Networking final, Networking 1, Networking...
There is a special range of addresses reserved for systems that cannot obtain an IP address automatically from a DHCP server. These addresses are not routable on the network. What is the value in the first octet for these addresses?
169
A Microsoft Windows® PC is configured to obtain its IP address via DHCP. If the PC is unable to contact a DHCP server, the PC automatically assigns itself an IP address in what range?
169.254.0.0 - 169.254.255.255
Which of the following address ranges is not routable? This task contains the radio buttons and checkboxes for options. T
169.254.0.0 - 169.254.255.255
Which of the following is a valid value of the first octet for a Class B IP address?
172
Which policy is also referred to as a fair use policy?
Acceptable use policy
Which policy provides restrictions and overall guidelines on how the network should be used?
Acceptable use policy
What mode of NIC redundancy has only one NIC active at a time?
Active-Standby
Gateway
Acts as a translator between two different telephony signaling environments
What routing protocol characteristic indicates the believability of the routing protocol (as opposed to other routing protocols)?
Administrative distance
Refer to the exhibit. Consider the network topology. Which (if any) device in the topology has an incorrect IP address? (Assume that if two devices belong to one subnet, and another device belongs to a different subnet, that device (belonging to a different subnet than the other two devices) has an incorrect IP address.)
All devices have valid IP addresses.
Which of the following best defines an IDS sensor?
An IDS sensor scans, audits, and monitors the security infrastructure for signs of attacks in progress.
Which of the following best defines an IPS sensor?
An IPS sensor sits in-line with traffic being analyzed, can recognize the signature of a well-known attack, and respond appropriately.
Which of the following conditions result in no current flowing through a circuit?
An open in a cable
What IoT technology is specialized for monitoring sensor data and is ultimately led by Garmin?
Ant+
What is the name of the wireless protocol used in a sensor to relay information such as a person's heart rate or a car's tire pressure?
Ant+
A corporate e-mail service would be classified as belonging to what Layer of the OSI Model?
Application
Which of the following is a Microsoft Windows® log that would report events related to software applications running on the underlying operating system?
Application
If a network has "five nines" of availability, what is its maximum downtime per year?
Approximately five minutes
Which IEEE 802.1X component checks the credentials of a device wanting to gain access to the network?
Authentication server
What is a routing protocol that is used for moving prefixes back and forth between different autonomous systems?
BGP
Which of the following routing protocols is an EGP?
BGP
Which routing protocol uses a complex set of metrics called path vectors?
BGP
While DHCP is not the only protocol used for dynamically assigning IP addresses to clients, it does offer a more robust set of features. Which of the following is a predecessor to DHCP, offering a reduced feature set?
BOOTP
A wireless LAN (WLAN) containing only one access point (AP) is known as what type of WLAN?
BSS
Refer to the exhibit. What type of LAN topology is shown in the graphic?
BUS
Which of the following pieces of equipment can a telephone technician use to determine if a phone line has dial tone?
BUTT SET
Which of the following conditions would most likely result in corrupted data?
Bad cables or connectors
Subnetting extends a classful subnet mask of an IP network to create additional subnets. However, what IP addressing approach removes bits from a classful subnet mask, to summarize multiple classful networks?
CIDR
Which of the following DNS record types is an alias of an existing record?
CNAME
Consider the fully-qualified domain name (FQDN) host1.pearsonitcertification.com; what is the top-level domain in the FQDN?
COM
What technology do WLANs use to decide when they gain access to the wireless media?
CSMA/CA
What is the technology used in an Ethernet network that features a backoff timer?
CSMA/CD
Which of the following statements are true of an Ethernet hub? Each correct answer represents a complete solution. Choose all that apply.
CSMA/CD needs to run on all attached devices. All connections need to be half-duplex.
Which of the following can distinguish between data arriving on various DS0s and can be thought of as a digital modem?
CSU/DSU
What can terminate an incoming digital circuit from a service provider and send properly formatted bits to a router?
CSU/DSU circuit
Which QoS mechanism is often called soft QoS?
Differentiated services
While an IPsec tunnel is being established, which of the following securely establishes a shared secret key, over the unsecured medium?
Diffie-Hellman (DH)
Which of the following is a modular switch port, allowing you quickly remove and insert a port in a modular switch you are troubleshooting?
GBIC
Which security technique uses wireless technologies to create an invisible boundary around some point?
Geofencing
Question 7 :Identify the broad categories of SNMP message types. (Choose three.)
Get,Set,Trap
Which IPv6 address type is indicated by the first four hex characters of an address ranging from 2000 to 3999?
Globally routable unicast
When following a structured troubleshooting methodology, what should you do if you test a hypothesis, and the hypothesis is determined to be invalid?
Hypothesize another probable cause of the issue.
A wireless LAN (WLAN) configured to work in an ad hoc fashion (that is, without requiring the use of an access point) is known as what type of WLAN?
IBSS
WLAN formed directly between wireless clients (without the use of a wireless AP) is referred to as what type of WLAN?
IBSS
You are troubleshooting an issue where a PC can reach some hosts on the Internet (using either DNS name or IP address), while several other hosts on the Internet are not reachable. From the PC you can Ping all devices on your local subnet. What is most likely causing the problem?
Incorrect (or missing) routes ina router's routing table
What is typically the problem when a host is unable to browse the Internet using domain names?
Incorrect DNS configuration
You are troubleshooting an issue where a PC cannot reach a web server (with a DNS name of pearsonitcertification.com) on the Internet. From the PC you can Ping the IP addresses of devices on your local subnet. You cannot Ping the DNS name of the web server. However, you have previously noted the IP address of the web server's IP address, and you notice that you can Ping the IP address of the web server. Of the following potential troubleshooting issues, what is most likely causing the problem?
Incorrect DNS configuration on the PC
What is typically the problem when a host is unable to reach devices outside the local network?
Incorrect default gateway
What term defines a variation in the delay of packets in the network?
Jitter
Question 3 :A lack of bandwidth can lead to which QoS issues? (Choose three.)
Jitter,Packet drops , Delay
Which of the following remote access security technologies is a client-server authentication protocol and uses the concept of a trusted third party (that is, a Key Distribution Center) that hands out tickets that are used instead of a username and password combination?
Kerberos
What is the name of the physical security device that's commonly grouped with keys and can be used to gain access to a network or a physical location?
Key fob
Which of the following security threats is a program that runs in the background of a computer and keeps a record of what a user types on their keyboard?
Keylogger
What protocol is used to bundle links together in order to improve bandwidth availability and redundancy?
LACP
What technology enables you to assign multiple physical links to a logical interface, which appears as a single link to a route processor?
LACP
Which of the following is a protocol that allows you to bundle multiple physical interfaces (for example, Ethernet switch interfaces) into a single logical interface?
LACP
Which type of fiber optic connector connects to a terminating device by pushing the connector into the terminating device and can be removed by depressing the tab on the connector and pulling it out of the terminating device?
LC
Which QoS mechanism can fragment large packets and interleave smaller packets in amongst the packet fragments?
LFI
Which of the following mechanisms is considered a link-efficiency tool in QoS? This
LFI
Which MPLS element makes frame-forwarding decisions based on labels applied to frames? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A ELSR
LSR
What term defines a delay of packets in the network?
Latency
What wireless LAN (WLAN) issue results from a WLAN's use of CSMA/CA?
Latency
An Ethernet hub resides at which layer of the OSI Model?
Layer 1
An Ethernet switch resides at which layer of the OSI Model?
Layer 2
Question 7 :A router resides at which layer of the OSI Model?
Layer 3
Internet Protocol (IP) resides at what layer of the OSI Model? Each correct answer represents a complete solution. Choose all that apply.
Layer 3 , Network
American Standard Code for Information Interchange (ASCII) would be classified at which layer of the OSI Model?
Layer 6
A DHCP server can be used to assign a temporary IP address to a DHCP client, as opposed to a network administrator statically configuring an IP address on that client. What is this temporary IP address assignment called?
Lease
Question 63 :A T3 connection is an example of which WAN type?
Leased Line
Which IPv6 address type begins with the hex characters FE80?
Link-local
Refer to the exhibit. In the topology, "Network Appliance X" takes requests coming into the server farm and spreads those requests out over all of the available servers (which contain identical content). What type of network appliance is Network Appliance X?
Load balancer
Which of the following network appliances is also known as a content swit
Load balancer
Which of the following connects the transmit leads of an Ethernet connector (or the transmit fiber of a fiber optic connector) to the receive leads of the same Ethernet connector (or the receive fiber of a fiber optic connector)?
Loopback plug
Which of the following approaches to wireless LAN (WLAN) security restricts access to a WLAN based on a computer's wireless interface card? This
MAC address filtering
In the absence of STP, what issues might result from a Layer 2 loop in a network? (Choose two.)
MAC address table corruption, Broadcast storms
Which of the following are sublayers of the Data Link Layer (that is, Layer 2) of the OSI Model? Each correct answer represents a complete solution. Choose all that apply.
MAC, LLC
Which of the following UNIX commands can be used to invoke a UNIX syntax reference?
