ITProTV - NET+ 008 Practice Exam: Baseline #1 Flashcards
** Which WAN technology offers the highest potential bandwidth?
Frame Relay T3 E3 FDDI OC-3
OC-3
Explanation: SONET WAN Technologies - Frame Relay up to 1.544 Mbps - OC-1 speeds up to 51.84 Mbps - OC-3 speeds up to 155.52 Mbps - OC-12 speeds up to 622.08 Mbps - ATM speeds up to 622 Mbps
** While troubleshooting a network outage on a 10GBase-SW network, a technician finds a 500-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue?
bend radius exceeded
maximum cable length exceeded
dirty connectors
RF interference caused by impedance mismatch
maximum cable length exceeded
Explanation:
10GBase-SW max cable length is 300 meters.
Bend Radius Exceeded - could be the problem if the max cable length wasn’t exceeded already. Remember, fiber-optic cable has max distances depending on the type of cable used and thet ype of network being implemented.
attenuation/DB loss - is reduction in power of the light signal as it is transmitted.
SFP/GBIC cable mismatch - occurs when you use the wrong cable type.
Bad SFP/GBIC cable or transceiver - occurs when you need to replace the component that is bad.
Wavelength mismatch - multimode fiber is designed to operate at 850 and 1300 nm while singlemode fiber is optimized for 1310 and 1550nm. If the wrong wavelength is implemented or a device is added to the network that operates at the wrong wavelength, signal loss will occur.
Fiber type mismatch - if you seu different types of fiber cable on the same network, you will get DB loss.
Connector mismatch - using the wrong connectors on your network, devices will be unable to communicate.
** Your network uses a single switch that divides your network into 3 virtual LANs (VLANs). The devices in each VLAN are connected to a single port on the switch. You plan to implement a second switch on your Network. You need to ensure that the VLANs that were originally implemented are spread across both switches. What should you do?
create a subnet-based VLAN on both switches.
implement frame tagging on both switches.
create a protocol-based VLAN on both switches.
Create a port-based VLAN on both switches.
implement frame tagging on both switches
Explanation:
Frame Tagging is a technique that adds a small ehader to the frame as it is passed between devices in order to maintain the original VLAN broadcast domain. In normal Ethernet, there is NO Tagging. Tagging is implemented only when Trunking VLANs between devices is involved. If you have only one switch, untagged VLAN is just fine. If you have two or more switches and you want all the VLANs to talk with each other, they will need the same TAG.
Which one of these requires a user complete an action, such as digitally signing an AUP, prior to accessing the Network?
Captive Portal
Access Control List
MAC Filter
Port Security
Captive Portal
Explanation:
Captive Portals - are Web Pages, typically used in public Networks, where users must complete some action before they are granted access to the Network. Captive Portals are commonly seen in coffee shops, hotels, airports, and the user often has to accept an acceptable use policy (AUP) before they can connect to the internet.
Port Security - Allows a Network administrator to only allow a specific MAC Address (or group of MAC Addresses) on a Switch port.
MAC Filtering - Basically does the same thing as Port Security, but Port Filtering works on Switches where MAC Filtering works on Routers. Accomplished by granting or denying Network access to a list of MAC Addresses. The List of MAC Addresses for which you are either granting or denying access to is stored in an Access Control List (ACL)
ACLs - compare the entity that is requesting access to a Network resource against a list of valid entities. Access is granted or denied based on the access configured for that entity. Simply put, ACLs identify which users have access to a given object, such as a drive, a file, or a directory.
Your company has decided to implement an Acceptable Use Policy (AUP) that must be distributed to all users. You have been asked to write the preliminary policy to submit your management approval. What is defined in this policy?
which method administrators should use to back up Network data
how users are allowed to employ company hardware
the sensitivity of company data
which users require access to certain company data
how users are allowed to employ company hardware
Your company has a corporate-wide Windows Server network using the TCP/IP protocol. Several users are complaining that their computers are getting IP address conflics. Which action should you perform?
