Network +

Ace your homework & exams now with Quizwiz!

1000Base-LX has the longest maximum run distance for Gigabit Ethernet running multimode fiber- what is that distance? A. 100 m B. 25 m C. 2000 m D. 550 m

D. 550 m

Which of the following statements is not true of Gigabit Ethernet? A. 1000BaseSX supports runs of up to 100m over multi-mode fiber optic cable B. 1000BaseT support up to 100 meter runs over UTP C. 1000BaseLX supports between 100 m and 10 km and can be used with multimode or single mode fiber optic cable D. 1000Base Sx supports between 100 m and 10 km and can be used with multi mode or single mode fiber optic cable

A. 1000BaseSX supports runs of up to 100m over multi-mode fiber optic cable

Which statement is not true about 10BaseT? A. 10BaseT requires Cat5a UTP cable B. 10BaseT runs at 10 Mbps C. The Maximum distance between the switch and the node is 100 m d. 10BaseT supports a maximum of 1024 nodes per switch

A. 10BaseT requires Cat5a UTP cable

Which TCP ports are commonly used by e-mail clients and servers? (Choose three.) A. 143 B. 443 C. 25 D. 110

A. 143 C. 25 D. 110 Simple Mail Transfer Protocol (SMTP) uses port 25. Post Office Protocol (POP) uses port 110. Internet Message Access Protocol (IMAP) uses port 143.

Upon notification of a computer crime, a first responder performs which tasks? (Select three.) A. Collect information B. Evaluate the severity of the situation C. Document Finding D. Remove power from volatile memory (RAM) E. Wipe any hard associated hard drives

A. Collect information B. Evaluate the severity of the situation C. Document Finding

A switch port can BEST be described by which of the following terms? A. Collision Domain B. Link State C. Distance Vector D. Broadcast domain

A. Collision Domain Explanation Correct Answer:Collision domain - Switched networks reduced collision domains to just at the individual ports. Incorrect Answers:Broadcast domains are no different on switches than hubs. Distance vector and link state are routing terms.

Which protocol maps IP addresses to Layer 2 (Data Link Layer) addresses? A. ARP B. Netstat C. TCP D. Ping

A. ARP

Which techniques should a technician utilize to achieve HA? (Choose three.) A. Aggregate Links B. Redundant Systems C. Back up server drives D. Install RAID

A. Aggregate Links B. Redundant Systems D. Install RAID Backups don't keep systems running, they make it easy to recover.High Availability (HA) is achieved with tools such as RAID arrays, Link Aggregation of multiple NICs and redundant systems. Redundant system may include power supplies, routers, etc. will help keep systems running in the event of a failure.

Doug was troubleshooting in a wiring closet in 2013. The cabling diagrams and documents are five years old and have little resemblance to what Doug sees. What configuration management process has fallen behind? A. Change Management B. System Logs C. Asset Management D. Baselining

A. Change Management

A technician suspects a problem with the structured cabling system. The work areas have all been tested and verified as functioning properly. What other elements should be checked? (Choose three.) A. Check the Power in the equipment room and to rack gear B. Check temperature in equipment room C. IF many users cannot connect, suspect a failed switch D. Check for multi-modal distortion in the UTP horizontal runs

A. Check the Power in the equipment room and to rack gear B. Check temperature in equipment room C. IF many users cannot connect, suspect a failed switch

SIEM is comprised of which primary elements? (Choose two.) A. Correlation B. Aggregation C. Reporting D. Analysis

A. Correlation B. Aggregation Explanation Aggregation and correlation are the two primary components of security information and event management (SIEM).Analysis and reporting are components of correlation.

