network+ exam cram practice test 2 questions 1-25

Ace your homework & exams now with Quizwiz!

13. Which of the following are considered vulnerability scanners? (Choose all correct choices.) ○ A. NMAP ○ B. NESSUS ○ C. OVAL ○ D. BLACKHOLE

A and B. Both NMAP and NESSUS are considered vulnerability scanners. OVAL (Answer C) is a language and BLACKHOLE (Answer D) is a fictitious entity.

24. In a traditional crossover cable, which sets of wires are crossed? (Choose all correct answers.) ○ A. 1 and 3 ○ B. 2 and 6 ○ C. 4 and 8 ○ D. 5 and 7

A and B. In a traditional crossover cable, wires 1 and 3 and wires 2 and 6 are crossed. The other options (Answers C and D) are not correct wiring choices for a traditional crossover cable.

19. Which two of the following define types of wiring closets? (Choose two.) ○ A. MDF ○ B. BDF ○ C. FDF ○ D. IDF

A and D. Main Distribution Frame (MDF) and Intermediate Distribution Frame (IDF) define types of wiring closets. The main wiring closet for a network typically holds the majority of the network gear, including routers, switches, wiring, servers, and more. When multiple wiring closets are used, the main distribution frame (MDF) connects to secondary wiring closets or intermediate distribution frames (IDFs). The Building Distribution Frame, or BDF (Answer B), is the superset of which both MDF and IDF constitute. Answer C is incorrect because FSF is a nonexistent entity.

1. Which utility is shown in the following figure (portions of which have been obscured to prevent telegraphing the answer)? Image ○ A. tracert ○ B. arp ○ C. ping ○ D. netstat

A. The tracert utility is used in Windows-based operating systems to trace the route taken to reach a particular host. This same functionality is provided in UNIX/Linux-based operating systems by traceroute. arp (Answer B) is used for resolving IP addresses to MAC addresses. ping (Answer C) tests if connectivity exists, whereas netstat (Answer D) displays protocol statistics and current TCP/IP network connections.

21. Which of the following are link-state protocols? (Choose all that apply.) ○ A. IGRP ○ B. OSPF ○ C. RIP ○ D. IS-IS

B and D. Link-state protocols include Open Shortest Path First (OSPF) and Intermediate System-to-Intermediate System (IS-IS). Answer A, Interior Gateway Routing Protocol (IGRP), and Answer C, Routing Information Protocol (RIP), are examples of distance-vector protocols.

16. Which of the following enables electrical power to transmit over twisted-pair Ethernet cable? ○ A. PPPoE ○ B. PoE ○ C. MaMM ○ D. EESR

B. Power over Ethernet (PoE) is a technology that enables electrical power to transmit over twisted-pair Ethernet cable. The power is transferred, along with data, to provide power to remote devices. These devices may include remote switches, wireless access points, VoIP equipment, and more. Answer A, PPPoE (Point-to-Point Protocol over Ethernet) is used for encapsulating frames and does not enable electrical power to transmit over Ethernet. The other options (Answers C and D) are fictitious choices.

6. Which switch is used with ipconfig to purge the DNS cache? ○ A. /release ○ B. /flushdns ○ C. /purgedns ○ D. /purge

B. The /flushdns switch is used with ipconfig to purge the DNS cache. The /release switch (Answer A) is used to release the IPv4 lease. The other options (Answers C and D) are not valid switches for use with ipconfig.

8. Your boss returns from a conference and can't stop talking about EUI-64, which he no doubt overheard other administrators discussing. What is he referring to? ○ A. An IPv4 subnet mask ○ B. The last 64 bits of an IPv6 address ○ C. The MAC address ○ D. The conference that he most likely attended

B. The last 64 bits of an IPv6 address are known as EUI-64 (Extended Unique Identifier, 64-bit). The other choices are incorrect (Answers A, C, and D) because EUI-64 is the last 64 bits of an IPv6 address.

23. Which of the following refers to the connection point between the ISP's part of the network and the customer's portion of the network? ○ A. loop ○ B. rubicon ○ C. demarcation ○ D. DMZ

C. A network's demarcation point refers to the connection point between the ISP's part of the network and the customer's portion of the network. A demilitarized zone, or DMZ (Answer D), is part of a network where you place servers that must be accessible by sources both outside and inside your network. The other choices (Answers A and B) are fictitious options.

