COMP TIA NETWORK + Flashcards

Q/A

1
Q

11.1

Which of the following protocols reside at the application layer of the Open Systems Interconnection (OSI) model? (Select all that apply.)

HTTP

SMTP

IP

TCP

A

HTTP, SMTP

Layer 7 (Application layer) works at the user end to interact with user applications. QoS (Quality of Service), file transfer, and email are the major popular services of the Application layer. This layer uses the following protocols: HTTP, SMTP, and FTP.

SMTP protocol resides at the Application layer (layer 7). This is the layer at which many TCP/IP services (high-level protocols) can run, which also includes FTP and HTTP.

Layer 3 (Network layer) performs real-time processing and transfers data from nodes to nodes. The Network layer assists the IP protocol.

The Transport layer–or Host-to-Host layer–establishes connections between the different applications, that the source and destination hosts are communicating with, using the TCP and UDP protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1.1

Client A is sending data to Server A. The packet has left the application layer and traversed the ISO model through to the data link layer. Which header will get encapsulated onto the packet at the data link layer?

Ethernet header

IP header

TCP header

UDP header

A

Ethernet header

Ethernet encapsulates the payload from higher layer protocols within a protocol data unit (PDU) called a frame. The ethernet header encapsulates a packet at the data link layer.

At the network layer, the Internet Protocol (IP) header wraps the TCP segment. The Internet Protocol (IP) stands at the heart of this protocol suite, providing logical addressing and packet forwarding between different networks.

The transport layer encapsulates the packet in the Transport Control Protocol (TCP) header.

The transport layer encapsulates the packet in the User Datagram Protocol (UDP) header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1.1

A network engineer is adding a bridge into the network design. Where in the Open Systems Interconnection (OSI) model will this bridge operate? (Select all that apply.)

Data Link layer of the OSI model

Layer 2 of the OSI model

Layer 5 of the OSI model

Transport layer of the OSI model

A

Data Link layer of the OSI model, Layer 2 of the OSI model

The bridge creates a link between the two physical segments so that hosts in Segment A can send and receive messages to hosts in Segment B. Bridges perform on Layer 2 (Data Link layer).

Connectivity devices found in the Layer 2 include a bridge. A bridge joins two network segments while minimizing the performance reduction of having more nodes on the same network.

There are no devices or components that operate at Layer 5. Layer 5 assumes responsibility for managing network connections between applications.

At the Transport layer, on the sending host, data from the upper layers is packaged as segments and tagged with the application’s port number, but there are no devices that operate at this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

1.1

Which Open Systems Interconnection (OSI) layer assumes responsibility for managing network connections between applications?

Session

Physical

Network

Data Link

A

Session

Most application protocols require the exchange of multiple messages between the client and server. This exchange of such a sequence of messages is called a session, thus, the Session layer. Sessions can work in three modes: simplex, half-duplex, or duplex.

Some form of transmission or physical media creates a link between network nodes. The Physical layer of the OSI model (layer 1) is responsible for the transmission and receipt of bits from one node to another node.

The Network layer (layer 3) transfers information between networks. It is the Session layer that manages connections between applications.

The Data Link layer (layer 2) transfers data between nodes on the same logical segment. Whereas, the Session layer manages connections between applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

1.1

A network administrator is reviewing some packets flagged by the Intrusion Detection System (IDS). The administrator notices that the packets are ping packets, but the size of the packets is much larger than expected. What is the MOST likely cause of the oversized packets?

Modified payload

Corrupted MTU

TCP flags

False positive

A

Modified payload

Payload is the data the packet is carrying. A modified payload will increase the size of the packet, exceeding the normal packet size.

The upper limit of the payload is also known as the maximum transmission unit (MTU). The official IEEE 802.3 standard defines a 2-byte field to specify the size of the data field or payload. The payload is between 46 and 1500 bytes.

Handshake transactions manage TCP connections, which make use of several TCP flags. The flags are SYN, ACK, FIN, RST, PSH, and URG. They do not change the packet’s size.

A false positive is a report of a fault when no fault exists. This can mean a signaled alert when no real threat or error causing the alert exists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1.1

A network administrator is looking at an ARP table on a switch for connected devices. Which Open Systems Interconnection (OSI) layer are they looking at?

Data Link

Physical

Network

Session

A

Data Link

The Data Link layer (layer 2) transfers data between nodes on the same logical segment. This is where ARP tables are located.

Some form of transmission or physical media creates a link between network nodes. The Physical layer of the OSI model (layer 1) is responsible for the transmission and receipt of bits from one node to another node.

The Network layer (layer 3) transfers information between networks. It is the Session layer that manages connections between applications.

Most application protocols require the exchange of multiple messages between the client and server. This exchange of such a sequence of messages is called a session, thus, the Session layer. Sessions can work in three modes: simplex, half-duplex, or duplex.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1.1

An engineer upgrades an organization’s network. Part of the upgrade focuses on the consolidation of devices. In particular, planning to replace routers and switches is on the agenda. When evaluating how network appliances operate, which device is a suitable replacement that performs the required functions?

Multilayer switch

IDS/IPS

Firewall

Repeater

A

Multilayer switch

A multilayer switch routes based on the contents of packets at layers 3 and up and more effectively in a VLAN environment. A multilayer switch is an appropriate solution for this scenario.

An IDS (intrusion detection system) detects malicious activity. An IPS (intrusion prevention system) is an inline security device, that monitors suspicious network and/or system traffic and reacts in real-time to block it.

Firewalls are principally used to implement security zones, such as an intranet, screened subnet topology, and the Internet.

A repeater is a layer 1 device that takes a signal and repeats it to the devices connected to it. Repeaters maintain signal integrity and amplitude.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1.1

Host A is communicating with Host B. Host A uses the American Standard Code for Information Interchange (ASCII) and Host B uses Unicode. The clients agree to translate the communication to ASCII. What layer of the Open System Interconnection (OSI) model does the agreement and translation occur?

Presentation

Application

Session

Transport

A

Presentation

The Presentation layer (Layer 6) transforms data between the format required for the network and the format required for the application. For example, the Presentation layer is used for character set conversion.

The Application layer (Layer 7) receives the translated data. This protocol does not encapsulate any other protocols or provide services to any protocol.

The Session layer (Layer 5) represents the dialog control functions that administer the process of establishing the dialog, managing data transfer, and then ending the session.

The Transport layer (Layer 4) identifies each type of network application by assigning it a port number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1.1

A server contains two ethernet cards. Two departments on separate networks need access to the server and resources on either side. A systems administrator configures a bridge with the interfaces. The administrator utilizes a bridge configuration to achieve which of the following?

Connecting different networks as if they were one

Connecting different networks for communication purposes but keeping them separate

Connecting devices within a single network

Protecting differing networks from one another

A

Connecting different networks as if they were one

A bridge is a hardware appliance or software application that connects different networks and treats them as if they were one network.

A router is a hardware appliance or application that connects different networks for communication purposes but keeps them separate. A router is a layer 3 device and communication between networks is done with routing tables.

To connect systems within a single network subnet, a hub or a switch is used. A hub is simply a physical hardware device, whereas a switch is a layer 2 device.

A firewall is a hardware device or application that is used to protect a network from another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1.1

An organization has asked a network administrator to research and submit a purchase order for new network access points. The network administrator is attempting to choose between using wired and wireless access points. Which layer of the OSI model is the administrator making a decision?

Physical layer

Network layer

Data link layer

Session layer

A

Physical layer

The physical layer of the OSI model is responsible for the transmission and receipt of the signals that represent bits of data from one node to another node.

The network layer is responsible for moving data around a network of networks, known as an internetwork or the Internet.

The data link layer is responsible for transferring data between nodes on the same logical segment.

The session layer (layer 5) represents functions that administer the process of establishing a dialog, managing data transfer, and then ending (or tearing down) the session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

1.1

A junior-level systems administrator troubleshoots network connectivity. Results of the troubleshooting reveal a device that is new to the administrator. This device connects all hosts and routes network traffic. After evaluating the possibilities, and based on the device’s characteristics, what does the network utilize for connectivity and traffic flow?

Multilayer switch

IDS/IPS

Firewall

Repeater

A

Multilayer switch

A multilayer switch routes based on the contents of packets at layers 3 and up and more effectively in a VLAN environment. A multilayer switch is an appropriate solution for this scenario.

An IDS (intrusion detection system) detects malicious activity. An IPS (intrusion prevention system) is an inline security device, monitoring suspicious network and/or system traffic and reacts in real time to block it.

Firewalls are principally used to implement security zones, such as intranet, screened subnet topology, and Internet.

A repeater is a layer 1 device that takes a signal and repeats it to the devices connected to it. Repeaters maintain signal integrity and amplitude.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1.1

An engineer troubleshoots a network connectivity issue that the server team reported. The engineer notices that the trunk port is down between two routers. After checking the fiber link on the router, the engineer moves the cable and notices that the link light comes on. The issue is MOST likely a part of what layer of the OSI model?

Physical layer

Network layer

Data link layer

Session layer

A

Physical layer

The physical layer of the OSI model is responsible for the transmission and receipt of the signals that represent bits of data from one node to another node.

The network layer is responsible for moving data around a network of networks, known as an internetwork or the Internet.

The data link layer is responsible for transferring data between nodes on the same logical segment.

The session layer (layer 5) represents functions that administer the process of establishing a dialog, managing data transfer, and then ending (or tearing down) the session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1.1

A technician surveys an office space to document the network. Upon discovering a network closet, the technician finds a network bridge. After examing the possibilities, what description satisfies the technician’s notes regarding the bridge?

Connecting different networks as if they were one

Connecting different networks for communication purposes, but keeping them separate

Connecting devices within a single network

Protecting differing networks from one another

A

Connecting different networks as if they were one

A bridge is a hardware appliance or software application that connects different networks and treats them as if they were one network.

A router is a hardware appliance or application that connects different networks for communication purposes but keeps them separate. A router is a layer 3 device and communication between networks is done with routing tables.

To connect systems within a single network subnet, a hub or a switch is used. A hub is simply a physical hardware device, whereas a switch is a layer 2 device.

A firewall is a hardware device or application that is used to protect a network from another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

1.2

A network installer is upgrading the software on a new router. The router has the ability to download software directly from an already upgraded, connected router. What kind of connection is MOST likely between these two routers to share configurations and software?

SAN

Client-Server

Peer-to-peer

PAN

A

Peer-to-peer

A peer-to-peer network is one where each end system acts as both client and server. A peer-to-peer connection is a single connection between two devices.

A client-server network is one where some nodes, such as PCs and laptops, act as clients and the servers are more powerful computers. Application services and resources are centrally provisioned, managed, and secured.

A personal area network (PAN) links devices, such as laptops and smartphones, and provides connectivity with peripheral devices, plus wearable technology, such as fitness trackers and smart watches.

A storage area network (SAN) provisions access to storage devices at the block level. A SAN is isolated from the main network and only accessed by servers, not by client PCs and laptops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

1.2

A server technician is shopping for new storage for data on the business network. The storage requirement has risen over the last year, and the servers currently have limited space. What is an option for the technician to purchase to increase the available storage on the local network?

VLAN

SAN

Client-server

SDWAN

A

SAN

A storage area network (SAN) provisions access to storage devices at the block level. A SAN is isolated from the main network. It is only accessed by servers, not by client PCs and laptops.

Software-defined wide area network (SDWAN) is an overlay network that provisions a corporate WAN across multiple locations and facilitates secure access to the cloud directly from a remote location.

A client-server network is one where some nodes, such as PCs and laptops, act as clients, and the servers are more powerful computers. Application services and resources are centrally provisioned, managed, and secured.

At layer 2, virtual local area networks (VLANs) can address this issue. Each interface on a managed switch can be assigned a VLAN ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1.2

A wireless access point is available on the floor for wireless users in the area. User 1 wants to send a file to user 2 using their laptop’s wireless adapters. Which of the following is the most secure way of sending files to one another using their current wireless adapters?

Using a bus network connection

Using an ad hoc connection

Using a wireless mesh network

Using an infrastructure connection

A

Using an ad hoc connection

In an ad hoc topology, the wireless adapter allows connections to and from other devices. This makes it possible for two laptops to connect directly with each other wirelessly. This is also referred to as an Independent Basic Service Set (IBSS).

Unlike an ad hoc network, nodes in a wireless mesh network (WMN), called mesh stations, are capable of discovering one another and peering, forming a Mesh Basic Service Set (MBSS).

Wireless access points are deployed in an infrastructure topology and provide a bridge between wireless and wired networks. In this case, the users want to use wireless only.

A bus network is a physical network topology where all nodes are attached directly to the main cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

1.2

A tech deploys a network using an E-LAN mesh approach. Compare and evaluate the choices to determine which network type the tech deploys.

WAN

MAN

PAN

CAN

A

MAN

A metropolitan area network (MAN) is a network that covers an area equivalent to a municipality. A MAN uses a service category such as an E-line, which establishes a point-to-point link or an E-LAN, which establishes a mesh topology.

A personal area network (PAN) is a network that connects two to three devices with cables and is most often seen in small or home offices.

A campus area network (CAN) is network that spreads over several buildings within the same overall area. As the name implies, a university would use a campus area network.

A wide area network (WAN) is a network that spans multiple geographic locations such as cities, states, provinces, and countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

1.2

The main office is planning for more jobs to become remote in nature. The network team is briefing the chief information security officer (CISO) on the use of VPN software and the protocols used for point-to-muiltipoint connections. Which protocols should the team brief to the CISO? (Select all that apply.)

mGRE

NFV

MPLS

vNIC

A

mGRE, MPLS

Multipoint Generic Routing Encapsulation (mGRE) is a version of the Generic Routing Encapsulation (GRE) protocol that supports point-to-multipoint links, such as the hub and spoke dynamic multipoint Virtual Private Network (VPN).

Multiprotocol label switching (MPLS) can operate as an overlay network to configure point-to-point or point-to-multipoint links between nodes regardless of the underlying physical and data link topologies.

Network function virtualization (NFV) provisions virtual network appliances, such as switches, routers, and firewalls, via VMs and containers.

Within the virtual machine (VM), the virtual NIC (vNIC) will look exactly like an ordinary network adapter and will be configurable in the same way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

1.2

A tech configures three computers in an office so users can share files. Which type of network does the tech create?

MAN

CAN

WAN

LAN

A

LAN

A local area network (LAN) covers a wide range of different sizes of networks but is mostly confined to a single geographical location. A small network in an office that is set up for simple fire sharing and printing is considered a LAN.

A campus area network (CAN) is a network that spreads over several buildings within the same overall area. As the name implies, a university would use a campus area network.

A wide area network (WAN) is a network that spans multiple geographic locations such as cities, states, provinces, and countries.

A metropolitan area network (MAN) is a network that covers an area equivalent to a city or a municipality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

1.2

A server administrator is adding a new Network Interface Card (NIC) to a virtual machine. What should the administrator modify to add the new NIC to the virtual machine?

Hypervisor

WAN

Demarcation point

SD-WAN

A

Hypervisor

In a virtualization host, the hypervisor—or virtual machine monitor (VMM)—manages the virtual environment and facilitates interaction with the computer hardware and network.

A wide area network (WAN) is a network of networks connected by long-distance links. A typical enterprise WAN would connect multiple sites, possibly in different countries.

The point at which the telco’s cabling enters the customer premises is known as the demarcation point.

Software-defined wide area network (SD-WAN) is a type of overlay network that provisions a corporate WAN across multiple locations and can facilitate secure access to the cloud directly from a remote location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

1.2

Which network topology describes the placement of nodes and how they connect to each other using network media?

Logical

Physical

Star

Ring

A

Physical

A physical network topology describes the placement of nodes and how they are connected by the network media. For example, in one network nodes might be directly connected via a single cable.

A logical network topology describes the flow of data through the network regardless of its physical layout.

A star network topology has each endpoint connected to a central forwarding node, such as a hub, switch, or router. The central node mediates communications between the endpoints.

A ring network topology has each node wired to its neighbor in a closed loop. A node receives a transmission from its upstream neighbor and passes it to its downstream neighbor until the transmission reaches its intended destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

1.2

An organization has asked a network engineer to suggest a type of connection the new office space will require. The chief executive officer (CEO) tells the engineer the organization wants a dedicated T1 line not slowed down by other businesses or Internet Service Provider (ISP) customers. What type of connection has the CEO described to the engineer?

Satellite

Leased line

Demarcation point

Digital subscriber line (DSL)

A

Leased line

For leased line data services, the foundation level of the T-carrier is the DS1 or T1 digital signal circuit. This service comprises 24 channels multiplexed into a single 1.544 Mbps full duplex digital connection used for voice and data. The engineer can multiplex the T1 lines themselves to provide even more bandwidth.

The point at which the telco’s cabling enters the customer premises is known as the demarcation point.

Digital subscriber line (DSL) is a technology for transferring data over voice-grade telephone lines, often referred to as the local loop.

Satellite systems provide very large areas of coverage, as the microwave dishes are aligned to orbital satellites that can either relay signals between sites directly or via another satellite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

1.2

Which of the following topologies is a network of two or more nodes that shares access to the network, but only one node can be active at any one time?

Mesh

Star

Bus

Ring

A

Bus

In a bus topology with more than two nodes, they all share access and bandwidth of the media. Only one node can be active at any one time. So, the nodes must contend to put signals on the media.

In a star topology, each endpoint node is connected to a central forwarding node, such as a hub, switch, or router. The central node mediates communications between the endpoints.

In a ring topology, each node is wired to its neighbor in a closed loop. A node receives a transmission from its upstream neighbor and passes it to its downstream neighbor until transmission is complete.

In a mesh topology, each device has a point-to-point link with every other device on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

1.2

IT engineers evaluate a network for upgrade purposes. IT engineers recommend replacing a hub with a switch. Of the choices given, which represents the current physical topology and the current logical topology?

Star, star

Mesh, star

Star, ring

Star, bus

A

Star, bus

A physical star network can be used to implement a logical bus topology. When a device, such as a hub, is used at the center of the star, logically, the topology works like a single cable bus.

When a device, such as a switch, is used at the center of the star, the bus element is reduced to the link between each node and its switch port. Taking the network (as a whole) both the physical and logical topology, is a star.

In a physical ring topology, each node is wired to its neighbor in a closed loop.

Mesh network topologies are commonly used in WANs. In theory, a mesh network requires that each device has a point-to-point link with every other device on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

1.2

A college is upgrading their high-speed network infrastructure to support direct-connect Internet in all student buildings and dormitories. The network will connect to high-performing school servers that will provide computer lab environments for classes. What type of network is the school continuing to maintain?

CAN

WLAN

WAN

PAN

A

CAN

The term campus area network (CAN) is sometimes used for a LAN that spans multiple nearby buildings. This high-speed network can connect directly with all students in all the buildings and dormitories.

A wireless local area network (WLAN) is a network based on Wi-Fi. Open (public) WLANs are often referred to as hotspots.

A wide area network (WAN) is a network of networks, connected by long-distance links. A typical enterprise WAN would connect multiple sites, possibly in different countries.

A personal area network (PAN) is a close-range network link between a variety of devices. For example, two smart phones connected to each other via Bluetooth are creating a PAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

1.2

An engineer for a large firm documents the internal computer network. A diagram the engineer creates shows a top-down view of the Ethernet infrastructure in a hub and spoke layout. While considering the physical and logical topologies of the network, determine which choices qualify. (Select all that apply.)

Star

Bus

Ring

LAN

A

Star, Bus

A star topology is a physical network design in which each node is connected to a central point. A star network is also referred to as a hub and spoke network.

A logical bus topology is one in which nodes receive the data transmitted all at the same time, regardless of the physical wiring layout of the network. A star network operates as a logical bus network when a hub is used rather than a switch.

In a physical ring topology, each node is wired in a closed loop. A node receives a transmission from its upstream neighbor and passes it to its downstream neighbor.

A local area network (LAN) covers a wide range of different sizes of networks, but is mostly confined to a single geographical location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

1.2

An IT engineer troubleshoots a small network. Previously, IT wired all nodes to a central closet. In the closet, the engineer discovers a hub. Of the choices given, which represents the current physical topology and the current logical topology?

Star, bus

Star, star

Star, ring

Mesh, star

A

Star, bus

A physical star network can be used to implement a logical bus topology. When a hub is used at the center of the star, logically, the topology works like a single cable bus.

When a switch is used at the center of network connectivity, each port acts independently. Therefore, both the physical and logical topology is a star.

In a physical ring topology, each node is wired to its neighbor in a closed loop.

Mesh network topologies are commonly used in WANs. In theory, a mesh network requires that each device has a point-to-point link with every other device on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

1.2

A tech configures a network to use an E-lines service. Compare and evaluate the choices to determine which network type the tech configures.

MAN

PAN

CAN

WAN

A

MAN

A metropolitan area network (MAN) is a network that covers an area equivalent to a municipality. A MAN uses a service category such as an E-line, which establishes a point-to-point link or an E-LAN, which establishes a mesh topology.

A personal area network (PAN) is a network that connects two to three devices with cables and is most often seen in small or home offices.

A campus area network (CAN) is a network that spreads over several buildings within the same overall area. As the name implies, a university would use a campus area network.

A wide area network (WAN) is a network that spans multiple geographic locations such as cities, states, provinces, and countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

1.2

An engineer begins the installation of a network for a new business. Ethernet cables run from desktop locations to a centralized patch panel in a data closet where a hub is placed until a new switch arrives. Evaluate the engineer’s configuration, and conclude which types of physical and logical topologies the engineer implements. (Select all that apply.)

Star

Bus

Ring

LAN

A

Star, Bus

A star topology is a physical network design in which each node is connected to a central point. A star network is also referred to as a hub and spoke network.

A logical bus topology is one in which nodes receive the data transmitted all at the same time, regardless of the physical wiring layout of the network. A star network operates as a logical bus network when a hub is used rather than a switch.

In a physical ring topology, each node is wired in a closed loop. A node receives a transmission from its upstream neighbor and passes it to its downstream neighbor.

A local area network (LAN) covers a wide range of different sizes of networks, but is mostly confined to a single geographical location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

1.2

A network administrator is creating a plan for connecting multiple branch locations to the main database located in the headquarters. Which protocols can the administrator use to accomplish this link? (Select all that apply.)

mGRE

MPLS

NFV

vNIC

A

mGRE, MPLS

Multipoint Generic Routing Encapsulation (mGRE) is a version of the Generic Routing Encapsulation (GRE) protocol that supports point-to-multipoint links, such as the hub and spoke dynamic multipoint VPN.

Multiprotocol label switching (MPLS) can operate as an overlay network to configure point-to-point or point-to-multipoint links between nodes regardless of the underlying physical and data link topologies.

Network function virtualization (NFV) provisions virtual network appliances, such as switches, routers, and firewalls, via VMs and containers.

Within the virtual machine (VM), the virtual NIC (vNIC) will look exactly like an ordinary network adapter and will be configurable in the same way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

1.3

An organization has asked a junior network technician to retrieve some swappable ports that host a single LC connection per port. Since there are numerous inserts for network devices, which should the technician retrieve?

F-type connector

QSFP

RJ-45

SFP

A

SFP

Also designed for Gigabit Ethernet, the small form-factor pluggable (SFP) uses local connectors (LCs). Gigabit Interface Converter (GBIC) was very bulky and largely replaced by SFP, also known as mini-GBIC.

Quad small form-factor pluggable (QSFP) is a transceiver form factor that supports 4 x 1 Gbps links, typically aggregated to a single 4 Gbps channel.

RG-6 is an 18 AWG cable with 75-ohm impedance typically used as a drop cable for Cable Access TV (CATV) and broadband cable modems, and usually terminated using F-type connectors secured by screwing into place.

Technicians use RJ-45 connectors with 4-pair (8-wire) cables. The connectors are also known as 8P8C (8-position/8-contact).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

1.3

A network installer is building a long-distance link. The nodes are approximately 5 km apart. What type of fiber link should the installer build for this link?

1000BASE-LX

100BASE-FX

10GBASE-SR

100BASE-SX

A

1000BASE-LX

The 1000BASE-LX is a Gigabit Ethernet standard and supports 1 Gbps and a distance of 5 km using single mode fiber.

Installers often use the 100BASE-FX Fast Ethernet firer standard for wiring backbones. It uses multimode fiber for speeds of up to 100Mbps for a distance of up to 2 km.

The 100BASE-SX is a Fast Ethernet fiber standard that supports lengths up to 300 meters and speeds up to 100Mbps.

The 10GBASE-SR is a 10 Gigabit Ethernet fiber standard in backbone configurations, and it supports up to 300-meter link lengths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

1.3

Corporate has requested the installation of a new fiber link that supports 160 channels. What type of multiplexing is required to meet corporate’s request?

WDM

CWDM

DWDM

QSFP+

A

DWDM

Dense Wavelength Division Multiplexing (DWDM) provisions greater numbers of channels (20, 40, 80, or 160). This means that there is much less spacing between each channel and requires more precise and expensive lasers.

Coarse Wavelength Division Multiplexing (CWDM) supports up to 16 wavelengths and is typically used to deploy four or eight bidirectional channels over a single fiber strand.

Bidirectional wavelength division multiplexing (WDM) links are documented in Ethernet standards (1000BASE-BX and 10GBASE-BX).

Enhanced quad small form-factor pluggable (QSFP+) supports 40 GbE by provisioning 4 x 10 Gbps links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

1.3

Network equipment in a rack system has limited in-front facing space with the door closed. A technician uses small form-factor connectors to connect a fiber cable. After evaluating the choices, predict the correct fiber connectors for the system.

SC

LC

UPC

APC

A

LC

A local connector (LC) is a small form factor version of the SC push-pull fiber optic connector. It is available in simplex and duplex versions.

A subscriber connector (SC) is a push/pull connector used with fiber optic cabling.

Angled physical contact (APC) faces are angled for a tighter connection than other fiber connectors. These connectors are usually deployed when the fiber is being used to carry analog signaling, as in cable access TV (CATV) networks.

The ultra physical contact (UPC) fiber connector defines that the cable and connector are polished to the highest standard (a higher standard than with PC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

1.3

An engineer is building a backbone network in a new facility. The cabling going from one side of the building to the other is about 500 feet and will support a 5Gbps link between two routers. Which type of cabling should the engineer use?

1000BASE-SX

10GBASE-SR

Coaxial/RG-6

10GBASE-LR

A

10GBASE-SR

A 10GBASE-SR is a fiber Ethernet standard best suited to implementing backbone cabling that does not exceed 200 m (656 feet) and can achieve at least 4 Gbps throughput.

