It4 Flashcards
Which network protocol is used to automatically assign an IP address to a computer on a network?
DHCP
After having talked to the customer, a network technician suspects that an invalid IP address is the most likely cause of a network issue. Which step of the troubleshooting process does this represent?
Establish a theory of probable cause
A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off. What is the most likely cause of this problem?
The network cable is faulty.
The current IP configuration of a small company is done manually and is time-consuming. Because of increased network growth, a technician needs a simpler way for IP configuration of workstations. Which service would simplify the workstation IP configuration task?
DHCP
Which filtering method uses the physical address to specify exactly which device is allowed or blocked from sending data on a network?
MAC address filtering
Which IPv6 address represents the most compressed form of the IPv6 address 2001:0db8:cafe:0000:0835:0000:0000:0aa0/80?
2001:db8:cafe:0:835::aa0/80
A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?
to avoid interference from nearby wireless devices
Multiple users report that the workstations are assigned a 169.254.x.x IP address. The users are able to communicate only between each other. What is a possible solution?
Restart the DHCP server.
Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)
The wireless signal is too weak.
There is interference from outside sources.
Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.
Which type of network requires an active, powered TAP (test access point) to capture network traffic?
gigabit Ethernet
device has been assigned the IPv6 address of 2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the host identifier of the device?
1000:00d8:0058:00ab
Which is an obsolete and insecure Windows network protocol only required on operating systems earlier than Windows 2000?
NetBIOS
A wired network is undergoing several changes that could leave it vulnerable to connection by unauthorized devices while the work is in progress. Which two temporary measures would enable the authorized devices to continue to have network access but prevent unauthorized devices from connecting? (Choose two.)
Disable DHCP.
Assign static IP addresses to the authorized devices.
What security technique could provide secure access to a server located in a small office without the expense of implementing a DMZ or purchasing a hardware firewall?
implement port forwarding