Network+ Scenairos

Ace your homework & exams now with Quizwiz!

How many DS0s are used in a T1? A. 24 B. 30 C. 23 D. 31

A. 24

Which of the following can an application layer firewall filter that a network layer firewall cannot? A. HTTP URLs B. Telnet traffic C. ICMP D. HTTP traffic

A. HTTP URLs

Which of the following network security devices prevents users from propagating viruses? A. IPS B. Firewall C. IDS D. Content engine

A. IPS

IPSec is defined at what layer of the OSI model? Network Physical Layer 4 Layer 7

A. IPSec works at the Network layer of the OSI model (Layer 3) and secures all applications that operate above it (Layer 4 and above). Additionally, because it was designed by the IETF and designed to work with IPv4 and IPv6, it has broad industry support and is quickly becoming the standard for VPNs on the Internet.

Which of the following are forms of gigabit Ethernet that require the use of fiber optic cables? (Select THREE). A. 1000Base-T B. 1000Base-SX C. 1000Base-LX D. 10Base-T E. 1000Base-TX F. 1000Base-CX

B. 1000Base-SX C. 1000Base-LX F. 1000Base-CX

Which of the following cable types is typically used to connect a hub to a hub that does not support MDI-X? A. Straight B. Loopback C. Crossover D. Rollover

C. Crossover

Which of the following protocols provides the actual encryption used over VPN? A. PPP B. HTTPS C. PPTP D. SSH

C. PPTP

Which of the following protocols provides a secure method to remotely administer a server? A. HTTP B. SFTP C. SSH D. Telnet

C. SSH

Which of the following is a demarcation device for T1 circuits with the ability to run diagnostics when remotely activated? A. 66 block B. Demarcation extension C. Smart jack D. 110 block

C. Smart jack

Which of the following WAN technologies provides a 45Mbps circuit over TDM equipment? A. SONET B. E3 C. T3 D. OC-12

C. T3

Which of the following command line tools would BEST be used to verify DNS functionality? A. netstat B. traceroute C. dig D. arp

C. dig

Which of the following is the default port for SMTP? A. 443 B. 21 C. 110 D. 25

D. 25

Which of the following tools enables the technician to trace cables in multiple pair wiring? A. Cable tester B. Multimeter C. Butt set D. Toner probe

D. Toner probe

You have implemented and tested a solution and identified any other effects the solution may have, what is your next step? Create an action plan Close the case and head home for the day Reboot the Windows server Document the solution

Document the solution

What device is an example of an Ethernet technology implemented as a star topology?

Hub

568B wiring starting with Pin 1

Orange/White, Orange, Green/White, Blue, Blue/White, Green, Brown/White, Brown o-O-g-B-b-G-br-BR

You need to power a device, such as an access point or IP phone. What protocol can provide power to these devices over an Ethernet cable?

Power over Ethernet (PoE)

Which UNIX command is used for terminal emulation in the same way Telnet is used?

The UNIX command rlogin functions similarly to Telnet.

Why would we use WPA instead of basic WEP?

The values of WPA keys can change dynamically while the system is used.

What are two purposes for segmentation with a bridge? To add more broadcast domains To create more collision domains To add more bandwidth for users To allow more broadcasts for users

To create more collision domains To add more bandwidth for users Bridges and switches break up collision domains, which allow more bandwidth for users.

What does 802.1q define

Virtual LANs

What software application can help automatically ensure that your Windows-based computers have the most current security patches?

Windows Update

If you need to connect two PCs directly together using their network adapters, what type of cable do you need?

crossover cable

How many non‐overlapping channels are available with 802.11a? 3 12 23 40

23

How wide are the channels used in 802.11n in order to gain the large bandwidth that the specification provides? 22MHz 20Mhz 40Mhz 100Mhz

40Mhz

Which of the following is the maximum transmission distance of 10GBase-LR? A. 6 miles (9.7 kilometers) B. 25 miles (40 kilometers) C. 512 miles (824 kilometers) D. 1,024 miles (1648 kilometers)

A. 6 miles (9.7 kilometers)

221.17.101.223/28 is an example of which kind of notation? A. CIDR B. DNS C. Port Number D. ARP

A. CIDR

Which of the following authentication protocols uses certificates to negotiate access to the network? A. EAP-TLS B. PAP C. CHAP D. Kerberos

A. EAP-TLS

You are using a TDR. Which three of the following actions can you do with this device? Estimate cable lengths Find splice and connector locations and their associated loss amounts Display unused services Define cable‐impedance characteristics

A. Estimate cable lengths B. Find splice and connector locations and their associated loss amounts D. Define cable‐impedance characteristics Due to sensitivity to any variation and impedance to cabling, answers A, B and D are all reasons you'd use a TDR.

A network administrator is configuring a network with a dynamic routing protocol. Which of the following would support equal cost load balancing and have all routers contain the same topology view? A. OSPF B. IGRP C. RIP D. BGP

A. OSPF

PPTP is a combination of which of the following protocols? (Select TWO). A. PPP B. POP3 C. PPPoE D. TCP E. TCP/IP

A. PPP E. TCP/IP

Which of the following data is included in a wireless access points beacon frame? A. SSID and MAC address B. IP and MAC address C. SSID and WEP key D. Channel and WEP key

A. SSID and MAC address

Which of the following items changes the encryption key on a users session after a set period of time? A. TKIP B. AES C. RADIUS D. WEP

A. TKIP

Using a routing table, which of the following routes will be selected MOST frequently? A. The lowest administrative distance B. The highest administrative distance C. The BGP route D. The one with the greatest number of hops

A. The lowest administrative distance

What are the three switch functions at Layer 2?

