M01B_PRACTICE_Final_Exam

Ace your homework & exams now with Quizwiz!

A host has an address of 100.55.177.99/16. Which of the following is the broadcast address for the subnet?

100.55.255.255

Which of the following uses metal clips placed over plastic slots to connect individual copper wires?

110 block

Which of the following are frequencies defined by 802.11 committees for wireless networking? (Select two.)

2.4 GHz 5.75 GHz

What is the decimal form of the following binary IP address? 11001101.00111001.10101001.01000010

205.57.169.66

Which port does Telnet use?

23

Which network address and subnet mask does APIPA use? (Select two.)

255.255.0.0 169.254.0.0

You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment, which your client complains runs too slowly. She wants to upgrade the network to run up to 600 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work BEST in this situation?

802.11n

Which of the following is the open standard for tagging Layer 2 frames?

802.1q

Which of the following BEST describes Ethernet flow control?

A configuration that sends a pause frame to the transmitting device when the receiving device cannot keep up with the volume of data being sent.

Which of the following best describes DHCP scope exhaustion?

A denial of service from a lack of IP addresses in a DHCP server's pool.

Larry is tasked with implementing a VoIP system in the office. He presents his research to his boss, who wants to use the current hard phones to save money. What BEST explains why this is not possible?

A hard phone does not have the internal computing parts to accept VoIP transmissions.

Which of the following do hosts on a private network share if the network utilizes a NAT router?

A physical IP address

While viewing the status of interfaces on a Cisco switch, you see an abnormally large number of CRC errors on one interface. This interface is connected to a user's workstation that is located in a cubicle on the second floor. What could cause this to happen?

A strong EMI emitter near the cable connected to that interface.

Which of the following is a valid MAC address?

AB.07.CF.62.16.BD

While browsing the internet, you notice that the browser displays ads linked to recent keyword searches you performed. Which attack type is this an example of?

Adware

Which of the following describes how an extended access control lists can improve network security?

An access control list filters traffic based on the IP header information, such as source or destination IP address, protocol, or socket number.

Which of the following BEST describes an ARP spoofing attack?

An attack that associates an attacker's MAC address with the IP address of a victim's device.

Which of the following are specific to an extended Access control lists? (Select two.)

Are the most used type of ACL. Use the number ranges 100-199 and 2000-2699.

What is the primary purpose of RADIUS?

Authenticate remote clients before access to the network is granted.

What is the primary countermeasure to social engineering?

Awareness

Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?

CSU/DSU

What does SNMP use to identify a group of devices under the same administrative control?

Community strings

You want to make sure that all users have passwords over eight characters in length and that passwords must be changed every 30 days. What should you do?

Configure account policies in Group Policy.

You want to connect a laptop computer running Windows to a wireless network. The wireless network uses multiple access points and WPA2-Personal. You want to use the strongest authentication and encryption possible. SSID broadcast has been disabled. What should you do?

Configure the connection with a pre-shared key and AES encryption.

Which of the following tasks is associated with the Session layer?

Connection establishment

Which of the following features does UDP provide? (Select two.)

Connectionless datagram services Low overhead

You have configured a wireless access point to create a small network and configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do?

Decrease the beacon interval.

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having issues. Which of the following configuration values would you MOST likely need to change?

Default gateway

Which device is NAT typically implemented on?

Default gateway router

What does the Windows Update Delivery Optimization function do?

Delivery Optimization provides you with Windows and Store app updates and other Microsoft products.

Which of the following describes the point where the service provider's responsibility to install and maintain wiring and equipment ends and the customer's begins?

Demarc

A network switch is configured to perform the following validation checks on its ports: All ARP requests and responses are intercepted. Each intercepted request is verified to ensure that it has a valid IP-to-MAC address binding. If the packet has a valid binding, the switch forwards the packet to the appropriate destination. If the packet has an invalid binding, the switch drops the ARP packet. Which security feature was enabled on the switch to accomplish this task?

Dynamic ARP inspection

Which of the following services automatically creates and deletes host records when an IP address lease is created or released?

Dynamic DNS

Which IPSec subprotocol provides data encryption?

ESP

Which of the following is the process of breaking a message into packets, adding controls and other information, and then transmitting the message through the transmission medium?

Encapsulation

A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the website from being accessible on the internet. Which solution should you implement?

