Network + Practice Exam 2 Flashcards
- Which utility is shown in the following figure (portions of which have been obscured to prevent telegraphing the answer)?
❍ A. tracert
❍ B. arp
❍ C. ping
❍ D. netstat **NOTE: this question has image not present**
A. The tracert utility is used in Windows-based operating systems to trace the route taken to reach a particular host. This same functionality is provided in UNIX/Linux-based operating systems by traceroute. arp (Answer B) is used for resolving IP addresses to MAC addresses. ping (Answer C) tests if connectivity exists, whereas netstat (Answer D) displays protocol statistics and current TCP/IP network connections.
- You are the administrator for a company that has more than 200 Windows 7 workstations. You want to prevent each workstation from seeing other network computers and devices as well as prevent people on other network computers from seeing your workstations. Which setting must you turn off? ❍ A. MAN ❍ B. SAN ❍ C. Network discovery ❍ D. CRAN
C. Toggling off network discovery prevents the workstation from seeing other networked computers and devices as well as prevents people on other networked computers from seeing each workstation on which discovery is toggled off. A metropolitan area network, or MAN (Answer A), is a network that spans a defined geographic location, such as a city or suburb. A storage area network, or SAN (Answer B), is a network of storage disks. Answer D, CRAN, is a nonexistent choice.
- Most UNIX/Linux-based systems include the ability to write messages (either directly or through applications) to log files by using which utility with syslog? ❍ A. scribe ❍ B. master ❍ C. recorder ❍ D. logger
D. Most UNIX/Linux-based systems include the ability to write messages (either directly or through applications) to log files via syslog. This can be done for security or management reasons and provides a central means by which devices that otherwise could not write to a central repository can easily do so (often by using the logger utility). Answers A, B, and C are nonexistent utility choices.
- Which tool is shown in the following figure? Exam Questions 563 ❍ A. Voltmeter ❍ B. Micrometer ❍ C. Punchdown ❍ D. Event recorder **NOTE: this question has image not present**
C. Punchdown tools are used to attach twisted-pair network cable to connectors within a patch panel. Specifically, they connect twisted-pair wires to the insulation displacement connector (IDC). Answers A, B, and D are tools that are not shown in the figure.
- At what layer of the OSI model do time domain reflectometers operate? ❍ A. Session ❍ B. Presentation ❍ C. Application ❍ D. Physical
D. TDRs work at the physical layer of the OSI model, sending a signal through a length of cable, looking for cable faults. Answers A, B, and C are OSI layers above the physical layer and thus higher than that at which time domain reflectometers operate.
- Which switch is used with ipconfig to purge the DNS cache? ❍ A. /release ❍ B. /flushdns ❍ C. /purgedns ❍ D. /purge
B. The /flushdns switch is used with ipconfig to purge the DNS cache. The /release switch (Answer A) is used to release the IPv4 lease. The other options (Answers C and D) are not valid switches for use with ipconfig.
- Which utility is shown in the following figure (portions of which have been obscured to prevent telegraphing the answer)? ❍ A. ipconfig ❍ B. ifconfig ❍ C. nslookup ❍ D. nbtstat
C. nslookup is used to perform manual DNS lookups and is shown in the figure. The nbtstat utility (Answer D) is used to view statistics related to NetBIOS name resolution and to see information about current NetBIOS over TCP/IP connections. ipconfig (Answer A) is used to view and renew TCP/IP configuration on a Windows system, whereas ifconfig (Answer B) is its counterpart in the UNIX/Linux operating systems.
- Your boss returns from a conference and can’t stop talking about EUI-64, which he no doubt overheard other administrators discussing. What is he referring to? ❍ A. An IPv4 subnet mask ❍ B. The last 64 bits of an IPv6 address ❍ C. The MAC address ❍ D. The conference that he most likely attended
B. The last 64 bits of an IPv6 address are known as EUI-64 (Extended Unique Identifier, 64-bit). The other choices are incorrect (Answers A, C, and D) because EUI-64 is the last 64 bits of an IPv6 address.
