Exam Prep-Network+ Flashcards
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
a. HTTPS
b. TLS
c. HTTP
d. SSL
a. HTTPS
Which two encryption protocols might be used to provide secure transmissions for email services?
a. HTTP and HTTPS
b. SSL and TLS
c. FTP and SFTP
d. SSH and RDP
b. SSL and TLS
Which of the following applications could be used to run a website from a server?
a. Hypertext Transfer Protocol
b. FileZilla
c. Microsoft Exchange Server
d. Ngnix
d. Ngnix
As you’re working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you’re having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
a. Identify the problem.
b. Test the theory to determine the cause.
c. Establish a plan of action to resolve the problem and identify potential effects.
d. Document findings, actions, outcomes, and lessons learned.
a. Identify the problem
In the event of a fire, the most appropriate failure policy is a _______ policy.
a. Power-off
b. Fail-close
c. Fail-open
d. Shutdown
c. Fail-open
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
a. Hub-and-spoke
b. Ring
c. Hybrid
d. Peer-to-peer
d. Peer-to-peer
In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?
a. Hybrid
b. Client-server
c. Hub-and-spoke
d. Peer-to-peer
b. Client-server
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
a. Client-server
b. Mesh
c. Hub-and-spoke
d. Star
d. Star
You need to access customer records in a database as you’re planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
a. FTP
b. SQL
c. SMTP
d. TLS
b. SQL
Which of the following is an application layer protocol?
a. IP
b. RDP
c. TCP
d. Apache
b. RDP
What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?
Active Directory
What is the fundamental distinction between a layer 2 switch and a router?
A layer 2 switch belongs only to its local network, and a router belongs to two or more networks.
What is the fundamental distinction between a node and a host?
A host is an endpoint device that hosts or accesses a resource on the network, and a node is any computer or device that can be addressed on the network.
What is the fundamental distinction between a MAN and a WAN?
A WAN covers a large geographical area, and a MAN covers a smaller, more defined geographical area.
List two protocols that function at the transport layer of the OSI model. What type of address do these protocols add to their headers, and what element does that address identify?
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)
and the port addresses the receiving application
At the network layer, what type of address is used to identify the receiving host?
IP address
At the data link layer, which type of network address is used to identify the receiving node?
Physical address, MAC address, hardware address, or data link layer address
A computer is unable to access the network. When you check the LED lights near the computer’s network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?
Part 1: Physical Layer
Part 2: Data link layer and physical layer
A user complains that their computer cannot access email, although the computer can access websites. At which layer of the OSI model should you begin troubleshooting this problem and why?
Application layer—Email protocols such as SMTP, POP3, and IMAP4 all function at the application layer.
While troubleshooting a problem, you realize the problem is caused by a complex series of issues that will affect a large number of users even to test your theory as to the cause, and that process won’t even solve the problem. What should you do next in the troubleshooting process?
Escalate the problem
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?
a. IDF
b. Work area
c. CEO’s office
d. EF
EF
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
a. Look at whether the device is located on the ISP’s side of the demarc.
b. Look at the manufacturer information on the device’s label.
c. Look at purchase records for the device to determine when it was acquired.
d. Look at what kinds of cables are connected to this device.
a. Look at whether the device is located on the ISP’s side of the demarc.
Which of the following devices are you likely to find in the MDF? Choose all that apply.
a. Routers
b. Switches
c. Network printer
d. KVM switch
a. Routers, b. Switches, and d. KVM switch
Which device converts signals from a campus’s analog phone equipment into IP data that can travel over
the Internet?
a. Legacy PBX
b. VoIP phone
c. Voice gateway
d. Dedicated telephone switch
c. Voice gateway
If you’re shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
a. AC adapter
b. Rack ears
c. Padded feet
d. Large fans
b. Rack ears
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
a. Fiber-optic cable
b. Patch cable
c. Backbone cable
d. Plenum-rated cable
b. Patch cable
You’ve decided to run an Nmap scan on your network. Which apps could you open to perform this task?
