Network+ Practice

Ace your homework & exams now with Quizwiz!

What is the binary representation of the 255.254.0.0 subnet mask?

11111111.11111110.00000000.00000000

What is the binary representation of the 255.255.128.0 subnet mask?

11111111.11111111.10000000.00000000

Which of the following port number is reserved for the NTP?

123

How many bits make up an IPv6 address?

128

Which of the following port numbers are reserved for NetBIOS services?

137 138 139

What is the network address for the 154.24.67.147/22 host?

154.24.64.0

How many networks can be created by borrowing four bits from hosts?

16

An SNMP agent receives requests on UDP port:

161

Which of the following UDP ports are reserved for the SNMP?

161 162

An SNMP management station receives SNMP notification on UDP port:

162

Route redistribution

A solution used to translate routing information between routers configured to use different routing protocols is known as:

The Data-Link layer is further subdivided into two other layers called ___ ___ ___ and ___ ___ ___

Logical Link Control Media Access Control

____ is a short-range radio tech that is often used for wireless printers, mice, keyboards, and scanners.

Bluetooth

The classful IP add. 200.200.200.200 is a Class ____ add.

C

A switch controls and segments traffic on your network by learning the ____ addresses of all the components connected to it.

MAC

ARP resolves IP addresses to _____ addresses.

MAC

7 layers

The Open Systems Interconnection (OSI) model consists of:

_____ is a dynamic database that resolves hostnames to IP addresses.

DNS (domain name system)

True/False: The Transport layer converts digital data into electronic signals to be put on a wire

False

True/False: Using DNS will segment a network.

False

True/False: VLANs create collision domains.

False

8 subnets, 30 hosts per subnet

What is the maximum number of subnets and hosts per subnet for the 192.168.50.247 255.255.255.224 network?

ipconfig

What is the name of a Windows command line utility that can be used to display TCP/IP configuration settings?

ping

What is the name of a command line utility used for checking the reachability of a remote host?

UDP port 67 is used by:

DHCP Boostrap Protocol (BOOTP)

Presentation layer

Layer 6 of the OSI model is also known as:

DNS runs on:

UDP port 53 TCP port 53

Trivial File Transfer Protocol (TFTP) uses:

UDP port 69

Transport layer Layer 4

User Datagram Protocol (UDP) resides at: (Select 2 answers)

172.45.121.254

What is the last usable host IP address for the 172.45.120.0/23 network?

The most common topology in use today is the _________ topology.

star

A UTP cable running 1000Mbps can be a maximum distance of

100 meters

Which TCP port is used by the POP3?

110

What is 192.168 in binary?

11000000.10101000

Which of the following answers lists the CIDR notation of the 255.192.0.0 subnet mask?

/10

Which of the following answers lists the CIDR notation for 255.255.224.0 subnet mask?

/19

Which of the following answers lists the CIDR notation of the 255.255.255.224 subnet mask?

/27

In the MAC address 00-05-1B-00-4B-F6, which part of the add. is the unique ID for the device?

00-4B-F6

Previously resolved IP-to-MAC addresses are stored in the ARP caches on a Microsoft client for about ____ minutes.

10

What is the maximum valid range for IP addresses that can be assigned to hosts on the 192.168.100.248 255.255.255.248 network?

192.168.100.249 - 192.168.100.254

What is the network address for the 192.168.223.15 255.255.255.252 host?

192.168.223.12

What is the last usable host IP address on the 192.168.32.9/30 network?

192.168.32.10

Which of the following answers lists the broadcast address for the 192.168.50.155/20 network?

192.168.63.255

The FTP Data Connection for sending file data is established through port:

20

Which of the following port numbers are used by the FTP

20 21

A fully meshed topology with five components would have _____ connections and require ____ cables.

20, 10

The FTP control connection for administering a session is established through port number:

21

Autonomous system

A collection of IP networks and routers under the control of one administrative entity is commonly referred to as:

netstat

A command line utility in MS Windows used for displaying protocol statistics and current TCP/IP network connections is called?

_____ is a term that refers to combining authentication, authorization, and accounting into the same system or server.

AAA

A DNS record that is the same as an A record but is specifically used on IPv6 is an ____ ____

AAAA record

_____ was developed along with WPA2 keys, used in wireless authentication.

AES (adv. encrypt. standard)

169.254.1.1 is an example of an ____ address.