- You’ve been summoned to a small law firm to help a client with networking issues that cropped up when it added a number of new workstations. The CIDR notation appearing in the documentation kept on site is 192.168.12.0/26. What is the range of IPv4 addresses that can be assigned to workstations? ❍ A. 192.168.12.1 to 192.168.12.255 ❍ B. 192.168.12.1 to 192.168.12.128 ❍ C. 192.168.12.1 to 192.168.12.62 ❍ D. 192.168.12.1 to 192.168.12.32
C. The IP addresses available beneath 192.168.12.0/26 range from 192.168.12.1 to 192.168.12.62. With 26 mask bits, only 62 hosts can exist on a subnet. The other choices are incorrect (Answers A, B, and D) because they do not represent the correct range of IPv4 addresses that can be assigned to workstations.
- Traffic is not being allowed through port 53 of the firewall. Which TCP or UDP protocol is associated with that port by default? ❍ A. IMAP ❍ B. RDP ❍ C. DNS ❍ D. DHCP
C. Port 53 is associated with DNS, by default. Port 3389, by default, is associated with RDP (Answer B), whereas port 143 is associated with IMAP (Answer A), and ports 67 and 68 are associated with DHCP (Answer D).
- Which command is shown in the following figure (portions of which have been obscured to prevent telegraphing the answer)? 564 Practice Exam 2 ❍ A. arp -d ❍ B. arp -a ❍ C. arp -s ❍ D. traceroute **NOTE: this question has image not present**
B. The –a option is used with arp to display entries in the routing table. The –d option (Answer A) is used to delete an entry, whereas –s (Answer C) is used to add an entry. traceroute (Answer D) is a UNIX/Linux utility for tracing the route from one host to another.
- Which layers of the OSI model match the Network Interface Layer of the TCP/IP model? (Choose all that apply.) ❍ A. Application ❍ B. Presentation ❍ C. Session ❍ D. Transport ❍ E. Network ❍ F. Data Link ❍ G. Physical
F and G. The network interface layer of the TCP/IP model matches the data link and physical layers of the OSI model in functionality. The other choices (Answers A, B, C, D, and E) are incorrect because they are OSI model layers other than those that match the network interface layer of the TCP/IP model.
- Which of the following are considered vulnerability scanners? (Choose all correct choices.) ❍ A. NMAP ❍ B. NESSUS ❍ C. OVAL ❍ D. BLACKHOLE
A and B. Both NMAP and NESSUS are considered vulnerability scanners. OVAL (Answer C) is a language and BLACKHOLE (Answer D) is a fictitious entity.
- IPv4 has automatic private IP addressing within the range beginning 169.254.0.0. What is the equivalent addressing in IPv6? ❍ A. There is not an equivalent. ❍ B. FFFF:: prefix ❍ C. 0000:: prefix ❍ D. FE80:: prefix
D. Within IPv6, the FE80:: prefix is equivalent to the 169.254.0.0 range (automatic private IP addressing) in IPv4. The other choices (Answers A, B, and C) are incorrect because the FE80:: prefix is equivalent to the 169.254.0.0 range in IPv4.
- What is the next step in the troubleshooting methodology after identifying the problem? ❍ A. Test the theory to determine the cause. ❍ B. Implement the solution or escalate as necessary. ❍ C. Establish a theory of probable cause. ❍ D. Document findings, actions, and outcomes.
C. The next step is to establish a theory of probable cause. The steps in the methodology are 1. Identify the problem, 2. Establish a theory of probable cause (Answer C), 3. Test the theory to determine cause (Answer A), 4. Establish a plan of action to resolve the problem and identify potential effects, 5. Implement the solution or escalate as necessary (Answer B), 6. Verify full system functionality and if applicable implement preventative measures, and 7. Document findings, actions, and outcomes (Answer D).
