Network+ N10-005 Flashcards

1
Q

Which routing protocol uses a composite metric of bandwidth and delay of the line to find the best path to a remote network

A

EIGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which command determines whether a particular IP host is responding

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You need your IP address, subnet mask, default gateway, and DNS information. What command will you type in from a Windows command prompt

A

ipconfig /all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which utility is used to view TCP/IP configuration for a computer

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which command will display the current contents of the ARP cache on the local workstation

A

arp -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which nbtstat switch displays a list of all the NetBIOS sessions currently active on the local workstation

A

nbtstat -s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network device that is used to connect multiple devices without segmenting a network is a

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Spanning Tree Protocol allows for redundancy of what networking device

A

Bridge (switch)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following can operate at both layers 2 and 3 of the OSI model
A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SMTP resides at which of the following layers of the OSI model

A

Applicaiton

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user their wireless 802.11g Internet connection is intermittently disrupted. Which of the following is the cause of the problem

A

Cordless phones and/or microwave ovens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which device helps to reduce collision domains

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which logical physical topology does 802.3 utilize
A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which wireless standard has a maximum data rate of 11Mbps

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What functionality does Kerberos provide

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What TCP/IP port numbers does FTP utilize

A

20 and 21. 20 is FTP data or a client, and 21 is an FTP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

At what layer of the OSI model does UDP reside

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Convert the following binary string to its dotted decimal address: 11000000.10101000.01100011.0001101

A

192.168.99.26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

100Base-TX uses how many pairs of Category 5 Unshielded Twisted Pair (UTP) cables

A

2 pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What device connects computers with wireless adapters to a network

A

Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Converting analog signals to digital signals and digital signals to analog signals can be done using what device

A

Modem. Dial up modems are rarely used today, but cable modems are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The maximum segment length for Ethernet is __________

A

100 meters (328 feet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the maximum speed of 802.11g

A

54Mbps (megabits per second)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following techniques would increase the bandwidth for network transmission by joining multiple connections into one logical connection

A

Bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

True/False: Firewalls are used to prevent packets from entering and leaving a network

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which device can never run full duplex

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A valid Media Access Control (MAC) address is how many bytes long

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What well-known port does Trivial File Transfer Protocol (TFTP) use

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In which OSI layer does a bridge operate

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An IT specialist is going to implement a packet filter on a network for Internet connections. What port must they allow through the firewall for users to connect to the Web

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is the point when local exchange carrier responsibility ends

A

Demarc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is a utility that translates the IP address to its physical network address

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Ethernet networking is known as a physical ______ topology

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is the default port for HTTPS

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

n the Media Access Control (MAC) address 00:B0:D0:6A:F2:B5, what does 00:B0:D0 identify

A

The manufacturer of the device, known as the OUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which network segments is located outside the firewall

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A network administrator needs to establish a remote connection to a client machine. Telnet is not secure because everything is sent in the clear. Which protocol and port number should be used instead

A

Secure Shell (SSH), port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

During certain hours of operation, network performance has noticeably slowed. What utility could be used to track the source of the bottleneck

A

traceroute/tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which command will produce the following output on a Unix box?\nEtho Link encap : Ethernet H\nWaddr: 00 :80 :C8 :D6 :74 :43\nInet adder : 4.150.6.3 Bcast : 4.255.255.255\nMask: 255.0.0.

A

ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

If a new network has just been installed but does not function correctly, and the hosts appear to be configured correctly, what command should be used FIRST to test basic connectivity

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The following output is from what diagnostic tool?\n 1. Router 1 (192.168.0.1) 2.0 ms 1.0 ms 2.0 ms\n2. Server.net.com (4.150.6.3) 18.0 ms 12.0 ms 32.0ms\n3. Lammle.com (2.12.14.1) 240 ms 120 ms 300 ms

A

traceroute/tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What fiber connector looks similar to an RJ-45 connector and connects two strands of fiber

A

Mechanical Transfer-Registered Jack (MT-RJ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What cable type is used to link together two buildings that are over 10 miles (16.09 kilometers) apart

A

single-mode fiber (SMF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the maximum CAT3 length acceptable for a horizontal cross-connect

A

100 meters (328 feet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

An optical time-domain reflectometer (OTDR) can be used to assess what

A

Fiber segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What level of the Open Systems Interconnect (OSI) model does a proxy server operate in

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What device is used to create a virtual local area network (VLAN)

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What utility is being used given the following output?\n Interface: 206.212.36.18 on Interface 1\nInternet Address Physical Address\n206.212.36.8 00-00-21-64-91-f2 Dynamic\n206.212.36.11 00-00-21-1b-4a-a7 Dynamic\n

A

arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Identify the Windows utility being used given the following output:\n Proto Local Address Foreign Address State\nTCP TLam:epmap TLam.tlam.com:0 Listenin

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What protocol creates a secure connection between a web browser and a web server

A

Secure Sockets Layer (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

True/False: If an administrator wants to set up an email server to exchange emails with other servers over the Internet, Simple Mail Transfer Protocol (SMTP) would be utilized

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which protocol allows usernames and passwords to be transmitted as clear-text

A

password authentication protocol (PAP), which has been replaced by CHAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

At what layer of the Open Systems Interconnect (OSI) model does a router function

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Simple Mail Transfer Protocol (SMTP) utilizes what well-known Transmission Control Protocol/Internet Protocol (TCP/IP) port number?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A technician pings 127.0.0.1 and gets the following result ‘Unable to contact IP driver, error code 2.’ What should you do now?

