Networking (2) Flashcards
You are configuring a wireless 802.1.1n router for a small network. When setting it up, which security option should you choose?
WPA2
WPA
WEP
WPA2
Of the wireless encryption methods listed, WPA2 is the newest and most secure. Some routers offer WPA2 Enterprise, which is a great choice as well
What type of network covers large geographical areas and often supports thousands of users?
WAN
PAN
MAN
WAN
A wide area network (WAN) covers large geographical areas and often supports thousands of users
Which TCP/IP protocol, developed by Microsoft, allows users to connect to remote computers and run programs on them?
RDP
SMB
CIFS
RDP
Developed by Microsoft, the Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. When you use RDP, you see the desktop of the computer you’ve signed into on your screen. It’s like you’re really there, even though you’re not
What port does the SSH protocol use?
21
22
23
22
Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. SSH uses port 22
Which of the following IP addresses is not routable on the internet?
- 1.1.1
- 1.1.1
- 1.1.1
10.1.1.1
Private IP addresses are not routable on the Internet. The private IP address range for class A networks is 10.0.0.0/8
Which network connectivity device does not forward broadcast messages, thereby creating multiple broadcast domains?
Switch
Bridge
Router
Router
One of the key features of routers is that they break up broadcast domains. Broadcast traffic on one side of the router will not get passed to the other side, which greatly reduces network traffic
You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to troubleshoot the network adapter?
Multimeter
Loopback plug
Cable tester
Loopback plug
A loopback plug is for testing the ability of a network adapter to send and receive. The plug gets plugged into the NIC, and then a loopback test is performed using troubleshooting software. You can then tell whether the card is working properly
Your company just expanded and is leasing additional space in an adjacent office building. You need to extend the network to the new building. Fortunately, there is a conduit between the two. You estimate that the cable you need to run will be about 300 meters long. What type of cable should you use?
CAT5
CAT7
MMF
MMF
UTP cables are limited to 100 meters, so CAT5 and CAT7 will not work. You need fiber, and multimode fiber (MMF) can span distances of 300 meters
You want to ensure that the clients computer can download email from external email servers, regardless of the protocol their email client uses. Which ports do you open on the firewall to enable this? (Choose two)
23
25
110
143
110
143
Simple Mail Transfer Protocol (SMTP, port 25), Post Office Protocol 3 (POP3, port 110), and Internet Message Access Protocol (IMAP, port 143) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email
You are installing network cabling in a highly secure facility. The cables needs to be immune to electronic eavesdropping. What type of cable should you use?
Fiber-optic
STP
Coaxial
Fiber-optic
Fiber-optic cabling uses pulses of light instead of electric voltages to transmit data, so it is immune to electrical interference and to wiretapping
Which networking device is capable of reading IP addresses and forwarding packets based on the destination IP address?
Switch
Bridge
Router
Router
Routers operate at the Network layer (Layer 3) of the OSI model. Because of this, they make their decisions on what to do with traffic based on logical addresses, such as an IP address
What type of network is most commonly associated with Bluetooth and covers a small area?
WAN
PAN
MAN
PAN
A personal area network (PAN) is a small-scale network designed around one person within a limited boundary area. The term generally refers to networks that use Bluetooth technology
Which TCP/IP internet layer protocol is responsible for resolving physical MAC addresses to logical IP addresses?
ICMP
ARP
RARP
RARP
At the Internet layer of TCP/IP, Address Resolution Protocol (ARP) resolves logical IP addresses to physical MAC addresses built into network cards. Reverse ARP (RARP) resolves MAC addresses to IP addresses
Which of the following IPv6 addresses is equivalent to an address in the 169.254.0.0/16 range in IPv4?
FC00::/7
FE80::/10
FF00::/8
FE80::/10
The 169.254.0.0/16 range in IPv4 is the APIPA range, used for automatic configuration if the host can’t locate a DHCP server. The same task in IPv6 is accomplished with a link local address in the FE80::/10 range
You need to configure a wireless router for an office network. The office manager wants new devices to be able to automatically join the network and announce their presence to other networked devices. Which service should you enable to allow this?
NAT
QoS
UPnP
UPnP
Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and to enable those devices to automatically announce their presence to other devices on the network
You are troubleshooting a computer with an IPv6 address that is in the FE80::/10 range Which of the following statements are true? (Choose two)
The computer will not be able to get on the internet
The computer will be able to get on the internet
The computer is configured with a link local unicast address
The computer is configured with a link global unicast address
The computer will not be able to get on the internet
The computer is configured with a link local unicast address
Addresses in the FE80::/10 range are link local unicast addresses. A link local address is assigned to each IPv6 interface but is not routable on the Internet. If this is the only address the host has, it will not be able to get on the Internet
You have set up your web server to function as an FTP server as well. Users on the internet complain that they are not able to access the server using FTP clients. What port are they trying to access the server on?
21
22
23
21
The File Transfer Protocol (FTP) is optimized for downloading files from servers. It uses port 21
Which TCP/IP port and protocol allows you to access data such as employee phone numbers and email addresses that are stored within a information directory?
25-SMTP
445-CIFS
389-LDAP
389-LDAP
The Lightweight Directory Access Protocol (LDAP) is a directory services protocol based on the X.500 standard. LDAP is designed to access information stored in an information directory typically known as an LDAP directory or LDAP database. This often includes employee phone numbers and email addresses
You are configuring network hosts with static IP addresses. You have chosen to use a class B network address. What is the default subnet mask that you should configure on the hosts?
- 0.0.0
- 225.0.0
- 255.255.0
255.225.0.0
The default subnet mask for class B networks is 255.255.0.0, or written in shorthand, /16
You are installing a new network and working in a wiring closet. You need to attach several network cables to a 110 block. Which tool should you use to perform this task?
Crimper
Cable stripper
Punchdown tool
Punchdown tool
If you’re working on a larger network installation, you might use a punchdown tool. It’s not a testing tool but one that allows you to connect (that is, punch down) the exposed ends of a wire into wiring harnesses, such as a 110 block
Of the following fiber connectors, which is used for duplex (two stands instead of one)?
ST
SC
FC
SC
The SC connector can be used for both single-mode and multimode, both in simplex and duplex. The RJ-11 is, of course, not a fiber connector
What twisted pair connectors are commonly found for telephone wire?
RJ-45
Coaxial
RJ-11
RJ-11
RJ-11 accommodates two pair of wires and is the standard household or office wired telephone connection. RJ-45 is the four pair connector used for twisted-pair Ethernet. Coaxial is a type of network cable and would have a BNC connector (with a locking mechanism) or an F-connector
Using the T568B wiring standard on both ends of a cable would produce what type of network cable?
T568B on ends is not a working network cable
T568B on ends is a crossover network cable
T568B on ends is a straight-through network cable
T568B on ends is a straight-through network cable
T568B on both ends is a straight-through network cable. If you have a T568A on one end and a T568B on the other, that is a crossover cable
What IoT device configuration most likely includes continuous remote monitoring?
Light switches
Security cameras
Door locks
Security cameras
While thermostats, light switches and door locks offer the feature of remote management, the security cameras would likely include continuous remote monitoring