Certification exam practice Flashcards

1
Q

Which type of hypervisor does not sit inside of an operating system
Type I
Type II
Type III
Type IV

A

Type I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

On which port does remote desktop run
53
636
3389
389

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are a network technician working on a number of calls for small businesses and you realize you’re gonna be late for one. What’s the best thing to do?

A

Call the customer to let them know you’re running behind schedule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which network troubleshooting tool is used to measure electric currents and voltage
Toner
Multimeter
OTDR
TDR

A

Multimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which are the two main filters that firewalls use for data packets
IP addresses
User accounts
Applications
Ports
Protocols

A

Ports and protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocol in IPsec provides both authentication and encryption

A

ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false: cordless phones can cause interference for wireless networks

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or false: fluorescent light can cause EMI

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or false: microwaves tend to cause interference in wired networks

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is this statement, correct, if no, what is the correct number?
A directly connected route has an administration distance of 0
The statement is correct
255
1
120

A

The statement is correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two statements are true about RIP router protocols?
A router cannot contain more than 15 hops
Ryder management becomes more effective as the network expands
Routes are calculated based on number of hops required
Route changes are broadcasted instantly through the network

A

A route cannot contain more than 15 hops and routes are calculated based on number of hops required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two statements are true about Microsoft security zones
Internet Explorer has four security zones
Adding a website to a security zone, blocked access to that website
The default security level for local Internet, and trusted sites is the same
Security level for restricted sites can be changed
Windows firewall is the application. You must use to add or remove websites to securities zones

A

Internet has four security zones and the default security level for local trusted sites is the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false: in a star topology, a bad cable affects only two interfaces

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false: in a star topology, central connection point allows for flexible scanability

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or false: in a star topology, failure of central connectivity device does not bring down the entire network

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Complete the statement
The access you use to securely connect your home computer to your company Internet is a _________, this is an example of a

A

VPN, host to site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two advantages of using a mesh topology network
It’s self healing, and can still operate when one node breaks down
It is considered more reliable than other networks
Data travels from node to node, with each node in the network handling each packet
The protocols used are very lightweight with little overhead

A

s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An administrator wants to get priority to video conferencing traffic on the router. What should be configured on the router to facilitate this?
QoS
Firewall
Static routing
Floating static routes

A

QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which encryption standard is considered to be the weakest for wireless networks
AES
WEP
WPA
WPA2

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which command is used to delete an IP address bound to interface
dchp -release or ipconfig/release

A

ipconfig/release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which command is used to acquire an IP address from a DHCP server
dhcp -renew or ipconfig/renew

A

ipconfig/renew

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which type of cable is least susceptible to EMI
Fiber optic
STP
Coaxial
UTP

A

Fiber optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which record type should an administrator create to have a more user-friendly name for a host machine
ANAME
ALIAS
CNAME

A

CNAME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which type of record resolves IP addresses to host names
CNAME
A
PTR

