Certification exam practice Flashcards

1
Q

Which type of hypervisor does not sit inside of an operating system
Type I
Type II
Type III
Type IV

A

Type I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

On which port does remote desktop run
53
636
3389
389

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are a network technician working on a number of calls for small businesses and you realize you’re gonna be late for one. What’s the best thing to do?

A

Call the customer to let them know you’re running behind schedule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which network troubleshooting tool is used to measure electric currents and voltage
Toner
Multimeter
OTDR
TDR

A

Multimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which are the two main filters that firewalls use for data packets
IP addresses
User accounts
Applications
Ports
Protocols

A

Ports and protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocol in IPsec provides both authentication and encryption

A

ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false: cordless phones can cause interference for wireless networks

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or false: fluorescent light can cause EMI

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or false: microwaves tend to cause interference in wired networks

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is this statement, correct, if no, what is the correct number?
A directly connected route has an administration distance of 0
The statement is correct
255
1
120

A

The statement is correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two statements are true about RIP router protocols?
A router cannot contain more than 15 hops
Ryder management becomes more effective as the network expands
Routes are calculated based on number of hops required
Route changes are broadcasted instantly through the network

A

A route cannot contain more than 15 hops and routes are calculated based on number of hops required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two statements are true about Microsoft security zones
Internet Explorer has four security zones
Adding a website to a security zone, blocked access to that website
The default security level for local Internet, and trusted sites is the same
Security level for restricted sites can be changed
Windows firewall is the application. You must use to add or remove websites to securities zones

A

Internet has four security zones and the default security level for local trusted sites is the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false: in a star topology, a bad cable affects only two interfaces

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false: in a star topology, central connection point allows for flexible scanability

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or false: in a star topology, failure of central connectivity device does not bring down the entire network

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Complete the statement
The access you use to securely connect your home computer to your company Internet is a _________, this is an example of a

A

VPN, host to site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two advantages of using a mesh topology network
It’s self healing, and can still operate when one node breaks down
It is considered more reliable than other networks
Data travels from node to node, with each node in the network handling each packet
The protocols used are very lightweight with little overhead

A

s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An administrator wants to get priority to video conferencing traffic on the router. What should be configured on the router to facilitate this?
QoS
Firewall
Static routing
Floating static routes

A

QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which encryption standard is considered to be the weakest for wireless networks
AES
WEP
WPA
WPA2

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which command is used to delete an IP address bound to interface
dchp -release or ipconfig/release

A

ipconfig/release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which command is used to acquire an IP address from a DHCP server
dhcp -renew or ipconfig/renew

A

ipconfig/renew

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which type of cable is least susceptible to EMI
Fiber optic
STP
Coaxial
UTP

A

Fiber optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which record type should an administrator create to have a more user-friendly name for a host machine
ANAME
ALIAS
CNAME

A

CNAME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which type of record resolves IP addresses to host names
CNAME
A
PTR

A

PTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Is this statement, correct? If not, what is the correct statement?
WEP Provides the strongest encryption for a wireless network
No, it’s WPA2
No, it’s WPA
No, it’s radius
The statement is correct

A

WPA2 has the strongest encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

True or false: IP is connection oriented and reliable

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

True or false: TCP is connection oriented and reliable

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

True or false: UDP is connectionless and unreliable

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Is this statement, correct? If not, what is the correct statement?
E1 Connections use 32 channels to obtain a top speed of 2.048 MB per second
The statement is correct
No, it’s 34.368 MBps
No it’s 44.736 MBPs
No, it’s 1.544 MBPS

A

The statement is correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is a member of the IPsec protocol suite and provides authenticity, integrity, and confidential protection of packets
AH
L2TP
ESP
PPTP

A

ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

True or false: CNAME records must be created manually

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

True or false: DNS resolves host names to IP addresses

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

True or false: LMHOSTS files resolve host names to IP addresses

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

True or false: firewalls are only set up on individual host machines

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

True or false: firewalls can be hardware or software based

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

True or false: firewalls mainly use User accounts to filter data packets

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Is this statement, correct? If not, what is the correct statement?
Cable that meets the 1000baseT standard, has a maximum length of 1000 meters
The statement is correct
No, it’s 500 m
No, it’s 250 m
No, it’s 100 m

