shite

Ace your homework & exams now with Quizwiz!

You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?

Circuit-level

Consider the following IP addresses. - 124.77.8.5 - 131.11.0.9 - 190.66.250.10- 196.5.89.44. Which list represents the IP address class of each listed IP address?

Class A - Class B - Class B - Class C

When designing a firewall what is the recommended approach for opening and closing ports?

Close all ports; open only ports required by applications inside the DMZ

You manage a network with a single switch. On each switch port a hub connects multiple devices to the switch. Which condition are you most likely to experience on the network?

Collisions

Which of the following tasks is associated with the session layer?

Connection establishment

You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network?

Convergence

What is the basic purpose of the OSI Physical Layer?

Coordinates rules for transmitting bits.

You have a TCP/IP network with 50 hosts. There have been inconsistent communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned. Which protocol can you implement on your network to help prevent problems such as this?

DHCP

You have a network with 50 workstations. You want to automatically configure workstations with the IP address - subnet mask - and default gateway values. Which device should you use?

DHCP Server.

Which firewall implementation creates a buffer network that can be used to host email or web servers?

DMZ

You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. What protocol should you implement?

DNS

You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com Which device would you use?

DNS server

You have a Large TCP/IP network and want to keep host real time clock synchronized. What protocol should you use?

NTP

You are configuring the DHCP Relay Agent role service on a Windows server. Which of the following is a required step for the configuration?

Specify which server network interface the agent listens on for DHCP messages.

You manage a network that uses IPv6 addressing. When clients connect devices to the network- they generate an interface ID and use NDP to learm the subnet prefix and default gateway. Which IPv6 address assignment method is being used?

Stateless auto configuration

Which of the following benefits apply only to creating VLANs with switches and not to segmenting the network with regular switches?

You can create multiple broadcast domains

You are troubleshooting a connectivity problem on a Linux server. You are able to connect to another system on the local network - but are not able to connect to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly - which of the following commands would you use to view the default gateway information on the linux server?

ipconfig

Select the statement that best describes a broadcast storm.

A Broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth.

You manage a server that uses and IP address of 192.169.255.188 with a mask of 255.255.0.0. Which of the following describes the address type?

Classless

Which protocol is used for securely browsing a website?

HTTPS

A host has the address 100.55.177.99/16. Which of the following is the broadcast address for the subnet?

100.55.255.255

Which of the following use the CSMA/CD access method?

1000BaseT

You have recently installed a new Windows Server 2016 System. To ensure the accuracy of the system time- you have loaded an application that synchronizes the hardware clock on the server with an external time source on the internet. Now you must configure the firewall on your network to allow time synchronization traffic through. Which of the following ports are you most likely to open on the firewall?

123

n an IP addressing scheme using default subnet masks- which of the following IP addresses can you assign to a host?

132.70.254.15

Which port number is used by SNMP?

161

Which of the following is the first IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?

166.70.0.1

Which of the following is the last IP address that can be assigned to hosts on the 1676.70.0.0 using the default subnet mask?

166.70.255.254

Which of the following IP addresses ranges is reserved for Automatic Private IP Addressing?

169.254.0.1 - 169.254.255.254

Which of the following is not one of the ranges of IP addresses defined in the RFC 1918 that are commonly used behind a NAT server?

169.254.0.1 - 169.254.255.254

What port does Telnet use?

23

You have been told to assign the IP address 21.155.67.188 to a host on the network using the default subnet mask. Which mask should you use?

255.0.0.0

You are configuring the IP address for a host and have been asked to use the address 192.160.99.110/16. What subnet mask value would you use?

255.255.0.0

Which of the following tunneling methods is used to send IPv4 traffic through an IPv6 network?

4-to-6 tunneling

To increase security on your company's internal network the administrator has disabled as many ports as possible. Now however you can browse the Internet but you are unable to perform secure credit card transactions when making purchases from ecommerce websites. Which ports need to be enabled to allow secure transactions?

443

You want to maintain tight security on your internal network-so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS- which port should you enable?

53

How does a proxy server differ from a packet filtering firewall?

A proxy server operates at the Application layer, while a packet filtering firewall operates at the network layer.