18. Which type of connector is used with coaxial cable? ○ A. ST ○ B. SC ○ C. F ○ D. MT-RJ

C. F-type connectors (which are screw-type connectors) are used with coaxial cable. ST (Answer A), SC (Answer B), and MT-RJ (Answer D) connectors are associated with fiber cabling.

10. Traffic is not being allowed through port 53 of the firewall. Which TCP or UDP protocol is associated with that port by default? ○ A. IMAP ○ B. RDP ○ C. DNS ○ D. DHCP

C. Port 53 is associated with DNS, by default. Port 3389, by default, is associated with RDP (Answer B), whereas port 143 is associated with IMAP (Answer A), and ports 67 and 68 are associated with DHCP (Answer D).

4. Which tool is shown in the following figure? Image ○ A. Voltmeter ○ B. Micrometer ○ C. Punchdown ○ D. Event recorder

C. Punchdown tools are used to attach twisted-pair network cable to connectors within a patch panel. Specifically, they connect twisted-pair wires to the insulation displacement connector (IDC). Answers A, B, and D are tools that are not shown in the figure.

25. Which of the following is a security protocol designed to provide centralized validation of users who attempt to gain access to a router or Network Access Server (NAS)? ○ A. RDP ○ B. AAA ○ C. TACACS+ ○ D. ASDM

C. Terminal Access Controller Access Control System+ (TACACS+) is a security protocol designed to provide centralized validation of users who attempt to gain access to a router or Network Access Server (NAS). RDP, Remote Desktop Protocol (Answer A), is a presentation layer protocol that supports traffic between a Windows Terminal Client and Windows Terminal Server. AAA (Answer B) represents the authentication, authorization, and accounting model. ASDM (Answer D) is incorrect because it is a fictitious choice.

9. You've been summoned to a small law firm to help a client with networking issues that cropped up when it added a number of new workstations. The CIDR notation appearing in the documentation kept on site is 192.168.12.0/26. What is the range of IPv4 addresses that can be assigned to workstations? ○ A. 192.168.12.1 to 192.168.12.255 ○ B. 192.168.12.1 to 192.168.12.128 ○ C. 192.168.12.1 to 192.168.12.62 ○ D. 192.168.12.1 to 192.168.12.32

C. The IP addresses available beneath 192.168.12.0/26 range from 192.168.12.1 to 192.168.12.62. With 26 mask bits, only 62 hosts can exist on a subnet. The other choices are incorrect (Answers A, B, and D) because they do not represent the correct range of IPv4 addresses that can be assigned to workstations

15. What is the next step in the troubleshooting methodology after identifying the problem? ○ A. Test the theory to determine the cause. ○ B. Implement the solution or escalate as necessary. ○ C. Establish a theory of probable cause. ○ D. Document findings, actions, and outcomes.

C. The next step is to establish a theory of probable cause. The steps in the methodology are 1. Identify the problem, 2. Establish a theory of probable cause (Answer C), 3. Test the theory to determine cause (Answer A), 4. Establish a plan of action to resolve the problem and identify potential effects, 5. Implement the solution or escalate as necessary (Answer B), 6. Verify full system functionality and if applicable implement preventative measures, and 7. Document findings, actions, and outcomes (Answer D).

2. You are the administrator for a company that has more than 200 Windows 7 workstations. You want to prevent each workstation from seeing other network computers and devices as well as prevent people on other network computers from seeing your workstations. Which setting must you turn off? ○ A. MAN ○ B. SAN ○ C. Network discovery ○ D. CRAN

C. Toggling off network discovery prevents the workstation from seeing other networked computers and devices as well as prevents people on other networked computers from seeing each workstation on which discovery is toggled off. A metropolitan area network, or MAN (Answer A), is a network that spans a defined geographic location, such as a city or suburb. A storage area network, or SAN (Answer B), is a network of storage disks. Answer D, CRAN, is a nonexistent choice.

