ITProTV - NET+ 008 Practice Exam: Baseline #2 Flashcards
** You are implementing several Switches on your Network. The Network contains client computers that run both Internet Protocol (IP) and Internetwork Packet Exchange (IPX). To increase Network efficiency, you need to configure the Switches so that the two different types of traffic are isolated. Which type of Virtual Local Area Network (VLAN) should you implement?
subnet-based VLAN
protocol-based VLAN
frame-tagging VLAN
port-based VLAN
protocol-based VLAN
Explanation:
You should implement a Protocol-Based VLAN. This will allow you to isolate IP and IPX Traffic. With Protocol-Based VLANs, each VLAN is configured to support a single Protocol.
Port-Based VLAN - Each port on the Switch is assigned to a VLAN, devices attached to the Port automatically becomes members of that VLAN.
Subnet-Based VLAN - Each Subnet on your Network is assigned to a VLAN. Devices are part of a Subnet based on the Subnet to which the device’s IP Address belongs.
Frame-Tagging VLAN - is a type of Port-Based VLAN that uses frame tagging to allow VLANs to be spread across multiple Switches.
** You have been hired as a contractor to implement a Small Office Home Office (SOHO) Network for a small business. While gathering the requirements and constraints regarding the Network, you decide to implement two Subnets on the Network.
What are valid reasons for implementing Subnets on an IP Network? (Choose Two)
to configure a greater number of Hosts
to reduce congestion by decreasing Network traffic
to use more than one Server on each segment of an IP LAN.
to reduce congestion by increasing Network media bandwidth.
to increase Network Security
to reduce congestion by decreasing Network traffic.
to increase Network Security
Explanation: Subnets are used for the following reasons: to expand the Network to reduce congestion to reduce CPU use to isolate Network problems to improve Security to allow combinations of media, because each subnet can support a different medium.
** You are deploying a Virtual Private Network (VPN) for remote users. You want to meet the following goals:
- The VPN gateway should require the use of Internet Protocol Security (IPSec)
- All remote users must use IPSec to connect to the VPN Gateway.
- No internal Hosts should use IPSec.
Which IPSec Mode should you use?
host-to-host
gateway-to-gateway
This configuration is NOT possible.
host-to-gateway
host-to-gateway
Explanation:
Host-to-Gateway: requires the use of IPSec for all Remote Clients. The remote clients use IPSec to connect to the VPN gateway. Any communication between the VPN gateway and the internet hosts on behalf of the remote client does not use IPSec. Only the traffic over the Internet uses IPSec.
host-to-host: Each host must deploy IPSec. This mode would require that any internal hosts that communicate with the VPN clients would also need to deploy IPSec.
gateway-to-gateway: gateways at each end of the connection provide IPSec functionality. The individual host do not. For this reason, the VPN is transparent to the users. This deployment best works when a branch office or partner company needs access to your Network.
** You are setting up your company’s VoIP infrastructure. One remote office location has audio problems when placing or receiving calls. At times, speech quality is poor, or there is a noticeable and distinct echo for call audio. In troubleshooting a possible system configuration issue, which of the following possibilities do you want to eliminate first?
H.323 protocol support has not been selected
the call terminates on an analog endpoint.
Check to make sure system updates have been applied
Echo cancellation has been misconfigured or has not been applied.
Compression mode setting differs between caller and receiver devices
the call terminates on an analog endpoint
** You instruct a user to issue the ipconfig command with the /release and /renew options. In which two situations would it be appropriate to ask a user to do this? (Choose Two)
when the result of running the ipconfig /all command indicates a 169.254.163.6 address.
when no IP helper address has been configured on the Router between the Client and the DHCP Server.
when the no IP directed-broadcast command has been issued in the Router interface local to the client, and no IP Helper address has been configured on the Router between the client and the DHCP Server
when recent scope changes have been made on the DHCP Server
when the result of running the ipconfig /all command indicates a 169.254.163.6 address.
when recent scope changes have been made on the DHCP Server
** Your organization has several VLANs implemented on its Network. The VLANs operate across several Switches. What do all users on the VLAN have in common?
