Exam Prep-Network+ Flashcards

1
Q

In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
a. HTTPS
b. TLS
c. HTTP
d. SSL

A

a. HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two encryption protocols might be used to provide secure transmissions for email services?
a. HTTP and HTTPS
b. SSL and TLS
c. FTP and SFTP
d. SSH and RDP

A

b. SSL and TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following applications could be used to run a website from a server?
a. Hypertext Transfer Protocol
b. FileZilla
c. Microsoft Exchange Server
d. Ngnix

A

d. Ngnix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

As you’re working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you’re having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
a. Identify the problem.
b. Test the theory to determine the cause.
c. Establish a plan of action to resolve the problem and identify potential effects.
d. Document findings, actions, outcomes, and lessons learned.

A

a. Identify the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the event of a fire, the most appropriate failure policy is a _______ policy.
a. Power-off
b. Fail-close
c. Fail-open
d. Shutdown

A

c. Fail-open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
a. Hub-and-spoke
b. Ring
c. Hybrid
d. Peer-to-peer

A

d. Peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?
a. Hybrid
b. Client-server
c. Hub-and-spoke
d. Peer-to-peer

A

b. Client-server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
a. Client-server
b. Mesh
c. Hub-and-spoke
d. Star

A

d. Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to access customer records in a database as you’re planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
a. FTP
b. SQL
c. SMTP
d. TLS

A

b. SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is an application layer protocol?
a. IP
b. RDP
c. TCP
d. Apache

A

b. RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the fundamental distinction between a layer 2 switch and a router?

A

A layer 2 switch belongs only to its local network, and a router belongs to two or more networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the fundamental distinction between a node and a host?

A

A host is an endpoint device that hosts or accesses a resource on the network, and a node is any computer or device that can be addressed on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the fundamental distinction between a MAN and a WAN?

A

A WAN covers a large geographical area, and a MAN covers a smaller, more defined geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List two protocols that function at the transport layer of the OSI model. What type of address do these protocols add to their headers, and what element does that address identify?

A

TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)
and the port addresses the receiving application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

At the network layer, what type of address is used to identify the receiving host?

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

At the data link layer, which type of network address is used to identify the receiving node?

A

Physical address, MAC address, hardware address, or data link layer address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A computer is unable to access the network. When you check the LED lights near the computer’s network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?

A

Part 1: Physical Layer
Part 2: Data link layer and physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A user complains that their computer cannot access email, although the computer can access websites. At which layer of the OSI model should you begin troubleshooting this problem and why?

A

Application layer—Email protocols such as SMTP, POP3, and IMAP4 all function at the application layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

While troubleshooting a problem, you realize the problem is caused by a complex series of issues that will affect a large number of users even to test your theory as to the cause, and that process won’t even solve the problem. What should you do next in the troubleshooting process?

A

Escalate the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?
a. IDF
b. Work area
c. CEO’s office
d. EF

A

EF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
a. Look at whether the device is located on the ISP’s side of the demarc.
b. Look at the manufacturer information on the device’s label.
c. Look at purchase records for the device to determine when it was acquired.
d. Look at what kinds of cables are connected to this device.

A

a. Look at whether the device is located on the ISP’s side of the demarc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following devices are you likely to find in the MDF? Choose all that apply.
a. Routers
b. Switches
c. Network printer
d. KVM switch

A

a. Routers, b. Switches, and d. KVM switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which device converts signals from a campus’s analog phone equipment into IP data that can travel over
the Internet?
a. Legacy PBX
b. VoIP phone
c. Voice gateway
d. Dedicated telephone switch

