Book-Cards-Pt3 - Sheet 1 (2) Flashcards

1
Q

qtext

A

answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which routing protocol uses a composite metric of bandwidth and delay of the line to find the best path to a remote network?

A

EIGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which command will display the current contents of the ARP cache on the local workstation?

A

arp -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network device that is used to connect multiple devices without segmenting a network is a ?

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Spanning Tree Protocol allows for redundancy of what networking device?

A

Bridge (switch)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which can operate at both Layers 2 and Layer 3 of the OSI model?

A

Layer 3 switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SMTP resides at what layer of the OSI model?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A user discovers that their wireless 802.11g Internet connection is intermittently disrupted. What can typically cause this problem?

A

Cordless phones and/or microwave ovens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which device helps to increase the number of collision domains?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which logical physical topology does 802.3 utilize?

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which wireless standard has a maximum data rate of 11Mbps?

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What functionality does Kerberos provide?

A

Authentication of security principles and authorization of access to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What TCP/IP port numbers does FTP utilize?

A

20 and 21. 20 is FTP data or a client, and 21 is an FTP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

At what layer of the OSI model does UDP reside?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Convert the following binary string to its dotted decimal address: 11000000.10101000.01100011.00011010

A

192.168.99.26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

100BaseTX uses how many pairs of Category 5 unshielded twisted-pair (UTP) cables?

A

2 pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What device connects computers with wireless adapters to a network in infrastructure mode?

A

Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Converting analog signals to digital signals and digital signals to analog signals can be done using what device?

A

Modem. Dial-up modems are rarely used today, but cable modems are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The maximum segment length for Ethernet is .

A

100 meters (328 feet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the maximum speed of 802.11g?

A

54Mbps (megabits per second)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which techniques would increase the bandwidth for network transmission by joining multiple connections into one logical connection?

A

Bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

True/False: Firewalls are used to prevent packets from entering and leaving a network.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which device can never run full duplex?

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A valid Media Access Control (MAC) address is how many bytes long?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What well-known port does Trivial File Transfer Protocol (TFTP) use?

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In which OSI layer does a bridge operate?

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An IT specialist is going to implement a packet filter on a network for Internet connections. What port must they allow through the firewall for users to connect to the Web?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the name of the point where local exchange carrier responsibility ends?

A

Demarc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What protocol translates the IP address to its physical network address?

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Ethernet networking is known as a physical topology.

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the default port for HTTPS?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

In the Media Access Control (MAC) address 00:B0:D0:6A:F2:B5, what does 00:B0:D0 identify?

A

The manufacturer of the device, known as the OUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which network segment is located outside the firewall?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A network administrator needs to establish a remote connection to a client machine. Telnet is not secure because everything is sent in the clear. Which protocol and port number should be used instead?

A

Secure Shell (SSH), port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What fiber connector looks similar to an RJ-45 connector and connects two strands of fiber?

A

Mechanical transfer registered jack (MT-RJ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What cable type is used to link together two buildings that are over 10 miles (16.09 kilometers) apart?

A

Single-mode fiber (SMF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the maximum Cat 3 length acceptable for a horizontal cross-connect?

A

100 meters (328 feet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

An optical time-domain reflectometer (OTDR) can be used to assess what?

A

Fiber segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What level of the Open Systems Interconnection (OSI) model does a proxy server operate in?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What device is used to create a virtual local area network (VLAN)?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What protocol creates a secure connection between a web browser and a web server and is an alternative to using Telnet?

A

Secure Sockets Layer (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

True/False: If an administrator wants to set up an email server to exchange emails with other servers over the Internet, Simple Mail Transfer Protocol (SMTP) would be utilized.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which remote access authentication protocol allows usernames and passwords to be transmitted as clear text?

A

Password Authentication Protocol (PAP), which has been replaced by CHAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

At what layer of the Open Systems Interconnection (OSI) model does a router function?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Simple Mail Transfer Protocol (SMTP) utilizes what well-known Transmission Control Protocol/Internet Protocol (TCP/IP) port number?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A technician pings 127.0.0.1 and gets the following result - Unable to contact IP driver, error code 2. - What should you do now?