A

PTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Is this statement, correct? If not, what is the correct statement? WEP Provides the strongest encryption for a wireless network No, it’s WPA2 No, it’s WPA No, it’s radius The statement is correct
WPA2 has the strongest encryption
26
True or false: IP is connection oriented and reliable
False
27
True or false: TCP is connection oriented and reliable
True
28
True or false: UDP is connectionless and unreliable
True
29
Is this statement, correct? If not, what is the correct statement? E1 Connections use 32 channels to obtain a top speed of 2.048 MB per second The statement is correct No, it’s 34.368 MBps No it’s 44.736 MBPs No, it’s 1.544 MBPS
The statement is correct
30
Which of the following is a member of the IPsec protocol suite and provides authenticity, integrity, and confidential protection of packets AH L2TP ESP PPTP
ESP
31
True or false: CNAME records must be created manually
True
32
True or false: DNS resolves host names to IP addresses
True
33
True or false: LMHOSTS files resolve host names to IP addresses
False
34
True or false: firewalls are only set up on individual host machines
False
35
True or false: firewalls can be hardware or software based
True
36
True or false: firewalls mainly use User accounts to filter data packets
False
37
Is this statement, correct? If not, what is the correct statement? Cable that meets the 1000baseT standard, has a maximum length of 1000 meters The statement is correct No, it’s 500 m No, it’s 250 m No, it’s 100 m
No, it’s 100 m
38
Complete the following statement A smart thermostat controlled by _____________ is an example of IOT Heat sensor Motion detector An app
An app
39
Complete the statement All IOT devices must have __________ Firewall An IP address An account
An IP address
40
None of the computers in a building for a large company can connect to the resources, stored on a server, located several buildings away. Which three commandline tools will help you identify the problem IP Netbios Ping Ipconfig Netstat
IP, ping, netstat
41
Which DNS servers hold complete tables of mapping of Internet addresses and IP addresses DBSSEC namespace External Root
Root
42
your purchasing department has purchased a new single band 802.11 AC wireless router. You want to make sure all your wireless devices are compatible with this new router. Besides, 802.11 AC, which two wireless standards will work with these wireless routers? 802.11N 802.11B 802.11A 802.11G
802.11N and 802.11A
43
You need to connect three wireless networks together: an 802.11A, an 802.11G, and an 802.11N. Which wireless tool should accomplish this task? Wireless access point Wireless router Wireless Bridge Wireless network adapter
Wireless bridge
44
Connecting several computers together in a circle without the use of a hub or switches what kind of topology Ring Diamond Star Mesh
Ring
45
You have been task with installing a new routing protocol that monitors the network for routers that have changed their link state. Which routing protocol will accomplish this IGRP NAT OSPF RIP
OSPF
46
Which IEEE standard is used for wireless networks 802.11 802.5 802.2 802.3
802.11
47
You need to find the MAC address of the network adapter to further computer You are currently working on. commandline command will give you the information you need Grep arp Ipconfig /all Ipconfig
Ipconfig /all
48
You need to set up 750 computers on the same network. Which IP class is the best option Class C Class B Class D Class A
Class B
49
Do you need to subnet a 192.168.1.0 network using a C class network. What will be the submit mask? 255.0.0.0 255.255.0.0 255.255.255.255 255. 255. 255. 0
255.255.255.0
50
You need to set up 200 computers on a class A private network. Which of the following network IDs all the criteria of a class a private network 192.168.1.0 100.10.1.0 172.168.0.1 10.0.0.0
10.0.0.0
51
You need to set up a group of IPv6 network interfaces in such a way that each package is delivered to each interface. You should implement a(n) _______ address Broadcast Singlecast Anycast Multicast
Multicast
52
You can truncate IPv6 addresses to save time. The fully truncated version of 2001:4860:000:2001:0000:0000:0000:0068 would be ___________ 2001:4860:0:2001:0:0:0:68 21:486::21:::68 2001:4860::::68 2001:4860:0:2001::68
2001:4860:0:2001::68
53
Which file resolves netBIOS names to IP addresses HOSTS WINS LMHOSTS DNS
LMHOSTS
54
Which type of virtual which allows virtual machines communicate with the host machine, but no further Internal Endpoint Private External
Internal
55
Which two ports are used for incoming and outgoing email SMTP SSH FTP IMAP
SMTP and IMAP
56
True or false: a TDR is used to find kinks and breaks in fiber optic cable
False
57
True or false: a toner is used to trace copper wire cable through a wall
True
58
