Network+ midterm ch. 1-5, 7

Ace your homework & exams now with Quizwiz!

which wireless technology is used to track fitness activity levels and geographic movement? a. Bluetooth b. ANT+ c. NFC d. Infrared

ANT+

Which of the following sockets will you apply to a standard telnet port tcp23 where the host has an IP address of 10.43.3.87? a. 10.43.23.3:87 b. 19.43.3.87:23 c. 10.23.43.3:87 d. 10.43.3.23:87

10.43.3.87:23

What is the maximum allowable distance for horizontal cabling? a. 100m b. 50m c. 7m d. 89n

100m

Which of the following elements in a domain name system is a DNS client that requests information from DNS name servers? a. namespace b. name servers c. TLD d. resolvers

resolvers

Which of the following remote access methods allows a remote client to take over and command a host computer? a. RAS b. remote file access c. terminal emulation d. VPN

terminal emulation

Which of the following client-server applications use Apache and Nginx? a. email service b. ftp services c. web services d. DNS services

web services

The State of Nevada has organized a gaming championship for which you have been contracted to set up the network connections. the championship is a seven-day long affair with a heavy influx of participants. Which of the following protocols would you choose in setting up such a network? a. ICMP b. TCP c. UDP d. IP

UDP

Quinton works as a network specialist at John Brooks &Co, an ISP. Part of his job requires him to authenticate and secure Wifi networks using the EAP (extensible authentication protocol). Freesco, a client of John Brooks &Co., uses PKI (public key infrastructure) certificates to exchange public keys. Analyze which of the following steps Quinton should follow under these circumstances. a. use the EAP-TLS encryption to protect communications b. use PEAP as it is tunnel-based c. use EAP-MSCHAPv2 d. use EAP-FAST via Secure tunneling

Use the EAP-TLS encryption to protect communication

Which of the following institutions assigns a manufacturer's OUI? a. ICANN b. IEEE c. IANA d. FQDN

IEEE

Which of the following tools measures the amount of light power transmitted on a fiber-optic line? a. multimeter b. tone generator c. tone locator d. OPM

OPM, optical power meter

Which of the following command-line tools is used to display current TCP/IP addressing and domain name information on a Windows computer? a. ip b. dig c. ipconfig d. ping

ipconfig

What is the frequency range for Bluetooth communication? a. 300 ghz-300,00ghz b. 1850mhz-1990mhz c. 5.1ghz - 5.8ghz d. 2.4ghz - 2.4835ghz

2.4ghz - 2.4835ghz

You are a network engineer who is working on a very busy network and is concerned why the actual throughput is less than the potential bandwidth. The total signal strength has been estimated to be 1000w, and the estimated loss of signal due to noise has been calculated to be 6db. What is the throughput that is being received at the moment as per your calculations, keeping the 3-db rule in mind? a. 500w b. 250w c. 125w d. 750w

250w

Computer A started a communication sequence with Computer B that has a sequencing number of 300070, Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgement. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case? a. 300072 b. 300800 c. 300871 d. 300870

300871

The Mosiac Music School has hired Kirk to setup a SIP protocol for a collaborative multimedia conference session that will be limited to the selected students opting for music theory. Which of the following ports should he use in such a situation so that the required encryption can be provided? a. 993 b. 5060 c. 995 d. 5061

5060

Zero Travels, a transport company, has just set up two offices within a range if eight kilometers apart from each other for smoother transactions. Lee, a senior technician at Informatics Ltd., has been hired to set up a network connection between these two branches. Which of the following network models should Lee set up keeping in mind that budget is also a factor to be considered? a. WAN b. MAN c. PAN d. CAN

CAN

Netcom Solutions is an Internet Service Provider that has purchased a fresh wholesale bandwidth from network service provider GT&P. Netcom Solutions has been using duplex technologies running through copper wires for its distribution. It now wants to upgrade to multiplexing technologies using fiber-optic cables so that it can allow multiple signals to travel simultaneously. Analyze which of the following types of multiplexing technologies Netcom should choose in this situation for its connection with GT&P so that it can operate with more channels. a. WDM b. FDM c. TDM d. DWDM

DWDM

Victor has been recently added to the network engineers' team at Yakuza Infinity. Which of the following methods must he know to understand how filtering prevents the AP from authenticating any device whose MAC address is not listed by the network administrator? a. Authentication b. WPA c. Encryption algorithms d. MAC filtering

MAC filtering

HLP Ltd. has already set up a private web server for its corporate network with Windows as an operating system, and now they have contacted you to make their network remotely accessible to a certain group of employees. They have also requested you to ensure that the selected protocol provides secured and encrypted transmissions. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server? a. the telnet protocol b. RDP c. the SSH protocol d. POP3

