CIS 444 exam 1 Flashcards
On an Ethernet network using the star topology, which device can function as the cabling nexus that forms the figurative center of the star?
Load balancer
Access Point
Router
Switch
switch
Which of the following Wide Area Network (WAN) technologies uses broadband signaling?
Cable television (CATV)
Digital Subscriber Line (DSL)
Integrated Services Digital Network (ISDN)
Synchronous Optical Network (SONET)
Cable television (CATV)
Which of the following is not a technology typically used for a personal area network (PAN)?
Z-Wave
NFC
SDWAN
Bluetooth
SDWAN
Which of the following is a wide area networking mechanism that assigns labels to packets and forwards them based on those labels, rather than addresses?
MPLS
ATM
PPPoE
Frame relay
MPLS
Which of the following best describes the function of the network medium?
The network medium processes electrical or light signals and converts them to data.
The network medium provides the physical connection between networked computers.
The network medium provides the protocol used to transmit data between end systems.
The network medium passes data packets between two routers
The network medium provides the physical connection between networked computers.
Which network type is typically wireless?
WLAN
LAN
SAN
WAN
WLAN
Ralph is an employee of a company that offers the option to telecommute from home. As a telecommuting employee, he needs to connect to the company network to access client information, transfer files, and send email through a Virtual Private Network (VPN) connection. Ralph is investigating the different Wide Area Network (WAN) services available for the remote connection before he implements one. His home is over 30 years old; the existing telephone wiring was not run through conduit, and the wiring seems to be deteriorating. Ralph has cable television (CATV) service, and his home is also approximately 20,000 feet from the nearest telephone central office. He wants to implement the fastest remote connection service possible, but cost is a factor in the decision. Which WAN technology should Ralph implement?
A DSL (Digital Subscriber Line) connection
A dedicated leased line (fractional T-1)
A standard modem-to-modem connection
A broadband CATV connection
A broadband CATV connection
Which of the following best describes the function of a demarcation point or demarc?
The vertical cross-connect that links horizontal networks together
The place in a telecommunications room where a patch panel is located
A switch or hub that connects the computers in a particular work area together, forming a horizontal network
The place where an outside service enters the building
The place where an outside service enters the building
Which of the following Wide Area Network (WAN) connection technologies uses analog signaling?
Public Switched Telephone Network (PSTN)
Synchronous Optical Network (SONET)
Cable television (CATV)
Digital Subscriber Line (DSL)
Public Switched Telephone Network (PSTN)
Which of the following cabling topologies provides the greatest number of redundant paths through the network?
Ring
Star
Mesh
Bus
Mesh
Which of the following statements about a wired Local Area Network (LAN) is true?
Wired LANs support only the star and ring topologies.
Wired LANs support only the star and bus topologies.
Wired LANs can support ring, bus, or star topologies.
Wired LANs support only the star topology
Wired LANs can support ring, bus, or star topologies
Which type of network connects Local Area Networks (LANs) in distant locations?
MAN
WAN
CAN
LAN
WAN
You have recently started a new job that enables you to telecommute from home, and you need a Wide Area Network (WAN) connection to the Internet. You will need to access the company network using a Virtual Private Network (VPN) connection to obtain client information, transfer files, and send email through the company servers. Your home is over 30 years old. The existing telephone wiring was not run through a conduit, and it seems to be deteriorating. You have cable television service, and your home is approximately 20,000 feet from the nearest telephone central office. You want to implement the fastest possible remote connection service, but cost is still a factor in the decision. Which WAN technology should you implement?
A dedicated leased line (fractional T-1)
A DSL (Digital Subscriber Line) connection
A broadband cable television (CATV) connection
A standard modem-to-modem connection
A broadband cable television (CATV) connection
Which type of network is typically confined to a small area, such as a single room, floor, or building?
CAN
WAN
LAN
MAN
LAN
Which technology is typically used for Personal Area Networks (PANs)?
DSL
ISDN
RFID
Bluetooth
Bluetooth
Which internet service provides unequal amounts of upstream and downstream bandwidth?
DSL
FCoE
OSI
SDSL
DSL
Which of the following hardware components is typically found at the demarcation point of a leased line, such as a T-1 or T-3?
110 block
Terminator
Smartjack
Punchdown
Smartjack
A company is moving their entire operation to a new building, and part of the plan is to increase the speed of their Internet access by installing a leased T-3 line to replace their existing broadband connection. The service provider they have selected sends a technician to install the leased line. Which of the following is the correct term for the location in the new building where the technician will terminate the T-3?
Switch
Demarc
Patch panel
Firewall
Demarc
Which of the following is an example of a hybrid topology?
Four Ethernet switches connected using a bus topology
Four Ethernet switches, each with a separate network connection to each of the other three
A workstation with two network interface cards, one of which is connected to a star network and one to a bus network
Four workstations, each with a separate network connection to each of the other three
Four Ethernet switches connected using a bus topology
Which of the following devices often provides diagnostic testing capabilities at the demarcation point of a leased line Wide Area Network (WAN) service?