Collision Domain
TCP/IP Subnet
Cable Segment
Broadcast Domain
Broadcast Domain
Explanation:
VLANs place users from many locations into the same Broadcast Domain. A single VLAN can span multiple physical LAN segments, collision domains, and TCP/IP Segments. VLANs can be based on work function, common applications or protocols, departement, or other logical grouptings. VLAN assignment is configured at the Switch for each device that is connected to the Switch. VLANs enable many users at many locations to be in the same Broadcast Domain.
Routers define Broadcast Domains, and because Switches are Layer 2 Devices, they do not segment Broadcast Domains, instead they segment Collision Domains.
VLANs span multiple collision domains, subnets, and cable segments, so users would not have these aspects of the Network in common.
IEEE 802.1Q is the Networking standard that supports VLANs on an Ethernet Network.
Broadcast Domains can be created using Swtiches or Routers.
** Your company operates a fleet of panel trucks, each with a built-in cellular base station for voice and data communications. you are required to upgrade the wireless equipment used in 18 vehicles. You do not want to install obsolete equipment. Which of the following cellular technologies is most likely to be obsolete?
EDGE CDMA LTE TDMA GSM
TDMA
Explanation:
Time Division Multiple Access (TDMA) is obsolete. It is a multiplexing technique used to combine multiple signals in a single wireless ceullar channel. It is a 2G cellular technology that was largely decommissioned in 2007-2009.
Code-Division Multiple Access (CDMA) refers to a multiplexing technique used to combine multiple signals in a single wireless cellular channel. CDMA applies to both 2G and 3G cellular networks, and remains in wide use today as carries such as Spring, Virgin Mobile, and Verizon.
Enhanced Data Rates for GSM Evolution (EDGE) is 3 times faster than GSM, but based on GSM technologies. EDGE capabilities are roughly equivalent to those delivered on the original iPhone in late June 2007. Still in use today.
Global System for Mobile (GSM) communications is the worlds most widely used cellphone technology. Best choice for those who need to use their cellphones outside the USA.
Long Term Evolution (LTE) is an IP-based 4G Cellular technology that started rolling out in 2012.
** You need to implement a data center for your company. In this data center, you plan to implement inter-rack connections that are limited to 25 meters (82 Feet). Which Ethernet standard should you implement?
100Base-T4
1000Base-CX
1000Base-TX
100Base-FX
1000Base-CX
Explanation:
1000Base-CX is designed for wiring closets. It has transmission rate of 1000 Mbps and a max segment length of 25 meters (82 Feet)
100Base-FX is IEEE Standard for Fiber-Optic Fast Ethernet Network topology. Transmits 100 Mbps over a baseband connection, and uses Fiber-Optic cable as the transferring medium. It has a max segment distance of 2 km (1.24 Miles).
10BaseF is the 10 Mbps version of Ethernet over Fiber-Optic Cable.
100Base-T4 is one of the Fast Ethernet standards. It consists of 4 pairs of unshielded twisted pair CAT3, 4, or 5 Copper Wiring. It has a max segment length of 100 meters (328 feet) and a max transmission rate of 100 Mbps.
1000Base-TX is one of the Fast Ethernet topologies. Transmits 500 Mbps on each of 4 wire pairs. It requires more expensive CAT 6 copper cabling.
** You are documenting the Network Layout for your company. You have discovered a Firewall that has two Network interfaces. Which Firewall architecture have you discovered?
bastion host
screened host
dual-homed firewall
screened subnet
dual-home firewall
Explanation:
Dual-Homed Firewall has two Network interfaces. One interface connects to the Public Network, usually the Internet. The other interface connects to the Private Network. The forwarding and routing function should be disabled on the Firewall to ensure that Network segregation occurs.
Basion Host is a computer that resides on a Network that is Locked Down to provide max security.