7. Which utility is shown in the following figure (portions of which have been obscured to prevent telegraphing the answer)? Image ○ A. ipconfig ○ B. ifconfig ○ C. nslookup ○ D. nbtstat

C. nslookup is used to perform manual DNS lookups and is shown in the figure. The nbtstat utility (Answer D) is used to view statistics related to NetBIOS name resolution and to see information about current NetBIOS over TCP/IP connections. ipconfig (Answer A) is used to view and renew TCP/IP configuration on a Windows system, whereas ifconfig (Answer B) is its counterpart in the UNIX/Linux operating systems.

17. Which of the following can be used on the Internet to capture data traveling between computers? ○ A. Registered jack ○ B. NIDS ○ C. NIPS ○ D. Packet sniffer

D. A packet sniffer can be used on the Internet to capture data traveling between computers. A registered jack (Answer A) is a connector used with wiring. NIDS (Answer B) is a Network-based Intrusion Detection System, whereas NIPS (Answer C) is a Network-based Intrusion Prevention System.

3. Most UNIX/Linux-based systems include the ability to write messages (either directly or through applications) to log files by using which utility with syslog? ○ A. scribe ○ B. master ○ C. recorder ○ D. logger

D. Most UNIX/Linux-based systems include the ability to write messages (either directly or through applications) to log files via syslog. This can be done for security or management reasons and provides a central means by which devices that otherwise could not write to a central repository can easily do so (often by using the logger utility). Answers A, B, and C are nonexistent utility choices.

20. Traffic is not being allowed through ports 67 and 68 of the firewall. Which TCP or UDP protocol is associated with those ports by default? ○ A. IMAP ○ B. RDP ○ C. DNS ○ D. DHCP

D. Ports 67 and 68 are associated with DHCP by default. Port 53 is associated with DNS (Answer C). Port 3389 by default is associated with RDP (Answer B), whereas port 143 is associated with IMAP (Answer A).

5. At what layer of the OSI model do time domain reflectometers operate? ○ A. Session ○ B. Presentation ○ C. Application ○ D. Physical

D. TDRs work at the physical layer of the OSI model, sending a signal through a length of cable, looking for cable faults. Answers A, B, and C are OSI layers above the physical layer and thus higher than that at which time domain reflectometers operate.

22. Which utility is shown in the following figure (portions of which have been obscured to prevent telegraphing the answer)? Image ○ A. tracert ○ B. arp ○ C. ping ○ D. netstat

D. The netstat utility is used to view the current TCP/IP connections on a system. The tracert utility (Answer A) is used in Windows-based operating systems to trace the route taken to reach a particular host. arp (Answer B) is used for resolving IP addresses to MAC addresses. ping (Answer C) tests if connectivity exists.

14. IPv4 has automatic private IP addressing within the range beginning 169.254.0.0. What is the equivalent addressing in IPv6? ○ A. There is not an equivalent. ○ B. FFFF:: prefix ○ C. 0000:: prefix ○ D. FE80:: prefix

D. Within IPv6, the FE80:: prefix is equivalent to the 169.254.0.0 range (automatic private IP addressing) in IPv4. The other choices (Answers A, B, and C) are incorrect because the FE80:: prefix is equivalent to the 169.254.0.0 range in IPv4.

12. Which layers of the OSI model match the Network Interface Layer of the TCP/IP model? (Choose all that apply.) ○ A. Application ○ B. Presentation ○ C. Session ○ D. Transport ○ E. Network ○ F. Data Link ○ G. Physical

F and G. The network interface layer of the TCP/IP model matches the data link and physical layers of the OSI model in functionality. The other choices (Answers A, B, C, D, and E) are incorrect because they are OSI model layers other than those that match the network interface layer of the TCP/IP model.

11. Which command is shown in the following figure (portions of which have been obscured to prevent telegraphing the answer)? Image ○ A. arp -d ○ B. arp -a ○ C. arp -s ○ D. traceroute

Question 11 B. The -a option is used with arp to display entries in the routing table. The -d option (Answer A) is used to delete an entry, whereas -s (Answer C) is used to add an entry. traceroute (Answer D) is a UNIX/Linux utility for tracing the route from one host to another.


Related study sets

Evidence and Legal reasoning: Chapter 1

View Set

Chapter 3 - Corporate Governance

View Set