APIPA (auto. private internet protocol address)

What is a firewall's list of rules, which it uses to block traffic?

Access control list (ACL)

SMTP works at the _____ layer of the OSI model

Application

TFTP is connectionless protocol that works at the ____ layer of the OSI model.

Application

Layer 7

Application layer of the OSI model is known as:

What does SNMP provide?

Automated alerts and reports on network devices

The classful IP add. 139.2.1.2 is a Class ____ add.

B

Sending unsolicited messages over a bluetooth-enabled device is referred to as

Bluejacking

The hacking of a smartphone or other bluetooth-enabled device through an open bluetooth connection is called

Bluesnarfing

192.168.10.0/28 is an example of which kind of notation?

CIDR

_____ is used as a carrier access method on 802.11a/b/g/n networks.

CSMA/CA

Original (legacy) ethernet uses a carrier access method referred to as

CSMA/CD (carrier sense multiple access with collision detection

A ____ is used to convert LAN signal to WAN signal and vice versa.

CSU/DSU

What device connects a LAN to a T1 circuit?

Channel Service unit/data service unit (CSU/DSU)

What device connects a local area network (LAN) to a T1 circuit?

Channel service unit/data service unit (CSU/DSU)

In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to the:

Class A address space

Which of the following answers refer to the characteristic features of the 10.0.0.0 10.255.255.255 IPv4 address space? (Select 2 answers)

Class A range Non-routable (private) IP address range

Which of the following answers list the characteristic features of the 172.16.0.0 172.31.255.255 IPv4 address space? (Select 2 answers)

Class B range Non-routable (private) IP address range

In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to the:

Class C address space

What tool is used to connect an RJ-45 to a UTP?

Crimper

The ____ protocol is used for smart cards.

EAP (extensible authentication protocol)

An interference caused by wires running past speakers, fluorescent light ballasts, or electric motors is referred as ____ ____ .

EMI (electromagnetic interference)

____ is a type of DSL that provides the same upload speed as its download speed.

SDSL (symmetric digital subscriber line)

Which of the following protocols runs on TCP port 445?

SMB

____ ____ ____ ____ is a management protocol that you can use to gather info about the network and the components it contains.

SNMP (simple network management protocol)

The unique ID that an admin can assign to a WAP is called the

SSID

When configuring a wireless AP, what should you consider when selecting a channel?

Select a channel farthest from that of any other AP in the area.

Which networking topology connects computers via a central device?

Star

DNS resolved ____ to IP addresses.

hostnames

An _____ allows users to access shared company info with their browsers w/o accessing the internet.

intranet

OSPF is an example of a ____ ____ routing protocol

link state

_____ ____ increases throughput by allowing multiple paths for traffic on the same session.

load balancing

The IP address 127.0.0.1 is referred to as the ____ add.

loopback

A physical barrier that consists of a two-door system that requires authentication to open each door and often even to return to the first door is called a ____

mantrap

A packet that has one source add. and a list or range of destination addresses is referred to as a ____ .

multicast

The _____ command displays the NetBIOS name cache showing recently resolved NetBIOS names and IP addresses.

nbtstat -c

Which two commands can you type to see the DNS servers that your computer is using?

nslookup ipconfig

You can test general connectivity between computers using the _____ tool.

ping

Static route

A manually configured routing entry is known as:

Layer 6 of the OSI model

Presentation layer is another term for:

Which type of firewall keeps track of existing connections passing through it?

Stateful

/all

Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)?

-a

Which netstat parameter allows to display all active TCP connections and the TCP and UDP ports on which the computer is listening?

IPv4 IPsec IPv6 ICMP

Which of following protocols reside(s) at the OSI network layer? (Select all that apply)

Router

Which of the devices listed below is used for separating broadcast domains?

route print

Which of the following command line commands in MS Windows is used to display the contents of a routing table?

route print

Which of the following command line commands in MS Windows is used to display the contents of a routing table?

tracert -6

Which of the following commands in MS Windows displays the route taken by IPv6 packets on their way to another host?

[command] /?

Which of the following commands in MS Windows is used to display help information related to a specific network command line utility?

True/False: Firewalls are not usually combination of hardware and software.

False

True

True or False: A command line network administration utility that operates by sending Internet Control Message Protocol (ICMP) echo request packets to the destination host and waiting for a reply in order to test the communication with another computer on an Internet Protocol (IP) network is called ping.