A

reinstall the TCP/IP protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

True/False: 172.192.4.256 is a valid Internet Protocol (IP) address

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What Open Systems Interconnect (OSI) layer converts digital data into electronic signals to be put on a wire

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

True/False: Internet Control Message Protocol (ICMP) is used for error reporting with Internet Protocol (IP)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which of the following WAN technologies uses thirty 64Kpbs channels

A

E-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What network hardware allows MOST traffic collisions?

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which system detects and reports attempts of unauthorized access to the network

A

IDS

62
Q

True/False: 32 bit is a valid Wired Equivalent Privacy (WEP) key

A

False

63
Q

True/False: 1000Mbps is known as 1000 terabytes per second.

A

False. It means gigabits per second.

64
Q

True/False: One of the purposes of a Virtual Local Area Network (VLAN) is to add more users

A

False, it is to break up broadcast domains

65
Q

Which device would administer routing in a network

A

Router, or layer-3 switch

66
Q

Which command line tools would be used to verify DNS functionality

A

Dig or nslookup

67
Q

True/False: If a network administrator needs to reduce the usage of certain web sites used between the company and the Internet, a proxy server should be implemented

A

True

68
Q

A technician is terminating a line that was extending an Ethernet jack to a wiring closet. Which hardware tool is necessary to complete the task

A

Punch-down tool

69
Q

Which is required to pass traffic from one VLAN to another

A

Router or layer-3 switch

70
Q

After using the nslookup command, which commands is used to determine the IP address of a company A’s mail server

A

set type=mx

71
Q

At what two layers of the Open Systems Interconnect (OSI) model does a packet-filtering firewall operate?

A

Network and Transport

72
Q

How many pairs are crossed in a crossover cable

A

Two

73
Q

True/False: The maximum speed of 802.11b is 54Mbps (megabits per second)

A

False

74
Q

True/False: The maximum speed of 802.11b is 11Mbps (megabits per second)

A

True

75
Q

Which documentation would a network administrator need to update if they have just finished upgrading the firmware on all switches within the LAN

A

Physical network diagram

76
Q

True/False: The number of wireless users will affect the range of an 802.11b Wireless Access Point (WAP)

A

False. It will affect the throughput but not the distance.

77
Q

True/False: 1000Base-CX is an Institute of Electrical and Electronics Engineers (IEEE) copper cable standard

A

True

78
Q

True/False: A MESH network has the least collision

A

True

79
Q

True/False: Mesh network topology uses the MOST cable of any physical topology

A

True

80
Q

True/False: 100Base-FX runs over Category 5e cable

A

False

81
Q

True/False: 100Base-FX runs over multimode fiber (MMF) optic cable

A

True

82
Q

What is the maximum cable type required for 100Base-TX

A

Category 5 Unshielded Twisted Pair (UTP)

83
Q

True/False: Using a Wireless Access Point (WAP), bridging an 802.3 network to an 802.11 network can be accomplished

A

True

84
Q

Which type of connector does a 10Base-F network use

A

Straight tip (ST)

85
Q

True/False: The 802.11b/g frequency band is 2.4GHz (gigahertz)

A

True

86
Q

Which protocol permits secure polling network devices

A

SMTPv3

87
Q

Which is a topology used in networks for its scalability

A

Star

88
Q

Which is part of the IP protocol suite and is used to monitor network managed devices?

A

SNMP

89
Q

A user is booting a workstation and receives a message that a duplicate IP address is in use on the network. Which command could be used to troubleshoot the problem

A

arp

90
Q

A technician is extending a data circuit to the other side of the building. Which would the technician set up at the new location

A

IDF

91
Q

Which is the best encryption protocol that the DoD says is unbreakable

A

AES

92
Q

Which encryption protocol or standard allows you to create a virtual subnet on an intranet

A

SSL VPN

93
Q

Which user-authentication method uses a public key and private key pair

A

PKI

94
Q

True/False: RIPv2 is a hybrid routing protocol

A

False

95
Q

True/False: RIPv1 is a Link State routing protocol

A

False

96
Q

Which two software types would be used for identifying an attack

A

IDS/IPS

97
Q

A client purchases a new wireless printer and wants to be able to bond it their PDA. Which technologies describes the type of wireless printer that was purchased

A

bluetooth

98
Q

True/False: Internet Protocol version 6 (IPv6) uses 128-bit addresses

A

True

99
Q

A technician has just finished implementing a solution for a network issue. What steps in should the technician do next?

A
  1. Document the issue and the solution that was implemented
100
Q

True/False: A denial of service (DoS) attack is meant to prevent users from accessing a system

A

True

101
Q

True/False: IP spoofing is the process of sending a packet with a fake source address, pretending that the packet is coming from within the network the hacker is trying to attack.

