Network Pro CH1-12 Flashcards

Unlock all answers in this set

Unlock answers
question
You are troubleshooting a workstation connection... drop cable connecting the computer to the network. Which type of document should you update?
answer
Change documentation
question
You are troubleshooting a workstation connection... different port on the patch pane. Which type of document should you update?
answer
Wiring schematic
question
You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
answer
Change management
question
Which type of documentation would you consult to find the location of RJ-45 wall jacks and their endpoints in the intermediate distribution closet?
answer
Wiring schematic
question
You need to find out what kind of laws might apple to... Which type of document would you consult?
answer
Regulation
question
In troubleshooting a router, you want to identify which other devices... Which type of document would most likely have this information?
answer
Network diagram
question
Which of the following information are you likely to find in a policy document?
answer
A requirement for using encrypted communications for web transactions
question
Which of the following information are you likely to find in a procedure document?
answer
Details on how to test and deploy patches.
question
Which of the following documents would likely identify that drop cables on your network use T568A standard?
answer
Wiring schematic
question
You want to make sure that the correct ports on a firewall have been opened or closed. Which document should you check?
answer
Configuration documentation
question
A new law was recently passes that states that all businesses must keep a history of... Which document type would you update first in response to this new law?
answer
Policy
question
You are concerned about the amount of traffic that passed though a router... Which document would help in identifying past average network traffic?
answer
Baseline
question
You are in the habit of regularly monitoring performance statistics for your... Which type of document should you update to reflect the change?
answer
Baseline
question
Which of the following terms describes a test lab environment that does not require the use of physical hardware?
answer
Virtual sandbox
question
You manage a network with a single switch. All hosts connect to the... You want to increase the security of devices that are part of the accounting department... What should you do?
answer
Use a router to configure a subnet for the accounting computers
question
You walk by the server room and notice a fire has started. What should you do first?
answer
Make sure everyone has cleared the area
question
Which of the following fire extinguisher types is best used for electrical fires that might result when working with computer components?
answer
Class C
question
Which of the following fire extinguisher suppressant types is best used for electrical fires that might result when working with computer components?
answer
Carbon dioxide (CO2)
question
Which of the following fire extinguisher types poses a safety risk to users in the area? (Select two)
answer
- CO2 - Halon
question
Which of the following statements about ESD is not correct?
answer
ESD is much more likely to occur when the relative humidity is above 50%
question
What is recommended humidity level for several rooms?
answer
70%
question
You are adding a new rack to your data center... The only space you have available in the data center is on the... To protect against failures, you also plan to install a UPS in the rack along... There are problems with this plan. What should you do?
answer
Hire an electrician to install a wall outlet near the new rack
question
The power supply in a tower server system... Next, you remove the power supply unit from the server and open it... Which safety rules were violated in this scenario? (Select two)
answer
- You should never open a computer power supply - You should unplug a device from the wall outlet before connecting yourself to it with a static wristband
question
You have just started a new job as a network... To improve the safety of your organization, you decide... How should you get them?
answer
Download them from the chemical manufacturers' websites
question
Which of the following is an example of an internal threat?
answer
A user accidentally deletes the new product designs
question
Which of the following is an example of privilege escalation?
answer
Creeping privilieges
question
What is the greatest threat to the confidentiality of data in most secure organizations?
answer
USB devices
question
When would choosing to do nothing about an identified risk be acceptable?
answer
When the cost of protecting the asset is greater than the potential loss
question
When analyzing assets, which analysis method assigns financial values to assets?
answer
Quantitative
question
Your company has developed and implemented countermeasures for the greatest risks to their assets... What is the remaining risk called?
answer
Residual risk
question
Which of the following is not a valid response to a risk discovered during a risk analysis?
answer
Denial
question
If an organization shows sufficient due care, which burden is eliminated in the event of a security breach?
answer
Negligence
question
Purchasing insurance is what type of response to risk?
answer
Transference
question
When recovery is being performed due to a disaster, which services are to be stabilized first?
answer
Mission critical
question
In business continuity planning, what is the primary focus of the scope?
answer
Business processes
question
What is the primary goal of business continuity planning?
answer
Maintaining business operations with reduced or restricted infrastructure capabilities or resources
question
Which of the following network strategies connects multiple servers together such that if one server fails, the other immediately take over its tasks, preventing a disruption in service?
answer
Clustering
question
You manage the website for your company. The Web1 server hosts... Which component is a single point of failure for the website?
answer
Disk controller
question
You manage a website for your company. The website uses three... Considering the availability of your website, which component represents a single point of failure?
answer
Website storage
question
Match each third-party integration phase on the left with the tasks that need to be completed during that phase on the right. Each phase may be used once, more than once, or not at all.
answer
Communicate vulnerability assessment... - Ongoing operations Disable VPN configurations... - Off-boarding Compare your organization's... - Onboarding Disable the domain... - Off-boarding Identify how privacy... - Onboarding Draft an ISA... - Onboarding Conduct regular security... - Ongoing operations
question
Match each Interoperability Agreement document on the left with the appropriate description on the right. Each document may be used once, more than once, or not at all.
answer
Specifies exactly which... - SLA Creates an agreement... - BPO Provides a summary of... - MOU Documents how the... - ISA Defines how disputes... - SLA Specifies a present... - BPO
question
Your organization is in the process of negotiating an Interoperability Agreement (IA) with another organization. As a part of this... As a security administrator, which tasks should you complete during this phase? (Select two)
answer
- Identify how data will be shared - Identify how data ownership will be determined
question
Which is the most common failure of a security policy in an environment?
answer
Lack of user awareness
question
Which business document is a contract that defines a set of terms that will govern future agreements between two parties?
answer
Master Service Agreement
question
A user named Bob Smith has been assigned... When provisioning Bob's user account in... On first logon, Bob is prompted to change... What should you do to increase the security of Bob's account? (Select two)
answer
- Require stronger initial password when creating user accounts - Train users not to use passwords that are easy to guess
question
You have installed anti-virus software on computers at your business... What should you add to your security measures to help prevent this from happening again?
answer
User awareness training
question
What is the main difference between vulnerability scanning and penetration testing?
answer
Vulnerability scanning is performed within the security perimeter; penetration testing is performed outside of the security perimeter
question
What is the primary purpose of penetration testing?
answer
Test the effectiveness of your security perimeter
question
A security administrator logs on to a Windows server on her organization's... What type of scan was conducted in this scenario?
answer
Credentialed scan
question
A network utilizes a network access control (NAC) solutions to protect against malware. When a wired or wireless... What is the process called?
answer
Posture assessment
question
You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
answer
Change management
question
Which component of a Change and Configuration Management policy identifies technical and budgetary considerations associated with a proposed change and also identifies any potential impacts to the network?
answer
Feasibility anaylsis
question
Arrange the steps in the Change and Configuration Management process on the left in the correct order in which they should be completed on the right.
answer
Step 1 - Identify the need... Step 2 - Conduct a feasibility... Step 3 - Define the procedure... Step 4 - Notify affected parties... Step 5 - Implement the change. Step 6 Test the implementation Step 7 - Document the change.
question
Which of the following is an example of privilege escalation?
answer
Creeping privileges
question
If the SONET (OC-1) base data rate is 51.84 Mbps, how much data can the Optical Carrier level 12 (OC-12) transfer in one second?
answer
622.08 Mb
question
To access the Internet through the PSTN, what kind of connectivity device must you use?
answer
Modem
question
Which of the following are characteristics of ATM?(Select Two)
answer
Uses fixed-length cells of 53-bytes add labels to data units
question
Which four of the following are the responsibility of the WAN service provider?
answer
CO DCE Local loop PSE
question
Which type of network divides data to be transmitted into small units and routes these units from the originating system to the destination system, allowing multiple, concurrent communications on the network medium?
answer
Packet-switched
question
Which of the following WAN technologies provides packet switching over high-quality digital lines that speeds up to 1.544 Mbps or greater?
answer
Frame Relay
question
Which WAN connection types use digital communications over public telephones?
answer
DSL ISDN
question
Which of the following is true of Multiprotocol Label Switching? (Elect two.)
answer
It can carry ATM, SONET, and Ethernet traffic. CEF is required for all MPLS-enable Cisco routers
question
What is the maximum data rate of an ISDN BRI line?
answer
128 Kbps
question
Which three of the following are characteristics of ISDN?
answer
It provides enough bandwidth to transmit data at much higher speeds than standard modems and analog lines It is a dial-up service that uses existing copper wires for the local loop It lets you transmit voice, video, and data over the same lines.
question
You have a series of WAN links that connects your site to multiple other sites. Each remote site is connected to your site using a dedicated link What type of connection is being used?
answer
Point-to-point
question
Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?
answer
CSU/DSU
question
Your client has acquired several small companies and would like to connect them together into one network. Not al of the routers are cisco devices and compatibility is a concern. Which WAN encapsulation method should you recommend your client use?
answer
PPP
question
RouterA is connected to RouterB through Serial1. You want to configure the link to use PPP with CHAP authentication with a password of CISCO. which set of commands would you use on RouterA to complete the configurations?
answer
A- RouterA(config)#username RouterB password cisco
question
Two routers with the hose name SLC and PROVO have been configured to connect using PP with CHAP authentication through their BRI0 interfaces. what should you do to correct the problem;
answer
On SLC, change the username password to chocolate
question
Which of the following statements about the functionality of LCP are true? select three
answer
Username and passwords may be required during the handshake LCP provides multilink support Data can be compressed at the source and decompressed at the destination
question
Which of the following are benefits of LCP? select three
answer
Provides load balancing across multiple links Negotiates the use (or lack) of authentication before starting the session Monitors data dropped on the link and avoids frame looping
question
What is the connection order used by two TCP/IP routers to open a session with PPP including authentications?
answer
LCP, authentications, NCP
question
PPP supports authentications, compressions, and multiple network-layer protocols. Which of the following correctly sequences these functions when a PP link is established?
answer
Negotiate compression settings, perform authentications, negotiate network layer protocols.
question
Which of the following protocols is used by PPP to enable support for multiple network-layer protocols?
answer
NCP
question
Which of the following WAN technologies provides digital dial-up connections on two 64 Kbps data channels?
answer
ISDN BRI
question
A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?
answer
Satellite
question
Which of the following forms of networking is highly susceptible to eavesdropping and must be secured accordingly?
answer
Wireless
question
Which of the following is the most susceptible to interference related to atmospheric conditions?
answer
Satellite
question
Which of the following Internet access technologies support simultaneous voice and data traffic over the same physical line? (Select two.)
answer
ISDN BRI ADSL
question
Which of the following Internet services provides equal upload and download bandwidth?
answer
SDSL
question
Which of the following are characteristics of VDSL? (Select Two)
answer
Unequal download and upload speeds Supports both data and voice at the same time
question
Which of the following technologies does GSM use to allow multiple connections on the same frequency?
answer
Time division multiple access
question
Which of the following cellular network types does NOT provide Internet connectivity?
answer
2G
question
Which of the following cellular types use MIMO to increase 3G data throughput? (Select two.)
answer
LTE HSPA+
question
Drag the cellular network specification on the left to its corresponding mobile technology generation on the right
answer
2G - GSM CDMA 3G - LTE HSPA+ 4G - WiMAX
question
Which of the following describe the EDGE cellular technology? (select two.)
answer
The first Internet compatible technology Offers speeds of 400-1,000 Kbps
question
Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office?
answer
DSL
question
Which of the following services are available regardless of whether the telephone company network is available?
answer
Cable modem
question
Which type of Internet service uses the DOCSIS specification?
answer
Coaxial cable
question
Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? select two
answer
TACACS+ RADIUS
question
You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization. Which of the following would be a required part of your configuration?
answer
Configure the remote access servers as RADIUS clients.
question
Which of the following protocols can be used to centralize remote access authentication?
answer
TACACS
question
You want to set up a service to allow multiple users to dial in to the office server from modems on their home computers. What service should you implement?
answer
RAS
question
You are configuring your computer to dial up to the Internet. What protocol should you use?
answer
PPP
question
Which of the following protocols or services is commonly used on cable Internet connections for user authentication?
answer
PPPoE
question
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need?
answer
Remote access
question
You have just signed up for Internet access using a local provider that gives you a fiber optic line into your house. From there, the Ethernet and wireless connections are used to create a small network within your home. Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection?