Your Cisco router has three network interfaces configured: S0/1/0 is a WAN interface that is connected to an ISP.F0/0 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. F0/1 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. You have configured an access control list on this router using the following rules:- deny ip 192.168.1.0 0.0.0.255 any - deny ip 192.168.2.0 0.0.0.255 any -These rules will be applied to the WAN interface on the router. Your goal is to block any IP traffic coming in on the WAN interface that has a spoofed source address that makes it appear to be coming from the two internal networks. However when you enable the ACL you find that no traffic is being allowed through the WAN interface. What should you do?

Add a permit statement to the bottom of the access list.

which of the following is a characteristic of static routing when compared to dynamic routing?

All routes must be manually updated on the router

Which of the following describes how access lists can be used to improve network security?

An access list filters traffic based on the IP header information such as source or destination IP address - protocol - or socket numbers.

Which of the following routing protocols uses paths - rules - and policies instead of a metric for making routing decisions?

BGP

A switch running STP is classified as a backup bridge? What state is it in?

Blocking

Which of the following best describes the concept of a VLAN?

Devices on the same network logically grouped as if they were on separate networks

Which protocol is used on the world wide web to transmit web pages to the browser?

HTTP

A router is connected to a network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route on router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?

Drop the packet.

A user reports that network access from her workstation is very slow. The problem does not seem to be affecting any other users. Which of the following conditions is the most likely cause?

Duplex mismatch

You want to connect your small company network to the Internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of NAT should you implement?

Dynamic

Which of the following services automatically creates and deletes host records when an IP address lease is created or released?

Dynamic DNS

Which of the following protocols is classified as a hybrid routing protocol?

EIGRP

Which of the following is a valid IPv6 address?

FEC0::AB:9007

You want to allow your users to download files from a server running the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability?

FTP

Which of the following is likely to be located in a DMZ?

FTP server

Which of the following is the best device to deploy to protect your private network from a public untrusted network?

Firewall

A router is connected to a network 192.169.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to the network 10.1.0.0/16. What will the router do with the packet.

Forward the packet to the next hop router specified by the route network 0.0.0.0

You have been given a laptop to use for work. You connect the laptop to your company network use it from home and use it while traveling. You want to protect the laptop from Internet-based attacks. What solution should you use?

Host-based firewall

Which organization is responsible for allocating public IP addresses?

IANA

Which of the following protocols allows host to exchange messages to indicate problems with packet delivery?

ICMP

Which protocol does an IP host use to inform a router that it wants to receive specific multicast frames?

IGMP

What protocol stores email on the mail server and allows users to access it from various client devices without having to download it?

IMAP4

You have a router that is configured as a firewall. The router is a Layer 3 device only. Which of the following does the router use for identifying allowed or denied packets?

IP address

You have a router that is configured as a firewall. The router is a layer 3 device only. Which of the following does the router use for identifying allowed or denied packets?

IP address

You have a workstation connected to a small branch network using a single switch. The network does not have any routers and is not connected to the internet. What are the minimum configuration parameters required on the workstation to be able to communicate with all hosts on the internet?

IP address and subnet mask

You need to configure a Cisco RFC 1542 compliant router to forward any received DHCP frames to the appropriate subnet. The address of the remote DHCP server is 172.16.30.1. Which of the following commands would be used to configure the router?

IP helper-address 172.16.30.1

You have a private network connected to the internet. Your routers will not share routing information about your private network with internet routers. Which of the following best describes the type of routing protocol you would use?

IPG

Under which of the following circumstances might you implement BGP on your company network and share routes with internet routers?

If the network is connected to the internet using multiple ISPs

You recently created a new network segment for the development department. Because the hosts are now on a different network segment - they can no longer contact the DHCP server. Both network segments are connected via a cisco router. Which of the following would be the best action to take in order to fix the problem?

Implement an IP helper address on the router.

You have configured your organization's DHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days. You are using a Windows server for DHCP - and the default lease time is eight days. What impact - if any - will this have on the network?

Increased network traffic

You would like to control Internet access based on users - time of day - and Web sites visited. How can you do this?

Install a proxy server. Allow Internet access only through the proxy server.

A switch running STP is in the listening state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do?

It does not record the address or segment information. It does not forward the message

A switch running STP is in a learning state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do?

