Networking + Final Exam

Ace your homework & exams now with Quizwiz!

Which of the following statements is not true regarding 1000BaseCX?

1000BaseCX uses CAT6 UTP 1000BaseCX uses twin axial cabling, not CAT UTP. Incorrect Answers: All of the other answers are completely true

Which cable standard is limited to 10 Mbps, has a maximum segment distance of 100 meters, and uses UTP cable?

10BaseT

The wireless standard 802.11n uses which of the following frequencies? (Select two.)

2.4 GHz 5 GHz

HTTPS requires you to open which additional port in your firewall?

443 Hypertext Transfer Protocol, Secure (HTTPS) uses Port 443, which is the port that would need to be opened on your firewall to use that protocol. Incorrect Answers: Port 80 is HTTP; port 143 is IMAP; port 3389 is RDP.

What do you call a snapshot of your systems and network when they are working correctly?

A Baseline

Marsha wants to place certain restrictions on communication between client computers and the main file server. Which of the following will enable her to accomplish her goal?

ACL (Access Control List)

Which of the following is NOT an aspect of Asymmetric Digital Subscriber Line (ADSL)?

ADSL is a dial-up service.

A company has a network connection with an ISP. The company is going to add a second network connection with a different Internet service provider. In order to pass traffic between the two connections, which routing protocol is the BEST choice?

BGP BGP - Border gateway protocol is used between autonomous systems. In this case, adding a different connection to your network via a different ISP means all the other routers need to be updated to reflect this new route. BGP is also used to communicate between autonomous systems. Incorrect Answers: IS-IS, OSPF, and RIP are all interior gateway protocols, so they won't work between ISPs.

Sylvia suspects a cable labeled as CAT 6 by a previous tech might not be up to standard. What tool enables her to test her theory?

Cable certifier

Which type of cable do you need to connect a client to a 100BaseTX network?

Category 5 UTP

A switch port can BEST be described by which of the following terms?

Collision domain

You are attempting to troubleshoot an issue between two computers that are both connected to a Layer 2 unmanaged switch. Of the following, which is the BEST way to find out if the switch is the problem?

Connect both of the PC's together with a crossover cable

What tool enables you to attach an RJ-45 connector to a CAT 6 cable using the TIA/EIA 568A wiring schematic?

Crimper

What type of cable would enable you to connect a switch in one closet to a switch in another closet successfully?

Crossover

It's an old story: a user is unable to access the Internet. The network administrator checks the workstation and sees that it has an APIPA address. What service is MOST likely not functioning correctly to have caused this?

DHCP

Being able to access a Web site by its IP address, but not by its name, indicates a problem with what?

DNS

A network technician, Ellen, receives a support ticket. The ticket does not provide enough information for Ellen to determine the problem. Which of the following should she perform FIRST before responding to the ticket?

Determine if anything has changed

Your company has just experienced an attack that caused the Web site www.yourwebsite.com to go down. What term BEST describes this?

DoS attack

Which of the following naming conventions works at the Data Link Layer (Layer 2) of the OSI model and is a term associated with IPv6?

EUI-64 An EUI-64 is the second half of your IPv6 address and operates at the Data Link Layer (Layer 2) of the OSI model. Incorrect Answers: MAC-48 is an obsolete term used to identify networking hardware. EUI-48 is a new term associated with MAC addresses and is used to identify devices on a network. It is used heavily in converting to an EUI-64 address. An IP-32 is a term that I kind of just made up. Sounded pretty cool though, huh?

A switch in the MDF has shut down at 5 PM every day this week. Which network tool should a technician use to troubleshoot this problem?

Environmental monitor

Which elements would you expect in an acceptable-use policy? (Select three.)

Equipment ownership Illegal use Network access

Your company wants to test out the security of your network by allowing attackers to hit a fake network that you create. Which technology would you need to use?

Honeynet

Network administrator Zordon wants to ensure that the only remote users who access the corporate network come only from Zordon's own country. Which of the following security measures could he configure to accomplish this?

IP filtering

Which command is used to display the current TCP/IP configuration on a UNIX or Linux system?

Ifconfig

What is the BEST description of how a layer 2 switch works?

It switches packets within the same broadcast domain based on MAC addresses. It switches packets within the same subnet based on MAC addresses. - MAC addresses are layer 2 addresses. Incorrect Answers: Typical switches don't deal with IP addresses, and users must be on the same subnet to communicate.

Which of the following protocols enables tunneling and encryption?

L2TP

Of the following protocols, which are used to implement VPNs? (Select two.)

L2TP IPSec The only protocols from the list that are used for VPNs are IPSec and L2TP. Incorrect Answers:Serial Line Internet Protocol (SLIP) is an older style encapsulation protocol used with modem connections.Point-to-Point Protocol over Ethernet is the authentication method used in DSL connections.Password Authentication Protocol (PAP) is an authentication protocol used to provide users with access to network resources. The username and password are sent in clear text, which is no good in this day and age.