A 10GBASE-LR is rated for 10 km operation over single mode fiber. Ethernet over Fiber uses the IEEE 802.3 10GBASE-LR and 10GBASE-ER specifications.

A 1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation over multimode fibers. The standard specifies a distance capability between 220 meters and 550 meters.

Coaxial/RG-6 is an 18 AWG cable with 75-ohm impedance typically used as drop cable for Cable Access TV (CATV) and broadband cable modems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

1.3

A technician finishes running fiber optic cable across a large building to expand the internal network. The fiber connects to equipment in a rack with extremely limited space for a connector. Considering the situation and the types of available fiber connectors, which one will accomplish connectivity?

LC

APC

SC

UPC

A

LC

A local connector (LC) is a small form factor version of the SC push-pull fiber optic connector. It is available in simplex and duplex versions. SFP+ use the LC form factor but run at speeds of 10Gb.

A subscriber connector (SC) is a push/pull connector used with fiber optic cabling.

Angled physical contact (APC) faces are angled for a tighter connection than other fiber connectors. These connectors are usually deployed when the fiber is being used to carry analog signaling, as in cable access TV (CATV) networks.

The ultra physical contact (UPC) fiber connector defines that the cable and connector are polished to the highest standard (a higher standard than with PC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

1.3

A technician is building a new network link between a switch and a router. The switch only has ethernet ports, while the router only has fiber ports. What could the technician utilize to connect these two devices?

Patch panel/patch bay

Transceiver/media converter

Fiber distribution panel

SFP+

A

Transceiver/media converter

Enterprise switches and routers are available with modular, hot-swappable transceivers/media converters for different types of fiber optic patch cord connections. These allow connections between ethernet and fiber networks.

A patch panel or patch bay is a type of distribution block with insulation-displacement connections (IDCs) on one side and pre-terminated RJ-45 modular ports on the other.

Permanent cables run through conduit to wall ports at the client access end and a fiber distribution panel at the switch end. Fiber patch cables complete the link from the wall port to the NIC and from the patch panel to the switch port.

Enhanced SFP (SFP+) is an updated specification to support 10 GbE but still uses the LC form factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

1.3

An IT engineer considers optical mode OM1 or OM2 cables for a project. The project requires cables that are rated for applications up to 1 Gbps and use LED transmitters. Of the following choices, which type of cable does the engineer select to use?

Duplex

Bidirectional

Single-mode

Multimode

A

Multimode

Multimode fiber is inexpensive to deploy compared to single-mode fiber. As such, it does not support long distances as single-mode. Multimode uses uses light emitting diode (LED) technology.

Single-mode cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics.

Duplex is a communication configuration. Full duplex refers to a communication configuration/type such as network links that allow simultaneously sending and receiving. Most network links are full-duplex.

Bidirectional refers to two-way communication. Bidirectional does not imply the ability for full-duplex and may only be half-duplex. This means send and receive is taken in turns.

previous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

1.3

A network technician is installing a new router in a new wing of the corporate building. The technician needs to connect the new router to the core router. The router is about 300 feet away from the core router and requires a 100Mbps connection. What type of connection should the technician build for the router?

10BASE-T

100BASE-TX

Coaxial/RG-6

10GBASE-T

A

100BASE-TX

A 100BASE-TX refers to Fast Ethernet working over Cat 5 (or better) twisted pair copper cable for speeds up to 100Mbps, and a maximum supported link length of 100 meters (328 feet).

A 10BASE-T denotes an early implementation that works at 10 Mbps (10), uses a baseband signal (BASE), and runs over twisted pair copper cabling (-T).

A 10GBASE-T refers to Fast Ethernet working over Cat 6 or better shielded or screened cable for speeds up to 10 gigabits.

Coaxial/RG-6 is an 18 AWG cable with 75 ohm impedance typically used as drop cable for Cable Access TV (CATV) and broadband cable modems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

1.3

An engineer is installing a new connection between two database stacks. The engineer is using copper cable and needs a connection speed of 40GbE with a distance of about 12 feet. Which medium should the engineer utilize for this link?

10GBASE-LR

Coaxial

Twinaxial

10BASE-T

A

Twinaxial

Twinax is for data center 10 GbE (unofficially referred to as 10GBASE-CR) and 40 GbE (40GBASE-CR4) interconnections of up to about 5 meters for passive cable types and 10 meters for active cable types.

Coaxial/RG-6 is an 18 AWG cable with 75-ohm impedance typically used as drop cable for Cable Access TV (CATV) and broadband cable modems.

A 10GBASE-LR is rated for 10 km operation over single mode fiber.

Ethernet over Fiber uses the IEEE 802.3 10GBASE-LR and 10GBASE-ER specifications.

A 10BASE-T denotes an early implementation that works at 10 Mbps (10), uses a baseband signal (BASE), and runs over twisted pair copper cabling (-T).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

1.3

An engineer creates several Ethernet cables and chooses to terminate the cable ends with the orange pair using pins one and two. Considering the standard choices, which of the following does the engineer choose to implement?

TIA/EIA 568b

TIA/EIA 568a

RJ-11

RJ-45

A

TIA/EIA 568b

There are two defined methods for terminating Ethernet connectors: T568A and T568B. While T568A is mandated, T568B is the more widely deployed of the two.

ANSI/TIA/EIA 568 standard defines two methods for terminating Ethernet connectors: T568A and T568B. T568A is mandated by the US government and by the residential cabling standard TIA 570.

RJ-45 connectors are used with 4-pair (8-wire) cables. The connectors are also referred to as 8P8C (8-position/8-contact).

RJ-11 connectors are used with 2 or 3-pair UTP (unshielded twisted pair). There is room for six wires, but the four center wires are most commonly used. Pins 3 and 4, carry the dial tone and voice circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

1.3

A network installer is installing new phone lines into the network room. The installer has many blades for the punchdown panels in the building and needs a blade that is customizable on one end. Which blade should the installer use that has a customizable blade on one end of the punch tool?

Bix

Krone

110

66

A

Bix

BIX panels are rare but still used. The blades for these panels are adjustable on one end of the punch tool. They are similar to a 110 punch tool but are adjustable.

Krone format panels are rare and proprietary to that type of punch tool. The tool has a scissor-like function on the front of the punch tool instead of a set blade.

Installers mostly use 110 format punch blocks for LAN technology and RJ-45 connections. They have a set blade on one end of the punch tool.

Installers mainly use 66 format punch blocks in telecom installations and phone connectivity panels. They have a blade on the side of the punch tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

1.3

Corporate has requested the installation of a new fiber link that supports 160 channels. What type of multiplexing is required to meet corporate’s request?

DWDM

CWDM

QSFP+

WDM

A

DWDM

Dense Wavelength Division Multiplexing (DWDM) provisions greater numbers of channels (20, 40, 80, or 160). This means that there is much less spacing between each channel and requires more precise and expensive lasers.

Coarse Wavelength Division Multiplexing (CWDM) supports up to 16 wavelengths and is typically used to deploy four or eight bidirectional channels over a single fiber strand.

Bidirectional wavelength division multiplexing (WDM) links are documented in Ethernet standards (1000BASE-BX and 10GBASE-BX).

Enhanced quad small form-factor pluggable (QSFP+) supports 40 GbE by provisioning 4 x 10 Gbps links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

1.3

An engineer has installed a new router but is not connected to the core network yet. What type of connector should the engineer install to get the requested throughput of 30Gbps or more?

Enhanced quad small form-factor pluggable (QSFP+)

Enhanced form-factor pluggable (SFP+)

Coarse wavelength division multiplexing (CWDM)

Dense wavelength division multiplexing (DWDM)

A

Enhanced quad small form-factor pluggable (QSFP+)

Enhanced quad small form-factor pluggable (QSFP+) supports 40 GbE by provisioning 4 x 10 Gbps links.

Enhanced form-factor pluggable (SFP+) is an updated specification to support 10 GbE but still uses the LC form factor.

Dense Wavelength Division Multiplexing (DWDM) provisions greater numbers of channels (20, 40, 80, or 160). This means that there is much less spacing between each channel and requires more precise and expensive lasers.

Coarse Wavelength Division Multiplexing (CWDM) supports up to 16 wavelengths and is typically used to deploy four or eight bidirectional channels over a single fiber strand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

1.3

An engineer has a task to survey an old building and determine the current network infrastructure. Building owners state that some cabling is from a recent install. The engineer achieves a speed of 10 Gbps while testing the cable up to 100 meters and also determines the cable to be well shielded. Based on the engineer’s findings, the cabling meets what specification?

Cat 5e

Cat 6

Cat 3

Cat 7

A

Cat 7

Cat 7 cable is fully screened and shielded (S/FTP) and rated for 10GbE applications up to 100 m (328 feet). The cable supports transmission frequencies up to 600 MHz at 10 Gbps.

Cat 5e is tested at 100 MHz (like Cat 5 was) but to higher overall specifications for attenuation and crosstalk, meaning that the cable is rated to handle Gigabit Ethernet (1 Gbps) throughput.

Cat 6 can support 10 Gbps speeds only over shorter distances—nominally 55 meters, but often less if cables are closely bundled together.

Cat 3 is an old specification. It is not used for modern implementations but may be found in older installations. Cat 3 supports speeds up to 10 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

1.3

A network engineer is troubleshooting an ethernet connection between two buildings. The engineer noticed that the network devices got upgraded, but the wiring did not. The engineer needs a connection that can handle 10Gbps at 500 MHz for a distance of 300 feet using RJ-45 connectors. What type of ethernet should the engineer replace the Cat 5 with to meet the connection standard?

Cat 6

Cat 6a

Cat 7

Cat 8

A

Cat 6a

Cat 6A is an improved specification cable that can support 10 Gbps over 100 m. RJ-45 connectors terminate the Cat 6A cable.

Cat 6 can support 10 Gbps but over shorter distances—nominally 55 m, but often less if cables are closely bundled together.

Cat 7 cable is always of a screened/shielded type and rated for 10GbE applications up to 100 m (328 feet). GG45 or TERA connectors must terminate Cat 7 cable rather than standard RJ-45 connectors.

Intended for use in data centers, Cat 8 is only for short patch cable runs that make top-of-rack connections between adjacent appliances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

1.3

An engineer has installed a new router but is not connected to the core network yet. What type of connector should the engineer install to get the requested throughput of 30Gbps or more?

Enhanced quad small form-factor pluggable (QSFP+)

Coarse wavelength division multiplexing (CWDM)

Dense wavelength division multiplexing (DWDM)

Enhanced form-factor pluggable (SFP+)

A

Enhanced quad small form-factor pluggable (QSFP+)

Enhanced quad small form-factor pluggable (QSFP+) supports 40 GbE by provisioning 4 x 10 Gbps links.

Enhanced form-factor pluggable (SFP+) is an updated specification to support 10 GbE but still uses the LC form factor.

Dense Wavelength Division Multiplexing (DWDM) provisions greater numbers of channels (20, 40, 80, or 160). This means that there is much less spacing between each channel and requires more precise and expensive lasers.

Coarse Wavelength Division Multiplexing (CWDM) supports up to 16 wavelengths and is typically used to deploy four or eight bidirectional channels over a single fiber strand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

1.3

A network technician is installing a new ethernet receptacle using a punch tool. Which blade type can the technician utilize to terminate the wires onto the punch block?

110

66

RJ-45

RJ-11

A

110

Technicians mostly use 110 format punch blocks for LAN technology and RJ-45 connections. They have a set blade on one end of the punch tool.

Technicians mainly use 66 format punch blocks in telecom installations and phone connectivity panels. They have a blade on the side of the punch tool.

Technicians use RJ-45 connectors with 4-pair (8-wire) cables. The connectors are also known as 8P8C (8-position/8-contact).

Technicians use RJ-11 connectors with 2 or 3-pair UTP (unshielded twisted pair). There is room for six wires, but technicians most commonly use the four center wires. Pins 3 and 4 carry the dial tone and voice circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

1.3

A server administrator has asked a junior network engineer to build a link between the server and the new SAN that the administrator just installed. The speed requirements for the link are more than 20Gbps, and the distance is about 20 feet. What medium should the network engineer use to build the required link?

40GBASE-T

10GBASE-T

1000BASE-T

10BASE-T

A

40GBASE-T

A 40GBASE-T refers to Gigabit Ethernet working over Cat 8 shielded cable with speeds up to 40 Gbps and a distance of 30 meters.

A 10GBASE-T refers to Fast Ethernet working over Cat 6 or better shielded or screened cable for speeds up to 10 gigabits.

Gigabit Ethernet builds on the standards defined for Ethernet and Fast Ethernet to implement rates of 1000 Mbps (1 Gbps). Over copper wire, Gigabit Ethernet is specified as 1000BASE-T, working over Cat 5e or better.

A 10BASE-T denotes an early implementation that works at 10 Mbps (10), uses a baseband signal (BASE), and runs over twisted pair copper cabling (-T).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

1.4

A company has 725 hosts on the network that utilize public Internet Protocol (IP) addresses. The company has three contiguous class C addresses for the hosts. Instead of maintaining three routing tables, the company has one single entry. What feature allows the company to consolidate the routing tables?

Network Address Translation (NAT)

Reserved Addresses

Variable Length Subnet Masks (VLSMs)

Classless Inter-Domain Routing (CIDR)

A

Classless Inter-Domain Routing (CIDR)

The company is using Classless Inter-Domain Routing (CIDR). CIDR uses bits normally assigned to the network ID to mask the complexity of the subnet and host addressing scheme within the network. CIDR collapses the three routing entries into one single entry.

Variable Length Subnet Masking (VLSM) allows a network designer to allocate ranges of Internet Protocol (IP) addresses to subnets that match the predicted need for numbers of subnets and hosts per subnet.

Reserved addresses are for special use and are not public routable.

Network Address Translation (NAT) is used by routers to translate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

1.4

All client machines configured for DHCP are up and running without issue. However, the clients not configured for IPv4 are not getting IP addresses. What should the server administrator configure so the IPv6 clients can receive automatic address configuration as well?

Router advertisement

RFC1918

SLAAC

Dual stack

A

SLAAC

IPv4 depends heavily on the Dynamic Host Configuration Protocol (DHCP) for address autoconfiguration. IPv6 uses a more flexible system of address autoconfiguration called stateless address autoconfiguration (SLAAC).

Private IP addresses can draw from one of the pools of addresses defined in RFC 1918 as non-routable over the Internet.

Dual stack hosts and routers can run both IPv4 and IPv6 simultaneously and communicate with devices configured with either type of address.

A router advertisement (RA) contains information about the network prefix(es) served by the router, information about autoconfiguration options, plus information about link parameters, such as the maximum transmission unit (MTU) and hop limit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

1.4

What allows a network designer to allocate ranges of Internet Protocol (IP) addresses to subnets that match the predicted need for the number of subnets and hosts per subnet?

Private addressing

Classless Inter-Domain Routing (CIDR)

Public addressing

Variable Length Subnet Masks (VLSMs)

A

Variable Length Subnet Masks (VLSMs)

Variable Length Subnet Masks (VLSMs) allows a network designer to allocate ranges of Internet Protocol (IP) addresses to subnets that match the predicted need for numbers of subnets and hosts per subnet.

Classless Inter-Domain Routing (CIDR) uses bits normally assigned to the network ID to mask the complexity of the subnet and host addressing scheme within that network. CIDR is also sometimes described as supernetting.

Private addressing is used by hosts communicating within a Local Area Network (LAN).

Public addressing is used by hosts communicating with other hosts on different networks or over the Internet.

previous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

1.4

A networked host is sending data to a single host in the same Virtual Local Area Network (VLAN). Which protocol will handle the packets for this transmission?

Unicast

Anycast

Broadcast

Multicast

A

Unicast

When a host wants to send a packet to a single recipient, it uses a unicast packet addressed to the IP address of the destination host.

Multicasting allows one host on a network to send content to other hosts that have identified themselves as interested in receiving the originating host’s content.

Anycast refers to a group of hosts configured with the same IP address. When a router forwards a packet to an anycast group, it uses a prioritization algorithm and metrics to select the host that is “closest.”.

One means of addressing multiple hosts is to perform a broadcast. A broadcast occurs by sending a packet to the network or subnet’s broadcast address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

1.4

A network administrator is setting up a 192.168.1.0/24 network using variable length subnet masking (VLSM) to support the sales and marketing department. The sales department has 120 computers and the marketing department has 50 computers. Which of the following Internet Protocol (IP) address configurations will provide adequate support for the marketing department? (Select all that apply.)

192.168.1.128/26

192.168.1.0/25

255.255.255.192

255.255.255.224

A

192.168.1.128/26 and 255.255.255.192

The 192.168.1.128/26 network provides 62 assignable IP addresses in the range of 192.168.1.129 - 192.168.1.190. This is enough addresses to support the 50 computers of the marketing department.

The subnet mask of 255.255.255.192 is used for the 192.168.1.128/26 network. The network’s broadcast address is 192.168.1.191.

The 192.168.1.0/25 network provides 126 assignable IP addresses in the range of 192.168.1.1 - 192.168.1.126. The network’s broadcast address is 192.168.1.127.

The 192.168.1.192/27 network uses a subnet mask of 255.255.255.224 and provides 30 valid host IP addresses ranging from 192.168.1.193 to 192.168.1.222. This network’s broadcast address is 192.168.1.223.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

1.4

A user goes to the website www.shopping.com. A bastion host reviews the request to enter the site to verify the safety of the request. What has the company established to enable clients access to data on the private system without compromising the security of the internal network?

Port forwarding

Network Address Translation (NAT)

Port Address Translation (PAT)

Demilitarized Zone (DMZ)

A

Demilitarized Zone (DMZ)

The company is using a Demilitarized Zone (DMZ), also referred to as a perimeter network. The idea of a DMZ is that traffic cannot pass through it directly. If communication is required between hosts on either side of a DMZ, a bastion host will take the request and check it.

Network Address Translation (NAT) was devised as a way of freeing up scarce Internet Protocol (IP) addresses for hosts needing Internet access.

Port Address Translation (PAT) is a means for multiple private IP addresses to be mapped onto a single public address.

Port forwarding is used by configuring a router’s public address to accept incoming requests and forwarding them to a different IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

1.4

A system sends a message to all link-local nodes via a multicast address. Compare private address types and conclude which address the system will use.

192.152.160.120

ff:ff:ff:ff:ff:ff

ff02::1

00:5a:3b:08:5c:02

A

ff02::1

A multicast address identifies multiple network interfaces. Unlike Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6) must support multicast. The first 8 bits indicate the address is within the multicast scope (1111 1111 or ff). The address ff02::1 has a target of all link-local nodes.

A broadcast address sends data to all of the other nodes on the network.

A broadcast frame is given the hardware address of ff:ff:ff:ff:ff:ff.

A unicast address is used when a sending interface addresses a single receiving interface. A unicast message uses the receiver’s Media Access Control (MAC) address.

An Internet Protocol (IP) address is used for sending data outside of an internal network. An example of an IP address is 192.152.160.120.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

1.4

A windows server cannot connect to the public network. After entering a ipconfig /all command, the server has an IP address of 169.254.219.35. Which of the following is most likely the reason the server cannot communicate with the public network?

The server has a DHCP address.

The server has an APIPA address.

The server has an EUI-64 (or interface ID).

The server has a public IP address.

A

The server has an APIPA address.

Automatic Private IP Addressing (APIPA) is automatically set by the Windows operating system if a static IP is not set, and DHCP addressing is not working. Hosts with an APIPA IP address will only communicate with others with the same setting on a local network.

Dynamic Host Configuration Protocol (DHCP) servers do not lease out APIPA IP addresses that use the range of 169.254.0.0 to 169.254.255.255, exclusively.

Public IP addresses are reserved for services or host on the Internet which is a public network. Public IP addresses are not used in internal networks.

An EUI-64 or interface identifier is a MAC-derived address that is used for IPv6 globally scoped unicast addresses that are similar to public IPv4 addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

1.4

A company has 350 hosts that connect to the network. All of the hosts use a public Internet Protocol (IP) address. Consider public address classes to determine which of the following may represent the first octet in the IP address range.

225

132

125

192

A

132

The company will require the use of a Class B public network. This network can have up to 65,534 hosts and the first octet of the address will range from 128-191.

The first octet of 125 will be too large for the company. 125 falls within a Class A range and supports up to 16,777,241 hosts. The range for this class is 1-126.

The first octet of 192 will not be sufficient. This octet falls within Class C, which supports up to 254 hosts. The range for Class C is 192-223.

The first octet of 225 is not a valid address for the company. Class D addresses range from 224.0.0.0 through 239.255.255.255 and is used for multicasting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

1.4

A new physical web server receives power from and connects to the network in the communications closet. To ensure the server is ready to communicate with users in the various offices of the building, a network administrator verifies network service installation and that the server can communicate with a Layer 3 switch in the same closet. How may the network administrator carry out these tests? (Select all that apply.)

Ping the Default Gateway

Ping the subnet mask

Ping the virtual IP

Ping the loopback

A

Ping the Default Gateway and Ping the loopback

The loopback address is a reserved address, typically an IPv4 address of 127.0.0.1. It is often used to check that TCP/IP is correctly installed on the local host.

The default gateway is the router. A layer 3 switch can operate on the network layer to route traffic. Pinging the gateway will verify that a path exists to eventually route to other offices.

The subnet mask is not a pingable IP address. A subnet mask distinguishes the network ID and host ID of a single IP address (e.g., 255.255.255.0).

A virtual IP is a shared IP address for representing, for example, a pair of web servers configured for load balancing. There is no virtual IP in this case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

1.4

The DHCP server is offline and the server team is working on re-building corrupted scope information. The team notices that some clients have not had any issues since the DHCP server went down. After investigating the operational client machines, the team notices that they are all running IPV6. How do IPv6 hosts gain addressing without manual configuration?

RFC1918

SLAAC

Dual stack

Router advertisement

A

SLAAC

IPv4 depends heavily on the Dynamic Host Configuration Protocol (DHCP) for address autoconfiguration. IPv6 uses a more flexible system of address autoconfiguration called stateless address autoconfiguration (SLAAC).

Private IP addresses can draw from one of the pools of addresses defined in RFC 1918 as non-routable over the Internet.

Dual stack hosts and routers can run both IPv4 and IPv6 simultaneously and communicate with devices configured with either type of address.

A router advertisement (RA) contains information about the network prefix(es) served by the router, information about autoconfiguration options, plus information about link parameters, such as the maximum transmission unit (MTU) and hop limit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

1.4

A small office is utilizing a total of 25 Internet Protocol (IP) addresses to support various workstations and printers. One of the workstations has an IP address of 192.168.10.50. Which of the following are true about this network’s subnet? (Select all that apply.)

Subnet mask of 255.255.255.224

CIDR notation of /28

Broadcast address of 192.168.10.31

CIDR notation of /27

A

Subnet mask of 255.255.255.224 and CIDR notation of /27

IP address 192.169.10.50 is part of the second subnet of the 192.168.10.0 network that is notated as 192.168.10.32/27. Its subnet mask is 255.255.255.224.

The Classless Inter-Domain Routing (CIDR) notation of /27 breaks down the 192.169.10.0 network into multiple sets of 30 usable IP addresses. This will supply enough IP addresses for the office.

The first subnet of a 192.168.10.0/27 network begins with host IP address 192.168.10.1 to 192.168.10.30. The broadcast address of 192.168.10.31 is associated with this first subnet.

A /28 subnet has 14 usable IP addresses, and is not enough for the office. The IP address of 192.168.10.50 would be part of the 192.168.10.48/28 subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

1.4

A user goes to the website www.shopping.com. A bastion host reviews the request to enter the site to verify the safety of the request. What has the company established to enable clients access to data on the private system without compromising the security of the internal network?

Port forwarding

Port Address Translation (PAT)

Demilitarized Zone (DMZ)

Network Address Translation (NAT)

A

Demilitarized Zone (DMZ)

The company is using a Demilitarized Zone (DMZ), also referred to as a perimeter network. The idea of a DMZ is that traffic cannot pass through it directly. If communication is required between hosts on either side of a DMZ, a bastion host will take the request and check it.

Network Address Translation (NAT) was devised as a way of freeing up scarce Internet Protocol (IP) addresses for hosts needing Internet access.

Port Address Translation (PAT) is a means for multiple private IP addresses to be mapped onto a single public address.

Port forwarding is used by configuring a router’s public address to accept incoming requests and forwarding them to a different IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

1.4

A network administrator is setting up a 192.168.1.0/24 network using variable length subnet masking (VLSM) to support the sales and marketing department. The sales department has 120 computers and the marketing department has 50 computers. Which of the following Internet Protocol (IP) address configurations will provide adequate support for the marketing department? (Select all that apply.)

255.255.255.224

255.255.255.192

192.168.1.128/2

192.168.1.0/25

A

255.255.255.192 and 192.168.1.128/26

The 192.168.1.128/26 network provides 62 assignable IP addresses in the range of 192.168.1.129 - 192.168.1.190. This is enough addresses to support the 50 computers of the marketing department.

The subnet mask of 255.255.255.192 is used for the 192.168.1.128/26 network. The network’s broadcast address is 192.168.1.191.

The 192.168.1.0/25 network provides 126 assignable IP addresses in the range of 192.168.1.1 - 192.168.1.126. The network’s broadcast address is 192.168.1.127.

The 192.168.1.192/27 network uses a subnet mask of 255.255.255.224 and provides 30 valid host IP addresses ranging from 192.168.1.193 to 192.168.1.222. This network’s broadcast address is 192.168.1.223.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

1.4

A company has 725 hosts on the network that utilize public Internet Protocol (IP) addresses. The company has three contiguous class C addresses for the hosts. The company implemented Classless Inter-Domain Routing (CIDR) to assist with the maintenance of the three networks. What will CIDR provide to the network?

CIDR will provide translation between the private and public addresses.

CIDR will use bits normally assigned to the network ID to mask the complexity of the subnet and host address scheme.

CIDR will allow a network designer to allocate ranges of IP addresses to subnets that match the predicted need for numbers of subnets and hosts.

CIDR will provide groups of address ranges reserved for special use and are not publicly routable.

A

CIDR will use bits normally assigned to the network ID to mask the complexity of the subnet and host address scheme.

The company is using Classless Inter-Domain Routing (CIDR). CIDR uses bits normally assigned to the network ID to mask the complexity of the subnet and host addressing scheme within the network. CIDR collapses the three routing entries into one single entry.

Variable Length Subnet Masking (VLSM) allows a network designer to allocate ranges of Internet Protocol (IP) addresses to subnets that match the predicted need for numbers of subnets and hosts per subnet.

Reserved addresses are for special use and are not public routable.

