Cram Flashcards
What is the maximum number of computers recommended for inclusion in a
peer-to-peer network?
❍ A. 2
❍ B. 5
❍ C. 10
❍ D. 25
C. The maximum number of computers recommended in a peer-to-peer network
is 10
When a WAN is confined to a certain geographic area, such as a university campus
or city, it is known as a
❍ A. LAN
❍ B. MAN
❍ C. VAN
❍ D. VPN
B. A WAN can be referred to as a MAN (Metropolitan Area Network) when it is
confined to a certain geographic area, such as a university campus or city.
You have been asked to install a network to give the network users the greatest
amount of fault tolerance. Which of the following network topologies would you
choose?
❍ A. Star
❍ B. Ring
❍ C. Mesh
❍ D. Bus
C. A mesh network uses a point-to-point connection to every device on the network.
This creates multiple points for the data to transmit around the network
and therefore creates a high degree of redundancy. The star, ring, and bus
topologies do not offer fault tolerance.
Which of the following topologies enables network expansion with the least
amount of disruption for the current network users?
❍ A. Bus
❍ B. Ring
❍ C. LAN
❍ D. Star
D. On a star network, each network device uses a separate cable to make a
point-to-point connection to a centralized device such as a hub or switch. With
such a configuration, you can add a new device to the network by attaching the
new device to the hub or switch with its own cable. This process does not disrupt
the users who are currently on the network. Answers A and B are incorrect
because the addition of new network devices on a ring or bus network can
cause a disruption in the network and cause network services to be unavailable
during the installation of a new device. A LAN (local area network) is created
using any topology and is not a topology in and of itself.
You have been asked to connect two office locations. It has been specified that
you use a wireless link. Which of the following strategies would you use to connect
the two offices? ❍ A. Point-to-point ❍ B. Wireless mesh ❍ C. PtMP ❍ D. Star bus hybrid
A. In a point-to-point (PtP) wireless configuration, the communication link travels
from one node directly to one other node. Wireless point-to-point systems are
often used in wireless backbone systems such as microwave relay communications
or as a replacement for a single wired communication cable. You can use
the point-to-point link to connect two locations to share data and resources. The
other choices are not appropriate options for creating the wanted connection.
Which network topology offers the greatest level of redundancy but also has the
highest implementation cost?
❍ A. Wireless mesh
❍ B. Wired mesh
❍ C. Hybrid star
❍ D. Bus network
B. The wired mesh topology requires each computer on the network to be individually
connected to every other device. This configuration provides maximum
reliability and redundancy for the network. However, of those listed, it is the most
costly to implement because of the multiple wiring requirements.
Which of the following statements are associated with a bus LAN network?
(Choose all correct answers.)
❍ A. A single cable break can cause complete network disruption.
❍ B. All devices connect to a central device.
❍ C. It uses a single backbone to connect all network devices.
❍ D. It uses a dual-ring configuration
A, C. In a bus network, a single break in the network cable can disrupt all the
devices on that segment of the network—a significant shortcoming. A bus network
also uses a single cable as a backbone to which all networking devices
attach. A star network requires networked devices to connect to a centralized
device such as a hub or MSAU. It does not use a dual-ring configuration.
Therefore, answer B is incorrect.
Which of the following statements best describes a VPN?
❍ A. It is any protocol that enables remote clients to log in to a server over
a network such as the Internet.
❍ B. It provides a system whereby only screen display and keyboard and
mouse input travel across the link.
❍ C. It is a secure communication channel across a public network such
as the Internet.
❍ D. It is a protocol used to encrypt user IDs and passwords.
C. A VPN provides a secure communication path between devices over a public
network such as the Internet.
Which of the following are required to establish a VPN connection? (Choose all
correct answers.)
❍ A. VPN server
❍ B. VPN client
❍ C. VPN protocols
❍ D. VPN MAC identification
A, B, C. Many elements are involved in establishing a VPN connection. This
includes the VPN client to initiate the session, the VPN server to answer the
client requests, and the VPN protocols to secure and establish the connection.
Which of the following are valid ways to assign computers to a VLAN? (Choose
the three best answers.)
❍ A. Protocol assignment
❍ B. Port-based assignment
❍ C. NetBIOS computer name
❍ D. MAC address
A, B, D. VLANs can be created by using protocol assignments, by defining the
ports on a device as belonging to a VLAN, or by using MAC addresses. VLANs
cannot be created by using the NetBIOS computer name.
At which OSI layer does an AP operate?
❍ A. Network
❍ B. Physical
❍ C. Data link
❍ D. Session
C. A wireless access point (AP) operates at the data link layer of the OSI model.
An example of a network layer device is a router. An example of a physical layer
device is a hub. Session layer components normally are software, not hardware.
Which of the following are sublayers of the data link layer? (Choose two.)