Ethernet bonding

Which of the following IPv6 addresses is used by a host to contact a DHCP server?

FF02::1:2

Which type of cabling do Ethernet 100BaseFX networks use?

Fiber optic

Which backup strategy backs up all files from a computer's file system (regardless of whether the file's archive bit is set or not) and then marks them as backed up?

Full

Which of the following is a device that can send and receive data simultaneously?

Full-duplex

Which of the following are considered VoIP endpoints?

Hard phones and soft phones

Which of the following are the components of a SAN?

Hosts, storage, and SAN fabric

You have a small network with a single subnet connected to the internet, as shown in the exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstation should use RouterA as the default gateway and DNS1 as the DNS server address. From the drop-down menu options, select the appropriate parameters to configure the workstation's TCP/IP settings.

IP address 192.168.12.46 Subnet mask 255.255.255.240 Default gateway 192.168.12.34 DNS server 198.162.1.22

You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that can both accommodate the company's current size and scale as the company grows. The service needs to provide adequate storage as well as additional computing power. Which cloud service model should you use?

IaaS

What role does ARP play in the routing process?

If a router does not know a destination device's MAC address, it sends an ARP broadcast containing the destination device's IP address and requesting its MAC address.

Which of the following are advantages of using fiber optic cabling for a network? (Select two.)

Immunity to electromagnetic interference Greater cable distances without a repeater

Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.75 GHz Bandwidth per channel: 40 MHz Because of your facility's unique construction, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do?

Implement antenna diversity.

You're replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network? (Select two.)

Install a RADIUS server and use 802.1x authentication. Configure devices to run in infrastructure mode.

Which recommendation should you follow while using 110 blocks for connecting Cat5 and higher data cables?

Keep wire pairs twisted up to within one half of an inch of the connector.

Which of the following do switches and wireless access points use to control access through a device?

MAC address filtering

Which of the following technologies uses variable-length packets, adds labels to packets as they enter the WAN cloud, and uses the labels to switch packets and prioritize traffic?

MPLS

You have a server that has a 100BaseFX network interface card you need to connect to a switch. The switch only has 100BaseTX switch ports. Which device should you use?

Media converter

You want to measure the voltage, amps, and ohms of various devices. Which tool should you use?

Multimeter

Which of the following BEST describes port aggregation?

Multiple ports linked together and used as a single logical port.

You're installing network wiring for a new Ethernet network at your company's main office building. The project specifications call for Cat 5e UTP network cabling and RJ45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of Cat 3 network cable in storage. Upon closer inspection, it appears very similar to the Cat 5e wiring. To finish the project, should you use the Cat 3 cabling as a substitute for the Cat 5e cabling?

No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing crosstalk and supporting higher data rates.

Which of the following authentication protocols transmits passwords in cleartext and is considered too unsecure for modern networks?

PAP

What do you need to configure on a firewall to allow traffic directed to the public resources on the screened subnet?

Packet filters

Which options are you able to set on a firewall? (Select three.)

Packet source address Port number Packet destination address

You're adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for heating and air conditioning. You'd like to run your Ethernet cables in this area. Which type of cable must you use?

Plenum-rated cable

You manage a network that uses switches. In the lobby of your building are three RJ45 ports connected to a switch. You want to make sure that visitors cannot plug their computers in to the free network jacks and connect to the network, but you want employees who plug in to those same jacks to be able to connect to the network. Which feature should you configure?

Port authentication

Which statements accurately describe the port states of both bridges and switches? (Select two.)

Ports in a blocked state still receive BPDUs. In the learning state, the MAC address table can be populated, but frames are not forwarded.

CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of network systems, you decide to use APIPA addressing. With APIPA configured, all the systems are able to communicate with each other, but you're having trouble configuring internet access. What is the MOST LIKELY cause of the problem?

Private addresses cannot directly communicate with hosts outside the local subnet.

You want to identify the traffic that is generated and sent through a network by a specific application on a device. Which tool should you use?

Protocol analyzer

Which term does the OSI model use that's different from the TCP/IP model in reference to the terms frame, packet, and segment?

Protocol data unit (PDU)

When analyzing assets, which analysis method assigns financial values to assets?

Quantitative

What does a remote access server use for authorization?