Which kind of connector would you find on a fiber-optic cable?

LC

An office would like to set up an unsecured wireless network for their customers in their lounge area. Customers should be allowed to access the Internet, but should not have access to the office's internal network resources. Which firewall configuration can accomplish this?

Packet filtering

Horizontal cable is terminated at which device in the wiring closet?

Patch panel

Which of the following OSI layers converts the ones and zeros into the type of signals needed for the network cable, and then places these signals on the cable?

Physical layer

Which of the following utilities can you use to confirm connectivity to another TCP/IP host?

Ping Ping is a TCP/IP protocol that is used to test connectivity between two TCP/IP hosts. Incorrect Answers: ARP resolves IP addresses to MAC addresses. Nbstat is a command that displays the contents of the NetBIOS name cache. Netstat is a command that displays the current TCP/IP socket connections.

Network administrator Julius is going to install an 802.11n network. Which of the following should he consider FIRST?

Placement

An IT manager needs a new switch to support VoIP phones and wireless access points in a new building. Which of the following features should be included in the new switch?

PoE and QoS

You have just installed your recently purchased IDS. What must you do to your switch to allow your IDS to capture and record network traffic?

Port mirroring Once you install your IDS, configure the switch to port mirror and watch all your network traffic go! Incorrect Answers: Virtual Trunk Protocol (VTP) is a Cisco proprietary protocol used to propagate VLAN information to all the switches in your network. Spanning Tree Protocol (STP) is a switching function to prevent bridge loops. 802.1q is trunking and is used to connect VLANs across multiple physical switches.

A network administrator wants to filter outgoing network requests. Which of the following choices will filter the outbound requests?

Proxy Server Proxy server - Proxy servers can be set up to filter both incoming and outgoing requests. This way, a company can make sure employees don't go to unapproved Web sites. Incorrect Answers: VPN concentrator is what you connect to when you remotely VPN to your network.DHCP servers don't filter outgoing traffic, they just hand out IP addresses.IIS server is Microsoft's web server software package.

Which tool would a network technician need in order to install additional cables to an existing patch panel?

Punch down tool

HTTPS works with which secure protocol?

SSL HTTPS works with Secure Sockets Layer (SSL) to encrypt sensitive data being sent over the Internet. Incorrect Answers: IPSec and L2TP are encryption protocols used mostly with VPNs. Kerberos is an authentication standard for networks.

What technology is used to inhibit Layer 2 switching loops within a LAN?

STP (Spanning Tree Protocol)

Which technology deals with redundant links within a Layer 2 segment?

STP Spanning Tree Protocol

The _______________ layer of the OSI model establishes, manages, and terminates multiple communications between computers.

Session

When the loss of a piece of equipment or link can bring down an entire process, workflow or even the whole organization, that lost element is called what?

Single point of failure

An accountant for a large corporation receives a call from an individual claiming to be John, a network technician in HQ. John tells the accountant that they have been having some problems with the active directory for a few employees and her account is one of the accounts experiencing problems. John then asks for her username and password so that he can resolve the problem with the account. What is this scenario an example of?

Social engineering

A home user is experiencing performance issues with her wireless network. She has checked the following issues:_x000D__x000D_- Checked to make sure the laptop is within the appropriate wireless network range_x000D_- Checked the connected SSID and wireless channel_x000D_- Checked that the laptop is the only device connected to the wireless network_x000D__x000D_Which is the MOST likely cause for the performance issues?

There are other wireless devices in the area that operate on the wireless band and on the same wireless channel. There are other wireless devices on the same wireless channel. - The user's WAP may be on the right channel, but if other WAPs are on the same channel, their signals can interfere with each other, causing slowdowns for everyone. Incorrect Answers: The user is the only one connected to the WAP, so it is not overloaded by someone else watching videos. A wrong TKIP password would prevent a connection, not poor performance. IP addresses won't affect performance.

What technology enables VLANs to span multiple switches?

Trunking

This seldom-seen threat uses commands to a switch to change a Switchport to a trunk link.

VLAN hopping

Real-time Transport Protocol (RTP) uses which port(s)?

5004/5005 RTP uses UDP or TCP ports 5004 and 5005. Incorrect Answers: Port 443 is used by HTTPS. Ports 2427 and 2727 are used by MGCP. Port 161 is used by SNMP.

You are using HTTPS to make some online purchases. At which OSI layer does the encryption and decryption take place?

Layer 6 (Presentation Layer)

A company has a wireless access point and only wants a pre-defined list of laptops to be able to attach to it. Which of the following should be configured?

MAC filtering

You are working with your Web development team in order to find a way for them to securely update their content from remote locations such as their home. Which of the following would you set up for them?

