ITProTV - NET+ 008 Practice Exam: Baseline #1 Flashcards
** Which WAN technology offers the highest potential bandwidth?
Frame Relay T3 E3 FDDI OC-3
OC-3
Explanation: SONET WAN Technologies - Frame Relay up to 1.544 Mbps - OC-1 speeds up to 51.84 Mbps - OC-3 speeds up to 155.52 Mbps - OC-12 speeds up to 622.08 Mbps - ATM speeds up to 622 Mbps
** While troubleshooting a network outage on a 10GBase-SW network, a technician finds a 500-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue?
bend radius exceeded
maximum cable length exceeded
dirty connectors
RF interference caused by impedance mismatch
maximum cable length exceeded
Explanation:
10GBase-SW max cable length is 300 meters.
Bend Radius Exceeded - could be the problem if the max cable length wasn’t exceeded already. Remember, fiber-optic cable has max distances depending on the type of cable used and thet ype of network being implemented.
attenuation/DB loss - is reduction in power of the light signal as it is transmitted.
SFP/GBIC cable mismatch - occurs when you use the wrong cable type.
Bad SFP/GBIC cable or transceiver - occurs when you need to replace the component that is bad.
Wavelength mismatch - multimode fiber is designed to operate at 850 and 1300 nm while singlemode fiber is optimized for 1310 and 1550nm. If the wrong wavelength is implemented or a device is added to the network that operates at the wrong wavelength, signal loss will occur.
Fiber type mismatch - if you seu different types of fiber cable on the same network, you will get DB loss.
Connector mismatch - using the wrong connectors on your network, devices will be unable to communicate.
** Your network uses a single switch that divides your network into 3 virtual LANs (VLANs). The devices in each VLAN are connected to a single port on the switch. You plan to implement a second switch on your Network. You need to ensure that the VLANs that were originally implemented are spread across both switches. What should you do?
create a subnet-based VLAN on both switches.
implement frame tagging on both switches.
create a protocol-based VLAN on both switches.
Create a port-based VLAN on both switches.
implement frame tagging on both switches
Explanation:
Frame Tagging is a technique that adds a small ehader to the frame as it is passed between devices in order to maintain the original VLAN broadcast domain. In normal Ethernet, there is NO Tagging. Tagging is implemented only when Trunking VLANs between devices is involved. If you have only one switch, untagged VLAN is just fine. If you have two or more switches and you want all the VLANs to talk with each other, they will need the same TAG.
Which one of these requires a user complete an action, such as digitally signing an AUP, prior to accessing the Network?
Captive Portal
Access Control List
MAC Filter
Port Security
Captive Portal
Explanation:
Captive Portals - are Web Pages, typically used in public Networks, where users must complete some action before they are granted access to the Network. Captive Portals are commonly seen in coffee shops, hotels, airports, and the user often has to accept an acceptable use policy (AUP) before they can connect to the internet.
Port Security - Allows a Network administrator to only allow a specific MAC Address (or group of MAC Addresses) on a Switch port.
MAC Filtering - Basically does the same thing as Port Security, but Port Filtering works on Switches where MAC Filtering works on Routers. Accomplished by granting or denying Network access to a list of MAC Addresses. The List of MAC Addresses for which you are either granting or denying access to is stored in an Access Control List (ACL)
ACLs - compare the entity that is requesting access to a Network resource against a list of valid entities. Access is granted or denied based on the access configured for that entity. Simply put, ACLs identify which users have access to a given object, such as a drive, a file, or a directory.
Your company has decided to implement an Acceptable Use Policy (AUP) that must be distributed to all users. You have been asked to write the preliminary policy to submit your management approval. What is defined in this policy?
which method administrators should use to back up Network data
how users are allowed to employ company hardware
the sensitivity of company data
which users require access to certain company data
how users are allowed to employ company hardware
Your company has a corporate-wide Windows Server network using the TCP/IP protocol. Several users are complaining that their computers are getting IP address conflics. Which action should you perform?
Implement a DHCP Server
Increase the TCP window size
Change the MAC Address for each Network interface card
Manually configure IP Addresses on each computer
Implement a DHCP server
One of your branch offices is located on two non-adjacent floors in an office building. You have been given permission to route a communications link between the two floors using existing conduit in the building’s elevator shaft. Your current cabling plan calls for TP wiring on each of the two floors, but the distance between them is more than 90 meters. You need to interconnect the two floors using fiber optic cable in the cheapest manner possible. Which of the following should you deploy between the wiring centers on each floor?
Media Converters Firewalls Modems Hubs Routers Switches
Media Converters
You support multiple wireless networks. You need to ensure that the protocols used offer the appropriate level of security. Match the descriptions on the left with the Wireless Encryption Protocols on the right?
