38-366: 67-132 Flashcards
If a router cannot determine the next hop for a packet, the router will:
A. Forward the packet to the default route.
B. Send the packet back to the packet’s source.
C. Broadcast the packet.
D. Store the packet in the memory buffer.
A. Forward the packet to the default route.
In which physical network topology is each computer connected to a central point? A. Star B. Mesh C. Ring D. Bus
A. Star
Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.) A. Token ring B. Ethernet C. Dial-up D. Leased line
C. Dial-up
D. Leased line
A private network that allows members of an organization to exchange data is an: A. Extranet B. Ethernet C. Intranet D. Internet
C. Intranet
Security is a concern on wireless networks due to: A. The radio broadcast access method. B. Spread spectrum issues. C. Frequency modulation issues. D. The potential for cross-talk.
A. The radio broadcast access method.
A characteristic of the mesh topology is that it: A. Uses a central hub. B. Cannot use wired connections. C. Uses redundant paths. D. Cannot use wireless connections.
C. Uses redundant paths.
To protect a network when it is connected to the Internet, you should use a: A. Bridge B. Firewall C. Switch D. Router
B. Firewall
One purpose of a perimeter network is to:
A. Make resources available to the intranet.
B. Link campus area networks (CANs).
C. Link local area networks (LANs).
D. Make resources available to the Internet.
D. Make resources available to the Internet.
Which protocol can be used to encrypt packets on the Internet? A. SNMP B. HTTPS C. TFTP D. HTTP
B. HTTPS
The service that resolves fully qualified domain names (FQDN) to IP addresses is: A. Windows Internet Name Service (WINS). B. Domain Name Service (DNS). C. Internet Service Provider (ISP). D. Address Resolution Protocol (ARP).
B. Domain Name Service (DNS).
DRAG DROP - Order the layers of the OSI model: Select and Place: - Application - Data link - Network - Physical - Presentation - Session - Transport
Layer:
1: Physical
2: Data link
3: Network
4: Transport
5: Session
6: Presentation
7: Application
If a router is installed so that it separates a DHCP server from its clients, the clients will:
A. Immediately lose connectivity to all segments.
B. Be unable to obtain their leases from the server.
C. Immediately lose connectivity to the local segment.
D. Receive an immediate renewal of their lease.
B. Be unable to obtain their leases from the server.
Which of the following services masks internal IP addresses from outside the network? A. DHCP B. WINS C. NAT D. DNS
C. NAT
The query protocol used to locate resources on a network is:
A. User Datagram Protocol (UDP).
B. Lightweight Directory Access Protocol (LDAP)
C. Tracert
D. Telnet.
B. Lightweight Directory Access Protocol (LDAP)
Tracert is used to:
A. Manage routing tables dynamically.
B. Manage session-oriented connections between nodes.
C. Report the route taken by packets across an IP network.
D. Report the shortest route between different networks.
C. Report the route taken by packets across an IP network.
In which OSI layer does routing occur? A. Transport B. Network C. Data Link D. Physical
B. Network
What type of record does DNS use to find a mail service? A. Service (SRV) DNS record B. Canonical (CNAME) DNS record C. Mail Exchanger (MX) DNS record D. Host (A) DNS record
C. Mail Exchanger (MX) DNS record
The default gateway address identifies the:
A. Device that will connect the computer to the local network.
B. Device that will connect the computer to a remote network.
C. Server that will provide name services for the computer.
D. Server that will authenticate the user of the computer.
B. Device that will connect the computer to a remote network.
How many bits are there in an Internet Protocol version 6 (IPv6) address? A. 32 B. 64 C. 128 D. 256
C. 128
Which of the following is a public IP address? A. 10.156.89.1 B. 68.24.78.221 C. 172.16.152.48 D. 192.168.25.101
B. 68.24.78.221
What is the minimum cabling requirement for a 100BaseTX network? A. Category 3 UTP cable B. Category 5 UTP cable C. Category 6 UTP cable D. Multimode fiber cable
B. Category 5 UTP cable
Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.) A. Establishing network speed parameters B. Verifying the client's patch level C. Negotiating algorithms to use D. Exchanging key information
C. Negotiating algorithms to use
D. Exchanging key information
HOTSPOT -
You are trying to access a music sharing service on the Internet. The service is located at the IP address 173.194.75.105. You are experiencing problems connecting.
You run a trace route to the server and receive the output shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Router
Successful
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
21DA:D3:0:2F3B:2AA:FF:FE28:9C5A is a valid IPv6 unicast address
FE80::2AA:FF:FE28:9C5A is a valid IPv6 address
21DA::02AA:::FF:FE28:9C5A is a valid IPv6 address
Yesy
Yes
No
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
IPsec can be used to secure network communications between two mahines
IPsec can be used to secure network communications between two networks
IPsec network traffic is always encrypted
Yesy
Yes
No
This question requires that you evaluate the underlined text to determine if it is correct.
The process of replicating a zone file to multiple DNS servers is called “zone replication”.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Zone transfer
B. Zone synchronization
C. Start of authority
D. No change is needed
A. Zone transfer