Lab Questions Flashcards

Review Lab Test Questions

1
Q

Which layer of the OSI model is used to forward packets on the network?

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which layer of the OSI model maps to the Internet layer of the TCP/IP model?

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the functionality of data encapsulation?

A
  • Ensures security and reliability of data transmission
  • Adds headers to the data that is sent across the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

At which layer of the OSI model does a router function?

A

Layer 3 The Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the characteristics of a physical network topology?

A
  • a physical network topology displays the actual layout of the network
  • a physical network topology displays the physical location of devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which network topology(s) has a single point of failure?

A

Star, Bus, Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the advantages of a mesh topology?

A
  • ensure high-availability of the network connectivity
  • ensure redundancy of network connectivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which network topology is most expensive to implement and maintain?

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which network topology is most commonly used in a network infrastructure?

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Class C Private IP address?

A

192.168.x.x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the subnet mask for a Classful Class A IP range?

A

255.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What would the subnet mask be of the following network range? 192.168.1.0/28

A

255.255.255.240

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Loopback address for IPv4?

A

127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the functionality of a Multicast IP address?

A

Sends network communication to a specific set of hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What sort of internet service providers are used by airlines to provide internet services to customers in transit?

A

Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What sort of internet connection is preferred to provide guaranteed uptime to customers?

A

Leased Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which phenomenon is used by light waves within Fibre Optic cables to travel from one point to another?

A

Total Internal Reflection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of twists in a twisted pair cable?

A

Reduce Noise (crosstalk)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does W in RJ11W indicate?

A

Wall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

To which IEEE standard is Ethernet cabling specifications measured against?

A

IEEE Standard 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

At what rate is data transmitted using 40GBASE-T?

A

40Gbits/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which cable uses light-emitting diodes to transmit multiple signals at a time?

A

Multimode fibre-optic cable (MMF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the two major parts of a BIX punchdown block system?

A

Mount and Connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When implementing an organised cable management solution, what is required to help keep the system organised?

