MTA 98-366 Exam Dump Flashcards

1
Q

One advantage of Dynamic Routing is that it?

Automatically maintains Routing Tables
Limits traffic derived from Routing Protocols.
Reduces broadcast traffic
Automatically enables DHCP

A

Automatically maintains Routing Tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following represents a Media Access Control (MAC) Address?

GV:ZC:KK:DK:FZ:CA

  1. 255.255.0
    05: 35:AB:6E:AL:25
  2. 0.0.1
A

05:35:AB:6E:AL:25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Connecting to a Private Network Address from a Public Network Requires?

Network Address Translation (NAT)
Dynamic Host Configuration Protocol (DHCP)
Network Access Protection (NAP)
Dynamic Domain Name System (DNS)

A

Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Network device that associates a Media Access Control (MAC) Address with a Port is a?

DSL Modem
Hub
Router
Switch

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Layer 2 device that connects multiple computers within a Network is a?

Repeater
Switch
Router
Packet

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A cable that meets the 1000BaseT standard has a maximum length of?

100m
250m
500m
1000m

A

100m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Router’s Static Route is set by the?

Adjacent Network
Next Upstream Router
Network Administrator
Routing Protocol

A

Network Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which setting is used to determine the Domain Name System (DNS) setting on a client computer?

Telnet
NSLOOKUP
Pathping
Netstat

A

NSLOOKUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The default Subnet Mask for a Class B Network is?

  1. 0.0.255
  2. 0.255.255
  3. 0.0.0
  4. 255.0.0
A

255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The default Port used for SMTP is?

23
25
80
8080

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The PING tool is used to (Choose Two)?

Determine the Network portion of a Host address.
Self-Test a Host’s own Network Interface.
Determine whether a Host is reachable.
Manage a Host’s session when UDP is used.

A

Self-Test a Host’s own Network Interface.

Determine whether a Host is reachable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are Features of DHCP? (Choose Two)

IP Address Resolution to canonical names.
Secure Shell connections
Address Reservation
Network File Transfer
IP Address Exclusion.
A

Address Reservation

IP Address Exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Command-Line tool used to list a Host’s active incoming connections is?

NETSTAT
IPCONFIG
NSLOOKUP
PING

A

NETSTAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A Computer that has an IP Address of 169.254.0.1 cannot access the Network. Which of the following Services should you confirm is available?

WINS
DNS
DHCP
TFTP

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Network does the IP Address 220.100.100.100 belong to?

  1. 100.100.0/24
  2. 100.100.1/24
  3. 255.255.0/24
  4. 255.255.1/24
A

220.100.100.0/24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which Subnet Mask is Valid?

  1. 255.255.240
  2. 255.255.228
  3. 255.255.164
  4. 255.255.245
A

255.255.255.240

The Subnets listed in the Question are from Class C.

Valid Masks in Class C:

  1. 255.255.0
  2. 255.255.128
  3. 255.255.192
  4. 255.255.224
  5. 255.255.240
  6. 255.255.248
  7. 255.255.252
  8. 255.255.254
  9. 255.255.255
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A Service that resolves NetBIOS Names to IP Addresses is?

Domain Name Service (DNS)
Internet Service Provider (ISP)
Address Resolution Protocol (ARP)
Windows Internet Name Service (WINS)

A

Windows Internet Name Service (WINS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of DNS Record Maps Host names to Addresses?

Mail Exchanger (MX) DNS Record
Service (SRV) DNS Record
Host (A) DNS Record
Canonical (CNAME) DNS Record

A

Host (A) DNS Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Teredo Tunneling is a Protocol that?

Translates Internet Protocol v4 (IPv4) to Internet Protocol v6 (IPv6).
Allows IPv6 Connectivity through IPv4 Devices.
Provides VPN Security
Dynamically allocates IPv6 Addresses.

A

Allows IPv6 Connectivity through IPv4 Devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the Default Subnet Mask for a Class C Internet Network?

  1. 255.255.252
  2. 255.2545.240
  3. 255.255.192
  4. 255.255.0
A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The Default Port used for Telnet is?

23
25
80
8080

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When a Client’s DHCP-issued Address expires, the Client will?

Select a new Address and request approval from the DHCP Server.
Require Manual Configuration with a Static IP Address
Attempt to obtain a New Address by Broadcasting
Continue to use the Address until it is notified to stop.

A

Attempt to obtain a New Address by Broadcasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You PING a server by using a Fully Qualified Domain Name (FQDN) and do not receive a response. You then PING the same server by using its IP Address and receive a response.

Why do you receive a response on the second attempt but not on the first attempt?

