Chapter Quizzes Flashcards

1
Q

Which of the following are layers of the OSI reference model? (Choose 3)
Transmission Layer

Application Layer

Presentation Layer

Session Layer

Encryption Layer

Connection Layer

WAN Layer

A

Application Layer

Presentation Layer

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Protocol Data Unit (PDU)?

A type of encryption used in data transmission

A device that manages data transmission rates

A measure of data transmission speed

A chunk of data with protocol-specific headers added at each OSI layer

A

A chunk of data with protocol-specific headers added at each OSI layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary purpose of data encapsulation in network protocols?

To encrypt data for secure transmission

To convert data into an analog signal for transmission

To compress data for faster transmission

To add additional data headers for routing and delivery

A

To add additional data headers for routing and delivery

Explanation

Data encapsulation is a fundamental process in network communication, where data at each layer of the OSI model is wrapped with protocol-specific headers (and sometimes footers). These headers provide essential information such as source and destination addresses, error checking, and more, which are necessary for the correct routing and delivery of data across a network. This process ensures that data packets are handled appropriately at each hop along their path to the destination.

Encapsulation is not about compressing data but organizing it for transmission. Compression is a separate process that might be applied to data before encapsulation.

Encapsulation itself does not involve encryption. Encryption may be applied to data as part of the security protocols at various layers but is distinct from the encapsulation process.

Encapsulation deals with the digital organization of data for transmission, not the conversion of digital signals to analog. The conversion to analog signals, if necessary, is handled at the Physical layer, separate from the encapsulation process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An engineer uses a type of network adapter to connect a fiber link to a router. The
transceiver fits into an optical interface on a layer 3 Ethernet router.

Of the choices, which layer 1 implementation does the engineer utilize?

Media converter

Switch

Bridge

VoIP endpoint

A

Media converter

Explanation
Media converters are layer 1 devices and are used to convert one cable type to another.
These components alter the characteristics of one type of cable to match those of another.
A switch is a layer 2 device. Switches can handle traffic based on a node’s physical address
which is also known as a Media Access Control (MAC) address.
A bridge is a layer 2 appliance or application that connects different networks as if they
were one network.
A VoIP (Voice over Internet Protocol) endpoint is a phone system component that can be
implemented as software running on a computer or smartphone, or as a dedicated
traditional handset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A communications engineer notices that every time it rains the signal becomes very
degraded.

Which layer of the OSI model is the engineer most likely troubleshooting?

Data Link

Transport

Application

Physical

A

Physical

Explanation
The physical layer (PHY) of the OSI model (layer 1) is responsible for the transmission and
receipt of the signals that represent bits of data from one node to another node. Wireless is
one medium.
The data link layer (layer 2) is responsible for transferring data between nodes on the same
logical segment.
At the transport layer on the sending host, the system packages data from the upper layers
as a series of layer 4 protocol data units (PDUs), referred to as segments.
The application layer (layer 7) is at the top of the OSI stack. An application-layer protocol
does not encapsulate any other protocols or provide services to any protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following devices operate at the Data Link layer of the OSI model? (Select
three.)
Routers
Gateways
Repeaters
Hubs
Network interface cards (NICs)
Bridges
Switches

A

Network Interface Cards (NICs)

Bridges

Switches

Explanation
Network interface cards (NICs), bridges, and switches all operate at the OSI Data Link layer.
They use the physical device address (MAC address) to identify packets.
Hubs and repeaters operate at the Physical layer. They simply repeat packets without
regard to addresses.
Routers and gateways function at the Network layer. They examine the logical device and
network address to perform routing tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When the Data Link layer performs encapsulation, it adds control information to the
payload in the form of header fields.

Which of the following are header fields added by the Data Link layer during
encapsulation? (Select three.)

TTL (Time to Live)
Destination hardware address
Sequence number
Source hardware address
Encryption type
Checksum for basic error checking
Window size

A

Destination hardware address

Source hardware address

Checksum for basic error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of an Access Control List (ACL) at Layer 3 (Network layer) of the OSI model?

To serve as a list of permissions for file access on the network

To filter network traffic by permitting or blocking packets based on IP
addresses and other criteria

To act as a routing protocol for determining the best path for data
packets

To define the maximum size for packets transmitted across the
network

A

To filter network traffic by permitting or blocking packets based on IP
addresses and other criteria

Explanation
At Layer 3, ACLs are used to enforce security policies by filtering traffic. They determine
which packets are allowed to pass through a network device, such as a router, based on
rules that include IP addresses, protocol types, ports, and other criteria.
ACLs do not define packet sizes; this is typically managed by the network protocols in use,
such as TCP/IP.
ACLs are not routing protocols. Routing protocols like OSPF or BGP are used to determine
the best path for data packets.
ACLs at Layer 3 do not manage file access permissions; they control network traffic. File
access permissions are typically managed by the operating system or file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the OSI model, what is the primary function of the Network layer?
The primary function of the Network layer is to move data around an internetwork using logical network and host IDs.

The primary function of the Network layer is to encode and convert
data into signals suitable for transmission over the physical medium.

The primary function of the Network layer is to ensure reliable
transmission of data across a physical link.

The primary function of the Network layer is to establish, manage,
and terminate connections between applications on different hosts.

A

The primary function of the Network layer is to move data around an internetwork using logical network and host IDs.

