Network+ Master Set

Ace your homework & exams now with Quizwiz!

802.11b

2.4 GHz DSSS 11 Mbps ~300' No backward compatibility

The IEEE 802.11a standard specifies a channel bandwidth of:

20 MHz

The IEEE 802.11g standard specifies a channel bandwidth of:

20 MHz

Which of the answers listed below refers to an IPv4 address range reserved for future use?

240.0.0.0 - 255.255.255.254 (240.0.0.0/4)

How many layers does the OSI model contain?

7

Which category (CAT) of UTP cabling is the fastest?

7

What wavelength is used on a 10GBaseSR network?

850

Which connector is currently used in wired networks?

8P8C

What is the maximum length for UTP cables allowed by the TIA/EIA 568 cabling specification?

90M

Which of the DNS database records listed below returns a 32-bit IP address?

A

What are you trying to discover when you test a cable for continuity?

A broken wire

A strong password that meets the password complexity requirement should contain: (Select best answer)

A combination of characters from at least 3 character groups

Which item is part of a wall outlet?

A female jack

In the newer Bluetooth 4.0 version, what is required during the pairing process?

A four-digit personal identification number (PIN)

What are the characteristic features of ATM? (Select all that apply)

A network technology used for connecting devices on a WAN Used in SONET networks 53-byte data transfer unit (a.k.a. ATM cell) Data transfer rates of up to 10 Gbps

A network protocol that allows for secure file transfer over SSL is called:

File Transfer Protocol Secure (FTPS)

Which routing metric determines the largest frame a particular technology can handle?

MTU (Maximum Transmission Unit)

Disabling SSID broadcast:

Makes a WLAN harder to discover

A type of technology that provides control over the usage of a mobile device within a designated area is referred to as:

Geofencing

What type of IPv6 address do you need to get on the Internet?

Global unicast address

If you provide support for, but do not install, UTP networks, which two tools are most important to use?

Good, medium-priced toner and a good, medium-priced cable tester

Which protocol allows for retrieving contents of an Internet page from a web server?

HTTP

Which of the protocols listed below enables remote access to another computer on the network via web browser?

HTTPS

__________ problems manifest themselves as intermittent problems.

Heat and power

Which vendor was one of the earliest PaaS providers?

Heroku

IPv6 addresses are expressed with the use of:

Hexadecimal numbers

What term best describes the way the DNS name space is organized?

Hierarchical

What are the characteristic features of satellite Internet connections? (Select 3 answers)

High signal latency Interference (weather dependent) Relatively high cost in comparison to terrestrial links

Which term refers to the passage of a packet through a router?

Hop

Which term describes the cabling that goes more or less horizontally from a work area to the telecommunications room?

Horizontal cabling run

Which alternate site allows for fastest disaster recovery?

Hot site

Which of the following terms refers to a duplicate of the original site, with fully operational computer systems as well as near-complete backups of user data?

Hot site

What is the meaning of the term "capacitance"?

How long it takes a wire to get a full charge

Border Gateway Protocol (BGP) falls into the category of:

Hybrid routing protocols

TCP port 80 is assigned to:

Hypertext Transfer Protocol (HTTP)

In virtualization technology, a software program that manages multiple operating systems (or multiple instances of the same operating system) on a single computer system is called:

Hypervisor

Which organization assigns Autonomous System Numbers (ASNs)?

IANA

Which organization has the authority to create new top-level domain names?

ICANN

Which protocol does the ping application use?

ICMP

Which of the answers listed below illustrates the difference between passive and active security breach response?

IDS vs. IPS (Intrusion Detection System vs. Intrusion Prevention System)

Which IEEE standard provides the implementation basis for most modern WLANs?

IEEE 802.11

In 802.11 networks, the term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth. Channel bonding was first introduced with the:

IEEE 802.11n standard

Which of the following standards implements PoE+?

IEEE 802.3at

The arp command can be used to perform what kind of resolution?

IP to MAC

The DNS database AAAA record creates a pointer that maps a hostname to:

IPv6 address

Which task is the first step in the troubleshooting process?

Identify the problem.

A type of layer 2 network switch with configuration features that can be modified through a user interface is referred to as:

Managed switch

What are the characteristic features of the 100BaseTX Ethernet standard? (Select 3 answers)

Maximum cable segment length of 100 meters Transfer rate of 100 Mbps over two-pair Cat 5 or better cable Twisted-pair copper cabling (Category 5 or higher)

Which of the password policy settings listed below prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?

Maximum password age setting

Which type of network topology provides the highest level of redundancy?

Mesh

Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?

Minimum password age setting

DNS record that specifies a list of additional name servers on a domain is called:

Name Server? (NS)

Which two tools dominate the vulnerability testing arena?

Nessus and OpenVAS

Which of the answers listed below refer to IMAP4? (Select 2 answers)

Offers improved functionality in comparison to POP3 Serves the same function as POP3

Which of the answers listed below refer to a very basic UPS type commonly used for protecting a single PC? (Select 2 answers)

Offline Standby

Which of the answers listed below refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments?

Omnidirectional antenna

If you suspect that a fiber-optic run has a break, which type of device would you use to determine if there is a break, and to identify the location of the break?

Optical Time Domain Reflectometer (OTDR)

EMI shielding protects the transferred data signals from: (Select 2 answers)

Outside interference Eavesdropping

Most PCs today have two types of expansion slots: PCI and __________.

PCIe

Which of the following terms refer to solutions used for controlling network resources and assigning priority to different types of traffic? (Select 2 answers)

Packet shaping Quality of Service (QoS)

Which of the following answers refer(s) to frame relay? (Select 3 answers)

Packet-switching method Data transfer rates of up to 45 Mbps A network technology used for connecting devices on a WAN

Which connection type is limited to point-to-point topology and uses a 25-pin female DB type?

Parallel

Which tool is used to create a baseline on Windows systems?

Performance Monitor

A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as:

Phishing

A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of: (Select 2 answers)

Phishing Social engineering

A solution that allows to supply electricity over standard Ethernet cables is known as: (Select 2 answers)

PoE IEEE 802.3af

IEEE 802.3at

PoE+. Power over Ethernet+.

Which network protocol enables encapsulation of PPP frames within 802.3 frames?

Point-to-Point Protocol over Ethernet (PPPoE)

Which of the following allows an administrator to inspect the traffic passing through a network switch?

Port mirroring

Which of the tools listed below would be used to identify running services on a networked host?

Port scanner

Which WAP configuration setting allows for adjusting the boundary range of a wireless signal?

Power level controls

What does the term "Blackout" refer to?

Power outage

Which advantage of virtualization provides substantial reduction in dollars spent and electricity used?

Power savings

Which device is an example of a peripheral device?

Printer

Which mode allows an intrusion detection system (IDS) to inspect a copy of every packet on a network?

Promiscuous

Which utility is categorized in the CompTIA Network+ exam as a hardware tool?

Protocol analyzer

Which of the answers listed below refers to a cloud computing delivery model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?

Infrastructure as a Service (IaaS)

Which term best describes disgruntled employees abusing legitimate access to company's internal resources?

Insider threat

Which column in a routing table tells the router which of its ports to use?

Interface

In a modern DCS, each of the local controllers connects (eventually) to a centralized controller—called the __________—where global changes can be managed.

Internet Connection Sharing (ICS) server

An emerging field of new technologies, such as wearable tech or home automation is known as:

IoT (Internet of Things)

Which term is another name for an optical power meter?

Light meter

When designing and building a network, which requirements define the network's needs?

List of requirements

Which technology is marketed as and now generally accepted as a true 4G technology?

Long Term Evolution (LTE)

Which free Web server was originally created for the UNIX/Linux platforms, but now runs on multiple operating systems (including Windows)?

Apache HTTP Server

What is the most common type of a DSL Internet access?

Asymmetric digital subscriber line (ADSL)

Which of the answers listed below refers to the process of granting or denying access to resources?

Authorization

Which term defines what an authenticated person can do with data?

Authorization

Which of the answers listed below refers to a possible symptom of exhausted DHCP scope?

Automatic Private IP Addressing (APIPA)

Which deployment model uses employees' existing mobile devices for use by the corporation?

BYOD

Bayonet Neill-Concelman (BNC) connector is used with:

Coaxial copper cabling

A lightly protected subnet consisting of publicly available servers placed on the outside of the company's firewall is referred to as:

DMZ

A wireless disassociation attack is a type of:

Denial of Service (DoS) attack

On a TCP/IP network, a router determines where an incoming packet should go by looking at the packet's __________.

Destination IP

Using the ping command, which message is displayed if your computer has no route to the address listed?

Destination host unreachable

A deauthentication (deauth) attack is a form of __________ attack.

DoS

Which of the terms listed below refers to a backup technique that allows for creating an exact copy of an entire drive and replicating the drive to a new computer or to another drive on the same computer in case of a hard drive failure?

Drive imaging

Which term refers to ports in the 49152 to 65535 range?

Dynamic

What is a better known name for dynamic IP addressing?

Dynamic Host Configuration Protocol (DHCP)

Which VPN type enables direct communication links between remote hosts on a WAN?

Dynamic Multipoint Virtual Private Network (DMVPN)

What is the European counterpart to a T1 line?

E1

What are the characteristic components of the OSI data link layer? (Select 3 answers)

MAC address Switch Frame

An Ethernet switch forwards LAN traffic from connected devices based on the information stored in:

MAC address table

A network access method whereby the 48-bit physical address assigned to each NIC is used to grant/deny network access is known as:

MAC filtering

A computer network connecting multiple LANs over an area of a city or campus is referred to as:

MAN

Every Web server must include "www" as part of its name.

False

For IPv6 networks to function, they need common network IDs.

False

Hardening IoT devices increases the danger of loss or downtime on the devices.

False

In a Windows system, a technician runs the ip utility.

False

Layer 2 Tunneling Protocol (L2TP) has authentication and encryption.

False

Microsoft introduced the first bare-metal hypervisor called ESX.

False

The TCP/IP model consists of six layers.

False

The term public cloud refers to the services and applications that are owned by the public.

False

The terms emulation and virtualization refer to the same technology.

False

The two types of meshed topologies are partially meshed and wholly meshed.

False

The vast majority of cabling problems occur long after a successful network installation.

False

To write IPv6 addresses containing strings of zeroes, you can use a pair of periods (..) to represent a string of consecutive groups with a value of zero.

False

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol.

False

Twisting the fiber is a popular action with fiber-optic cables.

False

Two nearby wireless access points (WAPs) should use close channels like 6 and 7.

False

Two systems on the same network may have NICs with the same MAC address.

False

Unfortunately, routing tables in IPv6 offer a much larger footprint than routing tables in IPv4.

False

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).

False

User Datagram Protocol (UDP) is a connection-oriented protocol.

False

Using class blocks enables a much more efficient use of IP addresses compared to subnetting.

False

When a collision occurs on an Ethernet network, the cable is reserved for the nodes whose data collided until they have finished retransmitting.

False

VoIP gateway is a network device that converts voice and fax calls, in real time, between an IP network and: (Select 2 answers)

Public Switched Telephone Network (PSTN) Plain Old Telephone System (POTS)

Which tool puts UTP wires into 66- and 110-blocks?

Punchdown tool

What is the functionality provided by the Class of Service (CoS) parameter? (Select 2 answers)

QoS Traffic management

Which standard offers authentication, authorization, and accounting?

RADIUS

Which core function is sent by the agent after the SNMP manager queries an agent with a GetRequest or GetNextRequest?

Response

Which term refers to the administrative account native to Linux?

Root

Which of the following terms refers to an agreement that specifies performance requirements for a vendor?

SLA

TCP port 25 is used by:

SMTP

Which of the protocols listed below enables secure remote access to another computer on the network via command line?

SSH

Examples of copper cabling types used in Ethernet networks include: (Select all that apply)

STP UTP Coax

A range of IP addresses that a DHCP server can lease out to DHCP clients is known as:

Scope

A network protocol that allows for secure file transfer over Secure Shell (SSH) is called:

Secure File Transfer Protocol (SFTP)

The SMTP protocol is used for: (Select 2 answers)

Sending email between mail servers Sending email from a client device

Who is responsible for the process of determining critical assets?

Senior management

Which industrial control system (ICS) device monitors characteristics like temperature?

Sensor

What cabling predates both networking and the personal computer?

Serial

Which of the following answers refers to a set of bug fixes or code enhancements available in the form of a single installable package?

Service pack

Layer 5 of the OSI model is also referred to as:

Session layer

Which OSI layer assumes the responsibility for managing network connections between applications?

Session layer

Which of the tools listed below allows for secure disposal of physical documents?

Shredder

Which term represents a measurement of how well a wireless device is connecting to other devices?

Signal strength

Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks?

Simple Mail Transfer Protocol (SMTP)

10GBaseLR/LW

Single-mode fiber 1310 nm LC Length of 10 km

Which of the answers listed below refer(s) to the feature(s) of SFP? (Select all that apply)

Small form factor transceiver Converts electrical signals to optical signals Newer transceiver type that replaces GBIC Modular (hot swappable) interface Converts optical signals to electrical signals Data transfer of 1 Gbps

Which of the following answers refers to a dedicated local network consisting of devices that provide data access?

Storage Area Network (SAN)

Spanning Tree Protocol (STP) provides protection against:

Switching loops

Port 109

TCP POP, Post Office Protocol, version 2

Port 995

TCP POP3 over SSL (encrypted transmission)

Port 648

TCP RRP, Registry Registrar Protocol

Port 556

TCP Remotefs, rfs, rfs_server

Port 115

TCP SFTP, Simple File Transfer Protocol

Port 706

TCP SILC, Secure Internet Live Conferencing

Port 720

TCP SMQP, Simple Message Queue Protocol

Port 465

TCP SMTP over SSL - CONFLICT with registered Cisco protocol

Port 901

TCP Samba Web Administration Tool (SWAT)

Port 981

TCP SofaWare Technologies Remote HTTPS management for firewall devices running embedded Checkpoint Firewall-1 software

Port 712

TCP TBRPF, Topology Broadcast based on Reverse-Path Forwarding

Port 711

TCP TDP, Tag Distribution Protocol

Port 604

TCP TUNNEL

Port 81

TCP Torpark - Onion routing ORport

Port 117

TCP UUCP-PATH

Secure Shell (SSH) protocol runs on:

TCP port 22

A network technician uses Remote Desktop Protocol (RDP) client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection?

