38-366: 1-66 Flashcards

1
Q

One advantage of dynamic routing is that it:
A. Automatically maintains routing tables.
B. Limits traffic derived from routing protocols.
C. Reduces broadcast traffic.
D. Automatically enables DHCP.

A

A. Automatically maintains routing tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following represents a Media Access Control (MAC) address?
A. GV:ZC:KK:DK:FZ:CA
B. 255.255.255.0
C. 05:35:AB:6E:A1:25
D. 127.0.0.1
A

C. 05:35:AB:6E:A1:25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Connecting to a private network address from a public network requires:
A. Network address translation (NAT).
B. Dynamic Host Configuration Protocol (DHCP).
C. Network Access Protection (NAP).
D. Dynamic domain name system (DDNS).

A

A. Network address translation (NAT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A network device that associates a Media Access Control (MAC) address with a port is a:
A. DSL modem
B. Hub
C. Router
D. Switch
A

D. Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A Layer 2 device that connects multiple computers within a network is a:
A. Repeater
B. Switch
C. Router
D. Packet
A

B. Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A cable that meets the l000BaseT standard has a maximum length of:
A. 100 m
B. 250 m
C. 500 m
D. 1,000 m
A

A. 100 m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A router's static route is set by the:
A. Adjacent network
B. Next upstream router
C. Network administrator
D. Routing protocol
A

C. Network administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which setting is used to determine the Domain Name System (DNS) settings on a client computer?
A. TELNET
B. NSLOOKUP
C. PATHPING
D. NETSTAT
A

B. NSLOOKUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
The default subnet mask for a Class B network is:
A. 0.0.0.255
B. 0.0.255.255
C. 255.0.0.0
D. 255.255.0.0
A

D. 255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
The default port used for SMTP is:
A. 23
B. 25
C. 80
D. 8080
A

B. 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ping tool is used to: (Choose two.)
A. Determine the network portion of a host address.
B. Self-test a host’s own network interface.
C. Determine whether a host is reachable.
D. Manage a host’s session when UDP is used.

A

B. Self-test a host’s own network interface.

C. Determine whether a host is reachable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are features of DHCP? (Choose two.)
A. IP address resolution to canonical names
B. Secure shell connections
C. Address reservation
D. Network file transfer
E. IP address exclusion

A

C. Address reservation

E. IP address exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
The command-line tool used to list a host's active incoming connections is:
A. NETSTAT
B. IPCONFIG
C. NSLOOKUP
D. PING
A

A. NETSTAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A computer that has an IP address of 169.254.0.1 cannot access the network.
Which of the following services should you confirm is available?
A. WINS
B. DNS
C. DHCP
D. TFTP

A

C. DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which network does the IP address 220.100.100.100 belong to?
A. 220.100.100.0/24
B. 220.100.100.1/24
C. 255.255.255.0/24
D. 255.255.255.1/24
A

A. 220.100.100.0/24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which subnet mask is valid?
A. 255.255.255.240
B. 255.255.255.228
C. 255.255.255.164
D. 255.255.255.245
A

A. 255.255.255.240

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A service that resolves NetBIOS names to IP addresses is:
A. Domain Name Service (DNS).
B. Internet Service Provider (ISP).
C. Address Resolution Protocol (ARP).
D. Windows Internet Name Service (WINS).
A

D. Windows Internet Name Service (WINS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
What type of DNS record maps host names to addresses?
A. Mail Exchanger (MX) DNS record
B. Service (SRV) DNS record
C. Host (A) DNS record
D. Canonical (CNAME) DNS record
A

C. Host (A) DNS record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Teredo tunneling is a protocol that:
A. Translates Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6).
B. Allows IPv6 connectivity through IPv4 devices.
C. Provides VPN security.
D. Dynamically allocates IPv6 addresses.

A

B. Allows IPv6 connectivity through IPv4 devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
What is the default subnet mask for a Class C Internet network?
A. 255.255.255.252
B. 255.255.255.240
C. 255.255.255.192
D. 255.255.255.0
A

D. 255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
The default port used for telnet is:
A. 23
B. 25
C. 80
D. 8080
A

A. 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When a client’s DHCP-issued address expires, the client will:
A. Select a new address and request approval from the DHCP server.
B. Require manual configuration with a static IP address.
C. Attempt to obtain a new address by broadcasting.
D. Continue to use the address until it is notified to stop.

A

C. Attempt to obtain a new address by broadcasting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response.
Why do you receive a response on the second attempt but not on the first attempt?
A. PING is improperly configured.
B. The DNS is not resolving.
C. The DHCP server is offline.
D. NSLOOKUP is stopped.