Explanation
The primary function of the Network layer is to move data around an internetwork using
logical network and host IDs. The Network layer, or Layer 3 of the OSI model, is responsible
for the logical addressing of data and its delivery across different networks, or an
internetwork. It uses logical addresses, such as IP addresses, to ensure data packets are
routed to the correct destination network and ultimately to the correct host within that
network. Routers, which operate at this layer, use the information contained in the packet’s
network layer header to make forwarding decisions, guiding the packet through the
internetwork hop by hop until it reaches its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following functions are performed by the OSI Transport layer? (Select three.)

Packet formatting for delivery through a medium

Data segmentation and reassembly

Media access control, logical topology, and device identification

Consistent data formatting between dissimilar systems

Path identification and selection

End-to-end flow control

Reliable message delivery

A

Data segmentation and reassembly

End-to-end flow control

Reliable message delivery

Explanation
The Transport layer is responsible for breaking upper-layer data into segments and
allowing reliable communication through end-to-end flow control, error detection, and
error correction.
Message transmission through a medium is performed at the Physical layer.
Media access, logical topology, and device identification occur at the Data Link layer.
Path identification and selection is a function of the Network layer.
Data formatting is performed at the Presentation layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security engineer configures software-based port security on a hardware firewall.
Which OSI model layer identifies the application ports to configure?
Layer 3
Layer 1
Layer 4
Layer 2

A

Layer 4

Explanation
The transport layer (layer 4) manages end-to-end communications. At layer 4, a port
number identifies each application, such as 80 for hypertext transfer protocol (HTTP) web
traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What role does the Presentation layer (layer 6) of the OSI model play in terms of data
compression and encryption?

The Presentation layer handles the routing of data between different
networks and supports encryption protocols like IPsec.

The Presentation layer supports data compression and encryption to
prepare data for network transmission.

The Presentation layer is primarily responsible for the physical
encryption of data using hardware-based methods.

The Presentation layer is involved in the logical organization of data
into frames for transmission.

A

The Presentation layer supports data compression and encryption to
prepare data for network transmission.

Explanation
The Presentation layer transforms data to ensure that it is in the correct format for the
application or network. This includes data compression to reduce the size of the data for
transmission and encryption to secure the data during transfer.
The Presentation layer deals with data transformation and representation, not physical
encryption methods, which are typically implemented at lower layers or by specific security
hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following statements accurately describes the function of the Session layer
(layer 5) in the OSI model?
The Session layer is used for character set conversion, such as
between ASCII and Unicode.

The Session layer administers the process of establishing, managing,
and terminating a dialog between client and server.

The Session layer provides the physical transmission of data over
network media.

The Session layer is responsible for routing packets across different
networks.

A

The Session layer administers the process of establishing, managing,
and terminating a dialog between client and server.

Explanation
The correct answer is that the Session layer administers the process of establishing,
managing, and terminating a dialog between client and server. The Session layer is crucial
for controlling the dialog between two computers or network devices. It establishes,
manages, and terminates connections, ensuring that data is properly synchronized and
organized during communication sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network engineer is designing a network in various offices to create multiple broadcast
domains. Each has its own Virtual Local Area Network (VLAN).
When configuring these multiple broadcast domains on the switch, the switch will be
operating at what layer of the OSI model?
Layer 4 (Transport Layer)

Layer 7 (Application Layer)

Layer 2 (Data Link Layer)

Layer 1 (Physical Layer)

A

Layer 2 (Data Link)

Explanation
Layer 2 (Datalink Layer) is the correct answer. VLANs (Virtual Local Area Networks) are a
Layer 2 technology. When configuring VLANs on a switch, the network engineer is working
at the Data Link Layer. This layer is responsible for segmenting the network into multiple
broadcast domains using VLAN IDs. Devices like switches and bridges operate at this layer
to manage MAC addresses and frames, which are essential for VLAN functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following network geographies refers to a network that spans several buildings within walking distance of each other, such as at a business park?
CAN

WAN

PAN

MAN

A

CAN

A campus area network (CAN) is a computer network that spans a limited geographic area. CANs interconnect multiple local area networks (LAN) within an educational or corporate campus. A WAN (Wide Area Network) is a network that spans a large geographical area, such as multiple cities or countries. A PAN (Personal Area Network) is a network that connects devices within an individual’s personal space, typically within a range of a few meters. A MAN (Metropolitan Area Network) is a network that spans a larger area than a LAN (Local Area Network), often covering a city or a metropolitan area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following type of network models doesn’t differentiate between the devices that provide services and those that request services?
Client-server

Point-to-point

Hub-and-spoke

Peer-to-peer

A

Peer-to-peer

A peer-to-peer network model does not differentiate between the clients and the servers, and every node can become a client and a server when requesting and responding to service requests. In a client-server network model, there is a clear distinction between client devices that request services and server devices that provide services. A Point-to-point network is a direct connection between two devices. One device acts as the sender and the other as the receiver. A Hub-and-spoke network model has a central hub that connects other devices (spokes). The hub provides services to the spokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

HongHong, a network administrator, was asked by the Chief Information Officer (CIO) to set up a new office with a network that has full redundancy. What topology would BEST meet the CIO’s requirement?