TCP port 3389

Which of the following ports is used by HTTPS?

TCP port 443

Which of the ports listed below are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers)

TCP port 5060 TCP port 5061

Port 513

TCP, UDP Login Who

Port 0

TCP, UDP Reserved; do not use (but is a permissible source port value if the sending process does not expect messages in response)

Port 512

TCP, UDP exec, Remote Process Execution comsat, together with biff: notifies users of new c.q. yet unread e-mail

Port 152

TCP, UDP BFTP, Background File Transfer Program

Port 547

TCP, UDP DHCPv6 server

Port 9

TCP, UDP DISCARD protocol

Port 53

TCP, UDP DNS (Domain Name System)

Port 7

TCP, UDP ECHO protocol

Port 135

TCP, UDP EPMAP / Microsoft RPC Locator Service

Port 259

TCP, UDP ESRO, Efficient Short Remote Operations

Port 989/990

TCP, UDP FTP Protocol (data and control) over TLS/SSL

Port 41

TCP, UDP Graphics

Port 11

TCP, UDP SYSTAT protocol

What is the de facto protocol suite of the Internet?

TCP/IP

What network protocol do Apple systems use today?

TCP/IP

UDP port 69 is assigned to:

TFTP

What does the term "Miredo" refer to?

Teredo tunneling software

What information is included in the data portion of an Ethernet frame on an IP network?

The IP addresses of both systems

UTP category ratings are based on what criteria?

The highest frequency the cable can handle

What is a shared attribute of all members of the Ethernet family of networking technologies?

The network access method

A Trojan can appear as a game, like poker.

True

A network protocol is special software that allows a network to use logical addressing in order to move data from one subnet to another.

True

A physical point where an ISP's network ends and connects with the customer's on-premises wiring (which also defines where the ISP's responsibility for maintenance ends and the consumer's responsibility begins) is referred to as demarcation point, or demarc.

True

A properly grounded, 20-amp dedicated circuit will suffice for a single small rack.

True

A single non-standard Ethernet frame that allows for much larger maximum payload size is commonly referred to as jumbo frame.

True

A single switch configured into two VLANs is the simplest form of VLAN possible.

True

A special type of cabling with fire-retardant jacket placed inside the space between structural floor and dropped ceiling or inside walls is known as a plenum-rated cabling.

True

A type of IDS that relies on predetermined attack patterns to detect intrusions is referred to as a signature-based IDS.

True

Almost all network technologies that use fiber-optic cable require pairs of fibers.

True

An IP address that doesn't correspond to any actual physical network interface is called a virtual IP address (VIP/VIPA).

True

Every serving application has an open port.

True

Fiber-optic cable is attractive for use in high electromagnetic interference (EMI) areas.

True

For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP).

True

Glass is notorious for bending radio waves as the waves pass through them causing refraction.

True

What are the characteristics of SMB/CIFS? (Select 2 answers)

Provides shared access to files, directories, and devices Used mainly by computers running Microsoft Windows operating systems

Setting up a wireless connection in Network and Sharing Center Control Panel applet in MS Windows requires: (Select 3 answers)

Providing the wireless network name Selecting security/encryption type Typing in the network security key (Wi-Fi password)

Lots of operating systems come with built-in DNS server software, including Windows Server.

True

NetBIOS was suitable only for small networks.

True

Network Address Translation (NAT) provides an IP proxy between a private LAN and a public network such as the Internet.

True

Networked clients not residing on the same subnet as the DHCP server can still obtain an IP address from the server through a DHCP relay agent (a.k.a. IP helper).

True

No two systems on the same network can share the same IP address.

True

One nice aspect of DSL is that you do not have to run new phone lines.

True

The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a shared medium before transmitting to prevent collisions and loss of data.

True

With full-duplex, a NIC can send and receive data at the same time.

True

How many copper wires are used by a T1 line?

Two pairs

Port 518

UDP NTalk

Port 67/68

UDP DHCP (Dynamic Host Configuration Protocol)

Port 666

UDP Doom, First online FPS

Port 750

UDP Kerberos version IV

Port 123

UDP NTP (Network Time Protocol) - used for time synchronization

Port 69

UDP TFTP (Trivial File Transfer Protocol)

Port 82

UDP Torpark - Control Port

Port 533

UDP netwall, For Emergency Broadcasts

Dynamic Host Configuration Protocol (DHCP) runs on: (Select 2 answers)

UDP port 67 UDP port 68

Which of the following answers refer to the characteristics of copper-based networks? (Select 3 answers)

Used for last-mile cable runs Less expensive in comparison to optical fiber Limited bandwidth and maximum cable segment length in comparison to fiber-optic links

What are the characteristics of fiber-optic cabling? (Select all that apply)

Used for network backbone cabling Immunity to electromagnetic interference Provides higher level of security than copper cabling (difficult to tap into) More suitable for carrying digital information than copper cabling

What are the characteristic features of the RJ-45 connector? (Select 2 answers)

Used with Ethernet network cabling Copper cabling connector

Which program is an example of bare-metal virtualization software?

VMware ESXi

Which tool is an example of a Type 1 hypervisor?

VMware ESXi

Which of the following answers refers to a non-proprietary RDP alternative that enables control over another computer on the network with the use of a graphical user interface?

VNC (Virtual Network Computing)

Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network through the Internet?

VPN

Which of the terms listed below does not fall into the category of preventive physical security controls?

Video surveillance

Which of the terms listed below refers to a solution that allows multiple operating systems to work simultaneously on the same hardware?

Virtualization

Which term refers to taking the hardware of the host system and segmenting it into individual virtual machines?

Virtualization

A system administrator has identified a server that may not have been updated with the latest security patches. Which of these would be the best way to determine if any known vulnerabilities exist on this server?

Vulnerability scan

Which of the following answers lists an example of a modern network bridging device?

WAP

Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices?

Wireless Wide Area Network (WWAN)

A type of network device used for improving wireless signal strength within homes and small offices is called:

Wireless range extender

Which type of malware replicates exclusively through networks?

Worm

Which term refers to the first generation of packet-switching technology?

X.25

Which of the answers listed below refer to highly directional antenna type used for long-range point-to-point bridging links? (Select 3 answers)

Yagi antenna Dish antenna Parabolic antenna

In NetFlow, single flows are stored in a __________.

flow cache

A packet sniffer is a program that queries a network interface and collects packets in a file called a __________ file.

capture

What entry is made at the command prompt in UNIX/Linux to display DNS server information?

cat /etc/resolv.conf

Time-division multiple access (TDMA) enabled multiple users to share the same __________ more or less at the same time.

channel

Which of the following devices would be used for connecting a router to a T1 line?

channel service unit/data service unit (CSU/DSU)

Which unit is used to measure signal loss in networking?

dB

Both near-end crosstalk (NEXT) and far-end crosstalk (FEXT) are measured in __________.

decibels

With misconfigured proxy ARP settings, the VPN concentrator can send what looks like a __________ attack on the LAN?

denial of service (DoS)

An access control list (ACL) is a rule applied to an interface that allows or denies traffic based on things like source or __________.

destination IP address

Which command, while not available on Windows, can be used on macOS/UNIX/Linux systems to diagnose DNS problems?

dig

Which of the tools listed below enable troubleshooting of problems related to name resolution? (Select 2 answers)

dig nslookup

A __________ is when a port intentionally drops a well-formed frame.

discard

In response to the demand for two-pair cabling, manufacturers often connect two fibers together to create __________ fiber-optic cabling.

duplex

Which of the following DNS database records maps a domain name to a list of mail servers for that domain?

mail exchanger record (MX)

ARP poisoning is a common method for __________ attacks.

man in the middle

Which of the following is an example of active eavesdropping?

man-in-the-middle attack (MITM)

Cat ratings are officially rated in __________, indicating the highest frequency the cable can handle.

megahertz (MHz)

Which command is a dynamic (keeps running) equivalent to traceroute?

mtr

If you are using NetBIOS, which command allows you to see if other local systems are visible?

net view

A command-line utility in MS Windows used for displaying protocol statistics and current TCP/IP network connections is called:

netstat

Software defined networking (SDN) cuts the control plane of individual devices out of the picture and lets an all-knowing program called a __________ controller dictate how both physical and virtual network components move traffic through the network.

network

Which tool is an example of a GUI port scanner and protocol analyzer?

nmap

Which of the following network administration command-line utilities can be used for DNS queries?

nslookup

A MAC address is also known as a(n) __________ address.

physical

Which utility uses Internet Message Control Protocol (ICMP) packets to query by IP or by name?

ping

What command can you use to tell a device to send packets to itself?

ping 127.0.0.1

Which utilities are excellent examples of connectivity software, applications that enable you to determine if a connection can be made between two computers?

ping and traceroute

The space between the acoustical tile ceiling in an office building and the actual concrete ceiling above is called the __________.

plenum

Which command-line command in MS Windows is used to display the contents of a routing table?

route print

Which tool is used to create, configure, and maintain virtual machines on the host from the comfort of a client computer running the tool?

vSphere Client

The different colors of the laser signals feature different __________.

wavelengths

When testing for continuity using a multimeter set it to Ohms; if you have a connection you will see a(n) __________ reading.

zero Ohms

What is the result of running "Add a VPN connection" in Settings in the Control Panel on the Windows client side of a PPTP VPN connection?

A virtual NIC is created.

The IEEE 802.11ac standard specifies a maximum channel bandwidth of:

160 MHz

SNMP runs on UDP port:

161

What User Datagram Protocol (UDP) ports does SNMP use for unsecure communication?

161 and 162

Evolved High-Speed Packet Access (HSPA+) provided theoretical speeds up to __________, although most HSPA+ implementations rarely exceeded 10 Mbps.

168 Mbps

Which of the following answers lists the broadcast address for the 192.168.50.155/20 network?

192.168.63.255

A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:

ACL

Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

ACL

Which of the answers listed below refers to a rule-based network access control mechanism implemented on routers, switches, and firewalls that allows to filter network traffic by IP address or port number?

ACL

Which of the following answers refers to a wireless connectivity technology used for monitoring sensor data collected from low-powered sports and fitness equipment?

ANT+

Which type of firewall is built into most consumer-grade routers?

A small office/home office (SOHO) firewall

Which safety issue is considered to be a physical safety issue?

A technician lifting equipment

An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker's IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario?

ARP poisoning

An Ethernet switch table containing IP-to-MAC address mappings is called:

ARP table

A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as:

Acceptable Use Policy (AUP)

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:

Accounting

Which type of domain allows all of the domain controllers to be equal partners, such that any domain controller can take over if one domain controller fails?

Active Directory

Which NIC light turns on when the card detects network traffic and intermittently flickers when operating properly?

Activity

Which industrial control system (ICS) device makes changes that modify a characteristic such as temperature?

Actuator

A wireless networking topology in which client devices communicate directly with each other without the use of a controlling Access Point (AP) is called:

Ad hoc mode

Which term refers to a program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows?

Adware

According to the troubleshooting theory, verification of full system functionality and implementation of applicable preventative measures should be performed:

After implementing the solution

Which term refers to physically separating your network from every other network?

Air gap

Which tool is an open-source tool for penetration testing pretty much every aspect of wireless networks?

Aircrack-ng

Which term refers to a cipher's underlying mathematical formula?

Algorithm

Restoring data from an incremental backup requires: (Select 2 answers)

All copies of incremental backups made since the last full backup Copy of the last full backup

Which type of algorithm is used when two different keys, one to encrypt and one to decrypt, are used in encryption?

Asymmetric-key

Which part of the AAA security architecture deals with the verification of the identity of a person or process?

Authentication

A type of Ethernet interface that automatically detects the required cable connection type (straight-through vs. crossover) and configures the connection appropriately is known as:

Auto MDI-X

An IPv6 link-local address is an equivalent of IPv4's:

Automatic Private IP Addressing (APIPA) address

Shielded Twisted-Pair (STP) cabling reduces what kind of interference? (Select 2 answers)

Crosstalk EMI

Which of the following attack types relies on amplification effect?

DDoS attack

Which of the following connector types are used for RS-232 serial communications? (Select 2 answers)

DE-9 DB-25

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:

DHCP

APIPA addresses are valid only for communications within a network segment that a given host is connected to. A host with APIPA-assigned address (i.e. an IP address in the range between 169.254.0.1 and 169.254.255.254) cannot connect to the Internet. The assignment of APIPA address typically indicates a problem related to:

DHCP

An expired IP address indicates a problem with:

DHCP

Which tool automatically assigns an IP address whenever a computer connects to the network?

DHCP

A security feature of a network switch that provides countermeasures against rogue DHCP servers is called:

DHCP snooping

A security administrator is concerned that documents and spreadsheets containing credit card information may be transmitted to the Internet. Which of these would be the best way to identify the transmission of this sensitive information?

DLP (Data Loss Prevention)

A network engineer is designing a WAN that would connect all remote locations to each other using encrypted tunnels. Which of these WAN technologies best fits this description?

DMVPN (Dynamic Multpoint VPN)

A network admin can ping remote host by its IP address, but not by FQDN (Fully Qualified Domain Name). Which of the following is the most probable source of the problem?

DNS

Remapping a domain name to a rogue IP address is an example of what kind of exploit?

DNS poisoning

In order to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?

DNS server

Each analog voice call gets converted into a __________ signal at the telephone company's central office before being multiplexed into larger circuits.

DS0

What is the most basic data chunk you get in the telephone world?

DS1

Layer 2 of the OSI model is known as:

Data link layer

Examples of protocols used for implementing secure VPN tunnels include: (Select 3 answers)

Datagram Transport Layer Security (DTLS) Internet Protocol Security (IPsec) Secure Sockets Layer/Transport Layer Security (SSL/TLS)

IPv4 addresses are expressed with the use of:

Decimal numbers

Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?

Degaussing

A network manager has asked you to coordinate the installation of a new smartjack. What location should you use for this installation?

Demarc point

Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets?

ICMP

Which network protocol enables detection of packet loss?

ICMP (Internet Control Message Protocol)

Which protocol is best for simple, connectionless applications that never need more than a single packet?

ICMP (Internet Control Message Protocol)

Which IEEE committee defines frames, speeds, distances, and types of cabling to use in a network environment?

IEEE 802

Which of the answers listed below applies to a situation where an Ethernet switch acts as an authenticator for devices connecting to a network through one of its ports?