Implement a DHCP Server
Increase the TCP window size
Change the MAC Address for each Network interface card
Manually configure IP Addresses on each computer
Implement a DHCP server
One of your branch offices is located on two non-adjacent floors in an office building. You have been given permission to route a communications link between the two floors using existing conduit in the building’s elevator shaft. Your current cabling plan calls for TP wiring on each of the two floors, but the distance between them is more than 90 meters. You need to interconnect the two floors using fiber optic cable in the cheapest manner possible. Which of the following should you deploy between the wiring centers on each floor?
Media Converters Firewalls Modems Hubs Routers Switches
Media Converters
You support multiple wireless networks. You need to ensure that the protocols used offer the appropriate level of security. Match the descriptions on the left with the Wireless Encryption Protocols on the right?
Descriptions:
Uses a 256-bit Preshared Key
Requires RADIUS Server
Uses a 40-bit or 104-bit Key
Answers:
WEP
WPA/WPA2 Personal
WPA/WPA2 Enterprise
WEP = Uses a 40-bit or 104-bit Key
WPA/WPA2 Personal = Uses a 256-bit pre-shared Key
WPA/WPA2 Enterprise = Requires a RADIUS Server
You are designing a SOHO Network for your company. You want to use the Ethernet standard that supports a data transmission rate of 1 Gbps over copper cable. Which Ethernet standard should you use on the Network?
10Base-T
1000BaseCX
1000BaseSX
100Base-FX
1000BaseCX
You need to increase the arena that is covered by your Wireless Network to include another building. You decide to use a signal bounce. All of the following could help with this issue EXCEPT?
repeaters
encryption
reflectors
channel bonding
encryption
Management has stipulated that you must use unshielded twisted-pair category consists of four twisted pairs of copper wire that is certified for transmission rates up to 100 Mbps for the new guest network you are setting up. Which cabling category should you use?
CAT 2 CAT 1 CAT 4 CAT 5 CAT 3
CAT 5
Explanation: Transmission Rates CAT 1 = 4 Mbps, 2 Twisted Pairs CAT 2 = 4 Mbps CAT 3 = 10 Mbps CAT 4 = 16 Mbps CAT 5 = 100 Mbps CAT 5e = 1000 Mbps (1 Gbps) CAT 6 = 1000 Mbps CAT 6a = 10 Gbps CAT 7 = 10 Gbps CAT 8 = 40 Gbps
Protocols: POP3 HTTPS FTP IMAP RDP
Answers: Port 3389 Port 110 Port 21 Port 143 Port 443
POP3 = 110 HTTPS = 443 FTP = 21 IMAP = 143 RDP = 3389
To improve security, you change your Web server named Web1 to the HTTPS protocol. Shortly after implementing the change, users report that they cannot access any Web sites hosted on Web1 by using their fully qualified domain names (FQDN). However, they can access other websites that are hosted on other Web Servers by using their FQDN. What is causing the problem?
HTTPs is not a supported protocol.
The local area network (LAN) is down.
The DNS Server is down.
The new Web address starts with https instead of http.
The new Web address starts with https instead of http.
A Network admin use wants the Network can accept an MTU value above 1500. Which of the following should he configure?
UTM appliance
Jumbo Frame
Virtual Router
FCoE
Jumbo Frame
What is a physical barrier that acts as the first line of defense against an intruder?
a lock
a turnstile
an access control vestibule
a fence
a fence
You use HTTPS to secure your e-commerce website. You suspect an external breach has occurred. What should you do to enhance transaction security?
Hashing files
Generating new keys
Avoiding common passwords
disabling IP ports
Generating new keys
Your organization needs to perform a risk assessment for their ISP. Which specific type of assessment should you complete?
Vulnerability Assessment
Process Assessment
Vendor Assessment
Posture Assessment
Vendor Assessment
Which TCP Port is the Well-Known Port assigned to SSL?
119
80
443
20
443
Your company has implemented a Firewall that only examines the packet header information. Which type of Firewall is this an example of?
application-level proxy firewall
kernel proxy firewall
stateful firewall
packet-filtering firewall
packet-filtering firewall
You need to implement Spanning Tree Protocol (STP) to prevent Network Loops when more than one path can be used. Which two devices could you deploy? (Choose Two)
Switches
Routers
Bridges
Hubs
Switches
Bridges
Your company wants to use the Private Class B Network designation of 172.17.0.0/20. You have been asked to divide it up into six subnets. Two subnets should have 512 nodes and four more subnets have 256 nodes already established. While a total of 2,048 IP addresses are needed, the design should leave some room for growth in each subnet.