Hybrid

Bus

Mesh

Star

A

Mesh

A mesh topology connects every endpoint to every other endpoint, creating a fully redundant network. While a hybrid topology combines different topologies, it does not inherently provide full redundancy. The redundancy level depends on the specific combination of topologies used. In a bus topology, all devices are connected to a single shared communication line. If a device on it fails, the entire network can be affected. It lacks redundancy. In a star topology, devices are connected to a central hub or switch. If the hub or switch fails, the network can be disrupted.A mesh topology connects every endpoint to every other endpoint, creating a fully redundant network. While a hybrid topology combines different topologies, it does not inherently provide full redundancy. The redundancy level depends on the specific combination of topologies used. In a bus topology, all devices are connected to a single shared communication line. If a device on it fails, the entire network can be affected. It lacks redundancy. In a star topology, devices are connected to a central hub or switch. If the hub or switch fails, the network can be disrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Dion Worldwide has created a network architecture that relies on two main data centers, one in the United States and one in Japan. Each satellite office in the United States and Canada will connect back to the American data center, while each satellite office in Asia will connect back to the Japanese data center. Both the American and Japanese data centers are interconnected, as well. Therefore, if a client in the Philippines wants to send a file to the office in Miami, it will go first to the Japanese datacenter, then route across to the American datacenter, and then to the Miami satellite office. Which of the following network topologies best describes the Dion Worldwide network?

Hub and spoke

Bus

Star

Ring

A

Hub and spoke

A hub and spoke topology is a network topology where a central device (the hub) is connected to multiple other devices (the spokes). A Bus topology has a single communication line where all devices are connected. It does not have distinct hubs and spokes. A star topology has a central hub that connects all devices in a point-to-point manner. While the Dion Worldwide network has hubs, not a single central hub connecting all devices. A Ring topology connects devices in a circular manner, where each device is connected to two neighboring devices. It doesn’t have distinct hubs and spokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which type of network device operates at layer 1 of the OSI model and requires connected devices to operate at half-duplex using CSMA/CD?

Switch

Hub

Bridge

Router

A

Hub

A hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment. It operates at the physical layer (Layer 1) of the OSI model. All devices connected by a hub are in a single collision domain and a single broadcast domain, so it must use half-duplex for communication and CSMA/CD. A switch operates at layer 2 of the OSI model and provides more advanced functionality than a hub. A bridge also operates at layer 2. It connects two separate network segments. A router operates at layer 3 and forwards data packets among networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?

Tagging

Encapsulation

Tunneling

De-encapsulation

A

De-encapsulation

De-encapsulation in networking is performed at the receiver side or destination side as data moves from layer 1 to layer 7 of the OSI model. As information travels up the layers of the OSI layer, information added from the sender’s encapsulation process is removed layer by layer. Tagging typically refers to the process of adding additional information or labels to data packets for specific purposes. Tunneling involves encapsulating one network protocol within another protocol for data transference. Encapsulation is the reverse process of de-encapsulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

According to the OSI model, at which of the following layers is data encapsulated into a frame?

Layer 1

Layer 2

Layer 3

Layer 4

A

Layer 2

The data layer, or layer 2, is the second layer of the seven-layer OSI model. The data link layer encapsulates data into frames for delivery between nodes on the same network. Data is transmitted at Layers 5, 6, and 7 of the OSI model. At Layer 4, the data is encapsulated into segments. At layer 3, the segments are encapsulated into packets. At layer 2, the packets are encapsulated into frames. At layer 1, the frames are encapsulated into bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which network device operates at layer 2?

Repeater

Switch

Router

Firewall

A

Switch

A basic switch operates at layer 2 of the OSI model. For the exam, unless they mention a “multilayer switch” or “layer 3 switch”, always assume they are referencing a basic layer 2 switch. A router is a layer 3 device. A repeater is a layer 1 device. A firewall will operate layers 3 through 7, depending on the type of firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What layer of the OSI model is responsible for data encryption and character set conversion, such as ASCII to UTF-8?

Layer 7

Layer 6

Layer 5

Layer 4

A

Layer 6

The presentation layer (layer 6) establishes how information is presented, typically for display or printing. Data encryption and character set conversion (such as ASCII to EBCDIC) are usually associated with this layer. The presentation layer translates information in a way that the application layer understands. This layer also translates information from the application layer to the session layer. Layer 7, the Application Layer, deals with end-user services. Layer 5, the session layer, manages sessions. Layer 4, the transport layer, controls end-to-end communication and error-checking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What protocol is commonly associated with port 53?

HTTP

FTP

SSH

DNS

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which protocol is connection-oriented and ensures reliable data delivery by establishing a virtual circuit between sender and receiver?

TCP

UDP

ICMP

GRE

A

TCP

TCP (Transmission Control Protocol) is connection-oriented, providing reliable, ordered, and error-checked delivery of data by establishing a virtual circuit between sender and receiver. UDP is connectionless, suitable for real-time applications but does not guarantee reliable delivery. ICMP is used for network diagnostics, error reporting, and is connectionless, not designed for data transfer. GRE is a tunneling protocol, not inherently providing reliable data delivery; it encapsulates various network layer protocols for routing purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which statement accurately describes characteristics of a UDP connection?

UDP is connection-oriented, ensuring reliable data delivery.

UDP provides error checking and retransmission of lost packets.

UDP is suitable for real-time applications due to its low latency.

UDP guarantees in-order deliver of data packet.

A

UDP is suitable for real-time applications due to its low latency.

UDP (User Datagram Protocol) is connectionless and does not establish a connection before sending data. This lack of connection setup contributes to lower latency, making it suitable for real-time applications like streaming, gaming, and voice communication. UDP is connectionless, not connection-oriented, and it does not ensure reliable data delivery. UDP does not provide error checking or retransmission of lost packets. UDP does not guarantee in-order delivery of data packets; packets may arrive out of order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which port is commonly used for receiving emails from a mail server?

Port 80

Port 110

Port 443

Port 25

A

Port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which port and protocol combination(s) are commonly associated with Remote Desktop Protocol (RDP)?