Which choice is not found in a change request? (select one) A. Cost of implementation B. Potential Impact C. Type of Change D. Rollback Process E. Notification F. Configuration Procedures

A. Cost of Implementation

DHCP servers pull IP addresses from a pool of IP addresses. This pool is called the: A. DHCP Scope B. DHCP Pool C. DHCP Array D. DHCP lease

A. DHCP Scope

What is the primary purpose of netstat? A. Displays all connections to and from a host computer B. Captures frames and packets for later to review C. Shows your computer's connection(s) to any web server(s) D. Graphical Utility that charts amount of network data entering and leaving host

A. Displays all connections to and from a host computer

What is a chunk of data that has been sent out of a NIC called? A. Frame B. MAC C. Segment D. Packet

A. Frame

Which techniques can a technician use to harden her network? (Choose three.) A. Keep Account roles separated to avoid conflicts of interest B. Avoid using privileged accounts C. Avoid saving certificates, passwords and keys in the same location D. Track hardware and software for patch requirements

A. Keep Account roles separated to avoid conflicts of interest B. Avoid using privileged accounts D. Track hardware and software for patch requirements

Which selections represent authentication services? (Choose two.) A. Kerberos B. EAP C. AES D. TKIP

A. Kerberos B. EAP Kerberos and Extensible Authentication Protocol (EAP) both provide authentication services. Kerberos is geared toward wired environments while EAP is better suited to wireless setups. AES and TKIP are encryption methods that do not directly provide authentication services.

A technician suspects that a virus has infected the network. One of its actions appears to be that it utilizes a large amount of network bandwidth. What is the BEST tool that the technician can use to quickly determine which workstations are infected? A. Network Sniffer B. Syslog C. Web server D. SNMP

A. Network Sniffer A sniffer is used to examine network traffic. These are more commonly known as packet sniffers.

Troubleshooting networks add which elements to the general troubleshooting model? (Choose three.) A. Network model bottom-to-top approach B. Network model outside - to -inside approach C. Network model divide and conquer approach D. Network model top to bottom approach

A. Network model bottom-to-top approach C. Network model divide and conquer approach D. Network model top to bottom approach Explanation Troubleshooting from the outsides to the insides of a network model would be poor troubleshooting, plus there is no such approach.Using the network model as a starting place to troubleshoot network issues is an effective approach and can be performed using a top-to-bottom, bottom-to-top or most likely layer to least likely layer (divide-and-conquer) methodology.

Which of the following is allowed by port forwarding? A. Outside access to hosts on the LAN side of a NAT router B. One host on the LAN side of the NAT router to be assigned with the same public address of the router's WAN interface C. Public Addresses to be assigned to the LAN side of a NAT router D. Registers a LAN side host with a portable DNS address

A. Outside access to hosts on the LAN side of a NAT router

An office would like to set up an unsecured wireless network for their customers in their lounge area. Customers should be allowed to access the Internet, but should not have access to the office's internal network resources. Which firewall configuration can accomplish this? A. Packet filtering B. NAT C. Stateful inspection D. Port security

A. Packet filtering Correct Answer:Packet filtering - Among other things, packet filtering controls access to IP-addressed devices

Which of the following are typically found in an MDF equipment room? (Choose three.) A. Patch Panel(s) B. IDF C. Switch(es) D. Rack

A. Patch Panel(s) C. Switch(es) D. Rack

Preparation for incidents is a multifaceted process that includes which tasks? (Select two.) A. Penetration Testing B. Vulnerability Testing C. Service-Level-Agreement D. Statement of work

A. Penetration Testing B. Vulnerability Testing

Which would be the best solution to make an encrypted tunnel using SSH? A. Piggyback an existing tunnel program onto SSH B. Set up tunnel using PPTP C. Recode an unencrypted tunneling program to support SSH Encryption D. Set up a Tunnel using L2TP / IPsec

A. Piggyback an existing tunnel program onto SSH

Which of the following are common network problems? (Choose three.) A. Replay Attacks B. Loops C. Initialization Vector Attacks D. Connecting Switches in a tree structure

A. Replay Attacks B. Loops C. Initialization Vector Attacks

Which choices are examples of asymmetric encryption? (Choose two.) A. Rivest-Shamir-Adleman B. Elliptic Curve Cryptography C. Blowfish D. Data Encryption Standard

A. Rivest-Shamir-Adleman B. Elliptic Curve Cryptography Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA) are examples of asymmetric encryption. Incorrect Answers: Blowfish and Data Encryption Standard (DES) are examples of symmetric encryption.