AAAA server
SIP trunk
Media converter
Smartjack
Smartjack
On a TCP/IP network, which layer of the Open Systems Interconnection (OSI) model contains protocols responsible for encapsulating the data generated by an application, creating the payload for a packet that will be transmitted over a network?
Presentation
Transport
Session
Physical
Transport
Which of the following terms describes the Transmission Control Protocol (TCP) exchange that establishes a connection prior to the transmission of any data?
Connection establishment
Synchronization
Initialization exchange
Three-way handshake
Three-way handshake
Which two of the following functions is the multifunction device on a home or small office network known as a broadband router least likely to provide?
Proxy server and VPN headend
Firewall and router
Wireless Access Point (WAP) and switch
DHCP server and DNS server
Proxy server and VPN headend
Which of the OSI model layers is responsible for syntax translation and compression or encryption?
Network
Session
Presentation
Application
Presentation
The protocols at which layer of the Open Systems Interconnection (OSI) model use port numbers to identify the applications that are the source and the destination of the data in the packets?
Transport
Network
Presentation
Application
Transport
Which layer of the Open Systems Interconnection (OSI) model defines the medium, network interfaces, connecting hardware, and signaling methods used on a network?
Data link
Network
Physical
Transport
Physical
On a TCP/IP network, flow control is a function implemented in protocols operating at which layer of the Open Systems Interconnection (OSI) model?
Session
Presentation
Network
Transport
Transport
Which layer Open Systems Interconnection (OSI) model does not have protocols in the TCP/IP suite exclusively dedicated to them?
Session
Network
Application
Transport
Session
Ed is a software developer who has been given the task of creating an application that requires guaranteed delivery of information between end systems. At which layer of the Open Systems Interconnection (OSI) model does the protocol that provides the guaranteed delivery run, and what type of protocol must Ed use?
Transport layer; connection-oriented
Data link layer; connectionless
Network layer; connection-oriented
Application layer; connectionless
Transport layer; connection-oriented
At which layer of the OSI model do you find the protocol responsible for the delivery of data to its ultimate destination on an internetwork?
Network
Session
Data link
Application
Network
You are designing an Ethernet network for your company’s newest branch office. Your current task is to decide which Ethernet specification to use for the network, a decision that you know will determine what type of cabling you need to purchase and the topology with which the cable will be installed. Which layers of the Open Systems Interconnection (OSI) reference model apply to the cabling and topology elements of a network?
The application and transport layers
The transport and network layers
The network and data link layers
The data link and physical layers
The data link and physical layers
Which function is defined as occurring at the session layer of the Open Systems Interconnection (OSI) model?
Dialog control
Datagram routing
Data encryption
Dialog switching
Dialog control
You are a consultant working on a new client’s network. The network has been in place for decades, and you have been given a diagram supplied by the original installer. The diagram says that the network computers are connected to a device called a multiport repeater. Which of the following devices can also be described as a multiport repeater?
Router
Hub
Switch
Bridge
Hub
Which of the following devices enables administrators of enterprise wireless networks to manage multiple Access Points (APs) from a central location?
Hypervisor
Wireless controller
Wireless endpoint
Demarcation point
Wireless controller
Specify the layer of the Open Systems Interconnection (OSI) model at which the Internet Protocol (IP) operates and whether it is connection-oriented or connectionless.
Network; connection-oriented
Transport; connection-oriented
Network; connectionless
Transport; connectionless
Network; connectionless
The protocols that are responsible for the delivery of data packets to their final destinations on an internetwork operate at which layer of the Open Systems Interconnection (OSI) reference model?
Network
Transport
Session
Application
Network
Which two of the following constructs provide roughly the same function? (Choose two that apply.)
CSU/DSU
SIP trunk
VPN concentrator
Smartjack
SIP trunk
Which layer of the Open Systems Interconnection (OSI) model has its own logical addressing system and is responsible for routing packets from one network to another?
Transport
Session
Network
Presentation
Network
Which layer of the Open Systems Interconnection (OSI) model is responsible for the logical addressing of end systems and the routing of datagrams on a network?
Physical
Data link
Transport
Network
Network
Which layer of the Open Systems Interconnection (OSI) model is responsible for transmitting signals over the network medium?
Data link
Physical
Network
Transport
Physical
Which of the following are available as Internet of Things (IoT) devices?
Doorbells
Refrigerators
Thermostats
All of the above
All of the above
Which of the following devices operates only at the physical layer of the Open Systems Interconnection (OSI) model?
Hub
Bridge
Router
Switch
Hub
Which of the following are available as Internet of Things (IoT) devices?
Thermostats
Doorbells
Speakers
All of the above
All of the above
Proxy servers operate at which layer of the OSI reference model?
Network
Transport
Data link
Application
Transport
Which device runs exclusively at the physical layer of the Open Systems Interconnection (OSI) model?
Switches
Routers
Repeaters
Switches
Repeaters
Identify the layer of the Open Systems Interconnection (OSI) model that controls the addressing, transmission, and reception of Ethernet frames, and also identify the media access control method that Ethernet uses.