True

True or False: Used without any parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.

RIPv2

Which of the answers listed below refers to a distance vector routing protocol?

Rollover cable

Which of the cable types listed below is often used to connect a computer terminal to a router's console port?

ping6 host1

Which of the command line commands listed below allows for sending an ICMPv6 echo request to another network node (host1) in Linux OS?

nbtstat

Which of the following answers lists a Windows command line utility designed to be of help in troubleshooting NetBIOS name resolution problems?

BGP

Which of the following answers lists an example of a hybrid routing protocol?

/all

Which of the following answers lists an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters?

MTU

Which of the following metrics describes the largest allowable data unit that can be transmitted across the network?

nslookup

Which of the following network administration command line utilities can be used for DNS queries?

VRRP HSRP

Which of the following networking protocols provide(s) redundancy? (Select all that apply)

EGP

Which of the following protocol types is used for sharing routing information between autonomous systems (routing domains)?

HTTP FTP SMTP

Which of the following protocols reside(s) at the application layer of the OSI model? (Select all that apply)

SPB

Which of the following provides a replacement for the Spanning Tree Protocol (STP)?

HUB Network cabling

Which of the following reside(s) at the physical layer of the OSI model? (Select all that apply)

Layer 3

Which of the following terms refers to the OSI network layer?

nslookup

Which of the following tools allows for obtaining a domain name to IP address mapping?

nbtstat -A 192.168.1.10

Which of the nbtstat parameters allows to resolve remote host (192.168.1.10) by its IP address?

nbtstat -1 host1

Which of the nbtstat parameters allows to resolve remote host (host1) by its name?

-r

Which of the netstat utility parameters listed below allows to display the contents of the IP routing table?

pathping

Which of the network command line utilities in MS Windows combines the features of ping and tracert?

Run as administrator

Which of the options listed below allows for execution of a command if the requested operation in the command line interface in MS Windows requires elevation?

VRRP HSRP

Which of the protocols listed below are used for designating a backup router in the event of an active router failure? (Select 2 answers)

NetBIOS

Which of the protocols listed below resides at the session layer of the OSI model?

Maximum hop count Time to live (TTL)

Which of the following can be used to prevent routing loops? (Select 2 answers)

netstat -r

Which of the following command line commands in MS Windows is used to display the contents of a routing table?

ipconfig /release ipconfig /renew

Which of the following command line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers)

What wire pairs connect to a 66 block from the telecom company?

25 pair

In a Class C address, a network ID is how many bits?

24

Which of the following port numbers are assigned to the Media Gateway Control Protocol (MGCP)? (Select 2 answers)

2427 2727

SMTP operates with the use of TCP port:

25

Which TCP/IP port number identifies SMTP?

25

You need to provide inter-VLAN comm. What device do you need?

A Layer 3 switch (router)

____ _____ can be defined as the ability to lose a network component w/o losing data and/or functionality

Fault tolerance

What protocol is used within a ping command?

ICMP

____ are specific logical address to which applications are assigned in a computer.

Ports

TCP port 119 is used by:

Network News Transfer Protocol (NNTP)

Compared to the number of all IPv4 addresses available per subnet, the total number of usable IPv4 addresses that can be assigned to hosts from that pool is reduced by two. Those two addresses that cannot be assigned to hosts are used as: (Select 2 answers)

Network address Broadcast address

A packet-filtering firewall operates at which layers of the OSI model?

Network and Transport

True/False: 156.144.226.123 is a valid IP address

True

True/False: A DMZ is a network segment that is neither public nor local but halfway between.

True

True/False: A bridge can selectively forward data packets

True

True/False: A bridge is a network device that operates at Layer 2 of the OSI model

True

True/False: A dipole is an omnidirectional antenna

True

True/False: A firewall can permit, deny, encrypt, decrypt, and proxy all computer traffic that flows through it.

True

True/False: A network collision happens when two devices attempt to communicate on the same physical segment at the same time

True

True/False: A proxy service can be used to cache web pages for future retrieval.

True

True/False: A switch is a network device that operates at Layer 2 of the OSI model

True

True/False: An intrusion detection system (IDS) monitors network traffic, looking for signs of an intrustion.

True

True/False: Antivirus software will help protect a computer from Trojan horses.

True

True/False: TCP is a connection-oriented, and UDP is reliable.

