ITProTV - NET+ 008 Practice Exam: Baseline #2 Flashcards
** You are implementing several Switches on your Network. The Network contains client computers that run both Internet Protocol (IP) and Internetwork Packet Exchange (IPX). To increase Network efficiency, you need to configure the Switches so that the two different types of traffic are isolated. Which type of Virtual Local Area Network (VLAN) should you implement?
subnet-based VLAN
protocol-based VLAN
frame-tagging VLAN
port-based VLAN
protocol-based VLAN
Explanation:
You should implement a Protocol-Based VLAN. This will allow you to isolate IP and IPX Traffic. With Protocol-Based VLANs, each VLAN is configured to support a single Protocol.
Port-Based VLAN - Each port on the Switch is assigned to a VLAN, devices attached to the Port automatically becomes members of that VLAN.
Subnet-Based VLAN - Each Subnet on your Network is assigned to a VLAN. Devices are part of a Subnet based on the Subnet to which the device’s IP Address belongs.
Frame-Tagging VLAN - is a type of Port-Based VLAN that uses frame tagging to allow VLANs to be spread across multiple Switches.
** You have been hired as a contractor to implement a Small Office Home Office (SOHO) Network for a small business. While gathering the requirements and constraints regarding the Network, you decide to implement two Subnets on the Network.
What are valid reasons for implementing Subnets on an IP Network? (Choose Two)
to configure a greater number of Hosts
to reduce congestion by decreasing Network traffic
to use more than one Server on each segment of an IP LAN.
to reduce congestion by increasing Network media bandwidth.
to increase Network Security
to reduce congestion by decreasing Network traffic.
to increase Network Security
Explanation: Subnets are used for the following reasons: to expand the Network to reduce congestion to reduce CPU use to isolate Network problems to improve Security to allow combinations of media, because each subnet can support a different medium.
** You are deploying a Virtual Private Network (VPN) for remote users. You want to meet the following goals:
- The VPN gateway should require the use of Internet Protocol Security (IPSec)
- All remote users must use IPSec to connect to the VPN Gateway.
- No internal Hosts should use IPSec.
Which IPSec Mode should you use?
host-to-host
gateway-to-gateway
This configuration is NOT possible.
host-to-gateway
host-to-gateway
Explanation:
Host-to-Gateway: requires the use of IPSec for all Remote Clients. The remote clients use IPSec to connect to the VPN gateway. Any communication between the VPN gateway and the internet hosts on behalf of the remote client does not use IPSec. Only the traffic over the Internet uses IPSec.
host-to-host: Each host must deploy IPSec. This mode would require that any internal hosts that communicate with the VPN clients would also need to deploy IPSec.
gateway-to-gateway: gateways at each end of the connection provide IPSec functionality. The individual host do not. For this reason, the VPN is transparent to the users. This deployment best works when a branch office or partner company needs access to your Network.
** You are setting up your company’s VoIP infrastructure. One remote office location has audio problems when placing or receiving calls. At times, speech quality is poor, or there is a noticeable and distinct echo for call audio. In troubleshooting a possible system configuration issue, which of the following possibilities do you want to eliminate first?
H.323 protocol support has not been selected
the call terminates on an analog endpoint.
Check to make sure system updates have been applied
Echo cancellation has been misconfigured or has not been applied.
Compression mode setting differs between caller and receiver devices
the call terminates on an analog endpoint
** You instruct a user to issue the ipconfig command with the /release and /renew options. In which two situations would it be appropriate to ask a user to do this? (Choose Two)
when the result of running the ipconfig /all command indicates a 169.254.163.6 address.
when no IP helper address has been configured on the Router between the Client and the DHCP Server.
when the no IP directed-broadcast command has been issued in the Router interface local to the client, and no IP Helper address has been configured on the Router between the client and the DHCP Server
when recent scope changes have been made on the DHCP Server
when the result of running the ipconfig /all command indicates a 169.254.163.6 address.
when recent scope changes have been made on the DHCP Server
** Your organization has several VLANs implemented on its Network. The VLANs operate across several Switches. What do all users on the VLAN have in common?