A

Colour coded cable, Cable ties, Cable labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which microsoft technology can be used to create virtual devices on a physical device on-premise?
Hyper-V
26
What is the purpose of creating a private virtual switch using Hyper-V?
Connects locally located virtual devices together
27
Which devices can be created using Network Function Virtualisation (NFV)?
Virtual Firewalls, Virtual Load balancers
28
Which virtual device can be created using Hyper-V?
Virtual Switch
29
How can a virtual device communicate with a physical device on the network?
Using an external virtual switch
30
What does the acronym CIA stand for in relation to network security?
Confidentiality, Integrity, Availability
31
Which threat actor will have prior knowledge of the network layout to perform a malicious attack?
Disgruntled network administrator
32
What is the purpose of Role-based Access Control (RABC)?
Users only have access to specific resources according to their job role
33
Where in a network segment will the DMZ be located?
Between the internal and external network
34
What can be used for multi-factor authentication?
Username and password, Smart Card
35
Which type of attack can be conducted to render a network device inaccessible?
Ransomware attack, Denial of Service attack
36
In a ____ attack, the user is misled by a caller that he is a network technician gathering personal information from the user.
Social Engineering
37
Which type of attack misleads a user to connect to a malicious wireless access point?
Evil Twin
38
In which type of attack are the cache records manipulated for malicious purposes?
DNS poisoning, ARP Spoofing
39
In ________ a malicious user gains physical access to a restricted area of the network.
Tailgating
40
HTTP and HTTPS are TCP-based protocols. Which ports do they use?
80 and 443
41
You work as a network administrator in a domain environment. You have a new firewall and need to configure it. You are asked to create web filtering and firewall rules based on domain groups. Which of the following protocol will you use to integrate your firewall directly with Active Directory?
LDAP
42
You work as a network administrator and are responsible for configuring network firewalls, routers and switches. You have configured rules between the user and server VLANs. You received a request from your development team to create a new rule that allows port TCP 1433 to the database server. Based on the port number, which database is installed on the server.
SQL
43
One of the users in your organisation has just re-installed the operating system on his system. He notices that the email software can be accessed after the reinstallation, but all the old emails have disappeared. What could be the cause of this problem?
POP3 was used on the mail client software
44
What transport protocol/ports do DNS and DHCP use?
UDP 53 / UDP 67 and 68
45
Which parameter can be used with the ping command to send a constant stream of packets when using a Windows device?
-t
45
Which of the following command can be used to display the local routing table for a Windows device?
route print
46
Which command must be used on a Linux device to determine the IP configuration of the eth0 network interface?
ifconfig eth0 or ip address show eth0
47
What is the arp -a command used for on a Windows device?
Displays the address resolution table for the device
48
When executing the tracert 192.168.0.10 command, what can be determined from the output?
The route it will take to reach the destination IP address
49
What is the functionality of a DNS Server?
Resolving hostnames to IP addresses
50
Why would an additional DNS server be implemented in a network?
To ensure high-availability of the DNS server
51
Which command can be used to refresh the DNS records on a host device?
ipconfig /registerdns
52
What is the function of an A host record in DNS?
Points an IP address to a static device
53
What is the functionality of an MX record on a DNS server?
It points to the SMTP server for the domain
54
What is the purpose of implementing a DHCP server on a network?
Dynamically allocate IP addresses to hosts on the network, Automatically assign a DNS server address to a host
55
After installation of the DHCP server role, why is it necessary to restart the DHCP service?
To ensure the credentials that were stipulated is applied
56
What is the functionality of a lease for a DHCP server?
It stipulates how long an IP address will be allocated to a host
57
When creating a scope on a DHCP server, what is the purpose of specifying an exclusion?
An exclusion is specified to ensure specific IP addresses are not automatically allocated to hosts
58
On which server will the DHCP server role normally be installed?
Domain Member Server
59
To be able to remotely manage a Windows device securely, which of the following protocols can be used?
RDP
60
Which of the following connection methods can be used to connect a company’s offices which are located in different geographical areas?
Site-to-Site VPN
61
While configuring a new VPN client, which Role service needs to be installed for the Remote Access role on a Windows server?
Direct Access and VPN (RAS)
62
Which permission needs to be assigned to a user to be able to connect to a VPN connection?
Network Access permissions
63
Which permission allows a user access to a resource?
Authentication
64
To ensure the high availability of a resource, what needs to be configured?
NIC teaming, Multipathing, Network Load balancing
65
Which DNS record needs to be configured for a network load balancing cluster?
An A record
66
What needs to be done with a newly added network adapter to be able to configure NIC teaming?
Configure the adapter with a static IP address in the correct range
67
Which IP address will be used to connect a resource after Network Load balancing has been configured?
The Cluster's IP address
68
What is the functionality of multipathing?
Create different network routes to a resource on the network, Ensure a resource is highly available
69
Which Stratum Level is the least Trusted?