Data link layer; CSMA/CD
Data link layer; CSMA/CA
Physical layer; Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Physical layer; Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Data link layer; CSMA/CD
You want to create a network in which computers from different departments are assigned to separate Virtual Local Area Networks (VLANs). You also want to be able to forward traffic between the VLANs so that each computer is capable of accessing any other computer. Which of the following will enable you to perform all these functions with a single device?
Load balancer
Virtual router
Broadband router
Multilayer switch
Multilayer switch
Multiprotocol switches are devices that perform functions associated with two different layers of the Open Systems Interconnection (OSI) reference model. Which layer is often associated with network switching?
Physical
Session
Transport
Data link
Data link
What layer of the Open Systems Interconnection (OSI) model is responsible for translating and formatting information?
Transport
Application
Session
Presentation
Presentation
Which of the following devices can also be described as a multiport repeater?
Bridge
Hub
Switch
Router
Hub
Which of the following statements about bridges and switches is true?
Bridges and switches must support the network layer protocol implemented on the Local Area Network (LAN).
Bridges and switches build their internal tables based on destination addresses and forward packets based on source addresses.
Bridges and switches are data link layer devices that use Media Access Control (MAC) addresses to forward frames.
Bridges and switches are network layer devices that use logical addressing to forward frames.
Bridges and switches are data link layer devices that use Media Access Control (MAC) addresses to forward frames.
At which layer of the Open Systems Interconnection (OSI) model is there a protocol that adds both a header and footer to the information that is passed down from an upper layer, thus creating a frame?
Data link
Physical
Transport
Network
Data link
Which of the following protocols provides connectionless delivery service at the transport layer of the Open Systems Interconnection (OSI) model?
HTTP
UDP
TCP
ARP
UDP
A multilayer switch can operate at which layers of the Open Systems Interconnection (OSI) model?
Network and Transport
Physical and Data link
Transport and Session
Data link and Network
Data link and Network
A multilayer switch typically functions at which layers of the OSI reference model?
Data link and Network
Session and Presentation
Network and Transport
Transport and Session
Data link and Network
Which of the following is another term for a switch?
Multihomed router
Multiport bridge
Multiport repeater
Multicast hub
Multiport bridge
Which of the following devices can you use to connect two multimode fiber-optic Ethernet networks in different buildings 2000 meters apart using a single-mode fiber-optic cable segment running at the same speed, while maintaining a single collision domain?
Router
Switch
Bridge
Media converter
Media converter
Alice is a network administrator designing a new Local Area Network (LAN). She needs to determine the type of cabling and the network topology to implement. Which layers of the Open Systems Interconnection (OSI) model apply to cabling and topology elements?
Network and transport layers
Physical and data link layers
Transport and application layers
Data link and network layers
Physical and data link layers
Which of the following is not one of the five functional levels associated with a distributed control system such as Supervisory Control and Data Acquisition (SCADA) systems?
Remote access
Field level
Direct control
Production control
Remote access
Which protocol operates at the network layer of the OSI model, but does not encapsulate data generated by an upper layer protocol for transmission over the network?
ARP
ICMP
TCP
UDP
ICMP
Which of the following statements explains the purpose of the twists in twisted pair cabling?
The twists prevent collisions.
The twists completely eliminate crosstalk and electromagnetic interference (EMI) in adjacent wire pairs.
The twists prevent crosstalk in adjacent wire pairs and limit the effects of EMI on the signals carried over the cable.
The twists extend the bend radius allowance of the cable.
The twists prevent crosstalk in adjacent wire pairs and limit the effects of EMI on the signals carried over the cable.
Which of the following Ethernet specifications calls for CAT8 UTP cable exclusively?
10GBase-T
40GBase-T
100Base-TX
1000Base-SX
40GBase-T
Which statement about fiber-optic cabling is true?
There are two main fiber-optic cable types: single-mode and multimode.
Fiber-optic cables use IBM Data Connector (IDC) connectors.
Single-mode fiber-optic cable uses a laser light source and a copper core.
Multimode fiber-optic cable uses a Liquid Crystal Display (LCD) light source
There are two main fiber-optic cable types: single-mode and multimode.
Network cable runs generally connect office endpoints, such as wall plates, to a central cabling nexus, which is typically where the runs are joined to a backbone network that links them together. Which of the following is a term for such nexuses where network cabling connections are found?
RDP
IDF
MIB
MTBF
IDF
Which of the following telecommunications components is all but obsolete and is found only in old, analog telephone installations?
66 block
110 block
Patch panel
Smartjack
66 block
Which of the following Ethernet physical layer options does not use the star topology?
10Base2
10Base-T
100Base-TX
1000Base-T
10Base2
Which tool might you use when connecting internal twisted-pair cable runs to the keystone connectors that snap into wall plates?
A crimper
A punchdown tool
A pigtail splicer
A fusion splicer
A punchdown tool
You have been hired by a client to connect two local area networks together, which are in different buildings 500 meters apart. The cable type you use must support Gigabit Ethernet data rates of 1000 megabits per second (Mbps) and provide a high level of resistance to electromagnetic interference (EMI). Which cable type can you choose to meet the client’s needs?
