Testout – College Essay

Unlock all answers in this set

Unlock answers
question
Which of the following functions are performed by proxies?
answer
Cache web pages, Block employees from accessing certain websites
question
Install a proxy server
answer
Your company leases a very fast Internet connection and pays for it based on usage. You have been asked by the company president to reduce Internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection, without decreasing performance.
question
Proxy
answer
Which of the following allows you to save frequently-accessed websites on your local network for later retrieval?
question
Load balancer
answer
Which of the following devices accepts incoming client requests and distributes those requests to specific servers?
question
VPN concentrator
answer
You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?
question
A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.
answer
How does a proxy server differ from a packet filtering firewall?
question
Switch
answer
Which of the following devices is used on a LAN and offers guaranteed bandwidth to each port?
question
Network interface card
answer
Which network component connects a device with the transmission media and allows it to send and receive messages?
question
Router
answer
Which of the following hardware devices links multiple networks and directs traffic between networks?
question
It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.
answer
Which of the following best describes how a switch functions?
question
Hub
answer
An access point that conforms to the IEEE 802.11b standard acts most closely to what other networking device?
question
Transceiver
answer
What device sends signals from a computer onto a network?
question
Hub, Repeater
answer
Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?
question
It demodulates analog data from a telephone network into digital PC data. It modulates digital data from the PC into analog data and transmits it on a telephone network.
answer
Which of the following statements accurately describes how a modem works?
question
When a frame enters a port, the source MAC address is copied from the frame header.
answer
How do switches and bridges learn where devices are located on a network?
question
Packet filtering
answer
Which of the following is a firewall function?
question
Host-based IDS
answer
As a security precaution, you have implemented IPsec that is used between any two devices on your network. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks.
question
IDS
answer
What security mechanism can be used to detect attacks originating on the Internet or from within an internal, trusted subnet?
question
Firewall
answer
Which of the following is the best device to deploy to protect your private network from a public untrusted network?
question
An alert is generated and delivered via e-mail, the console, or an SNMP trap. The IDS logs all pertinent data about the intrusion.
answer
What actions can a typical passive Intrusion Detection System (IDS) take when it detects an attack?
question
IDS
answer
Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?
question
Listening to network traffic, Monitoring the audit trails on a server
answer
Which of the following activities are considered passive in regards to the functioning of an intrusion detection system?
question
Update filters to block suspect traffic, Perform reverse lookups to identify an intruder
answer
An active IDS system often performs which of the following actions?
question
Content filter
answer
Which of the following prevents access based on website ratings and classifications?
question
Comparison to a database of known attacks
answer
What does an IDS that uses signature recognition use for identifying attacks?
question
Signature
answer
Which of the following is the most common detection method used by an IDS?
question
Update the signature files
answer
You have just installed a new network-based IDS system that uses signature recognition. What should you do on a regular basis?
question
IDS
answer
Which of the following devices can monitor a network and detect potential security attacks?
question
VPN concentrator
answer
You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?
question
Load balancer
answer
Which of the following devices accepts incoming client requests and distributes those requests to specific servers?
question
IDS, IPS
answer
Which of the following are security devices that perform stateful inspection of packet data, looking for patterns that indicate malicious code?
question
Enforcement of the organization's Internet usage policy, An increase in bandwidth availability
answer
You are investigating the use of website and URL content filtering to prevent users from visiting certain websites. Which benefits are the result of implementing this technology in your organization?
question
Periodic reviews must be conducted to detect malicious activity or policy violations.
answer
Properly configured passive IDS and system audit logs are an integral part of a comprehensive security plan. what step must be taken to ensure that the information is useful in maintaining a secure environment?
question
IPS
answer
Which of the following devices is capable of detecting and responding to security threats?
question
IPS
answer
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want to take immediate action when possible to stop or prevent the attack. Which tool should you use?
question
Send the frame out to ports 2-8.
answer
An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?
question
Hub
answer
Which of the following devices does not segment the network?
question
Layer 3 switch
answer
Which of the following devices is capable of performing routing of IP packets at wire speeds using an ASIC module instead of the CPU or software?
question
Content Switch
answer
You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static Web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your Web content. The device should not be able to distribute requests between the various Web servers using specialized hardware and not just a software configuration. In addition, SSL sessions should use the hardware components in the device to create the SSL sessions.
question
Single broadcast domain Single broadcast domain Single broadcast domain Multiple broadcast domains Single broadcast domain Single broadcast domain Multiple broadcast domains
answer
Drag the broadcast domain property on the left to the appropriate network device(s) on the right. Each property can be used more than once. Hub Unmanaged switch 802.11n wireless access point Router Bridge Repeater Layer 3 Switch
question
Traffic shaper
answer
You manage a server that runs your company website. The website includes streaming video that shows features of some of your products. The link connecting your server to the Internet charges based on bandwidth use. when the bandwidth spikes, so does your bill. You would like to implement a solution to prevent the amount of traffic sent over the WAN link from exceeding a specific level. Which solution should you implement?
question
Switch
answer
Angela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. In a check of network traffic, Angela discovers a high number of collisions. Which connectivity device would best reduce the number of collisions and provide for future growth?
question
IDS
answer
Which of the following devices can monitor a network and detect potential security attacks?
question
IPS
answer
which of the following devices is capable of detecting and responding to security threats?
question
IDS
answer
What security mechanism can be used to detect attacks originating on the Internet or from within an internal trusted subnet?
question
An alert is generated and delivered via Email, the console, or an SNMP trap. The IDS logs all pertinent data about the intrusion.
answer
What actions can a typical passive intrusion Detection System (IDS) take when it detects an attack? (Select two.)
question
IPS
answer
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action when possible to stop or prevent the attack. Which tool should you use?
question
IDS
answer
Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?
question
Host based IDS
answer
As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for a traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement?
question
Signature based
answer
What IDS method searches for intrusion or attack attempts by recognizing patterns or identities listed in a database
question
Anomaly based IDS
answer
You are concerned about protecting your network from network-based attack from the Internet. Specifically, you are concerned about zero-day attacks (attacks that have not yet been identified or that do not have prescribed protections.) Which type of device should you use?
question
Load balancing
answer
You have a Web server on your network that hosts the public website for your company. You want to make sure that the website will continue to be available even if a NIC, hard drive, or other problem prevents the server from responding. Which solution should you implement?
question
Load balancin
answer
You manage a server that runs your company website. The Web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that a second server can respond to requests for website content. Which solution should you implement?
question
Anomaly based IDS
answer
You are concerned about protecting your network from network-based attacks from the Internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?
question
Configure the browser to send HTTPS requests through the VPN connection, Configure the VPN connection to use IPsec
answer
A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration (Select two.)
question
RADIUS, TACACS+
answer
Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.)
question
Configure remote access servers as RADIUS clients.
answer
You have decided to implement a remote access solution that uses multiple remote access servers. you want to implement RADIUS to centralize remove access authentication and authorization. Which of the following would be a required part of your configuration?
question
Uses TCP, Allows for a possible of three different servers, one each for authentication, authorization, and accounting.
answer
Which of the following are characteristics of TACACS+ (Select two.)
question
RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to split between different servers.