Port 3389 - TCP

Port 3389 - UDP

Port 5060/5061 - UDP

Port 5060/5061 - TCP

A

Port 3389 - TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You are entrusted with establishing a secure and compliant network infrastructure within a commercial building that has air ducts, confined spaces, and concerns of fire safety compliance. What specific cable type should be chosen to guarantee both optimal fire safety measures and better compliance in such environments?

Plenum

Cat5e

HDMI

RG-6

A

Plenum

Plenum cables have fire-resistant jackets, crucial for safety in air handling spaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

When setting up a home network you are asked to connect the line from the wall to the customer’s modem, which connector is most commonly used to connect this cable from the service provider to a cable modem?

F-Type

RJ-45

SC

BNC

A

F-Type

F-Type connectors are standard for coaxial cables, commonly used for cable modem connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following statements regarding Twinaxial cables is incorrect?

Twinaxial cables are commonly used for short-distance, high-speed data transmission.

Twinaxial cables consist of two inner conductors surrounded by insulating material and an outer shield.

Twinaxial cables are primarily utilized in fiber optic networks for long-distance connectivity.

Twinaxial cables are cost-effective alternatives to coaxial cables for certain applications

A

Twinaxial cables are primarily utilized in fiber optic networks for long-distance connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which form factor is typically associated with a single-channel data link in networking equipment?

SFP

QSFP+

M.2

USB

A

SFP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

For short-distance transmission in local network, which fiber optic type is MOST commonly used?

Single Mode Fiber

Multi Mode Fiber

Coaxial Cable

Twisted Pair Cable

A

Multi-Mode Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which is a key function of a UPS in a data center?

Providing temporary surge protection

Ensuring continuous power to equipment

Maximizing energy consumption

Facilitating data backup

A

Ensuring continuous power to equipment

UPS systems maintain steady power supply during outages, preventing downtime and ensuring equipment remains operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

In data center fire safety, what system is designed to minimize damage to networking infrastructure and is most effective in extinguishing a fire?

Clean Agent Fire Suppression

Water Sprinkler System

Pre-Action System

Foam-Based Extinguisher

A

Clean Agent Fire Suppression

36
Q

What voltage level is commonly used for equipment designed to be used in Europe?

320 Volts

120 Volts

480 Volts

230 Volts

A

230 Volts

In United States, 120 Volts is the standard

37
Q

What lockable device is MOST crucial for safeguarding physical networking equipment?

Server Rack Enclosure

Fire Extinguisher Mount

Biometric Door Lock

Cable Management Tray

A

Server Rack Enclosure

38
Q

In Adherence to standards for physical networking installations, what is the recommended orientation for a server rack to optimize cooling efficiency?

Port-side Exhaust

Port-side Intake

Top-side Exhaust

Bottom-side Intake

A

Port-side Exhaust

This means the exhaust ports of the networking equipment should face a common aisle, allowing hot air to be expelled from the back of the rack.

39
Q

A freelance photographer is setting up a home office. They need to connect a desktop, a laptop, a network printer, and occasionally guests’ devices to the Internet and to each other for file sharing and printing.

Which type of network is MOST suitable for this scenario?

CAN (Campus Area Network)

MAN (Metropolitan Area Network)

SOHO (Small Office/Home Office) Network

PAN (Personal Area Network)

A

SOHO (Small Office/Home Office) Network

40
Q

Which of the following interfaces does a SOHO router provide at the Physical Layer of the OSI model? (Select THREE)

RJ-45 ports for a local cabled network

SATA ports for internal storage connection

WAN port for Internet Service Provider (ISP) connection

USB ports for direct computer connection

HDMI ports for multimedia streaming

VGA ports for video output

Radio antennas for wireless signal transmission

A

RJ-45 ports for a local cabled network

WAN port for Internet Service Provider (ISP) Connection

Radio antennas for wireless signal transmission

41
Q

Which of the following functions does a SOHO router implement at layer 2 to make use of its Physical Layer adapters? (Select TWO)

DHCP server

Ethernet switch

Wireless Access Point

Firewall

Network Address Translation (NAT)

A

Ethernet switch

Wireless access point

42
Q

A small office/home office (SOHO) network is configured to use the private IP address range of 192.168.1.0/24.
If you are setting up a SOHO router for this network, which of the following IP addresses would be MOST appropriate for the router?

192.168.1.255

192.168.1.1

203.0.113.1

192.168.2.1

A

192.168.1.1

This IP address is within the specified IP address range of 192.168.1.0/24 and is commonly used as the default gateway address for devices on the network. It is a suitable choice for the router’s IP address, allowing it to manage traffic between the local network and the Internet.

43
Q

What is the MOST effective method for protecting the management interface of a SOHO router?

Configuration a strong administrative account passphrase

Disabling the firewall

Enabling UPnP (Universal Plug and Play)

Setting the router to automatically accept firmware updates

A

Configuration a strong administrative account passphrase

Configuring a strong administrative account passphrase is a critical security measure for protecting the router’s management interface. A strong passphrase helps prevent unauthorized access to the router’s settings where malicious changes could compromise the entire network’s security.

44
Q

At layer 4 of the OSI, how is each application identified to facilitate proper routing and delivery of data?

Through the application’s unique username and password

By a unique port number assigned to the application

By the MAC address of the destination device

Through the use of encryption algorithms

A

By a unique port number assigned to the application

At layer 4, the Transport Layer, each application is identified by a unique port number. This port number is used to ensure that data is delivered to the correct application on a device. For example, web traffic typically uses port 80 for HTTP or port 443 for HTTPS, and email might use port 25 for SMTP. This system allows multiple applications to run on a single device without their data streams getting mixed up.