Single-mode fiber-optic cable
Thin coaxial cable
Shielded Twisted Pair (STP) cable
Unshielded Twisted Pair (UTP) cable
Single-mode fiber-optic cable
Twisted-pair cables consist of multiple pairs of wires within a sheath, with each pair of wires twisted together separately. Which statement best explains the reason for the twists in twisted-pair cabling?
The twists help to prevent crosstalk in adjacent wire pairs.
The twists make it easier for installers to attach connectors to the cable ends.
The twists extend the cable’s bend radius allowance, making it easier to install.
The twists help to prevent data collisions from occurring
The twists help to prevent crosstalk in adjacent wire pairs.
Which of the following cable types is typically configured in a star topology, uses eight copper conductors arranged in four pairs, and uses RJ-45 connectors?
RG-8
Twisted pair
RG-58
Fiber optic
Twisted pair
Which of the following types of patch cables is used to connect a computer to a wall plate?
Straight through
Crossover
Rollover
Plenum
Straight through
Which of the following types of cable is never used to connect a workstation to an Ethernet network?
Rollover
Straight-through
Crossover
Plenum
Shielded
Rollover
Which of the following troubleshooting tools is not used to test copper cabling installations?
Wiremap tester
Multimeter
Tone generator and locator
OTDR
OTDR
Which statement about single-mode fiber-optic cable is true?
Multimode cables use an LED light source, while single-mode cables use a laser.
Multimode cables can span longer distances than single-mode cables.
Multimode cables have a smaller core filament than single-mode cables.
Multimode fiber-optic cables require a ground, whereas single-mode cables do not
Multimode cables use an LED light source, while single-mode cables use a laser.
Which of the following tools do cable installers use to add connectors such as RJ-45 and RJ-11 to twisted pair cabling?
A crimper
A splicer
A pigtail
A patch
A crimper
Wavelength division multiplexing is a fiber-optic technique for carrying multiple signals on a single network medium. There are several types of this technique, including Coarse Wavelength Division Multiplexing (CWDM), Dense Wavelength Division Multiplexing (DWDM), and Bidirectional Wavelength Division Multiplexing (BWDM, or just WDM). Which of the following is not one of the ways in which these types of multiplexing differ?
They use different wavelength spacings.
They carry different numbers of channels on a single medium.
They provide different amounts of signal amplification.
None of the above
None of the above
Which of the following signal types is carried by copper cable?
Fiber optic
Microwave
Infrared
Electrical
Electrical
Ralph has been hired by a client to install cabling to connect two existing networks. The two networks are in different buildings approximately 1000 feet apart. The cable type must support Gigabit Ethernet data rates of 1000 megabits per second (Mbps) and provide a high level of resistance to electromagnetic interference (EMI). Your client wants the most economical cabling solution that meets their needs. Which of the following cable types best meets the needs of this client?
Multimode fiber-optic cable
Shielded Twisted Pair (STP) cable
Unshielded Twisted Pair (UTP) cable
Thin coaxial cable
Multimode fiber-optic cable
Which of the following tools do cable installers use to connect bulk cable runs to wall plates and patch panels?
A crimper
A splicer
A pigtail
A punchdown block tool
A punchdown block tool
To which of the following Internet connection types does a specification called DOCSIS apply?
Dial-up modem
DSL
Cable broadband
ISDN
Cable broadband
It is Ralph’s first day working for a consultancy that does network cable installations. His new boss hands him a spool of Category 6 cable, a large plier-like device, and a bag of little clear plastic components and tells him to “get started on fives and tens.” What is Ralph expected to do?
Pull cable runs
Create patch cables
Attach keystone connectors
Install a patch panel
Attach keystone connectors
Ed has discovered that, on some of his newly installed twisted-pair cable runs, the installer has stripped away nearly a foot of the cable sheath at each end and has untwisted the wire pairs before attaching them to the connectors. Which of the following problems is the network more likely to experience due to the untwisted wires?
Jitter
Attenuation
Crosstalk
EMI
Crosstalk
Which twisted pair cable type supports both 10-megabit-per-second (Mbps) and 100 Mbps data rates, using only two pairs? (Choose all that apply.)
Category 2 (CAT2)
Category 3 (CAT3)
Category 4 (CAT4)
Category 5e (CAT5e)
Category 5e (CAT5e)
Which connector type is used with fiber-optic cables?
DB-9
SC
BNC
RJ11
SC
Ralph has been hired to connect three Local Area Networks (LANs) together with redundant paths that form a fault-tolerant backbone. The LANs reside on different floors in the same building and are approximately 600 meters apart. Each LAN is currently configured in a star topology using twisted pair cabling. Each LAN includes wall plates and rack-mounted patch panels and switches. Building and fire codes allow cables to run through existing risers, ceilings, and walls, but a 50,000-watt radio station occupies one of the floors between the LANs. Which topology and cable type are best suited for this network?
Star topology and fiber-optic cabling
Star topology and coaxial cabling
Mesh topology and fiber-optic cabling
Star topology and twisted pair cabling
Mesh topology and fiber-optic cabling
Which of the following cable connector types is not used with fiber-optic cable?
Subscriber Connector (SC)
Mechanical Transfer-Registered Jack (MT-RJ)
F-type
Fiber Local Connector (LC)
F-type
What is the name for a device that determines the length of a cable by transmitting a signal at one end and measuring how long it takes for a reflection of the signal to return from the other end?