MAN
Which of the following connects to multiple intermediate distribution frames?
MDF
What Ethernet switch feature allows a port to automatically determine which of its leads are used for transmitting data and which of its leads are used for receiving data?
MDIX
Which of the following features allows an Ethernet switch port to automatically detect which of its pins should be used for transmitting and which pins should be used for receiving? This
MDIX
Which of the following features can fix mismatched Tx/Rx leads on an Ethernet switch?
MDIX
Which Ethernet switch feature allows an Ethernet switch to make a copy of frames seen on one switch port and send those copies out of another Ethernet switch port? (NOTE: This feature is often used to allow a network analyzer connected to one switch port to see traffic present on a different switch port.)
Port forwading
Which of the following is a vulnerability scanner product from Tenable Network Security®?
Nessus
What switch feature allows you to connect a network sniffer to a switch port and tells the switch to send a copy of frames seen on one port out the port to which your network sniffer is connected?
Port mirroring
Which of the following is a link-state routing protocol that uses a metric of cost, which is based on the link speed between two routers?
OSPF
A network administrator can use which of the following to locate a break in a fiber optic cable?
OTDR
What piece of test equipment enables you to locate a break in a fiber-optic cable?
OTDR
Which of the following network appliances acts as a relay for packets traveling between a network's clients and the Internet and is not focused on tunneling?
Proxy server
From the following list, identify the detection methods commonly used by IPS sensors. (Choose three.)
Policy Based, Signature Based, Behavior Based
What Ethernet switch feature allows a PC running packet capture software and connected to one switch port to receive a copy of traffic seen on another switch port?
Port Mirroring
Which of the following network appliances is used to restrict clients from accessing certain URLs on the Internet?
Proxy server
Refer to the exhibit. In the topology shown, what is the most likely type of network appliance labeled as "Network Appliance X?"
Proxy server
Which of the following tools should be used to connect wires to a 110 block?
Punch Down tool
Which of the following remote access security technologies is a UDP-based protocol used to communicate with an AAA server and does not encrypt an entire authentication packet, but only encrypts the password?
Radius
Which type of fiber optic connector, containing one fiber optic strand per connector, is connected by pushing the connector into a terminating device and can be removed by pulling the connector from the terminating device?
SC
What does the term asymmetric mean in DSL?
The upload speed and the download speed differ.
If you are working on an isolated test network (that is, a test bed), what piece of equipment can you use to simulate a heavy network load?
Throughput tester
What is a common reason for disabling SSID broadcast in a wireless LAN (WLAN)? This
To better conceal the SSID of a WLAN
Which of the following pieces of test equipment is sometimes called a "fox and hound?"
Toner Probe
Which of the following tools best helps you determine which wires on a punch down block connect back to a specific user's office?
Toner probe
Identify the quality of service (QoS) mechanism that can set a bandwidth limit on traffic and delays packets, rather than drops packets, attempting to exceed that bandwidth limit.
Traffic Shaping
Question 51 :If you want to buffer excess traffic and send it later, what traffic conditioning technology should you consider?
Traffic Shaping
Windowing is provided at what layer of the OSI reference model?
Transport Layer
Question 9 :Identify the four layers of the TCP/IP stack.
Transport Layer, Internet Layer, Application Layer, Network Interface Layer
Which of the following security threats is a program that appears to be for one purpose (for example, a game), but secretly performs another task (for example, collecting a list of contacts from an end-user's e-mail program)?
Trojan horse
Which of the following network appliances performs the most processor-intensive tasks and is critical in IPSec environments?
VPN concentrator
What technology is an IETF version of HSRP?
VRRP
Which Ethernet switch feature allows you to create a VLAN on one switch and have that VLAN be automatically created on other switches?
VTP
What virtual network device allows Microsoft Active Directory (AD) services, UNIX-based web services, and DNS services to be co-resident on the same network device?
Virtual Server
What virtual network service stores user data and the GUI in a data center, as opposed to the hard drive in a user's computer?
Virtual desktop
What virtual network component allows virtual servers located on the same physical server to be logically separated into different VLANs?
Virtual switch
Which of the following security threats is a piece of code (for example, a program or a script) that infects a system, because an end-user executed a program?
Virus
What type of software application should network administrators routinely use to verify the security of their network and check for any weaknesses?
Vulnerability scanner
Which of the following approaches to wireless LAN (WLAN) security uses RC4 as its encryption algorithm?
WEP
Which of the following wireless LAN (WLAN) security threats involves mathematical algorithms that can determine a pre-shared key value? This
WEP and WPA security cracking
Which two of the following are common wireless security standards?
WEP, WPA
Which of the following security threats can infect a system or propagate to other systems without any intervention from an end user?
WORM
Which of the following approaches to wireless LAN (WLAN) security uses TKIP for encryption?
WPA
Which of the following approaches to wireless LAN (WLAN) security requires users to authenticate against an authentication server's database, rather than a client being configured with a PSK?
WPA Enterprise
Question 7 :Which standard developed by the Wi-Fi Alliance implements the requirements of IEEE 802.11i?
WPA2
Which of the following approaches to wireless LAN (WLAN) security uses AES for encryption? This
WPA2
Which of the following wireless LAN (WLAN) security threats involves performing reconnaissance to identify open wireless access points (APs) that could potentially become targets of future attacks?
War driving
Which of the following wireless LAN (WLAN) security threats involves a user writing a symbol in a public place, letting other users know about the existence of a WLAN, and possibly information about how to access that WLAN?
Warchalking
When an organization is developing a site redundancy solution, which option offers decent recovery times without initial responsiveness equivalent to the main site?
Warm Site
A notification that a specific operation failed to complete successfully is classified as what syslog severity level?
Warnings (4)
What is a best practice to prevent you from damaging a circuit board with static from your body?
Wear an ESD wrist strap.
Which of the following UNIX commands can be used to configure the IP address of a UNIX host's Ethernet interface?
ifconfig
The Network Layer of the OSI Model corresponds to what layer of the TCP/IP Stack? This
internet
What command enables you to refresh DHCP lease information?
ipconfig
What tool would you use to release a DHCP address on a Windows system?
ipconfig
Refer to the exhibit. What command produced the output shown on your Windows workstation?
ipconfig /all
What command enables you to view the DNS settings for the device?
ipconfig /all
What command would you use to verify the DNS server to be used by your Windows workstation?
ipconfig /all
Which of the following commands is used on a UNIX host to generate information about each router hop along the path from a source to a destination? This
traceroute
Which of the following is a type of network interface device (NID) that includes circuitry to perform such functions as converting between framing formats on a digital circuit?
Smart Jack
What is the name of the physical security device that is credit card sized and allows a user to authenticate onto a network?
Smart card
Which of the following remote access security technologies is a TCP-based protocol used to communicate with an AAA server and encrypts an entire authentication packet, rather than just the password?
TACACS+
Which of the following requires two types of authentication (but no more) from a user seeking admission to a network?
TFA
Which of the following protocols is used for transferring files with a remote host in a non-secure fashion and without requiring user credentials?
TFTP
Which of the following protocols are most commonly used to provide security for an HTTPS connection? (Choose two.)
TLS, SSL
What are the two primary protocols found at the Transport Layer of the TCP/IP Stack?
Tcp/udp
Which two of the following protocols are used to connect to a remote host via a terminal emulator?
Telnet, SSH
Refer to the exhibit. What is the output shown?
The ARP cache information
What is an acceptable one-way latency in a typical VoIP network?
150 ms
What is the maximum recommended one-way delay for voice traffic?
150 ms
What is the bandwidth of an OC-3?
155.52 Mbps
What is the leased line technology that has a bandwidth capacity of 44.7 Mbps?
T3
What command produced the following snippet of output?
ifconfig
What is the data rate of an OC-3 connection?What is the data rate of an OC-3 connection?
155.52Mbps
What DSL variant has a distance limitation of 18,000 ft. between a DSL modem and its DSLAM?
ADSL
Which of the following is a symmetric encryption algorithm available in 128-bit, 192-bit, and 256-bit key versions?
AES
Which of the following is an IPSec protocol that provides authentication and integrity services but does not support encryption?
AH
What wireless LAN (WLAN) device interconnects a wired LAN with wireless devices?
AP
What specification identifies the cable television frequencies dedicated to data transmission?
DOCSIS
What device terminates the DSL signal coming from a customer?
DSLAM
What technology allows devices to simultaneously transmit and receive data?
Full duplex
What WAN topology is typically the most complex and expensive to implement?
Full mesh
Which NDP message type is used by a host to locate the IPv6 routers attached to the local network?
RS
What is the measure of a wireless signal's strength?
RSSI
Which of the following is a value measuring the power of a wireless signal?
RSSI
Question 9 :Which of the following QoS mechanisms is considered an IntServ mechanism?
RSVP
Question 22 :What technology operates in the 3 kHz through 300 GHz range
Radio
Which of the following wireless LAN (WLAN) security threats is also known as an "evil twin?"
Rogue access point
What device in an STP domain features all ports in a Designated state?