45
Q

Which of the following BEST describes a demarcation point in the context of telecommunications?
The maximum data transfer rate achievable by the ISP

The protocol used for encrypting data over the Internet

The central hub where all ISPs connect and exchange data

The point at which the telco’s cabling enters the customer premises

A

The point at which the telco’s cabling enters the customer premises

The demarcation point (often shortened to “demarc”) is the point where the telecommunications company’s (telco’s) responsibility ends and the customer’s responsibility regains; typically where the telco’s cabling enters the building or premises.

46
Q

What do Internet Service Providers (ISPs) use to establish links between their networks within an Internet eXchange Point (IXP) data center?

Bluetooth connectivity

Peer-to-peer file sharing

NFC (Near Field Communication)

Transit and peering arrangements

A

Transit and peering arrangements

Within an Internet eXchange Point (IXP) data center, ISPs establish links between their networks using transit and peering arrangements. These arrangement allow them to carry traffic to and from parts of the Internet they do not physically own, facilitating the exchange of Internet traffic between different ISP’s networks

47
Q

What is the decimal form of the following binary IP address?
11001101.00111001.10101001.01000010

238.90.202.99

190.42.154.51

206.58.170.67

205.57.169.66

A

205.57.169.66

48
Q

Which of the following sets correctly represents the possible values that can be represented by each digit in hexadecimal notation?

0 through 9 and A through E

0 through 7

1 through 10

0 through 9 and A through F

A

0 through 9 and A through F

49
Q

You are a network technician troubleshooting a connectivity issue in your company’s
network. After identifying the problem and establishing a theory of probable cause, you
have successfully tested your theory and determined the cause of the issue.
You have just finished establishing a detailed plan of action to resolve the problem, which
includes replacing a faulty network switch that has been causing intermittent connectivity
issues for several users.
What is the next step you should take according to the CompTIA Network+ troubleshooting
methodology?

Implement the solution by replacing the faulty network switch.

Verify full system functionality by asking user if they are still experiencing issues.

Document the problem and solution in the company knowledge base.

Establish a new theory of probable cause for the connectivity issue.

A

Implement the solution by replacing the faulty network switch.

Explanation
According to the CompTIA Network+ troubleshooting methodology, after establishing a
plan of action to resolve the problem, the next step is to implement the solution. In this
scenario, the plan of action involves replacing a faulty network switch that has been
identified as the cause of the connectivity issues. Therefore, the correct next step is to
proceed with the implementation of this solution.

50
Q

A user is unable to print to a network printer. Which of the following is the first step that a
technician should take to troubleshoot the issue?

Establish a plan of action to resolve the problem.

Identify the problem.

Establish a theory of probable cause.

Implement preventative measures.

A

Identify the problem.

Explanation
The first step should always be to identify the actual problem so that the technician can
then proceed with other steps to resolve the problem.

51
Q

When troubleshooting a software issue reported by a user who is unfamiliar with technical
terms, which type of question is MOST effective to begin the diagnostic process?

Asking for the error code displayed on the screen.

Asking if they have experienced this issue

Asking them to describe what they were doing when the issue occurred

Asking if they have tried rebooting their computer

A

Asking them to describe what they were doing when the issue occurred

Explanation
Asking them to describe what they were doing when the issue occurred is the correct
answer. This is an open question that encourages the user to provide a detailed account of
their actions leading up to the problem. It allows the troubleshooter to gather valuable
context about the issue without requiring the user to use technical terms. This approach
can help identify patterns or specific actions that may be contributing to the problem.

52
Q

How is identifying the location and scope of a problem helpful in the troubleshooting process? (Select TWO)

It helps prioritize the problem in relation to other incidents.

It eliminates the need for gathering further information from users.

It allows for the immediate resolution of the problem without further analysis.

It helps identify the source of the problem.

It automatically resolves any related issues without intervention.

A

It helps prioritize the problem in relation to other incidents.

It helps identify the source of the problem

The following are the ways in which identifying the location and scope of a problem are
helpful in the troubleshooting process:
◦ It helps prioritize the problem in relation to other incidents. By understanding the
scope of a problem, whether it affects a large number of systems or is confined to a
specific area, IT professionals can better prioritize it in relation to other ongoing
incidents, ensuring that resources are allocated efficiently.
◦ It helps identify the source of the problem. Knowing the location and the number of
systems affected can provide valuable clues about the source of the problem. For
example, if an issue is localized to a specific network segment, this information can
narrow down potential causes.

53
Q

When trying to identify the cause of a problem, which of the following are key questions to
ask? (Select two.)

Can the problem be solved by buying new hardware?
Should we switch to a different software platform?

What has changed since it was last working?

Did it ever work?

Is the system turned on?

A

What has changed since it was last working?

Did it ever work?

Explanation
The following are the key questions to ask:
◦ Did it ever work? Knowing whether the system ever functioned correctly helps to
determine if the issue is with the initial setup or configuration, or if something has
caused a previously working system to fail. This question helps to narrow down the
troubleshooting approach.
◦ What has changed since it was last working? Identifying any changes made to the
system since it last worked correctly can pinpoint the cause of the problem. Changes
could include software updates, hardware modifications, or environmental factors,
and are often the root cause of new issues.

54
Q

What should you do when you discover symptoms of more than one problem while
investigating a user’s system issue?
Immediately escalate all discovered problems to a higher-level
support team without further investigation.

