Chap 7 - Practice Test 2 Flashcards

1
Q

1-Which of the following are technologies typically used for Personal Area Networks (PANs)? (Choose all that apply.)

RFID
Z-Wave
ISDN
NFC
Bluetooth

A

Z-Wave

NFC

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2- Network has a router connected to two switches, and a hub. The switches and hub each have 3 workstations
connected. How many collision domains and broadcast domains are there in this network?

  • There are three collision domains and one broadcast domain.
  • There is one collision domain and one broadcast domain.
  • There are three collision domains and three broadcast domains.
  • There are seven collision domains and three broadcast domains.
  • There are nine collision domains and three broadcast domains.
A

There are nine collision domains and three broadcast domains.

Broadcast:
1 for each switch and the hub
routers do not forward broadcasts

Collisions:
1 for the hub
3 for each switch as 3 workstations
2 for the router to switch connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3- Which of the following types of network devices can provide authentication services for multiple remote access servers using the device’s own account database?

NAS
IDS
NGFW
RADIUS

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4- You are designing the network for your company’s new branch office, and you need a device on which administrators can create Virtual Local Area Networks (VLANs) and that will forward traffic between them. Which of the following types of devices can do this?

Virtual router
Multilayer switch
Broadband router
Load balancer

A

Multilayer switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

6- The protocols that are responsible for the delivery of data packets to their final destinations on an internetwork operate at which layer of the Open Systems Interconnection (OSI) reference model?

Application
Session
Transport
Network
Data link

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

10- You are planning an automated operating system eployment for 100 new Windows worksations your company has received. You intend to configure the workstations to boot using Preboot Execution Environment (PXE), during which time the system will obtain an IP address from a Dynamic Host Configuration Protocol (DHCP) server and then download aboot image file from a Trivial File Transfer Protocol (TFTP) server. Which of the following well- known ports must you open on the firewall separating the workstations from the servers? (Choose all that apply.)

64
65
66
67
68
69

A

DHCP: 67, 68
TFTP: 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

13- The Domain Name System (DNS) defines a hierarchical name space, locations in which are reflected in fully qualified domain names (FQDNs). Which of the words in the FQDN www.paris.mydomain.org represents the bottommost layer in the DNS namespace’s domain hierarchy?

www
paris
mydomain
org

A

paris

The word paris is the name of the bottom most domain in the given FQDN. paris is a subdomain within mydomain, and mydomain is a second- level domain registered by a particular organization. The topmost layer in the DNS hierarchy is represented by org, which is a top- level domain. In this FQDN, www is not the name of a domain; it is the name of a particular host in the paris.mydomain.org domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

23- You are installing a wireless network in a site that has a great many 2.4 GHz wireless telephones. Which of the following wireless networking technologies can you use, which will never experience interference from the telephones? (Choose all that apply.)

IEEE 802.11b
IEEE 802.11g
IEEE 802.11ac
IEEE 802.11a
IEEE 802.11n

A

IEEE 802.11ac
IEEE 802.11a

this is an asshole question. The key word is never. 802.11n, since it has 2.4Ghz capability could have an issue, but its 5Ghz side wont. ugh CompTIA!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

26- After some incidents of security breaches, you have been asked to draft a revised password policy for the company’s users. Which of the following are typical elements of a corporate password policy? (Choose all that apply.)

Frequent password changes
Use of special characters
Minimum password length
Unique password

A

Frequent password changes
Use of special characters
Minimum password length
Unique password

old test - the first choice is no longer a NIST recommendation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPv4 Route Table

33- A user calls Ed at the help desk to report that he cannot access the Internet. He can access systems on the local network, however. Ed examines the routing table on the user’s workstation and sees the following listing. Which statement explains why the user cannot access the Internet?

Active Routes:
Network Destination Netmask Gateway Interface Metric
127.0.0.0 255.0.0.0 On- link 127.0.0.1 331
127.0.0.1 255.255.255.255 On- link 127.0.0.1 331
127.255.255.255 255.255.255.255 On- link 127.0.0.1 331
192.168.2.0 255.255.255.0 On- link 192.168.2.37 281
192.168.2.37 255.255.255.255 On- link 192.168.2.37 281
192.168.2.255 255.255.255.255 On- link 192.168.2.37 281
224.0.0.0 240.0.0.0 On- link 127.0.0.1 331
224.0.0.0 240.0.0.0 On- link 192.168.2.37 281
255.255.255.255 255.255.255.255 On- link 127.0.0.1 331
255.255.255.255 255.255.255.255 On- link 192.168.2.37 281
===========================
Persistent Routes: None

The routing table does not specify a loopback address.
The routing table does not specify a DNS server address.
The routing table does not specify a default gateway address.
The routing table contains two different routes to the 224.0.0.0 network

A

The routing table does not specify a default gateway address.

