Network+_Chapter 4,6,7,8,9,10,10_MASTER DUMP
Which switch is used with the Windows netstat utility to show name of a running program?
-b
Which switch is used with the Windows netstat utility to show the process ID?
-o
Which term is an original top-level domain name?
.mil
A network with a subnet mask of 255.255.255.192 would have what prefix?
/26
When performing a binary XOR (eXclusive OR) calculation with a plainrtext value of 1 and a key value of 1, what is the result?
0
When performing a binary XOR (eXclusive OR) calculation with a plaintext value of 0 and a key value of 0, what is the result?
0
What is the range of decimal values in each of the four groups of an IPv4 address?
0 to 255
Which routing table gateway value indicates that there is no gateway needed for a network ID?
0.0.0.0
What is 15 in binary?
01111
Which could be a valid Autonomous System Number (ASN)?
1.33457
What was the maximum speed at which 10BASE-T Ethernet networks could communicate?
10 Mbps
Which IP address is a private IP address?
10.164.19.5
What is the maximum cable length on a segment of a 1000BASE-T network?
100 meters
What was the maximum distance between a hub and a node on a 10BASE-T network?
100 meters
How many host bits would you need to leave to provide for the given number of hosts?
1000:10, 200:8, 5:3, 30:5, 50:6
Of all the Gigabit Ethernet IEEE standards detailed in the chapter, which one maintains a signal over the greatest distance?
1000BASE-LX
Which version of Gigabit Ethernet is published under the 802.3ab standard?
1000BASE-T
The __________ version of Gigabit Ethernet, published under the 802.3z standard, is divided into a series of standards, with names such as 1000BASE-SX and 1000BASE-LX.
1000BASE-X
What is the binary equivalent of the decimal value 151?
10010111
How many hosts would be on each subnet if you borrow 10 bits of a Class B?
1022
How many subnets can you create if you borrow 10 bits of a Class B network?
1024
In 100BASE-T, what is the maximum number of nodes per hub/switch?
1024
What is the maximum number of nodes that could be attached to a 10BASE-T hub?
1024
Enter the network portion of 103.56.115.117
103.0.0.0
Enter the network address of 109.13.58.238 255.0.0.0
109.0.0.0
Which standard used multimode cabling?
10BASE-FL
Which Ethernet cabling standard defines an Ethernet network that uses Cat 3 or better UTP cabling, operating at 10 Mbps?
10BASE-T
Which 10 GbE standard features a multimode fiber type?
10GBASE-SR
What is the name of the IEEE standard for 10 GbE running on twisted pair cabling?
10GBASE-T
Enter the host portion of 111.112.207.194
112.207.194
Which wavelength is used by 1000BASE-LX fiber-optic cabling?
1300 nm
Which wavelength is used on 10GBASE-LW fiber-optic cabling?
1310 nm
Which port is used to receive e-mail messages from e-mail servers (IMAP4)?
143
What is the maximum number of hops allowed by RIP?
15
What is the broadcast of 150.5.0.96 /27?
150.5.0.127
Enter the network portion of 161.86.66.69
161.86.0.0
What is the network ID for 172.19.0.62/27?
172.19.0.32
What is the network ID of 172.19.0.94/27?
172.19.0.64
What is the host range of 172.19.0.64/27?
172.19.0.65 - 172.19.0.94
Which one of the IP addresses below is a network ID?
176.16.100.100 /30
Enter the network address of 183.227.161.249 255.255.0.0
183.227.0.0
Which of the following is a valid host on network 192.168.24 /29?
192.168.24.27 with a subnet mask 255.255.255.248
What is the host range for 192.168.32.32 /30?
192.168.32.33 -192.168.32.34
Which IP address is valid for an individual host expressed in dotted decimal notation?
192.168.4.2
Enter the network portion of 197.146.101.32
197.146.101.0
Which IP address is a public IP address?
198.192.100.3
Which TCP ports does the old active File Transfer Protocol (FTP) use by default?
