Networking I - CNT3504

Ace your homework & exams now with Quizwiz!

Which of the following is a characteristic of TACACS+? • Encrypts the entire packet, not just authentication packets • Uses UDP ports 1812 and 1813 • Requires that authentication and authorization are combined in a single server • Supports only TCP/IP

- Encrypts the entire packet, not just authentication packets TACACS+ was originally developed by Cisco for centralized remote access administration. TACACS+: • Provides three protocols, one each for authentication, authorization, and accounting. This allows each service to be provided by a different server. • Uses TCP port 49. • Encrypts the entire packet contents and not just authentication packets. • Supports more protocol suites than RADIUS. RADIUS is used by Microsoft servers for centralized remote access administration. RADIUS: • Combines authentication and authorization using policies to grant access. • Allows for the separation of accounting to different servers. However, authentication and authorization remain combined on a single server. • Uses UDP ports 1812 and 1813. • Uses a challenge/response method for authentication. RADIUS encrypts only the password using MD5.

Which protocol is used for securely browsing a website? • HTTPS • SIP • SSH • ARP • UDP

- HTTPS HTTPS is a secure form of HTTP that uses SSL to encrypt data before it is transmitted. HTTP is used by Web browsers and Web servers to exchange files (such as Web pages) through the World Wide Web and intranets.

What is the binary format for the following decimal IP address? 131.9.202.111

10000011.00001001.11001010.01101111 10000011.00001001.11001010.01101111 is the binary format of the address. To convert binary to decimal, remember the following numbers: 128, 64, 32, 16, 8, 4, 2, 1

What is the maximum data rate of an ISDN BRI line? • 64 Kbps • 128 Kbps • 1.544 Mbps • 256 Kbps

128 Kbps IDSN BRI carries two B channels and one D channel. Each B channel can maintain a throughput of 64 Kbps, for a total of 128 Kbps. The D channel is used for line management and does not contribute to data throughput.

Which three of the following IP addresses are Class B addresses? • 115.33.0.0 • 129.0.0.0 • 195.155.0.0 • 132.12.0.0 • 190.65.2.0 • 64.2.2.64 • 224.15.55.2

129.0.0.0 132.12.0.0 190.65.2.0 You can identify the IP address class by memorizing the range of values for the first octet. • 0-126 = Class A • 128-191 = Class B • 192-223 = Class C • 223-239 = Class D • 240-255 = Class E

Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select all that apply.) • 1.6.45.254 • 129.0.0.1 • 191.168.2.15 • 123.254.19.6 • 168.16.5.1 • 228.62.18.6

129.0.0.1 191.168.2.15 168.16.5.1 You can identify the IP address class by memorizing the range of values for the first octet. • 0-126 = Class A = 255.0.0.0 • 128-191 = Class B = 255.255.0.0 • 192-223 = Class C = 255.255.255.0 • 223-239 = Class D • 240-255 = Class E

A host on the network has an IP address of 129.11.99.78 using the default subnet mask. How would you identify the address and mask using CIDR notation? • 129.11.99.78/16 • 129.11.99.78:8 • 129.11.99.78/24 • 129.11.99.78:16 • 129.11.99.78:24 • 129.11.99.78/8

129.11.99.78/16 You can identify the IP address class by memorizing the range of values for the first octet. • 0-126 = Class A = 255.0.0.0 = 8 bits • 128-191 = Class B = 255.255.0.0 = 16 bits • 192-223 = Class C = 255.255.255.0 = 24 bits • 223-239 = Class D • 240-255 = Class E

What is the network address and subnet mask used by APIPA? (Select two.) • 169.254.0.0 • 255.255.0.0 • 255.0.0.0 • 255.255.255.0 • 169.0.250.0 • 169.255.0.0

169.254.0.0 255.255.0.0 Automatic Private IP Addressing (APIPA) uses a network address of 169.254.0.0 with the default Class B subnet mask of 255.255.0.0. Host addresses will be within the range of 169.254.0.1 and 169.254.255.254.

Which of the following IP address ranges is reserved for Automatic Private IP Addressing? • 192.168.0.0 - 192.168.255.254 • 169.168.0.1 - 169.168.255.255 • 169.192.0.0 - 169.192.254.255 • 169.254.0.1 - 169.254.255.254 • 192.168.0.1 - 192.168.254.255

169.254.0.1 - 169.254.255.254 The Internet Assigned Numbers Authority (IANA) has reserved 169.254.0.1 through 169.254.255.254 for Automatic Private IP Addressing (APIPA). APIPA also sets the subnet mask on the network to 255.255.0.0.

Which of the following is a valid IPv4 address? (Select two.) 256.0.0.1 192.168.1.512 172.16.1.26 2.2.2.2 10.384.0.3 254.7.1.417 1.254.1.1024

172.16.1.26 2.2.2.2 A valid IPv4 address consists of 4 8-bit (1 byte) numbers separated by periods. For example, 10.0.0.65. Because they are 8 bits long, these numbers are frequently called octets.

You've decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (Select two.) • 172.17.128.0 • 172.17.32.0 • 172.17.0.0 • 172.17.96.0 • 172.17.16.0

172.17.128.0 172.17.0.0 The subnet mask used for the 172.17.0.0 network can be viewed in binary notation as 11111111.11111111.11000000.000000. Because the first two bits of the third octet are used for the network portion of the address, four subnets are possible: • 172.17.0.0 • 172.17.64.0 • 172.17.128.0 • 172.17.192.0

What is the decimal format of the following binary IP address? 11001110.00111010.10101010.01000011 190.42.154.51 205.57.169.66 206.58.170.67 238.90.202.99

206.58.170.67 206.58.170.67 is the decimal form of the IP address. To convert binary to decimal, remember the following numbers: 128, 64, 32, 16, 8, 4, 2, 1

What is the default subnet mask for the IP address 203.111.3.3? • 255.255.255.255 • 255.255.0.0 • 255.0.0.0 • 255.255.255.0

255.255.255.0 You can identify the IP address class by memorizing the range of values for the first octet. • 0-126 = Class A = 255.0.0.0 • 128-191 = Class B = 255.255.0.0 • 192-223 = Class C = 255.255.255.0 • 223-239 = Class D • 240-255 = Class E

Which of the following cellular network types does not provide Internet connectivity? • EDGE • 4G • HSPA+ • 2G • LTE

2G 2G (second generation) networks were the first to offer digital data services, such as text messaging, but did not provide Internet connectivity. Edge, HSPA+, LTE, and 4G all provide Internet connectivity, and each has specific bandwidth limitations.

Drag the cellular network specification on the left to its corresponding mobile technology generation on the right.

2G >> GSM >> CDMA 3G >> LTE >> HSPA+ 4G >> WiMAX

Which of the following tunneling methods is used to send IPv4 traffic through an IPv6 network? • ISATAP • 6-to-4 tunneling • Toredo tunneling • 4-to-6 tunneling

4-to-6 tunneling

Which of the following ports are used with TACACS? • 22 • 49 • 50 and 51 • 1812 and 1813 • 3389

49 Terminal Access Controller Access-Control System (TACACS) uses TCP and UDP ports 49. Port 22 is used by Secure Shell (SSH). Ports 50 and 51 are used by IPsec. Ports 1812 and 1813 are used by Remote Authentication Dial In User Service (RADIUS). Port 3389 is used by Remote Desktop Protocol (RDP).

You manage a network with two locations: Portland and Seattle. Both locations are connected to the Internet. All computers in both locations are configured to use IPv6. You would like to implement an IPv6 solution to meet the following requirements: • Hosts in each location should be able to use IPv6 to communicate with hosts in the other location through the IPv4 Internet. • You want to use a site-to-site tunneling method instead of a host-to-host tunneling method. Which IPv6 solution should you use? • Teredo • ISATAP • 6-to-4 • 4-to-6

6-to-4 Use 6-to-4 tunneling to create a router-to-router tunnel between two sites through an IPv4 network.

If the SONET (OC-1) base data rate is 51.84 Mbps, how much data can the Optical Carrier level 12 (OC-12) transfer in one second?

622.08 Mb The base rate for OC-1 is 51.84 Mbps. All other OCx levels are multiples of this base level. In this case OC12 is 12 x the base rate (51.84); which yields 622.08 Mbps.

Which of the following are valid IPv6 IP addresses? Select all that apply. • 343F:1EEE:ACDD:2034:1FF3:5012 • 127.0.0.1 • 6384:1319:7700:7631:446A:5511:8940:2552 • 192.168.2.15 • 141:0:0:0:15:0:0:1 • 165.15.78.53.100.1

6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1 An IPv6 IP address is a 128-bit address listed as eight 16-bit hexadecimal sections. Leading zeros can be omitted in each section. Therefore, 6384:1319:7700:7631:446A:5511:8940:2552 and 141:0:0:0:15:0:0:1 are both valid IPv6 IP addresses. A single set of all-zero sections can be abbreviated with two colons (::). Therefore, 141::15:0:0:1 would also be a valid address.

RouterA is connected to RouterB through Serial1. You want to configure the link to use PPP with CHAP authentication with a password of cisco. Which set of commands would you use on RouterA to complete the configuration? A. RouterA(config)#username RouterB password cisco RouterA(config)#int s1 RouterA(config-if)#encap ppp RouterA(config-if)#ppp auth chap B. RouterA(config)#int s1 RouterA(config-if)#encap ppp RouterA(config-if)#ppp auth chap RouterA(config-if)#ppp chap username RouterB password cisco C. RouterA(config)#int s1 RouterA(config-if)#encap ppp RouterA(config-if)#ppp chap username RouterA password cisco D. RouterA(config)#int s1 RouterA(config-if)#encap ppp RouterA(config-if)#ppp auth chap password cisco E. RouterA(config)#int s1 RouterA(config-if)#encap ppp auth chap password cisco

A To complete this configuration, you will need to: 1. Identify RouterB and the password with the username command. 2. Set PPP encapsulation with the encapsulation command. 3. Set the PPP authentication to CHAP with the ppp authentication command.

Listed below are several DNS record types. Match the record type on the left with its function on the right.

A >> Points a hostname to an IPv4 address. CNAME >> Provides alternate names to hosts that already have a host record. PTR >> Points an IP address to a hostname. AAAA >> Points a hostname to an IPv6 address. MX >> Identifies servers that can be used to deliver mail.

Review the output from the show interfaces fa0/1 command on the switch2 switch in the exhibit. What is wrong with the fa0/1 interface in this example? • The protocol status is down. • The cable connecting it with the device on the other end is a straight-through cable, but needs to be crossed-over. • A duplex mismatch exists with the device on the other end of the connection. • The line status is administratively down.

A duplex mismatch exists with the device on the other end of the connection. In this example, the following statistics indicate that a duplex mismatch error has occurred: • Duplexing is set to half. • There are a significant number of runts. • There are a significant number of collisions. • There are a significant number of late collisions.

