IST166Final Flashcards

1
Q

All of the 802.11 standards for wireless networking support which type of communication path sharing technology?

A

CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have been contacted by OsCorp to recommend a wireless Internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?

A

802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the frequency of 802.11a networking?

A

5.75 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following are frequency defined by 802.11 committees for wireless networking?

A

2.4 GHz, 5.75 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many total channels are available for 802.11g wireless?

A

11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are designing an update to your client’s wireless network. The existing wireless network uses 802.11b equipment; which your client complains runs too slowly. She wants to upgrade the network to run at 54 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users’ workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation?

A

802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which IEEE wireless standards specify transmission speeds up to 54 Mbps?

A

802.11g, 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How many total channels are available for 802.11a wireless networks?

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

A

11 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which IEEE standard describes wireless communications?

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless devices?

A

WEP, WPA Personal, and WPA2 Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?

A

users with the correct WEP key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What encryption method is used by WPA for wireless networks?

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You need to add security for your wireless network. You would like to use the most secured method. Which method should you implement?

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

On wireless networks, which technology is employed to provide the same type of protection that cables provide on a wired network?

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following protocols or mechanisms is not used to provide security on a wireless network?

A

RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You want to implement 802.1x authentication on your wireless network. Which of the following will be required?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?

A

on a RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following specifications identify security that can be added to wireless networks?

A

802.1x, 802.11i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You have a small home network that uses WEP. The access point is configured as the DHCP server and NAT router that connects to the Internet. You do not have a RADIUS server. Which authentication method should you choose?

A

open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You need to configure a wireless network. You want to use WPA Enterprise. Which of the following components will be part of your design?

A

802.1x, TKIP encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point, and to be able to roam between the two access points. How should you configure the access points?

A

Same SSID, different channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do?

A

Decrease the beacon interval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You have purchased a used wireless access point and want to set up a small wireless network at home. The access point only supports WEP. You want to configure the most secure settings on the access point. Which of the following would you configure?

A

preshared key, open authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area but cannot see your network to connect to it.
What should you do?

A

configure a profile on the wireless client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You want to connect your client computer to a wireless access point connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client?

A

AES, SSID, Preshared key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You have a small wireless network that uses multiple access points. The network currently uses WEP. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop?

A

SSID, Preshared key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Telnet is inherently insecure because its communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which protocol is used for securely browsing a Web site?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following are improvements to SNMP that are included within SNMPv3?

A

Authentication for agents and managers

Encryption of SNMP messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What do you do?

A

Implement version 3 of SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which protocol does HTTPS use to offer greater security in Web transactions?

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following protocols are often added to other protocols to provide secure transmission of data?

A

TLS, SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following protocols can be used to securely manage a network device from a remote connection?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

When using Kerberos authentication, which of the following terms is used to describe the token that verifies the identity of the user to the target system?

A

Ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following applications typically use 802.1x authentication?

A

Controlling access through a wireless access point

controlling access through a switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following authentication methods uses tickets to provide single sign-on?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following authentication protocols uses a 3 way handshake to authenticate uses to the network?

A

CHAP, MS-CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

You have been contracted by a firm to implement a new remote access solution based on a Windows Server 2003 system. The customer wants to purchase and install a smartcard system to provide a high level of security to the implementation. Which of the following authentication protocols are you most likely to recommend to the client?

A

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

You want to increase the security of your network by allowing only authorized users to be able to access network devices through a switch. Which of the following should you implement?

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which of the following is a feature of MS-CHAP v2 that is not included in CHAP?

A

mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following are used when implementing Kerberos for authentication and authorization?

A

Ticket granting server, Time server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

You have a Web server that will be used for secure transactions for customers who access the Web site over the Internet. The Web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?

A

obtain a certificate from a public PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use?

A

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following is a mechanism for granting and validating certificates?

A

PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which protocol and port number is used by BOOTP/DHCP?

A

UDP 67

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which port number is used by SNMP?

A

161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

You are configuring a network firewall to allow SMTP outbound e-mail traffic, and POP3 inbound e-mail traffic. Which of the following TCP/IP ports should you open on the firewall?