Which of the following is a secure email protocol? A. STLS B. IMAP C. POP D. SMTP

A. STLS Start Transport Layer Security (STLS) is the current approach to running secure email protocols.

Which of the following are types of firewalls? (Choose two.) A. Stateful B. Deep state C. Statement D. Stateless

A. Stateful and D. Stateless

Identify two characteristics of logging and analysis utilities. (Select two.) A. They can analyze utilization of network capacity, storage use, CPU load and other parameters B. They can present results in a graphical format C. They can proactively generate alerts to a pager or email address D. They can identify direction and strength of a radio-frequency interface

A. They can analyze utilization of network capacity, storage use, CPU load and other parameters B. They can present results in a graphical format

What utility would you use on a UNIX system to help determine where an internet connection is being slowed down? A. Traceroute B. Tracert C. Ping D. Ifconfig

A. Traceroute

Documenting a "find" after a war driving excursion is known as what? A. War chalking B. War marking C. Updating D. Blogging

A. War chalking

When the loss of a piece of equipment or link can bring down an entire process, workflow or even the whole organization, that lost element is called what? A. single point of failure B. critical asset C. Redundant link D. Critical node

A. single point of failure

Your company has just purchased 800 new PCs for a roll-out you are about to make. Of the following choices, which should you update accordingly? A. Wire schemes B. Asset Management C. Baselines D. Change Management

B. Asset Management

Which network solution provides at least 50 Mbps of bandwidth and supports full-duplex communication? A. 10Base 2 Ethernet B. 10/100 layer 2 switch C. 5.0 GHz 802.11a D. 2.4 GHz 802.11g

B. 10/100 layer 2 switch 10/100 layer 2 switch is correct. Switches are usually configured to be full-duplex, and the 100 part of the label means that the switch supports 100 Mbps. Incorrect Answers: 802.11a and 802.11g are wireless and are only half-duplex. 10Base2 Ethernet is only 10 Mbps, and because data flows on a single wire, it is necessarily half-duplex.

A small factory would like to connect a separate warehouse on its property to the network. The warehouse is about 200 meters (656 feet) away from the main factory building. They need a high-speed connection but do not have an unlimited budget. Which would be the MOST cost-effective method to supply a gigabit Ethernet connection to the second building? A. 1000BaseLX B. 1000BaseSX C. 10GBaseLW D. 1000BaseT

B. 1000BaseSX 1000Base-SX supports a long run (up to 500 m) with gigabit speed over multimode fiber. It is commonly used for intra-building links. Incorrect Answers: 10GBase-LW is for 10Gigabit and is very expensive. 1000BaseT is twisted pair and only good for 100 meters. 1000Base-LX is single-mode fiber used as a backbone run because it supports long runs of up to 10 km.

Which networking technology used in LAN's is described as Fast Ethernet and uses two pairs of cabling for transmitting and receiving? A. 100BaseFX B. 100BaseTX C. 100BaseT4 D. 1000BaseT

B. 100BaseTX 100BaseTX is Fast Ethernet which uses wire pairs 1 & 2 for sending and wire pairs 3 & 6 for receiving. Incorrect Answers: 100BaseT4 is Fast Ethernet, but it uses four pairs of wires to achieve transmission. 100BaseFX is Fast Ethernet, but it uses 1 pair of fiber-optic cabling to send and receive. 1000BaseT is not Fast Ethernet (it has no cool buzz word). It also uses all 4 pairs of wires.