What is the correct way to subnet this network?
Allocate two networks with /22 masks, and the remaining four with /23 masks.
Allocate two networks with /20 masks, and the remaining four with /22 masks.
Allocate two networks with /21 masks, and the remaining four with /22 masks.
Allocate two networks with /24 masks, and the remaining four with /25 masks.
Allocate two networks with /23 masks, and the remaining four with /24 masks.
Allocate two networks with /22 masks, and the remaining four with /23 masks.
Which of these devices functions works at Layer 7?
VoIP Gateway
Content Filter
NGFW
VoIP PBX
NGFW (Next Generation Firewall)
Explanation:
Layer 7 = Application Layer
Which of the following would be used to help defend against a Man-in-the-Middle Attack?
Flood Guard
DHCP Snooping
Root Guard
BPDU Guard
DHCP Snooping
Your organization has implemented Kerberos 5 to authenticate its users. A member of management has asked you to explain ticket granting in Kerberos 5. You want to explain all the components of Kerberos to this member of management. Which entity is a ticket that is granted to a client after a client is Authenticated?
AS
KDC
TG S
TGT
TGT (Ticket-Granting Ticket)
Explanation:
AS = Authentication Server
KDC = Key Distribution Center
TGS = Ticket Granting Server
A company procedure calls for using the IPv4 and IPv6 Loopback addresses as part of the troubleshooting process. Which of the following explanations best represents the purpose of this tool?
To provide an IP address for testing the local IP stack through the Network interface.
To provide an IP address that is always available even in the absence of a Network.
To provide an IP address to check interface drivers and hardware.
To provide an IP address for testing the local IP stack without a physical Network connection.
To provide an IP address to determine minimum round-trip performance for packets.
To provide an IP address for testing the local IP stack without a physical Network connection.
You are using DSL to connect to the Internet. You recently setup Firewall software to protect your computer’s resources from external users. After setting up the Firewall software, you can no longer access Websites by name.
What is the problem?
You do not have a static IP address.
Your DHCP scope is exhausted.
You have a DHCP server on the Network.
Your firewall software is blocking port 53.
Your firewall software is blocking port 25.
Your firewall software is blocking port 53.
Explanation:
Port 53 is DNS (Domain Name System) which translates Frequently Qualified Domain Names (FQDN) to IP Addresses.
You administer your company’s 100Base-TX Ethernet Network. TCP/IP is the Networking protocol used on the Network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices?
Telnet
SMTP
SNMP
ARP
SNMP (Simple Network Management Protocol)
You need to assign a virtual IP address to an internet server. What are valid reasons for doing so? (Choose ALL that Apply)
To permit multiple servers to share the same address.
To prevent generic addresses for immediate access
To permit the same address to access multiple domain names
To permit a single network interface to service multiple incoming service requests
To eliminate host dependencies on specific, individual network interfaces
To permit multiple servers to share the same address
To permit the same address to access multiple domain names
To eliminate host dependencies on specific, individual network interfaces.
You manage a network for your organization. The network contains one DNS server and three routers. You are setting up a new DHCP server. You configure separate scopes for each subnet on your Network. The routers are configured to forward DHCP requests. You need to ensure that DHCP clients receive the appropriate settings using the least administrative effort. What else should you do? (Choose ALL that Apply)
Configure the DNS server as a scope option for each scope
Configure the DNS server as a server option
Configure each router as a scope option for its appropriate scope
Configure each router as a server option
Configure the DNS server as a server option
Configure each router as a scope option for its appropriate scope
You just installed a replacement switch that was moved from one part of the network to a new location. After all the patch cables are reconnected, some users cannot communicate via email. What is the most likely issue?
Network connection LED status indicators
VLAN mismatch
Bad Port
Attenuation
VLAN mismatch
Which wireless topology only requires one access point to be physically connected to the wired network, while still offering maximum flexibility and redundancy?
Bluetooth
Mesh
Ad Hoc
Infrastructure
Mesh
Which device or feature provides a bridge between the physical environment and the virtual environment?