Time-domain reflectometer
Voltage event recorder
Butt set
Spectrum analyzer
Time-domain reflectometer
Which statement is true about coaxial cable?
Coaxial cable has three conductors within the same sheath.
Coaxial cable has two conductors within the same sheath.
Coaxial cable has a copper core that carries light pulse signals.
Coaxial cable has an insulating sheath made of either PVC or Teflon.
Coaxial cable has two conductors within the same sheath.
Which of the following tools can you use to test the optical loss in a fiber-optic cable?
An OLTS
A TDR
A tone generator and locator
A wiremap tester
An OLTS
Which of the following devices is not one of the tools generally used by a data networking cable installer?
Tone generator and locator
Wiremap tester
Butt set
Cable certifier
Butt set
Ed has been hired by a company to upgrade its network infrastructure. The current network is 10 Mbps Ethernet running on Category 5 (CAT5) twisted pair cable. There are 100 computers on the network, all of which have 10/100/1000 multispeed network interface adapters. The computers are all connected to hubs. Users are complaining that the network is too slow, and connections are sometimes dropped. Management wants to upgrade to the fastest Ethernet standard possible, using the existing cabling, and still keep costs to a minimum. Which of the following implementations should Ed recommend to the client?
Upgrade to 1000Base-T and keep the existing hubs.
Upgrade to 100Base-FX and replace all of the hubs with switches.
Upgrade to 1000Base-T and replace all of the hubs with switches.
Upgrade to 100Base-SX and replace all of the hubs with switches.
Upgrade to 1000Base-T and replace all of the hubs with switches.
You are heading out to do a cabling job for a client who has twisted-pair Ethernet networks at their facility. You want to bring connectors and cables to prepare for any eventuality. Which connector type is typically associated with Ethernet networks?
N-type
BNC
F-type
RJ45
RJ45
Your supervisor has asked you to call the cabling contractor your company uses and make an appointment to install some new twisted-pair cable runs. In addition to asking how many cable runs you need pulled, the contractor asks you if you need plenum or PVC. Under which of the following conditions might the local building code require that a data network use plenum cable?
When cable runs exceed the maximum length specified by the physical layer specification
When cables must run through air ducts
When cables run near to devices that generate electromagnetic interference (EMI)
When multiple cables run through the same conduit
When cables must run through air ducts
Dense Wave Division Multiplexing (DWDM) is a signaling technology that has become a popular choice in the construction of which of the following types of provider links?
Digital Subscriber Line (DSL)
Metro-optical
Satellite
Cable
Metro-optical
Ed has discovered that some of the twisted-pair cable runs on his newly installed Ethernet network are well over 100 meters long. Which of the following problems is his network likely to experience due to cable segments that are greater than the specified length?
Jitter
Attenuation
Crosstalk
EMI
Attenuation
Which of the following is not a type of fiber-optic connector?
SC
MTRJ
ST
BNC
BNC
Wavelength division multiplexing is a technique for carrying multiple fiber-optic signals on a single network medium. There are several types of this multiplexing technique, including Coarse Wavelength Division Multiplexing (CWDM), Dense Wavelength Division Multiplexing (DWDM), and Bidirectional Wavelength Division Multiplexing (BWDM, or just WDM). Which of the following is one of the ways in which these types of multiplexing differ?
They carry different numbers of channels on a single medium.
They use different wavelength spacings.
They provide different amounts of signal amplification.
They use different forms of amplitude modulation.
They use different wavelength spacings.
Alice has been hired by a corporation to design the cabling for their network. The corporation just moved into two different floors of an older building: a retail space on the ground floor and an office space on the 43rd floor. The building has existing Category 5 (CAT5) Unshielded Twisted Pair (UTP) cable. Alice’s client wants two separate Local Area Networks (LANs), one on each of the two floors, with a backbone network connecting them. They want a 1 gigabit-per-second (Gbps) data rate for each LAN but plan on migrating to 10 Gbps in the future. The two networks are approximately 200 meters apart. Which of the following solutions best meets the client’s needs?
Install Category 6 (CAT6) or Category 6a (CAT6a) UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use twisted pair cable for the backbone network.
Use the existing CAT5 cabling for the LANs, since CAT5 runs at 1 Gbps. Use thick coaxial cable for the backbone network.
Install CAT6 or CAT6a UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use multimode fiber-optic cable for the backbone network.
Install CAT6 or CAT6a UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use the existing CAT5 cable for the backbone network.
Install CAT6 or CAT6a UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use multimode fiber-optic cable for the backbone network.
Which twisted pair cable type can you use to construct a 10GBase-T network with 100-meter segments?
CAT5
CAT5e
CAT6
CAT6a
CAT6a
A large enterprise network will-at a minimum-have demarcation points for telephone services and a connection to an Internet Service Provider’s (ISP’s) network. In many cases, these services will enter the building in the same equipment room that houses the backbone switch. Which of the following is the term used to describe this wiring nexus?
MTBF
IDF
RDP
MDF
MDF
What is the valid range of numbers for the ephemeral client ports used by the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?