answer
Which of the following are differences between RADIUS and TACACS+?
question
TACACS
answer
Which of the following protocols can be used to centralize remote access authentication?
question
Support secured communications over an untrusted network
answer
A VPN is used primarily for what purpose?
question
RAS
answer
You want to set up a service to allow multiple users to dial in to the office server from modems on their home computers. what service should you implement?
question
PPTP
answer
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
question
PPP
answer
You are configuring your computer to dial up to the Internet. What protocol should you use?
question
PPPoE
answer
Which of the following protocols or services is commonly used on cable Internet connections for user authentication?
question
Remote access
answer
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need?
question
PPTP, L2TP
answer
Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the Internet? (select two.)
question
ESP, AH
answer
IPsec is implemented through two separate protocols. What are these protocols called? (Selected two.)
question
IPsec
answer
Which of the following network layer protocols provides authentication and encryption services for IP based network traffic?
question
PPPoE
answer
You have just signed up for Internet access using a local provider that gives you a fiber optic line into your house. From there, Ethernet and wireless connections are used to create a small network within your home. Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection?
question
Authenticating remote clients before access to the network is granted.
answer
RADIUS is primarily used for what purpose?
question
Encrypts the entire packet, not just the authentication packets
answer
Which of the following is a characteristics of TACAS+
question
49
answer
Which of the following ports are used with TACAS?
question
encrypts the entire communication session, uses port 443
answer
Which of the following statements about SSL VPN are true? (Select two.)
question
GRE
answer
Which of the following can route layer 3 protocols across an IP network?
question
Presence information
answer
Your company recently installed a unified communication system. Employees are now able to inform each other of their availability. Which unified communication feature is this?
question
Unified communication
answer
You've been asked by upper management if there is a way to integrate phone calls, emails, and instant messaging into a single platform. Which of the following systems should you recommend to them?
question
Port forwarding
answer
Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host?
question
DNS Server
answer
You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com. Which device would you use?
question
DNS
answer
You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which protocol should you implement?
question
The client system is configured to use DHCP, the client system is unable to reach the DHCP server.
answer
After installing a new DHCP server on the network, you need to verify that network devices are receiving IP addressing via DHCP. You reboot a windows XP client system and using the ipconfig command, receive the following information Ethernet adapter Local Area Connection 1: Description . . . . . . . . . . : CardBus-I 10/100 PC Card Physical Address . . . . . . . : 02-00-4C-4F-3F-50 DHCP Enabled . . . . . . . . . . . : Yes Autoconfiguration enabled . . . . . . Yes Autoconfiguration IP Address . . . . . . . :169.254.25.129 Subnet Mask . . . . . . . . . . . 255.255.0.0 Default Gateway . . . . . . . . : DNS Servers . . . . . . . . : Which of the following statements are true? (Select two).
question
Wednesday Morning
answer
You have configured your organizations dHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days. A user's workstation is powered on and receives addressing information from this DHCP server Monday morning at 8:00AM. When will the client contact the DHCP server to renew the lease (by default)?
question
A DHCP server assigns addresses to requesting hosts. It can deliver other configuration information in addition to IP addresses.
answer
Which two of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true?
question
Install a DHCP server on the network. Use Automatic Private IP Addressing
answer
Which of the following strategies are used to prevent duplicate IP addresses being used on a network? (select two.)
question
DHCP Server
answer
You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use?
question
You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06)
answer
You are implementing a DHCP server for your segment. Your Segment's IP address is 192.168.1.0. Your default gateway address is 192.168.1.254. Your DNS server address is 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments. You configured the 03 Router option on youe DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP addressing information dynamically, your users complain that they are unable to access websites on the Internet. How can you resolve this problem?
question
The clients must be configured to obtain IP addressing from a DHCP server.
answer
Due to widespread network expansion, you have decided to upgrade the network by configuring a DHCP server for the network. The network uses Linux, Windows, and Mac OS X client systems. You configure the server to distribute IP addresses from 192.168.2.1 to addres 192.168.2.100. You use the subnet mask of 255.255.255.0. After making all setting changes on the DHCP server, you reboot each client system but they are not able to obtain an IP address from the DHCP server. Which of the following would explain the failure?
question
Unavailable DHCP server
answer
You administer a network with Windows 2000 and UNIX servers, and Windows 2000 Professional, Windows 89, and Macintosh clients. A user of a windows 98 computer calls you one day and says he is unable to access resources on the network. You type ipconfig on the user's computer and receive the following output: 0 ethernet adapter: IP address . . . . . . . . . : 169.254.1.17 Subnet Mask . . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . . : You also check your NIC and see the link light on. what might the problem be?
question
Cache web pages, block employees from accessing certain websites
answer
Which of the following functions are performed by proxies? (Select two.)
question
A proxy server is blocking access to the websites
answer
You connect your computer to a wireless network available at the local library. You find that you can access all websites you want on the Internet except for two. What might be causing the problem?
question
Proxy
answer
Which fo the following solutions would you implement to track which websites network users are accessing?
question
Install a proxy server. Allow Internet access only through the proxy server.
answer
You would like to control Internet access based on users, time of day, and websites visited. How can you do this?
question
Proxy Server
answer
You manage a server that runs your company website. The web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that static web content can be offloaded to a different server, while the web server continues to process dynamic content.
question
Operates at the Session layer. Verifies sequencing of session packets.
answer
Which of the following are true of a circuit proxy filter firewall (Select two.)
question
Can perform load balancing, authentication, and caching. Handles requests from the Internet to a server in a private network.
answer
Which of the following are true about reverse proxy? (Select two.)
question
A, CNAME, PTR, AAAA, MX
answer
Listed below are several DNS record types. Match the record type on the left with its function on the right. Drag: A, CNAME. MX. PTR. AAAA Drop: Points a hostname to an IPv4 address Provides alternate names to hosts that already have a host record. Points an IP address to a hostname. Points a hostname to an IPv6 address Identifies servers that can be used to deliver mail.
question
Implement an IP Helper address on the router.
answer
You recently created a new network segment for Development. Because the hosts are now on a different network segment, they can no longer contact the DHCP server. Both network segments are connected via a Cisco router. Which of the following would be the best action to take in order to fix the problem?
question
Specify which server network interface the agent listens on for DHCP messages.
answer
You are configuring the DHCP Relay Agent role service on a Windows server. Which of the following is a required step for the configuration?
question
Dynamic DNS
answer
Which of the following services automatically creates and deletes host records when an IP address lease is created or released?
question
The ipconfig /release command is entered on a workstation. The DHCP server renews an IP address lease.
answer
If dynamic DNS is being used, which of the following events will cause a dynamic update of the host records? (Select two.)
question
Routing and Remote Access
answer
You have a WIndows Server 2012 system that you want to use as a DHCP Relay Agent. Which Windows Server 2012 service would you use to do this?
question
ip helper-address 172.16.30.1
answer
You need to configure a Cisco RFC 1542 compliant router to forward any received DHCP frames to the appropriate subnet. The address of the remote DHCP server is 172.16.30.1 Which of the following commands would be used to configure the router?