20 and 21
Enter the network portion of 212.164.48.186
212.164.48.0
What is the decimal equivalent of the binary value 11010101?
213
Enter the network portion of 213.182.97.137
213.182.97.0
Enter the host portion of 72.245.102.133
245.102.133
Enter the default, classful mask for ip address 100.208.112.164
255.0.0.0
Enter the default, classful mask for ip address 138.166.116.229
255.255.0.0
A network with a subnet mask of 255.255.255.240 would have what prefix?
28
Which formula would you use to arrive at the number of hosts on a subnet?
2x- 2, where x represents the number of zeroes in the subnet mask
How many binary digits are in an IPv4 address?
32
How many subnets can you create if you borrow 5 bits of a Class C network?
32
What is the increment for a /27?
32
How long is a subnet mask?
32 bits
Server Message Block uses TCP port __________ by default.
445
Which TCP port does Terminal Access Controller Access Control System Plus (TACACS+) use by default?
49
If you needed a network that would provide for 20 hosts, how many host bits would you have to have?
5
What UDP port do DNS servers primarily use?
53
When using the newer Rapid Spanning Tree Protocol (RSTP), how long does it take a network to return to convergence?
6 seconds
What is the minimum size of an Ethernet frame?
64 bytes
If you needed a network that would provide for 200 hosts, how many host bits would you have to have?
8
What is the increment of a /29?
8
Which port do HTTP Web servers use?
80
What wavelength is used on 10GBASE-SW fiber-optic cabling?
850 nm
What wavelength is used on a 10GBASE-SR network?
850 nm
Enter the class (capital letter) for 124.106.208.77
A
Which is an accurate statement about repeaters and bridges?
A bridge may act like a repeater to connect two networks, but then goes a step further—filtering and forwarding traffic between those segments based on MAC addresses.
The most-common block cipher, __________, is so fast even applications that traditionally used stream ciphers are switching to it.
Advanced Encryption Standard (AES)
Which statement about subnet masks is true?
All machines on the same network have the same subnet mask.
Apple called its protocol suite ___________________.
AppleTalk
Which protocol is a path vector routing protocol?
BGP
The most popular DNS server used in UNIX/Linux systems is called ____________________.
BIND
Enter the class (capital letter) for 201.191.108.62
C
Enter the class (capital letter) for 206.162.134.1
C
The specification for 100BASE-T calls for UTP cabling using __________ or better rated cabling.
Cat 5
What is the name of Cisco's proprietary operating system?
Cisco IOS
If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong?
Class B
A particular multicast called an IGMP group is assigned an address in which class range?
Class D range
Which statement best describes a Class E address ID?
Class E is considered to be experimental.
Active Directory leans heavily on __________; Active Directory uses it for the DHCP server to talk to the DNS server.
DDNS
Any network using ____________________ consists of a DHCP server and DHCP clients.
DHCP
Which term does CompTIA use for a relay agent that is enabled and configured within a router?
DHCP relay
Which term refers to an authentication and integrity protocol designed to prevent bad guys from impersonating legitimate DNS servers?
DNSSEC
Using the ping command, which message is displayed if your computer has no route to the address listed?
Destination host unreachable
What tasks should be performed as soon as an administrator finishes configuring a router?
Document how you configured the router and backup the router configuration.
Enter the class (capital letter) for 254.56.228.213
E
Which authentication method is commonly used for more-secure wireless networks?
EAP-TLS
Which e-mail server type has over 50 percent market share and runs on just about everything, from Unix/Linux to Windows?
Exim
The protocol used by Autonomous Systems to communicate with each other is a(n) __________.
Exterior Gateway Protocol (EGP)
What is the universal MAC address for broadcast?
FF-FF-FF-FF-FF-FF
Which is the best RADIUS server choice for UNIX/Linux?
FreeRADIUS
Web servers and Web browsers use ____________________ to communicate.
HTTP
Which is the most common type of proxy server?