Root Bridge
Question 1 :What device is a Layer 3 device that is used to make forwarding decisions based on a Layer 3 address?
Router
What device would forward information using the following address as its primary information: 192.168.1.101?
Router
An IP version 6 (IPv6) address contains how many bits?
128
What is the common TCP port (that is, "well-known" port) used by IMAP?
143
What is the maximum amount of power a switch is allowed to provide per port according to the IEEE 802.3af standard?
15.4W
One error occurred during the transmission of 8 bits. What is the BER?
.125
Which of the following are examples of top-level domains? Each correct answer represents a complete solution. Choose two.
.com, .edu
Given a subnet mask of 255.255.192.0, what is the corresponding prefix notation?
/18
Your company has been assigned the 172.16.0.0/16 network for use at one of its sites. You need to use a subnet mask that will accommodate 42 subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask will you use?
/22
Your company has been assigned the 192.168.1.0/24 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 30 hosts per subnet, while maximizing the number of available subnets. What subnet mask will you use?
/27
What option would you specify after the ipconfig command to display the IP address of a Windows PC's DNS server?
/all
Question 61 :Which Syslog severity level indicates the most severe condition?
0
What is the best possible value for administrative distance?
0
What is the subnet mask address used in a default static route?
0.0.0.0
Question 6 :What is the network address and subnet mask of a default route?
0.0.0.0/0
The default route in Internet Protocol Version 4 is designated as which of the following?
0.0.0.0/0.
What is the MAC address corresponding to the IP address of 172.16.202.2?
00-50-56-fd-65-2c
Although it does not indicate the most severe Syslog error condition, which Syslog severity level indicates a condition requiring immediate attention?
1
You have a Layer 2 switch. You have left all ports in the default VLAN. You connect five workstations. How many broadcast domains exist on this switch?
1
In the given figure, all the three wireless access points (APs) operate in the 2.4 GHz frequency band. Which three channels should be used by the APs?
1,6,11
You are configuring a wireless LAN (WLAN) with three wireless access points having overlapping coverage areas. The wireless access points are using the 2.4 GHz frequency band and are located in the United States. What three non-overlapping channels in the 2.4 GHz band should you select?
1,6,11
What is the range for a Class A address?
1-126
Which of the following statements are true regarding VLANs?
1. A VLAN has a single broadcast domain. 2. For traffic to pass between two VLANs, that traffic must be routed.
Which of the following categories of UTP cabling are commonly used for 1000BASE-T networks?
1. CAT 6 2. CAT 5e
Identify two differences between an Ethernet bridge and an Ethernet switch.
1. Switches usually have higher port densities than bridges. 2. Switches use ASICs to make forwarding decisions, whereas bridges make their forwarding decisions in software.
What is the bandwidth of a T1 digital circuit?
1.544 Mbps
What is the distance limitation of 10GBASE-LW?
10 km
If multiple wireless access points exist in a wireless LAN (WLAN), what percentage of coverage overlap should the access points have?
10 to 15 percent
When extending the range for a 2.4GHz WLAN, you can use nonoverlapping channels for adjacent coverage cells. However, there should be some overlap in coverage between those cells (using nonoverlapping channels) to prevent a connection from dropping as a user roams from one coverage cell to another. What percentage of coverage overlap should you recommend for these adjacent cells?
10% to 15%
Given the following network address translation (NAT) topology, identify the IP address that is the outside global IP address. (NOTE: To avoid using an organization's actual IP addresses in this question, all IP addresses are technically private IP addresses. However, assume that the 172.16.1.0/24 network and the 10.1.2.3 IP address are publicly routable.)
10.1.2.3
Identify the distance limitation of a 1000BASE-T Ethernet network.
100 m
What is the distance limitation of 10GBASE-LR?
10km
What is the maximum bandwidth of an 802.11b wireless LAN (WLAN)?
11 MBPS
What is the administrative distance of OSPF in a Cisco network?
110
A router has 12 ports. How many broadcast domains does the router have?
12
A switch has 12 ports. How many collision domains does the switch have?
12
What is the administrative distance of RIP in a Cisco network?
120
Identify the well-known UDP port number for NTP.
123
Refer to the exhibit. Given the network address translation (NAT) topology, identify the IP address that is the inside global IP address. (NOTE: To avoid using an organization's actual IP addresses in this question, all IP addresses are technically private IP addresses. However, assume that the 172.16.1.0/24 network and the 10.1.2.3 IP address are publicly routable.)
172.16.1.2
To what subnet does a host with an IP address of 172.16.155.10/18 belong?
172.16.128.0/18
Refer to the exhibit. Examine the output shown. What is the address that information is sent to if it is determined that the remote address is on a different subnet?
192.168.1.1
A router's IP routing table has entries noted in the exhibit. To which next hop IP address will the router forward a packet destined for 10.1.2.1?
192.168.1.2
Refer to the exhibit. Given the network address translation (NAT) topology, identify the IP address that is the inside local IP address. (NOTE: To avoid using an organization's actual IP addresses in this question, all IP addresses are technically private IP addresses. However, assume that the 172.16.1.0/24 network and the 10.1.2.3 IP address are publicly routable.)
192.168.1.2
You are designing a small office/home office (SOHO) network, and you wish to have four subnets, while maximizing the number of hosts per subnet. The network you need to subnet is 192.168.5.0/24. Which of the following is one of the four subnets you should create?
192.168.5.64/26
What type of cordless phone is most likely to interfere with a wireless LAN (WLAN)?
2.4 GHZ
The IEEE 802.11b wireless standard has which of the following frequency band / maximum bandwidth parameters?
2.4 GHz / 11 Mbps
The IEEE 802.11g wireless standard has which of the following frequency band / maximum bandwidth parameters?
2.4 GHz / 54 Mbps
The IEEE 802.11n wireless standard has which of the following frequency band / maximum bandwidth parameters?
2.4 GHz or 5 GHz / > 300 Mbps
What are the common TCP ports (that is, "well-known" ports) used by FTP? Each correct answer represents a complete solution. Choose two.
20,21
What is the common TCP port (that is, "well-known" port) used by SSH?
22
What is the common TCP port (that is, "well-known" port) used by Telnet?
23
Question 8 :What is the common TCP port (that is, "well-known" port) used by SMTP?
25
Given a subnet mask of /19, what is the corresponding dotted decimal notation?
255.255.224.0
What is the correct formula for the calculation of the number of hosts that can exist on a given subnet?
2^h - 2
If you need to create at least six subnets, how many bits should you use for subnetting?
3
How many channels on an E1 circuit are available for voice, video, or data?
30
Question 58 :What is the distance limitation of 10GBASE-SW?
300 M
What is the size of an MPLS header?
32 bits
What is the maximum range of the IEEE 802.11g wireless standard?
32 m indoors / 140 m outdoors
Question 20 :What TCP port is used by RDP?
3389
What is the maximum range of the IEEE 802.11b wireless standard?
35 m indoors / 140 m outdoors
Which Syslog severity level is a condition where a specific operation failed to complete successfully?
4
Question 37 :What is the distance limitation of 100GBASE-ER4?
40 km
What is the distance limitation of 10GBASE-ER?
40 km
What is the common TCP port (that is, "well-known" port) used by HTTPS?
443
How big is the payload of an ATM cell?
48 bytes
How big is the payload part of an ATM cell?
48 bytes
If you need to create at least 30 subnets, how many bits must you use for subnetting?
5
In a wireless LAN (WLAN) operating in the 2.4 GHz band, access points (APs) with adjacent coverage areas should have how many channels of separation to avoid interfering with one another?
5
You have a Layer 2 switch. You have left all ports in the default VLAN. You connect five workstations. How many collision domains exist on this switch?
5
The IEEE 802.11a wireless standard has which of the following frequency band / maximum bandwidth parameters?
5 GHz / 54 Mbps
If a network has the five nines of availability, how much downtime does it experience per year?
5 minutes
Question 31 :What is the common port (that is, "well-known" port) used by DNS?
53
What is the maximum bandwidth of an 802.11g wireless LAN (WLAN)?
54 Mbps
Question 81 :What is the maximum bandwidth of an 802.11a wireless LAN (WLAN)?
544 Mbps
If you need to create at least 58 subnets, how many bits must you use for subnetting?
6
When you're using the 2.4GHz band for multiple access points in a WLAN found in the United States, which nonoverlapping channels should you select? (Choose three.)
6,11,1
What protocol is used to request a MAC address that corresponds to a known IPv4 address on the local network?
ARP
Approximately how many addresses are provided by a Class B scheme?
65,000
Which of the following is a cross-connect block that was popular for cross-connecting Cat 3 UTP cables for 10 Mbps Ethernet LANs, but does not support higher-speed LAN technologies, such as 100 Mbps Ethernet LANs?
66 block
Which Syslog severity level produces highly detailed information that is typically used for troubleshooting purposes?
7
What is the maximum range of the IEEE 802.11n wireless standard?
70 m indoors/ 250 m outdoors
Question 15 :What is the common TCP port (that is, "well-known" port) used by HTTP?
80
What is the name of the wireless protocol that can be used to form local area networks in the 900MHz as well as 2.4, 3.6, 5, and 60GHz frequencies?