question
Reverse Proxy
answer
Based on the diagram, which type of proxy server is handling the client's request? Client ----> Internet ----> Proxy ----> Server 1 Proxy and Server 1 are an internal network
question
64Kbps
answer
You have installed an ISDN connection into your home so you can connect to the Internet and talk on the phone at the same time. While you are talking on the telephone, what is the maximum data rate of your internet connection? ISDN supports 128Kbps total
question
155.52mbps
answer
What is the speed of an OC-3 connection OC-1= 51.84 Mbps
question
One D channel operating at 16Kbps Two B channels operating at 64 Kbps each
answer
Which two of the following describe the channels and data transfer rates used for ISDN BRI?
question
ISDN BRI
answer
Which of the following WAN technologies provides digital dial-up connections on two 64 Kbps data channels?
question
It uses existing telephone lines for digital data transmission. It can be used to transmit multiple data types on the same line (data, voice, video, and so on). It has faster connect times than traditional dial-up access.
answer
Which three of the following are advantages of ISDN BRI
question
It lets you transmit voice, video, and data over the same lines. It is a dial-up service that uses existing copper wires for the local loop. It provides enough bandwidth to transmit data at much higher speeds than standard modems and analog lines.
answer
Which three of the following are characteristics of ISDN?
question
622.08Mbps
answer
If the SONET (OC-1) based data rate is 51.84Mbps, how much data can the Optical Carrier level 12 (OC-12) transfer in one second
question
Satellite
answer
A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?
question
Wireless
answer
Which of the following forms of networking are highly susceptible to eavesdropping and must be secured accordingly?
question
PSTN
answer
You are moving to an area where DSL will be available in the next six moths. Which method of Internet connectivity should you implement until DSL is available, if your existing connectivity needs are minimal?
question
Satellite
answer
Which of the following is most susceptible to interference related to atmospheric conditions?
question
Modem
answer
To access the Internet through the PSTN, what kind of connectivity device must you use?
question
SONET
answer
Which of the following is a WAN technology that allows for interoperability of vendor hardware for fiber optic networking?
question
MPLS
answer
Which of the following technologies uses variable-length packets and adds labels to packets as they enter the WAN cloud, with the labels being used to switch packets and prioritize traffic?
question
Supports variable-length data units, Adds labels to data units
answer
Which of the following are characteristics of MPLS? (Select two.)
question
Adds labels to data units, Uses fixed-length cells of 53-bytes
answer
Which of the following are characteristics of ATM (Select two.)
question
Transport protocol used for other traffic types (such as ATM) Dual counter-rotating fiber optic rings
answer
Which of the following are characteristics of SONET? (Select two.)
question
POTS
answer
Which of the following describes the lines used in the local loop for dial-up telephone access?
question
PSTN
answer
Which of the following terms identifies the network of dial-up telephone and long-distance lines?
question
ISDN BRI, ADSL
answer
Which of the following Internet access technologies support simultaneous voice and data traffic over the same physical line? (Select two.)
question
DCE, CO, PSE, Local loop
answer
Which four of the following are the responsibility of the WAN service provider
question
Packet-switched
answer
Which network type divides transmitted data into smaller pieces and allows for multiple communications on the network medium?
question
Circuit-switched
answer
Which network type establishes a dedicated physical connection between two hosts in order to transmit time-sensitive data?
question
Frame Relay
answer
Which of the following WAN technologies provides packet switching over high-quality digital liens at speeds greater than 1.544 Mbps
question
DSL, ISDN
answer
Which WAN connection types use digital communications over public telephone lines? (Select two.)
question
A single T1 channel can transfer data at 64 Kbps T1 lines use two pairs of copper wire
answer
Which of the following correct describes the T1 carrier system? (Select two.)
question
ISDN BRI
answer
Which of the following WAN technologies is a dial-up only service?
question
T3
answer
You are implementing Internet connectivity for a new start-up company. Your client will provide online storefronts for retailers. To do this, they have calculated that their Internet connection must provide a data rate of at least 20-30 Mbps. Which type of service should you implement
question
Packets
answer
When implementing a Multiprotocol Label Switching (MPLS) WAN, which data unit is managed by the routers at different sites?
question
MPLS
answer
Which networking technology creates virtual links between two remote network endpoints by prefixing packets with a header containing one or more labels?
question
It can carry ATM, SONET, and Ethernet traffic. CEF is required for all MPLS-enabled Cisco routers.
answer
Which of the following is true of Multiprotocol Label Switching? (Select two.)
question
MLPS is designed to work with many different protocols. MPLS-enabled routers switch packets based on the label information, not the packet contents.
answer
Which of the following is true of Multiprotocol Label Switching? (Select two.)
question
128Kbps
answer
What is the maximum data rate of an ISDN BRI line?
question
Two B channels operating at 64 Kbps each, One D channel operating at 16 Kbps
answer
Which of the following describe the channels and data transfer rates used for ISDN BRI? (Select two.)
question
It provides enough bandwidth to transmit data at higher speeds than standard modems and analog lines. It lets you transmit voice, video, and data over the same lines. It is a dial-up service that uses existing copper wires for the local loop.
answer
Which of the following are characteristics of ISDN? (Select three.)
question
DSL
answer
Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office?
question
Cable modem
answer
Which of the following services are available regardless of whether the telephone company network is available?
question
PSTN
answer
You are traveling throughout North America to many metropolitan and rural areas. Which single form of Internet connectivity provides the greatest potential connectivity wherever you travel?
question
ISDN, DSL
answer
Which WAN connection types use digital communications over POTS? (Select two.)
question
PPP
answer
Your client has acquired several small companies and would like to connect them together into one network. Not all of the routers are Cisco devices and compatibility is a concern. Which WAN encapsulation method should you recommend your client use?
question
A
answer
RouterA is connected to RouterB through Serial 1. You want to configure the link to use PPP with CHAP authentication with a password of cisco. Which sent of commands would you use on RouterA to complete the configuration? A. RouterA(config)#username RouterB password cisco RouterA (config)#int s1 RouterA(config-if)#encap ppp RouterA(config-if)#ppp auth chap B. RouterA(config)#int s1 RouterA(config-if)#encap ppp RouterA(config-if)#ppp auth chap RouterA(config-if)#ppp chap username RouterB password cisco C. RouterA(config)#int s1 RouterA(config-if)#encap ppp RouterA(config-if)#ppp chap username RouterA password cisco
question
Data can be compressed at the source and decompressed at the destination. LCP provides multilink support. Usernames and passwords may be required during the handshake.
answer
Which of the following statements about the functionality of LCP are true? (Select three.)
question
Monitors data dropped on the link and avoids frame looping. Provides load balancing across multiple links. Negotiates the use (or lack) of authentication before starting the session.
answer
Which of the following are benefits of LCP? (Select three.)
question
LCP, authentication, NCP
answer
What is the connection order used by two TCP/IP routers to open a session with PPP including authentication? 1 authentication 2 NCP 3 LCP
question
Negotiate compression Settings, Perform authentication, Negotiate Network-layer protocols
answer
PPP supports authentication, compression, and multiple Network-layer protocols. Which of the following correctly sequences these functions when a PPP link is established? 1 Negotiate compression Settings 2 Negotiate Network-layer protocols 3 Perform authentication
question
NCP
answer
Which of the following protocols is used by PPP to enable support for multiple Network-layer protocols?