RDP

RT&T is a world-renowned ISP that has hired you as a contractor for a cross-country network cabling project for its upcoming new FiberNet package. Through this package, it plans on providing high-speed Internet to consumers. Which of the following cables will you choose to carry out this large-scale project. a. SMF b. MMF c. Twisted pair cable d. Coaxial cable

SMF

You, as a network engineer, are working on setting up a data delivery service. While creating the TCP segment for this purpose, you wish to set up a command requesting a synchronization of the sequence numbers between two nodes. Which of the following flags will you apply with a 1 bit field so that you can set this up? a. PSH b. FIN c. URG d. SYN

SYN

Which of the following protocols transfers files without any authentication or security? a. VPN b. FTPS c. SFTP d. TFTP

TFTP

Which of the following consists of one or more insulated twisted pair wires encased in a plastic sheath? a. UTP b. STP c. MMF d. SMF

UTP

You have been appointed as the network administrator in Well Brew Ltd. The WPS (Wifi Protected setup) in the office is user-friendly, but not very secure. A recent problem highlighted that the PIN can be easily cracked through a brute force, which means simply trying numerous possible character combinations to find the correct combination. Which of the following attacks have you most likely encountered? a. War driving b. War chalking c. WPA attack d. WPS attack

WPS attack

the administrator at JK Cements wants you to assign a port number other than the standard port 80 to a web server on the Internet so that several people within the organization can test the site before the web server is made available to the public. To reach the web server, which type of port number must a tester enter in the browser address box along with the web server's IP address? a. a private port number b. a dynamic port number c. a registered port number d. a well-known port number

a private port number

A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose. a. star topology b. a mesh topology c. a ring topology d. a bus topology

a star topology

The process of designing, implementing, and maintaining an entire network is called a. patch management b. SCADA c. a network loop d. a system life cycle

a system life cycle

You are working as a network engineer with Skynet solutions. You have been sent to the Waylan Union High to establish a wireless link between the entrance facility and the main distribution frame. Which of the following cabling methods would you choose to complete the task at hand? a. horizontal cabling b. backbone cabling c. plenum cabling d. patch cabling

backbone cabling

PepsiCo Ltd., has been having a lot of bugs in their network and so they have hired Suleiman to analyze the issue at hand, On inspection, he has come up with the solution that certain changes to the network must be done in order to make it functional. Which of the following statements should Suleiman consider while considering a change in a network? a. change management procedures should consist of preparing a backup plan as well b. change management procedures do not evaluate the cost of change of a plan c. changes to a network can be done without keeping in view the effect of the change on its users and applications d. changes to a network should be done when there are maximum users on the network

change management procedures should consist of preparing a backup plan as well

name the phenomenon where a wireless signal is split into secondary waves, when it encounters an obstruction? a. reflection b. diffraction c. refraction d. scattering

diffraction takes place when a wireless signal is diffracted, or split into secondary waves, when it encounters an obstruction

Yang, a network engineer, has been asked with establishing a new long-distance connection for the branch offices between Manhattan and Texas by an ISP. In doing so, analyze which of the following cables he should opt for in order to obtain maximum speed and bandwidth a. fiber optic cable b. UTP c. STP d. patch cable

fiber optic cable

Mr. Chadwick has recently set up a network connection for a client wherein he made a transition between an SMF and MMF cable using a fusion splicer. Around a week later, the client calls him up and raises a concern about fluctuations in the network. Mr. Chadwick decides to conduct an on-site inspection, and he gets to know that the reason behind the fluctuation is that the transmission has not traversed successfully. Analyze which common fiber problem Mr. Chadwick is referring to in this case. a. dirty connectors b. wavelength mismatch c. link loss d. fiber type mismatch

fiber type mismatch

Which of the following prefixes would you allot for a quantity of 1,000,000,000 bits per second? a. tera b. giga c. kilo d. mega

giga

Local Brew is a small cafe operating in New York. It has set up a free wireless network in its cafe to provide customers with ease of Internet access. Recently, one of the customers lodged a complaint against Local Brew regarding data theft from his emails, which has been traced back to the cafe's public IP. Local Brew has informed Barton, who is the network provider for the cafe, to rectify the issue. Which of the following should Barton do to analyze and rectify the issue? a. he should check for guest network preferences b. he should check if the antenna has been misplaced c. he should check whether captive portal user reminders have been set up d. he should check whether the geofencing security option has been enabled

he should check whether captive portal user reminders have been set up

Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. this has caused multiple data errors and a deterioration in communication. Which of the following issues has been caused the issue here? a. interference b. channel overlap c. insufficient wireless coverage d. simultaneous wired and wireless connections

insufficient wireless coverage

Black Lion Cements has set up its new branch office adjacent to its manufacturing unit. Even though there are a lot of heavy pieces of machinery operating adjacent to the office, the management at Black Lion cements believes that this will enhance the employees' performance. It has hired JW Communications to manage and assess its network requirements. After setting up the network, the network engineers are constantly facing wireless communication errors, which are difficult to diagnose. Analyze which of the following might be the cause of this error. a. interference seems to be the cause b. insufficient wireless coverage might be the cause c. attenuation might lead to loss in signals d. lack of firmware updates might be the cause