IEEE 802.1X

What type of unit is formed by two or more wireless nodes communicating in ad hoc mode?

Independent Basic Service Set (IBSS)

Which of the solutions listed below would be used to provide redundant power source for datacenter server racks?

Independent power circuits

What is the function of archive bit?

Indicating whether a file has been modified since the last backup

Which of the answers listed below refers to a high-speed alternative to Fibre Channel technology?

InfiniBand

Which of the answers listed below refers to a short distance, line-of-sight technology used for example in home remote controls?

Infrared Radiation (IR)

Which cloud service model is used by Amazon Web Services (AWS)?

Infrastructure as a Service (IaaS)

A wireless networking topology consisting of at least one Access Point (AP) is referred to as:

Infrastructure mode

Which of the following terms refers to the OSI network layer?

Layer 3

The term "Presentation layer" refers to:

Layer 6 of the OSI model

The application layer of the OSI model is also known as:

Layer 7

The duration of time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as:

Lease

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

Domain Name System (DNS)

The term "Brownout" refers to what kind of situation?

Drop in voltage

Which of the following would add power redundancy on a server box?

Dual-power supply

Which type of NAT allows many computers to share a pool of routable IP addresses that number fewer than the computers?

Dynamic

Automatic routing table update is a feature of:

Dynamic routing

What is another name for electronic discovery?

E-discovery

Which hypervisor is considered to be the industry leader?

ESXi

Which of the following enables automatic configuration of an IPv6 address?

EUI-64

A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker's attention from the actual corporate network is known as:

Honeypot

A network segment utilizing only this type of device is the most prone to network performance degradation due to large number of network collisions.

Hub

The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance.

Hub

Which of the following examples meets the requirement of multifactor authentication?

Password and biometric scan

Which of the following password policy settings determines the number of unique new passwords that must be associated with a user account before an old password can be reused?

Password history setting

The two factors that are considered important for creating strong passwords are: (Select 2 answers)

Password length Password complexity

An Ethernet straight-through cable is also commonly referred to as:

Patch cable

Which of the following answers refer to common cabling type used for connecting workstations to network devices? (Select 2 answers)

Patch cable Straight-through cable

A simple device consisting of multiple connector blocks and ports used for cable management is known as:

Patch panel

What type of agent is composed of modules that perform a thorough inventory of each security-oriented element in the computer?

Persistent agent

Which layer of the OSI model defines a method of moving radio waves?

Physical

Which of the following cloud service types would provide the best solution for a web developer intending to create a web app?

Platform as a Service (PaaS)

A type of enclosed space in a building (such as the one between a dropped ceiling and the structural ceiling) used for air handling is commonly referred to as:

Plenum

What is another name for dynamic NAT?

Pooled NAT

Your company has a single server on a private LAN that it wants to make accessible from the Internet. Which of the following would give the server the protection of NAT, while allowing access to that server from the Internet?

Port Forwarding

Which technology is incredibly useful for any type of situation where an administrator needs to inspect packets coming to or from certain computers?

Port Mirroring

A server with a private IP address has been set up to handle requests from an outside (public) network. Which of the solutions listed below would enable this function?

Port forwarding

Which of the following acronyms refers to a client authentication method used in WPA/WPA2 Personal modes?

Pre-shared key (PSK)

Character encoding, data compression and encryption/decryption take place at the:

Presentation layer of the OSI model

What are the characteristic features of RADIUS? (Select 3 answers)

Primarily used for network access Combines authentication and authorization Encrypts only the password in the access-request packet

Which of the answers listed below refers to an ISDN (Integrated Services Digital Network) service designed for larger organizations that take advantage of digital PBX systems?

Primary Rate Interface (PRI)

A type of cloud infrastructure available solely for a single organization is known as:

Private cloud

Which type of agreement would be the most suitable for regulating responsibilities of users with administrative rights on a network?

Product Usage Agreement (PUA)

A type of server used for collecting diagnostic and monitoring data from networked devices is known as:

Syslog server

Which of the answers listed below describe the function of DiffServ architecture? (Select 2 answers)

QoS Traffic management

Which of the solutions listed below add(s) redundancy in areas identified as single points of failure? (Select all that apply)

RAID Dual-power supply Failover clustering Load balancing

Which type of RAID does not offer fault tolerance?

RAID 0

Which term refers to the most common limiting factor in a host's ability to run virtual machine?

RAM

Which of the answers listed below refers to an encryption algorithm used in TKIP?

RC4

A Microsoft-proprietary protocol providing a user with graphical interface for connecting to another networked host is known as:

RDP

Which of the following answers refer(s) to authentication protocol(s) providing the AAA functionality? (Select all that apply)

TACACS+ (Terminal Access Controller Access-Control System Plus) RADIUS (Remote Authentication Dial-In User Service)

Which protocol is by far the most common type of session on a typical TCP/IP network?

TCP

Which protocol is connection-oriented?

TCP

Port 20/21

TCP FTP

A network administrator needs to configure a firewall rule to allow FTPS traffic from a remote location. Which of these port numbers would allow this traffic?

TCP Port 443

Port 170

TCP Print-srv

Port 517

TCP Talk

Port 532

TCP netnews

Port 674

TCP ACAP, Application Configuration Access Protocol

Port 548

TCP AFP (Apple Filing Protocol)

Port 654

TCP AODV, Ad hoc On-Demand Distance Vector

Port 699

TCP Access Network

Port 311

TCP Apple Server-Admin-Tool, Workgroup-Manager-Tool

Port 179

TCP BGP (Border Gateway Protocol)

Port 829

TCP CMP (Certificate Management Protocol)

Port 782

TCP Conserver serial-console management server

Port 647

TCP DHCP Failover Protocol

Port 652

TCP DTCP, Dynamic Tunnel Configuration Protocol

Port 411

TCP Direct Connect Hub port

Port 700

TCP EPP, Extensible Provisioning Protocol

Port 591

TCP FileMaker 6.0 Web Sharing (HTTP Alternate, see port 80)

Port 79

TCP Finger protocol

Port 70

TCP Gopher protocol

Port 101

TCP HOSTNAME

Port 80

TCP HTTP (HyperText Transfer Protocol) - used for transferring web pages

Port 443

TCP HTTPS - HTTP Protocol over TLS/SSL (encrypted transmission)

Port 692

TCP Hyperwave-ISP

Port 695

TCP IEEE-MMS-SSL

Port 993

TCP IMAP4 over SSL (encrypted transmission)

Port 194

TCP IRC (Internet Relay Chat)

Port 702

TCP IRIS over BEEP

Port 102

TCP ISO-TSAP protocol

Port 88

TCP Kerberos - authenticating agent

Port 646

TCP LDP, Label Distribution Protocol

Port 701

TCP LMP, Link Management Protocol.

Port 515

TCP Line Printer Daemon protocol - used in LPD printer servers

Port 691

TCP MS Exchange Routing

Port 57

TCP MTP, Mail Transfer Protocol

Port 119

TCP NNTP (Network News Transfer Protocol) - used for retrieving newsgroups messages

Port 911

TCP Network Console on Acid (NCA) - local tty redirection over OpenSSH

Port 698

TCP OLSR, Optimized Link State Routing

Port 110

TCP POP3 (Post Office Protocol version 3) - used for retrieving E-mails

Port 107

TCP Remote Telnet Service

Port 540

TCP UUCP (Unix-to-Unix Copy Protocol)

Port 43

TCP WHOIS protocol

Port 587

TCP email message submission (SMTP) (RFC 2476)

Port 860

TCP iSCSI

Port 113

TCP ident - old server identification system, still used by IRC servers to identify its users

Port 543

TCP klogin, Kerberos login

Port 544

TCP kshell, Kerberos Remote shell

Port 873

TCP rsync File synchronisation protocol

Port 665

TCP sun-dr, Remote Dynamic Reconfiguration

Post Office Protocol v3 (POP3) uses:

TCP port 110

Which port enables the FTP's Data Connection for sending file data?

TCP port 20

The File Transfer Protocol (FTP) Control Connection for administering a session is established through:

TCP port 21

Port 137-139

TCP, UDP NetBIOS

Port 3389

TCP, UDP RDP (Remote Desktop Protocol)

Port 530

TCP, UDP RPC

Port 1

TCP, UDP TCPMUX

Port 902

TCP, UDP VMware Server

Port 520

TCP, UDP efs Routing - RIP

Port 514

TCP, UDP rsh protocol - used to execute non-interactive command line commands on a remote system and see the screen return syslog protocol - used for system logging

Port 384

TCP, UDP A Remote Network Server System

Port 531

TCP, UDP AOL Instant Messenger, IRC

Port 387

TCP, UDP AURP, AppleTalk Update-based Routing Protocol

Port 201

TCP, UDP AppleTalk Routing Maintenance

Port 264

TCP, UDP BGMP, Border Gateway Multicast Protocol

Port 19

TCP, UDP CHARGEN (Character Generator) protocol

Port 371

TCP, UDP ClearCase albd

Port 13

TCP, UDP DAYTIME protocol

Port 546

TCP, UDP DHCPv6 client

Port 383

TCP, UDP HP OpenView HTTPs Operations Agent

Port 593

TCP, UDP HTTP RPC Ep Map

Port 42

TCP, UDP Host Name Server

Port 220

TCP, UDP IMAP, Interactive Mail Access Protocol, version 3

Port 143

TCP, UDP IMAP4 (Internet Message Access Protocol 4) - used for retrieving E-mails

Port 323

TCP, UDP IMMP, Internet Message Mapping Protocol

Port 631

TCP, UDP IPP, Internet Printing Protocol

Port 213

TCP, UDP IPX

Port 500

TCP, UDP ISAKMP, IKE-Internet Key Exchange

Port 464

TCP, UDP Kerberos Change/Set password

Port 389

TCP, UDP LDAP (Lightweight Directory Access Protocol)

Port 636

TCP, UDP LDAP over SSL (encrypted transmission)

Port 218

TCP, UDP MPP, Message Posting Protocol

Port 639

TCP, UDP MSDP, Multicast Source Discovery Protocol

Port 18

TCP, UDP Message Send Protocol

Port 445

TCP, UDP Microsoft-DS (Active Directory, Windows shares, Sasser worm, Agobot, Zobotworm) Microsoft-DS SMB file sharing

Port 991

TCP, UDP NAS (Netnews Admin System)

Port 524

TCP, UDP NCP (NetWare Core Protocol) is used for a variety things such as access to primary NetWare server resources, Time Synchronization, etc.

Port 563

TCP, UDP NNTP protocol over TLS/SSL (NNTPS)

Port 366

TCP, UDP ODMR, On-Demand Mail Relay

Port 35

TCP, UDP QMS Magicolor 2 printer

Port 17

TCP, UDP QOTD (Quote of the Day) protocol

Port 5

TCP, UDP RJE (Remote Job Entry)

Port 26

TCP, UDP RSFTP - A simple FTP-like protocol

Port 554

TCP, UDP RTSP (Real Time Streaming Protocol)

Port 39

TCP, UDP Resource Location Protocol

Port 38

TCP, UDP Route Access Protocol

Port 369

TCP, UDP Rpc2portmap

Port 153

TCP, UDP SGMP, Simple Gateway Monitoring Protocol

Port 427

TCP, UDP SLP (Service Location Protocol)

Port 25

TCP, UDP SMTP (Simple Mail Transport Protocol) - used for e-mail routing between mailservers

Port 161/162

TCP, UDP SNMP (Simple Network Management Protocol)

Port 444

TCP, UDP SNPP, Simple Network Paging Protocol

Port 156

TCP, UDP SQL Service

Port 118

TCP, UDP SQL Services

Port 22

TCP, UDP SSH (Secure Shell) - used for secure logins, file transfers (scp, sftp) and port forwarding

Port 111

TCP, UDP SUNRPC protocol

Port 49

TCP, UDP TACACS Login Host protocol

Port 37

TCP, UDP TIME protocol

Port 318

TCP, UDP TSP, Time Stamp Protocol

Port 23

TCP, UDP Telnet protocol - unencrypted text communications

Port 992

TCP, UDP Telnet protocol over TLS/SSL

Port 209

TCP, UDP The Quick Mail Transfer Protocol

Port 401

TCP, UDP UPS Uninterruptible Power Supply

Examples of distance-vector routing protocols include: (Select 2 answers)

RIP (Routing Information Protocol) EIGRP (Enhanced Interior Gateway Routing Protocol)

Port 542

TCP, UDP commerce (Commerce Applications)

Port 749

TCP, UDP kerberos-adm, Kerberos administration

Port 158

TCP, UDP DMSP, Distributed Mail Service Protocol

Which of the answers listed below refers to a channel access method used in 2G GSM networks?

TDMA (Time-Division Multiple Access)

What series of standards does the U.S National Security Agency (NSA) define to block RF emanation?

TEMPEST

What protocol was adopted in 1994, and is now considered obsolete except for small, private WANs?

RIPv2

What type of connector is used by all UTP Ethernet NICs?

RJ-45

Which type of network documentation would be of help in determining the physical location of a network server?

Rack diagram

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

Radio-frequency identification (RFID)

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is called:

Ransomware

Which type of port has a number in the 1024 to 49151 range?

Registered

Which of the following answers refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network?

Remote Desktop Protocol (RDP)

Which VPN type is used for connecting computers to a network? (Select all that apply)

Remote-access Client-to-site

In computer networking, the term "Attenuation" refers to a loss in signal strength during transmission caused by increasing distance and obstacles encountered on the signal path. The problem of attenuating circuit on the network can be solved by adding a device that boosts the signal strength. This type of device is known as:

Repeater

Which statement is an accurate comparison between repeaters and bridges?

Repeaters retransmit all packets, while bridges filter and forward traffic based on the MAC addresses of the computers on the network.

In the Kerberos-based authentication process, the purpose of the client's timestamp is to provide countermeasure against:

Replay attacks

Which of the terms listed below refers to permanent IP address assignment from a DHCP server?

Reservation

A network topology in which each node connects to exactly two other nodes is referred to as:

Ring topology

An authentication subsystem in which a single set of authentication credentials provides access to multiple systems within a single organization is referred to as:

SSO (Single sign-on)

A type of protocol used in network management systems for monitoring network-attached devices is called:

Simple Network Management Protocol (SNMP)

Which protocol offers a method for querying the state of certain network devices?

Simple Network Management Protocol (SNMP)

What type of fiber-optic cable uses lasers to send signals?