PING is improperly configured
The DNS is not resolving.
The DHCP Server is Offline
NSLOOKUP is Stopped

A

The DNS is not resolving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A Media Access Control (MAC) Address identifies a/an?

UPnP Device
Local Broadcast Domain
Network Interface Card (NIC)
Local Area Network (LAN)

A

Network Interface Card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Two Companies want to share data by using the Internet. Which type of Network provides that solution?

Ethernet
Intranet
Extranet
Perimeter

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

VPNs are implemented to provide?

A Secure Connection within a Private Network
A Secure Connection through Public Networks
Additional Encryption by using IPSec.
Additional Security for selected Computers.

A

A Secure Connection through Public Networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

If an 802.11g Internet connection has connectivity problems, what may be the cause?

A Cordless Phone
A Cellular Phone
Incandescent Lights
Electromagnetic Interference (EMI)

A

Electromagnetic Interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of these factors has the biggest impact on Data Transmission speed in a Wireless Network?

The Access method used for the Network.
The Transmission standard of the equipment used.
The use of Strong Encryption for Transmissions.
The Transmission wattage rating used on the NIC

A

The Transmission standard of the equipment used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following uses a Tunneling Protocol?

Internet
VPN
Extranet
VLAN

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A Network that separates an organization’s Private Network from a Public Network is a/an?

Firewall
Extranet
Perimeter
Internet

A

Perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which type of Network is most Vulnerable to Intrusion?

Dial-Up
Wireless
Broadband
Leased Line

A

Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Attenuation in a Wireless Network Signal is a result of?

Number of Wireless Nodes connected.
Distance from the Access Point
Interference from Cellular Phones
Encryption of the Signal.

A

Distance from the Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which type of Network covers the broadest area?

WAN
CAN
LAN
PAN

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In Local Area Network (LAN) Topologies, the primary media access methods are? (Choose Two)

Contention
Negotiation
Kerberos
Token Passing

A

Contention
Token Passing

Media contention occurs when two or more network devices have data to send at the same time. Because multiple devices cannot talk on the network simultaneously, some type of method must be used to allow one device access to the network media at a time. This is done in two main ways: carrier sense multiple access collision detect (CSMA/CD) and token passing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

In a Physical Star Topology, the Central Device is referred to as a ?

Bridge
Server
Segmenter
Hub

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What technology can you use to extend an internal Network across shared or public Networks?

VLAN
Microsoft ASP-NET
Microsoft .NET Framework
VPN

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which two are published IEEE 802.11 Wireless Transmission Standards? (Choose Two)

  1. 1 lf
  2. 11g
  3. 11k
  4. 11m
  5. 11n
A
  1. 11g

802. 11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What happens when an 802.11b node starts broadcasting within the range of an 802.11g Access Point?

The Access Point will transmit, but the node will be unable to receive.
A connection will be established
Both the node and the access point will be unable to transmit.
The node will transmit, but the Access Point will be unable to receive.

A

A connection will be established

Because b and g both have the same 2.4 GHz Frequencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which technology provides the highest bit rate?

T1
El
DS3
ISDN

A

DS3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A VPN is a/an?

Encrypted connection across the Internet.
Virtual Network within your Local Area Network (LAN).
Communication Tunnel between VLANs.
Personal Network for your use only.

A

Encrypted connection across the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following determines the Media Access method that is used in a Network?

Number of Hosts connected to the Network
Number of Domain Servers on the segment
Maximum Speed of the Media
Topology and Protocols

A

Topology and Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which wireless authentication method provides the highest level of Security?

Wired Equivalency Privacy (WEP)
IEEE 802.11n
WI-FI Protected Access (WPA)
IEEE 802.11a

A

WI-FI Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The Topology of a Local Area Network (LAN) is defined by the?

Number of Devices to Connect
Physical and Logical Characteristics
Distance between Workstations
Type of Cable being used.

A

Physical and Logical Characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

The max throughput of an 802.11g Network is?

2.4 GHz
54 GHz
2.4 Mbps
54 Mbps

A

54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A node within a Local Area Network (LAN) must have a Network Interface Device on a?

Network Account
Table of all network nodes
Host Address
Resource to Share

A

Host Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following is a Layer 2 WAN Protocol?

Point-to-Point Protocol (PPP)
Simple Network Management Protocol (SNMP)
Transmission Control Protocol (TCP)
Internet Protocol (IP)

A

Point-to-Point Protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which type of Port is used to support VLAN Traffic between two Switches?

Virtual Port
WAN Port
Trunk Port
LAN Port

A

Trunk Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The Protocol that maps IP Addresses to Media Access Control (MAC) addresses is?

