MOD5 Review Practice Exam Flashcards

1
Q

The primary goal of an Extranet is to?

let users access different websites
provide company information to internal employees
allow different businesses to share information

A

allow different businesses to share information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Firewall is to a Network as - ?

a movie is to a screen
an eraser is to a pencil
a door is to a classroom

A

a door is to a classroom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are types of VPNs? (Choose All That Apply)

HTTPS
FTPS
PPTP
SSL
L2TP /w IPSec
A

PPTP
SSL
L2TP /w IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Find and Match three Wireless Encryption Standards based on level of Security?

WEP
WPA
WPA2
SSL
TLS
802.11g
Options:
1 - Least Secure
2 - More Secure
3 - Most Secure
Not a Wireless Encryption Standard
A
WEP = 1 - Least Secure
WPA = 2 - More Secure
WPA2 = 3 - Most Secure
SSL = Not a Wireless Encryption Standard
TLS = Not a Wireless Encryption Standard
802.11g = Not a Wireless Encryption Standard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Match the name of the TCP/IP Layer with the Corresponding TCP/IP Layer number?

Layer 4
Layer 3
Layer 2
Layer 1

Options:
Presentation
Session
Internetwork
Transport
Application
Network
Physical
Network Interface/Network Access
A

Layer 4 = Application
Layer 3 = Transport
Layer 2 = Internetwork
Layer 1 = Network Interface/Network Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following devices operates on the Network Layer?

Layer 2 Switch
Layer 3 Switch
Hub
Repeater

A

Layer 3 Switch (Network Layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

At which Layer of the OSI Model do VLANs reside?

Layer 5
Layer 4
Layer 2
Layer 3

A

Layer 2 - Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

At which layer of the OSI Model does IP Addressing reside?

Layer 3
Layer 2
Layer 4
Layer 1

A

Layer 3 - Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List the OSI Model in order of 7 - 1?

A
7 - Application
6 - Presentation
5 - Session
4 - Transport
3 - Network
2 - Data Link
1 - Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which OSI Layer does Network Cabling reside?

Layer 5
Layer 3
Layer 4
Layer 2
None of the Above
A

None of the Above - It’s Layer 1 PHYSICAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a valid IPv4 Loopback Address?

  1. 0.0.1
  2. 254.131.48
  3. 255.255.0
  4. 168.41.97
A

127.0.0.1 is the Loopback Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do you need to configure on a Host in order for it to access a Network and the Internet/Web? (Choose All That Apply)

DNS Server
MAC Address
IP Address
Subnet Mask
Default Gateway
A

DNS Server
IP Address
Subnet Mask
Default Gateway

MAC Addresses are NOT usually configured because they are typically assigned by a manufacturer when the device is created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many Bits are in an IPv4 Address?

64
32
16
128

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is NOT a valid Private Address Range?

172.0.0.0 to 172.255.255.255
10.0.0.0 to 10.255.255.255
192.168.0.0 to 192.168.255.255
172.16.0.0 to 172.31.255.255
All of these are valid private Address ranges.

A

172.0.0.0 to 172.255.255.255

PRIVATE IP Addresses only for Private Networks.
Class A
Starts with 10, so 10.0.0.0 for example.
Class B
172.16.0.0 to 172.31.0.0
Class C
192.168.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following makes it possible for Private IP Addresses to access the Internet using a Publicly Routable Address?

DHCP
CIDR
NAT
DNS

A

NAT - Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many Bits are in an IPv6 Address?

128
32
64
16

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following would be considered an APIPA Address?

  1. 0.0.1
  2. 168.0.1
  3. 254.0.1
  4. 0.0.1
A

169.254.0.1

18
Q

Match the following IP Addresses with its corresponding address Class. Some answer some be used more than once.

  1. 41.94.99
  2. 99.31.65
  3. 91.37.22
  4. 49.33.222
  5. 10.99.254
  6. 55.176.47
  7. 254.254.254
  8. 0.0.1

Options:
Class A
Class B
Class C

A
  1. 41.94.99 ———– Class A
  2. 99.31.65 ———- Class B
  3. 91.37.22 ———- Class A
  4. 49.33.222 —— Class C
  5. 10.99.254 ——– Class B
  6. 55.176.47 ——– Class C
  7. 254.254.254 —- Class A
  8. 0.0.1 —————- Class A
Ranges:
Class A = 1.0.0.0 to 126.0.0.0
Class B = 128.x.0.0 to 191.x.0.0
Class C = 192.x.x.0 to 233.x.x.0
Class D = 224.x.x.x - Multicast Address/Presentation Software
Class E = 240.x.x.x - RESERVED
19
Q

Of the following Network devices listed, which of them is responsible for separating IP Networks?

WAP
Hub
Switch
Router

A

Router

20
Q

Match the following wireless technologies with the speeds associated with each?