Address learning forward/filter decisions loop avoidance

What are the distinct functions of Layer 2 switching that increase available bandwidth on the network? (Choose three.) Address learning Routing Forwarding and filtering Creating network loops Loop avoidance IP addressing

Address learning Forwarding and filtering Loop avoidance

What type of scan can be done by an antivirus program? Emergency In-demand On-access All of the above

All of the above

Which application would a voltage event record be used for? Voltage recording Distortion measurement Flicker measurement Capturing voltage transients All of the above

All of the above

Which of the following Ethernet unshielded twisted‐pair (UTP) cables types is most commonly used? 10Base‐T 100Base‐TX 1000Base‐TX All of the above

All of the above

Which of the following is a tunneling protocol? Layer 2 Tunneling Protocol (L2TP) Internet Protocol Security (IPSec) Secure Sockets Layer (SSL) All of the above

All of the above

Which of the following Ethernet technologies has the shortest transmission distance? A. 10Base-T B. 10GBase-T C. 100Base-T D. 10GBase-SR

B. 10GBase-

Which of the following is the maximum segment distance of a 100Base-FX network? A. 100 meters (328 feet) B. 2,000 meters (6,561 feet) C. 1,024 meters (3,359 feet) D. 1,023 meters (3,356 feet)

B. 2,000 meters (6,561 feet)

When connecting two devices for voice on a vertical connect, which of the following cables would be used to connect the two devices? A. Cross-connect wire B. 25 pair cable C. CAT3 D. CAT5

B. 25 pair cable

Which of the following is the maximum distance a 10GBase-EW connection can transmit with one repeater? A. 10,000 meters (32,808 feet) B. 80,000 meters (262,467 feet) C. 20,000 meters (65,616 feet) D. 40,000 meters (131,233 feet)

B. 80,000 meters (262,467 feet)

Which of the following TCP connect scanners is always set for normal data flow once a connection is established? A. TCP B. ACK C. SYN D. RSH

B. ACK

Which of the following would be an appropriate use of an EGP? A. Unequal cost load balancing over a switched network. B. Advertising a /24 to an upstream provider. C. Periodic updates to neighbors on the LAN. D. Routing between VLANs on an Ethernet network.

B. Advertising a /24 to an upstream provider

A network technician is installing a series of three access points to cover the entire wing of a building. Only one access point has a wired connection. 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points? A. Channels 1-3-5 B. Channels 6-6-6 C. Channels 7-11-1 D. Channels 5-5-5

B. Channels 6-6-6

A corporate network has grown and manual monitoring of the network devices are no longer feasible. Which of the following would provide central logging for all devices with message priority levels? A. Install a new server with remote terminals open to monitor equipment. B. Install a syslog server and configure the network devices to send log messages to it. C. Install a SNMP polling server to monitor and collect logs on equipment. D. Install a protocol analyzer to monitor traffic logs.

B. Install a syslog server and configure the network devices to send log messages to it.

Ensuring that data is transmitted securely over an IP network is the main purpose of: A. FTP. B. TLS. C. Telnet. D. SIP.

B. TLS.

A user has plugged a computer into a switch port and now is unable to access any server resources on the network. Which of the following are the MOST likely reasons for the access problem? (Select TWO). A. The spanning tree protocol has locked down the port. B. The computer is connected to a port in the wrong VLAN. C. The appropriate credentials have not been supplied for network access. D. A port mirroring session was started and is interfering with the connection. E. The computer is connected to an incorrect PoE port.

B. The computer is connected to the wrong VLAN port C. The appropriate credentials have not been supplied for network access.

A computer is not able to connect to the network. The link light on the NIC is not illuminated. Which of the following should the technician do FIRST? A. Reinstall NIC drivers with the most current drivers. B. Verify network cable connectivity. C. Replace the NIC card with a known good NIC card. D. Check to make sure that the port on the switch is working properly.

B. Verify network cable connectivity.

The below output is from which of the following utilities? Interface: 172.30.0.104 --- 0x2 Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic 172.30.0.254 00-30-48-82-65-0e dynamic A. ping B. arp C. nbtstat D. netstat

B. arp

This device uses hardware addresses to filter a network

Bridge or Switch

Which of the following is the maximum hop count for RIPv2? A. 18 B. 10 C. 16 D. 17

C. 16

.A network technician is implementing new wireless access points in an existing wireless infrastructure. The security is the WPA 2 standard. Which of the following encryption methods may not be compatible with the previously installed access points? A. TKIP B. 3DES C. AES D. CHAP

C. AES

Which of the following WAN layer two protocols would be BEST suited for a full mesh topology? A. PPP B. ATM C. MPLS D. Frame-relay

C. MPLS

Which of the following would be used to connect a vertical cross connect when using data connections? A. 110 blocks B. Demarc extension C. Patch panel D. 66 blocks

C. Patch panel

A VoIP telephone with a built-in hub is plugged into a single network using both the hub port and the telephone port. The network begins to experience severe lag due to a significant increase in traffic. Which of the following features would help to prevent this from occurring in the future? A. Port mirroring B. VLANS C. Spanning tree D. Trunking

C. Spanning tree

Which of the following commands is used to provide the output below in a Windows environment? 1 * * * Request timed out. 2 * * * Request timed out. 3 * * * Request timed out. A. nbtstat B. netstat C. tracert D. ping

C. tracert

What cable issues should you know and understand for network troubleshooting?

Collisions Crosstalk Shorts Attenuation Interference Open impedance mismatch

A network administrator is summarizing the following IP address ranges into a single route for redistribution into the network core: 192.168.0.0 /24 192.168.1.0 /24 192.168.2.0 /24 192.168.3.0 /24 Which of the following IP summary addresses will represent the listed network ranges without including any ranges not listed? A. 192.168.0.0 /21 B. 192.168.0.0 /23 C. 192.168.0.0 /16 D. 192.168.0.0 /22

D. 192.168.0.0 /22

An RJ-11 connector is capable of having up to how many pins? A. 8 B. 2 C. 4 D. 6

D. 6

Given the following routing table entries, which of the following will the next-hop address be for a packet destined for the address 192.168.1.203? Network Address Subnet Mask Next Hop Address 0.0.0.0 0.0.0.0 77.0.5.5 192.168.0.0 255.255.0.0 66.40.90.121 192.168.1.0 255.255.255.0 72.40.91.1 192.168.1.0 255.255.255.127 40.40.0.254 A. 40.40.0.254 B. 66.40.90.121 C. 77.0.5.5 D. 72.40.91.1

D. 72.40.91.1

Which of the following documentation would a network administrator need to update if they have just finished upgrading the firmware on all the switches within the LAN? A. Wiring schematics B. Logical network diagram C. Physical network diagram D. Baseline and configuration documentation