answer
PPPoE
question
RADIUS is primarily used for what purpose?
answer
Authenticating remote clients before access to the network is granted
question
Which of the following are characteristics of TACACS +?
answer
Encrypts the entire packet, not just authentication packets
question
Which of the following ports are used with TACACS ?
answer
49
question
Which type of device is required to implement port authentication through a switch?
answer
RADIUS server
question
Which of the following are characteristics of TACACS +? select two
answer
Allowing for a possible of three different servers, one each for authentication, authorization, and accounting. Uses TCP.
question
you are troubleshooting physical layer issues with Gi0/1 interface in a router. you need to view and analyze the number of collisions detected on the interface
answer
show interfaces Gi0/1
question
You are troubleshooting physical layer issues with the G0/1 interface on a router. You suspect a duplex mismatch error has occurred and need to determine the duplex settings configured on the interface. Which commands should you use?
answer
show interfaces gi0/1 show interfaces gi0/1 status
question
Review the output from the show interfaces far/1 command on the switch 2 switch in the exhibit. what is wrong with the fa0/1 interface in this example?
answer
A duplex mismatch exists with the device on the other end of the connection.
question
Consider the network shown in the exhibit. When you run the show interface command on switch1, you observe a significant number of runts on the Gio/1 interface. What does this statistic indicate?
answer
Collisions are occurring.
question
You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice significant number of CRC errors displayed. What are the most likely causes? select two
answer
Collisions EMI or cross-talk on the cable connected to the interface
question
You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. Which interface statistic displays the number of collisions that occurred after the 64th byte of the frame was transmitted?
answer
Late collisions
question
A workstation is connected to a switch on the Gi0/2 interface using a straight-through cable. The ethernet interface in the workstation has bee manually configured to use a 100Mbps link speed in full-duplex mode. Which of the following are true in this scenario? select three
answer
The switch attempts to sense the link speed If the link speed is 100Mbps or 100Mbps, half-duplex is used. If the link speed is 1000Mbps or faster, full-duplex is used.
question
Consider the network shown in the exhibit. You have been experiencing intermittent connectivity issues with switch2. To check the status of the interfaces, you run the following commands: Switch2#show interfaces fa0/1 status
answer
The devices connected to fa0/1 interface has auto negotiation disabled
question
Your organization recently opened a branch office in a remote area. Because of its location, traditional WAN connectivity was not available. so you contracted with a satellite provider to connect the branch office network to your home office network. What is the most likely cause of this poor WAN performance.
answer
There is latency on the WAN link.
question
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. What is the most likely cause of this poor WAN performance.
answer
The WAN provider is throttling bandwidth on the link
question
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. You ran the show interface. What are the most likely causes of this WAN issues? select two
answer
There is a problem with the service providers network The WAN interface on one or both routers have been disabled.
question
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. You ran the show interface. What are the most likely causes of this WAN issues?
answer
There is a data link encapsulation protocol mismatch between the WAN interfaces on both ends of the link.
question
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. You ran the show interface. What are the most likely causes of this WAN issues?
answer
There is an authentication misconfiguration issue the WAN interfaces on both ends of the link
question
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. You ran the show interface. What are the most likely causes of this WAN issues?
answer
There is an IP address misconfiguration issues between the WAN interfaces on both ends of the link.
question
An access point that conforms to the IEEE 802.11b standard acts most closely to what other networking device?
answer
Hub
question
All of the 802.11 standards for the wireless networking support which type of communication path sharing technology?
answer
CSMA/CA
question
Uses a narrow frequency band and hops data signals in a predictable sequence
answer
FHHS
question
Breaks data into pieces and ends the pieces access multiple frequencies in a defined range
answer
DSSS
question
Breaks data into very small data streams in order to send the information across long distances
answer
OFDM
question
Which of the following is true of a wireless network SSID?
answer
Groups wireless devices together into the same logical network
question
Which wireless networking component is used to correct multiple APs together?
answer
DS
question
Which IEEE standard describes wireless communications?
answer
802.11b
question
Which data transmutation rate is defined by the IEEE 802.11b wireless standard.
answer
11Mbps
question
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4GHz. Which 802.11 stand will work best in this situation?
answer
802.11a
question
You are designing an update to your clients wireless network. The existing network uses 802.11b. Due to budget, which 802.11 standard will work best.
answer
802.11g
question
Which IEEE wireless standard specify transmission speeds up to 54Mbps? select two
answer
802.11a 802.11g
question
You have been contacted by OsCorp to recommend a wireless solution.
answer
802.11g
question
Which of the following are frequencies defined by 802.11 committees for wireless networking. select two
answer
2.4GHz 5.57GHz
question
Which technologies are used by the 802.11ac standard to increase network bandwidth? select two
answer
Eight MIMO radio streams 80MHz donned channels
question
Your organization uses an 802.11b wireless network. Recently other tenets installed the following equipment in your building....
answer
The wireless tv system
question
What is the frequency of 802.11a networking?
answer
5.75GHz
question
How many total channels are available for 802.11a wireless networks?
answer
23
question
How many total channels are available for 802.11g wireless networks?
answer
11
question
Which wireless technology is used to enable 802.11a-ht and 802.11g-ht networks to emulate 802.11n network speeds?
answer
Channel bonding
question
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point, and to be able to roam between the two access points. How should you configure the access points?
answer
Same SSID, different channel.
question
You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do?
answer
Decrease the beacon interval.
question
You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network to connect to it. What should you do?
answer
Configure a profile on the wireless client.
question
You have a small wireless network that uses multiple access points. The network currently uses WPA. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop?
answer
TKIP encryption Preshared key
question
You are building a wireless network within and between two buildings. The buildings are separated by more then 3000 feet. The wireless network should meet the following requirements....
answer
Building 1-location A Right-facing directional Antenna/WPA2 with CCMP Building 1-location B Omni directional Antenna/WPA2 with CCMP Building 1-location C Left-facing directional Antenna/WPA2 with CCMP Building 1-location D Right-Facing Parabolic Antenna/WPA2 with CCMP Building 2-location A Omni Directional/WEP with Open authentication Building 2-location B Left-facing Parabolic Antenna/WPA2 with CCMP
question
Your wireless network consist of multiple wireless 802.11n access points that are configured as follows.....This network is required to support an ever-increasing number of devices. what should you do?
answer
Double the bandwidth assigned per channel to 40MHz
question
What purpose does a wireless site survey serve? select two
answer
To Identify existing or potential sources of interference To identify the coverage area and preferred placement of access points.
question
You are designing a wireless network for a client. Your client needs the network to support data rate of at least 150Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4GHz. Which 802.11 standard will work best in this situation?
answer
802.11n
question
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54Mbps. Which 802.11 standard will work best in this situation? select two
answer
802.11n 802.11a
question
You are designing an update to your clients wireless network. The existing wireless network uses 802.11g equipment, which your client complains runs to slowly. She wants to upgrade the network to run 150Mbps or faster. Which 802.11 standard will work best in this situation.
answer
802.11n
question
You have been hired to design a wireless network for a SOHO environment. Which of the following questions should you ask? select three
answer
How many devices will need to be supported Is the business expected to grow in size in the future What type of data will be transmitted on the network
question
To optimize your network, you want to configure your wireless AP to use a channel that meets the following criteria. non-overlapping, low utilization, low interference.
answer
channel 1
question
Match each wireless term or concept on the left with its associated description on the right
answer
Compares the level of the WIFI signal to the level of background radio signals/ Signal to Noise ratio Checks channel utilization and identifies sources of RF inference/ Spectrum analysis Identifies how strong a radio signal is at the receiver/Received Signal Level Identifies the number of useful bits delivered from the senders to the receiver/ Causes multiple copies of the same radio signal to be received by the receiving antenna/ Bounce Degrades wireless network performance/ Device saturation
question
Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow for the creation of quest WLANs for keeping public wireless traffic separated from private traffic?
answer
Distributed wireless mesh infrastructure
question
Match each wireless device on the left with is corresponding characteristics on the right.
answer
Manages all of the Apps that are connected to it/ Wireless controller Suppors 30 to 50 wireless clients per access point/ Wireless controller Profides NAT routing and an ethernet switch in one device/ SOHO wireless router Supports a maximum of 5-10 wireless clients/ SOHO wireless router Pushes wireless configurations settings to connected access points/ Wireless controller
question
Match the wireless networking term or concept on the left with its appropriate description on the right.
answer
Moving an wireless device/Roaming Used by Cisco wireless equipment/ LWAPP Specifies the number of clients/ Device density Automatically partitions a single/ VLAN pooling Graphically displays wireless/ Heat map Connects tow wired networks/ Wireless bridge Identifies how strong/ The number of useful bits/ Goodput
question
Match each type of access point on the left with the wireless network architecture that they are commonly used in on the right
answer
Independent access point infrastructure/ Intelligent AP Hub-and-spoke infrastructure/ Lightweight AP Distributed wireless mesh infrastructure/ Intelligent AP
question
Which encryption method is used by WPA for wireless networks?
answer
TKIP
question
You want to implement 802.1x authentication on your wireless network. Which of the following will be required;
answer
RADIUS
question
You want to connect your client computer to a wireless access point connected to your wired network air work. The network Admin tells you that the access point is configured to use WPA2 personal with the strongest encryption method possible. SSID broadcast is ruined off. Which of the following must you configure manually on the client. select three
answer
SSID AES Preshared Key
question
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement.
answer
WPA2
question
You are concerned that the wireless access points may have been deployed within your organization without authorizations. What should you do. select two
answer
Conduct a site survey Check the MAC addresses on devices connected to your wired switch
question
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. What type of security risk is this?
answer
Rogue access point
question
An attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using airsnort to capture packets, but found that she couldn't break the encryption. What attack techniques did the attack us? select two
answer
Pharming Evil twin
question
What is the LEAST secure place to locate an access point with an omni-directional antenna when creating a wireless cell?
answer
Near a window
question
Which of the following measures will make your wireless network inviable to the casual attacker performing war driving?
answer
Disable the SSID broadcast
question
You are the wireless network Admin for your organization. As the size of the organization has grown, you've decided to upgrade your wireless network to use 802.11x authentication instead of pre-shared keys. What should you do
answer
Configure all wireless access points with client certs. Configure the RADIUS server with a server cert.
question
You are designing a wireless network implementation for a small business. The business deals with sensitive customer information, so data emanation must be reduced as mush as possible. the floor plan of the office is shown below...
answer
A-Direciton B-Direction C-Omni-Direction D-Direciton E-Direciton F-Direciton G-Direciton
question
You need to implement a wireless network between two buildings on a college campus. A wired network has already been implemented within each building. the buildings are 100 meters apart. select two
answer
High-gain Parabolic
question
Which of the following wireless security methods uses common shared key configured on the wireless access point and all wireless clients?
answer
WEP, WPA Personal, and WPA2 Personal
question
You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? select two
answer
AES encryption 802.1x
question
Match each WIFI jamming attach on the left with its corresponding description on the right.
answer
Transmits radio signals at random amplitudes and frequencies/ Random noise jamming Transmits pulses of radio signals at random amplitudes and frequencies/Random pulse jamming Repeatedly transmits high-intensity, short-duration RF burst at a rapid pace/ Spark jamming
question
You are setting up a wireless hotspot in a local coffee shop. For best results, you want todisperse the radio signals evenly throughout the coffee shop.Which of the following types of antennas would you use on the AP to provide a 360degree dispersed wave pattern?
answer
Omni-Directional
question
You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standard could the network be using. select two
answer
Bluetooth 802.11b
question
You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360dispersed RF wave design. After installed, the signal between the two systems is weak as many obstacles interfere with the signal.
answer
Replace the Omni-directional antenna with a directional antenna
question
A user on your network has been moved to another office down the hall. after the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?
answer
The client system has moved to far away from the access point.
question
You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer and all settings, with the exception of SSIDs, remain configured to the default. Which of the following might you suspect as the cause of the connectivity problems?
answer
Overlapping channels
question
You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for its customers who want Internet access. You decide to check your e-mail before the meeting begins, but when you open the browser you cannot gain Internet access. Other customers are on the Internet and because you use a wireless connection at work, you are sure your laptops wireless adapter works. What is the likely cause of this problem?
