Chap 6 - Practice Test 1 Flashcards
6-5: You are an IT consultant who has been contracted to install new computers on a client’s Gigabit Ethernet network. You want the performance of the new computers to be as good as it can be, so you configure their network adapters to run at the full speed of 1 Gbps and to use full-duplex communication. You test the computers after installing them, and they function well. However, once the computers are in service, you begin getting complaints from the client of extremely poor network performance on the new machines. You return to the site that evening and run some ping tests, but you do not detect any problem. You call in a colleague to perform a packet analysis, and she detects large numbers of packet collisions, late collisions, Cyclic Redundancy Check (CRC) errors, and runt frames. Which of the following could be the cause of the problem?
Damaged cables
Transmit/Receive (TX/RX) reversal
Duplex mismatch
Incorrect cable type
Duplex mismatch
6-12: Which of the following are port numbers used for Structured Query Language (SQL) communications? (Choose all that apply.)
1433
3389
1521
3306
1433 - SQL Server
1521- SQLNet
3306 - MySQL
6-15: You are setting up an 802.11n wireless network using the 2.4 GHz frequency band. You plan to install three Wireless Access Points (WAPs). Which of the following channels should you use for your access points to avoid channel overlap that can result in interference? (Choose all that apply.)
1
4
6
8
11
1
6
11
6-16: Your supervisor has asked you to increase the security of the servers on your network. Which of the following procedures can be considered to be server hardening techniques? (Choose all that apply.)
Upgrading server firmware
Disabling unnecessary services
Creating privileged user accounts
Disabling unused TCP and UDP ports
Disabling unnecessary services
Creating privileged user accounts
Disabling unused TCP and UDP ports
6-17: You are working the IT help desk when a user calls to report that he cannot access the Internet, although he is able to connect to computers on the local network. At the user’s workstation, you run the ipconfig /all command and examine the output. Which of the options is the most likely explanation for the user’s problem, based on the following ipconfig results?
Windows IP Configuration
Host Name . . . . .Client12
Primary Dns Suffix
Node Type . . . . .Hybrid
IP Routing Enabled. No
WINS Proxy Enabled. No
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix
Description . . . . . . . . . .PCIe Family Controller
Physical Address. . . . . . . .60-EB-69-93-5E-E5
DHCP Enabled. . . . . . . . . .No
Autoconfiguration Enabled . . .Yes
Link-local IPv6 Address . . . .fe80::c955:c944:acdd:3fcb%2
IPv4 Address. . . . . . . . . .192.168.23.234
Subnet Mask . . . . . . . . . .255.255.255.0
Lease Obtained. . . . . . . . .Monday, October 23, 2017 6:23:47 PM
Lease Expires . . . . . . . . .Saturday, November 18, 2017 9:49:24 PM
Default Gateway . . . . . . . .192.168.216.99
DHCPv6 IAID . . . . . . . . . .241232745
DHCPv6 Client DUID . . . . . .00-01-00-01-18-10-22-0D-60-EB-69-93-5E-E5
DNS Servers . . . . . . . . . .192.168.22.114
NetBIOS over Tcpip. . . . . . .Enabled
DHCP is not enabled.
The Subnet Mask setting is incorrect.
The Default Gateway setting is incorrect.
The DNS Servers setting is located on another network.
The Default Gateway setting is incorrect.
default gateway should be on same network as workstation, but its not
6-24: Which of the following well-known ports do you use to configure outgoing mail on a POP3 email client?
110
25
143
80
25
6-25: You are a consultant who has been hired to extend a network by a client that is still running thin Ethernet. Which of the following cable types will you have to bring with you to add thin Ethernet network segments?
RG-8
RG-58
RJ45
RJ11
RG-58
6-27: Which of the following protocols does Internet Protocol Security (IPSec) use to provide data origin authentication by digitally signing packets before transmitting them over the network?
AH
SSL
ESP
RDP
AH
6-28: You have constructed a network on which all of the computers are connected to a single switch. You then create Virtual Local Area Networks (VLANs) on the switch, corresponding to the company’s departments, and add the switch port for each user workstation and department server to the appropriate VLAN. Later, users report that while they can access their departmental servers and the workstations of other users in the same department, they cannot communicate with any of the other departments. What is the problem, and what must you do to correct it?
- There is a faulty VLAN configuration on the switch. You must recreate all of the
VLANs and configure each VLAN for routing. - VLANs are limited to data link layer communication only. To enable communication between the VLANs, you must install a router or a layer 3 switch on the network and configure it to route traffic between the VLANs.
- The VLANs are using different data link layer protocols. You must configure the VLANs to use the same data link layer protocol in order for them to communicate with each other.
- One of the VLANs is configured to filter all of the other VLAN traffic for security purposes. You must change the filter on this one VLAN.