Level 15
70
Which command-line command would display time sync information for an NTP client?
w32tm /query /peers
71
What is the maximum number of NTP Servers that an NTP client can be synchronized with?
1
72
Which of the following port is used by NTP Servers to provide time synchronization?
123
73
Which Transport Layer protocol is used by NTP Servers to provide time synchronization?
UDP
74
When configuring a server for a failover cluster, what needs to be validated before adding the server to the cluster?
The harddrives are all similarly configured, The server has the same roles installed as other servers in the cluster, The server has a network interface card configured the same as the other server in the cluster
75
A server needs to be added to a failover cluster, and a virtual switch needs to be created using Hyper-V Manager. The other server in the cluster has a preconfigured virtual switch named: PLCluster. What must be the name of the virtual switch that needs to be created?
PLCluster
76
After an incident has occurred resulting in data loss which of the following specifies the amount of acceptable data a company can lose?
Recovery Point Objective (RPO)
77
What needs to be done to ensure a backup can be scheduled?
Install the Windows Server Backup feature, Identify and configure storage solution for the backup
78
A__________ site contains all the relevant network equipment and data but needs to be configured in the event of a disaster.
Warm
79
You need to configure a voice VLAN on your Cisco switch with the VLAN ID 10. What command will you use on the global configuration mode?
configure terminal vlan 10 name VOICE
80
What is the name of the switching feature that prevents frame dropping in case of congestion by pausing sending frames?
Flow Control
81
You have a high speed environment in your network with speeds of up to 40 Gbps. Users in the network are experiencing slow performance issues on some applications. What do you need to enable on your equipment to improve the performance?
Jumbo Frames
82
What is the key drawback of STP or per VLAN STP – PVST?
Slow convergence
83
You want to improve the security in your network and enable MAC address filtering. Which of the following feature will you configure on the switch ports?
Port security
84
What does an L3 device use to make decisions on where to forward a packet?
Routing Table
85
Your device has a route to the 0.0.0.0/0 network in a routing table. What route is it, and when will it be used?
0.0.0.0/0 is a default route. The router uses it to route packets if it doesn't have a more specific route to the destination
86
When is dynamic routing protocol preferred over static routes?
Dynamic routing protocols are better in large environments where there are many networks and devices
87
What is the difference between distance vector and link state routing protocol?
Distance vector routing protocol exchanges the whole routing table, while link state routing protocol exchanges information about all connected networks
88
Which of the following routes will have an Administrative distance of 90 in a routing table?
EIGRP routes
89
You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router?
Check the IP routing table
90
You have two users who work on the same floor and belong to the same department. The organization has strict rules implemented for printer access. One of the users is unable to access the printer but has access to the Internet. What should you check on your switch?
VLAN assignment
91
You have implemented your network with new managed switches. A user is experiencing periodical interruptions on the network. While pinging the main server, you notice that there is periodical packet loss. What could cause this problem?
Broadcast storm
92
You have configured a new web server in your network, which will be used only from the local network. You published the website on TCP port 8443 but are unable to access the website on that port from a client device. You are able to ping the server IP address and also have access to the server using a Remote Desktop Connection. What could be the cause of this issue?
Windows Firewall is enabled and port 8443 is not allowing traffic
93
You have a complex network environment and have issues related to the routing of network traffic between hosts. Which of the following command will you use to troubleshoot this issue and verify how the packets are routed?
traceroute
94
In which type of cloud configuration is the customer responsible for maintaining the operating system and software?
Infrastructure as a Service (IaaS)
95
When choosing the location to create resources in the cloud, what is the best location for the resources?
Geographically closest Cloud Service Provider, Closest Regional Cloud Service Provider Datacenter
96
With a _________ Cloud, the hardware and software are maintained by the company that owns it.
Private
97
What is an example of Software as a Service (SaaS)?
Microsoft 365, Dropbox
98
What is the advantage of elasticity when utilizing a cloud service provider?
Resource allocation is scaled automatically, Resources are deallocated when not used
99
Which tier in the three-tiered network is responsible for routing traffic in and out of a network?
Core
100
At which layer in Software Defined Network (SDN) will you find a firewall?
Application Layer
101
How many tiers are there in the spine and leaf network architecture?
2
102
The traffic that enters into a network is known as the ___________ traffic.
Southbound
103
Which storage area network (SAN) connection type uses an Ethernet switch to send commands to the SAN devices?
Internet Small Computer Systems Interface (iSCSI)
104
What will affect the quality of VoIP calls?
Jitter
105
Which hardware metrics needs to be measured to ensure the availability of the network?
CPU utilisation, Memory, Temperature
106
Which service needs to be configured to ensure metrics for network devices can be captured?
SNMP
107
Which application on Windows devices can be used to review events that occurred on the local system?
Event Viewer
108
