Networking CH. 1-6 preparation for midterm
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?
P2P
Which email protocol allows an email client to download email messages to the local computer?
POP3
Which computers are the highest authorities in the Domain Name System hierarchy?
Root servers
You are a network administrator for an organization. You are asked to create a shared folder on a Microsoft Windows system so that other users on the same network are able to access its contents. To be able to meet this requirement, which protocol is likely to be used?
SMB
DNS clients can use this zone to obtain information such as IP address that correspond to DNS domain names or services. What type of DNS zone is this?
SOA NS
You are a network administrator and you need to access the secure command line interface access of an edge router on your network. The router uses cryptography for remote authentication. Which protocol is the router configured with for this purpose?
SSH
By default, which of the following components of the composite metric are considered for Enhanced Interior Gateway Routing Protocol (EIGRP) ?
Bandwidth and delay
Which of these is considered a secure place to store a list of documented network passwords?
Password Manager
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
Patch Cable
You have a network of ten computers connected to a single switch that has 12 ports. You need to add six more computers to the network so you add a second switch by connecting it to the first switch by way of a network cable. Which network topology is now used?
Star-bus
You want to display the cache entries for 192.168.1.101. Which parameter should you use with the arp command?
-p
What is the Internet standard MTU?
1,500 bytes
Which of the following format can be considered a valid IPv6 address?
2001:0db8:0000:0003:0000:ff00:0042:8329
Refer to the exhibit. Which of the pictured software is a port scanner?
A port scanner is an application designed to probe a server or host for open transport layer ports. This is often used by administrators to verify security policies of their networks and by attackers to identify network services running on a host and exploit vulnerabilities. A port scanner will indicate open ports on specific servers (IP addresses) as well as those that are blocked. "B"
Refer to the exhibit. Which of the pictured software is a protocol analyzer?
A protocol analyzer is a software tool used to capture and analyze signals and data traffic over a communication channel. Such a channel varies from a local computer bus to a satellite link, that provides a means of communication using a standard communication protocol (networked or point-to-point). Ethernet and IP protocol analyzers usually organize data based on the OSI or the TCP/IP model. "C"
A routing protocol's reliability and priority are rated by what measurement?
AD
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
All devices on your local network
Which routing protocol does an exterior router use to collect data to build its routing tables?
BGP
You suspect that the Webserver, which is located on your network and hosts multiple Internet facing Websites. The Webserver runs on Windows Server 2008. After receiving complaints from the users of Webserver occasionally being unavailable, you investigate and find that it is getting flooded with many ping requests. What should you do to immediately handle this situation?
Block all incoming ICMP requests
If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops?
By implementing a limit on the number of hops allowed in a path
Which Carrier Sense technology is used on wireless networks to reduce collisions?
CSMA/CA
Which of these categories of twisted-pair cable can support Gigabit Ethernet?
Cat 5e, Cat 6a, Cat 7
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Checksum
You are planning to implement dual stack of IPv4 and IPv6 in your network. Currently, your network runs of servers, routers, and switches that have not been upgraded for several years. You are still running the Windows Server 2003. When implementing dual stack, which of the following will be your primary concerns?
Ensuring that Internet Service Providers (ISPs) work with IPv6
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?
Entrance Facility
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
Evil Twin
When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?
FE80::/10
What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?
FHSS
You manage a small stub network that has a router configured with static routing. If the connection to the next hop goes down, what action will the router perform?
It will continue to route traffic on the same path.
You have configured a DHCP pool to allocate the IP addresses to the system for 3 days. What have you defined?
Lease time
What is the first step of inventory management?
List all components on the network
You are asked to install a device that will combine several connections to the Internet and provide the sum of the available network speeds to an internal network while equally sharing the data traffic among all the Internet connections. Which of the following devices are you asked to install?
Load balancer
Which fiber connector contains two strands of fiber in each ferrule?
MTRJ
Which type of address is used at the Transport layer to identify the receiving application?
Port
The network administrator has configured the enterprise firewall to permit port 21 to allow FTP transfers to occur from outside the enterprise. Users can connect to the FTP server that is located on the enterprise network. However, file transfers fails. Why could this be?
Port 20 along with port 21 must also be permitted
Your organization has multiple remote offices. The users at the remote office often remotely connect to the application servers. Which of the protocols should you enforce for encrypted communication?[Choose all that apply].
RDP SSH
You need to highlight the location of physical servers and network devices mounted on standardized frames that are installed within a datacenter to a new colleague. Which of the following types of diagrams should you show?
Rack Diagram
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
Rack Ears
You have been asked to host a new e-commerce Website. Your manager has asked you to configure the Website with a certificate. After hosting the Website with the certificate, which security protocol have you use?
SSL/TLS
Which kind of multiplexing assigns slots to nodes according to priority and need?
STDM (statistical time division multiplexing)
Which protocol's header would a Layer 4 device read and process?
TCP
Why would a network administrator implement vulnerability scanning on a network?
To reveal vulnerabilities in the network
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
VoIP Gateway
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?
White/green
What type of diagram shows a graphical representation of a network's wired infrastructure?
Wiring Schematic
You've decided to run an Nmap scan on your network. What app could you open to perform this task? Choose all that apply.
Zenmap, Command Prompt and Powershell
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?
cat 6a
Which of these commands is available only in Linux?
dig
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?
ipconfig /release
Refer to the exhibit. Which of the following command is likely to show the required output? Ex. Reply from 96.30.22.166: bytes=32 time=127ms TTL=55
ping
To troubleshoot a network problem, you are required to use a packet analyzer on a Unix based system. Which of the following command line interface commands will provide you with the required functionality?
tcpdump
Refer to the exhibit. Which of the following command is likely to show the required output? ex. over a maximum of 30 hops
traceroute
At which OSI layer does IP operate?