SFTP SFTP is FTP, but secured using SSH. Incorrect Answers: SNMP v2 and v3 have encryption built-in, but not v1. Also, SNMP is more of a monitoring protocol than a file transferring protocol.HTTP is insecure, and so is the old Linux-based telnet command known as RSH.

What are typical ways of proactively communicating SNMP alerts? (Select two.)

SMS Email

Having the proper security policies and adequate training for employees protects your network from which of the following?

Social engineering

A user reports that the company network is down. Ace technician, Arnold Grimmer walks into a communications closet and sees that there is a short patch cable with both ends plugged into two ports on the same switch. Which term describes what he saw?

Switch loop

An organization has an ever-expanding array of network devices. They have determined it is too time-consuming to log into each device to collect error information. Network administrator Geraldine says that she can set up a server that will capture errors from each device automatically. Which of the following technologies would BEST fit this requirement?

Syslog

Network engineer Alonzo needs to troubleshoot at a remote corporate facility across the WAN. Which of the following user authentications would be the BEST to implement?

TACACS+

A rancher wants to use a wireless camera he has installed in his barn which is about 100 yards from his house. What kind of antennas should he use on the house and barn to get the best signal?

Unidirectional

Which of the following is NOT true about how a gateway router may get an IP address assigned to its WAN port?

You need to FTP your IP data to most routers

A network administrator wants to setup two-factor authentication. Which of the following will accomplish this?

A username, password, and a key fob

Big Dave, a network technician, is troubleshooting a wireless network. Some of the WAPs in a building have consistently high ping times across the units. What is another name for this problem?

Latency Latency - The time it takes for a device to respond to a request from another device. Incorrect Answers: Attenuation is the degradation of a signal over distance. Crosstalk is when two wires are close enough for the signals on each to interfere with the other. Frequency hopping has nothing to do with high ping times.

To verify a connection at Layer 1, which hardware tool would MOST likely be used?

Loopback plug

The unique physical address assigned to every network card is also known as a(n):

MAC address

An SMTP server needs two different types of records in it's DNS server in order to work properly. Which are they? (Select two.)

MX A

The Highland Gadget Corporation has a central office and five satellite offices. The lead network engineer wants to redo the company's network so that each satellite office connects to the central office and to every other satellite office. What topology would best suit such a network?

Mesh

Which networking topology connects computers via multiple paths?

Mesh

You are a network administrator attempting to troubleshooting a WINS server. Which tool would you most likely use to diagnose this?

Nbtstat Nbtstat is for troubleshooting NetBIOS related issues, which is what a Windows Internet Name Server (WINS) uses to identify devices on a network. Incorrect Answers: Netstat is a great tool for finding out network statistics on TCP and UDP connections you have made on your PC. Nslookup is a robust tool used in Windows and Linux worlds to troubleshoot DNS problems, not WINS problems. Dig is a tool used in Linux to troubleshoot DNS problems.

Which document defines services, products, and time frames for support provided by a vendor?

Statement of work A statement of work is a legal contract between an organization and vendor that defines the details of work, products, and support to be provided. Incorrect Answers: A memorandum of understanding is used instead of a contract. A service-level agreement is a contract that covers the broad scope of service to be provided. An acceptable-use policy is a document that governs how users will access and use IT resources.

You have two computers on the Internet and you wish to transfer a file between them. Which of the following protocols would most probably be the fastest to do this transfer?

TFTP

Thelma is trying to send an e-mail from her server at Thelma.scoobydoobydo.com to her friend Josie at Josie.Pussycats.au. In what order is the request routed through the relevant DNS servers to resolve the names?

The Scoobydoobydo.com DNS server; the root DNS server; the .AU DNS server; the Pussycats.au DNS server First, Thelma's system sends a request to the Scoobydoobydo.com DNS server, then the Scoobydoobydo.com DNS server would send a query to the root DNS server. The root DNS server would point the Scoobydoobydo.com DNS server to the .au DNS server, which would point to the Pussycats.au DNS server. The Pussycats.au DNS server should know the host called Josie in that domain.

You recently installed wireless network cards for laptop users. The help desk receives a call from a user who couldn't access the network with a laptop while on a business trip, although the laptop worked fine when he tested it on his desk. What is the likely cause of the problem?

The user moved out of range of the access point. You have to be within the range of the access point to use a wireless LAN. IEEE 802.11 networks are designed to work in a local area of approximately 300 feet. Incorrect Answers: Wireless networks don't use modems or CAT 5 cable, and there is no separate encryption key for remote access with wireless networks.

Your company has to move the heavily-used intranet Web server from one computer to a new, faster system. You make the changeover and send out an e-mail to let everyone know. You then start getting a number of e-mails back saying users cannot access the new Web site by DNS name, even though you updated the "A" record in the DNS server. What's the most likely problem?