question
SDSL
answer
Which of the following Internet services provides equal upload and download bandwidth?
question
Unequal download and upload speeds, Supports both data and voice at the same time
answer
Which of the following are characteristics of VDSL? (Select two.)
question
Supports data traffic only( no voice)
answer
Which of the following is a characteristic of SDSL?
question
Time division multiple access
answer
Which of the following technologies does GSM use to allow multiple connections on the same frequency?
question
2G
answer
Which of the following cellular network types does not provide Internet connectivity? 4G, LTE, 2G, EDGE, HSPA+
question
HSPA+, LTE
answer
Which of the following cellular network types use MIMO to increase 3G data throughput? (Select two.)
question
2G: GSM, CDMA 3G: LTE, HSPA+ 4G: WiMAX
answer
Drag the cellular network specification on the left to its corresponding mobile technology generation on the right. Drag: LTE, GSM, WiMAX, HSPA+, CDMA Drop: 2G:__,__ 3G:__,__ 4G:__,__
question
Offers speeds of 400-1000Kbps, The first internet compatible technology
answer
Which of the following describe the EDGE cellular technology? (Select two.)
question
Metropolitan Area Network (MAN)
answer
Which of the following geographic network types are typically managed by a city as a public utility?
question
Single mode
answer
Which of the following forms of optical fiber would usually be used to connect two buildings across campus from each other, which are sever kilometers apart?
question
Greater cable distances without a repeater, Immunity to electromagnetic interference
answer
Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two.)
question
Pin 1, Pin 2
answer
Which pins in an RJ45 connetor are used to transmit data when used on a 100BaseT Ethernet network? (Select two.) Pin 1: Tx+ Pin 2: Tx- Pin 3: Rx+ Pin 4: Unused Pin 5: Unused Pin 6: Rx- Pin 7: Unused Pin 8: Unused
question
No, Category 5 cabling has more twists per inch than Category 3 cabling to reduce cross-talk and support higher data rates.
answer
You are installing networking wiring for a new Ethernet network at your company's main office building. The project specifications call for Category 5 UTP network cabling and RJ-45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of CAtegory 3 network cable in storage. Upon investigation it appears very similar to Category 5 wiring. Should you use Category 3 cabling as a substitute for Category 5 cabling to finish the project?
question
The ends of the cable must be terminated, It has a conductor made from copper in the center of the cable, It uses two concentric metallic conductors.
answer
Which of the following are characteristics of coaxial network cable? (choose three.)
question
The central core is smaller than that of multimode fiber optic cabling.
answer
Which of the following is true about single mode fiber optic network cabling?
question
Cat 5e
answer
What is the minimum cable specification that supports 1000Mbps Ethernet?
question
Cat 6
answer
Which of the following cable types often includes a solid plastic core?
question
RG-6, RG-59
answer
Which of the following cable classifications are typically used for cable and satellite networking with coaxial cables? (Select two.)
question
RG-59
answer
You have a small home network connected to the Internet using an RG-6 cable. You need to move the router connecting the network to the Internet, but can't find any RG-6 cable. Which cable types could you use instead? RG-8 and RG-58 have an impedance rating of 50 ohms RG-59 and RG-6 have an impedance rating of 75 ohms
question
Plenum
answer
You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights. You would like to run your Ethernet cables in this area. Which type of cable must you use?
question
Single mode fiber optic
answer
Of the following cables, which offer the best protection against EMI? Cat 5, RG-6, Single mode fiber optic, Cat 5e
question
RG-6
answer
Of the following cables, which offer the best protection against EMI? RG-6, Cat 6e, Cat 5, Cat5e
question
Crossover
answer
You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?
question
Crossover
answer
You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use?
question
Crossover
answer
You have two switches that you need to connect using their uplink ports. The switches do not support auto-MDI. Which type of cable should you use?
question
Straight-through
answer
You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use?
question
Rollover
answer
You have purchased a new router that you need to configure. You need to connect a workstation to the router's console port to complete the configuration tasks. Which type of cable would you most likely use?
question
Media converter
answer
You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BasTX switch ports. Which device should you use?
question
Layer 1
answer
At which OSI model layer does a media converter operate?
question
GBIC, SFP
answer
What type of module might a switch use to allow it to modify the media type supported by a switch port? (Select two.)
question
F-type
answer
You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use?
question
SC, ST
answer
Which of the following connectors usually require polishing as part of the assembly process? (select two.)
question
RJ-45
answer
Which of the following connectors is used with Ethernet 10BaseT networks?
question
You want to connect your computer to the internet with a dial-up connection
answer
In which of the following situations might you use an RJ-11 connector? You want to connect the 10BaseT network card in your computer to a switch You want to connect your computer to the internet with a dial-up connection You want to upgrade your 10BaseT to 100BaseT
question
They use a housing and latch system similar to an RJ-45 UTP connector. They are half the size of standard connectors.
answer
Which of the following are characteristics of an LC fiber optic connector? (choose two.)
question
They use metal guide pins to ensure accurate alignment. They can be used with multimode fiber optic cables.
answer
Which of the following are characteristics of an MT-RJ fiber optic connector? (select two.)
question
White/green, green, white/orange, blue, white/blue, orange, white/brown, brown
answer
You want to use the T568A standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector?
question
ST
answer
Which of the following connectors is used with fiber optic cables and connects using a twisting motion?
question
LC, MT-RJ
answer
Which of the following connectors are used with fiber optic cables andi nclude both cables in a single connector? (Select two.)
question
Serial
answer
Which of the following connectors is typically used on one end of a rollover cable?
question
When connecting a phone to a phone line.
answer
When would you typically use an RJ-11 connector?
question
RS-232
answer
Which of the following standards is typically used in a rollover cable?
question
RG-6, RG-59
answer
F-type connectors are typically used with cables using which of the following standards? (select two.)
question
110 block
answer
Which of the following uses metal clips placed over plastic slots for connecting individual copper wires?
question
Keep wire pairs twisted up to within one-half of an inch of the connector.
answer
When using 110 blocks for connecting Cat5 and higher data cables, which recommendation should you follow?
question
Crimping tool
answer
You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task?
question
Punchdown tool
answer
What tool should you use to extend network services beyond the demarc?
question
Cable stripper
answer
You are making Ethernet drop cables using Cat5e and RJ45 connectors. You need to remove the plastic coating over the cable to expose the individual wires. Which tool should you use?
question
Punchdown tool
answer
You are working with 25 pair wires and 66 blocks. You have pushed the wires onto the 66 block, but now need to cut off the excess end of each wire. Which tool should you use?
question
Identify the location of a fault on a cable. Measure the length of a cable.
answer
Which of the following tests can be performed by a TDR? (Select two.)
question
OTDR
answer
You are working with an existing fiber optic installation in your building. You want to know how long each length of a cable is that runs through the walls. Which tool should you use?
question
TDR
answer
You have been asked to document the wiring in your building. You would like to identify the length of each Cat5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use?
question
Point the cut side of the tool towards the wire end. Use a punchdown tool with a notched blade.
