Telecommunication exam

Ace your homework & exams now with Quizwiz!

You want to display the cache entries for 192.168.1.101. Which parameter should you use with the arp command?

-a

What is the Internet standard MTU?

1,500 bytes

The 1000Base-LX utilizes light with what wavelength? 1550 nanometers 1300 nanometers 850 nanometers 1200 nanometers

1300 nanometers

What decimal number corresponds to the binary number 11111111?

255

You need to implement high availability in your network. One implementation company ensures that their implementation will provide 99% of availability in a period of one year. With the mentioned availability, what would be the total downtime in a year?

3.65 days

You need to connect to a colleague's system using the default Microsoft Windows remote desktop application to troubleshoot an application issue. Which port should be opened on the colleague's system firewall to ensure successful remote connection?

3389

A routing protocol's reliability and priority are rated by what measurement?

AD

If you need to perform port scanning in your network, which of the following tool are you likely to use? [Choose all that apply].

Angry IP Scanner Superscan

Which routing protocol does an exterior router use to collect data to build its routing tables?

BGP

You suspect that the Webserver, which is located on your network and hosts multiple Internet facing Websites. The Webserver runs on Windows Server 2008. After receiving complaints from the users of Webserver occasionally being unavailable, you investigate and find that it is getting flooded with many ping requests. What should you do to immediately handle this situation?

Block all incoming ICMP requests

If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops?

By implementing a limit on the number of hops allowed in a path

What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?

Coaxial cable, F-connector

Which of the following is true about the OSPF routing protocol?

Each router has complete knowledge of the network topology.

When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?

FE80::/10

In the client-server model, what is the primary protocol used for communication between a browser and web server? FTP TCP HTTP SSL

HTTP

If you use the ping command to send an echo request from one host to the other, then which of the following protocols have you used?

ICMP

Which two protocols manage neighbor discovery processes on IPv4 networks?

ICMP and ARP

Which email protocol allows an email client to read mail stored on the mail server? IMAP4 TCP SMTP POP3

IMAP4

You manage a small stub network that has a router configured with static routing. If the connection to the next hop goes down, what action will the router perform?

It will continue to route traffic on the same path.

(picture of logical network topology)

Logical network topology

Which fiber connector contains two strands of fiber in each ferrule?

MTRJ

Which type of DNS record identifies an email server?

MX record

In which of the following applications can a virtual IP address be used? [Choose all that apply].

NAT Gateway Redundancy Protocols

Which kind of crosstalk occurs between wire pairs near the source of the signal?

NEXT

Which email protocol allows an email client to download email messages to the local computer? TCP POP3 SMTP IMAP4

POP3

Which type of address is used at the Transport layer to identify the receiving application? Protocol IP address Port MAC address

Port

You are a network administrator for an organization. You are asked to create a shared folder on a Microsoft Windows system so that other users on the same network are able to access its contents. To be able to meet this requirement, which protocol is likely to be used?

SMB

You are a network administrator and you need to access the secure command line interface access of an edge router on your network. The router uses cryptography for remote authentication. Which protocol is the router configured with for this purpose?

SSH

Your organization has multiple remote offices. The users at the remote office often remotely connect to the application servers. Which of the protocols should you enforce for encrypted communication? [Choose all that apply].

SSH RDP

Which two encryption protocols might be used to provide secure transmissions for browser and web server communications? SSL and TLS TCP and UDP SSL and HTTP HTTP and HTTPS

SSL and TLS

Which kind of multiplexing assigns slots to nodes according to priority and need

STDM (statistical time division multiplexing)

Refer to the following statements: This type of diagram depicts how devices are interconnected to each other using wires and cabling2) This type of diagram depicts the arrangement of devices and how they communicate with each other.Which diagram types are being described?

Statement 1 describes a physical network diagram while statement 2 describes a logical one

Which of the following statements is true about Fault tolerance?1) It is a direct result of the design of the network itself.2) It is the name of the feature that allows for dual layer 2 connections between switches.3) Enables a network to continue functioning normally in case of a partial failure.

Statements 1 and 3 are true

The IP connectionless protocol relies on what other protocol to guarantee delivery of data? ARP ICMP UDP TCP

TCP

Which protocol's header would a Layer 4 device read and process?

TCP

When interconnecting a switch port to a patch panel, which of the following information should be documented according to best practices? [Choose all that apply].

The network device on the other end of the link The port number of the switch used

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server

You have been asked to set up a new data center. Before you proceed with the actual setup, you need to create a rack diagram of an existing rack that you want to use. Which of the following could be the reason for you to create one such diagram? [Choose all that apply].

To determine the quantity of servers you need to purchase To manage the size of the equipment to fit into the rack

Why would a network administrator implement vulnerability scanning on a network?

To reveal vulnerabilities in the network

What are the differences between the POP3 and IMAP4 protocols?

Using POP3, email is downloaded to the client computer. Using IMAP4, the client application manages the email while it's stored on the server.

Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?