A

No, it’s 100 m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Complete the following statement
A smart thermostat controlled by _____________ is an example of IOT
Heat sensor
Motion detector
An app

A

An app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Complete the statement
All IOT devices must have __________
Firewall
An IP address
An account

A

An IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

None of the computers in a building for a large company can connect to the resources, stored on a server, located several buildings away. Which three commandline tools will help you identify the problem
IP
Netbios
Ping
Ipconfig
Netstat

A

IP, ping, netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which DNS servers hold complete tables of mapping of Internet addresses and IP addresses
DBSSEC
namespace
External
Root

A

Root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

your purchasing department has purchased a new single band 802.11 AC wireless router. You want to make sure all your wireless devices are compatible with this new router. Besides, 802.11 AC, which two wireless standards will work with these wireless routers?
802.11N
802.11B
802.11A
802.11G

A

802.11N and 802.11A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

You need to connect three wireless networks together: an 802.11A, an 802.11G, and an 802.11N. Which wireless tool should accomplish this task?
Wireless access point
Wireless router
Wireless Bridge
Wireless network adapter

A

Wireless bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Connecting several computers together in a circle without the use of a hub or switches what kind of topology
Ring
Diamond
Star
Mesh

A

Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

You have been task with installing a new routing protocol that monitors the network for routers that have changed their link state. Which routing protocol will accomplish this
IGRP
NAT
OSPF
RIP

A

OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which IEEE standard is used for wireless networks
802.11
802.5
802.2
802.3

A

802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

You need to find the MAC address of the network adapter to further computer You are currently working on. commandline command will give you the information you need
Grep
arp
Ipconfig /all
Ipconfig

A

Ipconfig /all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

You need to set up 750 computers on the same network. Which IP class is the best option
Class C
Class B
Class D
Class A

A

Class B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Do you need to subnet a 192.168.1.0 network using a C class network. What will be the submit mask?
255.0.0.0
255.255.0.0
255.255.255.255
255. 255. 255. 0

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

You need to set up 200 computers on a class A private network. Which of the following network IDs all the criteria of a class a private network
192.168.1.0
100.10.1.0
172.168.0.1
10.0.0.0

A

10.0.0.0

51
Q

You need to set up a group of IPv6 network interfaces in such a way that each package is delivered to each interface. You should implement a(n) _______ address
Broadcast
Singlecast
Anycast
Multicast

A

Multicast

52
Q

You can truncate IPv6 addresses to save time. The fully truncated version of 2001:4860:000:2001:0000:0000:0000:0068 would be ___________
2001:4860:0:2001:0:0:0:68
21:486::21:::68
2001:4860::::68
2001:4860:0:2001::68

A

2001:4860:0:2001::68

53
Q

Which file resolves netBIOS names to IP addresses
HOSTS
WINS
LMHOSTS
DNS

A

LMHOSTS

54
Q

Which type of virtual which allows virtual machines communicate with the host machine, but no further
Internal
Endpoint
Private
External

A

Internal

55
Q

Which two ports are used for incoming and outgoing email
SMTP
SSH
FTP
IMAP

A

SMTP and IMAP

56
Q

True or false: a TDR is used to find kinks and breaks in fiber optic cable

A

False

57
Q

True or false: a toner is used to trace copper wire cable through a wall

A

True

58
Q

True or false: a multimeter used to see if an eithernet cables functioning

A

False

59
Q

Which Lennox command shows a DNS server for device plus the 13 route servers for DNS
nslookup
Host
Dnslookup
Dig

A

Dig

60
Q

On which layer of the OSI model does encryption take place
Presentation
Data link
Application
Session

A

Presentation

61
Q

Which three of these are a type of switch port?
Access
Unmanaged
Voice access
Trunk
Managed

A

Access, voice access, trunk

62
Q

Is the statement correct? If not, what is the right statement?
In a diamond, every single computer is connected to every other computer on the network
Star
Mesh
Ring
No changes needed

A

Mesh

63
Q

Which twisted pair cable category runs at 10 Gbps for 55 m
CAT6a
CAT7
CAT5
CAT6

A

CAT6

64
Q

Which port does the remote desktop protocol use?
636
389
443
3389

A

3389

65
Q

Wireless camera connects directly to a device and send pictures to it. Which type of connection is this?
Peer to peer
Infrastructure
Ad hoc

