Comptia Network+ (N10-008) Flashcards
Some of what I have found and learnt while studying
Generic Routing Encapsulation (GRE) is a protocol for wrapping data packets inside secondary data packets in order to set up a direct point-to-point network connection..
Which of the following extends this capability from a limited number of sites by dynamically establishing tunnels without the need to explicitly configure mapping entries?
a. GRE2
b. zGRE
c. xGRE
d. mGRE
d. mGRE
While GRE provides a secure private path for packets through a public network using a point-to-point tunnel between two sites, Multipoint Generic Routing Encapsulation (mGRE) extends this capability from a limited number of sites by dynamically establishing tunnels without the need to explicitly configure mapping entries.
The other options presented do not exist and are, thus, incorrect.
Which of the following is designed to keep the system’s uptime running in the event of a disaster?
a. High availability
b. Load balancing
c. Quality of Service
d. Caching engines
a. High availability
High availability (HA) is a component of a technology system that eliminates single points of failure to ensure continuous operations or uptime for an extended period. If a network switch or router stops operating correctly (meaning that a network fault occurs), communication through the network could be disrupted, resulting in a network becoming unavailable to its users. Therefore, network availability, called uptime, is a major design consideration for high availability networks.
A cable operator needs to transition from one cable type to another.
Which of the following would be best help?
a. MDI
b. Repeater
c. Hub
d. Media converter
d. Media converter
Where a repeater connects two cable segments of the same type, a media converter transitions from one cable type to another.
Media converters also work at Layer 1, the Physical Layer of the OSI model.
When Ethernet gets wired with a hub, there needs to be a means of distinguishing the interface on an end system with the hub. The end system interface is known as Medium Dependent Interface (MDI)
**Repeaters **overcome distance limitations by boosting the signal somewhere along the cable run. A repeater works at the physical layer (Layer 1) of the OSI model and is transparent concerning the rests of the network infrastructure.
A **Hub **acts like a multiport repeater, so that every port receives transmissions sent from any other port.
Which of the following is the IEEE specification developed to ensure interoperability of VLAN technologies from the various vendors?
a. 802.1X
b. 802.1z
c. 802.1Q
d. 802.1s
c. 802.1Q
IEEE 802.1Q is the networking standard that supports Virtual LANs (VLANs) on an Ethernet network and was developed to ensure interoperability of VLAN technologies from the various vendors.
The standard defines a system of VLAN tagging for Ethernet frames and the accompanying procedures to be used by bridges and switches in handling such frames.
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
a. A backup of a large video presentation to cloud storage for archival purposes
b. A duplication of a hosted virtual server to another physical server for redundancy
c. A download of navigation data to a portable device for offline access
d. A query from an IoT device to a cloud-hosted server for a firmware update
b. A duplication of a hosted virtual server to another physical server for redundancyis MOST likely to generate significant East-West traffic in a datacenter
A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP:
IP Address: 196.26.4.30
Subnet Mask: 255.255.255.224
Gateway: 196.24.4.1
The network engineer observes that all users have lost Internet connectivity.
Which of the following describes the issue?
a. The incorrect subnet mask was configured
b. The incorrect gateway was configured
c. The incorrect IP address was configured
d. The incorrect interface was configured
a. The incorrect subnet mask was configured
A CIDR of /26 would give a subnet of 255.255.255.192
In a crossover cable, which wire is wire 1 crossed with?
a. 4
b. 5
c. 3
d. 2
c. 3
In a crossover cable, wires 1 and 3 and wires 2 and 6 are crossed.
After a recent breach, the security technician decides to aggregate and analyse its security logs. Which system should be used?
a. Event log
b. Syslog
c. SIEM
d. SNMP
c. SIEM
Security information and event management (SIEM) is a term for software products and services combining security information management (SIM) and security event management (SEM).
A SIEM can consolidate syslog, SNMP, and event log data into a single repository. Security logs can be analysed and aggregated.
What speed and frequency does Wireless standard 802.11n have?
802.11n:
- 74Mbs-600Mbs
- 2.4GHz & 5GHz
A network technician has set up a link where the cable length exceeds the distance limitation and may not achieve the required speed or be unreliable. What should the network technician use in this case?
a. Media Converter
b. Repeater
c. MDI
d. Hub
b. Repeater
A repeater works at the physical layer (Layer 1) of the OSI model and overcomes distance limitations by boosting the signal somewhere along the cable run.
a. Media Converter
Where a repeater connects two cable segments of the same type, a media converter transitions from one cable type to another. Media converters also work at the Physical Layer of the OSI model.
c. MDI
When Ethernet gets wired with a hub, there needs to be a means of distinguishing the interface on an end system with the hub. The end system interface is known as Medium Dependent Interface (MDI).
d. Hub
A hub acts like a multiport repeater so that every port receives transmissions sent from any other port.
What is the network ID associated with the host located at 205.12.35.26/27?
a. 205.12.35.32
b. 205.12.35.48
c. 205.12.35.0
d. 205.12.35.16
c. 205.12.35.0
In classless subnets using variable length subnet mask (VLSM), the network ID is the first IP address associated within an assigned range. In this example, the CIDR notation is /27, so each subnet will contain 32 IP addresses.
This means that there eight networks in this class C range: 205.12.35.0, 205.12.35.32, 205.12.35.64, 205.12.35.96, 205.12.35.128, 205.12.35.160, 205.12.35.196, and 205.12.35.224.
Since the IP address provided is 205.12.35.26, it will be in the 205.12.35.0/27 network.
At which layer of the OSI model does STP operate?
a. Transport
b. Session
c. Data link
d. Presentation
c. Data link
Protocols and technologies such as Spanning Tree Protocol (STP) operate at the data link layer.
What type of connector is this?
a. MTRJ Connector.
b. RJ-45
c. SC (Subscriber Connector)
d. LC (Lucent Connector)
e. FC (Ferrule Core Connector)
f. RJ-11
g.ST (Straight Tip Connector)
d. LC (Lucent Connector)
The LC Connectors have a flange on top, similar to an RJ-45 connector that aids secure connection.
This week, you’ve been assigned to help solve connectivity problems between the home office and several remote locations. What type of legacy device provides serial communication capabilities across phone lines?
a. A router
b. A modem
c. PBX
d. A switch
b. A modem
A traditional modem provides serial communication capabilities across phone lines.
aA helpdesk technician is reviewing the network layout in various areas. What is the purpose of subnetting?