Network Address Translation (NAT) is used by routers to translate between the private and public addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

1.4

A host with a Media Access Control (MAC) of 00:72:8b:31:8b:cb uses a global scope addressing scheme. One identifier for this host is 0272:8bff:fe31:8bcb. Consider Internet Protocol version 6 (IPv6) addressing schemes to determine what this identifier represents.

Extended Unique Identifier (EUI) 64

Subnet address

Global scope

Network ID

A

Extended Unique Identifier (EUI) 64

The identifier 0272:8bff:fe31:8bcb is the Extended Unique Identifier (EUI) 64. This is a Media Access Control (MAC)-derived address that converts a 48 bit MAC address to a 64-bit interface ID. Another method of developing the interface ID is to use privacy extensions.

The first three bits in Internet Protocol version 6 (IPv6) indicates that the address is within the global scope. Most of the IPv6 address space is unused.

The subnet address is a 16-bit identifier located immediately before the interface ID.

The network ID consists of 45 bits that are allocated in a hierarchical manner to regional registries, Internet Service Providers (ISPs), and end users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

1.4

A new network administrator is going through the company’s network and surveying current network configurations. After examining a few hosts, the general Internet Protocol (IP) scheme starts with the first octet at 10 and all are using a default mask of 255.0.0.0. Which of the following would be true for this network? (Select all that apply.)

Class A network

Public IP addressing

/24

Private IP addressing

A

Class A network and Private IP addressing

A Class A network can be identified by the first octet being in the range of 1-126. It supports large numbers of hosts over 16 million.

Private IP addresses are used for internal networks. They can be drawn from one of the pools of addresses defined in RFC 1918, or better known as Class A, B, and C private address ranges.

Public IP addresses are used and routable on the public network or the Internet. The allocation of these addresses is governed by IANA and administered by regional registries and Internet service providers (ISP).

A classless inter-domain routing (CIDR) notation of a /24 is representative of a Class C network that uses a subnet mask of 255.255.255.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

1.4

What is the Internet Protocol (IP) address of a router on the same IP network as the host?

Virtual IP

Default gateway

Subnet mask

Loopback address

A

Default gateway

The default gateway is the Internet Protocol (IP) address of a router on the same IP network as the host.

The loopback address is used by administrators to verify if the Transmission Control Protocol (TCP)/IP is correctly installed on a local host.

A subnet mask is used to distinguish between the network ID and the host ID within a single IP address.

A virtual IP allows for multiple physical routers to serve as a single default gateway for a subnet. To do this, each router must have an interface connected to the subnet, with its own unique Media Access Control (MAC) address and IP address. They share a common virtual IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

1.4
A system administrator has installed a new client computer on the network. The computer is getting an IP address of 169.254.0.1 on a DHCP-enabled network. What kind of address did the computer receive?

Subinterfaces

Loopback

Tunneling

Link local

A

Link local

A link local IP addressing scheme is used within the scope of a single broadcast domain only. An example of such an address is an automatic private IP addressing (APIPA) that issues when a DHCP server cannot be found.

A loopback address is an IP address by which a host can address itself over any available interface. Loopbacks usually test the local machine.

Tunneling occurs when the source and destination hosts are on the same logical network, but connected via different physical networks.

The router’s physical interface gets configured with multiple subinterfaces or virtual interfaces. The subinterface receives traffic from a given VLAN and then routes it to the subinterface serving the destination VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

1.4

Select the Internet Protocol (IP) address that is in the Class B private address range.

10.160.025.001

169.254.140.102

127.050.137.081

172.20.105.003

A

172.20.105.003

Hosts communicating with one another over a Local Area Network (LAN) will typically use private addressing. Private Internet Protocol (IP) addresses can be drawn from one of the pools of addresses. The Class B private address range is 172.16.0.0 to 172.31.255.255. The answer option 172.20.105.003 falls within this range.

The addresses 169.254.0.0 to 169.254.255.255 are reserved for use by hosts for automatic private IP addressing, also known as link-local addressing.

The IP address 127.050.137.081 is reserved for loopback addresses. The range 127.0.0.0 to 127.255.255.255 is reserved for this purpose, to be used by administrators to verify if the Transmission Control Protocol (TCP)/IP is correctly installed on the local host.

The Class A private address range is 10.0.0.0 to 10.255.255.255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

1.4

A system uses a private address to send a packet within the internal network. The address is ff02::1. Compare private address types and determine what type of address the system is using.

Broadcast

Multicast

Unicast

Internet Protocol (IP)

A

Multicast

A multicast address identifies multiple network interfaces. Unlike Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6) must support multicast. The first 8 bits indicate the address is within the multicast scope (1111 1111 or ff). The address ff02::1 has a target of all link-local nodes.

A broadcast address sends data to all of the other nodes on the network.

A broadcast frame is given the hardware address of ff:ff:ff:ff:ff:ff.

A unicast address is used when a sending interface addresses a single receiving interface. A unicast message uses the receiver’s Media Access Control (MAC) address.

An Internet Protocol (IP) address is used for sending data outside of an internal network. An example of an IP address is 192.152.160.120.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

1.4
The hosts on a company’s network all use a public Internet Protocol (IP) address. The first octet in the IP range is 132. Determine which class the network belongs to after comparing the octet ranges of the following classes of addresses.

Class A

Class D

Class C

Class B

A

Class B

The company will require the use of a Class B public network. This network can have up to 65,534 hosts and the first octet of the address will range from 128-191. The first octet in the scenario is 132 and falls within this range.

A company with a Class A network can have up to 16,777,241 hosts. The range for this class is 1-126.

A company with a Class C network can have up to 254 hosts. The range for Class C is 192-223.

A Class D network contains addresses that range from 224.0.0.0 through 239.255.255.255. This class is used for multicasting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

1.5

Which protocol allows for a protected dialog between the client and server by assigning the web server a digital certificate issued by a Certificate Authority?

Secure Sockets Layer/Transport Layer Security (SSL/TLS)

Network Time Protocol (NTP)

Hypertext Transfer Protocol (HTTP)

Hypertext Transfer Protocol Secure (HTTPS)

A

Hypertext Transfer Protocol Secure (HTTPS)

Hypertext Transfer Protocol Secure (HTTPS) is a subset of Hypertext Transfer Protocol (HTTP) that allows for a secure dialog between the client and server using Secure Sockets Layer/Transport Layer Security (SSL/TLS). To implement HTTPS, the web server is assigned a digital certificate by a trusted Certificate Authority (CA).

HTTP is the foundation of web technology. HTTP enables clients to request resources from an HTTP server.

SSL/TLS works as a layer between the Application and Transport layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) stack. It is normally used to encrypt TCP connections.

The Network Time Protocol (NTP) enables the synchronization of time-dependent applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

1.5

Company A has purchased new computing devices that support IPv6 and not IPv4. What protocol could the company enable on the network to allow the transmission of IPv6 packets and encapsulated frames or packets from different types of network protocols over an IPv4 network?

LDAP

SQL Server

GRE

ICMP

A

GRE

Generic Routing Encapsulation (GRE) Tunneling protocol allows the transmission of encapsulated frames or packets from different types of network protocol over an IP network.

The Internet Control Message Protocol (ICMP) reports errors and sends messages about the delivery of a packet.

Relational databases operate using structured query language (SQL). SQL uses port 1433 and defines commands, such as SELECT, to retrieve information or UPDATE to change it.

Most directory services are implementations of the Lightweight Directory Access Protocol (LDAP). LDAP is not a directory standard but a protocol used to query and update X.500-like directories. It operates on port 389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

1.5

Corporate hired a penetration testing expert to test their internal security. The final report given to the executives shows that the way the expert circumvented their security was by using port 1521 from a remote location. The expert suggested enabling access control lists on that service. What protocol did the expert use to infiltrate the network?

Telnet

SQLnet

MySQL

Syslog

A

SQLnet

Oracle’s remote data access protocol SQL*Net uses TCP/1521. Access lists should secure these ports to provide security.

Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de facto standard for logging events from distributed systems on port 514.

Telnet is both a protocol and a terminal emulation software tool that transmits shell commands and output between a client and the remote host on port 23.

The open-source MySQL platform uses TCP/3306. The MariaDB platform forked from MySQL uses the same port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

1.5

What provides additional options, rather than only leases, for host Internet Protocol (IP) addresses?

ESP

DHCPv6

APIPA

EUI64

A

DHCPv6

Internet Protocol version 6 (IPv6) can locate routers and generate a host address with a suitable network prefix. In this context, the role of a Dynamic Host Configuration Protocol (DHCP) server in IPv6 is different. DHCPv6 is used to provide additional option settings, rather than leases for host IP addresses.

Extended Unique Identifier 64 (EUI64) is a method used to automatically configure IPv6 host addresses. The unique 64-bit interface ID is derived from the MAC address of the network interface of a host.

Automatic Private Internet Protocol Addressing (APIPA) was developed as a means for clients that could not contact a DHCP server to communicate on the local network.

Encapsulating Security Payload (ESP) provides confidentiality and/or authentication and integrity. It can be used to encrypt the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

1.5

Which port will a Domain Name Server (DNS) use for record transfers over 512 bytes?

Transmission Control Protocol (TCP) port 53

Transmission Control Protocol (TCP) port 23

User Datagram Protocol (UDP) port 53

User Datagram Protocol (UDP) 69

A

Transmission Control Protocol (TCP) port 53

A Domain Name Server (DNS) server that needs to allow large record transfers over 512 bytes will be configured to allow connections over Transmission Control Protocol (TCP) port 53.

A DNS server is usually configured to listen for queries on User Datagram Protocol (UDP) port 53. Larger transfers (over 512 bytes) require use of TCP port 53.

Telnet uses TCP port 23 by default. Telnet is terminal emulation software to support a remote connection to another computer.

Trivial File Transfer Protocol (TFTP) is a connectionless protocol running over User Datagram Port 69.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

1.5

A Simple Network Management Protocol (SNMP) agent informs the monitor of a port failure. Analyze the functions of an SNMP agent to determine what command the monitor uses for this notification.

Set

Walk

Get

Trap

A

Trap

The Trap command is used when the agent informs the monitor of a notable event, such as a port failure. The threshold for triggering traps can be set for each value.

The Get command is used for the software to query the agent for a single Object Identifier (OID). This command is used by the monitor to perform regular polling.

The monitor can be used to change certain variables using the Set command.

The monitor can walk a Management Information Base (MIB) subtree by using multiple Get and Get Next commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

1.5

A new system administrator configures a shared repository for access to files through a web-based interface. What port must the administrator enable on the repository?

80

22

21

445

A

80

The Hypertext Transfer Protocol (HTTP) enables clients to request resources from an HTTP server. HTTP uses port 80.

Secure Shell (SSH) is the principal means of obtaining secure remote access to a UNIX or Linux server. SSH uses port 22.

The Server Message Block (SMB) protocol provides File/Print Sharing Service. SMB allows a machine to share its files and printers to make them available. SMB uses port 445.

File Transfer Protocol (FTP) connects to Transmission Control Protocol (TCP) port 21 on an FTP server and opens a chosen dynamic client port number for communications and transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

1.5

A user has received a new computer from the system administrator. The sysadmin told the user to just plug the computer in and everything will work fine. After plugging the computer in at the desk, the user noticed there is no connectivity but sees an IP address of 169.254.1.1. What protocol was the system administrator depending on to configure this computer?

SMTP TLS

DHCP

HTTPS

LDAP

A

DHCP

A router runs a dynamic host configuration protocol (DHCP) server to allocate a unique address to each host that connects to the network on ports 67 and 68.

Simple Mail Transfer Protocol (SMTP) with TLS uses TCP port 587 and TLS to allow mail clients to submit messages for delivery securely.

Most directory services are implementations of the Lightweight Directory Access Protocol (LDAP). LDAP is not a directory standard but a protocol used to query and update an X.500-like directory that runs on port 389.

SSL/TLS works between the Application and Transport layers of the TCP/IP stack. When used with the HTTP application, it is known as HTTP Secure (HTTPS) on port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

1.5

A system administrator for ABC Company receives a request for a new account. A new employee is onboarding and will receive a Voice over Internet Protocol (VoIP) phone. The employee’s name is Sam Smith and the phone number will be 1234567890. The company’s domain is @abccompany.com. Develop a Session Initiation Protocol (SIP) Uniform Resource Indicator (URI). (Select all that apply.)

sip:sam.smith@1234567890

sip:sam.smith.abccompany.com

sip:123456789.abccompany.com

sip:sam.smith@abccompany.com

A

sip:sam.smith@abccompany.com and sip:sam.smith@1234567890

Session Initiation Protocol (SIP) endpoints are the end-user devices, also known as user agents. In this scenario, the Voice over Internet Protocol (VoIP) is the SIP endpoint. One example of an SIP for this VoIP is sip:sam.smith@abccompany.com. This is a unique URI that includes the user’s name and the company domain.

The URI sip:sam.smith@1234567890 is a unique URI that includes the user’s name and the SIP endpoint phone number.

The URI sip:1234567890.abcompany.com is not a valid URI. The URI must include the “@” symbol followed by the phone number or company domain.

The URI sip:sam.smith.abccompany.com is not a valid URI. The URI must include the “@” symbol followed by the phone number or company domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

1.5

Explain how the Simple Authentication and Security Layer (SASL) provides binding in Lightweight Directory Access Protocol Secure (LDAPS).

The client supplies the Domain Name (DN) and password.

The server authenticates to the client and configures a secure channel for communications.

The client and server negotiate the use of a supported security mechanism.

The directory grants anonymous access.

A

The client and server negotiate the use of a supported security mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

1.5

A Cybersecurity specialist has been gathering data about the corporate network. The specialist has realized that the e-mail server is using port 143 and getting intercepted at random times. The specialist has briefed the CISO of his findings and has suggested swapping to port 993. Which protocol did the specialist suggest?

POP3 over SSL

IMAP

IMAP over SSL

SMTP

A

IMAP over SSL

A client connects to an IMAP server over port 143 and establishes connection security using a TLS. The default port for IMAPS (IMAP over SSL) is TCP/993.

A client establishes a connection to the POP server on TCP port 110. Using TLS encryption can secure POP. The default TCP port for secure POP (POP3S) is port 995.

A client connects to an IMAP server over TCP port 143. Like POP, IMAP is a mail retrieval protocol, but with mailbox management features lacking in POP.

SMTP is useful only to deliver mail to permanently available hosts. When an SMTP server receives a message, it delivers the message to a mailbox server using port 25.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

1.5

Which of the following provides an automatic method for allocating an Internet Protocol (IP) address, subnet mask, default gateway, and Domain Name System (DNS) server addresses?

DHCP

RARP

APIPA

TFTP

A

DHCP

The Dynamic Host Configuration Protocol (DHCP) provides an automatic method for allocating an Internet Protocol (IP) address, subnet mask, default gateway, and optional parameters.

Automatic Private IP Addressing (APIA) was developed by Microsoft as a means for clients that could not contact a DHCP server to communicate on the local network.

Reverse Address Resolution Protocol (RARP) allows a host to obtain an IP address from a server configured with a list of address mappings. RARP can be used to obtain only an IP address, which is inadequate for most implementations of IP.

Trivial File Transfer Protocol (TFTP) is used to provide additional parameters for the Bootstrap Protocol (BOOTP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

1.5

Corporate hired a penetration testing expert to test their internal security. The final report given to the executives shows that the way the expert circumvented their security was by using port 1521 from a remote location. The expert suggested enabling access control lists on that service. What protocol did the expert use to infiltrate the network?

Syslog

Telnet

SQLnet

MySQL

A

SQLnet

Oracle’s remote data access protocol SQL*Net uses TCP/1521. Access lists should secure these ports to provide security.

Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de facto standard for logging events from distributed systems on port 514.

Telnet is both a protocol and a terminal emulation software tool that transmits shell commands and output between a client and the remote host on port 23.

The open-source MySQL platform uses TCP/3306. The MariaDB platform forked from MySQL uses the same port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

1.5

A network administrator is monitoring network traffic and notices a severe spike on port 993. Which protocol is causing the spike in network traffic?

POP3 over SSL

IMAP

SMTP

IMAP over SSL

A

IMAP over SSL

A client connects to an IMAP server over port 143 and establishes connection security using a TLS. The default port for IMAPS (IMAP over SSL) is TCP/993.

A client establishes a connection to the POP server on TCP port 110. Using TLS encryption can secure POP. The default TCP port for secure POP (POP3S) is port 995.

A client connects to an IMAP server over TCP port 143. Like POP, IMAP is a mail retrieval protocol, but with mailbox management features lacking in POP.

SMTP is useful only to deliver mail to permanently available hosts. When an SMTP server receives a message, it delivers the message to a mailbox server using port 25.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

1.5

A client is attempting to connect to a network, but is unable to successfully connect. They decide to open Wireshark to see if they can troubleshoot but want to filter based on the DHCP port. What should they filter on?

TCP 67

TCP 139

TCP 80

UDP 123

A

TCP 67

Information can be viewed from Dynamic Host Configuration Protocol (DHCP) traffic by filtering on TCP 67 and 68. DHCP dynamically assigns IP addresses to network hosts.

Server Message Block (SMB) provides File/Print Sharing Service and operates on TCP 139 and 445. SMB allows a machine to share its files and printers to make them available.

Hypertext Transfer Protocol (HTTP) operates over TCP 80 and enables clients to request resources from a HTTP server.

The Network Time Protocol (NTP) enables the synchronization of time-dependent applications. A server or host that is configured with the incorrect time may not be able to access network services. Authentication, and other security mechanisms will often fail if the time is not synchronized on both communicating devices. Errors are likely to be generic failed or invalid token messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

1.5

A network engineer is troubleshooting interconnectivity between IPv4 hosts and IPv6 hosts. The engineer has found there is a need for a layer three tunneling protocol that can encapsulate different types of IPv6 and IPv4 packets. What type of encapsulation should the engineer enable on the network?

LDAP

GRE

ICMP

SQL Server

A

GRE

Generic Routing Encapsulation (GRE) Tunneling protocol allows the transmission of encapsulated frames or packets from different types of network protocol over an IP network.

The Internet Control Message Protocol (ICMP) reports errors and sends messages about the delivery of a packet.

Relational databases operate using structured query language (SQL). SQL uses port 1433 and defines commands, such as SELECT, to retrieve information or UPDATE to change it.

Most directory services are implementations of the Lightweight Directory Access Protocol (LDAP). LDAP is not a directory standard but a protocol used to query and update X.500-like directories. It operates on port 389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

1.5

A system administrator notices a server cannot access network services. Authentication is also failing. The error is an invalid token message. Which of the following protocols should the system administrator verify early in the troubleshooting process?

Network Time Protocol (NTP)

Server Message Block (SMB)

Hypertext Transfer Protocol (HTTP)

Post Office Protocol (POP)

A

Network Time Protocol (NTP)

The Network Time Protocol (NTP) enables the synchronization of time-dependent applications. A server or host that is configured with the incorrect time may not be able to access network services. Authentication, and other security mechanisms will often fail if the time is not synchronized on both communicating devices. Errors are likely to be generic failed or invalid token messages.

Server Message Block (SMB) provides File/Print Sharing Service. SMB allows a machine to share its files and printers to make them available.

Hypertext Transfer Protocol (HTTP) enables clients to request resources from a HTTP server.

The Post Office Protocol (POP) is an early example of a mailbox protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

.1.5

A new helpdesk technician has been working on a computer for a few days with no issues. Today, the technician logged into the computer and noticed no connection. The network technician tells the helpdesk technician that the IP lease expired, and there are no usable IP addresses right now. What service should the network technician modify to incorporate more IP addresses or reduce the lease times?

DHCP

SMTP TLS

LDAP

HTTPS

A

DHCP

A router runs a dynamic host configuration protocol (DHCP) server to allocate a unique address to each host that connects to the network on ports 67 and 68.

Simple Mail Transfer Protocol (SMTP) with TLS uses TCP port 587 and TLS to allow mail clients to submit messages for delivery securely.

Most directory services are implementations of the Lightweight Directory Access Protocol (LDAP). LDAP is not a directory standard but a protocol used to query and update an X.500-like directory that runs on port 389.

SSL/TLS works between the Application and Transport layers of the TCP/IP stack. When used with the HTTP application, it is known as HTTP Secure (HTTPS) on port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

1.5

A user has turned in a computer to the help desk with the complaint that “nothing works.” When the technician logs into the computer, the time is not correct. The technician knows that all domain computers pull time from the domain controller, but this occurs through which protocol?

Network Time Protocol (NTP)

Server Message Block (SMB)

Hypertext Transfer Protocol (HTTP)

Post Office Protocol (POP)

A

Network Time Protocol (NTP)

Network Time Protocol (NTP) Application protocol allows machines to synchronize to the same time clock that runs over UDP port 123.

Server Message Block (SMB) Application protocol, used for requesting files from Windows servers and delivering them to clients, uses port 445.

Hypertext Transfer Protocol (HTTP) enables clients to request resources from a HTTP server.

Post Office Protocol (POP) allows the download of mail messages but not the management of the remote inbox. It uses port 110.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

1.5

Which protocol uses Network Level Authentication (NLA) which requires the client to authenticate before a full remote session starts?

Remote Desktop Protocol (RDP)

Telnet

Secure Shell (SSH)

Virtual Network Computing (VNC)

A

Remote Desktop Protocol (RDP)

Remote Desktop Protocol (RDP) is Microsoft’s protocol for operating remote Graphical User Interface (GUI) connections to a Windows machine. RDP uses Network Level Authentication (NLA) which requires the client to authenticate before a full remote session is started.

During a Telnet connection, the password and other communications are not encrypted and therefore could be vulnerable to packet sniffing and other attacks.

Secure Shell (SSH) is the principal means of obtaining secure remote access to a UNIX or Linux server. The server’s host key is used to set up a secure channel for the client to submit authentication credentials.

Virtual Network Computing (VNC) is a freeware product with similar functionality to RDP. There is no connection security with this product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

1.5

Which delivery method and protocol may send data out of order and over different paths? (Select all that apply.)

Connectionless

UDP

TCP

Connection-oriented

A

Connectionless and UDP

Connectionless, a data transmission delivery method using User Datagram Protocol (UDP), does not establish a connection between devices so data delivery may be out of order and over different paths.

User Datagram Protocol (UDP) is used in the connectionless delivery method where data delivery may be out of order and over different paths.

Transmission Control Protocol (TCP) is used in the connection-oriented delivery method where deliver of a stream of data is in the same order as it was sent after establishing a connection.

Connection-oriented, a data transmission delivery method using TCP, after establishing a connection sends any data and delivers a stream of data in the same order as it was sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

1.5

Explain how the Simple Authentication and Security Layer (SASL) provides binding in Lightweight Directory Access Protocol Secure (LDAPS).

The client and server negotiate the use of a supported security mechanism.

The directory grants anonymous access.

The client supplies the Domain Name (DN) and password.

The server authenticates to the client and configures a secure channel for communications.

A

The client and server negotiate the use of a supported security mechanism.

Authentication, referred to as binding to the server, can be implemented in several ways for Lightweight Directory Access Protocol Secure (LDAPS). The Simple Authentication and Security Layer (SASL) completes binding by the client and server negotiating the use of a supported security mechanism.

If no authentication is used, anonymous access is granted to the directory.

Simple authentication performs binding by the client supplying the Domain Name (DN) and password.

Secure Sockets Layer (SSL)/Transport Layer Security (TLS) can also be used for authentication. SSL/TLS provides a means for the server to authenticate to the client and configure a secure channel for communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

1.6

Which DNS record type is responsible for identifying a primary authoritative name server?

SOA

Root

MX

NS

A

SOA

The Start of Authority (SOA) record identifies a primary authoritative name server that maintains complete resource records for a zone.

A root is not a record type but is a server type. Root domain name system (DNS) servers have complete information about top-level domain servers.

A Mail Exchange (MX) record identifies an email server for the domain. An MX record must not point to a CNAME record.

An NS (Name Server) record identifies a server as a name server for a zone, but it does not indicate its authoritative status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

1.6

What might cause zone transfers of domain name system (DNS) record updates to fail between multiple DNS servers?

Misconfigured stratum

Incorrect scope

Missing root server

Incorrect DNS records

A

Misconfigured stratum

Stratum 1 NTP servers directly connect to an accurate clock source. If an inaccurate Network Time Protocol (NTP) server is specified on a server, it may result in time synchronization and further communication problems.

Dynamic Host Configuration Protocol (DHCP) servers use an address pool called a scope. Addresses get dynamically assigned from this pool to client computers that request one.

A root server is aware of top-level domains. A missing root server might cause failure in a DNS lookup but would not impact a zone transfer.

Incorrect DNS records will cause problems with the name resolution of host systems but will not impact a zone transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

1.6

A server administrator configures a network’s internal DNS to set the records for all servers. Users mention that one server, in particular, is not reachable by name. What does the administrator investigate?

Forward lookups

DNS caching

Recursive lookups

Time to live settings

A

Forward lookups

Forward lookups use a forward lookup zone to return an IP address associated with a host name. In this case, an entry for the particular host was likely missed or contains a typo.

DNS caching occurs in both servers and client computers. Caching helps to speed the name resolution process by caching host names. If a cache cannot resolve a name, then a lookup is performed.

A recursive lookup means that if the queried server is not authoritative, it does take on the task of querying other name servers until it finds the requested record or times out.

Time to live (TTL) settings refer to the configuration of caching host names. When the TTL expires, the cache entry is invalid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

1.6

Client systems receive IP address configurations via a DHCP server. When negotiating the address information assignment, what relates to available leases? (Select all that apply.)

T1

T2

DORA

ARP

A

T1 and T2

A client can renew its lease from a Dynamic Host Configuration Protocol (DHCP) server when at least half the lease’s period has elapsed (T1 timer) so that it keeps the same IP addressing information.

A client can attempt to rebind the same lease configuration with any available DHCP server. By default, this happens after 87.5% of the lease duration is up (T2 timer).

The DHCP lease process is often known as the DORA process. This process of obtaining a lease includes Discover, Offer, Request, and Ack(nowledge).

When negotiating an address from a DHCP server, an ARP message checks that the address is unused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

1.6

A network administrator configures all printers in an organization to be issued specific IP addresses from a DHCP server. What does the administrator configure to accomplish this?

Scope options

Static assignment

Dynamic assignment

Scope

A

Scope options

Dynamic host configuration protocol (DHCP) servers use scope options to issue configuration options, such as DNS server settings and more.

A system, such as a printer, can use a static assignment. Typically this is done by using IP addresses outside the DHCP scope. Alternatively, a specially configured exclusion range can assign statically assigned addresses.

Client systems can use a dynamically assigned IP address. This is an address assigned by a dynamic host configuration protocol (DHCP) server that may change when the assigned lease time is up.