Descriptions:
Uses a 256-bit Preshared Key
Requires RADIUS Server
Uses a 40-bit or 104-bit Key
Answers:
WEP
WPA/WPA2 Personal
WPA/WPA2 Enterprise
WEP = Uses a 40-bit or 104-bit Key
WPA/WPA2 Personal = Uses a 256-bit pre-shared Key
WPA/WPA2 Enterprise = Requires a RADIUS Server
You are designing a SOHO Network for your company. You want to use the Ethernet standard that supports a data transmission rate of 1 Gbps over copper cable. Which Ethernet standard should you use on the Network?
10Base-T
1000BaseCX
1000BaseSX
100Base-FX
1000BaseCX
You need to increase the arena that is covered by your Wireless Network to include another building. You decide to use a signal bounce. All of the following could help with this issue EXCEPT?
repeaters
encryption
reflectors
channel bonding
encryption
Management has stipulated that you must use unshielded twisted-pair category consists of four twisted pairs of copper wire that is certified for transmission rates up to 100 Mbps for the new guest network you are setting up. Which cabling category should you use?
CAT 2 CAT 1 CAT 4 CAT 5 CAT 3
CAT 5
Explanation: Transmission Rates CAT 1 = 4 Mbps, 2 Twisted Pairs CAT 2 = 4 Mbps CAT 3 = 10 Mbps CAT 4 = 16 Mbps CAT 5 = 100 Mbps CAT 5e = 1000 Mbps (1 Gbps) CAT 6 = 1000 Mbps CAT 6a = 10 Gbps CAT 7 = 10 Gbps CAT 8 = 40 Gbps
Protocols: POP3 HTTPS FTP IMAP RDP
Answers: Port 3389 Port 110 Port 21 Port 143 Port 443
POP3 = 110 HTTPS = 443 FTP = 21 IMAP = 143 RDP = 3389
To improve security, you change your Web server named Web1 to the HTTPS protocol. Shortly after implementing the change, users report that they cannot access any Web sites hosted on Web1 by using their fully qualified domain names (FQDN). However, they can access other websites that are hosted on other Web Servers by using their FQDN. What is causing the problem?
HTTPs is not a supported protocol.
The local area network (LAN) is down.
The DNS Server is down.
The new Web address starts with https instead of http.
The new Web address starts with https instead of http.
A Network admin use wants the Network can accept an MTU value above 1500. Which of the following should he configure?
UTM appliance
Jumbo Frame
Virtual Router
FCoE
Jumbo Frame
What is a physical barrier that acts as the first line of defense against an intruder?
a lock
a turnstile
an access control vestibule
a fence
a fence
You use HTTPS to secure your e-commerce website. You suspect an external breach has occurred. What should you do to enhance transaction security?
Hashing files
Generating new keys
Avoiding common passwords
disabling IP ports
Generating new keys
Your organization needs to perform a risk assessment for their ISP. Which specific type of assessment should you complete?
Vulnerability Assessment
Process Assessment
Vendor Assessment
Posture Assessment
Vendor Assessment
Which TCP Port is the Well-Known Port assigned to SSL?
119
80
443
20
443
Your company has implemented a Firewall that only examines the packet header information. Which type of Firewall is this an example of?
application-level proxy firewall
kernel proxy firewall
stateful firewall
packet-filtering firewall
packet-filtering firewall
You need to implement Spanning Tree Protocol (STP) to prevent Network Loops when more than one path can be used. Which two devices could you deploy? (Choose Two)
Switches
Routers
Bridges
Hubs
Switches
Bridges
Your company wants to use the Private Class B Network designation of 172.17.0.0/20. You have been asked to divide it up into six subnets. Two subnets should have 512 nodes and four more subnets have 256 nodes already established. While a total of 2,048 IP addresses are needed, the design should leave some room for growth in each subnet.
What is the correct way to subnet this network?
Allocate two networks with /22 masks, and the remaining four with /23 masks.
Allocate two networks with /20 masks, and the remaining four with /22 masks.
Allocate two networks with /21 masks, and the remaining four with /22 masks.
Allocate two networks with /24 masks, and the remaining four with /25 masks.
Allocate two networks with /23 masks, and the remaining four with /24 masks.
Allocate two networks with /22 masks, and the remaining four with /23 masks.
Which of these devices functions works at Layer 7?
VoIP Gateway
Content Filter
NGFW
VoIP PBX
NGFW (Next Generation Firewall)
Explanation:
Layer 7 = Application Layer
Which of the following would be used to help defend against a Man-in-the-Middle Attack?
Flood Guard
DHCP Snooping
Root Guard
BPDU Guard
DHCP Snooping
Your organization has implemented Kerberos 5 to authenticate its users. A member of management has asked you to explain ticket granting in Kerberos 5. You want to explain all the components of Kerberos to this member of management. Which entity is a ticket that is granted to a client after a client is Authenticated?
AS
KDC
TG S
TGT
TGT (Ticket-Granting Ticket)
Explanation:
AS = Authentication Server
KDC = Key Distribution Center
TGS = Ticket Granting Server