My Knowledge Check Flashcards

1
Q

What two application layer protocols are used for browsing the Internet? (Choose two.)

(a) SMTP

(b) HTTP

(c) HTTPS

(d) POP3

A

HTTP & HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which wireless security technology is difficult to crack and provides encryption of network traffic?

(a) WEP

(b) WPA2

(c) MAC address filtering

(d) EAP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the description of the IP 240.2.6.255 address

(a) Public address

(b) Link-local address

(c) Experimental address

(d) Loopback address

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the description of the IP 127.0.0.1 address

(a) Public address

(b) Link-local address

(c) Experimental address

(d) Loopback address

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the description of the IP 169.254.1.5 address

(a) Public address

(b) Link-local address

(c) Experimental address

(d) Loopback address

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the description of the IP 198.133.219.2 address

(a) Public address

(b) Link-local address

(c) Experimental address

(d) Loopback address

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of device is able to create physical movement?

(a) actuator

(b) sensor

(c) RFID tag

(d) console

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

(a) application

(b) presentation

(c) session

(d) transport

(e) network

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which scenario describes a peer-to-peer network?

(a) Users access shared files from a file server.

(b) A user visits a webpage on the company web site.

(c) A user has shared a printer attached to the workstation.

(d) Users print documents from a network printer that has a built-in NIC.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What addresses are mapped by ARP?

(a) IPv4 address to a destination MAC address

(b) destination IPv4 address to the source MAC address

(c) destination IPv4 address to the destination host name

(d) destination MAC address to the source IPv4 address

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A home network is using NAT on the router connecting it to the internet. The PCs on the home network receive private IP addresses through DHCP. When a PC sends a packet to a web server on the internet, what is the source IP address in the packet header when it arrives at the web server?

(a) the private IP address assigned to the PC through DHCP

(b) a registered public IP address statically configured on the PC

(c) a registered public IP address assigned to the external router interface

(d) the broadcast IP address of the external network connecting to the ISP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)

(a) It eliminates most address configuration errors.

(b) It ensures that addresses are only applied to devices that require a permanent address.

(c) It guarantees that every device that needs an address will get one.

(d) It provides an address only to devices that are authorized to be connected to the network.

(e) It reduces the burden on network support staff.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which shortened address is an accurate representation of the IPv6 address 2001:0db8:0000:0000:ab00:0000:0000:0000?

(a) 2001:db8:0:0:ab00::

(b) 2001:db8::ab00::

(c) 2001:db8:0:0:ab::

(d) 2001:db8:0:ab00:0

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which information does a switch use to keep the MAC address table information current?

(a) the destination MAC address and the incoming port

(b) the destination MAC address and the outgoing port

(c) the source and destination MAC addresses and the incoming port

(d) the source and destination MAC addresses and the outgoing port

(e) the source MAC address and the incoming port

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which portion of the network layer address does a router use to forward packets?

(a) host portion

(b) broadcast address

(c) network portion

(d) gateway address

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are port numbers used in the TCP/IP encapsulation process?

(a) Source port numbers and destination port numbers are not necessary when UDP is the transport layer protocol being used for the communication.

(b) Source port and destination port numbers are randomly generated.

(c) If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

(d) Destination port numbers are assigned automatically and cannot be changed.

A
17
Q

Which two methods are used to directly connect mobile devices such as tablets and smartphones to a data network? (Choose two.)

(a) WiMax

(b) cellular communications

(c) Bluetooth

(d) wired Ethernet

(e) Wi-Fi

A
18
Q

What is the default SSID Broadcast setting on a wireless router?

(a) Enabled

(b) Disabled

(c) Auto

(d) Off

A
19
Q

Which two application layer protocols manage the exchange of messages between a client with a web browser and a remote web server? (Choose two.)

(a) DNS

(b) HTTP

(c) HTML

(d) DHCP

(e) HTTPS

A
20
Q

Which type of network cable is commonly used in backbone networks and telephone companies?

(a) coaxial cable

(b) fiber-optic cable

(c) twisted-pair cable

(d) shielded twisted-pair cable

A
21
Q

What are two reasons a network administrator might want to create subnets? (Choose two.)

(a) simplifies network design

(b) improves network performance

(c) easier to implement security policies

(d) reduction in number of routers needed

(e) reduction in number of switches needed

A
22
Q

Which type of device provides an Internet connection through the use of a phone jack?

(a) cable modem

(b) DSL modem

(c) satellite modem

(d) Wi-Fi AP

A
23
Q

A network technician attempts to ping www.example.net from a customer computer, but the ping fails. Access to mapped network drives and a shared printer are working correctly. What are two potential causes for this problem? (Choose two.)

(a) The Windows domain or workgroup name that is configured on the computer is incorrect.

(b) The target web server is down.

(c) The computer has been assigned a static IP address.

(d) DNS service is unavailable on the customer network.

(e) The HTTP protocol is not working properly on the target server.

A
24
Q

Which two options are examples of standalone text messaging clients? (Choose two.)

(a) IMAP

(b) VoIP

(c) Facebook messaging

(d) POP3

(e) WhatsApp

(f) SMTP

A
25
Q

What is a benefit of adding a router within an IP network?

(a) increases the size of the local network

(b) keeps broadcasts contained within a local network

(c) reduces the number of hosts that can connect to the network

(d) controls host-to-host traffic within a single local network

A
26
Q

Which two TCP header fields are used to confirm receipt of data? (Choose two.)

(a) FCS

(b) preamble

(c) checksum

(d) sequence number

(e) acknowledgment number

A