Which of the following is a valid MAC address? AB.07.CF.62.16.BD 95ABC2F4.ABC5.569D.43BF 145.65.254.10 FABC.875E.9BG6

AB.07.CF.62.16.BD MAC addresses are comprised of 12 hexadecimal digits (ranging from 0-9 and A-F). They are typically represented as a three sets of four hexadecimal digits or six sets of two hexadecimal digits separated with periods. Regardless of the grouping and separator values, look for 12 hex digits for a valid MAC address.

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address? • ARP • BOOTP • ICMP • IGMP • DHCP • DNS

ARP Hosts use the Address Resolution Protocol (ARP) to discover the hardware address of a host.

Which of the following are characteristics of ATM? (Select two.) • Uses POTS in the local loop • Supports variable-length packets • Adds labels to data units • Connects to the WAN cloud with a CSU/DSU • Uses fixed-length cells of 53-bytes

Adds labels to data units Uses fixed-length cells of 53-bytes ATM is a WAN communication technology originally designed for carrying time-sensitive data such as voice and video. However, it can also be used for regular data transport. • ATM is a packet switching technology that uses fixed-length data units called cells. Each cell is 53-bytes. • The cell header includes labels that identify the virtual path information. ATM switches in the WAN cloud use the virtual path to switch cells within the WAN to the destination.

Match the networking function or device on the left with the OSI model layer it is associated with on the right.

Application ---> HTTP Presentation --> ASCII Session ------> Session ID number Transport ----> Port numbers Network -----> Router Data Link -----> Switch Physical -----> Wireless access point

RADIUS is primarily used for what purpose? • Managing RAID fault-tolerant drive configurations • Authenticating remote clients before access to the network is granted • Controlling entry gate access using proximity sensors • Managing access to a network over a VPN

Authenticating remote clients before access to the network is granted

You are working with an older 10Base2 Ethernet network. Which of the following connector types will you most likely encounter? • BNC • RJ11 • AUI • F-Type

BNC A 10Base2 Ethernet network (also called a Thinnet) is an older type of network that uses coaxial cables with BNC connectors for communication. F-Type connectors are used for cable and satellite TV connections, as well as broadband cable connections. AUI connectors are used for 10Base5 Ethernet networks. RJ11 connectors are typically used for dial-up connections.

Which three of the following devices operate at the Data Link layer of the OSI model ?

Bridges Network interface cards (NICs) Switches

Which of the following topologies connects all devices to a trunk cable?

Bus Messages sent using a physical bus topology are broadcast to all devices in the network. The device in the middle of the star (typically a hub), receives the message and forwards it on to all other devices.

Which of the following is a valid MAC address? 83-5A-5B-0B-31-55-F1 73-99-12-61-15 C0-34-FF-15-01-8E 255.255.255.0 192.168.12.15 34-9A-86-1G-B3-24

C0-34-FF-15-01-8E A MAC or hardware address is a unique identifier hard coded on every network adapter card. A valid MAC address has a total of 12 hexadecimal numbers. Hexadecimal numbers contain the numbers 0 to 9 and the letters A to F. Valid values in a MAC address range anywhere from 00 to FF.

Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals? • IDS • Modem • Proxy • CSU/DSU

CSU/DSU

Which of the following services are available regardless of whether the telephone company network is available? • Dial-up • DSL • ISDN • Cable modem

Cable modem

You are making Ethernet drop cables using Cat5e cable and RJ45 connectors. You need to remove the plastic coating over the cable to expose the individual wires. Which tool should you use? • Butt set • Snips • Cable stripper • Punchdown tool

Cable stripper Use a cable stripper to remove the plastic covering for a cable. Note: When making drop cables or using punchdown blocks, do not remove the plastic covering for individual wires. Use snips to cut cables. Use a punchdown tool to push wires into 66 or 110 blocks and cut wires at the same time.

Which of the following cable types often includes a solid plastic core? • Cat 3 • Cat 6 • Cat 5e • Cat 5

Cat 6 Cat 6 cables include a solid plastic core that keeps the twisted pairs separated and prevents the cable from being bent too tightly.

Consider the following IP addresses. 1. 124.77.8.5 2. 131.11.0.9 3. 190.66.250.10 4. 196.5.89.44 Which list represents the IP address class of each listed IP address? • Class B, Class B, Class C, Class C • Class A, Class B, Class C, Class C • Class A, Class B, Class B, Class C • Class B, Class B, Class C, Class D • Class B, Class C, Class C, Class D • Class A, Class B, Class C, Class C

Class A, Class B, Class B, Class C You can identify the IP address class by memorizing the range of values for the first octet. • 0-126 = Class A • 128-191 = Class B • 192-223 = Class C • 223-239 = Class D • 240-255 = Class E

You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0. Which of the following describes the address type? • Multicast • Broadcast • Classless • Public • Classful

Classless Because the IP address is not using the default subnet mask, it is using classless addressing. Classless addressing modifies the length of the subnet mask, using a custom mask value instead of the default subnet mask.

You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts access those resources but do not host services of their own. What type of network do you have?

Client/Server In a client-server network, hosts have specific roles. For example, some hosts are assigned server roles, which allows them to provide network resources to other hosts. Other hosts are assigned client roles, which allows them to consume network resources.

Which type of Internet service uses the DOCSIS specification? • Coaxial cable • Unshielded Twisted Pair • Fiber Optic • Shielded Twisted Pair

Coaxial cable

You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice a significant number of CRC errors displayed. What are the most likely causes? (Select two. Either response is a complete solution.) • Collisions • The cable connected to this interface is a cross-over cable, but should be a straight-through cable. • The cable connected to this interface is a straight-through cable, but should be a cross-over cable. • EMI or cross-talk on the cable connected to the interface • The device on the other end of the cable is powered off or the other interface is administratively shutdown.

Collisions EMI or cross-talk on the cable connected to the interface CRC errors are received frames that did not pass the FCS check. These are usually caused by collisions; however, they can also be caused by EMI or cross-talk on UTP cabling. All of these conditions can damage frames on the wire, causing a CRC error. Using the wrong type of cabling would cause the link to go down. A disabled interface on the other end of the cable would also cause the link to go down.

When you run the show interfaces command on switch1, you observe a significant number of runts on the Gi0/1 interface. What does this statistic indicate? • The cable connected to this interface is a cross-over cable, but should be a straight-through cable. • The cable connected to this interface is a straight-through cable, but should be a cross-over cable. • There is EMI or cross-talk on the cable connected to this interface that is corrupting frames. • Collisions are occurring.

Collisions are occurring. Runts are frames that are too small. (The minimum frame size required is 64 bytes.) This is commonly caused by collisions. In this scenario, the collisions are probably caused by a duplex mismatch error.

You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization. Which of the following would be a required part of your configuration? • Obtain certificates from a public or private PKI. • Configure the remote access servers as RADIUS servers. • Configure remote access clients as RADIUS clients. • Configure the remote access servers as RADIUS clients.

Configure the remote access servers as RADIUS clients. When configuring a RADIUS solution, configure a single server as a RADIUS server. Then configure all remote access servers as RADIUS clients.

Which two of the following are included as part of Data Link layer specifications?

Controlling how messages are propagated through the network. Identifying physical network devices.

You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task? • Vampire taps • Crimping tool • Needle nose pliers • Punch down tool

Crimping tool

You have a TCP/IP network with 50 hosts. There have been inconsistent communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned. Which protocol can you implement on your network to help prevent problems such as this? • DHCP • SNMP • TCP • IP • ICMP • IGMP

DHCP You can use the Dynamic Host Configuration Protocol (DHCP) to set up a DHCP server that will assign IP addresses automatically to network hosts. DHCP servers will not assign the same IP address to two different hosts.

You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use? • DNS server • DHCP server • Gateway • Router

DHCP server Use a DHCP server to deliver configuration information to hosts automatically. Using DHCP is easier than configuring each host manually.

You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which protocol should you implement? • Telnet • DNS • DHCP • ARP

DNS DNS is a system that is distributed throughout the internetwork to provide address/name resolution. For example, the name www.mydomain.com would be identified with a specific IP address.

You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com. Which device would you use? • Bandwidth shaper • DNS server • IPS • IDS • Load balancer

DNS server Use a DNS server to provide hostname-to-IP address resolution. A bandwidth shaper modifies the flow of traffic to keep traffic within predefined limits.

Which WAN connection types use digital communications over public telephone lines? (Select two.) • SONET • DSL • X.25 • ATM • ISDN • 56 Kbps dialup

DSL ISDN Both DSL (Digital Subscriber Line) and ISDN (Integrated Services Digital Network) use regular phone lines for digital communications.

Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office? • Wireless • DSL • Satellite • Cable modem

DSL (Digital Subscriber Line)

Your company purchases a new bridge, which filters packets based on the MAC address of the destination computer. On which layer of the OSI model is this device functioning?

Data Link

Which of the following statements about the functionality of LCP are true? (Select three.) • Data can be compressed at the source and decompressed at the destination. • LCP provides remote terminal access in public data networks. • LCP is responsible for logical addressing in PPP. • LCP provides multilink support. • Usernames and passwords may be required during the handshake. • LCP encapsulates multiple protocols.

Data can be compressed at the source and decompressed at the destination. LCP provides multilink support. Usernames and passwords may be required during the handshake. The Link Control Protocol (LCP) is a sublayer within the PPP protocol stack. LCP options provide authentication, compression, error detection, and multilink functionality.

Which of the following describes the point where the service provider's responsibility ends and the customer's responsibility begins for installing and maintaining wiring and equipment? • Smart jack • Vertical cross connect • Punchdown block • Demarc • IDF

Demarc When you contract with a local exchange carrier (LEC) for data or telephone services, they install a physical cable and a termination jack onto your premises. The demarcation point (demarc) is the line that marks the boundary between the telco equipment and the private network or telephone system. Typically, the LEC is responsible for all equipment on one side of the demarc, and the customer is responsible for all equipment on the other side of the demarc.

You have a network that occupies the top floor of a three story building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. What would you use to relocate the WAN line into a wiring closet on your floor? • Demarc extension • Smart jack • Horizontal cross connect • 110 block • 66 block

Demarc extension A demarc extension extends the demarcation point from its original location to another location within the building. The demarc extension typically consists of a single wire bundle that attaches to the existing demarc and supplies a termination point to a different location. You might need a demarc extension if your network occupies an upper floor of a building. The LEC will typically install the demarc into the MDF on the bottom floor, and you will need to install an extension to place the demarc into the IDF on your floor.

Which of the following services automatically creates and deletes host records when an IP address lease is created or released? • DHCP Relay • Forward lookup • Dynamic NAT • Dynamic DNS

Dynamic DNS Dynamic DNS (DDNS) enables clients or the DHCP server to update records in the zone database automatically whenever an IP address lease is created or renewed.

In the OSI model, which of the following functions are performed at the Presentation layer? (Select two.)

Encrypt and compress data Specify data format (such as file formats) The Presentation layer encrypts data, changes and converts character sets, and compresses data. File formats (such as .jpg, .wmv, and .wav) are part of the Presentation layer.