Internet Message Access Protocol (IMAP)
Dynamic Host Configuration Protocol (DHCP)
Routing Information Protocol (RIP)
User Datagram Protocol (UDP)
Address Resolution Protocol (ARP)
A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A User reports that she cannot connect to Network resources from a computer on the Company Network. The User was able to connect to the Network Resources yesterday. You verify that the User’s Computer is properly physically connected to the Network. You discovery that the Computer’s IP Address is 169.254.48.97. You need to restore access to Network Resources. What should you do next?

Flush the Cache on the DNS Server
Reset the User’s Password on the Server
Check the Router’s current Routing Tables
Verify that the DHCP Service is available.

A

Verify that the DHCP Service is available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The Host Name of a Fully Qualified Domain Name (FQDN) mail.exchange.corp.nwtraders.com is?

corp
com
nwtraders
exchange
mail
A

mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

To which IP configuration does the CIDR Notation 192.168.1.1/25 refer?

  1. 168.1.1 – 255.255.255.64
  2. 168.1.1 – 255.255.255.1
  3. 168.1.1 – 255.2545.255.32
  4. 168.1.1 – 255.255.255.256
  5. 168.1.1 – 255.255.255.128
A

192.168.1.1 – 255.255.255.128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which command is used to Verify that a Server is connected to the Network?

IPCONFIG
ROUTE
PING
CHECK

A

PING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which of these represents the Internet Protocol Version 6 (IPv6) Loopback Address?

127.0.0.1
192.168.0.1
FEC0:A8C0::AA01
::1

A

::1 (For IPv6)

127.0.0.1 (For IPv4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which of these addresses is a Multicast Address?

  1. 0.0.1
  2. 254.0.1
  3. 168.0.1
  4. 0.0.1
A

224.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which of the following uses pointer records and A records?

IDS
DNS Server
NAT Server
IPS

A

DNS Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

The ipconfig command will?

Configure Routers
Display a Client’s Address
Display a Client’s Broadcast Mode
Configure DHCP Clients

A

Display a Client’s Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

One reason to incorporate VLANs in a Network is to?

Increase the number of available IP addresses.
Increase the number of available Media Access Control (MAC) addresses.
Reduce the number of Broadcast Domains.
Reduce the number of nodes in a Broadcast Domain.

A

Reduce the number of nodes in a Broadcast Domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which of these is an Application Layer protocol?

TCP
FTP
IP
UDP

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

The Top-Level Domain of www.adventureworks.com is?

www
adventureworks
adventureworks.com
com

A

com

60
Q

At what Layer in the OSI Model are hardware addresses referenced?

Network
Application
Data Link
Physical

A

Data Link

61
Q

You need to divide a Network into 3 Subnets. Which device should you use?

Hub
Bridge
Router
Segmenter

A

Router

62
Q

The Type of Connector used in a 100BaseT Ethernet cable is?

RJ-11
RJ-45
TNC
BNC

A

RJ-45

63
Q

In addition to Switching, Multilayer Switches also?

Provide Layer 3 Routing functions.
Interface with CAT3, CATS, CAT5e, and Fiber Optics.
Support 10mb, 100mb, and 1gb Local Area Network (LAN) ports.
Operate by using only Layer 1 and 2 Protocols.

A

Provide Layer 3 Routing functions.

64
Q

One reason to replace an unmanaged Switch with a Managed Switch is to?

Manage the Routing Tables
Support Multiple VLANs
Reduce Collision Domains
Route between Networks.

A

Support Multiple VLANs

65
Q

To directly connect the Ethernet Network Interface Cards (NICs) of two Computers, you should use a?

Crossover Cable
Straight Cable
Rollover Cable
Coaxial Cable

A

Crossover Cable

66
Q

The Function of a Router is to?

Provide IP Subnet Masks for Hosts
Forward Traffic to other Networks
Broadcast Routing Tables to Clients
Store tables for name resolution.

A

Forward Traffic to other Networks

67
Q

If a Router cannot determine the next hop for a Packet, the Router will?

Forward the Packet to the Default Route
Send the Packet back to the Packet’s source.
Broadcast the Packet
Store the Packet in the Memory Buffer

A

Forward the Packet to the Default Route

68
Q

In which physical Network Topology is each Computer connected to a Central Point?

Star
Mesh
Ring
Bus

A

Star

69
Q

Which two of the following are Connectivity options for Wide Area Networks (WANs)? (Choose Two)

Token Ring
Ethernet
Dial-Up
Leased Line

A

Dial-Up

Leased Line

70
Q

A Private Network that allows members of an organization to exchange data is an?

Extranet
Ethernet
Intranet
Internet

A

Intranet

71
Q

Security is a concern on Wireless Networks due to?