Single Mode Fiber (SMF)

What type of fiber-optic cable is used in a 1000BaseLX network?

Single-mode fiber

1000BaseLX

Single-mode fiber 1300 nm LC and SC 5 km

10GBaseER/EW

Single-mode fiber 1550 nm LC and SC Length of 40 km

Which type of VPN enables connectivity between two networks?

Site-to-site

Which switch and network equipment modular transceivers have replaced gigabit interface converters (GBICs) as the modular connector of choice?

Small form-factor pluggable (SFP)

How do many small networks avoid using a full-blown file server?

Small networks take advantage of network attached storage (NAS).

Which preventive physical security control would provide basic means for securing door access?

Smart card reader

Which of the answers listed below refer to implementations of certificate-based authentication? (Select 2 answers)

Smart cards 802.1X

A remote-line diagnostic device placed at the joining point between an ISP's line and customer's premises wiring is known as:

Smart jack

What type of backups are commonly used with virtual machines?

Snapshot

An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:

Social engineering

All modern NICs are multispeed and auto-sensing.

True

All network technologies break data transmitted between computers into smaller pieces called frames.

True

All operating systems come with some form of baseline tools.

True

As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack are the secondary victims of the DDoS attack; they are often referred to as zombies, and collectively as a botnet.

True

One of the features of the Dynamic Host Configuration Protocol (DHCP) is the capability for static allocation of an IP address based on the IP-to-MAC address mapping.

True

Optical Carrier (OC) transmission rate specifications adhere to a pattern where the OC prefix is followed by a number designating a multiple of the base unit of 51.84 Mbps.

True

Optical Time-Domain Reflectometer (OTDR) is a type of specialized cable tester that allows for locating faults and breaks in fiber-optic cabling.

True

Patch panels serve as your first line of defense in organizing cables.

True

PerfMon is a unique Linux tool for performance monitoring.

True

Physical and logical network diagrams provide visual representation of network architecture. A physical network diagram contains information on hardware devices and physical links between them. A logical network diagram describes the actual traffic flow on a network and provides information related to IP addressing schemes, subnets, device roles or protocols that are in use on the network.

True

Which of the answers listed below refer to the RJ-11 connector? (Select 2 answers)

Used with telephone cabling Copper cabling connector

Which of the terms listed below refers to a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain regardless of their physical location?

VLAN

Switch spoofing and double tagging are attack methods used in:

VLAN hopping attacks

IEEE 802.3ac

VLAN tag (frame size extension to 1522 bytes)

NTP enables:

Synchronization of clocks over a computer network

What hardware component was the first type of popular virtual machine seen in the PC world?

Virtual desktop

Which of the answers listed below refer(s) to reversed TX/RX? (Select 2 answers)

Wrong TIA/EIA cable standard type used Wrong pin/pair assignments on cable ends

Which type of backups are really just redundant servers?

real-time

Installing backup power in case of electrical failure is a form of __________.

redundancy

CIDR for 255.252.0.0

/14

CIDR for 255.254.0.0

/15

CIDR for 255.255.0.0

/16

CIDR for 255.255.128.0

/17

CIDR for 255.255.192.0

/18

CIDR for 255.255.224.0

/19

CIDR for 192.0.0.0

/2

CIDR for 255.255.240.0

/20

CIDR for 255.255.255.255

/32

CIDR for 240.0.0.0

/4

CIDR for 248.0.0.0

/5

CIDR for 252.0.0.0

/6

CIDR for 254.0.0.0

/7

CIDR for 255.0.0.0

/8

CIDR for 255.128.0.0

/9

Which ipconfig command switch would a technician use to display detailed information (such as DNS servers and MAC addresses)?

/all

Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)?

/all

Disaster recovery is a critical part of change management.

False

IEEE 802.3ab

1000Base-T (Gigabit Ethernet over twisted pair)

All IPv6 addresses have a record type of __________.

AAAA

Which term refers to another name for a session?

Connection

RADIUS is an Authentication, Authorization, and Accounting (AAA) standard.

True

Rootkits can strike firmware.

True

Which network device enables centralized management of WAPs?

Wireless LAN controller

Which of the answers listed below refers to a wireless protocol designed to provide communication between appliances in a home automation network?

Z-Wave

Which tool is the best choice for testing DNS?

ping

ANT is the most commonly used network technologies today.

False

What is the range of decimal values in each of the four groups of an IPv4 address?

0-255

What value will most routers insert into the routing table Destination LAN IP column if there is no gateway needed?

0.0.0.0

Which value of the ECN field is the default, indicating "not QoS aware"?

00

What is the binary equivalent of the decimal value 97?

01100001

Which of the following answers refer to IPv6 loopback addresses? (Select 2 answers)

0:0:0:0:0:0:0:1 ::1

Which layer of the OSI model is associated with moving data between computers?

1

Which of the choices listed below would allow for setting up three Wireless Access Points (WAPs) on non-overlapping channels?

1 6 11

RFID (Radio-frequency identification) devices generally communicate within __________.

1 meter

Which of the channels defined by the 802.11 standard may be used by a WAP using the 2.4-GHz band in the United States?

1 through 11

Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5 (Cat 5) cabling? (Select all that apply)

100 Mbps transfer rate over 2 pairs of cables (100BaseT networks) 1 Gbps transfer rate over all 4 pairs of cables (1000BaseT networks) 100-meter cable segment length Twisted-pair copper cabling RJ-45 connector

What is the maximum cable length on a segment of a 1000BaseT network?

100 meters

What is the typical cable segment length for a copper twisted-pair Ethernet cable?

100 meters

Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5e (Cat 5e) cabling? (Select all that apply)

100-meter cable segment length Twisted-pair copper cabling RJ-45 connector 1 Gbps transfer rate over 4 pairs of cables (1000BaseT networks)

IEEE 802.3z

1000Base-X (Gigabit Ethernet)

What is the binary equivalent of the decimal value 151?

10010111

IEEE 802.3u

100Base-T (Fast Ethernet and auto-negotiation)

In 100BaseT, what is the maximum number of nodes per hub/switch?

1024

What is the maximum number of nodes that could be attached to a 10BaseT segment or hub?

1024

IEEE 802.3a

10Base-2 (thin Ethernet)

IEEE 802.3j

10Base-F (fiber optic)

IEEE 802.3i

10Base-T (twisted pair)

Which is the least expensive and most popular 10 GbE media type?

10GBaseLR

What is the name of the IEEE standard for 10 GbE running on twisted pair cabling?

10GBaseT

Which value of the ECN field indicates "QoS aware, congestion encountered"?

11

How long is a MAC address?

12 hexadecimal characters

Network Time Protocol (NTP) runs on UDP port:

123

Which of the following answers refers to an IPv4 address range used for loopback addresses?

127.0.0.0 - 127.255.255.255 (127.0.0.0/8)

Which of the answers listed below refer to an IPv4 loopback address?

127.0.0.1

What is the leading octet value range for an IPv4 address belonging to a class B network?

128 - 191

An IPv6 address consists of:

128 bits

How many powerful DNS server clusters, scattered all over the world, does the DNS root contain?

13

Which wavelength is used by 1000BaseLX fiber-optic cabling?

1300nm

Which wavelength is used on 10GBaseLW fiber-optic cabling?

1310

How many channels were defined by the 802.11 standard?

14

Which of the TCP port numbers listed below is assigned to the Internet Message Access Protocol (IMAP)?

143

Which port is used to receive e-mail messages from e-mail servers (IMAP4)?

143

What is the maximum number of hops allowed by RIP?

15

What is the network address for a 154.24.67.147/22 host?

154.24.64.0

An OC-3 line supports transmission rates of up to:

155.52 Mbps

What is the range of transfer speed for ATM?

155.52 to 622.08 Mbps and beyond

What wavelength is used on a 10GBaseEy network?

1550

Compared to SFP, SFP+ offers enhanced data transfer rates of up to:

16 Gpbs

What wavelength is used on 10GBaseSW fiber-optic cabling?

850

Almost all multimode fiber cables transmit __________ wavelengths.

850nm

Jumbo frames are usually __________ bytes long—though technically, anything over 1500 counts—and they reduce the total number of frames moving through the network.

9000

Which of the answers listed below refers to the maximum data transfer rate of OC-192 connection?

9953.28 Mbps (9.95 Gbps)

Which type of link light is found on older NICs?

Collision

What is the primary use of coaxial cable in networking today?

Connecting a cable modem to an Internet Service Provider (ISP)

An application software used to selectively block access to certain websites is an example of:

Content filter

Which industrial control system (ICS) device knows enough to manage a process?

Controller

Which of the following answers refers to a bus topology network first developed for use in vehicles?

Controller Area Network (CAN)

Which of the answers listed below refer to the characteristic features of a modem? (Select 3 answers)

Converts digital data into analog signal Allows a computer to send and receive information over telephone lines Converts analog signal into digital data

Which of the following can be the source of RFI and cause disruptions in network connectivity?

Cordless phones Fluorescent lights Microwave ovens Bluetooth devices

Anycasting starts by giving a number of computers (or clusters of computers) unique IP addresses.

False

Bluetooth is designed to defend against aggressive, sophisticated attacks.

False

Circuit-switching networks move data divided into small blocks over a shared connection.

False

Connectionless sessions are designed to check for errors.

False

Domain information groper (dig) and nslookup are command-line tools used for DNS queries. Both utilities are available on Windows and Linux. Of the two, nslookup is the preferred tool on UNIX-like systems; dig is the default DNS query tool for MS Windows.

False

Dynamic Network Address Translation (DNAT) provides a permanent mapping between a private IP address and a public IP address on a one-to-one basis.

False

Encryption is a process that guarantees that the data received is the same as originally sent.

False

Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research based on symptoms may also involve asking for assistance of a more experienced tech.

False

High MTBF (mean time between failures) value indicates that a component or system provides low reliability and is more likely to fail.

False

In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup.

False

In a wired network, a charge on a wire represents a zero while no charge represents a one.

False

It is a good idea to give root access to critical log files for performance reasons.

False

It is difficult to add LTE to almost any device that does not have it built in.

False

Modern switches with auto-sensing ports require a crossover cable.

False

Most new cabling installations use category 3 (CAT 3) unshielded twisted pair (UTP) cable.

False

Multicast is a new idea introduced with IPv6.

False

Multicast traffic enables multiple unique signals.

False

Multimeters test frequency.

False

NAT is essentially the same process as routing.

False

NetFlow is another name for SNMP.

False

Patch panels allow you to connect only one kind of cabling; that is, they support only UTP, STP, or fiber, but not a mixture of different types.

False

Plenum cable provides less protection than riser-rated cable.

False

Point Coordination Function (PCF) is the currently implemented collision avoidance system.

False

Powerful hypervisors like ESXi and Hyper-V are administered directly at the box.

False

RFID tags often hold personally identifiable information (PII).

False

Routers forward broadcast messages to other networks.

False

Routers work with the source IP address of each packet.

False

Setting up an IPv6 tunnel is easy.

False

Social engineering attacks are considered an example of classic hacking.

False

Static Network Address Translation (SNAT) provides a mapping between a private IP address and any of the IP addresses belonging to the available public IP address pool.

False

TCP and UDP both offer encryption methods at Layer 4 of the OSI model.

False

The Ethernet community would like to position 1000BaseSX as the Ethernet backbone of the future.

False

The Ethernet networking technology standard was based on a ring topology.

False

The Internet Control Message Protocol (ICMP) works at Layer 3 to deliver connection-oriented

False

The Internet Protocol (IP) works at the Link layer.

False

The Link layer of the TCP/IP model combines features of the top three layers of the OSI model.

False

The Network Interface layer of the TCP/IP model maps to the Network layer of the OSI model.

False

The cornerstone of a firewall is its demilitarized zone (DMZ).

False

The most common type of cabling used in networks today consists of fiber-optic cables.

False

The notion of an industrial control system (ICS) is a new concept stemming from the development of digital monitors and controls.

False

The ping utility uses Simple Network Management Protocol (SNMP) packets to query by IP address or by name.

False

The term "DHCP snooping" refers to an exploit that enables operation of a rogue DHCP network server.

False

When a computer gives itself an Automatic Private IP Address (APIPA), it also includes a valid default gateway address.

False

When a frame arrives at the switch, the switch makes an exact copy of the frame and sends it to every other system on the network.

False

When crimping an RJ-45 onto a UTP cable, be sure to slide each boot onto the patch cable after you crimp both ends.

False

When following standard safety practices while installing equipment, use a band saw to miter joints.

False

With an omnidirectional antenna, the radio wave flows outward from the wireless access point (WAP) in one direction.

False

You can have more than two CSU/DSUs on a single T1 line.

False

Which term refers to the 100-Mbps standards, even though there are now newer versions of Ethernet available?

Fast Ethernet

What general type of cabling is a technician most likely to use today when installing Ethernet cabling in areas with high electrical interference?

Fiber

What kind of cabling did the 10BaseFL standard specify?

Fiber

Which type of cable uses a two-number designator consisting of core and cladding measurements?

Fiber

Which type of cable works best for long-distance transmissions?

Fiber

Which of the answers listed below refers to a technology designed to provide connectivity between servers and data storage devices over fiber-optic or copper cable links?

Fiber channel

IEEE 802.8

Fiber optic connection

Which type of cabling provides the best protection against EMI/RFI?

Fiber-optic cabling

Which technology refers to an infrastructure that can be utilized to support a SAN?

Fibre Channel over Ethernet (FCoE)

What is the function of FTP?

File exchange

What is the function of a Time-Domain Reflectometer (TDR)?

Finding breaks in copper network cables

Which of the following answers refers to a software or hardware that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through?

Firewall

Which of the answers listed below refers to a type of software embedded into a hardware chip?

Firmware

What is the name of a security mechanism that protects a network switch against populating its MAC table with invalid source addresses?

Flood guard

IEEE 802.9

For services like voice and data

Which technology acts on behalf of clients, getting information from various sources and handing that info to the clients?

Forward Proxy Server

IEEE 802.3as

Frame expansion

What characteristic does spread-spectrum transmission change for each user?

Frequency

IEEE 802.3x

Full duplex

A network topology in which each node has a direct physical connection to every other node is known as:

Full mesh

Which of the following would require troubleshooting if a network connectivity problem originates from mismatched transceiver types? (Select 2 answers)

GBIC (Gigabit Interface Converter) SFP (Small Form-Factor Pluggable)

What does the letter "G' stand for in the 2G, 3G and 4G technologies?