True

Ctrl+C

Which of the following key combinations allows to stop the execution of the current command run in Windows Command Prompt?

Ethernet switch

Which of the following devices resides at the data link layer of the OSI model?

Port number 3389 is reserved for:

Remote Desktop Protocol (RDP)

The ____ layer of the OSI model is responsible for establishing, synchronizing, maintaining, and then terminating the communication channels between computers.

Session

You add a new cable to your network. What document do you update?

Wiring schematics

A _____ _____ can be used to verify connectivity in a cable w/o attaching the cable network.

cable tester

The ipconfig command with no switches displays the IP address, subnet mask, and ___ ____ of the computer interfaces.

default gateway

FTPS is an extension to the SSH and runs by default on port number 22

False

True/False: A cable modem selectively forwards data packets

False

True/False: A hub and a repeater operate at Layer 2 of the OSI model.

False

True/False: A hub and a switch operate at the same layer of the OSI model

False

True/False: A hub and router operate at the same layer of the OSI model.

False

True/False: A multimode fiber-optic cable (MMF) is terminated on a punch-down block.

False

True/False: A network admin wants all computers protected from Trojan horses and worms. Implementing a firewall will accomplish this requirement.

False

True/False: A packet-filtering firewall operates at the Network and Data Link layers of the OSI model.

False

True/False: A parabolic is a type of omnidirectional antenna

False

True/False: A repeater can be used to cache web pages for future retrieval.

False

True/False: A ring networking topology connects computers via a cetral hub.

False

True/False: A router and bridge operate at the same layer of the OSI model.

False

True/False: An intrusion detection system (IDS) can detect attacks within encrypted traffic.

False

True/False: An intrusion detection system replaces a firewall on your network.

False

True/False: Antivirus software will help protect a computer from hackers.

False

True/False: IPSec encrypts data between web browers and web servers

False

True or False: 100BASE-TX Ethernet can send a signal 10 times as far as 10BASE-T Ethernet without the use of repeaters.

False. It can send it 10 times as fast but not 10 times as far.

True or False: There is no real difference between a logical network topology and a physical network topology.

False. Logical topology describes traffic flow, and physical topology is how the computers are physically connected to each other.

True or False: Telnet is more more secure than SSH

False. SSH is more secure than Telnet

True or False: Computers in a star topology use T connector's to attach the computer's network card to the cable.

False. Star topologies use a hub or a switch, and computers connected to them commonly use RJ-45 connectors (for twisted-pair cabling).

What is the first valid host address for a node residing in the 10.119.136.143/20 network?

10.119.128.1

Which of the following answers lists the binary notation of the decimal number 252?

11111100

What is the leading octet value range for an IPv4 address belonging to a class B network?

128 - 191

What is the maximum valid range for IP addresses that can be assigned to hosts on the 134.170.185.46 255.255.128.0 network?

134.170.128.1 - 134.170.255.254

What is the first usable host IP address on the 172.26.56.110/27 network?

172.26.56.97

What port number does Secure Shell (SSH) use by default?

22

Which of the following answers lists the decimal notation of the binary number 11100000?

224

Which of the following answers refer to the leading octet value range and class of the IPv4 multicast address block? (Select 2 answers)

224 - 239 Class D

The default subnet mask for a Class B network is ____

255.255.0.0

What is the maximum number of hosts per subnet for the 10.47.255.1/20 network?

4094 hosts

HTTPS uses what TCP destination port number?

443

a network admin is going to implement a packet filter on a network for internet connections. What must port be allowed dthorugh the fireqall for user to connct to secure websites?

443

Which of the following answers lists the broadcast address for the 46.28.247.109/10 network?

46.63.255.255

Terminal Access Controller access-Control System remote authentication protocol runs by default on port:

49

Registered ports range from 1024 to

49151

Ports referred to as dynamic, or private, or ephemeral ports have numbers in the range of:

49152 - 65535

RTP Control Protocol (RTCP) runs by default on port:

5005

Which of the port numbers listed below is commonly used for Session Initiation Protocol (SIP) non-encrypted traffic?

5060

What is 01100011.00011010 in decimal?

99.26

If you want to allow remote access to 500 users, which type of device is recommended?

A VPN concentrator

If you wanted to ensure that your firewall could block inflammatory email, which type of service would you look for?