The Radio Broadcast Access Method
Spread Spectrum issues.
Frequency modulation issues.
The Potential for Cross-Talk.

A

The Radio Broadcast Access Method

72
Q

A Characteristic of the Mesh Topology is that it?

Uses a Central Hub
Cannot use Wired Connections
Uses redundant paths.
Cannot use Wireless Connections.

A

Uses redundant paths.

73
Q

To protect a Network when it is connected to the Internet, you should use a?

Bridge
Firewall
Switch
Router

A

Firewall

74
Q

One purpose of a Perimeter Network is to?

Make resources available to the Intranet
Link Campus Area Networks (CANs)
Link Local Area Networks (LANs)
Make resources available to the Internet.

A

Make resources available to the Internet

75
Q

Which protocol can be used to encrypt Packets on the Internet?

SNMP
HTTPS
TFTP
HTTP

A

HTTPS

76
Q

The Service that resolves Fully Qualified Domain Names (FQDN) to IP Addresses is?

Windows Internet Name Service (WINS)
Domain Name Service (DNS)
Internet Service Provider (ISP)
Address Resolution Protocol (ARP)

A

Domain Name Service (DNS)

77
Q

If a Router is installed so that it separates a DHCP Server from its Clients, the Clients will?

Immediately lose connectivity to all segments.
Be unable to obtain their Leases from the Server.
Immediately lose connectivity to the Local Segment.
Receive an immediate renewal of their Lease.

A

Be unable to obtain their Leases from the Server.

78
Q

Which of the following Services masks Internal IP Addresses from outside the Network?

DHCP
WINS
NAT
DNS

A

NAT

79
Q

The Query Protocol used to locate resources on a Network is?

User Datagram Protocol (UDP)
Lightweight Directory Access Protocol (LDAP)
Tracert
Telnet

A

Lightweight Directory Access Protocol (LDAP)

80
Q

Tracert is used to?

Manage Routing Tables dynamically.
Manage Session-Oriented connections between nodes.
Report the Route taken by Packets across an IP Network.
Report the shortest Route between different Networks

A

Report the Route taken by Packets across an IP Network.

81
Q

In which OSI Layer does Routing occur?

Transport
Network
Data Link
Physical

A

Network

82
Q

What type of Record does DNS use to find a Mail Service?

Service (SRV) DNS Record
Canonical (CNAME) DNS Record
Mail Exchanger (MX) DNS Record
Host (A) DNS Record

A

Mail Exchanger (MX) DNS Record

83
Q

The Default Gateway address identifies the?

Device that will connect the Computer to the Local Network.
Device that will connect the Computer to a Remote Network.
Server that will provide name services for the Computer
Server that will Authenticate the User of the Computer

A

Device that will connect the Computer to a Remote Network.

84
Q

How many Bits are there in an Internet Protocol Version 6 (IPv6) Address?

32
64
128
256

A

128

85
Q

Which of the following is a public IP Address?

  1. 156.89.1
  2. 24.78.221
  3. 16.152.48
  4. 168.25.101
A

68.24.78.221

Public Ranges:

  1. 0.0.0 ———– 9.255.255.255
  2. x.x.x ———- 126.255.255.255
  3. 0.0.0 ——- 169.253.255.255
  4. 255.0.0 — 172.15.255.255
  5. 32.0.0 —– 191.0.1.255
  6. 0.3.0 ——- 192.88.98.255
  7. 88.100.0 – 192.167.255.255
  8. 169.0.0 —- 198.17.255.255
  9. 20.0.0 —– 223.255.255.255
86
Q

What is the minimum cabling requirement for a 100BaseTX Network?

Category 3 UTP Cable
Category 5 UTP Cable
Category 6 UTP Cable
Multimode Fiber Cable

A

Category 5 UTP Cable

87
Q

Internet Key Exchange (IKE) is responsible for which two functions? (Choose Two)

Establishing Network speed parameters
Verifying the Client’s patch level
Negotiating algorithms to use.
Exchanging key information.

A

Negotiating algorithms to use.
Exchanging key information.

Internet Key Exchange (IKE) negotiates the IPSec security associations (SAs). This process requires that the IPSec systems first authenticate themselves to each other and establish ISAKMP (IKE) shared keys.

In phase 1 of this process, IKE creates an authenticated, secure channel between the two IKE peers, called the IKE security association. The Diffie-Hellman key agreement is always performed in this phase.

In phase 2, IKE negotiates the IPSec security associations and generates the required key material for IPSec. The sender offers one or more transform sets that are used to specify an allowed combination of transforms with their respective settings. The sender also indicates the data flow to which the transform set is to be applied. The sender must offer at least one transform set. The receiver then sends back a single transform set, which indicates the mutually agreed-upon transforms and algorithms for this particular IPSec session.