A

c. Voice gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
If you’re shopping for a rack switch, what component on the switch tells you it can be mounted to a rack? a. AC adapter b. Rack ears c. Padded feet d. Large fans
b. Rack ears
26
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use? a. Fiber-optic cable b. Patch cable c. Backbone cable d. Plenum-rated cable
b. Patch cable
27
You’ve decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply. a. Zenmap b. Microsoft Edge c. Command Prompt d. PowerShell
a. Zenmap, c. Command Prompt, and d. PowerShell
28
What type of diagram shows a graphical representation of a network’s wired infrastructure? a. Rack diagram b. Wiring diagram c. Network map d. Network topology
b. Wiring diagram
29
Which of these is considered a secure place to store a list of documented network passwords? a. The CEO’s smartphone b. A sticky note under the keyboard c. A password manager d. The MDF
c. A password manager
30
What is the first step of inventory management? a. Interview users. b. Identify network requirements. c. List an administrative account’s username and password for each device on a network. d. List all components on the network
d. List all components on the network.
31
Give three examples of networked devices that are not computers.
Answers may vary and might include security cameras, SCADA sensors that might be monitoring environmental controls (such as HVAC), electric utilities, water and sewage, traffic signals, mass transit, manufacturing equipment, refrigeration units, or lighting and entry systems. Answers should not include networking devices such as routers, switches, and access points, or networked devices that run on computers, such as servers.
32
Why is it important to use a structured cabling standard when installing and managing cabling systems?
Structured cabling standards describe the best ways to install various types of networking media to maximize performance and minimize upkeep.
33
Why is it important to use plenum-rated cabling in the area above the ceiling tile?
Plenum-rated cabling is safer than regularly coated PVC cabling. It produces less smoke when burned, and the smoke is less toxic.
34
What is the unit of measurement that defines the space available in a rack? How tall are standard racks?
Rack height is measured in rack units (RU or U) with the industry standard being 42U tall— about 6 feet.
35
Why is it important to minimize cable clutter in a rack?
To help prevent airflow blockages
36
What are some elements that are typically included in network diagrams?
Answers may vary and might include physical layout, logical topology, IP address reserves, names of major network devices, and types of transmission media.
37
How can you go about gathering the information needed to assemble a thorough operations manual?
Answers may vary and might include visits to data rooms, an examination of servers and desktops, a review of receipts for software and hardware purchases, and the use of a protocol analyzer or network management software package.
38
What command invokes Nmap at a command line?
nmap
39
For what time period should you schedule a network change?
If possible, schedule the change for completion during off-hours. Many organizations maintain a regularly scheduled maintenance window during which changes can be made
40
In a large organization, how do you typically request permission to perform a network 20. change?
Submit a change request document.
41
Which part of a MAC address is unique to each manufacturer? a. The network identifier b. The OUI c. The device identifier d. The physical address
b. The OUI
42
What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network? a. Default gateway b. DNS server c. Root server d. DHCP server
a. Default gateway
43
What decimal number corresponds to the binary number 11111111? a. 255 b. 256 c. 127 d. 11,111,111
a. 255
44
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting? a. All devices on the Internet b. All devices on your local network c. The one device that is configured with this IP address d. No devices
b. All devices on your local network
45
When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself? a. FF00::/8 b. ::1/128 c. 2000::/3 d. FE80::/64
d. FE80::/64
46
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation’s DHCP lease, which command would you use? a. ipconfig /release b. ipconfig /renew c. ifconfig /release d. ifconfig /renew
a. ipconfig /release
47
Which of these commands has no parameters in Windows? a. ping b. ipconfig c. hostname d. nslookup
c. hostname
48
Which DNS server offers the most current resolution to a DNS query? a. Primary DNS server b. Root DNS server c. Caching DNS server d. TLD DNS server