Content filtering

Wen all routers in an AS agree bout the path from one point to another, the network is said to be what?

Converged

When all routers in an autonomous system agree about the path from one point to another, the network is said to be what?

Converged

IP addresses can be auto assigned to clients in a network used special servers called ____ servers

DHCP (dynamic host configuration protocol)

What is a security zone that allows public traffic but is isolated from the private network called?

DMZ = demilitarized zone

A _____ server is used to resolve hostnames to IP addresses.

DNS

Presentation layer of the OSI model

Data encryption and decryption typically takes place at the:

The ping tool creates special packets called _____ packets.

Echo request

100BaseTF uses what type of cable medium?

Ethernet over fiber

True or False: WEP is now considered to be the most secure standard for wireless networking.

False. WPA2 is the most secure standard.

An OTDR is used to test what?

Fiber

TCP port 1720 is the default port number for:

H.323

If port 80 is blocked on the firewall, then the ____ protocol will not function through the firewall.

HTTP

TCP port number 80 is used by:

HTTP

Which unsecure protocol uses port 80 by default?

HTTP

Which device monitors inbound and outbound network connections in order to identify suspect activity?

IDS

_____ is the protocol standard used for multicasting on intranets.

IGMP

TCP port 143 is used by:

IMAP

Which devise or software can identify and react to an attack by shutting down a port or dropping certain types of packets?

IPS

An ____ ____ ____ is a system that can detect malicious traffic and close ports or reset connections.

IPS - intrusion prevention system

____ is a flexible protocol that can be used to secure practically all TCP/IP-related communication.

IPSec

A company wants to have an intranet. Where would the intranet web server be located in the network?

In the LAN, usually behind the firewall to the WAN

Presentation layer

In the OSI model, data compression takes place at the:

_____ is the local authentication protocol that is used by default for Microsoft Active Directory and Novell Directory Services.

Kerberos

Data link layer

Layer 2 of the OSI model is also known as:

Network layer

Layer 3 of the OSI model is also referred to as:

Transport layer

Layer 4 of the OSI model is also known as:

Session layer

Layer 5 of the OSI model is called:

The length of time a computer is allowed to use a dynamic IP add. provided by a DHCP server is known as the

Lease time

____ ____ ____ ____ is a protocol that has become the standard for info directories such as Microsoft Active Directory

Litghtweight Directory Access Protocol (LDAP)

____ ____ ____ ____ is a modern protocol that combines the advantages of Frame Relay and ATM and speeds routing by using labels so that decision can be made much more quickly.

MPLS (multi-protocol label switching)

A DNS record that indicates a mail server is an ____ record.

MX (mail exchange)

Which network topology has the most physical connections per host, which means it will have the least collisions?

Mesh

____ ____ ____ is a service that translates one set of addresses to another set of addresses.

NAT (network add. translation)

____ is a type of system that translates one set of address to another one a one-to-one basis.

NAT (network add. translation)

At what layer of the OSI model does a router function?

Network

ICMP is a protocol that works at the _____ layer of the OSI model.

Network

IP is a connectionless protocol that works at the _____ layer of the OSI model

Network

What three elements must computers have in common to form a network?

Network media and topology, protocol, software client or service

Which of the following answers list the characteristic features of the 192.168.0.0 192.168.255.255 IP address space? (Select 2 answers)

Non-routable (private) IP address range Class C range

Which of the following is an example of a valid subnet mask?

None of the above is a valid subnet mask

_____ is one of the protocols used to retrieve mail from SMTP servers

POP3 or IMAPv4

Which two protocol allow secure access to a VPN?

PPTP and IPsec

A _____ record provides reverse lookups in DNS.

PTR

____ ____ is a tech whereby each packet of data can take a separate route to its destination.

Packet switching

Port number 5004 is used by:

RTP

Logging, notification, and shunning are what types of reactions from what type of security device?

Passive reactions from an IDS

A WAP operates at the ____ layer of the OSI model.

Physical

Which of the following statements are true?

Point to Point tunneling Protocol (PPTP) runs on port 1723 Port number 88 is reserved for Kerberos Port 1701 is used by Layer 2 Forwarding Protocol (L2F) and Layer 2 Tunneling Protocol (L2TP)

Your boss tells you to block certain ports on your firewall. What documentation do you need to update?