answer
mismatched SSID
question
After installing a new 2.4GHz cordless phone system in your office, you notice that wireless network performance is adversely affected. Which of the following wireless networking standards are you most likely to be using? (Select two.)
answer
802.11b 802.11g
question
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee rom two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?
answer
The user is out of the effective range of the wireless access point on her floor
question
While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?
answer
Use a different channel ID
question
Mobile devices in your organization us the access point shown in the figure below to connect to your wireless network. what should you do. select two
answer
Set the channel used by access pint B to 11 Set the access point B to sue 802.11n wireless network
question
which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building>
answer
Place access points above where most clients are
question
you have physically added a wireless access point to your network and installed a wireless network card in two laptops running windows. Neither laptop can find the network and you have come to the conclusion that you must manually configure the wireless access points (AP). Which of the following values uniquely identifies the network AP?
answer
SSID
question
You need to place a wireless access point in your two-story building. While trying avoid interference, which of the following is the best location for the access point?
answer
in the top floor
question
Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?
answer
Place accès points above where most clients are
question
Your wireless network consists of multiple 802.11n access points that are configured as follows... what should you do
answer
implement antenna diversity
question
You are in the process of configuring an iSCSI storage area network (SAN) for your network.... Which tool should you use?
answer
iSCSI Initiator
question
Arrange the Fibre Channel SAN implementations tasks in the order they should be performed.
answer
Step 1- Install a Fibre Channel adapter in each server that will access the shared storage on the SAN. Step 2- Deploy a Fibre Channel switch. Step 3- Connect each server to the Fibre Channel switch using the appropriate fiber optic cabling for the equipment you are using. Step 4- Deploy a shared storage device, such as an external RAID device containing multiple hard disk drives.
question
Which of the following does NOT accurately describe an iSCSI SAN?
answer
Requires special hardware and knowledge to implement.
question
You manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server. Which network-based storage technology is being used?
answer
NAS with Clustering.
question
In a SAN implementation, the servers that connect to shared storage devices are called___________________.
answer
initiators
question
Which of the following are typical components of a NAS device? select two
answer
A minimal network OS. One or more NICs.
question
Which of the following protocols are used with VoIP?
answer
SIP RTP
question
Which of the following protocols are used by VoIP to set up, maintain, and terminate a phone call?
answer
SIP
question
Which switch features are typically used with VoIP?
answer
PoE VLAN
question
Which of the following features is used with digital IP phones to supply power through a switch port?
answer
PoE
question
Match each UC component on the left with its corresponding definition on the right.
answer
UC Server - Manages the entire UC system UC Gateway - Connects a digital network to an analog network UC Server - Makes presence information available to users UC Hardware Device - An IP phone for making phone calls UC Gateway - Connects a UC network to the PSTN UC Software Device - A smart phone used to access the UC system UC Hardware Device - Designed to work specifically with the UC server
question
Your company uses VoIP for phone calls. Recently, employees have been complaining about phone calls with unusual sound effects. Which type of problem is occurring on the VoIP system?
answer
Jitter
question
At what percent is packet loss noticeable in voice traffic?
answer
1%
question
Which protocol doies VoIP use to interface with the PSTN?
answer
MGCP
question
Your company recently installed a unified communication system. Employees are now able to inform each other of their availability.
answer
Presence information
question
You've been asked by upper management if there is a way to integrate phone calls, emails, and instant messaging into a single platform. Which of the following systems should you recommend to them?
answer
Unified communication
question
Which of the following protocols is used during the call control process of multimedia communications?
answer
Session Initiation Protocol
question
In virtualization, what is the role of a hypervisor?
answer
A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.
question
What type of virtualization completely simulates a real physical host?
answer
Full Virtualization
question
Which component is most likely to allow physical and virtual machines to communicate with each other?
answer
Virtual switch
question
Which of the following are advantages of virtualization? select two
answer
Centralized administration Easy migration of systems to different hardware
question
You need to provide DHCP and file sharing services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?
answer
Virtual servers.
question
You have configured a virtual network that includes the following virtual components: *Four virtual machines (Virtual OS 1, Virtual OS 2, etc.) *One virtual switch The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network. Give the port configuration for the virtual switch and the physical switch in the table below, click on on all of the virtual and physical machines Virtual OS 1 can communicate with.
answer
Virtual OS 2 Virtual OS 3
question
You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?
answer
Virtual servers
question
You have configured a virtual network that includes the following virtual components: *Four virtual machines (Virtual OS 1, Virtual OS 2, etc.) *One virtual switch The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network. Give the port configuration for the virtual switch and the physical switch in the table below, click on on all of the virtual and physical machines Virtual OS 1 can communicate with. Virtual Switch - P1 - Virtual OS 1- Virtual Network1 P2 - Virtual OS 2 - Virtual Network2 P3 - Virtual OS 3 - Virtual Network1 P4 - Virtual OS 4 - Virtual Network2 P5 - Virtual Switch - Virtual Network1, Physical Network Physical Switch P1 - Physical Switch - Physical Network P2 - Physica OS1 - Physical Network P3 - Physica OS2 - Physical Network P4 - Physica OS3 - Physical Network P5 - Physica OS4 - Physical Network
answer
Virtual OS 3 Physical OS 1 Physical OS 2 Physical OS 3 Physical OS 4
question
You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your testing virtual machines are connected to the production network through the hypervisor's network interface. However, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent this, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do?
answer
Create a new virtual switch configured for host-only (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch.
question
Match the virtualization feature on the right with the appropriate description on the left.
answer
Flexibility - Moving virtual machines between hypervisor hosts Testing - Verifying that security controls are working as designed Server consolidation - Performing a physical-to-virtual migration (P2V) Sandboxing - Isolating a virtual machine from the physical network
question
You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working. To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations. Currently, none of your testing virtual machines have a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates.
answer
Create a new virtual switch configured for bridged (external) networking Connect the virtual network interfaces in the virtual machine to the virtual switch
question
What key advantage does a virtual router have over a physical router?
answer
Multiple networks can be connected to a single interface.
question
You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?
answer
Implement a virtual firewall within the hypervisor.
question
Which of the following statements about virtual NICs are true?
answer
Virtual NICs need the appropriate driver installed to function. Multiple virtual NICs can be added to a virtual machine.
question
Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network?
answer
SaaS
question
Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?
answer
PaaS delivers everything a developer needs to build an application onto the cloud infrastructure
question
Which of the following is NOT true regarding cloud computing?
answer
Cloud computing requires end-user knowledge of the physical location and configuration of the system that delivers the services.
question
Public cloud
answer
Provides cloud services to just about anyone
question
Private cloud
answer
Provides cloud services to a single organization
question
Community cloud
answer
Allows cloud services to be shared by several organizations
question
Hybrid Cloud
answer
Integrates one cloud service with other cloud services
question
You were hired by a small start-up company. the company is in a small office and has several remote employees. You ave been asked to find a business service that would accommodate the curren size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power. Which cloud serve model should you use?
answer
IaaS
question
You manage the information systems for a large co-location data center. Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture?
answer
Verify that your network's existing security infrastrucutre is working properly. Install the latest firmware updates from the device manufacturer
question
You manage the information systems for a large manufacturing firm. Supervisory control and data acquistion (SCADA) devices are used on the manfucaturing floor to manager your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture?
answer
Install the latest firmware updates from the device manufacturer Verify that your network's existing security infrastrucutre is working properly.
question
Why do attackers prefer static environment devices to conduct distributed network attacks? select two
answer
These devices tend to employ much weaker security than traditional network devices These devices are typically more difficult to monitor than traditional network devices.
question
Match the definition on the left with the SCADA technology term on the right
answer
Remote Terminal Unit- Connects equipment to the network via a wireless signal and converts digital data from the network into signals that the equipment can process. DCS- A network of components that work together in order to remotely manage industrial equipment. Network Link- Connects the supervisory computer to the RTUs or PLCs. Supervisory Computer-Communicates with and send control commands to connected SCADA devices. Programmable logic Controller- Connects equipment to the network via a physical medium and converts digital data into signals that the equipment can process
question
Which of the following is an example of smart technology embedded within networked devices associated with automated factory equipment?
answer
SCADA systems
question
SCADA systems are typically implemented using which of the following components?
answer
Remote terminal units (RTUs), and programmable Logic Controllers (PLCs)
question
What is the risk associated with smart technology used in network devices such as smart refrigerators, environmental controls, or industrial equipment?
answer
They are vulnerable to exploits due to weaker security.
question
You want to maintain security on your internal network
answer
53
question
Using the Netstat command, you notice that a remote system
answer
Downloading a file
question
You want to allow your users to download files from a server running the TCP
answer
FTP
question
After blocking a number of ports to secure your server
answer
Open port 25 to allow SMTP service
question
Users complain that they can't connect to the website when they type
answer
The HTTP port should be changed to 80
question
Which of the following does a router acting as a firewall use to control packets
answer
ACL
question
You have a company network that is connected to the Internet. You want all users
answer
Use firewalls to create a DMZ. Web Inside / Private Behind
question
You have just installed a packet-filtering firewall
answer
Port number/source address of a packet/destination address of a packet
question
Which of the following describes how access lists
answer
An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers.
question
You have used firewalls to create a demilitarized zone
answer
Put the Database on the private network/Put the Web server inside the DMZ
question
when designing a firewall, what is the recommended approach
answer
Close all ports, open only ports required
question
Match the firewall type
answer
Layer 2- V Layer 3- R Counts-R Does-V Different-R Same-V
question
Your Cisco router has three
answer
Add a permit
question
Which firewall implementation creates a buffer
answer
DMZ
question
Which of the following are true about routed firewalls
answer
Supports Counts
question
An All-in-one security appliance is best
answer
a Remote
question
Which of the following features are common functions
answer
Bandwith shaping Spam Filtering
question
You recently installed a new all-in-one security appliance in a remote office
answer
Change the default Configure the device's authentication
question
Which of the following prevents access based on website ratings
answer
Content filter
question
You manage a server that runs your company website
answer
Proxy Server
question
Based on the diagram, which type of proxy is handling the client's request
answer
Reverse
question
Which of the following network services or protocols uses TCP/IP port 22
answer
SSH
question
Which port number is used by SNMP
answer
161
question
Which protocol and port number is used by BOOTP
answer
UDP 67
question
To increase security on your company's internal network
answer
443
question
You are monitoring network traffic on your network and you see a large amount of traffic between a Windows
answer
The workstation is using NetBIOS to access shared resources on the server
question
You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427
answer
Someone is using Voice over IP VOIP
question
You have been given a laptop to use for work
answer
Host-based
question
You have just installed a packet-filtering firewall on your network
answer
Destination address Port number Source address
question
You provide Internet access for a local school
answer
Application Level
question
A small startup company has hired
answer
The UTM represents a single point of failure
question
Match the firewall type on the right
answer
Packet Filtering Firewall- 3 Circuit Level Proxy - 5 Application Level Gateway - 7 Routed Firewall - 3 Transparent Firewall - 2
question
Which of the following prevents access based on website rating and classifications?
answer
Content filter
question
You manage a server that runs your company Web site. The Web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that static Web content can be offloaded to a different server, while the Web server continues to process dynamic content. Which solution should you implement?
answer
Proxy server
question
Based on the diagram, which type of proxy server is handling the client's request?
answer
Reverse Proxy Server
question
Which of the following network services or protocols uses TCP/IP port 22?
answer
SSH
question
Which port number is used by SNMP?
answer
161
question
Which protocol and port number is used by BOOTP/DHCP?
answer
UDP 67
question
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?
answer
443
question
You are monitoring network traffic on your network and you see a large amount of traffic between a Windows workstation and a Window server on the following ports: *137 *138 *139 Which is the source of this network traffic?
answer
The workstation is using NetBIOS to access shared resources on the server.
question
You are monitoring network traffic on your network, and you see the traffic between two network hosts on port 2427. What is the source of this network traffic?
answer
Someone is using Voice over IP (VoIP) to make a telephone call.
question
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks. What solution should you use?
answer
Host-based firewall
question
You have just installed a packet-filtering firewall on your network. Which options will you be able to set on your firewall?
answer
Source address of a packet Destination address of a packet Port Number
question
You provide Internet access for a local school. You want to control Internet access based on user, and prevent access to specific URLs. Which type of firewall should you install?