A. Layer 2 tracking
b. Layer 3 segments
c. Port security
d. Flow control
b. Layer 3 segments
Subnetting creates Layer 3 broadcast domain segments with fewer hosts.
A network administrator updated an internet server to evaluate some new features in the current release. A week after the update, the internet server vendor warns that the latest release may have introduced a new vulnerability, and a patch is not available for it yet.
Which of the following should the administrator do to mitigate the risk?
a. Utilize WAF to restrict the malicious activity to the internet server
b. Downgrade the server and defer the new feature testing
c. Enable the host-based firewall on the internet server
d. Enable HIPS to protect the server until the patch is released
c. Enable the host-based firewall on the internet server
Enabling the host-based firewall adds an additional layer of protection to the server by controlling incoming and outgoing network traffic based on a set of predefined rules. This can help in restricting access to vulnerable services or applications on the server, reducing the potential impact of the identified vulnerability.
Utilize WAF (Web Application Firewall) A WAF is generally used to protect web applications from various attacks. While it adds security, it might not directly address vulnerabilities introduced by the specific update on the internet server.
Downgrade the server and defer the new feature testing: While downgrading may temporarily remove the new feature, it might not be a feasible or recommended solution, especially if the new feature is essential or brings significant improvements.
Enable HIPS (Host-based Intrusion Prevention System) to protect the server: HIPS can provide additional security by monitoring and preventing malicious activities on the host. However, enabling the host-based firewall is a more specific and targeted measure in response to a known vulnerability.
In summary, enabling the host-based firewall is a proactive step to mitigate the risk until a patch becomes available.
What are the meanings of cloud basics:
A. Elasticity
B. Scalability
C. Multi-tenancy?
A. Elasticity is the ability to increase or decrease resources based on the demand of the your applications, services etc.
B. Scalability enables quickly increasing resources without the investment of more on-site hardware by utilizing the cloud’s resources.
C. Multi-tenancy refers to a cloud provider’s ability to host multiple tenants on the same infrastructure.
Which type of media is used to connect telecommunication rooms, server rooms, and remote locations and offices?
a. Vertical
b. Tracer
c. PLC
d. Plenum
a. Vertical
Vertical cable, or backbone cable, refers to the media used to connect telecommunication rooms, server rooms, and remote locations and offices.
Plenum cable is used in the space between the structural ceiling and a drop-down ceiling.
PLC and Tracer are fictitious choices.
A network technician wants to upgrade the company’s hub to avoid collisions.
Which solution would help the technician accomplish this to the fullest extent?
a. Router
b. Switch.
c. Bridge
d. Hub
b. Switch
An Ethernet Layer 2 Switch performs a similar function as a bridge, but in a more granular way, and for many more ports than bridges support. Each switch port is a separate collision domain.
The router’s other interfaces divide the network into 3 logical subnetworks. These subnets map to Layer 2 segments, each implemented using a Switch.
An Ethernet **bridge **works at the Data Link Layer (Layer 2), establishing separate physical network segments while keeping all nodes in the same logical network, reducing the number of collisions
Hubs have no configuration options. The technician connects the device to a power source and then connects the network cables for the hosts, becoming part of the network segment served by the hub.
What is SIEM?
Security Information and Event Management (SIEM)
SIEM gathers logs and data from all sorts of different systems.
It provides real-time or near real-time analysis of security alerts generated by network hardware and applications
What are Hash values used for?
Hashes values are used for verifying data, not for encryption.
Hash values are always fixed in size
Two common hashes are MD5 and SHA-1
A hash function is any function that can be used to map data of arbitrary size to fixed-size values, though there are some hash functions that support variable length output. The values returned by a hash function are called hash values, hash codes, digests, or simply hashes
What might be an example of a network metric?
A. Bandwidth Usage
B. Memory Timings
C. CPU Usage
D. Dropped Packets
A. Bandwidth Usage
Bandwidth usage is very important when determining if your network is running at optimal performance.
Memory timings and CPU usage are more of a local hardware issue.
Dropped packets is something left from pinging another device.
A User moves seamlessly between access points when walking between two campus buildings. Which of the following provides this functionality?
a. Cellular Roaming
b. MU-MIMO
c. ESSID
d. CSMA/CA
e. WPA3
c. EESID
Extended Service Set Identification (ESSID)
Mesh WiFi uses standards (such as 802.11s) where the mesh topology is more complex and the repeaters or access points are all part of the same ESSID (Extended Service Set Identification) which provides a seamless connection.
Which of the following DNS record types is a pointer to the canonical name, which is used to perform a reverse DNS lookup?
a. NS
b. PTR
c. CNAME
d. MX
b. PTR
A PTR record is a pointer to the canonical name, which is used to perform a reverse DNS lookup, in which case the name is returned when the query originates with an IP address.
What Is the Principle of Least Privilege?
The principle of least privilege (PoLP) is an information security concept which maintains that a user or entity should only have access to the specific data, resources and applications needed to complete a required task.
Organizations that follow the principle of least privilege can improve their security posture by significantly reducing their attack surface and risk of malware spread.
The principle of least privilege is also a fundamental pillar of zero trust network access (ZTNA) 2.0 which provides the ability to accurately identify applications and specific application functions across any and all ports and protocols, including dynamic ports, regardless of the IP address or fully qualified domain name (FQDN) an application uses.
Which metric defines the largest data unit that can be passed without fragmentation?
a. DMZ
b. QoS
c. MTU
d. OSPF
c. MTU
The maximum transmission unit (MTU) defines the largest data unit that can be passed without fragmentation.
Which of the following technologies could be used to ensure that users who log into the network are physically in the same building as the network they are attempting to authenticate on? (Select TWO)
a. GPS location
b. NAC
c. Port Security
d. Geo-IP
a. GPS location and b. NAC
GPS (Global Positioning System) can provide accurate geographic location information. It can be used to verify the physical location of a device, ensuring it is within the specified building or area.
NAC (Network Access Control) solutions can enforce policies based on various factors, including the physical location of the device. NAC may integrate with other technologies, such as endpoint security software or network infrastructure, to assess and control access based on location.
The other options are not directly related to verifying the physical location of users in a building:
Port Security is more focused on controlling access to switch ports based on MAC addresses and is not designed to verify the physical location of users.
Geo-IP is a technology that determines the geographical location of a device based on its IP address. While it can provide a general location, it may not be as precise as GPS and may not be suitable for ensuring users are within a specific building.
