Net+ Flashcards

1
Q

A network engineer is analyzing a specific network protocol. Which of the following are the principal functions of a network protocol? (Select all that apply.)

A.Addressing
B.Encapsulation
C.Network layer
D.Presentation

A

A+B
Addressing describes where data messages should go. At each layer, there are different mechanisms for identifying nodes and rules on how they can send and receive messages.

Encapsulation describes how the system should package data messages for transmission. Encapsulation is like an envelope for a letter, with the distinction that each layer requires its own envelope.

The network layer is the part of the OSI model which forwards information between networks by examining the destination network-layer address or logical network address.

The presentation layer of the OSI model transforms data between the format required for the network and the format required for the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A communications engineer notices that every time it rains the signal becomes very degraded. Which layer of the OSI model is the engineer most likely troubleshooting?

A.Physical
B.Data Link
C.Transport
D.Applicatio

A

A. Physical
The physical layer (PHY) of the OSI model (layer 1) is responsible for the transmission and receipt of the signals that represent bits of data from one node to another node. Wireless is one medium.

The data link layer (layer 2) is responsible for transferring data between nodes on the same logical segment.

At the transport layer on the sending host, the system packages data from the upper layers as a series of layer 4 protocol data units (PDUs), referred to as segments.

The application layer (layer 7) is at the top of the OSI stack. An application-layer protocol does not encapsulate any other protocols or provide services to any protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A systems administrator wants to ensure that port numbers are being appropriately assigned for each type of network application. What layer of the OSI model should the administrator be reviewing to ensure these actions are taken?

A.Network
B.Transport
C.Session
D.Application

A

B transport
At the transport layer on the sending host, the system packages data from the upper layers as a series of layer 4 protocol data units (PDUs). It is critical at this layer that all types of network applications be assigned the correct port number.

The network layer (layer 3) is responsible for moving data around a system of networks, known as an internetwork or the Internet.

The session layer (layer 5) represents functions that administer the process of establishing a dialog, managing data transfer, and then ending (or tearing down) the session.

The application layer (layer 7) is at the top of the OSI stack. An application-layer protocol does not encapsulate any other protocols or provide services to any protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A junior IT technician configures a purchased private computer network for a small bakery. What is a SOHO router considered to be once it is placed in the building?

A.IXP
B.PSTN
C.CPE
D.IANA

A

C. CPE
Customer premises equipment (CPE) is equipment owned, managed, and supported by the customer as it falls beyond the demarcation point.

The major infrastructure (or the backbone) of the Internet consists of high bandwidth trunks connecting Internet eXchange Points (IXPs).

The public switched telephone network is where the customer premise equipment connects to gain Internet access. Historically, a PSTN provided access by dial-up, but fiber and broadband have since replaced it.

Internet Assigned Numbers Authority (IANA) is an organization that manages the allocation of IP addresses and maintenance of the top-level domain space. Internet Corporation for Assigned Names and Numbers (ICANN) currently runs IANA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An application developer is attempting to troubleshoot issues with ASCII conversion for their application. At which layer of the OSI model are they troubleshooting?

A.Application
B.Session
C.Data link
D.Presentation

A

D.
The presentation layer of the OSI model transforms data between the format required for the network and the format required for the application.

The application layer (layer 7) is at the top of the OSI stack. An application-layer protocol does not encapsulate any other protocols or provide services to any protocol.

The session layer (layer 5) represents functions that administer the process of establishing a dialog, managing data transfer, and then ending (or tearing down) the session.

The data link layer (layer 2) is responsible for transferring data between nodes on the same logical segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network administrator configures a SOHO router for a small business. Which zone and IP address information is configured on the router for proper functionality for users to access all internal resources and the Internet?

A.Zone: private
Internal IP range 192.168.51.0/24
Zone: public
External IP 209.0.113.1

B.Zone: public
Internal IP range 149.167.1.0/24
Zone: private
External IP 20.0.11.1

C.Zone: private
Internal IP range 182.168.19.0/24
Zone: public
External IP 188.4.11.1

D.Zone: public
Internal IP range 192.168.6.0/24
Zone: private
External IP 212.8.1.9

A

A
For the SOHO router to function properly for both internal network communications and access to the Internet, a private zone would use a private IP address range (192.168. 0.0 to 192.168. 255.255.) while a public zone would use a public IP (198.20.0.0 - 223.255.255.255).

In this instance, the zone for an internal range should be private and use a private address range. The zones get flipped, and the internal range becomes a public range.

In this instance, the zones are acceptable, however, the internal IP range is a public range.

In this instance, the IP address configurations are acceptable, however, the zone types are flipped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security engineer configures software-based port security on a hardware firewall. Which OSI model layer identifies the application ports to configure?

A.Layer 1
B.Layer 2
C.Layer 3
D.Layer 4

A

D. Layer 4

The transport layer (layer 4) manages end-to-end communications. At layer 4, a port number identifies each application, such as 80 for hypertext transfer protocol (HTTP) web traffic.

Layer 1 (the physical layer) uses physical ports and cabling to connect and create a local area network.

