Exam questions Flashcards

1
Q

Which subnet mask is valid?

A: 255.255.255.240
B: 255.255.255.228
C: 255.255.255.164
D: 255.255.255.245

A

255.255.255.240

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A service that resolves NetBIOS names to IP addresses is:

A

Windows Internet Name Service (WINS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of DNS record maps host names to addresses?

A

Host (A) DNS record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Teredo tunneling is a protocol that:

A

Allows IPv6 connectivity through IPv4 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the default subnet mask for a Class C Internet network?

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The default port used for telnet is:

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a client’s DHCP-issues address expires, the client will:

A

Attempt to obtain a new address by broadcasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response.

Why do you receive a response on the second attempt but not on the first attempt?

A

The DNS is not resolving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Media Access Control (MAC) address identifies a/an:

A

Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Two companies want to share data by using the Internet.

What type of network provides the solution?

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPNs are implemented to provide:

A

A secure connection through public networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If an 802.IIg Internet connection has connectivity problems, what may be the cause?

A

Electromagnetic Interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of these factors has the biggest impact on data transmission speed in a wireless network?

A

The transmission standard of the equipment used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following used a tunnelling protocol?

A: Internet
B: VPN
C: Extranet
D: VLAN

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network that separates an organisations private network from a public network is a/an:

A

Perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of network is most vulnerable to intrusion?

A

Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attenuation in a wireless network signal is a result of:

A

Distance from the access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of network covers the broadest area?

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In local area network (LAN) topologies, the primary media access methods are:

A

Contention and Token passing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What happens wen an 802.11b node starts broadcasting within the range of ab 802IIg access point?

A

A connection will be established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which technology provides the highest bit rate?

A

DS3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A VPN is a/an:

A

Encrypted protection across the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What determines the media access method that is used in a network?

A

Topology and protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which wireless authentication method provides the highest level of security?

A

WI-FI protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The topology of a local area network (LAN) is defined by the:

A

Psychical and logical characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The maximum output of an 802.IIg network is:

A

54 Mpbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A node within a local area network (LAN) must have a network interface device and a:

A

Host address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which is Layer 2 WAN protocol?

A

Point-to-Point Protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which type of port is used ti support VLANs traffic between two switches?

A

Trunk port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The protocol that maps IP addresses to a Media Access Control (MAC) address is:

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is:

A

mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

To which IP configuration does the CIDR notation 192.168.1.1/25 refer?

A

192.168.1.1 255.255.255.128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which command is used to verify that a server is connection to the network?

A

PING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What represents the Internet Protocol versos 6 (PIv6) loopback address?

A

::1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the range of multicast addresses?

A

244.0.0.0 to 239.255.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What uses pointer record and A records?

A

DNS Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The ipconfig command will:

A

Display a client’s address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

One reason to incorporate VLANs in a network is to:

A

Reduce the number of nodes in a broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

To directly connect the Ethernet network interface cards (NICs) of two computers you should use a:

A

Crossover cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The function of a router is to:

A

Forward traffic to other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

If a router cannot determine the next hop for a packet, the router will:

A

Forward the packet to the default route

42
Q

One purpose of a perimeter network is to:

A

Make resourced available to the internet

43
Q

Which protocol can be used to encrypt packets on the Internet?

A

HTTPS

44
Q

The service that resolves fully qualified domain names (FQDN) to IP addresses is:

A

Domain Name Service (DNS)

45
Q

If a router is installed so that it separates a DHCP server from its clients, the clients will:

A

Be unable to obtain their leases from the server

46
Q

Which service masks internal IP addresses from outside the world?

A

NAT

47
Q

The query protocol used to locate resourced on a network is:

A

Lightweight Directory Access Protocol (LDAP)

48
Q

Tracert is used to:

A

Report the route taken by packets across an IP network

49
Q

In which OSI layer does routing occur?

A

Network

50
Q

What type of record does DNS use to find a mail service?

A

Mail Exchanger (MX) DNS record

51
Q

The default gateway address identifies the:

A

Device that will connect the computer to a remote network

52
Q

How many are there in an Internet Protocol version 6 (IPv6)?

A

128

53
Q

Which of the following is a public IP address?

A. 10.156.89.1
B. 68.24.78.221
C. 172.16.152.48
D. 192.168.25.101

A

B

54
Q

What is the minus cabling requirement for a 100BaseTX network?

A

Category 5 UTP cable

55
Q

Internet Key Exchange (IKE) is responsible for which two functions?