True or false: a multimeter used to see if an eithernet cables functioning
False
59
Which Lennox command shows a DNS server for device plus the 13 route servers for DNS nslookup Host Dnslookup Dig
Dig
60
On which layer of the OSI model does encryption take place Presentation Data link Application Session
Presentation
61
Which three of these are a type of switch port? Access Unmanaged Voice access Trunk Managed
Access, voice access, trunk
62
Is the statement correct? If not, what is the right statement? In a diamond, every single computer is connected to every other computer on the network Star Mesh Ring No changes needed
Mesh
63
Which twisted pair cable category runs at 10 Gbps for 55 m CAT6a CAT7 CAT5 CAT6
CAT6
64
Which port does the remote desktop protocol use? 636 389 443 3389
3389
65
Wireless camera connects directly to a device and send pictures to it. Which type of connection is this? Peer to peer Infrastructure Ad hoc
Peer to peer
66
This type of wireless network lack security, because there’s no centralized device controlling security Wireless Infrastructure Ad hoc
Ad hoc
67
Which type of wireless network is controlled through a wireless access point Peer to peer Infrastructure Ad hoc
Infrastructure
68
What can be disabled on a wireless access point to help secure the wireless network? SSID QoS MAC filtering
SSID
69
TCP is used on which layer of the OSI model Layer 2 Layer 4 Layer 1 Layer 3
Layer 4
70
Your neighbor has asked you to network his home office. He wants a wired connection, not wireless. The network needs to support approximately one gigabyte per second speeds. What is the least expensive options that meet his requirements? Coaxial CAT3 Fiber optic CAT5e
CAT5e
71
What version of NAT allows for multiple private addresses to share a single public address? PAT Dynamic NAT Static NAT One-to-many NAT
PAT
72
How many T1 lines are used for full T3 connection 28 2 3 16
28
73
True or false: layer 2 switches use MAC addresses
True
74
True or false: layer 3 switches can use Mac addresses
False
75
True or false: layer 3 switches use IP addresses
True
76
Which two statements are true about layer 2 switches Store-and-forward is the fastest switching method available A switch uses MAC address tables to determine where to forward frames If a switch h does not know where to forward a frame it floods it out all ports Switches are faster than hubs in all circumstances A switch uses IP address tables to determine where to forward packets
A switch uses MAC address tables to determine where to forward frames If a switch h does not know where to forward a frame it floods it out all ports
77
Which layers of the OSI model are considered to be hardware layers 3-7 4-7 1-2 1-3
1-3
78
What are 3 common forwarding methods used by LAN switches Arpa mapping Store-and-forward Cut-through Fragment-free Touting Packet switching
Store-and-forward Cut-through Fragment-free
79
What type of communication is defined at the physical and data link layers of the OSI model WAN protocols Routing Transport LAN protocols
LAN protocols
80
True or false: in a dynamic NAT, a pool of public IP addresses is used
True
81
True or false: in PAT, at least two public IP addresses are required
False
82
True or false: In a static NAT, each private ip address requires a separate public IP address for mapping
True
83
Which two of the following WAN technologies are most commonly used to connect home devices to the internet Cable modems ISDN T1 DSL E1
Cable modems and DSL
84
Which type of switch is also known as a plug and play switch Virtual Unmanaged Multilayer Managed
Unmanaged
85
Is the following statement correct? If not, what is the correct statement AAAA records resolve hostnames to 128-bit ip addresses The statement is correct No, it’s IPv4 No, it’s A No, it’s IPv6
The statement is correct
86
Which best describes a VPN A dynamic routing protocol A secure tunnel used to pass data through internet Virtual protocol name An encryption protocol
A secure tunnel used to pass data through internet
87
What is the internet? Global system on that connected computers A network restricted to users within an organization Provides access to services needed by partners and customers without granting them access to entire network
A global system on interconnected computers
88
What is the intranet? Global system on that connected computers A network restricted to users within an organization Provides access to services needed by partners and customers without granting them access to entire network
A network restricted to users within an organization
89
What is the extranet Global system on that connected computers A network restricted to users within an organization Provides access to services needed by partners and customers without granting them access to entire network
Provides access to services needed by partners and customers without granting them access to entire network