A

25, 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which of the following are characteristics of a packet-filtering firewall?

A

Stateless, Filters IP address and port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

After blocking a number of ports to secure your server, you are unable to send e-mail. To allow e-mail service which of the following needs to be done?

A

Open port 25 to allow SMTP service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of the following is a firewall function?

A

packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open TCP/IP ports 80, 110, 25, 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?

A

Web server, e-mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks. Which solution should you use?

A

Host based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which of the following are characteristics of a circuit-level gateway?

A

Filters based on sessions, Stateful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

You have used firewalls to create a demilitarized zone. You have a Web server that needs to be accessible to Internet users. The Web server must communicate with a database server for retrieving product, customer, and order information. How should you place devices on the network to best protect the servers?

A

Put the Web server inside the DMZ.

Put the database server on the private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which of the following functions are performed by proxies?

A

Block employees from accessing certain Web sites

Cache Web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Haley configures a Web site using Windows 2000 default values. What are the HTTP port and SSL port settings?

A

80 for HTTP; 443 for SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which of the following is a good reason to install a firewall?

A

To prevent hackers from accessing your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

You provide Internet access for a local school. You want to control Internet access based on user, and prevent access to specific URLs. Which type of firewall should you use?

A

Application level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

You have just installed a packet-filtering firewall on your network. What options will you be able to set on your firewall?

A

Port number
Destination address of a packet
Source address of a packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

You have a router that is configured as a firewall. The router is a layer 3 device only. Which of the following does the router use for identifying allowed or denied packets?

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

You want to maintain tight security on your internal network, so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable?

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

To increase security on your company’s internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

You have a company network that is connected to the Internet. You want all users to have access to the Internet, but need to protect your private network and users. You also need to make a Web server publicly available to Internet users. Which solution should you use?

A

Use firewalls to create a DMZ. Place the Web server inside the DMZ, and the private network behind the DMZ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Your company has a connection to the Internet that allows users to access the Internet. You also have a Web server and an e-mail server that you want to make available to Internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ?

A

Network based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Your company leases a very fast Internet connection and pays for it based on usage. You have been asked by the company president to reduce Internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection, without decreasing performance. What is the best way to do this?

A

Install a proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Which protocol and port number is used by TFTP?

A

UDP 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

You administer a Web server on your Network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You configured the Web site as follows:
IP address: 192.168.23.8
HTTP Port: 1030
SSL Port: 443
Users complain that they can’t connect to the Web site when they type www.westsim.com. What is the most likely source of the problem?

A

The HTTP port should be changed to 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

How does a proxy server differ from a packet filtering firewall?

A

A proxy server operates at the Application layer, while a packet filtering firewall operates at the network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which of the following does a router acting as firewall use to control which packets are forwarded or dropped?

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Using the Netstat command, you notice that a remote system has made a connection to your Windows Server 2003 system using TCP/IP port 21. Which of the following actions is the remote system most likely to be performing?

A

Downloading a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which of the following network services or protocols uses TCP/IP port 22?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?

A

circuit-level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

You manage a small network at work. Users use workstations connected to your network. No portable computers are allowed. As part of your security plan, you would like to implement scanning of e-mails for all users. You want to scan the e-mails and prevent any e-mails with malicious attachments from being received by users. Your solution should minimize administration, allowing you to centrally manage the scan settings. Which solution should you use?

A

network based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

You are the administrator for a secure network that uses firewall filtering. Several network users have requested to access Internet Usenet groups but are unable. What needs to be done to allow users to access the newsgroups?

A

Open port 119 to allow NNTP service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which of the following is not a primary characteristic of a worm?

A

it infects the MBR of a hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?

A

rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Which of the following describes a man-in-the-middle attack?

A

A false server intercepts communications from a client by impersonating the intended server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Users on your network report that they have received an e-mail stating that the company has just launched a new Web site for employees, and to access the Web site they need to go there and enter their username and password info. No one in your company has sent this e-mail. What type of attack is this?

A

phishing

81
Q

How can an organization help prevent social engineering attacks?