Which of the following Log Level Severity levels indicates that there can be a potential problem?
Warning
109
What is the first step that needs to be taken when troubleshooting a network incident?
Identify the problem
110
What is the purpose of documenting an incident?
For future reference
111
Where is the best practice to test theory for the probable cause of the incident?
In a sandbox solution
112
Which strategies can be used to identify the cause of an incident?
Gather information of the incident, Question people involved
113
You have configured a new DHCP server and connected it to the network. There is connectivity to the server, but the clients in the network are unable to obtain IP addresses from the server. Which enabled feature on the switch can cause this issue?
DHCP snooping
114
You work in an organization as a network administrator. One of your new clients owns a hotel and has asked you to provide a single Internet connection for every room, but also ensure that the users are not visible to each other. Which technology on the switch will you use to meet the requirements stated in the scenario?
Create Private VLANs
115
You have empty ports on your switches, that is, no connected hosts. Which are best practices to ensure that the empty ports are secure?
Move the ports from the default VLAN to a new, unused VLAN and then disable them
116
Which versions of SNMP are considered unsecure?
SNMPv1, SNMPv2c
117
You need to create an access list on your router to filter specific IP addresses and ports. You created entries with permit statements and deny statements. But you forget to add one specific deny statement to filter traffic from host A. How will this traffic be treated?
Host A traffic will be denied because, at the end of every access list, there is an implicit deny statement
118
Which tool is used to connect a media connector to the end of a cable?
Cable Crimper
119
Which tool uses red and black probes to measure voltage?
Multimeter
120
Which tool is used to test an Ethernet cable and creates a loopback connection?
Cable Tester
121
Which of the following devices is used to test a fiber cable to determine a fault and its length?
Optical Time-Domain Reflectometer (OTDR)
122
Which is a hardware device that is used for troubleshooting network transmission issues?
Loopback Adapter
123
Which of the following networking device can be used to implement access lists, dynamic routing protocols, and Network Address Translation (NAT)?
Router
124
On which device can you not assign an IP address?
Hub
125
Which are the benefits of a Wireless LAN Controller?
Simplified wireless network maintenance, Flexible deployment of a wireless access point, Interference detection, Wireless access point status detection
126
Which SCADA component is geographically dispersed and receives commands to perform certain tasks?
Remote Terminal Unit (RTU)
127
What is the data rate that defines the amount of data transmitted in a specific time?
Throughput
128
What is the maximum speed of the CAT1 cable?
Up to 1Mbps
129
Which types of cables are mainly used in elevator shafts that can prevent fire?
Riser-rated
130
Which type of cable has an RJ45 (male) at one end and a DB9 (female) connector at the other end?
Rollover Cable, Console Cable
131
Which of the following causes an evident loss of decibel?
Increased Attenuation
132
Which wireless standard provides a range of 150 feet and is the oldest standard still in use and supported by wireless routers?
802.11b
133
In Basic Service Set (BSS), what is the maximum number of access points?
1
134
In roaming, what is the first step that a wireless client performs?
Scanning
135
Which protocol was initially introduced with Wi-Fi Protected Access (WPA)?
Temporal Key Integrity Protocol (TKIP)
136
When using CDMA, where is the cellular-related information stored?
In the handset
137
Which is the orientation of the antenna concerning the surface of the earth?
Antenna Polarisation
138
When is a site survey done for a wireless network?
Before Deployment
139
You have several visitors who come to your office every day and connect to the corporate wireless network. You want to secure the wireless network and limit wireless network access for the visitors. They should not be able to connect to the systems on the corporate wireless network. Which method should you use?
Create a guest wireless network
140
Which protocol is used for generating preshared keys?
Temporal Key Integrity Protocol (TKIP)
141
Which type of portal is used for wireless client authentication?
Captive
142
Which type of camera records the entry and exit of each individual through the door?
Fixed
143
Which employee training method uses a Learning Management System (LMS)?
Training Videos
144
Which phase is defined after the Preparation phase in the Incident Response Plan?
Identification
145
When is the disaster recovery plan invoked?
During the disaster
146
In which phase of a system life cycle is a device procured into the organization and becomes an asset, identified using a specific number or similar identification method?
Acquisition
147
Which are the components of a standard operating procedure document?
Definitions, Scope, Purpose, Responsibilities, Procedures
148
If you enable password history in a Windows environment, how many passwords are remembered by default?
24
149
In a physical network diagram, which entities should be documented?
Clients, WAN Links, VoIP Phones, Servers, Firewalls
150
Which is the main panel that houses the main incoming cables for the building or floor?
MDF
151
When writing the site survey report, which of the following points should be included?
Recommendations on type of wireless access points, Number of wireless access points, Amount of redundancy, Mounting locations along with the cable path
152
When defining a baseline of a server, which of the following components’ utilization must be included?
Processor, Network, Memory, Hard Drive
153
In which type of Non-disclosure Agreement (NDA) do you have more than two parties involved, but just one party shares the information with the other parties?
Multilateral