Choose all that apply.
a. Zenmap
b. Microsoft Edge
c. Command Prompt
d. PowerShell
a. Zenmap, c. Command Prompt, and d. PowerShell
What type of diagram shows a graphical representation of a network’s wired infrastructure?
a. Rack diagram
b. Wiring diagram
c. Network map
d. Network topology
b. Wiring diagram
Which of these is considered a secure place to store a list of documented network passwords?
a. The CEO’s smartphone
b. A sticky note under the keyboard
c. A password manager
d. The MDF
c. A password manager
What is the first step of inventory management?
a. Interview users.
b. Identify network requirements.
c. List an administrative account’s username and password for each device on a network.
d. List all components on the network
d. List all components on the network.
Give three examples of networked devices that are not computers.
Answers may vary and might include security cameras, SCADA sensors that might be monitoring environmental controls (such as HVAC), electric utilities, water and sewage, traffic signals, mass transit, manufacturing equipment, refrigeration units, or lighting and entry systems. Answers should not include networking devices such as routers, switches, and access points, or networked devices that run on
computers, such as servers.
Why is it important to use a structured cabling standard when installing and managing cabling systems?
Structured cabling standards describe the best ways to install various types of networking media to maximize performance and minimize upkeep.
Why is it important to use plenum-rated cabling in the area above the ceiling tile?
Plenum-rated cabling is safer than regularly coated PVC cabling. It produces less smoke when burned, and the smoke is less toxic.
What is the unit of measurement that defines the space available in a rack? How tall are standard racks?
Rack height is measured in rack units (RU or U) with the industry standard being 42U tall— about 6 feet.
Why is it important to minimize cable clutter in a rack?
To help prevent airflow blockages
What are some elements that are typically included in network diagrams?
Answers may vary and might include physical layout, logical topology, IP address reserves, names of major network devices, and types of transmission media.
How can you go about gathering the information needed to assemble a thorough operations manual?
Answers may vary and might include visits to data rooms, an examination of servers and desktops, a review of receipts for software and hardware purchases, and the use of a protocol analyzer or network management software package.
What command invokes Nmap at a command line?
nmap
For what time period should you schedule a network change?
If possible, schedule the change for completion during off-hours. Many organizations maintain a regularly scheduled maintenance window during which changes can be made
In a large organization, how do you typically request permission to perform a network 20. change?
Submit a change request document.
Which part of a MAC address is unique to each manufacturer?
a. The network identifier
b. The OUI
c. The device identifier
d. The physical address
b. The OUI
What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network?
a. Default gateway
b. DNS server
c. Root server
d. DHCP server
a. Default gateway
What decimal number corresponds to the binary number 11111111?
a. 255
b. 256
c. 127
d. 11,111,111
a. 255
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
a. All devices on the Internet
b. All devices on your local network
c. The one device that is configured with this IP address
d. No devices
b. All devices on your local network
When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself?
a. FF00::/8
b. ::1/128
c. 2000::/3
d. FE80::/64
d. FE80::/64
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation’s DHCP lease, which command would you use?
a. ipconfig /release
b. ipconfig /renew
c. ifconfig /release
d. ifconfig /renew
a. ipconfig /release
Which of these commands has no parameters in Windows?
a. ping
b. ipconfig
c. hostname
d. nslookup
c. hostname
Which DNS server offers the most current resolution to a DNS query?
a. Primary DNS server
b. Root DNS server
c. Caching DNS server
d. TLD DNS server
a. Primary DNS server
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
a. The caching and primary DNS servers because the caching server is requesting zone transfers from the primary server
b. The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server
c. The root and primary DNS servers because the primary server is requesting zone transfers from the root server
d. The web server and primary DNS server because the web server is requesting zone transfers from the primary DNS server
b. The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server
Which type of DNS record identifies an email server?
a. AAAA record
b. CNAME record
c. MX record
d. PTR record
MX record
What is the range of addresses that might be assigned by APIPA?