A scope defines a range or ranges of addresses that a dynamic host configuration protocol (DHCP) server can issue to client systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

1.6

In which of the following would an IT engineer configure a PTR?

Reverse lookup zone

Forward lookup zone

DNS Hierarchy

DNS Forwarder

A

Reverse lookup zone

A PTR record is found in reverse lookup zones and is used to resolve an IP address to an associated host name.

A forward lookup zone is used to translate a given a name record and return a related Internet protocol (IP) address.

Third-party domain name system (DNS) means that another organization is responsible for hosting records. Typically, this would be for external domains.

A forwarder transmits a client query to find a host to another domain name system (DNS) server and routes the replies it gets back to the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

1.6

A virtual private network exists between two sites. The main site delivers Internet protocol (IP) addresses to the remote site. A configuration change places the remote site on a different subnet. An IT engineer reconfigures which of the following?

Relay

Reservation

Lease

Pool

A

Relay

A DHCP relay agent can be configured to provide forwarding of DHCP traffic between different subnets.

A media access control (MAC) address reservation is a mapping of a MAC address to a specific IP address within the DHCP server’s address pool.

Using a reservation ensures a device always uses the same IP address.

A lease period determines how long a system is assigned an IP address from a DHCP server. A long lease means the client does not have to renew as frequently, but as a result the DHCP server’s pool of IP addresses is not replenished.

The address pool is the range of IP addresses that a DHCP server can allocate to clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

1.6

A Voice over Internet Protocol (VoIP) application does not work properly with company email address accounts. A tech concludes that a domain name system (DNS) record is incorrect. Which record type does the tech modify to restore services?

SRV

CNAME

TXT

AAAA

A

SRV

A Service (SRV) record is a DNS record used to identify a record that is providing a network service or protocol. Properties of this record type include port and protocol.

A Canonical Name (CNAME) record is a Domain Name System (DNS) record used to represent an alias for a host.

A TXT record is used to store any free-form text that may be needed to support other network services. An SPF record, for example, is a TXT record that is used to list the IP addresses or names of servers that are permitted to send email.

An AAAA record is used to resolve a host name to an Internet Protocol version 6 (IPv6) address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

1.6

A user requests that a company web host have two different names for the same Internet protocol (IP) address. The user requests jobs.companyname.com and careers.companyname.com. Which domain name system (DNS) record does an IT tech configure to accomplish this?

CNAME

SRV

TXT

AAAA

A

CNAME

A Canonical Name (CNAME) record is a Domain Name System (DNS) record used to represent an alias for a host. Aliases are used to give a host multiple names.

A Service (SRV) record is a DNS record which identifies a record that provides a network service or protocol. Properties of this record type include port and protocol.

A TXT record is used to store any free-form text needed to support other network services. An SPF record, for example, is a TXT record that is used to list the IP addresses or names of servers that are permitted to send email.

An AAAA record is used to resolve a host name to an Internet Protocol version 6 (IPv6) address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

1.6

A Windows Active Directory (AD) domain uses companyname.com. An external web server uses www.companyname.com. Users on the corporate network cannot reach the web server when using a www prefix. An IT engineer modifies which of the following to remedy the issue?

Internal DNS zone

External DNS zone

DNS forwarder

Third-party DNS

A

Internal DNS zone

Internal domain name system (DNS) zones refer to the domains used on a private network. As the site uses the same domain name as AD, an A record for www needs to be created internally to point to the public web server address.

External domain name system (DNS) zones refer to records that Internet clients must be able to access.

A forwarder transmits a client query to find a host to another domain name system (DNS) server and routes the replies it gets back to the client.

Third-party domain name system (DNS) means that another organization is responsible for hosting records. Typically, this would be for external domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

1.6

A company has an Active Directory domain called specks.com. The company has an on-demand subscription for cloud services and wants to ensure their internal applications are accessible to their remote employees via their Fully Qualified Domain Names (FQDNs) in the cloud. The company will control all these services and applications. Which of the following will the company most likely be using throughout their organization? (Select all that apply.)

Internal DNS server

Cloud-hosted DNS server

External DNS server

Third-party DNS server

A

Internal DNS server and Cloud-hosted DNS server

The company is using an internal DNS server because it controls all its services and applications. The DNS server will provide name resolution using FQDNs.

The company wants to extend its internal DNS services to the cloud and a cloud-hosted option is most appropriate option. The company can deploy a virtual DNS server that is accessible by its cloud users.

External DNS servers refers to an external DNS zone that Internet clients must be able to access. A company will most likely not have an external DNS server with a public IP address.

Most external DNS servers are managed by third-party organizations and are referred to as external DNS servers. These are usually owned and managed by another company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

1.6

An engineer configures a DomainKeys Identified Mail (DKIM) record to list the names allowed to receive email from a given source. Considering domain name system (DNS) record types, which does the engineer configure?

TXT record

CNAME record

SRV record

“A” record

A

TXT record

A TXT record is used to store any free-form text that may be needed to support other network services. DomainKeys Identified Mail (DKIM) records are TXT records that are used to decide whether email is allowed from a given source to prevent spam and mail spoofing.

A Canonical Name (CNAME) record is a Domain Name System (DNS) record used to represent an alias for a host.

A Service (SRV) record is a DNS record used to identify a record that is providing a network service or protocol.

An A record is used to resolve a host name to an IPv4 address. This is the most common type of record in a DNS zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

1.6

New workstations are set up in the office. They currently do not have an Internet Protocol (IP) address set and are connected to the network. These workstations will need to work with applications that are time sensitive. What must the system administrator configure for these applications to function correctly?

Configure the correct NTP settings.

Enable DHCP on the NIC.

Point to the correct DNS server.

Create a CNAME record.

A

Configure the correct NTP settings.

The Network Time Protocol (NTP) enables the synchronization of these time-dependent applications. Workstations that connect to these applications must know the correct time by pointing to the correct NTP IP address to synchronize time.

Enabling Dynamic Host Configuration Protocol (DHCP) will allow the workstation to get basic IP settings. There are DHCP options for NTP, but that must be setup on the DHCP server.

Configuring the correct IP setting on the workstation so its pointing to the correct Domain Name System (DNS) server will provide proper name resolution.

A Canonical Name (CNAME) record is used to represent an alias for a host. For example, the true name of a web server could be masked as the alias WEB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

1.6

A network administrator is working with the in-addr.arpa domain of the company’s Domain Name System (DNS) server. The admin creates a pointer (PTR) record for a server’s Internet Protocol (IP) address 10.60.100.21. Which of the following Enterprise network components is the administrator working with?

The reverse lookup zone

The IP exclusions

The IP helper

The MAC reservations

A

The reverse lookup zone

The reverse lookup zone is found in a special domain called in-addr.arpa of a Domain Name System (DNS) server. It contains PTR records to resolve IP addresses to name records (e.g. A record).

Internet Protocol (IP) exclusions is a feature of the Dynamic Host Configuration Protocol (DHCP) service. It excludes addresses from a DHCP pool that are used for static configuration of certain services in the same subnet range.

The IP helper refers to the DHCP relay configurations set on a router to forward DHCP requests to the appropriate DHCP server for processing.

Media Access Control (MAC) reservations or IP reservations are a mapping of a MAC address to a specific IP address within the DHCP server’s address pool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

1.7

A business with three different locations needs to share data between storage area networks at each site. This business has a strict budget they need to maintain while achieving this function. Which of the following options can link storage area networks without the need for expensive fiber-specific switches and adapters?

Fibre Channel

Software-defined network

East-West

Internet Small Computer Systems Interface (iSCSI)

A

Internet Small Computer Systems Interface (iSCSI)

The iSCSI can link Storage Area Networks (SANs) but is also seen as an alternative to Fibre Channel itself since it works over ordinary Ethernet network adapters and switches.

The purpose of a software-defined network is to make all parts of the network infrastructure accessible to automation and orchestration technologies.

Fibre Channel is the most popular high-bandwidth solution to connect SANs and the network administrator can configure them to work over Ethernet, but it is pricey.

East-West is a term to describe traffic that flows from server to server in a data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

1.7

An employee working from home uses a virtual private network (VPN) to access certain websites. To connect to the VPN, the employee needs to request access to a server. What kind of traffic is the employee’s request from the machine to the server?

North-South

East-West

Application layer

Control layer

A

North-South

The employee’s request from the machine to the server is North-South traffic since it is traffic going into the data center from the outside.

The control layer is the layer between the application layer and the infrastructure layer in software-defined networking. The software-defined network (SDN) controller provides the functionality of the control layer by communicating between SDN applications (“northbound” API) and infrastructure devices (“southbound” API).

East-West traffic is traffic traveling within a data center but not traveling into a data center.

The application layer is part of the infrastructure of software-defined networking. It applies the business logic that makes decisions about how to prioritize and secure traffic and where to switch the traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

1.7

Name the model typically used in spine and leaf topologies to connect distribution switches to server nodes and provide higher bandwidth than the typical workgroup switch.

Fibre Channel

Software-defined network

Top-of-rack switching

Core

A

Top-of-rack switching

Top-of-rack switching refers to the practice of using switches specifically made to provide high-bandwidth links between distribution switches and server nodes.

A software-defined network does not serve the purpose of connecting server nodes to distribution switches. The software-defined network makes all parts of the network infrastructure accessible to automation and orchestration technologies.

Fibre Channel (FC) connects storage area networks via fiber technologies, not server nodes and distribution switches. Fibre Channel involves three components: the initiator, the target, and the FC switch.

The core is a layer of the hierarchical network model that provides a highly available network backbone. This layer comprises connections between wide area network (WAN) routers/firewalls and layer 3 switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

1.7

A technology firm is opening a brick-and-mortar location and needs to determine if they can pay more for higher network speeds or if they need to sacrifice some speed to stay on budget. Which of the following options can the tech firm consider when designing the configuration of their data center?

Branch office vs. on-premises data center vs. colocation

Backbone

Software-defined network

Infrastructure layer

A

Branch office vs. on-premises data center vs. colocation

Branch office vs. on-premises data center vs. colocation are the different configurations a data center can design, and each has its pros and cons.

In this example, higher speeds at a colocated data center are the pro, but the higher expense is the con.

A software-defined network is not an option to design a data center.

The infrastructure layer is a layer of devices that handle the actual forwarding of traffic and imposition of ACLs and other policy configurations for security in software-defined networking.

Backbone describes parts of network topology, not an option to design a data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

1.7

A network technician is setting up a new office space by plugging in computers, printers, and telephones to workgroup switches via structured cabling and ports on the wall. What tier of the network hierarchy is the network technician plugging these devices?

Backbone

Access/edge

Control layer

Management plane

A

Access/edge

The access/edge layer allows end-user devices to connect to the network using cabling and wall ports for wired access and access points for wireless access.

User/end devices do not plug directly into the backbone.

User/end devices do not plug directly into the control layer. The functions of the control plane are implemented by a virtual device referred to as the SDN controller.

User/end devices do not plug directly into the management plane. The management plane interfaces with the operational plane and implements monitoring of traffic conditions and network status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

1.7

In a spine and leaf topology, there are two layers: the spine and the leaf. What do the top-tier switches in the spine layer comprise, even though neither link to one another?

Infrastructure layer

Control layer

Backbone

Access/edge

A

Backbone

The term backbone describes the links that aggregate and distribute traffic from multiple different areas in the network.

A virtual device, referred to as the Software-Defined Network (SDN) controller, implements the functions of the control plane.

An infrastructure layer is a group of devices that handle the actual forwarding of traffic and imposition of access control lists (ACLs) and other policy configurations for security.

Access/edge is where users and end devices plug into the network. This layer does not aggregate and distribute traffic from multiple different areas of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

1.7

What is a cost-effective way to connect a Storage Area Network (SAN)?

Fibre Channel over Ethernet (FCoE)

Software-defined network

Infrastructure layer

Fibre Channel

A

Fibre Channel over Ethernet (FCoE)

Fibre Channel over Ethernet (FCoE) is the standard that allows for mixed use of ethernet networks with both ordinary data and storage network traffic. FCoE delivers Fibre Channel packets over ethernet cabling and switches.

Fibre Channel is a high-speed network communications protocol used to implement SANs but is pricey since it requires fiber infrastructure.

The infrastructure layer is not a way to connect SANs. It contains devices that handle the actual forwarding of traffic and imposition of access control lists (ACLs) and other policy configurations for security in software-defined networking.

Software-defined networking enables all parts of the network infrastructure to be accessible for automation and orchestration technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

1.7

A network technician is troubleshooting failed Quality of Server (QoS) echo requests between a firewall and a Layer 3 switch. Which layer of the 3-tiered network hierarchy is the network technician troubleshooting?

Core

Infrastructure layer

Distribution/aggregation layer

Application layer

A

Distribution/aggregation layer

The distribution/aggregation layer provides fault-tolerant interconnections between different access blocks. This layer is often used to implement traffic policies, such as quality of service (QoS).

The application layer is not part of the three-tiered network hierarchy. It is part of a software-defined networking architecture that determines how to prioritize and secure traffic and where to switch the traffic.

Infrastructure layer is not part of Cisco’s design principle for the three-tiered network hierarchy. It contains devices that handle the actual forwarding of traffic and imposition of ACLs and other policy configurations for security in software-defined networking.

The core tier provides a high availability network backbone that has redundant traffic paths for data to continue to flow around the access and distribution layers of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

1.7

The T11 ANSI standard can be a particularly expensive way to connect a Storage Area Network (SAN) and involves three main types of components: the initiator, the target, and a director. What is the name of the standard described?

Fibre Channel

Internet Small Computer Systems Interface (iSCSI)

North-South

Application layer

A

Fibre Channel

The Fibre Channel connects storage area networks using 3 main types of components: the initiator, the target, and the Fibre Channel switch. The initiator is the client device of the SAN. The target is the network port for a storage device. The Fibre Channel switch, sometimes referred to as a director, provides the connections between the initiator and the target.

The application layer is part of the infrastructure of software-defined networking. It applies the business logic that makes decisions about how to prioritize and secure traffic and where to switch the traffic.

North-South describes data traveling into and out of a data center.

Internet Small Computer Systems Interface (iSCSI) does not require a Fibre Channel switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

1.7

A network designer is explaining the options a business owner has to manage his business’ network infrastructure. One option the business owner can choose will allow devices to provision and decommission quickly and to configure the devices via code in scripts. What is the term for the option described?

Software-defined network

Management plane

Backbone

Distribution/aggregation layer

A

Software-defined network

A software-defined network makes all parts of the network infrastructure accessible to automation and orchestration technologies.

The management plane sits at the same level as the control plane but is in place to monitor traffic conditions and the network status.

Backbone describes parts of a network topology, not a way to manage network infrastructure. While the backbone may provide the underlay for software-defined networking, its function is not to manage network infrastructure.

The distribution/aggregation layer provides fault-tolerant interconnections between different access blocks and either the core or other distribution blocks, but does not provide a way to manage network infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

1.7

A real estate agent is uploading photos of the latest listing onto the corporate website. Once the agent uploads the photos, they pass through multiple servers undergoing quality checks and sorting to ensure that they appear in the most relevant searches. What term best describes the passing of data from server to server?

East-West

North-South

Branch office vs. on-premises data center vs. colocation

Top-of-rack switching

A

East-West

East-West is a term to describe traffic that travels or flows between server to server in a data center.

North-South is a term to describe traffic that goes to and from a data center. In this scenario, the North-South traffic would be the process of uploading the photos by the real estate agent.

Branch office vs. on-premises data center vs. colocation represents options used when designing a data center.

A top-of-rack switching refers to the practice of using switches specifically made to provide high-bandwidth links between distribution switches and server nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

1.8

Management at an online retailer meet to discuss delivery options for an online shopping experience. IT proposes using a method where transactions take place in a cloud environment, but using a back-end locally. Which delivery model does IT suggest as a solution?

Hybrid

Private

Public

Community

A

Hybrid

A hybrid cloud solution uses a mix of multiple cloud delivery models. One approach is to only utilize cloud services when forecasted that private services will experience an increase in activity.

A private cloud infrastructure is one that is completely private to, and owned by, the organization.

A public (or multi-tenant) cloud solution is hosted by a third-party and shared with other subscribers. There are risks regarding performance and security.

A community cloud solution is where several organizations share the costs of either a hosted private or fully private cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

1.8

An organization decides to retire an internal email infrastructure based on Microsoft Exchange server technology. As a result, IT plans a migration to Microsoft Office 365. Based on IT’s plan, which cloud service type best identifies the upcoming implementation?

SaaS

PaaS

IaaS

Hybrid

A

SaaS

Software as a Service (SaaS) is a computing method that uses the cloud to provide application services to users. Office 365 is an example of SaaS.

Platform as a Service (PaaS) is a computing method that uses the cloud to provide any platform-type services. An Oracle database is an example of PaaS.

Infrastructure as a Service (IaaS) is a means of provisioning IT resources such as servers, load balancers, and storage area network (SAN) components.

Hybrid refers to a cloud computing solution that implements a combination of service types such as public, private, or community solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

1.8

Cloud offerings, such as Amazon’s Elastic Compute Cloud and Microsoft’s Azure Virtual Machines, are examples of what type of service?

Infrastructure

Platform

Software

Virtual

A

Infrastructure

Infrastructure as a Service (IaaS) is a means of provisioning IT resources such as servers, load balancers, and storage area network (SAN) components quickly. Examples include Amazon’s Elastic Compute Cloud and Microsoft’s Azure Virtual Machines.

Software as a Service (SaaS) is a computing method that uses the cloud to provide application services to users. An example is Microsoft Office 365.

Platform as a Service (PaaS) provides resources between SaaS and IaaS. It may include servers and storage network infrastructure but with a multi-tier web application/database platform on top. An example is Microsoft Azure SQL Database.

A virtual service is a term used for virtual infrastructure such as VMware’s vSphere (e.g. ESXi). Virtual infrastructure by itself is not a cloud service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

1.8

An organization moving to a cloud infrastructure joins one of its partners’ platforms. Evaluate the given statements and conclude which best fits the organization’s approach.

Shared costs

Utilization benefits

Multi-tenant use

Private link

A

Shared costs

A community cloud solution is where several organizations share the costs of either a hosted private or fully private cloud.

A hybrid cloud solution uses a mix of multiple cloud delivery models. One approach is to only utilize cloud services when it forecasts that private services will experience an increase in activity.

A public (or multi-tenant) cloud solution is hosted by a third-party and shared with other subscribers. There are risks regarding performance and security.

Co-location within a data center offers a higher bandwidth solution by providing a direct or private link. The customer establishes infrastructure within a data center supported by the cloud provider or provisions a direct link from an enterprise network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

1.8

An organization considers moving some internal services to the cloud. Which of the following descriptions relates to a hybrid cloud infrastructure?

Utilization benefits

Shared costs

Multi-tenant use

Third-party secure

A

Utilization benefits

A hybrid cloud solution uses a mix of multiple cloud delivery models. One approach is to only utilize cloud services when it forecasts that private services will experience an increase in activity.

A community cloud solution is where several organizations share the costs of either a hosted private or fully private cloud.

A public (or multi-tenant) cloud solution is hosted by a third-party and shared with other subscribers. There are risks regarding performance and security.

A hosted private cloud solution is hosted by a third-party for the exclusive use of the organization. This is more secure and can guarantee a better level of performance than a public cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

1.8

A company uses several Windows Servers for Active Directory, SQL Server, RADIUS, DHCP, and DNS. Management pushes to move to the cloud. IT suggests moving services in a staggered fashion as to not cause disruption. IT moves SQL server instances to the cloud as a start. IT migrates this specific function to which of the following service types?

PaaS

IaaS

SaaS

Hybrid

A

PaaS

Platform as a Service (PaaS) is a computing method that uses the cloud to provide any platform-type services. A SQL database is an example of PaaS.

Software as a Service (SaaS) is a computing method that uses the cloud to provide application services to users. Office 365 is an example of SaaS.

Infrastructure as a Service (IaaS) is a means of provisioning IT resources such as servers, load balancers, and storage area network (SAN) components.

Hybrid refers to a cloud computing solution that implements a combination of delivery models such as public, private, or a community solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

1.8

Which of the following relates to a private hosted cloud delivery model?

Exclusively secure

Utilization benefits

Multi-tenant use

Shared costs

A

Exclusively secure

A hosted private cloud solution is hosted by a third-party for the exclusive use of the organization. This is more secure and can guarantee a better level of performance than a public cloud.

A hybrid cloud solution uses a mix of multiple cloud delivery models. One approach is to only utilize cloud services when it forecasts that private services will experience an increase in activity.

A public (or multi-tenant) cloud solution is hosted by a third-party and shared with other subscribers. There are risks regarding performance and security.

A community cloud solution is where several organizations share the costs of either a hosted private or fully private cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

1.8

An organization looks to implement a solution where remote workers can access both cloud-based resources and on-premise data. Some users will use company-issued laptops, while others will use personally owned desktop computers. Which solution does the IT department deploy?

A virtual private network

A desktop as a service environment

A hybrid cloud

A multitenancy environment

A

A virtual private network

A virtual private network (VPN) uses a secure tunnel created between two endpoints across a network. A VPN would satisfy the organization’s need to access cloud apps and on-premise data.

Desktop as a Service (DaaS) is a means of provisioning virtual desktop infrastructure (VDI) as a cloud service. VDI allows a client browser to operate an OS desktop plus software apps.

A hybrid cloud solution uses a mix of multiple cloud delivery models. Mixing private and public models is known as a hybrid.

Cloud service providers (CSPs) offer multitenant services to multiple cloud consumers. As a shared resource, there are risks regarding performance and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

1.8

A cloud implementation for a growing business requires additional processing power. How will an engineer provide additional resources in real-time?

Implementing elasticity

Implementing scalability

Implementing a private direct-connect to the CSP

Implementing orchestration

A

Implementing elasticity

Elasticity refers to a system’s ability to handle changes on-demand in real-time. A system with high elasticity will not experience loss of service or performance if demand increases.

Adding nodes (horizontal/scaling out) or adding resources to each node (vertical/scaling up) can achieve scalability. This does not occur in real-time.

Colocation within a data center offers a higher bandwidth solution to the cloud by providing a direct or private link to a customer’s on-premise network.

Orchestration performs a sequence of automated tasks, such as creating a virtual server. In doing so, the orchestrated steps would have to run numerous automated scripts or API service calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

1.8

Which of the following descriptions relates to a public cloud infrastructure?

Multi-tenant use

Shared costs

Co-location

Third-party secure

A

Multi-tenant use

A public (or multi-tenant) cloud solution is hosted by a third-party and shared with other subscribers. There are risks regarding performance and security.

A community cloud solution is where several organizations share the costs of either a hosted private or fully private cloud.

Co-location within a data center offers a higher bandwidth solution by providing a direct or private link. The customer establishes infrastructure within a data center supported by the cloud provider or provisions a direct link from an enterprise network.

A hosted private cloud solution is hosted by a third-party for the exclusive use of the organization. This is more secure and can guarantee a better level of performance than a public cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

1.8

IT implements Google Suite for Business at a large firm. This implementation negates the need to install any local applications. Considering the implementation, which type of cloud service does IT deploy?

PaaS

SaaS

Hybrid

IaaS

A

SaaS

Software as a Service (SaaS) is a computing method that uses the cloud to provide application services to users. Office 365 is an example of SaaS.

Platform as a Service (PaaS) is a computing method that uses the cloud to provide any platform-type services. An Oracle database is an example of PaaS.

Infrastructure as a Service (IaaS) is a means of provisioning IT resources such as servers, load balancers, and storage area network (SAN) components.

Hybrid refers to a cloud computing solution that implements a combination of service types such as public, private, or community solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

1.8

IT engineers from partner organizations plan a cloud infrastructure. After considering the available delivery models, engineers decide to migrate and use a community model. Evaluate the given statements and conclude which best fits the model’s approach.

Shared costs

Multi-tenant use

Private link

Utilization benefits

A

Shared costs

A community cloud solution is where several organizations share the costs of either a hosted private or fully private cloud.

A hybrid cloud solution uses a mix of multiple cloud delivery models. One approach is to only utilize cloud services when it forecasts that private services will experience an increase in activity.

A public (or multi-tenant) cloud solution is hosted by a third-party and shared with other subscribers. There are risks regarding performance and security.

Co-location within a data center offers a higher bandwidth solution by providing a direct or private link. The customer establishes infrastructure within a data center supported by the cloud provider or provisions a direct link from an enterprise network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

2.1

A company updates an Internet use policy for employees to follow. In addition, a server engineer deploys a forward web proxy server onto the network to safeguard and enhance Internet web browsing. What functional features is this particular proxy server setup providing for employees? (Select all that apply.)

Caching engine

Access control list

Traffic filtering

Load balancing

A

Caching engine, Traffic filtering

A forwarding proxy server provides for protocol-specific outbound traffic. Most web proxy servers provide caching engines for frequently visited websites.

A multipurpose proxy is one configured with filters for multiple protocol types, such as HyperText Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP).

A load balancer is a hardware appliance or software instance that distributes incoming client requests across a farm or pool server nodes.

A firewall uses Access Control Lists (ACLS) to implement the principle of least access that only allows the minimum amount of traffic required to operate valid network services and no more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

2.1

A typical private network may have a router separating the internal network from the public network (Internet). The router may have a single IP interface to the public network but multiple interfaces connected to multiple internal subnets. How would a network administrator describe these different internal subnets?

Each subnet is a broadcast domain.

Each subnet is a collision domain.

Each subnet has a DSL modem.

Each subnet has a single trunk uplink.

A

Each subnet is a broadcast domain.

Each subnet is a separate broadcast domain which allows all nodes in that subnet to communicate with each other but must go through the router to communicate with another subnet or broadcast domain.

Each network node connected to the same media, like a hub, is in the same collision domain. For this reason, network administrators use switches instead.

Digital subscriber line (DSL) is a technology for transferring data over voice-grade telephone lines. This is commonly used for an Internet service provider (ISP) and connected to the perimeter router.

A subnet with one or more switches may connect multiple trunk uplinks to the router to carry all the VLAN-to-VLAN routed traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

2.1

A company uses multiple redundant paths on the internal network to reduce network latency. A firewall in the demilitarized zone with multiple network interfaces can systematically route traffic to these internal paths depending on bandwidth and other network policies. Considering the incoming Internet traffic, what other purpose does this firewall serve as?

Unselected
Proxy server

Unselected
Content filter

Unselected
VPN headend

Unselected
Load balancer

A

Load balancer

A load balancer can switch traffic to alternative nodes, reduce bottlenecks, and allow for failover services. In this case, the network engineer redirects specific traffic to take advantage of available bandwidth.