802.11
Consider the following wireless network (WLAN) topology. A wireless client running IEEE 802.11a is having connectivity issues when attempting to roam between access points (APs). What is the most likely issue?
802.11 standards
Which wireless LAN (WLAN) standards can operate in the 5 GHz frequency band? Each correct answer represents a complete solution. Choose all that apply.
802.11a, 802.11n
You are configuring a wireless access point (AP). You specify a wireless standard of 802.11n operating in the 2.4 GHz band. You also select an option to make it operate in a "backward compatible" mode. Therefore, what additional 802.11 standards are supported? Each correct answer represents a complete solution. Choose all that apply.
802.11b 802.11g
Which IEEE 802.11 variant supports a maximum speed of 54Mbps and uses the 2.4GHz band?
802.11g
Direct-Sequence Spread Spectrum (DSSS) is a wireless LAN (WLAN) transmission method. Which two of the following WLAN standards use the DSSS transmission method?
802.11g 802.11b
Orthogonal Frequency Division Multiplexing (OFDM) is a wireless LAN (WLAN) transmission method. Which three of the following WLAN standards support OFDM?
802.11n 802.11a 802.11g
Which wireless LAN (WLAN) standards can operate in the 2.4 GHz frequency band? Each correct answer represents a complete solution. Choose all that apply.
802.11n 802.11g 802.11b
Which of the following approaches to wireless LAN (WLAN) security involves the use of an authentication server?
802.1X
Which of the following user authentication technologies uses a supplicant, an authenticator, and an authentication server?
802.1X
Which IEEE standard, supported on some Ethernet switches, requires a user to authenticate themselves before gaining access to the rest of the network?
802.1x
What is the IEEE standard for link aggregation?
802.3ad
What is the IEEE standard for the version of Power over Ethernet that offers a maximum of 15.4 Watts of power to an attached device?
802.3af
What is the IEEE standard for the version of Power over Ethernet that offers a maximum of 32.4 Watts of power to an attached device?
802.3at
Which of the following protocols resolves an IP address of a network device to a corresponding MAC address?
ARP
Which of the following DNS record types is used to map a hostname to an IPv4 address?
A
What is a DHCP lease?
A DHCP lease is a temporary assignment of IP address information to a DHCP client.
What is a DHCP reservation?
A DHCP reservation is a static addressing approach where a specific MAC address is mapped to a specific IP address, which will not be assigned to any other network device.
Which two of the following are true regarding a client-to-site and site-to-site virtual private networks (VPN)?
A client-to-site VPN (also known as a remote access VPN) interconnects a remote user with a site, as an alternative to dial-up or ISDN connectivity, at a reduced cost. A site-to-site VPN interconnects two locations, as an alternative to a leased line, at a reduced cost.
Which of the following best defines a firewall?
A firewall defines a set of rules dictating which types of traffic are permitted or denied as that traffic enters or exits a firewall interface.
In a wireless LAN (WLAN), what might cause a "multipath" problem?
A metal file cabinet
Question 39 :What is a native VLAN?
A native VLAN is the VLAN on an IEEE 802.1Q trunk that does not have any tag bytes added.
Call agent
A repository for a VoIP network's dial plan
Which of the following are ways routes can be injected into a router's IP routing table? Each correct answer represents a complete solution. Choose all that apply.
A route is dynamically learned. A route is redistributed from one routing source into a dynamic routing protocol. A route is statically configured. A route is directly connected.
Why might a network using DHCP for IP address assignment need a DHCP relay agent?
A router resides between a DHCP client and a DHCP server.
Question 26 :Identify the purpose of a DHCP scope.
A scope acts as a pool of IP addresses from which a DHCP server can assign IP addresses to DHCP clients.
IP phone:
A telephone with an integrated Ethernet connection.
While troubleshooting a connectivity issue in your network, you did a Ping from Host A to Host B, and the Ping was successful. From this, where can you conclude the issue resides?
Above OSI Layer 3
A router operating at Layer 3 primarily makes its forwarding decisions based on what address? This
Destination IP address
Which of the following DNS record types is an IPv6 address record?
AAAA
Which approach to bandwidth usage consumes all the available frequencies on a medium to transmit data?
BaseBand
What is a snapshot of performance on a typical usage level for the network?
Baseline
Which of the following configuration management (CM) elements involves collecting network statistics during normal network operation?
Baselining
What is the range of well-known TCP and UDP ports?
Below 1024
Which QoS mechanism does not reorder packets and simply uses first-in, first-out logic?
Best effort
Question 103 :Where is PPPoE typically used in a DSL environment?
Between the home and a service provider
What type of physical security utilizes a fingerprint or facial recognition to verify identity? This
Biometrics
If a packet cannot be forwarded by a router interface due to the packet's size exceeding the interface's maximum transmission unit (MTU), the router attempts to fragment the packet, unless the packet's header has the don't fragment (DF) bit set. If the DF bit is set, the router usually drops the packet and sends an ICMP message back to the sender, to let the sender know that the packet was dropped. If a router does not send such a notification, what is that router called?
Black hole router
A router that drops a packet exceeding a router interface's MTU size, when that packet has its "don't fragment" bit set, is called which of the following?
Black-hole router
What is the name of the wireless technology that can create a personal area network (PAN)? This
Bluetooth
Which of the following security attacks occurs when an attacker exploits a known vulnerability in an application (for example, an error in an application that allowed that application to write to an area of memory dedicated to a different application), which could cause another application to crash?
Buffer overflow attack
What device, traditionally used by telephone technicians, enables you to tap into a phone line to, for example, check a line for dial tone?
Butt set
Question 1 :If you successfully ping from host A to host B, what can you conclude about host A?
Its OSI Layers 1-3 are functional.
Question 65 :Which of the following is an open standard variant of HSRP? This
CARP
Question 3 :Which piece of test equipment can you use to test the throughput of a Cat 5 cable?
Cable certifier
Which of the following pieces of equipment can be used to determine the supported frequency range of a cable?
Cable certifier
Which of the following is mostly likely to cause EMI?
Cable placement
A network administrator can use which of the following to locate a break in a copper cable?
Cable tester
Which of the following pieces of equipment can be used to check the wires in a cable for continuity (that is, check to make sure there are no opens, or breaks, in a conductor)?
Cable tester
Which of the following reflect the media type, bandwidth capacity, and distance limitation combination of 10BASE-T Ethernet?
Cat 3 (or higher) UTP/10 Mbps/100 m
Which type of unshielded twisted pair (UTP) is commonly used in Ethernet 10BASE-T networks, which carry data at a rate of 10 Mbps (although it can carry data at a maximum rate of 16 Mbps, as seen in some Token Ring networks)?
Category 3
Which type of unshielded twisted pair (UTP) cable uses 24 gauge wiring and is commonly used in Ethernet 100BASE-TX networks, which carry data at a rate of 100 Mbps, although it is capable of carrying traffic at a rate of 155 Mbps on older implementations of ATM networks? (NOTE: This type of UTP should not be used for networks running at speeds of 1 Gbps or higher.)
Category 5
Which type of unshielded twisted pair (UTP) cable is commonly used for 1000BASE-T Ethernet networks and is often made of relatively thick conductors (for example, 22 gauge or 23 gauge wire) and thick insulation?
Category 6
What is the minimum category of unshielded twisted pair (UTP) cable that can be used for 10GBASE-T networks for the distance of 100 meters?
Category 6a
ATM can be considered in which of the following WAN categories?
Cell switched
Asynchronous Transfer Mode is associated with which of the following?
Cell-switched connection
Question 33 :What type of authentication credentials are used by SNMPv2c?
Community Strings
Refer to the exhibit. Consider the wireless network (WLAN) topology. A wireless client running IEEE 802.1g is having connectivity issues when attempting to roam between access points (APs). What is the most likely issue?
Channel Selection
Which of the following remote access security technologies performs authentication through a three-way handshake (that is, challenge, response, and acceptance messages) between a server and a client, where the three-way handshake allows a client to be authenticated without sending credential information across a network?
Chap
ISDN is an example of which of these WAN types?
Circuit Switched
SDN is considered to be what type of WAN connection?
Circuit-switched connection
What class of IP address is 172.16.1.2?
Class B
What class of address is used for small networks with few systems that need connection?
Class C
What class of address is used for multicast in IP?
Class D
What class of address is used for experimental purposes?
Class E
Question 120 :Which of the following (QoS) functions places traffic into different categories?
Classification
Which DLP target activity level addresses data in operation?
Client Level
What type of network has a dedicated file server, which provides shared access to files?
Client-server
Which is not an area typically targeted by a data loss prevention policy?
Cloud level
Which of the following reflects the media type, bandwidth capacity, and distance limitation combination of 10BASE2 Ethernet?
Coax/10 Mbps/185 m
Which of the following reflect the media type, bandwidth capacity, and distance limitation combination of 10BASE5 Ethernet?
Coax/10 Mbps/500 m
When an organization is developing a site redundancy solution, which option offers recovery but is the most time consuming upon main site failure?
