MeasureUP MTA 98-366 Networking Fundamentals (Set 1) Flashcards

1
Q

What is the highest bit rate supported by 802.11g?

11 mb/ second
2 mb/second
54 mb/second
300 mb/second

A

54 megabits per second (Mbps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For what purpose is an ad hoc networking mode used in wireless networking?

To provide the highest possible level of authentication and transport security
To hide the wireless network from computers
To enable wireless computers to form a network when no WAP is present
To allow a wireless computer to locate a WAP when the Service Set Identifier is not transmitted

A

To enable wireless computers to form a network when no wireless access point (WAP) is present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of a RADIUS server in a wireless network that is secured using Wi-Fi Protected Access (WPA)?

Client address filtering
Encryption key management
Wired network interface
User authentication

A

User authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which media access protocol is used by 802.11 wireless communications?

Token passing
CSMA/CD
CSMA/CA
Polling

A

CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The maximum throughput of an 802.11n network is:

11 Mbps
54 Mbps
600 Mbps
100 Mbps

A

600 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two WLAN standards operate at the 2.4 GHz frequency? (Choose two)

  1. 11a
  2. 3
  3. 11b
  4. 15
  5. 11g
A

802.11g, 802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An infrastructure mode WLAN:

can be used to connect wireless clients to a wired network.
requires a RADIUS server
only supports WEP security
always broadcasts SSIDs

A

can be used to connect wireless clients to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which WLAN security standard supports AES encryption?

PPTP
WPA
L2TP
WEP

A

WPA (WiFi Protected Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of firewall filtering would you configure to filter traffic based on packet content?

Application level
Stateful inspection
Port and address
Intrusino detection

A

Application level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You want to set up a subnet that is isolated from the rest of your local area network (LAN). You want to filter all traffic based on the parameters you define. Which type of device should you use?

Bridge
Hub
Firewall
Network address translation (NAT) server

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your network is configured to allow select business partners access to resources on your internal network through virtual private network (VPN) connections. This is an example of a:

screened subnet
virtual local area network (VLAN)
extranet
perimeter network

A

extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The term “intranet” refers to:

local host computers configured to connect to the Internet
your private, internal network
connections to external resources provided to external users
an isolating network between your internal network and the Internet

A

your private, internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of network is only used to connect computers within a single company?

VPN
Extranet
Intranet
WLAN

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which device is used to prevent traffic destined for a specific port from being received from the Internet?

IDS
Switch
Bridge
Firewall

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Internet security zone includes:

all internal and external web sites, except those listed in the the Intranet zone
all internal and external Web sites that are not listed in the restricted or trusted sites zone
all external web sites
all external Web sites that are not listed in the Restricted or Trusted Sites zone.

A

all external Web sites that are not listed in the Restricted or Trusted Sites zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which technology is used to allow a client computer to securely connect to a remote private network across the Internet?

WLAN
VPN
CAN
MAN

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You want to allow external users access to a specific web server, but block access to resources on your intranet. You need to configure a :

wide area network (WAN)
perimeter network
virtual local area network (VLAN)

A

perimeter network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which kind of device is used to connect a wireless LAN segment to a wired LAN segment?

Switch
Modem
Wireless Access Point (WAP)
Hub

A

Wireless Access Point (WAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You want to configure computers in different locations on your network as if they were all part of the same subnet. You need to set up a:

virtual local area network (VLAN)
virtual machine manager (VMM)
perimeter network
virtual private network (VPN)

A

virtual local area network (VLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You want to ensure that computers on your internal LAN cannot use their assigned IP addresses to communication directly on the Internet. Which address range is valid for this purpose?

  1. 0.0.1 through 127.0.0.254
  2. 0.0.1 through 11.0.0.254
  3. 169.21.1 through 192.169.21.254
  4. 16.20.1 through 172.16.20.254
A

172.16.20.1 through 172.16.20.254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of server would you place in a perimeter network?

A database server that stores information used by the company’s accounting program
A Web server that must be accessed by external users.
An Active Directory domain controller
A file server that contains highly confidential files

A

A Web server that must be accessed by external users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A three-homed perimeter network configuration requires:

one wireless access point
three firewalls
one firewall
three wireless access points

A

one firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a primary reason to implement a VLAN?

To allow computers with 802.11n adapters to connect to the network
To provide secure access for users connecting through an unsecure network
To manage bandwidth allocation based on the type of user.
To provide centralized authentication for users connecting through wireless and dial-up connections

A

To manage bandwidth allocation based on the type of user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which method of configuring a VLAN offers the best scalability?