The network engineer would use a proxy server as an intermediary for network access, such as Internet access. A proxy can control what a system can or cannot connect to.

Content filtering is a feature found in security appliances such as firewalls. The filter can block websites based on criteria such as topic categorization.

A virtual private network (VPN headend) refers to the VPN router at a primary site responsible for aggregating high traffic volumes of remote sites connected via VPN in a hub and spoke topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

2.1

A company implements a new Voice over Internet Protocol (VoIP) phone system with networked VoIP endpoints at some office desks as a pilot program. The other employees will still be working with analog phone services. How would a network administrator connect this new VoIP system with the existing analog phone system?

Unselected
Voice gateway

Unselected
VoIP PBX

Unselected
Cable modem

Unselected
Legacy PBX

A

Voice gateway

A voice gateway is a means of translating between a VoIP system and legacy voice equipment and networks. This gateway can include an integrated VoIP PBX feature as well.

A legacy Private Branch Exchange (PBX) system is based on the traditional telephone network and provides switch services for analog voice.

A VoIP PBX by itself provides digital switching of the VoIP system that includes its VoIP endpoints. The VoIP PBX must connect to a voice or VoIP gateway to connect back to the external voice provider, especially an analog service.

A cable modem is a device with RJ-45 ports that connect to the local network, while the coax port connects to the service provider network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

2.1

A network administrator needs to provide remote workers access to internal messaging servers but cannot do internal service at the perimeter network. What can the network administrator deploy to listen for client requests from the Internet and create the appropriate request to the internal messaging server?

Unselected
Voice gateway

Unselected
Forward web proxy

Unselected
Intrusion prevention system

Unselected
Reverse proxy

A

Reverse proxy

A reverse proxy server provides for protocol-specific inbound traffic. This type of proxy can listen for client requests from the Internet and create the appropriate request to the internal server.

A voice gateway is a means of translating between a VoIP system and legacy voice equipment and networks, such as Plain Old Telephone Service (POTS) lines and handsets.

A forwarding proxy server provides for protocol-specific outbound traffic. A web proxy must be able to parse and modify HTTP and HTTPS commands.

An intrusion prevention system (IPS) can deploy as hardware or software to provide an active response after analyzing possible network threats that match signature patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

2.1

After a device failure, a network engineer replaces a layer 2 device on a network. Which device does the engineer replace to restore layer 2 functionality?

Unselected
DSL modem

Unselected
Switch

Unselected
Hub

Unselected
Router

A

Switch

A switch is a layer 2 device. Switches can handle traffic based on a node’s physical address, which is also known as a Media Access Control (MAC) address.

A router is a hardware appliance or application that connects different networks/subnets for communication purposes but keeps them as separate networks. A router is a layer 3 device.

A Digital Subscriber Line (DSL) modem is a device used to send and receive data over voice-grade telephone lines, often referred to as the local loop.

A hub (also known as a dumb device) connects computers to a network in a star configuration. A hub lacks the features contained in a switch but can be used to connect devices in a local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

2.1

A branch office has an account with a local Internet Service Provider (ISP) for downlink speeds of about 30 megabits per second (Mbps). The ISP provided a device to set up at the office to connect to the Internet. What type of device does the office’s network administrator need to set up?

Unselected
Cable modem

Unselected
Layer 3 switch

Unselected
VPN headend

Unselected
DSL modem

A

Cable modem

A cable modem is a device with RJ-45 ports that connect to the local network, while the coax port connects to the ISP network. Cable network based on the Data Over Cable Service Interface Specification (DOCSIS) supports downlink speeds of up to 38 Mbps in North America.

Digital subscriber line (DSL) is a technology for transferring data over voice-grade telephone lines.

A layer 3 capable switch is a standard switch optimized for routing between virtual LANs (VLANs).

A virtual private network (VPN headend) refers to the VPN router at a primary site responsible for aggregating high traffic volumes of remote sites connected via VPN in a hub and spoke topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

2.1

Which of the following devices operates similarly to a multiport repeater?

Unselected
Edge router

Unselected
Bridge

Unselected
Hub

Unselected
Cable modem

A

Hub

A hub acts similar to a multiport repeater so that every port receives transmissions sent from any other port. As a repeater, the hub works only at the Physical layer.

A bridge works at the data link layer (layer 2) to establish separate physical network segments while keeping all nodes in the same logical network.

Edge routers, placed at the network perimeter, are typified by distinguishing external (Internet-facing) and internal interfaces. These routers can perform framing to repackage data from the private LAN frame format to the WAN Internet access frame format.

A cable modem is a device with RJ-45 ports that connect to the local network, while the coax port connects to the service provider network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

2.1

Which device transfers data over voice-grade telephone lines?

Unselected
Cable modem

Unselected
DSL modem

Unselected
Hub

Unselected
Edge router

A

DSL modem

Digital subscriber line (DSL) is a technology for transferring data over voice-grade telephone lines. The DSL modem connects to the supporting ISP.

A cable modem is a device with RJ-45 ports that connect to the local network, while the coax port connects to the ISP network; this transfers data over coax cables.

A hub is a layer 1 device that operates at the physical layer. A hub is a multiport repeater deployed as the central point of connection for nodes.

A router is a layer 3 device. An edge router is placed at the network perimeter to repackage data from the private LAN frame to the WAN Internet access frame format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

2.1

A company policy mandates establishing a proxy server for Internet use. An IT engineer responsible for the deployment, chooses a transparent approach to reduce configuration efforts. Considering how the IT engineer establishes the proxy server, what does a transparent configuration type utilize?

Unselected
Client port configuration

Unselected
Inline network appliance

Unselected
Mapping of IP to MAC addresses

Unselected
Content filtering

A

Inline network appliance

A transparent proxy intercepts client traffic without the client being configured. A transparent proxy must be implemented on a switch or router or other inline network appliance.

A nontransparent proxy means that the client must be configured with the proxy server address and port number to use it. The port on the proxy server is often configured as port 8080.

Web proxies are often described as web security gateways as they prevent incoming malware from the Internet, block spam, and restrict browsing to only authorized sites.

A mapping of Internet Protocol (IP) to Media Access Control (MAC) addresses is a function of a layer 3 switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

2.1

A wireless router commonly mounted on an office ceiling is widely known as which of the following devices?

Unselected
DSL modem

Unselected
Access point

Unselected
Bridge

Unselected
HVAC sensor

A

Access point

A wireless router is also known as an access point (AP). These types of omnidirectional devices are commonly mounted on the ceiling for maximum range.

Digital subscriber line (DSL) is a technology for transferring data over voice-grade telephone lines. A DSL modem is commonly used to connect customers to an Internet service provider (ISP).

Heat, ventilation, and air conditioning (HVAC) sensors are network-based devices that monitor various sensors for an office or building.

A bridge works at the data link layer (layer 2) to establish separate physical network segments while keeping all nodes in the same logical network.

142
Q

2.1

A department in an organization asks a systems administrator to set up a small network for a test project that consists of five computers. The admin searches the storage for a spare device to make the connection. Considering the functionality of network connectivity devices, which options can independently satisfy the requirement?

Unselected
Switch

Unselected
Router

Unselected
Firewall

Unselected
Bridge

A

Switch

A switch is a layer 2 device. Switches can handle traffic based on a node’s physical address (also known as a Media Access Control (MAC) address). A switch is useful in this scenario.

Firewalls are principally used to implement security zones, such as intranet, screened subnet topology, and Internet.

A router is a hardware appliance or application that connects different networks for communication purposes but keeps them separate. A router is a layer 3 device and communication between networks is done with routing tables.

A bridge is an appliance or application that connects different networks as if they were one.

143
Q

2.1

Which of the following systems provide an active response to network threats that match signature patterns?

Unselected
IPS

Unselected
VPN headend

Unselected
IDS

Unselected
SCADA

A

IPS

An intrusion prevention system (IPS) can deploy as hardware or software to provide an active response after analyzing possible network threats that match signature patterns.

Intrusion Detection System (IDS) is like an IPS but provides a passive response to detected network threats using alerts such as notifications or e-mails.

A supervisory control and data acquisition (SCADA) system runs as software on ordinary computers to gather data and manage plant devices and equipment with embedded PLCs, called field devices.

A virtual private network (VPN headend) refers to the VPN router at a primary site responsible for aggregating high traffic volumes of remote sites connected via VPN in a hub and spoke topology.

144
Q

2.1

Which of the following works directly with programmable logical controllers (PLCs) in an industrial complex?

Unselected
Smart refrigerators

Unselected
SCADA

Unselected
Smart speakers

Unselected
Wireless printers

A

SCADA

A supervisory control and data acquisition (SCADA) system runs as software on ordinary computers to gather data and manage plant devices and equipment with embedded PLCs, referred to as field devices.

A smart refrigerator is considered an Internet of Things (IoT) endpoint device that is networked and managed remotely. Most smart devices use a Linux or Android kernel.

A network printer, connected via Ethernet cable or Wi-Fi connection, can be managed remotely. Users can even print to these types of printers directly from a smartphone.

A smart speaker is considered an IoT endpoint device that the user can manage remotely via Ethernet or Wi-Fi connection.

145
Q

2.1

A user requests that the company’s voicemail system is accessible by a computer. Which of the following options does an IT technician configure?

Unselected
Switch

Unselected
Media converter

Unselected
VoIP endpoint

Unselected
Bridge

A

VoIP endpoint

A VoIP (Voice over Internet Protocol) endpoint is a phone system component that can be implemented as software running on a computer or smartphone, or as a dedicated traditional handset.

A bridge is an appliance or application that connects different networks as if they were one network.

A switch is a layer 2 device. Switches can handle traffic based on a node’s physical address, also known as a Media Access Control (MAC) address.

Media converters are layer 1 devices and are used to convert one cable type to another. These components alter the characteristics of one type of cable to match those of another.

146
Q

2.1

HVAC sensors are Internet of Things (IoT) devices that provide monitoring of what type of data? (Select all that apply.)

Unselected
Humidity

Unselected
Power

Unselected
Temperature

Unselected
Ventilation

A

Humidity, Temperature, Ventilation

Heating, Ventilation, Air Conditioning (HVAC) sensors are Internet of Things (IoT) devices that monitor environmental controls. For example, one environmental control involves temperature to determine how hot or cold an office, rack enclosure, or building is.

HVAC sensors also monitor ventilation to determine if fresh air moves into the space to reduce moisture levels and mold build-up.

HVAC sensors also use moisture detention to measure humidity. This is a useful monitoring tool to determine moisture in a rack enclosure to help prevent static electricity in the air.

HVAC sensors do not monitor power. However, if available, smart power distribution units (PDUs) can provide powerful information to a central power monitoring software.

147
Q

2.1

An engineer configures a wireless distribution system (WDS) in bridged mode. As a result, which of the statements are true regarding access point functionality?

Unselected
Access point functionality works in repeater mode only.

Unselected
In bridged mode, access point functionality does not centralize wireless management.

Unselected
Access point functionality only assigns distribution systems to a single access point.

Unselected
In bridged mode, access point functionality does not support wireless clients.

A

In bridged mode, access point functionality does not support wireless clients.

A wireless distribution system (WDS) can bridge two separate cabled segments. When WDS is in bridge mode, the access points (AP) will not support wireless clients.

Wireless networks expand using devices called wireless range extenders (WREs), which are lightweight APs functioning in repeater mode only.

A wireless LAN controller is a hardware device or software application which can be run on a server or workstation to centralize the management function of a wireless network.

A wireless distribution system (WDS) can be configured via multiple access points to cover a larger area. As with configuring extenders, the access points (AP) must be set to use the same parameters.

148
Q

2.1

Which of the following devices is a layer 3 networking device?

Unselected
Hub

Unselected
Edge router

Unselected
Switch

Unselected
Repeater

A

Edge router

A router is a layer 3 device. An edge router is placed at the network perimeter to repackage data from the private LAN frame to the WAN Internet access frame format.

A switch is a layer 2 device. It is responsible for transferring data between nodes on the same logical segment.

A hub is a layer 1 device that operates at the physical layer. A hub is a multiport repeater deployed as the central point of connection for nodes.

A repeater is a layer 1 device. It is a device that amplifies an electronic signal to extend the maximum allowable distance for a media type.

149
Q

2.1

A network administrator needs to set up a circuit-level stateful inspection of traffic coming in and out of a specific segment of the network. What type of device should the network administrator use in this case?

Unselected
Firewall

Unselected
Switch

Unselected
Bridge

Unselected
Router

A

Firewall

A stateful firewall operates at Layer 5 (Session) of the Open Systems Interconnection (OSI) model. This type of firewall performs circuit-level stateful inspection by maintaining stateful information about the session between two hosts.

A router is a hardware appliance or application that connects different networks/subnets for communication purposes but keeps them as separate networks. A router is a layer 3 device.

A switch is a layer 2 device. Switches can handle traffic based on a node’s physical address. It is also known as a Media Access Control (MAC) address.

A bridge is an appliance or intermediate system that joins physical network segments while minimizing the performance reduction of having more nodes on the same network.

150
Q

2.1

Which of the following security options would require the use of a smart badge to gain access to a rack enclosure full of rack-mounted servers and storage appliances?

Unselected
Smart locks

Unselected
IDS

Unselected
Locking cabinets

Unselected
CCTV

A

Smart locks

A smart locker is a cabinet that supports unlocking via a smart card/badge or biometric. Lockers may also have built-in monitoring and surveillance to alert an administrator when a person adds or removes an item.

Lockable cabinets or safes can provide secure storage for individual items, such as media with cryptographic keys or shared password lists.

Closed-Caption Television (CCTV) provides security monitoring to a specific area, including a data center with rack enclosures.

An Intrusion Detection System (IDS) is a system that can deploy as a hardware appliance or software application. An IDS performs real-time analysis of either network traffic or system and application logs.

151
Q

2.1

A network engineer is designing a network layout on a college campus that will connect multiple buildings over long ranges. How would the engineer connect the physical backbone of the buildings into one wide-area network?

Unselected
Install VoIP endpoints

Unselected
Install network bridges

Unselected
Install repeaters

Unselected
Install access points

A

Install repeaters

A repeater overcomes the distance limitation by boosting the signal at some point along the cable run. Repeaters are available for copper and fiber links, with the latter as an optical-electrical-optical (OEO) repeater.

An access point mediates communications between wireless stations, and it can also provide a bridge to a cabled network segment.

A bridge is an appliance or application that connects different networks (subnets) and treats them as one network.

A VoIP (Voice over Internet Protocol) endpoint is a phone system component that the network engineer can implement as software running on a computer or smartphone or a dedicated traditional handset.

152
Q

2.1

A user submits a request to the IT support team to enable a voice message functionality so that missed calls can leave saved messages. Which system does the engineer use to enable the user’s request successfully?

Unselected
VoIP gateway

Unselected
Media converter

Unselected
Cable modem

Unselected
VoIP PBX

A

VoIP PBX

A Voice over Internet Protocol (VoIP) Private Branch Exchange (PBX) is the core switch that controls all functions found in a VoIP system.

A voice gateway is a means of translating between a VoIP system and legacy voice equipment and networks, such as Plain Old Telephone Service (POTS) lines and handsets.

The cable modem is interfaced to a computer or router through an Ethernet or USB adapter and with the access provider’s network by a short segment of coax that eventually routes to a cable service provider for Internet service.

A media converter is a device that converts one media signaling type to another. It can also convert fiber to twisted pair cables and vice versa.

153
Q

2.1

Office desktop computers and Voice over Internet Protocol (VoIP) phones will most likely connect to this network device to communicate with other systems over the Local Area Network (LAN).

Unselected
SCADA system

Unselected
Wireless LAN controller

Unselected
Layer 3 switch

Unselected
Access point

A

Layer 3 switch

A layer 3 capable switch is a standard switch optimized for routing between Virtual LANs (VLANs). This will allow office computers and VoIP phones to connect directly for network connection and even power if the switch supports Power over Ethernet (PoE).

An Access Point (AP) or wireless router may be appropriate for most desktop computers but are not common for VoIP phones.

A wireless LAN controller is a hardware device or software application run on a server or workstation to centralize the management function of a wireless network.

A supervisory control and data acquisition (SCADA) system gathers data and manages plant devices and equipment with field devices.

154
Q

2.1

Which of the following are networked devices that will provide security monitoring of an office perimeter against unauthorized access? (Select all that apply.)

Unselected
IP cameras

Unselected
HVAC sensors

Unselected
Smart doorbells

Unselected
Smart thermostat

A

IP cameras, Smart doorbells

An Internet protocol (IP) camera is a networked device that can provide security monitoring of an office perimeter. Closed-caption Television (CCTV) networks are commonly set up with coax.

A smart doorbell is considered an Internet of Things (IoT) device that can monitor people coming to an office door and alert office users of a visitor at the door.

Heat, ventilation, and air conditioning (HVAC) sensors are network-based devices that monitor an office or building, but not for human threats related to actions such as unauthorized access.

A smart thermostat is a networked device that can manually control an office or room temperature or through automation.

155
Q

2.1

A company implements a new Voice over Internet Protocol (VoIP) phone system with networked VoIP endpoints at some office desks as a pilot program. The other employees will still be working with analog phone services. How would a network administrator connect this new VoIP system with the existing analog phone system?

Unselected
Cable modem

Unselected
VoIP PBX

Unselected
Voice gateway

Unselected
Legacy PBX

A

Voice gateway

A voice gateway is a means of translating between a VoIP system and legacy voice equipment and networks. This gateway can include an integrated VoIP PBX feature as well.

A legacy Private Branch Exchange (PBX) system is based on the traditional telephone network and provides switch services for analog voice.

A VoIP PBX by itself provides digital switching of the VoIP system that includes its VoIP endpoints. The VoIP PBX must connect to a voice or VoIP gateway to connect back to the external voice provider, especially an analog service.

A cable modem is a device with RJ-45 ports that connect to the local network, while the coax port connects to the service provider network.

156
Q

2.1

A systems administrator deploys a proxy server for an organization. The administrator chooses to use a transparent approach to the configuration. Considering how the systems administrator deploys the proxy server, what does this configuration type utilize?

Unselected
Inline network appliance

Unselected
Client port configuration

Unselected
Content filtering

Unselected
Mapping of IP to MAC addresses

A

Inline network appliance

A transparent proxy intercepts client traffic without the client being configured. A transparent proxy must be implemented on a switch or router or other inline network appliance.

A nontransparent proxy means that the client must be configured with the proxy server address and port number to use it. The port on the proxy server is often configured as port 8080.

Web proxies are often described as web security gateways as they prevent incoming malware from the Internet, block spam, and restrict browsing to only authorized sites.

A mapping of Internet Protocol (IP) to Media Access Control (MAC) addresses is a function of a layer 3 switch.

157
Q

2.1

An engineer troubleshoots a wireless access point. IT does not function as expected. The engineer learns that the configuration is set for bridged mode to cabled segments. Based on the configuration type, which choice describes the access point’s configuration limitation?

Unselected
Access point functionality works in repeater mode only.

Unselected
In bridged mode, access point functionality does not support wireless clients.

Unselected
In bridged mode, access point functionality does not centralize wireless management.

Unselected
Access point functionality only assigns distribution systems to a single access point.

A

In bridged mode, access point functionality does not support wireless clients.

A wireless distribution system (WDS) can bridge two separate cabled segments. When WDS is in bridge mode, the access points (AP) will not support wireless clients.

Wireless networks expand using devices called wireless range extenders (WREs), which are lightweight APs functioning in repeater mode only.

A wireless LAN controller is a hardware device or software application which can be run on a server or workstation to centralize the management function of a wireless network.

A wireless distribution system (WDS) can be configured via multiple access points to cover a larger area. As with configuring extenders, the access points (AP) must be set to use the same parameters.

158
Q

2.1

Users report that connectivity does not work in a specific part of the building. An IT engineer responds by reconfiguring repeater frequencies, so they match. Which of the following does the engineer troubleshoot and configure to restore connectivity?

Unselected
Access points

Unselected
Repeaters

Unselected
Network bridges

Unselected
VoIP endpoints

A

Repeaters

A repeater overcomes the distance limitation by boosting the signal at some point along the cable run. Repeaters are available for copper and fiber links, with the latter as an optical-electrical-optical (OEO) repeater.

An access point mediates communications between wireless stations, and it can also provide a bridge to a cabled network segment.

A bridge is an appliance or application that connects different networks (subnets) and treats them as one network.

A VoIP (Voice over Internet Protocol) endpoint is a phone system component that an IT engineer can implement as software running on a computer or smartphone or a dedicated traditional handset.

159
Q

2.1

A user reports that the phone software installed on a PC does not seem to be working. An engineer determines that the user’s handset is not functioning correctly as well. The engineer investigates which of the following options to remedy the issue?

Unselected
VoIP endpoint

Unselected
Bridge

Unselected
Switch

Unselected
Media converter

A

VoIP endpoint

A VoIP (Voice over Internet Protocol) endpoint is a phone system component that can be implemented as software running on a computer or smartphone, or as a dedicated traditional handset.

A bridge is an appliance or application that connects different networks as if they were one network.

A switch is a layer 2 device. Switches can handle traffic based on a node’s physical address, also known as a Media Access Control (MAC) address.

Media converters are layer 1 devices and are used to convert one cable type to another. These components alter the characteristics of one type of cable to match those of another.

160
Q

2.2

A network contractor is reviewing the algorithms used for path selection. The algorithms categorize according to the topology and metrics used to build and update a routing information base. It also prioritizes optimal or least-cost paths. What algorithm uses the number of hops to determine the destination as a metric?

Unselected
Distance vector

Unselected
Routing information protocol

Unselected
Hybrid routing protocol

Unselected
Static route

A

Distance vector

Distance vector protocols use the number of hops to the destination as the metric. The route with the fewest hops is the least-cost path, and the network will select it for use.

Static routes configure as non-persistent or persistent/permanent. A non-persistent route is removed from the routing table if the router gets rebooted.

The routing information protocol (RIP) is a distance vector routing protocol. RIP only considers a single piece of information about the network topology—the next hop router to reach a given network or subnet (vector).

Hybrid Routing Protocol is an advanced distance vector comprised of two elements: bandwidth and delay.

161
Q

2.2

A network uses a dynamic routing protocol that requires the administrator to provide weighted elements such as reliability, bandwidth and load. Which routing protocol is in use?

Unselected
Open Shortest Path First (OSPF)

Unselected
Border Gateway Protocol (BGP)

Unselected
Enhanced Interior Gateway Routing Protocol (EIGRP)

Unselected
Routing Information Protocol (RIP)

A

Enhanced Interior Gateway Routing Protocol (EIGRP)

The Enhanced Interior Gateway Routing Protocol (EIGRP) is a distance vector-based routing protocol and uses a metric composed of several administrator weighted elements.

The Open Shortest Path First (OSPF) protocol is suited to large organizations with multiple redundant paths between networks. It has high convergence performance and was designed for the outset to support classless addressing.

Routing Information Protocol (RIP) is a distance vector-based routing protocol. It uses a hop count metric to determine the distance to the destination network.

The Border Gateway Protocol (BGP) is designed to be used between routing domains and is used as the routing protocol on the Internet, primarily between Internet Service Providers (ISPs).

162
Q

2.2

The company’s office building has the network segmented into different areas based on floor level. The network architect is working on building a hierarchical routing network to take advantage of multiple redundant paths between each network segment. Which routing protocol will the architect most likely implement in this network?

Unselected
OSPF

Unselected
EIGRP

Unselected
BGP

Unselected
RIP

A

OSPF

Open Shortest Path First (OSPF) is a link state type of routing protocol ideal for hierarchical systems and networks. OSPF is suitable for organizations with multiple redundant paths between networks.

Routing Information Protocol (RIP) is a distance vector routing protocol. RIP only considers the next hop router to reach a given network or subnet (vector).

Enhanced Interior Gateway Routing Protocol (EIGRP) is a distance vector or hybrid routing protocol. It relies on neighboring routers to report paths to remote networks and uses a metric composed of administrator-weighted elements.

The Border Gateway Protocol (BGP) is a patch vector routing protocol used between routing domains in a mesh internetwork.

163
Q

2.2

A network administrator made recommendations to an organization to implement Quality of Services (QoS) features for video conferencing rooms and data networks. However, the operations manager was unsure of its benefit. How would the network administrator describe QoS to the manager? (Select all that apply.)

Unselected
The service is basically a traffic shaper.

Unselected
The management plane creates static routes.

Unselected
The data plane handles the switching of traffic.

Unselected
The control plane decides how to prioritize traffic.

A

The data plane handles the switching of traffic,

The service is basically a traffic shaper,

The control plane decides how to prioritize traffic.

In terms of QoS, network functions divide into three planes. The control plane makes decisions about how to prioritize traffic and where it should switch them.

The data plane handles the actual switching of traffic. This basically forwards packets through the router to their destination.

Protocols, appliances, and software that can apply these three functions are known as traffic shapers or bandwidth shapers. Traffic shapers delay certain packet types—based on their content—to ensure that other packets have a higher priority.

The management plane monitors traffic conditions. As conditions change, changes occur at the control and data plane level to prioritize data, such as video over data during video conference meetings.

164
Q

2.2

A company invited an IT Consulting company to recommend network changes in an office building that will feature multiple teleconferencing rooms and open space for public Internet access. This is a shared office space for new small businesses. What benefits of the Quality of Service (QoS) protocol could the IT consulting company share to improve the building’s network performance, especially for video conferences? (Select all that apply.)

Unselected
The service is basically a traffic shaper.

Unselected
The management plane creates static routes.

Unselected
The control plane decides how to prioritize traffic.

Unselected
The data plane handles the switching of traffic.

A

The data plane handles the switching of traffic,

The service is basically a traffic shaper,

The control plane decides how to prioritize traffic.

Protocols, appliances, and software that can apply these three functions are known as traffic shapers or bandwidth shapers. Traffic shapers delay certain packet types—based on their content—to ensure that other packets have a higher priority.

In terms of QoS, network functions divide into three planes. The control plane makes decisions about how to prioritize traffic and where it should switch them.

The data plane handles the actual switching of traffic. This basically forwards packets through the router to their destination.

165
Q

2.2

A new network administrator in the lab is not able to get a server from one subnet talking to another server in a different subnet. Unsure about the multiple routes configured on the layer 3 switches, the administrator decides to do rapid troubleshooting to at least get the two servers communicating with each other. What should the network administrator configure to fix the network issues?