49152 through 65535
1024 to 49151
1023 through 65534
1 through 1024
49152 through 65535
To which class does the following IPv4 address belong: 190.126.14.251?
Class B
Class C
Class D
Class A
Class B
Which of the following pairs of well-known ports are the default values you would use to configure a POP3 email client?
110 and 143
110 and 25
143 and 25
80 and 110
110 and 25
Which of the following is a valid IPv6 address?
2001:0:49e6:39ff:8cf5:6812:ef56
2001:0:44ef68:23eb:99fe:72bec6:ea5f
fe00::c955:c944:acdd:3fcb
fe00::b491:cf79:p493:23ff
fe00::c955:c944:acdd:3fcb
What is the valid range of numbers for the well-known Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports used by servers?
1 through 1023
49152 through 65534
1 through 49151
1024 through 49151
1 through 1023
Automatic Private IP Addressing (APIPA) assigns IPv4 addresses from which of the following classes to Dynamic Host Configuration Protocol (DHCP) clients that cannot contact a DHCP server?
Class D
Class B
Class A
Class C
Class B
Alice has been instructed to install 100 Windows workstations, and she is working on automating the process by configuring the workstations to use PXE boots. Each workstation therefore must obtain an IP address from a DHCP server and download a boot image file from a TFTP server. Which well-known port must Alice open on the firewall separating the workstations from the servers?
65
66
64
67
67
Which of the following well-known ports do you use to configure outgoing mail on a POP3 email client?
143
110
25
80
25
Ralph is configuring a new email client on a workstation to use the Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3) email protocols. He wants both protocols to use encryption when communicating with the email server. Which port number should Ralph use to secure the SMTP connection with Transport Layer Security (TLS) and the POP3 connection with Secure Sockets Layer (SSL) encryption?
110
993
25
995
995
Which of the following is the default well-known port number for the Hypertext Transfer Protocol (HTTP) used for web client/server communications?
22
80
443
20
80
The secured version of the Hypertext Transfer Protocol (HTTPS) uses a different well-known port from the unsecured version. Which of the following ports is used by HTTPS by default?
443
80
110
25
443
You have been given a Class B network IP address with which to configure the new network you are designing. Which of the following is the default subnet mask you should use for an IPv4 Class B network?
255.255.255.0
255.255.255.255
255.255.0.0
255.0.0.0
255.255.0.0
Which of the following could be a valid MAC address for a network interface adapter?
10.124.25.43
00:1A:6B:31:9A:4E
fe80::89a5:9e4d:a9d0:9ed7
FF:FF:FF:FF:FF:FF
00:1A:6B:31:9A:4E
You are configuring the computers on a new network, and you have been given the network address 10.26.0.0/13. Which of the following subnet mask values must you use when configuring the computers?
255.252.0.0
255.255.254.0
255.248.0.0
255.254.0.0
255.248.0.0
Which of the following is a class B IP address?
10.16.225.1
172:33:19:7
192.168.254.77
10.255.255.255
172:33:19:7
A network interface adapter in a workstation has a hexadecimal MAC address of 001F9EFC7AD0. Which of the following would be the adapter’s IPv6 link local address based on its EUI-64 value?
FE80::FF00:1F9E:FC7A:D0FE
FE80::FFFE:021F:9EFC:7AD0
FE80::021F:9EFF:FEFC:7AD0
FE80::001F:9EFF:FEFC:7AD0
FE80::021F:9EFF:FEFC:7AD0
Which of the following criteria does a firewall capable of service-dependent filtering use to block traffic?
Port numbers
IP addresses
Hardware addresses
Protocol identifiers
Port numbers
Which of the following IPv4 address are you unable to assign to a network host?
229.6.87.3
FIXME
1.1.1.1
9.34.0.1
229.6.87.3
In which IPv4 class is the address 127.0.0.1 found?
Class B
Class A
None of the above
Class C
None of the above
The secured version of the Hypertext Transfer Protocol (HTTPS) uses a different well-known port from the unsecured version (HTTP). Which of the following ports are used by HTTP and HTTPS by default?
80
25
110
463
80
Ed has been assigned the IPv4 network address 192.168.2.32/28 for the computers in his department. Which of the following ranges of addresses can Ed use to configure the TCP/IP clients on his computers?
192.168.2.32 to 192.168.2.55
192.168.2.33 to 192.168.2.46
192.168.2.33 to 192.168.2.40
192.168.2.1 to 192.168.2.254
192.168.2.33 to 192.168.2.46
Convert the binary mask 11111111.11111111.11100000.00000000 into its equivalent decimal value. What is the decimal representation of this mask?
255.255.224.0
255.255.240.0
255.255.248.0
255.255.252.0
255.255.224.0
Which of the following statements about VLANs are true? (Choose all that apply.)
All of the devices in a particular VLAN must be physically connected to the same switch.
A VLAN creates a limited broadcast domain on a switched network.
You must have VLANs on a switched network for communication between computers on different cable segments to occur.
A router is not required for communication between VLANs.
A VLAN creates a limited broadcast domain on a switched network.