D. Baseline and configuration documentation

Which of the following equipment would allow for routing based on logical addresses? A. Layer 2 hub B. Layer 2 switch C. Layer 1 NIC D. Layer 3 switch

D. Layer 3 switch

Which of the following cables would a technician make in order to identify a physical interface problem? A. Serial B. Rollover C. Console D. Loopback

D. Loopback

Which of the following would be used to relocate a T1 closer to the switch for connectivity? A. Patch panel B. 25 pair cable C. Demarc extension D. Smart jack

D. Smart jack

A new laptop has been purchased with an 802.11n wireless card. The laptop will not connect to their existing 802.11a network. Which of the following is MOST likely the reason the laptop will not connect? A. The laptop is too far from the existing network B. Interference C. Wrong SSID is being used D. Standard mismatch

D. Standard mismatch

Ethernet is defined at these layers

Data Link and Physical

QoS methods focus on one of five problems that can affect data

Delay Data Dropped packets Error Packets Out-of-order delivery Jitter

The SYN floods and Smurf are examples of what types of attack?

Denial of service (DoS)

Is BGP considered link state or distance vector?

Distance vector

You are troubleshooting a LAN switch and have identified the symptoms. What is the next step you should take? Escalate the issue Create an action plan Implement the solution Determine the scope of the problem

Escalate the issue

You have one serial port on your router but need to connect many remote sites. What WAN protocol could you consider as an option?

Frame Relay. Although Frame Relay is not available in many markets today, it is a possible solution for the problem presented.

Know the nine troubleshooting steps, in order

Gather information - identify symptoms and problems. Identify the affected areas of the network. Determine if anything has changed. Establish the most probable cause. Escalation if necessary. Create an action plan and solution, identifying potential effects. Implement and test the solution. Identify the results and effects of the solution. Document the solution and the entire process.

Which encryption protocol works with both IPv4 and IPv6?

IPSec

Spreading network traffic across multiple connections is called___________________.

Load balancing

Which WAN technologies are considered circuit‐switching networks?

Modems (PSTN/POTS) and ISDN

Optical Carrier Levels OC-1 OC-3 OC-12 OC-48 OC-192

OC-1 - 51.84Mbps OC-3 - 155.52Mbps OC-12 - 622.08Mbps OC-48 - 2.488Gbps OC-192 - 9.953Gbps

The two different types of virus scans are ___________________.

On-demand and on-access Click to flip

What are requirements imposed on the way you manage your network called?

Regulations

What are the types of xDSL?

SHAV V2, VH SDSL HDS ADSK VDSL VDSL2 or VHDSL

Which encryption protocol or standard allows you to create a virtual subnet on an intranet?

SSL VPN

Which type of routing would you configure on a router if you needed to use as little router overhead and CPU processing as possible?

Static routing

At which layer is routing implemented, enabling connections and path selection between two end systems?

The Network layer provides routing through an internetwork and logical addressing.

Basic IP routing process

The frame changes at each hop but that the packet is never changed or manipulated in any way until it reaches the destination device.

What is the best explanation for a DMZ? To separate a security zone for an IPS and IDS server To create a security zone for VPN terminations To create a security zone that allows public traffic but is isolated from the private inside network To create a security zone that allows private traffic but is isolated from the public network

To create a security zone that allows public traffic but is isolated from the private inside network

Which application-layer protocols are secure

SSH HTTPS SFTP SNMPv3

If data from one of your subnets should be restricted from entering another subnet, the subnets should be configured as different ___________________.

Security zones

A workstation presents an error message to a user. The message states that a duplicate IP address has been detected on the network. After establishing what has changed in the network, what should be the next step using the standard troubleshooting model? Test the result. Select the most probable cause. Create an action plan. Identify the results and effects of the solution.

Select the most probable cause.

Eight Levels of QoS

0 Best effort 1 Background 2 Standard (spare) 3 Excellent load (business‐critical applications) 4 Controlled load (streaming media) 5 Voice and video (interactive voice and video, less than 100ms latency and jitter) 6 Layer 3 Network Control Reserved Traffic (less than 10ms latency and jitter) 7 Layer 2 Network Control Reserved Traffic (lowest latency and jitter)

The default administrative distance of a static route is?

1

586B uses which pins to make a connection?

1 to 3 and 2 to 6

What is the Class C range of values for the first octet in decimal and in binary?

192-223, 110xxxxx.

In a class C IP address, how long is the network address? 8 bits 16 bits 24 bits 32 bits

24 bits

Which of the following are the IEEE version of STP? (Choose 2) 802.1x VLANs 802.1d 802.11 802.1w

802.1d 802.1w 802.1d and 802.1w are both IEEE STP versions, with 802.1w being the latest and greatest version

Which network-access security method is commonly used in wireless networks?

802.1x 802.1X defines the encapsulation of the Extensible Authentication Protocol (EAP) over 802 which is known as "EAP over LAN" or EAPOL. 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.

What is the maximum distance of 10GBase‐SR? 100 meters (328 feet) 302 meters (990 feet) 305 meters (1000 feet) 1593 km (6 miles)

A 10GBase‐SR cable can have a maximum distance of 990 feet (302 meters).

Will a computer that shares no resources most likely be connected to the backbone or to a segment?

A segment

802.11n uses MIMO. How does this optimize throughput to gain the high speed advantage that 802.11n provides? By specifying an acknowledgment of each and every frame, 802.11n provides better overhead. Several frames are sent by several antennae over several paths and are then recombined by another set of antennae. One frame at a time is sent, but faster than in 802.11g because multiple antennas are used (multiple‐in, multiple‐out). MIMO packs smaller packets into a single unit, which improves throughput.

Several frames are sent by several antennae over several paths and are then recombined by another set of antennae.

What is the difference between a stateful and stateless firewall

A stateless firewall examines each packet individually and does not track existing states.

You need to create a cable that will connect your host to a wall jack connection. Which of the following will you use? IDS/IPS Snips Cable strippers Multimeter

Snips

Users are reporting that they can access Internet web pages but cannot access the internal company website. Which of the following is the MOST likely source of the problem? A. The intranet server is down. B. The intranet DNS entry is non-authoritative. C. The DNS address handed out by DHCP is incorrect. D. The default gateway is incorrect.