Unselected
Configure a static route

Unselected
Configure the interior gateway protocol

Unselected
Configure a default route

Unselected
Configure the exterior gateway protocol

A

Configure a static route

A static route is manually added to the routing table and only changes if edited by the administrator. This is ideal for temporary solutions to rapidly set up a route for network testing or quick troubleshooting.

A default route is a type of static route that identifies the next hop router for a destination and cannot match another routing table entry.

Addresses 0.0.0.0/0 (IPv4) or ::/0 (IPv6) represent the default route.

A network under the administrative control of a single owner is known as an autonomous system (AS). An Interior Gateway Protocol (IGP) is a protocol that identifies routes within an AS.

An Exterior Gateway Protocol (EGP) is a protocol that advertises routes between autonomous systems.

166
Q

2.2

A lab network has different routers to mimic a wide area production network. The lab has the network segmented into sections, such as development, staging, and pre-production. By default, if the router specifies a static route, then that route gets which administrative distance value?

Unselected
110

Unselected
90

Unselected
1

Unselected
20

A

1

A static route has a default administrative distance (AD) value of 1. The value expresses the relative trustworthiness of the protocol supplying the route.

The Border Gateway Protocol (BGP) has a default AD value of 20. This default AD value is coded into the router but can be adjusted.

The Enhanced Interior Gateway Routing Protocol (EIGRP) has a default AD value of 90. This default AD value is coded into the router but can be adjusted.

The Open Shortest Path First (OSPF) has a default AD value of 110. This default AD value is coded into the router but can be adjusted.

167
Q

2.2

A network manager configures a Routing Information Protocol (RIP) on the network. Consider the types of dynamic routing protocols to determine what features the protocol will provide.

Unselected
The protocol will use a metric composed of several administrator weighted elements.

Unselected
The protocol will perform routing between domains and is the routing protocol Internet Service Providers (ISPs) use.

Unselected
The protocol will group networks, their connected hosts and routers within an autonomous system.

Unselected
The protocol will consider only one route to a given destination network.

A

The protocol will consider only one route to a given destination network.

Routing Information Protocol (RIP) is a distance vector-based routing protocol. It uses a hop count metric to determine the distance to the destination network. To help prevent looping, the maximum hop count allowed is 15.

The Enhanced Interior Gateway Routing Protocol (EIGRP) uses a metric composed of several administrator weighted elements, including reliability, bandwidth, delay and load to determine a route.

The Open Shortest Path First (OSPF) is a hierarchical link-state routing protocol. Routers within a given area share the same topological database of the networks they serve.

Border Gateway Protocol (BGP) is designed to be used between routing domains, and as such, is used as the routing protocol on the Internet, primarily between Internet Service Providers (ISPs).

168
Q

2.2

A network engineer is reviewing the IP header fields and notices that the field reduces by one every time a packet forwards to a router. What is the name of this IP header field?

Unselected
EIGRP

Unselected
Static Route

Unselected
TTL

Unselected
Routing information protocol

A

TTL

The Time to Live (TTL) IP header field reduces by one every time a packet forwards by a router (referred to as a hop). The TTL output field in the ping command shows the counter’s value when the packet arrives at its destination.

Static routes configure as non-persistent or persistent/permanent. A non-persistent route gets removed from the routing table if the router reboots.

The routing information protocol (RIP) only considers a single piece of information about the network topology, which is the next hop router to reach a given network or subnet (vector).

Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector or hybrid routing protocol. EIGRP relies on neighboring routers to report paths to remote networks.

169
Q

2.2

Protocols, appliances, and software that can apply a control plan, data plane, and management plane to its network functionality are known as which of the following?

Unselected
Link state

Unselected
Border Gateway Protocol

Unselected
Bandwidth shaper

Unselected
Distance vector

A

Bandwidth shaper

Protocols, appliances, and software that can apply these three functions are traffic shapers or bandwidth shapers. Traffic shapers delay certain packet types based on their content.

Distance vector is a routing algorithm. Distance vector protocols use the number of hops to the destination as the metric. The route with the fewest hops is the least-cost path and thereby selected for use.

A link state is an interface monitoring metric. It measures whether an interface is working (up) or not (down).

Border Gateway Protocol (BGP) is a routing protocol. It is designed to be used between routing domains in a mesh internetwork and is used as the routing protocol on the Internet, primarily between ISPs.

170
Q

2.2

Which routing protocol uses the destination address 0.0.0.0/0?

Unselected
Static

Unselected
QoS

Unselected
Default

Unselected
Administrative distance

A

Default

A default route is a type of static route that identifies the next hop router for an unknown destination. The destination address 0.0.0.0/0 is used for Internet Protocol version 4 (IPv4) and the address ::/0 is used for Internet Protocol version 6 (IPv6).

A static route is manually added to the routing table and only changes if edited by the administrator.

An administrative distance (AD) value is used to express the relative trustworthiness of the protocol supplying the route. Default AD values are coded into the router but are adjustable.

Quality of Service (QoS) is a network feature that identifies traffic streams belonging to a specific application, such as VoIP, and prioritizes them over other applications like file transfer.

171
Q

2.2

The network monitoring software alerts to issues where packets are circulating between two routers before they get discarded. How would a network administrator confirm this routing issue on the network?

Unselected
Check the link state of the routers.

Unselected
Check the ISP to ISP route.

Unselected
Check if the TTL goes to 0.

Unselected
Check the routing table for next hop.

A

Check if the TTL goes to 0.

The Time to Live (TTL) IP header field reduces by one every time a router (referred to as a hop) forwards a packet. When pinging a destination, the routing loop will eventually reduce the TTL value to 0.

Open Shortest Path First (OSPF) is a link state routing protocol that works with multiple redundant paths between networks. Check the link state if physical connections are cut or non-existent.

Routing Information Protocol (RIP) considers the next hop router to reach a given network or subnet (vector). The routing table can show the next hop values that determine priority.

The Border Gateway Protocol (BGP) is the routing protocol on the Internet, primarily between Internet Service Providers (ISPs).

172
Q

2.2

A network consultant is reviewing header fields and is looking for evidence that packets are arriving at their destination. What is the name of the output ping that provides this information?

Unselected
IGP

Unselected
Link state

Unselected
TTL

Unselected
RIP

A

TTL

The TTL output field in the ping command shows the value of the counter when the packet arrives at its destination.

A link state algorithm allows a router to store the complete network topology and assess the least-cost paths from this topology database.

An Interior Gateway Protocol (IGP) is a protocol that identifies the routes within an autonomous system (AS).

The routing information protocol (RIP) only considers a single piece of information about the network topology, which is the next hop router to reach a given network or subnet (vector).

173
Q

2.2

A network architect has positioned multiple routers in different floor levels of a 10-story office building that will support the internal network of a large software company. Each routing device has redundant paths and connections. Which routing protocol would benefit the organization’s hierarchical structure?

Unselected
OSPF

Unselected
BGP

Unselected
EIGRP

Unselected
RIP

A

OSPF

Open Shortest Path First (OSPF) is a link state type of routing protocol ideal for hierarchical systems and networks. OSPF is suitable for organizations with multiple redundant paths between networks.

Routing Information Protocol (RIP) is a distance vector routing protocol. RIP only considers the next hop router to reach a given network or subnet (vector).

Enhanced Interior Gateway Routing Protocol (EIGRP) is a distance vector or hybrid routing protocol. It relies on neighboring routers to report paths to remote networks and uses a metric composed of administrator-weighted elements.

The Border Gateway Protocol (BGP) is a patch vector routing protocol used between routing domains in a mesh internetwork.

174
Q

2.2

A technician is reviewing the routing gateway protocols for the organization under the autonomous system (AS) control as a single owner. In reviewing the available protocols, which one identifies routes within an AS?

Unselected
IGP

Unselected
EIGRP

Unselected
TTL

Unselected
RIP

A

IGP

An Interior Gateway Protocol (IGP) is the protocol that identifies routes within an AS.

The Time to Live (TTL) IP header field reduces by one every time a packet forwards by a router (referred to as a hop). The TTL output field in the ping command shows the counter’s value when the packet arrives at its destination.

Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector or hybrid routing protocol. EIGRP relies on neighboring routers to report paths to remote networks.

The routing information protocol (RIP) only considers a single piece of information about the network topology, which is the next hop router to reach a given network or subnet (vector).

175
Q

2.2

A network contractor is reviewing the algorithms used for path selection. What algorithm allows a router to store the complete network topology and assess the least-cost paths from this topology database?

Unselected
Static route

Unselected
Hybrid routing protocol

Unselected
Distance vector

Unselected
Link state

A

Link state

A link state algorithm allows a router to store the complete network topology and assess the least-cost paths from the topology database.

Distance vector protocols use the number of hops to the destination as the metric. The route with the fewest hops is the least-cost path, and the network will select it for use.

Static routes configure as non-persistent or persistent/permanent. A non-persistent route gets removed from the routing table if the router reboots.

Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector or hybrid routing protocol. EIGRP relies on neighboring routers to report paths to remote networks.

176
Q

2.2

A network contractor is reviewing the algorithms used for path selection. The algorithms categorize according to the topology and metrics used to build and update a routing information base. It also prioritizes optimal or least-cost paths. What algorithm uses the number of hops to determine the destination as a metric?

Unselected
Hybrid routing protocol

Unselected
Routing information protocol

Unselected
Distance vector

Unselected
Static route

A

Distance vector

Distance vector protocols use the number of hops to the destination as the metric. The route with the fewest hops is the least-cost path, and the network will select it for use.

Static routes configure as non-persistent or persistent/permanent. A non-persistent route is removed from the routing table if the router gets rebooted.

The routing information protocol (RIP) is a distance vector routing protocol. RIP only considers a single piece of information about the network topology—the next hop router to reach a given network or subnet (vector).

Hybrid Routing Protocol is an advanced distance vector comprised of two elements: bandwidth and delay.

177
Q

2.2

A technician is evaluating the organization’s autonomous system to determine if it can use paths through another organization’s network. What is the technician trying to determine?

Unselected
Static route

Unselected
Exterior gateway protocol

Unselected
Routing information protocol

Unselected
Administrative distance

A

Exterior gateway protocol

An Exterior Gateway Protocol (EGP) is one that can advertise routes between autonomous systems. An EGP includes a field to communicate the network’s autonomous system ID and allows network owners to determine whether they can use paths through another organization’s network.

A static route is manually added to the routing table and only changes if edited by the administrator.

Routing Information Protocol (RIP) is a distance vector-based routing protocol. It uses a hop count metric to determine the distance to the destination network.

Administrative distance (AD) value is used to express the relative trustworthiness of the protocol supplying the route. Default AD values are coded into the router but can be adjusted by the administrator if necessary.

178
Q

2.2

Which networking protocol provides routing capabilities on the Internet, primarily between Internet Service Providers (ISPs)?

Unselected
Enhanced Interior Gateway Routing Protocol (EIGRP)

Unselected
Border Gateway Protocol (BGP)

Unselected
Open Shortest Path First (OSPF)

Unselected
Routing Information Protocol (RIP)

A

Border Gateway Protocol (BGP)

The Border Gateway Protocol (BGP) is designed between routing domains and used as the routing protocol on the Internet, primarily between Internet Service Providers (ISPs).

Routing Information Protocol (RIP) is a distance vector-based routing protocol. It uses a hop count metric to determine the distance to the destination network.

The Open Shortest Path First (OSPF) protocol is suited to large organizations with multiple redundant paths between networks. It has high convergence performance and was designed for the outset to support classless addressing.

The Enhanced Interior Gateway Routing Protocol (EIGRP) is a distance vector-based routing protocol and uses a metric composed of several administrator-weighted elements such as “bandwidth” and “delay.”

179
Q

2.2

The network administrators were alerted to a possible routing loop issue between two routers. Some packets are eventually getting discarded. Determine a way to confirm if the routing issue is still a concern.

Unselected
Check the routing table for next hop.

Unselected
Check the link state of the routers.

Unselected
Check if the TTL goes to 0.

Unselected
Check the ISP to ISP route.

A

Check if the TTL goes to 0.

The Time to Live (TTL) IP header field reduces by one every time a router (referred to as a hop) forwards a packet. When pinging a destination, the routing loop will eventually reduce the TTL value to 0.

Open Shortest Path First (OSPF) is a link state routing protocol that works with multiple redundant paths between networks. Check the link state if physical connections are cut or non-existent.

Routing Information Protocol (RIP) considers the next hop router to reach a given network or subnet (vector). The routing table can show the next hop values that determine priority.

The Border Gateway Protocol (BGP) is the routing protocol on the Internet, primarily between Internet Service Providers (ISPs).

180
Q

2.2

The network monitoring software alerts to issues where packets are circulating between two routers before they get discarded. How would a network administrator confirm this routing issue on the network?

Unselected
Check the routing table for next hop.

Unselected
Check if the TTL goes to 0.

Unselected
Check the link state of the routers.

Unselected
Check the ISP to ISP route.

A

Check if the TTL goes to 0.

The Time to Live (TTL) IP header field reduces by one every time a router (referred to as a hop) forwards a packet. When pinging a destination, the routing loop will eventually reduce the TTL value to 0.

Open Shortest Path First (OSPF) is a link state routing protocol that works with multiple redundant paths between networks. Check the link state if physical connections are cut or non-existent.

Routing Information Protocol (RIP) considers the next hop router to reach a given network or subnet (vector). The routing table can show the next hop values that determine priority.

The Border Gateway Protocol (BGP) is the routing protocol on the Internet, primarily between Internet Service Providers (ISPs).

181
Q

2.2

A network administrator needs to build a network that can account for network reliability with a default routing element such as “delay” to carry time-sensitive data such as voice or video. The network needs to also apply the cost to route traffic at the lowest bandwidth link available. Which routing protocol would be appropriate for this network?

Unselected
Border Gateway Protocol (BGP)

Unselected
Routing Information Protocol (RIP)

Unselected
Open Shortest Path First (OSPF)

Unselected
Enhanced Interior Gateway Routing Protocol (EIGRP)

A

Enhanced Interior Gateway Routing Protocol (EIGRP)

The Enhanced Interior Gateway Routing Protocol (EIGRP) is a distance vector-based routing protocol and uses a metric composed of several administrator weighted elements such as “bandwidth” and “delay.”

The Open Shortest Path First (OSPF) protocol is suited to large organizations with multiple redundant paths between networks. It has high convergence performance and was designed for the outset to support classless addressing.

Routing Information Protocol (RIP) is a distance vector-based routing protocol. It uses a hop count metric to determine the distance to the destination network.

The Border Gateway Protocol (BGP) is designed to be used between routing domains and is used as the routing protocol on the Internet, primarily between Internet Service Providers (ISPs).

182
Q

2.2

A network administrator is troubleshooting network routing issues in the lab. The layer 3 switches in the server room have multiple routes for each subnet. The issue only needs to be temporarily resolved for a scheduling test today. How can the network administrator temporarily fix this routing issue?

Unselected
Configure the exterior gateway protocol

Unselected
Configure a default route

Unselected
Configure the interior gateway protocol

Unselected
Configure a static route

A

Configure a static route

A static route is manually added to the routing table and only changes if edited by the administrator. This is ideal for temporary solutions to rapidly set up a route for network testing or quick troubleshooting.

A default route is a type of static route that identifies the next hop router for a destination and cannot match another routing table entry.

Addresses 0.0.0.0/0 (IPv4) or ::/0 (IPv6) represent the default route.

A network under the administrative control of a single owner is known as an autonomous system (AS). An Interior Gateway Protocol (IGP) is a protocol that identifies routes within an AS.

An Exterior Gateway Protocol (EGP) is a protocol that advertises routes between autonomous systems.

183
Q

2.2

A network manager configures a dynamic routing protocol on the network. The protocol considers only one route to a given destination network. To prevent looping, the protocol limits the number of hops to 15. Compare dynamic routing protocols to determine which protocol the manager is implementing.

Unselected
Enhanced Interior Gateway Routing Protocol (EIGRP)

Unselected
Open Shortest Path First (OSPF) Protocol

Unselected
Border Gateway Protocol (BGP)

Unselected
Routing Information Protocol (RIP)

A

Routing Information Protocol (RIP)

Routing Information Protocol (RIP) is a distance vector-based routing protocol. It uses a hop count metric to determine the distance to the destination network. To help prevent looping, the maximum hop count allowed is 15.

The Enhanced Interior Gateway Routing Protocol (EIGRP) uses a metric composed of several administrator weighted elements, including reliability, bandwidth, delay and load to determine a route.

The Open Shortest Path First (OSPF) is a hierarchical link-state routing protocol. Routers within a given area share the same topological database of the networks they serve.

Border Gateway Protocol (BGP) is designed to be used between routing domains, and as such is used as the routing protocol on the Internet, primarily between Internet Service Providers (ISPs).

184
Q

2.2

A network contractor is reviewing the algorithms used for path selection. What algorithm allows a router to store the complete network topology and assess the least-cost paths from this topology database?

Unselected
Distance vector

Unselected
Static route

Unselected
Hybrid routing protocol

Unselected
Link state

A

Link State

A link state algorithm allows a router to store the complete network topology and assess the least-cost paths from the topology database.

Distance vector protocols use the number of hops to the destination as the metric. The route with the fewest hops is the least-cost path, and the network will select it for use.

Static routes configure as non-persistent or persistent/permanent. A non-persistent route gets removed from the routing table if the router reboots.

Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector or hybrid routing protocol. EIGRP relies on neighboring routers to report paths to remote networks.

185
Q

2.3

Ethernet’s collision detection mechanism results in any network communications to happen in which way?

Unselected
Collision free

Unselected
Half-duplex

Unselected
Non-shared

Unselected
Full-duplex

A

Half-duplex

The collision detection mechanism means that only half-duplex transmission is possible. This means that a node can transmit or receive, but it cannot do both at the same time.

Full-duplex communication is not possible with collision detection. Full-duplex would mean that send and receive can happen at the same time from a node.

Each network node connected to the same media is in the same collision domain. The collisions become more frequent with the addition of more nodes, and consequently, it reduces the effective data rate. Ethernet is not collision free.

Ethernet is a multiple access area network, which means that the available communications capacity, shared between the nodes, connect to the same media.

186
Q

2.3

Compare and differentiate the features of tagged and untagged ports. (Select all that apply.)

Unselected
A frame with an address to a port in the same Virtual Local Area Network (VLAN) is untagged.

Unselected
A frame will get tagged if it goes over a trunk port.

Unselected
A switch receiving a tagged frame on an access port will block the frame.

Unselected
An untagged port will normally be the port operating as a trunk.

A

A frame with an address to a port in the same Virtual Local Area Network (VLAN) is untagged.

A frame will get tagged if it goes over a trunk port.

If a frame is addressed to a port in the same Virtual Local Area Network (VLAN) on the same switch, then the frame does not need an additional tag.

If a frame needs transporting over a trunk link, the switch adds the relevant 802.1Q tag to identify the VLAN and then forwards the frame over the trunk port.

If the switch receives an 802.1Q tagged frame on an access port, it strips the tag before forwarding it. The switch will not block the frame.

A tagged port will normally be the port operating as a trunk. The port will be capable of transporting traffic addressed to multiple VLANs.

187
Q

2.3

An engineer notices a large number of frames traversing a network. While frames are not getting dropped, the traffic from the frames is taxing switches in a network closet. What will the engineer implement to rectify this situation?

Unselected
Link aggregation protocol

Unselected
Jumbo frames

Unselected
Flow control

Unselected
Port aggregation

A

Jumbo frames

A jumbo frame supports a data payload of up to around 9,000 bytes (rather than 1500). This reduces the number of frames that need transmitting, which reduces the number of processing that switches and routers do.

IEEE 802.3x flow control allows a server to instruct the switch to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames.

Port aggregation combines two or more separate cabled links into a single logical channel. From the host end, this is also known as NIC teaming. This will not improve bandwidth in this situation.

The Link Aggregation Control Protocol (LACP) can autonegotiate the bonded link between the switch ports and the end system to recover from a physical failure.

188
Q

2.3

While deploying a VoIP network for a small business, a telecom company configures which options? (Select all that apply.)

Unselected
Circuit-based transmission

Unselected
Auxiliary VLAN

Unselected
Untagged frames

Unselected
Multiple broadcast domains

A

Auxiliary VLAN,

Multiple broadcast domains,

Most switches now support the concept of a voice or auxiliary VLAN (Virtual LAN) to distinguish a PC/data and VoIP traffic without having to configure a trunk.

A VLAN (Virtual LAN) creates its own broadcast domain. Therefore, the engineer uses multiple broadcast domains when integrating a data and voice network with VLANs.

Voice over IP (VoIP) transmits voice traffic as data packets rather than over circuit-based transmission lines found in traditional analog phone systems.

To differentiate traffic, a switch that handles VoIP traffic will only accept tagged frames that match the configured voice VLAN ID.

189
Q

2.3

Ethernet is known to use which type of contention-based system?

Unselected
BASE

Unselected
CSMA/CD

Unselected
MAC

Unselected
802.3

A

MAC

Media access control (MAC) refers to the methods a network technology uses. Ethernet uses a contention-based MAC system. Each network node connected to the same media is in the same collision domain.

The Ethernet protocol governing contention and media access is called Carrier Sense Multiple Access with Collision Detection (CSMA/CD).

When referring to an Ethernet standard, BASE refers to a baseband signal. For example, 10BASE-T denotes an early implementation that works at 10 Mbps.

The Institute of Electrical and Electronics Engineers (IEEE) 802.3 Ethernet standards provide assurance that network cabling will meet the bandwidth requirements of applications. The standards specify the bit rate achieved over different types of media up to the supported distance limitations.

190
Q

2.3

Network switches at a small manufacturing firm use the neighbor discovery (ND) protocol. Which features will the network benefit from as a result? (Select all that apply.)

Unselected
Hosts can configure IPv6 addresses automatically.

Unselected
Switches are organized into a hierarchy.

Unselected
Hosts are allowed to discover other nodes.

Unselected
Each switch determines the shortest path to the root.

A

Hosts can configure IPv6 addresses automatically,

Hosts are allowed to discover other nodes.

The neighbor discovery protocol features address autoconfiguration that enables a host to configure IPv6 addresses for its interfaces automatically and detect whether an address is already in use on the local network.

The neighbor discovery protocol features local address resolution, which allows a host to discover other nodes and routers on the local network.

Switches organize into a hierarchy, with the switch at the top of the hierarchy being the root. The switch with the lowest ID, comprising a priority value and the MAC address, will be selected as the root.

Each switch determines the shortest path to the root bridge by exchanging information with other switches. This STP information gets packaged as bridge protocol data unit (BPDU) multicast frames.

191
Q

2.3

A systems administrator troubleshoots a problematic network. In doing so, a packet sniffer captures all suspected garbage traffic from numerous source ports to a single destination port on a Cisco switch. What configuration does the systems administrator use to achieve this? (Select all that apply.)

Unselected
Port mirroring

Unselected
Port tagging

Unselected
Switched port analyzer

Unselected
Port security

A

Port mirroring

Switched port analyzer

By default, sniffing of unicast traffic by hosts attached to the same switch is prevented. Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port.

There are circumstances in which capturing and analyzing network traffic is a legitimate activity. This capability can be configured on a Cisco switch and referred to as a switched port analyzer (SPAN).

A tagged port refers to a virtual LAN (VLAN) configuration and will normally be operating as a trunk. That is, it is capable of transporting traffic addressed to multiple VLANs.

A port security configuration validates the MAC address of end systems that connect to a switch port.

192
Q

2.3

The same hub has Host A1 and Host B1 connected. Host A1 sends a request to communicate with Host C2. Host B1 is communicating with Host C3. There is a delay in communications between Hosts A1 and C2 until the media is clear. Which Ethernet Protocol is providing this function?

Unselected
Carrier Sense Multiple Access/Collision Detection (CSMA/CD)

Unselected
Virtual Local Area Network (VLAN)

Unselected
Broadcast domain

Unselected
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

A

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol uses schemes, such as “request to send,” to gain access to the media. Nodes listen to the media before transmitting and transmit when the media is clear. A node wanting to transmit but detecting activity, must wait and try later.

CSMA with Collision Detection (CSMA/CD) protocol defines methods for detecting a collision. When a signal present on the interface transmits and receives lines simultaneously, the node broadcasts a jam signal.

Virtual Local Area Network (VLAN) creates separate layer 2 broadcast domains on the same switch or configures separate broadcast domains across distributed switches.

Nodes that share the same broadcast address are within the same broadcast domain.

193
Q

2.3

Two Windows hosts connected to a switch are contending to respond to ARP (Address Resolution Protocol) queries. Only one of the hosts is receiving network traffic. Determine the most likely cause of this issue.

Unselected
Incorrect gateway

Unselected
Duplicate IP address

Unselected
Duplicate MAC address

Unselected
Expired IP address

A

Duplicate MAC address

A duplicate Media Access Control (MAC) address causes both hosts to contend with each other when responding to Address Resolution Protocol (ARP) queries. Then, communications could be split between them or reach only one of the hosts.

If Windows detects a duplicate internet protocol (IP) address, it displays a warning and disables IP traffic. In this case, network traffic is still occurring.

An expired IP address forces a client to renew its IP lease with any available DHCP (Dynamic Host Configuration Protocol) server. This does not apply to ARP requests.

A default gateway setting provides a path for the client to communicate outside of its subnet. The current issue resides at Layer 2 of the Open Systems Interconnection (OSI) model.

194
Q

2.3

A network engineer suggests using a packet sniffer to capture traffic for troubleshooting purposes. What configuration on a switch allows for this capability? (Select all that apply.)

Unselected
Port mirroring

Unselected
Port security

Unselected
Port tagging

Unselected
Switched port analyzer

A

Port mirroring

Switched port analyzer

By default, sniffing of unicast traffic by hosts attached to the same switch is prevented. Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port.

There are circumstances in which capturing and analyzing network traffic is a legitimate activity. This capability can be configured on a Cisco switch and referred to as a switched port analyzer (SPAN).

A tagged port refers to a virtual LAN (VLAN) configuration and will normally be operating as a trunk. That is, it is capable of transporting traffic addressed to multiple VLANs.

A port security configuration validates the MAC address of end systems that connect to a switch port.

195
Q

2.3

Identify the function that copies packets sent to one or more source ports to a destination port.

Unselected
Switching loops

Unselected
Spanning tree

Unselected
Port mirroring

Unselected
Bridge Protocol Data Unit (BPDU)

A

Port mirroring

Port mirroring copies all of the packets sent to one or more source ports to a mirror (or destination) port. On a Cisco switch, this refers to a Switched Port Analyzer (SPAN).

Switching loops cause flooded frames to circulate the network perpetually, causing what is often known as a broadcast storm.

A spanning tree is a means for bridges to organize themselves into a hierarchy. The bridge at the top of the hierarchy is the root bridge.