To access the Internet, the workstation’s routing table must include a default gateway entry, which would have a Network Destination value of 0.0.0.0. A workstation’s routing table does not have to specify the address of a Domain Name System (DNS) server. The loopback (127.0.0.1) and multicast (224.0.0.0) addresses are normal routing table entries that do not affect Internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

34- Which of the following statements about single- mode fiber- optic cable are true? (Choose all that apply.)

  • Multimode cables use an LED light source, while single- mode cables use a laser.
  • Multimode cables can span longer distances than single- mode cables.
  • Multimode cables have a smaller core filament than single- mode cables.
  • Multimode cables have a smaller bend radius than single- mode, making them easier to install.
  • Multimode fiber- optic cables require a ground, whereas single- mode cables do not
A
  • Multimode cables use an LED light source, while single- mode cables use a laser.
  • Multimode cables have a smaller bend radius than single- mode, making them easier to install.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

36- Which of the following cabling topologies have never been used by standard Ethernet networks? (Choose all that apply.)

Bus
Ring
Star
Mesh

A

Ring

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

37- Pulling into your company parking lot at lunchtime, you notice a person without a company parking sticker on his car working at a laptop. You have seen this more than once, and you begin to suspect that unauthorized users are connecting to the company’s Wireless Access Point (WAP) and gaining access to the network. Which of the following are steps you can take to prevent this from happening in the future? (Choose all that apply.)

Use Kerberos for authentication
Place the access point in a screened subnet
Disable SSID broadcasting
Implement MAC address filtering

A

Disable SSID broadcasting
Implement MAC address filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

52- Your supervisor wants you to disable all of the ports on the network’s switches that are not in use. You tell her that this is not necessary, and she wants to know why you think so. Which of the following are valid reasons not to disable unused switch ports? (Choose all that apply.)

The unused ports are not patched in to wall jacks.
The datacenter is already secured from unauthorized access.
The switch is configured to use a MAC- based ACL.
Leaving some ports enabled facilitates the on- boarding of new users.

A

The datacenter is already secured from unauthorized access.

The switch is configured to use a MAC- based ACL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

41- Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a Media Access Control (MAC) mechanism designed to prevent two systems using the same network medium from transmitting at the same time. Which of the following IEEE standards calls for the use of CSMA/CA?

802.3
802.1X
802.11ac
All of the above

A

802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

54- Which of the following network devices can employ Access Control Lists (ACLs) to restrict access? (Choose all that apply.)

Routers
Servers
Switches
Hubs
Wireless Access Points

A

Routers

Servers

Switches

Wireless Access Points

17
Q

56- Which of the following statements about Dynamic Host Configuration Protocol (DHCP) snooping are true? (Choose all that apply.)

  • DHCP snooping is implemented in network switches.
  • DHCP snooping prevents DNS cache poisoning.
  • DHCP snooping detects rogue DHCP servers.
  • DHCP snooping drops DHCP messages arriving over the incorrect port
A
  • DHCP snooping is implemented in network switches.
  • DHCP snooping detects rogue DHCP servers.
  • DHCP snooping drops DHCP messages arriving over the incorrect port
18
Q

Where is DHCP snooping implemented?

A

in network switches

19
Q

68- You are having trouble installing a Wireless Local Area Network (WLAN) using IEEE 802.11b/g equipment in a new office complex. The wireless devices have trouble connecting to the access point, and when they do, they achieve only low speeds. When you use a WiFi analyzer to scan the 2.4 GHz frequency band, you see literally dozens of other networks in the area, spread across all of the available channels. Choose the tasks from the following list that you should perform to enable your wireless devices to connect to the network reliably and at their best possible speeds. (Choose all that apply.)

  • Configure the access point to suppress SSID broadcasts.
  • Configure all of the wireless network devices to use the 5 GHz band.
  • Upgrade all of the network devices to the latest firmware.
  • Configure all of the network devices to use WPA2 encryption with AES.
  • Upgrade the access point and all of the wireless client devices to IEEE 802.11n.
A
  • Configure all of the wireless network devices to use the 5 GHz band.
  • Upgrade the access point and all of the wireless client devices to IEEE 802.11n.

this seems like a real BULLSHIT question. 802.11 b/g equipment cannot do 5 Ghz, so B is not an option. But it is if you can do E, which apparently is correct. This is total nonsense wording

20
Q

74- Which of the following are network topologies used by IEEE 802.11 Wireless Local Area Networks (WLANs)? (Choose all that apply.)

