MeasureUP MTA 98-366 Networking Fundamentals (Set 1) Flashcards

1
Q

What is the highest bit rate supported by 802.11g?

11 mb/ second
2 mb/second
54 mb/second
300 mb/second

A

54 megabits per second (Mbps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For what purpose is an ad hoc networking mode used in wireless networking?

To provide the highest possible level of authentication and transport security
To hide the wireless network from computers
To enable wireless computers to form a network when no WAP is present
To allow a wireless computer to locate a WAP when the Service Set Identifier is not transmitted

A

To enable wireless computers to form a network when no wireless access point (WAP) is present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of a RADIUS server in a wireless network that is secured using Wi-Fi Protected Access (WPA)?

Client address filtering
Encryption key management
Wired network interface
User authentication

A

User authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which media access protocol is used by 802.11 wireless communications?

Token passing
CSMA/CD
CSMA/CA
Polling

A

CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The maximum throughput of an 802.11n network is:

11 Mbps
54 Mbps
600 Mbps
100 Mbps

A

600 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two WLAN standards operate at the 2.4 GHz frequency? (Choose two)

  1. 11a
  2. 3
  3. 11b
  4. 15
  5. 11g
A

802.11g, 802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An infrastructure mode WLAN:

can be used to connect wireless clients to a wired network.
requires a RADIUS server
only supports WEP security
always broadcasts SSIDs

A

can be used to connect wireless clients to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which WLAN security standard supports AES encryption?

PPTP
WPA
L2TP
WEP

A

WPA (WiFi Protected Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of firewall filtering would you configure to filter traffic based on packet content?

Application level
Stateful inspection
Port and address
Intrusino detection

A

Application level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You want to set up a subnet that is isolated from the rest of your local area network (LAN). You want to filter all traffic based on the parameters you define. Which type of device should you use?

Bridge
Hub
Firewall
Network address translation (NAT) server

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your network is configured to allow select business partners access to resources on your internal network through virtual private network (VPN) connections. This is an example of a:

screened subnet
virtual local area network (VLAN)
extranet
perimeter network

A

extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The term “intranet” refers to:

local host computers configured to connect to the Internet
your private, internal network
connections to external resources provided to external users
an isolating network between your internal network and the Internet

A

your private, internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of network is only used to connect computers within a single company?

VPN
Extranet
Intranet
WLAN

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which device is used to prevent traffic destined for a specific port from being received from the Internet?

IDS
Switch
Bridge
Firewall

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Internet security zone includes:

all internal and external web sites, except those listed in the the Intranet zone
all internal and external Web sites that are not listed in the restricted or trusted sites zone
all external web sites
all external Web sites that are not listed in the Restricted or Trusted Sites zone.

A

all external Web sites that are not listed in the Restricted or Trusted Sites zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which technology is used to allow a client computer to securely connect to a remote private network across the Internet?

WLAN
VPN
CAN
MAN

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You want to allow external users access to a specific web server, but block access to resources on your intranet. You need to configure a :

wide area network (WAN)
perimeter network
virtual local area network (VLAN)

A

perimeter network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which kind of device is used to connect a wireless LAN segment to a wired LAN segment?

Switch
Modem
Wireless Access Point (WAP)
Hub

A

Wireless Access Point (WAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You want to configure computers in different locations on your network as if they were all part of the same subnet. You need to set up a:

virtual local area network (VLAN)
virtual machine manager (VMM)
perimeter network
virtual private network (VPN)

A

virtual local area network (VLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You want to ensure that computers on your internal LAN cannot use their assigned IP addresses to communication directly on the Internet. Which address range is valid for this purpose?

  1. 0.0.1 through 127.0.0.254
  2. 0.0.1 through 11.0.0.254
  3. 169.21.1 through 192.169.21.254
  4. 16.20.1 through 172.16.20.254
A

172.16.20.1 through 172.16.20.254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of server would you place in a perimeter network?