A

publish and enforce clearly written security policies

Educate employees on the risks and countermeasures

82
Q

What is the primary countermeasure to social engineering?

A

awareness

83
Q

You have worked as the network administrator for a company for 7 months. One day all pictures files on the server become corrupted. You discover that a user downloaded a virus from the Internet onto his workstation, and it propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation does not recur. What on earth should you do?

A

install a network virus detection software solution

84
Q

Which of the following statements about the use of anti-virus software is correct?

A

anti-virus software should be configured to download updated virus definition files as soon as they become available

85
Q

Capturing packets as they travel from one host to another with the intent of altering the contents of the packets is a form of which security concern?

A

man-in-the-middle attacks

86
Q

Which of the following are examples of social engineering?

A

shoulder surfing, dumpster diving

87
Q

A Smurf attack requires all but which of the following elements to be implemented?

A

Padded cell

88
Q

What is the main difference between a worm and a virus?

A

A worm can replicate itself and does not need a host for distribution

89
Q

Which is a form of attack that either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

A

Denial of service attack

90
Q

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

A

virus

91
Q

Which of the following is the best countermeasure against man-in-the-middle attacks?

A

IPSec

92
Q

Which of the following measures are you most likely to implement in order to protect against a worm or Trojan horse?

A

anti-virus software

93
Q

An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?

A

Denial of Service

94
Q

Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network?

A

Smurf

95
Q

You are concerned about protecting you network from network-based attacks from the Internet. Specifically, you are concerned about “zero day” attacks (attacks that have not yet been identified or that do not have prescribed protections). Which type of device should you use?

A

anomaly based IDS

96
Q

Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?

A

IDS

97
Q

Which of the following devices is capable of detecting and responding to security threats?

A

IPS

98
Q

What action can a typical passive Intrusion Detection System (IDS) take when it detects an attack?

A

The IDS logs all pertinent data about the intrusion

An alert is generated and delivered via Email, the console, or an SNMP trap.

99
Q

As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement?

A

Host based IDS

100
Q

What is the most common form of host based IDS that employs signature or pattern matching detection methods?

A

Anti-virus software

101
Q

Which IDS method searches for intrusion or attack attempts by recognizing patterns or identities listed in a database?

A

Signature based

102
Q

You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action when possible to stop or prevent the attack.Which tool should you use?

A

IPS

103
Q

What security mechanism can be used to detect attacks originating on the Internet or from within an internal trusted subnet?

A

IDS

104
Q

Which of the following devices can monitor a network and detect potential security attacks?

A

IDS

105
Q

You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use?

A

Port scanner

106
Q

Which of the following functions can port scanner provide?

A

Determining which ports are open on a firewall

Discovering unadvertised servers

107
Q

You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. which document would help in identifying past average network traffic?

A

Baseline

108
Q

Which of the following information are you likely to find in a procedure document?

A

Details on how to test and deploy patches

109
Q

You are troubleshooting a workstation connection to the network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update?

A

Wiring schematic

110
Q

You are in the habit of regularly monitoring performance statistics for your devices. You find that this month a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect the change?

A

Baseline

111
Q

Which type of documentation would you consult to find the location of RJ-45 wall jacks and their endpoints in the intermediate distribution closet?

A

Wiring schematic

112
Q

Which of the following information are you likely to find in a policy document?

A

a requirement for using encrypted communications for Web transactions.

113
Q

You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable connecting the computer to the network. Which type of document should you update?

A

Change documentation

114
Q

A new law was recently passed that states that all businesses must keep a history of all e-mails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law?

A

Policy

115
Q

You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult?

A

regulation

116
Q

You are troubleshooting the connection of a computer in an office to the punchdown block in the distribution closet. Which document would you consult to identify the termination of the cable on the punchdown block based on the wall jack location in the office?

A

Wiring schematic

117
Q

Which of the following documents would likely identify that drop cables on your network use the T568A standard?

A

Wiring schematic

118
Q

In troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information?

A

Network diagram

119
Q

You want to make sure that the correct ports on a firewall have been opened or closed. Which document should you check?

A

Configuration documentation

120
Q

Which protocol uses traps to send notifications from network devices?