Collision Domain
TCP/IP Subnet
Cable Segment
Broadcast Domain
Broadcast Domain
Explanation:
VLANs place users from many locations into the same Broadcast Domain. A single VLAN can span multiple physical LAN segments, collision domains, and TCP/IP Segments. VLANs can be based on work function, common applications or protocols, departement, or other logical grouptings. VLAN assignment is configured at the Switch for each device that is connected to the Switch. VLANs enable many users at many locations to be in the same Broadcast Domain.
Routers define Broadcast Domains, and because Switches are Layer 2 Devices, they do not segment Broadcast Domains, instead they segment Collision Domains.
VLANs span multiple collision domains, subnets, and cable segments, so users would not have these aspects of the Network in common.
IEEE 802.1Q is the Networking standard that supports VLANs on an Ethernet Network.
Broadcast Domains can be created using Swtiches or Routers.
** Your company operates a fleet of panel trucks, each with a built-in cellular base station for voice and data communications. you are required to upgrade the wireless equipment used in 18 vehicles. You do not want to install obsolete equipment. Which of the following cellular technologies is most likely to be obsolete?
EDGE CDMA LTE TDMA GSM
TDMA
Explanation:
Time Division Multiple Access (TDMA) is obsolete. It is a multiplexing technique used to combine multiple signals in a single wireless ceullar channel. It is a 2G cellular technology that was largely decommissioned in 2007-2009.
Code-Division Multiple Access (CDMA) refers to a multiplexing technique used to combine multiple signals in a single wireless cellular channel. CDMA applies to both 2G and 3G cellular networks, and remains in wide use today as carries such as Spring, Virgin Mobile, and Verizon.
Enhanced Data Rates for GSM Evolution (EDGE) is 3 times faster than GSM, but based on GSM technologies. EDGE capabilities are roughly equivalent to those delivered on the original iPhone in late June 2007. Still in use today.
Global System for Mobile (GSM) communications is the worlds most widely used cellphone technology. Best choice for those who need to use their cellphones outside the USA.
Long Term Evolution (LTE) is an IP-based 4G Cellular technology that started rolling out in 2012.
** You need to implement a data center for your company. In this data center, you plan to implement inter-rack connections that are limited to 25 meters (82 Feet). Which Ethernet standard should you implement?
100Base-T4
1000Base-CX
1000Base-TX
100Base-FX
1000Base-CX
Explanation:
1000Base-CX is designed for wiring closets. It has transmission rate of 1000 Mbps and a max segment length of 25 meters (82 Feet)
100Base-FX is IEEE Standard for Fiber-Optic Fast Ethernet Network topology. Transmits 100 Mbps over a baseband connection, and uses Fiber-Optic cable as the transferring medium. It has a max segment distance of 2 km (1.24 Miles).
10BaseF is the 10 Mbps version of Ethernet over Fiber-Optic Cable.
100Base-T4 is one of the Fast Ethernet standards. It consists of 4 pairs of unshielded twisted pair CAT3, 4, or 5 Copper Wiring. It has a max segment length of 100 meters (328 feet) and a max transmission rate of 100 Mbps.
1000Base-TX is one of the Fast Ethernet topologies. Transmits 500 Mbps on each of 4 wire pairs. It requires more expensive CAT 6 copper cabling.
** You are documenting the Network Layout for your company. You have discovered a Firewall that has two Network interfaces. Which Firewall architecture have you discovered?
bastion host
screened host
dual-homed firewall
screened subnet
dual-home firewall
Explanation:
Dual-Homed Firewall has two Network interfaces. One interface connects to the Public Network, usually the Internet. The other interface connects to the Private Network. The forwarding and routing function should be disabled on the Firewall to ensure that Network segregation occurs.
Basion Host is a computer that resides on a Network that is Locked Down to provide max security.
Screened Host is a Firewall that resides between the Router that connects a Network to the Internet and the Private Network. The Router acts as a screening device, and the Fireawll is the Screen Host.
Screened Subnet is another term for a Demilitarized Zone (DMZ). Two Firewalls are used in this configuration: one Firewall resides between the Public Network and the DMZ, and the other resides between the DMZ and the Private Network.
** In PKI, what is the entity that signs a Certificate?
a principal
a subject
an issuer
a verifier
an issuer
Explanation:
Issuer = The entity that signs a Certificate.
Principle = Any entity that possesses a public key.
Verifier = An entity that verifies a public key chain.
Subject = An entity that seeks to have a Certificate validated.