❍ A. MAC
❍ B. LCL
❍ C. Session
❍ D. LLC
A, D. The data link layer is broken into two distinct sublayers: Media Access
Control (MAC) and Logical Link Control (LLC). LCL is not a valid term. Session is
another of the OSI model layers.
At which two OSI layers can a switch operate? (Choose two.)
❍ A. Layer 1
❍ B. Layer 2
❍ C. Layer 3
❍ D. Layer 4
B, C. A switch uses the MAC addresses of connected devices to make its forwarding
decisions. Therefore, it is called a data link, or Layer 2, network device.
It can also operate at layer 3 or be a multilayer switch. Devices or components
that operate at Layer 1 typically are media-based, such as cables or connectors.
Layer 4 components typically are software-based, not hardware-based.
Which of the following OSI layers is responsible for establishing connections
between two devices?
❍ A. Network
❍ B. Transport
❍ C. Session
❍ D. Data link
B. The transport layer is responsible for establishing a connection between networked
devices. The network layer is most commonly associated with route discovery
and datagram delivery. Protocols at the session layer synchronize the
data exchange between applications on separate devices. Protocols at the data
link layer perform error detection and handling for the transmitted signals and
define the method by which the medium is accessed
TCP is an example of what kind of transport protocol?
❍ A. Connection-oriented
❍ B. Connection-reliant
❍ C. Connection-dependent
❍ D. Connectionless
A. TCP is an example of a connection-oriented transport protocol. UDP is an
example of a connectionless protocol. Connection-reliant and connectiondependent
are not terms commonly associated with protocols.
Which of the following are considered transport protocols? (Choose the two best
answers.)
❍ A. TCP
❍ B. IP
❍ C. UDP
❍ D. THC
A, C. Both TCP and UDP are transport protocols. IP is a network protocol, and
THC is not a valid protocol.
What is the function of ARP?
❍ A. It resolves MAC addresses to IP addresses.
❍ B. It resolves NetBIOS names to IP addresses.
❍ C. It resolves IP addresses to MAC addresses.
❍ D. It resolves hostnames to IP addresses.
C. ARP resolves IP addresses to MAC addresses. Answer A describes the function
of RARP, Answer B describes the process of WINS, and Answer D describes
the process of DNS resolution.
What is the function of NTP?
❍ A. It provides a mechanism for the sharing of authentication information.
❍ B. It is used to access shared folders on a Linux system.
❍ C. It is used to communicate utilization information to a central manager.
❍ D. It is used to communicate time synchronization information between
systems.
D. NTP is used to communicate time synchronization information between
devices. NFS (Network File System) is a protocol typically associated with
accessing shared folders on a Linux system. Utilization information is communicated
to a central management system most commonly by using the SNMP
protocol
Which of the following protocols offers guaranteed delivery?
❍ A. FTP
❍ B. IPX
❍ C. IP
❍ D. TCP
D. TCP is a connection-oriented protocol that guarantees delivery of data. FTP is
a protocol used to transfer large blocks of data. IPX stands for Internetwork
Packet Exchange. IP is a network layer protocol responsible for tasks such as
addressing and route discovery.
During a discussion with your ISP’s technical support representative, he mentions
that you might have been using the wrong FQDN. Which TCP/IP-based
network service is he referring to?
❍ A. DHCP
❍ B. WINS
❍ C. SNMP
❍ D. DNS
D. DNS is a system that resolves hostnames to IP addresses. The term FQDN is
used to describe the entire hostname. None of the other services use FQDNs.
Which DNS record stores additional hostnames, or aliases, for hosts in the
domain?
❍ A. ALSO
❍ B. ALIAS
❍ C. CNAME
❍ D. PTR
C. The CNAME record stores additional hostnames, or aliases, for hosts in the
domain
What are SNMP databases called?
❍ A. HOSTS
❍ B. MIBs
❍ C. WINS
❍ D. Agents
B. SNMP uses databases of information called MIBs to define what parameters
are accessible, which of the parameters are read-only, and which can be set.
What are logical groupings of SNMP systems known as?
❍ A. Communities
❍ B. Pairs
❍ C. Mirrors
❍ D. Nodes
A. SNMP communities are logical groupings of systems. When a system is configured
as part of a community, it communicates only with other devices that
have the same community name.
What are two features supported in SNMPv3 and not previous versions?
❍ A. Authentication
❍ B. Dynamic mapping
❍ C. Platform independence
❍ D. Encryption
- A and D. SNMPv3 supports authentication and encryption
same IP address. What feature of DHCP enables you to accomplish this?
❍ A. Stipulation
❍ B. Rider
❍ C. Reservation
❍ D. Provision
C. Reservations are specific addresses reserved for clients.
Which of the following is NOT a common packet sent during the normal DHCP
process?
❍ A. DHCPACK
❍ B. DHCPPROVE
❍ C. DHCPDISCOVER
❍ D. DHCPOFFER
B. DHCPPROVE is not a common packet. The other choices presented (DHCPACK,
DHCPDISCOVER, and DHCPOFFER) are part of the normal process.