Chapter 8 Quiz Flashcards

1
Q

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)

1) SLP
2) Port 443
3) SMTP
4) SSH
5) Ports 161/162

A

2) Port 443 (used to secure a communication channel between two devices)
4) SSH (Secure Shell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

length 126
duplex full
speed 1000mbps
PoE 48.2v

Which network tool most likely produced the output?

A

Network multimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A new Cat6 cable run and keystone jack were installed for a workstation that was moved from the sales department to the shipping department. Since the move, the user has been complaining of slow transfer speeds on both Internet and local network communications. The technician ran a test and is viewing the following output on the tester.
length 454
duplex half
speed 10mbps

A

The NIC in the workstation is statically set to 10 Mbps/Half-duplex.-

The network switch port is statically set to 10 Mbps/Half-duplex.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose for the twists in twisted pair Ethernet cabling?

A

Reduce crosstalk between wire pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following are valid IPv4 private IP addresses? (Select TWO).

1) 10.20.30.40
2) 1.2.3.4
3) 192.168.256.12
4) 172.29.29.254
5) 1::9034:12:1:1:0
6) FEC2::AHBC:1908:0

A

1) 10.20.30.40
4) 172.29.29.254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are tasked with securing a small network for a client in which the following requirements must be met:
* If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered.

  • The private trusted network should not be accessible from the public untrusted network.
  • If attacks are coming from the external network, the system should detect and prevent malicious activity.
  • All incoming and outgoing email should be scanned for malware.
A

Implement a UTM appliance. (unified threat management) (UTM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A technician has been dispatched to a client’s office to diagnose wireless network issues and suspects that channel overlap may be the problem.

Which of the following tools will the technician use to help in determining whether her suspicions are correct?

A

Wi-Fi analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following indicates the most concise abbreviation of the IPv6 address FEFE:0000:0000:0000:0002:0000:0000:0001?

A

FEFE::2:0:0:1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are installing network cabling and require a cable solution that provides the best resistance to EMI.

Which of the following will you choose for this installation?

A

STP (Shielded Twisted Pair)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A server or service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the location bar. If this service is malfunctioning, your browser will display a page not found error.

What server provides this service?

A

Web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in the following message, “Could not find this item. Verify the location of ‘\FileServer\Docs’ and try again.”

Which of the following is the most likely cause for this message?

A

The share to the file server is disconnected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are troubleshooting a Windows workstation that is having problems communicating with the host at IP address 1.2.3.4.

What utility will you use at the command line to determine where the communication is stopping?

A

tracert 1.2.3.4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The accounting department moved its network-attached printer from one side of the office to a more centralized location, making the printer much more accessible to all accounting users. Since the move, the users have not been able to print to the printer. The printer powers on and shows it is ready to accept print jobs. The printer configuration page shows the following output.

Ip configuration method DHCP
Ip address 169.254.101.132
subnetmask 255.255.0.0
default gateway

You disconnect the patch cable from the keystone jack at the new location and move the printer and cable to reconnect it at the original location. The printer begins printing the jobs that failed to print earlier.

Which of the following are the most likely reasons for the printer failing to print at the new location? (Select TWO.)

1) The DHCP server is down or has a problem with the DHCP service.
2) The cable run connecting the new keystone jack to the patch panel is bad.
3) The printer needs to have static IP configuration parameters assigned.
4) The printer does not have a valid default gateway assigned.
5) The patch panel connector for the new location’s cable run is not connected to a switch.
6) The printer’s integrated network interface controller is faulty.

A

2) The cable run connecting the new keystone jack to the patch panel is bad.

5) The patch panel connector for the new location’s cable run is not connected to a switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technician is working at a client’s office after hours and needs two cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The other cable is for an Ethernet connection from the computer to the existing keystone jack on the wall. The technician has the necessary wire and connectors to make the cables.
(Select THREE.)

1) Crimper
2) Toner probe
3) Cable tester
4) Cable stripper
5) Punchdown tool
6) Loopback plug

A

1) Crimper
3) Cable tester
4) Cable stripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A server provides the services to take you to the correct website domain when you type cengage.com in your web browser. If this service were not functioning, you would have to remember the IP address for cengage.com.

A

DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In which of the following situations should you install an IPS instead of an IDS?

A

You want to block unauthorized activity on your LAN from the Internet.

17
Q

Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message through the router?
Host B is connected to the switch and the switch is conected to the firewall

A

SMTP (Simple Mail Transfer Protocol)

18
Q

While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s email server connected to the private LAN. Pinging the email server from several workstations on the LAN results in 0% packet loss.

A

Escalate the problem to a server administrator to check for issues with the server.

19
Q

A technician is installing UTP cable and needs to terminate the connections on the patch panel shown in the following image.
What tool should be used to terminate and complete this installation?

A

Punchdown tool

20
Q

Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that company-owned workstations are up-to-date with security patches, anti-malware requirements, and software application updates. The manager is also concerned that employee-owned devices connecting to the corporate LAN have the same level of security as the company devices.

A

Implement an endpoint management server appliance.

21
Q

You replaced the LCD panel in a laptop computer and verified full system functionality, including wireless connectivity. The customer picked up the laptop and now reports he can no longer access his wireless network regardless of how close the computer is positioned to the WAP. Other users can connect to the WAP without any problem.

A

The Laptop’s wireless radio is toggled to the off position

22
Q

The network icon in the notification area of a Windows 7 machine is displaying a yellow triangle with a black exclamation point indicating limited connectivity.

Checking the computer’s network connection properties will most likely indicate which of the following single-assigned host IP addresses? (Select TWO.)

1) FE80::feba:123:8:9343
2) 192.168.0.1
3) 169.254.1.1
4) 2000:db08:1919:100:feba:123:8:9343
5) 10.0.0.1
6) 172.16.1.1

A

1) FE80::feba:123:8:9343
3) 169.254.1.1

23
Q

Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building with no existing network. In 1924, someone added electrical outlets to the building, but the layout and design of the building prohibits adding any additional copper or fiber cable. You completed a wireless site survey and concluded that wireless networking is out of the question and will not properly function due to environmental interference.

A

EoP (Educational Opportunity Program)

24
Q

“Device A” is an 8-port layer 2 managed switch and “Device C” is a 4-port hub.
Which of the following describes “Device B,” assuming all workstations can communicate with each under normal circumstances?

A

Router

25
Q

You require a protocol in order for your Windows network hosts to have access to shared files and folders.

A

CIFS (Common Internet File System)

26
Q

Which of the following is a function of an endpoint management server appliance?

A

Restricting a device’s access to the network until security requirements are met

27
Q

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA/EIA 568B standard.

A

Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown

28
Q

A technician wants to consolidate and log specific alerts from network devices into a database so maintenance tasks and potential device problems can be addressed in a timely manner.

A

Syslog server

29
Q

A server provides the necessary IP configuration to your network host so the host can communicate on the network. If this service malfunctions, your device will not be able to utilize the network.

A

DHCP server

30
Q

A coworker is asking for your advice on a problem with a computer that will not communicate on the network. While assisting the coworker, you suspect that the wired NIC may have failed.
(Select TWO.)
1) Wi-Fi analyzer
2) Loopback plug
3) Network multimeter
4) Punchdown tool
5) Cable tester

A

2) Loopback plug
3) Network multimeter