Network Layer
You need to implement high availability in your network. One implementation company ensures that their implementation will provide 99% of availability in a period of one year. With the mentioned availability, what would be the total downtime in a year?
1.5 days
Which of the following IPv4 and IPv6 addresses are correctly portrayed using CIDR notation? [Choose all that apply].
2001:db8::/32 192.168.2.0/24
What decimal number corresponds to the binary number 11111111?
255
You need to connect to a colleague's system using the default Microsoft Windows remote desktop application to troubleshoot an application issue. Which port should be opened on the colleague's system firewall to ensure successful remote connection?
3389
Users on a network are complaining that they cannot connect to a Webserver by its name in the Web browser. You can access the Webserver using its IP address. You discover an access list is blocking several UDP ports. Which port should you remove from the access list to allow users to connect to the Webserver?
53
A computer is configured with a subnet mask of 255.255.255.192. How many IP addresses, including the network and broadcast addresses, are available in the subnet the computer is in?
64
You need to block all unsecured web traffic using its default port from a specific network segment of the enterprise network. Which port would you block to achieve this?
80
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
802.11n
Which Bluetooth class has the highest power output?
Class 1
You have a network that consists of seven computers running Windows 10 Professional. You add an eighth computer with Windows Server 2016 installed. Which networking model can the network now support that it could not support without the addition of the eighth computer?
Client-Server
What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?
Coaxial cable, F-connector
You are asked to perform an analysis on the network that will allow you to deduce information from patterns in communication. Which of the following types of analysis are you asked to perform?
Data traffic analysis
What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network?
Default Gateway
A router receives a packet with a destination address that is not found within its routing table. The router is configured to send all such packets to a specific next hop address. What is this next hop address called?
Default route
Which of the following is true about the OSPF routing protocol?
Each router has complete knowledge of the network topology.
When a router can't determine a path to a message's destination, where does it send the message?
Gateway of last resort
Refer to the exhibit. Which of the following type of diagram is being depicted? reference image for question
Logical Network Topology
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
Look at whether the device is located on the ISP's side of the demarc.
Which type of DNS record identifies an email server?
MX Record
Which of the following describes the configuring of MAC reservation in a DHCP server?
Manually allocate the MAC address to a desired IP address in the DHCP server
In which of the following applications can a virtual IP address be used? [Choose all that apply].
NAT Gateway Redundancy Protocols
Which kind of crosstalk occurs between wire pairs near the source of the signal?
NEXT
Which of the following statements is true about Fault tolerance?1) It is a direct result of the design of the network itself.2) It is the name of the feature that allows for dual layer 2 connections between switches.3) Enables a network to continue functioning normally in case of a partial failure.
Statements 1 and 3 are true
What method of IP network configuration would you use for devices such as servers and printers so that all users on a network will always be able to reach these resources using the same network address?
Static IP address allocation
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
Static Route
If you need to perform port scanning in your network, which of the following tool are you likely to use? [Choose all that apply].
Superscan Angry IP Scanner
Your network firewall currently allows only HTTP traffic to pass through. You need to allow FTP traffic to pass through the firewall. Which of the following should be allowed?[Choose all that apply].
TCP port 2` TCP port 20
Which part of a MAC address is unique to each manufacturer?
The OUI
When interconnecting a switch port to a patch panel, which of the following information should be documented according to best practices? [Choose all that apply].
The network device on the other end of the link The port number of the switch used
You have been asked to set up a new data center. Before you proceed with the actual setup, you need to create various diagrams. You also need to create a rack diagram of an existing rack that you want to use. Which of the following could be the reason for you to create one such diagram? [Choose all that apply].
To determine the shapes of the equipment that you need to purchase To determine which equipment to purchase
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
Tone locator
You have been experiencing connectivity with various websites. The response time to open these websites is high. You tested the same websites from your home and could open them much faster. You assume that the slow access to the Websites might be due to high latency. Which of the given utility is likely to help you in finding the source that may be causing the latency issue?
Traceroute
Which transmission characteristic is never fully achieved?
Bandwidth
What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?
Fiber type mismatch
In the client-server model, what is the primary protocol used for communication between a browser and web server?
HTTP
Refer to the exhibit. Which of the following configuration is being displayed to increase the network uptime?
High availability
If you use the ping command to send an echo request from one host to the other, then which of the following protocols have you used?
ICMP
Which two protocols manage neighbor discovery processes on IPv4 networks?
ICMP and ARP
Which email protocol allows an email client to read mail stored on the mail server?
IMAP4
A network engineer is configuring a network to be able to relay IPv6 packets. The network only supports IPv4 and does not have dual-stack support. Which of the following can be used to successfully relay IPv6 packets over this network?
IPv6 tunneling
Which OSI layer is responsible for directing data from one LAN to another?
Network Layer
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
Remote Desktop
Which of the following devices are you likely to find in the MDF? Choose all that apply.
Routers, Switches and KVM Switch
Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?
SSL and TLS
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Star
Refer to the following statements: This type of diagram depicts how devices are interconnected to each other using wires and cabling2) This type of diagram depicts the arrangement of devices and how they communicate with each other.Which diagram types are being described?
Statement 1 describes a physical network diagram while statement 2 describes a logical one
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server