** Which technology or device would be best suited for implementing short-ranged Fiber-Optics transmissions?
SFP+
DWDM
CWDM
QSFP
CWDM
Explanation:
CWDM = Course Wavelength Division Multiplexing is a WDM system and uses fewer than eight active wavelengths per fiber. This technology is designed for Short-Range communications, causing it to employ wide-range frequencies with wavelengths that are far apart. CWDM is compact and cost-effective option when spectral efficiency is not a requirement.
DWDM = Dense Wavelength Division Multiplexing enables long-range communications. Can fit up to 96 wavelengths into the C-band spectrum of Fiber cable, utilizing a tighter wavelength spacing to fit more channels onto a single fiber. More costly and more time-consuming to operate.
QSFP = Quad Small Form-Factor Pluggable and SFP+ (Enhanced Form-Factor Pluggable are transceivers used for both telecommunication and data communication applications, common 10-Gig Ethernet.
** Your company has decided to implement Unified Communication. You have been asked to implement a VoIP Network. You need to connect the VoIP Network to your company’s PBX. What should you implement?
UC Server DSCP Multicast QoS UC Gateway Unicast
UC Gateway
Explanation:
Unified Communcations include VoIP, Vide, Real-Time Services, Qualot of Service (QoS) and UC Devices.
UC Devices include UC Servers, UC Devices, and UC Gateways.
UC Servers are responsible for managing the UC Communications.
UC Devices help transport and monitor.
UC Gateways connect VoIP Networks to other types of Networks, such as PBX Networks.
** Your company consists of 75 employees. Your company has entered into a partnership with another company that is located across the country. Your company’s users must be able to connect to the partner’s Network quickly and reliably. Support for Voice, Data, and imaging transmissions and a dedicated 24-hour link are required. Your solution must be as inexpensive as possible whil eproviding enough bandwidth for your company’s employees - What should you implement?
POTS ISDN ATM FDDI T1
T1
Explanation:
T1 lines can provide fast, digital connections of up to 1.544 Mbps, transmitting voice, data, and video. T1 line also provides a dedicated connection, which means that it provides a 24-hour link. T1 line is more expensive than a dial-up connection using Plain Old Telephone Service (POTS) or an Integrated Services Digital Network (ISDN) connection, but this company needs enough bandwidth to accomodate its 75 users, which justifies the additional cost.
Asynchronous Transfer Mode (ATM) is a high-speed, cell-switching link type, very expensive to implement.
Fiber Distributed Data Interface (FDDI) is high-speed, Token Ring Network that uses Fiber-Optic cable transmitting up to 100 Mbps. It does offer speed, but it is limited to a ring distance of 100 km, or 62 miles.
Integrated Services Digital Network (ISDN) provides a direct, point-to-point digital connection at a speed of up to 2 Mbps. Usually , speeds of 128 Kbps are seen with ISDN. However, because it is a dial-up connection, it would not provide a dedicated 24-hour link.
** Management has decided to implement a diversity antenna system at its main headquarters. What is the advantage of using this system?
a diversity antenna system ads more bandwidth
a diversity antenna system avoids multipath distortion
a diversity antenna system increases the coverage area
a diversity antenna system increases the transmission power
a diversity antenna system avoids multipath distortion
** You asked to acquire address space for a new Network that must accomodate atleast 12 Subnets, each with atleast 2,048 nodes. A total of 25,576 IP Addresses are needed, but the available address space should leave some room for growth in each Subnet, and for the nubmer of Subnets to double (or more). The Network must also support IPsec to the endpoints for security reasons. Which of the following options provides the best fit while minimizing costs?
IPv6 Network with a /48 global routing prefix
IPv6 Network with a /56 global routing prefix
IPv6 Network with a /64 global routing prefix
Public IPv4 Class B Network, purchased on the open market.
Private IPv4 Class A Network (10.0.0.0)
IPv6 Network with a /56 global routing prefix.
Explanation:
IPv6 Network with a /56 global routing prefix should impose little or no cost to obtain. It also provides 256 Subnets, each with millions of nodes, and supports IPsec end-to-end. Thus, it provides the best fit while minimizing costs because it meets the starting requirements with ample room for growth.
Private IP Addresses do NOT support IPSec connections end-to-end. They require Network Address Translation (NAT) or some equivalent, and will not work with IPSec. Thus a Private IPv4 Class A address is not suitable.