HTTP
Which protocol is the underlying protocol used by the World Wide Web?
HTTP
Which protocol is the secure counterpart of HTTP used to enable connections between clients and servers that hackers can't break?
HTTPS
Which trunk standard enables you to connect switches from different manufacturers?
IEEE 802.1Q
Which protocol is the preferred alternative to POP3 and runs on TCP port 143?
IMAP4
A managed switch needs a(n) __________ to enable configuration through the network.
IP address
Which is true of hosts on the Internet?
IP addresses must be unique.
What information is included in the data portion of an Ethernet frame on an IP network?
IP addresses of the source and destination systems
Which tool does Cisco use to implement DHCP relay?
IP helper
Which is an authentication and encryption protocol suite that works at the Network layer of the OSI seven-layer model?
IPSec
Which protocol is a link state dynamic routing protocol?
IS-IS
The network or networks within an AS communicate with protocols called __________.
Interior Gateway Protocols (IGPs)
Which entity assigns Autonomous System Numbers (ASNs)?
Internet Assigned Numbers Authority (IANA)
Which attribute applies to the OSPF routing method?
It corrects link failures and creates convergence almost immediately.
Which statement best describes the preamble of an Ethernet frame?
It includes a 7-byte series of alternating ones and zeroes followed by a start frame delimiter.
Which authentication protocol is used in a TCP/IP network where many clients all connect to a single authenticating server with no point-to-point involved?
Kerberos
What is the most common connector used in a 1000BASE-SX network?
LC
Which protocol is the tool that programs use to query and change a database used by the network?
LDAP
The Internet Control Message Protocol (ICMP) works at __________ to deliver connectionless packets.
Layer 3
What OSI model layer supports content switches?
Layer 7
__________ specifies a number of features and options to automate the negotiation, management, load balancing, and failure modes of aggregated ports.
Link Aggregation Control Protocol (LACP)
VLANs based on __________ are called dynamic VLANs, although they are never used these days.
MAC addresses
Which authentication method is the most common authentication method for dial-up connections?
MS-CHAPv2
Although you can use it independently if you like, Windows DNS server is the default resolver and name server for ____________________—Microsoft's batteries-included approach to managing enterprise networks.
NULL
At which layer of the OSI model do routers work?
NULL
How long is the start frame delimiter?
NULL
If you can't see the network using ____________________, you may have a problem with your NetBIOS settings.
NULL
Manufacturers have accommodated the need for switches to connect to a variety of 10 GbE connector types by devising which concept?
NULL
The "R" in the standard 10GBASE-SR stands for which type of signaling?
NULL
The "W" in the standard 10GBASE-SW stands for which type of signaling?
NULL
The default VLAN on a switch has been assigned an IP address of 172.19.0.62/27 with a default gateway of 172.19.0.94. You can't ping the switch from your workstation which has address 172.19.0.66/27 but you can ping your default gateway which is 172.19.0.94. Why can't you ping the switch?
NULL
The foundation of which technique involves taking a single class of IP addresses and chopping it up into multiple smaller groups?
NULL
The vast majority of network rollouts in offices use 1000BASE-T connections, or __________, as you'll hear them called.
NULL
What TCP/IP application uses port 80?
NULL
What command would you run from a Windows command line to test a computer's network stack?
NULL
What general type of cabling is a technician most likely to use today when installing Ethernet cabling in areas with high electrical interference?
NULL
What information is kept in the DNS resolver cache?
NULL
What is the increment of 150.5.100.32 /21?
NULL
What is the network ID of 176.16.100.1 /20?
NULL
What was the original maximum data transfer rate of the first Ethernet developed by Xerox?
NULL
What wavelength is used on a 10GBASE-Ey network?
NULL
When a router has more than one route to the same network using the same routing protocol, the _______________ is used to determine the better route.
NULL
When a router is accessed remotely using SSH, which command displays its routing table?
NULL
Which column in a routing table tells the router which of its ports to use?