Cold Site
Which of the following steps are involved in diagnosing a problem? Each correct answer represents a complete solution. Choose all that apply.
Collect information. B Eliminate potential causes. C Verify hypothesis.
Random Early Detection (RED) is an example of which of the following (QoS) functions?
Congestion avoidance
Queuing is another name for which of the following quality of service (QoS) functions?
Congestion management
Which phase of an incident response plan focuses on the protection of resources and determining operational status?
Contain
Refer to the exhibit. In the topology, "Network Appliance X" receives content coming over a WAN from the HQ server and stores that content locally. This allows devices at the Branch Office site to get their content directly from this network appliance, without burdening the WAN. What type of network appliance is Network Appliance X?
Content engine
What performance optimization technology uses a network appliance, which can receive a copy of content stored elsewhere (for example, a video presentation located on a server at a corporate headquarters), and serves that content to local clients, thus reducing the bandwidth burden on an IP WAN?
Content engine
What specialized network device is commonly used to load-balance traffic across multiple servers in a group?
Content switch
Routing protocols differ in the amount of time they require to fail over from a previously active route to a backup route. What is the name for this routing protocol property?
Convergence
Which options should be included in a bring-your-own-device policy?
Corporate support policy per device or device category,Explicit and detailed list of permitted devices,
What metric is used by the OSPF routing protocol?
Cost
Which of the following pieces of equipment can be used to attach an RJ-45 connector to a UTP cable?
Crimper
Which of the following conditions can occur when an analog connection creates an electromagnetic field around its conductors, inducing its waveforms on a nearby analog connection?
Cross-talk
Which options should be included in a bring-your-own-device policy?
Detailed presentation on the exit policies for employees C Integration between it and the acceptable use policy
In what type of attack does the attacker compromise multiple systems and then instruct those compromised systems, called zombies, to simultaneously flood a target system with traffic?
DDos
Which of the following security attacks occurs when an attacker compromises multiple systems, and those compromised systems, called "zombies," are instructed by the attacker to simultaneously launch an attack against a target system, exhausting that target system's resources?
DDos Attack
Which of the following features allows a network device without an IP address to dynamically be assigned IP address information (for example, IP address, subnet mask, DNS server, and WINS server) from a network server?
DHCP
Refer to the exhibit. Consider the topology. What needs to be configured on router R1 in order for the DHCP client to successfully send a DHCPDISCOVER message to the DHCP server?
DHCP relay agent
A DHCP reservation involves the exchange of four messages between a DHCP client and a DHCP server. What is the first of these messages?
DHCPDISCOVER
What is the first DHCP message sent by a client attempting to obtain IP address information from a DHCP server?
DHCPDISCOVER
Which of the following are valid DHCP message types used during a DHCP reservation? Each correct answer represents a complete solution. Choose all that apply.
DHCPDISCOVER C DHCPREQUEST D DHCPACK
What locally significant identifier is used by a Frame Relay network to reference a virtual circuit?
DLCI
A firewall might use what configuration option to prevent users on the Internet from initiating sessions with devices inside a corporate network, while still allowing users on the Internet to initiate sessions with publicly available corporate servers (for example, an e-mail server or a web server)?
DMZ
What variation of network address translation (NAT) automatically assigns an inside global address from a pool of available addresses?
DNAT
What NAT variation automatically assigns an inside global address from a pool of available addresses?
DNAT - Dynamic NAT permits
What service is typically used to resolve a FQDN?
DNS
In cable modem technologies, the frequencies dedicated to data transmission are specified by what?
DOCSIS
Which layer of the OSI reference model contains the MAC and LLC sublayers?
Data Link Layer
What type of policy seeks to focus on accidental or malicious information loss?
Data loss prevention policy
What are common sensitive data-identification methods that are the focus of data loss prevention systems?
Deep content inspection, Content-level scanning
Which two of the following are DHCP options that a DHCP server can assign to a DHCP client?
Default gateway, DNS server
What type of route is manually configured in a router's routing table and tells a router where to send traffic destined for a network not in the router's routing table?
Default static route
Question 3 :Which of the following is most likely the first step in a structured troubleshooting methodology?
Define the problem.
Which of the following is the point in a telephone network where the maintenance responsibility passes from a telephony company to a subscriber (unless the subscriber has purchased inside wiring maintenance)?
Demarc
In a topology running STP, every network segment has a single ______________ port, which is the port on that segment that is closest to the root bridge in terms of cost.
Designated
If a PC on an Ethernet network attempts to communicate with a host on a different subnet, what destination IP address and destination MAC address will be placed in the packet/frame header sent by the PC?
Dest. IP: IP address of remote host. Dest. MAC: MAC address of default gateway.
Which of the following approaches to wireless LAN (WLAN) security helps conceal the existence of a WLAN?
Disabling SSID broadcast
What is often the last stage of a system life cycle used in the network?
Disposal
Who developed the TCP/IP Stack network reference model (also known as the TCP/IP Model)?
DoD
Which of the following security attacks occurs when an attacker sends the target system a flood of data or requests that consume the target system's resources?
DoS attack
Which of the following security attacks occurs when an attacker sends a target system a flood of data or requests that consume the target system's resources?
Dos attack
What topology is seen in WAN networks and was designed to increase the redundancy of communications?
Dual ring
You are troubleshooting an issue where a PC is having intermittent connectivity issues. The PC can Ping specific local and remote hosts (using both IP addresses and DNS names) some of the time but not all of the time. Which of the following issues is the most likely cause of this PC's unpredictable traffic patterns?
Duplicate IP addresses
Which of the following is a valid representation of the IPv6 address of 0E50:0002:0000:0000:0000:4000:0000:0001?
E50:2::4000:0:1
Which of the following specifies how authentication is performed by IEEE 802.1X?
EAP
What variant of Domain Name System (DNS) overcomes the size limitations of the original version of DNS through the use of pseudo-resource-records?
EDNS
A Cisco router has learned a network via three different routing protocols: OSPF, EIGRP, and RIP. Which route will the router believe (that is, inject into the router's IP routing table)? This
EIGRP
Which of the following routing protocols are interior gateway protocols? Each correct answer represents a complete solution. Choose all that apply.
EIGRP IS-IS OSPF
Which two routing protocols use bandwidth in their calculation of metric by default?
EIGRP, OSPF
What is another name used to reference the functions provided by the Provider Edge (PE) router?
ELSR
A wireless LAN (WLAN) containing at least two access points (APs) is known as what type of WLAN?
ESS
What is the name of the process that is used in IPv6 address autoconfiguration to form a host ID?
EUI-64
If two devices simultaneously transmit data on an Ethernet network and a collision occurs, what does each station do in an attempt to resend the data and avoid another collision?
Each device sets a random back-off timer, and the device will attempt retransmission after the timer expires.
Which of the following is a Microsoft Windows® command that can display a listing of NetBIOS device names learned by a PC?
N\\nbtstat
Consider the following wireless network (WLAN) topology. A wireless client running IEEE 802.11g is having connectivity issues when attempting to roam between access points (APs). What is the most likely issue?
Encryption types
Which of the following can send an alert to a network administrator if humidity levels in a server farm exceeds a configured threshold?
Environmental monitor
Which phase of an incident response plan focuses on the removal of an infection?
Eradicate
What Microsoft Windows application enables you to view a variety of log types, including application, security, and system logs?
Event Viewer
Which of the following conditions would most likely result in corrupted data?
Exceeding the distance limitation of a cable
What is typically the problem when a host is unable to obtain an IP address from a local DHCP server?
Exhausted DHCP scope
Drag the routing information sources to match them with their administrative distances.
Explanation: The routing information sources with their administrative distances are given below: Statically configured network: 1 EIGRP: 90 OSPF: 110 RIP: 120 External EIGRP: 170
Drag the network attacks to match them with their descriptions.
Explanation: Types of network attacks are described below: Malware: A software program designed to damage or take other unwanted actions on a computer system EMI interception: An attacker copies information traveling over the wire Man-in-the-middle: An attacker gets in the direct path between a client and a server and eavesdrops on their conversation FTP bounce: An attacker sends a PORT command specifying the IP address of a third party Dumpster diving: A technique used to retrieve information that could be used to carry out an attack on a network
Drag the network categories to match them with their descriptions.
Explanation: Types of network categories are described below:WAN (Wide Area Network): Interconnects network components that are geographically separatedMAN (Metropolitan Area Network): Interconnects locations scattered throughout a metropolitan areaLAN (Local Area Network): Interconnects network components within a local areaPAN (Personal Area Network): A network whose scale is very small, like a connection between a PC and a digital camera via USBCAN (Campus Area Network): Interconnection of local-area networks within a limited geographical space
Drag the network categories to match them with their descriptions. Here, in this type of question, you have to match the item on the left with the correct item on the right by selecting and placing the item to its correct answer. Shortcut key to perform this task are. Press the Alt+down arrow key to activate the target. Press the arrow key to navigate through all the item. Copy the left item using the Enter key. Paste the item using the Enter key. If you want to remove the item, navigate to any of the left side items and press the Delete key to remove for Windows and the Fn+Delete key for Mac. Correct AnswerCompareYour Answer Network Category Description 1.MAN 2.LAN 3.WAN 4.CAN 5.PAN
Explanation: Types of network categories are described below:WAN (Wide Area Network): Interconnects network components that are geographically separatedMAN (Metropolitan Area Network): Interconnects locations scattered throughout a metropolitan areaLAN (Local Area Network): Interconnects network components within a local areaPAN (Personal Area Network): A network whose scale is very small, like a connection between a PC and a digital camera via USBCAN (Campus Area Network): Interconnection of local-area networks within a limited geographical space Lesson: Computer Network Fundamentals
Which options should be included in a bring-your-own-device policy?