You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use? • BNC • ST • SC • RJ-45 • F-type • RJ-11

F-type Use an F-type connector for broadband cable connections that use coaxial cable. Use a BNC connector for 10Base2 Ethernet networks. Use an RJ-11 connector for modem connections to a phone line. Use an RJ-45 connector for an Ethernet network that uses twisted pair cable. Use ST and SC connectors for fiber-optic cables.

Which of the following is a valid IPv6 address? • 199.12.254.11 • FEC0::AB:9007 • FEC0:AB98::A7::9845:4567 • FEC0:AB04:899A • FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A

FEC0::AB:9007 The :: in the address replaces blocks of consecutive 0's. The longer form of this address would be FEC0:0000:0000:0000:0000:0000:00AB:9007. Leading 0's within a quartet can also be omitted. You can only omit one block of 0's using the double colon. An address without double colons should have a total of 32 hexadecimal numbers in 8 blocks.

The WWW is a physical set of networks. • True • False

False The World Wide Web (WWW) is an open source information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet

You are the administrator of your company's network. You want to prevent unauthorized access to your intranet from the Internet. Which of the following should you implement? • ICS • Packet Internet Groper • Proxy server • Firewall

Firewall

Which of the following is the best device to deploy to protect your private network from a public untrusted network? • Firewall • Gateway • Router • Hub

Firewall A firewall is the best device to deploy to protect your private network from a public untrusted network. Firewalls are used to control traffic entering and leaving your trusted network environment. Firewalls can manage traffic based on source or destination IP address, port number, service protocol, application or service type, user account, and even traffic content.

You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the Internet to provide users with Internet access. Since doing so, it has come to your attention that an intruder has invaded your network from the Internet on three separate occasions. What type of network hardware should you implement to prevent this from happening again? • CSU/DSU • Firewall • Proxy server • Router • Hub • Switch

Firewall The role of a firewall is to provide a barrier between an organization's network and a public network, such as the Internet. Its job is to prevent unauthorized access into the organization's private network. To do this, the firewall examines incoming packets and determines whether they should be allowed to enter based on a set of rules defined by the network administrator.

Which of the following WAN technologies provides packet switching over high-quality digital lines at speeds greater than 1.544 Mbps? • X.25 • Frame Relay • ISDN • POTS

Frame Relay Frame Relay networks are packet-switched networks that operate at T1 or T3 speeds. Frame Relay achieves faster speeds by using high-quality digital lines, which require less extensive error control than X.25 networks.

What type of module might a switch use to allow it to modify the media type supported by a switch port? (Select two.) MPLS GBIC SFP OC-x

GBIC (gigabit interface converter) SFP (small form-factor pluggable) Older network adapters used an external transceiver that matched the media type. While nearly all current network adapters come with a built-in transceiver type, new devices, such as switches and routers, use transceiver modules that allow you to modify the media type of a port by changing the transceiver. Transceiver modules include the following: • A GBIC (gigabit interface converter) is a larger-sized transceiver that fits in a port slot and is used for Gigabit media including copper and fiber optic. • An SFP (small form-factor pluggable) is similar to a GBIC but with a smaller size. An SFP is sometimes called a mini-GBIC.

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two.) • Faster installation • Greater cable distances without a repeater • Lower installation cost • Immunity to electromagnetic interference

Greater cable distances without a repeater Immunity to electromagnetic interference

Which protocol is used on the World Wide Web to transmit Web pages to Web browsers?

HTTP HTTP or HyperText Transfer Protocol is used by Web servers and browsers to transmit Web pages on the Internet. This is often confused with HTML or HyperText Markup Language which is the markup language used to create Web content.

You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a second wiring closet on the main floor. You need to connect the two wiring closets. Which of the following are typically used to connect the two wiring closets? (Select two.) • Smart jack • Horizontal cross connect • Vertical cross connect • Demarc extension • 25 pair

Horizontal cross connect 25 pair A horizontal cross connect connects wiring closets on the same floor. 25 pair or 100 pair wiring punched down into 66 or 110 blocks are often used to connect the wiring closets together.

Which of the following devices does not segment the network? • Router • Firewall • Hub • Switch

Hub

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents? (Select two.) • Router • Hub • Repeater • Bridge • Switch • Gateway

Hub Repeater

Which organization is responsible for allocating public IP addresses? • IANA • IETF • IEEE • CompTIA

IANA The Internet Assigned Numbers Authority (IANA) is responsible for allocating IP addresses used on the Internet. When you want to obtain a public IP address, you would typically get the address from your ISP, which has received it from a Regional Internet Registry (RIR), which has been assigned a block of addresses from IANA. The IETF is an organization that is responsible for settings standards used on the Internet. The IEEE is an organization that sets networking standards such as for Ethernet or wireless networking. CompTIA is a professional organization that represents computing technology companies and individuals.

Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?

ICMP The Internet Control Message Protocol (ICMP) allows hosts to exchange messages to indicate the status of a packet as it travels through the network.

You have a network that occupies both floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a second wiring closet on the second floor directly above the wiring closet that holds the demarc. Which of the following terms describes the closet on the second floor? • IDF • Horizontal cross connect • Demarc extension • Vertical cross connect • MDF

IDF An intermediate distribution frame (IDF) is a smaller wiring distribution point within a building. IDFs are typically located on each floor directly above the MDF, although additional IDFs can be added on each floor as necessary.

Which protocol does an IP host use to inform a router that it wants to receive specific multicast frames? • ICMP • IP • IGMP • SNMP • MGP

IGMP IP hosts use the IGMP or Internet Group Management Protocol to inform multicast-enabled routers that they want to receive specific multicast frames.

Which of the following protocols stores email on the mail server and gives users a choice to download mail or keep it on the server?

IMAP4 IMAP4 allows a mail server to hold messages for a client. A POP3 server requires the user to download his or her email.

You are asked to recommend an email retrieval protocol for a company's sales team. The sales team needs to access email from various locations and possibly different computers. The sales team does not want to worry about transferring email messages or files back and forth between these computers. Which email protocol was designed for this purpose?

IMAP4 The Internet Message Access Protocol version 4 (IMAP) is an email retrieval protocol designed to enable users to access their email from various locations without the need to transfer messages or files back and forth between computers. Messages remain on the remote mail server and are not automatically downloaded to a client system.

You have a small network with a single subnet connected to the Internet as shown in the Exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstation should use RouterA as the default gateway, and DNS1 as the DNS server address. From the dropdowns, select the appropriate parameters to configure the workstation's TCP/IP settings. • IP Address • Subnet Mask • Default Gateway • DNS Server

IP Address: 192.168.12.46 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.12.34 DNS Server: 198.162.1.22

Which of the following Internet access technologies support simultaneous voice and data traffic over the same physical line? (Select two.) • ISDN BRI • PSTN • ADSL • SDSL

ISDN BRI ADSL Both ISDN BRI and Asymmetrical DSL (ADSL) can be used for simultaneous voice and data traffic. Both divide the single line into multiple channels, allowing one channel to be used for phone calls with remaining channels used for data. With ADSL, splitters are required to keep the voice traffic from causing interference on the data channels.

Which of the following WAN technologies provides digital dial-up connections on two 64 Kbps data channels? • Frame Relay • ATM • X.25 • ISDN BRI

ISDN BRI ISDN BRI is a dial-up only service. Basic Rate ISDN provides access to two 64 Kbps data channels (B channels) and one 16 Kbps service channel (D channel). The two B channels can be used together for a total data transfer rate of 128 Kbps. Data compression can further increase the data transfer rate.

A workstation is connected to a switch on the Gi 0/2 interface using a straight-through cable. The Ethernet interface in the workstation has been manually configured to use a 100 Mbps link speed in full-duplex mode. Which of the following are true in this scenario? (Select three.) • If the link speed is 1000 Mbps or faster, full-duplex is used. • The switch attempts to sense the link speed. If it can't, the slowest link speed supported on the interface is selected. • If the link speed is 10 Mbps or 100 Mbps, full-duplex is used. • The switch interface will display as administratively down. • If the link speed is 1000 Mbps or faster, half-duplex is used. • If the link speed is 10 Mbps or 100 Mbps, half-duplex is used.

If the link speed is 1000 Mbps or faster, full-duplex is used. The switch attempts to sense the link speed. If it can't, the slowest link speed supported on the interface is selected. If the link speed is 10 Mbps or 100 Mbps, half-duplex is used.

You recently created a new network segment for Development. Because the hosts are now on a different network segment, they can no longer contact the DHCP server. Both network segments are connected via a Cisco router. Which of the following would be the best action to take in order to fix the problem?

Implement an IP Helper address on the router. When an IP Helper address is implemented on the Cisco router, DHCP broadcasts are forwarded to the specified IP address of the DHCP server. This allows hosts in a different network segment to contact the DHCP server.

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation cannot communicate with any other host on the network. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix. : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled. . . . . . . : No Autoconfiguration Enabled . . : Yes IPv4 Address. . . . . . . : 192.168.2.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . : 192.168.1.1 DNS Servers . . . . . . . : 192.168.2.20 What is the most likely cause of the problem? • Incorrect IP address • Incorrect default gateway • Incorrect subnet mask • Incorrect DNS server address

Incorrect IP address In this example, the IP address assigned to the host is on the wrong subnet. The host address is on the 192.168.2.0/24 subnet, but the other devices are using addresses on the 192.168.1.0 subnet (the scenario states that you are connecting the workstation to this subnet).

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20 What is the most likely cause of the problem? • Incorrect subnet mask • Incorrect DNS server address • Incorrect default gateway • Incorrect IP address

Incorrect default gateway In this example, the default gateway address is incorrect. The default gateway address must be on the same subnet as the IP address for the host. The host address is on the 192.168.1.0/24 subnet, but the default gateway address is on the 192.168.2.0 subnet.

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask. . . . . . . . : 255.255.0.0 Default Gateway . . . . . . : 192.168.1.1 DNS Servers . . . . . . . : 192.168.1.20 192.168.1.27 What is the most likely cause of the problem? • Incorrect DNS server address • Incorrect subnet mask • Incorrect default gateway • Incorrect IP address

Incorrect subnet mask In this example, the network is using a mask of 255.255.255.0 (24-bits), but the workstation is configured to use a mask of 255.255.0.0. You can identify the IP address class by memorizing the range of values for the first octet. • 0-126 = Class A = 255.0.0.0 = 8 bits • 128-191 = Class B = 255.255.0.0 = 16 bits • 192-223 = Class C = 255.255.255.0 = 24 bits • 223-239 = Class D • 240-255 = Class E

Which of the following strategies are used to prevent duplicate IP addresses being used on a network? (Select two.)

Install a DHCP server on the network Use Automatic Private IP Addressing

In the OSI model, which of the following functions are performed at the Application layer? (Select all that apply.)

Integration of network functionality into the host operating system Enabling communication between network clients and services

Which of the following is true of Multiprotocol Label Switching? (Select two.) • It is designed to forward only packets created with the TCP/IP protocol. • Packets routed using MPLS require additional routing lookup overhead. • It can carry ATM, SONET, and Ethernet traffic. • MPLS-enabled routers switch packets based on the packet contents, not on label information. • CEF is required for all MPLS-enabled Cisco routers.