a. Primary DNS server
49
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why? a. The caching and primary DNS servers because the caching server is requesting zone transfers from the primary server b. The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server c. The root and primary DNS servers because the primary server is requesting zone transfers from the root server d. The web server and primary DNS server because the web server is requesting zone transfers from the primary DNS server
b. The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server
50
Which type of DNS record identifies an email server? a. AAAA record b. CNAME record c. MX record d. PTR record
MX record
51
What is the range of addresses that might be assigned by APIPA?
169.254.0.1 through 169.254.255.254
52
You are the network manager for a computer training center that allows students to bring their own laptops to class for learning and taking notes. Students need access to the Internet, so you have configured your network’s DHCP server to issue IP addresses automatically. Which DHCP option should you modify to make sure you are not wasting addresses used by students who have left for the day?
Lease time
53
You have decided to use SNAT and PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP for all five clients in your office to be able to access servers on the Internet?
1
54
Explain how the bits of an IPv6 address are organized and describe IPv6 shorthand notation
An IPv6 address has 128 bits that are written as eight blocks of hexadecimal numbers separated by colons. Each block is 16 bits long. Leading zeroes in a four-character hex block can be eliminated. If blocks contain all zeroes, they can be eliminated and replaced by double colons (::). To avoid confusion, only one set of double colons is used in an IPv6 address.
55
FTP sometimes uses a random port for data transfer, but an FTP server always, unless programmed otherwise, listens to the same port for session requests from clients. What port does an FTP server listen on?
21
55
You issue a transmission from your workstation to the following socket on your LAN: 10.1.1.145:53. Assuming your network uses standard port designations, what application layer protocol handles your transmission?
DNS (Domain Name Service)
56
Suppose you want to change the default port for RDP as a security precaution. What port does RDP use by default, and from what range of numbers should you select a private port number?
3389; 49152 through 65535
57
You have just set up a new wireless network at your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. What command will give you the information you need?
ip address show or ifconfig -a
58
While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS server. What command-line utility can you use to assign the correct DNS server IP address?
nslookup (in interactive mode)
59
When running a scan on your computer, you find that a session has been established with a host at the address 208.85.40.44:443. Which application layer protocol is in use for this session? What command-line utility might you use to determine the domain name of the other computer?
Port 443 indicates this an HTTPS session. nslookup can identify the domain name of the host at that IP address
60
Which protocol’s header would a layer 4 device read and process? a. IP b. TCP c. ARP d. HTTP
b. TCP
61
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source? a. Source port b. Acknowledgment number c. DiffServ d. Checksum
d. Checksum
62
What is the Internet standard MTU? a. 65,535 bytes b. 1,522 bytes c. 1,500 bytes d. 9,198 bytes
c. 1,500 bytes
62
At which OSI layer does IP operate? a. Application layer b. Transport layer c. Network layer d. Data link layer
c. Network layer
63
Which encryption protocol does GRE use to increase the security of its transmissions? a. SSL b. SFTP c. IPsec d. SSH
c: IPsec
63
Which two protocols manage neighbor discovery processes on IPv4 networks? a. ICMP and ARP b. IPv4 and IPv6 c. TCP and UDP d. NDP and Ethernet
a. ICMP and ARP
63
You’re getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address? a. telnet 192.168.1.56 b. tracert 192.168.1.56 c. arp -a d. netstat -n
c. arp -a
64
What is one advantage offered by VDI over RDS and VNC? a. Offers access to multiple OSs in VMs b. Supports remote access to mobile devices c. Allows multiple users to sign in at once d. Provides open source flexibility
a. Offers access to multiple OSs in VMs
65
Which encryption benchmark ensures data is not modified after it’s transmitted and before it’s received? a. Confidentiality b. Integrity c. Availability d. Symmetric