Policies, procedures, and configurations

Remote Authentication Dial In User Service (RADIUS) protocol run on:

Port 1813 Port 1812

A tech that allows a switch or other device to use and distribute Ethernet current to power the devices is called _____.

Power over Ethernet (PoE)

At the ____ layer of the OSI model, data is compressed (or decompresed) and encrypted or (decrypted).

Presentation (Layer 6)

_____ is a the protocol on which Microsoft Terminal Services operations

RDP (remote desktop protocol)

Which routing protocol uses a next hop as a metric in deciding how to route traffic?

RIP

Implementing policies and procedure that define how corporate info is kept confidential and training employees on these procedures can help prevent what?

Social Engineering

What type of cable would you use to connect a CSU/DSU to another CSU/DSU?

T-1 crossover

____ is a secure remote access and remote control system developed by Cisco.

TACACS+

The two protocols at the Transport layer of the TCP/IP suite are ____ and ____

TCP UDP

The Secure Shell (SSH) protocol uses:

TCP port 22

Lightweight Directory Access Protocol (LDAP) uses:

TCP port 389

HTTP over TLS/SSL runs on:

TCP port 443

What device can measure the time a signal goes down and back on a cable?

TDR

Port number 23 is assigned to:

Telent

Which terminal emulation program is insecure bc it does not encrypt any data, including usernames and passwords?

Telnet

How can you verify that your DMZ is allowing TCP ports throught?

Telnet to the ports in question on the DMZ server

True or False: A mesh topology offers fault tolerance through redundant routes

True

TCP is a connection-oriented protocol that works at the ____ layer of the OSI model

Transport (layer 4)

Network and Session

Transport layer resides between which two other layers of the OSI model?

Port number 5061 is typically used for SIP traffic encrypted with Transport Layer Security (TLS)

True

The add. 192.168.2.1 with a subnet mask of 255.255.255.0 could be a host add. in a private network.

True

Port numbers in the range from 1024 to 49151 are referred as:

User ports Registered ports

A protocol used with VLANs that reduces admin effort and increases accuracy when multiple switches are used, by allowing one switch to propagate info to many other, is referred to as _____

VLAN Trunking Protocol (VTP)

Attacking a network by posing as a trunked interface is an example of

VLAN hopping

_____ are logical subnets that are formed using switches.

VLANs (virtual local area networks)

A _____ is a secure connection that is transmitted through a nonsecure medium, usually the internet.

VPN (virtual private network)

A device that is used specifically to create a tunnel for communication through an inherently unsecure medium is a _____.

VPN concentrator.

A ____ ____ ____ is a used to connect computers using wireless NICs to a wired network

WAP (wireless access point)

Ports between 0 and 1023 are known as:

Well-known ports System ports

You can view the ARP cache on computer by typing ____ on a command line.

arp -a

In the acronym, ASDL when referring to a digital subscriber line, the letter A stands for _____

asymmetric

____ ____ ____ uses 53-byte cells rather than variable-length packets.

asynchronous transfer mode (ATM)

Sophisticated authentication methods that rely on body measurements such as fingerprints, hand prints, and voice prints, retina scans, and so on are types of ____ authentication.

biometric

____ ____ is a tech whereby a single channel is opened at the start of a session and that single channel is used throughout the communication.

circuit switching

An interference caused by wires that run parallel to each other and not twisted together is called _____ .

crosstalk

The networking tech that defines standards for controlling data and that is defined by the IEEE 802.3 standard is

ethernet

ST and SC are both type of ____ connectors.

fiber-optics

A ____ is a hardware device and/or software package that prevents packets from flowing through an interface form one network to another unless they meet a specified criterion.

firewall

RJ-45 connectors can contain up to ____ pairs of wires

four

Whereas IPv4 addresses are formatted in dotted decimal, IPv6 addresses are formatted in

hexadecimal

A device that poses as a server with sensitive data to distract or even trap an attacker is referred to as a ______ .

honeypot

If you are installing cables in between the ceiling tiles of a building, you may be required by a law to use a special type of cable called a _____ cable.

plenum

A _____ service makes a connection to the internet on behalf of a user.

proxy

A WAP in an org. that was not installed by the admin team of that org is referred to as a

rogue access point

____ are Layer 3 devices that can move packets from one subnet to another.

routers

A situation that allows current to flow on a different path than was oringinally intended in the circuit is a(n) _____ ____

short circuit

A device that can be installed into a network with pre-configurations of normal network traffic so that it can determine what is normal and block or even terminate sessions when something is not normal is a ____ ____ .