If one could purchase a Public IPv4 Class B Network address on the OPen Market, it would cost atleast $300,000 if not double. A single Class B Address can only be subdivided into 14 Subnets, each one needs 2,048 nodes.
** You are deploying fiber optic links and connections on a local area network (LAN). You need to ensure proper and efficient data communications. Which of the following transceiver or fiber optics characteristics are essential? (Choose ALL that Apply)
full duplex simplex cables single-mode multimode half duplex duplex cables
full duplex
multimode
duplex cables
Explanation:
Multimode - makes use of thicker, graded light-conducting fibers that are cheaper to make and terminate. They are more limited in the distances such cables can span and are well-suited for LAN applications.
Full Duplex - means that both parties may transmit and receive simultaneously over a communication link. Because LAN applications require simultaneous, two-way communications, full duplex is needed.
Duplex Cables - incorperate two fibers, so that one may be used to send data for receipt by another part, while the other part may use the other fiber to send data for receipt by the first party. This supports simultaneous, two-way communications and makes it well suited for LAN applications.
** As part of monitoring Network Traffic, you need to determine the payload that is produced by using IPsec in tunnel mode with the AH protocol. Which of the following best describes this payload?
an encapsulated packet that is encrypted.
an unencapsulated packet that is encrypted.
an unencapsulated packet that is digitally signed.
an encapsulated packet that is digitally signed.
an encapsulated packet that is digitally signed.
Explanation:
IPsec (Internet Protocol Security) in tunnel mode with the Authentication Header (AH) protocol produces an encapsulated packet that is digitally signed. AH digitally signs a packet for authentication purposes. Tunnel mode encapsulates a packet with another packet. Encapsulating Security Protocol (ESP) encrypts IPsec packets. Transport Mode sends IPsec packets between two computers without encapsulating packets. AH and ESP work in transport mode and tunnel mode.
** If a routing table contained multiple routes for the same destination, which were inserted by the following methods, which route will the Router use to reach the desination Network?
The route inserted by BGP
The route inserted by RIP
The route configured as a static route.
The route inserted by OSPF.
The route configured as a static route.
Explanation:
A Static Route will be preferred because it has the Lowest Administrative Distance. Administrative Distance is a feature that is used to select the best path when two or more routes to the same destination exist. These multiple routes are the result of different protocols being available to be used.
The Default Administrative options offered are: RIP = 120 (Routing Information Protocol) OSPF = 110 (Open Shortest Path First) BGP = 20 (Border Gateway Protocol) Static = 1
** Management has requested that you document the minimum level of security for all network devices. Which of the following will this provide?
procedures
standards
guidelines
baselines
baselines
Explanation:
Baselines - define the minimum level of security and performance of a system in an organization. Baselines are also used to benchmark for future changes.
Guidelines - are the actions that are suggested when standards are not applicable in a particular situation.
Standards - are mandated rules that govern the acceptable level of security for hardware and software. Also include regulated behaviors of employees. Standards are enforceable and are the activities and actions that must be followed. Standards can be defined internally in an organization or externally as Regulations.
Procedures - are detailed instructions used to accomplish a task r oa goal. Procedures define how the security policy will be implemented in an organization through repeatable steps.
** Your company’s IT department needs to provide field engineers with a remote GUI-based access to their in-office desktop PCs over the Internet. Engineers could use Windows, Linux, iOS, and Android on their remote devices with a mix of macOS and Windows on the in-office desktops. Which of the following remote access tools offers the best no-cost option?
SSH Telnet RDC VNC ARD
Virtual Network Computing (VNC)
Explanation:
Key Words = GUI Based
VNC = Virtual Network Computing are widely and freely available for Windows, OS X, Linux, Android, iOS, and Chrome. They are easy to setup, and use, interoperate among multiple versions, and work well through corporate and personal firewalls. RDC = Microsoft's Remote Desktop Connection does not work on Linux. ARD = Apple Remote Desktop works best for Apple Environments, but does not work on Windows and other platforms well. And costs $80 per license. SSH/Telnet = Secure Shell and Telnet do not provide a GUI, they are command-line utilities.