Spanning Tree Protocol (STP) information is packaged as a Bridge Protocol Data Unit (BPDU).

196
Q

2.3

An engineer troubleshoots a recent network configuration. Two switches that connect via a crossover cable can not communicate. Which statements help the engineer describe the current configuration? (Select all that apply.)

The crossover cable uses T568A on both ends.

Transmit occurs on pins 1 and 2 of the switch.

Transmit occurs on pins 3 and 6 of the switch.

The crossover cable uses T568A on one end and T568B on the other end.

A

Transmit occurs on pins 3 and 6 of the switch

The crossover cable uses T568A on one end and T568B on the other end.

As an intermediate system, a switch port uses MDI-X and receives on pins 1 and 2 and transmits on pins 3 and 6.

The cable between the host interface port and switch interface port should be straight through (either T568A on both ends or T568B on both ends) and not a crossover cable.

An end system uses a media dependent interface (MDI) to transmit on pins 1 and 2 and receive on pins 3 and 6.

Historically (in the days of hubs and very early 10/100 switches), dedicated uplink ports and crossover cables made these connections. A crossover cable has T568A termination at one end and T568B termination at the other end.

197
Q

2.3

A network engineer configures network connectivity. Identify how switches will work if the engineer configures the spanning tree protocol (STP). (Select all that apply.)

Switches are organized into a hierarchy.

Each switch determines the shortest path to the root.

Hosts are allowed to discover other nodes.

Hosts can configure IPv6 addresses automatically.

A

Switches are organized into a hierarchy

Each switch determines the shortest path to the root

Each switch determines the shortest path to the root bridge by exchanging information with other switches. This STP information gets packaged as bridge protocol data unit (BPDU) multicast frames.

Switches organize into a hierarchy, with the switch at the top of the hierarchy being the root. The switch with the lowest ID, comprising a priority value and the MAC address, will be selected as the root.

The neighbor discovery protocol features address autoconfiguration that enables a host to configure IPv6 addresses for its interfaces automatically and detect whether an address is already in use on the local network.

The neighbor discovery protocol features local address resolution, which allows a host to discover other nodes and routers on the local network.

198
Q

2.3

A technician installs and connects some spare switches in a network closet by using crossover cables. Auto-MDI/MDIX is not supported. For some reason, the switches are not communicating with each other. What does the technician note about the configuration while troubleshooting the issue? (Select all that apply.)

The crossover cable uses T568A on both ends.

The crossover cable uses T568A on one end and T568B on the other end.

Transmit occurs on pins 1 and 2 of the switch.

Transmit occurs on pins 3 and 6 of the switch.

A

The crossover cable uses T568A on one end and T568B on the other end.

Transmit occurs on pins 3 and 6 of the switch.

199
Q

2.3

Which contention-based system describes how nodes communicate on an Ethernet network?

BASE

CSMA/CD

802.3

MAC

A

MAC

Media access control (MAC) refers to the methods a network technology uses. Ethernet uses a contention-based MAC system. Each network node connected to the same media is in the same collision domain.

The Ethernet protocol governing contention and media access is called Carrier Sense Multiple Access with Collision Detection (CSMA/CD).

When referring to an Ethernet standard, BASE refers to a baseband signal. For example, 10BASE-T denotes an early implementation that works at 10 Mbps.

The Institute of Electrical and Electronics Engineers (IEEE) 802.3 Ethernet standards provide assurance that network cabling will meet the bandwidth requirements of applications. The standards specify the bit rate achieved over different types of media up to the supported distance limitations.

200
Q

2.3

A network engineer configures network connectivity. Identify how switches will work if the engineer configures the spanning tree protocol (STP). (Select all that apply.)

Switches are organized into a hierarchy.

Each switch determines the shortest path to the root.

Hosts can configure IPv6 addresses automatically.

Hosts are allowed to discover other nodes.

A

Switches are organized into a hierarchy.

Each switch determines the shortest path to the root.

201
Q

2.3

An engineer has currently set a data payload or maximum transmission unit (MTU) to 1,500 bytes. The network the frames traverse uses a 10GB switching fabric. The MTU limit is causing network congestion due to the high number of frames. What can the engineer implement to remedy this problem?

Flow control

Link aggregation protocol

Port aggregation

Jumbo frames

A

Jumbo frames

A jumbo frame supports a data payload of up to around 9,000 bytes (rather than 1500). This reduces the number of frames that need transmitting, which reduces the number of processing that switches and routers do.

IEEE 802.3x flow control allows a server to instruct the switch to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames.

Port aggregation combines two or more separate cabled links into a single logical channel. From the host end, this is also known as NIC teaming. This will not improve bandwidth in this situation.

The Link Aggregation Control Protocol (LACP) can autonegotiate the bonded link between the switch ports and the end system to recover from a physical failure.

202
Q

2.3

Two systems receive split communications from ARP (Address Resolution Protocol) queries. What would cause this configuration issue to occur?

Expired IP address

Duplicate MAC address

Duplicate IP address

Incorrect gateway

A

Duplicate MAC address

A duplicate Media Access Control (MAC) address causes both hosts to contend with each other when responding to Address Resolution Protocol (ARP) queries. Then, communications could be split between them or reach only one of the hosts.

If Windows detects a duplicate internet protocol (IP) address, it displays a warning and disables IP traffic. In this case, network traffic is still occurring.

An expired IP address forces a client to renew its IP lease with any available DHCP (Dynamic Host Configuration Protocol) server. This does not apply to ARP requests.

A default gateway setting provides a path for the client to communicate outside of its subnet. The current issue resides at Layer 2 of the Open Systems Interconnection (OSI) model.

203
Q

2.3

A systems administrator looks to restrict access to a small LAN. How can the administrator achieve this goal when configuring a switch?

Unselected
MAC validation

Unselected
Port mirroring

Unselected
VLAN tagging

Unselected
Link aggregation

A

MAC validation

A port security configuration validates the MAC address of end systems that connect to a switch port.

Port aggregation combines two or more separate links into a single channel. The Link Aggregation Control Protocol (LACP) can recover from a failed link between a switch port and end system.

By default, sniffing of unicast traffic by hosts attached to the same switch is prevented. Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port.

A tagged port refers to a virtual LAN (VLAN) configuration and will normally be the port operating as a trunk. That is, it is capable of transporting traffic addressed to multiple VLANs.

204
Q

2.3

A systems administrator increases the speed of network connections by using a technique that autonegotiates a bonded connection between switch ports and end systems. What technology does the systems administrator use to accomplish this?

Unselected
Port aggregation

Unselected
Port mirroring

Unselected
Port tagging

Unselected
Port security

A

Port aggregation

Port aggregation means combining two or more separate links into a single channel. The Link Aggregation Control Protocol (LACP) can autonegotiate the bonded link between the switch ports and end systems.

By default, sniffing of unicast traffic by hosts attached to the same switch is prevented. Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port.

A tagged port refers to a virtual LAN (VLAN) configuration and will normally be operating as a trunk. That is, it is capable of transporting traffic addressed to multiple VLANs.

A port security configuration validates the MAC address of end systems that connect to a switch port.

205
Q

2.3

A network manager is designing a network for a new company. The company will have over 300 hosts and will interconnect multiple switches to build the network fabric. What will the network manager use to connect the switches?

Unselected
Trunks

Unselected
Virtual Local Area Network (VLAN) tag

Unselected
Access port

Unselected
Tagged port

A

Trunks

A trunk interconnects between switches on large networks. A sysadmin will configure each switch as a trunk port for this purpose.

When frames designated for different Virtual Local Area Networks (VLANs) transport across a trunk, the system must preserve the VLAN ID (VID) of each frame for the receiving switch to forward it correctly. The system uses a VLAN tag for this function.

If a frame is addressed to a port in the same VLAN on the same switch, it uses an access port, also known as an untagged port.

A tagged port is the port operating as a trunk, meaning that it is capable of transporting traffic addressed to multiple VLANs.

206
Q

2.3

A host uses Internet Protocol version 6 (IPv6). The host sends a packet to another host, and a router informs the host of a better route to take. Which protocol provides this function?

Unselected
Neighbor Discovery Protocol (ND)

Unselected
Dual-stack

Unselected
Dynamic Host Configuration Protocol (DHCP)

Unselected
Router Advertisement (RA)

A

Neighbor Discovery Protocol (ND)

One of the main functions of the Neighbor Discovery (ND) protocol is redirection, which enables a router to inform a host of a better route to a particular destination.

Dual-stack hosts can run both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) simultaneously and communicate with devices configured with either type of address.

IPv4 depends heavily on the Dynamic Host Configuration Protocol (DHCP) for address autoconfiguration.

A Router Advertisement (RA) uses the ND protocol. Routers send out advertisements periodically and will respond to a solicitation request to enable clients to determine in which network they reside.

207
Q

2.3

What will cause a switch to act like a hub and transmit a frame out of all ports, except the source port?

Unselected
When the MAC address table cannot find the MAC address

Unselected
When capturing and analyzing network traffic occurs

Unselected
When frames begin to circulate the network perpetually

Unselected
When the bridges in a network organize themselves into a hierarchy

A

When the MAC address table cannot find the MAC address

If the system cannot find a Media Access Control (MAC) address in the MAC address table, then the switch acts like a hub and transmits the frame out of all of the ports, except for the source port.

Port mirroring provides the facility to capture and analyze network traffic. Port mirroring copies all packets sent to one or more source ports to a mirror port.

Switching loops cause flooded frames to circulate the network perpetually, causing what is often known as a broadcast storm.

A spanning tree is a means for the bridges to organize themselves into a hierarchy.

207
Q

2.3

A sysadmin has set a network switch to autonegotiate. What does this setting impact?

Unselected
Speed

Unselected
Connectivity

Unselected
Aggregation

Unselected
Mirroring

A

Speed

Switches support a range of Ethernet standards so older and newer network adapters can all connect to the same network. In most cases, a sysadmin sets a port on the switch to autonegotiate speed (10/100/1000 Mbps.)

When a switch needs to connect to another switch, communications would fail if both interfaces used MDI-X. Nowadays, most switch interfaces configure to use auto-MDI/MDIX by default.

Port aggregation combines two or more separate cabled links into a single logical channel. From the host end, this is known as NIC teaming. This will not improve speed in this situation.

Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port. This does not set the switch’s speed.

208
Q

2.4

Which cellular technology provides an estimated real-world download of up to 300 Megabits per second (Mbps)?

Unselected
3G

Unselected
5G

Unselected
4G

Unselected
2G

A

5G

5G real-world speeds range from about 50 Mbps to 300 Mbps currently. 5G uses different spectrum bands from low (sub-6 GHz) to medium/high (20-60 GHz).

4G or Long Term Evolution (LTE) is theorized to have a maximum download speed of 150 Mbps but currently performs real-world at around 20 Mbps.

3G is also known as CDMA2000/Evolution-Data Optimized (EV-DO). CDMA network providers use this, which can support a 3.1 Mbps downlink and 1.8 Mbps uplink.

2G cellular data service was capable of around 14.4 Kbps. 2G was made available with two formats during its inception: Global System for Mobile Communication (GSM)-based phones and TIA/EIA IS-95 (cdmaOne)-based handsets.

209
Q

2.4

A manager wants to deploy a wireless network in the Internet cafe; that will support wireless gamers. The access point must support the fastest data rates and be able to provide the most bandwidth possible for all connected users. Which wireless feature and mode would be most appropriate for this access points (APs) used in this cafe? (Select all that apply.)

802.11ac

MU-MIMO

802.11n

MIMO

A

802.11ac

MU-MIMO

Multiuser Multiple Input Multiple Output (MU-MIMO) or beamforming allows an access point (AP) to use multiple antennas to process a spatial stream of signals in the direction of a station separately to other streams. Bandwidth is no longer shared or queued by each connected station; it can service each stream separately and/or simultaneously.

802.11ac is the only wireless standard that supports MU-MIMO. It also works in the 5.0 Ghz frequency band and supports higher data rates than 802.11n.

Multiple Input Multiple Output (MIMO) supports more bandwidth than previous 802.11 standards with the use of multiple antennas. Bandwidth is still shared amongst all connection stations.

The 802.11n standard supports MIMO, but not MU-MIMO.

210
Q

2.4

Which of the following 802.11 standards will provide the fastest wireless network throughput and work in the 5 GHz band only?

Unselected
802.11b

Unselected
802.11ac

Unselected
802.11n

Unselected
802.11g

A

802.11ac

The 802.11ac standard is one of the latest standards other than 802.11ax that are available for consumers today. It is designed to work only in the 5 GHz band and can provide a gigabit-like network throughput.

The 802.11b standard is a legacy standard that provides data rates of 11 Mbps and works in the 2.4 GHz band.

The 802.11g standard is also a legacy standard that became a straightforward upgrade path from 802.11b. It has a nominal data rate of 54 Mbps and works in the 2.4 GHz band.

The 802.11n standard is the predecessor to 802.11ac. It can use channels in the 2.4 GHz and 5 GHz band. It also offers channel bonding.

211
Q

2.4

A network administrator performs a site survey to determine the optimal position for an access point (AP). The AP must be able to reach the manager’s office in the far corner of the office floor. Which of the following should the network administrator consider when selecting a wireless router that can reach all users in the office and is compatible with most wireless devices? (Select all that apply.)

2.4 Ghz frequency band

Unidirectional antennas

Omnidirectional antennas

5.0 Ghz frequency band

A

2.4 Ghz frequency band

5.0 Ghz frequency band

Omnidirectional antennas

Placing omnidirectional antennas on the ceiling would provide the best 360 degree coverage with good line-of-sight and reduced interference between the APs and all connecting wireless devices in the office.

Wireless APs provide dual band coverage to connect both legacy and current wireless devices. Providing support for the 2.4 Ghz frequency band will connect most current office devices like printers, laptops, even older smart phones.

Wireless APs that also provide 5.0 Ghz frequency support can connect newer model devices and current smart phones.

Unidirectional antennas are a type of antenna that concentrates the signal beam in a single direction. This will not support all users in the office.

212
Q

2.4

Users at a company use a mix of wireless devices (phones, tablets, laptops) that use either the 2.4 or 5 GHz spectrum. Considering the given wireless 802.11 standard, which one does the company utilize for their mobile devices?

Unselected
b

Unselected
g

Unselected
n

Unselected
a

A

n

802.11n products can use channels in the 2.4 GHz band or the 5 GHz band, although the 5 GHz band is preferred for optimal bandwidth and to avoid interference.

802.11b standardized the use of the carrier method Direct Sequence Spread Spectrum (DSSS), uses the 2.4 GHz band, and operates at 11 Mbps.

The 802.11a has a nominal data rate of 54 Mbps and is an older wireless specification that was released in 1999. It uses only the 5 GHz band.

802.11g uses the 2.4 GHz band and has a nominal data rate of 54 Mbps. When in 802.11b compatibility mode, it drops back to using DSSS.

213
Q

2.4

A manager wants to upgrade the wireless g network that provides Internet access to other mobile devices. If the manager wants to spend the least amount of money but increase wireless network speeds to the next level, which wireless technology should the next wireless router support?

Unselected
Wi-Fi 4

Unselected
Wireless ac

Unselected
5G network

Unselected
Wi-Fi 6

A

Wi-Fi 4

Wi-Fi 4 (802.11n) provides 72 Mbps per stream rates. This is the next available version of the 802.11 standards after wireless g that can increase that manager’s network bandwidth without being too expensive.

Wi-Fi 5 (802.11ac) provides network throughput similar to Gigabit Ethernet. An AC5300 can support 1000 Mbps over a 40 MHz 2.4 GHz band channel and two 2,167 Mbps streams over 80 MHz 5 GHz band channels.

Wi-Fi 6 (802.11ax) approximates 10G connections such as the AX11000. This is achievable using a 6 Ghz frequency band.

The 5G network is a cellular technology that produces real-world speeds between 50 Mbps to 300 Mbps.

213
Q

2.4

To increase wireless bandwidth in a large building, an engineer researches solutions. Which of the following implementations refers to using 40 MHz as a solution?

Unselected
Unidirectional antenna

Unselected
Channel bonding

Unselected
Omnidirectional antenna

Unselected
MU-MIMO

A

Channel bonding

802.11n can obtain more bandwidth with the option to use two adjacent 20 MHz channels as a single 40 MHz channel, referred to as channel bonding, which is a practical option only in the 5 GHz band.

A unidirectional antenna type includes the Yagi (a bar with fins) and parabolic (dish or grid) form factors. Unidirectional antennas are useful for point-to-point connections (a wireless bridge).

An omnidirectional vertical rod-type antennas send and receive signals in all direction more-or-less equally. Access points with an omnidirectional antenna should ideally be ceiling-mounted for the best coverage.

Multiuser multiple input multiple output (MU-MIMO) or beamforming allows an access point (AP) to use its multiple antennas to overcome limitations with simultaneous communications to stations.

214
Q

2.4

An IT technician needs to set up multiple outdoor antennas at a large farm to boost radio communication for its farmers. Which of the following antennas should the technician install that would require the least amount of maintenance throughout its lifecycle?

Unselected
Yagi antenna

Unselected
Parabolic grid antenna

Unselected
Static dish antenna

Unselected
Torus antenna

A

Yagi antenna

A Yagi (a bar with fins) antenna is a valuable unidirectional signal for point-to-point wireless bridge connections. This is common for outdoor use and can boost radio signals across long distances.

A static dish antenna is a parabolic or dome shaped antenna that is unidirectional. This antenna is expensive with up-front cost and maintenance.

A torus (donut) antenna is similar to round wireless routers that businesses mount in an office ceiling. This is not ideal for outdoor use.

A parabolic grid antenna looks like a dome but with a more rectangular feature with grid-like openings. This antenna is expensive with up-front cost and maintenance.

215
Q

2.4

A new office room on the second floor needs wireless networking installed to support video conferencing equipment. The IT manager has set aside a small budget, but the network engineer needs to support at least two 2,167 Mbps streams over 80 MHz 5 GHz band channels. While staying within budget, what minimum 802.11 wireless standard access point (AP) can the engineer purchase to complete the work?

Unselected
Wireless g

Unselected
Wi-Fi 6

Unselected
Wi-Fi 5

Unselected
Wi-Fi 4

A

Wi-Fi 5

Wi-Fi 5 (802.11ac) is designed to provide network throughput similar to Gigabit Ethernet. An AC5300 can support 1000 Mbps over a 40 MHz 2.4 GHz band channel and two 2,167 Mbps streams over 80 MHz 5 GHz band channels.

Wi-Fi 4 (802.11n) is rated at providing 72 Mbps per stream. Assuming the maximum number of four spatial streams and optimum conditions, the nominal data rate could be as high as 600 Mbps for a 40 MHz bonded channel.

Wi-Fi 6 (802.11ax) is designed to approximate 10G connections such as the AX11000. This is achievable using a 6 Ghz frequency band.

Wireless g or 802.11g uses the 2.4 GHz frequency band and has a nominal data rate of 54 Mbps.

216
Q

2.4

Which of the following options does a wireless g access point NOT support? (Select all that apply.)

Unselected
2.4 GHz frequency

Unselected
5.0 GHz frequency

Unselected
Channel bonding

Unselected
Multiple-Input-Multiple-Output (MIMO)

A

Channel bonding

Multiple-Input-Multiple-Output (MIMO)

5.0 GHz frequency

Wireless g (802.11g) does not use the 5.0 GHz frequency range. Wireless n does support both the 2.4 GHz and 5.0 GHz frequencies.

Wireless n (802.11n) does support channel bonding. For example, wireless n allows combining two adjacent 20 MHz channels into a single 40 MHz channel.

Wireless n supports Multiple-Input-Multiple-Output (MIMO), which increases bandwidth by multiplexing the signals from 2 to 4 separate antennas (a radio chain).

Wireless g only supports the 2.4 GHz range. Wireless g uses Orthogonal Frequency Division Multiplexing (OFDM), which makes it possible also to support backward compatibility for legacy 802.11b clients.

217
Q

2.4

The company issued a used company phone to a new employee. The phone is an older model that will not accept a subscriber identity module (SIM) card. This phone most likely supports which type of cellular technology? (Select all that apply.)

Unselected
3G

Unselected
GSM

Unselected
LTE

Unselected
CDMA

A

3G

CDMA

Code Division Multiple Access (CDMA) handsets do not use SIM cards. The providers manage the handset. CDMA requires each subscriber device to use a code to key the modulation of their signal.

3G is a cellular technology also known as CDMA2000/Evolution-Data Optimized (EV-DO). CDMA network providers use this, which can support a 3.1 Mbps downlink and 1.8 Mbps uplink.

Global System for Mobile Communication (GSM)-based phones use Time Division Multiple Access (TDMA). GSM subscribers can use a subscriber identity module (SIM) card on an unlocked handset.

Long Term Evolution (LTE) is a converged 4G standard supported by both the GSM and CDMA network providers, but the network providers must install a SIM card on the phone.

218
Q

2.4

The wireless access points (APs) on a large building floor have different names depending on the room. Employees and customers are confused and are constantly calling IT support to get the best wireless signal to work with as they constantly must change the AP connection. How can a network administrator improve wireless signals across the entire floor and provide a simple way to use the wireless network?

Unselected
Set up an extended service set (ESS).

Unselected
Set limit on power output.

Unselected
Use Wi-Fi 6 APs.

Unselected
Create ad hoc connections.

A

Set up an extended service set (ESS).

A wireless AP makes up an infrastructure basic service set (BSS). Multiple BSS may group together to form an extended service set (ESS) to boost wireless signals and a single AP name for the connection.

An ad hoc topology is also known as an Independent Basic Service Set (IBSS). The wireless adapter allows connections to and from other devices as a small workgroup.

Wi-Fi 6 (802.11ax) aims at providing 10G connection speeds using a 6 GHz frequency band. The APs configurations are more relevant in this case than the type of AP.

Limiting power output reduces the AP frequency range. Regulatory policies can require reducing power in restricted areas near military or government buildings.

219
Q

2.4

A wireless systems administrator modifies a company’s 802.11n network to increase bandwidth. The administrator employs a multiple input multiple output (MIMO) configuration of 3x3:2. Considering the administrator’s selected MIMO notation, which option explains the selected configuration?

Unselected
The number of receive antennas x the number of transmit antennas : the number of simultaneous transmit and receive streams

Unselected
The number of transmit antennas x the number of receive antennas : the number of simultaneous transmit and receive streams

Unselected
The number of transmit antennas x the number of receive antennas : the number of channels bonded

Unselected
The number of recieve antennas x the number of transmit antennas : the number of channels bonded

A

The number of transmit antennas x the number of receive antennas:
the number of simultaneous transmit and receive streams

Multiple Input Multiple Output (MIMO) is the use of multiple antennas to boost bandwidth and is identified by AxB:C notation. A is the number of transmit antennas, B is the number of receive antennas, and C is the number of simultaneous transmit and receive streams.

Multiple Input Multiple Output (MIMO) wireless technology is used in 802.11n/ac and 4G standards. The maximum possible is 4x4:4, but common configurations are 2x2:2 or 3x3:2.

With Multiple Input Multiple Output (MIMO), having more transmit and receive streams than spatial streams helps to improve signal reliability, rather than boosting bandwidth.

With Multiple Input Multiple Output (MIMO), both the transmitter and receiver must support the same number of streams.

220
Q

2.4

A tech configures a medium-sized business to utilize an ad hoc approach when connecting wireless devices. These devices allow connections to and from each other. Review the following properties and determine which applies to an ad hoc topology.

Unselected
It uses an independent basic service set (IBSS).

Unselected
It uses a basic service set (BSS).

Unselected
It is able to roam in an extended service area (ESA).

Unselected
It is grouped into an extended service set (ESS).

A

It uses an independent basic service set (IBSS).

In an ad hoc topology, the wireless adapter allows connections to and from other devices. In 802.11 documentation, this is called an independent basic service set (IBSS).

Nodes in a so-called mesh network can path discovery and forwarding between peers using a routing protocol, like the hybrid wireless mesh protocol (HWMP).

A star topology is a physical network design where each node connects to a central point. A star network is referred to as a hub and spoke network.

Most wireless networks deploy in an infrastructure topology where each station connects through a base station or access point (AP). In 802.11 documentation, this is called a Basic Service Set (BSS).

221
Q

2.4

An officer floor is requesting a new wireless network. Users are requesting faster data rates. Network administrators want to use wireless technology with the most individual channels to choose from and to worry less about wireless interference from other wireless technologies. Which of the following will the office most likely use? (Select all that apply.)

Unselected
802.11n

Unselected
2.4 Ghz

Unselected
5.0 Ghz

Unselected
802.11g

A

802.11n

5.0 Ghz

The 5 Ghz frequency band supports more individual channels than the 2.4 Ghz band. It also suffers less from congestion and interference, meaning it supports higher data rates.

The 802.11n wireless standard provides more bandwidth than previous standards. Its data rates are 288.8 Mbps for a single channel and 600 Mbps for bonded channels.

The 2.4 Ghz band supports less individual channels and has a greater risk of interference from other wireless technologies, such as Bluetooth, that also use the 2.4 Ghz band. Meaning, it has lower data rates than 5.0 Ghz.

The 802.11g wireless standard has a data transfer rate of up to 54 Mbps, the same as 802.11a. 802.11g does not support the 5 Ghz band.

221
Q

2.4

A company is working on finalizing its purchase of unlocked phones for traveling sales agents. These agents will travel to major cities in different countries. They will purchase cellular time using SIM cards in these countries for business communication using voice services. What are the minimum cellular communications standards the phone must support?

Unselected
CDMA

Unselected
LTE

Unselected
GSM

Unselected
EV-DO

A

GSM

Global System for Mobile Communication (GSM) is a standard for cellular radio communications and data transfer. GSM phones can use a SIM card purchased in the local country to connect to voice services.

Long Term Evolution (LTE) is a converged 4G standard. LTE devices must have a SIM card issued by the original network provider, whose services may not be available in different countries.

Code Division Multiple Access (CDMA) provides each subscriber a code or “key,” which is then used by the receiver to extract the subscriber’s traffic from the radio channel. CDMA phones do not use SIM cards.

Evolution-Data Optimized (EV-DO) is a 3G standard deployed by CDMA network providers for data service.

222
Q

2.4

A new office building was constructed right outside a United States military. The building has a few wireless access points (APs) that must adhere to some federal regulations because of the building’s locations. What regulation would the building management have to adhere to regarding these APs?

Unselected
Decrease the power output.

Unselected
Use maximum EIRP settings.

Unselected
2.4 Ghz AP must use channel 14.

Unselected
Use maximum frequency power.

A

Decrease the power output.