Alice has been instructed to create an IPv4 network with 8 subnets and 30 hosts per subnet. She has been assigned a Class C network address. Which of the following subnet masks will she have to use?
255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.224
Which of the following modifications occur when you configure the native Virtual Local Area Network (VLAN) on your network switches to use 802.1q tagging? (Choose all that apply.)
Double-tagged packets are not prevented.
BPDU guards are applied.
Root guards are applied.
Trunk traffic is routed, not switched.
BPDU guards are applied
Which of the following is another term for a switching technique called port isolation?
Frame relay
Private VLAN
Site-to-site VPN
Screened subnet
Private VLAN
Port security on an Ethernet switch is implemented through the use of which of the following methods?
Blacklisted MAC addresses
Whitelisted MAC addresses
Port-by-port MAC address filtering
Spoofed MAC addresses
Port-by-port MAC address filtering
The default mask for a IPv4 Class B network is 255.255.0.0. How many subnet bits do you need to create 600 subnets with 55 hosts per subnet, and what is the new subnet mask for the network?
10 subnet bits with a subnet mask of 255.255.255.192
9 subnet bits with a subnet mask of 255.255.255.128
10 subnet bits with a subnet mask of 255.255.224.0
11 subnet bits with a subnet mask of 255.255.255.192
10 subnet bits with a subnet mask of 255.255.255.192
Alice has been asked to design her company’s Internet Protocol (IPv4) addressing scheme. The company has been assigned a Class C network address of 192.168.30.0. Alice’s director wants 4 subnets with 28 hosts per subnet. How many bits are required for subnets? How many bits are required for hosts? What will the new subnet mask be for this network?
3 subnet bits, 5 host bits, and subnet mask 255.255.255.240
4 subnet bits, 3 host bits, and subnet mask 255.255.255.248
3 subnet bits, 5 host bits, and subnet mask 255.255.255.224
5 subnet bits, 3 host bits, and subnet mask 255.255.255.192
3 subnet bits, 5 host bits, and subnet mask 255.255.255.224
What is the greatest number of host addresses you can create on a single subnet of a network with the following address: 172.16.0.0/20?
142
144
4,094
4,096
4,094
Which of the following tasks can you perform to split a large, switched Local Area Network (LAN) into multiple broadcast domains?
Replace one or more switches with hubs.
Install a firewall to filter broadcast traffic.
Enable the Spanning Tree Protocol (STP) on the switches.
Create Virtual Local Area Networks (VLANs) in the switches.
Create Virtual Local Area Networks (VLANs) in the switches.
Alice has recently created a new screened subnet (or perimeter network) for the company’s web server cluster, along with a router to connect it to the internal network. When she is finished, she sends Ralph an email instructing him to run the following command on his Windows workstation so that he can access the servers on the screened subnet. What function does the IP address 192.168.87.226 perform in this command?
192.168.87.226 is the address of Ralph’s workstation.
192.168.87.226 is the network address of the perimeter network.
192.168.87.226 is the address of one of the router’s interfaces.
192.168.87.226 is the address of the web server cluster.
192.168.87.226 is the address of one of the router’s interfaces.
Which of the following is the best definition of a subinterface?
A logical network interface created from a physical network interface
One of the ports on a physical network interface adapter with multiple ports
A physical network interface connected to a subnet
One of the IP addresses associated with a network interface that has multiple IP addresses
A logical network interface created from a physical network interface
Which of the following protocols is responsible for inserting the tags into frames that enable switches to forward them to the appropriate Virtual Local Area Network (VLAN)?
IEEE 802.3x
IEEE 802.1X
IEEE 802.1q
IEEE 802.11ac
IEEE 802.1q
Ralph has a wired home network with three Windows computers, a switch, and a cable modem/router that provides access to the Internet. One of the computers is able to connect to the other two, but it cannot connect to the Internet. Which of the following configuration parameters on the malfunctioning computer will Ralph most likely have to change to resolve this problem?
IP address
Subnet mask
Default gateway
MAC address
Default gateway
Ed has been hired to design a company’s network. The company has an assigned Class C network address of 192.168.30.0. Ed’s client wants the network to be configured with 10 subnets, each with 14 hosts. Is this configuration possible with the given address, and if so, how many subnets and hosts can Ed create on the network?
Yes, this will work. By using 4 subnet bits, it is possible for Ed to create up to 16 subnets. He can then use the remaining 4 host bits to create 14 hosts on each subnet.
No, this will not work. A Class C address cannot be subnetted to create 8 subnets.
No, this will not work. Although there are sufficient bits available to create 10 subnets, there are not enough bits left over for Ed to create 14 hosts per subnet.
Yes, this will work. Ed can create 10 subnets with 14 hosts per subnet. By using 3 subnet bits, he can create 10 subnets, which leaves 5 bits to create up to 30 hosts per subnet.
Yes, this will work. By using 4 subnet bits, it is possible for Ed to create up to 16 subnets. He can then use the remaining 4 host bits to create 14 hosts on each subnet.
Your supervisor has given you a Class C network IP address and has asked you to create a network with 8 subnets and 30 hosts per subnet. Which of the following subnet masks will you have to use?
