Networking and Servers poll questions
802.1Q
Which IEEE standard determines how VLANs work on a network?
Port 161
What port do SNMP agents listen on?
Default gateway
What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network?
Class 1
Which Bluetooth class has the highest power output?
IMAP4
Which email protocol allows an email client to read mail stored on the mail server?
FE80::/10
When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?
AD
A routing protocol's reliability and priority are rated by what measurement?
Look at whether the device is located on the ISP's side of the demarc.
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
NFC
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
Network layer
At which OSI layer does IP operate?
24 bits
How many bits of a Class A IP address are used for host information?
ipconfig /release
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?
Rack ears
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
Client-server
In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2016. Which networking model can the network now support that it could not support without the upgrade?
HTTP
In the client-server model, what is the primary protocol used for communication between a browser and web server?
Top listeners
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
All devices on your local network
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
SNMP Get Next
What command requests the next record in an SNMP log?
.255
What decimal number corresponds to the binary number 11111111?
Network documentation is easier to manage
What do well-chosen subnets accomplish?
DiffServ
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
1,500 bytes
What is the Internet standard MTU?
List all components on the network.
What is the first step of inventory management?
2 h - 2 = Z
What is the formula for determining the number of possible hosts on a network?
A Layer 2 switch belongs only to its local network, and a router belongs to two or more networks.
What is the fundamental distinction between a Layer 2 switch and a router?
Eight
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?
Layer 3
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Active Directory
What is the name of the domain controller database that Windows Server 2016 uses to store data about user access and resources on the network?
Static route
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
Wiring schematic
What type of diagram shows a graphical representation of a network's wired infrastructure?
Virtual switch
What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?
Gateway of last resort
When a router can't determine a path to a message's destination, where does it send the message?
How long devices like this one will last on average until the next failure
When shopping for a new router, what does the MTBF tell you?
802.11n
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
Integrity
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
IPsec
Which encryption protocol does GRE use to increase the security of its transmissions?
256-the interesting octect, 2h
Which formulas can be used to calculate the magic number? Choose two.
The fourth one
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
a. Routers, b. Switches, and d. KVM switch
Which of the following devices are you likely to find in the MDF? Choose all that apply.
Speed
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
To increase the number of networking devices on a network
Which of the following is not a good reason to segment a network?
dig
Which of these commands is available only in Linux?
A password manager
Which of these is considered a secure place to store a list of documented network passwords?
Infrared
Which one of the following wireless transmission types requires a clear LOS to function?
Trunk
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
Online UPS
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
Evil twin
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
Patch cable
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
a. Zenmap, c. Command Prompt, and d. PowerShell
You've decided to run an Nmap scan on your network. What app could you open to perform this task? Choose all that apply
Rogue AP
You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?
Traffic shaping
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
VoIP gateway
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
POP3
Which email protocol allows an email client to download email messages to the local computer?
BGP
Which routing protocol does an exterior router use to collect data to build its routing tables?
IKEv2
Which tunneling protocol is a component of the IPsec protocol suite?
SSL and TLS
Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?
ICMP and ARP
Which two protocols manage neighbor discovery processes on IPv4 networks?
MX record
Which type of DNS record identifies an email server?
Cold site
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
DHCP relay agent
While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need in order to make the central DHCP server accessible across VLANs?
Wireshark
While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?
NAT mode
With which network connection type does the VM obtain IP addressing information from its host?
The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
Root servers
Which computers are the highest authorities in the Domain Name System hierarchy?
DirectAccess
What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?
Hypervisor
What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?
FHSS
What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?
Network layer
Which OSI layer is responsible for directing data from one LAN to another?
Remote Desktop
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
PaaS
Which cloud computing services model gives software developers access to multiple operating systems for testing?
Bluesnarfing
A hacker takes advantage of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred?
Peer-to-peer
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?
CSMA/CA
Which Carrier Sense technology is used on wireless networks to reduce collisions?
TCP
Which protocol's header would a Layer 4 device read and process?
PPPoE
Which remote access protocol is used over an Ethernet network?
SFTP
Which remote file access protocol is an extension of SSH?