Bus
Mesh
Ad hoc
Star
Infrastructure

A

Ad hoc

Infrastructure

21
Q

76- You are working the help desk at a local computer store, and you receive a call from a customer trying to set up a home network using computers running Windows 10 and wired Ethernet equipment. The customer reports that she cannot access the other two computers in the house from her workstation, nor can she access the Internet. You ask her to run the ipconfig /all command and read the results to you. She says that her IP address is 192.168.0.2, her subnet mask is 255.255.255.0, and her default gateway is 192.168.0.1. Which of the following is the most likely cause of the customer’s problem?

  • The customer’s network address cannot include a zero.
  • The customer has an incorrect subnet mask.
  • The customer’s network cable is damaged or unplugged.
  • The customer has an incorrect default gateway address
A

The customer’s network cable is damaged or unplugged.

22
Q

80- Which of the following types of networking devices can split a single network into multiple collision domains while maintaining a single broadcast domain? (Choose all that apply.)

Switch
Bridge
Router
Hub

A

Switch

Bridge

23
Q

81- You have just finished installing a web server farm on your company’s network, along with a router to create a screened subnet (perimeter network) on which the web servers are located. However, you now cannot access the web servers from your workstation on the internal network. Which of the following is not one of the tasks you will have to complete before you can access the screened subnet from the internal network?

Change MAC addresses
Change IP addresses
Update the DNS records
Change default gateway addresses

A

Change MAC addresses

24
Q

85- You are starting work at a new company, and on your first day, you ask about wireless access for your laptop. You are given a Service Set Identifier (SSID) and a WiFi Protected Access II (WPA2) passphrase. Later, in the lunchroom, when you try to connect your laptop to the network, you cannot see the SSID you were given in the list of available networks, although you can see other networks. What should you do next to try to resolve the problem?

Move closer to the Wireless Access Point (WAP).
Move away from the microwave in the lunchroom.
Type in the WPA2 passphrase.
Type the SSID in manually.

A

Type the SSID in manually.

25
Q

87- In the Domain Name System (DNS), a zone is a contiguous area of the DNS namespace for which authority is delegated to one or more DNS servers. Which of the following DNS resource record types specifies the IP addresses of the authoritative DNS servers for a particular zone?

PTR
SRV
MX
NS

A

NS (Name Server)

26
Q

90- Which of the following Power over Ethernet (PoE) specifications supplies power to devices using the spare wire pair on a 10Base-T or 100Base-TX twisted- pair network?

4PPoE
Alternative A
Alternative B
All of the above

A

Alternative B

27
Q

97- A user calls you at the IT help desk and reports that she is having intermittent problems accessing both local servers and internet websites. Which of the following potential problems can you rule out immediately?

Malfunctioning Domain Name System (DNS) server
Duplicate Media Access Control (MAC) addresses
Duplicate IP addresses
Malfunctioning router

A

Duplicate IP addresses

28
Q

96- You are troubleshooting a workstation that cannot access the network. The workstation is plugged into a wall plate that should provide it with access to a DHCP- equipped network using the 192.168.4.0/24 network address. No one else on that network is reporting a problem. You check that the patch cable is properly plugged into the workstation and the wall plate, which they are, and then run ipconfig /all on the workstation and examine the output. Which of the statements could be the explanation for the workstation’s problem, based on the following ipconfig results?

Windows IP Configuration
Host Name . . . . . . . . . . . . : Client12
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
Ehernet adapter Local Area Connection:
Connection- specific DNS Suffix . :
Description . . . . . . . . . . . : PCIe Family Controller
Physical Address. . . . . . . . . : 60- EB- 69- 93- 5E- E5
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link- local IPv6 Address . . . . . : fe80::c955:c944:acdd:3fcb%2
IPv4 Address. . . . . . . . . . . : 169.254.203.42
Subnet Mask . . . . . . . . . . . : 255.255.0.0
Lease Obtained. . . . . . . . . . : Monday, October 23, 2017 6:23:47 PM
Lease Expires . . . . . . . . . . : Saturday, November 18, 2017 9:49:24 PM
Default Gateway . . . . . . . . . :
DHCPv6 IAID . . . . . . . . . . . : 241232745
DHCPv6 Client DUID. . . . . . . . : 00- 01- 00- 01- 18- 10- 22- 0D- 60- EB- 69- 93- 5E- E5
DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. . . . . . . . : Enabled

The DNS server addresses are incorrect.
The Default Gateway address is missing.
The Subnet Mask value is incorrect.
The DHCP scope is exhausted.

A

The DHCP scope is exhausted.