answer
You are preparing to attach wires in a 110 block. You want to connect the wires and trim off the excess at the same time, which of the following should you do?
question
Certifier
answer
You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100Mbps. Which tool should you use to test the drop cable and the connection to the network?
question
This is a crossover cable The cable is functioning correctly.
answer
You've connected a cable certifier to an RJ45 walljack, and the output shown below is displayed on the device. What does this output indicate? (Select two.) 1 - 3 2 - 6 3 - 1 4 - 7 5 - 8 6 - 2 7 - 4 8 - 5
question
Pins 1 and 2 are shorted
answer
You've connected a cable certifier to an RJ-45 wall jack and the output shown below is displayed on the device. what does this output indicate? 1 x 1 2 x 2 3 - 3 4 - 4 5 - 5 6 - 6 7 - 7 8 - 8
question
Pin 4 is open, Pin 6 is open
answer
You've connected a cable certifier to an RJ-45 wall jack and the output shown below is displayed on the device. What does this output indicate? (Select two.) 1 - 1 2 - 2 3 - 3 4 4 5 - 5 6 6 7 - 7 8 - 8
question
Fiber-optic cable, shielded twisted pair cable
answer
You're responsible for implementing network cabling in a new network installation. The cabling will be installed in a manufacturing environment where there is a great deal of electromagnetic interference (EMI) Which type of cabling would operate best in this environment? (Choose two.)
question
RJ48c
answer
Which of the following connector types would you most likely use to connect to a T1 WAN service?
question
BNC
answer
You are working with an older 10Base2 Ethernet network. Which of the following connector types will you most likely encounter?
question
RJ-45, RJ-11
answer
Which of the following connector types are used with UTP cables? (Select two.)
question
DB-25, DB-9, RJ-45, RJ-11, LC, BNC< F-Type
answer
Match cable heads in Testout question 211 B.2 Network+ Domainm 1: Network Architecture, All Questions
question
Angled Physical Contact polish
answer
You need to replace a fiber optic cable that is connecting two switches together. You inspect the existing fiber cable and determine that it uses LC connectors. You also notice the cable's ferrule has a slight slant to it. Which polish grade should you use to replace the existing cable
question
Angled Physical Contact
answer
Which type of polish grade uses green-colored connectors to help prevent using the wrong connector type?
question
Messages travel from one device to the next until they reached the destination device.
answer
You have a network that sues a logical ring topology. How do messages travel through the network?
question
Messages are broadcast to all devices connected to the network
answer
You have a network that uses a logical bus topology. How do messages travel through the network?
question
Bus
answer
Which of the following topologies connects all devices to a trunk cable?
question
Ring
answer
Which of the following topologies connects each device to a neighboring device?
question
Ring
answer
In which of the following topologies does each device on the network act as a repeater,s ending the signal to the next device?
question
Star
answer
Which of the following topologies connects each network device to a central hub?
question
Mesh
answer
You have implemented an ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?
question
Mesh
answer
You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?
question
Mesh
answer
You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs?
question
Switch
answer
What device is used to create a physical star topology?
question
Star
answer
You have a small network that uses a hub to connect multiple devices. What physical topology is used?
question
Point-to-point
answer
You have a series of WAN links that connects your site to multiple other sites. Each remote site is connected to your site using a dedicated link. What type of connection is being used?
question
Point-to-multipoint
answer
You have a site in your network that is connected to multiple other sites. A single virtual circuit is used to connect to all other sites. What type of connection is being used?
question
No devices will be able to communicate
answer
You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. Which of the following describes what happens to the network communications?
question
All devices except the device connected with the drop cable will be able to communicate
answer
You have a network connected using a physical star topology. One of the drop cables connecting a workstation is removed. Which of the following best describes what happens to network communications?
question
Device A will be able to communicate with all other devices.
answer
You have a network connected using a full physical mesh topology. The link between device A and device B is broken. Which of the following best describes what happens to network communications?
question
Peer-to-peer
answer
You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have?
question
Client-server
answer
You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts access those resources but do not host services of their own. What type of network do you have?
question
Bus, Star
answer
Which of the following physical topologies are used with Ethernet networks? (Select two.)
question
Partial Mesh
answer
You have been asked to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement?
question
Install the latest firmware updates from the device manufacturer. Verify that your network's existing security infrastructure is working properly.
answer
You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)
question
Install the latest firmware updates from the device manufacturer. Verify that your network's existing security infrastructure is working properly.
answer
You manage the information systems for a large co-location data center. Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)
question
These devices tend to employ much weaker security than traditional network devices. These devices are typically more difficult to monitor than traditional network devices.
answer
Why do attackers prefer static environment devices to conduct distributed network attacks? (Select two.)
question
RTU - Connects the equipment to the network via wireless signal and converts digital data from the network into signals that the equipment can process. DCS - A network of components that work together in order to remotely manage industrial equipment. Network Link - Connects the supervisory computer to the RTUs or PLCs Supervisory Computer - Communicates with and sends control commands to connected SCADA devices Programmable Logic Controller - Connects equipment to the network via a physical medium and converts digital data into signals that the equipment can process.
answer
Match the Definition on the left with the SCADA technology term on the right. Drag 1 A network of components that work together in order to remotely manage industrial equipment 2 Connects equipment to the network via a wireless signal and converts digital data from the network into signals that the equipment can process 3 Connects the supervisory computer to the RTUs or PLCs 4 Communicates with and sends control commands to connected SCADA devices 5 Connects equipment to the network via a phsical medium and converts digital data into signals that the equipment can process. Drop 1 Remote Terminal Unit 2 DCS 3 Network Link 4 Supervisory Computer 5 Programmable Logic Controller
question
Session Initiation Protocol
answer
Which of the following protocols is used during the call control process of multimedia communications?
question
172.16.1.26, 2.2.2.2
answer
Which of the following is a valid IPv4 address? (Select two.) 172.16.1.26 10.384.0.5 2.2.2.2 1.254.1.1024 192.168.1.512 254.7.1.417 256.0.01
question
C0-34-FF-15-01-8E
answer
Which of the following is a valid MAC address? 34-9A-86-1G-B3-24 73-99-12-61-15 255.255.255.0 83-5A-5B-0B-31-55-F1 C0-34-FF-15-01-8E 192.168.12.15
question
AB.07.CF.62.16.BD
answer
Which of the following is a valid MAC address? FABC.875E.9BG6 145.65.254.10 AB.07.CF.62.16.BD 95ABC2F4.ABC5.569D.43BF
question
Class A, Class B, Class B, Class C
answer
Consider the following IP addresses. 1. 124.77.8.5 2. 131.11.0.9 3. 190.66.250.10 4. 196.5.89.44 Which lists represents the ID address class of each listed IP address? Class B, Class B, Class C, Class C Class B, Class B, Class C, Class D Class A, Class B, Class C, Class C Class B, Class C, Class C, Class D Class, A, Class B, Class B, Class C A= 0-126 B= 128-191 C= 192-223 D= 223-239 E= 240-255
question
6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1
answer
Which of the following are valid IPv6 IP addresses? Select all that apply. 6384:1319:7700:7631:446A:5511:8940:2552 127.0.0.1 165.15.78.53.100.1 192.168.2.15 343F:1EEE:ACDD:2034:1FF3:5012 141:0:0:0:15:0:0:1
question
257.0.122.55 45.22.156.256 145.8.260.7
answer
Which three of the following are not valid IP addresses? 257.0.122.55 116.0.0.116 132.64.32.8 45.22.156.256 1.55.254.3 145.8.260.7 122.0.0.0
question
130.16.61.3
answer
Your network has been assigned the Class B address of 130.15.0.0 Which of the following is not an address you can assign to a node on a your network?