A

True

102
Q

Which routing protocols uses AS-Path as one of the methods to build the routing table

A

BGP

103
Q

A technician is troubleshooting a switch and has identified the symptoms. Which steps should the technician take next

A

Escalate the issue

104
Q

What kind of tool could a hacker use to intercept traffic on your network?

A

Packet sniffer

105
Q

.Remote users are having problems accessing files from a file server. Which should a technician check first?

A

Connectivity

106
Q

Which type of virus attacks executable application and system program files?

A

File virus

107
Q

Which monitoring software is used to view network at the frame level?

A

Packet sniffer

108
Q

A technician needs to truce a wire that is in the wall. Which is the best way for the technician to identify the wire’s location?

A

Tone Generator

109
Q

Which devices allows segregation of collision domains but not broadcasting domains?

A

Switches

110
Q

Which is the maximum transmission distance of 10GBase-LR?

A

6 miles

111
Q

Which layer of the OSI model does IPSec operate in?

A

Network (Layer 3)

112
Q

Which tools would be used to test the break in a fiber connection on the network?

A

OTDR

113
Q

True/False: A rogue access point is when a switch has been installed on a network without the administrator’s knowledge.

A

False. When an AP has been installed without permission.

114
Q

True/False: Phishing/social engineering refers to the act of attempting to illegally obtain sensitive information by pretending to be a credible source.

A

True

115
Q

What are the three main types of intruder detection and defense?

A

Active detection, passive detection, proactive defense

116
Q

What defines how security will be implemented in an organization, including physical security, document security, and network security?

A

Security policy

117
Q

Which authentication methods allows for domain level authentication on a wireless network?

A

RADIUS

118
Q

A company is in the process of upgrading their network infrastructure to support new VoIP telephony equipment. Which is a primary feature to consider when selecting a new switch to support the phones?

A

PoE

119
Q

True/False: A security procedure defines the appropriate response to a security event on your network.

A

True

120
Q

What are the three primary LAN topologies?

A

Bus, ring, and star, but we only use bus in today’s LANs.

121
Q

What common WAN topology often results in multiple connections to a single site, leading to a high degree of fault tolerance?

A

Mesh

122
Q

What is the term for a device that shares its resources with other network devices?

A

Server

123
Q

What network model draws a clear distinction between devices that share their resources and devices that do not?

A

Client/Server

124
Q

Which network topology or connection type can be implemented with only two endpoints?

A

Point-to-point

125
Q

Will a computer that shares no resources most likely be connected to the backbone or to a segment?

A

Segment

126
Q

Which LAN topology is characterized by all devices being daisy-chained together with the devices at each end being connected to only one other device?

A

Bus

127
Q

True/False: RIP is a vendor-neutral routing protocol that uses very little bandwidth but a lot of memory on a router.

A

False. Yes, RIP is vendor neutral, but it uses little router processing and a lot of bandwidth to do its job.

128
Q

True/False: OSPF is a hybrid routing protocol.

A

False

129
Q

True/False: EIGRP is used to update the ARP tables on a router.

A

False

130
Q

What does the acronym ICMP stand for?

A

Internet Control Message Protocol

131
Q

True/False: EIGRP is a classful routing protocol.

A

False

132
Q

True/False: EIGRP has a routing-protocol version that does not support IPv6.

A

False

133
Q

True/False: OSPF is a link-state protocol that supports VLSM and classless routing.

A

True

134
Q

True/False: RIPv1 is a Distance Vector protocol that does not support VLSM and supports only classful routing.

A

True

135
Q

What does the acronym IS-IS stand for?

A

Intermediate System-to-Intermediate System

136
Q

What does the acronym IDS stand for?

A

Intrusion Detection System

137
Q

What WAN protocol is described as residing in Layer 2.5 of the OSI model?

A

MPLS

138
Q

True/False: If you can ping a host, this does not mean it is 100% up and running.

A

True

139
Q

A network user enters http://www.comptia.org into their Internet web browser. What is the default port number for the Uniform Resource Locator (URL)?

A

80

140
Q

What is another name for the Media Access Control (MAC) address?

A

Physical address or hardware address

141
Q

Which LAN connection technology has a full duplex speed of 200Mbps and uses a CAT5e cable?

A

100Base-T

142
Q

What is the Internet Protocol version 4 (IPv4) loopback address?

A

127.0.0.1

143
Q

An Ethernet Media Access Control (MAC) address consists of how many bits?

A

48

144
Q

True/False: EIGRP uses hop count as a metric to determine the best path to a remote network.

A

False

145
Q

Why would you use dynamic routing over static routing?

A

Updates routing table automatically and scales to large newtorks

146
Q

True/False: OSPF can be used only on Cisco routers.

A

False

147
Q

True/False: DSL is used to connect hosts to an Ethernet hub.

A

False

148
Q

True/False: SDSL means that your download and upload speeds on the line are different.

A

False

149
Q

True/False: A link light is the small, usually red, LED on the back of a network card.

A

False

150
Q

True/False: ADSL means that the uplink and download speeds of a DSL link are the same.

A

False