Final Flashcards

1
Q

Layer 2 defines

A

local area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of address translation allows more that one internal address to be mapped to a single external address?

A

Port Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is layer 3 in the OSI model?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the best method to secure data

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

At which layer of the OSI model do MAC addresses operate?

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layers 5, 6, and 7 from the OSI model correspond to which of the following layers of the TCP/IP model?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is not a function of the data link layer?

A

specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following would be a standard or protocol used at the Data Link layer of the Internet or OSI model?

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The application layer is the seventh layer of the Internet model and specifies the type of connection and the electrical signals that pass through it.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which network topology connected nodes with a ring of cable?

A

Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a type of coaxial cable?

A

RG-59

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Ethernet protocol is defined at what layer in the OSI model.

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which networking devices can use the Spanning Tree Protocol (STP)?

A

Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through singlemode fiber?

A

1000BaseX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Coaxial cable costs less and offers less shielding to electrical interference than twisted pair cable.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are patch cables used for? (Select two.)

A

to connect the patch panel to the switch
To connect PCs to outlet boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following enables you to use multiple NICs in a computer to achieve a much faster network speed?

A

Bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Enter the subnet the host 10.82.84.139/18 belongs to:

A

10.82.64.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the first valid host on the subnetwork that the node 172.24.121.68 255.255.255.240 belongs to?

A

172.24.121.65

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

__________ is not an important function of the transport layer.

A

routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How many hosts can be located on a network, where the IPv4 subnet mask is 26 bits?

A

62

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An application layer address using TCP/IPv4 looks like:

A

www.uvu.edu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:

A

broadcast message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Enter the last valid host on the network that the host 192.168.158.169 255.255.255.252 is a part of:
192.168.158.170
26
Which of the following protocols resolves IP addresses to MAC addresses?
ARP
27
The source port identifier of the received TCP segment tells the destination station _____________.
which application layer process the packet is from.
28
TCP is the network layer protocol used on the Internet today.
False
29
TCP/IP operates only as connection-oriented.
False
30
To test basic IP connectivity you would typically use ________.
ping
31
With QoS routing different __________ are defined, each with different priorities.
classes of service
32
Translating an application layer address to a network layer address and finally to a data link layer address is called address resolution.
True
33
A(n) _________ is a specially formatted request used to perform IP address to data link address resolution.
Address Resolution Protocol request
34
Is this IP address configuration valid for an internet host? IP: 100.134.251.3 Subnet: 255.257.240.0
False
35
Your ISP sent you the following information. Default Gateway 131.75.69.32/23 What is the proper subnet mask for this IP address (in dotted decimal format)?
255.255.254.0
36
The most common protocol for dynamic addressing in TCP/IP networks is the Dynamic Host Configuration Protocol.
True
37
IP:
is utilized during routing functions
38
What is the broadcast address of the network 172.23.255.0 255.255.255.0?
172.23.255.255
39
Is this IP address configuration valid for an internet host? IP: 10.1.2.3 Subnet: 255.255.240.0
False
40
When DHCP Discover fails, what process will the client use to generate an address for itself?
When DHCP Discover fails, what process will the client use to generate an address for itself?
41
A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration change will allow the PING to be successful?
Allow ICMP to pass through the Router
42
What is the first valid host on the subnetwork that the node 172.24.176.118 255.255.254.0 belongs to?
172.24.176.1
43
If a network has a subnet mask of 255.255.255.224, how many host addresses are on the network
30
44
_________created a service that allows organizations to transfer IPv4 addresses they don't need to another organization.
ARIN
45
The network layer address for IP is ten bytes long when using IPv4.
False
46
What is the first valid host on the subnetwork that the node 172.23.75.10 255.255.255.192 belongs to?
172.23.75.1
47
What is the last valid host on the subnetwork 172.24.198.0/23?
172.24.199.254
48
A workstation on the network is configured as follows. A user reports that they are unable to print to a device located on a different subnet. Which of the following is the MOST likely problem? IP address: 172.16.204.12 Subnet Mask: 255.255.0.0 Default Gateway: 172.15.204.254 DNS address: 172.16.204.1
Default gateway
49
In its simplest form, the __________ has two columns: the first column lists every destination network, while the second column lists the interface on which that computer should send messages, if they are destined for the network in the first column.
routing table
50
You have decided to setup a mail server, but aren't able to send or receive email. What protocol and ports would you check for functionality?
25 (SMTP) and 143 (IMAP)
51
Which statements about SSH and Telnet are true? (Select two.)
SSH is more secure than Telnet because it encrypts data. SSH uses port 22, and Telnet uses port 23.
52
What command do you run to see the DNS cache on a Windows system?
ipconfig /displaydns
53
Running which command enables you to query the functions of a DNS server?
nslookup
54
Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443?
Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption.
55
Which authentication standard is highly time sensitive?
Kerberos
56
Which of these is a form of tunneling:
GRE
57
Which VPN technology enables direct connections between satellite locations?
DMVPN
58
What kind of DNS records do IPv6 addresses use?
AAAA
59
An N-tiered architecture:
is generally more “scalable” than a three-tiered architecture
60
You have just had DSL installed at your house. Although the Internet connection is fast, your phones no longer work. What is the problem?
The installer failed to install the POTS filters on the phones.
61
A company is connected to an ISP, but owns the premise router with an internal CSU/DSU. Which of the following is considered the demarc?
Smart jack
62
To achieve maximum Wi-Fi coverage in a room, where should you place the WAP?
Place the WAP in the center of the room.
63
A technician sets up a network with multiple WAN connections, backup power sources, multiple firewalls, and a mesh configuration for network switching. All of the software and hardware has fault detection designed to provide a system with minimal down time. Which of the following is the BEST example of this optimization method?
High availability
64
What type of server supports EAP-encrypted passwords in accordance with the 802.1X standard?
RADIUS server
65
A “thin client” architecture approach:
places all or almost all of the application logic on the server
66
Which of the following allows 802.11n higher transfer speeds than the previous wireless standards?
MIMO technology
67
A technician has two wireless 802.11g APs. One is set to channel 1 and the other channel 6. The APs appear to interfere with each other. Which of the following is MOST likely the reason?
Channel width is set to 40MHz
68
Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps?
802.11b
69
Channel bonding will improve which of the following wireless characteristics?
Connection speed
70
A user is unable to communicate with any local network resources, but is connected to the wireless network and can access the Internet. The network technician notices that the laptop has an incorrect IP address, even though it shows it is connected. Which of the following is the MOST likely cause?
Incorrect SSID
71
Which of the following is needed when using WPA2-Enterprise wireless encryption? TFTP
RADIUS
72
A user with a 802.11n WLAN card is connected to a SOHO network and is only able to connect at 11 Mbps with full signal strength. Which of the following standards is implemented on the network?
802.11b
73
An 801.11g wireless access point was configured as follows: - AP encryption forced to WPA2-AES mode only - MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40 Which is true about the above configuration?
An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.
74
A company that was previously running on a wired network is performing office-wide upgrades. A department with older desktop PC's that do not have wireless capabilities must be migrated to the new network, ensuring that all computers are operating on a single network. Assuming CAT5e cables are available, which of the following network devices should a network technician use to connect all the devices to the wireless network?
Wireless router
75
A malicious user connects to an open wireless network and is able to copy, reassemble and play back live VoIP data streams from wireless VoIP users. Which of the following attacks has the user performed?
Packet Sniffing
76