What is the network ID associated with the host located at 192.168.0.123/29?
a. 192.168.0.64
b. 192.168.0.112
c. 192.168.0.120
d. 192.168.0.96
c. 192.168.0.120
Which of the following is an architecture that specifies a simple and coarse-grained mechanism for classifying and managing network traffic and providing QoS on modern networks?
a. PPoE
b. CoS
c. Diffserv
d. PoE
c. Diffserv
Diffserv (Differentiated services code point) is an architecture that specifies a simple and coarse-grained mechanism for classifying and managing network traffic and providing QoS on modern networks.
a. PPoE (Point-to-Point Protocol over Ethernet) is a network protocol that facilitates communication between network endpoints.
b. CoS (Class of Service) in an Ethernet trunk, CoS is used to define trunk connections as full-duplex, incoming only, or outgoing only.
d. PoE (Power over Ethernet) is technology that passes electric power over twisted-pair Ethernet cable to powered devices (PD)
A network architect is assessing network performance.
Which of the following is part of the CSMA/CD protocol to identify collisions early? (Select ALL that apply):
a. CRC
b. FCS
c. Preamble
d. SFD
c. Preamble and d. SFD
The preamble and the Start Frame Delimiter (SFD) are for clock synchronization and as part of the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol to identify collisions early.
The error checking field contains a 32-bit (4-byte) checksum called the Cyclic Redundancy Check (CRC) The CRC is calculated based on the contents of the Frame.
The Cyclic Redundancy Check is also known as the Frame Check Sequence (FCS). There is no mechanism for retransmission if the damage is detected, nor is the CRC completely accurate at detecting damage.
How do you break down an IPv6 Address?
All IPv6 addresses are 128 bits long.
They are written as 8 groups of 4 hexadecimal digits (16 bits each) and the hexadecimal groups range from 0 to FFFF.
Each group is separated by colons (:)
Which of the following is a fiber standard for Gigabit Ethernet that utilizes single-mode fiber?
a. 1000BASE-SX
b. 1000BASE-LX
c. TIA/EIA 568a
d. RG-6
b. 1000BASE-LX
The 1000BASE-LX fiber standard for Gigabit Ethernet utilizes single-mode fiber.
1000BASE-SX is intended for use with multimode fiber and has a maximum length of 220 meters for default installations.
TIA/EIA 568A (and 568B) are telecommunications standards that specify the pin arrangements for the RJ-45 connectors on UTP or STP cables.
RG-6 is a common type of coaxial cable often used for cable TV and cable modems.
You experience connectivity problems with your SOHO network. What can you change in an attempt to solve this problem?
a. Raise the transfer rate.
b. Lower the transfer rate.
c. Remove all encryption.
d. Shorten the SSID.
b. Lower the transfer rate.
If you experience connectivity problems between wireless devices, try using the lower transfer rate in a fixed mode to achieve a more stable connection.
The higher the transfer rate, the shorter the connection distance.
What utilises Ports 2427 & 2727?
Media Gateway Control Protocol (MGCP)
A protocol used within a distributed Voice over IP system.
TCP, UDP: MGCP uses TCP or UDP as its transport protocol.
The well known port for MGCP gateway traffic is 2427.
The well known port for MGCP call agent traffic is 2727
What is the IPv6 equivalent of 127.0.0.1? (Choose two.)
a. ::1
b. ::24
c. 0:0:0:0:0:0:0:1
d. 0:0:0:0:0:0:0:24
a. ::1 and c. 0:0:0:0:0:0:0:1
The IPv4 address 127.0.0.1 is reserved as the loopback address, and IPv6 has the same reservation. IPv6 addresses 0:0:0:0:0:0:0:0 and 0:0:0:0:0:0:0:1 are reserved as the loopback addresses.
The address 0:0:0:0:0:0:0:1 can be shown using the :: notation with the 0s removed, resulting in ::1.
A multilayer switch is one that can operate at both Layer 2 and Layer 3 of the OSI model, which means the multilayer device can operate as which two of the following devices?
a. A switch and a hub
b. A switch and a router
c. A bridge and a hub
d. A bridge and a switch
b. A switch and a router
A multilayer switch can operate at both Layer 2 and Layer 3 of the OSI model, which means the multilayer device can operate as both a switch and a router.
What kind of connector is this?
ST Connector
Straight Tip connector
The ST Connector uses a half-twist bayonet type of lock.
Which of the following is a method of virtualizing network services instead of running them on proprietary hardware?
a. WLAN
b. NFC
c. NFV
d. SDWAN
b. NFV
Network function virtualization (NFV) is a method of virtualizing network services instead of running them on proprietary hardware.
This is not true of the other options presented.
IPv4 has automatic private IP addressing within the range beginning 169.254.0.0. What is the equivalent addressing in IPv6?
a. There is not an equivalent
b. 0000:: prefix
c. FE80:: prefix
d. FFFF:: prefix
c. FE80:: prefix
In IPv6, the FE80:: prefix is equivalent to the 169.254.0.0 range (automatic private IP addressing) in IPv4.
The other choices are incorrect because the FE80:: prefix is equivalent to the 169.254.0.0 range in IPv4
Which of the following is a proprietary protocol from Cisco used to reduce administration in the switched network?
a. VNMP
b. VCPN
c. VTP
d. VNMC
c. VTP
VLAN Trunking Protocol (VTP) is used to reduce administration in the switched network.
What is the 1st Octet value range of a Class A subnet and how many possible Hosts does that provide?
Class A:
- 1st Octet value range is from 1 to 127
- Provides 16.7 million possible hosts
A switch forwards data only to the port that connects to the destination device. It knows which port to forward it to based on which value?
a. Conf value
b. Port number
c. IP address
d. MAC address
d. MAC address
Whereas a hub forwards the data it receives to all the ports on the device, a switch forwards it only to the port that connects to the destination device.
It does this by checking the MAC address of the devices attached to it and then matching the destination MAC address in the data it receives.
What is the cable type for 10Base2?
Thin Coaxial
Which implementation of DSL is the most common?
a. ADSL
b. SDSL
c. VDSL
d. IDSL
a. ADSL
The most common implementation of DSL is ADSL (asymmetric), which provides a high data rate in only one direction.
While the other variants of DSL are available, they are not as popular as ADSL.
All variants of DSL are decreasing in popularity in recent years as more are turning to cable and fiber solutions for high-speed Internet and network access.
A network administrator is trying to power off a Cisco switch, but it is not working. The administrator needs to be in which mode to perform this task?
a. Global configuration
b. User
c. Autonegotiate
d. Enable
d. Enable
Privileged EXEC mode (also called ENABLE mode) allows the user to reboot or shut down the appliance and to backup and restore the system configuration.