signature-based IPS

_____-mode fiber is used for very high-speed, very high-distance network apps.

single

NTP is an Application layer that synchronizes _____ between computers on a network.

time

In the media-testing duo referred to as the fox and hound, the hound is actually a _____ and a _____ .

tone generator tone locator

The ____ tool works like the ping tool, but it can be used to determine which router is not able to forward a packet.

tracert

VLANs use special ports between switched called _____ .

trunks

A packet that has one source add. and one destination add. is referred to as a ____

unicast

traceroute

A Linux command line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as:

Router

A device designed to filter and transfer data packets between different types of computer networks is called:

TTL

A field in an IP datagram that specifies how many more hops a packet can travel before being discarded is called:

True

A loopback interface on a router provides the means for basic testing whether the router is on and operational.

traceroute6 traceroute -6

A network command line utility in Linux that tracks and displays the route taken by IPv6 packets on their way to another network node is known as: (Select 2 answers)

tracert

A network command line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called:

Routing table

A set of rules stored on a Layer 3 switch or a networked host that allows to determine the topology of the surrounding network is commonly referred to as:

Route aggregation

A solution used to optimize and decrease the size of a routing table is known as:

Layer 3

At which of the OSI layers IP addressing takes place?

True

Autonomous System Number (ASN) is a globally unique number allocated for a collection of networked systems that operate common routing protocols and are under control of a single administrative authority.

62

How many usable IP addresses can be assigned to hosts on a /26 subnet?

RIPv2 OSPF IS-IS

Examples of interior gateway routing protocols include: (Select all that apply)

OSPF IS-IS

Examples of link-state routing protocols include: (Select 2 answers)

ifconfig

What is the name of a Linux command line utility that can be used to display TCP/IP configuration settings?

Hop count

In computer routing, a rough measure of distance between two networked hosts is commonly referred to as:

Data link layer

In the OSI model, Media Access Control (MAC) and Logical Link Control (LLC) sublayers are the components of:

Transport layer Layer 4

In the OSI model, Transmission Control Protocol (TCP) resides at: (Select all that apply)

Data link layer

In the OSI model, physical addressing takes place at the:

Layer 5

In the OSI model, session layer is also known as:

Network layer of the OSI model

Internet Protocol Security (IPsec) resides at:

Which type of security device or software employs a redirection device known as honeypot?

Intrusion Prevention System (IPS)

Application layer

OSI layer 7 is also referred to as:

Layer 1

Physical layer of the OSI model is also referred to as:

Layer 3 of the OSI model Network layer of the OSI model

Routers operate at: (Select two answers)

False

Routing Information Protocol (RIP) is an example of a link state routing protocol.

Executing the ping command in a loop

The -t switch in the MS Windows' ping utility is used for:

All routers have finished updating their routing tables

The term "Convergence state" refers to a situation where:

True

The term "Default route" refers to the network path used by a router for forwarding all packets with destination addresses not listed in its routing table.

Exterior Gateway Protocol (EGP) Hybrid routing protocol

What are the characteristic features of the Border Gateway Protocol (BGP)? (Select 2 answers)

ping host1 -6 ping -6 host1

What is the correct syntax for checking the IPv6 connectivity with another network node (host1) in MS Windows? (Select 2 answers)

255.248.0.0

What is the do-tdecimal representation of a /13 subnet mask?

Bit

What is the name of a data unit used at the OSI physical layer?

Sessinon layer

Which OSI layer assumes responsibility for managing network connections between applications?

Transport layer

Which OSI layer is responsible for breaking up data into segments?

arp -a

Which command in MS Windows displays a table consisting of IP addresses and their resolved Ethernet or Token Ring physical addresses?

-b

Which netstat parameter allows to display the names of applications and executable file components that are accessing the network?


Related study sets

BIO 201 NERVOUS SYSTEM TEST PRACTICE

View Set

Lesson 7/Chapter 20: The Lymphatic System

View Set

Drugs & Society Module 3- Stimulants

View Set

Lower Limb: Lesson 12 & 13 (Critique - Knee & Distal Femur)

View Set

UCA African American Cinema Final

View Set

Chapter 2 Smartbook Questions -- Finance

View Set

Mutations and Chromosomes part 1

View Set