b. Integrity
66
What is the difference between dynamic ARP table entries and static ARP table entries?
Dynamic ARP table entries are created when a client makes an ARP request, whereas static ARP table entries are entered manually using the ARP utility
66
What three characteristics about TCP distinguish it from UDP?
TCP is connection-oriented, uses sequencing and checksums, and provides flow control
66
What process is used to establish a TCP connection?
Three-way handshake
67
Which two fields in an Ethernet frame help synchronize device communications but are not counted toward the frame’s size?
Preamble and SFD
67
Which remote file access protocol is an extension of SSH? a. SFTP b. TFTP c. FTPS d. HTTPS
a: SFTP
68
Explain the key difference between how symmetric encryption works and how asymmetric encryption works
Symmetric encryption uses the same key during both the encryption and decryption of the data. Asymmetric encryption requires the use of two different keys, one to encrypt and the other to decrypt.
68
When surfing online, you get some strange data on an apparently secure website, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates for websites?
CA (Certificate Authority)
68
Which secured tunneling protocol might be able to cross firewalls where IPsec is blocked?
OpenVPN
69
What tcpdump command will capture data on the eth0 interface and redirect output to a text file named checkme.txt for further analysis?
tcpdump -i eth0 -w checkme.txt
70
Which terminal emulation protocol is similar to RDP but is open source?
VNC (Virtual Network Connection)
71
Which port must be open for RDP traffic to cross a firewall?
3389
72
Which transmission characteristic is never fully achieved? a. Latency b. Throughput c. Bit rate d. Bandwidth
d. Bandwidth
72
Which kind of crosstalk occurs between wire pairs near the source of the signal? a. Alien b. TX/RX reverse c. FEXT d. NEXT
d. NEXT
72
Which kind of multiplexing assigns slots to nodes according to priority and need? a. WDM (wavelength division multiplexing) b. STDM (statistical time division multiplexing) c. TDM (time division multiplexing) d. CWDM (coarse wavelength division multiplexing)
b. STDM (statistical time division multiplexing)
73
Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack? a. RG-6 coaxial cable b. Cat 5e twisted-pair cable c. Cat 6 twisted-pair cable d. Passive twinaxial cable
d. Passive twinaxial cable
73
Which of these categories of twisted-pair cable can support Gigabit Ethernet? a. Cat 5, cat 6, cat 7 b. Cat 5e, cat 6, cat 3 c. Cat 5e, cat 6a, cat 7 d. Cat 6, cat 7a, cat 5
c. Cat 5e, cat 6a, cat 7
73
Suppose you’re creating patch cables to be used in a government office. What color wire goes in the first pin? a. White/orange b. White/green c. Brown d. Blue
b. White/green
74
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters? a. Cat 5e b. Cat 6 c. Cat 6a d. Cat 7
c. Cat 6a
75
What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5- micron core cable? a. Dirty connectors b. Wavelength mismatch c. Fiber type mismatch d. TX/RX reverse
c. Fiber type mismatch
75
Which fiber connector contains two strands of fiber in each ferrule? a. MT-RJ b. SC c. ST d. LC
a. MT-RJ
76
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair? a. TDR b. Tone generator c. Tone locator d. Toner
c. Tone locator
77
How is latency measured, and in what unit?
Latency is measured by calculating a packet’s RTT, or the length of time it takes for a packet to go from sender to receiver, then back from receiver to sender. RTT is usually measured in milliseconds.
77
What is a twist ratio, and why is it important?
Twist ratio is the number of twists per meter or foot. The more twists per foot in a pair of wires, the more resistant the pair will be to crosstalk or noise.
77
What fiber is used in fiber-optic cabling to protect the inner core and prevent the cable from stretching?
To prevent the cable from stretching, and to protect the inner core further, strands of Kevlar (a polymeric fiber) surround the plastic buffer.
78
What characteristic of optical transmission is primarily responsible for the distance limitations of fiber-optic cabling?
Optical loss
78
Why is SMF more efficient over long distances than MMF?
The core of SMF is much narrower than that of MMF and reflects very little. The light does not disperse as much along the fiber
79
Why do APC ferrules create less back reflection than UPC ferrules?
The end faces are placed at an angle to each other, and the reflection is sent back in a different direction than the source of the signal.
80
Which fiber transceiver is the same size as SFP transceivers, but can support network speeds over 10 Gbps?