NULL
Which command is used to force a Windows client to update its records on the Active Directory's DNS server?
NULL
Which companies were involved in the 1979 introduction of the DIX Ethernet standard?
NULL
Which formula would you use to calculate the number of new subnets?
NULL
Which of the addresses below are valid hosts on network 192.168.1.64 /26? Pick two.
NULL
Which of the following is a network ID? Pick 2.
NULL
Which organization has added hundreds of generic TLDs, such as .biz for businesses and .rodeo?
NULL
Which pins on an RJ-45 connector are used to receive data?
NULL
Which protocol is used on the Internet for communication between Autonomous Systems?
NULL
Which protocol was originally Cisco's proprietary protocol?
NULL
Which protocol, used to handle low-level housekeeping tasks such as router advertisements, involves simple, single sessions that consist of a packet or a series of packets?
NULL
Which record points to the server that holds the records (zone) for a part of the DNS tree?
NULL
Which statement is true about DNS root servers?
NULL
Which switch is used with the Windows netstat utility to show name of a running program?
NULL
Which version of Ethernet was introduced in 1990?
NULL
Which very high-speed fiber network was already in place and being used for wide area networking (WAN) transmissions before the IEEE developed the 10 GbE Ethernet standards?
NULL
When a computer using NetBIOS booted up, it broadcasted its ____________________ along with its MAC address.
NetBIOS name
To what layer does the Internet Protocol correspond?
Network
Which tool is used by an administrator to manage many routers and provide an overall view of all the network?
Network Management Software (NMS)
__________ defines a newer series of protection applications that combine the features of what traditionally was done by separate applications.
Network access control (NAC)
__________ is a type of dedicated file server used in many networks.
Network attached storage (NAS)
Which routing protocol is the choice in most large enterprise's internal networks?
OSPF
Which statement is true of the Transport mode of IPSec?
Only the actual payload of an IP packet is encrypted.
Which would confirm that you have a DNS problem?
Ping works with the IP address but not the name associated with that address.
Which protocol is the Cisco protocol for accomplishing aggregation?
Port Aggregation Protocol (PAgP)
Which standard offers authentication, authorization, and accounting?
RADIUS
Which vector routing protocol is considered the granddaddy of all distance vector routing protocols?
RIP
Which routing protocol does not support variable-length subnet masking (VLSM)?
RIPv1
What protocol was adopted in 1994 and is now considered obsolete except for small, private WANs?
RIPv2
Which protocol is a distance vector routing protocol?
RIPv2
IANA has grown dramatically and now oversees five __________ that parcel out IP addresses to large ISPs and major corporations.
Regional Internet Registries (RIRs)
Which protocol is used to send e-mail from clients and between e-mail servers over TCP port 25?
SMTP
Which protocol offers a method for querying the state of certain network devices?
SNMP
Which term refers an encrypted link between SSH processes on two separate computers?
SSH tunnel
Which enables secure data transfers between two hosts and thus might have replaced FTP?
Secure Copy Protocol (SCP)
Which cryptographic hash function comes in several variants?
Secure Hash Algorithm (SHA)
Which protocol was developed as a secure replacement for Telnet?
Secure Shell (SSH)
__________ maps a single routable (that is, not private) IP address to a single machine, enabling you to access that machine from outside the network.
Static NAT
Which protocol involves a three-way handshake?
TCP
Which protocol is connection-oriented?
TCP
What network protocol do Apple systems use today?
TCP/IP
Which option is a free GUI tool written by Mark Russinovich (the Guru of Windows utilities)?
TCPView
Which protocol is popular for moving files between computers on the same LAN, where the chances of losing packets are very small?
TFTP
Which is a freeform type of DNS record that can be used for anything and allows any text to be added to a zone?
TXT record
Which protocol enables you to administer a server remotely and communicate with other servers on your network?
Telnet
Which standard offers authentication, authorization, and accounting?
Terminal Access Control Access Control System Plus (TACACS+)
Which Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?