Generation

The snmpwalk utility tells the SNMP manager to perform a series of __________ commands.

Get

Which core function is sent when an SNMP manager wants to query an agent?

Get

Which term is another name for a virtual machine?

Guest environment

TCP port 1720 is used by:

H.323

Which of the answers listed below refers to a protocol used for managing VoIP and VTC services?

H.323

Which CISCO protocol will help prevent downtime due to failures on the default gateway?

HSRP (Hot Standby Router Protocol)

Which protocol is the underlying protocol used by the World Wide Web?

HTTP

Which of the following protocols reside at the application layer of the OSI model? (Select 3 answers)

HTTP FTP SMTP

What is the name of a network protocol that secures web traffic via SSL/TLS encryption?

HTTPS

Which protocol is the secure counterpart of HTTP?

HTTPS

Which standards organization is named for the Greek word for "equal"?

ISO

An incident is an event in which the integrity of a(n) __________ is compromised.

IT infrastructure

Vulnerability scanning: (Select 3 answers)

Identifies lack of security controls Identifies common misconfigurations Passively tests security controls

Which of the following actions should be the first step in the troubleshooting process?

Identifying the problem

What statement describes the advantage of fault tolerance?

If one cable break, all of the other computers can still communicate.

Once a plan of action to resolve a problem has been established, the next step in the troubleshooting methodology process is to:

Implement the solution

Which of the following typically applies to a request that doesn't match the criteria defined in an ACL?

Implicit deny rule

Which of the following answers refers to a network authentication protocol that provides the single sign-on functionality?

Kerberos

Which hypervisor is closely integrated with Linux's kernel?

Kernel-based Virtual Machine (KVM)

A network connecting computers within a small geographical area such as a building or group of buildings is known as:

LAN

IEEE 802.1

LAN/MAN bridging, remote MAC bridging

What is the most common connector used in a 1000BaseSX network?

LC

Which of the answers listed below refer(s) to example(s) of fiber-optic connectors (Select all that apply)

LC ST SC MT-RJ

Physical layer of the OSI model is also known as:

Layer 1

1000BaseSX

Multimode fiber 850 nm LC 220-500m

10GBaseSR/SW

Multimode fiber 850 nm No connectors defined Length of 26-300 m

What type of fiber-optic cabling and connectors does a 100BaseFX network use?

Multimode with ST or SC connectors

The characteristic features of the IEEE 802.11n wireless standard include:

Multiple Input / Multiple Output (MIMO) 2.4 GHz frequency band 5.0 GHz frequency band Maximum data signaling rate of up to 600 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

A type of computer security solution that allows to define and enforce network access policies is referred to as:

NAC

Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address?

NAT

Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?

NAT

A legal contract between the holder of confidential information and another person to whom that information is disclosed prohibiting that other person from disclosing the confidential information to any other party is known as:

NDA

Which of the IPv6 protocols listed below is used by networked nodes for locating routers?

NDP

A network administrator has configured two Ethernet adapters in a database server to operate as a single connection. Which of these would best describe this configuration?

NIC teaming

The process of combining multiple physical network adapters into a single logical interface for increased throughput and redundancy is known as:

NIC teaming

Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network?

NTP

Which type of technology enables contactless payment transactions?

Near-field communication (NFC)

An IPv6 protocol performing the function of IPv4's Address Resolution Protocol (ARP) is called:

Neighbor Discovery Protocol (NDP)

An IPv6 protocol used by routers to advertise their presence on a network is known as:

Neighbor Discovery Protocol (NDP)

Which IPv6 protocol is used by networked hosts to determine the link layer address of adjacent nodes?

Neighbor Discovery Protocol (NDP)

Which protocol makes the IPv6 automation magic work?

Neighbor Discovery Protocol (NDP)

At which layer of the OSI model do routers work?

Network

Routers function at which layer of the OSI model?

Network

Which layer of the OSI model assembles the data it receives into pieces called packets?

Network

Which layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system?

Network

__________ is a type of dedicated file server used in many networks.

Network Attached Storage (NAS)

Which tool is used by an administrator to manage many routers and provide an overall view of all the network?

Network Management System (NMS)

Which term describes a practical application of a topology and other critical technologies that provides a method to get data from one computer to another on a network?

Network Technology

Which protocol ensures the reliability of the Kerberos authentication process?

Network Time Protocol (NTP)

Which of the answers listed below refer(s) to PPP? (Select all that apply)

Network protocol used for connecting devices on a WAN Enables encapsulation of IP traffic Used for establishing a direct connection between two networked devices

A dedicated storage appliance that can be added to a local network is known as:

Network-attached storage (NAS)

A type of advanced firewall capable of more in-depth inspection of network traffic that enables detection of application-specific attacks is referred to as: (Select 2 answers)

Next-generation firewall (NGFW) Layer 7 firewall

Which of the following command-line tools is used for discovering hosts and services on a network?

Nmap

A network topology in which each node connects to a central switching device is called:

Star topology

Which of the following network topologies is most commonly used in contemporary Ethernet LANs?

Star topology

A DHCPv6 server is operating very similarly to an IPv4 DHCP server by passing out complete IPv6 information: addresses and default gateways, as well as items like DNS server addresses. In which mode is this server?

Stateful

Which type of firewall packet inspection is aware of the packet's state, as it relates to other packets?

Stateful

Which document defines the services and products the vendor agrees to supply and the time frames in which to supply them?

Statement of Work (SOW)

Which of the answers listed below refers to a permanent assignment of an IP address?

Static IP address

A manually-configured routing table entry is known as:

Static route

Which of the following allows to determine which network segment an IP address belongs to?

Subnet mask

What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers)

Suitable for large corporate networks Requires RADIUS authentication server

Which device improves network performance by dividing a given network segment into separate collision domains?

Switch

Which of the answers listed below refers to a data link layer (layer 2) device designed to forward frames between network segments?

Switch

Which of the answers listed below refer to the characteristics of multimode fiber optics? (Select 3 answers)

Transmission distances of up to 2 km Less expensive than single-mode fiber optics Uses LED as the source of light

Layer 4 of the OSI model is also referred to as:

Transport layer

Which of the following answers refers to a modular network device designed to provide a seamless link between different types of network interfaces (e.g. copper and fiber, or vice versa)?

Transreciver

An agent can solicit information from an NMS with the __________ protocol data unit (PDU).

Trap

A DHCP server's IP exclusion configuration option allows network administrators to remove a single IP address or a range of IP addresses from the pool of addresses being assigned automatically to the requesting DHCP client computers. IP exclusion prevents other DHCP clients from requesting an IP address statically assigned to other essential network hosts (e.g. servers, or a wireless printers) via DHCP reservation.

True

A VPN is a classic example of a situation in which Proxy ARP is used.

True

A cloud delivery model consisting of two or more interlinked cloud infrastructures (private, community, or public) is referred to as a hybrid cloud.

True

A distributed control system (DCS) makes sense for a process that requires a continuous flow.

True

A double colon in an IPv6 address indicates that part of the address containing only zeros has been compressed to make the address shorter.

True

A host-based firewall is software installed on a "host" that provides firewall services for just that machine.

True

A hybrid routing protocol combines the features of distance-vector and link-state routing protocols.

True

A network device that apart from the function of an ordinary network switch can also provide additional functions at higher levels of the OSI reference model is known as a multilayer switch.

True

The power of DNS comes from its incredible flexibility.

True

The process of securing networking devices should include the practice of disabling unused physical ports.

True

The shape and angle of the tip of a fiber-optic connector can have an impact on the performance of a fiber-optic communication link. The two basic types of fiber end are Ultra Physical Contact (UPC) and Angled Physical Contact (APC). In the UPC-type connector, the connector end is polished with no angle, while APC connectors feature a fiber end polished at an 8-degree angle. Besides additional labeling (UPC or APC) that helps in identifying further details about a given connector type, fiber-optic connectors can also have different colors. The rule of thumb is that a UPC-type connector typically would be blue while APC connector would have a green color.

True

The technology advancements used in mobile devices enable almost any type of device to connect to the Internet.

True

The term "Default route" refers to a "last resort" network path used by a router for forwarding all packets with destination addresses not listed in its routing table.

True

The term "Dual-stack IP" refers to a solution that relies on implementing both IPv4 and IPv6 protocol stacks on various network devices to facilitate seamless migration from IPv4 to IPv6.

True

The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate access point to connecting hosts.

True

The term "Intrusion Detection System" (IDS) refers to a device or software application designed to detect malicious activities and violations of security policies on a network or computer host. An IDS designed to monitor networks is known as Network Intrusion Detection System (NIDS). A type of IDS installed on a host monitoring only that host is called Host Intrusion Detection System (HIDS). IDSs do not take any active steps to prevent or stop the intrusion relying only on passive response which may include sending an alert to a management console or saving information about the event in logs.

True

The term "Metropolitan Ethernet" refers to an Ethernet-based Metropolitan Area Network (MAN).

True

The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection.

True

You can use a brute force attack to search for open ports.

True

Zigbee is a completely open standard.

True

A type of port assigned to carry traffic from all the VLANs connected to a specific network switch is known as:

Trunk port

What is the only way to ensure Bluetooth security in a high-security environment?

Turn it off

Which of the answers listed below refer(s) to UTP cabling? (Select all that apply)

Twisted-pair copper cabling Used in Ethernet networks and telephone systems Low cost and ease of installation Not surrounded by any shielding that would provide protection against interference from outside sources In Ethernet networks, installed with RJ-45 connector type

Which type of hypervisor relies on an underlying operating system?

Type-2

Which Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?

UDP

Which of the protocols listed below reside at the OSI transport layer? (Select 2 answers)

UDP TCP

Port 525

UDP Timed, Timesaver

Port 561

UDP monitor

Port 550

UDP new-rwho, new-who

Port 560

UDP rmonitor, Remote Monitor

Which cable type suffers most from electromagnetic interference (EMI)?

UTP

Which type of cabling does the 10BaseT standard specify?

UTP

Which of the cabling types listed below is the most susceptible to EMI/RFI?

UTP cabling

A type of network traffic intended for a single host identified by a unique IP address is referred to as:

Unicast

Which method of sending a packet allows one computer to send a message directly to another user?

Unicast

Which device provides the benefit of acting like an inverter?

Uninterruptible Power Supply (UPS)

CAT5e

Up to 1 Gbps Ethernet, FastEthernet, Gigabit Ethernet

CAT1

Up to 1 Mbps Old telephone cable

CAT7

Up to 10 Gbps Gigabit Ethernet, 10G Ethernet (100 meters)

CAT6

Up to 10 Gbps Gigabit Ethernet, 10G Ethernet (55 meters)

CAT6a

Up to 10 Gbps Gigabit Ethernet, 10G Ethernet (55 meters)

CAT3

Up to 10 Mbps Token ring and 10BASE-T Ethernet

CAT5

Up to 100 Mbps Ethernet, FastEthernet, Token ring

CAT4

Up to 16 Mbps Token Ring Networks

CAT2

Up to 4Mbps Token ring networks

What is the name of an AES-based encryption mode implemented in WPA2?

Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP)

Which term does PerfMon use when referring to the monitored aspect of the system?

Counters

Which of the tools listed below would be used for attaching RJ-45 connectors to a twisted-pair Ethernet cable?

Crimper

What type of Ethernet cable would be used for establishing a direct communication link between two PCs?

Crossover cable

A modem running at 56 Kbps is actually running at 56 kilobaud.

False

A network's physical topology describes how signals travel electronically.

False

A reverse DNS lookup zone is used for finding an IP address associated with a given domain name.

False

A system's IPv6 link-local address is a multicast address.

False

A popular, short-range wireless technology used for connecting various personal devices in a WPAN is called:

Bluetooth

Which protocol is a path vector routing protocol?

Border Gateway Protocol (BGP)

A solution that allows to control access to a shared transmission medium in 802.11 networks is known as:

CSMA/CD

Which term describes a portion of the available spectrum available for Wi-Fi network communication?

Channel

Which netstat parameter allows to display all active TCP connections and the TCP/UDP ports on which the computer is listening?

-a

Which netstat parameter allows to display the names of applications and executable file components that are accessing the network?

-b

Which switch is used with the Windows netstat utility to show name of a running program?

-b

Which switch is used with the Windows netstat utility to show the process ID?

-o

Which of the netstat utility parameters listed below allows to display the contents of an IP routing table?

-r

Which term is an original top-level domain name?

.mil

CIDR for 0.0.0.0

/0

CIDR for 128.0.0.0

/1

CIDR for 255.192.0.0

/10

CIDR for 255.224.0.0

/11

CIDR for 255.240.0.0

/12

CIDR for 255.248.0.0

/13

CIDR for 255.255.248.0

/21

CIDR for 255.255.252.0

/22

CIDR for 255.255.254.0

/23

CIDR for 255.255.255.0

/24

CIDR for 255.255.255.128

/25

CIDR for 255.255.255.192

/26

CIDR for 255.255.255.224

/27

Which of the following answers lists the CIDR notation of the 255.255.255.224 subnet mask?

/27

CIDR for 255.255.255.240

/28

CIDR for 255.255.255.248

/29

CIDR for 224.0.0.0

/3

CIDR for 255.255.255.252

/30

CIDR for 255.255.255.254

/31

Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters?

/all

Which of the following could be a valid Autonomous System Number (ASN)?

1.33457

T1 lines support data transfer rates of up to:

1.544 Mbps

What is the size of a U, the equipment rack unit of measure, used for specifying height?

1.75in

Which of the answers listed below refer to the 10GBaseT Ethernet standard? (Select 3 answers)

10 Gbps transfer rate over a maximum cable segment length of 55 meters (Cat 6 cable) 10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6A and Cat 7 cable) Twisted-pair copper cabling

IEEE 802.3c

10 Mb/s repeater specifications (clause 9)

When a multispeed, auto-sensing 100BaseT NIC connects to a 10BaseT Ethernet hub, at what speed will the NIC function?

10 Mbps sending and receiving

IEEE 802.3ae

10-Gigabit Ethernet

What is the first valid host address that can be assigned to a node residing in the 10.119.136.143/20 network?

10.119.128.1

Which of the answers listed below refers to the maximum data transfer rate of E1 connection?