88
Q

This question requires that you evaluate the underlined text to determine if it is correct.

The process of replicating a zone file to multiple DNS Servers is called (Zone Replication).

Select the correct answer if the underlined text does not make the statement correct. Select “No Change is Needed” if the underlined text makes the statement correct.

Zone Transfer
Zone Synchronization
Start of Authority
No Change is Needed

A

Zone Transfer

DNS zone transfer, also sometimes known by the inducing DNS query type AXFR, is a type of DNS transaction. It is one of the many mechanisms available for administrators to replicate DNS databases across a set of DNS servers

89
Q

Which DNS record type specifies the Host that is the Authority for a given domain?

NS
MX
SNAM
SOA

A

SOA

The start of authority (SOA) resource record indicates the name of origin for the zone and contains the name of the server that is the primary source for information about the zone. It also indicates other basic properties of the zone.

90
Q

All session data is (encrypted) between all machines while using Telnet.

Select the correct answer if the underlined text does not make the statement correct. Select “No Change is Needed” if the underlined text makes the statement correct.

Not Encrypted
Encrypted between any Windows Machines
Encrypted only to any non-Windows machines
No Change is Needed

A

Not Encrypted

91
Q

Which protocol is a Transport Layer Protocol?

FTP
IP
UDP
ASCII

A

UDP

92
Q

The Four IEEE Standards, 802.11a, b, g, and n are collectively known as (Mobile Ad Hoc Networks)?

WiMAX
Bluetooth
WIFI
No Change is Needed

A

WIFI

93
Q

A University has Network Links between various locations. Where would a T3 connection be appropriate?

Server to Network in the main campus server room
Main campus to a large satellite campus
Computer lab PC to lab printer
Library laptop PCT to Internet.

A

Server to Network in the main campus server room

T3 lines are a common aggregation of 28 T1 circuits that yields 44.736 Mbps total network bandwidth . Besides being used for long-distance traffic, T3 lines are also often used to build the core of a business network at its headquarters

94
Q

You work at a Coffee Shop. Your supervisor asks you to help set up a Computer Network.
The Network needs to have the following items:
A Public Facing Web Server
A WIFI Network for Customer
A Private Network for the point of sale terminals.
An Office PC
A File/Print Server
A Network Printer
You need to set up a Perimeter Network to protect the Network.
Which two items should you include in the Perimeter Network? (Choose Two)

Network Printer
Web Server
File Server
WIFI Network
Point of Sale Terminals
A

Network Printer
Web Server

Put the web server and the network printer on the perimeter network.
The file server, wifi-network, and the Point of sale terminals should not be accessible from the internet.

Note: A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.

95
Q

Which two features of a Windows Server 2008 R2 Server should you install to use that Server as a Software Router? (Choose Two)

Network Policy and Access Services
Routing and Remote Access Services
Remote Administration
Direct Access

A

Network Policy and Access Services

Routing and Remote Access Services

96
Q

What are two characteristics of Fiber Optic Cable? (Choose Two)

Conducts Electricity
Requires metal conduit
Supports Splicing
Requires a policy for end connectors.

A

Supports Splicing
Requires a policy for end connectors.

C: A mechanical splice is a junction of two or more optical fibers that are aligned and held in place by a self-contained assembly (usually the size of a large carpenter’s nail).[1] The fibers are not permanently joined, just precisely held together so that light can pass from one to another.

D: Modern connectors typically use a “physical contact” polish on the fiber and ferrule end. This is a slightly convex surface with the apex of the curve accurately centered on the fiber, so that when the connectors are mated the fiber cores come into direct contact with one another.

97
Q

What Microsoft Network service can you use to establish a connection to a corporate LAN without any user action?

VPN
Remote Desktop
DirectAccess
Nap

A

DirectAccess

98
Q

A (secondary zone) is the first DNS zone to which all updates for the records that belong to that zone are written?

Primary Zone
Stub Zone
Conditional forwarding zone
No Change is Needed

A

Primary Zone

When a zone that this DNS server hosts is a primary zone, the DNS server is the primary source for information about this zone, and it stores the master copy of zone data in a local file or in AD DS.

99
Q

You are setting up a Network Computer game. You need to open up ports on your Firewall so your friends can join the Network. Which command displays the ports that your computer is listening for?

nslookup
nbtstat
ping
netstat

A

netstat

100
Q

When a Client Computer is unable to reach a DHCP Server, it will automatically assign an IP Address in the (10.0.0.0 - 10.0.0.255) Range?