It can carry ATM, SONET, and Ethernet traffic. CEF is required for all MPLS-enabled Cisco routers.

Which two of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true? • It can deliver other configuration information in addition to IP addresses. • A DHCP server assigns addresses to requesting hosts. • It cannot be configured to assign the same IP address to the same host each time it boots. • It is used only to deliver IP addresses to hosts

It can deliver other configuration information in addition to IP addresses. A DHCP server assigns addresses to requesting hosts.

Which of the following best describes how a switch functions?

It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.

Which of the following is true about the MAC address? (Select two.) It is a 48-bit address. It is a 64-bit address. It is typically represented by octets of decimal numbers between 0-255. It is a 32-bit address. It is typically represented by hexadecimal numbers.

It is a 48-bit address. It is typically represented by hexadecimal numbers.

Which of the following are characteristics of ISDN? (Select three.) • It is a dial-up service that uses existing copper wires for the local loop. • It uses analog signals to provide multiple data channels on the same send/receive media pair. • It lets you transmit voice, video, and data over the same lines. • It provides enough bandwidth to transmit data at higher speeds than standard modems and analog lines. • It uses HDLC as the default encapsulation protocol.

It is a dial-up service that uses existing copper wires for the local loop. It lets you transmit voice, video, and data over the same lines. It provides enough bandwidth to transmit data at higher speeds than standard modems and analog lines. Integrated Services Digital Network (ISDN) offers a natively digital service but runs over standard telephone lines. The ISDN communication protocols make it possible to carry voice, data, text, video, music, and so on over the same line at much higher speeds.

Which of the following statements accurately describes how a modem works? (Select two.)

It modulates digital data from the PC into analog data and transmits it on a telephone network. It demodulates analog data from a telephone network into digital PC data.

Which of the following are characteristics of coaxial network cable? (Choose three.) • It uses two concentric metallic conductors. • It uses RJ-45 connectors • The ends of the cable must be terminated. • It has a conductor made from copper in the center of the cable. • It is composed of four pairs of 22-gauge copper wire. • The conductors within the cable are twisted around each other to eliminate cross-talk. • It uses two concentric conductors made from plastic or glass which conduct light signals.

It uses two concentric metallic conductors. The ends of the cable must be terminated. It has a conductor made from copper in the center of the cable.

What is the connection order used by two TCP/IP routers to open a session with PPP including authentication? • NCP, authentication, LCP • NCP, LCP, authentication • LCP, NCP, authentication • LCP, authentication, NCP

LCP, authentication, NCP PPP uses the following process to open a session: 1. Exchange LCPs to establish the link and negotiate communication parameters. 2. (Optional) Perform authentication. 3. Exchange NCPs to negotiate the Network-layer protocols to use.

The Data Link Layer of the OSI model is comprised of two sublayers. What are they? (Select two.)

LLC (Logical Link Control) MAC (Media Access Control)

Which of the following cellular network types use MIMO to increase 3G data throughput? (Select two.) • EDGE • LTE • HSPA+ • CDMA2000 • WiMAX

LTE HSPA+ Both HSPA+ and LTE are 3G extensions that use multiple-input and multiple-output (MIMO) to increase bandwidth.

You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. Which interface statistic displays the number of collisions that occurred after the 64th byte of the frame was transmitted?

Late collisions In the output of the show interfaces command, the late collisions statistic displays the number of collisions that occurred after the 64th byte of the frame was transmitted. This may be caused by mismatched duplex settings.

At which OSI model layer does a media converter operate? Layer 1 Layer 2 Layer 3 Layer 4

Layer 1 A media converter operates at the OSI model layer 1 (Physical layer). The media converter translates frames into bits and transmits them on the transmission medium.

Which of the following are functions of the MAC sublayer? (Select two.)

Letting devices on the network have access to the LAN Defining a unique hardware address for each device on the network

The UDP transport protocol provides which of the following features? (Select all that apply.) • Guaranteed delivery • Sequence numbers and acknowledgements • Low overhead • Connectionless datagram services

Low overhead Connectionless datagram services

Which of the following connectors are used with fiber optic cables and include both cables in a single connector? (Select two.) • BNC • MT-RJ • ST • LC • SC

MT-RJ LC Both the LC and MT-RJ connectors have both fiber optic cables in a single connector. ST and SC connectors hold a single strand of fiber optic cable. A cable using either connector has two connectors on each end.

You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BaseTX switch ports. Which device should you use? • Gateway • Repeater • Media converter • Bridge • Hub

Media converter Use a media converter to convert from one media type to another media type within the same architecture. Use a bridge to connect two devices that use different network architectures, for example to connect a wired network to wireless clients. A hub or a repeater connect devices using the same media type.

You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs?

Mesh A mesh topology has multiple connections at each node, increasing connectivity fault tolerance. None of the other topologies have native fault tolerance built in.

You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?

Mesh In a mesh topology, each network device is interconnected to all other network nodes. This creates multiple data paths and in the event of a failed link, the data has an alternate route to arrive at its destination.

You have implemented an ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical topology has been implemented in this type of network?

Mesh This type of network uses a physical mesh topology. The key characteristics of a mesh topology are: • There's no central connecting point. • Any host can communicate directly with any other host on the network.

You have a network that uses a logical bus topology. How do messages travel through the network.

Messages are broadcast to all devices connected to the network. In a logical ring topology, messages travel to each device in turn. If the message is not intended for that device, the message is forwarded to the next device on the network.

Which of the following geographic network types are typically managed by a city as a public utility?

Metropolitan Area Network (MAN) A metropolitan area network (MAN) is a network that sometimes covers an entire city. MANs are typically owned and managed by a city as a public utility.

You have a server at work with a custom application installed. Connections to the server that use the custom application must use IPv6. The server is currently running IPv4. You are the only person who connects to the server, and you always use your Linux laptop for the connection. Your laptop supports both IPv4 and IPv6. The rest of your company network runs only IPv4. You need a cost-effective solution to allow your laptop to connect to the server. Your solution must also support communication through NAT servers. Which client software should you use to connect to the server? • ISATAP • Miredo • 4-to-6 • 6-to-4

Miredo On Linux, Miredo client software is used to implement Teredo tunneling. Teredo tunneling establishes a tunnel between individual hosts. Hosts must be dual-stack hosts so they can tunnel IPv6 packets inside IPv4 packets.

To access the Internet through the PSTN, what kind of connectivity device must you use? • CSU/DSU • Switch • TDM • Modem • DTE

Modem To establish a connection to the Internet through the public telephone network (PSTN/POTS) you must use a modem (modulator/demodulator) which converts digital PC data into analog signals that can be transmitted through standard telephone lines.

Which of the following are benefits of LCP? (Select three.) • Monitors data dropped on the link and avoids frame looping • Provides physical addressing for the data link layer • Provides logical addressing for the data link layer • Negotiates the use (or lack) of authentication before starting the session • Provides load balancing across multiple links

Monitors data dropped on the link and avoids frame looping Negotiates the use (or lack) of authentication before starting the session Provides load balancing across multiple links

Which of the following functions are performed at the Physical layer of the OSI model?

Movement of data across network cables

Which of the following address types is shared by multiple hosts, and is used to form groups of computers that should receive the same data stream? • Simplex • Multicast • Broadcast • Half-duplex • Unicast

Multicast A multicast address is an address that identifies a group of computers. Members of the group share the same multicast address.

Which type of address is the IP address 232.111.255.250? • Broadcast • Private • Multicast • Unicast

Multicast A multicast address is an address that identifies a group of computers. Members of the group share the same multicast address. Multicast addresses are in the range of 224.0.0.0 to 239.255.255.255. A unicast address is an address that identifies a single host. A broadcast address is an address that is sent to all hosts. Broadcast addresses are the last possible address on a subnet (typically ending in 255). The private IPv4 address ranges are: • 10.0.0.1 to 10.255.255.254 • 172.16.0.1 to 172.31.255.254 • 192.168.0.1 to 192.168.255.254

Which of the following protocols is used by PPP to enable support for multiple Network-layer protocols?

NCP PPP uses the Network Control Protocol (NCP) to support multiple upper-layer protocols.

You have a large TCP/IP network and want to keep hosts' real time clock synchronized. What protocol should you use?

NTP The network time protocol (NTP) lets you keep clocks synchronized.

PPP supports authentication, compression, and multiple Network-layer protocols. Which of the following correctly sequences these functions when a PPP link is established?

Negotiate compression settings, perform authentication, negotiate Network-layer protocols PPP uses the following process to open a session: 1. Exchange LCPs to establish the link and negotiate communication parameters (such as compression settings). 2. (Optional) Perform authentication. 3. Exchange NCPs to negotiate the Network-layer protocols.

At what OSI layer does a router operate to forward network messages?

Network

Which network component connects a device with the transmission media and allows it to send and receive messages? • Client • Network interface card • Peripheral • Protocol • Server

Network interface card

Which of the following devices operate at OSI model layer 2? (Select two.)

Network interface card Switch

You are installing networking wiring for a new Ethernet network at your company's main office building. The project specifications call for Category 5 UTP network cabling and RJ-45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of Category 3 network cable in storage. Upon investigation, it appears very similar to Category 5 wiring. Should you substitute Category 3 cabling for Category 5 cabling to finish the project? No, Category 5 cabling has more twists per inch than Category 3 cabling to reduce cross-talk and support higher data rates. Yes, you can substitute Category 5 wiring with Category 3 wiring, as they are electrically identical. No, Category 3 cabling doesn't support RJ-45 connectors. No, Category 5 cabling uses a thicker copper wire than Category 3 cable; enabling higher data transmission rates. No, the sheath surrounding Category 5 cable is much thicker; creating an extra layer of shielding to reduce cross-talk and support higher data rates.

No, Category 5 cabling has more twists per inch than Category 3 cabling to reduce cross-talk and support higher data rates. While Category 3 and Category 5 cabling may appear similar physically, they are electrically different. Category 5 cabling is twisted much tighter than Category 3 cabling. This reduces cross talk and enables Category 5 wiring to support much faster data transmission rates.

Based on the diagram, which network line code technique is being used?

Non-Return-to-Zero The Non-Return-to-Zero line code technique is being used. With Non-Return-to-Zero, binary 1s are represented by positive voltage while 0s are represented by negative voltage. However, unlike Return-to-Zero, there is no neutral (zero) voltage state between bits.

Match the description on the left with the appropriate networking signal line code on the right.

Non-Return-to-Zero >> Binary 1s are represented by positive voltage while 0s are represented by negative voltage. There is no zero voltage state between bits. Manchester >> The transition from one voltage level to another is used to represent binary data. Return-to-Zero Inverted >> A 0 is represented by sending a light pulse. A 1 is represented by sending no light pulse. Return-to-Zero >> Binary 0s and 1s are transmitted by sending voltage pulses, with the voltage returning to zero between pulses.

