Networking final
What is the Internet standard MTU?
1,500 bytes.
What is the minimum amount of ESD required to damage sensitive electronic equipment?
10 volts
What is the typical maximum segment length for Ethernet networks?
100 meters
Which IPv6 prefix can be routed on the Internet?
2000::/3
What decimal number corresponds to the binary number 11111111?
255
Which of the following IPv4 addresses is a public IP address?
64.233.177.189
Which of the following is part of a network's physical topology?
A printer plugged into a nearby desktop computer
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
AC adapter
Which of these categories of twisted-pair cable can support Gigabit Ethernet?
Cat 5e, cat 6a, cat 7
What is the minimum twisted-pair category required for 10-Gigabit Ethernet at 100 meters?
Cat6a
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Checksum
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?
Client-Server
Which OSI layer adds both a header and a trailer?
Data Link Layer
At what point does the ISP hand over responsibility to the customer?
Demarc
Which of the following causes physical layer failures?
ElectroMagnetic Interference (EMI)
Which IPsec encryption type encrypts the IP header?
Encapsulating security payload (ESP)
Which protocol's header includes the source MAC address?
Ethernet
When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself?
FE::/64
In the event of a fire, the most appropriate failure policy is a _______ policy.
Fail-Open
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
HTTPS
What numbering system do humans use to write MAC addresses?
Hexadecimal
An ARP table maps MAC addresses to what information?
IPV4 addresses
Which of these protocols does not include some kind of integrity check field in its header?
IPV6
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?
IPconfig release
Which encryption protocol does GRE use to increase the security of its transmissions?
IPsec
According to structured cabling standards, there must be at least one _______ on each floor.
Intermediate Distribution Frame (IDF)
Which two protocols manage neighbor discovery processes on IPv4 networks?
Internet Control Message Protocol (ICMP) and Address Resoultion Protocol (ARP)
what protocol does ping use
Internet control Message Protocol (ICMP)
Which type of DNS record identifies an email server?
Mail Exchanger (MX)
Which kind of crosstalk occurs between wire pairs near the source of the signal?
NEXT
Which of the following applications could be used to run a website from a server?
NGNIX
What problem will ping google.com check for that ping 8.8.8.8 will not?
Name resolution issues
At which OSI layer does IP operate?
Network Layer
Which network diagram shows a logical topology?
Network Map
You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.
Nmap, command prompt, and powershell
What is one advantage offered by VDI over RDS and VNC?
Offers access to multiple OSs in VMs
Which part of a MAC address is unique to each manufacturer?
Organizationally Unique Identifier (OUI)
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
Peer-to-Peer
When your computer requests a DNS lookup, which DNS server holds the most reliable information for that DNS record?
Primary DNS server
Which kind of multiplexing assigns slots to nodes according to priority and need?
STDM (statistical time division multiplexing)
Which remote file access protocol is an extension of SSH?
Secure File Transfer Protocol (SFTP)
which of the following is a secure protocol
Secure Shell (SSH)
Which two encryption protocols might be used to provide secure transmissions for email services?
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
Which remote file access protocol uses port 22
Secure file transfer protocol (SFTP)
You need to remote into a Linux server in another building on your network. Which of the following protocols should you use?
Secure shell (SSH)
When an Internet connection goes down, what business document defines a customer's options for paying a reduced rate?
Service Level Agreement (SLA)
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Star
Which DNS record type is listed first in a zone file?
Start Of Security (SOA)
You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
Structured Query Language (SQL)
Which networking device is best for connecting your network printer to three computers
Switch
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server
Which protocol's header would a layer 4 device read and process?
Transmission control protocol (TCP)
Which of these protocols could not be used to access a server in a nearby building?
Transport Layer Security (TLS)
Which network types can your smartphone use?
Wan, Lan, and Pan
What type of diagram shows a graphical representation of a network's wired infrastructure?
Wiring diagram
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
all devices on your local network
At what OSI layer does your browser's web page request begin its journey through the OSI layers?
application layer
You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address?
arp-a
Which transmission characteristic is never fully achieved?
bandwidth
Which two components of the CIA triad are ensured by adequate encryption methods?
confidentiality and integrity
Which tool could you use to test a twisted-pair cable's pinout?
continuity tester
What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network?
default gateway
Which change management principle must you apply to all changes regardless of scope or impact?
document the change
What group must clients join to access network resources in a client-server network?
domain
Pin 1 on one end of a cable is orange and white striped. What color should Pin 1 be on the other end of the cable to create a crossover cable?
green and white striped
Which of these commands has no parameters in Windows?
hostname
As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
identify the problem
In which life cycle phase is an old device removed from the network?
implementation
Which of the following is an advantage of P2P file sharing?
inexpensive
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
integrity
What command shows you a computer's TCP/IP configuration?
ipconfig
What Windows command outputs a computer's MAC address?
ipconfig / all
Which command disables a computer's connection to the network?
ipconfig/release
Which tool could you use to determine if a laptop's power cable is working properly?
multimeter
Which of the following improves overall network performance?
multiplexing
Which of the following devices are you likely to find in the MDF? Choose all that apply.
switches, KVM switch, and routers
You need to determine which device on your network is sending excessive messages to your Ubuntu Server. Which utility will give you this information?
tcpdump
While exploring the problem and developing a theory about the cause, where can you go to get information on similar problems your coworkers have faced in the past?
Knowledge Base
What is the first step of inventory management?
List all components on the network
Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack?
passive twinaxial cable
Which of these is considered a secure place to store a list of documented network passwords?
password manager
Which change is designed to close a security vulnerability without affecting other components of an application?
patch
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
patch cable
Which DNS record type is used to find an FQDN from a given IP address?
pointer (PTR)
Which DNS server offers the most current resolution to a DNS query?
primary DNS server
What is the earliest transceiver type to support four channels on a single transceiver to increase throughput?
qual small form-factor protocol (QSFP)
You're working from home and need to access a file server at the office while working in an application from your work desktop. At the same time, you often stream music in your browser. Which VPN type will be most efficient while still meeting your needs?
split tunnel VPN
When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using?
star topology
Which fiber connector does not support full-duplex transmissions?
straight tip (ST)
When you measure the amount of data coming into your home network, what metric are you identifying?
throughput
Which layer holds the address of the target application running on the destination computer?
transport layer
What should you do after making a plan to solve a problem and carrying out your plan?
verify functionality
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
voice gateway
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?
Entrance Facility (EF)
What protocol must be allowed through a firewall for tracert to work correctly?
Internet control message protocol (ICMP)
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
Look at whether the device is located on the ISP's side of the demarc.
What is an example of an open source DBMS?
MySQL
Which fire suppression level provides the most targeted protection?
Rack Level
Which of the following is an application layer protocol?
Remote Desktop Protocol (RDP)
Which of the following statements is not true?
SMF supports lower bandwidths than MMF.