169.254.0.1 through 169.254.255.254
You are the network manager for a computer training center that allows students to bring their own laptops to class for learning and taking notes. Students need access to the Internet, so you have configured your network’s DHCP server to issue IP addresses automatically. Which DHCP option should
you modify to make sure you are not wasting addresses used by students who have left for the day?
Lease time
You have decided to use SNAT and PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP for all five clients in your office to be able to access servers on the Internet?
1
Explain how the bits of an IPv6 address are organized and describe IPv6 shorthand notation
An IPv6 address has 128 bits that are written as eight blocks of
hexadecimal numbers separated by colons. Each block is 16 bits long. Leading zeroes in a four-character hex block can be eliminated. If blocks contain all zeroes, they can be eliminated and replaced by double colons (::). To avoid confusion, only one set of double colons is used in an IPv6 address.
FTP sometimes uses a random port for data transfer, but an FTP server always, unless programmed otherwise, listens to the same port for session requests from clients. What port does an FTP server listen on?
21
You issue a transmission from your workstation to the following socket on your LAN: 10.1.1.145:53. Assuming your network uses standard port designations, what application layer protocol handles your transmission?
DNS (Domain Name Service)
Suppose you want to change the default port for RDP as a security precaution. What port does RDP use by default, and from what range of numbers should you select a private port number?
3389; 49152 through 65535
You have just set up a new wireless network at your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. What command will give you the information you need?
ip address show or ifconfig -a
While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS server. What command-line utility can you use to assign the correct DNS server IP address?
nslookup (in interactive mode)
When running a scan on your computer, you find that a session has been established with a host
at the address 208.85.40.44:443. Which application layer protocol is in use for this session? What
command-line utility might you use to determine the domain name of the other computer?
Port 443 indicates this an HTTPS session. nslookup can identify the domain name of the host at that IP address
Which protocol’s header would a layer 4 device read and process?
a. IP
b. TCP
c. ARP
d. HTTP
b. TCP
What field in a TCP segment is used to determine if an arriving data unit exactly matches the
data unit sent by the source?
a. Source port
b. Acknowledgment number
c. DiffServ
d. Checksum
d. Checksum
What is the Internet standard MTU?
a. 65,535 bytes
b. 1,522 bytes
c. 1,500 bytes
d. 9,198 bytes
c. 1,500 bytes
At which OSI layer does IP operate?
a. Application layer
b. Transport layer
c. Network layer
d. Data link layer
c. Network layer
Which encryption protocol does GRE use to increase the security of its transmissions?
a. SSL
b. SFTP
c. IPsec
d. SSH
c: IPsec
Which two protocols manage neighbor discovery processes on IPv4 networks?
a. ICMP and ARP
b. IPv4 and IPv6
c. TCP and UDP
d. NDP and Ethernet
a. ICMP and ARP
You’re getting a duplicate IP address error on your computer and need to figure out what other
device on your network is using the IP address 192.168.1.56. What command will show you which MAC
address is mapped to that IP address?
a. telnet 192.168.1.56
b. tracert 192.168.1.56
c. arp -a
d. netstat -n
c. arp -a
What is one advantage offered by VDI over RDS and VNC?
a. Offers access to multiple OSs in VMs
b. Supports remote access to mobile devices
c. Allows multiple users to sign in at once
d. Provides open source flexibility
a. Offers access to multiple OSs in VMs
Which encryption benchmark ensures data is not modified after it’s transmitted and before it’s
received?
a. Confidentiality
b. Integrity
c. Availability
d. Symmetric
b. Integrity
What is the difference between dynamic ARP table entries and static ARP table entries?
Dynamic ARP table entries are created when a client makes an ARP request, whereas static ARP table entries are entered manually using the ARP utility
What three characteristics about TCP distinguish it from UDP?
TCP is connection-oriented, uses sequencing and checksums, and provides flow control
What process is used to establish a TCP connection?
Three-way handshake