- Which of the following enables electrical power to transmit over twisted-pair Ethernet cable? ❍ A. PPPoE ❍ B. PoE ❍ C. MaMM ❍ D. EESR
B. Power over Ethernet (PoE) is a technology that enables electrical power to transmit over twisted-pair Ethernet cable. The power is transferred, along with data, to provide power to remote devices. These devices may include remote switches, wireless access points, VoIP equipment, and more. Answer A, PPPoE (Point-to-Point Protocol over Ethernet) is used for encapsulating frames and does not enable electrical power to transmit over Ethernet. The other options (Answers C and D) are fictitious choices.
- Which of the following can be used on the Internet to capture data traveling between computers? ❍ A. Registered jack ❍ B. NIDS ❍ C. NIPS ❍ D. Packet sniffer
D. A packet sniffer can be used on the Internet to capture data traveling between computers. A registered jack (Answer A) is a connector used with wiring. NIDS (Answer B) is a Network-based Intrusion Detection System, whereas NIPS (Answer C) is a Network-based Intrusion Prevention System.
- Which type of connector is used with coaxial cable? ❍ A. ST ❍ B. SC ❍ C. F ❍ D. MT-RJ
C. F-type connectors (which are screw-type connectors) are used with coaxial cable. ST (Answer A), SC (Answer B), and MT-RJ (Answer D) connectors are associated with fiber cabling.
- Which two of the following define types of wiring closets? (Choose two.) ❍ A. MDF ❍ B. BDF ❍ C. FDF ❍ D. IDF
A and D. Main Distribution Frame (MDF) and Intermediate Distribution Frame (IDF) define types of wiring closets. The main wiring closet for a network typically holds the majority of the network gear, including routers, switches, wiring, servers, and more. When multiple wiring closets are used, the main distribution frame (MDF) connects to secondary wiring closets or intermediate distribution frames (IDFs). The Building Distribution Frame, or BDF (Answer B), is the superset of which both MDF and IDF constitute. Answer C is incorrect because FSF is a nonexistent entity.
- Traffic is not being allowed through ports 67 and 68 of the firewall. Which TCP or UDP protocol is associated with those ports by default? ❍ A. IMAP ❍ B. RDP ❍ C. DNS ❍ D. DHCP
D. Ports 67 and 68 are associated with DHCP by default. Port 53 is associated with DNS (Answer C). Port 3389 by default is associated with RDP (Answer B), whereas port 143 is associated with IMAP (Answer A).
- Which of the following are link-state protocols? (Choose all that apply.) ❍ A. IGRP ❍ B. OSPF ❍ C. RIP ❍ D. IS-IS
B and D. Link-state protocols include Open Shortest Path First (OSPF) and Intermediate System-to-Intermediate System (IS-IS). Answer A, Interior Gateway Routing Protocol (IGRP), and Answer C, Routing Information Protocol (RIP), are examples of distance-vector protocols.
- Which utility is shown in the following figure (portions of which have been obscured to prevent telegraphing the answer)? Exam Questions 567 ❍ A. tracert ❍ B. arp ❍ C. ping ❍ D. netstat **NOTE: this question has image not present**
D. The netstat utility is used to view the current TCP/IP connections on a system. The tracert utility (Answer A) is used in Windows-based operating systems to trace the route taken to reach a particular host. arp (Answer B) is used for resolving IP addresses to MAC addresses. ping (Answer C) tests if connectivity exists.
- Which of the following refers to the connection point between the ISP’s part of the network and the customer’s portion of the network? ❍ A. loop ❍ B. rubicon ❍ C. demarcation ❍ D. DMZ
C. A network’s demarcation point refers to the connection point between the ISP’s part of the network and the customer’s portion of the network. A demilitarized zone, or DMZ (Answer D), is part of a network where you place servers that must be accessible by sources both outside and inside your network. The other choices (Answers A and B) are fictitious options.
- In a traditional crossover cable, which sets of wires are crossed? (Choose all correct answers.) ❍ A. 1 and 3 ❍ B. 2 and 6 ❍ C. 4 and 8 ❍ D. 5 and 7
A and B. In a traditional crossover cable, wires 1 and 3 and wires 2 and 6 are crossed. The other options (Answers C and D) are not correct wiring choices for a traditional crossover cable.