SFP+ transceivers are the same module size as SFP; theoretical maximum transmission speed is 16 Gbps
81
Suppose you’re assisting with a cable installation using fiber-optic cabling that will support Gigabit Ethernet. You’re approved to install segments up to 4000 m in length. What mode of fiber cable are you using?
SMF
81
What is the difference between short circuits and open circuits?
A short circuit is one where connections exist in places they shouldn’t, while an open circuit is one where needed connections are missing.
82
What kind of tool can measure the distance to the location of damage in a cable?
Answers may include cable performance tester, line tester, certifier, or network tester.
82
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? a. Layer 4 b. Layer 3 c. Layer 2 d. Layer 1
b. Layer 3
82
As you’re troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone? a. RSSI b. Channel c. EIRP d. Band
a. RSSI (received signal strength indicator)
82
Which one of the following wireless transmission types requires a clear LOS to function? a. Bluetooth b. NFC c. IR d. Wi-Fi
c. IR (infrared)
83
Which of the following wireless technologies does not use the 2.4 GHz band? a. Z-Wave b. Bluetooth c. ZigBee d. Wi-Fi
a. Z-Wave
83
Which function of WPA/WPA2 security ensures data cannot be read in transit? a. Message integrity b. Authentication c. Encryption d. Key distribution
c. Encryption
84
Which protocol replaced TKIP for WPA2? a. CCMP b. WEP c. RADIUS d. RC4
a. CCMP
84
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? a. 802.11g b. 802.11ac c. 802.11b d. 802.11ax
d. 802.11ax
85
Which Carrier Sense technology is used on wireless networks to reduce collisions? a. CSMA/CD b. EAPoL c. CSMA/CA d. SSID
c. CSMA/CA
86
You’ve just completed a survey of the wireless signals traversing the airspace in your company’s vicinity, and you’ve found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss? a. Rogue AP b. War driving c. Evil twin d. Hidden node
a. Rogue AP
86
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you’re about to sign in, you realize that you clicked on an SSID called “Free Coffee and Internet.” What kind of security trap did you almost fall for? a. Guest network b. Captive portal c. Evil twin d. Brute force attack
c. Evil twin
86
To exchange information, two antennas must be tuned to the same
frequency or channel
87
What addresses does an 802.11 frame contain that an 802.3 frame does not?
Transmitter address and Receiver address
88
When a wireless signal encounters a large obstacle with wide, smooth surfaces, what happens to the signal?
The signal reflects, or bounces back, toward its source.
88
Signals traveling through areas in which many wireless communications systems are in use will exhibit a lower –––––––– due to the higher proportion of noise.
SNR
88
What is the primary difference between how WPA2-Personal and WPA2-Enterprise are implemented on a network?
WPA2-Enterprise requires a RADIUS authentication server
89
Why do wireless networks generally experience a greater reduction in throughput compared with wired networks?
Wireless networks experience a high number of collisions and require greater
90
What size bonded channels do 802.11ac and 802.11ax support?
20-, 40-, 80-, and 160-MHz channels
90
What feature of a site survey maps the Wi-Fi signals in your location?
Heat map
90
You’re setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they’re waiting on the children. However, she’s concerned about keeping her own data private. What wireless feature can you configure on her AP to meet her requests?
Guest network or wireless client isolation
90
Which 802.11X authentication protocol is often used by WLANs?
EAPoL
90
What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer? a. Hypervisor b. NFV (Network Functions Virtualization) c. SDN (software-defined networking) d. Terminal emulation
a. Hypervisor
91
What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes? a. Virtual firewall b. Virtual switch c. Virtual router d. Virtual load balancer
b. Virtual switch
91
Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic? a. Router b. Firewall c. Switch d. Load balancer
d. Load balancer
92
With which network connection type does the VM obtain IP addressing information from its host? a. Bridged mode b. Managed mode c. NAT mode d. Isolation mode
c. NAT mode
93
Which type of switch connects all devices in a rack to the rest of the network? a. ToR switch b. Spine switch c. EoR switch d. Core switch
a. ToR switch
93
Which cloud service model gives software developers access to multiple platforms for testing code? a. IaaS b. PaaS c. SaaS d. XaaS
b. PaaS
93