A

B. The DNS is not resolving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
A Media Access Control (MAC) address identifies a/an:
A. UPnP device.
B. Local broadcast domain.
C. Network interface card (NIC).
D. Local area network (LAN).
A

C. Network interface card (NIC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Two companies want to share data by using the Internet.
Which type of network provides the solution?
A. Ethernet
B. Intranet
C. Extranet
D. Perimeter

A

C. Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

VPNs are implemented to provide:
A. A secure connection within a private network.
B. A secure connection through public networks.
C. Additional encryption by using IPSec.
D. Additional security for selected computers.

A

B. A secure connection through public networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
If an 802.llg Internet connection has connectivity problems, what may be the cause?
A. A cordless phone
B. A cellular phone
C. Incandescent lights
D. Electromagnetic interference (EMI)
A

D. Electromagnetic interference (EMI)

28
Q

Which of these factors has the biggest impact on data transmission speed in a wireless network?
A. The access method used for the network
B. The transmission standard of the equipment used
C. The use of strong encryption for transmissions
D. The transmission wattage rating used on the NIC

A

B. The transmission standard of the equipment used

29
Q
Which of the following uses a tunneling protocol?
A. Internet
B. VPN
C. Extranet
D. VLAN
A

B. VPN

30
Q
A network that separates an organization's private network from a public network is a/an:
A. Firewall
B. Extranet
C. Perimeter
D. Internet
A

C. Perimeter

31
Q
Which type of network is most vulnerable to intrusion?
A. Dial-up
B. Wireless
C. Broadband
D. Leased line
A

B. Wireless

32
Q
Attenuation in a wireless network signal is a result of:
A. Number of wireless nodes connected.
B. Distance from the access point.
C. Interference from cellular phones.
D. Encryption of the signal.
A

B. Distance from the access point.

33
Q
Which type of network covers the broadest area?
A. WAN
B. CAN
C. LAN
D. PAN
A

A. WAN

34
Q
In local area network (LAN) topologies, the primary media access methods are: (Choose two.)
A. Contention
B. Negotiation
C. Kerberos
D. Token passing
A

A. Contention

D. Token passing

35
Q
n a physical star topology, the central device is referred to as a:
A. Bridge
B. Server
C. segmenter
D. Hub
A

D. Hub

36
Q
Which technology can you use to extend an internal network across shared or public networks?
A. VLAN
B. Microsoft ASP-NET
C. Microsoft .NET Framework
D. VPN
A

D. VPN

37
Q
Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)
A. 802.1 If
B. 802.11g
C. 802.11k
D. 802.11m
E. 802.11n
A

B. 802.11g

E. 802.11n

38
Q

What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point?
A. The access point will transmit, but the node will be unable to receive.
B. A connection will be established.
C. Both the node and the access point will be unable to transmit.
D. The node will transmit, but the access point will be unable to receive.

A

B. A connection will be established.

39
Q
Which technology provides the highest bit rate?
A. T1
B. El
C. DS3
D. ISDN
A

C. DS3

40
Q

A VPN is a/an:
A. Encrypted connection across the Internet.
B. Virtual network within your local area network (LAN).
C. Communication tunnel between VLANs.
D. Personal network for your use only.

A

A. Encrypted connection across the Internet.

41
Q

Which of the following determines the media access method that is used in a network?
A. Number of hosts connected to the network
B. Number of domain servers on the segment
C. Maximum speed of the media
D. Topology and protocols

A

D. Topology and protocols

42
Q
Which wireless authentication method provides the highest level of security?
A. Wired Equivalency Privacy (WEP)
B. IEEE 802.lln
C. WI-FI Protected Access (WPA)
D. IEEE 802.11a
A

C. WI-FI Protected Access (WPA)

43
Q
The topology of a local area network (LAN) is defined by the:
A. Number of devices to connect.
B. Physical and logical characteristics.
C. Distance between workstations.
D. Type of cable being used.
A

B. Physical and logical characteristics.

44
Q
The maximum throughput of an 802.llg network is:
A. 2.4 GHz.
B. 54 GHz.
C. 2.4 Mbps
D. 54 Mbps.
A

D. 54 Mbps.

45
Q
A node within a local area network (LAN) must have a network interface device and a:
A. Network account
B. Table of all network nodes
C. Host address
D. Resource to share
A

C. Host address

46
Q

Which of the following is a Layer 2 WAN protocol?
A. Point-to-Point Protocol (PPP)
B. Simple Network Management Protocol (SNMP)
C. Transmission Control Protocol (TCP)
D. Internet Protocol (IP)

A

A. Point-to-Point Protocol (PPP)

47
Q
Which type of port is used to support VLAN traffic between two switches?
A. Virtual port
B. WAN port
C. Trunk port
D. LAN port
A

C. Trunk port

48
Q

The protocol that maps IP addresses to a Media Access Control (MAC) address is:
A. Internet Message Access Protocol (IMAP).
B. Dynamic Host Configuration Protocol (DHCP).
C. Routing Information Protocol (RIP).
D. User Datagram Protocol (UDP).
E. Address Resolution Protocol (ARP).

