Chap 7 - Practice Test 2 Flashcards
1-Which of the following are technologies typically used for Personal Area Networks (PANs)? (Choose all that apply.)
RFID
Z-Wave
ISDN
NFC
Bluetooth
Z-Wave
NFC
Bluetooth
2- Network has a router connected to two switches, and a hub. The switches and hub each have 3 workstations
connected. How many collision domains and broadcast domains are there in this network?
- There are three collision domains and one broadcast domain.
- There is one collision domain and one broadcast domain.
- There are three collision domains and three broadcast domains.
- There are seven collision domains and three broadcast domains.
- There are nine collision domains and three broadcast domains.
There are nine collision domains and three broadcast domains.
Broadcast:
1 for each switch and the hub
routers do not forward broadcasts
Collisions:
1 for the hub
3 for each switch as 3 workstations
2 for the router to switch connections
3- Which of the following types of network devices can provide authentication services for multiple remote access servers using the device’s own account database?
NAS
IDS
NGFW
RADIUS
RADIUS
4- You are designing the network for your company’s new branch office, and you need a device on which administrators can create Virtual Local Area Networks (VLANs) and that will forward traffic between them. Which of the following types of devices can do this?
Virtual router
Multilayer switch
Broadband router
Load balancer
Multilayer switch
6- The protocols that are responsible for the delivery of data packets to their final destinations on an internetwork operate at which layer of the Open Systems Interconnection (OSI) reference model?
Application
Session
Transport
Network
Data link
Network
10- You are planning an automated operating system eployment for 100 new Windows worksations your company has received. You intend to configure the workstations to boot using Preboot Execution Environment (PXE), during which time the system will obtain an IP address from a Dynamic Host Configuration Protocol (DHCP) server and then download aboot image file from a Trivial File Transfer Protocol (TFTP) server. Which of the following well- known ports must you open on the firewall separating the workstations from the servers? (Choose all that apply.)
64
65
66
67
68
69
DHCP: 67, 68
TFTP: 69
13- The Domain Name System (DNS) defines a hierarchical name space, locations in which are reflected in fully qualified domain names (FQDNs). Which of the words in the FQDN www.paris.mydomain.org represents the bottommost layer in the DNS namespace’s domain hierarchy?
www
paris
mydomain
org
paris
The word paris is the name of the bottom most domain in the given FQDN. paris is a subdomain within mydomain, and mydomain is a second- level domain registered by a particular organization. The topmost layer in the DNS hierarchy is represented by org, which is a top- level domain. In this FQDN, www is not the name of a domain; it is the name of a particular host in the paris.mydomain.org domain.
23- You are installing a wireless network in a site that has a great many 2.4 GHz wireless telephones. Which of the following wireless networking technologies can you use, which will never experience interference from the telephones? (Choose all that apply.)
IEEE 802.11b
IEEE 802.11g
IEEE 802.11ac
IEEE 802.11a
IEEE 802.11n
IEEE 802.11ac
IEEE 802.11a
this is an asshole question. The key word is never. 802.11n, since it has 2.4Ghz capability could have an issue, but its 5Ghz side wont. ugh CompTIA!
26- After some incidents of security breaches, you have been asked to draft a revised password policy for the company’s users. Which of the following are typical elements of a corporate password policy? (Choose all that apply.)
Frequent password changes
Use of special characters
Minimum password length
Unique password
Frequent password changes
Use of special characters
Minimum password length
Unique password
old test - the first choice is no longer a NIST recommendation
IPv4 Route Table
33- A user calls Ed at the help desk to report that he cannot access the Internet. He can access systems on the local network, however. Ed examines the routing table on the user’s workstation and sees the following listing. Which statement explains why the user cannot access the Internet?
Active Routes:
Network Destination Netmask Gateway Interface Metric
127.0.0.0 255.0.0.0 On- link 127.0.0.1 331
127.0.0.1 255.255.255.255 On- link 127.0.0.1 331
127.255.255.255 255.255.255.255 On- link 127.0.0.1 331
192.168.2.0 255.255.255.0 On- link 192.168.2.37 281
192.168.2.37 255.255.255.255 On- link 192.168.2.37 281
192.168.2.255 255.255.255.255 On- link 192.168.2.37 281
224.0.0.0 240.0.0.0 On- link 127.0.0.1 331
224.0.0.0 240.0.0.0 On- link 192.168.2.37 281
255.255.255.255 255.255.255.255 On- link 127.0.0.1 331
255.255.255.255 255.255.255.255 On- link 192.168.2.37 281
===========================
Persistent Routes: None
The routing table does not specify a loopback address.
The routing table does not specify a DNS server address.
The routing table does not specify a default gateway address.
The routing table contains two different routes to the 224.0.0.0 network
The routing table does not specify a default gateway address.
To access the Internet, the workstation’s routing table must include a default gateway entry, which would have a Network Destination value of 0.0.0.0. A workstation’s routing table does not have to specify the address of a Domain Name System (DNS) server. The loopback (127.0.0.1) and multicast (224.0.0.0) addresses are normal routing table entries that do not affect Internet access.
34- Which of the following statements about single- mode fiber- optic cable are true? (Choose all that apply.)
- Multimode cables use an LED light source, while single- mode cables use a laser.
- Multimode cables can span longer distances than single- mode cables.
- Multimode cables have a smaller core filament than single- mode cables.
- Multimode cables have a smaller bend radius than single- mode, making them easier to install.