Doug needs to install a fiber run between the MDF and the IDF in his building. The distance between the buildings is roughly 20 meters. He wants to use the fastest connection possible. Which standard should he use? A. 1000BaseSX B. 10GBaseSR C. 10GBaseT D. 10GBaseSW

B. 10GBaseSR 10GBaseSR will run at 10 Gbps over fiber. The "S" states that it is short-range. It can go at distances up to roughly 300 meters. The "R" means that it is designed to be used with existing Ethernet standards.

Which is the default port for NTP? A. 321 B. 123 C. 231 D. 132

B. 123

If a host has the IP address 23.51.126.9, which default subnet mask would you use? A. 255.255.255.255 B. 255.0.0.0 C. 255.255.255.0 D. 255.255.0.0

B. 255.0.0.0 Correct Answer:Class A IP addresses, with a range of 1.x.x.x to 126.x.x.x, use a default subnet mask of 255.0.0.0

Which best describes a model? A. A duplicate of a real object or process B. A representation of a real object or process C. Multiple steps of a process converted into a single step D. The expansion of a single process step into multiple steps

B. A representation of a real object or process

What does ad-hoc mode describe? A. 802.11 network B. A wireless network comprised only of peer computers C. A bluetooth environment comprised of a mouse and keyboard D. Wireless devices connected to a WAP

B. A wireless network comprised only of peer computers

Here are three IP addresses: 216.53.12.11, 130.222.255.170, 223.255.6.88. What class of addresses are each one (in order)? A. A, C, A B. C, B, C C. B, A, C D. C, A, B

B. C, B, C

In what folder is the HOSTS file located on a Windows computer? A. C:\Windows\etc B. C:\Windows\System32\Drivers\etc C. C:\etc D. C:\Windows\System32\etc

B. C:\Windows\System32\Drivers\etc

Which of the following is NOT a DDoS attack profile? A. Application Attack B. Certificate Attack C. Volume Attack D. Protocol Attack

B. Certificate Attack Certificate attack is a made-up term. Incorrect Answers: Volume attacks, protocol attacks, and application attacks are all profiles of Distributed Denial of Service (DDoS) attacks.

Which of the following is not a common certificate error or warning? A. Self-signed certificate B. Certificate is on the Certificate Relocation List (CRL) C. Certificate is not valid for this site D. Expired Certificate

B. Certificate is on the Certificate Relocation List (CRL)

Which of the following is not a packet switching technology? A. MPLS B. Circuit Switch C. ATM D. Frame Relay

B. Circuit Switch Circuit switching is the opposite of packet switching - it creates a hard-wired circuit between two communicating nodes. Incorrect Answers: Frame Relay, Asynchronous Transfer Mode (ATM), and Multiprotocol Label Switching (MPLS) are all examples of packet switching networks.

Which statements are true of DNS? (Choose three.) A. DNS uses ARP to map names to mac addresses B. DNS maps names to IP Addresses C. DNS uses recursive queries to find domain names and IP addresses D. DNS is used to organize resources

B. DNS maps names to IP Addresses C. DNS uses recursive queries to find domain names and IP addresses D. DNS is used to organize resources

Which field would not be found in an Ethernet frame? A. Source MAC address B. Destination IP address C. Ethertype D. Destination MAC address

B. Destination IP address Explanation Source and destination IP addresses would be found in the IP packet, not in the Ethernet frame.Destination MAC, Source MAC and Ethertype fields are all found in the Ethernet frame.