VLANs are limited to data link layer communication only. To enable communication between the VLANs, you must install a router or a layer 3 switch on the network and configure it to route traffic between the VLANs.
6-29: The TCP/IP term socket consists of which of the following elements? (Choose all that apply.)
Port number
MAC address
IP address
Subnet mask
Port number
IP address
Socket
A socket is one endpoint of a two way communication link between two programs running on the network.
accomplished by adding IP address + port, like this: 192.168.2.87:8080
6-32: Which of the following are tasks that can be performed by a protocol analyzer that could provide potential intruders with information about the network? (Choose all that apply.)
- A protocol analyzer can decrypt protected information in packets captured from the network.
- A protocol analyzer can detect open ports on network systems and launch attacks against them.
- A protocol analyzer can display the IP addresses of the systems on the network.
- A protocol analyzer can display the application data in packets captured from the network.
- A protocol analyzer can display the IP addresses of the systems on the network.
- A protocol analyzer can display the application data in packets captured from the network.
6-38: You are working your company’s IT help desk, where you are required to follow a specific troubleshooting protocol when handling calls from users. In which of the following troubleshooting steps would you create a trouble ticket?
Establish a theory of probable cause
Verify full system functionality and, if applicable, implement preventive measures
Identify the problem
Test the theory to determine the cause
Document findings, actions, and outcomes
Implement the solution or escalate as necessary
Establish a plan of action to resolve the problem and identify potential effects
Identify the problem
6-40: Which of the following Wide Area Network (WAN) services provide unequal amounts of upstream and downstream bandwidth? (Choose all that apply.)
SDSL
CATV
ADSL
FCoE
CATV
ADSL
6-43: Which of the following is not a term for the process of combining the bandwidth of two or more network adapters to increase the overall speed of the connection and provide fault tolerance?
Port aggregation
Link aggregation
Bonding
Clustering
NIC teaming
Clustering
applies to servers, not network adapters
6-52: When starting her new position as a network administrator, Alice was given two user accounts. One account is intended for standard user activities, and another has the additional permissions needed for Alice to perform administrative tasks. This is an example of which of the following security concepts?
Zero day
Least privilege
Defense in depth
Multifactor authentication
Least privilege
Defense in Depth
use of multiple security mechanisms to provide additional protection
6-53: You are in the process of troubleshooting a user’s computer that is malfunctioning. Which step of the troubleshooting model involves replacing computer components until you have identified a faulty hardware device?
Establish a plan of action to resolve the problem
Duplicate the problem
Gather information
Verify full system functionality
Test the theory to determine the cause
Document findings, actions, and outcomes
Establish a theory of probable cause
Test the theory to determine the cause
6-61: Which of the following protocols use tunneling to establish secured links between TCP/IP systems? (Choose all that apply.)
L2TP
IPSec
MGRE
NAT
L2TP
IPSec
MGRE
MGRE
Multipoint Generic Routing Encapsulation
- used to connect multiple remote sites through a VPN
- uses hub and spoke topology
- encapsulates and forward packets from one remote site to another
6-62: Your supervisor has given you a Class C network IP address and has asked you to create a network with 8 subnets and 30 hosts per subnet. Which of the following subnet masks will you have to use?
255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
255.255.255.252
255.255.255.224
to get 8 subnets, you need 3 bits, because 2^3 = 8, out of the last octet
then convert this to binary as 11100000, which converts to 224
Class C networks are: 255.255.255.0 or /8, which gives us a value of:
255.255.255.224
6-69: You are a consultant working on a new client’s network. The network has been in place for decades, and you have been given a diagram supplied by the original installer. The diagram says that the network computers are connected to a device called a multiport repeater. Which of the following devices can also be described as a multiport repeater?
Hub
Bridge
Switch
Router
Hub
6-75: You are designing a new wireless network based on the IEEE 802.11n standard. The equipment you have selected supports both the 2.4 GHz and 5 GHz frequencies, and you are undecided about which one to use. Which of the following are possible reasons why the 5 GHz frequency tends to perform better than the 2.4 GHz frequency on a Wireless Local Area Network (WLAN)? (Choose all.)
- The 5 GHz frequency has more channels than the 2.4 GHz frequency.
- The 5 GHz frequency conflicts with fewer common household devices than the 2.4 GHz frequency.
- The 5 GHz frequency transmits at faster speeds than the 2.4 GHz frequency.
- The 5 GHz frequency supports longer ranges than the 2.4 GHz frequency.
- The 5 GHz frequency has more channels than the 2.4 GHz frequency.
- The 5 GHz frequency conflicts with fewer common household devices than the 2.4 GHz frequency.
- The 5 GHz frequency transmits at faster speeds than the 2.4 GHz frequency.
6-77: Which of the following server applications uses two well-known port numbers, one for control traffic and one for data traffic?
FTP
SNMP
NTP
HTTP
FTP
21 - control connection
20 - for transfering data