Screened Host is a Firewall that resides between the Router that connects a Network to the Internet and the Private Network. The Router acts as a screening device, and the Fireawll is the Screen Host.
Screened Subnet is another term for a Demilitarized Zone (DMZ). Two Firewalls are used in this configuration: one Firewall resides between the Public Network and the DMZ, and the other resides between the DMZ and the Private Network.
** In PKI, what is the entity that signs a Certificate?
a principal
a subject
an issuer
a verifier
an issuer
Explanation:
Issuer = The entity that signs a Certificate.
Principle = Any entity that possesses a public key.
Verifier = An entity that verifies a public key chain.
Subject = An entity that seeks to have a Certificate validated.
** Which technology or device would be best suited for implementing short-ranged Fiber-Optics transmissions?
SFP+
DWDM
CWDM
QSFP
CWDM
Explanation:
CWDM = Course Wavelength Division Multiplexing is a WDM system and uses fewer than eight active wavelengths per fiber. This technology is designed for Short-Range communications, causing it to employ wide-range frequencies with wavelengths that are far apart. CWDM is compact and cost-effective option when spectral efficiency is not a requirement.
DWDM = Dense Wavelength Division Multiplexing enables long-range communications. Can fit up to 96 wavelengths into the C-band spectrum of Fiber cable, utilizing a tighter wavelength spacing to fit more channels onto a single fiber. More costly and more time-consuming to operate.
QSFP = Quad Small Form-Factor Pluggable and SFP+ (Enhanced Form-Factor Pluggable are transceivers used for both telecommunication and data communication applications, common 10-Gig Ethernet.
** Your company has decided to implement Unified Communication. You have been asked to implement a VoIP Network. You need to connect the VoIP Network to your company’s PBX. What should you implement?
UC Server DSCP Multicast QoS UC Gateway Unicast
UC Gateway
Explanation:
Unified Communcations include VoIP, Vide, Real-Time Services, Qualot of Service (QoS) and UC Devices.
UC Devices include UC Servers, UC Devices, and UC Gateways.
UC Servers are responsible for managing the UC Communications.
UC Devices help transport and monitor.
UC Gateways connect VoIP Networks to other types of Networks, such as PBX Networks.
** Your company consists of 75 employees. Your company has entered into a partnership with another company that is located across the country. Your company’s users must be able to connect to the partner’s Network quickly and reliably. Support for Voice, Data, and imaging transmissions and a dedicated 24-hour link are required. Your solution must be as inexpensive as possible whil eproviding enough bandwidth for your company’s employees - What should you implement?
POTS ISDN ATM FDDI T1
T1
Explanation:
T1 lines can provide fast, digital connections of up to 1.544 Mbps, transmitting voice, data, and video. T1 line also provides a dedicated connection, which means that it provides a 24-hour link. T1 line is more expensive than a dial-up connection using Plain Old Telephone Service (POTS) or an Integrated Services Digital Network (ISDN) connection, but this company needs enough bandwidth to accomodate its 75 users, which justifies the additional cost.
Asynchronous Transfer Mode (ATM) is a high-speed, cell-switching link type, very expensive to implement.
Fiber Distributed Data Interface (FDDI) is high-speed, Token Ring Network that uses Fiber-Optic cable transmitting up to 100 Mbps. It does offer speed, but it is limited to a ring distance of 100 km, or 62 miles.
Integrated Services Digital Network (ISDN) provides a direct, point-to-point digital connection at a speed of up to 2 Mbps. Usually , speeds of 128 Kbps are seen with ISDN. However, because it is a dial-up connection, it would not provide a dedicated 24-hour link.