Virtual router
Hypervisor
Virtual NIC
Virtual Firewall
Virtual NIC (Network Interface Card)
You have been called to troubleshoot a workstation problem in the oldest building on your company’s corporate campus. The network workstations in the building are unreliable. When the room lights are on, connectivity is lost, but when the room lights are off, the network is functional. Upon arrival, you quickly survey the work environment. You observe the following conditions:
- Lighting consists mainly of fluorescent lights.
- Temperature is 65 degrees Fahrenheit (18 degrees Celsius)
- Humidity is 75%
- Employees own space heaters, but they are not using them.
- Electrical outlets appear outdated.
What is most likely causing the loss of connectivity?
Fluorescent lighting in the room
Defective network hubs
low temperature
voltage fluctuation in the outlets
Fluorescent lighting in the room
Your company is located in Atlanta, GA. Management has decided to deploy multiple 802.11b WLANs. You are concerned that there are not enough non-overlapping channels to support the number of access points that you need to deploy. How many non-overlapping channels are supported in this deployment?
five
eleven
three
eight
three
Your company uses a single global IP address that maps to the company’s local IP addresses. When requests are sent from the internal network to destinations outside the company, those requests are mapped from the IP address of the local host that made the request to the global IP address.
What term describes this process?
Network Address Translation (NAT)
Network File System (NFS)
Network Access Point (NAP)
Network Access Server (NAS)
Network Address Translation (NAT)
A user reports that she cannot print from her computer. You also notice that they are unable to reach a suppliers web site. The operating system is Windows 8.1. Which command should you start with to help with your diagnosis?
route
ping
nmap
dig
ping
Which of these devices can perform router functions?
IDS
Proxy Server
Wireless Controller
Multi-Layer Switch
Multi-Layer Switch
You are a system admin. A user calls you complaining that every time she tries to log onto the network, she gets an error message. Other users are not having any problems. Which question is best to ask first when attempting to troubleshoot the problem?
Which error message do you receive?
Have you rebooted your computer?
How much memory is installed in your computer?
What is your username and password?
Which error message do you receive?
Users are unable to log in to the network. When you examine the authentication server, you see that CPU usage is almost 100%. What is most likely the issue?
expired IP address
incorrect gateway
unresponsive service
names not resolving
unresponsive service
You are the network admin for a healthcare organization. Recently several federal and state government laws have been enacted which will affect network operations. Which change management documentation should record this information?
baselines
regulations
policies
procedures
regulations
You are installing the wiring for a small office. You want to connect the fifty computers in the office to the Switch. The CAT6 cables that you plan to use have RJ-45 connectors on both ends. Which component should you use?
110 Block
demarcation extension
66 block
Patch panel
Patch panel
You need to deploy a fiber distribution panel for datacenter, remote office, or local area networking use. Which of the following features are NOT important for such uses? (Choose ALL that Apply)
Support for SFP+ Cable storage Cable termination Support for GBIC connectors bulkhead adapters and receptacles cable splices
Support for SFP+
Support for GBIC Connectors
Explanation:
Fiber distribution panel does not need support for SFP+ and for GBIC connectors.
GBIC connectors are used for end-point termination at a device interface of some kind. They are neither typically used nor necessary on a fiber distribution panel.
SFP+ stands for the enhanced, or plus, version of the Small Form-Factor (Hot) pluggable or (SFP) fiber optic connector. SFP+ connectors are used for endpoint connections and not in FDPs which do not need optical-to-digital or digital-to-optical conversion.
You administer a LAN. You want to encrypt TCP/IP communications on the LAN. The protocol that you use for encryption should be able to encrypt entire data packets, and the protocol should be able to operate in both tunnel mode and transport mode. Which protocol should you use to encrypt data on the Network?
Kerberos
IPX
L2TP
IPSec
IPSec (Internet Protocol Security)
You are a desktop admin for Nutex Corporation. Your org uses Ethernet cable to connect network resources. A user reports that he is unable to access network resources on his portable computer. The portable computer is connected to the company’s network using an Ethernet cable. When you test the cable using a time domain reflectometer (TDR) the signal returns too soon. What should you do?
reinstall the network adapter
re-route the network cable
replace the network adapter
replace the network cable
replace the network cable