A. The intranet server is down.

A network administrator needs to filter unwanted packets when implementing the companies' security policies. What should be implemented to help exercise control over future network traffic? Access control list (ACL) Proxy server Intrusion Prevention System VPN concentrator

Access control list (ACL)

In computer security, what does AAA stand for?

Authentication, authorization, and accounting

You have upgraded the firmware on your switches and access points. What documentation do you need to update? Baselines and configuration documentation Physical network diagram Logical network diagram Wiring schematics

Baselines and configuration documentation

Monkey B, Michelangelo and Stoned are examples of which type of virus? IP spoofing Multipartite Macro Boot sector

Boot sector

What kind of attack could a hacker use to target a network that tries to log in to some type of shared network resource? Packet sniffers Brute-force attack Worm Backdoor

Brute-force attack

Which of the following are types of flow control? (Choose all that apply.) Buffering Cut‐through Windowing Congestion avoidance VLANs

Buffering Windowing Congestion avoidance The common types of flow control are buffering, windowing, and congestion avoidance.

Which of the following IEEE standards describes the power output of a standard switch port? A. 802.3ab B. 802.3ae C. 802.3af D. 802.3aa

C. 802.3af

Which of the following devices can be remotely looped for troubleshooting purposes? A. A 66 block B. A 110 block C. A smart jack D. A patch panel

C. A smart jack

Which of the following documentation would a network administrator refer to discover a rogue WAP? A. Wiring schematics B. Policies C. Baseline D. Regulations

C. Baseline

Which of the following access methods is used for wireless medium access? A. CSMA/CD B. PPPoE C. CSMA /CA D. PPTP

C. CSMA /CA

There are two networks sharing the same office space. One network already has an 802.11g access point. The second network acquires one as well. If known, which of the following would help keep the two networks from interfering with each other? A. Encryption type B. Pre-shared key C. Channel D. WEP key

C. Channel

Which UTP wiring uses four twisted wire pairs (eight wires) and is rated for 250MHz?

Category 6

A router receives a packet with a destination address 72.44.69.254. However, no entry in the routing table exists for the network. Which of the following actions will the router take? A. The packet will be queued while the router queries for an acceptable path to the destination. B. The packet will be dropped as non-routable. C. The packet will be forwarded out until another router forwards the packet. D. The packet will be forwarded to the next hop address of the default route.

D. The packet will be forwarded to the next hop address of the default route.

Which of the following is found in a layer two switch? A. SSID settings B. Routing protocols C. DNS zones D. VLAN settings

D. VLAN settings

A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords? A. WPA TLS B. 64-bit WEP C. 128-bit WEP D. WPA PEAP

D. WPA PEAP

Which spread‐spectrum technology does the 802.11b standard define for operation? IR DSSS FHSS DSSS and FHSS IR, FHSS, and DSSS

DSSS

Which WAN technologies are considered packet‐switching networks?

Frame‐Relay and X.25

Which application layer protocols are not secure

HTTP FTP rsh (remote shell) rcp (remote copy protocol) SNMP1 SNMP2

IP resides at which layer of the OSI model? Application Transport Data Link Network Physical

IP is a Network-layer protocol. You are thinking ot TCP which is Transport

In which two states is the MAC address table populated with addresses? Blocked Listening Learning Forwarding

Learning Forwarding

What does 802.1d define

MAC Bridges standard which includes Bridging, Spanning Tree and others.

Which WAN protocol can carry traffic from both circuit-switching and packet-switching clients?

MPLS

Logical addressing is used at this layer

Network

APs come set up with what type of security enabled by default?

None

Which is not a routing protocol? RIP RIPv2 RIPv3 EIGRP

RIPv3 RIP, RIPv2, and EIGRP are all examples of routing protocols.

What does 802.1w define

Rapid Spanning Tree Protocol (RSTP)

T-Series Speeds T1 T1C T2 T3 T4

T1 - 1.544Mbps (E1 - 2.048Mbps) T1C - 3.152Mbps T2 - 6.312Mbps T3 - 44.736Mbps (E3 - 34.368Mbps) T4 - 274.176Mbps

Which of the following can check the speed and condition of the signal on a cable as well as measure the time it takes to send a signal down the wire and back? Multimeter TDR Tone generator event recorder

TDR

What does Extended Service Set ID mean (ESS)? That you have more than one access point, and they are in the same SSID connected by a distribution system That you have more than one access point, and they are in separate SSIDs connected by a distribution system That you have multiple access points, but they are placed physically in different buildings That you have multiple access points, but one is a repeater access point

That you have more than one access point, and they are in the same SSID connected by a distribution system

Users are reporting that they can access the internet but not the internal company website. Which of the following is the most likely problem? The DNS entry for the server is non‐authoritative The intranet server is down The DNS address handed out by DHCP is incorrect The default gateway is incorrect

The DNS entry for the server is non‐authoritative

The OSI model uses an encapsulation method to describe the data as it is encapsulated at each layer of the OSI. What is the encapsulation named at the Data Link layer? Bits Packets Frames Data Segments

The Data Link layer is responsible for encapsulating IP packets into frames and for providing logical network addresses.

Segmentation of a data stream happens at which layer of the OSI model? Physical Data Link Network Transport

The Transport layer receives large data streams from the upper layers and breaks these up into smaller pieces called segments

The states of STP

The blocking state prevenst the use of looped paths. The listening state prepares to forward data frames without populating the MAC address table. The learning state populates the MAC address table but doesn't forward data frames. The forwarding state sends and receives all data frames on the bridged port. The disabled state is virtually nonoperational.

Which routing protocol has a maximum hop count of 15? RIPv1 IGRP EIGRP OSPF

The distance‐vector protocols RIPv1 and RIPv2 both have a maximum hop count of 15 (remember, 16 is unreachable). IGRP and EIGRP have a hop count of 255, and OSPF doesn't have a maximum hop count.

Which is not an advantage of network segmentation? Reduced congestion Improved security Containing network problems Preventing broadcast storms

The first 3 options all aid in boosting network performance, so the only option left is broadcast storms. Increased traffic will increase LAN congestion

What is the valid range of values that may appear in an IPv4 octet? Give your answer in decimal as well as binary.