A website just changed its IP address and a user is unable to reach it by typing the site's domain name into their browser. What command can the user run to make the computer learn the website's new IP address? A. IPconfig /updatednscache B. IPconfig /flushdns C. IPconfig /dnsupdate D. Ipconfig /all

B. IPconfig /flushdns

Of the following choices, what is the MOST likely cause that a user is unable to access a network through the wireless access point? A. A short in the cable pairs B. Incorrect WEP key C. Faulty crossover cable D. TXRX is reversed

B. Incorrect WEP key

Clark is troubleshooting a user's PC. They are using their browser to visit Web sites such as PayPal, eBay, and Newegg. They begin seeing SSL certificate mismatch warnings. Which of the following attacks could be happening? A. Honey pot B. Man-in-the-middle C. Smurf D. Zombie

B. Man-in-the-middle

The primary command-line tool to troubleshoot Windows naming issues is what? A. Netstat B. Nbtstat C. IPconfig D. Net

B. Nbtstat Nbtstat provides information about the netbios naming service that runs in some Windows-based computers.The other choices do not primarily focus on Windows name resolution information.

Get, Response, Set, and Trap are communications that occur between an SNMP manager and an SNMP managed device. These communications are examples of what? A. MIB B. PDU C. TCP D. NMS

B. PDU The commands and responses passed between SNMP managers and devices are sent as protocol data units (PDU). Incorrect Answers: SNMP protocol data units (PDU) are sent as UDP traffic, not TCP. NMS is the program that sends and receives the communications. Managed Information Base (MIB) is the categorized information being queried.

Network upgrades have been completed, and the network protocols have been modernized. The WINS server was shut down. Since there is no need for NetBIOS traffic, it will no longer be allowed on the network. Which of the following will accomplish this objective? A. IP Filtering B. Port Filtering C. MAC Filtering D. Content Filtering

B. Port Filtering NetBIOS uses three well-known ports. Filter these (137, 139, and 15), and there will not be any more NetBIOS traffic.

Vicky is a network technician who has installed a new managed 10/100 Mbps switch on the LAN. The network has an old printer with a 10 Mbps NIC that will be connected to the new switch. Which of the following settings on the switch will need to be configured to support the printer? A. IP Address B. Port speed C. PoE D. MAC Filtering

B. Port speed

Which choice is not true about protocol analyzers such as WireShark? A. Protocol Analyzers can show the contents of packets and frames B. Protocol Analyzers can generate packets and frames C. Protocol Analyzers can filter packets and frames D. Protocol Analyzers can capture packets

B. Protocol Analyzers can generate packets and frames

Which protocols are implementations of AAA? (Choose two.) A. Kerberos B. RADIUS C. Encryption strength D. TACACS+

B. RADIUS and D. TACACS+ RADIUS and TACACS+ provide authentication, authorization, and accounting. Incorrect Answers: Encryption does not directly provide authentication, authorization, or accounting.

What protocol would enable Jill, the administrator of the Bayland Widget Corporation's network, to monitor her routers remotely? A. FTP B. SNMP C. DNS D. NFS

B. SNMP Correct Answer:The Simple Network Management Protocol (SNMP) enables you to collect information from SNMP-capable devices.

Which device can determine the length of a cable? A. Toner B. TDR C. Network Analyzer D. Continuity Tester

B. TDR Time Domain Reflectometers (TDRs) can accurately determine cable lengths, which can also tell how far down the cable a break exists. This is accomplished by sending a signal down the cable and seeing how long it takes the signal to reflect back.

George is unable to surf the Web. No matter what address he enters, he receives the message, "The page cannot be displayed." On George's system, you can ping 64.226.214.168, but when you ping www.totalsem.com, you receive the message "Server not found." What problem does this indicate? A. George's NIC is malfunctioning B. The DNS Server is not working correctly C. George's cable is not connected to the network hub D. The DHCP server is not working correctly

B. The DNS Server is not working correctly

You are the network administrator with 15 users on a network. None of them have been able to connect to the server for the last 30 minutes. You try pinging the workstations from the server, but you can't ping any of them or the loopback address, even after a reboot. Which of the following statements MUST be true? A. You need to reboot the DNS Sever B. There is a problem with the server NIC C. All users need to reboot their systems D. You need to reboot the DHCP server

B. There is a problem with the server NIC

Which characteristics impact the strength of passwords? (choose two) A. Encryption Strength B. Use of additional character space C. Password Length D. Authentication methods

