Exam questions Flashcards
Which subnet mask is valid?
A: 255.255.255.240
B: 255.255.255.228
C: 255.255.255.164
D: 255.255.255.245
255.255.255.240
A service that resolves NetBIOS names to IP addresses is:
Windows Internet Name Service (WINS)
What type of DNS record maps host names to addresses?
Host (A) DNS record
Teredo tunneling is a protocol that:
Allows IPv6 connectivity through IPv4 addresses
What is the default subnet mask for a Class C Internet network?
255.255.255.0
The default port used for telnet is:
23
When a client’s DHCP-issues address expires, the client will:
Attempt to obtain a new address by broadcasting
You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response.
Why do you receive a response on the second attempt but not on the first attempt?
The DNS is not resolving
A Media Access Control (MAC) address identifies a/an:
Network Interface Card
Two companies want to share data by using the Internet.
What type of network provides the solution?
Extranet
VPNs are implemented to provide:
A secure connection through public networks
If an 802.IIg Internet connection has connectivity problems, what may be the cause?
Electromagnetic Interference (EMI)
Which of these factors has the biggest impact on data transmission speed in a wireless network?
The transmission standard of the equipment used
Which of the following used a tunnelling protocol?
A: Internet
B: VPN
C: Extranet
D: VLAN
VPN
A network that separates an organisations private network from a public network is a/an:
Perimeter
Which type of network is most vulnerable to intrusion?
Wireless
Attenuation in a wireless network signal is a result of:
Distance from the access point
Which type of network covers the broadest area?
WAN
In local area network (LAN) topologies, the primary media access methods are:
Contention and Token passing
What happens wen an 802.11b node starts broadcasting within the range of ab 802IIg access point?
A connection will be established
Which technology provides the highest bit rate?
DS3
A VPN is a/an:
Encrypted protection across the Internet
What determines the media access method that is used in a network?
Topology and protocols
Which wireless authentication method provides the highest level of security?
WI-FI protected Access (WPA)
The topology of a local area network (LAN) is defined by the:
Psychical and logical characteristics
The maximum output of an 802.IIg network is:
54 Mpbs
A node within a local area network (LAN) must have a network interface device and a:
Host address
Which is Layer 2 WAN protocol?
Point-to-Point Protocol (PPP)
Which type of port is used ti support VLANs traffic between two switches?
Trunk port
The protocol that maps IP addresses to a Media Access Control (MAC) address is:
Address Resolution Protocol (ARP)
The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is:
To which IP configuration does the CIDR notation 192.168.1.1/25 refer?
192.168.1.1 255.255.255.128
Which command is used to verify that a server is connection to the network?
PING
What represents the Internet Protocol versos 6 (PIv6) loopback address?
::1
What is the range of multicast addresses?
244.0.0.0 to 239.255.255.255.255
What uses pointer record and A records?
DNS Server
The ipconfig command will:
Display a client’s address
One reason to incorporate VLANs in a network is to:
Reduce the number of nodes in a broadcast domain
To directly connect the Ethernet network interface cards (NICs) of two computers you should use a:
Crossover cable
The function of a router is to:
Forward traffic to other networks
If a router cannot determine the next hop for a packet, the router will:
Forward the packet to the default route
One purpose of a perimeter network is to:
Make resourced available to the internet
Which protocol can be used to encrypt packets on the Internet?
HTTPS
The service that resolves fully qualified domain names (FQDN) to IP addresses is:
Domain Name Service (DNS)
If a router is installed so that it separates a DHCP server from its clients, the clients will:
Be unable to obtain their leases from the server
Which service masks internal IP addresses from outside the world?
NAT
The query protocol used to locate resourced on a network is:
Lightweight Directory Access Protocol (LDAP)
Tracert is used to:
Report the route taken by packets across an IP network
In which OSI layer does routing occur?
Network
What type of record does DNS use to find a mail service?
Mail Exchanger (MX) DNS record
The default gateway address identifies the:
Device that will connect the computer to a remote network
How many are there in an Internet Protocol version 6 (IPv6)?
128
Which of the following is a public IP address?