A

Peer to peer

66
Q

This type of wireless network lack security, because there’s no centralized device controlling security
Wireless
Infrastructure
Ad hoc

A

Ad hoc

67
Q

Which type of wireless network is controlled through a wireless access point
Peer to peer
Infrastructure
Ad hoc

A

Infrastructure

68
Q

What can be disabled on a wireless access point to help secure the wireless network?
SSID
QoS
MAC filtering

A

SSID

69
Q

TCP is used on which layer of the OSI model
Layer 2
Layer 4
Layer 1
Layer 3

A

Layer 4

70
Q

Your neighbor has asked you to network his home office. He wants a wired connection, not wireless. The network needs to support approximately one gigabyte per second speeds. What is the least expensive options that meet his requirements?
Coaxial
CAT3
Fiber optic
CAT5e

A

CAT5e

71
Q

What version of NAT allows for multiple private addresses to share a single public address?
PAT
Dynamic NAT
Static NAT
One-to-many NAT

A

PAT

72
Q

How many T1 lines are used for full T3 connection
28
2
3
16

A

28

73
Q

True or false: layer 2 switches use MAC addresses

A

True

74
Q

True or false: layer 3 switches can use Mac addresses

A

False

75
Q

True or false: layer 3 switches use IP addresses

A

True

76
Q

Which two statements are true about layer 2 switches
Store-and-forward is the fastest switching method available
A switch uses MAC address tables to determine where to forward frames
If a switch h does not know where to forward a frame it floods it out all ports
Switches are faster than hubs in all circumstances
A switch uses IP address tables to determine where to forward packets

A

A switch uses MAC address tables to determine where to forward frames
If a switch h does not know where to forward a frame it floods it out all ports

77
Q

Which layers of the OSI model are considered to be hardware layers
3-7
4-7
1-2
1-3

A

1-3

78
Q

What are 3 common forwarding methods used by LAN switches
Arpa mapping
Store-and-forward
Cut-through
Fragment-free
Touting
Packet switching

A

Store-and-forward
Cut-through
Fragment-free

79
Q

What type of communication is defined at the physical and data link layers of the OSI model
WAN protocols
Routing
Transport
LAN protocols

A

LAN protocols

80
Q

True or false: in a dynamic NAT, a pool of public IP addresses is used

A

True

81
Q

True or false: in PAT, at least two public IP addresses are required

A

False

82
Q

True or false: In a static NAT, each private ip address requires a separate public IP address for mapping

A

True

83
Q

Which two of the following WAN technologies are most commonly used to connect home devices to the internet
Cable modems
ISDN
T1
DSL
E1

A

Cable modems and DSL

84
Q

Which type of switch is also known as a plug and play switch
Virtual
Unmanaged
Multilayer
Managed

A

Unmanaged

85
Q

Is the following statement correct? If not, what is the correct statement
AAAA records resolve hostnames to 128-bit ip addresses
The statement is correct
No, it’s IPv4
No, it’s A
No, it’s IPv6

A

The statement is correct

86
Q

Which best describes a VPN
A dynamic routing protocol
A secure tunnel used to pass data through internet
Virtual protocol name
An encryption protocol

A

A secure tunnel used to pass data through internet

87
Q

What is the internet?
Global system on that connected computers
A network restricted to users within an organization
Provides access to services needed by partners and customers without granting them access to entire network

A

A global system on interconnected computers

88
Q

What is the intranet?
Global system on that connected computers
A network restricted to users within an organization
Provides access to services needed by partners and customers without granting them access to entire network

A

A network restricted to users within an organization

89
Q

What is the extranet
Global system on that connected computers
A network restricted to users within an organization
Provides access to services needed by partners and customers without granting them access to entire network

A

Provides access to services needed by partners and customers without granting them access to entire network

90
Q

Is the following statement correct? If not, what is the correct statement
ff00:: is a valid IPv6 address that could be assigned to a host computer
The statement is correct
No, it’s ::1
No, it’s 2001:db8::
No, it’s 2003:dead:beef:4dad:23:46:bb:101

A

2003:dead:beef:4dad:23:46:bb:101

91
Q

Your ISP recently installed a t1 line. What is the maximum throughput of a T1 line
1.536 Mbps
15.35 Mbps
1.544 Mbps
1.5 Mbps