It uses the source MAC address and network segment information to build its bridge database but does not forward the message

You are troubleshooting an IP addressing issue and so issue a command to view the TCP/IP configuration of the system. The command you use produces the following output:fxpO: flags=8843 mtu 1500inet6 fe80::2aO:83ff:fe30:57a%fxpO prefixlen 64 scopeid OX1inet l92.l68.1.235 netmask OxffffchO broadcast 255.255.255.255ether OO:aO:83:30:O5:7amedia: Ethernet autoselect (lOObaseTX )status: activelOO: flags=8049 mtu 16384inet6 ::1 prefixlen 128inet6 fe80::1%loO prefixlen 64 scopeid OX7inet 127.0.0.1 netmask OxffOOOOOOWhich of the following operating systems are you working on?

Linux

Switches running the STP are in the process of exchanging BPDUs and defining their roles. In what state are the switches?

Listening

You have a router configured to share routing information using RIP. In addition you have a single static route that identifies a default route for all other networks. The next hop router for the default route has changed. You need to make the change with the least amount of effort possible. What should you do?

Manually reconfigure the default route to point to the new next hop router.

When multiple routes to a destination exist - what is used to select the best possible route?

Metric

You have a special server at work with a custom application installed. Connections to the server that use custom application must use IPv6. The server is currently running IPv4. You are the only person who connects to the server and you always use your laptop for the connection. Your laptop supports both IPv4 and IPv6. The rest of your company network runs only IPv4. You need a cost effective solution to allow your laptop to connect to the server. Your solution must also support communication through NAT servers. Which method should you use?

Miredo

Which type of address is the IP address 232.111.255.250?

Multicast

Your company has a connection to the internet that allows users to access the internet. You also have a web server and an email server that you want to make available to the internet users. You want to created a DMZ for these two servers. Which type of device should you use to create the DMZ?

Network-based firewall

Which of the following routing protocols uses the relative link costs as the metric?

OSPF

Which of the following best describes OSPF?

OSPF is a classless link state routing protocol.

What are the main differences between the OSPF and IS-IS routing protocols?

OSPF requires an area 0 while IS-IS does not.

You need to configure spanning tree on a Cisco switch. You'd like to use a protocol that confirms to the 802.1w standards. Which protocol should you use?

Rapid PVST+

After blocking a number of ports to secure your server -you are unable to send email. To allow email server which of the following needs to be done?

Open port 25 to allow SMTP service

Which of the following associates a port number with a host on a private network?

PAT

Which of the following TCP/IP Protocols do email clients use to download messages from a remote mail server?

POP3

Which of the following is a firewall function?

Packet filtering

Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host?

Port forwarding

You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the Internet. From your work office you can try to access your home computer using its IP address but are unable to communicate with the server. You are able to connect to other hosts on the Internet. Why can't you access the server?

Private addresses are not accessible through the Internet.

CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems you decide to use APIPA addressing for the network. With APIPA configured all systems are able to communicate with each other but you are having trouble configuring Internet access. What is the likely cause of the problem?

Private addresses cannot directly communicate to hosts outside the local subnet.

Which of the following protocols has a limit of 15 hops between any two networks?

RIP

What is the main difference between RIP and RIPv2?

Rip is a classful protocol while RIPv2 is a classless protocol.

In the OSI model what is the primary function of the Network layer?

Routes messages between networks.

You have a Windows Server 2016 system that you want to use as a DHCP Relay Agent. Which Windows Server 2016 service would you sue to do this?

Routing and Remote Access

Your company has just acquired another company in the same city. You are given the task of integrating the two email systems so that the messages can be exchanged between the email servers. However - each network uses an e-mail package from a different vendor. Which TCP/IP protocol will enable messages to be exchanged between systems?

SMTP

What will the switch do with the frame?

Send it out all ports except for the port it was received on

You are monitoring network traffic on your network and you see traffic between two network hosts on port 1720. What is the source of this network traffic?

Someone is using voice over IP (VOiP) to make a telephone call

Which of the following features dynamically places switch ports in block or forwarding states?

Spanning tree

You have a small network at home that is connected to the internet. On your home network you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow Internet hosts to contact the server to browse a personal website. What should you use to allow access?

Static NAT

Which of the following best describes the purpose of using subnets?

Subnets divide an IP address into multiple addresses.

You manage a subnet that uses the following subnet address: 198.162.1.0/23.Which of the following best describes how addressing is configured for the subnet?

Supernetting

You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose?

