Exam questions Flashcards
Which subnet mask is valid?
A: 255.255.255.240
B: 255.255.255.228
C: 255.255.255.164
D: 255.255.255.245
255.255.255.240
A service that resolves NetBIOS names to IP addresses is:
Windows Internet Name Service (WINS)
What type of DNS record maps host names to addresses?
Host (A) DNS record
Teredo tunneling is a protocol that:
Allows IPv6 connectivity through IPv4 addresses
What is the default subnet mask for a Class C Internet network?
255.255.255.0
The default port used for telnet is:
23
When a client’s DHCP-issues address expires, the client will:
Attempt to obtain a new address by broadcasting
You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response.
Why do you receive a response on the second attempt but not on the first attempt?
The DNS is not resolving
A Media Access Control (MAC) address identifies a/an:
Network Interface Card
Two companies want to share data by using the Internet.
What type of network provides the solution?
Extranet
VPNs are implemented to provide:
A secure connection through public networks
If an 802.IIg Internet connection has connectivity problems, what may be the cause?
Electromagnetic Interference (EMI)
Which of these factors has the biggest impact on data transmission speed in a wireless network?
The transmission standard of the equipment used
Which of the following used a tunnelling protocol?
A: Internet
B: VPN
C: Extranet
D: VLAN
VPN
A network that separates an organisations private network from a public network is a/an:
Perimeter
Which type of network is most vulnerable to intrusion?
Wireless
Attenuation in a wireless network signal is a result of:
Distance from the access point
Which type of network covers the broadest area?
WAN
In local area network (LAN) topologies, the primary media access methods are:
Contention and Token passing
What happens wen an 802.11b node starts broadcasting within the range of ab 802IIg access point?
A connection will be established
Which technology provides the highest bit rate?
DS3
A VPN is a/an:
Encrypted protection across the Internet
What determines the media access method that is used in a network?
Topology and protocols
Which wireless authentication method provides the highest level of security?
WI-FI protected Access (WPA)
The topology of a local area network (LAN) is defined by the:
Psychical and logical characteristics
The maximum output of an 802.IIg network is:
54 Mpbs
A node within a local area network (LAN) must have a network interface device and a:
Host address
Which is Layer 2 WAN protocol?
Point-to-Point Protocol (PPP)
Which type of port is used ti support VLANs traffic between two switches?
Trunk port
The protocol that maps IP addresses to a Media Access Control (MAC) address is:
Address Resolution Protocol (ARP)
The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is:
To which IP configuration does the CIDR notation 192.168.1.1/25 refer?
192.168.1.1 255.255.255.128
Which command is used to verify that a server is connection to the network?
PING
What represents the Internet Protocol versos 6 (PIv6) loopback address?
::1
What is the range of multicast addresses?
244.0.0.0 to 239.255.255.255.255
What uses pointer record and A records?
DNS Server
The ipconfig command will:
Display a client’s address
One reason to incorporate VLANs in a network is to:
Reduce the number of nodes in a broadcast domain
To directly connect the Ethernet network interface cards (NICs) of two computers you should use a:
Crossover cable
The function of a router is to:
Forward traffic to other networks