Decreasing the power output reduces the AP frequency range. This can prevent the food market Wi-Fi frequency from going over to the military base where wireless signals are commonly restricted.

In America, regulations permit channels 1-11 only, while in Europe, regulations permit channels 1-13, and in Japan, regulations allow all 14 channels.

Using the maximum power output will provide the widest frequency range for an AP. This may cause the frequency to go over to the military base, which may be illegal in some countries.

Effective Isotropic Radiated Power (EIRP) is the sum of transmit power, antenna cable/connector loss, and antenna gain. EIRP must not exceed regulatory limits.

222
Q

2.4

A network administrator must install a new building floor with wireless access points (APs) to provide a wireless network to employees’ mobile devices. The AP security settings will be hardened and use an Extensible Authentication Protocol (EAP) to allow users to authenticate with their user accounts to access the network securely. What is the minimum wireless protection required to install these APs properly?

Unselected
WPA2-Personal

Unselected
WPA2-Enterprise

Unselected
WPA-Personal

Unselected
WPA-Enterprise

A

WPA2-Enterprise

WPA2-Enterprise allows clients to pass on employees’ user credentials to gain access to the AP. WPA2, in general, uses Wi-Fi encryption with Advanced Encryption Standard (AES) and Cipher Block Chaining Message Authentication Code Protocol (CCMP).

WPA2-Personal uses encryption with AES and CCMP but uses a pre-shared key (PSK) that all users will use to access the AP.

WPA-Personal has a PSK that all users will use to authenticate. This is a lower encryption standard than WPA2.

WPA-Enterprise utilizes the first version of WPA that uses the RC4 stream cipher to encrypt traffic. Users authenticate with their own credentials account. This is a lower encryption standard than WPA2.

223
Q

2.4

A company offers paid mobile phone plans or reimbursement for personal phones used for company business. Employees need a phone that can use a subscriber identity module (SIM) card that the company will provide. What type of cellular technologies would the employee phones be most likely supporting? (Select all that apply.)

Unselected
CDMA

Unselected
GSM

Unselected
3G

Unselected
LTE

A

GSM

LTE

Global System for Mobile Communication (GSM)-based phones use Time Division Multiple Access (TDMA). GSM subscribers can use a subscriber identity module (SIM) card on an unlocked handset.

Long Term Evolution (LTE) is a converged 4G standard supported by both the GSM and CDMA network providers, but the network providers must install a SIM card on the phone.

Code Division Multiple Access (CDMA) handsets do not use SIM cards. The providers manage the handset. CDMA requires each subscriber device to use a code to key the modulation of their signal.

3G is a cellular technology also known as CDMA2000/Evolution-Data Optimized (EV-DO). CDMA network providers use this, which can support a 3.1 Mbps downlink and 1.8 Mbps uplink.

224
Q

2.4

Which of the following would allow an 802.11n wireless channel to double its network bandwidth to 40 MHz with two adjacent 20 MHz channels?

Unselected
MIMO

Unselected
MU-MIMO

Unselected
Channel Bonding

Unselected
Mixed mode

A

Channel Bonding

Channel bonding is the practice of combining wireless channels for increased data capacity. Two adjacent 802.11n wireless routers, both using a 20 MHz channel, can create a single 40 MHz channel.

Multiple Input Multiple Output (MIMO) is the use of multiple reception and transmission antennas to boost bandwidth. It is available for 802.11n/ac.

Multi-user Multiple Input Multiple Output (MU-MIMO) is an access point that can use separate streams to connect multiple MU-MIMO-capable stations, providing the stations are not on the same directional path.

Mixed mode is used when wireless routers provide support for legacy clients. In this mode, a standard 802.11n device may enable 802.11g.

225
Q

2.4

Which of the following options does a wireless g access point NOT support? (Select all that apply.)

Unselected
2.4 GHz frequency

Unselected
Multiple-Input-Multiple-Output (MIMO)

Unselected
Channel bonding

Unselected
5.0 GHz frequency

A

Multiple-Input-Multiple-Output (MIMO)

Channel bonding

5.0 GHz frequency

Wireless g (802.11g) does not use the 5.0 GHz frequency range. Wireless n does support both the 2.4 GHz and 5.0 GHz frequencies.

Wireless n (802.11n) does support channel bonding. For example, wireless n allows combining two adjacent 20 MHz channels into a single 40 MHz channel.

Wireless n supports Multiple-Input-Multiple-Output (MIMO), which increases bandwidth by multiplexing the signals from 2 to 4 separate antennas (a radio chain).

Wireless g only supports the 2.4 GHz range. Wireless g uses Orthogonal Frequency Division Multiplexing (OFDM), which makes it possible also to support backward compatibility for legacy 802.11b clients.

226
Q

2.4

A network administrator performs a site survey to determine the optimal position for an access point (AP). The AP must be able to reach the manager’s office in the far corner of the office floor. Which of the following should the network administrator consider when selecting a wireless router that can reach all users in the office and is compatible with most wireless devices? (Select all that apply.)

Unselected
5.0 Ghz frequency band

Unselected
2.4 Ghz frequency band

Unselected
Omnidirectional antennas

Unselected
Unidirectional antennas

A

5.0 Ghz frequency band

2.4 Ghz frequency band

Omnidirectional antennas

Placing omnidirectional antennas on the ceiling would provide the best 360 degree coverage with good line-of-sight and reduced interference between the APs and all connecting wireless devices in the office.

Wireless APs provide dual band coverage to connect both legacy and current wireless devices. Providing support for the 2.4 Ghz frequency band will connect most current office devices like printers, laptops, even older smart phones.

Wireless APs that also provide 5.0 Ghz frequency support can connect newer model devices and current smart phones.

Unidirectional antennas are a type of antenna that concentrates the signal beam in a single direction. This will not support all users in the office.

227
Q

2.4

A farmer wants to install multiple antennas on the farm to boost radio communication across long distances. The antennas should be easy to install and require minimum maintenance and up-front costs. What type of antenna should the farmer install on the land?

Unselected
Static dish antenna

Unselected
Torus antenna

Unselected
Parabolic grid antenna

Unselected
Yagi antenna

A

Yagi antenna

A Yagi (a bar with fins) antenna is a unidirectional signal that is useful for point-to-point wireless bridge connections. This is common for outdoor use and can boost radio signals across long distances.

A static dish antenna is a parabolic or dome shaped antenna that is unidirectional. This antenna is expensive with up-front cost and maintenance.

A torus (donut) antenna is similar to those round wireless routers that businesses use to mount in an office ceiling. This is not ideal for outdoor use.

A parabolic grid antenna looks like a dome but with a more rectangular feature with grid-like openings. This antenna is expensive with up-front cost and maintenance.

228
Q

2.4

The manager would like to set up a temporary wireless network to connect a computer to the corporate office’s network to show a presentation slide and video only accessible from the internal SharePoint. The device will only support a pre-shared key (PSK) authentication process. Which wireless network feature will provide the latest security that will not require integrating services with a local Active Directory (AD)?

Unselected
WPA2-Enterprise

Unselected
WPA2-Personal

Unselected
WPA-Personal

Unselected
WPA-Enterprise

A

WPA2-Personal

Wi-Fi Protected Access version 2 (WPA2)-Personal uses a pre-shared key (PSK) that all users will use to connect to the access point (AP). WPA2, in general, uses Wi-Fi encryption with Advanced Encryption Standard (AES) and Cipher Block Chaining Message Authentication Code Protocol (CCMP).

WPA2-Enterprise does not use a PSK to connect clients to an access point (AP). Enterprise mode allows users to use their account credentials to connect.

WPA-Personal has a PSK that all users will use to authenticate. This is a lower encryption standard than WPA2.

WPA-Enterprise utilizes the first version of WPA that uses the RC4 stream cipher to encrypt traffic. Users authenticate with their account credentials. This is a lower encryption standard than WPA2.

229
Q

2.4

Users at a medium-sized business utilize an ad hoc approach when connecting wireless devices. Review the following properties and determine which applies to an ad hoc topology.

Unselected
It is grouped into an extended service set (ESS).

Unselected
It is able to roam in an extended service area (ESA).

Unselected
It uses an independent basic service set (IBSS).

Unselected
It uses a basic service set (BSS).

A

It uses an independent basic service set (IBSS).

An independent basic service set (IBSS) is an ad hoc topology where the wireless adapter allows connections to and from other wireless devices.

Clients can roam within an extended service area (ESA). ESA uses multiple access points (APs) with the same service set identification (SSID) and security configuration connected by a wired network.

An extended service set (ESS) uses more than one basic service set to create.

A basic service set (BSS) is an AP that mediates communications between client devices and provides a bridge to a cabled network segment.

230
Q

2.4

A new office building was constructed right outside a United States military. The building has a few wireless access points (APs) that must adhere to some federal regulations because of the building’s locations. What regulation would the building management have to adhere to regarding these APs?

Unselected
Use maximum frequency power.

Unselected
Decrease the power output.

Unselected
2.4 Ghz AP must use channel 14.

Unselected
Use maximum EIRP settings.

A

Decrease the power output.

Decreasing the power output reduces the AP frequency range. This can prevent the food market Wi-Fi frequency from going over to the military base where wireless signals are commonly restricted.

In America, regulations permit channels 1-11 only, while in Europe, regulations permit channels 1-13, and in Japan, regulations allow all 14 channels.

Using the maximum power output will provide the widest frequency range for an AP. This may cause the frequency to go over to the military base, which may be illegal in some countries.

Effective Isotropic Radiated Power (EIRP) is the sum of transmit power, antenna cable/connector loss, and antenna gain. EIRP must not exceed regulatory limits.

231
Q

2.4

A tech replaces a failed wireless router at a company. While waiting for the new router to arrive, an older router is put in place and will only provide speeds of 54 Mbps. Which wireless standard does the older router use?

Unselected
ac

Unselected
n

Unselected
b

Unselected
g

A

g

802.11g uses the 2.4 GHz band and has a nominal data rate of 54 Mbps. When in 802.11b compatibility mode, it drops back to using DSSS.

802.11b standardized the use of the carrier method Direct Sequence Spread Spectrum (DSSS), uses the 2.4 GHz band, and operates at 11 Mbps.

The 802.11ac standard continues the development of 802.11n technologies. The main distinction is that 802.11ac works only in the 5 GHz band.

802.11n products can use channels in the 2.4 GHz band or the 5 GHz band, although the 5 GHz band is preferred for optimal bandwidth and to avoid interference.

232
Q

2.4

A network administrator is setting up a new office room on a different floor of the building to support video conferencing sessions. The video systems will be utilizing a wireless network. Although the work budget is very small, the network must support two 2,167 Mbps streams over an 80 MHz 5 GHz band channel. What is the minimum wireless 802.11 standard access point (AP) a network administrator can purchase to stay close to budget while meeting the network requirements?

Unselected
Wi-Fi 6

Unselected
Wireless g

Unselected
Wi-Fi 5

Unselected
Wi-Fi 4

A

Wi-Fi 5

Wi-Fi 5 (802.11ac) is designed to provide network throughput similar to Gigabit Ethernet. An AC5300 can support 1000 Mbps over a 40 MHz 2.4 GHz band channel and two 2,167 Mbps streams over 80 MHz 5 GHz band channels.

Wi-Fi 4 (802.11n) is rated at providing 72 Mbps per stream. Assuming the maximum number of four spatial streams and optimum conditions, the nominal data rate could be as high as 600 Mbps for a 40 MHz bonded channel.

Wi-Fi 6 (802.11ax) is designed to approximate 10G connections such as the AX11000. This is achievable using a 6 Ghz frequency band.

Wireless g or 802.11g uses the 2.4 GHz frequency band and has a nominal data rate of 54 Mbps.

233
Q

2.4

A consumer configures a new wireless router at home and only configures the 5 GHz band. Which wireless standard only works with this band?

Unselected
b

Unselected
n

Unselected
g

Unselected
ac

A

ac

The 802.11ac standard continues the development of 802.11n technologies. The main distinction is that 802.11ac works only in the 5 GHz band.

802.11n products can use channels in the 2.4 GHz band or the 5 GHz band, although the 5 GHz band is preferred for optimal bandwidth and to avoid interference.

802.11g uses the 2.4 GHz band and has a nominal data rate of 54 Mbps. When in 802.11b compatibility mode, it drops back to using DSSS.

802.11b standardized the use of the carrier method Direct Sequence Spread Spectrum (DSSS). It uses the 2.4 GHz band, and operates at 11 Mbps.

234
Q

3.1

A sysadmin is investigating an issue on a switch after receiving reports that connecting to any network resource, local or on the web, is much slower than normal. What kind of log should the sysadmin investigate to determine what may be causing the issue?

Unselected
Baseline

Unselected
Audit

Unselected
Security

Unselected
Traffic

A

Traffic

Performance and traffic logs record statistics for compute, storage, and network resources over a defined period. This log would help to determine performance issues on a given network.

A baseline is a snapshot of a known good configuration and how a device operates at that known good configuration.

An audit log records the use of authentication and authorization privileges. It will generally record success/fail type of events. An audit log is also known as an access log or security log.

A security log is another phrase for an audit log.

235
Q

3.1

A Heat/Ventilation/Air Conditioning contractor fixed the HVAC unit in the server room. The sysadmin stopped receiving alerts about servers having issues. What alerts did the sysadmin receive regarding the servers?

Unselected
Temperature

Unselected
Processing

Unselected
Memory

Unselected
Bandwidth

A

Temperature

Temperature is important to monitor with electronics. If too cold, then devices could start to fail, such as batteries. If too hot, then other components could fail, like a CPU, hard drive, or graphics card.

Memory refers to the component of computers that temporarily stores actively used data. Improving memory would allow larger, more intensive programs to run better.

The Central Processing Unit (CPU) refers to the component in a device that executes commands given to it by a program or operating system. CPUs plug into a socket on a motherboard. Improving the processing speed would help programs calculate faster.

Bandwidth is the total capacity to process network traffic. Improving bandwidth would improve connecting to the internet.

236
Q

3.1

A sysadmin noticed that there were changes to the hardware firewall not properly documented. The sysadmin does not know who made the change. What type of log should the sysadmin investigate that may shed light on who made the change in the firewall?

Unselected
Audit

Unselected
Baseline

Unselected
Traffic

Unselected
Trap

A

Audit

An audit log records the use of authentication and authorization privileges. It will generally record success/fail type of events. An audit log is also known as an access log or security log.

A baseline is a snapshot of a known good configuration and how a device operates at that known good configuration.

A Simple Network Management Protocol (SNMP) Trap is an agent that informs the SNMP monitor of a notable event (port failure, for instance). The sysadmin can set the threshold for triggering traps for each value.

Performance and traffic logs record statistics for compute, storage, and network resources over a defined period. This log would help to determine performance issues on a given network.

237
Q

3.1

A new switch has a better ability to handle data transfer than a previous switch to prevent it from being overloaded. An overloaded router can cause a problem with what process?

Unselected
Available memory

Unselected
Total bandwidth

Unselected
Sending or receiving traffic

Unselected
Speed/Duplex Settings

A

Sending or receiving traffic

The ability of network equipment to process traffic is extremely important to an overall network functioning properly. If the equipment is too underpowered for a given network, a system will get overloaded.

Bandwidth is the total capacity to process network traffic. Improving bandwidth would improve connecting to the internet.

Memory refers to the component of computers that temporarily stores actively used data. Improving memory would allow larger, more intensive programs to run better.

Half duplex refers to only being able to transfer or receive one at a time. Full duplex refers to being able to transfer and receive at the same time. Having multiple devices configured differently can cause collisions.

238
Q

3.1

What kind of tool can a network administrator run to measure the network statistics of a building’s network equipment?

Unselected
Traffic

Unselected
Audit

Unselected
NetFlow

Unselected
Baseline

A

NetFlow

A packet analyzer, such as NetFlow, can measure network traffic statistics, but trying to record each frame imposes a heavy processing overhead on the network tap or mirror port.

A baseline is a snapshot of a known good configuration and how a device operates at that known good configuration.

An audit log records the use of authentication and authorization privileges. It will generally record success/fail type of events. An audit log is also known as an access log or security log.

Performance and traffic logs record statistics for compute, storage, and network resources over a defined period. This log would help to determine performance issues on a given network.

239
Q

3.1

A sysadmin is setting up a new office for an employee. After hooking the computer up to the network with an ethernet cable, the sysadmin noticed the computer was not getting a connection. The sysadmin previously hooked up the corresponding patch panel port to the switch but is not seeing any lights on the port. What does the sysadmin need to configure on the switch to fix the connectivity issue?

Unselected
Jitter

Unselected
Packet count

Unselected
Link state

Unselected
Bandwidth

A

Link state

Link state measures whether an interface is working (up) or not (down). The sysadmin would configure the link state of a given port on a switch or router to turn it on or off.

It is often useful to monitor packet counts. High packet counts will incur processing load on the CPU and system memory resources of the appliance, even if the size of each packet is quite small.

Bandwidth is the total capacity to process network traffic. Improving bandwidth would improve connecting to the internet.

Defined as being a variation in the delay, jitter manifests itself as an inconsistent rate of packet delivery.

240
Q

3.1

A sysadmin was monitoring the logs of the network equipment in the corporate office and noticed there were a lot of packet collisions. After digging around the individual network boxes, the sysadmin found that there was a misconfigured switch. What setting most likely contributed to packet collisions?

Unselected
Packet count

Unselected
Speed/Duplex settings

Unselected
Memory

Unselected
Bandwidth

A

Speed/Duplex

Half duplex refers to only being able to transfer or receive one at a time. Full duplex refers to being able to transfer and receive at the same time. Having multiple devices configured differently can cause collisions.

Memory refers to the component of computers that temporarily stores actively used data. Improving memory would allow larger, more intensive programs to run better.

Bandwidth is the total capacity to process network traffic. Improving bandwidth would improve connecting to the internet.

It is often useful to monitor packet counts. High packet counts will incur processing load on the CPU, and system memory resources of the appliance, even if the size of each packet is quite small.

241
Q

3.1

A sysadmin recently upgraded the network connection of the corporate office from 10Mbps download and 1Mbps upload to 500Mbps download and 50Mbps upload. What did the sysadmin increase to improve access to the web?

Unselected
Packet count

Unselected
Speed/Duplex settings

Unselected
Memory

Unselected
Bandwidth

A

Bandwidth

Bandwidth is the total capacity to process network traffic. Improving bandwidth would improve connecting to the internet.

It is often useful to monitor packet counts. High packet counts will incur processing load on the CPU and system memory resources of the appliance, even if the size of each packet is quite small.

Half duplex refers to only being able to transfer or receive one at a time. Full duplex refers to being able to transfer and receive at the same time.

Memory refers to the component of computers that temporarily stores actively used data. Improving memory would allow larger, more intensive programs to run better.

242
Q

3.1

A sysadmin is trying to understand what is causing the company’s virtual private network connections to fail. What kind of log would help the sysadmin track down the issue?

Unselected
Syslog

Unselected
Security

Unselected
Trap

Unselected
Audit

A

Syslog

Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de facto standard for logging events from distributed systems.

A Simple Network Management Protocol (SNMP) Trap is an agent that informs the SNMP monitor of a notable event (port failure, for instance). The sysadmin can set the threshold for triggering traps for each value.

An audit log records the use of authentication and authorization privileges. It will generally record success/fail type of events. An audit log is also known as an access log or security log.

A security log is another phrase for an audit log.

243
Q

3.1

A server running an SQL database is running out of capacity. The sysadmin noticed the disk space is not maxed out, and the processor is running at 25% capacity as well. What is another component of the server that the sysadmin should look at to restore the database’s functionality?

Unselected
Memory

Unselected
HDD

Unselected
Bandwidth

Unselected
CPU

A

Memory

Memory refers to the component of computers that temporarily stores actively used data. Improving memory would allow larger, more intensive programs to run better.

Hard drive refers to the storage medium used in computer systems.

The Central Processing Unit (CPU) refers to the component in a device that executes commands given to it by a program or operating system.

CPUs plug into a socket on a motherboard. Improving the processing speed would help programs calculate faster.

Bandwidth is the total capacity to process network traffic. Improving bandwidth would improve connecting to the internet.

244
Q

3.1

A sysadmin is looking to monitor the network devices by pulling data off of them remotely. What kind of network equipment functionality can the sysadmin use to accomplish this?

Unselected
Runt

Unselected
Giant

Unselected
Baseline

Unselected
SNMP trap

A

SNMP trap

A Simple Network Management Protocol Trap is an agent that informs the SNMP monitor of a notable event (port failure, for instance). The sysadmin can set a threshold for triggering traps for each value.

A giant is a frame that is larger than the maximum permissible size (1518 bytes for Ethernet II). If it is too large, it may get dropped by networking equipment.

A runt is a frame that is smaller than the minimum size (64 bytes for Ethernet). A collision usually causes a runt frame.

A baseline is a snapshot of a known good configuration and how a device operates at that known good configuration.

245
Q

3.1

A network engineer is trying to get approval to replace aging networking equipment. The justification for the purchase was that the office lost connectivity due to the devices becoming overloaded and overheated. What was the engineer using as justification?

Unselected
Change management

Unselected
Downtime/Uptime

Unselected
Disaster recovery

Unselected
Site survey

A

Downtime/Uptime

Downtime is the time a system is unavailable for use. Uptime is the time a system is available for use.

A documented change management process minimizes the risk of unscheduled downtime by implementing changes in a planned and controlled way.

A disaster recovery plan is the process that minimizes downtime by backing up critical data and the ability to restore availability if a primary system fails.

A site survey is the documentation about a location for the purpose of building an ideal wireless infrastructure. The survey often contains optimum locations for wireless antenna and access point placement to provide the required coverage for clients and identifying sources of interference.

246
Q

3.1

What kind of tool can a network administrator run to measure the network statistics of a building’s network equipment?

Unselected
Baseline

Unselected
NetFlow

Unselected
Traffic

Unselected
Audit

A

NetFlow

A packet analyzer, such as NetFlow, can measure network traffic statistics, but trying to record each frame imposes a heavy processing overhead on the network tap or mirror port.

A baseline is a snapshot of a known good configuration and how a device operates at that known good configuration.

An audit log records the use of authentication and authorization privileges. It will generally record success/fail type of events. An audit log is also known as an access log or security log.

Performance and traffic logs record statistics for compute, storage, and network resources over a defined period. This log would help to determine performance issues on a given network.

247
Q

3.1

What describes the function of a switch that gathers and sends out device statistics and issues alerts?

Unselected
Baseline

Unselected
Giant

Unselected
SNMP trap

Unselected
Runt

A

SNMP trap

A Simple Network Management Protocol (SNMP) Trap is an agent that informs the SNMP monitor of a notable event (port failure, for instance). The sysadmin can set the threshold for triggering traps for each value.

A giant is a frame that is larger than the maximum permissible size (1518 bytes for Ethernet II). If it is too large, it may get dropped by networking equipment.

A runt is a frame that is smaller than the minimum size (64 bytes for Ethernet). A collision usually causes a runt frame.

A baseline is a snapshot of a known good configuration and how a device operates at that known good configuration.

248
Q

3.1

A network operations engineer is investigating alerts that the data center keeps switching to battery backup. What environmental factor should the engineer investigate?

Unselected
Humidity

Unselected
Temperature

Unselected
Flooding

Unselected
Electrical

A

Electrical

Computer systems need a stable power supply, free from outages (blackouts), voltage dips (brownouts), and voltage spikes and surges.

There may be natural or person-made flood risks from nearby water sources and reservoirs or risks from leaking plumbing or fire suppression systems. Electrical systems need to be shut down immediately in the presence of any significant amount of water.

More water vapor in the air risks condensation forming within a device chassis, leading to corrosion and short circuit faults. Low humidity increases the risks of static charges building up and damaging components.

High temperatures make it difficult for device and rack cooling systems to dissipate heat effectively. This increases the risk of overheating components within device chassis and consequent faults.

249
Q

3.1

A sysadmin is investigating an issue on a switch after receiving reports that connecting to any network resource, local or on the web, is much slower than normal. What kind of log should the sysadmin investigate to determine what may be causing the issue?

Unselected
Baseline

Unselected
Audit

Unselected
Security

Unselected
Traffic

A
250
Q

3.1

The sysadmin is receiving alerts that the servers are having issues. A Heat/Ventilation/Air Conditioning system failed in the server room. What alerts did the sysadmin receive regarding the servers?

Unselected
Bandwidth

Unselected
Memory

Unselected
Processing

Unselected
Temperature

A
251
Q

3.1

A sysadmin is looking to monitor the network devices by pulling data off of them remotely. What kind of network equipment functionality can the sysadmin use to accomplish this?

Unselected
Baseline

Unselected
Giant

Unselected
Runt

Unselected
SNMP trap

A
252
Q

3.1

A sysadmin is running into the issue that traffic is getting dropped by the network equipment. After researching the issue, the sysadmin found that the individual packets were too small. What should the sysadmin configure to remove?

Unselected
Bandwidth

Unselected
Baseline

Unselected
Giants

Unselected
Runts

A
253
Q
A
254
Q
A
255
Q
A
256
Q
A
257
Q
A
258
Q
A
259
Q
A
259
Q
A
260
Q
A
261
Q
A
262
Q
A
263
Q
A
264
Q
A
265
Q
A
266
Q
A
266
Q
A
267
Q
A
268
Q
A
269
Q
A
270
Q
A
271
Q
A
272
Q
A
273
Q
A
274
Q
A
275
Q
A
276
Q
A
277
Q
A
278
Q
A
279
Q
A
280
Q
A
281
Q
A
282
Q
A
283
Q
A
284
Q
A
285
Q
A
286
Q
A
287
Q
A
288
Q
A
289
Q
A
290
Q
A
291
Q
A
292
Q
A
293
Q
A
294
Q
A
295
Q
A
296
Q
A
297
Q
A
298
Q
A
299
Q
A
300
Q
A
301
Q
A
302
Q
A
303
Q
A
304
Q
A
305
Q
A
306
Q
A
307
Q
A
308
Q
A
309
Q
A
310
Q
A
310
Q
A
311
Q
A
312
Q
A
313
Q
A
314
Q
A
315
Q
A
316
Q
A
317
Q
A
318
Q
A
319
Q
A
320
Q
A
321
Q
A
322
Q
A
323
Q
A
324
Q
A
325
Q
A
326
Q
A
327
Q
A
328
Q
A
329
Q
A
329
Q
A
330
Q
A
331
Q
A
332
Q
A
333
Q
A
334
Q
A
335
Q
A
336
Q
A
336
Q
A
337
Q
A
338
Q
A
338
Q
A
339
Q
A
339
Q
A
340
Q
A