UDP
Which protocol do Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) use?
UDP
Which process allows you to assign ports to VLANs after you create the VLANs?
VLAN assignment
Mozilla Firefox is an example of a __________ application.
Web client
What is the name of the classic Cisco console cable, more commonly called a rollover cable?
Yost
When the DNS name space is compared to a computer's file system, a domain is like ____________________.
a folder
In order for a VLAN to get its name, what is typically appended to the word "VLAN"?
a number
Which term refers to a cipher's underlying mathematical formula?
algorithm
Which type of algorithm is used when two different keys, one to encrypt and one to decrypt, are used in encryption?
asymmetric-key
Which term is refers to any encryption that uses different keys for encryption and decryption?
asymmetric-key encryption
Which process defines what an authenticated person can do with data?
authorization
By convention, what is the name given to Area ID 0 (zero) of an Open Shortest Path First (OSPF) network?
backbone
What causes the most common problems with HTTPS connection?
bad certificates
Which term refers to the ability of one connection to handle more data than others?
bandwidth
Which method of sending a packet allows every computer on the LAN to hear the message?
broadcast
What entry is made at the command prompt in UNIX/Linux to display DNS server information?
cat /etc/resolv.conf
Which term refers to a standardized type of file that includes a public key and the digital signature of a trusted third party?
certificate
You won't get an HTTPS connection without a good __________ exchange.
certificate
Which term refers to the result of running plaintext through a cipher algorithm using a key?
ciphertext
CompTIA and many techs refer to a CIDR address as a ___________________ address, meaning the subnet used does not conform to the big three: A, B, or C)
classless
Which term is used for data hasn't been encrypted yet?
cleartext
What is the purpose of a crimper?
connect an RJ-45 connector to the cable
Two computers first acknowledge the other, after which they conduct their communication. They end by closing the communication. Which term describes this communication process?
connection-oriented
A router determines where an incoming packet should go by looking at the packet's __________.
destination IP addresses
Those using UNIX/Linux have an extra DNS tool called _____________________; it is similar to nslookup, but it only runs noninteractively—you ask it a question, it answers the question, and it puts you back at a regular command prompt.
domain information groper
A Web client's source port number, generated pseudo-randomly by the Web client computer, is classically assigned as a(n) __________ ports.
dynamic
What file transfer protocol uses UDP port 69?
dynamic
Which type of NAT allows many computers to share a pool of routable IP addresses that number fewer than the computers?
dynamic NAT
How many pins does an RJ-45 connector have?
eight
Which term means to scramble, mix up, or change data in such a way that bad guys cannot read it but the intended recipient of the data can descramble it.
encryption
Which term refers to session information stored by a computer on one side of a session?
endpoint
Which term refers to ports in the 49152 to 65535 range?
ephemeral
Which term describes the status of a port that is part of an active, working endpoint pair?
established port
A Class C network block uses the __________ octets to define only the network ID.
first three
How many fields does a basic Ethernet frame contain?
five
What general type of cabling is a technician most likely to use today when installing Ethernet cabling in areas with high electrical interference?
flow-band
Dynamic DNS (DDNS) enabled DNS servers to get automatic updates of IP addresses of computers in their __________________.
forward lookup zones
Which technology acts on behalf of clients, getting information from various sources and handing that info to the clients?
forward proxy server
What is an advantage of fiber-optic cabling?
greater maximum distance
Which term describes a mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length?
hash
What term best describes the way the DNS is organized?
hierarchical
Which term refers to the passage of a packet through a router?
hop
Which item is part of a fully qualified domain name (FQDN)?
host name
In the DNS naming convention, what is the correct sequence for writing a fully qualified domain name (FQDN)?
host.domain.root
Cryptographic hash functions have a huge number of uses, but a common one is for verifying file __________.
integrity
Which command is used in Windows to eliminate any DNS caches on the local system?
ipconfig /flushdns
Which command is used to force a Windows client to update its records on the Active Directory's DNS server?