** Management has decided to implement a diversity antenna system at its main headquarters. What is the advantage of using this system?
a diversity antenna system ads more bandwidth
a diversity antenna system avoids multipath distortion
a diversity antenna system increases the coverage area
a diversity antenna system increases the transmission power
a diversity antenna system avoids multipath distortion
** You asked to acquire address space for a new Network that must accomodate atleast 12 Subnets, each with atleast 2,048 nodes. A total of 25,576 IP Addresses are needed, but the available address space should leave some room for growth in each Subnet, and for the nubmer of Subnets to double (or more). The Network must also support IPsec to the endpoints for security reasons. Which of the following options provides the best fit while minimizing costs?
IPv6 Network with a /48 global routing prefix
IPv6 Network with a /56 global routing prefix
IPv6 Network with a /64 global routing prefix
Public IPv4 Class B Network, purchased on the open market.
Private IPv4 Class A Network (10.0.0.0)
IPv6 Network with a /56 global routing prefix.
Explanation:
IPv6 Network with a /56 global routing prefix should impose little or no cost to obtain. It also provides 256 Subnets, each with millions of nodes, and supports IPsec end-to-end. Thus, it provides the best fit while minimizing costs because it meets the starting requirements with ample room for growth.
Private IP Addresses do NOT support IPSec connections end-to-end. They require Network Address Translation (NAT) or some equivalent, and will not work with IPSec. Thus a Private IPv4 Class A address is not suitable.
If one could purchase a Public IPv4 Class B Network address on the OPen Market, it would cost atleast $300,000 if not double. A single Class B Address can only be subdivided into 14 Subnets, each one needs 2,048 nodes.
** You are deploying fiber optic links and connections on a local area network (LAN). You need to ensure proper and efficient data communications. Which of the following transceiver or fiber optics characteristics are essential? (Choose ALL that Apply)
full duplex simplex cables single-mode multimode half duplex duplex cables
full duplex
multimode
duplex cables
Explanation:
Multimode - makes use of thicker, graded light-conducting fibers that are cheaper to make and terminate. They are more limited in the distances such cables can span and are well-suited for LAN applications.
Full Duplex - means that both parties may transmit and receive simultaneously over a communication link. Because LAN applications require simultaneous, two-way communications, full duplex is needed.
Duplex Cables - incorperate two fibers, so that one may be used to send data for receipt by another part, while the other part may use the other fiber to send data for receipt by the first party. This supports simultaneous, two-way communications and makes it well suited for LAN applications.
** As part of monitoring Network Traffic, you need to determine the payload that is produced by using IPsec in tunnel mode with the AH protocol. Which of the following best describes this payload?
an encapsulated packet that is encrypted.
an unencapsulated packet that is encrypted.
an unencapsulated packet that is digitally signed.
an encapsulated packet that is digitally signed.
an encapsulated packet that is digitally signed.
Explanation:
IPsec (Internet Protocol Security) in tunnel mode with the Authentication Header (AH) protocol produces an encapsulated packet that is digitally signed. AH digitally signs a packet for authentication purposes. Tunnel mode encapsulates a packet with another packet. Encapsulating Security Protocol (ESP) encrypts IPsec packets. Transport Mode sends IPsec packets between two computers without encapsulating packets. AH and ESP work in transport mode and tunnel mode.
** If a routing table contained multiple routes for the same destination, which were inserted by the following methods, which route will the Router use to reach the desination Network?
The route inserted by BGP
The route inserted by RIP
The route configured as a static route.
The route inserted by OSPF.
The route configured as a static route.
Explanation:
A Static Route will be preferred because it has the Lowest Administrative Distance. Administrative Distance is a feature that is used to select the best path when two or more routes to the same destination exist. These multiple routes are the result of different protocols being available to be used.
The Default Administrative options offered are: RIP = 120 (Routing Information Protocol) OSPF = 110 (Open Shortest Path First) BGP = 20 (Border Gateway Protocol) Static = 1
** Management has requested that you document the minimum level of security for all network devices. Which of the following will this provide?
procedures
standards
guidelines
baselines
baselines
Explanation:
Baselines - define the minimum level of security and performance of a system in an organization. Baselines are also used to benchmark for future changes.
