Chap 6 - Practice Test 1 Flashcards
6-5: You are an IT consultant who has been contracted to install new computers on a client’s Gigabit Ethernet network. You want the performance of the new computers to be as good as it can be, so you configure their network adapters to run at the full speed of 1 Gbps and to use full-duplex communication. You test the computers after installing them, and they function well. However, once the computers are in service, you begin getting complaints from the client of extremely poor network performance on the new machines. You return to the site that evening and run some ping tests, but you do not detect any problem. You call in a colleague to perform a packet analysis, and she detects large numbers of packet collisions, late collisions, Cyclic Redundancy Check (CRC) errors, and runt frames. Which of the following could be the cause of the problem?
Damaged cables
Transmit/Receive (TX/RX) reversal
Duplex mismatch
Incorrect cable type
Duplex mismatch
6-12: Which of the following are port numbers used for Structured Query Language (SQL) communications? (Choose all that apply.)
1433
3389
1521
3306
1433 - SQL Server
1521- SQLNet
3306 - MySQL
6-15: You are setting up an 802.11n wireless network using the 2.4 GHz frequency band. You plan to install three Wireless Access Points (WAPs). Which of the following channels should you use for your access points to avoid channel overlap that can result in interference? (Choose all that apply.)
1
4
6
8
11
1
6
11
6-16: Your supervisor has asked you to increase the security of the servers on your network. Which of the following procedures can be considered to be server hardening techniques? (Choose all that apply.)
Upgrading server firmware
Disabling unnecessary services
Creating privileged user accounts
Disabling unused TCP and UDP ports
Disabling unnecessary services
Creating privileged user accounts
Disabling unused TCP and UDP ports
6-17: You are working the IT help desk when a user calls to report that he cannot access the Internet, although he is able to connect to computers on the local network. At the user’s workstation, you run the ipconfig /all command and examine the output. Which of the options is the most likely explanation for the user’s problem, based on the following ipconfig results?
Windows IP Configuration
Host Name . . . . .Client12
Primary Dns Suffix
Node Type . . . . .Hybrid
IP Routing Enabled. No
WINS Proxy Enabled. No
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix
Description . . . . . . . . . .PCIe Family Controller
Physical Address. . . . . . . .60-EB-69-93-5E-E5
DHCP Enabled. . . . . . . . . .No
Autoconfiguration Enabled . . .Yes
Link-local IPv6 Address . . . .fe80::c955:c944:acdd:3fcb%2
IPv4 Address. . . . . . . . . .192.168.23.234
Subnet Mask . . . . . . . . . .255.255.255.0
Lease Obtained. . . . . . . . .Monday, October 23, 2017 6:23:47 PM
Lease Expires . . . . . . . . .Saturday, November 18, 2017 9:49:24 PM
Default Gateway . . . . . . . .192.168.216.99
DHCPv6 IAID . . . . . . . . . .241232745
DHCPv6 Client DUID . . . . . .00-01-00-01-18-10-22-0D-60-EB-69-93-5E-E5
DNS Servers . . . . . . . . . .192.168.22.114
NetBIOS over Tcpip. . . . . . .Enabled
DHCP is not enabled.
The Subnet Mask setting is incorrect.
The Default Gateway setting is incorrect.
The DNS Servers setting is located on another network.
The Default Gateway setting is incorrect.
default gateway should be on same network as workstation, but its not
6-24: Which of the following well-known ports do you use to configure outgoing mail on a POP3 email client?
110
25
143
80
25
6-25: You are a consultant who has been hired to extend a network by a client that is still running thin Ethernet. Which of the following cable types will you have to bring with you to add thin Ethernet network segments?
RG-8
RG-58
RJ45
RJ11
RG-58
6-27: Which of the following protocols does Internet Protocol Security (IPSec) use to provide data origin authentication by digitally signing packets before transmitting them over the network?
AH
SSL
ESP
RDP
AH
6-28: You have constructed a network on which all of the computers are connected to a single switch. You then create Virtual Local Area Networks (VLANs) on the switch, corresponding to the company’s departments, and add the switch port for each user workstation and department server to the appropriate VLAN. Later, users report that while they can access their departmental servers and the workstations of other users in the same department, they cannot communicate with any of the other departments. What is the problem, and what must you do to correct it?
- There is a faulty VLAN configuration on the switch. You must recreate all of the
VLANs and configure each VLAN for routing. - VLANs are limited to data link layer communication only. To enable communication between the VLANs, you must install a router or a layer 3 switch on the network and configure it to route traffic between the VLANs.
- The VLANs are using different data link layer protocols. You must configure the VLANs to use the same data link layer protocol in order for them to communicate with each other.
- One of the VLANs is configured to filter all of the other VLAN traffic for security purposes. You must change the filter on this one VLAN.
VLANs are limited to data link layer communication only. To enable communication between the VLANs, you must install a router or a layer 3 switch on the network and configure it to route traffic between the VLANs.
6-29: The TCP/IP term socket consists of which of the following elements? (Choose all that apply.)
Port number
MAC address
IP address
Subnet mask
Port number
IP address
Socket
A socket is one endpoint of a two way communication link between two programs running on the network.
accomplished by adding IP address + port, like this: 192.168.2.87:8080
6-32: Which of the following are tasks that can be performed by a protocol analyzer that could provide potential intruders with information about the network? (Choose all that apply.)
- A protocol analyzer can decrypt protected information in packets captured from the network.
- A protocol analyzer can detect open ports on network systems and launch attacks against them.
- A protocol analyzer can display the IP addresses of the systems on the network.
- A protocol analyzer can display the application data in packets captured from the network.
- A protocol analyzer can display the IP addresses of the systems on the network.
- A protocol analyzer can display the application data in packets captured from the network.
6-38: You are working your company’s IT help desk, where you are required to follow a specific troubleshooting protocol when handling calls from users. In which of the following troubleshooting steps would you create a trouble ticket?
Establish a theory of probable cause
Verify full system functionality and, if applicable, implement preventive measures
Identify the problem
Test the theory to determine the cause
Document findings, actions, and outcomes
Implement the solution or escalate as necessary
Establish a plan of action to resolve the problem and identify potential effects
Identify the problem
6-40: Which of the following Wide Area Network (WAN) services provide unequal amounts of upstream and downstream bandwidth? (Choose all that apply.)
SDSL
CATV
ADSL
FCoE
CATV
ADSL
6-43: Which of the following is not a term for the process of combining the bandwidth of two or more network adapters to increase the overall speed of the connection and provide fault tolerance?
Port aggregation
Link aggregation
Bonding
Clustering
NIC teaming
Clustering
applies to servers, not network adapters