question
129.0.0.0 132.12.0.0 190.65.2.0
answer
Which of the three of the following IP addresses are Class B addresses? 129.0.0.0 195.155.0.0 115.33.0.0 132.12.0.0 190.65.2.0 64.2.2.64 224.15.55.2 0-126 128-191 192-223 224-239 240-255
question
222.55.0.0 223.16.5.0 192.15.5.55
answer
Which three of the following IP addresses are Class C addresses
question
200.78.151.111 200.78.151.252 200.78.151.12
answer
Your network has been assigned the Class C network address of 200.78.151.0. Which three of the following addresses can be assigned to hosts on your network?
question
179.113.65.12 179.113.0.118 179.113.89.0
answer
Your network has been assigned the Class B network address of 179.113.0.0. Which three of the following addresses can be assigned to hosts on your network?
question
114.122.66.12 114.0.0.15 114.58.12.0
answer
Which three of the following IP addresses belong to the Class A network 114.0.0.0? (assume the network is indicated by the default portion of the IP address.)
question
132.70.254.15
answer
In an IP addressing scheme using default subnet masks, which of the following IP addresses can you assign to a host?
question
168.16.5.1 129.0.0.1 191.168.2.15
answer
Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select all that apply.) A=1 B=2 C=3
question
255.255.255.0
answer
What is the default subnet mask for the IP address 203.111.3.3?
question
166.70.0.1
answer
Which of the following is the first IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?
question
211.70.0.255
answer
Which of the following is the last IP address that can be assigned to hosts on the 211.70.0.0 network using the default subnet mask?
question
166.70.255.254
answer
Which of the following is the last IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?
question
It is a 48-bit address. It is typically represented by hexadecimal numbers.
answer
Which of the following is true about MAC address? (Select two.)
question
10000011.00001001.11001010.01101111
answer
What is the binary format for the following decimal IP address? 131.9.202.111
question
206.58.170.67
answer
What is the decimal format of the following binary IP address? 11001110.00111010.10101010.01000011
question
255.0.0.0
answer
You have been told to assign the IP address 21.155.67.188 to a host on the network using the default subnet mask. Which mask should you use?
question
129.11.99.78/16
answer
A host on the network has an IP address of 129,11,88,78 using the default subnet mask. How would you identify the address and mask using CIDR notation? 255.0.0.0 is 8 bits
question
255.255.0.0
answer
You are configuring the IP address for a host and have been asked to use the address 192.160.99.110/16. What subnet mask value would you use?
question
169.254.0.1 - 169.254.255.254
answer
Which of the following IP address ranges is reserved for Automatic Private IP Addressing?
question
FEC0::AB:9007
answer
Which of the following is a valid IPv6 address? FEC0:AB98::A7::9845:4567 199.12.254.11 FEC0::AB:9007 FEC0:AB04:899A FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A
question
Combine different media types on to the same subnet.
answer
Which of the following is not a reason to use subnets on a network
question
Subnets divide an IP network address into multiple network addresses.
answer
Which of the following best describes the purpose of using subnets?
question
169.254.0.0 255.255.0.0
answer
What is the network address and subnet mask used by APIPA? (Select two.)
question
Private addresses can not directly communicate to hosts outside the local subnet.
answer
CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use aPIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other but you are ahving trouble configuring Internet access. What is the likely cause of the problem?
question
Public network
answer
Your computer has an IP address of 161.13.5.15. Your computer is on a: Class C network Private network Multicast network Public network
question
142.15.6.1
answer
Which of the following IP addresses is a valid IP address for a host on a public network? 10.3.125.2 192.168.16.45 172.16.254.12 142.15.6.1
question
169.254.0.1 - 169.254.255.254
answer
Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server? 10.0.0.1 - 10.255.255.254 169.254.0.1 - 169.254.255.254 172.16.0.1 - 172.31.255.254 192.168.0.1 - 192.168.255.254
question
Unicast
answer
Which type of address is used in a packet to address the packet to a single host?
question
100.55.255.255
answer
A host has the address 100.55.177.99/16. Which of the following is the broadcast address for the subnet?
question
172.18.188.67 192.168.12.253 10.0.12.15
answer
You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select all that apply.) 224.15.166.12 32.188.99.10 240.12.188.1 172.18.188.67 192.168.12.253 10.0.12.15 127.0.0.1 172.16-31.0.0
question
Unicast
answer
What type of address is the IP address 198.162.12.254/24
question
Multicast
answer
Which of the following address types is shared by multiple hosts, and is used to form groups of computers that should receive the same data stream?
question
Send it out to all ports except for the port it was received on.
answer
A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame?
question
VLSM, Classless
answer
Which of the following terms are often synonymous with or made possible with CIDR (Select two.) NAT, OSPF, Classful, Classless, VLSM Classless Inter-Domain Routing
question
Supernetting
answer
You manage a subnet that sues the following subnet address: 198.162.1.0/23. Which of the following best describes how addressing is configured for that subnet? Classful Subnetting Supernetting Private
question
Classless
answer
You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0. Which of the following describes the address type? Multicast Classless Public Classful Broadcast
question
Multicast
answer
Which type of address is the IP address 232.111.252.250?
question
Private addresses are not accessible through the internet.
answer
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the Internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other host son the Internet. Why can't you access the server?
question
IANA
answer
Which organization is responsible for allocating public IP addresses
question
PAT
answer
Which of the following associates a port number with a host on a private network? VLSM PAT NAT CIDR
question
Static NAT
answer
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow Internet hosts to contact the server to browse a personal website. What should you use to allow access?
question
169.254.0.0 - 169.254.255.255
answer
Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server? 10.0.0.0 - 10.255.255.255 192.168.0.0 - 192.168.255.255 172.16.0.0 - 172.31.255.255 169.254.0.0 - 169.254.255.255
question
Static
answer
You are the network administrator for a small company that implements NAT to access the Internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP addresses to support these new servers but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers?
question
Dynamic
answer
You want to connect your small company network to the Internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of Network Address Translation (NAT) should you implement?
question
Subnets divide an IP network address into multiple network addresses
answer
Which of the following best describes the purpose of using subnets?