Global configuration mode allows the user to write configuration updates. This is important to consider when automatically pushing out configuration updates as well.
User EXEC mode is a read-only mode where commands can report the configuration, show system status, or run basic troubleshooting tools.
Autonegotiate is not a user mode, but the network administrator sets the port on the switch to autonegotiate speed (10/100/1000) and full – or half-duplex operation.
Which of the following is a technology that uses short path labels instead of longer network addresses to direct data from one node to another?
a. MPLS
b. Metropolitan Ethernet
c. PPPoE
d. GSM/CDMA
a. MPLS
MPLS (Multiprotocol Label Switching) is a technology that uses short path labels instead of longer network addresses to direct data from one node to another.
This is not true of the other options presented.
A security analyst is reviewing malicious packets and trying to understand the IPv4 header.
What is the first field in an IPv4 header?
a. Header Length
b. Version
c. Protocol
d. Source address
b. Version
The version field is the first field in an IPv4 packet and indicates the version of the internet protocol in use, which in the case of IPv4, is 4.
The field after Version is field length.
The protocol field describes what is contained (encapsulated) in the payload.
The source and destination addresses do not occur until the end of the header, before options and data. (The options field is not as common in IPv4)
Which of the following statements are associated with a bus LAN network? (Choose all correct answers.)
a. All devices connect to a central device.
b. A single cable break can cause complete network disruption.
c. It uses a single backbone to connect all network devices.
d. It uses a dual-ring configuration.
b. A single cable break can cause complete network disruption. and d. It uses a single backbone to connect all network devices.
In a bus network, a single break in the network cable can disrupt all the devices on that segment of the network, a significant shortcoming.
A bus network also uses a single cable as a backbone to which all networking devices attach.
A star network requires networked devices to connect to a centralized device such as a hub, switch, or MSAU.
Answer D is also incorrect because it does not use a dual-ring configuration.
Which of the following OSI layers is responsible for establishing connections between two devices?
a. Network
b. Data link
c. Session
d. Transport
d. Transport
The transport layer is responsible for establishing a connection between networked devices.
The network layer is most commonly associated with route discovery and datagram delivery.
Protocols at the session layer synchronize the data exchange between applications on separate devices.
Protocols at the data link layer perform error detection and handling for the transmitted signals and define the method by which the medium is accessed.
A system administrator wants to verify that external IP addresses cannot collect software versioning from servers on the network.
Which of the following should the system administrator do to confirm the network is protected?
a. Analyze packet captures
b. Use Nmap to query known ports
c. Review the ID3 logs on the netowrk
d. Utilize netstat to locate active connections
a. Analyze packet captures
Packet captures contain every packet that is sent and received by the network.
By using a program like Wireshark to analyze the packet captures, you can see what kind of information and metadata is contained within the packets.
By conducting this type of packet analysis, an attacker (or cybersecurity analyst) can determine if software versions are being sent as part of the packets and their associated metadata.
You’ve been summoned to a small law firm to help a client with networking issues that cropped up when it added a number of new workstations.
The CIDR notation appearing in the documentation kept onsite is 192.168.12.0/26.
What is the range of IPv4 addresses that can be assigned to workstations?
a. 192.168.12.1 to 192.168.12.128
b. 192.168.12.1 to 192.168.12.62
c. 192.168.12.1 to 192.168.12.32
d. 192.168.12.1 to 192.168.12.255
b. 192.168.12.1 to 192.168.12.62
The IP addresses available beneath 192.168.12.0/26 range from 192.168.12.1 to 192.168.12.62.
With 26 mask bits, only 62 hosts can exist on a subnet. The other choices are incorrect because they do not represent the correct range of IPv4 addresses that can be assigned to workstations.
A network technician is setting up a connection between switches, but is not establishing a connection.
Which of the following would be the most likely cause for it not to work?
A. Duel MDI-X ports
B. Uplink port
C. Crossover cables
D. Autonegotiation
a. Duel MDI-X ports
When a switch needs to connect to another switch, communications would fail if BOTH interfaces used media dependent interface crossover (MDI-X). One switch should use MDI and the other switch should use MDI-X
Historically (in the days of hubs and very early 10/100 switches), dedicated uplink ports connected to switches.
Network administrators used crossover cables in conjunction with dedicated uplink ports to connect switches.
Nowadays, network administrators configure most switch interfaces to use auto-MDI/MIDX by default. This means that the switch senses the configuration of the connected device and cable wiring and ensures that an MDI uplink to an MDIX port gets configured.
Users are complaining that the network’s performance is unsatisfactory. It takes a long time to pull files from the server, and, under heavy loads, workstations can become disconnected from the server. The network is heavily used, and a new videoconferencing application is about to be installed. The network is a 1000BASE-T system created with Ethernet hubs. Which device are you most likely to install to alleviate the performance problems?
a. Firewall
b. Media converter
c. Switch
d. Router
c. Switch
Replacing Ethernet hubs with switches can yield significant performance improvements. Of the devices listed, switches are also the only ones that can be substituted for hubs.
A router is used to separate networks, not as a connectivity point for workstations.
A media converter is used to connect two dissimilar types of network media.
A firewall is not a solution to the problem presented.
Name 3 or more different Antenna Types:
- Omni Antenna: Sphere shaped radiation pattern
- Dipole Antenna: Flat doughnut shaped radiation pattern
- Patch Antenna: Half of a sphere radiation pattern (e.g. ceiling mount)
- Directional (Yagi) Antenna: Stretched Football shaped radiation pattern (e.g. building to building mount)
- Directional (Parabolic) Antenna: Point to Point for miles
When might 0.0.0.0/8 be used?
0.0.0.0/8 can be used when a specific address is unknown.
It may be used as a source address by a client seeking a DHCP lease.
What is a VLAN and what do VLANs do?
A virtual local area network (VLAN).
A VLAN breaks a single network into multiple sections, splitting one broadcast domain into two or more broadcast domains.
It is a logical subnetwork that groups a collection of devices from different physical LANs and is often employed to help improve traffic management.
Several kinds of physical networks support VLANs, including Ethernet and Wi-Fi .
By logically separating ports and additional switches from one another, a VLAN effectively creates multiple standalone networks out of the same networking backbone. This is more secure, and it reduces the number of broadcasts individual devices receive.
What is the lowest layer (bottom layer) of a bare metal virtualization environment?
a. Hypervisor
b. Host Operating System
c. Physical Hardware
d. Guest Operating System
c. Physical Hardware
You need to purchase a wireless router that operates on 2.4GHz and 5GHz bands.