A

Negotiating algorithms to use and exchanging key information

56
Q

Which protocol is a transport layer protocol?

A

UDP and TCP

57
Q

Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router?

A

Network Policy and Access Services

Routing and Remote Access Sertvices

58
Q

What are two characteristics of fiber optic cable?

A

Supports splicing and requires a polish for end connectors

59
Q

A node within a local area network (LAN) must have?

A

NIC and IP address

60
Q

What is the bit rate for a North American T3 circuit?

A

44.736 Mbit/s

61
Q

Which feature of Category %e STP cable reduces external interferences?

A

Twisting

62
Q

What are thee advantages of VLANs?

A

The retiree a router to connect to VLANs on another switch

They compartmentalise a network and isolate traffic

The act although that are on the same LAN regardless o physical location

63
Q

What is an example of a network device that associates a network address with a port?

A

Router

64
Q

Which wireless communication problem is caused by electromagnetic waves?

A

Interference

65
Q

An Action Center alert recommends that you enable Windows Firewall.
After enabling the firewall, you can no longer access websites.

Which two TCP ports should you add exceptions for on the firewall?

A

Port 80 and port 443

66
Q

What are two advantages of using star topology rather than ring topology in a computer lab workgroup?

A

A central connection point allows for flexibility and scalability

A cable problem within the group affects two nodes, at most

67
Q

What are three characteristics of Ethernet network topology?

A

Can use coaxial, twisted pair and fiber optic media

Compromises the largest share of the networks in place today

Can negotiate different transmission speeds

68
Q

Your home computer is having problems accessing the Internet.
You suspect that your Internet router’s DHCP service is not functioning, so you check your computer’s IP address.

Which address indicates that your router’s DHCP service is NOT functioning?

A

196.254.1.15

69
Q

What are two characteristics of the CSMA/CD access method?

A

It checks to see if a collision has been detected

It waits until the transmission medium is idle

70
Q

What are two characteristics of a mesh network topology?

A

It is fault tolerant because of redundant connections

Every node connects to every other node on the network

71
Q

Which protocol is responsible for automatically assigning IP addresses?

A

HTTP

72
Q

The default subnet mask for a Class B network is:

A

255.255.0.0

73
Q

The default port used for SMTP is:

A

25

74
Q

Which are two features of DHCP?

A

Address reservation and IP address exclusion

75
Q

The command line tool used to list a host’s active incoming connections is?

A

NETSTAT

76
Q

Attenuation in a wireless network single is a result of :

A

Distance from the access point

77
Q

In a physical star topology, the central device is referred to as a:

A

Hub

78
Q

Which technology can you use to extend an internal network across shared or public folders?

A

VPN

79
Q

Which are published IEEE 802.11 wireless transmission standards?

A

802.11g and 802.11n

80
Q

What is an application layer protocol?

A

FTP

81
Q

The top-level domain of www.adventureworks.com is:

A

com

82
Q

In addition to switching, multilayer switches also:

A

Provide Layer 3 routing functions

83
Q

One reason to replace an unmanned switch with a managed switch is to:

A

Support multiple VLANs

84
Q

In which physical network topology is each computer connected to a central point?

A

Star

85
Q

What are two connectivity options for wide area networks (WANs)?

A

Dial-up an leased line

86
Q

A private network that allows multiple members of an organisation to exchange data is an:

A

Intranet

87
Q

Security is a concern on wireless networks due to:

A

The radio broadcast access method

88
Q

A characteristic of the mesh topology is that it:

A

Uses redundant paths

89
Q

What are the layers of the OSI Model?

A
  1. Physical
  2. Data link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application
90
Q

If a router is installed so that it separates a DHCP server from its clients, the clients will:

A

Be unable to obtain their leases form the server

91
Q

The default gateway identifies the:

A

Device that will connect the computer to a remote network

92
Q

What is the loopback address of your computer?

A

127.0.0.1

93
Q

Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies?

A

802.11n

94
Q

For which two reasons should you use IPsec between computers?

A

Data integrity and data confidentiality

95
Q

How do you protect the Internal network from intrusion?

A

Set the webserver in a perimeter network

96
Q

Which protocol is responsible for automatically assigning IP addresses?

A

HTTP

97
Q

What is the maximum cable length for a single Cat5 UTP cable run?

A

328 feet / 99.97 meters

98
Q

Which cable type transmits data the greatest distance?

A

Single-mode fiber

99
Q

Which routing is fault tolerant?

A

Dynamic routing

100
Q

The ping tool is used to:

A

Self-test a host’s own network interface and determine whether a host is reachable