Advise the user to only report the most severe problem to avoid
complicating the troubleshooting process.

Treat each problem as a separate case, even if they seem related.

Focus on the most complex problem first, assuming solving it will
automatically resolve the others.

A

Treat each problem as a separate case, even if they seem related.

Explanation
When multiple problems are discovered, it’s important to address each one individually.
This approach ensures that each issue is thoroughly investigated and resolved, rather than
assuming they are interconnected. Treating each problem separately also helps in
documenting and tracking the resolution process more effectively.

55
Q

As the IT support specialist for a small company, you are approached by an employee who
complains that they can’t connect to the Internet. Preliminary checks show that the issue is
isolated to this single workstation. Other devices on the same network are connecting
without any issues.

You decide to employ the bottom-to-top OSI model approach to systematically
troubleshoot and resolve the problem.

Using the bottom-to-top OSI model approach, which of the following steps should you take
first to troubleshoot the internet connectivity issue on the employee’s workstation?

Ensure that the workstation’s firewall settings are not blocking
internet access.

Confirm that the workstation is obtaining a valid IP address from the
DHCP server.

Check the Ethernet cable and the network interface card (NIC) for any
physical damage or disconnection.

Verify that the web browser settings on the workstation are correctly
configured.

A

Check the Ethernet cable and the network interface card (NIC) for any physical damage or disconnection.

When employing the bottom-to-top OSI model approach for troubleshooting, the first step is to start at the lower layer (Layer1, Physical Layer) and work your way up. Since the issue is isolated to a single workstation, it’s logical to first check the physical connections, such as the Ethernet cable and NIC for any signs of damage or disconnection. Physical connectivity problems are common and can prevent the device from accessing the network.

56
Q

Which of the following MOST correctly describes using the divide and conquer approach of
the OSI model for troubleshooting network issues?

Identifying the most likely layer causing the issue based on symptoms
and preliminary information, then working either up or down the OSI
model as needed to isolate and resolve the problem.

Starting the troubleshooting process at the Physical Layer (Layer 1)
and sequentially checking each layer until the Application Layer (Layer
7) is reached.

Focusing solely on the Application Layer (Layer 7) to identify and
resolve any software-related issues before considering network
infrastructure problems.

Checking all layers of the OSI model simultaneously to quickly identify
and resolve network issues without considering the logical order of
the layers.

A

Identifying the most likely layer causing the issue based on symptoms
and preliminary information, then working either up or down the OSI
model as needed to isolate and resolve the problem.

57
Q

When you have diagnosed the symptoms of a network issue and know what is likely
causing them, what should you do next?

Test each possible cause until you find the right one.

Ignore the symptoms and focus on unrelated components.

Immediately replace all network components.

Document the symptoms without further action.

A

Test each possible cause until you find the right one.

58
Q

Before escalating a troubleshooting problem, what should you be able to do? (Select TWO.)

Immediately escalate the problem without attempting any
troubleshooting.

Change system settings randomly in hopes of stumbling upon a
solution.

Wait for the problem to resolve itself before taking any action.
Establish the basic facts surrounding the problem.

Be able to communicate the basic facts clearly to the person to whom
you are referring the incident.

A

Establish the basic facts surrounding the problem

Be able to communicate the basic facts clearly to the person whom you are referring the incident

59
Q

A system that contains custom applications routinely crashes. IT decides to upgrade the operating system after speaking with application support personnel, and testing the problem.

What should IT do next to troubleshoot the issue?

Establish a plan of action.

Identify the problem.

Verify full system functionality and, if applicable, implement preventative measures.

Determine if anything has changed.

A

Establish a plan of action.

Explanation:
Establishing a plan of action, such as a maintenance windows or scheduled downtime to fix an issue, is the best practice. Researching the impacts of any fixes should also be considered

60
Q

What is the recommended action when applying a solution that is disruptive to the wider network during troubleshooting?

Proceed with the solution without informing anyone to avoid causing panic.

Consider the most appropriate time to schedule the reconfiguration work and plan how to notify other network users.

Apply the solution immediately to minimize troubleshooting time.

Disconnect the network to ensure no one is using it before applying the solution.

A

Consider the most appropriate time to schedule the reconfiguration work and plan how to notify other network users.

Explanation:
When a solutions is likely to disrupt the wider network, it is crucial to plan the implementation carefully. This includes choosing a time that minimizes the impact on users (such as after hours or during low-usage periods) and communicating the planned changes, the expected impact, and the duration of the disruption. This approach helps ensure that the solutions is implemented smoothly and with minimal negative impact on network users.

61
Q

A help desk operator is troubleshooting a site that is no longer responsive.
Which of the following is the last step the operator should perform?

Implement solution

Establish plan of action

Determine cause

Document findings

A

Determine Cause

Explanation:
The last step in troubleshooting is to document findings. This gives you the opportunity to add a complete description of the problem and its solution, including findings, actions, and outcomes.

61
Q

When verifying a solution to a reported problem, what is the primary goal?

To ensure the system functions faster than before.

To change the system’s configuration settings.

To implement additional features unrelated to the problem.

To validate that the solution fixes the reported problem without affecting the system’s overall functionality.

Explanation
The primary goal of verifying a solution is to ensure that the applied fix resolves the reported issue without causing new problems or negatively impacting the system’s overall functionality. This involves checking that the system continues to operate normally after the solution is applied.

A

To validate that the solution fixes the reported problem without affecting the system’s overall functionality.