  1. 11a
  2. 11b
  3. 11g
  4. 11n
Options:
300 Mbps
11 Mbps
54 Mbps
2 Mbps
A
  1. 11a —– 54 Mbps —– 5 GHz
  2. 11b —– 11 Mbps —— 2.4 GHz
  3. 11g —– 54 Mbps —– 2.4 GHz
  4. 11n —– 300 Mbps — 2.4 GHz & 5 GHz
21
Q

AJ suspects that someone has hacked into his Access Point because when he attempts to use Wireless on his phone, he can’t connect to his usual “DATC IT Program” Wireless Network. When he searches for Wireless Networks, he notices a Network named “FBI Surveillance Van” with Full Signal Strength. What might he need to change so that he can reconnect to his Network? (Choose All That Apply)

Wireless Encryption Method
Wireless Encryption Key
Careers
SSID
Default Gateway
A

Wireless Encryption Key

SSID

22
Q

Match the following Address Class with it’s corresponding default Subnet Mask?

Class A
Class B
Class C

Options:

  1. 255.255.255
  2. 0.0.0
  3. 255.0.0
  4. 255.255.0
A

Class A —– 255.0.0.0
Class B —– 255.255.0.0
Class C —– 255.255.255.0

23
Q

Match the following Subnet Maskes with the proper /CIDR notation?

/16
/17
/18
/19
/22
/24

Options:

  1. 255.192.0
  2. 255.128.0
  3. 255.255.0
  4. 255.224.0
  5. 255.252.0
  6. 255.0.0
A
*/16 ----- 255.255.0.0
/17 ----- 255.255.128.0
/18 ----- 255.255.192.0
/19 ----- 255.255.224.0
/22 ----- 255.255.252.0
*/24 ----- 255.255.255.0
  • /8 —— 255.0.0.0
  • /32 —– 255.255.255.255
24
Q

Which type of cable is most commonly used in LAN environments today?

RG6 Coaxial Cable
SMF
UTP
MMF

A

UTP - Unshielded Twisted Pair

25
Q

What technology would be used on a Switch to separate the Switch into logical Networks?

WLAN
PAN
MAN
SLAN
VLAN
A

VLAN

26
Q

A VLAN is also called a?

Internal Network
Logical Network
External Network

A

Logical Network

27
Q

Which of the following are Routing Protocols that are used today? (Choose Two)

OSPF
ILS
DNS
RIP
CIDR
A

OSPF

RIP

28
Q

Erin is a Network Administrator for a Hotel - She has guests complaining that when they are out at the pool, they lose connectivity.
What will be Erin’s best solution for providing Internet connectivity to a pool area?

Expand the Hotel’s Wired Network
Add a new WAN
Expand the Hotel’s Wireless Network

A

Expand the Hotel’s Wireless Network

29
Q

John is attempting to connect two computers directly together using the cable he usually uses to connect his computer to his Switch. He has set a Static IP Address on Computer A to 10.10.10.5 with a Subnet Mask of 255.255.255.0. He sets Computer B’s IP Address to 10.10.10.6, with Subnet Mask 255.255.255.0. When he tries to transfer files between the computers, he fails. What is the most-likely reason for this?

John has set the wrong IP Address on both machines.
John needs to change the Subnet Mask on both computers.
John needs to use a crossover cable instead of a straight through cable to connect the computers together.
Two computers cannot be directly connected to each other.

A

John needs to use a crossover cable instead of a straight through cable to connect the computers together.

If John used the Cable he usually uses to connect his Computer to a Switch, then it’s more than likely a Straight Through Cable (Connecting 2 Different Devices).

30
Q

A user calls into your help desk stating that he can access all of his Network files, but that he is unable to access the company webpage - http://www.example.com/. As a troubleshooting step, you ask the user to try to access the Web Page from http://10.0.0.1. The user states that he is able to pull up the Web Page using this Address.

Based on the information given, select the most-likely cause of the problem?

The DNS Address on the user’s computer is incorrect.
The user has configured an improper Subnet Mask
The Default Gateway on the user’s computer is misconfigured.
The HTTP Server is configured on the wrong port.

A

The DNS Address on the user’s computer is incorrect.

31
Q

Brian just graduated from his local community college in IT and started working for Adventure Works as an IT Technician. His new boss, Annie, decides to send him on a business trip to Seattle where he will help setup the computers in their new store.

When Brian arrives in Seattle, he immediately checks into his Hotel. He asks Erin, the Hotel Manager, if the Hotel has Internet Access. Erin tells Brian that the Hotel has both Wired and Wireless LAN connections available, which he may use to access the Internet for Free! Plus the Hotel will be expanding Internet connectivity to the pool area soon. Brian is thrilled that the Hotel provides Free Internet Access so that he can work at night, if necessary, to succeed in his first IT job.