** A suburban office location for your company is located next door to a regional airport, where a US government regional weather radar system is also housed. You are tasked with setting up a Wireless 802.11ac Network in that location. You must select a range of 80 MHz channels for the Network to use. Furthermore, some of the devices on that Network have 802.11n Wireless interfaces. Which of the following channels should you use on your Network? (Choose Two)
Channels 52 - 64 Channel 165 Channels 149 - 161 Channels 36 - 48 Channels 100 - 144
Channels 149 - 161
Channels 36 - 48
Explanation:
You should use channels 36 - 48 and 149 - 161 for indoor and outdoor WIFI use. All 802.11n and 802.11ac Client devices support use on these 2 bands.
Channels 52 - 64 was historically reserved by the FCC for government weather radar systems and DFS sensing is required for access points and client devices on this band.
Channels 100 - 144 also reserved for government weather radar systems.
Channel 165 is only 20 MHz wide and does not meet the channel width requirements.
** Your company is located in Charlott, North Carolina. Management has decided to deploy multiple 802.11a WLANs. Youa re concerned that there are not enough non-overlapping channels to support the number of access points that you need to deploy. How many non-overlapping channels are supported in this deployment?
twenty-three
eleven
four
three
twenty-three
Explanation:
- 11a = 23 non-overlapping
- 11b = 4 non-overlapping (1, 6, 11, 14)
- 11g = 4 non-overlapping (1, 5, 9, 13)
- 11g (US) = 3 non-verlapping (1, 6, 11)
** Your company has a main office and three branch offices throughout the United States. Management has decided to deploy a cloud solution that will allow all offices to connect to the same single-routed network and therby connect directly to the cloud. Which of the following is the BEST solution?
P2P
MPLS VPN
Site-to-Site VPN
Client-to-Site VPN
MPLS VPN
Explanation:
Multiprotocol Label Switching Layer 3 Virtual Private Network (VPN) - allows all offices to connect to the same singlerouted network and connect directly to the cloud.
** You have been given a drawing that shows the flow of communication in your Network, with symbols to indicate each piece of equipment’s function. Which configuration management documentation have you been given?
network baseline
logical network diagram
wiring schematic
physical network diagram
wiring schematic
Explanation:
Schematics include the flow of Network communication and symbols to indicate equipment function.
Wiring Diagram - emphasizes Network connections and uses horizontal and veritical lines to represent Network wires.
Logical DIagram - represents how the data will logically be transported through the Network.
Physical Diagram - represents the physical location of the network devices and how they are connected.
Network Baseline - not a diagram, but actually performance statistics gathered for comparative purposes.
** You have decided to implement ISAKMP. What is provided by this Technology?
a Citrix protocol used in application server environments.
a Protocol that works with IPsec to establish a Secure session.
a Protocol that encapsulates PPP within Ethernet Frames.
A Microsoft Protocol that establishes Sessions with other computers.
a Protocol that works with IPsec to establish a Secure session.
Explanation:
Internet Security Association and Key Management Protocol (ISAKMP) is a protocol that works with IPsec to establish a Secure session.
Remote Desktop Protocol (RDP) is a Microsoft Protocol that establishes sessions with other computers.
Point-to-Point Protocol (PPPoE) is a protocol that encapsulates PPP with Ethernet Frames.
Independent Computing Architecture (ICA) is a Citrixi Protocol used in application server environments.
- You need to determine the length of Network Cable. Which device should you use?
Hardware Loopback
TDR
Tone Generator
Crossover Cable
TDR (Time Domain Reflectometer)
Explanation:
TDR = Copper
OTDR = (Optical Time Domain Reflectometer) for Fiber
Hardware Loopback = Plug that connects the sending and receiving pins on a connector for troubleshooting purposes.
Tone Generator = with a Tone Locator to trace Network Cables. Also known as Fox and Hound.
Crossover Cable = To connect the sending pins in one device directly to the receiving pins in another device.
- What is the main purpose of a VPN concentrator?
to manage Internet requetss and cache Web content.
to provide dynamic IP addresses
to terminate the VPN tunnels
to resolve host names and IP addresses
to terminate the VPN tunnels
Explanation:
VPN Concentrator = to terminate the VPN Tunnels.
DNS Server = To resolve host names to IP Addresses.
DHCP Server = To provide dynamic IP Addresses
Proxy Server = To manage Internet requests and cache Web Content.