Which of the following describe the EDGE cellular technology? (Select two.) • An extension to 3G • Offers speeds of 400-1,000 Kbps • Uses MIMO • The first Internet compatible technology

Offers speeds of 400-1,000 Kbps The first Internet compatible technology

Two routers with the hostnames SLC and PROVO have been configured to connect using PPP with CHAP authentication through their BRI0 interfaces. Attempts to establish a session between the two routers fails. You check the running configuration on both routers and find the output shown below: ________________________________________ hostname SLC enable password cisco username PROVO password vanilla ! ! interface Serial0 ip address 172.16.55.129 255.255.255.252 encapsulation ppp ppp authentication chap ! ! - remaining output omitted -- ________________________________________ hostname PROVO enable password ccna username SLC password chocolate ! ! interface Serial0 ip address 172.16.55.130 255.255.255.252 encapsulation ppp ppp authentication chap ! ! - remaining output omitted -- ________________________________________ What should you do to correct the problem? • On SLC, change the username password to ccna. On PROVO, change the username password to cisco. • On SLC, change the username password to chocolate. • On SLC, change the username to SLC. On PROVO, change the username to PROVO. • On PROVO, change the enable password to cisco. • On PROVO, change the IP address to 172.16.55.128.

On SLC, change the username password to chocolate. The username password used by each router must match. In this scenario, changing the username password on SLC to chocolate would correct the problem (you could also change the password on PROVO to vanilla).

Which of the following TCP/IP protocols do e-mail clients use to download messages from a remote mail server?

POP3 The POP3 protocol is part of the TCP/IP protocol suite and used to retrieve e-mail from a remote server to a local client over a TCP/IP connection. SNMP is a protocol used to monitor network traffic. SMTP is a TCP/IP protocol used to send email.

You are configuring your computer to dial up to the Internet. What protocol should you use? • PPTP • PPP • VPN • SMTP

PPP PPP, or Point-to-Point Protocol, lets you dial up and connect to the Internet.

Your client has acquired several small companies and would like to connect them together into one network. Not all of the routers are Cisco devices and compatibility is a concern. Which WAN encapsulation method should you recommend your client use? • PPP • Cisco HDLC • PAP • Ethernet

PPP The Point-to-Point (PPP) protocol is not proprietary. For this reason, it is the best choice for connecting dissimilar vendor devices.

Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection? • L2TP • RDP • ICA • PPP • PPPoE

PPPoE PPP over Ethernet (PPPoE) is used for connections that have an "always on" state, such as DSL or fiber optic running Ethernet. PPPoE is a modification of PPP that allows for negotiation of additional parameters that are typically not present on a regular Ethernet network. ISPs typically implement PPPoE to control and monitor Internet access over broadband links.

Which of the following protocols or services is commonly used on cable Internet connections for user authentication? • RRAS • PPPoE • RDP • PPP

PPPoE The Point-to-Point Protocol over Ethernet (PPPoE) is commonly used on cable Internet connections for user authentication. Like its dial-up counterpart, the Point-to-Point Protocol (PPP), PPPoE requires that users provide authentication information before a connection is granted.

Which four of the following are the responsibility of the WAN service provider? • CPE • DTE • PSE • Local loop • DCE • CO

PSE Local loop DCE CO WAN service providers are responsible for: • Packet Switching Exchange (PSE)—equipment inside the WAN "cloud" • Central Office (CO)—equipment that allows access to the PSE • Data Circuit-Terminating Equipment (DCE)—devices that switch data to the WAN • Local loop—wiring that connects the customer to the CO Customers are responsible for: • Customer Premises Equipment (CPE)—any equipment at the customer site • Data Terminal Equipment (DTE)—devices that send local data to the WAN

Which network type divides transmitted data into smaller pieces and allows for multiple communications on the network medium? • Sliding window • Packet-switched • Circuit-switched • Frame-based • Multiplexed

Packet-switched A packet-switched network divides data into small units called packets. These packets are routed based on their destination addresses. With a packet-switched network, multiple hosts can use the network medium at the same time. An Ethernet computer network is an example of a packet-switched network.

You have been asked to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement?

Partial Mesh In a partial mesh topology, only some redundant paths exist. A partial mesh is more practical and less expensive than a full mesh.

Which of the following is used to terminate individual wires from a 25 pair or 100 pair cable using female RJ-45 ports? • Horizontal cross connect • Patch panel • 66 block • 110 block

Patch panel A patch panel is a device that typically connects individual stranded wires into female RJ-45 connectors. For example, you might connect 4 pairs of wires from a punchdown block to a port on the patch panel. On the patch panel, you then connect drop cables (cables with RJ-45 connectors) to the patch panel on one end and a computer on the other end.

You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have?

Peer-to-peer In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts, and each host is in charge of controlling access to those resources.

At which layer of the OSI model do hubs operate?

Physical

Network signaling is a function of which layer of the OSI model?

Physical Layer Network signaling methods are a function of the Physical layer (Layer 1) of the OSI model. The purpose of network signaling is to encode binary digital data on the network medium.

You need to terminate a Cat 6 UTP cable with an RJ45 connector. Your organization's IT policy states that all cable connectors must be wired according to TIA568A standards. Drag the UTP wire on the left to the correct pin in the RJ45 connector on the right.

Pin 1 White with green stripe Pin 2 Solid green Pin 3 White with orange stripe Pin 4 Solid blue Pin 5 White with blue stripe Pin 6 Solid orange Pin 7 White with brown stripe Pin 8 Solid brown

You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights. You would like to run your Ethernet cables in this area. Which type of cable must you use? • PVC • STP • Fiber optic • Plenum • Cat 5e or Cat 6e

Plenum Plenum cable is fire resistant and non-toxic; it must be used when wiring above ceiling tiles. PVC cable cannot be used to wire above ceilings because it is toxic when burned.

You have a series of WAN links that connects your site to multiple other sites. Each remote site is connected to your site using a dedicated link. What type of connection is being used? • Hybrid • Point-to-multipoint • Point-to-point • Packet switched

Point-to-point A point-to-point circuit is established between two locations. Each destination requires a separate circuit. A point-to-multipoint circuit is a single circuit that can be used to reach multiple locations.

Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more than once.

Presentation -> Application Data Link ---> Network Interface Application --> Application Session -----> Application Network ----> Internet Transport ---> Transport

CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use APIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other but you are having trouble configuring Internet access. What is the likely cause of the problem? • The DNS server is unavailable to resolve Internet hostnames. • The default gateway is not set on the client systems. • Private addresses cannot directly communicate to hosts outside the local subnet. • The default gateway is not set on the server. • All client systems must be rebooted.

Private addresses cannot directly communicate to hosts outside the local subnet. APIPA assigns private addresses designed for use on single-subnet networks that do not use routers. If Internet access is required, APIPA cannot be used to provide clients direct access to the Internet. APIPA is enabled by default and will assign an address if the DHCP server is unavailable.

What tool should you use to extend network services beyond the demarc? • Tone generator • Punchdown tool • Crimper • Media certifier

Punchdown tool A demarc is the location where the local network ends and the telephone company's network begins. This location is usually at a punch down block in a wiring closet. You use a punchdown tool to attach wires to the punch down block.

You are working with 25 pair wires and 66 blocks. You have pushed the wires onto the 66 block, but now need to cut off the excess end of each wire. Which tool should you use? • Cable stripper • Butt set • Snips • Punchdown tool

Punchdown tool Use a punchdown tool to push wires into 66 or 110 blocks and cut wires at the same time. The punchdown tool has a blade on one side the cuts off the excess wires. Use snips to cut cables or wires. However, a punchdown tool would be easier to use for this task than wire snips.

Which type of device is required to implement port authentication through a switch? • Proxy server • Router • RADIUS server • Layer 3 switch

RADIUS server Port authentication is provided by the 802.1x protocol, and allows only authenticated devices to connect to the LAN through the switch. 802.1x requires a RADIUS server (also called an AAA server) to validate the authentication credentials.

You want to set up a service to allow multiple users to dial in to the office server from modems on their home computers. What service should you implement? • PPP • ISDN • RAS • RIP

RAS RAS stands for Remote Access Service, which enables users to dial in to a server from remote locations. ISDN is a digital communications network that uses existing phone lines.

F-type connectors are typically used with cables using which of the following standards? (Select two.) • RG-59 • Cat 5 • Cat 5e • RG-6 • RG-58 • Cat 6e

RG-59 RG-6 F-type connectors are used with coaxial cable, and are typically used for cable TV and satellite installations using RG-6 or RG-59 cables. RG-58 cables typically use BNC connectors and cables are used for 10Base2 Ethernet. Cat 5, 5e, and 6e cables use RJ-45 connectors.

You have a small home network connected to the Internet using an RG-6 cable. You need to move the router connecting the network to the Internet, but can't find any RG-6 cable. Which cable types could you use instead? • RG-8 • RG-59 • RG-8 or RG-58 • RG-8, RG-58, or RG-59 • RG-58 • RG-58 or RG-59

RG-59 RG-6 has an impedance rating of 75 ohms. When using coaxial cables, it is important to use cables with the same impedance rating. Only RG-59 is rated for 75 ohms. RG-8 and RG-58 are rated for 50 ohms.

Of the following cables, which offer the best protection against EMI? • Cat 5e • RG-6 • Cat 6e • Cat 5

RG-6 Coaxial cable offers better protection against EMI than twisted pair cables. Coaxial cable has a mesh conductor which provides a ground and protects against EMI.

Which of the following cable classifications are typically used for cable and satellite networking with coaxial cables? (Select two.) • RG-6 • RG-8 • RG-58 • RG-59

RG-6 RG-59 Both RG-6 and RG-59 can be used for cable and satellite networking applications. RG-8 and RG-58 are used with 10 Mbps Ethernet.

Which of the following connectors is used with Ethernet 10BaseT networks? • RJ-45 • BNC • 15-pin D-shell • RJ-11

RJ-45

Which of the following connector types are used with UTP cables? (Select two.) • F-Type • SC • BNC • RJ45 • RJ11

RJ45 RJ11

Which of the following connector types would you most likely use to connect to a T1 WAN service?

RJ48c The RJ48c connector is similar to an RJ45 connector, but has different pin-outs. RJ48c connectors are commonly used for T1 WAN connections. RJ45 connectors are used for Ethernet, ISDN, and some DSL connections. RJ11 connectors are used for dial-up (modem) and some DSL connections.

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need? • Intranet • Virtual Private Network • Remote access • Internet

Remote access

In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device?

Ring

Which of the following topologies connects each device to a neighboring device?

Ring

Which of the following hardware devices links multiple networks and directs traffic between networks? • Bridge • Hub • Router • Repeater

Router A router is a device that links multiple networks and directs traffic between networks. Each network linked by routers has its own unique identifier called the "network number" or "network address."

In the OSI model, what is the primary function of the Network layer?

Routes messages between networks

You have a Windows Server 2012 system that you want to use as a DHCP Relay Agent. Which Windows Server 2012 service would you use to do this? • Routing and Remote Access • Network Policy Server • DNS • Internet Information Services (IIS) Manager

Routing and Remote Access In Windows Server 2012, the DHCP Relay Agent role is enabled and configured by using the Routing and Remote Access service. Before a Windows server can be used as a DHCP Relay Agent, the Routing and Remote Access service (RRAS) must be installed.