answer
Application-level
question
A small startup company has hired you to harden their new network. Because funds are limited, you have decided to implement a unified threat management (UTM) device that provides multiple security features in a single network appliance: • Firewall • VPN • Anti-spam • Antivirus You join the UTM device to the company's Active Directory domain. The company's traveling sales force will use the VPN functionality provided by the UTM device to connect to the internal company network from hotel and airport public WiFi networks. What weaknesses exist in this implementation?
answer
The UTM represents a single point of failure.
question
Match the firewall type on the right with the OSI layers at which it operates. Note: Each OSI Layer can be used once, more than once, or not at all.
answer
Packet Filtering Firewall OSI Layer 3 Circuit-level Proxy OSI Layer 5 Application-level Gateway OSI Layer 7 Routed Firewall OSI Layer 3 Transparent Firewall OSI Layer 2
question
You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have?
answer
Peer-to-peer
question
You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts access those resources but do not host services of their own. What type of network do you have?
answer
Client-server
question
Which of the following geographic network types are typically managed by a city as a public utility?
answer
Metropolitan Area Network (MAN)
question
You have a network that uses a logical ring topology. How do messages travel through the network?
answer
Messages travel from one device to the next until they reached the destination device.
question
You have a network that uses a logical bus topology. How do messages travel through the network?
answer
Messages are broadcast to all devices connected to the network.
question
Which of the following topologies connects all devices to a trunk cable?
answer
Bus
question
Which of the following topologies connects each device to a neighboring device?
answer
Ring
question
In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device?
answer
Ring
question
Which of the following topologies connects each network device to a central hub?
answer
Star
question
You have implemented an ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?
answer
Mesh
question
You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?
answer
Mesh
question
You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs?
answer
Mesh
question
What device is used to create a physical star topology?
answer
Switch
question
You have a small network that uses a hub to connect to multiple devices.What physical topology is used?
answer
Star
question
You have been asked to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices.Which of the following network topologies should you implement?
answer
Partial Mesh
question
Which of the following are included as part of Data Link layer specifications?
answer
*Identifying physical network devices. *Controlling how messages are propagated through the network.
question
In the OSI Model, what is the primary function of the Network layer?
answer
Routes messages between networks.
question
In the OSI model, which of the following functions are performed at the Presentation layer? (Select two)
answer
*Specify data format (such as file formats) *Encrypt and compress data
question
In the OSI model, which of the following functions are performed at the Application layer? (Select two)
answer
*Enabling communication between network clients and services. *Integration of network functionality into the host operating system.
question
Which of the following functions are performed at the Physical layer of the OSI model?
answer
Movement of data across network cables
question
The Data Link layer of the OSI model is comprised of two sublayers. What are they? (Select two)
answer
*MAC *LLC
question
Which of the following are functions of the MAC sublayer? (Select two)
answer
*Defining a unique hardware address for each device on the network. *Letting devices on the netowrk have access to the LAN.
question
Which OSI model layer is responsible for guaranteeing reliable message delivery?
answer
Transport
question
Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more than once.
answer
Presentation - Application Data Link - Network Interface Application - Application Session - Application Network - Internet Transport - Transport
question
Match the networking function or device on the left with the OSI model layer it is associated with on the right.
answer
Application - HTTP Presentation - ASCII Session - Session ID number Transport - Port numbers Network - Router Data Link - Switch Physical - Wireless access point
question
At what OSI layer does a router operate to forward network messages?
answer
Network
question
Your company purchases a new bridge which filters packets based on the MAC address of the destination computer. On which layer of the OSI model is this device functioning?
answer
Data Link
question
At which layer of the OSI model do hubs operate?
answer
Physical Hubs operate at layer 1, or the Physical layer.
question
Which of the following devices operate at OSI model layer 2? (Select two)
answer
*Switch *Network interface card
question
Which three of the following devices operate at the Data Link layer of the OSI model?
answer
*Switches *Network interface cards (NIC) *Bridges
question
Non-Return-to-Zero
answer
Binary 1s are represented by positive voltage while 0s are represented by negative voltage. There is no zero voltage state between bits.
question
Manchester
answer
The transition from one voltage level to another is used to represent binary data
question
Return-to-Zero Inverted
answer
A 0 is represented by sending a light pulse. A 1 is represented by sending no light pulse.
question
Return-to-Zero
answer
Binary 0s and 1s are transmitted by sending voltage pulses, with the voltage returning to zero between pulses.
question
Baseband
answer
Uses the entire network medium as a single transmission channel
question
De-multiplexing
answer
Combines signals from multiple channels into a single channel.
question
Frequency-division multiplexing
answer
Assigns different frequencies to different channels on the same network medium.
question
Broadband
answer
Divides the transmission medium into several channels.
question
Baud rate
answer
Measures the number of times a signal in a communications channel changes state.
question
Bit rate
answer
Measures the number of data bits transmitted in one second in a communication channel.
question
Network Signaling is a function of which later of the OSI Model?
answer
Physical Layer
question
Based on the diagram, which network line code technique is being used?
answer
Non-Return-to-Zero
question
Which protocol is used on the World Wide Web to transmit Web pages to Web browsers?
answer
HTTP
question
Your company just acquired another company in the same city. You are given the task of integrating the two e-mail systems to that messages can be exchanged between the e-mail servers. However, each network uses an e-mail package from a different vendor. Which TCPIP protocol will enable messages to be exchanged between systems?
answer
SMTP (Simple Mail Transfer Protocol)
question
You are an application developer and are writing a program to exchange video files through a TCPIP network. You need to select a transport protocol that will guarantee delivery. Which TCPIP protocol would you implement that provides this capability?
answer
TCP (Transmission Control Protocol)
question
Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes?
answer
TCP (Transmission Control Protocol)
question
You have a large TCPIP network and want to keep hosts' real time clock synchronized. What protocol should you use?
answer
NTP (Network Time Protocol)
question
What protocol sends e-mail to a mail server?
answer
SMTP (Simple Mail Transfer Protocol)
question
Which of the following protocols stores e-mail on the mail server and gives users a choice to download mail or keep it on the server?
answer
IMAP4 (Internet Mail Access Protocol V4)
question
You are asked to recommend an email retrieval protocol for a company's sales team. The sales team needs to access email from various locations and possibly different computers. The sales team does not want to worry about transferring email messages or files back and forth between these computers. Which email protocol was designed for this purpose?
answer
IMAP4 (Internet Mail Access Protocol V4)
question
Which of the following TCPIP protocols do e-mail clients use to download messages from a remote mail server?
answer
POP3 (Post Office Protocol 3)
question
The UDP transport protocol provides which of the following features? (Select all that apply)
answer
-Low overhead -Connectionless datagram services
question
Which protocol is used for securely browsing a website?
answer
HTTPS
question
Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
answer
ICMP (The Internet Control Message Protocol)
question
11
answer
17
question
B
answer
11
question
D
answer
13
question
F
answer
15
question
C
answer
12
question
10
answer
16
question
What is the binary format for the following decimal IP address?
answer
100000011.00001001.1001010.01101111
question
What is the decimal format for the following binary IP address?
answer
206.58.170.67
question
You are installing networking wiring for a new Ethernet network at your company's main office building. The project specifications call for Category 5 UTP network cabling and RJ-45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of Category 3 network cable in storage. Upon investigation, it appears very similar to Category 5 wiring. Should you substitute Category 3 cabling for Category 5 cabling to finish the project?
answer
No, Category 5 cabling has more twists per inch than Category 3 cabling to reduce cross-talk and support higher data rates
question
Which of the following cable types often includes a solid plastic core?
answer
Cat6
question
You are adding new wires in the office. The office has a false ceiling that holds the lights. You would like to run your Ethernet cable there. What type of cable must you use?
answer
Plenum
question
Which of the following connectors is used with Ethernet 10BaseT networks?
answer
RJ-45
question
In which of the following situations might you use an RJ-11 connector?
answer
You want to connect your computer to the internet with a dial-up connection.
question
When would you typically use an RJ-11 connector
answer
When connecting a phone to a phone line.
question
Which of the following connector types would you most likely use to connect to a T1 WAN service?
answer
RJ48c
question
Which of the following are characteristics of coaxial network cable? (Choose three)
answer
-It uses two concentric metallic conductors. -It has a conductor made from copper in the center of the cable. -The ends of the cable must be terminated.
question
Which of the following cable classifications are typically used for cable and satellite networking with coaxial cables?
answer
-RG-6 -RG-59
question
You have a small home network connected to the Internet using an RG-6 cable. You need to move the router connecting the network to the Internet, but can't find any RG-6 cable. Which cable types could you use instead?
answer
RG-59
question
Of the following cables, which offer the best protection against EMI?
answer
RG-6
question
You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use?
answer
F-type
question
F-Type connectors are typically used with cables using which of the following standards? (Select two)
answer
-RG-6 -RG-59
question
You are working with an older 10Base2 Ethernet network. Which of the following connector types will you most likely encounter?
answer
BNC
question
Which of the following forms of optical fiber would usually be used to connect two buildings across campus from each other, which are several kilometers apart?
answer
Single mode
question
Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two)
answer
-Immunity to electromagnetic interference -Greater cable distances without a repeater
question
Which of the following is true about single mode fiber optic network cabling?
answer
The central core is smaller than that of multimode fiber optic cabling
question
Of the following cables, which offer the best protection against EMI?
answer
Single mode fiber optic
question
Which of the following connectors usually require polishing as part of the assembly process? (Select two)
answer
-ST -SC
question
Which of the following are characteristics of an LC fiber optic connector? (Choose two)
answer
-They use a housing and latch system similar to an RJ-45 UTP connector -They are half the size of standard connectors
question
Which of the following are characteristics of an MT-RJ fiber optic connector? (Select two)
answer
-They can be used with multimode fiber optic cables -They use metal guide pins to ensure accurate alignment
question
Which of the following connectors is used with fiber optic cables and connects using a twisting motion?
answer
ST
question
Which of the following connectors are used with fiber optic cables and include both cables in a single connector? (Select two)
answer
-LC -MT-RJ
question
You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task?
answer
Crimping tool
question
What tool should you use to extend network services beyond the demarc?
answer
Punchdown tool
question
You are making Ethernet drop cables using Cat5e cable and RJ45 connectors. You need to remove the plastic coating over the cable to expose the individual wires. What tool should you use?
answer
Cable Stripper
question
You are working with 25 pair wires and 66 blocks. You have pushed the wires onto the 66 block, but now need to cut off the excess end of each wire. What tool do you use?
answer
Punchdown tool
question
Which of the following connector types are used with UTP cables? (Select two)
answer
-RJ45 -RJ11
question
Which of the following describes the point where the service providers responsibility ends and the customers responsibility begins for installing and maintaining wiring and equipment?
answer
Demarc
question
You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor. What would you use to connect the wiring closets together?
answer
Vertical Cross Connect
question
You have a network that occupies the top floor of a three story building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. What would you use to relocate the WAN line into a wiring closet on your floor?
answer
Demarc extension
question
You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a second wiring closet on the main floor. You need to connect the two wiring closets. Which of the following are typically used to connect the two wiring closets? (Select two.)
answer
-Horizontal Cross connect -25 Pair
question
You have a network that occupies both floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a second wiring closet on the second floor directly above the wiring closet that holds the demarc. Which of the following terms describes the closet on the second floor?
answer
IDF
question
Which of the following is used to terminate individual wires from a 25 pair or 100 pair cable using female RJ-45 ports?
answer
Patch Panel
question
You want to use the T568B standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector?
answer
White/orange, orange, white/green, blue, white/blue, green, white/brown, brown
question
Which of the following methods would you use to create a crossover cable?
answer
Use the T568A standard on one connector, and the T568B standard on the other connector.
question
You need to replace a fiber optic cable that is connecting two switches together. You instpect the existing fiber cable and determine that it uses LC connectors. You also notice the cable's ferrule has a slight slant to it. Which polish grade should you use to replace the existing cable?
answer
Angled Physical Contact polish
question
Which type of polish grade uses green-colored connectors to help prevent using the wrong connector type?
answer
Angled Physical Contact
question
You've connected a cable certifier to an RJ45 wall jack, and the output shown below is displayed on the device. What does this output indicate? (Select two.)
answer
-The cable is functioning correctly -This is a crossover cable
question
Consider the 850 nm multimode fiber optic cable shown below. How much loss can you expect between the transmitter and the receiver?