When Brian connects a cable from his Laptop’s NIC into a RJ45 jack he is connected to the?

Wireless Lan
VLAN
Wired LAN

A

Wired LAN

32
Q

Kim is studying to become an animator at the Graphic Design Institute. Michael, Kim’s friend from class, asks Kim to study with him after class in the school’s computer lab.

When Kim arrives in the lab she sees that Michael has already started his laptop and is connected to the school’s Network. Kim starts her laptop and attempts to connect to the school’s Network when she realizes that she forgot her Wireless Card. Kim tells Michael that she’ll have to run home and get her Wireless Card. Michael tells her that she does not need to have her Wireless Card because she can connect directly to the Network.

Kim asks Michael to show her how and he pulls out a cable and starts connecting it to her laptop’s internal, wired NIC and explaining the steps.

What type of network is Kim trying to connect to?

LAN
PAN
WAN

A

LAN

33
Q

To verify that Kim’s NIC works, Michael pings 127.0.0.1, which is known as the?

Static Address
Dynamic Address
Loopback Address

A

Loopback Address

34
Q

You have just started up your computer logged into Windows. You attempt to access the Web with Firefox, but you receive an “Unable to connect” page in Firefox. You notice down by the clock that your usual network connection icon is showing a yellow sign with an exclamation point. You run an “ipconfig /all” command and receive the following information:

Ethernet adapter Ethernet:
Connection-specific DNS Suffix ……….. :
Link-local IPv6 Address …………………….. : fe80::a0fa:2745:728b:55be%12
Autoconfiguration IPv4 Address ………. : 169.254.85.190
Subnet Mask ……………………………………… : 255.255.0.0
Default Gateway ………………………………… :

Based on the output of the ipconfig command, which answer best describes the problem?

The Computer needs a new Wireless Adapter
The Default Gateway is missing, therefore no communication can happen between local or remote Hosts.
The Subnet Mask should be 255.255.255.0
The Computer cannot find a DHCP Server.

A

The Computer cannot find a DHCP Server.

35
Q

Match the following transfer methods with the proper corresponding speeds?

DSO
T1
T3
OC3

Options:
155.52 Mbps
64 Kbps
44.734 Mpbs
1.544 Mbps
A

DSO ———- 64 Kbps
T1 ————– 1.544 Mbps
T3 ————- 44.734 Mbps
OC3 ———- 155.52 Mbps

36
Q

Match each of the following Digital Signalling (DS) methods with it’s T-Carrier equivalent?

DS0
DS1
DS3

Options:
T3
T1
Does not have a T-Carrier equivalent.

A

DS0 —– Does not have a T-Carrier equivalent.
DS1 —— T1
DS3 —– T3

37
Q

Match the PORTS with Protocols?

HTTP
HTTPS
DNS
SMTP
POP3
FTP
TELNET
SSH
Options:
22
110
25
53
80
21
23
443
A
HTTP ---------- 80
HTTPS -------- 443
DNS ------------ 53
SMTP ---------- 25
POP3 ---------- 110
FTP ------------- 21
TELNET ------- 23
SSH ------------ 22
38
Q

Which device usually acts as a Default Gateway for a Network?

WAP
Switch
HUB
Router

A

Router

39
Q

Given the following device connections, select the proper cable type? (Some may be used more than once, some may not be used at all)

Computer to Computer
Computer to Switch
Switch to Switch
Router to Router
Switch to Router
Building to Building (10km apart)
Computer to Hub
Hub to Hub
WAP to Switch
Server to Switch
Options:
Rollover Cable
Multimode Fiber
Crossover Cable
Straight Through (PATCH) Cable
Singlemode Fiber
A

Computer to Computer ——————– Crossover
Computer to Switch ————————- Straight Through/Patch
Switch to Switch —————————— Crossover
Router to Router —————————— Crossover
Switch to Router ——————————- Straight Through/Patch
Building to Building (10km apart) ——– Singlemode Fiber
Computer to Hub —————————— Straight Through/Patch
Hub to Hub ————————————– Crossover
WAP to Switch ———————————- Straight Through/Patch
Server to Switch ——————————– Straight Through/Patch

40
Q

On which type of device would you usually configure a VLAN?

Router
Access Point
Hub
Switch

A

Switch

41
Q

What is the difference between a Wireless Router and a Wireless Access Point (WAP)?

There is no difference between the two.
One has an antennae, the other does not.
A Wireless Router is a multifunction device that routes packets, has multiple switch ports on the back, and allows clients to access the Network Wirelessly.
Only approved Wireless devices can connect to a Wireless Access Point, any Wireless device can connect to a Wireless Router.

A

A Wireless Router is a multifunction device that routes packets, has multiple switch ports on the back, and allows clients to access the Network Wirelessly.