question
Combine different media type on the same subnet
answer
Which of the following is not a reason to use subnets on a network? Improve security Combine different media type on the same subnet Extend the network Isolate network problems
question
172.17.128.0 172.17.0.0
answer
You've decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (Select two.) 172.17.32.0 172.17.128.0 172.17.0.0 172.17.16.0 172.17.96.0
question
The IP address assigned to Fa0/0 on Router 1
answer
You have a small network connected to the Internet as shown in the Exhibit. You need to configure the default gateway address on Wrk1 so that it can communicate with hosts on the Internet. Which address would you use for the default gateway address? The IP address assigned to Fa0/1 on Router1 The IP address assigned to Fa0/0 on Router2 The IP address assigned to SwitchA The IP address assigned to Fa0/1 on Router 2 The IP address assigned to Fa0/0 on Router 1 Wrk1 - SwitchA - Fa0/0 - Router1 - Fa0/1 - SwitchB - Fa0/0 - Router2 - Fa0/1 - Internet
question
DNS Server address, Default gateway
answer
You have a small network as shown in the Exhibit you have configured the IP address and subnet mask on Wrk1. You want to be able to use Wrk1 to browse the Internet to connect to sites like www.cisco.com. What other parameters are required on the work station? (Select two.) WINS Server address DNS Server address Default gateway Hostname DHCP server address Wrk1 - SwitchA - Fa0/0 - Router1 - Fa0/1 - SwitchB - Fa0/0 - Router2 - Fa0/1 - Internet
question
IP address and subnet mask
answer
You have a workstation connected to a small branch network using a single switch. The network does not have any routers and is not connected to the Internet. What are the minimum configuration parameters required on the workstation to be able to communicate with all hosts on the network?
question
IP address - 192.168.12.46 Subnet Mask - 255.255.255.240 Default Gateway - 192.168.12.34 DNS Server - 198.162.1.22
answer
You have a small network with a single subnet connected to the Internet as shown in the Exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstation should use RouterA as the default gateway, and DNS1 as the DNS server address. From the drop downs, select the appropriate parameters to configure the workstations TCP/IP settings. DNS1 - 198.162.1.22 Internet - 166.11.199.77/22 RouterA - 192.168.12.34/28 Wrk1 IP address - 192.168.12.30 192.168.12.32 192.168.12.46 192.168.12.47 Subnet Mask - 255.255.255.0 255.255.255.240 255.255.255.224 Default Gateway - 166.11.199.77 192.168.12.34 198.162.1.22 DNS Server - 166.11.199.77 192.168.12.34 198.162.1.22
question
ARP
answer
A host wants to send a message to another host with the IP address 115.99.80.157. IP does not known the hardware address of the destination device. Which protocol can be used to discover the MAC address?
question
Drop - Static Full Assignment - 4 Static Partial Assignment - 3 Stateless Autoconfiguration - 1 Stateful DHCPv6 - 2 Stateles DHCPv6 - 5
answer
Match the IPv6 address configuration method on the right with its definition on the left. Drag 1 - Clients automatically generate the interface ID and learn the subnet prefix and default gateway through the Neighbor Discovery Protocol (NDP). 2 - Provides each client with an IP address, default gateway, and other IP configuration information. 3 - The prefix is statically assigned and the interface ID is derived from the MAC address. 4 - The entire 128-bit address and all other configuration information is statically assigned to the host. 5 - Supplies the client with the DNS server IP address only. Does not provide the client with an IP address and does not track the status of each client.
question
4 -to- 6 tunneling
answer
Which of the following tunneling methods is used to send IPv4 traffic through an IPv6 network?
question
6 -to- 4 Tunneling
answer
You manage a network with two locations: Portland and Seattle. Both locations are connected to the Internet. All computers in both locations are configured to use IPv6. You would like to implement an IPv6 solution to meet the following requirements: Hosts in each location should be able to use IPv6 to communicate with hosts in the other location through the IPv4 Internet. You want to use a site-to-site tunneling method instead of a host-to-host tunneling method. Which IPv6 solution should you use?
question
Tunnel endpoints configured on hosts, dual stack hosts, works through NAT
answer
Which of the following are characteristics of Teredo tunneling? (Select three.) Dual stack routers Tunnel endpoints configured on hosts Dual stack hosts Works through NAT IPv4-only hosts communicate with IPv6-only hosts.
question
Miredo
answer
You have a server at work with a custom application installed. Connections to the server that use the custom application must use IPv6. The server is currently running IPv4. You are the only person who connects to the server, and you always use your Linux laptop for the connection. Your laptop supports both IPv4 and IPv6. The rest of your company network runs only IPv4. You need a cost-effect solution to allow your laptop to connect to the server. Your solution must also support communication through NAT servers. Which client software should you use to connect to the server? 4 -to- 6 Miredo ISATAP 6 -to- 4
question
Stateless autoconfiguration
answer
You manage a network that uses IPv6 addressing. When clients connect devices to the network, they generate an interface ID and use NDP to learn the subnet prefix and default gateway. Which IPv6 address assignment method is being used?
question
BGP
answer
Which of the following routing protocols is used by routers on the Internet for learning and sharing routes?
question
OSPF
answer
Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)?
question
EIGRP
answer
Which of the following routing protocols is classified as a balanced hybrid routing protocol?
question
IS-IS, OSPF
answer
Which of the following routing protocols are classified as link state routing protocols? (Select two.)
question
OSPF requires an area 0, while IS-IS does not.
answer
What are the main differences between the OSPF and IS-IS routing protocols?
question
RIP
answer
Which of the following protocols has a limit of 15 hops between any two networks?
question
RIP is a classful protocol, while RIPv2 is a classless protocol
answer
What is the main difference betwen RIP and RIPv2?
question
If the network is connected to the Internet using multiple ISPs
answer
Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers?
question
RIP uses hop counts as the cost metric.
answer
Which of the following statements about RIP is true? RIP is the routing protocol used on the Internet. RIP is a link state routing protocol. RIP uses hop counts as the cost metric RIP is suitable for large networks
question
OSPF is a classless link-state routing protocol.
answer
Which of the following best describes OSPF? OSPF is a classful distance vector routing protocol. OSPF is a classless link-state routing protocol. OSPF is a classful link-state routing protocol. OSPF is a classless distance vector routing protocol.
question
The first router in the path to the destination network.
answer
What information does the next hop entry in a routing table identify?
question
Forward the packet to the next hop router specified by the rout to network 0.0.0.0.
answer
A router is connected to the network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?
question
Drop the packet.
answer
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?
question
IGP
answer
You have a private network connected to the Internet. Your routers will not share routing information about your private network with Internet routers. Which of the following best describes the type of routing protocol you would use?
question
All routes must be manually updated on the router.
answer
Which of the following is a characteristic of static routing when compared to dynamic routing?
question
Manually reconfigure the default route to point to the new next hop router.
answer
You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks. The next hop router for the default route has changed. You need to make the change with the least amount of effort possible. What should you do?
question
Wait for convergence to take place.
answer
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do?
question
Convergence
answer
You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network?
question
Route data based on logical network addresses. Maintain information about paths through an internetwork
answer
Which two of the following tasks do routers perform?
question
Hub - Single collision domain Switch - Multiple collision domain 802.11n wireless access point - Single collision domain Router - Multiple collision domains Bridge - Multiple collision domain Repeater - Single collision domain Layer 3 switch - Multiple collision domains
answer
Drag the collision domain property on the left to the appropriate network device(s) on the right. Each property can be used more than once. Drag Single collision domain Multiple collision domains Drop Hub, Switch, 802.11n wireless access point, router, bridge, repeater, layer 3 switch
question
To overcome a single point of failure on the next hop router.