2.048 Mbps

802.11

2.4 GHz DSSS 2 Mbps ~300' Compatible with 802.11

802.11g

2.4 GHz OFDM 54 Mbps ~300' Compatible with 802.11b

802.11n

2.4 GHz OFDM (QAM) 100+ Mbps ~300' Compatible with 802.11b/g

Which of the following answers refer to the IEEE 802.11b wireless standard? (Select 3 answers)

2.4 GHz frequency range Maximum data signaling rate of 11 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers)

20 MHz 40 MHz

What is the decimal equivalent of the binary value 11010101?

213

Which of the answers listed below refers to a channel bandwidth used in 802.11b networks?

22 MHz

Which of the following answers refer to the IPv4 multicast address block? (Select 2 answers)

224 - 239 Class D range

Which of the TCP ports listed below is used by Telnet?

23

How many channels are in a DS1 frame?

24

Which TCP/IP ports does MGCP (Media Gateway Control Protocol) use?

2427 and 2727

Which of the following answers lists the default (classful) subnet mask for a class A network?

255.0.0.0

Which of the following answers lists the default (classful) subnet mask for a class B network?

255.255.0.0

Which of the answers listed below refers to the default (classful) subnet mask for a class C network?

255.255.255.0

Which formula would you use to arrive at the number of hosts on a subnet?

2x - 2, where x represents the number of zeroes in the subnet mask

Which formula would you use to calculate the number of new subnets?

2y, where y is the number of bits you add to the subnet mask

What was the original maximum data transfer rate of the first Ethernet developed by Xerox?

3 Mbps

Which pins on an RJ-45 connector are used to receive data?

3 and 6

How many binary digits are in an IPv4 address?

32

An IPv4 address consists of:

32 bits

What is the approximate total bandwidth of an E3 line?

34 Mbps

Which of the following answers refers to the maximum data transfer rate of E3 connection?

34.368 Mbps

One of the last GSM technologies, Enhanced Data rates for GSM Evolution (EDGE), offered data speeds up to __________.

384 Kbps

What is the norm today for the number of pairs in UTP cabling?

4

QSFP offers data transfer rates of up to:

4 Gbps

T3 lines support data transfer rates of up to:

44.736 Mbps

Which of the following answers lists the number of connections in a full mesh network consisting of 10 nodes?

45

The nodes that connect in an IBSS randomly generate a __________ string of numbers that looks and functions just like a MAC address.

48-bit

Without the preamble, how many basic pieces of information does an Ethernet frame contain?

5

802.11a

5 GHz OFDM 54 Mbps ~150' No backward compatibility

802.11ac

5 GHz OFDM (QAM) Up to 1 Gbps ~300' Compatible with 802.11a

Frequency bands used by 802.11 networks include:

5.0 GHz 2.4 GHz

Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard?

5.0 GHz frequency band Maximum data signaling rate of up to 6.77 Gbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method Multi-User Multiple Input / Multiple Output (MU-MIMO)

Which TCP/IP ports does the Real-time Transport Protocol (RTP) use for VoIP systems?

5004 and 5005

Which of the following UDP ports is assigned to the Domain Name System (DNS)?

53

What is the minimum category rating of UTP cabling you would need for a network that runs at 1000 Mbps?

5e

Which category rating uses a bandwidth of 250 MHz to accommodate 10000 Mbps?

6

When using the newer Rapid Spanning Tree Protocol (RSTP), how long does it take a network to return to convergence?

6 seconds

A limited IPv4-to-IPv6 transition mechanism that allows for encapsulation of IPv6 packets in IPv4 packets transmitted over IPv4 networks is referred to as:

6 to 4

A network administrator wants to secure the existing access to a directory service with SSL/TLS encryption. Which of the following TCP ports needs to be opened to implement this change?

636

What is the minimum size of an Ethernet frame?

64B

What temperature is considered to be ideal for a server room?

68 degrees farenheit

Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one is one of the most popular IPv6 tunneling standards?

6in4

Which now deprecated tunneling protocol enabled IPv6 traffic over the IPv4 Internet?

6to4

LTE networks feature speeds of __________ upload.

75 Mbps

An SNMP system has up to __________ core functions (depending on the version of SNMP).

8

How many pins does an RJ-45 connector have?

8

Which port do HTTP Web servers use?

80

In reality, Wi-Fi is really __________.

802.11

Which IEEE subcommittee sets the standards for Wireless LAN networks

802.11

The IEEE 802.11g standard is backwards compatible with:

802.11b

The IEEE 802.11n standard offers backward compatibility with which of the following standards? (Select all that apply)

802.11g 802.11b 802.11a

Which of the acronyms listed below refers to a policy of permitting employees to bring personal mobile devices and to use those devices for accessing privileged company information and applications?

BYOD

What causes the most common problems with HTTPS connection?

Bad certificates

Which routing metric refers to the ability of a connection to handle more data than others?

Bandwidth

Which term is synonymous with traffic shaping?

Bandwidth Shaping

A type of historical network data kept as a reference for resolving future performance issues is referred to as:

Baseline

Which term defines the most basic infrastructure mode network - a BSS of one WAP and one or more wireless nodes?

Basic Service Set Identifier (BSSID)

Which of the following answers refers to a fiber transceiver equipped with the capability to transmit and receive signals over a single fiber strand?

Bidirectional

Which of the following terms does not fall into the category of detective physical security controls?

Biometrics

Which of the following reside at the physical layer of the OSI model?

Bit Network cabling

Which term is another name for a switching loop?

Bridging loop

IEEE 802.7

Broadband LAN cabling

A networked host with unknown address can be reached via:

Broadcast

Which method of sending a packet allows every computer on the LAN to hear the message?

Broadcast

An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is referred to as:

Brute-force attack

In which type of network topology, the main network cable becomes a single point of failure?

Bus

Which first generation network topology used a single cable that connected all the computers in a line?

Bus

Penetration testing: (Select all that apply)

Bypasses security controls Actively tests security controls Exploits vulnerabilities

Which of the following answers refers to a security policy enforcement software tool or service placed between cloud service users and cloud applications?

CASB (Cloud Access Security Brokers)

Which of the following answers refers to a channel access method used in 3G cellular networks?

CDMA

The use of cable modems within a standard cable television infrastructure for Internet access is commonly referred to as:

Cable broadband

Which tool helps a technician make unshielded twisted pair (UTP) cables?

Cable stripper

A type of tool used for verifying correct electrical connections of wires in a cable is known as:

Cable tester

Which tool can be used to notify a technician of a continuity problem or if a wire map is not correct?

Cable tester

Which tool would be used for detecting incorrect cabling pin-out assignments?

Cable tester

Which fire cable rating has no significant fire protection?

Cable with a polyvinyl chloride (PVC) rating

Which of the DNS database records listed below allows multiple domain names to resolve to the same IP address?

Canonical Name record (CNAME)

Which of the following answers refers to a solution allowing administrators to block network access for users until they perform required action?

Captive portal

Which of the following allows for verifying the absence of traffic on a shared transmission medium in 802.3 networks?

Carrier Sense Multiple Access/Collision Detect (CSMA/CD)

Which of the following answers refers to the minimum requirement for twisted-pair copper cabling in modern Ethernet networks?

Cat 5e

10GBaseT

Cat 6/6a UTP Four-pair/full-duplex RJ-45 Length of 55/100 km

1000BaseT

Cat5e/6 UTP Four-pair/full-duplex RJ-45 100 m

What are the three dominant mobile network technologies?

Cellular WANs, 802.11, and Bluetooth

Which term refers to a standardized type of file that includes a public key with a digital signature, and the digital signature of a trusted third party?

Certificate

Which tool tests a cable to ensure that it can handle its rated amount of capacity?

Certifier

A network device hardening process should include:

Changing default credentials / Avoiding common passwords Firmware upgrades / Patching and updates File hashing Disabling unnecessary services and unused ports (physical and virtual) Implementation of secure protocols Cryptographic key renewal

Which hypervisor serves as the foundation for massive cloud offerings by Amazon, IBM, and RackSpace?

Citrix XenServer

In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to the:

Class A address space

Which of the following answers refer to the characteristic features of the 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) IPv4 address space? (Select 2 answers)

Class A range Non-routable (private) IP address range

Which of the answers listed below refer to the 172.16.0.0 - 172.31.255.255 (172.16.0.0/12) IPv4 address space? (Select 2 answers)

Class B range Non-routable (private) IP address range

In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to the:

Class C address space

Which optional field in an Ethernet frame header can be used to enable the Quality of Service (QoS) functionality?

Class of Service (CoS)

Which of the answers listed below refers to a solution that replaces the classful network design?

Classless Inter-Domain Routing (CIDR)

Which type of cable is described as a central conductor wire that is surrounded by insulating materials and placed inside a braided metal shield?

Coax

Which of the following answers refer to the RG-6 cabling specification? (Select 3 answers)

Coaxial cabling Suitable for long-distance cable runs Used for cable television, satellite television and cable modems

What are the characteristics of the RG-59 cabling specification? (Select 3 answers)

Coaxial cabling Suitable for short-distance cable runs Used for analog video and CCTV installations

A disaster recovery facility that provides only the physical space for recovery operations is called:

Cold site

Within a Windows OS, which tool can you use to verify that Windows recognizes a NIC and is ready to use it?

Device Manager

Which of the following Internet access types takes advantage of the traditional analog telephone lines?

Dial-up

Which of the following antenna types provide a 360-degree horizontal signal coverage? (Select 2 answers)

Dipole antenna Omnidirectional antenna

LDAP (Lightweight Directory Access Protocol) is an example of:

Directory access protocol

Which of the answers listed below refers to a type of routing protocol that determines the best route for data packets based on the lowest number of hops?

Distance-vector

Which type of switch simplifies virtual network configuration by enabling an option to configure switching for the entire network from a single interface?

Distributed switch

An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn't have time or resources to handle legitimate requests is known as:

DoS attack

A type of wiring closet that interconnects WAN links coming into the building with the internal network is known as Intermediate Distribution Frame (IDF).

False

POP3 is used for:

Email retrieval

Which of the answers listed below refer(s) to MPLS (Multiprotocol Label Switching)? (Select all that apply)

Enables delivery of various data packet types over the same network link Packet-switching method Used for connecting devices on a WAN Designed to simplify and improve the performance of routing process

Which term means to scramble, mix up, or change data in such a way that bad guys cannot read it; however, the person receiving the data can descramble it.

Encryption

What are the characteristics of TACACS+? (Select 3 answers)

Encrypts the entire payload of the access-request packet Primarily used for device administration Separates authentication and authorization

A Web client's source port number, generated pseudo-randomly by the Web client computer, is classically assigned as a(n) __________.

Ephemeral

CRC allows for collecting metrics that provide information on

Error rates

IEEE 802.3

Ethernet standards for CSMA/CD

What type of unit is formed by a single wireless access point servicing a given area that has been extended by adding more access points?

Extended Service Set (ESS)

A zombie is an operator of a botnet.

False

Which of the following EAP methods offers the highest level of security?

Extensible Authentication Protocol - Transport Layer Security (EAP-TLS)

Which of the EAP methods listed below relies on client-side and server-side certificates for authentication?

Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)

A type of coaxial connector commonly used for cable television and cable modems is called:

F-type

Examples of technologies used for SAN connectivity include:

FCoE InfiniBand iSCSI Fiber channel

Which of the answers listed below refers to an IPv6 link-local address?

FE80::/10

Which of the following answers lists a valid address of FE80:00A7:0000:0000:02AA:0000:4C00:FE9A after compression?

FE80:A7::2AA:0:4C00:FE9A

What is the universal MAC address for broadcast?

FF-FF-FF-FF-FF-FF

Which multicast reserved address is designed to reach solicited-node addresses?

FF02::1:FFXX:XXXX

IEEE 802.3d

FOIRL (fiber link)

Which of the following remote file-access protocols do not offer encryption? (Select 2 answers)

FTP TFTP

Which term refers to doors that default to open in case of emergency?

Fail open

A 2U rack-mounted server measures 7 inches.

False

A NIC reads the data portion of a frame to determine the address of the receiving system.

False

A cold site is the most expensive type of backup site for an organization to operate.

False

A dedicated communication channel used exclusively between two connected hosts is a characteristic feature of packet-switching networks.

False

A dedicated connection uses a dial-up connection to another private network or the Internet.

False

A dedicated telephone line has a phone number.

False

A forward DNS lookup zone returns a domain name for a given IP address.

False

A logical network diagram is a document that describes the detailed layout of the building and the way devices are connected to the network through the actual cabling that transmits data.

False

A managed switch needs a MAC address to enable configuration on Layer 3.

False

A manufacturer selling boxed reels of unshielded twisted pair (UTP) cabling will clearly mark the cable's category rating on the connectors at the end of the cable.

False

Which protocol is the preferred alternative to POP3 and runs on TCP port 143?

IMAP4

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?

IP

Which of the following answers refers to a method for managing a network's IP address space?

IP address management (IPAM)

Which of the answers listed below refers to a means for executing reflective DOS attack?

IP spoofing

Which of the answers listed below refer to methods for creating secure connections between clients and cloud service providers? (Select 3 answers)

IPsec SSL/TLS encryption VPN

Which of the following answers refers to a cable rack that interconnects wiring between an MDF and workstation devices?

Intermediate Distribution Frame (IDF)

Which protocol is a link state dynamic routing protocol?

Intermediate System - Intermediate System (IS-IS)

Before plugging in RJ 45 cables, what should you determine to save a lot of time and effort once the system installation starts?

Internal IP addressing scheme

Which of the following solutions enables simultaneous digital transmission of voice, video, data, and other network services over a PSTN?

Internet Services Digital Network (ISDN)

Which of the following answers refers to a lower-cost alternative to Fibre Channel technology?

Internet Small Computer System Interface (iSCSI)

What is an advantage of fiber-optic cabling over Unshielded Twisted Pair (UTP)?

It has a longer maximum distance

Which statement best describes the importance of virtualization?

It increases flexibility as the scale of an operation increases.

Which statement describes an IP address?

It is a unique dotted decimal number assigned to every network device

Assigning a unique encrypted key, called a ticket, to each user that logs on to the network is a characteristic feature of:

Kerberos

A type of diagnostic tool that allows to measure signal strength in fiber-optic cabling is called:

Light meter

TCP port 389 is the default network port for:

Lightweight Directory Access Protocol (LDAP)

Which of the following answers refers to an SSL/TLS-based directory access protocol?

Lightweight Directory Access Protocol (LDAPS)

Which of the following solutions enables combining several physical ports of a switching device into a single logical channel?