Explicit list of permitted applications B Explicit and detailed list of permitted devices Integration between it and the acceptable use policy
Which of the following copper connector types is most commonly used for cable TV connections?
F-conenector
Which of the following protocols is used for transferring files with a remote host in a non-secure fashion?
FTP
Which of the following security attacks leverages the PORT command?
FTP bounce attack
BGP's path selection is solely based on autonomous system hops.
False
Which of the following network devices uses ACL to prevent unauthorized access into company systems?
Firewall
Which of the following can often be categorized as an encryption device (that is, a device capable of participating in an encrypted session)? Each correct answer represents a complete solution. Choose all that apply.
Firewall, VPN concentrator, Router
Question 4 :A toner probe is also known as what?
Fox and hound
What is the protocol data unit name for data at Layer 2?
Frame
Which of the following parameters must match between a wireless LAN (WLAN) client and a WLAN access point (AP) in order for the client to associate with the AP? Each correct answer represents a complete solution. Choose all that apply.
Frequency band B SSID C Encryption type
What WAN topology permits the highest degree of failover and redundancy?
Full Mesh
The steps that occur as a DHCP client obtains IP address information from a DHCP server are:
HCPDISCOVER: When a DHCP client initially boots, it has no IP address, default gateway, or other such configuration information. Therefore, a DHCP client initially communicates by sending a broadcast message in an attempt to discover a DHCP server. DHCPOFFER: When a DHCP server receives a DHCPDISCOVER message, it can respond with a unicast DHCPOFFER message. DHCPREQUEST: The DHCP client communicates with the selected server by sending a unicast DHCPREQUEST message asking the DHCP server to provide IP configuration parameters. DHCPACK: The DHCP server responds to the client with a unicast DHCPACK message. This DHCPACK message contains a collection of IP configuration parameters
What kind of network is used by many cable companies to service their cable modems and has both fiber-optic and coaxial cabling?
HFC
A host that can protect itself by inspecting traffic flowing into its network interface is called a ________.
HIPS
Which of the following security solutions consists of software running on a host to protect that host against a collection of well-known attacks?
HIPS
What technology is similar to WiMAX and offers wireless broadband service? The maximum data rate is 84 Mbps.
HSPA+
Which of the following are Layer 3 redundancy mechanisms? Each correct answer represents a complete solution. Choose all that apply.
HSRP, CARP
Firewalls can be categorized based on their platform or based on the way they inspect traffic. Which two of the following are two categories of firewalls, based on a firewall's platform?
Hardware, Software
What does RIP use for a metric?
Hop count
Which of the following is a telephony solution that is typically based on a traditional privately-owned telephone system?
Hosted PBX
What site provides a nearly identical level of service with virtually no downtime?
Hot
When an organization is developing a site redundancy solution, which option offers the best recovery times upon main site failure?
Hot site
Question 3 :What device operates at Layer 1 of the OSI model?
Hub
Question 7 :What is the most common topology seen with a DMVPN?
Hub and spoke (partial mesh)
What WAN topology enables you to minimize WAN expenses by not directly connecting any two remote locations?
Hub-and-Spoke
What topology features a central location that connects to each remote connection but does not feature connections between those remote locations directly?
Hub-and-spoke
Of the steps listed, which one occurs first in a structured troubleshooting model?
Hypothesize a probable cause.
Which step in a structured troubleshooting methodology can most benefit from your experience and intuition?
Hypothesize a probable cause.
Which of the following remote access technologies is a Citrix Systems® proprietary protocol that allows applications running on one platform (for example, Microsoft Windows®) to be seen and controlled from a remote client, independent of the client platform (for example, UNIX)?
ICA
Question 9 :What protocol is used by the ping command?
ICMP
Which of the following standards specifies a method for sending traffic for multiple VLANs across a single link?
IEEE 802.1Q
What multicast protocol is used between clients and routers to let routers know which of their interfaces are connected to a multicast receiver?
IGMP
Question 10 :Identify three e-mail protocols.
IMAP4, POP3, SMTP
Which IoT technology is commonly used in remote controls to transmit information using a form of light?
IR
Which of the following are examples of interior gateway protocols? Each correct answer represents a complete solution. Choose all that apply.
IS-IS, OSPF, RIP
What are the three levels of security associated with events appearing in Microsoft Windows® application logs?
Information, Warning, Error
What type of wireless topology features the use of access points to facilitate network communications?
Infrastructure
WEP's RC4 approach to encryption uses a 24-bit string of characters added to transmitted data, such that the same plain-text data frame will never appear as the same WEP-encrypted data frame. What is this string of characters called?
Initialization vector
What NAT IP address is a public IP address that maps to an inside device?
Inside global
Which QoS mechanism is also referred to as hard QoS because it makes strict bandwidth reservations?
Integrated services
Which three of the following are features of IPsec?
Integrity Confidentiality Authentication
A building might have multiple patch panels (for example, on different floors of a building). These common locations, where cables from nearby offices terminate, are often called what?
Intermediate distribution frames
Which of the following is a Microsoft Windows® command that can be used release and renew a DHCP lease on a PC?
Ipconfig
Which of the following antenna types radiates an equal amount of power in all directions (in a spherical pattern), and is said to have a gain of 0 dBi?
Isotropic
Which of the following is a primary benefit of a VPN concentrator?
It allows traffic to travel securely over an untrusted network (for example, the Internet).
Which of the following are the primary benefit of a proxy server?
It hides inside addresses from the public Internet. It reduces bandwidth demand on an internal LAN.
Question 6 :Which of the following is a primary benefit of a content engine?
It reduces bandwidth demand on an IP WAN.
Which of the following is a technology that allows a service provider to offer networking services to customers?
NaaS
SNMP uses a series of objects to collect information about a managed device. The structure, similar to a database, containing these objects is referred to as what?
MIB
What wireless technology allows the IEEE 802.11n standard to achieve higher throughput than other standards (that is, IEEE 802.11 a/b/g) by using multiple antennas for transmission and reception?
MIMO
Which of the following is used by IEEE 802.11n to achieve high throughput using multiple antennas for transmission and reception?
MIMO
What kind of media is used by 100GBASE-SR10 Ethernet?
MMF
What media type is used by 10GBASE-SR?
MMF
Which of the following specifies a type of fiber optic cable that has a core whose diameter is large enough to transport light arriving at a variety of angles (that is, more than one mode of propagation)?
MMF
Which of the following is a type of network, commonly used by service providers, that makes forwarding decisions based on a label contained in a 32-bit header?
MPLS
Which of the following user authentication protocols added two-way authentication to an earlier version of the protocol?
MS-CHAP
Which type of fiber optic connector contains two fiber strands in a single connector?
MTRJ
What router interface parameter specifies the largest packet size the interface will forward (without fragmentation being required)?
MTU
Which of the following DNS record types is used for an e-mail server?
MX
Which of the following security attacks occurs when an attacker causes traffic flowing between two devices on a network to flow through the attacker's device?
Man-in-the-middle attack
Identify the quality of service (QoS) function that alters bits in a frame, cell, or packet.
Marking
What name is given to a VLAN on an IEEE 802.1Q trunk whose frames are not tagged?
Native VLAN
Which of the following are common sources of wireless network radio frequency interference (RFI)? (Choose three.)
Microwave ovens, Game consoles, Baby monitors
Which of the following are common sources of interference with a wireless LAN (WLAN)? Each correct answer represents a complete solution. Choose all that apply.
Microwave ovens,Codless Phones
Which issue is commonly related to a network device becoming a black hole for traffic?
Mismatched MTU
What IP traffic type should you use if you want to send out a video stream to 23 of the systems in the marketing department? There are 50 total systems in this department.
Multicast
Which IPv6 address type is indicated by an address beginning with the hex characters FF?
Multicast
Which of the following requires two or more types of authentication from a user seeking admission to a network?
Multifactor authentication
Which of the following can be used to measure the amount of current (in Amps) flowing through a circuit?
Multimeter
Many firewalls use what feature to translate private IP addresses on an inside network to publicly routable IP addresses on an outside network (for example, the Internet)?
NAT
What is the name of the document that creates a confidential relationship between parties to protect any type of confidential or proprietary information or trade secrets?
NDA
What is the name of the document that outlines the confidential material, knowledge, or information that agreeing parties cannot communicate to others?
NDA
What is the name of the protocol used with IPv6 to learn the Layer 2 addresses that exist on the same local network?