A

1.544 Mbps

92
Q

A ________ is a device that sets up a different collision domains for each device connected to it, allowing the networked devices to run in full duplex collisions
Router
Repeater
Hub
Switch

A

Switch

93
Q

What type of route is manually configured by an administrator?
Dynamic
Static
Direct
Floating

A

Static

94
Q

All of your users connect to websites using edge. They usually type domain names such as www.Microsoft.com. What protocol is initiated by default when they press enter after typing the domain name.
FTP
HTTPS
HTTP
UDP

A

HTTP

95
Q

You are troubleshooting a server that needs to connect directly to the Internet, After you run an ipconfig/all, you discover the problem. The server has been auto-assigned the 1Pv6 address fe80:260:8ff:fec0:98%4.
The server won’t connect to the Internet because this is a
address.
Logic-Link
Malformed
Link-Private
Link-Local

A

Link-Local

96
Q

Which data transmission method uses a private tunnel over a public network
VPN
PPTP
IPsec
L2TP

A

VPN

97
Q

You have just scanned the ports of your server and notice that port 3389 is open. What can you tell from this info
The DNS service is running
Remote Desktop services is running
The WINS service is running
RRAS is running

A

The Remote Desktop devices is running

98
Q

Which layer in the TCP model has TCP as its main protocol?
Application
Network Access
Transport
Internet

A

Transport

99
Q

Which step is the first in troubleshooting a network related problem in a small to medium size business
Run a network test
Identify the number of users affected by the problem
Identify the problem
Question and users on what they see is the problem

A

Identify the problem

100
Q

True or false: ping is used to see if one can connect to it destinations IP address

A

True

101
Q

True or false: teresa shows, actual IP addresses on a path from a source to a destination

A

False

102
Q

True or false: the house command performs DNS lookups

A

True

103
Q

True or false: netstat shows open and listening ports on a device

A

True

104
Q

True or false: a layer 2 switch is also called the bridge

A

True

105
Q

True or false: a layer 2 switch uses routing tables

A

False

106
Q

True or false: a switch flood port, if it does not know where to send a packet

A

True

107
Q

True or false: a firewall can be a hardware device

A

True

108
Q

True or false: a firewall can be a software package

A

True

109
Q

True or false: a firewall is a special room to protect servers

A

False

110
Q

True or false: A secondary name gets it data from another name server using his own transfer

A

True

111
Q

True or false: AAA records resolve host names, through IPV4 addresses

A

False

112
Q

True or false: entries in a HOSTS file on a local computer take precedence over DNS

A

True

113
Q

What your tunnels use to transmit IPV6 address information over IPV4
GRE
ISATAP
Teredo
VPN

A

ISATAP
Teredo

114
Q

Your IT Director wants you to group all of the Administrative Assistants’ computers so they can communicate as if they were on the same network. The challenge is that they are located in different areas of a building. What should you do?
Configure a VLAN
Connect all the administrative assistance to one dedicated router
Connect all the administrative assistance to one dedicated switch
Reconfigure the entire company onto one large class B subnet

A

Configure a Vlan

115
Q

Which command-line tool is used to display IP address information and, where applicable, DHCP server information?
Ipconfig
Ping -d
Ping
Ipconfig /all

A

Ipconfig /all

116
Q

How can you connect computer devices using a public network and ensure their messages are safe from being intercepted by unauthorized users
LAN
ISDN
VPN
WAN

A

VPN

117
Q

Which one of the following is a wrongs level domain
.edu
www.gmetrix.com
support.microsoft.com
In-addr.arpa

A

In-addr.arpa

118
Q

Is the following statement, correct? If not, what is the correct statement?
A router is a device that functions primarily on the data link layer of the OSI model
No change needed
No it’s transport layer
No it’s physical layer
No its network layer

A

No its network layer

119
Q

True or false: a router is used to separate multiple networks

A

True

120
Q

True or false: a VLAN is typically configured on a router

A

False

121
Q

True or false: NAT is the mapping of a private LAN IP address

A

True

122
Q

True or false: public websites are accessed through port 25

A

False

123
Q

True or false: decured websites are accessed through port 443 by default

A

True

124
Q

True or false: unsecured websites are accessed through port 80 by default

A

True