A

E. Address Resolution Protocol (ARP).

49
Q

A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday.
You verify that the user’s computer is properly physically connected to the network. You discover that the computer’s IP address is 169.254.48.97.
You need to restore access to network resources.
What should you do next?
A. Flush the cache on the DNS server.
B. Reset the user’s password on the server.
C. Check your router’s current routing tables.
D. Verify that the DHCP service is available.

A

D. Verify that the DHCP service is available.

50
Q
The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is:
A. corp
B. com
C. nwtraders
D. exchange
E. mail
A

E. mail

51
Q
To which IP configuration does the CIDR notation 192.168.1.1/25 refer?
A. 192.168.1.1 255.255.255.64
B. 192.168.1.1 255.255.255.1
C. 192.168.1.1 255.255.255.32
D. 192.168.1.1 255.255.255.256
E. 192.168.1.1 255.255.255.128
A

E. 192.168.1.1 255.255.255.128

52
Q
Which command is used to verify that a server is connected to the network?
A. IPCONFIG
B. ROUTE
C. PING
D. CHECK
A

C. PING

53
Q
Which of these represents the Internet Protocol version 6 (IPv6) loopback address?
A. 127.0.0.1
B. 192.168.0.1
C. FEC0:A8C0::AA01
D. ::1
A

D. ::1

54
Q
Which of these addresses is a multicast address?
A. 127.0.0.1
B. 169.254.0.1
C. 192.168.0.1
D. 224.0.0.1
A

D. 224.0.0.1

55
Q
Which of the following uses pointer records and A records?
A. IDS
B. DNS Server
C. NAT Server
D. IPS
A

B. DNS Server

56
Q
The ipconfig command will:
A. Configure routers
B. Display a client's address
C. Display a client's broadcast mode
D. Configure DHCP clients
A

B. Display a client’s address

57
Q

One reason to incorporate VLANs in a network is to:
A. Increase the number of available IP addresses.
B. Increase the number of available Media Access Control (MAC) addresses.
C. Reduce the number of broadcast domains.
D. Reduce the number of nodes in a broadcast domain.

A

D. Reduce the number of nodes in a broadcast domain.

58
Q
Which of these is an application layer protocol?
A. TCP
B. FTP
C. IP
D. UDP
A

B. FTP

59
Q
The top-level domain of www.adventureworks.com is:
A. www
B. adventureworks
C. adventureworks.com
D. com
A

D. com

60
Q
At what layer in the OSI model are hardware addresses referenced?
A. Network
B. Application
C. Data link
D. Physical
A

C. Data link

61
Q
You need to divide a network into three subnets.
Which device should you use?
A. Hub
B. Bridge
C. Router
D. Segmenter
A

C. Router

62
Q
The type of connector used on a 100BaseT Ethernet cable is:
A. RJ-11
B. RJ-45.
C. TNC.
D. BNC.
A

B. RJ-45.

63
Q

In addition to switching, multilayer switches also:
A. Provide Layer 3 routing functions.
B. Interface with CAT3, CATS, CAT5e, and fiber optics.
C. Support 10 MB, 100 MB, and 1 GB local area network (LAN) ports.
D. Operate by using only Layer 1 and 2 protocols.

A

A. Provide Layer 3 routing functions.

64
Q
One reason to replace an unmanaged switch with a managed switch is to:
A. Manage the routing tables.
B. Support multiple VLANS.
C. Reduce collision domains.
D. Route between networks,
A

B. Support multiple VLANS.

65
Q
To directly connect the Ethernet network interface cards (NICs) of two computers, you should use a:
A. Crossover cable
B. Straight cable
C. Rollover cable
D. Coaxial cable
A

A. Crossover cable

66
Q
The function of a router is to:
A. Provide IP subnet masks for hosts.
B. Forward traffic to other networks.
C. Broadcast routing tables to clients.
D. Store tables for name resolution.
A

B. Forward traffic to other networks.