NET+ Mobile App Flashcards
All of the following are Common Packets sent during the Normal DHCP process, EXCEPT?
DHCPPROVE
DHCPOFFER
DHCPACK
DHCPDISCOVER
DHCPPROVE
Of the following, which one is a proprietary Protocol from Cisco used to lessen administration in the Switched Network?
VNMP
VNMC
VTP
VCPN
VTP
Explanation:
VLAN Trunking Protocol (VTP)
You are installing a Wireless Network solution, and you require a standard that can operate using either 2.4 GHz or 5 GHz frequencies. The standard that you would choose is which of the following?
- 11b
- 11g
- 11a
- 11ac
- 11n
802.11n
Explanation:
- 11n = 2.4 GHz or 5 GHz
- 11a = 5 GHz
- 11b = 2.4 GHz
- 11g = 2.4 GHz
- 11ac = 5 GHz
The function of ARP is?
Resolves Hostnames to IP Addresses
Resolves MAC Addresses to IP Addresses
Resolves NetBIOS Names to IP Addresses
Resolves IP Addresses to MAC Addresses
Resolves IP Addresses to MAC Addresses
The Protocol that offers guaranteed delivery is which of the following?
POP
TCP
FTP
IP
TCP
During a discussion with your ISP’s technical support representative, he mentions that you might have been using the wrong FQDN. The TCP/IP basd network servce that he is referring to is which of the following?
WINS
DNS
DHCP
SNMP
DNS (Domain Name System)
Explanation:
DNS = Resolves Host Names to IP Addresses
Logical groupings of SNMP systems are known as?
Communities
Nodes
Mirrors
Pairs
Communities
Explanation:
Logical groupings of Systems are known as SNMP Communities.
Of the following, which ones are considered Transport Protocol? (Choose the Two Best Answers)
TCP
IP
THC
UDP
TCP
UDP
What is the main purpose of a Router?
It creates a Table of MAC Addresses
Sends Traffic from a Host on one Network to a Host on another Network
It acts as a Bridge between Two Switches
It uses a Routing Table to send data between Hosts on the Same Network
Sends Traffic from a Host on one Network to a Host on another Network
Which technology allows a Private Host to send data out to the Public Internet?
NAT
DHCP
EIGRP
NAS
NAT (Network Address Translation)
Which is a Port that FTP uses?
80
3389
143
20
20
Explanation:
FTP uses both 20 and 21
HTTP = 80
RDP = 3389 (Remote Desktop Protocol)
IMAP = 143
Which command is equivalent to Route Print?
netstat -a
show route
netstat -r
netstat -f
netstat -r
Which type of general Routing Protocol routes data between Autonomous Systems (AS)?
EGP
IGP
RIP
EIGRP
EGP (External Gateway Protocol)
A Switch can operate at which TWO OSI Layers? (Choose Two)
Layer 1 Layer 4 Layer 2 Layer 3 Layer 5 Layer 6
Layer 2 (Data Link) Layer 3 (Network)
DNS record that stores additional Hostnames, or Aliases, for Hosts in the Domain is which of the following?
ALIAS
CNAME
PTR
ALSO
CNAME
Explanation:
CNAME stores additional Hostnames, or Aliases for hosts in the Domain
There is NO ALSO or ALIAS Record
PTR is used for Reverse Lookups
A computer network in a defined area that links buildings and consists of various LANs within that limited geographical area is?
DAN
CAN
SAN
PAN
CAN (Campus-Area Network)
DNS record that is most regularly used to map Hostnames to an IP Address for a Host with IPv6 is which of the following?
MX
A
PTR
AAAA
AAAA
Explanation:
AAAA is used to map Hostnames to an IP Address for a Host with IPv6 address.
A Record is NOT used for this purpose.
MX identifies the Mail Exchanger.
PTR is used for Reverse Lookups
Of the following, which one does the NIST define as a composition of Two or more distinct cloud infrastructures?
Private Cloud
Hybrid Cloud
Community Cloud
Public Cloud
Hybrid Cloud
The Port that is associated with H.323 is which of the following?
636
3389
443
1720
1720
Explanation:
1720 is the Default Port for H.323
HTTPS uses Port 443
LDAPS uses Port 636
RDP uses Port 3389
Which type of wireless topology is regularly used to extend a Wired LAN to involve wireless devices?
Ad Hoc
Star Topology
Star Bus
Infrastructure
Infrastructure
Explanation:
Infrstructure Wireless Topology is regularly used to extend a Wired LAN to involve Wireless Devices.
Which of the following protocols uses Port 68 by Default?
DHCP
DNS
SMB
SMTP
DHCP
Explanation:
DHCP uses 67 and 68
DNS uses 53
SMB uses 445
SMTP uses 25
The term that is used for the number of hops necessary to reach a node is which of the following?