- Which of the following is a security protocol designed to provide centralized validation of users who attempt to gain access to a router or Network Access Server (NAS)? ❍ A. RDP ❍ B. AAA ❍ C. TACACS+ ❍ D. ASDM
C. Terminal Access Controller Access Control System+ (TACACS+) is a security protocol designed to provide centralized validation of users who attempt to gain access to a router or Network Access Server (NAS). RDP, Remote Desktop Protocol (Answer A), is a presentation layer protocol that supports traffic between a Windows Terminal Client and Windows Terminal Server. AAA (Answer B) represents the authentication, authorization, and accounting model. ASDM (Answer D) is incorrect because it is a fictitious choice.
- Which of the following is a digitally signed statement that associates the credentials of a public key to the identity of the person, device, or service that holds the corresponding private key? ❍ A. certificate ❍ B. record ❍ C. card ❍ D. ticket
A. A certificate is a digitally signed statement that associates the credentials of a public key to the identity of the person, device, or service that holds the corresponding private key. The other choices (Answers B, C, and D) are not correct names for a digitally signed statement associating the credentials of a public key to the identity of the person, device, or service holding the private key.
- To prevent intruders from gaining access to your live data, you have been instructed to create another server that may lure attackers in and allow you to catch them in the act. What type of server do you need to create? ❍ A. NAT ❍ B. DMZ ❍ C. ACL ❍ D. Honeypot
D. A honeypot is a site created to lure attackers in and hopefully allow you to catch them in the act. Network Address Translation, or NAT (Answer A), is a standard that enables the translation of IP addresses used on one network to a different IP address that is acceptable for use on another network. A demilitarized zone, or DMZ (Answer B), is part of a network where you place servers that must be accessible by sources both outside and inside your network. An Access Control List, or ACL (Answer C), is a list of trustees assigned to a file or directory. A trustee can be any object available to the security subsystem.
- Which of the following is a collection of software, standards, and policies combined to enable users from the Internet or other unsecured public networks to securely exchange data? ❍ A. Honeynet ❍ B. PKI ❍ C. X.509 ❍ D. X.503
B. A public key infrastructure (PKI) is a collection of software, standards, and policies that are combined to allow users from the Internet or other unsecured public networks to securely exchange data. A honeynet (Answer A) is an entire network set up to monitor attacks from outsiders. X.509 (Answer C) and X.503 (Answer D) are standards not related to the question being asked and thus incorrect choices.
- Which of the following is a security protocol designed to ensure privacy between communicating client/server applications? ❍ A. STFP ❍ B. TFTP ❍ C. IGMP ❍ D. TLS
D. TLS is a security protocol designed to ensure privacy between communicating client/server applications. STFP (Answer A) is a protocol for securely uploading and downloading files to and from a remote host. TFTP (Answer B) is a UDP-based protocol for file transfer that does not include security or error checking. IGMP (Answer C) provides a mechanism for systems within the same multicast group to register and communicate with each other.
- Which type of RAID implements disk striping with distributed parity? ❍ A. RAID 1 ❍ B. RAID 5 ❍ C. RAID 0 ❍ D. RAID 0 + 1
B. RAID 5, disk striping with distributed parity, requires a minimum of three disks—the total size of a single disk being used for the parity calculation. RAID 1 (Answer A) is a fault-tolerant standard that mirrors data between two disks to create an exact copy. RAID 0 (Answer C) requires a minimum of two disks, offers no fault tolerance and improves I/O performance. RAID 0 + 1 (Answer D) combines RAID levels 1 and 0.
- Traffic is not being allowed through port 143 of the firewall. Which TCP or UDP protocol is associated with that port by default? ❍ A. IMAP ❍ B. RDP ❍ C. DNS ❍ D. DHCP
A. Port 143 is associated with IMAP by default. Port 3389, by default, is associated with RDP (Answer B), whereas port 53 is associated with DNS (Answer C), and ports 67 and 68 are associated with DHCP (Answer D).