Link Aggregation Control Protocol (LACP)

A type of routing protocol that calculates the best path between source and destination nodes based on a map of network connectivity between nodes is called:

Link-state

Which of the answers listed below refer to iptables? (Select 2 answers)

Linux-command line tool Packet filtering utility

Which term refers to making a bunch of servers look like a single server, thereby creating a server cluster?

Load Balancing

A network device designed for managing the optimal distribution of workloads across multiple computing resources is referred to as:

Load balancer

Which of the actions listed below can be taken by an IDS? (Select 2 answers)

Logging Sending an alert

Malicious code activated by a specific event is known as:

Logic bomb

IEEE 802.2

Logical Link control standards for connectivity

While troubleshooting problems with a Network Interface Card (NIC), connector pins on the NIC's port can be tested with the use of:

Loopback plug

Which of the following are hashing algorithms? (Select 2 answers)

MD5 SHA

A type of attack that relies on intercepting and altering data sent between two networked hosts is known as:

MITM attack

Manufacturers have accommodated the need for switches to connect to a variety of 10 GbE connector types by devising which solution?

MSAs

Which of the following answers refers to a connector type not used with copper cabling?

MT-RJ

What are the characteristic traits of a network switch? (Select all that apply)

Makes forwarding decisions in hardware (ASIC) Typically capable of connecting more network segments than bridge (more physical ports) Sometimes referred to as multiport bridge Newer and more effective type of network device in comparison to network bridge

Which of the following answers describe the features of a network bridge? (Select 3 answers)

Makes forwarding decisions in software Typically capable of connecting fewer network segments than switch (fewer physical ports) Older and less effective type of network device in comparison to network switch

An SNMP-compliant device includes a virtual database containing information about configuration and state of the device that can be queried by an SNMP management station. This type of data repository is referred to as:

Management Information Base (MIB)

A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called:

Material Safety Data Sheet (MSDS)

Which guideline applies to racks and network components?

Material safeties data sheet (MSDS)

What is the meaning of the "10" in 10BaseT?

Max speed of 10Mbps

Which of the following metrics is used to describe the largest allowable data unit that can be transmitted across a network?

Maximum Transmission Unit (MTU)

Which of the following answers refer to the 1000BaseSX Ethernet standard? (Select 2 answers)

Maximum cable segment length between 220 and 500 meters Multimode fiber-optic cabling

What are the characteristic features of the 1000BaseT Ethernet standard?

Maximum cable segment length of 100 meters Twisted-pair copper cabling (Cat 5 or higher) Uses all four pairs of wires in a cable for data transmission

Which of the answers listed below refer to the 1000BaseLX Ethernet standard? (Select 3 answers)

Maximum cable segment length of up to 5 km over single-mode fiber Fiber-optic cabling Maximum cable segment length of up to 500 m over multimode mode fiber

Which of the answers listed below refer to the characteristic features of the IEEE 802.11a wireless standard? (Select 3 answers)

Maximum data signaling rate of 54 Mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

What are the characteristics of the IEEE 802.11g wireless standard? (Select 3 answers)

Maximum data signaling rate of 54 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency range

Which of the following terms is used to describe an average time required to repair a failed component or device?

Mean time to repair (MTTR)

A network link consisting of two dissimilar transmission medium types requires an intermediary device known as:

Media converter

What are the characteristic features of the 192.168.0.0 - 192.168.255.255 (192.0.0.0/24) IPv4 address space? (Select 2 answers)

Non-routable (private) IP address range Class C range

A dedicated software tool used for monitoring and examining contents of a network traffic is called: (Select 2 answers)

Packet sniffer Protocol analyzer

IEEE 802.3ad

Parallel links (link aggregation)

What are the characteristic traits of GBIC (Gigabit interface converter)? (Select all that apply)

Modular (hot swappable) interface Converts optical signals to electrical signals Converts electrical signals to optical signals Data transfer of 1 Gbps

What are the characteristic traits of single-mode fiber optics? (Select 3 answers)

More expensive than multimode fiber optics Transmission distances of up to 100 km Uses laser as the source of light

Which of the following answers refers to the new feature introduced with the IEEE 802.11ac standard?

Multi-User MIMO (MU-MIMO)

A type of network traffic intended for a particular group of hosts is called:

Multicast

Which method of sending a packet allows a single computer to send a packet to a group of interested computers?

Multicast

Which of the tools listed below would be used for testing power supply voltage output?

Multimeter

What is the only important measure of coax cabling?

Ohm Rating

Which term refers to a relative measure of the resistance (or more precisely, characteristic impedance) on a cable?

Ohm Rating

What network component is built into most motherboards today?

Onboard NIC

A system administrator has configured an incremental tape backup system that begins each week on Sunday morning. On Sunday night, an imaging server failed and needs to be immediately recovered. How many tape sets would be required to fully restore this server?

One

Which type of UPS provides the best power outage protection? (Select 2 answers)

Online Double-conversion

What is the fastest way for validating a digital certificate?

Online Certificate Status Protocol (OCSP)

Which of the following answers refers to a link-state routing protocol?

Open Shortest Path First (OSPF)

Which tool can be used to notify a technician where a cable break is occurring on a fiber cable?

Optical Time Domain Reflectometer (OTDR)

When a collision occurs on a network relying on the CSMA/CD access method, what alerts the network interface cards (NICs)?

Overlapping signals

A type of limited-range computer network used for data transmission among various types of personal devices is generally referred to as:

PAN

Which form of NAT typically handles the one-to-many connections?

PAT

Which of the following answers refers to a Network Address Translation (NAT) method that binds a combination of private IP address and port number with a corresponding public IP address and port information?

PAT (Port Address Translation)

Which tools are tunneling protocols?

PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol)

Which of the following statements describing the function of a DNS PTR record are true? (Select 2 answers)

PTR record resolves an IP address to a hostname for reverse lookups. The functionality provided by a PTR record is the opposite of A and AAAA DNS records.

Which tool intercepts and logs network packets?

Packet sniffer

What are the characteristic features of TFTP? (Select 2 answers)

Provides no security features A very basic form of file sharing protocol

What is the function of a DNS TXT record? (Select 2 answers)

Provides outside services with additional information about a domain Not used to direct any traffic

Telnet: (Select 3 answers)

Provides username & password authentication Transmits data in an unencrypted form Enables remote login and command execution

In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as:

Proxy

Which tool can be used to access a Cisco router remotely from a Windows system?

PuTTY

Which of the following answers refers to a cloud computing delivery model in which the cloud infrastructure is provisioned for open use by the general public?

Public cloud

Which of the tools listed below is used for attaching wires to a patch panel?

Punchdown tool

Which mechanism will move a port into a root-inconsistent state if BPDUs coming from a certain direction indicate another switch is trying to become the root bridge?

Root guard

Which type of malware takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools?

Rootkit

A device designed to filter and transfer data packets between dissimilar types of computer networks is called:

Router

Which of the devices listed below is used for separating broadcast domains?

Router

Which of the answers listed below refer to the components that can be found at the OSI network layer? (Select 3 answers)

Router IP Address Packet

An agreement between a service provider and users defining the nature, availability, quality, and scope of the service to be provided is referred to as:

SLA

Which of the following protocols runs on TCP port 445?

SMB/CIFS (Server Message Block/Common Internet File System)

A system administrator has asked the security team for a firewall rule that will allow them to "walk the MIB." What service should be allowed through the firewall?

SNMP

Which underlying protocol enables network monitoring tools to work?

SNMP (Simple Network Management Protocol)

Which DNS record specifies a host and port information that allow to find specific services on a network?

SRV

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:

SSH

Which of the answers listed below refers to a secure replacement for Telnet?

SSH

Unblocking TCP port 22 enables what type of traffic? (Select 2 answers)

Secure Shell (SSH) Secure File Transfer Protocol (SFTP)

Which written document defines how an organization will protect its IT infrastructure?

Security policy

Which DNS records are commonly used with the DNS TXT record? (Select 2 answers)

Sender Policy Framework (SPF) DomainKeys Identified Mail (DKIM)

Which DNS records are used to protect a domain from being wrongfully identified as a source of email spam? (Select 2 answers)

Sender Policy Framework (SPF) DomainKeys Identified Mail (DKIM)

Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services?

Session Initiation Protocol (SIP)

Unified communication leans heavily on ___________ for transmission.

Session Initiation Protocol (SIP) and Real-time Transport (RTP)

Which of the following enables VoIP calls between PBXs?

Session Initiation Protocol (SIP) trunk

An NMS can tell an agent to make changes to the information it queries and sends, called variables, through a __________ protocol data unit (PDU).

Set

A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called:

Software as a Service (SaaS)

Which of the answers listed below refers to a technology designed to simplify network infrastructure management?

Software-defined networking (SDN)

Which characters are not permitted in a DNS domain or host name?

Spaces

Which of the protocols listed below provide protection against switching loops? (Select 2 answers)

Spanning Tree Protocol (STP) Rapid Spanning Tree Protocol (RSTP)

A type of diagnostic tool used for measuring the strength of a wireless signal is referred to as:

Spectrum analyzer

An email sent from unknown source disguised as the source known to the message receiver is an example of: (Select 2 answers)

Spoofing Social engineering

__________ broadcasts data in small, discrete chunks over the different frequencies available within a certain frequency range.

Spread-spectrum

IEEE 802.6

Standards for information exchange

IEEE 802.4

Standards for token passing bus access

IEEE 802.5

Standards for token rings and LAN/MAN communication

Which first generation network topology provided fault tolerance?

Star

Which of the answers listed below refer to copper cabling termination specifications? (Select 2 answers)

TIA/EIA 568a TIA/EIA 568b

An IPv4 packet header field that specifies how many more hops a packet can travel before being discarded is called:

TTL

What are the characteristic features of FCoE? (Select all that apply)

Takes advantage of copper cabling Enables connectivity between servers and data storage devices Does not require any specialized hardware Does not require separate cabling infrastructure

Who is often a supporter of first responders to a security incident and should follow good forensic practices?

Technician

Which protocol enables you to control a remote computer from a local computer over a network?

Telnet

Which unencrypted remote-access method enables control over another computer on the network via command line?

Telnet

A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called:

Temporal Key Integrity Protocol (TKIP)

An IPv4-to-IPv6 transition mechanism with native support for Network Address Translation (NAT) is known as:

Teredo

Once the theory of probable cause of the problem has been established, the next troubleshooting step should be:

Testing the theory to determine the problem cause

You've just started your computer, and you find that you have access to some local servers but no access to the Internet. Which of these is the most likely reason for this issue?

The DHCP server is down

What item do most professional cable installers use to quote the price for an installation?

The number of drops

In a specification such as 10BaseT, what does the word "base" identify?

The signal type

Which tool is falls into the category of a third-party software tool?

Throughput tester

What kind of tool would be used for troubleshooting short/open circuits inside a copper cable?

Time-Domain Reflector (TDR)

Which tool can be used to notify a technician where a cable break is occurring on a copper cable?

Time-domain reflectometer (TDR)

What is the purpose of a crimper?

To connect a RJ-45 connector to the cable

What is another name for a timestamped service ticket?

Token

Which tool has only one job: to help a technician locate a particular cable?

Tone generator

Which of the following tools would be used for locating a cable in a cabling bundle or tracing individual wires in a cable?

Toner and probe kit

Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or user names and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns, such as keyboard typing style ("something you do"). Multifactor authentication systems require implementation of authentication factors from two or more different categories.

True

BYOD requires tight controls and separation of employee personal data from corporate data.

True

Before the Internet existed, the biggest drawback to remote connections was the cost to connect.

True

Business continuity planning deals with the concept of backup sites.

True

Cabling, physical addresses, NICs, and switches are included in the Link layer of the TCP/IP model.

True

Category 3 (Cat 3) cable is a 10 Mbps twisted-pair copper cable used in telephone wiring and older Ethernet (10BaseT) networks.

True

Category 7 is a twisted-pair cabling standard featuring improved specifications for canceling crosstalk and system noise. As in Cat 6A, Cat 7 cabling offers 10 Gbps data transfer rate over a cable segment length of 100 meters in 10GBaseT networks. Category 7 standard introduces new connector types (the GG45 and TERA connector). Cat 7 cabling hasn't seen a widespread market adoption yet, because all manufacturers of active equipment and network cards prefer Cat 6A standard which offers similar performance and takes advantage of the traditional RJ-45 connector.

True

Changing the native VLAN on all trunk ports to an unused VLAN ID is one of the countermeasures against VLAN hopping.

True

Chassis intrusion detection is an option that can be enabled/disabled in the BIOS setup utility (if a BIOS comes equipped with this feature). Coupled with a hardware sensor mounted inside the computer case, this functionality can be used to check if the case was opened and display a notification alert during next boot.

True

CompTIA calls regularly updating operating systems and applications to avoid security threats patch management.

True

Computers use the Address Resolution Protocol (ARP) utility to resolve IP addresses to MAC addresses.

True

Different networking jobs require wildly different tools.

True

Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4.

True

E1 and SONET use a derivative of the High-Level Data Link Control (HDLC) protocol as the control channel.

True

E1 and T1 lines can interconnect for international use.

True

End users are probably the primary source of security problems for any organization.

True

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS.

True

Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams.

True

Network design quantifies the equipment, operating systems, and applications used by the network.

True

Hash functions allow for mapping large amounts of data content to a small string of characters. The result of hash function provides the exact "content in a nutshell" (in the form of a string of characters) derived from the main content. In case there's any change to the data after the original hash was taken, the next time when hash function is applied, the resulting hash value calculated after content modification will be different from the original hash. In computer forensics procedures, comparing hashes taken at different stages of evidence handling process ensures that the evidence hasn't been tampered with and retains its integrity.

True

Hot Standby Router Protocol (HSRP) is a Cisco feature.

True

IR blasters can emulate any IR remote control, turning any Android into a universal remote.

True

If your network consists of only two, three, or four routers, RIP's easy configuration often makes it worth putting up with slower convergence.

True

In 10GBaseT networks, Category 6 (Cat 6) cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas Cat 6A (Augmented) cabling allows for 10 Gbps data transfer rate over a cable segment length of 100 meters.

True

In STP network topology, the term "Root guard" refers to a security mechanism designed to protect integrity of the designated main switch.

True

In a network using subnets, the term "Default gateway" refers to a network device (e.g. router) that enables exchange of data between hosts residing in different subnets.