Which of the following Internet services provides equal upload and download bandwidth? • VHDSL • SDSL • ADSL • VDSL

SDSL Symmetrical DSL (SDSL) provides equal download and upload speeds. Depending on the region, speeds are between 1.544-2.048 Mbps. Newer SHDSL provides between 4.6-5.696 Mbps. The entire line is used for data; simultaneous voice and data is not supported. Splitters are not required, because voice traffic does not exist on the line.

What protocol sends e-mail to a mail server?

SMTP Simple Mail Transfer Protocol (SMTP) is used to send emails From Client To Mail Server Across the Internet.

Your company has just acquired another company in the same city. You are given the task of integrating the two e-mail systems so that messages can be exchanged between the e-mail servers. However, each network uses an e-mail package from a different vendor. Which TCP/IP protocol will enable messages to be exchanged between systems?

SMTP The Simple Mail Transfer Protocol (SMTP) specifies how messages are exchanged between e-mail servers. POP3 and IMAP4 are used by e-mail clients to download e-mail messages from e-mail servers.

Which of the following connectors usually require polishing as part of the assembly process? (Select two.) • BNC • ST • AUI • IDC • SC

ST SC The fiber optic cable assembly process is more complex than other assemblies. It is necessary to polish the exposed fiber tip to ensure that light is passed on from one cable to the next with no dispersion.

Which of the following connectors is used with fiber optic cables and connects using a twisting motion? • LC • SC • F-type • BNC • ST

ST Tip: To remember the difference between ST and SC connectors, associate the T in ST with "twist". SC and LC connectors are used with fiber optic cables but plug in instead of twist.

A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas? • Satellite • Dial-up • ISDN • Cable modem • DSL

Satellite

Which of the following is most susceptible to interference related to atmospheric conditions? • Cable modem • Satellite • ISDN • DSL • Dial-up

Satellite

An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do? • Send the frame out the destination port. • Send the frame out all 8 ports. • Drop the frame. • Send the frame out ports 2-8.

Send the frame out ports 2-8. Because the switch does not know the port that is used to reach the destination device, it will send the frame out all ports except for the port on which the frame was received. After the switch learns the port that is used to reach the destination device, it will send the frame out only that port.

Which of the following forms of optical fiber would usually be used to connect two buildings across campus from each other, which are several kilometers apart? • Multimode • Dual mode • Single mode • Fibre Channel mode

Single mode In this scenario, use single mode fiber optic cables. Fiber optic is graded as single mode or multimode. Single mode consists of a single very thin core which produces fewer reflections. This provides greater effective bandwidth over greater distances. Multimode is less costly than single mode fiber. Multimode transmits multiple light rays concurrently. Multimode is used to transmit over shorter distances as the rays tend to disperse as the transmission distance increases. Fibre channel is a network topology used in storage area networks.

Of the following cables, which offer the best protection against EMI? • Cat 5 • RG-6 • Cat 5e • Single mode fiber optic

Single mode fiber optic

You are configuring the DHCP Relay Agent role service on a Windows server. Which of the following is a required step for the configuration? • Configure the Windows server to be on the same subnet as the DHCP server. • Connect an RFC 1542 compliant router to the Windows server. • Use the ip helper-address command to specify the remote DHCP server. • Specify which server network interface the agent listens on for DHCP messages.

Specify which server network interface the agent listens on for DHCP messages.

Which of the following topologies connects each network device to a central hub?

Star

You have a small network that uses a hub to connect multiple devices. What physical topology is used?

Star A hub creates a network with a physical star topology. The physical star topology uses a logical bus topology, where messages are sent to all devices connected to the hub.

You manage a network that uses IPv6 addressing. When clients connect devices to the network, they generate an interface ID and use NDP to learn the subnet prefix and default gateway. Which IPv6 address assignment method is being used? • Static full assignment • Stateless autoconfiguration • Static partial assignment • Stateful DHCPv6

Stateless autoconfiguration

Match the IPv6 address configuration method on the right with its definition on the left.

Static Full Assignment The entire 128-bit address and all other configuration information is statically assigned to the host. Static Partial Assignment The prefix is statically assigned and the interface ID is derived from the MAC address. Stateless Autoconfiguration Clients automatically generate the interface ID and learn the subnet prefix and default gateway through the Neighbor Discovery Protocol (NDP). Stateful DHCPv6 Provides each client with an IP address, default gateway, and other IP configuration information. Stateless DHCPv6 Supplies the client with the DNS server IP address only. Does not provide the client with an IP address and does not track the status of each client.

Which of the following best describes the purpose of using subnets? • Subnets divide an IP network address into multiple network addresses. • Subnets combine multiple IP network addresses into one network address. • Subnets place each device within its own collision domain. • Subnets let you connect a private network to the Internet.

Subnets divide an IP network address into multiple network addresses.

You manage a subnet that uses the following subnet address: 198.162.1.0/23. Which of the following best describes how addressing is configured for the subnet? • Supernetting • Classful • Private • Subnetting

Supernetting

Which of the following are characteristics of VDSL? (Select two.) • Does not require splitters. • Supports both data and voice at the same time • Unequal download and upload speeds • Equal download and upload speeds • Supports only data (not voice)

Supports both data and voice at the same time Unequal download and upload speeds

What device is used to create a physical star topology?

Switch A physical star topology uses a switch or a hub.

Which of the following protocols can be used to centralize remote access authentication? • Kerberos • EAP • SESAME • TACACS • CHAP

TACACS Centralized remote access authentication protocols include: • Remote Authentication and Dial-In User Service (RADIUS) • Terminal Access Controller Access Control System (TACACS)

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.) • TACACS+ • AAA • PKI • EAP • 802.1x • RADIUS

TACACS+ RADIUS

Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes?

TCP The TCP protocol includes error checking

You are an application developer and are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability?

TCP The Transmission Control Protocol (TCP) guarantees delivery through error checking and acknowledgments.

You have a small network connected to the Internet as shown in the Exhibit. You need to configure the default gateway address on Wrk1 so that it can communicate with hosts on the Internet. Which address would you use for the default gateway address? • The IP address assigned to Fa0/1 on Router1. • The IP address assigned to SwitchA. • The IP address assigned to Fa0/0 on Router1. • The IP address assigned to Fa0/1 on Router2. • The IP address assigned to Fa0/0 on Router2

The IP address assigned to Fa0/0 on Router1. When assigning the default gateway address, use the address of the router interface, connected to the same network, that is used to reach remote networks. In this scenario, the workstation must be configured with the IP address assigned to the Fa0/0 interface on Router1. This default gateway configuration allows the workstation to communicate with hosts on the other internal subnet as well as with hosts on the network.

Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Down • Protocol status: Down What are the most likely causes of this WAN issue? (Select two.) • There is an authentication misconfiguration issue between the WAN interfaces on both ends of the link. • There is a problem with the service provider's network. • There is an IP address misconfiguration issue between the WAN interfaces on both ends of the link. • There is a data link encapsulation protocol mismatch between the WAN interfaces on both ends of the link. • The WAN interface on one or both routers has been disabled. • There is latency on the WAN link.

The WAN interface on one or both routers has been disabled. There is a problem with the service provider's network. Because both the line status and the protocol status of the WAN interface is down, you're most likely experiencing a Layer 1 issue. As such, you should start troubleshooting at Layer 1. In this scenario, it's possible that: • One or both WAN interfaces have been shut down (disabled). • There is an issue with the service provider's network. Because both interfaces have a status of down/down, the problem must lie at Layer 1. The following issues are Layer 2 or 3 issues: • A protocol mismatch • An authentication mismatch • An IP address misconfiguration Latency on the link would still allow communications to occur between the routers, but performance would be poor. If this were the case, the interface status of both link ends would be in an up/up state.

Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. Recently, your CEO conducted a video conference with the employees at the branch office. The employees complained that the video was choppy and that the audio was frequently out of sync with the video. What is the most likely cause of this poor WAN performance? • There is an authentication misconfiguration issue between the WAN interfaces on both ends of the link. • There is a data link encapsulation protocol mismatch between the WAN interfaces on both ends of the link. • The WAN interface on the router at the branch office has been disabled. • The WAN provider is throttling bandwidth on the link. • There is an IP address misconfiguration issue between the WAN interfaces on both ends of the link.

The WAN provider is throttling bandwidth on the link. In this scenario, its possible that the WAN service provider is the cause of the problem. You should check the contract with the service provider to make sure they aren't throttling the bandwidth of the WAN link. It's not uncommon for service providers to impose bandwidth or utilization caps that could be hampering communications. Because connectivity exists between the home and branch office networks in this scenario, the following are very unlikely to be the cause of the problem: • A disabled WAN interface • A protocol mismatch • An authentication mismatch • An IP address misconfiguration

Which of the following is true about single mode fiber optic network cabling? • It transmits multiple rays of light concurrently. • The central core is smaller than that of multimode fiber optic cabling. • It doesn't support segment lengths as long as that supported by multimode fiber optic cabling. • It's less expensive than multimode fiber optic cabling. • The central core is composed of braided plastic or glass fibers

The central core is smaller than that of multimode fiber optic cabling.

After installing a new DHCP server on the network, you need to verify that network devices are receiving IP addressing via DHCP. You reboot a Windows XP client system and using the ipconfig command, receive the following information: Ethernet adapter Local Area Connection 1: Description . . . . . . . . . . . : CardBus-II 10/100 PC Card Physical Address. . . . . . . . . : 02-00-4C-4F-3F-50 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Autoconfiguration IP Address. . : 169.254.25.129 Subnet Mask . . . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . . . : DNS Servers . . . . . . . . . . : Which of the following statements are true? (Select two). • The client system is unable to reach the DHCP server. • The Default gateway address needs to point to the DHCP server. • The network subnet mask is incorrect. DHCP is disabled on the client system. • The network is configured to use static IP addressing. • The client system is configured to use DHCP.

The client system is unable to reach the DHCP server. The client system is configured to use DHCP. A system configured as a DHCP client will attempt to locate a DHCP server during the boot process. If the client system is unable to locate the DHCP server and obtain IP information, an APIPA assigned address of 169.254.25.129 and a subnet mask of 255.255.0.0 will be used.

Due to widespread network expansion, you have decided to upgrade the network by configuring a DHCP server for the network. The network uses Linux, Windows, and Mac OS X client systems. You configure the server to distribute IP addresses from 192.168.2.1 to address 192.168.2.100. You use the subnet mask of 255.255.255.0. After making all setting changes on the DHCP server, you reboot each client system but they are not able to obtain an IP address from the DHCP server. Which of the following would explain the failure? • The clients must be configured to obtain IP addressing from a DHCP server. • DHCP does not work in a heterogeneous computing environment unless the DHCP samba client software is installed. • DHCP does not function in a heterogeneous computing environment. • 192.168.x.x requires a class C subnet mask. • The DHCP server must be rebooted.