Which standard would cover this?
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.11ac
d. 802.11n covers both 2.4GHz and 5GHz
a. 802.11a only operates at 5GHz
b. 802.11b only operates at 2.4GHz
c. 802.11g both operates at 2.4GHz
e. 802.11ac operates at 5GHz
Which would be an example of a Denial of Service (DoS) attack:
1. A Ping Flood
2. Masquerading
3. Opening Multiple Web Browser Pages
4. VLAN Hopping
A Ping Flood is an example of a Denial of Service (DoS).
A ping flood will send continuous ping requests to a computer which will eventually crash it.
Masquerading is a social engineering tactic to get someone to give you personal information.
Opening a bunch of web browser pages will simply crash a system that doesn’t have enough memory to handle it.
VLAN hopping is more of a way to access data rather than crash a system.
Remember, the point of DoS is to deny service to resources.
Which of the following can be thought of as the “fiber to the home” connection?
a. mGRE
b. PAN
c. Metro-optical
d. SDWAN
c. Metro-optical
Metro-optical networks can span up to several hundred kilometers and are used to serve metropolitan areas in which there is a large, concentrated population: one way to think of them is as the “fiber to the home” connection.
Multipoint Generic Routing Encapsulation (mGRE) is used to connect multiple remote sites through a VPN.
PAN is a Personal Area Network
A network administrator is setting up a simple connection point for multiple devices to connect to and become part of the same network segment.
Which of the following cannot be configured?
A. Bridge
B. Switch
C. Hub
D. Router.
c. Hub
Hubs have no configuration options. The technician connects the device to a power source and then connects the network cables for the hosts, becoming part of the network segment served by the hub.
An Ethernet bridge works at the Data Link Layer (Layer 2), establishing separate physical network segments while keeping all notes in the same logical network, reducing the number of collisions.
An Ethernet Layer 2 Switch performs a similar function as a bridge, but in a more granular way, and for many more ports than bridges support. Each Switch port is a separate collision domain.
The router’s other interfaces divide the network into 3 logical subnetworks. These subnets map to Layer 2 segments, each implemented using a Switch
What device is used to configure various hypervisor guests to use different VLANs in the same virtualization environment?
a. Virtual Switch
b. NIC teaming
c. Virtual router
d. Virtual firewall
a. Virtual Switch
A Virtual Switch is used to configure various hypervisor guests to use different VLANs in the same virtualization environment
Which of the following is PoE+ also known as?
a. 802.3at
b. 802.3aa
c. 802.3ac
d. 802.3af
a. 802.3at
IEEE 802.3at is more commonly known as PoE+ which is Power over Ethernet enhancements at 25.5 W
There is no specific “802.3aa standard within the IEEE 802.3 series.
802.3ac is a 1998 VLAN tag which expanded the maximum frame size to 1522 bytes.
IEEE 802.3af is Power over Ethernet at 15.4 W
Which type of network is depicted in the figure?
a. Local-area network (LAN)
b. Wide-area network (WAN)
c. Metropolitan-area network (MAN)
d. Campus-area network (CAN)
b. Wide-area network (WAN)
A wide-area network (WAN) spans more than one geographic location, often connecting separated LANs. WANs are slower than LANs and often require additional and costly hardware, such as routers, dedicated leased lines, and complicated implementation procedures.
NTP uses a hierarchical, semi-layered system of time sources wherein each level of the hierarchy is termed a
a. Scope
b. Relay
c. Stratum
d. Lease
c. Stratum
NTP uses a hierarchical, semi-layered system of time sources wherein each level of the hierarchy is termed a stratum.
Each stratum/level is assigned a number starting with zero for the reference clock at the top and incrementing from there with the number representing the distance from the reference clock: this means that a server synchronized to a stratum n server runs at stratum n + 1.
All other choices presented (Lease, Relay, and Scope) are associated with DHCP and not with NTP.
Which of the following is a single-sign on authentication method?
a. CHAP
b. IPsec
c. EAPol
d. SSL
e. Kerberos
e. Kerberos
Kerberos is an authentication protocol, which provides a Single Sign On (SSO) based on a trusted 3rd party mutal authentication service.
It’s default Port is 88.
On a VLAN, what creates multiple paths to the storage resources and can be used to increase availability and add fault tolerance?
a. Multipathing
b. FCoE
c. Adding a management plane
d. Colocating
a. Multipathing
On a VLAN, multipathing creates multiple paths to the storage resources and can be used to increase availability and add fault tolerance.
Provide 3 examples of Password Policy
- Complexity
- Password age
- Lock-out
Which of the following would be BEST to use to detect a MAC spoofing attack?
a . Internet Control Message Protocol
b . Reverse Address Resolution Protocol
c . Dynamic Host Configuration Protocol
d . Internet Message Access Protocol
b . Reverse Address Resolution Protocol
Reverse Address Resolution Protocol (RARP) is a protocol that allows a device to obtain its MAC address from its IP address.
A MAC spoofing attack is an attack where a device pretends to have a different MAC address than its actual one. RARP can be used to detect a MAC spoofing attack by comparing the MAC address obtained from RARP with the MAC address obtained from other sources, such as ARP or DHCP.
A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay.
Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)
a. CPU usage
b. Memory
c. Temperature
d. Bandwidth
e. Latency
f. Jitter
a. CPU Usage
High CPU usage can contribute to slow performance, especially in virtualized environments where multiple VMs share the same physical resources.
b. Memory
Insufficient memory or high memory usage can lead to performance issues, as VMs may struggle to allocate the necessary resources.
Temperature is more related to hardware health.
Bandwidth, latency, and jitter are more relevant to network performance.
What is the speed usually offered with dial-up service?
a. 56 Kbps
b. 144 Kbps
c. 256 Kbps
d. 1 Gbps
a. 56 Kbps
Almost without exception, ISPs offer 56 Kbps access, the maximum possible under current dial-up standards.
Which one of the following routing protocols is used to exchange route information between public autonomous systems?
a. OSPF
b. BGP
c. EIGRP
d. RIP
b. BGP
BGP is the protocol that makes the Internet work by enabling data routing.
Border Gateway Protocol (BGP) is the postal service of the Internet. When someone drops a letter into a mailbox, the Postal Service processes that piece of mail and chooses a fast, efficient route to deliver that letter to its recipient.
Similarly, when someone submits data via the Internet, BGP is responsible for looking at all of the available paths that data could travel and picking the best route, which usually means hopping between autonomous systems.