Split Tunnel = divides internet traffic and sends some of it through an encrypted VPN tunnel and routes the other data through a different tunnel separately on an open Network. The purpose is to allow a user to chose which applications will be secured and which can connect normally.
Full Tunnel = differs in that all information is sent through an encrypted tunnel while utilizing the VPN. Less Risky, but more Costly.
- You have decided to implement a Network Protocol analyzer on your company’s Network. Which job is NOT performed by this tool?
identify source and destination of communication
identify the types of traffic on the Network
detect active viruses or malware on the Network
provide Network activity statistics
detect active viruses or malware on the Network
Explanation:
Protocol Analyzers
- Provide Network activity statistics.
- Identify source and destination communication.
- Identify the types of traffic on the Network.
- Detect unusual level of traffic.
- Detect specific pattern characteristics.
- A Network contains 150 Windows Client computers that all receive their IP configuration from a DHCP Server. The Network is divided into two Subnets. The Network administrator decides to move a client computer from one Subnet to another. After moving the client, the computer is having trouble communicating on the Network. You suspect that the client computer is using an IP Address from the old Subnet. You need to run the appropriate commands to ensure that the client computer receives a new IP Address.
Select the appropriate commands (Listed) and place them in the appropriate order.
ONLY select the commands that are necessary for the scenario. The scenario may include one or more commands. Order is Important.
ipconfig /renew ipconfig /displaydns ipconfig registerdns ipconfig /all ipconfig /showclassid ipconfig /setclassid ipconfig /flushdns ipconfig /release
ipconfig /release
ipconfig /renew
Explanation: ipconfig /all = Displays all the TCP/IP settings for the computers. ipconfig /flushdns = Removes the contents of the computer's DNS cache. ipconfig /registerdns = Registers the computer's DNS Host Name with the DNS Server. ipconfig /displaydns = Displays the contents of the computer's DNS cache. ipconfig /showclassid = Displays the DHCP class ID assigned to the client computer. ipconfig /setclassid = Will configure the DHCP class ID for the client computer.
- You are examining the packets captured on your Network. You notice some communication between your Cisco Router and someone from outside your Network. The packets indicate that the communication is occurring over TCP Port 23. Which Protocol is being used?
FTP
SSH
Telnet
TFTP
Telnet
Explanation:
FTP = 20, 21 (File Transfer Protocol)
SSH, SFTP = 22 (Secure Shell, Secure File Transfer Protocol)
Telnet = 23
SMTP = 25 (Simple Mail Transfer Protocol)
DNS = 53 (Domain Name System)
DHCP = 67, 68 (Dynamic Host Configuration Protocol)
TFTP = 69 (Trivial File Transfer Protocol)
HTTP = 80 (Hyptertext Transfer Protocol)
POP3 = 110 (Post Office Protocol v3)
NTP = 123 (Network Time Protocol)
NetBIOS = 137, 139
IMAP = 143 (Internet Message Access Protocol)
SNMP = 161, 162 (Simple Network Management Protocol)
LDAP = 389 (Lightweight Directory Access Protocol)
HTTPS = 443 (Hyptertext Transfer Protocol Secure)
SMB = 445 (Server Message Block)
Syslog = 514
SMTP TLS = 587
LDAPS = 636
IMAP over SSL = 993
POP3 over SSL = 995
SQL Server = 1433 (Structured Query Language)
SQLnet = 1521
H.323 = 1720
MGCP = 2427, 2727 (Media Gateway Control Protocol)
MySQL = 3306
RDP = 3389 (Remote Desktop Protocol)
RTP = 5004, 5005 (Realtime Transport Protocol)
SIP = 5060, 5061 (Session Initiation Protocol)
- Your company has implemented a Firewall that only examines the packet header information. Of which type of Firewall is this an example?
packet-filtering Firewall
stateful Firewall
kernal proxy Firewall
application-level proxy Firewall
packet-filtering Firewall
Explanation:
Packet-Filtering Firewall only examines the Packet Header.
Stateful Firewall usually examines all layers of the Packet to compile all the information for the State Table.
Packet-Filtering Firewall are based on Access Control Lists (ACL) and only looks at the data packet to obtain the source and desination address and the protocol and port used.