A

Reinstall the TCP/IP protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

True/False: 172.192.4.256 is a valid Internet Protocol (IP) address.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What Open Systems Interconnection (OSI) layer converts digital data into electronic signals to be put on a wire?

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

True/False: Internet Control Message Protocol (ICMP) is used for error reporting with Internet Protocol (IP).

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which WAN technologies uses 30 64Kpbs channels?

A

E-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What network hardware allows most traffic collisions?

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which system detects and reports attempts of unauthorized access to the network?

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

True/False: 32-bit is a valid Wired Equivalent Privacy (WEP) key.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

True/False: 1000Mbps is known as 1000 terabytes per second.

A

False. It means gigabyte per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

True/False: One of the purposes of a virtual local area network (VLAN) is to add more users.

A

False. It is to break up broadcast domains.

67
Q

Which device would administer routing in a network?

A

Router, or Layer 3 switch

69
Q

True/False: If a network administrator needs to restrict access to certain websites, a proxy server should be implemented.

70
Q

A technician is terminating a line that was extending an Ethernet jack to a wiring closet. Which hardware tool is necessary to complete the task?

A

Punch-down tool

71
Q

What is required to pass traffic from one VLAN to another?

A

Router, or Layer 3 switch

73
Q

At what two layers of the Open Systems Interconnection (OSI) model does a packet-filtering firewall operate?

A

Network and Transport

74
Q

How many pairs are crossed in a crossover cable?

75
Q

True/False: The maximum speed of 802.11b is 54Mbps (megabits per second).

76
Q

True/False: The maximum speed of 802.11b is 11Mbps (megabits per second).

77
Q

Which documentation would a network administrator need to update if they have just finished upgrading the firmware on all switches within the LAN?

A

Physical network diagram

78
Q

True/False: The number of wireless users will affect the range of an 802.11b wireless access point (WAP).

A

False. It will affect the throughput but not the distance.

79
Q

True/False: 1000BaseCX is an Institute of Electrical and Electronics Engineers (IEEE) copper cable standard.

80
Q

True/False: A mesh network has the least collisions.

81
Q

True/False: Mesh network topology uses the most cable of any physical topology.

82
Q

True/False: 100BaseFX runs over Category 5e cable.

83
Q

True/False: 100BaseFX runs over multimode fiber (MMF) cable.

84
Q

What is the maximum cable type required for 100BaseTX?

A

Category 5 unshielded twisted-pair (UTP)

85
Q

True/False: Using a wireless access point (WAP), you can bridge an 802.3 network to an 802.11 network.

86
Q

Which type of connector does a 10BaseFL network use?

A

Straight tip (ST)

87
Q

True/False: The 802.11b/g frequency band is 2.4GHz (gigahertz).

88
Q

Which protocol permits secure polling network devices?

89
Q

Which is a topology used in networks for its scalability?

90
Q

What is part of the IP suite and is used to monitor network-managed devices?

92
Q

A technician is extending a data circuit to the other side of the building. What would the technician set up at the new location?

93
Q

Among the encryption protocols that the DoD says are unbreakable, which is the best?

94
Q

What encryption protocol or standard allows you to create a virtual subnet on an intranet?

95
Q

Which user-authentication method uses a public key and private key pair?

96
Q

True/False: RIPv2 is a hybrid routing protocol.

97
Q

True/False: RIPv1 is a link state routing protocol.

98
Q

Which two software types would be used for identifying an attack?

A

IDS and IPS

99
Q

A client purchases a new wireless printer and wants to be able to bond it their PDA. What is the name of the technology that describes the type of wireless printer that was purchased?

100
Q

True/False: Internet Protocol version 6 (IPv6) uses 128-bit addresses.

101
Q

A technician has just finished implementing a solution for a network issue. What steps in should the technician do next?

A

Document the issue and the solution that was implemented.

102
Q

True/False: A denial of service (DoS) attack is meant to prevent users from accessing a system.

103
Q

True/False: IP spoofing is the process of sending a packet with a fake source address, pretending that the packet is coming from within the network the hacker is trying to attack.

104
Q

Which routing protocols uses AS-Path as one of the methods to build the routing table?

105
Q

A technician is troubleshooting a switch and has identified the symptoms. What step should the technician take next?

A

Escalate the issue.

106
Q

What kind of tool could a hacker use to intercept traffic on your network?