Which of the following enables administrators to monitor the traffic outbound and inbound to the switch?
a. HSRP
b. Port mirroring
c. Trunking
d. Spanning Tree Algorithm
b. Port mirroring
Port mirroring enables administrators to monitor the traffic outbound and inbound to the switch.
What is a hypervisor?
A Hypervisor is a special type of operating system that enables many Virtual Machine ‘guests’ to run on the same physical hardware.
A network technician wants to centrally manage the switches and segment the switches into separate broadcast domains. The Training network is currently using VLAN 1 for all of its devices and uses a single private IP address range with a 24-bit mask. Their supervisor wants VLAN 100 to be the management subnet and all of the switches must share VLAN information.
Which of the following should the technician configure to meet these requirements?
a. Configure VTP and 802.1x on all inter-switch connections with native VLAN 100
b. Configure VTP and 802.1q on the inter-switch connections with native VLAN 100 ?
c. Configure STP and 802.1q on the inter-switch connections with native VLAN 100
d. Configure STP and 802.1w on the inter-switch connections with native VLAN 100
e. Configure VSLM for the IP address range
b. Configure VTP and 802.1q on the inter-switch connections with native VLAN 100
VTP (VLAN Trunking Protocol): VTP is used for managing VLAN configuration across multiple switches. By configuring VTP, the technician can ensure that VLAN information is shared centrally, making it easier to manage VLANs consistently across all switches.
802.1q (IEEE 802.1Q): This is the standard for VLAN tagging. It allows for the implementation of VLANs on a network and supports the use of VLAN IDs. In this case, configuring 802.1q on the inter-switch connections ensures that VLAN information is carried between the switches.
Native VLAN 100: Setting the native VLAN to 100 on the inter-switch connections ensures that untagged frames (frames without VLAN tags) are treated as belonging to VLAN 100. This aligns with the requirement of using VLAN 100 as the management subnet.
a. is incorrect because 802.1x is related to port-based network access control, not VLAN management.
c. is incorrect because STP (Spanning Tree Protocol) is used for loop prevention, and while it is important in a network, it doesn’t directly address the requirement for centrally managing VLANs.
d. is incorrect because 802.1w is a version of the Rapid Spanning Tree Protocol (RSTP), and it’s not directly related to VLAN management.
e. is incorrect because VLSM (Variable Length Subnet Masking) is used for optimizing IP address allocation. Configuring VLSM for the IP address range is not relevant to the requirement of centrally managing switches and segmenting into separate broadcast domains.
Which of the following can serve as load balancers?
a. Multilayer switches and IPS
b. VoIP PBXs and UTM appliances
c. Multilayer switches and DNS servers
d. IDS and DNS servers
c. Multilayer switches and DNS servers
Multilayer switches and DNS servers can serve as load balancers.
What are PDUs?
Protocol Data Units (PDUs).
In networking, a protocol data unit (PDU) is the basic unit of exchange between entities that communicate using a specified networking protocol.
When working with a multilayer protocol stack, like the TCP/IP networking suite, use of the correct PDU is important when discussing protocol interactions.
What tool would you use when working with an IDC?
a. Media tester
b. Wire crimper
c. Punchdown tool
d. OTDR
c. Punchdown tool
You use a punchdown tool (RJ-45 or Krone) to terminate the Ethernet cables by inserting the cable wires into the insulation-displacement connector (IDC).
All the other tools are associated with making and troubleshooting cables; they are not associated with IDCs.
Which of the following are distance-vector protocols?
a. RIP
b. EIGRP
c. IS-IS
d. OSPF
RIP and EIGRP are both distance-vector protocols
a. RIP (Routing Information Protocol) is a distance-vector protocol
b. EIGRP (Enhanced Interior Gateway Routing Protocol) is a distance vector protocol
c. Intermediate System-to-Intermediate System (IS-IS) is a link-state protocol.
d. Open Shortest Path First (OSPF) is a link-state protocol
A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101 network but gets the following response: U.U.U.U.
Which of the following needs to be configured for these networks to reach each other?
a. Network address translation
b. Default gateway
c. Loopback
d. Routing protocol
b. Default gateway
Although most people have never seen “U.U.U.U” before, it seems that this response would indicate that the packets are being transmitted, but a downstream router is having trouble routing them.
This error message is usually seen when the destination network is unreachable.
A network administrator would like to collect information from several networking devices using SNMP.
Which of the following SNMP options should a network administrator use to ensure the data transferred is confidential?
a. Authpriv
b. SHA
c. MD5
d. Authentication passphrase
d. AuthPriv
SNMPv3 defines communication with authentication and privacy (AuthPriv) as one of three mechanisms available. It uses MD5 and SHA for authentication and either DES or AES for privacy.
SHA and MD5 are used in the solution, however they are not sufficient on their own.
An authentication passphrase would be insufficient to sustain confidentiality of the data.
You are implementing a new network that will use 1000BASE-T with switches configured for full duplex.
What is the maximum throughput that will be possible between two devices on the network?
a. 100 Mbps
b. 1000 Mbps
c. 2000 Mbps
d. 200 Mbps
c. 2000 Mbps
1000BASE-T is a network standard that runs at 1000 Mbps.
A full-duplex configuration in a switched environment gives a maximum throughput between two devices of 2000 Mbps.
A security administrator is investigating a CAM table flooded by an attacker. In the packet capture, what protocol should the security administrator filter on to look at related traffic?
a. ARP
b. IP
c. TCP
d. HTTP
a. ARP
Content Addressable Memory (CAM) table is a system memory construct used by Ethernet switch logic which stores information such as MAC addresses available on physical ports with their associated VLAN Parameters.
The Transmission Control Protocol/Internet Protocol (TCP/IP) suite includes the Address Resolution Protocol (ARP). The ARP performs the task of resolving an IP address to a hardware address. ARP messaging is only available to use with Ethernet.
You are installing a new network in your one-floor office building. You want to make sure everyone in the office can connect to the wireless access point with a good signal so you are going to install it in the ceiling in the middle of the office.
Which type of antenna should the access point have?
a. Omni antenna
b. Patch antenna
c. Yagi antenna
a. Omni antenna
The signal from an OMNI antenna spreads out to all directions, so it is good to place in the centre of the room, so it emanates to every device on the floor.
A Patch antenna is meant to go on a wall and radiate in one direction.
A Yagi antenna is used to send a strong signal in one direction.
In fiber connections, what does UPC stand for?
UPC is the acronym for Ultra Physical Contact.
Aqua and blue denote a straight through (or UPC) polish and green denotes an angled (or APC) polish.