B. Use of additional character space C. Password Length

The only Gigabyte Ethernet standard that has a maximum cable length shorter than 100 meters is: A. 1000Base-T B. 1000Base-LX C. 1000Base-CX D. 1000Base-SX

C. 1000Base-CX Correct Answer: 1000Base-CX uses copper cabling and is limited to 25 meters. Incorrect Answers: 1000Base-LX uses fiber-optic cabling and has a maximum length of 5 km using single-mode fiber. 1000Base-SX uses fiber-optic cabling and has a maximum length of 550 meters. 1000Base-T uses UTP and has a maximum length of 100 meters.

A network tech, must to connect a computer in a heavy industrial environment. The computer is located 260 meters (853 feet) away from the IDF. Which LAN technology would be the BEST choice? A. 10GBaseT B. Coaxial C. 100BaseFX D. MPLS

C. 100BaseFX Correct Answer:100BaseFX - Remember, the "F" stands for fiber, and in this case, 100Base FX is capable of reaching the 250 meter requirement. Incorrect Answers:10GBaseT is twisted pair, coaxial is even shorter than UTP, and MPLS is not a type of LAN technology.

Which networking technology is best defined as Fast Ethernet? A. 1000BaseSX B. 1000BaseT C. 100BaseT D. 10BaseFL

C. 100BaseT Fast Ethernet is also known at 100BaseT. It is also associated with 100BaseTX, 100BaseT4, and 100BaseFX. There is a pattern. If it has "100" in it, it's good for Fast Ethernet. Incorrect Answers: All of the other answers do not have "100" in their name, and therefore, incorrect.

Which decimal number is represented by the binary number 1 0 1 1 0 1 1 0? A. 182.176.73.0 B. 73 C. 182 D. 176

C. 182 Explanation: 128 + 0 + 32 + 16 + 0 + 4 + 2 + 0

What TCP/IP protocol is used to resolve an IP address to a MAC address? A. DHCP B. UDP C. ARP D. BootP

C. ARP (Address Resolution Protocol)

What is the quickest and easiest technology available to keep servers and equipment up and running? A. RAID Array B. Disaster Recovery Plan C. Battery Backup/UPS D. Business Continuity Plan

C. Battery Backup/UPS

Using an ACL in a firewall to block known malicious Web addresses is an example of which of the following? A. Port filtering B. MAC Filtering C. IP Filtering D. Application Filtering

C. IP Filtering

What does port mirroring accomplish? A. Redirects any outbound traffic from the mirrored port to a host with a specific IP address B. Doubles switch-port bandwidth by bonding a specified port to the mirrored port C. Enables inbound and outbound traffic from switch ports to be duplicated at the mirrored port D. Redirects any inbound traffic to the mirrored port to another, specified port

C. Enables inbound and outbound traffic from switch ports to be duplicated at the mirrored port

FTP uses TCP port 20 and TCP port 21. Which choice BEST describes how the ports are used? A. FTP Servers listen for commands on port 20 and respond with data on port 21 B. FTP clients send requests on port 21 and receive data on port 21 C. FTP Servers listen for commands on port 21 and respond with data on port 20 D. FTP clients send requests on port 20 and receive on port 20

C. FTP Servers listen for commands on port 21 and respond with data on port 20

Which of the following are most likely critical nodes? (Choose two.) A. IP security camera B. RADIUS uses TCP Port 1812 C. Front-end Router D. Server E. Switch w/ the payroll VLAN

C. Front-end Router D. Server Explanation Critical nodes are IT department assets whose loss would stop the oganization from functioning until the loss is recovered. Servers and the router that connects the organization to the Internet are typically critical nodes.