A

Packet sniffer

107
Q

Remote users are having problems accessing files from a file server. Which should a technician check first?

A

Connectivity

108
Q

Which type of virus attacks executable application and system program files?

A

File virus

109
Q

Which monitoring software is used to view a network at the frame level?

A

Packet sniffer

110
Q

A technician needs to test a wire that is in the wall. What is the best way for the technician to identify the wire’s location?

A

Use a tone generator

111
Q

What devices allow segregation of collision domains but not broadcasting domains?

112
Q

What is the maximum transmission distance of 10GBaseLR?

113
Q

In which layer of the OSI model does IPSec operate?

A

Network (Layer 3)

114
Q

What tool would be used to test the break in a fiber connection on the network?

115
Q

True/False: A rogue access point is where a switch has been installed on a network without the administrator’s knowledge.

A

False. Where an AP has been installed without permission.

116
Q

True/False: Phishing/social engineering refers to the act of attempting to illegally obtain sensitive information by pretending to be a credible source.

117
Q

What are the three main types of intruder detection and defense?

A

Active detection, passive detection, proactive defense

118
Q

What defines how security will be implemented in an organization, including physical security, document security, and network security?

A

Security policy

119
Q

What authentication method allows for domain-level authentication on a wireless network?

120
Q

A company is in the process of upgrading its network infrastructure to support new VoIP telephony equipment. What is a primary feature to consider when selecting a new switch to support the phones?

121
Q

True/False: A security procedure defines the appropriate response to a security event on your network.

122
Q

What are the three primary LAN topologies?

A

Bus, ring, and star, but we only use bus in today’s LANs.

123
Q

What common WAN topology often results in multiple connections to a single site, leading to a high degree of fault tolerance?

124
Q

What is the term for a device that shares its resources with other network devices?

125
Q

What network model draws a clear distinction between devices that share their resources and devices that do not?

A

Client-server

126
Q

Which network topology or connection type can be implemented with only two endpoints?

A

Point-to-point

127
Q

Will a computer that shares no resources most likely be connected to the backbone or to a segment?

128
Q

Which LAN topology is characterized by all devices being daisy-chained together with the devices at each end being connected to only one other device?

129
Q

True/False: RIP is a vendor-neutral routing protocol that uses very little bandwidth but a lot of memory on a router.

A

False. Yes, RIP is vendor neutral, but it uses little router processing and a lot of bandwidth to do its job.

130
Q

True/False: OSPF is a hybrid routing protocol.

131
Q

True/False: EIGRP is used to update the ARP tables on a router.

132
Q

What does the acronym ICMP stand for?

A

Internet Control Message Protocol

133
Q

True/False: EIGRP is a classful routing protocol.

134
Q

True/False: EIGRP has no version that supports IPv6.

135
Q

True/False: OSPF is a link state protocol that supports VLSM and classless routing.

136
Q

True/False: RIPv1 is a distance vector protocol that does not support VLSM and supports only classful routing.

137
Q

What does the acronym IS-IS stand for?

A

Intermediate System-to-Intermediate System

138
Q

What does the acronym IDS stand for?

A

Intrusion detection system

139
Q

What WAN protocol is described as residing in Layer 2.5 of the OSI model?

140
Q

True/False: If you can ping a host, this does not mean you can access its services.

142
Q

What is another name for the Media Access Control (MAC) address?

A

Physical address or hardware address

143
Q

Which LAN connection technology has a full-duplex speed of 200Mbps and uses a Cat 5e cable?

144
Q

What is the Internet Protocol version 4 (IPv4) loopback address?

145
Q

An Ethernet Media Access Control (MAC) address consists of how many bits?

146
Q

True/False: EIGRP uses hop count as a metric to determine the best path to a remote network.

147
Q

Why would you use dynamic routing over static routing?

A

It updates the routing table automatically and scales to large networks.

148
Q

True/False: OSPF can be used only on Cisco routers.

149
Q

True/False: DSL is used to connect hosts to an Ethernet hub.

150
Q

True/False: SDSL means that your download and upload speeds on the line are different.

151
Q

True/False: A link light is the small, usually red, LED on the back of a network card.

152
Q

True/False: ADSL means that the uplink and download speeds of a DSL link are the same.