answer
-1.2 dB
question
You are building a new network for a small startup financial services company... Both the switch and the BGIC modules use MT-RJ connectors... Will this implementation work?
answer
No, you shouldn't use multimode patch cables with single mode GBIC modules
question
#2 Will this implementation work?
answer
No, you should purchase path cables that use MT-RJ connectors
question
While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of CRC errors on one interface. This interface is connected to a user's workstation located in a cubicle on the 2nd floor. What could be causing this to happen?
answer
A strong emitter near the cable run connected to that interface
question
You are troubleshooting a connectivity problem in which one client system is unable to connect to a server. Both the server and client system are connected to the same Ethernet network switch. No other users have complained of a problem, and you suspect that faulty network cabling might be to blame. Which of the following troubleshooting steps are you most likely to perform first?
answer
Use a cable tester to test the cable between the computer system and the network switch.
question
Which of the following devices does not segment the network?
answer
Hub
question
Which of the following is a good reason to install a firewall?
answer
To prevent hackers from accessing your network.
question
Which of the following hardware devices links multiple networks and directs traffic between networks?
answer
Router
question
You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the Internet to provide users with Internet access. Since doing so, it has come to your attention that an intruder has invaded your network from the Internet on three separate occasions.
answer
Firewall
question
Which of the following is the best device to deploy to protect your private network from a public untrusted network?
answer
Firewall
question
Which of the following is a good reason to install a firewall?
answer
To prevent hackers from accessing your network.
question
You are the administrator of your company's network. You want to prevent unauthorized access to your intranet from the Internet. Which of the following should you implement?
answer
Firewall
question
Which of the following best describes how a switch functions?
answer
It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.
question
Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents? (Select two)
answer
Repeater Hub
question
How do switches and bridges learn where the devices are located on a network?
answer
When a frame enters a port, the source MAC address is copied from the frame header.
question
An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?
answer
Send the frame out port 2-8.
question
Which of the following devices does not segment the network?
answer
Hub
question
Which network component connects a device with the transmission media and allows it to send and receive messages?
answer
Network Interface card
question
What device sends signals from a computer onto a network?
answer
Transceiver
question
Which of the following statements accurately describes how a modem works? (Select two)
answer
It modulates digital data from the PC into analog data and transmits it on a telephone network. It demodulates analog data from a telephone network into digital PC data.
question
You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BaseTX switch ports. Which device should you use?
answer
Media converter
question
At which OSI model layer does a media converter operate?
answer
Layer 1
question
What type of module might a switch use to allow it to modify the media type supported by a switch port? (Select two)
answer
SFP GBIC
question
Which of the following is a valid MAC address?
answer
C0-34-FF-15-01-8E
question
Which of the following is a valid MAC address?
answer
AB.07.CF.62.16.BD
question
Which of the following is true about the MAC address? (Select two)
answer
It is typically represented by hexadecimal numbers. It is a 48-bit address
question
A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address?
answer
ARP
question
The media access control method of all Ethernet networks is____________.
answer
CSMA/CD
question
A network is connected following the IEEE 802.3 specifications. Which of the following best describes when a device can transmit messages?
answer
The device listens to determine if the transmission media is free.
question
The IEEE 802.3 committee describes the CSMA/CD media access method. Devices listen to the networks to determine if the transmission media is free before transmitting. Which of the following use the CSMA/CD access method? Select all that apply.
answer
10BaseT 1000BaseT
question
Which of the following physical topologies are used with Ethernet networks? (Select two)
answer
Star Bus
question
The media access control method of all Ethernet networks is
answer
CSMA/CD
question
Which of the following connectors is used with Ethernet 10BaseT networks?
answer
RJ-45
question
Which of the following use the CSMA/CD access method?(2 answers)
answer
1000BaseT, 10BaseT
question
A network is connected following the IEEE 802.3 specifications. Which of the following best describes when a device can transmit messages?
answer
The device listens to determine if the transmission media is free.
question
Which of the following physical topologies are used with Ethernet networks?(2 answers)
answer
Bus, Star
question
With an Ethernet 10BaseT network, the maximum cable length between a computer and the hub is:
answer
100 meters
question
Which of the following are requirements of the 1000BaseT Ethernet standards?(3 answers)
answer
CAT 5e cabling RJ-45 connectors The cable length must be less than or equal to 100m
question
You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose?(2 answers)
answer
1000BaseLX Single Mode Fiber
question
You have been tasked with designing a high-speed Ethernet network. Your client's building already has 150 ohm shielded twisted pair wiring installed. Due to budget constraints, they have asked you to reuse the existing wiring instead of installing new fiber optic cabling. Which Ethernet standard could you implement in this situation?
answer
1000BaseCX
question
Your network follows the 100BaseTx specifications for Fast Ethernet. What is the maximum cable segment length allowed?
answer
100 meters
question
Which of the following Ethernet standards uses fiber optic cabling?(2 answers)
answer
100BaseFX 1000BaseLX
question
You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings; some of which are around 300 m apart. Fiber-optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling that operates at full-duplex. Which Ethernet standard meets these guidelines?(2 answers)
answer
1000BaseSX, 10GBaseSR
question
Which Gigabit Ethernet standard uses multimode fiber-optic cabling and supports network segments up to a maximum of 550 m long?
answer
1000BaseSX
question
What type of cabling is used with 100BaseTX Fast Ethernet networks?
answer
Type 1A STP or Category 5 UTP
question
What is the minimum cable specification that supports 1000 Mbps Ethernet?
answer
Cat 5
question
What topology is used with 100BaseTX Fast Ethernet networks?(2 answers)
answer
Physical star/logical bus, Physical star/logical star
question
Which Gigabit Ethernet standard can support long network segments up to a maximum of 5 km when used with single mode fiber-optic cable?
answer
1000BaseLX
question
Ethernet 100BaseFX networks use what type of cabling?
answer
Fiber-optic
question
Your network follows the 100BaseFX specifications for Fast Ethernet, and uses half-duplex, multimode cable. What is the maximum cable segment length allowed?
answer
412 meters
question
Which of the following standards is used by SONET?
answer
10GBaseLW
question
You are planning a network for an educational campus. Due to the size of the buildings and the distance between them, you have elected to use 10BaseFL hubs, cabling, and network interface cards. What is the maximum length for the network cable between a workstation and a hub?
answer
2000 meters
question
You would like to implement 10 Gbps Ethernet over a distance of 1 km or greater. Which of the following would be the minimum requirement for the implementation?(2 answers)
answer
10GBaseLR standards Single mode fiber
question
You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks?
answer
Manually reconfigure the default route to point to the new next hop router.
question
Which of the following is a characteristic of static routing when compared to dynamic routing?
answer
All routers must be manually updated on the router.
question
Network needs to support 1000 Mbps over ethernet. What cables must you replace?
answer
cat 3 cat4
question
Workstation -> Router Config Port. What cable?
answer
Rollover
question
Which standard is typically used in a rollover cable?
answer
RJ-232
question
Workstation -> Switch through regular port (not uplink) and switch doesn't support auto-mdi.
answer
Straight Through
question
Which connector is usually on one end of a rollover?
answer
serial
question
You want to create a rollover cable that has an RJ-45 connector on both ends. How should you connect the wires within the connectors?
answer
Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5
question
You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use?
answer
Crossover
question
You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?
answer
Crossover
question
You have two switches that you need to connect using their uplink ports. The switches do not support auto-MDI. Which type of cable should you use?
answer
Crossover
question
You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use?
answer
Straight-through
question
You have purchased a new router that you need to configure. You need to connect a workstation to the router's console port to complete the configuration tasks. Which type of cable would you most likely use?
answer
Rollover
question
Which of the following connectors is typically used on one end of a rollover cable?
answer
Serial
question
Which of the following standards is typically used in a rollover cable?
answer
RS-232
question
Using the exhibit to match the connector type on the left with the corresponding letter on the right.
answer
A- DB-25 B- DB-9 C- RJ45 D- RJ11 E- LC F- BNC G- F-Type
question
You want to create a rollover cable that has an RJ-45 connector on both ends. How should you connect the wires within connectors?
answer
Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6 and pin 4 to pin 5
question
You are implementing a SOHO network for a local business. The ISP has already installed and connected a cable modem in the business. The business has four computers that need to communicate with each other and the Internet. The ISP's cable modem has only one RJ-45 port. You need to set up the network with the following in mind: Spend as little money as possible. Do not purchase unnecessary equipment. Computers need to have a gigabit connection to the network. New devices should not require management or configuration
answer
An unmanaged switch and CAT5e cabling
question
You manage the two-location network shown in the exhibit. Workstations and servers at each location connect to a patch panel using behind-the-wall wiring. The patch panel.... Drag the cable type on the left to the most appropriate network location on the right.
answer
Drop Cables Cat6 straight-through UTP Patch Cables Cat6 straight-through UTP Uplink Cables Cat6 crossover UTP WAN Cable Single-mode fiber optic
question
You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. Which of the following best describes what happens to network connections?
answer
No devices will be able to communicate
question
Which of the following can be performed by a TDR? (Select two.)
answer
Identify the location of a fault on a cable. ; Measure the length of a cable.
question
You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100 Mbps. Which tool should you use to test the drop cable and the connection to the network?
answer
Certifier
question
You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat 6e cable to connect the wiring closet to the shipping building. Which of the following should you include in your plan.
answer
Repeater
question
Users report that the Internet is no longer accessible. You suspect that the line connecting your building to the Internet is not working properly. Which of the following allows the service provider to remotely test the local loop?
answer
Smart Jack
question
A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server. Which of the following troubleshooting actions are you most likely to perform first?
answer
Replace the network card in the user's computer
question
You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the UTP patch cable is run 75 feet from the wall outlet, passes through the ceiling and over several florescent light fixtures before reaching the client system. Which of the following may be a cause of the connectivity problem?
answer
EMI interference
question
You are moving a client to a new location within an Ethernet network. Previous to the move, the client system did not have difficulty accessing the network. During the relocation, you attach a patch cable from the client system to the wall jack from the patch panel to the switch. Once connected you do not get a link light on the network card or the switch. You swap out the cable running between the patch panel and the switch with a known working one but you can still not connect. Which of the following might you suspect as the problem?
answer
Failed patch cable between the client system and the wall jack
question
You have decided to implement Gigabit Ethernet on your network. Each switch port is connected to a single device. Following the installation, you find one device connected to a switch that is only running at 100 Mbps. Which of the following are likely causes?
answer
Crosstalk
question
You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building. Which of the following conditions are you most likely to experience?
answer
Attenuation
question
You have a cable Internet connection at home. The installer had connected the router near the outside wall of your house with RG-6 cable. You move the cable router a distance of 50 meters using RG-8 cables and special connector adapters. Which condition are you most likely to experience?
answer
Echo
question
You want to measure the voltage, amps, and ohms of various devices. What tool should you use?
answer
Multimeter
question
You've connected a cable certifier to an RJ-45 wall jack and the output shown below is displayed on the device. What does this output indicate? 1 xxxxxxxxxxxxxxxxxxxxxxx 1 2 xxxxxxxxxxxxxxxxxxxxxxx 2 3 ------------------------------- 3 4 ------------------------------- 4 5 ------------------------------- 5 6 ------------------------------- 6 7 ------------------------------- 7 8 ------------------------------- 8 A. Pins 1 and 2 are crossed-over. B. Pins 1 and 2 are open. C. The cable is functioning correctly. D. Pins 1 and 2 are shorted.
answer
D. Pins 1 and 2 are shorted.
question
Users are complaining that sometimes network communications are slow. You use a protocol analyzer and find that packets are being corrupted as they pass through a switch. You also notice that this only seems to happen when the elevator is running. What should you do?
answer
Install shielded cables near the elevator
question
Upon conducting a visual inspection of the server room, you see that a switch displays LED collision lights that are continually lit. You check the LED on the corresponding workstation and see that it is flashing rapidly even though it is not sending or receiving network traffic at that time. What is the cause of the network collision?
answer
Faulty network card.
question
You have been asked to document the wiring in the building. You would like to identify the length of each Cat5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use?
answer
TDR.
question
Users report that the Internet is no longer accessible. You suspect that the line connecting your building to the Internet is not working properly. Which of the following allows the service provider to remotely test the local loop?
answer
Smart jack.