The clients must be configured to obtain IP addressing from a DHCP server. Once a DHCP server has been configured for the network, each client system has to be told to look for a DHCP server to obtain its IP addressing. Selecting DHCP to obtain IP addressing information is typically as easy as selecting a radio button. If the client is not set to DHCP, it will look for a statically assigned IP address.

You have been experiencing intermittent connectivity issues with switch2. To check the status of the interfaces, you run the following commands: switch2# show interfaces fa0/1 status Port Name Status Vlan Duplex Speed Type Fa0/1 connected 3 a-half a-100 10/100BaseTX switch2# show interfaces Gi0/1 status Port Name Status Vlan Duplex Speed Type Gi0/1 connected trunk a-full a-1000 1000BaseTX switch2# show interfaces Gi0/2 status Port Name Status Vlan Duplex Speed Type Gi0/2 connected trunk a-full a-1000 1000BaseTX What is the issue with this network? • There is a link speed mismatch on the Gi0/2 interface. • There is a duplex mismatch on the Gi0/2 interface. • There is a link speed mismatch on the Gi0/1 interface. • The device connected to the Fa0/1 interface has autonegotiation disabled. • The device connected to the Gi0/1 interface has autonegotiation disabled.

The device connected to the Fa0/1 interface has autonegotiation disabled. A duplex mismatch probably exists on the Fa0/1 interface. Note that duplexing has been automatically set to half, which is the default behavior for Cisco devices when autonegotiation fails. To fix the issue, check the Gi0/1 interface on router1 to see if autonegotiation has been disabled. You could manually configure the Fa0/1 interface on switch2 to use the same duplexing and link speed settings as the interface on the router, or you could re-enable autonegotiation on the router interface. The Gi0/1 and Gi0/2 interfaces on switch2 appear to be functioning correctly with full duplexing and full link speed having been automatically configured.

If dynamic DNS is being used, which of the following events will cause a dynamic update of the host records? (Select two.)

The ipconfig /release command is entered on a workstation. The DHCP server renews an IP address lease.

Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Up • Protocol status: Down What is the most likely cause of this WAN issue? • There is latency on the WAN link. • There is a data link encapsulation protocol mismatch between the WAN interfaces on both ends of the link. • There is an IP address misconfiguration issue between the WAN interfaces on both ends of the link. • The WAN interface on the router at the home office has been disabled. • The WAN interface on the router at the branch office has been disabled.

There is a data link encapsulation protocol mismatch between the WAN interfaces on both ends of the link. If the WAN interface's line status is up and the protocol status is down, then you're most likely experiencing a Layer 2 issue. This could be caused by a mismatch in the data link encapsulation protocol used on the link. Common Layer 2 point-to-point WAN protocols include HDLC, PPP, and Frame Relay. The same Layer 2 protocol must be used on both ends of the link. Disabled WAN interfaces are a Layer 1 problem and would result in an interface status of down/down. An IP address misconfiguration issue would be a Layer 3 problem and would result in an interface status of up/up. Latency on the link would still allow communications to occur between the routers, but with poor performance. If this were the case, the interface status of both link ends would be in an up/up state.

Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Up • Protocol status: Up What is the most likely cause of this WAN issue?

There is an IP address misconfiguration issue between the WAN interfaces on both ends of the link. If the line status is up and the protocol status is up, but communications still fail, then the problem most likely resides at Layer 3, where IP addressing comes into play. The most likely issue is that addresses assigned to the serial interfaces on both ends of the link have been misconfigured. For example, it's possible that the interfaces on each end of the link have been configured to run in different subnets. The interfaces on each end of a WAN link must be configured with IP addresses that reside within the same subnet.

Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Up • Protocol status: Down What is the most likely cause of this WAN issue? The WAN interface on the router at the branch office has been disabled. • There is latency on the WAN link. • The WAN interface on the router at the home office has been disabled. • There is an IP address misconfiguration issue between the WAN interfaces on both ends of the link. • There is an authentication misconfiguration issue between the WAN interfaces on both ends of the link.

There is an authentication misconfiguration issue between the WAN interfaces on both ends of the link. If the WAN interface's line status is up and the protocol status is down, then you're most likely experiencing a Layer 2 issue. This could be caused by a mismatch in the authentication configuration used on each end of the link. For example, this type of error would occur if you've configured PAP authentication on one end of the link and CHAP configured on the other. It could also be caused by incorrect passwords being used. The configuration on both ends has to match. Disabled WAN interfaces are a Layer 1 problem and would result in an interface status of down/down. An IP address misconfiguration issue would be a Layer 3 problem and would result in an interface status of up/up. Latency on the link would still allow communications to occur between the routers, but with poor performance. If this were the case, the interface status of both link ends would be in an up/up state.

Your organization recently opened a branch office in a remote area. Because of its location, traditional WAN connectivity was not available, so you contracted with a satellite provider to connect the branch office network to your home office network. Recently, your CEO conducted a video conference with the employees at the branch office. The employees complained that the video was choppy and that the audio was frequently out of sync with the video. What is the most likely cause of this poor WAN performance? • There is an authentication misconfiguration issue between the WAN interfaces on both ends of the link. • There is latency on the WAN link. • There is an IP address misconfiguration issue between the WAN interfaces on both ends of the link. • There is a data link encapsulation protocol mismatch between the WAN interfaces on both ends of the link. • The WAN interface on the router at the branch office has been disabled.

There is latency on the WAN link. In this scenario, its very likely that the satellite link itself is the cause of the problem. Because the radio signals used by satellite links must travel thousands of miles into space and back, several milliseconds of latency are introduced. For some types of network communications, such as saving a file or sending an email, this latency is not a problem. However, for time-sensitive communications such as a video conference, the latency inherent in the satellite link can cause poor network performance. Because connectivity exists between the home and branch office networks, the following are very unlikely to be the cause of the problem: • A disabled WAN interface • A protocol mismatch • An authentication mismatch • An IP address misconfiguration

Which of the following are characteristics of an MT-RJ fiber optic connector? (Select two.) • They use a nickel-plated housing. • They must never be used with single-mode fiber-optic cables. • They can be used with multimode fiber optic cables. • They use a keyed bayonet. • They are used with multifiber fiber optic ribbon cables. • They use metal guide pins to ensure accurate alignment

They can be used with multimode fiber optic cables. They use metal guide pins to ensure accurate alignment.

Which of the following are characteristics of an LC fiber optic connector? (Choose two.) • They are threaded. • They use a stainless steel housing. • They use a housing and latch system similar to an RJ-45 UTP connector. • They are half the size of standard connectors. • They use a one-piece bayonet connecting system. • They can be used with either fiber optic or copper cabling.

They use a housing and latch system similar to an RJ-45 UTP connector. They are half the size of standard connectors.

Which of the following technologies does GSM use to allow multiple connections on the same frequency? • Multiple-input and multiple-output • Time division multiple access • Frequency division multiple access • Code division multiple access

Time division multiple access (TDMA)

Which of the following is a good reason to install a firewall?

To prevent hackers from accessing your network

What device sends signals from a computer onto a network? • Gateway • Router • Cable • Transceiver

Transceiver A transceiver (short for transmitter/receiver) sends signals to and receives signals from the network. It translates the parallel data stream of the computer to the serial data stream of the network and vice versa. Most transceivers are now built into network interface cards (NICs).

Which OSI model layer is responsible for guaranteeing reliable message delivery?

Transport The Transport layer is responsible for connection services that provide reliable message delivery through error detection and correction mechanisms. Specifically, the TCP protocol provides these services.

Which of the following are characteristics of Teredo tunneling? (Select three.) • IPv4-only hosts communicate with IPv6-only hosts • Tunnel endpoints configured on hosts • Dual stack routers • Works through NAT • Dual stack hosts

Tunnel endpoints configured on hosts Works through NAT Dual stack hosts

You administer a network with Windows 2000 and UNIX servers, and Windows 2000 Professional, Windows 98, and Macintosh clients. A user of a Windows 98 computer calls you one day and says he is unable to access resources on the network. You type ipconfig on the user's computer and receive the following output: 0 Ethernet adapter: IP address. . . . . . . . . : 169.254.1.17 Subnet Mask . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . : You also check your NIC and see the link light on. What might the problem be? • Misconfigured DNS server • Unavailable DHCP server • The user changed the configuration of the computer • Missing default gateway • Bad NIC

Unavailable DHCP server If a Windows 98 client computer is configured to use DHCP and cannot locate one to receive IP addressing information, it assigns itself an IP address from the APIPA (Automatic Private IP Addressing) range of IP addresses. APIPA addresses include IP addresses from 169.254.0.0 to 169.254.255.254 and are reserved for this purpose. A lit link light on your NIC indicates a connection to the network.

Which type of address is used in a packet to address the packet to a single host? • Broadcast • Simplex • Unicast • Multicast • Full-duplex

Unicast A unicast address is an address that identifies a single host.

Which type of address is the IP address 198.162.12.254/24? • Broadcast • Private • Unicast • Multicast

Unicast The address 198.162.12.254 is a unicast address that identifies a single host on the 198.162.12.0 subnet. 198.162.12.255 is the broadcast address for the subnet. Multicast addresses are in the range of 224.0.0.0 to 239.255.255.255. The private IPv4 address ranges are: • 10.0.0.1 to 10.255.255.254 • 172.16.0.1 to 172.31.255.254 • 192.168.0.1 to 192.168.255.254

Which of the following methods would you use to create a crossover cable? • Use the T568B standard on one connector, and the BLOG convention on the other connector. • Use the T568A standard on one connector, and the BLOG convention on the other connector. • Use the T568A standard on one connector, and the T568B standard on the other connector. • Use the T568A standard. • Use the T568B standard.

Use the T568A standard on one connector, and the T568B standard on the other connector. The easiest way to create a crossover cable is to arrange the wires in the first connector using the T568A standard and arrange the wires in the second connector using the T568B standard. A crossover cable connects the transmit pins on one connector to the receive pins on the other connector (pin 1 to pin 3 and pin 2 to pin 6).

Which of the following are characteristics of TACACS+? (Select two.) • Uses UDP • Allows for a possible of two different servers, one for authentication and authorization, and another for accounting • Uses TCP • Allows for a possible of three different servers, one each for authentication, authorization, and accounting

Uses TCP Allows for a possible of three different servers, one each for authentication, authorization, and accounting TACACS+ was originally developed by Cisco for centralized remote access administration. TACACS+: • Provides three protocols, one each for authentication, authorization, and accounting. This allows each service to be provided by a different server. • Uses TCP. • Encrypts the entire packet contents. • Supports more protocol suites than RADIUS. RADIUS is used by Microsoft servers for centralized remote access administration. RADIUS: • Combines authentication and authorization using policies to grant access. • Uses UDP. • Encrypts only the password. • Often uses vendor-specific extensions. RADIUS solutions from different vendors might not be compatible.

Match each network signaling method on the left with its corresponding definition on the right. Each definition may be used once, more than once, or not at all.