ipconfig /registerdns
Which is the oldest ACL access model?
mandatory access control
What is the meaning of the "10" in 10BASE-T?
maximum speed of 10 Mbps
Which is used to determine the largest frame a particular technology can handle?
maximum transmission unit
Which method of sending a packet allows a single computer to send a packet to a group of interested computers?
multicast
What type of fiber-optic cabling and connectors does a 100BASE-FX network use?
multimode with ST or SC connectors
The VLAN ID a trunk port associates untagged traffic with its __________VLAN.
native
Which command is universally known as the "show me the endpoint" utility?
netstat
The 802.3 working group defines wired network standards that share the same basic frame type and __________.
network access method
A(n) __________ consists of multiple sensors placed around the network, often on one or both sides of the gateway router.
network-based IDS (NIDS)
All operating systems have a version of the __________ tool that enables DNS server queries.
nslookup
Which term describes the status for a socket that is prepared to respond to any traffic destined for that socket's port number?
open port
When a collision occurs on a network relying on the CSMA/CD access method, what alerts the network interface cards (NICs)?
overlapping signals
Every Fully Qualified Domain Name (FQDN) will always have a(n) __________ on the end to signify the root.
period (.)
In the DNS naming convention, what is each name separated by?
period (.)
Which is your best friend when testing DNS?
ping
What command can you use to tell a device to send packets to itself?
ping 127.0.0.1
What is another name for dynamic NAT?
pooled NAT
Telnet runs on TCP __________.
port 23
Which form of NAT typically handles the one-to-many connections?
port address translation (PAT)
Another name for port bonding is __________.
port aggregation
Which is used to designate a specific local address for various network services?
port forwarding
Which technology is incredibly useful for any type of situation where an administrator needs to inspect packets coming to or from certain computers?
port mirroring
Which mode allows an intrusion detection system (IDS) to inspect a copy of every packet on a network?
promiscuous
Which type of port has a number in the 1024 to 49151 range?
registered
If you ping a device and no echo reply comes back before the default time, ping will respond with a __________ message.
request timed out
What enables a system to determine an FQDN by knowing the IP address?
reverse lookup zones
Which mechanism will move a port into a root-inconsistent state if BPDUs coming from a certain direction indicate another switch is trying to become the root bridge?
root guard
Which servers are subordinate to the primary server, but all support the same domain?
secondary
Which term is used for any single communication between a computer and another computer?
session
In a specification such as 10BASE-T, what does the word "BASE" identify?
signaling type
Which modular transceivers have replaced gigabit interface converters (GBICs) as the modular transceiver of choice?
small form-factor pluggable (SFP)
The NIC and the attached __________ determine full- or half-duplex during the auto-negotiation process.
switch
Dynamic IP addressing via ____________________ automatically assigns an IP address whenever a computer connects to the network.
the Dynamic Host Configuration Protocol (DHCP)
Many years ago, the ping command had a bug that allowed malicious users to send malformed ping packets to a destination, causing __________.
the ping of death issue
What is the cornerstone of subnetting?
the subnet mask
What is another name for a timestamped service ticket?
token
Within the DNS hierarchy, which term refers to the DNS servers just below the DNS root?
top-level domain servers
Which tool records the route between any two hosts on a network?
traceroute
Which three states can be applied to switches using VLAN Trunking Protocol (VTP)?
transparent, server, and client
Which term describes a port on a switch that is configured to carry all traffic, regardless of VLAN number, between all switches in a LAN?
trunk port
Which method of sending a packet allows one computer to send a message directly to another?
unicast
Which type of cabling was used with 10BASE-T?
unshielded twisted pair (UTP)
Which type of network enables you to segment a physical network into multiple discreet networks without adding additional hardware?
virtual local area network (VLAN)
The different colors of the laser signals transmitted over fiber-optic cables feature different __________.
wavelengths
What name is given to the port numbers in the range of 0 to 1023?
well-known port numbers