interference seems to be the cause

When Kyle visited Claremont Group of Institutions as a network professional to repair defective cable ends, he accidently left more than an inch of exposed cable before a twisted-pair termination. Analyze what the consequence of Kyle's error will be. a. it will increase the possibility of noise interference, which will affect the network's signals b. it will risk connectivity and data transmission problems c. it will increase the possibility of transmission interference between wires d. it will make it difficult to diagnose data errors

it will increase the possibility of transmission interferences between wires

Which of the following is not a characteristic of fiber cable? a. low cost b. throughput c. noise immunity d. size

low cost

Vialom network has organized an online web concert featuring various well-known pop stars, which will stream globally. It has contacted JMT internet services to help the company in delivering a single video stream to multiple receivers so that there is minimal network traffic. Analyze which of the following IPv6 addresses it should use in this case. a. unicast address b. loopback address c. link local address d. multicast address

multicast address

Your client has hired you to extract details about the port on which the TCP/IP connections are running. You, as a network engineer, have decided to use the netstat utility for this purpose. Which of the following commands will you apply to list all current TCP connections and all listening TCP and UDP ports? a. netstat -a b. netstat -f c. netstat -n d. netstat -r

netstat -a

As a network administrator in Wright Elementary School, it is your job to monitor all the devices used by the staff and students. Which of the following commands would you employ to be able to detect, identify, and monitor devices on a network? a. ping b. tcpdump c. netstat d. nmap

nmap

Heroku Industries has a SQL Server database that provides data to clients throughout its network. It has now asked George, a network engineer, to sort an issue within the administration branch where the Windows firewall does not allow access to the users to such databases. Analyze what port should George open up in the firewall so that the issue is resolved. a. open up port 1433 b. open up port 1521 c. open up port 389 d. open up port 5061

open up port 1433

In reversing a software upgrade, which of the following types of upgrade uses the patch's automatic uninstall utility for reversing? a. client software upgrade b. shared application upgrade c. operating system upgrade d. operating system patch

operating system patch

Mr. Lowe is a network administrator who plans on purchasing a switch that will be the part of a network for a new fast-growing fast food joint named Momos & More (M&M). The team at M&M has specifically told Mr. Lower that even though the current need of the network is two fiber-optic connections, it is planning on a significant expansion in the coming years. This expansion will include a fiber-topic connectivity to every desktop in the organization. Analyze what Mr. Lowe should do in this situation. a. Order a switch with the current demand number b. order switches that allow upgradeable interfaces c. order media convertors d. use APC ferrules

order switches that allow upgradeable interfaces

You are adding new cables to a data outlet where you have to run the cables above the ceiling tile. What kind of cables should you use in such a scenario? a. plenum rated cable b. PVC c. STP d. UTP

plenum rated cable

You, as a network administrator, want to set up a file transfer version of SSH so that you can use a single channel to control both inbound and outbound communications. Which of the following ports will you use to carry out this operation? a. port 20 b. port 22 c. port 69 d. port 989

port 22

You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply? a. presentation layer b. transport layer c. data link d. physical layer

presentation layer

Which of the following statements is applicable for a peer-to-peer network and not for a client-server network mode? a. user accounts and passwords to the networks are all assigned in one place b. they are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce c. problems on the network can be monitored, diagnosed, and fixed from one location d. access to multiple shared resources can be centrally granted to a single user or a group of users.

they are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce.

What should be the ideal procedure after implementing the solution to a network troubleshooting problem? a. Document finds, actions, and outcomes b. test the theory to determine the cause c. verify functionality and implement preventive measures d. establish a theory of probable cause

verify functionality and implement preventive measures

Charlie Gordon is the new technician at Beekman University computer lab. He is unable to get the Wifi client to connect to the AP at all. He has looked into the matter and has found that he can't find an available AP even after using the correct security key. After further investigation, he has realized that if the access point does not broadcast its SSID, he would have to enter the SSID during client configuration. Analyze which of the following issues Charlie might be encountering in this scenario. a. encryption protocol mismatch b. incorrect passphrase c. wrong SSID d. Long AP association time

wrong SSID


Related study sets

American Government Review for Final Review

View Set

SOCIOLOGY Chapter 5: (Separate and Together: Life in Groups)

View Set

Analyzing Word Choice and Author's Purpose in Short Stories

View Set

22 The First Emperor of China Study Guide

View Set

Business Ethics Chapter 1 Exam Questions

View Set

Unit 8 Chemical Changes: 5.13 Reactants and Products

View Set

Chapter 11- Patterns of Medieval Life

View Set

Chapter 6: federal tax considerations for life insurance

View Set