UPC is an improvement over the APC fiber connector. It has a better surface finish after an extended polishing and the return loss is better by -50dB or higher.
File systems built on top of SANs can provide file-level access, but the SAN itself does not provide file abstraction, only operations at what level?
a. Server-level
b. Bit-level
c. Byte-level
d. Block-level
d. Block-level
A storage-area network (SAN) consists of networked/shared storage devices, are a subset of LANs, and allow you to use multiple devices to increase performance at block-level data storage.
Note: Block level storage, or block storage, is storage used for structured data and is commonly deployed in Storage Area Network (SAN) systems. It uses Internet Small Computer Systems Interface (iSCSI) and Fibre Channel (FC) protocols.
A wireless network in a small office has and SSID of WifiAP1.
A user who feels he needs more bandwidth irresponsibly connects another wireless access point and names it WifiAP1 also. Other users are accidentally connecting to this 2nd access point and they are not getting the security they need because the WAP wasn’t configured properly.
What is this 2nd access point known as?
a. A Rogue DHCP Server
b. A Man in the Middle
c. An Evil Twin
d. A Rogue Firewall
a. An Evil Twin
An Evil Twin is another WAP on your network that isn’t supposed to be there.
While this scenario can lead to a rogue DHCP server, there isn’t enough information to prove this.
This Evil Twin COULD be used for a Man-In-The-Middle attack, but again, there isn’t enough information in the scenario.
A Rogue Firewall really isn’t a thing.
What are two features supported in SNMPv3 and not previous versions?
a. Encryption
b. Platform independence
c. Authentication
d. Dynamic mapping
a. Encryption and c. Authentication
As opposed to earlier versions, Simple Network Management Protocol version 3 (SNMPv3) supports both authentication and encryption.
A home user reports to a network technician that the Internet is slow when they attempt to use their smartphone or laptop with their Wi-Fi network. The network administrator logs into the admin area of the user’s access point and discovers that multiple unknown devices are connected to it.
What is MOST likely the cause of this issue?
a. An Evil Twin has been implemented
b. A Successful WPS attack has occurred
c. The user is experiencing ARP Poisoning
d. The User is connected to a botnet.
b. A Successful WPS attack has occurred
Wi-Fi Protected Setup (WPS) allows users to configure a wireless network without typing in the passphrase. Instead, users can configure devices by pressing buttons or by entering a short personal identification number (PIN).
Unfortunately, WPS is fairly easy to hack and unknown devices can then connect to your network without permission. This is the most likely cause of the issue described in the question.
How do you shorten an IPv6 address?
IPv6 addresses are hexadecimal and since they are 128-bit, they are quite long:.
Original: 2041:0000:140F:0000:0000:0000:875B:131B
Method 1:
If there is a string of zeros then you can remove them once. In the example above I removed the entire 0000:0000:0000 part. You can only do this once, your IPv6 device will fill up the remaining space with zeros until it has a 128 bit address.
Short: 2041:0000:140F::875B:131B
Method 2:
If you have a “hextet” with 4 zeros then you can remove those and leave a single zero. Your IPv6 device will add the remaining 3 zeros.
Short: 2041:0000:140F::875B:131B
Shorter: 2041:0:140F::875B:131B
What is the purpose of RFC 1918
RFC 1918 is used to document how organizations could conduct address allocation for private Internets (Intra-nets)
Explain what IaaS is
Infrastructure as a service (IaaS) is a type of cloud computing service that offers essential compute, storage and networking resources on demand, and on a pay-as-you-go basis.
IaaS is one of the most well known types of cloud services. Others include Software as a service (SaaS), Platform as a Service (PaaS), and Coding as a Service (CaaS), and Serverless.
A network administrator has configured a new 250 Mbps WAN circuit, but a bandwidth speed test show poor performance when downloading larger files. The download initially reaches close to 250 Mbps but begins to drop and show spikes in the download speeds over time. The administrator checks the interface on the router and sees the following:
*ABCRTR01# show interface eth 1/1 GigabitEthernet 1/1 is up, line is up Hardware is GigabitEhternet, address is 000F.33cc.F13A Configures speed auto, actual 1 Gbit, configured duplex fdx, actual fdx Member of L2 VLAN 1, port is untagged, port state is forwarding.
Which of the following actions should be taken to improve the network performance of this WAN connection?
a. Replace eth1/1 with a 1000BaseT tranceiver
b. Shutdown and then re-enable this interface
c. configure the interface to use full duplex
d. Assign the interface a 802.1q tag to it’s own VLAN
d. Assign the interface a 802.1q tag to it’s own VLAN
The WAN interface (eth1/1) is currently untagged and is being assigned to the default VLAN (VLAN !). If there are numerous devices in the default VLAN, the VLAN may be overloaded or oversubscribed, leading to a reduction in the network performance.
To solve this issue, you would assign the WAN interface to a VLAN with less traffic or to it’s own VLAN.
By adding an 802.1q (VLAN tag) to the interface, you can assign it to it’s own individual VLAN and eliminate potential overloading or oversubscription issues. Theinterface is already set to full duplex (fdx) and operating in full duplex (fdx). Therefore the issue is not a duplexing mismatch.
The configuration shows tha the interface is already using a GigabitEthernet, so you do not need to replace the transceiver with a 1000Base-T module.
Also the physical layer is working properly and a link is established, as shown by the output “GigabitEthernet 1/1 is up”, showing the current transceiver is functioning properly at 1Gbps.
While issuing the shutdown command and then re-enabling the interface would clear any errors, based onthe interface status show, we have no indications that errors are being detected or reported.
Which statements about IPv6 and routing protocols are accurate? (Choose two)
a. EIGRPv3 was developed to support IPv6 routing
b. OSPFv3 was developed to support IPv6
c. Loopback addresses are used to form routing adjacencies
d. EIGRP, OSPF, and BGP are the only routing protocols that support IPv6
e. RIPng was developed to support IPv6 routing
b. OSPFv3 was developed to support IPv6 and e. RIPng was developed to support IPv6 routing
Which of the following are reasons to implement a proxy server?
a. To provide NAT services
b. To provide automatic IP addressing on the network
c. To protect the internal network from intruders
d. To centrally control Internet access
a. To provide NAT services and d. To centrally control Internet access
A proxy server acts as a centralized point for Internet access, thus making it easy to control a user’s Internet use.
Also, the proxy server provides Network Address Translation services as requests are sent to the Internet using the address of the proxy server’s external interface, not the system that sent it.