Compare the settings below to determine which of the following issues is preventing the user from connecting to a wireless network. Which of the following settings is incorrect on the client? client Server SSID: Wolverine-WiFi Open-WiFi Protocol: 802.11ac 802.11ac Security type: Open Open Network band: 5 GHz 5 GHz Network channel: 64 64 IPv4 address: 169.28.86.89 169.28.86.1 IPv4 DNS servers: 169.28.140.227 169.28.140.227 Manufacturer: Intel Corporation Cisco Description: Intel(R) Dual Band Wireless-AC 8265 Cisco Aireonet Series wireless access point Physical address (MAC): A4-C3-F0-A1-AF-59 00:0c:29:d8:62:75
SSID Mismatch
77
Which of the following wireless standards is capable of ONLY operating on 5.8GHz?
802.11a
78
A new WAP is configured to only use 802.11g with SSID broadcasts enabled. The encryption is set to WPA and the key is given to the user. A user near the WAP is using a laptop equipped with a 5GHz wireless card and is not able to see the SSID. Which of the following is the problem?
Incompatible hardware
79
A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. Which of the following is the malicious student implementing?
Jamming
80
Which of the following wireless security measures, although widely implemented, does not provide strong security?
MAC address filtering
81
______________ refers to the time it takes for a signal to travel from sender to recipient (highly exaggerated with satellite transmission).
Propagation delay
82
A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another. This is an example of which of the following?
Private SaaS
83
The ________________ cloud deployment model provides the highest levels of control, privacy and security.
private
84
NFC tags are always:
Passive
85
A thermostat that you can control remotely with an app on your smartphone would certainly fit under which of the following?
IoT
86
When designing a basic network, which of the following are factors to consider? (Select two.)
List of requirements Equipment limitations
87
Which of the following is a unique server function?
Network authentication
88
Through what mechanism is a change to the IT structure initiated?
Users submit a change request to the change management team.
89
What is succession planning?
Identifying personnel who can take over certain positions in response to an incident
90
A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?
Port security on the Ethernet switch has disabled the port.
91
Which of the following physical security controls prevents an attacker from gaining access to a network closet?
Proximity readers
92
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).
161 162
93
An administrator needs to open ports in the firewall to support both major FTP transfer modes. Which of the following default ports was MOST likely opened? (Select TWO)
20 21
94
An administrator needs to provide remote connectivity to server1, web traffic to server2, and FTP access to server3 using a single outside IP address. Which of the following would the administrator implement on the firewall to accomplish this?
Port Address Translation
95
A firewall that operates at Layer 7 of the OSI model is known as a(n):
application level
96
An organization notices a large amount of malware and virus incidents at one satellite office, but hardly any at another. All users at both sites are running the same company image and receive the same group policies. Which of the following has MOST likely been implemented at the site with the fewest security issues?
End-user awareness training
97
A firewall that detects and prevents attacks from outside the network based on learned data patterns can BEST be described as which of the following?
Behavior based IPS
98
Which of the following default ports would need to be open on a firewall to allow remote desktop access?
3389
99
After repairing a computer infected with malware, a technician determines that the web browser fails to go to the proper address for some sites. Which of the following should be checked?
Local hosts file
100
Which of the following assists a network administrator in reverse engineering malware and viruses?
Virtual machines
101
A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address?
Implement a split horizon DNS
102
Which Windows utility displays open ports on a host?
netstat
103
A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. Which of the following would be required to resolve the exploit?
Install recommended updates
104
Which of the following protocols are notorious for cleartext passwords? (Select two.)
POP3 Telnet
105
A company would like their technicians to be able to connect to employee desktops remotely via RDP. Which of the following default port numbers need to be opened on the firewall to support this?
3389
106
Sheryl, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO).
443 E 80
107
Which of the following network protocols is used to transport email between servers?
SMTP
108
A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access. Which of the following has MOST likely occurred?
Implicit deny is blocking all traffic.
109
A technician configures a firewall in the following manner in order to allow HTTP traffic Source IPZoneDest IPZonePortAction AnyUntrustAnyDMZ80Allow The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?
Application aware firewall
110
Jason is concerned about the communication between two workstations and wants to capture and analyze that traffic to see if anything illicit is going on. Which tool would best serve his needs?
Packet flow monitor
111
IGMP refers to:
Internet Group Management Protocol
112
What does nslookup do?
Queries DNS for the IP address of the supplied host name
113
While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue?
Bend radius exceeded
114
An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this?
Nessus
115
A technician is installing a PoE switch for VoIP phones. Which of the following is the technician MOST likely going to configure on the switch?
QoS
116
A technician has traced a POTS line to a 110 block. Which of the following devices would the technician MOST likely use to see if the line carries a dial tone?
Butt Set
117
A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building. Which of the following is the MOST common connector that will be used on the switch to connect the media converter?
ST
118
Which of the following is true about tunneling and encryption?
SSL VPN provides a secure tunnel.
119
A user is unable to print to a network printer. Which of following is the FIRST step that a technician should take to troubleshoot the issue?
Establish a plan of action to resolve the problem.
120
Jennifer, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Jennifer's workstation is as follows: IP address: 192.168.0.124 Subnet Mask: 255.255.255.128 Default Gateway: 192.168.0.254 Which is MOST likely preventing the user from accessing the Internet?
Incorrect gateway
121
The systems administrator has assigned an IP address and default gateway to a standard Layer 2 switch. Which of the following would be the primary purpose of doing this?
Allow remote administration of the switch
122
Which of the following devices can be utilized to monitor and block websites accessible by a company?
Content filter
123
Which of the following is used to ensure traffic flows efficiently on multiple T-1 circuits?
Load balancer
124
Which of the following devices exist as either hardware or software to assist in routing traffic? (Select TWO).
Layer 3 switch Router
125
A network technician is assisting the company with developing a new business continuity plan. Which of the following would be an appropriate suggestion to add to the plan?
Build redundant links between core devices