NDP
Which wireless communication protocol requires devices to be within 1.6 inches to communicate?
NFC
A box containing a demarc is called a ______________.
NID
A dedicated network device that acts as an intrusion prevention system (IPS) sensor is called a ________.
NIPS
Which NDP message type is used by an IPv6 device to locate neighbors on the local network?
NS
What protocol is used to synchronize a network device's clock with a time server?
NTP
Which layer of the OSI Model is concerned with logical addressing?
Network
IP addresses reside at which layer of the OSI reference model?
Network Layer
Which DLP target activity level addresses data in transit?
Network Level
Which of the following is a publicly available network security scanner?
Nmap
Which of the following IDS/IPS detection methods allows an administrator to define what normal traffic patterns are supposed to look like?
Non-statistical anomaly detection
In a SaaS solution, where are a company's applications hosted?
Offsite
What type of antenna radiates power at relatively equal power levels in all directions?
Omnidirectional
What type of antenna, used in wireless APs and wireless routers in SOHO locations, radiates equal power in all directions?
Omnidirectional
Which procedures detail what should happen when employees are hired and terminated?
On-boarding/off-boarding
If a WLAN does not need a user to give credentials to associate with a wireless AP and access the WLAN, what type of authentication is in use?
Open
Question 6 :A broken copper strand in a circuit is known as which of the following?
Open
Which MPLS network element is a service provider internal router that does not have a direct interface with the customer routers?
P
Which PPP authentication method offers one-way authentication and sends credentials in clear text?
PAP
What variation of network address translation (NAT) allows multiple inside local addresses to share a single inside global address?
PAT
Refer to the exhibit. What type of network topology is shown in the graphic?
PArtial Mesh
Which MPLS element is the provider's router that connects to the customer?
PE
Which of the following user authentication technologies uses digital certificates and a certificate authority (CA)?
PKI
Which two of the following protocols are used to retrieve e-mail from an e-mail server?
POP3, IMAP4
Question 61 :What is a very common protocol found on dedicated leased lines? This
PPP
Which of the following remote access technologies is a common Layer 2 protocol offering features such as: multilink interface, looped link detection, error detection, and authentication?
PPP
What technology is typically used in conjunction with DSL?
PPPoE
Which of the following is a set of communication rules that govern the secure implementation of a VPN?
PPTP
Which two of the following virtual private network (VPN) protocols lack native security features?
PPTP, L2TP
Which two of the following are types of Integrated Services Digital Network (ISDN) circuits?
PRI C BRI
Which of the following DNS record types points to a canonical name and is commonly used when performing a reverse DNS lookup?
PTR
Which agreement would need to be read carefully and signed by a network administrator (not an end user in the Sales department)?
PUA
Which of the following is a technology that allows a company to use development resources owned and maintained by a service provider?
PaaS
Question 48 :Frame Relay is an example of what WAN connection type?
Packet Switched
What loop-prevention mechanism is an override of another loop-prevention mechanism?
Poison reverse
Which of the following are distance-vector routing protocol features that can prevent routing loops? (Choose two.)
Poison reverse, Split Horizon
What topology aims to balance redundancy with easier management and cost-effectiveness?
Partial mesh
Which of the following technologies is not typically considered for an increase in redundancy?
Pat
Cables in wiring closets commonly terminate on what?
Patch panel
What type of network allows interconnected devices to share their resources with one another but would have issues regarding scalability?
Peer-to-peer
Which type of network is based on network clients sharing resources with one another?
Peer-to-peer
While an IPsec tunnel is being established, the peers at each end of the tunnel determine whether or not a certain feature should be used. This feature makes sure that a session key will remain secure, even if one of the private keys used to derive the session key becomes compromised. What is the name of this feature?
Perfect forward secrecy (PFS)
Which layer of the OSI Model is concerned with how bits are represented on the medium?
Physical
Which of the following Microsoft Windows® commands is primarily used to check reachability to a remote IP address? This
Ping
Which type of cable might be required for installation in a drop ceiling, which is used as an open-air return duct?
Plenum
Which type of twisted pair cable has an insulator that is fire retardant and minimizes the emission of dangerous fumes in the event of fire?
Plenum
Which Ethernet switch feature allows an Ethernet switch to provide power to an attached device?
PoE
Which of the following approaches to wireless LAN (WLAN) security requires a matching string of characters to be configured on a WLAN client and a WLAN access point (AP)?
Pre-shared key
What is the name of Layer 6 in the OSI Model?
Presentation
The process of troubleshooting can be simplified into three basic phases: (1) Problem report, (2) Problem diagnosis, and (3) Problem resolution. The majority of a troubleshooter's efforts are spent in which of these three phases?
Problem diagnosis
Which of the following comprise a simplified troubleshooting flow? (Choose three.)
Problem resolution Problem report Problem diagnosis
Which of the following is also known as a "network sniffer?"
Protocol analyzer
Which of the following copper connector types is an eight-pin connector found in most Ethernet networks?
RJ-45
Refer to the exhibit. Consider the network topology. Which (if any) device in the topology has an incorrect IP address? (Assume that if two devices belong to one subnet, and another device belongs to a different subnet, that device (belonging to a different subnet than the other two devices) has an incorrect IP address.)
R1
Which NDP message type is used by an IPv6 router to advertise its presence along with various link information?
RA
Which two of the following protocols are commonly used to communicate with an AAA server?
RADIUES, TACACS+
Which of the following user authentication technologies is used by Microsoft Windows® clients to remotely access a Microsoft Windows® network?
RAS
Which of the following protocols can be used to remotely connect to and control the desktop of a Microsoft Windows® computer?
RDP
Which of the following remote access technologies is a Microsoft protocol that allows a user to view and control the desktop of a remote Microsoft Windows® computer?
RDP
Identify the congestion-avoidance mechanism from the following list of QoS tools.
RED
If two nearby wireless devices (for example, a cordless phone or a wireless client) transmit using overlapping frequencies, those devices can interfere with one another. What is the term given to this type of interference?
RFI
Which IoT technology uses electromagnetic fields to identify and track tags attached to items?
RFID
Which of the following standards specifies a type of coaxial cable typically used for short distance applications, such as carrying composite video between two nearby devices, and has a characteristic impedance of 75 Ohms?
RG-59
Which of the following standards specifies a type of coaxial cable commonly used by local cable companies to connect individual homes to the cable company's distribution network?
RG-6
What topology was used in an early LAN technology that used the passing of a token to transmit?
RING
Which of the following is a distance-vector routing protocol with a maximum usable hop count of 15?
RIP
Which phase of an incident response plan focuses on the restoration of network devices and systems?
Recover
Which of the following are recommendations for developing a password policy?
Require passwords to contain uppercase and lowercase characters, a number, and a symbol . Do not allow words to be spelled out completely.
Most DHCP client devices on a network are dynamically assigned an IP address from a DHCP server (that is, dynamic addressing). However, some devices (for example, servers) might need to be assigned a specific IP address. What DHCP feature allows a static IP address to MAC address mapping?
Reservation
An incident response policy often ends with which phase?
Review
Refer to the exhibit. What type of LAN topology is shown?
Ring
What topology could result in a lack of all communication capabilities with a single connection break?
Ring
What topology was used in an early LAN technology that used the passing of a token to transmit?
Ring
Which of the following copper connector types is found in most home telephone networks?
Rj-11
Which of the following WAN technologies use unshielded twisted pair (UTP)? (Choose three.)
SDN - DSL modem - POTS dial-up modem
Which of the following are three broad categories of SNMP message types?
SET, GET, TRAP
Which of the following is a VoIP signaling protocol used to set up, maintain, and tear down VoIP phone calls?
SIP
Which of the following is a voice over IP (VoIP) signaling protocol used to setup, maintain, and tear down VoIP phone calls?
SIP
What media type is used by 1000BASE-ZX?
SMF
Which of the following specifies a type of fiber optic cable that has a core whose diameter is only large enough to transport light arriving at one angle (that is, one mode of propagation)?
SMF
Which of the following protocols is used to send e-mail to an e-mail server?
SMTP
What variation of network address translation (NAT) allows you to statically configure the inside global address assigned to a specific device inside your network?
SNAT
Identify the Simple Network Management Protocol (SNMP) component that is a piece of software, which runs on a managed device (for example, a server, router, or a switch).
SNMP Agent
Which component of an SNMP solution is a piece of software, which runs on a managed device (for example, a server, router, or a switch)?
SNMP Agent
Identify the Simple Network Management Protocol (SNMP) component that is an unsolicited message sent from an SNMP managed device to provide a notification about a significant event occurring on that managed device.
SNMP TRAP
Identify the Simple Network Management Protocol (SNMP) component that is also known as an NMS.
SNMP manager
Which of the following DNS record types provides authoritative information about a DNS zone (for example, the e-mail address of a DNS zone's administrator, the zone's primary name server, and various refresh timers)?
SOA
Which protocol supports a secure connection to a remote host via terminal emulation software?
SSH
You must send commands to a remote router and you are communicating over an unsecure channel. What protocol should you use?