A database server that stores information used by the company’s accounting program
A Web server that must be accessed by external users.
An Active Directory domain controller
A file server that contains highly confidential files

A

A Web server that must be accessed by external users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A three-homed perimeter network configuration requires:

one wireless access point
three firewalls
one firewall
three wireless access points

A

one firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a primary reason to implement a VLAN?

To allow computers with 802.11n adapters to connect to the network
To provide secure access for users connecting through an unsecure network
To manage bandwidth allocation based on the type of user.
To provide centralized authentication for users connecting through wireless and dial-up connections

A

To manage bandwidth allocation based on the type of user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which method of configuring a VLAN offers the best scalability?

Subnetting
Frame tagging
Supernetting
Frame filtering

A

Frame tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In which of the following situations would you want to configure a virtual private network (VPN)?

Wired and wireless network segments need to be connected
A web server needs to support public access as part of an e-commerce application
Computers at different locations on a WAN need to act as if they are on the same subnet
Home-based telecommuters need intermittent connections over the internet to the internal network.

A

Home-based telecommuters need intermittent connections over the internet to the internal network.

26
Q

A set of interconnected local area networks (LANs) is known as a:

Wide Area Network (WAN)
bridged network
perimeter network
virtual private network (VPN)

A

Wide Area Network (WAN)

27
Q

What is the typical communication rate for a dial-up connection over a standard dial-up analog line in the United States?

56 kbps
1.544 mbs/second
30 mbs/second
128 kbps

A

56 kilobits per second (Kbps)

28
Q

Which of the following is a dial-up connection type?

ISDN
IEEE 1394
cable modem
T1

A

ISDN

29
Q

What is the transmission rate of T1?

1.544 mbps
54 mbps
128 kbps
11 mbps

A

1.544 Mbps

30
Q

A DSL:

cannot be used to provide VPN access
allocates more bandwidth for upload traffic than for download traffic
allocates more bandwidth for download traffic than for upload traffic.
provides less bandwidth than ISDN-BRI

A

allocates more bandwidth for download traffic than for upload traffic.

31
Q

Which WAN carrier uses 23 B channels and one D channel?

T3
T1
ISDN-PRI
ISDN-BRI

A

ISDN-PRI

32
Q

Which type of Digital Subscriber Line (DSL) provides 1.544 duplex transmission on a single twisted pair line?

HDSL
CDSL
SDSL
ADSL

A

SDSL

33
Q

Computers connected to an Ethernet hub is an example of which kind of topology?

Star
Bus
Ring
Mesh

A

Star

34
Q

Which routing topology would most likely continue carrying traffic to all locations even if one communication path fails?

Ring
Mesh
Star
Bus

A

Mesh

35
Q

Modern Ethernet networks are most commonly wired using which topology?

Ring
Bus
Star
Mesh

A

Star

36
Q

A ring topology is used when wiring:

A wireless ad hoc mode network
a 100BaseT Ethernet network
A fiber distributed data interface (FDDI) network
a wireless infrastructure mode network
a X.25 packet switching network
A

a Fiber Distributed Data Interface (FDDI) network.

37
Q

Which access method is defined in the 802.5 specification?

Broadcast
Token passing
Collision avoidance
Collision detection

A

Token passing

38
Q

Which type of network uses a CSMA/CD as the access method?

FDDI
802.5
802.11g
Ethernet

A

Ethernet

39
Q

Which network topology offers the best fault tolerance?

Mesh
Ring
Bus
Star

A

Mesh

40
Q

Which physical topology is often implemented using a logical ring topology?

Mesh
Bus
Tree
Star

A

Star

41
Q

You are using unshielded twisted pair (UTP) to wire a 100Base T Ethernet network. What cable type should you use?

Cat 5
Cat 1
Cat 4
Cat 3

A

Cat 5

42
Q

Which media type is least susceptible to electromagnetic interference (EMI) ?

STP
UTP
Coaxial
Fiber optic

A

Fiber optic

43
Q

What is the maximum segment length when wiring a 10BaseT network with a Cat5 cable?

