Network

Ace your homework & exams now with Quizwiz!

QUESTION 3 The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is ____. A. corp B. com C. nwtraders D. exchange E. mail

A. corp B. com C. nwtraders D. exchange E. mail

Which of the following is a public IP address? A. 10.156.89.1 B. 68.24.78.221 C. 172.16.152.48 D. 192.168.25.101

Answer B

QUESTION 16 In addition to switching, multilayer switches also ____. A. Provide Layer 3 routing functions B. Interface with CAT3, CAT5, CAT5e, and fiber optics C. Support 10 MB, 100 MB, and 1 GB local area network (LAN) ports D. Operate by using only Layer 1 and 2 protocols

Answer: A

QUESTION 24 Security is a concern on wireless networks due to ____. A. the radio broadcast access method B. spread spectrum issues C. frequency modulation issues D. the potential for cross-talk

Answer: A

QUESTION 20 If a router cannot determine the next hop for a packet, the router will ____. A. forward the packet to the default route B. send the packet back to the packet's source C. broadcast the packet D. store the packet in the memory buffer

Answer: A Explanation: If there is no next hop, the packets are not policy routed. A default route of a computer that is participating in computer networking is the packet forwarding rule (route) taking effect when no other route can be determined for a given Internet Protocol (IP) destination address.

QUESTION 18 To directly connect the Ethernet network interface cards (NICs) of two computers, you should use a ____. A. crossover cable B. straight cable C. rollover cable D. coaxial cable

Answer: A Explanation: An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices together directly. Normal straight through cables were used to connect from a host network interface controller (a computer or similar device) to a network switch, hub or router.

QUESTION 21 In which physical network topology is each computer connected to a central point? A. Star B. Mesh C. Ring D. Bus

Answer: A Explanation: In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection.

If a router is installed so that it separates a DHCP server from its clients, the clients will ____. A. immediately lose connectivity to all segments B. be unable to obtain their leases from the server C. immediately lose connectivity to the local segment D. receive an immediate renewal of their lease

Answer: B

QUESTION 15 The type of connector used on a 100BaseT Ethernet cable is ____. A. RJ-11 B. RJ-45 C. TNC D. BNC

Answer: B

QUESTION 8 Which of the following uses Pointer records and A records? A. IDS B. DNS Server C. NAT Server D. IPS

Answer: B Explanation: DNS records include: * A: Address record. * PTR: Pointer record.

QUESTION 11 Which of these is an application layer protocol? A. TCP B. FTP C. IP D. UDP

Answer: B Explanation: FTP is an application layer protocol.

QUESTION 37 The default gateway address identifies the ____. A. device that will connect the computer to the local network B. device that will connect the computer to a remote network C. server that will provide name services for the computer D. server that will authenticate the user of the computer

Answer: B Explanation: A default gateway is the node on the computer network that the network software uses when an IP address does not match any other routes in the routing table. In home computing configurations, an ISP often provides a physical device which both connects local hardware to the Internet and serves as a gateway.

QUESTION 26 To protect a network when it is connected to the Internet, you should use a ____. A. Bridge B. Firewall C. Switch D. Router

Answer: B Explanation: A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings.

QUESTION 17 One reason to replace an unmanaged switch with a managed switch is to ____. A. manage the routing tables B. support multiple VLANS C. reduce collision domains D. route between networks

Answer: B Explanation: A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers. The major difference between the packet switching operation of a router and that of a Layer 3 switch is the physical implementation. In general-purpose routers, packet switching takes place using software that runs on a microprocessor, whereas a Layer 3 switch performs this using dedicated application-specific integrated circuit (ASIC) hardware.

QUESTION 19 The function of a router is to ____. A. provide IP subnet masks for hosts B. forward traffic to other networks C. broadcast routing tables to clients D. store tables for name resolution

Answer: B Explanation: A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.

QUESTION 9 The ipconfig command will ____. A. configure routers B. display a client's address C. display a client's broadcast mode D. configure DHCP clients

Answer: B Explanation: Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.

QUESTION 35 In which OSI layer does routing occur? A. Transport B. Network C. Data Link D. Physical

Answer: B Explanation: In the seven-layer OSI model of computer networking, the network layer is layer 3. The network layer is responsible for packet forwarding including routing through intermediate routers.

QUESTION 2 Which setting is used to determine the Domain Name System (DNS) settings on a client computer? A. TELNET B. NSLOOKUP C. PATHPING D. NETSTAT

Answer: B Explanation: NSLOOKUP is a network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record.

The service that resolves fully qualified domain names (FQDN) to IP addresses is ____. A. Windows Internet Name Service (WINS). B. Domain Name Service (DNS). C. Internet Service Provider (ISP). D. Address Resolution Protocol (ARP).

Answer: B Explanation: The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites.

QUESTION 33 The query protocol used to locate resources on a network is ____. A. User Datagram Protocol (UDP) B. Lightweight Directory Access Protocol (LDAP) C. Tracert D. Telnet

Answer: B Explanation: The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network.

QUESTION 28 Which protocol can be used to encrypt packets on the Internet? A. SNMP B. HTTPS C. TFTP D. HTTP

Answer: B Explanation: HTTPS, which stands for Hypertext Transfer Protocol Secure, makes it more difficult for hackers, the NSA, and others to track users. The protocol makes sure the data isn't being transmitted in plain-text format, which is much easier to eavesdrop on.