question
The phone line to one office is not working. You have identified the location of the phone line in a 66 block in the wiring closet. Which tool would you use to connect to the phone line at the punchdown block to see if you can make or receive calls?
answer
Butt set.
question
You want to create a loopback plug using a single RJ-45 connector. How should you connect the wires in the connector?
answer
Connect pin 1 to pin 3 and pin 2 to pin 6.
question
You are working with an existing fiber optic installation in your building. You want to know how long each length of cable is that runs through walls. Which tool should you use?
answer
OTDR
question
You want to measure the voltage, amps, and ohms of various devices. Which tool should you use?
answer
Multimeter.
question
During a network infrastructure upgrade, you have replaced two 10 Mbps hubs with switches and upgraded from Category 3 UTP cable to Category 5e. During the process, you accidentally cut the Cat 5e patch cable that stretches from the network printer to the upgraded switch. What is the impact on the network?
answer
All network nodes, with exception of the printer, will be available.
question
You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat 6e cable to connect the wiring closet to the shipping building.Which of the following should you include in your plan?
answer
Repeater.
question
Which of the following best describes the condition where a signal sent on one wire is received on another wire within the same connector?
answer
NEXT.
question
You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. Which of the following best describes what happens to network communications?
answer
No device is able to communicate.
question
You're responsible for implementing network cabling in a new network installation. The cabling will be installed in a manufacturing environment where there is a great deal of electromagnetic interface (EMI). Which type of cabling would operate best in this environment?
answer
Shielded twisted pair cable. Fiber-optic cable.
question
You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building. Which of the following are you most likely to experience?
answer
Attenuation.
question
You have a cable Internet connection at home. The installer had connected the router near the outside wall of your house with RG-6 cable. You move the cable router a distance of 50 meters using RG-8 cables and special connector adapters. Which condition are you most likely to experience?
answer
Echo.
question
You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the UTP patch cable is run 75 feet from the wall outlet, passes through the ceiling and over several florescent light fixtures before reaching the client system. Which of the following may be a cause of the connectivity problem?
answer
EMI interfaace.
question
You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100 Mbps. Which tool should you use to test the drop cable and the connection to the network?
answer
Certifier.
question
A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server. Which of the following troubleshooting actions are you most likely to perform first?
answer
Replace the network card in the user's computer.
question
You have a network connected using a physical star topology. One of the drop cables connecting a workstation is removed. Which of the following best describes what happens to network communications?
answer
All devices except the device connected to the drop cable will be able to communicate.
question
You have a network using a full physical mesh topology. The link between device A and device B is broken. Which of the following best describes what happens to network communications?
answer
Device A will be able to communicate with all other devices.
question
You have decided to implement Gigabit Ethernet on your network. Each switch port is connected to a single device. Following the installation, you find one device connected to a switch that is only running at 100 Mbps. Which of the following are likely causes?
answer
Crosstalk.
question
Which of the following tests can be performed by a TDR?
answer
Measure the length of a cable. Identify the location of a fault on a cable.
question
You have just connected four new computer systems to an Ethernet switch using spare patch cables. After the installation only three systems are able to access the network. You verify all client network settings and replace the network card in the failed system. The client is still unable to access the network. Which of the following might you suspect as the real cause of the problem?
answer
Failed patch cable.
question
You are moving a client to a new location within an Ethernet network. Previous to the move, the client system did not have any difficulty accessing the network. During the relocation, you attach a patch cable from the client system to the wall jack and from the patch panel to the switch. Once connected you do not get a link light on the network card or the switch. You swap out the cable running between the patch panel and the switch with a known working one but you can still not connect. Which of the following might you suspect as the problem?
answer
Failed patch cable between the client system and the wall jack.
question
You are troubleshooting a connectivity problem in which one client system is unable to connect to a server. Both the server and the client system are connected to the same Ethernet network switch. No other users have complained of a problem, and you suspect that faulty network cabling might be to blame. Which of the following troubleshooting steps are you most likely to perform first?
answer
Use a media tester to test the cable between the computer and the network switch.
question
You have just been hired as a network administrator. A user has just changed offices and needs you to activate the network and telephone communications in his office. However, the wiring at the punch down block is labeled poorly and you are unable to tell which wires go to the user's office. What should you do?
answer
Use a tone generator to locate the correct wiring.
question
You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wall to hang a picture and pierces the cable such that a signal sent on pin 1 arrives on the cable connected to pin 7. What term describes this condition?
answer
Short circuit.
question
Which of the following is a valid IPv4 address?
answer
2.2.2.2 172.16.1.26
question
Consider the following IP addresses. 1) 124.77.8.5 2) 131.11.0.9 3) 190.66.250.10 4) 196.5.89.44
answer
Class A, Class B, Class B, Class C
question
Which three of the following IP addresses are Class B addresses? (
answer
190.65.2.0 129.0.0.0 132.12.0.0
question
Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select all that apply.)
answer
129.0.0.1 191.168.2.15 168.16.5.1
question
What is the default subnet mask for the IP address 203.111.3.3?
answer
255.255.255.0
question
How would you identify the address and mask using CIDR notation?
answer
129.11.99.78/16
question
Which of the following best describes how addressing is configured for the subnet?
answer
Supernetting
question
Which of the following describes the address type?
answer
Classless
question
Which organization is responsible for allocating public IP addresses?
answer
IANA
question
Which of the following best describes the purpose of using subnets?
answer
Subnets divide an IP address into multiple network addresses.
question
Which network IDs will be assigned to these subnets in this configuration? (Select two.)
answer
172.17.0.0 172.17.128.0
question
Which address would you use for the default gateway address? http://i.imgur.com/rFLX29Z.png
answer
The IP address assigned to Fa0/0 on Router1.
question
From the dropdowns, select the apropriate parameters to configure the workstation's TCP/IP settings. http://i.imgur.com/8aj359P.png
answer
IP Address 192.168.12.46 Subnet Mask 255.255.255.240 Default Gateway 192.168.12.34 DNS Server 198.162.1.22
question
Which of the following would be the best action to take in order to fix the problem?
answer
Implement an IP Helper address on the router.
question
Which of the following IP addresses ranges is reserved for Automatic Private IP Addressing?
answer
169.254.0.1 - 169.254.255.254
question
What is the network address and subnet mask used by APIPA?
answer
255.255.0.0 169.254.0.0
question
CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use APIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other but you are having trouble configuring Internet access. What is the likely cause of the problem?
answer
Private addresses cannot directly communicate to hosts outside the local subnet.
question
After installing a new DHCP server on the network, you need to verify that the network devices are receiving IP addresses via DHCP. You reboot a Windows XP client system and using the ipconfig command, receive the following information: Ethernet adapter Local Area Connection 1: Description: CardBus-II 10/100 PC Card Physical Address : 02-00-4C-3F-50 DHCP Enabled : Yes Auto configuration Enabled : Yes Auto configuration IP Address : 169.254.25.129 Subnet : 255.255.0.0 Default Gateway: DNS Servers: Which of the following statements are true?
answer
The client system is unable to reach the DHCP server. The client system is configured to use DHCP.
question
You have configured your organization's DHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days. A user's workstation is powered on and receives addressing information from this DHCP server Monday morning at 8 am. When will the client contact the DHCP?
answer
Wednesday morning
question
Which two of the following statementsabout the Dynamic Host Configuration Protocol (DHCP) are true?
answer
It can deliver other configuration information in addition to IP addresses. A DHCP server assigns addresses to requesting hosts.
question
Which of the following strategies are used to prevent duplicate IP addresses being used on a network?
answer
Install a DHCP server on the network. Use Automatic Private IP Addressing.
question
You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use?
answer
DHCP Server.
question
You are implementing a DHCP server for your segment. Your segment's IP address is 192.168.1.0. Your default gateway address is 192.168.1.254. Your DNS server address is 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments. YOu configured the 03 Router option on your DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP address information dynamically, your users complain that they are unable to access web sites on the Internet. How can you resolve this problem?
answer
You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06).
question
Due to widespread network expansion, you have decided to upgrade the network by configuring a DHCP sever for the network uses Linux, Windows, and Mac OS X client systems. You configure the server to distribute IP addresses from 12.168.2.1 to address 192.168.2.100. You use the subnet mask of 255.255.255.0. after making al setting changes on the DHCP sever, you reboot each client system but they are not able to obtain an ip address from the dhcp server. Which of the following would explain the failure?
answer
the clients must be configured to obtain ip addressing from a dhcp server
question
You have a TCP/IP network with 50 hosts. There has been inconsistant communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned. Which protocol can you implement on your network to help prevent problems such as this?
answer
DHCP
question
You are configuring the DHCP Relay Agent role service on a Windows server. Which of the following is a required step for the configuration?
answer
Specify which server network interface the agent listens on for DHCP messages.
question
You have a Windows Server 2012 system that you want to use as a DHCP Relay Agent. Which Windows Server 2012 service would you sue to do this?
answer
Routing and Remote Access
question
You need to configure a Cisco RFC 1542 compliant router to forward any recieved DHCP frames to the appropriate subnet. The address of the remote DHCP server is 172.16.30.1. Which of the following commands would be used to configure the router?
answer
IP helper-address 172.16.30.1
question
You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com Which device would you use?
answer
DNS server
question
You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which protocol should you implement?
answer
DNS
question
Listed below are several DNS record types. Match the record the on the left with its function on the right.
answer
Points a hostname to an IPv4-A Provides alternate names to hosts that already have a host record.-CNAME Points an IP address to a hostname-PTR Points a hostname to an IPv6 address-AAAA identifies servers that can be used to deliver mail.-MX
question
Listed below are several DNS record types. Match the record type on the left with its function on the right.
answer
Identify a domain controller- SRV
question
which of the following services automatically creates and deletes host records wen an ip address lease is created or released?
answer
DYNAMIC DNS
question
If dynamic DNS is being used, which of the following events will cause a dynamic update of the host records?
answer
The DHCP server renews an ip address lease The ipconfig/release command is entered on a workstation.
question
Which of the following are valid IPv6 IP addresses?
answer
6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1
question
Which of the following is a valid IPv6 address?
answer
FEC0::AB:9007
question
Match the IPv6 address configuration method on the right with it's definition on the left.
answer
Static Full Assignment: The entire 128-bit address and all other configuration information is statically assigned to the host.
question
Which of the following tunneling methods is used to send IPv4 traffic through an IPv6 network?
answer
4-to-6 tunneling
question
You manage a network with two locations: Portland and Seattle. Both locations are connected to the Internet. All computers in both locations are configured to use IPv6. You would like to implement an IPv6 solution to meet the following requirements: Hosts in each location should be able to use IPv6 to communicate with hosts in the other location through the IPv4 Internet. You want to use a site-to-site tunneling method instead of a host-to-host tunneling method. Which IPv6 solution should you use?
answer
6-to-4
question
Which of the following are characteristics of Teredo tunneling?
answer
Works through NAT dual stack hosts tunnel endpoints configured on hosts
question
You have a special server at work with a custom application installed. Connections to the server that use custom application must use IPv6. The server is currently running IPv4. You are the only person who connects to the server, and you always use your laptop for the connection. Your laptop supports both IPv4 and IPv6. The rest of your company network runs only IPv4. You need a cost effective solution to allow your laptop to connect to the server. Your solution must also support communication through NAT servers. Which method should you use?
answer
Miredo
question
You manage a network that uses IPv6 addressing. When clients connect devices to the network, they generate an interface ID and use NDP to leanrthe subnet prefix and default gateway. Which IPv6 address assignment method is being used?
answer
Stateless auto configuration
question
Which type of address is used in a packet to address the packet to a single host?
answer
Unicast
question
Which type of address is the IP address 198.162.12.254/24?
answer
Unicast
question
Which of the following address types is shared by multiple hosts, and is used to form groups of computers that should receive the same data stream?
answer
Multicast
question
Which type of address is the IP address 232.111.255.250?
answer
Multicast
question
Which protocol does an IP host use to inform a router that it wants to receive specific multicast frames?
answer
IGMP
question
A video conference consisting of multiple participants uses ___________ network transmissions.