Which statement is NOT true of IPv6 addresses? A. There are no private IPv6 addresses B. Outbound IPv6 addresses are randomized by the operating system C. IPv4 and IPv6 are automatically translated back and forth as required. D. EUI-64 can be traced back to the source computer

C. IPv4 and IPv6 are automatically translated back and forth as required.

Which of the following connectors would be found on a fiber-optic cable? A. RJ-11 B. RS-232 C. MT-RJ D. BNC

C. MT-RJ The MT-RJ is one of four fiber-optic cable connectors, including the ST, SC, and LC. Incorrect Answers: RJ-11 is for phone lines and CAT 3 Ethernet, RS-232 is for printer ports, and BNC is for ThinNet cables.

Which statement is true of a NAT router? A. The NAT function is performed at the ISP facility B. All hosts on the LAN side of a NAT router are assigned the same IP address as the public address in the router C. NAT routers replace the source IP address with it's own IP address D. NAT routers allow public addresses to exist on the LAN side of the router

C. NAT routers replace the source IP address with it's own IP address

Which coaxial cable(s) have a characteristic impedance of 50 ohms? (Select two) A. RG-6 B. RG-59 C. RG-58 D. RG-8

C. RG-58 D. RG-8 RG-8 and RG-58, known as Thicknet and Thinnet, have 50-ohm impedance and were used in early Ethernet installations. Incorrect Answers: RG-59 has 75-ohm impedance and is found in older CATV installations. RG-6 has 75-ohm impedance is used in modern CATV and home satellite installations.

Which of the following protocols is associated with monitoring devices on a network? A. SMTP B. RDP C. SNMP D. EIGRP

C. SNMP

Which of the following would enable someone to capture user names and passwords on a network? A. DoS B. Honey Pot C. Sniffer D. Proxy Server

C. Sniffer Correct Answer:A sniffer would be the tool of choice here, analyzing network traffic and searching for any user names and passwords that went out in clear text.

Which characteristic is true of TCP? A. TCP Uses the END message to close a connection B. The TCP 3-way handshake begins with a SYN message followed by an ACK response followed by an ACK SYN Message C. TCP Uses a FIN message to close a connection D. TCP is connectionless

C. TCP Uses a FIN message to close a connection

Which of the following is a UTP wiring standard? A. 10BaseT runs at 10 Mbps B. IEEE 802.3 C. TIA 568B C. TIA A568

C. TIA 568B

Which choice is NOT a typical Wi-Fi problem? A. Wrong WAP password B. Interference C. WPS Failure D. WAP configuration has changed

C. WPS Failure

Network administrator Marie manages one Linux and two Windows servers. She wants to be able to review all of the server logs centrally. Which of the following services could Marie use in this scenario? A. Event Logs B. Baselines C. Syslog D. Change Management

C. syslog

Your Internet connection works just fine, but you cannot access www.totalsem.com using its domain name or IP address. What command can you use to see if the Web site is down or if the problem is a router between your machine and the Web server? A. nbtstat www.totalsem.com B. arp www.totalsem.com C. tracrt www.totalsem.com D. ping 255.255.255.0

C. tracrt www.totalsem.com

Which statement is NOT true of 100 megabit Ethernet? A. Ethernet can run at 100 Mbps on fiber or copper B. Both 100BaseT and 100Base Tx run over unshielded twisted pair C. Both 100BaseF and 100Base FX run over multi-mode cable D. 100BaseTX supports runs of up to 2KM

D. 100BaseTX supports runs of up to 2KM 100BaseTX only supports runs of up to 100 meters.

Before an Ethernet NIC may transmit data onto a medium, it must check to see if another NIC is transmitting data. What is this checking process called? A. Collision Avioidance B. Multiple Access C. Collision Detection D. Carrier Sense

D. Carrier Sense Carrier sense, also known as carrier detect, is the test that a NIC performs prior to transmitting on a network medium. Incorrect Answers:Multiple access means that when the station transmits, all stations on the segment will hear the transmission.Collision detection means that a station sending data can tell when another station transmits at the same time.Collision avoidance is the technique used by a network interface to recover from or prevent a collision.