255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.224
Which of the following TCP/IP parameters, configured on an end system, specifies the Internet Protocol (IP) address of a router on the local network that provides access to other networks?
WINS Server Addresses
Default Gateway
DNS Server Addresses
Subnet Gateway
Default Gateway
Ralph has been instructed to use the network address 10.12.0.0/14 for the new network he is installing. What subnet mask value should he use when configuring his computers?
255.248.0.0
255.252.0.0
255.254.0.0
255.255.248.0
255.252.0.0
If you have an IPv4 network address of 192.168.1.32/27, what is the valid range of host addresses you can use for your workstations?
192.168.1.33 through 192.168.1.63
192.168.1.33 through 192.168.1.62
192.168.1.34 through 192.168.1.62
192.168.1.34 through 192.168.1.63
192.168.1.33 through 192.168.1.62
Ralph is a network administrator who has just installed a new open-source email server for the users at his company. The server is configured to send and receive Internet email and create a mailbox for each user that will permanently store the user’s mail on the server. Ralph next uses a protocol analyzer to examine the network traffic resulting from the new server installation. Which new protocol should Ralph expect to see in his network traffic analysis? (Choose all that apply.)
SNMP
IMAP
POP3
RIP
IMAP and POP3
Which of the following protocols is used to exchange directory service information?
LDAP
SMB
SNMP
RDP
LDAP
Which of the following server applications uses two well-known port numbers, one for control traffic and one for data traffic?
FTP
HTTP
SNMP
NTP
FTP
Which of the following protocols does the ping program never use to carry its messages?
ICMP
Ethernet
IP
TCP
TCP
Which of the following protocols provides connection-oriented service with guaranteed delivery at the transport layer of the OSI model?
IP
HTTP
TCP
UDP
TCP
Which of the following protocols does IPsec use to digitally encrypt packets before transmitting them over the network?
ESP
MSCHAP
SSL
AH
ESP
Which of the following is the primary application layer protocol used by web browsers to communicate with web servers?
HTTP
HTML
SMTP
FTP
HTTP
Devices on a TCP/IP network typically use the Address Resolution Protocol (ARP) to locate specific destinations on the local network by resolving IP addresses into Media Access Control (MAC) addresses (also known as hardware addresses). At which layer of the Open Systems Interconnection (OSI) model do these MAC addresses operate?
Physical
Data link
Network
Transport
Data link
On which of the following types of devices should you consider disabling unused ports as a security precaution?
Switches
Wireless Access Points
Router
Hubs
Switches
Which of the following statements about the Enhanced Interior Gateway Routing Protocol (EIGRP) is not true?
EIGRP does not support classless IPv4 addresses.
EIGRP is a hybrid routing protocol.
EIGRP shares routes within an autonomous system.
EIGRP can only transmit incremental routing table updates.
EIGRP does not support classless IPv4 addresses.
Which of the following prevents packets on a TCP/IP internetwork from being transmitted endlessly from router to router?
Administrative distance
Time to Live (TTL)
Open Shortest Path First (OSPF)
Maximum Transmission Unit (MTU)
Time to Live (TTL)
The Simple Network Management Protocol (SNMP) works by processing information gathered from agents installed or embedded in network devices and displaying the information on a central console. Which of the following is the term used for the database in which SNMP agents store information about their properties?
Trap
SIEM
MIB
Syslog
MIB
Which of the following statements about static routing are true?
Static routes are a recommended solution for large internetworks with redundant paths to each destination network.
Static routes are manually configured routes that administrators must add, modify, or delete when a change in the network occurs.
Static routes adapt to changes in the network infrastructure automatically.
Static routes are automatically added to the routing table by routing protocols when a new network path becomes available.
Static routes are manually configured routes that administrators must add, modify, or delete when a change in the network occurs.
Which of the following routing protocols has both interior and exterior designations, based on whether it is used for routing within an autonomous system or on the Internet?
OSPF
EIGRP
BGP
RIP
BGP
SSH was created to be an improvement on the Telnet terminal emulation program. In which of the following ways is it an improvement?
SSH provides graphical terminal emulation.
SSH is faster than Telnet.
SSH encrypts passwords and data.
SSH is less expensive than Telnet
SSH encrypts passwords and data.
Which of the following types of routing protocols route datagrams between autonomous systems?
EGP
RIP
OSPF
IGP
EGP
Which of the following application layer protocols includes a program that enables a user to log on to a network device and execute commands on the remote system using a command-line interface?
Nslookup
Domain Name System (DNS)
Simple Network Management Protocol (SNMP)
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
Which of the following TCP/IP routing protocols measures the efficiency of routes by the number of hops between the source and the destination?
Border Gateway Protocol (BGP)
Open Shortest Path First (OSPF)
Intermediate System to Intermediate System (IS-IS)
Routing Internet Protocol (RIP)
Routing Internet Protocol (RIP)
Which port value is used by the File Transfer Protocol (FTP)?
21
53
23
69
21
What is the native file sharing protocol used on all Microsoft Windows operating systems?
File Transfer Protocol (FTP)
Hypertext Transfer Protocol (HTTP)
Server Message Block (SMB)
Network File System (NFS)
Server Message Block (SMB)