A

SNMP

121
Q

Because of an unexplained network slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host. What protocol will the software use to detect the problem?

A

SNMP

122
Q

You manage a server at work that has just been configured with a new application. Consequently, the server has crashed several times during the week. You think you have the problem resolved, but you would like to be able to manage the server remotely in case there is a problem. Which of the following protocols would you use for remote management?

A

VNC, ICA

123
Q

Which of the following protocols or services would you associate with the Window’s Remote Desktop Services network traffic?

A

RDP

124
Q

You are an administrator for a large company. You are setting up a computer at a worker’s home so he can telecommute while he recovers from surgery. You want to connect to the UNIX server at the office to update his account information. Which utility should you use to accomplish this?

A

Telnet

125
Q

Which port does Telnet use?

A

23

126
Q

Chapter 9

A

STARTED SOME QUESTIONS BACK

127
Q

*** 9.4 You want to know what protocols are being used on your network. You’d like to monitor network traffic and sort traffic based on protocol. Which tool should you use?

A

Packet Sniffer

128
Q

You have a WAN link that connects two sites. The WAN link is supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the actual bandwidth of the link. Which tool should you use?

A

Throughput tester

129
Q

You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use?

A

Protocol analyzer

130
Q

You connect a packet sniffer to a switch to monitor frames on your local area network. However, the packet sniffer is only able to see broadcast frames and frames addressed specifically to the host device. Which feature should you enable on the switch so you can see frames from all devices connected to the switch?

A

Mirroring

131
Q

You are concerned about attacks directed against the firewall on your network. You would like to examine the content of individual frames sent to the firewall. Which tool should you use?

A

Packet sniffer

132
Q

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device which is connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation and not other devices. Which feature should you configure?

A

Promiscuous mode

133
Q

You manage a firewall that connects your private network to the Internet. You would like to see a record of every packet that has been rejected by the firewall in the past month. Which tool should you use?

A

Event log

134
Q

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device which is connected to a hub with three other computers. The hub is connected to the same switch that is connected to the router. When you run the software, you only see frames addressed to the four workstations but not to the router. Which feature should you configure?

A

Mirroring

135
Q

You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B. On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packet between Host A and Host B. What should you do?

A

Run the packet sniffer application on Host B

136
Q

You have a Web site that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted. Which tool should you use?

A

Load tester

137
Q

You have installed a new application on a network device. During testing, it appears as if the software is causing other services running on the device to stop responding. Which tool should you consult to identify the problem?

A

Application log

138
Q

**** 10.1 You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, that she can no longer access the network. You go to her office and see that the user’s stiletto heel has broken and exposed the wires in the Cat 5 network cable. You make another cable and attach it from the wall plate to the user’s computer. What should you try next in your troubleshooting strategy?

A

Test the solution

139
Q

While working on a Linux server, you are unable to connect to Windows Server 2003 system across the Internet. You are able to ping the default gateway on your own network, so you suspect that the problem lies outside of the local network. Which utility would you use to track the route a packet takes as it crosses the network?

A

traceroute

140
Q

a router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next?

A

Identify possible effects of the solution

141
Q

A user reports that he can’t connect to a specific Web site. You go to the user’s computer and reproduce the problem. What should you do next?

A

Identify the affected areas of the network

142
Q

User’s report that the network is down. After some investigation, you determine that a specific router is configured such that a routing loop exists. What should you do next?

A

Determine if escalation is needed.

143
Q

You are a network administrator for your company. A frantic user calls you one morning exclaiming that “nothing is working.” What should you do next in your troubleshooting strategy?

A

Establish the symptoms

144
Q

A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works. What should you do next?

A

Identify the results and effects of the solution

145
Q

A user reports that she can’t connect to a server on your network. You check the problem and find out that all users are having the same problem. What should you do next?

A

Determine what has changed

146
Q

A user reports that she can’t connect to the Internet. After some investigation, you find that the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point. What should you do next?