A. 10.156.89.1
B. 68.24.78.221
C. 172.16.152.48
D. 192.168.25.101
B
What is the minus cabling requirement for a 100BaseTX network?
Category 5 UTP cable
Internet Key Exchange (IKE) is responsible for which two functions?
Negotiating algorithms to use and exchanging key information
Which protocol is a transport layer protocol?
UDP and TCP
Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router?
Network Policy and Access Services
Routing and Remote Access Sertvices
What are two characteristics of fiber optic cable?
Supports splicing and requires a polish for end connectors
A node within a local area network (LAN) must have?
NIC and IP address
What is the bit rate for a North American T3 circuit?
44.736 Mbit/s
Which feature of Category %e STP cable reduces external interferences?
Twisting
What are thee advantages of VLANs?
The retiree a router to connect to VLANs on another switch
They compartmentalise a network and isolate traffic
The act although that are on the same LAN regardless o physical location
What is an example of a network device that associates a network address with a port?
Router
Which wireless communication problem is caused by electromagnetic waves?
Interference
An Action Center alert recommends that you enable Windows Firewall.
After enabling the firewall, you can no longer access websites.
Which two TCP ports should you add exceptions for on the firewall?
Port 80 and port 443
What are two advantages of using star topology rather than ring topology in a computer lab workgroup?
A central connection point allows for flexibility and scalability
A cable problem within the group affects two nodes, at most
What are three characteristics of Ethernet network topology?
Can use coaxial, twisted pair and fiber optic media
Compromises the largest share of the networks in place today
Can negotiate different transmission speeds
Your home computer is having problems accessing the Internet.
You suspect that your Internet router’s DHCP service is not functioning, so you check your computer’s IP address.
Which address indicates that your router’s DHCP service is NOT functioning?
196.254.1.15
What are two characteristics of the CSMA/CD access method?
It checks to see if a collision has been detected
It waits until the transmission medium is idle
What are two characteristics of a mesh network topology?
It is fault tolerant because of redundant connections
Every node connects to every other node on the network
Which protocol is responsible for automatically assigning IP addresses?
HTTP
The default subnet mask for a Class B network is:
255.255.0.0
The default port used for SMTP is:
25
Which are two features of DHCP?
Address reservation and IP address exclusion
The command line tool used to list a host’s active incoming connections is?
NETSTAT
Attenuation in a wireless network single is a result of :
Distance from the access point
In a physical star topology, the central device is referred to as a:
Hub
Which technology can you use to extend an internal network across shared or public folders?
VPN
Which are published IEEE 802.11 wireless transmission standards?
802.11g and 802.11n
What is an application layer protocol?
FTP
The top-level domain of www.adventureworks.com is:
com
In addition to switching, multilayer switches also:
Provide Layer 3 routing functions
One reason to replace an unmanned switch with a managed switch is to:
Support multiple VLANs
In which physical network topology is each computer connected to a central point?
Star
What are two connectivity options for wide area networks (WANs)?
Dial-up an leased line
A private network that allows multiple members of an organisation to exchange data is an:
Intranet
Security is a concern on wireless networks due to:
The radio broadcast access method
A characteristic of the mesh topology is that it:
Uses redundant paths
What are the layers of the OSI Model?
- Physical
- Data link
- Network
- Transport
- Session
- Presentation
- Application
If a router is installed so that it separates a DHCP server from its clients, the clients will:
Be unable to obtain their leases form the server
The default gateway identifies the:
Device that will connect the computer to a remote network
What is the loopback address of your computer?
127.0.0.1
Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies?
802.11n
For which two reasons should you use IPsec between computers?
Data integrity and data confidentiality
How do you protect the Internal network from intrusion?
Set the webserver in a perimeter network
Which protocol is responsible for automatically assigning IP addresses?
HTTP
What is the maximum cable length for a single Cat5 UTP cable run?
328 feet / 99.97 meters
Which cable type transmits data the greatest distance?
Single-mode fiber
Which routing is fault tolerant?
Dynamic routing
The ping tool is used to:
Self-test a host’s own network interface and determine whether a host is reachable