- Which three options are considered to be characteristics of a client-server Network? (Choose Three)
a decentralized Network less expensive Network hardware more stable and secure connections every node in the Network can request and provide services lengthy access time for a service
less expensive Network hardware
more stable and secure connections
lengthy access time for a service
Explanation:
2 Main types of Networks for the Exam, Peer-to-Peer and Client-Server.
Peer-to-Peer are decentralized Networks in which nodes can request and provide services directly to each other. These Networks are fast, and easy to setup, but are often seen as more unstable, less secure, and expensive.
Client-Server Networks employ a single central server to which clients will request access so they can connect to the Web and use Applications, files, and other shared Resources. These Networks are more stable, cheaper, and secure; however they do take significatnly more time to access various Services than in a Peer-to-Peer Network.
- Your company has recently replaced ALL the Shielded Twisted Pair (STP) and Unshielded Twisted Pair (UTP) cable with Fiber Optic Cable. You need to purchase a device to determine the Length of Cables used on your Network. Which tool do you need?
OTDR
TDR
Toner Probe
Butt Set
OTDR (Optical Time Domain Reflectometer)
Explanation:
OTDR = Fiber
TDR = (Time Domain Reflectometer) for Copper
Butt Set = Used to test Telephone Lines.
Toner Probe = Used to identify a single cable on the Network, best tool to use to locate bad CAT5 Cable.
- Which technology provides centralized Remote user Authentication, Authorization, and Accounting?
RADIUS
VPN
Single Sign-On
DMZ
RADIUS (Remote Authentication Dial-In User Service)
Explanation:
VPN = (Virtual Private Network) allows users to access Private Network resources over a Public Network, such as the Internet. Tunneling techniques are used to protect the internal Resources (Full/Split Tunneling)
DMZ = (Demilitarized Zone) is an isolated Subnet on a Network that contains resources that are commonly accessed by public users, such as Internet users. Implemented with the use of Firewalls.
Single Sign-On = a feature whereby a user logs in once to access all Network resources.
- You need to implement Spanning Tree Protocol (STP) to prevent Network loops when more than one path can be used. Which two devices could you deploy? (Choose Two)
Routers
Switches
Hubs
Bridges
Switches
Bridges
- The Network you administer is a Fast Ethernet Network. Wall outlets are connected to patch panels by 90-meter cables. Patch panels are connected to switches by 5-meter Cables. The Network uses CAT5 Unshielded Twisted Pair (CAT5 UTP) Cable.
You use a 15-meter patch cable to connect a Server named Shipping to a Wall Outlet. You connect the Shipping computer to the Network, start the computer, and properly configure it. HOwever, clients cannot connect to the Shipping Server. Clients can connect to the other Servers on the Network. What will most likely solve the connection problem?
replacing the CAT5 UTP with CAT3 UTP
replacing the 15-meter patch cable with a 10-meter patch cable
replacing the 15-meter patch cable with a 3-meter patch cable
replacing the CAT5 UTP with CAT1 UTP
replacing the 15-meter patch cable with a 3-meter patch cable
Explanation:
The max length of cable between a computer and a Switch or Hub is 100 Meters.
In this scenario, the Total Length of cable between the Shipping Server and the Switch is 110 Meters.
- You are about to install several Wireless Access Points (WAP) in different areas of the building. You want max coverage, so you opt for the longer-range 2.4 GHz frequency. Which item below should most likely also be of concern?
Interference
Channel Overlap
Security Type Mismatch
Power Levels
Channel Overlap
Explanation:
Channel Overlap can cause Performance issues. Even though 11 channels are available in the US, there is a high degree of overlap. When using multiple Wireless Access Points (WAP) in 2.4 GHz mode, you should set the Wireless channels at 1, 6, and 11 to provide the best coverage and avoid overlaps.
Power Levels can affect Wireless Network performance. Power Levels should only be a concern if you need to adjust the signal strength to prevent the signal from extending outside of a certain boundary.
Interference in Wireless communications can originate from several sources. If there are too many devices operating at 2.4 GHz spectrum without proper channel separation, there could be interference. Common household items such as microwaves, cordless phones, and baby monitors can also be sources of interference. Because you are deploying multiple Wireless Access Points (WAP) in the same frequency, you are more likely to experience channel overlap than interference. Interference is a secondary concern.