A

Create an action plan

147
Q

Examine the following output.
Reply from 64.78.193.84: bytes=32 time=86ms
Reply from 64.78.193.84: bytes=32 time=86ms
Reply from 64.78.193.84: bytes=32 time=86ms
Reply from 64.78.193.84: bytes=32 time=86ms
Reply from 64.78.193.84: bytes=32 time=86ms
Reply from 64.78.193.84: bytes=32 time=86ms
Reply from 64.78.193.84: bytes=32 time=86ms
Reply from 64.78.193.84: bytes=32 time=86ms
Which of the following utilities produced this output?

A

ping

148
Q

You work in an office that uses NetWare servers and Windows NT 4.0 servers. The network uses both the TCP/IP and IPX/SPX protocols. You are sitting at a workstation that uses Windows 95 OSR2. An application you are using is unable to contact a Windows NT server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?

A

ping

149
Q

You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the UTP patch cable is run 75 feet from the wall outlet, passes through the ceiling and over several florescent light fixtures before the client system. Which of the following may be the cause of the connectivity problem?

A

EMI interference

150
Q

You have just been hired as a network administrator. A user has just changed offices and needs you to activate the network and telephone connections in his office. However, the wiring at the punch down block is labeled poorly and you are unable to tell which wires go to the user’s office. What should you do?

A

Use a tone generator to locate the correct wiring

151
Q

You have a cable Internet connection at home. The installer had connected the router near the outside wall of your house with RG-6 cable. You move the cable router a distance of 50 meters using RG-8 cables and special connector adapters. Which condition are you most likely to experience?

A

Echo

152
Q

You are working with an existing fiber optic installation in your building. You want to know how long each length of cable that runs through walls. Which tool should you use?

A

OTDR

153
Q

You manage a network that uses 1000BaseT Ethernet. You find that one device on the network at only 100 Mbps. Which tool should you use to test the drop cable and the connection to the network?

A

Certifier

154
Q

During a network infrastructure upgrade, you have replaced two 10 Mbps hubs with switches and upgraded from Category 3 UTP cable to Category 5e. During the process, you accidentally cut the Cat 5e patch cable that stretches from the network printer to the upgraded switch. What is the impact on the network?

A

All network nodes, with the exception of the printer, will be available.

155
Q

The phone line to one office is not working. You have identified the location of the phone line in a 66 block in the wiring closet. Which tool would you use to connect to the phone line at the punchdown block to see if you can make and receive calls?

A

Butt set

156
Q

You have just connected four new computer systems to an Ethernet switch using spare patch cables. After the installation only three systems are able to access the network. You verify all client network settings and replace the network card in the failed system. The client is still unable to access the network. Which of the following might you suspect as the real cause of the problem?

A

Failed patch cable

157
Q

You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat 6e cable to connect the wiring closet to the shipping building. Which of the following should you include in your plan?

A

Repeater

158
Q

You have decided to implement Gigabit Ethernet on your network. Each switch port is connected to a single device. Following the installation, you find one device connected to a switch that is only running at 100 Mbps. Which of the following are likely causes?

A

Crosstalk

159
Q

You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat 6e cable to connect the wiring closet to the shipping building. Which of the following conditions are you most likely to experience?

A

Attenuation

160
Q

You have a network connected using a full physical mesh topology. The link between device A and device B is broken. Which of the following best describes what happens to network communications?

A

Device A will be able to communicate with all other devices

161
Q

You’re responsible for implementing network cabling in a new network installation. The cabling will be installed in a manufacturing environment where there is a great deal of EMI. Which type of cabling would operate best in this environment?

A

Fiber-optic

shielded twisted pair cable

162
Q

You want to measure the voltage, amps, and ohms of various devices. Which tool should you use?

A

Multimeter

163
Q

You have a network connected using a physical star topology. One of the drop cables connecting a workstation is removed. Which of the following best describes what happens to network communications?

A

All devices except the device connected with the drop cable will be able to communicate

164
Q

You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. Which of the following best describes what happens to network communications?

A

No devices will be able to communicate

165
Q

You want to create a loopback plug using a single RJ-45 connector. How should you connect the wires in the connector?