Explanation:
The primary goal of verifying a solution is to ensure that the applied fix resolves the reported issue without causing new problems or negatively impacting the system’s overall functionality. This involves checking that the system continues to operate normally after the solution is applied.

62
Q

In networking, what type of wireless network allows devices to connect directly to each other without the need for a centralized access point?

Ad Hoc

Point-to-Point

Mesh Network

Infrastructure

A

Ad Hoc

Ad Hoc networks enable devices to connect directly, promoting peer-to-peer communication without relying on a centralized access point. Point-to-Point setups involve dedicated connections between two specific devices, whereas Ad Hoc allows multiple devices to connect without a centralized point. Mesh networks involve interconnected nodes for redundancy. Ad Hoc networks are more straightforward, connecting devices directly without the complexity of a mesh. Infrastructure networks rely on centralized access points for device connections, contrasting with the decentralized.

63
Q

Which of the following allows an access point to use multiple antennas to send and receive data at faster speeds?

Band Steering

Channel Bonding

MIMO Technology

Dynamic Frequency Selection

A

MIMI Technology

Multiple Input Multiple Output (MIMO) enhances data throughput (speed) by using multiple antennas.

64
Q

When establishing a network, what feature enhances user authentication and controls internet access in public Wi-Fi environments?

Captive Portal

DNS Server

Ethernet Switch

Powerline Adapter

A

Captive Portal

Captive portals enforce user authentication, manage guest access, and control internet usage—crucial in public Wi-Fi settings.

65
Q

In a large-scale Wi-Fi deployment for a shopping mall, which type of access point is most suitable for seamless roaming and centralized management?

Lightweight Access Point

Autonomous Access Point

Mesh Access Point

Standalone Access Point

A

Lightweight Access Point

Lightweight APs rely on a centralized controller for management, making them ideal for large deployments like shopping malls, ensuring seamless roaming and centralized control.

66
Q

In a business setting prioritizing advanced security, which Wi-Fi security protocol offers improved protection against offline dictionary attacks and enhanced encryption compared to its predecessor?

WPA3

WPA2

WEP

WPA-Enterprise

A

WPA3

WPA3 enhances Wi-Fi security with features like Simultaneous Authentication of Equals (SAE) for protection against offline attacks, providing advanced security. While still widely used, WPA2 lacks the advancements in protection against offline dictionary attacks and encryption improvements introduced in WPA3.

67
Q

A user reports that they can’t connect to a server on your network. You check the problem and find out that all users are having the same problem. What should you do next?

Create an action plan.

Establish the most probable cause.

Identify the affected areas of the network.

Determine what has changed.

A

Determine what has changed

At this point, you have identified the symptoms and the scope of the problem. In this scenario, you have determined that the problem affects all users. The next step is to determine what might have changed that could have caused the problem.

68
Q

Which layer of the Open Systems Interconnect (OSI) model specifies the physical layer of a network?

Layer 3

Layer 1

Layer 2

Layer 5

A

Layer 1

Layer one of the OSI model is the physical layer. It specifies the physical topology and physical interface. It is responsible for the transmission and receipt of bits from one node to another node.

69
Q

Which function of the SOHO router is responsible for allocating a unique IP address to each host that connects to it?

A

Dynamic Host Configuration Protocol (DHCP)

DHCP is the function responsible for automatically allocating unique IP addresses to each host that connects to the SOHO router. It assigns IP addresses from a defined pool, ensuring that each device receives a unique address an can communicate on the network without IP address conflicts

70
Q

At layer 4 of the OSI model, which mechanism is responsible for ensuring reliable data delivery between hosts?

A

The implementation of flow control and error-checking protocols

Layer 4, the transport layer, is responsible for providing reliable data delivery when required by applications. This is achieved through the implementation of flow control and error-checking protocols, such as TCP, which ensure that packets are delivered in order and without errors. If packets are lost or damaged, these protocols can request that the data be resent, thus maintaining the integrity of the communication.

71
Q

You are an IT technician troubleshooting a reported issue where several users are experiencing intermittent network connectivity problems. To identify the precise nature of the problem, you decide to consult indirect sources of information.
Which of the following sources would be MOST helpful in your investigation? (Select two.)

Sending a company-wide email asking if anyone else is experiencing similar issues.

Reviewing the company’s social media feed for any related complaints.

Reviewing the latest financial reports for budget cuts in the IT department.

Consulting recent job logs or speaking with other technicians who might have the relevant information.

Checking the system documentation, such as installation or maintenance logs

A

Consulting recent job logs or speaking with other technicians who might have relevant information.

Checking the system documentation, such as installation or maintenance logs

72
Q

A growing company has recently moved into a new office space. The company has 50 employees, each with their own workstation. The office also has multiple printers, a centralized server, and requires structured cabling for connectivity.

Which type of network would be MOST effective for this setup?

Wide Area Network (WAN)

Small Office/Home Office (SOHO) network

Small and medium-sized Enterprise (SME) network

Data Center

A

Small and Medium-sized Enterprise (SME) network

An SME network is designed to support dozens of users and would use structured cabling and multiple switches and routers to provide connectivity. This is the most suitable type of network for a company with 50 employees.

73
Q

A team of network consultants is configuring an Internet of Things (IoT) network. The team is considering network topologies in the context of the IoT devices being used, which are all within 100 meters of one another, are battery-powered, and communicate via the Zigbee protocol.

Which of the following network topologies would BEST save power and scale easily to thousands of IoT sensor devices while saving power by cooperating with nearby devices?

Ring

Mesh

Bus

Star

A

Mesh

Mesh networks provide excellent redundancy, because other routes, via intermediary devices, are available between locations if a link failure occurs.