Subnetting
Frame tagging
Supernetting
Frame filtering

A

Frame tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In which of the following situations would you want to configure a virtual private network (VPN)? Wired and wireless network segments need to be connected A web server needs to support public access as part of an e-commerce application Computers at different locations on a WAN need to act as if they are on the same subnet Home-based telecommuters need intermittent connections over the internet to the internal network.
Home-based telecommuters need intermittent connections over the internet to the internal network.
26
A set of interconnected local area networks (LANs) is known as a: Wide Area Network (WAN) bridged network perimeter network virtual private network (VPN)
Wide Area Network (WAN)
27
What is the typical communication rate for a dial-up connection over a standard dial-up analog line in the United States? 56 kbps 1.544 mbs/second 30 mbs/second 128 kbps
56 kilobits per second (Kbps)
28
Which of the following is a dial-up connection type? ISDN IEEE 1394 cable modem T1
ISDN
29
What is the transmission rate of T1? 1.544 mbps 54 mbps 128 kbps 11 mbps
1.544 Mbps
30
A DSL: cannot be used to provide VPN access allocates more bandwidth for upload traffic than for download traffic allocates more bandwidth for download traffic than for upload traffic. provides less bandwidth than ISDN-BRI
allocates more bandwidth for download traffic than for upload traffic.
31
Which WAN carrier uses 23 B channels and one D channel? T3 T1 ISDN-PRI ISDN-BRI
ISDN-PRI
32
Which type of Digital Subscriber Line (DSL) provides 1.544 duplex transmission on a single twisted pair line? HDSL CDSL SDSL ADSL
SDSL
33
Computers connected to an Ethernet hub is an example of which kind of topology? Star Bus Ring Mesh
Star
34
Which routing topology would most likely continue carrying traffic to all locations even if one communication path fails? Ring Mesh Star Bus
Mesh
35
Modern Ethernet networks are most commonly wired using which topology? Ring Bus Star Mesh
Star
36
A ring topology is used when wiring: ``` A wireless ad hoc mode network a 100BaseT Ethernet network A fiber distributed data interface (FDDI) network a wireless infrastructure mode network a X.25 packet switching network ```
a Fiber Distributed Data Interface (FDDI) network.
37
Which access method is defined in the 802.5 specification? Broadcast Token passing Collision avoidance Collision detection
Token passing
38
Which type of network uses a CSMA/CD as the access method? FDDI 802.5 802.11g Ethernet
Ethernet
39
Which network topology offers the best fault tolerance? Mesh Ring Bus Star
Mesh
40
Which physical topology is often implemented using a logical ring topology? Mesh Bus Tree Star
Star
41
You are using unshielded twisted pair (UTP) to wire a 100Base T Ethernet network. What cable type should you use? Cat 5 Cat 1 Cat 4 Cat 3
Cat 5
42
Which media type is least susceptible to electromagnetic interference (EMI) ? STP UTP Coaxial Fiber optic
Fiber optic
43
What is the maximum segment length when wiring a 10BaseT network with a Cat5 cable? 10 meters 2 meters 1000 meters 100 meters
100 meters
44
Why should you avoid fluorescent lights when running unshielded twisted pair (UTP) cable? Possible damage to computers Possible physical damage to light Possible physical damage to cable Possible signal degradation
Possible signal degradation
45
Which media is immune to electromagnetic interference (EMI)? 1000Base-T 100Base-FX 10Base5 10Base2
100Base-FX
46
The maximum length of a 100Base-TX segment is: 185 meters 500 meters 100 meters 200 meters
100 meters (500ft.)
47
What type of connector is used to connect a network interface card to the network using UTP cable? AUI BNC RJ-45 RJ-11
RJ-45
48
Which two cable specifications are for coaxial cable? (choose two) ``` 10Base-2 100Base-T4 10Base-5 100Base-FX 10Base-T ```
10Base-5, 10Base-2
49
What is the difference between STP and UTP cable? STP transmits data using light. UTP transmits data using electromagnetic waves. STP has outer shielding. UTP does not. STP uses insulated copper wires. UTP does not. STP has more twists than UTP.
STP has outer shielding. UTP does not.
50
Which cable type has the strictest fire code requirements? UTP Plenum Riser Coaxial
Plenum
51
A router does not have an entry in its routing table associated with the destination address that is encoded in a packet. Where will the router send the packet? To the original source router To the most recent source router To the physically nearest router To its default next router
To its default next router
52
Which devices use IP addreesses to control network traffic? (Choose two). ``` Repeater Layer 2 Switch Hub Layer 3 Switch Router Bridge ```
Layer 3 switch, Router
53
You are configuring a router as a firewall or your perimeter network. You want to provide the highest possible level of protection to your network. Which is the most sophisticated method for managing traffic through a router? Static packet filters Stateful inspection Proxy Application-layer filtering
Application-layer filtering
54
What is the role of routing protocols? To report packet errors To display routing tables on remote routers To dynamically update route information. To enable administrator updates to static routing tables
To dynamically update route information.
55
The purpose of a NAT is to: Allow multiple computers with private addresses to access the Internet using a single public address. encrypt data that is sent across the internet dynamically assign IP addresses allow computers at different geographic locations to have addresses in the same IP subnet
Allow multiple computers with private addresses to access the Internet using a single public address.
56
RouterA has a static routing table and is not configured with a default route. What happens when RouterA receives a packet that does match any routes? The route is chosen randomly. The packet is discarded. The router performs network address translation (NAT). The packet is broadcast to all routes.
The packet is discarded.
57
Which protocol is a distance-vector routing protocol? RIP BGP OSPF SNMP
RIP (Routing Information Protocol)
58
OSPF: sends a multicast packet as soon as a change in the network configuration is detected. sends the routing table as a broadcast every 30 seconds does not support variable-length subnet masks (VLSM) can only support routes of up to 15 hops
sends a multicast packet as soon as a change in the network configuration is detected.
59
A NAT server is used to provide Internet access to computers that are configured with private IP addresses. Choose whether the statement is correct as stated or choose the text that should replace the underlined text to make the statement correct. database server web server file server The statement is correct and does not need any changes.
The statement is correct and does not need any changes.
60
How does a standard hub differ from a standard switch? A hub sends packets to all connected computers; a switch directs packets to specific computers. A hub is used for internal network connections; a switch is used for external network connections. A hub is used for external network connections; a switch is used for internal network connections. A hub directs packets to specific computers; a switch sends packets to all connected computers.
A hub sends packets to all connected computers; a switch directs packets to specific computers.
61
Using a switch on an Ethernet network helps to reduce: illegal users IP address use effective bandwidth collisions
collisions