A

Connect pin 1 to pin 3 and pin 2 to pin 6

166
Q

You are troubleshooting a connectivity problem in which one client system is unable to connect to a server. Both the server and client system are connected to the same Ethernet network switch. Nor other users have complained of a problem, and you suspect that faulty network cabling might be to blame. Which of the following troubleshooting steps are most likely to perform first?

A

Use a media tester to test the cable between the computer system and the network switch

167
Q

You use a Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wall to hang a picture and pierces the cable such that a signal sent on pin 1 arrives on the cable connected to pin 7. What term describes this condition?

A

short circuit

168
Q

Upon conducting a visual inspection of the server room, you see that a switch displays LED collision lights that are continually lit. You check the LED on the corresponding workstation and see that it is flashing rapidly even though it is not sending or receiving network traffic at that time. What is the cause of the network collisions?

A

Faulty network card

169
Q

You have been asked to document the wiring in your building. You would like to identify the length of each Cat5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use?

A

TDR

170
Q

Users report that the Internet is no longer accessible. You suspect that the line connecting your building to the Internet is not working properly. Which of the following allows the service provider to remotely test the local loop?

A

Smart jack

171
Q

You are moving a client to a new location within an Ethernet network. Previous to the move, the client system did not have difficulty accessing the network. During the relocation, you attach a patch cable from the client system to the wall jack and from the patch panel to the switch. Once connected you do not get a link light on the network card or the switch. You swap out the cable running between the patch panel and the switch with a known working one but you still cannot connect. Which of the following might you suspect as the problem?

A

Failed patch cable between the client system and the wall jack

172
Q

A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through single Ethernet switch. No other users have reported problems connecting to the Sales server. Which of the following troubleshooting actions are you most likely to perform first?

A

replace the network card in the user’s computer

173
Q

Which of the following best describes the condition where a signal sent on one wire is received on another wire within the same connector?

A

NEXT

174
Q

Which of the following test can be performed by a TDR?

A

Identify the location of a fault on a cable

Measure the length of a cable

175
Q

Which TCP/IP utility gives you the following output?
Active Connections
Proto Local Address Foreign Address State
TCP me:epmap me:0 LISTENING
TCP me:microsoft-dsme:0 LISTENING
TCP me:1025 me:0 LISTENING
TCP me:1026 me:0 LISTENING

A

netstat -a

176
Q

Which TCP/IP utility gives you the following output?
Interface: 192.168.4.101 on Interface 0x3
Internet Address Physical Address Type
192.168.1.23 00-d1-b6-b7-c2-af dynamic

A

arp

177
Q

Examine the following output:
Active Connections
Proto Local Address Foreign Address State
TCP SERVER:1036 localhost:4832 TIME_WAIT

Which utility produced this output?

A

netstat

178
Q

You’re trying to access your office network with your Windows XP workstation from home using your organization’s virtual private network. Your modem has dialed and connected to your ISP, but you can’t connect to your office network. You issue the ipconfig command from the shell prompt and learn that your system has been assigned an IP address of 169.254.1.12. What’s causing the problem?

A

Your ISP’s DHCP server isn’t working properly

179
Q

You administer a network with Windows 2000 and UNIX servers, and Windows 2000 Professional, Windows 98, and Macintosh clients. A user of a Windows 98 computer calls you one day and says he is unable to access resources on the network. You type ipconfig on the user’s computer and receive the following output:
0 Ethernet adapter:
IP address…………..: 169.254.1.17
Subnet Mask………..: 255.255.0.0
Default Gateway…….:
You also check you NIC and see the link light is on. What might be the problem?

A

Unavailable DHCP server

180
Q

You are troubleshooting an IP addressing issue, and so issue a command to view the TCP/IP configuration of the system. The command you use produces the following output:

fxp0: flags=8843 mtu 1500

Which of the following operating systems are you working on?

A

Linux

181
Q

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following:

Subnet Mask……….255.255.0.0

What is the most likely cause of the problem?

A

Incorrect subnet mask

182
Q

You are troubleshooting a connectivity problem on a Linux server. You are able to connect to another system on the local network, but are not able to connect to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?