A Systems Administrator is setting up severs with standard network interface cards (NICs).
Which two of the following do most standard NICs support (Select all that apply):
a. Gigabit Ethernet
b. Fast Ethernet
c. 10 GbE
d. 40 GbE
a. Gigabit Ethernet and b. Fast Ethernet
Most Ethernet adapters support Gigabit Ethernet, as they are designed for use with copper cabling and are capable of 10/100/1000 operation.
Most Ethernet adapters support Fast Ethernet, meaning that they support Gigabit Ethernet, Fast Ethernet and 10BASE-T.
A sysadmin would have to provision for a different king of adapter for 10GbE or 40GbE, which come at a considerable price premium over basic Gigabit models.
What is the connection point between the operator’s part of the network and the customer’s portion of the network?
a. Distinction
b. Frontier
c. Segregation
d. Demarcation
d. Demarcation
A network’s demarcation point is the connection point between the operator’s part of the network and the customer’s portion of the network.
Which type of IDS/IPS is primarily focused on evaluating attacks based on attack signatures and audit trails?
a. Signature based
b. Empirical based
c. Analytic based
d. Behavior based
a. Signature based
A signature-based system, also commonly known as misuse-detection system (MD-IDS/MD-IPS), is primarily focused on evaluating attacks based on attack signatures and audit trails.
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?
a. SSO
b. TACACS+
c. Zero Trust
d. Separation of duties
e. Multifactor authentication
b. TACACS+
Terminal Access Controller Access-Control System (TACACS), is a network protocol that was developed by Cisco.
TACACS is a network protocol designed for centralized authentication, authorization, and accounting (AAA) services for network devices, such as routers
It allows granular access control. Packet Encryption. RADIUS encrypts only the password in the access request packet.
TACACS+ encrypts the entire packet content, ensuring a higher level of security.
Name the 3 tiers of a Classic Data Centre Architecture
Top: Tier 1 - Core Layer
Middle: Tier 2 - Distribution/
Aggregation Layer
Bottom: Tier 3 - Access/Edge Layer
In a crossover cable, which wires are crossed?
a. Wires 1 and 3 and wires 5 and 7
b. Wires 2 and 4 and wires 6 and 8
c. Wires 1 and 3 and wires 2 and 6
d. Wires 1 and 2 and wires 3 and 4
c. Wires 1 and 3 and wires 2 and 6
In a crossover cable, wires 1 and 3 and wires 2 and 6 are crossed.
What is the 1st Octet value range of a Class C subnet and how many possible Hosts does that provide?
Class C:
- 1st Octet value range is from 192 to 223
- Provides 254 possible hosts
The CIDR notation for the network you are now troubleshooting is 192.168.67.32/28.
What is the range of IPv4 addresses that can be assigned to workstations?
a. 192.168.67.33 to 192.168.67.46
b. 192.168.67.1 to 192.168.67.126
c. 192.168.67.33 to 192.168.67.62
d. 192.168.67.1 to 192.168.67.62
a. 192.168.67.33 to 192.168.67.46
The IP addresses available beneath 192.168.67.32/28 range from 192.168.67.33 to 192.168.67.46.
With 28 mask bits, only 14 hosts can exist on a subnet.
The other options are incorrect ranges for the address and subnet values given.
What is the Cable Type for 10BaseT, 100BaseT and 1000BaseT?
Unshielded Twisted Pair
What is ICMP?
Internet Control Message Protocol (ICMP) is a Layer 3, supporting protocol, in the Internet protocol suite.
It is used by network devices, including routers, to send error messages and operational information indicating success or failure when communicating with another IP address, for example, an error is indicated when a requested service is not available or that a host or router could not be reached.
ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems, nor is it regularly employed by end-user network applications (with the exception of some diagnostic tools like ping and traceroute).
ICMP for IPv4 is defined in RFC 792. A separate ICMPv6 is defined by RFC 4443. ICMP has nothing to do with Port Numbers.
At which OSI layer does a Wireless Access Point operate?
a. Data link
b. Session
c. Network
d. Physical
a. Data link
A Wireless Access Point (AP) operates at the data link layer of the OSI model.
An example of a network layer device is a router.
An example of a physical layer device is a hub.
Session layer components normally are software, not hardware.
What kind of cable would you associate with an F-type connector?
a. UTP
b. Fiber-optic
c. STP
d. Coaxial
d. Coaxial
F-type connectors are used with coaxial cables.
They are not used with fiber-optic, unshielded twisted-pair (UTP), or shielded twisted-pair (STP) cabling.
A network administrator wants to be able to address multiple address hosts.
Which two of the following would accomplish this task? (Select all that apply)
a. Broadcast
b. ff:ff:ff:ff:ff:ff
c. Unicast
d. 255.255.240.0
a. Broadcast and b. ff:ff:ff:ff:ff:ff
One method of addressing multiple hosts is to perform a broadcast. An administrator performs a broadcast by sending a packet to the network or subnet’s broadcast addresses.
Implemented broadcasts occur at layer 2 by sending them to the MAC address ff:ff:ff:ff:ff:ff. All hosts connected to the switch (or in the same VLAN) will recieve them.
What is VLSM?
Variable Length Subnet Mask (VSLM)
Where the subnet design uses more than one mask in the same network, which means more than one mask is used for different subnets of a single class A, B, C or a network.
It is used to increase the usability of subnets as they can be of variable size.
What speed and frequency does Wireless standard 802.11g have?
802.11g:
- 54 Mbps
- 2.4 GHz
A network administrator is tasked with building a wireless network in a new building located next door to your company’s office building. The wireless clients should not be able to communicate with other wireless clients but should be able to communicate with any wired users on the network. The users must be able to seamlessly migrate between the buildings while maintaining a constant connection to the LAN.
How should the administrator configure the new wireless network in this new building?
a. Use the same SSIDs on different channels and with AP isolation ?
b. Use the same SSIDs on the same channels with AP isolation
c. Use different SSIDs on the same channels with VLANs
d. Use different SSIDs on different channels and VLANs
a. Use the same SSIDs on different channels and with AP isolation
Which of the following are considered transport protocols? (Choose the two best answers.)
a. TCP
b. UDP
c. IP
d. THC
a. TCP and b. UDP
Both TCP and UDP are transport protocols.
IP is a network protocol.
THC is not a valid protocol.
In Network Security, what is a Zero Day Vulnerability?
Zero Day Vulnerability:
Any unknown vulnerabilities, e.g. weakness in the system design, implementation, software code, or a lack of preventative mechanisms in place.