Uses the entire network medium as a single transmission channel -----> Baseband Combines signals from multiple channels into a single channel -----> De-multiplexing Assigns different frequencies to different channels on the same network medium -----> Frequency-division multiplexing Divides the transmission medium into several channels -----> Broadband Measures the number of times a signal in a communications channel changes state -----> Baud rate Measures the number of data bits transmitted in one second in a communication channel -----> Bit rate

You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor. What would you use to connect the wiring closets together? • Demarc extension • Horizontal cross connect • Vertical cross connect • Smart jack

Vertical cross connect A vertical cross connect connects the main distribution frame (MDF) on the main floor to intermediate distribution frames (IDFs) on upper floors. Cabling runs vertically (up and down) between the MDF and the IDFs.

You have configured your organization's DHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days. A user's workstation is powered on and receives addressing information from this DHCP server Monday morning at 8:00 AM. When will the client contact the DHCP server to renew the lease (by default)? • Wednesday morning • Never • Thursday morning • Friday morning

Wednesday morning To ensure that addresses are not left in an assigned state when they are no longer needed, the DHCP server uses a lease duration for address assignments. Halfway through the lease period, a DHCP client will request a lease renewal, and the DHCP server will extend the lease. In this scenario, the lease duration is four days. If a lease was acquired on Monday morning, then the renew request will be made two days later, on Wednesday morning.

How do switches and bridges learn where devices are located on a network?

When a frame enters a port, the source MAC address is copied from the frame header. Bridges and switches learn addresses by copying the MAC address of the source device and placing it into the MAC address table. The port number which the frame entered is also recorded in the table and associated with the source MAC address.

When would you typically use an RJ-11 connector? • When using Cat 3 cables. • When using RG-6 cables. • When using single mode fiber optic cables. • When connecting a phone to a phone line. • When using multimode fiber optic cables. • When using Cat 5 or higher cables.

When connecting a phone to a phone line. An RJ-11 connector is used for connecting analog telephones to the telephone jacks. Cat 3, Cat 5, and higher twisted pair cables use RJ-45 connectors. Coaxial cables use F-type or BNC connectors. Fiber optic cables use a variety of connectors (RC, RT, LC, MT-RJ).

You want to use the T568B standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector?

White/orange, orange, white/green, blue, white/blue, green, white/brown, brown The T568B standard uses the following order of wires in the connector: White/orange, orange, white/green, blue, white/blue, green, white/brown, brown. The T568A standard switches the green and orange wires (along with their corresponding white wires). Use the order Blue-Orange-Green-Brown (BLOG), with the white wire first, for connecting wires on a 110 punchdown block.

Which of the following forms of networking are highly susceptible to eavesdropping and must be secured accordingly? • Satellite • Wireless • Dial-up • ISDN • DSL

Wireless All forms of networking are potentially vulnerable to eavesdropping. Wireless networks by definition broadcast network transmissions openly and therefore can be detected by outsiders. For this reason, wireless networks should maintain data encryption to minimize the risk of transmitting information to unintended recipients.

You are implementing a DHCP server for your segment. Your segment's IP address is 192.168.1.0. Your default gateway address is 192.168.1.254. Your DNS server address is 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments. You configured the 03 Router option on your DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP addressing information dynamically, your users complain that they are unable to access websites on the Internet. How can you resolve this problem?

You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06). In this scenario, the DHCP server hasn't been configured to deliver the IP address of the DNS server to the workstations. When users try to access websites with a browser, they receive an error message because their workstations can't resolve URLs into IP addresses. To fix this, you must enable option 06 Domain Name Server on the DHCP server and configure it with the IP address of your DNS server.

In which of the following situations might you use an RJ-11 connector? • You want to connect the 10BaseT network card in your computer to a switch. • You want to connect your computer to the Internet with a dial-up connection. • You want to upgrade your 10BaseT network to 100BaseT. • You want to test a network cable to see if there is a break in the line.

You want to connect your computer to the Internet with a dial-up connection. RJ-11 connectors are typically used for telephones and modems.

Which TCP/IP utility gives you the following output? Interface: 192.168.4.101 on Interface 0x3 Internet Address Physical Address Type 192.168.1.23 00-d1-b6-b7-c2-af dynamic

arp This output is displayed when you use the arp command to look at the ARP cache.

Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently? • arp • arping • nbtstat • netstat

arp Use the arp command to view the MAC addresses associated with IP addresses that the local workstation has contacted recently. When a workstation uses ARP to find the MAC address of an IP address, it places that information in its ARP table.

Which TCP/IP utility gives you the following output? • netstat -a • arp -a • ipconfig • nbtstat -c

arp -a The arp -a command shows the current entries in the computer's ARP cache.

You want to be able to view the DNS server address that a computer is using. Which of the following utilities would you use? (Select two.) • netstat • dig • ifconfig • host • ipconfig

ifconfig ipconfig Use the ipconfig command on Windows and ifconfig command on Linux to view the IP configuration for a device including the IP address, subnet mask, default gateway, and DNS server addresses used for a connection.

You need to configure a Cisco RFC 1542 compliant router to forward any received DHCP frames to the appropriate subnet. The address of the remote DHCP server is 172.16.30.1 Which of the following commands would be used to configure the router? • host 172.16.30.1 • ip address dhcp 172.16.30.1 • ip helper-address 172.16.30.1 • ifconfig 172.16.30.1

ip helper-address 172.16.30.1 To configure a Cisco router to listen for DHCP traffic and route any received DHCP frames to the appropriate subnet, use the following command: ip helper-address [server_address]

Which TCP/IP utility gives you the following output? • winipcfg • ipconfig • arp -a • netstat -a

ipconfig The ipconfig command shows the computer's TCP/IP configuration information. winipcfg also shows the TCP/IP configuration, but in a Windows graphical format.

You have been called in to troubleshoot a connectivity problem on a newly installed Windows Server 2003 system. The system is operating satisfactorily and is able to communicate with other systems on the local network. However it is unable to access any systems on other segments of the corporate network. You suspect that the default gateway parameter for the system has not been configured, or may be configured incorrectly. Which of the following utilities are you most likely to use to view the default gateway information for the system? • winipcfg • netstat • ipconfig • ifconfig

ipconfig Use the ipconfig utility to view the TCP/IP configuration of a Windows Server 2003 system. The information displayed by ipconfig includes default gateway information.

A video conference call consisting of multiple participants uses _________ network transmissions.

multicast UC systems typically use unicast network transmissions. An example of a unicast transmission is a one-on-one VoIP phone call. UC systems also support multicast transmissions. Examples of a multicast transmission are conference phone calls or conference video calls consisting of multiple users.

You administer a NetBIOS-based network that uses the TCP/IP protocol. You are trying to troubleshoot a computer that is unable to contact a server by its NetBIOS name. Which command can you use to check the connection? • nbtstat • netbt • nbname • netstat

nbtstat

Which TCP/IP utility gives you the following output? • arp -a • nbtstat -c • netstat -r • netstat -a

nbtstat -c nbtstat -c shows you the resolved NetBIOS name cache for a computer. In other words, these are the NetBIOS name-to-IP address mappings for known remote computers.

Your computer is sharing information with a remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection? • arp • ping • ipconfig • netstat • nbtstat

netstat

Examine the following output: Active Connections Proto Local Address Foreign Address State TCP SERVER1:1036 localhost:4832 TIME_WAIT TCP SERVER1:4798 localhost:1032 TIME_WAIT TCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAIT TCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHED TCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHED TCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED Which of the following utilities produced this output? • nslookup • netstat • dig • ifconfig

netstat The output shown is produced by the netstat command. netstat reports the TCP/IP ports open on the local system, as well as identifying the protocol and remote host connected to that port. This information can be very useful when looking for security weaknesses, as a TCP/IP port that is open to traffic unnecessarily represents a security risk.

Which TCP/IP utility gives you the following output? • nbtstat -c • netstat -r • netstat -a • arp -a

netstat -a netstat -a shows you the status of all connections and listening ports.

Which TCP/IP utility gives you the following output? • arp -a • nbtstat -c • netstat -r • netstat -a

netstat -r netstat -r shows you the computer's route table.

Which command displays network activity statistics for TCP, UDP, and IP? • netstat -s • nbtstat -s • ping -s • nslookup • telnet

netstat -s

You work in an office that uses NetWare servers and Windows NT 4.0 servers. The network uses both the TCP/IP and IPX/SPX protocols. You are sitting at a workstation that uses Windows 95 OSR2. An application you are using is unable to contact a Windows NT server named FileSrv2. Which command can you use to determine whether your computer can still contact the server? • tracert • arp • ping • nwlookup

ping On a TCP/IP-based network, you can use the ping command to check connectivity between a source and destination computer.

Which TCP/IP utility gives you the following output? • ipconfig • ifconfig • ping • arp -a

ping The output of the ping command shows you the results of four echo request/reply contacts with a destination host.

You are troubleshooting physical layer issues with the Gi0/1 interface in a router. You need to view and analyze the number of collisions detected on the interface. Which command should you use? • show interfaces gi0/1 • show controllers gi0/1 • show interfaces gi0/1 description • show interfaces gi0/1 status

show interfaces gi0/1 The show interfaces gi0/1 command displays statistics about the Gi0/1 interface, including the number of collisions and late collisions. The show interfaces gi0/1 status command displays summary information about the interface status. The output displays the port, name, status, VLAN assignment, duplex configuration, interface speed, and link type. The show interfaces gi0/1 description command displays the line and protocol status of the interface. The show controllers command is used to display configuration parameters for serial interfaces (not Ethernet interfaces), such as the type of serial cable and which end of the cable is connected to the device (DCE or DTE).

You are troubleshooting physical layer issues with the Gi0/1 interface in a router. You suspect that a duplex mismatch error has occurred, and you need to determine the duplex settings configured on the interface. Which commands could you use? (Choose two. Each response is a complete solution.)

show interfaces gi0/1 status show interfaces gi0/1 Both the show interfaces gi0/1 command and the show interfaces gi0/1 status command display configuration information for the Gi0/1 interface, including the duplex configuration. Using this information, you can identify duplex mismatch errors. The show interfaces gi0/1 description command displays the line and protocol status of the interface. The show controllers command is used to display configuration parameters for serial interfaces (not Ethernet interfaces), such as the type of serial cable and which end of the cable is connected to the device (DCE or DTE). The show interfaces counters command displays the traffic on the physical interface.

While working on a Linux server, you are unable to connect to Windows Server 2003 system across the Internet. You are able to ping the default gateway on your own network, so you suspect that the problem lies outside of the local network. Which utility would you use to track the route a packet takes as it crosses the network? • traceroute • tracert • dig • nslookup • ifconfig • ipconfig

traceroute traceroute is a Linux utility that allows you to track the route of a packet as it traverses the network. The traceroute utility is used on Linux systems, while tracert is used on Windows systems.


Related study sets

Quiz 8: Green Algae & Land Plants

View Set

Life of policy provisions, riders and options

View Set

13.Земля в Солнечной системе

View Set