The range of values that an IPv4 octet can take on is 0 through 255 in decimal, which stems from the values 00000000 through 11111111 in binary.

What types of threats can adversely affect your network?

Threats include: denial of service attacks viruses worms rogue access points phishing various other attack methods employed by hackers

Which of the following allows a server to distinguish among different simultaneous requests from the same host? They have different port numbers. A NAT server changes the IP address for subsequent requests. A server is unable to accept multiple simultaneous sessions from the same host. One session must end before another can begin. The MAC address for each one is unique.

Through the use of port numbers. TCP and UDP can establish multiple sessions between the same two hosts without creating any confusion. The sessions can be between the same or different applications, such as multiple web‐browsing sessions or a web‐browsing session and an FTP session

Two examples of high-bandwidth applications

Voice over IP (VoIP) and real-time video streaming

What types of services can firewalls provide

scanning services signature identification security zones. and content filtering

How many bits is a MAC address? 16 32 48 64

48 bit (6-byte)

Which of the following authentication protocols uses plain text to transmit passwords over the internet? A. RADIUS B. PAP C. CHAP D. Kerberos

B. PAP

A technician is extending a data circuit to the other side of the building. Which of the following would the technician set up at the new location? A. EMI B. MDF C. IDF D. ESD

C. IDF

Which of the following is the FIRST criterion used to select a next hop from the routing table? A. Lowest administrative distance B. Greatest number of hops C. Most precise matching prefix D. The BGP route

C. Most precise matching prefix

What is a proxy server and what types of proxying are common

A computer that makes and fulfills requests on behalf of another computer. Many firewalls can act as proxies. Common proxy services include IP proxy FTP proxy web proxy mail (SMTP) proxy.

Where can a DMZ be placed

A demilitarized zone (DMZ) can be located outside a firewall, connected directly to the Internet. However, it can also be placed after the firewall. You need to remember that it can be placed in either location.

A frame carries a packet to only two places

A frame uses MAC (hardware) addresses to send a packet on a LAN. The frame will take the packet to either a host on the LAN or a router's interface if the packet is destined for a remote network

You want to monitor your UPS systems and make sure they are functioning correctly. What device should you use?

A voltage event recorder

A user reports that they cannot access any network resources. Which of the following tools would a technician use to troubleshoot the problem? A. Cable tester B. TDR C. Certifier D. Butt set

A. Cable tester

In the OSI model, which of the following layers would be the cause of a session time-out while browsing the web? A. Layer 5 B. Layer 7 C. Layer 3 D. Layer 2

A. Layer 5

Which of the following documentations would a network technician find ports that a company has blocked? A. Policies, procedures and configurations B. Baseline reports C. Network wiring schematics D. RFC

A. Policies, procedures and configurations

A network administrator of a company has many branch locations each using a subnet mask of 255.255.255.224. Which of the following dynamic routing protocols should be used? A. RIPv2 B. IGRP C. IS-IS D. BGP

A. RIPv2

A network engineer for a company has issued the 10.44.210.0/24 network for a branch office. The network administrator for the branch has three separate VLANs for voice, workstations, and servers. There are approximately 50 end user workstations, 50 IP phones that require addressing, and a dozen servers. How should the network administrator use the block allocated to the branch? A. Subnet the block into /26s and assign one to each VLAN B. Do not subnet the block? use the /24 for all VLANs. C. The administrator must request more networks and use the networks given so far for the servers and workstation VLANs. D. Subnet the block into /25s and assign one to each voice and workstation VLANs.

A. Subnet the block into /26s and assign one to each VLAN

Which of the following is part of the TCP/IP protocol suite? A. UDP B. IPX C. NetBEUI D. SPX

A. UDP

Which of the following describes a broadcast address? All network bits are on (1s). All host bits are on (1s). All network bits are off (0s). All host bits are off (0s).

All host bits are on (1s).

Which is a tool of network scanners? Packet sniffers IDS/IPS software Port scanners All of the above

All of the above

IPv6 uses multiple types of addresses. Which of the following would describe an anycast address used by an IPv6 host? Communications are routed to the most distant host that shares the same address. Packets are delivered to all interfaces identified by the address. This is also called one‐to‐many addressing. This address identifies multiple interfaces, and the anycast packet is only delivered to one address. This address can also be called one‐to‐one‐of‐many.

Anycast is a new type of communication that replaces broadcasts in IPv4. Anycast addresses identify multiple interfaces, which is the same as multicast; however, the big difference is that the anycast packet is delivered to only one address: the first one it finds defined in the terms of routing distance. This address can also be called one‐to‐one‐of‐many.

Which layer of the OSI model do software firewalls operate in? (Choose all that apply.) Application Presentation Physical Network

Application Network

A company requires a hub and spoke WAN solution. Which of the following are BEST suited to meet this need? (Select THREE). A. ISDN B. MPLS C. ADSL D. SONET E. Frame-relay F. ATM G. DOCSIS

B. MPLS E. Frame-relay F. ATM

Which of the following routing protocols is a link state and uses a backbone called area 0? A. IS-IS B. OSPF C. BGP D. EIGRP

B. OSPF

A mail server was recently placed in the network. The users report email is slow. Upon closer inspection a technician notices that error counters on the interface are incrementing. Which of the following could be causing the problem? A. Wrong subnet mask B. Duplex mismatch C. Port speed mismatch D. Switch loop

B. Duplex mismatch

When connecting two devices for data on a vertical cross connect, which of the following cables would be used to connect those devices? A. CAT5e B. Fiber C. Coaxial D. CAT6

B. Fiber

Which of the following is an advantage of 100Base-FX over 100Base-TX? A. Faster transmission speeds B. Longer cable runs C. Uses a more durable cable D. Ease of installation

B. Longer cable runs

Which of the following protocols are used in VoIP? (Select TWO). A. RDP B. RTP C. SSH D. SMTP E. SIP

B. RTP E. SIP

Which of the following WAN technologies would a technician find dense wavelength division multiplexing (DWDM)? A. T1 B. SONET C. ADSL D. ISDN

B. SONET

Everyday around lunch time there is network latency on the Windows proxyserver 10.1.1.7. Which of the following network utilities can a technician run in order to determine the severity of the latency? A. arp-t 10.1.1.7 B. ping-t 10.1.1.7 C. nbtstat -t 10.1.1.7 D. tracert -t 10.1.1.7

B. ping-t 10.1.1.7

The difference between 10Base-T and 100Base-T is: A. 100Base-T frames hold more data. B. shorter timing between Ethernet frames. C. 100Base-T requires STP cabling. D. smaller headers on Ethernet frames.