10 meters
2 meters
1000 meters
100 meters

A

100 meters

44
Q

Why should you avoid fluorescent lights when running unshielded twisted pair (UTP) cable?

Possible damage to computers
Possible physical damage to light
Possible physical damage to cable
Possible signal degradation

A

Possible signal degradation

45
Q

Which media is immune to electromagnetic interference (EMI)?

1000Base-T
100Base-FX
10Base5
10Base2

A

100Base-FX

46
Q

The maximum length of a 100Base-TX segment is:

185 meters
500 meters
100 meters
200 meters

A

100 meters (500ft.)

47
Q

What type of connector is used to connect a network interface card to the network using UTP cable?

AUI
BNC
RJ-45
RJ-11

A

RJ-45

48
Q

Which two cable specifications are for coaxial cable? (choose two)

10Base-2
100Base-T4
10Base-5
100Base-FX
10Base-T
A

10Base-5, 10Base-2

49
Q

What is the difference between STP and UTP cable?

STP transmits data using light. UTP transmits data using electromagnetic waves.
STP has outer shielding. UTP does not.
STP uses insulated copper wires. UTP does not.
STP has more twists than UTP.

A

STP has outer shielding. UTP does not.

50
Q

Which cable type has the strictest fire code requirements?

UTP
Plenum
Riser
Coaxial

A

Plenum

51
Q

A router does not have an entry in its routing table associated with the destination address that is encoded in a packet. Where will the router send the packet?

To the original source router
To the most recent source router
To the physically nearest router
To its default next router

A

To its default next router

52
Q

Which devices use IP addreesses to control network traffic? (Choose two).

Repeater
Layer 2 Switch
Hub
Layer 3 Switch
Router
Bridge
A

Layer 3 switch, Router

53
Q

You are configuring a router as a firewall or your perimeter network. You want to provide the highest possible level of protection to your network. Which is the most sophisticated method for managing traffic through a router?

Static packet filters
Stateful inspection
Proxy
Application-layer filtering

A

Application-layer filtering

54
Q

What is the role of routing protocols?

To report packet errors
To display routing tables on remote routers
To dynamically update route information.
To enable administrator updates to static routing tables

A

To dynamically update route information.

55
Q

The purpose of a NAT is to:

Allow multiple computers with private addresses to access the Internet using a single public address.
encrypt data that is sent across the internet
dynamically assign IP addresses
allow computers at different geographic locations to have addresses in the same IP subnet

A

Allow multiple computers with private addresses to access the Internet using a single public address.

56
Q

RouterA has a static routing table and is not configured with a default route. What happens when RouterA receives a packet that does match any routes?

The route is chosen randomly.
The packet is discarded.
The router performs network address translation (NAT).
The packet is broadcast to all routes.

A

The packet is discarded.

57
Q

Which protocol is a distance-vector routing protocol?

RIP
BGP
OSPF
SNMP

A

RIP (Routing Information Protocol)

58
Q

OSPF:

sends a multicast packet as soon as a change in the network configuration is detected.
sends the routing table as a broadcast every 30 seconds
does not support variable-length subnet masks (VLSM)
can only support routes of up to 15 hops

A

sends a multicast packet as soon as a change in the network configuration is detected.

59
Q

A NAT server is used to provide Internet access to computers that are configured with private IP addresses. Choose whether the statement is correct as stated or choose the text that should replace the underlined text to make the statement correct.

database server
web server
file server
The statement is correct and does not need any changes.

A

The statement is correct and does not need any changes.

60
Q

How does a standard hub differ from a standard switch?

A hub sends packets to all connected computers; a switch directs packets to specific computers.
A hub is used for internal network connections; a switch is used for external network connections.
A hub is used for external network connections; a switch is used for internal network connections.
A hub directs packets to specific computers; a switch sends packets to all connected computers.

A

A hub sends packets to all connected computers; a switch directs packets to specific computers.

61
Q

Using a switch on an Ethernet network helps to reduce:

illegal users
IP address use
effective bandwidth
collisions

A

collisions