Ethernet switching by using hardware-based media access control (MAC) addresses and wireless to wired bridging make use of physical layer adapters at layer 2.

At layer 3, the network layer, the routing part of the router (such as a SOHO router), makes forwarding decisions between the local private network and the public Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which networking component would connect to a SOHO router, operating at the first layer of the OSI model?

A.Wireless Access Point
B.RJ-45
C.Firewall
D.Internal bridge

A

B. RJ-45

This is a part of the router and represents the physical connection for Ethernet cables. It operates at the first layer (physical layer) of the OSI model.

A wireless access point allows nodes with wireless network cards to communicate and creates a bridge between wireless networks and wired ones and is found on layer 2 (data link).

The firewall in the router can be configured with rules specifying behavior for each port. This occurs in the fourth layer, the transport and application layer.

The access point in a router also wires to the Ethernet switch via an internal port. This forms a bridge that operates at layer 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A systems engineer configures IP addresses for a SOHO router. In doing so, the engineer uses calculations to determine addresses for two subnets. Which value does the engineer determine the binary value of 1010 relates to in hexadecimal?

A.A
B.0
C.FF
D.100

A

A. A
The character A is the hexadecimal representation of the decimal value of 10 and the binary value of 1010.

The value of 0 is a decimal value that corresponds to a hexadecimal value of 0 and also to the binary value of 0000.

The character FF is the hexadecimal value of 255 in decimal notation. This would sometimes be written as 0xFF for clarity. The binary representation is 11111111.

The hexadecimal value to match the binary value of 1010 is not 100, but rather 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A networking engineer is troubleshooting issues with a router. At which layer of the OSI model is the engineer troubleshooting?

A.Data link
B.Transport
C.Network
D.Session

A

C. Network

The main appliance working at layer 3 is the router. The network layer (layer 3) is responsible for moving data around a system of networks, known as an internetwork or the Internet.

The data link layer (layer 2) is responsible for transferring data between nodes on the same logical segment.

At the transport layer on the sending host, the system packages data from the upper layers as a series of layer 4 protocol data units (PDUs), referred to as segments.

The session layer (layer 5) represents functions that administer the process of establishing a dialog, managing data transfer, and then ending (or tearing down) the session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of fiber optic cable is suited for long distance links?

A

Single mode fiber (SMF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which fiber Ethernet standard is best suited to implementing backbone cabling that does not exceed 200 m (656 feet) and can achieve at least 4 Gbps throughput?

A

10GBASE-SR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which grade or grades of fiber have a 62.5 micron core?

A

OM1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You need to provision a fiber patch panel to terminate incoming cabling with green LC connectors. What type of ports should be provisioned on the patch panel?

A

Green connector color-coding indicates angled physical contact (APC) finishing. This type of finishing is incompatible with PC or UPC ports. The patch panel must be provisioned with Lucent Connector ports with APC finishing type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What maximum distance is defined in standards documentation for 1000BASE-LX running over MMF?

A

550 m (1804 feet). Note that 1000BASE-LX can run over MMF or SMF. SMF has much higher range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which types of distribution frames are best suited to 100 MHz or better operation?

A

110, BIX, and Krone blocks.

14
Q

What type of distribution frame is best suited to cabling wall ports to Ethernet switches in a way that best supports future changes?

A

A patch panel allows wall ports to be connected to switches via patch cords. If a switch is replaced or if a wall port needs to be connected to a different switch port, the change can be made easily by moving a patch cord.

15
Q

At what layer of the OSI model does a fiber distribution panel work?

A

All types of distribution frames work at the physical layer (layer 1).

16
Q

You need to provision modular SFP+ transceivers to support a 10 gigabit link between two switches using an existing fiber cable. What two characteristics must you check when ordering the transceivers?

A

Use an appropriate Ethernet standard and wavelength for the type and grade of fiber and link distance (10GBASE-SR versus 10GBASE-LR, for instance) and match the connector type of the existing cable (LC or SC, for instance).

17
Q

You have selected an SFP+ 1310 nm Tx and 1490 nm Rx transceiver to implement a BiDi link between two switches. Should you provision a second SFP+ 1310 nm Tx and 1490 nm Rx for the other switch?

A

No, you need an SFP+ module with 1490 nm Tx and 1310 nm Rx.

18
Q

what are the steps of the network troubleshooting methodology?

A
  1. Identify the problem:
    Gather information.
    Duplicate the problem, if possible.
    Question users.
    Identify symptoms.
    Determine if anything has changed.
    Approach multiple problems individually.
  2. Establish a theory of probable cause:
    Question the obvious.
    Consider multiple approaches.
    Top-to-bottom/bottom-to-top OSI model.
    Divide and conquer.
  3. Test the theory to determine cause:
    Once theory is confirmed, determine next steps to resolve problem.
    If theory is not confirmed, reestablish new theory or escalate.
  4. Establish a plan of action to resolve the problem and identify potential effects.
  5. Implement the solution or escalate as necessary.
  6. Verify full system functionality, and if applicable, implement preventive measures.
  7. Document findings, actions, and outcomes.
19
Q
A