VoIP gateway

Which of these is considered a secure place to store a list of documented network passwords?

a password manager

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

all devices on your local network

Which transmission characteristic is never fully achieved?

bandwidth

By default, which of the following components of the composite metric are considered for Enhanced Interior Gateway Routing Protocol (EIGRP) ?

bandwidth and delay

You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting from the Physical layer of the OSI model. Which of the following approaches would you use to troubleshoot this problem? Divide and conquer approach Random layer approach Bottom up approach Top down approach

bottom up approach

Which of these categories of twisted-pair cable can support Gigabit Ethernet?

cat 5e, cat 6a, cat 7

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?

cat 6a

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

checksum

You have a network that consists of seven computers running Windows 10 Professional. You add an eighth computer with Windows Server 2016 installed. Which networking model can the network now support that it could not support without the addition of the eighth computer? Star-bus Hybrid Client-server Ring

client server

You are asked to perform an analysis on the network that will allow you to deduce information from patterns in communication. Which of the following types of analysis are you asked to perform?

data traffic analysis

Which of the following OSI layers is involved with media access control, hardware addressing and the local delivery of frames between devices on the same LAN? Physical layer Datalink layer Network Layer Transport Layer

datalink layer

What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network?

default gateway

A router receives a packet with a destination address that is not found within its routing table. The router is configured to send all such packets to a specific next hop address. What is this next hop address called?

default route

Which of these commands is available only in Linux?

dig

You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting from the Physical layer of the OSI model. Which of the following approaches would you use to troubleshoot this problem? Divide and conquer approach Random layer approach Bottom up approach Top down approach

divide and conquer approach

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?

entrance facility

IPv4 and IPv6 use the same packet format. TRUE OR FALSE

false

The CTRL + S key combination can be used to stop an actively running command. TRUE OR FALSE

false

The Data Link layer attaches a trailer to the end of a packet, and does not include a header. TRUE OR FALSE

false

The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol. TRUE OR FALSE

false

What is NOT a TIA/EIA recognized cabling type that can be used for horizontal cabling? fiber-optic unshielded twisted pair (UTP) shielded twisted pair (STP) RG-6 Coaxial

fiber optic

What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?

fiber type mismatch

Signals that can travel in only one direction on a medium are referred to as what type of signal? duplex half-duplex full-duplex simplex

full-duplex

When a router can't determine a path to a message's destination, where does it send the message?

gateway of last resort

Which of the following configuration is being displayed to increase the network uptime?

high availability

Where is a demarc located in relation to the structured cabling of an enterprise environment? at the Intermediate Distribution Frame (IDF) between the MDF and the IDF in the work area in the Main Distribution Frame (MDF)

in the main distribution frame (MDF)

What command can you utilize to display TCP/IP configuration information for each network adapter installed? ipconfig /all ipconfig /show ipconfig /list ipconfig /full

ipconfig/all

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?

ipconfig/release

What is the first step of inventory management?

list all component on the network

You are asked to install a device that will combine several connections to the Internet and provide the sum of the available network speeds to an internal network while equally sharing the data traffic among all the Internet connections. Which of the following devices are you asked to install?

load balancer

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?

look at where the device is located on the ISP's side of the demarc.

At which OSI layer does IP operate?

network layer

Which OSI layer is responsible for directing data from one LAN to another?

network layer

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?

patch cable

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use? Hybrid Ring Star-bus Peer-to-peer

peer to peer

Within which of the following OSI layers would a malfunction caused by a bad switch port reside? Network Application Physical Transport

physical

Which of the following command is likely to show the required output?

ping

The network administrator has configured the enterprise firewall to permit port 21 to allow FTP transfers to occur from outside the enterprise. Users can connect to the FTP server that is located on the enterprise network. However, file transfers fails. Why could this be?

port 20 along with port 21 must also be permitted

You need to highlight the location of physical servers and network devices mounted on standardized frames that are installed within a datacenter to a new colleague. Which of the following types of diagrams should you show?

rack diagram

If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?

rack ears

Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions? SSH SFTP Remote Desktop Telnet

remote desktop

Which computers are the highest authorities in the Domain Name System hierarchy?

root service

Which of the following devices are you likely to find in the MDF? Choose all that apply.

routers switches KVM switch

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use? Mesh Star-bus Hybrid Star

star

You have a network of ten computers connected to a single switch that has 12 ports. You need to add six more computers to the network so you add a second switch by connecting it to the first switch by way of a network cable. Which network topology is now used? Star Mesh Star-bus Hybrid

star-bus

What kind of route is created when a network administrator configures a router to use a specific path between nodes?

static route

To troubleshoot a network problem, you are required to use a packet analyzer on a Unix based system. Which of the following command line interface commands will provide you with the required functionality?

tcpdump

Which part of a MAC address is unique to each manufacturer?

the OUI

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?

tone locator

Which of the following command is likely to show the required output?

traceroute

You have been experiencing connectivity with various websites. The response time to open these websites is high. You tested the same websites from your home and could open them much faster. You assume that the slow access to the Websites might be due to high latency. Which of the given utility is likely to help you in finding the source that may be causing the latency issue?

traceroute

Which of the following OSI layers is responsible for the segmentation, multiplexing, flow control and host-to-host communication services for applications? Network Layer Session Layer Datalink Layer Presentation Layer Transport Layer

transport layer

A time domain reflectometer sends a signal and analyzes the return signal's change in amplitude to determine where cable imperfections may exist. TRUE OR FALSE

true

What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs? patch cable horizontal cross connect diagonal cabling vertical cross connect

vertical cross connect

What command can be used to check a domain computer's time source from a Command Prompt window? ntpd show source w32tm /query /source time --source date /source

w32tm/query/source

What are the three different types of port number ranges as defined by IANA?

well-known ports registered ports dynamic and private ports

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?

white/green

What type of diagram shows a graphical representation of a network's wired infrastructure?

wiring schematic

You've decided to run an Nmap scan on your network. What app could you open to perform this task? Choose all that apply.

zenmap command prompt powershell


Related study sets

Chapter 1: The Human Body: An Orientation

View Set

Fundamentals of Anatomy and Physiology Ch. 10 Pt 3

View Set

Test 1: Maternity by Lowdermilk & Perry: Chapters 1, 2, 12, 13, 14, 15, 26

View Set