74
Q

A systems manager is preplanning for an event where critical servers might fail.

Which of the following would be the most likely plan of action?
answer

Repair

Ignore

Destroy

Replace

A

Replace

In the case of critical servers, the systems manager would have duplicate servers on hand to replace them since the cost of the time it would take to repair the servers would be unknown.

75
Q

Which of the following devices use MAC addresses and host interfaces at the Data Link Layer for communication? (Select two.)
answer

The radio in a mobile device

NIC ports in a computer

HDMI cables

Fiber optic cables

USB flash drives

A

The radio in the mobile device

NIC ports in a computer

NIC ports in computers are equipped with MAC addresses, which serve as unique identifiers at the Data Link Layer.

The radio component of a mobile device, which enables wireless communication, also has a unique MAC address.

76
Q

From the list below, identify which questions are open questions that would be effective in gathering detailed information during a troubleshooting process. (Select three.)
answer

Is your computer running Windows 10?

Can you describe the steps you took before noticing the issue?

Have you tried restarting your device?

Do you have problems with other applications as well?

What error message do you see when the problem occurs?

Did the problem start after you installed new software?

What changes have you noticed since the issue began?

A

Can you describe the steps you took before noticing the issue?

Do you have problems with other applications as well?

What changes have you noticed since the issue began?

77
Q

Your manager has asked you to implement a network infrastructure that will accommodate failed connections.

Which of the following network topologies provides redundancy for a failed link?
answer

Ring

Mesh

Bus

Star

A

Mesh

In a mesh topology, each network device is interconnected with all other network nodes. This creates multiple data paths. If a link fails, the data has an alternate route to its destination.

78
Q

Which networking component would connect to a SOHO router, operating at the first layer of the OSI model?
answer

Internal bridge

Firewall

Wireless Access Point

RJ-45

A

RJ-45

This is a part of the router and represents the physical connection for Ethernet cables. It operates at the first layer (Physical) of the OSI model.

79
Q

How is the SOHO router typically described in the context of a network?
answer

Central Office Exchange Service (COES)

Network Access Server (NAS)

Internet Service Provider (ISP) Gateway

Customer Premises Equipment (CPE)

A

Customer Premises Equipment (CPE)

The SOHO router is described as Customer Premises Equipment (CPE). This term refers to any termination and routing equipment placed at the customer’s site, which can be owned or leased from the telecommunications company or owned by the customer. It connects the local network to the wider Internet

80
Q

Which of the following networking topologies connects each network device to a central forwarding appliance?
answer

Bus

Star

Ring

Mesh

81
Q

Which of the following geographic network types is typically confined to a single geographical location where all nodes and segments are directly connected?
answer

Local area network (LAN)

Personal area network (PAN)

Metropolitan area network (MAN)

Wide area network (WAN)

A

Local Area Network (LAN)

A LAN is confined to a single geographical location. In a LAN, all nodes and segments are directly connected with cables or short-range wireless technologies.

82
Q

Which of the following BEST describes a demarcation point in the context of telecommunications?
answer

The maximum data transfer rate achievable by the ISP

The protocol used for encrypting data over the Internet

The central hub where all ISPs connect and exchange data

The point at which the telco’s cabling enters the customer premises

A

The point at which the telco’s cabling enters the customer premises

The demarcation point is the point where the telecommunication’s company’s responsibility ends and the customer’s responsibility begins; typically where the telco’s cabling enters the building on premises.

83
Q

When changing a system as part of implementing a troubleshooting solution, which of the following practices should be followed? (Select two.)
answer

Implement all suggested solutions simultaneously to save time.

Record all changes made during the troubleshooting process.

Avoid testing changes to expedite the resolution process.

Make changes without backing up data and configuration.

Test after each change to ensure the problem is resolved.

A

Record all changes made during the troubleshooting process

Test after each change to ensure the problem is resolved

84
Q

Which of the following BEST describes the role of the Application layer (layer 7) in the OSI model?
answer

The Application layer defines the electrical and physical specifications for devices.

The Application layer is responsible for setting up and maintaining the data link connections.

The Application layer provides an interface for software programs to exchange data over a network.

The Application layer manages the segmentation and reassembly of data packets.

A

The Application layer provides an interface for software programs to exchange data over a network.

It facilitates the communication between software applications and the underlying network services, allowing for the exchange of data once a communication channel has been established by the lower-level protocols.

85
Q

What does the Network layer use to move information around an internetwork?
answer

Physical layer media

Logical network and host IDs

Access control lists (ACLs)

Data link protocols

Hardware addresses

A

Logical network and host IDs

The network layer uses logical network and host IDs to move information around an internetwork. These IDs allow routers to determine the destination network for each packet.

86
Q

Which of the following functions does a SOHO router implement at layer 2 to make use of its Physical layer adapters? (Select two.)
answer

DHCP server

Ethernet switch

Wireless access point

Firewall

Network Address Translation (NAT)

A

Ethernet Switch

Wireless access point

Ethernet switch. The Rj-45 jacks on a SOHO router are connected internally by an Ethernet switch, allowing multiple wired devices to communicate within the same network segment. This is a key functions at Layer 2, facilitating the use of Physical layer adapters for wired connections.

Wireless access point. A SOHO router includes a wireless access point, which uses radio antennas to implement a version of the Wi-Fi standard. This allows wireless devices such as PCs, tablets, smartphones, and printers to form a network. The access point is also connected to the Ethernet switch internally, bridging the wired and wireless segments into a single logical data link network.