127.0.0.0 - 127.0.0.255
169.254.0.0 - 169.254.255.255
192.168.100.0 - 192.168.100.255
No Change is Needed

A

169.254.0.0 - 169.254.255.255

101
Q

A Node within a Local Area Network (LAN) must have which two of the following? (Choose Two)

Username and Password
Share Name
NIC
IP Address
Table of All Network Nodes
A

NIC

IP Address

102
Q

A/an (Virtual Private Network (VPN)) protects a Network’s Perimeter by monitoring traffic as it enters and leaves?

Extranet
Firewall
Intranet
No Change is Needed

A

Firewall

103
Q

The Loopback Address of your computer is (127.0.0.1)?

10.0.1.1
169.254.0.5
192.168.1.1
No Change is Needed

A

No Change is Needed

104
Q

Which IEEE 802.11 WIFI Networking Standard requires Dual Antennas so it can run in all of its supported frequencies?

  1. 11a
  2. 11b
  3. 11g
  4. 11n
A

802.11n

105
Q

What is the Bit Rate for a North American T3 Circuit?

  1. 312 Mbps
  2. 736 Mbps
  3. 176 Mbps
  4. 352 Mbps
A

44.736 Mbps

106
Q

Which feature of Category 5e STP Cable reduces external interference?

Crosstalk
Shielding
Length
Twisting

A

Shielding

107
Q

What are 3 Advantages of VLANs? (Choose Three)

They can logically address packets by using IP
They require a Router to connect to VLANs on another Switch
They compartmentalize a Network and isolate Traffic.
They are efficient because a single Switch can implement only a single VLAN
They act as though they are on the same LAN regardless of Physical Location.

A

They require a Router to connect to VLANs on another Switch.
They compartmentalize a Network and isolate Traffic.
They act as though they are on the same LAN regardless of Physical Location.

VLANs provide the following advantages:
* (E) VLANs enable logical grouping of end-stations that are physically dispersed on a network. …
* VLANs reduce the need to have routers deployed on a network to contain broadcast traffic. …
* (C) Confinement of broadcast domains on a network significantly reduces traffic.
By confining the broadcast domains, end-stations on a VLAN are prevented from listening to or receiving broadcasts not intended for them.
* (B) If a router is not connected between the VLANs, the end-stations of a VLAN cannot communicate with the end-stations of the other VLANs.

108
Q

For which two reasons should you use IPSec between Computers? (Choose Two)

Data Compression
Data Integrity
Data Redundancy
Data Confidentiality

A

Data Integrity

Data Confidentiality

109
Q

Every Router today is (TCP/IP Enabled), which is an industry-standard protocol that you use on the Internet and for Local Addressing?

HTTP
FTP
SNMP
No Change is Needed

A

No Change is Needed

110
Q

You are home for vacation, and a family member wants your help to purchase and install Network Cable for a home office. The cable needs to support atleast 300 Mbps. What is the least expensive option that meets this requirement?

CAT3
CAT5
CAT5e
CAT6

A

CAT5e

111
Q

(WEP) wireless encryption is the most susceptible to interception and decryption?

WPA-AES
WPA2
WPA-PSK
No Change is Needed

A

No Change is Needed

112
Q

What is an example of a Network Device that associates a Network Address with a Port?

Switch
Router
Hub
DSL Modem

A

Router

113
Q

Which Wireless Communication problem is caused by Electromagnetic Waves?

Fading
Attenuation
Interference
Diffraction

A

Interference

114
Q

An Action Center Alert recommends that you enable Windows Firewall. After enabling the Firewall, you can no longer access Websites. Which Two TCP Ports should you add exceptions for on the Firewall? (Choose Two)

Port 21
Port 23
Port 25
Port 80
Port 443
A

Port 80

Port 443

115
Q

What are two advantages of using STAR Topology rather than Ring Topology in a Computer Lab workgroup? (Choose Two)

Failure of a Central connectivity device does not bring down the entire network.
A central connection point allows for flexibility and scalability
Data travels on redundant paths, so one cable cannot stop its transmission.
A cable problem within the group affects two nodes, at most.

A

A central connection point allows for flexibility and scalability
A cable problem within the group affects two nodes, at most.

116
Q

What are three characteristics of Ethernet Network Topology? (Choose Three)

It uses tokens to avoid collisions on the network.
It can us coaxial, Twisted Pair, and Fiber Optic media.
It comprises the largest share of the networks in place today.
It is a non-switching protocol.
It can negotiate different transmission speeds.

A

It can us coaxial, Twisted Pair, and Fiber Optic media.
It comprises the largest share of the Networks in place today.
It can negotiate different transmission speeds.