True

In a partially meshed topology network, at least two machines have redundant connections.

True

In computer networking, the term "Collision" refers to a situation in which two or more demands are made simultaneously on an equipment that can handle only one request at any given moment.

True

In computer networking, the term "Out-of-band management" refers to a network device management technique that enables device access through a dedicated communication channel separate from the network where a given device operates. Managing access can be established either locally by installing an out-of-band management card on the device, or remotely by establishing a dedicated connection to the device with the use of a modem or console router.

True

In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes.

True

In computer security, the term "Exploit" refers to a any method that allows malicious users to take advantage of a vulnerability found in computer systems.

True

In telecommunications, Protocol Data Unit (PDU) is a term used for describing a specific unit of data passed across a network.

True

In terms of size and reach, a Metropolitan Area Network (MAN) can be placed between a LAN (smaller type of network) and a WAN (larger type of network).

True

In the patch management process, an unwanted change introduced by an update can typically be reverted via rollback feature which allows for restoring an application or system to a state prior to the update.

True

Installing structured cabling properly takes a startlingly high degree of skill.

True

Lightweight EAP (LEAP) is a proprietary EAP authentication used almost exclusively by Cisco wireless products.

True

Long Term Evolution (LTE) is a wireless communications standard for mobile devices and wireless hotspots. LTE offers significant improvements in terms of speed when compared to the older generation of 3G cellular networks. LTE and its later revision LTE-Advanced (LTE-A) are often marketed as 4G standards.

True

Materials from which the plenum-rated cable's cover is made include low-smoke polyvinyl chloride (PVC) and fluorinated ethylene polymer (FEP).

True

Most of the connections that make up the high-speed backbone of the Internet use technologies designed at least 20 years ago to support telephone calls.

True

Preparing for incidents is the cornerstone of managing risk.

True

Private Branch Exchange (PBX) is an internal telephone exchange or switching system implemented in a business or office. PBX allows for handling of internal communications without the use of paid Public Switched Telephone Network (PSTN) service. A Voice over Internet Protocol (VoIP) PBX, which takes advantage of existing LAN cables, can further reduce costs by removing the need for separate telephone cabling infrastructure in a building or office.

True

Regardless of the implementation of an Ethernet network, the design of the frames remains the same.

True

Routers use logical addresses to forward data.

True

Secure File Transfer Protocol (SFTP) is an extension to the Secure Shell protocol (SSH) and runs by default on TCP port 22.

True

Secure Shell (SSH) is a more secure replacement for Telnet.

True

Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the same area without causing interference.

True

Switching loops are rare.

True

Symmetric-key encryption uses the same key for both encryption and decryption.

True

TCP is a connection-oriented protocol.

True

The 66 block (older type/primarily used in analog telephone systems) and the 110 block (newer type/used in computer networks) are examples of punch-down blocks used for connecting sets of wires.

True

The 802.11 standard defines both how wireless devices communicate and how to secure that communication.

True

The FCS uses a type of binary math called a cyclic redundancy check (CRC) that the receiving NIC uses to verify that the data arrived intact.

True

The Internet is an example of a large public WAN.

True

The Mechanical Transfer Registered Jack (MT-RJ) is a type of Small Form Factor (SFF) connector.

True

The Transport layer of the TCP/IP model uses both connection-oriented and connectionless protocols.

True

The best example of nonrepudiation is a digital signature.

True

The current version of SNMP is SNMPv3.

True

The default Wireshark screen has become the standard most other protocol analyzers are based on.

True

The general feature of all twisted-pair cabling types is that wires inside the cable are grouped into pairs and wires in each pair are twisted around each other to reduce signal interference from adjacent wire pairs (effect known as crosstalk).

True

The importance of changing default user names and passwords can be illustrated on the example of certain network devices (e.g. routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.

True

The main difference between the UTP and STP cabling is that STP cable takes advantage of additional protective cover reducing signal interference from outside sources.

True

The main method by which a first responder secures an area is by having their presence at the scene.

True

The only time a technician would use a punchdown tool in a diagnostic environment is a quick repunch of a connection to make sure all the contacts are properly set.

True

The term "VoIP endpoint" refers to a dedicated hardware device or an application program that enables Voice over Internet Protocol (VoIP) telephone calls from computing devices.

True

The traceroute command defaults to IPv4.

True

The traceroute utility is used to trace all of the routers between two points.

True

The very last step of the troubleshooting process involves documenting findings, actions and outcomes. This step comes after verification of full system functionality and implementation of applicable preventive measures.

True

To allow traffic from multiple VLANs on a single communication link, frames from individual VLANs must be identified. The most common and preferred method, IEEE 802.1Q, adds a tag to the Ethernet frame header, labeling it as belonging to a certain VLAN.

True

Transmission carried out in one direction only is described as simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes.

True

Unshielded twisted pair (UTP) category (CAT) ratings are officially rated in megahertz (MHz), indicating the highest frequency the cable can handle.

True

VLANs based on ports are the most common type of VLAN.

True

Virtualization provides a virtualized BIOS and System Setup for every virtual machine.

True

Viruses need human action to spread.

True

WAPs use an access control list (ACL) to enable or deny specific MAC addresses.

True

Web browsers are designed to request HTML pages from Web servers and then open them.

True

When a DHCP client boots up, it automatically sends out a special DHCP Discover message using the broadcast address.

True

When a NIC sends a frame that contains the broadcast address, every NIC on the network processes that frame.

True

When a cable is not broken but it's not moving data the way it should, turn to a certifier for diagnostics.

True

When troubleshooting a network, consider other issues first because routers do not fail very often.

True

When troubleshooting a problem, a technician needs to select the most probable cause from all the possible causes.

True

Whitelisting and blacklisting are labor-intensive processes, with whitelisting requiring far more work.

True

Wi-Fi Protected Setup (WPS) is a network security standard which simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network. WPS has known vulnerabilities and disabling this functionality is one of the recommended ways of securing wireless networks.

True

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three.

True

With complete Internet services, such as Skype, all of the interconnections to the PSTN are handled in the Cloud.

True

With distance vector routing protocols, the simplest total cost sums the hops (the hop count) between a router and a network.

True

You can think of a link-local address as IPv6's equivalent to IPv4's APIPA/zeroconf address.

True

Which of the following answers refers to a dedicated device designed to manage encrypted connections established over an untrusted network, such as the Internet?

VPN concentrator

What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes?

Variable-Length Subnet Masks (VLSM)

Which of the following tools would be of help in troubleshooting wireless signal loss and low wireless network signal coverage?

WAP power level controls

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called:

WLAN

Which of the following would be the best solution for securing a small network lacking an authentication server?

WPA2-PSK

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:

War driving

Which secondary location lacks current data and may not have functioning Internet/network links?

Warm

An organization is creating a disaster recovery plan that includes a remote recovery site. This site contains the hardware necessary to recover all IT services, but none of the software or data is installed prior to the disaster event. Which of the following would best describe this site?

Warm site

Google Chrome and Mozilla Firefox are examples of __________ applications.

Web Client

What function uses port 80?

Web Server

What name is given to the port numbers in the range of 0 to 1023?

Well-known

Which of the following tools would be of help in determining the optimal placement of a WAP?

Wi-Fi analyzer

A computer network connecting multiple smaller networks over very large geographical areas is known as:

Wide Area Network (WAN)

When designing and building a network, which requirements help in determining how to connect to the Internet?

Wired/wireless considerations

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves:

Wireless site survey

Why are crossover cables rarely used nowadays?

Wireless technology has superseded the need for crossover cables.

Which tool is an example of a packet sniffer?

Wireshark

Which of the tools listed below can provide information on network latency problems? (Select 3 answers)

ping Packet analyzer tracert or traceroute

Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses?

arp -a

Which process allows you to assign ports to VLANs after you create the VLANs?

assignment

Fingerprint readers, facial recognition cameras, voice analyzers, retinal blood vessel scanners or other more exotic characteristics are all examples of __________.

biometric devices

Most switches enable you to use multiple NICs for a single machine, a process called __________ or link aggregation.

bonding

Which of the answers listed below refers to a special type of frame used by STPs?

bridge protocol data unit (BPDU)

If the disaster requires actions offsite from the primary infrastructure, it is under the jurisdiction of__________.

business continuity

You won't get an HTTPS connection without a good __________ exchange.

certificate

When talking about QoS for medianets, an administrator needs to develop the concept of __________.

differentiated Services (DiffServ)

The Internet was founded on the __________ principle.

end-to-end

A __________ cable that uses LEDs is known as multimode fiber (MMF).

fiber-optic

The older __________ connector left a little gap between the connection points due to imperfections in the glass.

flat-surface connector

What is the name of a Linux command-line utility that can be used to display TCP/IP configuration settings?

ifconfig

Many years ago, the ping command had a bug that allowed malicious users to send malformed ping packets to a destination causing the __________ issue.

ping of death

A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy.

honeypot

Virtualization enables one machine called the __________, to run multiple operating systems simultaneously.

host

A __________ VPN deals with a specific single connection between two machines using VPN software or hardware.

host-to-host

The first and last bastion of defense for an entire infrastructure's security is at the individual __________.

hosts

Which of the network diagram symbols listed below represents an access point?

https://www.examcompass.com/media/communityquiz/images/amfslpkq73npm9pez6inpitmo.png

Which of the network diagram symbols listed below depicts a router?

https://www.examcompass.com/media/communityquiz/images/l1jhwkj82qvzdnkjljkds8kpa.png

Which network diagram symbol would be used to represent a firewall?

https://www.examcompass.com/media/communityquiz/images/n2c9vhvnagq1k4b8poh2pgcbv.png

Which of the following symbols would be used to depict a network switch?

https://www.examcompass.com/media/communityquiz/images/zy37i2eu08edkuojfd6k1e3cz.png

Both Z-Wave and Zigbee use a mesh networking topology to facilitate communication in homes, yet both also have __________ that act as the network interconnect.

hubs

To reduce fire hazards, most city ordinances require the use of __________ cable for network

plenum

Access control lists (ACLs) consider traffic as either __________.

inbound or outbound

A supervisory control and data acquisition (SCADA) system is a subset of the __________.

industrial control system (ICS)

If you want to know how hard your network is working, use a(n) __________.

interface monitor

A cable might experience crosstalk, where the electrical signal bleeds from one wire pair to another, creating __________.

interference

Which Linux command can be used to view IP settings?

ip

What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings?

ipconfig

Which command can be used on a Windows computer to view the IP settings?

ipconfig

Which command is used to force a DNS server to update its records?

ipconfig /registerdns

Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers)

ipconfig /release ipconfig /renew

The SNMP manager requests and processes information from the __________ devices.

managed

A command-line utility used for checking the reachability of a remote network host is called:

ping

The __________ defines who may access the network, how they may access the network, and what they can access.

network access policy

A __________ consists of multiple sensors placed around the network, often on one or both sides of the gateway router.

network intrusion detection system (NIDS)

All operating systems have a version of the __________ tool that enables DNS server queries.

nslookup

Which command would a technician use to diagnose DNS problems on a Windows computer?

nslookup

Which of the software tools listed below allows for obtaining a domain name to IP address mapping?

nslookup

The __________ watches some kind of monitor—the interface—and intervenes if necessary.

operator

In NetFlow, a single flow is a flow of __________ from one specific place to another.

packets

Microsoft has a utility called __________ that combines the functions of ping and tracert and adds some additional functions.

pathping

Which network command-line utility in MS Windows combines the features of ping and tracert?

pathping

Virtual servers and virtual network components can be created in the cloud using Infrastructure as a Service (IaaS) providers, often at rates measured in __________ per hour.

pennies

Connected Bluetooth devices create a __________.

personal area network (PAN)

Packet sniffers need to capture all the packets they can so it is typical for them to connect to an interface in __________ mode.

promiscuous

Most packet sniffers come bundled with a __________, the tool that takes the sniffed information and figures out what's happening on the network.

protocol analyzer

Training users to recognize social-engineering tactics assists in __________.

risk management

Configuration bridge protocol data units (BPDUs) establish the topology, where one switch is elected __________ and acts as the center of the STP universe.

root bridge

Which utility enables you to display and edit the local system's routing table?

route

Instead of NAT and private network IDs, IPv6 relies on __________.

router advertisements

Which of the acronyms listed below refers to a technology that allows for real-time analysis of security alerts generated by network hardware and applications?

security information and event management (SIEM)

ICS/DCS/SCADA and other networks are traditionally good candidates for network __________.

segmentation

A unique WLAN identifier (a.k.a. wireless network name) is commonly referred to as:

service set identifier (SSID)

A wireless hotspot is a feature that enables a device to share its cellular WAN connection by setting up a(n) __________ via its own 802.11 wireless.

service set identifier (SSID)

A metric that compares the amount of usable data and the background noise that is being sent over a transmission channel is known as:

signal-to-noise ratio (SNR)

Managed devices run specialized __________ called agents.

software

Code-division multiple access (CDMA) came out not long after GSM, and used a __________form of transmission.

spread-spectrum

Which command used in Linux is faster and more powerful than netstat?

ss

A dedicated local network consisting of devices providing data access is called:

storage area network (SAN)

The NIC and the attached __________ determine full- or half-duplex during the auto-negotiation process.

switch

Which of the following answers refers to a command-line packet capturing utility?

tcpdump

Which tool is a command line alternative to Wireshark?

tcpdump

A __________ is an example of something to monitor.

temperature

What distance can a signal travel on a fiber-optic cable?

tens of kilometers

Within the DNS hierarchy, which term refers to the DNS servers just below the DNS root?

top-level domain (TLD) servers

A Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as:

traceroute

Which software tool is built into operating systems?

traceroute

Which tool records the route between any two hosts on a network and can be used to troubleshoot routing problems?

traceroute

Which utility can be used to diagnose where a problem lies when you have problems reaching a remote system?

traceroute

A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called:

tracert

On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control the flow of packets into or out of the network according to the type of packet or other rules.

traffic shaping

Biometric access calls for using a(n) __________ physical characteristic of a person to permit access to a controlled IT resource.

unique


Related study sets

Unit 9 Progress Check: MCQ, Unit 8 Progress Check: MCQ, APWH, Unit 4 Test, My AP Practice, Unit 6 Progress Check: MCQ, Unit 5 WHAP

View Set

Government: 10.2 The House of Representatives

View Set

World Religions Test Study Guide

View Set