Link Stops
Connections
Hop Count
Jump List
Hop Count
The IPv6 equivalent of 127.0.0.1 are _____ and _____? (Choose Two)
::1
0:0:0:0:0:0:0:24
::24
0:0:0:0:0:0:0:1
::1
0:0:0:0:0:0:0:1
What is a WAN called when it is confined to a certain geographic area, such as a City?
LAN
VPN
MAN
VAN
MAN (Metropolitan-Area Network)
You are assigned a Class C Network Address. Which subnet masks will you use to create a Network with 8 Subnets, each with 30 Hosts?
- 255.255.128
- 255.255.240
- 255.255.224
- 255.255.192
255.255.255.224
Explanation:
You have to allocate 3 of the 8 bits in the last octet for Subnet identifiers to create a Network with 8 Subnets and 30 Hosts per Subnet. The result is a binary value of 1110000000 for the last octet in the Subnet Mask, which converts to a decimal value of 224.
Which Wireless Security standard expanded the initialization vector to 48 bits?
WEP
WPA
CCMP
WEP-PSK
WPA (WIFI Protected Access)
A Network with “Five Nines” of availability can have how many minutes of Downtime per year?
20 Minutes
15 Minutes
10 Minutes
5 Minutes
5 Minutes
Explanation:
Five Nines = 99.999% Availabile, ,means it’s down less than 5 minutes per year.
Six Nines = 99.9999% Available, means it’s down less than 30 seconds per year.
In which Network topology is the right to send messages passed around between devices?
Token Ring
Star Bus
Hybrid
Mesh
Token Ring
A Wireless Network is experiencing a Multipath problem. Which of these is the likely cause?
A metal file cabinet
Wrong SSID
A cordless phone.
Use of overlapping channels.
A metal file cabinet
Which of the following specifications identifies the cable television frequencies used for data transmission?
DOCSIS
TDM
HFC
DSLAM
DOCSIS
What is the name for the single-use value used in Cryptographic Algorithms like Wired Equivalent Privacy’s (WEP) RC4?
HMAC
IV
TKIP
MIC
IV
Two PCs are directly connected together with a straight-through cable but are unable to communicate. What is the problem?
The straight-through cable should be upgraded to a parallel cable.
The two PCs should be connected with a crossover cable.
The cable is defective.
The two PCs can’t be connected directly without a Switch or Hub in between them.
The two PCs should be connected with a crossover cable.
Which of the following is a type of Unshielded Twisted Pair (UTP) cabling capable of carrying gigabit Ethernet traffic?
CAT4
CAT5
CAT5e
CAT3
CAT5e
Of the following, which is a Service-Based model for Network Infrastructure?
HaaS
SaaS
PaaS
NaaS
NaaS (Network as a Service)
Which of the following is the Windows command that can display a list of the Source and Desitnation IP addresses for a PC’s existing connections?
netstat
arp
nbstat
ipconfig
netstat (network statistics)
You are working as a Network engineer. A client is complaining that many devices are not able to connect to the rest of the Network. Upon investigating, you find that a couple of devices are sending a nonstop flurry of broadcast frames. What problem is likely occuring in the CLient’s Network as a result of these excessive broadcast frames?
NIC Teaming misconfiguration
Broadcast Storm
Switching Loop
Decreased Bandwidth
Broadcast Storm
Of the following, which could end up being the result of nonstandard pinout creation in Network cabling?
Splitting pairs in a cable
Using a 110 block
Using a 66 block
Not using a punch-down tool
Splitting pairs in a cable
Of the following, which is the Layer that controls which terminals are sending and receiving?
Data Link
Application
Network
Physical
Data Link
What are the max transmission speed and usable distance of 10GBase-T?
10 Gbps, 250 Meters
10 Gbps, 10 Meters
10 Gbps, 100 Meters
10 Gbps, 150 Meters
10 Gbps, 100 Meters
Which of the following Domain Name System (DNS) records is used to provide authoritative information about a DNS Zone?
MX
CNAME
SOA
AAAA
SOA (Statement of Authority)
An organization’s Networking Team is designing a new Network. They need to ensure that the topology they choose is the one with the highest level of Redundency and Failover. Which Network topology should this Team choose?
Hub and Spoke
Full Mesh
Partial Mesh
Bus
Full Mesh
Which of the following uses an active or passive tag that stores data that can be read without line-of-sight?
NFC
IR
RFID
802.11
RFID (Radio Frequency Identification)
Of the following, which would NOT be considered a software troubleshooting tool?
ARP
Tone Probe
Port Scanner
Throughput Tester
Tone Probe
Of the following, which is the software that resides on a Host and seeks to protect that Host from a collection of well-known attacks?
NIPS
HIPS
PPTP
IDS
HIPS (Host-based Intrusion Prevention System)
What is the purpose of a Channel Service Unit/Data Service Unit (CSU/DSU)?
To terminate a leased line connection.
To act as a VPN endpoint for private Networks.
To provide secure WAN communications.
To route packets based on prefix addresses.
To terminate a leased line connection.
You want to manually implement traceroute using ping. Which ping flag would let you do so?
- i
- t
- S
- n
-i