answer
multicast
question
You administer a network with windows 200 unix servers, ad windows 2000 professionl, windows 98, and macintosh clients. A user of a windows 98 computer calls you one day and says he is unable to access respurces on the network. You type IPCONFIG on the users computer and receive the following output 0 ethernet adapter
answer
Unavailable DHCP server
question
You want to be able to view the DNS server address that a computer is using. Which of the following utilities would you use
answer
ifconfig Ipconfig
question
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet This workstation can communicate with some hosts on private network, but not with other host. You run IPCONFIG/ALL and see the following: Ethernet adapter Local Area Connection : Connection- specific DNS Suffix . : mydomain . local Description . . . Broadcom network adapter Physical Address . : 00 - AA-BB-CC-74-EF DHCP Enabled . . . . . . . No Autoconfiguration Enabled . Yes IPv4 Address 192 . 168 . 1 . 102(Preferred) Subnet Mask . 255 . 255 . 0 . 0 Default Gateway : 192 . 168 . 1.1 DNS Servers . . 192 . 168 . 2 . 20 192.168.1.27
answer
Incorrect Subnet mask
question
This workstation can communicate with some hosts on the private network, but not with other hosts. you run ifconfig /all and see the following. What is the most likely cause of the problem?
answer
Incorrect default gateway
question
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet which uses the default subnet mask. This workstation cannot communicate with any other hosts on private network. You run IPCONFIG/ALL and see the following: Ethernet adapter Local Area Connection : Connection- specific DNS Suffix . : mydomain . local Description . . . Broadcom network adapter Physical Address . : 00 - AA-BB-CC-74-EF DHCP Enabled . . . . . . . No Autoconfiguration Enabled . .: Yes IPv4 Address 192 .... :168 . 1 . 102(Preferred) Subnet Mask ..........: 255 . 255 . 225 . 0 Default Gateway ...: 192 . 168 . 1.1 DNS Servers . ......: 192 . 168 . 2 . 20
answer
Incorrect ip address
question
You work in an office that uses NetWare servers and Windows NT 4.0 servers.The network uses both the TCP/IP and IPX/SPX protocols. You are sitting at a workstation that uses Windows 95 OSR2.An application you are using is unable to contact Windows NT server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?
answer
Ping
question
Your computer is sharing information with remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection?
answer
netstat
question
You administer a NetBIOS-based network that uses the TCP/IP protocol.You are trying to troubleshoot a computer that is unable t ocontact a server by its Net BIOS name.Which command can you use to check the connection?
answer
Nbstat
question
Which command displays network activity statistics for TCP,UDP, and IP?
answer
Netstat -s
question
You have been called in to troubleshoot a connectivity problem on a newly installed Windows Server 2003 system.The system is operating satisfactorily and is able to communicate with other systems on the local network.However it is unable to access any systems on other segments of the corporate network. You suspect that the default gateway parameter for the system has not been configured,or may be configured incorrectly.Which of the following utilities are you most likely to use to view the default gateway information for the system?
answer
Ipconfig
question
While working on a Linux server, you are unable to connect to Windows Server 2003 system across the Internet.You are able to ping the default gateway on your own network, so you suspect that the problem lies outside of the local network. Which utility would you use to track the route a packet takes as it crosses the network?
answer
Traceroute
question
Which TCP/IP utility gives you the following output? interface: 192.168.4.101 on interface 0x3 internet address physical address type 192.168.1.23 00-d1-b6-b7-c2-af dynamic
answer
arp
question
Which TCP/IP utility gives you the following output? Local Area Connection: Node IpAddress:
answer
Nbstat -c https://o.quizlet.com/cuLHHIgTEFswqyGwZaGiGg_m.jpg
question
Which TCP/IP utility gives you the following output? Route Table Interface List
answer
Netstat -r https://o.quizlet.com/LyNp4u7GjQxK1EU9jq.8kA_m.jpg
question
Which TCP/IP utility gives you the following output? Reply from 192.168.1.168
answer
Ping https://o.quizlet.com/UUFdBdCl2VrM7yxasvHruA_m.jpg
question
Which TCP/IP utility gives you the following output? Active Connections Proto/ local address/ foreign address/ state
answer
Netstat -a https://o.quizlet.com/pUFh84lq3OHHReImwqKOYA_m.jpg
question
Which TCP/IP utility gives you the following output? Interface:192.168.1.111
answer
Arp -a https://o.quizlet.com/bM7q1MOfoeZF0oavj.3paA_m.jpg
question
Which TCP/IP utility gives you the following output? Ethernet adapter Local Area Connection:
answer
Ipconfig https://o.quizlet.com/Kz2Kjb2AHxp62FAjXwzzBw_m.jpg
question
Examine the following output: Active Connections Proto local address foreign address state Which of the following utilities produced this output?
answer
Netstat
question
Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently?
answer
Arp
question
You need to perform a reverse lookup of the 10.0.0.1 IP address. Which command can you use to accomplish this? (Select two. Each response is a complete solution.) A. nbtstat -a 10.0.0.3 B. ipconfig /dnslookup 10.0.0.3 C. dig -x 10.0.0.3 D. nslookup 10.0.0.3 E. arp 10.0.0.3
answer
dig -x 10.0.0.3 nslookup 10.0.0.3
question
Mary calls to tell you that she can't connect to an intranet server called WebSrvl. From her computer, you ping the server's IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem? A. tracert B. nslookup C. nbtstat D. netstat E. arp
answer
nslookup
question
You are troubleshooting a network connectivity issue on a Unix system. You are able to connect to remote systems by using their IP address, but unable to connect using the hostname. You check the TCP/IP configuration, and note that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Choose two .) A. traceroute B. tracert C. dig D. nslookup
answer
dig nslookup
question
Examine the following output : Server : helicuplar.xct.takro.net Address : 209.53.4.130 Name : westsim.com Address : 64.78.193.84 Which of the following utilities produced this output? A. nslookup B. tracert C. ipconfig D. netstat
answer
nslookup
question
Consider the following output from a dig command run on a Linux system. ; ;; DiG 8 .2 ;; westsimlll.com ;;res options :init recurs defnam dnsrch ;;got answer : ;;-;;HEADER;; -opcode :QUERY , status : NOERROR , id :4 ;;flags : qr rd ra ; QUERY :l , ANSWER :l , AUTHORITY :2, ADDITIONAL :0 ;;QUERY SECTION : ;; westsimlll.com , type= A , class= IN ;;ANSWER SECTION : westsimlll .com . 7h33m IN A 76 .141 .43 .129 ;;AUTHORITY SECTION : westsimlll .com . 7h33m INNS dnsl .deriatctlll .com. westsimlll.com. 7h33m INNS dns2.de riatct222.com . ;;Total query time : 78 msec ;;FROM: localhost .localdomain to SERVER :default -- 202 .64 .49 .150 ;;WHEN: Tue Feb 16 23 :21 :24 2005 ;;MSG SIZE sent : 30 rcvd :l03 which of the following utilities produced this output?
answer
Dig
question
Consider the following output from a dig command run on a Linux system. ; ;; DiG 8 .2 ;; westsimlll.com ;;res options :init recurs defnam dnsrch ;;got answer : ;;-;;HEADER;; -opcode :QUERY , status : NOERROR , id :4 ;;flags : qr rd ra ; QUERY :l , ANSWER :l , AUTHORITY :2, ADDITIONAL :0 ;;QUERY SECTION : ;; westsimlll.com , type= A , class= IN ;;ANSWER SECTION : westsimlll .com . 7h33m IN A 76 .141 .43 .129 ;;AUTHORITY SECTION : westsimlll .com . 7h33m INNS dnsl .deriatctlll .com. westsimlll.com. 7h33m INNS dns2.de riatct222.com . ;;Total query time : 78 msec ;;FROM: localhost .localdomain to SERVER :default -- 202 .64 .49 .150 ;;WHEN: Tue Feb 16 23 :21 :24 2005 ;;MSG SIZE sent : 30 rcvd :l03 What is the IP address of the DNS server that performed this name resolution? A. 202.64.49.150 B. 76.141.43.129 C. 192.168.1.100 D. 16.23.21.24
answer
202.64.49.150
question
A user reports that he can't browse to a specific Web site on the Internet. From his computer, you find that a ping test to the Web server succeeds. A trace route test shows that 17 hops to the destination Web server. What is the most likely cause of the problem?
answer
incorrect DNS server address
question
Match each switch management method on left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all.
answer
Competes with normal network traffic for bandwidth. In-band Management
question
Uses a dedicated communication channel.
answer
Out-of-band management
question
Does not compete with normal network traffic for bandwidth.
answer
Out-of-band management
question
Affected by network outages.
answer
In-band management
question
Match each switch management method on left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all.
answer
Commonly sold at retail stores Unmanaged switch
question
Provide port security features.
answer
Managed switch
question
Support VLANs
answer
Managed switch
question
Provide very few configuration options
answer
Unmanaged switch
question
Can be configured over a network connection
answer
Managed switch
question
Can be configured over a dedicated communication channel
answer
Managed switch
question
You reconfiguring PuTTY to be used to access the CLI of Cisco switch Which of the following configuration values would PuTTY from connection? (Select two.)
answer
4600 baud Flow contro = RTS/CTS
question
Match the Cisco device password type on the left with its function on the right
answer
Controls the ability to log on through a LAN or WAN interface configured on the device VTY
question
Controls the ability to switch configuration modes
answer
EXEC
question
Controls the ability to connect to the device using a direct connection
answer
Console
question
A router is configured with the login, no password condition for console access. Which of the following statements is true about access via a Telnet or SSH session?
answer
Access is denied
question
Which command would you use on a switch to enable management from a remote network?
answer
IP default-gateway 192.168.10.185
question
What does the ip address dhcp command allow you to do?
answer
Configures the switch to obtain an IP address from a DHCP server
question
You are configuring a switch so that you can manage it via PuTTY from the same network segment as the switch. On the switch, you enter the following commands. Switch# config terminal switch(config)#interface Evian 1 switch(config-if)#ip- address 192.168.1.10 225.225.225.0 will this configuration work?
answer
No, the no shutdown command needs to be entered
question
You need to configure the FastEthernet 0/1 interface on a switch to automatically detect the appropriate link speed and duplex setting by negotiating with the device connected to the other end of the link.
answer
Enter global configuration mode: conf t Enter interface configuration mode: int fa0/1 Set the speed of the interface: speed auto Set the duplex setting for the interface: duplex auto
question
You need to disable the FastEthernet 0/0 interface on a switch.
answer
Enter global configuration mode: conf t Enter interface configuration mode: int fa0/0 Disable the interface: shutdown Verify the interface is disabled: show ip interface brief
question
The FastEthernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected to it.
answer
Enter global configuration mode: conf t Enter interface configuration mode: int fa0/0 Verify the interface is disabled: show interface status Enable the interface: no shut
question
A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame?
answer
Send it out all ports except for the port it was received on
question
Which of the following are reasons to configure VLAN's on a switch as opposed to using switches without VLANs?
answer
Increased Security Increased Number of broadcast domains
question
Which of the following benefits apply only to creating VLANs with switches and not to segmenting the network with regular switches?
answer
You can create multiple broadcast domains
question
you have two switches connected together as shown in the following diagram. How many broadcast domains are there in the network?
answer
2 https://o.quizlet.com/Z6BnjbjMYsaLmZmc-GKXrA_m.jpg
question
Which of the following statements describe how VLANs effect broadcast traffic within an internetwork?
answer
Devices on the same VLAN have the same subnet address Broadcast traffic is transmitted only within a VLAN
question
Which of the following are true using multiple VLANS on a single switch? select two
answer
The number of broadcast domains increases The number of collision domains remain the same
question
A virtual LAN can be created using which of the following?
answer
Switch
question
You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose?
answer
Switch
question
Which of the following best describes the concept of VLAN?
answer
Devices on the same network logically grouped as if they were on separate networks
question
When configuring VLANs on a switch, what is used to identify VLAN membership of a device?
answer
Switch port
question
You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAn 2 on each switch. A device on the first switch in VLAN 1 needs to be communicate with a device on the same switch is VLAN 2. What should you configure so that the two devices can communicate?
answer
Routing
question
You need to keep users in all other departments from accessing the servers used by the finance department. Which of the following technologies should you use to logically isolate the network?
answer
VLANs
question
You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches?
answer
Trunking
question
You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1. What should you configure to allow communication between these two devices through the switches?
answer
Trunking
question
When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?
answer
Trunk Ports
question
Computers A and B are on the same VLAN and are separated by two switches, as shown in the exhibit. Computer A sends a Fram to Computer B. Which of the following best describes the composition of the frame as it travels from A to B?