90
Is the following statement correct? If not, what is the correct statement ff00:: is a valid IPv6 address that could be assigned to a host computer The statement is correct No, it’s ::1 No, it’s 2001:db8:: No, it’s 2003:dead:beef:4dad:23:46:bb:101
2003:dead:beef:4dad:23:46:bb:101
91
Your ISP recently installed a t1 line. What is the maximum throughput of a T1 line 1.536 Mbps 15.35 Mbps 1.544 Mbps 1.5 Mbps
1.544 Mbps
92
A ________ is a device that sets up a different collision domains for each device connected to it, allowing the networked devices to run in full duplex collisions Router Repeater Hub Switch
Switch
93
What type of route is manually configured by an administrator? Dynamic Static Direct Floating
Static
94
All of your users connect to websites using edge. They usually type domain names such as www.Microsoft.com. What protocol is initiated by default when they press enter after typing the domain name. FTP HTTPS HTTP UDP
HTTP
95
You are troubleshooting a server that needs to connect directly to the Internet, After you run an ipconfig/all, you discover the problem. The server has been auto-assigned the 1Pv6 address fe80:260:8ff:fec0:98%4. The server won't connect to the Internet because this is a address. Logic-Link Malformed Link-Private Link-Local
Link-Local
96
Which data transmission method uses a private tunnel over a public network VPN PPTP IPsec L2TP
VPN
97
You have just scanned the ports of your server and notice that port 3389 is open. What can you tell from this info The DNS service is running Remote Desktop services is running The WINS service is running RRAS is running
The Remote Desktop devices is running
98
Which layer in the TCP model has TCP as its main protocol? Application Network Access Transport Internet
Transport
99
Which step is the first in troubleshooting a network related problem in a small to medium size business Run a network test Identify the number of users affected by the problem Identify the problem Question and users on what they see is the problem
Identify the problem
100
True or false: ping is used to see if one can connect to it destinations IP address
True
101
True or false: teresa shows, actual IP addresses on a path from a source to a destination
False
102
True or false: the house command performs DNS lookups
True
103
True or false: netstat shows open and listening ports on a device
True
104
True or false: a layer 2 switch is also called the bridge
True
105
True or false: a layer 2 switch uses routing tables
False
106
True or false: a switch flood port, if it does not know where to send a packet
True
107
True or false: a firewall can be a hardware device
True
108
True or false: a firewall can be a software package
True
109
True or false: a firewall is a special room to protect servers
False
110
True or false: A secondary name gets it data from another name server using his own transfer
True
111
True or false: AAA records resolve host names, through IPV4 addresses
False
112
True or false: entries in a HOSTS file on a local computer take precedence over DNS
True
113
What your tunnels use to transmit IPV6 address information over IPV4 GRE ISATAP Teredo VPN
ISATAP Teredo
114
Your IT Director wants you to group all of the Administrative Assistants' computers so they can communicate as if they were on the same network. The challenge is that they are located in different areas of a building. What should you do? Configure a VLAN Connect all the administrative assistance to one dedicated router Connect all the administrative assistance to one dedicated switch Reconfigure the entire company onto one large class B subnet
Configure a Vlan
115
Which command-line tool is used to display IP address information and, where applicable, DHCP server information? Ipconfig Ping -d Ping Ipconfig /all
Ipconfig /all
116
How can you connect computer devices using a public network and ensure their messages are safe from being intercepted by unauthorized users LAN ISDN VPN WAN
VPN
117
Which one of the following is a wrongs level domain .edu www.gmetrix.com support.microsoft.com In-addr.arpa
In-addr.arpa
118
Is the following statement, correct? If not, what is the correct statement? A router is a device that functions primarily on the data link layer of the OSI model No change needed No it’s transport layer No it’s physical layer No its network layer
No its network layer
119
True or false: a router is used to separate multiple networks
True
120
True or false: a VLAN is typically configured on a router
False
121
True or false: NAT is the mapping of a private LAN IP address
True
122
True or false: public websites are accessed through port 25
False
123
True or false: decured websites are accessed through port 443 by default
True
124
True or false: unsecured websites are accessed through port 80 by default
True