The users DNS cache still holds the old IP address to name association.

Oliver has inherited a network without any labeled ports on the patch panel. What tool will he need to get the patch panel properly labeled?

Toner The only tool that will work in this situation is the toner. A toner, which consists of a tone probe and tone generator, can be used to trace out the cables to determine the two ends of each cable. Incorrect Answers: A TDR determines the length of a cable, which does not help in this situation. A crossover cable allows two systems to be directed connected together. Hardware Loopback is used to test that a NIC is functioning properly.

You are working with your network administration team to create a new procedure for updating physical network diagrams. During the brainstorming session, your fellow teammates list the following ideas. Which of the these is the most appropriate for updating the diagrams?

Update whenever new network equipment is installed or changed. Whenever you get new network equipment such as routers, switches, or servers, and you need to install them on the network, it would be a good idea to update the diagrams at the same time. Incorrect Answers: If you were to get new employees that doesn't effect the network infrastructure directly. Waiting until before an audit is just procrastination. On the flipside, if you wait until after an audit, you'll have a ton of work on your hands after the auditing team tears into your network diagrams that haven't been maintained. You probably won't make many friends with the auditing team, either.

A network technician is trying to find out why a particular port on a switch will not allow other devices on the network to communicate with it. Which of the following is MOST likely the cause?

VLAN assignment VLAN assignment - VLAN ports can only communicate with other ports assigned to the same VLAN. Incorrect Answers: A wrong DNS server makes it impossible to reach destinations by their DNS names. A bad SFP module would prevent two routers from communicating with each other. Missing routes are temporary and usually get found automatically.

A company's network consists of a primary switch at one end of the office building and a secondary switch at the other end of the building. These switches are networked together. The office experiences a brownout only affecting the half of the building connected to the secondary switch. When power is restored, users connected to the secondary switch report no network or Internet connectivity. Which of the following should be verified on the secondary switch to resolve this issue?

Verify that the switch has power

Preparation for incidents is a multifaceted process that includes which tasks?

Vulnerability Scanning Penetration testing Vulnerability scanning and penetration testing show where network resources are exposed to risk. Once known, these resources can be hardened against threats. Incorrect Answers: Service -level agreements and statements of work are standard business documents that do not directly prepare for incidents.

As the network administrator for a small college, you have been asked to install and configure an 802.11g network. Which of the following protocols will provide maximum security for the students using the network?

WPA

Marshall is an IT manager for a small company. The company has a wireless network and is experiencing a significant increase in network traffic from the wireless access point to very high levels compared to the limited number of wireless devices in use. Marshall thinks that other, non-employees may be using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO.)

WPA encryption MAC filtering

During a projected network outage, several billing representatives need to be temporarily setup to take payments from customers. Because of the temporary nature of the situation, a wireless network was chosen, with security being enforced where possible. Which configuration will best meet the requirements for this scenario?

WPA2, SSID disabled, and 802.11a.

Brienne, an administrator, is attempting to connect a laptop to a server with a length of CAT5 cable that has RJ-45 connectors on each end. All of the IP settings have been verified to be correct, but the two computers can't connect. Which of the following would MOST likely fix the IP connectivity problem?

Wire pairs 1/ 2 and 3/ 6 need to be swapped on one end of the connecting cables.

Red is a farmer who has a home office and also works at a workstation in a barn on his property. The barn is located 150 feet (45 meters) from the house. Red wants to extend his home Internet connection to the barn. Which of the following technologies would MOST likely accommodate this range?

Wireless

A network administrator, is having intermittently lost connections with a local Linux server. She decides to check the IP address on the server to see if it conflicts with any other IP addresses on the network. Which of the following commands should Lisa use?

ifconfig

While working on your LAN, you notice that you cannot access your file server. Which of the following utilities would you use FIRST to troubleshoot the problem?

ipconfig When everything else is equal, assume a workstation will have problems before a server - run ipconfig on your system to make sure you have a good IP address!

You have been asked to inspect a computer that could be infected with spyware. What built-in utility can be used to show all the current network connections?

netstat

What is the correct wire order for the 568B standard?

orange stripe, orange, green stripe, blue, blue stripe, green, brown stripe, brown

You are setting up a network and would like to prevent users from having the ability to plug their PC into the network and receive an IP address. Which of the following would you implement in order to accomplish this?

static IP addressing


Related study sets

Digestive System and Metabolism Exam Study Guide (Pt. 5)

View Set

Reporting Serious Adverse Events in Investigations of Drugs and Biologics Quiz

View Set

La enfermedad como causa de marginación en la Edad Media (vocabulario)

View Set

Англійська мова 9 клас

View Set

Chapter 3: The Project Management Process Groups: A Case Study

View Set