answer
Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B. https://o.quizlet.com/ZXuHFRJJYz-K312JoixhDQ_m.jpg
question
Which of the following statements accurately describes a VLAN ID?
answer
Switches append a VLAN ID to the header of each frame to identify the virtual network to which it belongs.
question
Which of the following features dynamically places switch ports in blocking or forwarding states?
answer
Spanning tree
question
You manage a network that uses multiple switches. You want to provide muliple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support?
answer
Spanning tree
question
What problem does the Spanning Tree protocol prevent?
answer
Switching loops from developing when redundant paths are implemented between switches.
question
Which of the following are advantages of using the Spanning Tree Protocol (STP) in network segmented bridges?
answer
Prevents message loops from forming Identifies the optimal path between network devices. Lets you provide redundancy by using more then one connection between devices, making your network more reliable.
question
Which statements accurately describes port states of both bridges and switches?
answer
Ports in a blocked state still receive BPDUs In the learning state the MAC address table can be populated, but frames not forwarded.
question
A switch running STP is a backup bridge. What state is it in?
answer
Blocking
question
Switches running the STP are in the process of exchanging BPDUs and defining their roles. In what state are the switches?
answer
listening
question
A switch running STP is in a learning state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do?
answer
It uses the source MAC address and network segment information to build its bridge database, but does not forward the message
question
A switch running STP is in the listening state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do?
answer
It does not record the address or segment information. It does not forward the message
question
You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, which switch will become the root bridge?
answer
B https://o.quizlet.com/2Mk28Vj6wjskTBM634DYUA_m.jpg
question
You have two switches connected as shown in the Exhibit. You would like to configure rapid spanning tree on switch A. On which ports would you use portfast command?
answer
Fa0/1 and Fa0/2 https://o.quizlet.com/wkgr.uRilCSEVQ.XhO4YtQ_m.jpg
question
You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, how can your force Switch C to become a root bridge?
answer
Configure a priority number of 4096 for switch C https://o.quizlet.com/sHRpgtG8UoHBbTt.nWMaEQ_m.jpg
question
You have three switches configured as shown in the Exhibit. How can you guarantee that switch C becomes the root bridge?
answer
Configure switch C with a lower priority value https://o.quizlet.com/sh3LEJ9djzFNTC9QOeMkpw_m.jpg
question
You need to configure spanning tree on a Cisco switch. You'd like to use a protocol that confirms to the 802.1w standards. Which protocol should you use?
answer
Rapid PVST+
question
Match the Etherchannel protocol on the left with its characteristics on the right.
answer
Desirable mode places the port in a negotiating state. Port Aggregation Protocol (PAgP)
question
Based on the 802.3ad standard
answer
link Aggregation control protocol(LACP)
question
Passive mode places the port into a passive negotiation state.
answer
link aggregation control protocol (LACP)
question
Auto mode places the port into a passive negotiating state.
answer
Port Aggregation Protocol (PAgP)
question
Active more places the port in a negotiating state.
answer
link Aggregation control protocol(LACP)
question
You manage a network with a single switch. On each switch port, a hub connects multiple devices to the switch. which condition are you most likely to experience on the network ?
answer
collisions
question
select the statement that best describes a broadcast storm.
answer
A Broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth..
question
Which of the following solutions would you implement to eliminate switching loops?
answer
spanning tree
question
You manage a network that uses a single switch. All ports within your buildings connect through he single switch . Which feature should you implement?
answer
VLANs
question
You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support?
answer
spanning tree
question
You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive doc. What should you use for this situation?
answer
VLAN
question
You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active patch between any two switches?
answer
Spanning tree
question
Which feature prevents switching loops and ensures there is only a single active path between any two switches?
answer
spanning trees
question
A user reports that network access from her workstation is very slow. The problem does not seem to be affecting any other users. Which of the following conditions is the most likely cause?
answer
Duplex mismatch
question
You manage a local area network with several switches. A new employee has started today so you connect her workstation to a switch port. Which of the following is the most likely cause of the problem?
answer
Incorrect VLAN assignment
question
You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of a broadcast storm?
answer
Enable spanning tree on the switches
question
Which of the following solutions would you implement to eliminate switching loops?
answer
spanning tree
question
While viewing the status of the interfaces on a Cisco switch, you see abnormally large of oversized ethernet frames being received on one interface. This interface is connected to a workstation located on the 2nd floor. What could be causing this to happen?
answer
The workstation's network board is jabbering
question
The network board in a workstation is currently configured as follows:
answer
show running-config interface show interface
question
You want to be able to view the DNS server address that a computer is using. Which of the following utilities would you use?
answer
ipconfig. ifconfig.
question
Examine the following output: Active Connections Proto Local Address Foreign Address State TCP SERVER1:1036 localhost:4832 TIME_WAIT TCP SERVER1:4798 localhost:1032 TIME_WAIT TCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAIT TCP SERVER1:2150 cpe-66-67-255-118.roc.res.rr.com:14100 ESTABLISHED TCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHED TCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHEDWhich of the following utilities produced this output?
answer
Netstat
question
Which TCP/IP utility gives you the following output?
answer
nbtstat -c.
question
Which TCP/IP utility gives you the following output? Interface: 192.168.4.101 on Interface 0x3 Internet Address Physical Address Type 192.168.1.23 00-d1-b6-b7-c2-af dynamic
answer
arp.
question
You are troubleshooting a connectivity problem on a Linux server. You are unable to connect to another system on the local network, but are not able to connect to a server on a remote network. You suspect that a default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on a Linux server?
answer
ifconfig.
question
Which TCP/IP utility gives you the following output? Reply from 192.168.1.68: bytes=32 time;10ms TTL=128 Reply from 192.168.1.68: bytes=32 time;10ms TTL=128Reply from 192.168.1.68: bytes=32 time;10ms TTL=128Reply from 192.168.1.68: bytes=32 time;10ms TTL=128 Packets: Sent = 4, Received = 4, Lost = 0 , Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms
answer
ping.
question
While troubleshooting a problem on a Linux system, you run a utility that generates the following output:
answer
traceroute
question
You manage a network with multiple subnets connected to the Internet. A user reports that she can't access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on the subnet, however the computer does access other computers on other subnets as well as the Internet. Which of the following is most likely the cause of the problem?
answer
Missing route on the default gateway router.
question
You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. The office has two Windows 2000 servers, two UNIX severs, one Windows NT server, 90 Windows 98 clients, 40 Windows 2000 Professional clients, and five Macintosh clients. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is not working properly?
answer
tracert.
question
Trace route to 192.168.2.250 over a maximum of 30 hops: 1 2 ms 2 ms 2 ms 192.168.12.11 2 2 ms 2 ms 2ms 192.168.11.1 3 5 ms 5 ms 3 ms 192.168.10.15 4 2 ms 2 ms 2 ms 192.168.9.1 5 5 ms 5 ms 3 ms 192.168.11.1 6 2 ms 2 ms 2 ms 192.168.10.15 7 5 ms 5 ms 3 ms 192.168.9.1 ...additional output omitted What is the problem?
answer
Routing loop.
question
Which of the following commands would display the output shown here?
answer
route print.
question
You manage a network of multiple subnets connected to the Internet.A user reports that she can't access the Internet. You investigate the problem and find that she can access all hosts on the private network, but no hosts on the Internet. Which of the following is likely the cause of the problem?
answer
Missing default route on a router.
question
You have configured a remote access server to accept dial-up connections for remote access clients. Remote clients are able to connect successfully and access resources on the remote access server. However, the remote clients are not able to connect to other devices located on the same subnet where the remote access server is located. Which action would likely correct the problem?
answer
Enable proxy arp on the LAN connection for the remote access server.
question
8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.151.142.1] Which of the following produced this output?
answer
tracert.
question
You have just connected a new computer to your network. The network user static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem Which of the configuration values would you most likely need to change?
answer
Default gateway.
question
7 41 ms 41 ms 41 ms PQS6-0.GW11.SEA1.ALTER.NET [152.63.107.17]
answer
tracert.
question
Which of the following utilities would you use to view the routing table?
answer
route.
question
What is the primary purpose of gateway redundancy?
answer
To overcome a single point of failure on the next hop router.
question
Which of the following protocols provide gateway redundancy? select all that apply
answer
HSRP GLBP VRRP
question
Which process reduces the size of the routing table by advertising a single route as a destination for a group of contiguous subnets?
answer
Route summarization
question
Which of the following routing protocols uses relative link cost as a metric?
answer
OSPF
question
Match the default administrative distance with the route type.
answer
IGRP/100
question
Your company has decided to temporarily partner with a third-party organization for an upcoming project. This requires your company's network and the third-party's network to be connected via a dedicated WAN connection. what should you do to allow routing information to the exchange?
answer
Configure a border router to use route redistribution.
question
You computer has an IP address of 161.13.5.15.
answer
Your computer is on a: Public network
question
Which of the following IP addresses is a valid IP address for a host on a public network?
answer
142.15.6.1
question
Which of the following is not one of the ranges of IP addresses defined in the RFC 1918 that are commonly used behind a NAT server?
answer
169.254.0.1 - 169.254.255.254
question
You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer?
answer
10.0.12.15 172.18.188.67 192.168.12.253
question
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the Internet. From your work office, you can try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the Internet. Why can't you access the server?
answer
Private addresses are not accessible through the Internet.
question
Which of the following associates a port number with a host on a private network?
answer
PAT
question
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.138.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a Web server and allow Internet hosts to contact the server to browse a personal website. What should you use to allow access?
answer
Static NAT
question
Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?
answer
169.254.0.1 - 169.254.255.254
question
You are the network administrator for a small company that implements NAT to access the Internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP addresses to support these new servers but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers?
answer
Static
question
You want to connect your small company network to the Internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of NAT should you implement?
answer
Dynamic
question
Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host?
answer
Port forwarding
question
Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)?
answer
OSPF
question
Which of the following routing protocols is classified as a balance hybrid routing protocol?
answer
EIGRP
question
Which of the following routing protocols are classified as link state routing protocols? select two
answer
OSPF IS-IS
question
What are the main differences between the OSPF and IS-IS routing protocols?
answer
OSPF requires an area 0, while IS-IS does not.
question
Which of the following protocols has a limit of 15 hops between and two networks?
answer
RIP
question
What is the main difference between RIP and RIPv2?
answer
Rip is a classful protocol, while RIPv2 is a classless protocol.
question
Under which of the following circumstances might you implement BGP on your company network and share routes with internet routers?
answer
If the network is connected to the internet using multiple ISPs
question
You have a private network connected to the internet. Your routers will not share routing information about your private network with internet routers. Which of the following best describes the type of routing protocol you would use?
answer
IPG
question
You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks. The next hop router for the default has changed. You need to make the change with the least amount of effort possible. What should you do?
answer
Manually reconfigure the default route to point to the new next hop router.
question
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. the router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. what should you do.
answer
wait for convergence to take place.
question
you have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network.
answer
Convergence
question
When multiple routes to a destination exist, what is used to select the best possible route?
answer
Metric
question
Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions?
answer
BGP
question
Which of the following are true for the IS-IS routing protocol? select two
answer
Divides large networks into areas Supports IPv6 routing
question
One method of preventing routing loops is to not send information about a route back to the router from which the information came. What is this technique called?
answer
Split horizon
question
What information does the next hop entry in a routing table identify?
answer
The first router in the path to the destination network.
question
A router is connected to a network 192.169.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to the network 10.1.0.0/16. What will the router do with the packet.
answer
Forward the packet to the next hop router specified by the route network 0.0.0.0
question
A router is connected to a network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route on router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?
answer
Drop the packet.
question
Which of the following is a characteristic of static routing when compared to dynamic routing?
answer
All routers must be manually updated on the router.
question
Which two of the following tasks do routers perform?
answer
Maintain information about paths through an internetwork. Route data based on logical network addresses.
question
You have been recently hired to mange a network for a small company. Prior to your arrival, the entire network was migrated from IPv4 to IPv6. Which strategy could you imply to help prevent these issues from occurring?
answer
Use a /127 prefix on the backbone segment.
question
You work for a large, multinational organization that has an extensive global network that is interconnected using WAN links and routers.
answer
One of the intermediate routers is an MTU black hole.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New