- Which of the following refers to the rate of data delivery over a communication channel? ❍ A. Cost ❍ B. Convergence ❍ C. Throughput ❍ D. Latency
C. In the networking world, throughput refers to the rate of data delivery over a communication channel. Cost (Answer A) is a value used to encourage or discourage the use of a certain route through a network. Convergence (Answer B) is the time it takes for the routers to detect and accommodate a change. Latency (Answer D) is the delay induced by a piece of equipment or device used to transfer data.
- Which of the following involves the use of multiple antennas to increase data throughput? ❍ A. MIMO ❍ B. HSPA+ ❍ C. LTE ❍ D. WiMAX
A. The use of multiple antennas to increase throughput is a part of MIMO (multiple-input and multiple-output). The other technologies given as options (Answers B, C, and D) do not apply to antennas.
- Which of the following defines specifications for the Logical Link Control (LLC)? ❍ A. 802.2 ❍ B. 802.3 ❍ C. 802.11 ❍ D. 802.5
A. 802.2, the LLC sublayer, defines specifications for the Logical Link Control (LLC) sublayer in the 802 standard series. 802.3 (Answer B) defines the carrier sense multiple access with collision detection (CSMA/CD) media access method used in Ethernet networks. 802.11 (Answer C) is the standard for wireless local area networks (WLAN), whereas 802.5 (Answer D) is associated with token ring networks.
- Which of the following protocols enable client systems to access and run applications on a remote system, using that system’s resources? (Choose all correct answers.) ❍ A. RDP ❍ B. PCN ❍ C. NCV ❍ D. ICA
A and D. The RDP and ICA protocols allow client systems to access and run applications on a remote system, using that system’s resources. Only the user interface, keystrokes, and mouse movement are transferred between the client and server computers. Answers B (PCN) and C (NCV) are fictitious choices and thus incorrect.
- Which key is a nonsecret key that forms half of a cryptographic key pair used with a public key algorithm and freely given to all potential receivers? ❍ A. Open ❍ B. Public ❍ C. Private ❍ D. Restricted
B. A public key is a nonsecret key that forms half of a cryptographic key pair that is used with a public key algorithm. The public key is freely given to all potential receivers. A private key is the secret half of a cryptographic key pair that is used with a public key algorithm. The private part of the public key cryptography system is never transmitted over a network. The other choices (Answers A, C, and D) are incorrect terms for the public key.
- Which of the following is true on a network that uses CSMA/CD? ❍ A. Nodes can be prioritized for access to the network media. ❍ B. No node is given direct access to the network media. ❍ C. Every node has equal access to the network media. ❍ D. Collisions cannot occur.
C. On a network that uses CSMA/CD, every node has equal access to the network media. The other options (Answers A, B, and D) incorrectly state the relationship for a network using CSMA/CD.
- What hardware is located at the demarcation point? ❍ A. AP ❍ B. Punchdown block ❍ C. Terminator ❍ D. Smart jack
D. You need some form of hardware at the demarcation point: This is the smart jack, also known as the Network Interface Device (NID). An AP (Answer A) is an access point for a wireless network. A punchdown block (Answer B) is a device used to connect network cables from equipment closets or rooms to other parts of a building. A terminator (Answer C) is a hardware component used to stop a signal.
- Traffic is not being allowed through port 443 of the firewall. Which TCP or UDP protocol is associated with that port by default? ❍ A. RDP ❍ B. HTTPS ❍ C. SSH ❍ D. SMTP
B. Port 443 is associated with HTTPS by default. Port 3389, by default, is associated with RDP (Answer A), whereas port 22 is associated with SSH (Answer C), and port 25 is associated with SMTP (Answer D).
- What is the primary purpose of PPTP? ❍ A. Routes data through multiple ports ❍ B. Enables you to disable the capability for traffic to pass through a port ❍ C. Creates a secure tunnel between two points on a network ❍ D. Looks for inappropriate activity and sends notification of any potential threats
C. PPTP creates a secure tunnel between two points on a network, over which other connectivity protocols, such as PPP, can be used. This tunneling functionality is the basis for VPNs. The other choices (Answers A, B, and D) do not state the primary purpose of PPTP.