Security Type Mismatch - To connect to a Wireless Network, the client device must be set to use the same security type as the Access Point. The Access Point Security type include open and WEP, WPA/TKIP, WPA/AES, and WPA2/AES. While you need to ensure that the Wireless Access Points and the devices using them implment the same Security Type, you are more likely to have channel issues in this scenario.
To improve Security, you change your Web Server named Web1 to the HTTPS Protocol. Shortly after implementing the change, users report that they cannot access any Web Sites hosted on Web1 by using their Fully Qualified Domain Names (FQDN). However, they can access other Web Sites that are hosted on other Web Servers by using their FQDN. What is causing this problem?
The new Web Address starts with https instead of http.
The Local Area Network (LAN) is Down.
The DNS Server is Down.
HTTPS is not a supported protocol.
The new Web Address starts with https instead of http.
You are implementing an 802.11g Wireless Network in your office. What is the max number of Wireless Access Points (WAP) that you can implement within 30 meters of each other?
Two
Five
Three
Four
Three
Explanation:
Wireless Access Points only have 3 non-overlapping channels (1, 6, and 11 in the US and 1, 6, and 13 in EU). Therefore, to prevent interference, you need to configure the 3 Wireless Access Points (WAP) with different channels.
You have a strong Wireless password policy, but users (including management) are complaining about it. Consequently, enforcement is difficult. You need a protocol solution that does NOT require digital certificates. Which of these choices would help you secure your Network?
EAP-TLS
EAP-FAST
PEAP
Geofencing
EAP-FAST
Explanation:
EAP-FAST = Extensible Authentication Protocol - Flexible Authentication via Secure Tunneling, developed by Cisco to assit with enforcing Strong Password policies, and it does not require digital certificates. EAP-FAST is the faster version of Protected EAP (PEAP).
PEAP first creates a Tunnel between the supplicant (client) and the Server, and then proceeds with the rest of the steps in the EAP process. PEAP requires Certificates.
EAP-TLS = Extensible Authentication Protocol - Transport Layer Security uses Public Key Infrastructure (PKI) Certificates to authenticate the supplicant (client) and the Server.
Geofencing allows an admin to geographically define the boundaries of Wireless Access.
A user notifies you regarding the features that are available with his computer’s Video Card. He says that the Video Card’s manufacturer has several new features for the Video Card that he is unable to locate or use. He needs access to these features. What should you do?
Check for Firmware updates.
Upgrade the Operating System
Check for Operating System Updates
Check for Driver Updates
Check for Driver Updates
A user is complaining about Wireless connectivity. Their cubical is on a concrete wall, and the Wireless Access Point (WAP) is mounted on the other side of the wall. What describes what is happening to the Wireless signal that only has to travel a few inches?
absorption
attenuation
frequency mismatch
refraction
absorption
Explanation:
Abosrption = Occurs when an object does not reflect or retract a Wireless signal, but rather absorbs a portion of it. Drywall has relatively low absorption rate, while concrete has a relatively high absorption rate.
Refraction = “bends” the signal as it passes through, or the signal curves as it tries to go around the object.
Frequency Mismatch = occurs when one device is operating at 2.4 GHz and another is operating at 5 GHz, causing communication to drop.
Attenuation = is the degredation of a signal, typically occuring over distance.
While working as an IT Tech, you receive multiple complaints of Network outages occurring. After investigating, you conclude that there are incomplete files resulting in mismatching data values. What type of interference error has occured here?
a runt error
a giant error
a CRC error
an encapsulation error
a CRC error
Explanation:
CRC = Cyclic Redundancy Check occurs when a damaged or incomplete file causes the Checksum value to not match the CRC value. These errors occur often when compressed files are archives are extraced but can also occur when reading and writing to local or external hard disks or other external media.
Giants occur when a packet is too large to traverse a Network.
Runt is the exact opposite, and indicates a packet is too small to send.
Encapsulation is the process of hiding the values or stats of data packets to prevent unauthorized parties from being able to view or modify the hidden data.
A user is experiencing Network connectivity issues after a faulty NIC was replaced. You want the user to have excellent throughput, so you configure the NIC for Full-Duplex (Auto Configuration OFF). The corresponding Switch port is configured as Auto-Config, so you should be OK, but the throughput is lower than expected. What is the issue?
Duplex/Speed mismatch
Bottlenecks
Incorrect pin-out
TX/RX Reverse
Duplex/Speed mismatch