Switch

When configuring VLANs on a switch what is used to identify VLAN membership of a device?

Switch port

What problem does the Spanning Tree protocol prevent?

Switching loops from developing when redundant paths are implemented between switches.

You are an application developer and are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability?

TCP

Which of the following is a file transfer protocol that uses UPD?

TFTP

Which of the following network services or protocols uses TCP/IP port 69?

TFTP

You administer a web server on your network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You configured the website as follows:-IP address: 192.168.23.8 -HTTP Port: 1030-SSL Port: 443. Users complain that they can't connect to the website when they type www.westsim.com. What is the most likely source of the problem?

The HTTP port should be changed to 80

Due to widespread network expansion - you have decided to upgrade the network by configuring a DHCP sever for the network uses Linux/Windows/and Mac OS X client systems. You configure the server to distribute IP addresses from 12.168.2.1 to address 192.168.2.100. You use the subnet mask of 255.255.255.0. after making all setting changes on the DHCP sever - you reboot each client system but they are not able to obtain an ip address from the dhcp server. Which of the following would explain the failure?

The clients must be configured to obtain ip addressing from a dhcp server

A network is connected following the IEEE 802.3 specifications. Which of the following best describes when a device can transmit messages?

The device listens to determine if the transmission media is free.

What information does the next hop entry in a routing table identify?

The first router in the path to the destination network

You are monitoring network traffic on your network and you see a large amount of traffic between a Windows workstation and a windows server on the following ports: 137-138-139. What is the source of the network traffic?

The workstation is using NetBIOS to access shared resources on the server

Which OSI model layer is responsible for guaranteeing reliable message delivery?

Transport

When configuring VLANs on a switch- what type of switch ports are members of all VLANs defined on the switch?

Trunk ports

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1. What should you configure to allow communication between these two devices through the switches?

Trunking

Which type of address is the IP address 198.162.12.254/24?

Unicast

You have a company network that is connected to the Internet. You want all users to have Internet access but need to protect your private network and users. You also need to make a Web server publicly available to Internet users. Which solution should you use?

Use firewalls to create a DMZ. Place the Web server inside the DMZ and the private network behind the DMZ.

You need to keep users in all other departments from accessing the servers used by the finance department. Which of the following technologies should you use to logically isolate the network?

VLANS

You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open IP ports 80 - 25 - 110 and 143. Assuming that no other ports on the firewall need to be configured to provide access - what applications are most likely to be hosted on the server?

Web server and e-mail server

You are implementing a DHCP server for your segment. Your segment's IP address is 192.168.1.0. Your default gateway address is 192.168.1.254. Your DNS server address is 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments.You configured the 03 Router option on your DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP address information dynamically - your users complain that they are unable to access web sites on the Internet. How can you resolve this problem?

You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06).

Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently?

arp

Which TCP/IP utility gives you the following output? 3 host addresses...

nbtstat -c

Which command displays network activity statistics for TCP/UDP and IP?

netstat - s

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation and an application you are using is unable to connect to a Windows server named FileSrv2. Which command can you use to test network connectivity between your workstation and the server?

ping

Which of the following statements accurately describes a VLAN ID?

switches append a VLAN ID to the header of each frame to identify the virtual network to which it belongs.

You are an administrator for a large company. You are setting up a computer at a worker's house so he can telecommute while he recovers from surgery. You want to connect to the UNIX server at the office to update his account information. Which utility should you use to accomplish this task?

telnet

While working on a Linux server you are unable to connect to Windows Server 2016 system across the Internet. You are able to ping the default gateway on your own network so you suspect the problem lies outside the local network. Which utility would you use to trace the route a packet takes as it crosses the network?

traceroute


Related study sets

BUS. STRAT CHAPTER 4 QUIZ (TEST 1)

View Set

mktg 353 chapter 16 knowledge checks

View Set

schenck v. united states & tinker v. des moines independent community school district

View Set

Endocrinology - Pancreatic Hormones

View Set

Chapter 44: Assessment and Management of Patients with Biliary Disorders

View Set

Anatomy Chapter 15: Special Senses

View Set

Cubed Roots, Square Roots, Irrational and Rational Numbers

View Set

"Socratic Logic," Chapter III: Material Fallacies (For Exam)

View Set

Learning Styles and Willingham's learning theory

View Set