117
Q

Plain Old Telephone Service (POTS), most ISDN Lines, and Switched T1 Lines are all examples of (Message Switching)?

Circuit Switching
Packet Switching
FDDI Switching
No Change is Needed

A

Circuit Switching

118
Q

You suspect that your Internet Router’s DHCP Service is not functioning, so you check your Computer’s IP Address. Which address indicates that your Router’s DHCP Service is NOT functioning?

  1. 254.1.15
  2. 16.1.15
  3. 168.1.15
  4. 19.1.15
A

169.254.1.15

119
Q

Which of these is a Public Address space?

  1. 168.0.0/16
  2. 16.0.0/12
  3. 0.0.0/8
  4. 16.0.0/12
A

197.16.0.0/12

Public Address Ranges:

  1. 0.0.0 ———– 9.255.255.255
  2. x.x.x ———- 126.255.255.255
  3. 0.0.0 ——- 169.253.255.255
  4. 255.0.0 — 172.15.255.255
  5. 32.0.0 —– 191.0.1.255
  6. 0.3.0 ——- 192.88.98.255
  7. 88.100.0 – 192.167.255.255
  8. 169.0.0 —- 198.17.255.255
  9. 20.0.0 —– 223.255.255.255
120
Q

In a Wireless Network that requires SSL Certificate, (WEP) handles the SSL Certificate?

802.1x
WPA2-PSK
WPA-PSK
No Change is Needed

A

802.1x

This deployment scenario requires server certificates for each NPS server that performs 802.1X authentication.

121
Q

To set lower security settings in Internet Explorer for an Extranet Site, add the Site’s URL to the (Local Internet Zone)?

Internet
Trusted SItes
Extranet Sites
No Change is Needed

A

Trusted Sites

122
Q

You are helping a friend set up a Public-Facing Web Server for a home office. Your friend wants to protect the Internal Network from Intrusion. What should you do?

Set the Web Server in a Perimeter Network
Set the Web Server to block access on Ports 80 and 443.
Configure the Firewall to block access on Ports 80 and 443.
Set the IP Address of the Web Server to be within the LAN.

A

Set the Web Server in a Perimeter Network

123
Q

What are two characteristics of the CSMA/CD Access Method? (Choose Two)

It checks to see if a Collision has been detected.
It does a round robin search for requests to transmit from all nodes on the Network.
It signals its intent to transmit on the Network.
It waits until the Transmission medium is idle.

A

It checks to see if a Collision has been detected.

It waits until the Transmission medium is idle.

124
Q

What are two characteristics of a Mesh Network Topology? (Choose Two)

It is fault tolerant because of redundant connections.
Every node connects to every other node on the network.
It works best for Networks with a large number of nodes.
It requires less cabling than either a star or ring topology.

A

It is fault tolerant because of redundant connections.

Every node connects to every other node on the network.

125
Q

Which protocol is responsible for Automatically assigning IP Addresses?

HTTP
DHCP
DNS
WINS

A

DHCP

126
Q

According to the OSI Model, Encryption takes place in the (Transport) Layer?

Presentation
Network
Application
No Change is Needed

A

Presentation

127
Q

IPSec policies for two machines on a LAN can be modified by using the (IPSec policy snap-in) on Windows 7?

Windows Firewall with Advanced Security snap-in
LAN Adapter properties
Remote Access snap-in
No Change is Needed

A

Windows Firewall with Advanced Security snap-in

128
Q

An Address Resolution Protocol (ARP) Table is used to associate IP Addresses with (Host Names)?

MAC Addresses
HomeGroup Membership
Preferred Routers
No Change is Needed

A

MAC Addresses

129
Q

Which Network device interconnects Computers in a Workgroup, is able to be remotely configured, and provides the best throughput?

Unmanaged Switch
Hub
Router
Managed Switch

A

Managed Switch

130
Q

What is the max cable length for a single CAT5 UTP Cable run?

285 feet/86.87 meters
328 feet/99.97 meters
432 feet/131.67 meters
600 feet/182.88 meters

A

328 feet/99.97 meters

131
Q

Which of these Cable types transmits data the greatest distance?

Multi-Mode Fiber
Single-Mode Fiber
CAT5e
CAT6

A

Single-Mode Fiber

132
Q

What is a similarity between Layer 2 and Layer 3 Switches?

Both provide a high level of Security to the Network
Both use Logical Addressing to forward transmissions.
Both forward packets onto the Network
Both allow the implementation of VLANs

A

Both allow the implementation of VLANs.

A single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers; such a domain is referred to as a virtual local area network, virtual LAN or VLAN.
LANs are layer 2 constructs, so they can be supported by both Layer 2 and Layer 3 switches.