When shopping for a new router, what does the MTBF tell you? a. How long until that device fails b. How much it will cost to repair that device c. How long devices like this one will last on average until the next failure d. How long it will usually take to repair that device
: c. How long devices like this one will last on average until the next failure
94
What information does the switchport port-security command use to restrict access to a switch’s interface? a. MAC address b. Port number c. IP address d. Broadcast address
a. MAC address
95
Which of the following features of a network connection between a switch and server is not improved by link aggregation? a. Bandwidth b. Fault tolerance c. Speed d. Availability
c. Speed
95
Which cloud management technique executes a series of tasks in a workflow? a. Automation b. IaC c. SLA d. Orchestration
d. Orchestration
95
List two advantages to using virtualization on a network.
Answers will include two of the following: * Efficient use of resources * Cost and energy savings * Fault and threat isolation * Simple backups, recovery, and replication
96
List available options for connecting to cloud resources
Organizations generally offer an array of options, including Internet, VPN (virtual private network), remote access connections (such as SSH and RDP), a leased line from an ISP, and a private or dedicated direct connection.
96
How does a vNIC get a MAC address without manual intervention?
Upon creation, each vNIC is automatically assigned a MAC address.
97
What type of adapters are required on servers in an FCoE storage network?
CNA (converged network adapter)
97
. What are two use cases for a VIP (virtual IP address)?
A single VIP (virtual IP address) can be used to represent a cluster of resources such as web servers. Alternatively, it might be used to assign a different IP address to multiple instances of the same service running on a single machine.
97
Which type of hypervisor is installed directly on top of the server’s firmware?
Type 1 hypervisor
98
Only one exists on a network using STP
root bridge
99
What protocol is most often used to bond ports between a switch and a busy server?
LACP (Link Aggregation Control Protocol)
99
How is licensing an important concern when using virtualization?
Each virtualized device needs its own license in addition to a license for the hypervisor
100
What kind of device can be used to configure and manage physical and virtual networking devices across the network?
SDN controller or network controller
101
How many bits of a class A IP address are used for host information? a. 8 bits b. 16 bits c. 24 bits d. 32 bits
c. 24 bits
102
What is the formula for determining the number of possible hosts on a network? a. 2n = Y b. 2n – 2 = Y c. 2h = Z d. 2h – 2 = Z
d. 2h – 2 = Z
103
Which of the following is not a good reason to segment a network? a. To limit access to broadcast domains b. To reduce the demand on bandwidth c. To increase the number of networking devices on a network d. To narrow down the location of problems on a network
c. To increase the number of networking devices on a network
104
What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet? a. 0 bits b. 8 bits c. 9 bits d. 10 bits
b. 8 bits
105
What do well-chosen subnets accomplish? a. IP address spaces overlap for easier management. b. Network documentation is easier to manage. c. Routing efficiency is decreased by ensuring IP address spaces are not mathematically related. d. Problems affect the entire network, making them more difficult to pin down.
b. Network documentation is easier to manage
105
Which formulas can be used to calculate the magic number? Choose two a. 256 – the interesting octet b. 2h – 2 c. 2n d. 2h
a. 256 – the interesting octet d. 2h
106
Which hexadecimal block in an IPv6 address is used for the Subnet ID? a. The first one b. The third one c. The fourth one d. The eighth one
c. The fourth one
107
Which assignment technique requires a RADIUS server? a. Dynamic VLAN assignment b. Dynamic IP address assignment c. Static IP address assignment d. Static VLAN assignment
a. Dynamic VLAN assignment
107
Which port mode on a switch enables that port to manage traffic for multiple VLANs? a. Private b. Community c. Access d. Trunk
d. Trunk
107
Which IEEE standard determines how VLANs work on a network? a. 802.1X b. 802.11 c. 802.3af d. 802.1Q
d. 802.1Q
107
What is the network ID with CIDR notation for the IP address 172.16.32.108 whose subnet mask is 255.255.255.0?
172.16.32.0/24
107
Suppose your company has leased one class C license, 120.10.10.0, and wants to sublease the first half of these IP addresses to another company. What is the CIDR notation for the subnet to be subleased? What is the subnet mask for this network?