answer
What is the primary purpose of gateway redundancy?
question
HSRP, VRRP, GLBP
answer
Which of the following protocols provide gateway redundancy? (Select all that apply.)
question
Route summarization
answer
Which process reduces the size of the routing table by advertising a single route as the destination for a group of contiguous subnets?
question
100,120,1,90,110,5,0,170
answer
Match the default administrative distance with the route type. Drag 0 1 5 90 100 110 120 170 Drop IGRP RIP Static Route EIGRP Internal Route OSPF EIGRP Summary Route Connected Interface EIGRP External Route
question
Metric
answer
When multiple routes to a destination exist, what is used to select the best possible route?
question
OSPF
answer
Which of the following routing protocols uses relative link cost as the metric?
question
BGP
answer
Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions?
question
Divides large networks into areas. Supports IPv6 routing.
answer
Which of the following are true for the IS-IS routing protocol? (Select two.)
question
Configure a border router to use route redistribution.
answer
Your company has decided to temporarily partner with a third-party organization for an upcoming project. This requires your company's network and the third-party's network to be connected via a dedicated WAN connection. As you prepare for the connection, you encounter a problem. The two networks need to be able to exchange routing information, but they use different routing protocols. The third-party organization uses RIP, and your network uses OSPF. What should you do to allow routing information to be exchanged?
question
A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.
answer
In virtualization, what is the role of the hypervisor?
question
Full virtualization
answer
What type of virtualization completely simulates a real physical host?
question
Virtual OS2, Virtual OS3
answer
You have configured a virtual network that includes the following virtual components: Four virtual machines (Virtual OS1, Virtual OS2, etc.) and One virtual switch The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network. Given the port configuration for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS1 can communicate with Device Port Port Assignment Virtual switch P1 Virtual Network1 P2 Virtual Network1 P3 Virtual Network1 P4 Physical Network P5 Physical Network Physical Switch P1 Physical Network P2 Physical Network P3 Physical Network P4 Physical Network P5 Physical Network Virtual Network Virtual OS1 ->P1 -> Virtual Switch Virtual OS2 -> P2 -> Virtual Switch Virtual OS3 -> P3 -> Virtual Switch Virtual OS4 -> P4 -> Virtual Switch Virtual Switch -> P5 -> P1 -> Physical Switch Physical Network Physical OS1 -> P2 -> Physical Switch Physical OS2 -> P3 -> Physical Switch Physical OS3 -> P4 -> Physical Switch Physical OS4 -> P5 -> Physical Switch Physical Switch -> P1 -> P5 -> Virtual Switch
question
Virtual Servers
answer
You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?
question
Virtual switch
answer
Which component is most likely to allow physical and virtual machines to communicate with each other? Host operating system VHD Virtual switch Virtual desktop
question
Virtual OS3, Physical OS1, Physical OS2, Physical OS3, Physical OS4
answer
You have configured a virtual network that includes the following virtual components: Four virtual machines (Virtual OS1, Virtual OS2, etc.) and One virtual switch The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network. Given the port configurations for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS1 can communicate with. Device Port Port Assignment Virtual Switch P1 Virtual Network1 P2 Virtual Network2 P3 Virtual Network1 P4 Virtual Network2 P5 Virtual Network1, Physical Network Physical Switch P1 Physical Network P2 Physical Network P3 Physical Network P4 Physical Network P5 Physical Network
question
SaaS (Software as a Service
answer
Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network? DaaS (Data) PaaS (Platform) SaaS (Software) IaaS (infrastructure)
question
PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.
answer
Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?
question
Cloud computing requires end user knowledge of the physical location and configuration of the system that delivers the services
answer
Which of the following is not true regarding cloud computing? The term cloud is used as a metaphor for the internet Cloud computing requires end user knowledge of the physical location and configuration of the system that delivers the service. Cloud computing is software, data access, computation, and storage services provide to clients through the Internet. Typical cloud computing providers deliver common business applications online that are accessed from another web service or software like web browser.
question
Public Cloud - Provides clouds services to just about anyone. Private Cloud - Provides cloud services to a single organization Community Cloud - Allows cloud services to be shared by several organizations. Hybrid Cloud - Integrates one cloud service with other cloud services.
answer
Match each description on the left with the appropriate cloud technology on the right. Drag Provides cloud services to just about anyone Allows cloud services to be shared by several organizations. Integrates one cloud service with other cloud services. Provides cloud services to a single organization Drop Public Cloud Private Cloud Community Cloud Hybrid Cloud
question
Centralized administration, easy migration of systems to different hardware.
answer
Which of the following are advantages of virtualization (Select two.) Centralized administration Redundancy of hardware components for fault tolerance Easy migration of systems to different hardware Reduced utilization of hardware resources Improved detection of host based attacks
question
Connect the virtual network interfaces in the virtual machines to the virtual switch. Create a new virtual switch configured for host-only (internal) networking.
answer
You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating systems versions and editions. Currently, all of our testing virtual machines are connected to the production network through the hypervisor's network interface. However, you are concerned that the latest application ou are working on could adversely impact other network hosts if errors exist in the code. To prevent this you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do?
question
1,2,3,4
answer
Match the virtualization feature on the right with the appropriate description on the left. Drag - 1 Moving virtual machines between hypervisor hosts. 2 Verifying that security controls are working as designed. 3 Performing a physical-to-virtual migration (P2V) 4 Isolating a virtual machine from the physical network Drop - Flexibility, testing, server consolidation, sandboxing
question
Create a new virtual switch configured for bridged (external networking. Connect the virtual network interfaces in the virtual machines to the virtual switch.
answer
You are responsible for maintaining windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working. To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations. Currently, none of your testing virtual machines have a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates. What should you do?
question
iSCSI Initiator
answer
You are in the process of configuring an iSCSI storage area network (SAN) for your network. You want to configure a Windows Server 2012 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec. Which tool should you use?
question
Multiple networks can be connected to single interface.
answer
What key advantage does a virtual router have over physical router?
question
Implement a virtual firewall within the hypervisor.
answer
You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?
question
Virtual NICs need the appropriate driver installed to function. Multiple virtual NICs can be added to a virtual machine
answer
Which of the following statements about virtual NIC's are true? (Select two) Virtual NIC's need the appropriate driver installed to funciton Virtual NIC's dont have a MAC address. Multiple virtual NIC's can be added to a virtual machine The type of NIC installed on a physical machine determines the type of virtual NIC that is emulated Virtual NICs can communicate only with other virtual NICs
question
3241
answer
Arrange the Fiber Channel SAN implementation tasks in the order they should be performed. 1 Deploy a shared storage device, such as an external RAID device containing multiple hard disk drives 2 Deploy a Fiber Channel switch 3 Install a Fiber Channel adapter in each server that will access the share storage on the SAN 4 Connect each server to the Fiber channel switch using the appropriate fiber optic cabling for the equipment you are using.
question
Requires special hardware and knowledge to implement
answer
Which of the following does not accurately describe an iSCSI SAN? Uses port 3260 by default Requires special hardware and knowledge to implement
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New