B. shorter timing between Ethernet frames

Two ports on switch A are connected to switch B. The advanced switch feature that allows these ports to be combined and managed as a single entity is called: A. port mirroring. B. trunking. C. VLAN. D. spanning tree.

B. trunking.

After adding a new cable segment to the network, the technician should: A. document the changes in the business continuity plan. B. update the wiring schematics. C. create a new baseline document. D. update the disaster recovery plan.

B. update the wiring schematics.

VLANs break up ________ domains in a Layer 2 switched network.

Broadcast

Which of the following WAN technologies uses thirty 64Kbps channels? A. ATM B. T-1 C. E-1 D. MPLS

C. E-1

Which of the following will allow certain ports to be part of the same group while other ports within that switch are part of a different group? A. Trunking B. Port authentication C. Enabling VLANs D. Enabling VTP

C. Enabling VLANs

A host is unable to communicate across a network. From the information below, which of the following is the cause of the issue? Host Name...........................: Test20 Primary Dns Suffix...............: abc.com Node Type............................: Unknown IP Routing Enabled...............: No WINS Proxy Enabled............: No DNS Suffix Search List.........: abc.com Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : Description...........................: Broadcom NetXtreme Ethernet Physical Address..: 00-00-00-15-A1-D0 Dhcp Enabled......................: No IP Address...........................: 10.0.37.144 Subnet Mask........................: 255.255.254.0 Default Gateway................. : 10.0.38.1 DNS Servers...................... : 10.0.36.5

C. Gateway IP is incorrect.

An active/passive server cluster in which only one server is active and handling requests, is an example of which of the following network performance optimization? A. Traffic shaping B. QoS C. High availability D. Load balancing

C. High availability

While analyzing the contents of the IP routing table in a router, the administrator notices the following routes in the table: PrefixNext-Hop IPInterface 192.168.1.0 /24172.16.31.1 Ethernet0 192.168.2.0 /24172.16.31.1 Ethernet0 172.16.31.0 /24 Directly Connected Ethernet0 0.0.0.0/0172.16.31.2 Ethernet0 Which of the following BEST describes what would occur if a packet from 192.168.1.4 were sent to 192.168.3.4? A. The packet will be dropped as there is no matching route in the IP routing table to reach the destination network B. An ICMP network unreachable message will be sent to 192.168.1.4 C. The packet will be forwarded to 172.16.31.2 D. The packet will be forwarded to 172.16.31.1 since the source IP address is in the 192.168.1.0/24 range

C. The packet will be forwarded to 172.16.31.2

A technician needs to change locations of a telephone between 66 blocks. Which of the following tools would be used in locating the positions in the cross connections? A. Butt set B. Cable tester C. Toner probe D. Voltage meter

C. Toner probe

A network technician is connecting through the console port to configure a switch. Which of the following ports would be used to transfer configuration files from the switch? A. TCP 110 B. UDP 67 C. UDP 69 D. TCP 69

C. UDP 69

Which of the following command and switch combination would provide the following output? Interface: 172.30.0.102 --- 0x2 Internet Address Physical Address Type 172.30.0.5 00-30-48-82-72-8c dynamic A. arp-s B. netstat -a C. arp-a D. netstat -s

C. arp-a

Which of the following features of a switch will allow two switches to pass network information? PoE VLANs Trunking STP

Trunking

What does trunking provide?

Trunking allows you to make a single port part of multiple VLANs at the same time

Which protocols can be used for tunneling and encryption of data

Tunneling and encryption protocols include IPSec L2TP SSL PPTP VPN

A system administrator is troubleshooting an application that is terminating frequently. Which of the following utilities can be used to determine the problem? A. Port scanner B. History log C. DNS log D. Application log

D. Application log

Which of the following network component interfaces with a Telco T1 line at the demarcation point? A. ISDN adapter B. Modem C. NIC D. CSU / DSU

D. CSU / DSU

A technician is setting up a wireless network using WEP and DHCP. The technician has set the channel and SSID on the client workstation. Which of the following is the remaining step to complete the configuration? A. Enter the username and password. B. Change the SSID. C. Enter an IP address for the client. D. Enter the encryption key.

D. Enter the encryption key.

Two small companies sharing a switch would MOST likely benefit from which of the following advanced switch features? A. Spanning tree B. Trunking C. PoE D. VLAN

D. VLAN

What role does the "A" record in a Domain Name Service (DNS) server have in your network? Translates human name to IP address Translates IP address to human name Enables printing, copying, and faxing from one device Controls network packets to optimize performance

DNS translates human names to IP addresses for routing your packet through the Internet.

What two pieces of information does a router require to make a routing decision? Destination network (address) Destination MAC address Application layer protocol Neighbor router

Destination network (address) Neighbor router A frame uses MAC addresses to send a packet on the LAN. The frame will take the packet to either a host on the LAN or a router's interface if the packet is destined for a remote network.

Which different user-authentication protocols are used on networks

EAP CHAP MS-CHAP PKI Kerberos Radius TACACS+ 802.1x - (EAP over LAN or EAPOL)

Which of the following protocols support VLSM, summarization, and discontiguous networking? (Choose three.) RIPv1 IGRP EIGRP OSPF BGP RIPv2

EIGRP OSPF RIPv2 RIPv1 and IGRP are true distance‐vector routing protocols and can't do much, really, except build and maintain routing tables and use a lot of bandwidth! RIPv2, EIGRP, and OSPF build and maintain routing tables, but they also provide classless routing, which allows for VLSM, summarization, and discontiguous networking.

You receive a call from a user who is having issues connecting to a new VPN. Which is the first step you should take? Find out what has changed Reboot the workstation Document the solution Identify the symptoms and potential causes

Identify the symptoms and potential causes

How a firewall determines which traffic can pass through it

Firewalls use access control lists (ACLs), which are sets of rules, to determine which traffic is allowed to pass through.