Guidelines - are the actions that are suggested when standards are not applicable in a particular situation.
Standards - are mandated rules that govern the acceptable level of security for hardware and software. Also include regulated behaviors of employees. Standards are enforceable and are the activities and actions that must be followed. Standards can be defined internally in an organization or externally as Regulations.
Procedures - are detailed instructions used to accomplish a task r oa goal. Procedures define how the security policy will be implemented in an organization through repeatable steps.
** Your company’s IT department needs to provide field engineers with a remote GUI-based access to their in-office desktop PCs over the Internet. Engineers could use Windows, Linux, iOS, and Android on their remote devices with a mix of macOS and Windows on the in-office desktops. Which of the following remote access tools offers the best no-cost option?
SSH Telnet RDC VNC ARD
Virtual Network Computing (VNC)
Explanation:
Key Words = GUI Based
VNC = Virtual Network Computing are widely and freely available for Windows, OS X, Linux, Android, iOS, and Chrome. They are easy to setup, and use, interoperate among multiple versions, and work well through corporate and personal firewalls. RDC = Microsoft's Remote Desktop Connection does not work on Linux. ARD = Apple Remote Desktop works best for Apple Environments, but does not work on Windows and other platforms well. And costs $80 per license. SSH/Telnet = Secure Shell and Telnet do not provide a GUI, they are command-line utilities.
** A suburban office location for your company is located next door to a regional airport, where a US government regional weather radar system is also housed. You are tasked with setting up a Wireless 802.11ac Network in that location. You must select a range of 80 MHz channels for the Network to use. Furthermore, some of the devices on that Network have 802.11n Wireless interfaces. Which of the following channels should you use on your Network? (Choose Two)
Channels 52 - 64 Channel 165 Channels 149 - 161 Channels 36 - 48 Channels 100 - 144
Channels 149 - 161
Channels 36 - 48
Explanation:
You should use channels 36 - 48 and 149 - 161 for indoor and outdoor WIFI use. All 802.11n and 802.11ac Client devices support use on these 2 bands.
Channels 52 - 64 was historically reserved by the FCC for government weather radar systems and DFS sensing is required for access points and client devices on this band.
Channels 100 - 144 also reserved for government weather radar systems.
Channel 165 is only 20 MHz wide and does not meet the channel width requirements.
** Your company is located in Charlott, North Carolina. Management has decided to deploy multiple 802.11a WLANs. Youa re concerned that there are not enough non-overlapping channels to support the number of access points that you need to deploy. How many non-overlapping channels are supported in this deployment?
twenty-three
eleven
four
three
twenty-three
Explanation:
- 11a = 23 non-overlapping
- 11b = 4 non-overlapping (1, 6, 11, 14)
- 11g = 4 non-overlapping (1, 5, 9, 13)
- 11g (US) = 3 non-verlapping (1, 6, 11)
** Your company has a main office and three branch offices throughout the United States. Management has decided to deploy a cloud solution that will allow all offices to connect to the same single-routed network and therby connect directly to the cloud. Which of the following is the BEST solution?
P2P
MPLS VPN
Site-to-Site VPN
Client-to-Site VPN
MPLS VPN
Explanation:
Multiprotocol Label Switching Layer 3 Virtual Private Network (VPN) - allows all offices to connect to the same singlerouted network and connect directly to the cloud.
** You have been given a drawing that shows the flow of communication in your Network, with symbols to indicate each piece of equipment’s function. Which configuration management documentation have you been given?
network baseline
logical network diagram
wiring schematic
physical network diagram
wiring schematic
Explanation:
Schematics include the flow of Network communication and symbols to indicate equipment function.
Wiring Diagram - emphasizes Network connections and uses horizontal and veritical lines to represent Network wires.
Logical DIagram - represents how the data will logically be transported through the Network.
Physical Diagram - represents the physical location of the network devices and how they are connected.
Network Baseline - not a diagram, but actually performance statistics gathered for comparative purposes.