Remote access policies

Of the following restoration processes, which would result in the fastest restoration of all data if a system failure occurred on Friday?

Restore the full backup from Sunday and the last differential backup.

In the OSI model, what is the primary function of the Network layer?

Route messages between networks.

Which of the following connections would you use a straight-through cable for?

Router to a regular port on a switch

Routing data between computers on a network requires several mappings between different addresses. Which of the following statements is true?

Routers use ARP to resolve known IP addresses into MAC addresses.

Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol enables message exchange between systems?

SMTP

Which of the following wireless network protection methods prevents the wireless network name from being broadcast?

SSID broadcast

TCP is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. Computer 1 sends a SYN packet to Computer 2. Which packet does Computer 2 send back?

SYN/ACK

Which of the following can serve as a buffer zone between a private, secured network and an untrusted network?

Screened subnet

Which type of optical fiber is normally used to connect two buildings that are several kilometers apart?

Single-mode fiber

You have a small network that uses a switch to connect multiple devices. Which physical topology are you using?

Star

Which of the following NAT implementations maps a single private IP address to a single public IP address on the NAT router?

Static NAT

Which of the following has the least default administrative distance?

Static route to an IP address

Which of the following best describes the purpose of using subnets?

Subnets divide an IP network address into multiple network addresses.

Angela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. While checking network traffic, Angela discovers a high number of collisions. Which connectivity device would BEST reduce the number of collisions and allow future growth?

Switch

Which of the following BEST describes roaming?

The ability to broadcast the same SSID across multiple APs.

What is the definition of bandwidth?

The amount of data that can be transferred from one place to another in a specific amount of time.

Which statement BEST describes IPsec when used in tunnel mode?

The entire data packet, including headers, is encapsulated.

Which of the following describes the worst possible action by an IDS?

The system identified harmful traffic as harmless and allowed it to pass without generating any alerts.

Which of the following technologies does GSM use to allow multiple connections on the same frequency?

Time-division multiple access

How many types of full virtualization are there?

Two

Which of the following combines several layers of security services and network functions into one piece of hardware?

Unified Threat Management (UTM)

Which of the following strategies do we use to prevent duplicate IP addresses from being used on a network? (Select two.)

Use Automatic Private IP Addressing (APIPA). Install a DHCP server on the network.

Which component is MOST likely to allow physical and virtual machines to communicate with each other?

Virtual switch

Which of the following is true about a firewall?

You must manually specify which traffic you want to allow through the firewall. Everything else is blocked.

Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently?

arp

Which of the following is the top-level domain in www.testout.com.'s fully qualified domain name (FQDN)?

com

You are in the process of configuring an iSCSI storage area network (SAN) for your network. You want to configure a Windows Server system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec. Which tool should you use?

iSCSI Initiator

You are troubleshooting a connectivity problem on a Linux server. You're able to connect to another system on the local network but not to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?

ifconfig

You've been called in to troubleshoot a connectivity problem on a newly installed Windows Server system. The system is operating well and is able to communicate with other systems on the local network. However, it's unable to access any systems on other segments of the corporate network. You suspect that the system's default gateway parameter hasn't been configured or may be configured incorrectly. Which of the following utilities are you MOST likely to use to view the system's default gateway information?

ipconfig

Which two commands do you use to force a new IP configuration?

ipconfig /renew ipconfig /release

Examine the following output: Active ConnectionsProto Local Address Foreign Address StateTCP SERVER1:1036 localhost:4832 TIME_WAITTCP SERVER1:4798 localhost:1032 TIME_WAITTCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAITTCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHEDTCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHEDTCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED Which of the following utilities produced this output?

netstat

Which TCP/IP utility gives you the following output?

netstat -r

Examine the following output: Server: to.xct.mirrorxhq.netAddress: 209.53.4.130Name: westxsim.comAddress: 64.78.193.84 Which of the following utilities produced this output?

nslookup

Which TCP/IP utility gives you the following output?

ping


Related study sets

Cardiac: PVD: Peripheral Venous Disease

View Set

Exam #2 (Chapters 3-5,9,10, 13.5,24)

View Set

Forensics - Eysenck's personality theory (psychological approach)

View Set

HESI remediation management of care

View Set

Chapter 19- Cardiovascular System: Heart.... Anatomic Structures Controlling Heart Activity

View Set