A

ifconfig

183
Q

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation cannot communicate with any other host on the network. You run ipconfig /all and see the following:

DHCP Enabled……………..No
IPv4 Address………………..192.168.2.10(Preferred)
Default Gateway…………….192.168.1.1
DNS Servers…………………192.168.2.20

A

Incorrect IP address

184
Q

Which TCP/IP utility gives you the following output?

Reply from 192.168.1.168: bytes=32 time<10ms TTL=128

A

ping

185
Q

Due to widespread network expansion, you have decided to upgrade the network by configuring a DHCP server for the network. The network uses Linux, Windows, and Mac OS X client systems. You configure the server to distribute address from 192.168.2.1 to address 192.168.2.100. You use the subnet mask of 255.255.255.0. After making all setting changes on the DHCP server, you reboot each client system but they are not able to obtain an IP address from the DHCP server. Which of the following would explain the failure?

A

The clients must first be configured to obtain IP addressing from a DHCP server

186
Q

you work in an office that uses Linux servers, NetWare servers, and Windows NT 4.0 servers. The network uses both the TCP/IP and IPX/SPX protocols. The Linux server is used as an FTP server. Today you have received several calls from people who are unable to contact the Linux server at its known IP address. You are sitting at the Linux server and want to check its IP address. Which command would you use?

A

ifconfig

187
Q

Your computer is sharing information with a remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection?

A

netstat

188
Q

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with other hosts You run ipconfig /all and see the following:
DHCP Enabled……………..No
IPv4 Address………………..192.168.1.102(Preferred)
Subnet Mask…………………255.255.255.0
Default Gateway…………….192.168.2.1
DNS Servers…………………192.168.2.20

A

Incorrect default gateway

189
Q

You administer a NetBios-based network that uses the TCP/IP protocol. You are trying to troubleshoot a computer that is unable to contact a server by its NetBIOS name. Which command can you use to check the connection?

A

nbtstat

190
Q

Which TCP/IP utility gives you the following output?
Internet Address Physical Address Type
192.168.1.102 00-60-08-bd-62-5a dynamic
192.168.1.168 00-06-5b-1c-48-76 dynamic

A

arp -a

191
Q

Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently?

A

arp

192
Q

You want to be able to view the DNS server address that a computer is using. Which of the following utilities would you use?

A

ifconfig, ipconfig

193
Q

Which command displays network activity statistics for TCP, UDP, and IP?

A

netstat -s

194
Q

Which TCP/IP utility gives you the following output?
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix.: testout.com
IP address………………………….: 192.168.1.111
Subnet Mask……………………….: 255.255.255.0
Default Gateway…………………..: 192.168.1.1

A

ipconfig

195
Q

While troubleshooting a problem on a Linux system, you run a utility that generates the following output:
5 s3232.gw.Seat.someisp.net (63.201.72.9) 38.433 ms 38.713 ms 39.085 ms
6 st11122.gar1.Seat.someisp.net (211.242.9.121) 38.620 ms 38.593 ms
Which utility is it?

A

traceroute

196
Q

Which TCP/IP utility gives you the following output?
Local Area Connection:
Node IpAddress: [192.168.1.111] Scope Id: []
NetBIOS Remote Cache Name Table

A

nbtstat -c

197
Q

Which TCP/IP utility gives you the following output?
Route Table
=================================
Interface List
0x1 …………………….MS TCP Loopback interface
0x2 …00 10 4b 73 0e 0e 3Com 3C90x Ethernet Ada
===================================
===================================
Active Routes:

A

netstat -r

198
Q

You have been called in to troubleshoot a connectivity problem on a newly installed Windows Server 2003 system. The system is operating satisfactorily and is able to communicate with other systems on the local network. However it is unable to access any systems on other segments of the corporate network. You suspect that the default gateway parameter for the system has not been configured, or may be configured incorrectly. Which of the following utilities are you most likely to use to view the default gateway information for the system?

A

ipconfig

199
Q

you work in an office that uses Linux servers, NetWare servers, and Windows NT 4.0 servers. The network uses both the TCP/IP and IPX/SPX protocols.You are sitting at a workstation that uses Windows 95 OSR2. An application you are using is unable to contact a Windows NT server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?

A

ping