120.10.10.0/25 255.255.255.128
107
Subnetting operates at the __________ layer while VLANs function at the _________ layer.
Network, Data Link
108
Which VLAN on a switch manages untagged frames?
The native VLAN
109
An attacker configures a VLAN frame with two tags instead of just one. The first tag directs the frame to the authorized VLAN. After the frame enters the first VLAN, the switch appropriately removes the tag, then discovers the next tag, and sends the frame along to a protected VLAN, which the attacker is not authorized to access. What kind of attack is this?
Either VLAN hopping or double tagging is an acceptable answer.
109
What area of a network can provide less stringent security so a web server is more accessible from the open Internet?
Either screened subnet or DMZ (demilitarized zone) is an acceptable answer.
109
On which networking device do you configure VLANs?
Either switch or managed switch is an acceptable answer.
110
Which IP addressing technique subnets a subnet to create subnets of various sizes?
VLSM (variable length subnet mask)
110
Which VLAN type would be the best fit for a company’s web servers that need to be accessible from the Internet but should not be able to communicate with each other?
Isolated VLAN
111
Which Cisco command lists configured VLANs on a switch?
show vlan
112
Which OSI layer is responsible for directing data from one LAN to another? a. Transport layer b. Network layer c. Data link layer d. Physical layer
b. Network layer
112
What kind of route is created when a network administrator configures a router to use a specific path between nodes? a. Trace route b. Static route c. Default route d. Dynamic route
b. Static route
112
When a router can’t determine a path to a message‘s destination, where does it send the message? a. Default gateway b. Routing table c. Administrative distance d. Gateway of last resort
d. Gateway of last resort
112
A routing protocol’s reliability and priority are rated by what measurement? a. Routing table b. MTU c. Latency d. AD
d. AD
112
Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet? a. RIPv2 b. BGP c. OSPF d. IP
: b. BGP
112
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols? a. Layer 2 b. Layer 3 c. Layer 4 d. Layer 5
b. Layer 3
113
What kind of device can monitor a connection at the demarc but cannot interpret data? a. Line driver b. CSU/DSU c. DTE d. Smartjack
d. Smartjack
113
What specifications define the standards for cable broadband? a. PSTN b. HFC c. FTTC d. DOCSIS
d. DOCSIS
113
What method does a GSM network use to separate data on a channel? a. SIM b. CDMA c. TDMA d. TDM
c. TDMA
113
Which of these cellular technologies offers the fastest speeds? a. 4G-LTE b. LTE-A c. CDMA d. GSM
: b. LTE-A
114
Where is an MPLS label inserted into a message’s headers?
MPLS labels together are sometimes called a shim because of their placement between layer 2 and layer 3 information. For this reason, MPLS is sometimes said to belong to “layer 2.5.”
115
What four functions do all routers perform?
: 1. Connect dissimilar networks. 2. Interpret Layers 3 and 4 addressing and other information. 3. Determine the best path for data to follow. 4. Reroute traffic if a primary path is down but another path is available.
115
What database does a router consult before determining the most efficient path for delivering a message?
: Its routing table
116
Give three examples of routing metrics used by routers to determine the best of various available routing paths.
(Any three) Hop count, theoretical bandwidth, actual throughput, path latency (or delay), path load, MTU, cost, reliability, network topology
116
List three IGPs (interior gateway protocols).
(Any three) RIP, RIPv2, OSPF, IS-IS, EIGRP
116
How can you create a private and secure connection with your cloud network over the Internet?
A VPN travels over an Internet connection to give direct and secure access to cloud resources.
116
List three transport methods that can be used to support an SD-WAN
Any three WAN connectivity methods, such as DSL, cable broadband, fiber broadband, leased line, MPLS, cellular, and satellite.
116
When you list a router’s routing table, one of the routes is labeled with an S. Which routing protocol was used to create this route?
None—it’s a static route configured by a network administrator.
117
What command will ensure the configuration changes you made to a switch will persist after you restart the switch?
copy running-config startup-config or copy run start
118
What device must be installed on a DSL network to protect the sound quality of phone calls?
A splitter