocol may be used more than once).

Remote Authentication Dial-In Service (RADIUS) - Sends a user's credentials over UDP. Only encrypts the password. Terminal Access Controller Access-Control System (TACACS+) - Sends a user's credentials over TCP. Kerberos - Is a key component of Windows Active Directory. Provides a trusted Key Distribution Center (KDC).

Which of the following DHCP scope options will assign a static IP configuration to a device using the device's MAC address?

Reservation

Which of the following items of information does a packet header contain? (Select three.)

Sender Data chunk order Receiver

A technician determines that an older network hub that connects 24 workstations is performing poorly due to excessive network collisions. Which of the following network devices would be the BEST replacement?

Switch

You are a junior network technician for a small consulting firm. Your team recently split the network into smaller subnets, one for each department. One of your users, Jaclyn in HR, is trying to access shared files from Tom's computer in the sales department. Jaclyn states she was able to previously access these files. As part of your troubleshooting, you verify that both Tom and Jaclyn can access the network printer in their departments. Which of the following would be the MOST likely reason Jaclyn is unable to access files on Tom's computer?

Tom and Jaclyn are no longer on the same subnet.

You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees from visiting certain types of websites. The client also needs a VPN. Which of the following internet appliances should you install?

Unified Threat Management

Which of the following are options for connecting a computing device, such as a notebook computer or tablet, to a cellular network? (Select four.)

Use a USB cellular adapter to connect the device directly to the cellular network. Use a USB cable to connect the device to the network through a smartphone. Use an integrated cellular antenna to connect the device directly to the cellular network. Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hot spot.

You are working as an installer for a small IT company. One of your residential clients has purchased some IoT devices and you have been tasked with installing them for the client. These IoT devices will be networked together in a small network. Each device will connect to each other and act a relay for the network signal so additional network infrastructure will not be needed. Which of the following best describes this type of network?

Wireless mesh network

You are using a patch panel to connect the computers in your building to the appropriate switches, and you need to connect the Ethernet wires from the building network port cables to the patch panel. Where do you connect the wires on a patch panel?

You connect the wires to the backside of the panel.

You need to view detailed IP configuration information on your Windows workstation. In addition to the IP address, subnet mask, and default gateway configuration, you need to see the network card's MAC address and the addresses of the DHCP and DNS servers the workstation is communicating with. Which command would you enter at the command line to see this detailed information? ------------------------------------------------------------- When you see the DNS server address, you realize that this information needs to be updated. Earlier in the day, you implemented a new DNS server with a new IP address. The workstation will update this information in 24 hours. Which command can you enter at the command line to update the DNS server information right away?

ipconfig /all ipconfig/flushdns

You are the computer specialist for a small business. Your company server is named FS1 and has an IP address of 10.0.0.2. The hardware in your company server has started to experience intermittent failures, so you transfer the shares on the server to a spare server and take the main server offline. The spare server has an IP address of 10.0.0.3. You edit the existing A record for FS1 on your company's DNS server and redirect the hostname to the spare server's IP address of 10.0.0.3. Afterward, most users are able to access the shares on the spare server by hostname, but several users cannot. Instead, they see an error message indicating that the FS1 server cannot be found. Enter the command you can run from Command Prompt on these workstations that will allow them to access the shares on FS1 without performing a full restart.

ipconfig /flushdns

You are troubleshooting network connectivity issues on a workstation. Which command would you use to request new IP configuration information from a DHCP server?

ipconfig /renew

You have had several employees call the help desk where you work, complaining that they are not able to reach the www.widgets.com server. To help troubleshoot this issue, you decide to run a variety of commands. Which of the following commands is MOST likely to return the IP address of the desired server?

ping www.widgets.com

You are the network administrator of a branch office for your company. The branch office network is part of a WAN that covers most of the United States. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. Which of the following TCP/IP utilities would be BEST to use to troubleshoot the routers?

tracert


Related study sets

ATI Nutrition: chp 7 Nutrition Across the Lifespan

View Set

Table 7-13 Abnormalities of the Optic Disc

View Set

Chapter 13: The Strategy of International Business

View Set

Chapter 5 Annuity Principles and Concepts

View Set

Lab 12: Implement DHCP Relay Agent (Module 8)

View Set

Understanding Patho Chapter 35 & 36 - Digestive System - GI Disorders

View Set

Chapter 6 Quizlet Canada New Book!

View Set

user mgmt and SQL Server Security pt 1

View Set