What common WAN topology often results in multiple connections to a single site, leading to a high degree of fault tolerance?

Mesh

What is the version or name of RIP that is used with IPv6?

RIPng (RIP next generation)

Which routing protocols have an administrative distance of 120? (Choose two.) RIPv1 RIPv2 EIGRP OSPF

RIPv1 & RIPv2 RIPv1 and RIPv2 have an AD of 120. EIGRP has an AD of 90. OSPF has an AD of 110 IGRP has a lower AD of 100

Which services allow you to remotely access computers across a network

Remote-access services and protocols include RAS RDP PPP PPPoE VNC ICA

What is the purpose of a port scanner? Scan UDP for closed ports Sweep TCP for closed ports Search the network host for open ports

Search the network host for open ports

Which type of firewall keeps track of existing connections passing through it?

Stateful

What are some of the problems that, if determined, should be escalated?

Switching loops routing loops routing problems Proxy ARP broadcast storms

What is the U.S. Department of Defense standard for individual computers?

TCS - Trusted computer system

You have just implemented a solution and you want to celebrate your success. But what should you do next before you start your celebration? Gather more information about the issue Document the issue and the solution that was implemented Test the solution and identify other effects it may have Escalate the issue

Test the solution and identify other effects it may have

Which layer chooses and determines the availability of communicating partners along with the resources necessary to make the connection, coordinates partnering applications, and forms a consensus on procedures for controlling data integrity and error recovery?

The Application layer is responsible for finding the network resources broadcast from a server and adding flow control and error control (if the application developer chooses).

You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be? (Choose two.) The router is not configured for the new host. The STP configuration on the switch is not updated for the new host. The host has an invalid MAC address. The switch port the host is connected to is not configured to the correct VLAN membership. The STP shut down the port

The switch port the host is connected to is not configured to the correct VLAN membership. The STP shut down the port Tthe best answers are that the VLAN membership for the port is configured incorrectly and that STP shut down the port.

Which statements are true regarding ICMP packets? (Choose two.) They acknowledge receipt of a TCP segment. They guarantee datagram delivery. They can provide hosts with information about network problems. They are encapsulated within IP datagrams. They are encapsulated within UDP datagrams.

They can provide hosts with information about network problems. They are encapsulated within IP datagrams. Internet Control Message Protocol (ICMP) is used to send error messages through the network, but ICMP does not work alone. Every segment or ICMP payload must be encapsulated within an IP datagram (or packet).

Which network-performance optimization technique uses a contract to determine which data can get on to the network?

Traffic Shapping

When is STP said to be converged? (Choose two.) When all ports are in the forwarding state When all ports are in the blocking state When all ports are in the Listening state When all ports are in the Learning state

When all ports are in the forwarding state When all ports are in the blocking state

There are several ways to manage traffic on your network to speed up access and in some cases guarantee available bandwidth to applications. These include?

traffic shaping load balancing high availability and using caching servers or QoS

Which of the following can run full-duplex and achieve 200Mbps with CAT5e cable? 100Base-TX 100Base-T 1000Base-F 1000Base-T

100Base-T uses CAT5e and can run 200Mbps when using full-duplex. 100Base-TX is only CAT-5, not CAT5e

The default administrative distance of RIP is

120

The default administrative distance of RIPv2 is

120

What is the maximum data rate of IEEE 802.11a? What is the maximum data rate of IEEE 802.11b? What is the maximum data rate of IEEE 802.11g? What is the maximum data rate of IEEE 802.11n? What is the frequency range of IEEE 802.11a? What is the frequency range of IEEE 802.11b? What is the frequency range of IEEE 802.11g? What is the frequency range of IEEE 802.11n?

54Mbps 11Mbps 54Mbps 300Mbps 5GHz 2.4GHz 2.4GHz 2.4GHz/5GHz

The default administrative distance of EIGRP is

90

What happens when a router receives a packet for a network that isn't listed in the routing table? It forwards the packet to the next available router. It holds the packet until the address is updated in the routing table. The router will use RIP to inform the host that it can't send the packet. None of the above

A router will not send a broadcast looking for the remote network—the router will discard the packet.

Which is true regarding EIGRP successor routes? Successor routes are saved in the neighbor table. Successor routes are stored in the DUAL table. Successor routes are used only if the primary route fails. A successor route is used by EIGRP to forward traffic to a destination.

A successor route is used by EIGRP to forward traffic to a destination.

Which of the following are WAN protocols or technologies? (Choose all that apply.) ATM ISDN MPLS RIP

A. ATM B. ISDN C. MPLS Routing Information Protocol (RIP) is not a WAN protocol, but a routing protocol used in local area connections.

If you are running half-duplex Internet, which of the following is true. (Choose all that apply)? Your digital signal cannot transmit and receive data at the same time. Hosts use the CSMA/CD protocol to prevent collisions. The physical connection consists of one wire pair. All of the above

All of the above With half-duplex, you are using one wire pair with a digital signal either transmitting or receiving (but not both at once). Carrier Sense Multiple Access with Collision Detection (CSMA/CD) helps packets that are transmitted simultaneously from different hosts share bandwidth evenly.

Which of the following describes MIMO correctly? A protocol that requires acknowledgment of each and every frame A data‐transmission technique in which several frames are sent by several antennae over several paths and are then recombined by another set of antennae A modulation technique that allows more than one data rate A technique that packs smaller packets into a single unit, which improves throughput

B. Part of the 802.11n wireless standard, MIMO sends multiple frames by several antennae over several paths; they are then recombined by another set of antennae to optimize throughput and multipath resistance. This is called spatial multiplexing.

A workstation gives an error message to a user. The message states that a duplicate IP address has been detected on the network. After developing a hypothesis, what should the next step be according to the standard troubleshooting model? Test and observe an action plan. Determine if anything has changed. Implement an action plan. Document the solution and the entire process.

C. Creating an action plan and a solution, and identifying the potential effects, would be the next step according to the standard troubleshooting model.