A network technician has been tasked with monitoring the network. Which network function is it not necessary for her to monitor? A. Server utilitzation B. Error alerts C. Bandwidth D. File hash changes

D. File hash changes

Ping uses which IP layer protocol? A. FTP B. RIP C. ARP D. ICMP

D. ICMP

Which protocol in the TCP/IP protocol suite deals with logical addresses for hosts and resides at Layer 3 (Network Layer) of the OSI model? A. TCP B. UDP C. PPP D. IP

D. IP

Which statement is true of IPS and IDS systems? A. Passive IDS is the same as IPS B. IPS responds to threats with a notification to specified staff C. Passive IPS is the same as IPDS D. IPS detects then attempts to defend against a threat

D. IPS detects then attempts to defend against a threat

Which statement is true of inter-VLAN routing? A. Inter-VLAN routing enables remote VLANs to connect over a public network, such as the internet. B. InterVLAN routring calls for connecting each VLAN to a port on a router so that data can bass between the VLANs C. InterVLAN Routing encrypts and decrypts traffic between VLANs D. InterVLAN routing is implemented within switches to enable communication between VLANs

D. InterVLAN routing is implemented within switches to enable communication between VLANs

What command will assign a drive letter to a network share? A. Net drive B. Net share C. Net assign D. Net use

D. Net use

Which of the following is not a normal Windows log? A. Security Policies B. Setup C. Application D. Network E. Forwarded Events F. System

D. Network Explanation: Windows does not log network events.The application log notes events around launching, using and closing applications. The security log tracks events related to logging in, password changes, and the like. The setup log tracks events regarding the Windows installation and updates. The System log tracks events related to the Windows bootup process. The forwarded events logs receives logged events from other Windows computers

Which of the following is not a core tenet of securing IP networks? A. Confidentiality B. Integrity C. Availability D. Performance

D. Performance Performance is important to IP neworks but is not a core tenet of securing the network.The "CIA" of security is comprised of confidentiality, integrity, and availability.

A network technician needs to check the configuration of a port on a switch. Which tool will he MOST likely to use to verify the configuration? A. dig command B. nbtstat command C. traceroute command D. SNMP Monitor

D. SNMP Monitor SNMP, simple network messaging protocol, is used to, among other things, remotely administer SNMP-enabled devices. Incorrect Answers: - Traceroute tells you what routers your packets are passing through on their way to a destination. - Nbtstat is only used in NetBIOS/NetBEUI networks, - dig is a DNS query tool.

Which of the following is not an element of risk management? A. Security Policies B. Security Procedures C. Security controls D. Secure infrastructure from threats

D. Secure infrastructure from threats

When operating multiple, duplicate servers such as web servers, which method is best to take advantage of the full power of all of the servers? A. Round Robin Server B. DNS Server C. HSRP D. Server Side Load Balancer

D. Server Side Load Balancer

Which type of fiber optic cable supports longer run lengths? A. Multi-mode B. Laser-mode C. Fractal-mode D. Single-mode

D. Single-mode

Continuously bombarding a remote computer with broadcast pings that contain a bogus return address is an example of what specific type of attack? A. Man-in-the-Middle B. FTP Bounce C. DDoS D. Smurf

D. Smurf Correct Answer: The DoS attack described is known specifically as a smurf attack. Incorrect Answers: The other choices are not the attack described.

What hardware tool is used to determine the length of a cable? A. Continuity Tester B. Toner Generator C. Tone Probe D. Time Domain Reflectometer (TDR)

D. Time Domain Reflectometer (TDR)

Which term describes the process of scouting for Wi-Fi networks that may be vulnerable? A. Snooping B. Sniffing C. Fox hunting D. Wardriving

D. Wardriving


Related study sets

State Law and Regulations - Chapter 20 (Law Supplement Practice Exam Section)

View Set

What is a Diesel-Electric Locomotive?

View Set