QUESTION 13 At what layer in the OSI model are hardware addresses referenced? A. Network B. Application C. Data link D. Physical

Answer: C

QUESTION 14 You need to divide a network into three subnets. Which device should you use? A. Hub B. Bridge C. Router D. Segmenter

Answer: C Explanation: You can use a router to divide your network into subnets.

QUESTION 36 What type of record does DNS use to find a mail service? A. Service (SRV) DNS record B. Canonical (CNAME) DNS record C. Mail Exchanger (MX) DNS record D. Host (A) DNS record

Answer: C Explanation: A mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a domain name specifies how email should be routed with the Simple Mail Transfer Protocol (SMTP).

QUESTION 23 A private network that allows members of an organization to exchange data is an ____. A. Extranet B. Ethernet C. Intranet D. Internet

Answer: C Explanation: An intranet is a computer network that uses Internet Protocol technology to share information, operational systems, or computing services within an organization. This term is used in contrast to extranet, a network between organizations, and instead refers to a network within an organization.

QUESTION 34 Tracert is used to ____. A. manage routing tables dynamically B. manage session-oriented connections between nodes C. report the route taken by packets across an IP network D. report the shortest route between different networks

Answer: C Explanation: In computing, traceroute (treacert) is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network.

QUESTION 25 A characteristic of the mesh topology is that it ____. A. uses a central hub B. cannot use wired connections C. uses redundant paths D. cannot use wireless connections

Answer: C Explanation: Mesh network topology is one of the key network architectures in which devices are connected with many redundant interconnections between network nodes such as routers and switches. In a mesh topology, if any cable or node fails, there are many other ways for two nodes to communicate.

QUESTION 5 Which command is used to verify that a server is connected to the network? A. IPCONFIG B. ROUTE C. PING D. CHECK

Answer: C Explanation: PING is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.

QUESTION 1 A router's static route is set by the ____. A. adjacent network B. next upstream router C. network administrator D. routing protocol

Answer: C Explanation: Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from a dynamic routing protocol to forward traffic.

QUESTION 32 Which of the following services masks internal IP addresses from outside the network? A. DHCP B. WINS C. NAT D. DNS

Answer: C Explanation: The majority of NATs map multiple private hosts to one publicly exposed IP address. In a typical configuration, a local network uses one of the designated "private" IP address subnets (RFC 1918). A router on that network has a private address in that address space. The router is also connected to the Internet with a "public" address assigned by an Internet service provider.

QUESTION 38 How many bits are there in an Internet Protocol version 6 (IPv6) address? A. 32 B. 64 C. 128 256

Answer: C Explanation: IPv6 uses a 128-bit address, allowing 2128, or approximately 3.4×1038 addresses, or more than 7.9×1028 times as many as IPv4, which uses 32-bit addresses.

QUESTION 22 Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.) A. Token ring B. Ethernet C. Dial-up D. Leased line

Answer: CD Explanation: Token ring and Ethernet are used in LANs.

QUESTION 7 Which of these addresses is a multicast address? A. 127.0.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 224.0.0.1

Answer: D Explanation: The full range of multicast addresses is from 224.0.0.0 to 239.255.255.255.

QUESTION 10 One reason to incorporate VLANs in a network is to ____. A. increase the number of available IP addresses B. increase the number of available Media Access Control (MAC) addresses C. reduce the number of broadcast domains D. reduce the number of nodes in a broadcast domain

Answer: D Explanation: VLANs provide the following advantages: * VLANs enable logical grouping of end-stations that are physically dispersed on a network. * VLANs reduce the need to have routers deployed on a network to contain broadcast traffic. * Confinement of broadcast domains on a network significantly reduces traffic. By confining the broadcast domains, end-stations on a VLAN are prevented from listening to or receiving broadcasts not intended for them. Moreover, if a router is not connected between the VLANs, the end- stations of a VLAN cannot communicate with the end-stations of the other VLANs.

QUESTION 27 One purpose of a perimeter network is to ____. A. make resources available to the intranet B. link campus area networks (CANs) C. link local area networks (LANs) D. make resources available to the Internet

Answer: D Explanation: In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network.

QUESTION 6 Which of these represents the Internet Protocol version 6 (IPv6) loopback address? A. 127.0.0.1 B. 192.168.0.1 C. FEC0:A8C0::AA01 D. ::1

Answer: D Explanation: The localhost (loopback) address, 0:0:0:0:0:0:0:1, and the IPv6 unspecified address, 0:0:0:0:0:0:0:0, are reduced to ::1 and ::, respectively.

QUESTION 12 The top-level domain of www.adventureworks.com is ____. A. www B. adventureworks C. adventureworks.com D. com

Answer: D Explanation:A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet.

QUESTION 4 To which IP configuration does the CIDR notation 192.168.1.1/25 refer? A. 192.168.1.1 255.255.255.64 B. 192.168.1.1 255.255.255.1 C. 192.168.1.1 255.255.255.32 D. 192.168.1.1 255.255.255.256 E. 192.168.1.1 255.255.255.128

Answer: E Explanation: http://www.subnet-calculator.com/


Related study sets

NURS 209 Practice HESI Questions (IGGY BOOK)

View Set

MBF Connect - Chapter 10 and 11 Homework

View Set

Основи наукового пізнання 2 рівень

View Set

3AP Chemistry Possible Questions Bank

View Set

American History 2 Midterm (Chapters 16-20)

View Set

Nutrition, protein and supplements

View Set

Stat Chapter 10-1 Concepts of Estimation

View Set