Which UTP uses four twisted wire pairs (eight wires), is rated for 100MHz, and is capable of handling the disturbance on each pair caused by transmitting on all four pairs at the same time?

Category 5e

What is the version or name of EIGRP that is used with IPv6?

EIGPRv6

What is the administrative distance of OSPF? 90 100 110 120

EIGRP is the lowest, at 90 IGRP has a lower AD of 100 OSPF has an AD of 110 RIPv1 and RIPv2 both have an AD of 120

If a frame is received on a switch port and the source MAC address is not in the forward/filter table, what will the switch do?

Flood the frame out all ports except the port it was received on

A cross-over cable is used to connect all of the following except: Switch to switch Host to host Hub to switch Host to switch

Host to switch All devices that are pinned the same for transmit and receive require a cross-over cable to communicate directly.

Which Layer 1 devices can be used to enlarge the area covered by a single LAN segment? (Choose two.) Switch NIC Hub Repeater RJ‐45 transceiver

Hub Repeater Not that you really want to enlarge a single collision domain, but a hub (multiport repeater) will provide this functionality for you.

What is the result of segmenting a network with a bridge (switch)? (Choose two.) It increases the number of collision domains. It decreases the number of collision domains. It increases the number of broadcast domains. It decreases the number of broadcast domains. It makes smaller collision domains. It makes larger collision domains.

It increases the number of collision domains It makes smaller collision domains

What are two advantages of fiber-optic cabling?

It is completely immune to EMI and RFI and can transmit up to 40 kilometers (about 25 miles).

Which of the following describe the DHCP Discover message? (Choose two.) It uses FF:FF:FF:FF:FF:FF as a Layer 2 broadcast. It uses UDP as the Transport layer protocol. It uses TCP as the Transport layer protocol. It does not use a Layer 2 destination address.

It uses FF:FF:FF:FF:FF:FF as a Layer 2 broadcast. It uses UDP as the Transport layer protocol

What does 802.1b define

LAN/MAN Management

You connect a new host to your companies wireless network. The host is set to receives a DHCP address and the WEP key is entered correctly, however, the host cannot connect to the network. What can the problem be? DNS is not configured on the host MAC filtering is enabled on the AP The network has run out of wireless connections The host is enabled to run 802.11b and 802.11g

MAC filtering is enabled on the AP

What EIGRP information is held in RAM and maintained through the usage of hello and update packets? (Select all that apply.) DUAL table Neighbor table Topology table Successor route

Neighbor table Topology table EIGRP holds three tables in RAM: neighbor, topology, and routing. The neighbor and topology tables are built and also maintained with the use of hello packets.

What is the version or name of OSPF that is used with IPv6?

OSPF3

Which network topology or connection type can be implemented with only two endpoints?

Point-to-point

What does 802.1x define

Port Based Network Access Control

Which IPv6 routing protocol uses UDP port 521? RIPng EIGRPv6 OSPFv3 IS-IS

RIPng

You need to transfer files between two hosts. Which two protocol can you use? SNMP SCP RIP NTP FTP

SCP FTP Secure Copy Protocol (SCP), and File Transfer Protocol (FTP), can be used to transfer files between two systems.

Which of the following services use TCP? (Choose three.) DHCP SMTP SNMP FTP HTTP TFTP

SMTP FTP HTTP

The OSI has seven layers, which layer does SMTP work at?

SMTP resides at the Application layer of the OSI/DoD model

Which IEEE standard specifies the protocol for CSMA/CD? 802.2 802.3 802.5 802.11

The 802.3 standard, commonly associated with Ethernet, specifies the media‐access method used by Ethernet, which is known as Carrier Sense Multiple Access with Collision Detection (CSMA/CD).

A server has received a frame from your remote host. What will be the destination hardware address of the frame?

The MAC address of the router sending the frame to the server

When data is encapsulated, which is the correct order? Data, frame, packet, segment, bits Segment, data, packet, frame, bits Data, segment, packet, frame, bits Data, segment, frame, packet, bits

The encapsulation order is data, segment, packet, frame, bits

Which of the following protocols will advertise routed IPv6 networks? RIP RIPng OSPFv2 EIGRPv3

The routing protocols that have been upgraded to advertise IPv6 routes are RIPng, OSPFv3, and EIGRPv6. IS-IS can advertise IPv6 routes as well, but no upgrade was needed for IS-IS.

What is one reason that WPA encryption is preferred over WEP? A WPA key is longer and requires more special characters than the WEP key. The access point and the client are manually configured with different WPA key values. WPA key values remain the same until the client configuration is changed. The values of WPA keys can change dynamically while the system is used.

The values of WPA keys can change dynamically while the system is used.

Which of the following are benefits of VLANs? (Choose three.) They increase the size of collision domains. They allow logical grouping of users by function. They can enhance network security. They increase the size of broadcast domains while decreasing the number of collision domains. They simplify switch administration. They increase the number of broadcast domains while decreasing the size of the broadcast domains.

They allow logical grouping of users by function They can enhance network security. They increase the number of broadcast domains while decreasing the size of the broadcast domains.

You need to connect a hub to a switch. You don't like this idea because you know that it will create congestion. What type of cable do you need to use to connect the hub to the switch? EtherIP Crossover Straight‐through Cable Sense, Multiple Access

To connect two switches together or a hub to a switch, you need a crossover cable.

Which UTP wiring uses four twisted wire pairs (eight wires) and is rated for 250MHz? Category 3 UTP Category 5 STP Category 5 UTP Category 6 UTP

To get the high data-transfer speed, like 1Gbps, you need to use a wire standard that is highly rated, such as Category 5e or Category 6

Name some of the benefits of IPv6 over IPv4.

more available addresses, simpler header, options for authentication and other security


Related study sets

CISG: UN Convention on Contracts for the International Sale of Goods

View Set

Chapter 34: Management of Patients With Hematologic Neoplasms - N266 Sp2019

View Set

Geometry B-5, Geometry Ch. 4, Geometry Ch. 3, Geometry Ch. 2

View Set

Reading Explorer 4 Unit 4 Reading B

View Set

Reading Quiz 5: Geologic Time, Evolution, and Fossils (Ch. 5, 6 & 10) Week 6 & 7

View Set

Chapter one- American government and civic engagement

View Set