SSH
Which of the following is a cryptographic protocol that provides communication security over a computer network?
SSL
Which two of the following virtual private network (VPN) tunneling protocols can be used to provide security for HTTPS?
SSL, TLS
Which of the following allows a user to authenticate only once in order to gain access to multiple systems, without requiring the user to independently authenticate with each system?
SSO
Which type of fiber optic connector is often referred to as a bayonet connector?
ST
Which of the following technologies prevents a broadcast storm from forming due to a Layer 2 topological loop?
STP
Which network infrastructure device primarily makes forwarding decisions based on Layer 2 MAC addresses?
SWITCH
Which of the following technologies is used by an application service provider (ASP) to give subscribers access to application software?
SaaS
A DHCP server uses a pool of addresses (which typically corresponds to a single subnet) to assign IP address to DHCP clients on a specific network segment. What is a common name for this pool of addresses? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and al
Scope
Which of the following is a Microsoft Windows® log that would report events such as a failed login attempt?
Security
While an IPsec tunnel is being established, which of the following acts as an agreement between the two IPsec peers about the cryptographic parameters to be used in the ISAKMP session?
Security association (SA)
Which of the following is a continually changing document that dictates a set of guidelines for network use?
Security policy
Refer to the exhibit. Consider the network topology. Which (if any) device in the topology has an incorrect IP address? (Assume that if two devices belong to one subnet, and another device belongs to a different subnet, that device (belonging to a different subnet than the other two devices) has an incorrect IP address.)
Server 1
NetBIOS is associated with which layer of the OSI Model?
Session
Which of the following IDS/IPS detection methods could trigger an alarm if a certain string of bytes, in a certain context, is observed?
Signature-based detection
A __________ should provide valuable guidance on best practices throughout the network.
System lifecycle
Which of the following security attacks uses Internet Control Message Protocol (ICMP) traffic, directed to a subnet, to flood a target system with Ping replies?
Smurf Attack
What type of backup solution is a point-in-time, read-only copy of data?
Snapshot
Which of the following security attacks occurs when an attacker convinces someone to voluntarily provide information (for example, username and password credentials) to the attacker?
Social engineering attack
Automating the management and configuration of many different network devices, thanks to a centralized controller, refers to what technology?
Software-defined networking
What loop-prevention mechanism prevents a route learned on one interface from being advertised back out of that same interface?
Split Horizon
Which of the following installation practices could result in non-standard pin-outs in network cabling?
Splitting pairs in a cable
In the modern LAN, what topology is often used with LAN switches and Ethernet connections?
Star
Refer to the exhibit. What type of physical LAN topology is shown in the graphic?
Star
Refer to the exhibit. Examine the topology and Telnet sessions. Notice that return Telnet traffic for Session A (which originated on the inside of the network) is permitted to enter the inside network. However, Telnet traffic for Session B (which originated on the outside of the network) is not permitted to enter the inside network. What type of firewall is being used in the topology?
Stateful
What type of firewall inspects traffic leaving an inside network as it goes out to the Internet and allows returning traffic belonging to that session?
Stateful
Which two of the following are firewall inspection types?
Stateful , Packet Filtering
What feature allows a firewall to permit traffic to flow from a trusted network (for example, a corporate intranet) to an untrusted network (for example, the Internet) and then allow return traffic for that session, while blocking sessions initiated on the untrusted network?
Stateful inspection
Which of the following IDS/IPS detection methods watches network traffic patterns over a period of time and dynamically builds a baseline?
Statistical anomaly detection
Question 20 :Which DLP target activity level addresses data at rest?
Storage level
Which component of an IP address dictates how many bits of the 32-bit address are the network portion versus the host portion?
Subnet Mask
In the modern LAN, what type of device is typically used at the center of a star topology?
Switch
What device is a Layer 2 device that uses MAC address learning to intelligently forward traffic?
Switch
What device is used to create many different collision domains, thus helping to eliminate collisions in the modern network?
Switch
What device would forward traffic based on a MAC address?
Switch
Which of the following is a Microsoft Windows® log that would report events occurring on the underlying operating system?
System
SIP (Session Initiation Protocol):
The Layer 4 protocol that carries voice
What is the primary difference between the TIA/EIA-568-A and TIA/EIA-568-B wiring standards?
The color coding of the wiring
Question 35 :A system on an Ethernet network detects a collision. How does it respond?
The device retransmits after waiting for a period dictated by the backoff timer.
Question 5 :What should you follow closely when installing new network equipment?
The installation and maintenance guides
For understanding the netstat command, here's what you need to do: On the taskbar, right-click the Start button and open Command Prompt. show figure Execute the following netstat commands in the command prompt:netstat to list source and destination IP addresses and port numbers for all IP-based sessions.netstat -b to display names of the program that opened up a session.netstat -e to display statistical information for an interface's IP-based traffic.
Type netstat Type netstat -b Type netstat -e
Which of the following is a connectionless transport layer protocol?
UDP
Question 4 :Which of the following are characteristics of RADIUS? (Choose two.
UDP based, Only encrypts the password in an authentication packet
What can you add to a network to mitigate a power failure that might otherwise make an Ethernet switch unusable?
UPS
Host A (with an IP address of 10.1.2.3) sends a packet to Host B (with an IP address of 192.168.1.2). What type of data flow does this represent?
Unicast
Question 2 :Which is not a typical best practice found in a password policy?
Use of uppercase and lowercase letters only
Which of the following usually offers the highest bandwidth?
VDSL
Refer to the exhibit. In the topology, what type of network appliance is located at each of the sites?
VPN concentrator
Which two of the following are wireless broadband technologies?
WiMAX, HSPA+
A location within a building where network cables terminate is commonly called a(n) __________.
Wiring Closet
What is the name of the wireless communications protocol used primarily for home automation?
Z-Wave
Which of the following is a Microsoft Windows® command that displays what Layer 2 MAC address corresponds to a Layer 3 IP address?
arp
Refer to the exhibit. What command produced the output shown on your Windows workstation?
arp -a
What command enables you to view the ARP cache entries on a Windows workstation?
arp -a
Which of the following QoS mechanisms can compress the Layer 3 and Layer 4 headers of a voice over IP packet?
cRTP
Question 118 :What term is used to describe a loss of signal power?
dB loss
Which of the following UNIX commands is primarily used to resolve a fully-qualified domain name (FQDN) to an IP address and lacks an interactivity mode (that is, the entire command and all of the appropriate parameters are entered with a single command)?
dig
Which of the following UNIX commands can be used to check FQDN-to-IP-address resolution? (Choose three.)
dig host nslookup
What command produced the following snippet of output?
dig pearsonitcertification.com
Refer to the exhibit. In the topology, "Network Appliance X" takes requests coming into the server farm and spreads those requests out over all of the available servers (which contain identical content). What type of network appliance is Network Appliance X?
honeypott
Question 2 :Which of the following Windows commands enables you to display NetBIOS over TCP/IP information?
nbtstat
Refer to the exhibit. What command produced the output shown on your Windows workstation?
nbtstat
What command enables you to view the NetBIOS name cache on your Windows workstation?
nbtstat
Which of the following is a Microsoft Windows® command that can display a listing of the source and destination IP address for existing sessions on a PC?
netstat
You need to verify the TCP connections your workstation is making. What tool should you use?
netstat
Which Windows commands could have produced the following output? (Choose two.)
netstat -r route print
Refer to the exhibit. What command produced the output shown on your Windows workstation?
nslookup
What command enables you to verify DNS information and functionality?
nslookup
What is the most likely command you would be using to verify your DNS configuration is functioning properly?
nslookup
Which of the following UNIX commands is primarily used to resolve a fully-qualified domain name (FQDN) to an IP address and can operate in an interactive mode (that is, you enter this command, receive a prompt, and can then give additional commands)?
nslookup
While more than one of the following Microsoft Windows® commands can be used to resolve a fully-qualified domain name (FQDN) to an IP address, identify the command whose primary purpose is to resolve a FQDN to an IP address (for example, to determine if a Domain Name System (DNS) record is correct).
nslookup
What type of network allows interconnected devices to share their resources with one another but would have issues regarding scalability?
peer-to-peer
Refer to the exhibit. What command produced the output shown on your Windows workstation?
ping
Which tool enables you to test basic connectivity to a remote system?
ping
Which of the following commands would you issue on a UNIX host to send five ICMP echo messages to a device with an IP address of 10.1.1.1?
ping -c 5 10.1.1.1
Identify the quality of service (QoS) mechanism that can set a bandwidth limit on traffic and drop packets attempting to exceed that bandwidth limit.
policing
Which of the following Microsoft Windows® commands can be used to manipulate a PC's forwarding table?
route
What device operates at Layer 3 of the OSI model?
router
What is the name of the default congestion avoidance technique that allows newly arriving packets to be discarded when a queue is full?
tail drop
You are troubleshooting a reachability issue, where a PC cannot reach a remote host. Packets from the PC must transit multiple routers to reach the remote host. Which of the following Microsoft Windows® commands would be most appropriate for locating the last router hop that successfully transmitted packets destined for the remote host?
tracert