Incorrect:
Not A: Layer 2 switches do not provide high level of security.
Not B: Another name for logical address is IP address. Only Layer 3 switches uses IP address. Layer 2 switches uses MAC addresses.
Not C: only Layer 3 switches forward packets on the network (like routers).

133
Q

(Dynamic Routing) is Fault Tolerant?

Static Routing
Default Route
Least Cost Routing
No Change is Needed

A

No Change is Needed

134
Q

You need to run 4 Ethernet Network drops. Each drop is approximately 125/46.33 meters. An interference exists along the path of each drop. You need to ensure that interference is reduced. What cable type should you use?

STP CAT5e
UTP CAT5e
CAT3
UTP CAT6

A

STP CAT5e

135
Q

What is an example of a Layer 3 Device that connects multiple Computers and Networks?

Packet
Repeater
Switch
Router

A

Router

136
Q

Which metric does Routing Information Protocol (RIP) use to determine the least costly route?

Delay
Host ID
Hop Count
Interface

A

Hop Count

137
Q

What are two differences between Switches and Hubs? (Choose Two)

Switches are slower than Hubs because of the extra addressing functions that Switches perform.
Switches send data to all of the computers that are connected to them for efficiency.
Switches are capable of sending and receiving data at the same time.
Switches identify the intended destination of the data that they receive.

A

Switches are slower than Hubs because of the extra addressing functions that Switches perform.
Switches identify the intended destination of the data that they receive.

Hubs repeat everything they receive and can be used to extend the network.
Switches control the flow of network traffic based on the address information in each packet. A switch learns which devices are connected to its ports (by monitoring the packets it receives), and then forwards on packets to the appropriate port only. This allows simultaneous communication across the switch, improving bandwidth.

138
Q

What is the DNS Record type that specifies an Alias name of another Address Record?

MX
CNAME
NS
SOA

A

CNAME

CNAME stands for Canonical Name. CNAME records can be used to alias one name to another.

139
Q

Each IPv4 Address consists of a (MAC Address and a Data-Link Layer Address)?

Network ID and a Host ID
DNS Record and a Default Route
64-Bit Binary Number divided into Octets
No Change is Needed

A

Network ID and a Host ID

140
Q

The (NTP) value in a resource record indicates a length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it.

TTL
GPS
SOA RR
No Change is Needed

A

TTL

141
Q

What happens when an 802.11a node broadcasts within range of an 802.11g Access Point?

The Access Point transmits, but the node is unable to receive.
A Connection occurs
Both the node and the Access Point are unable to transmit.
The node transmits, but the Access Point is unable to receive.

A

The node transmits, but the Access Point is unable to receive.

(Because a and g operate on different Frequencies.
a = 5GHz
g = 2.4GHz

142
Q

Order the Layers of the OSI Model?

A
7 = Application
6 = Presentation
5 = Session
4 = Transport
3 = Network
2 = Data Link
1 = Physical
143
Q

Is the statement true? - Yes or No

21DA:D3:0:2F3B:2AA:FF:FE28:9C5A is a valid IPv6 unicast address?

FF80::2AA:FF:FE28:9C5A is a valid IPv6 Address?

21DA::02AA:::FF:FE28:9C5A is a valid IPv6 Address?

A

YES

YES

NO

144
Q

True or False?

IPSec can be used to secure Network communication between two machines?

IPSec can be used to secure Network communications between two Networks?

IPSec network traffic is always Encrypted?

A

True

True

False

145
Q

Match IP Addresses to corresponding IPv4 Address Class?

  1. 234.23.2
  2. 100.20.3
  3. 111.22.3
  4. 123.12.1
Options:
Class A
Class B
Class C
Class D
A
  1. 234.23.2 ———- Class B
  2. 100.20.3 ———- Class D
  3. 111.22.3 ———— Class C
  4. 123.12.1 ————– Class A
146
Q

Match the Protocol to the Description?

connection-less, message-based protocol with best-effort service.
connection-oriented protocol with guaranteed service.
resolves IP addresses to MAC addresses

Options:
TCP
ICMP
ARP
UDP
IGMP
A
UDP = connection-less, message-based protocol with best-effort service.
TCP = connection-oriented protocol with guaranteed service.
ARP = resolves IP Addresses to MAC addresses.
147
Q

Is the statement true? - Yes or No

The TCP/IP Model has 4 Layers, which correspond with the OSI Model’s 7 Layers?

The TCP/IP Application Layer corresponds with the Top 4 Layers of the OSI Model?

The TCP/IP Transport and Internet Layers correspond with Layers 3 and 4 of the OSI Model?

A

YES

NO

YES