- Multimode fiber- optic cables require a ground, whereas single- mode cables do not
- Multimode cables use an LED light source, while single- mode cables use a laser.
- Multimode cables have a smaller bend radius than single- mode, making them easier to install.
36- Which of the following cabling topologies have never been used by standard Ethernet networks? (Choose all that apply.)
Bus
Ring
Star
Mesh
Ring
Mesh
37- Pulling into your company parking lot at lunchtime, you notice a person without a company parking sticker on his car working at a laptop. You have seen this more than once, and you begin to suspect that unauthorized users are connecting to the company’s Wireless Access Point (WAP) and gaining access to the network. Which of the following are steps you can take to prevent this from happening in the future? (Choose all that apply.)
Use Kerberos for authentication
Place the access point in a screened subnet
Disable SSID broadcasting
Implement MAC address filtering
Disable SSID broadcasting
Implement MAC address filtering
52- Your supervisor wants you to disable all of the ports on the network’s switches that are not in use. You tell her that this is not necessary, and she wants to know why you think so. Which of the following are valid reasons not to disable unused switch ports? (Choose all that apply.)
The unused ports are not patched in to wall jacks.
The datacenter is already secured from unauthorized access.
The switch is configured to use a MAC- based ACL.
Leaving some ports enabled facilitates the on- boarding of new users.
The datacenter is already secured from unauthorized access.
The switch is configured to use a MAC- based ACL.
41- Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a Media Access Control (MAC) mechanism designed to prevent two systems using the same network medium from transmitting at the same time. Which of the following IEEE standards calls for the use of CSMA/CA?
802.3
802.1X
802.11ac
All of the above
802.11ac
54- Which of the following network devices can employ Access Control Lists (ACLs) to restrict access? (Choose all that apply.)
Routers
Servers
Switches
Hubs
Wireless Access Points
Routers
Servers
Switches
Wireless Access Points
56- Which of the following statements about Dynamic Host Configuration Protocol (DHCP) snooping are true? (Choose all that apply.)
- DHCP snooping is implemented in network switches.
- DHCP snooping prevents DNS cache poisoning.
- DHCP snooping detects rogue DHCP servers.
- DHCP snooping drops DHCP messages arriving over the incorrect port
- DHCP snooping is implemented in network switches.
- DHCP snooping detects rogue DHCP servers.
- DHCP snooping drops DHCP messages arriving over the incorrect port
Where is DHCP snooping implemented?
in network switches
68- You are having trouble installing a Wireless Local Area Network (WLAN) using IEEE 802.11b/g equipment in a new office complex. The wireless devices have trouble connecting to the access point, and when they do, they achieve only low speeds. When you use a WiFi analyzer to scan the 2.4 GHz frequency band, you see literally dozens of other networks in the area, spread across all of the available channels. Choose the tasks from the following list that you should perform to enable your wireless devices to connect to the network reliably and at their best possible speeds. (Choose all that apply.)
- Configure the access point to suppress SSID broadcasts.
- Configure all of the wireless network devices to use the 5 GHz band.
- Upgrade all of the network devices to the latest firmware.
- Configure all of the network devices to use WPA2 encryption with AES.
- Upgrade the access point and all of the wireless client devices to IEEE 802.11n.
- Configure all of the wireless network devices to use the 5 GHz band.
- Upgrade the access point and all of the wireless client devices to IEEE 802.11n.
this seems like a real BULLSHIT question. 802.11 b/g equipment cannot do 5 Ghz, so B is not an option. But it is if you can do E, which apparently is correct. This is total nonsense wording
74- Which of the following are network topologies used by IEEE 802.11 Wireless Local Area Networks (WLANs)? (Choose all that apply.)
Bus
Mesh
Ad hoc
Star
Infrastructure
Ad hoc
Infrastructure
76- You are working the help desk at a local computer store, and you receive a call from a customer trying to set up a home network using computers running Windows 10 and wired Ethernet equipment. The customer reports that she cannot access the other two computers in the house from her workstation, nor can she access the Internet. You ask her to run the ipconfig /all command and read the results to you. She says that her IP address is 192.168.0.2, her subnet mask is 255.255.255.0, and her default gateway is 192.168.0.1. Which of the following is the most likely cause of the customer’s problem?
- The customer’s network address cannot include a zero.
- The customer has an incorrect subnet mask.
- The customer’s network cable is damaged or unplugged.
- The customer has an incorrect default gateway address
The customer’s network cable is damaged or unplugged.
80- Which of the following types of networking devices can split a single network into multiple collision domains while maintaining a single broadcast domain? (Choose all that apply.)
Switch
Bridge
Router
Hub
Switch
Bridge
81- You have just finished installing a web server farm on your company’s network, along with a router to create a screened subnet (perimeter network) on which the web servers are located. However, you now cannot access the web servers from your workstation on the internal network. Which of the following is not one of the tasks you will have to complete before you can access the screened subnet from the internal network?
Change MAC addresses
Change IP addresses
Update the DNS records
Change default gateway addresses
Change MAC addresses
85- You are starting work at a new company, and on your first day, you ask about wireless access for your laptop. You are given a Service Set Identifier (SSID) and a WiFi Protected Access II (WPA2) passphrase. Later, in the lunchroom, when you try to connect your laptop to the network, you cannot see the SSID you were given in the list of available networks, although you can see other networks. What should you do next to try to resolve the problem?
Move closer to the Wireless Access Point (WAP).
Move away from the microwave in the lunchroom.
Type in the WPA2 passphrase.
Type the SSID in manually.
Type the SSID in manually.