Networking (2) Flashcards

1
Q

You are configuring a wireless 802.1.1n router for a small network. When setting it up, which security option should you choose?

WPA2

WPA

WEP

A

WPA2

Of the wireless encryption methods listed, WPA2 is the newest and most secure. Some routers offer WPA2 Enterprise, which is a great choice as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of network covers large geographical areas and often supports thousands of users?

WAN

PAN

MAN

A

WAN

A wide area network (WAN) covers large geographical areas and often supports thousands of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which TCP/IP protocol, developed by Microsoft, allows users to connect to remote computers and run programs on them?

RDP

SMB

CIFS

A

RDP

Developed by Microsoft, the Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. When you use RDP, you see the desktop of the computer you’ve signed into on your screen. It’s like you’re really there, even though you’re not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What port does the SSH protocol use?

21

22

23

A

22

Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. SSH uses port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following IP addresses is not routable on the internet?

  1. 1.1.1
  2. 1.1.1
  3. 1.1.1
A

10.1.1.1

Private IP addresses are not routable on the Internet. The private IP address range for class A networks is 10.0.0.0/8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which network connectivity device does not forward broadcast messages, thereby creating multiple broadcast domains?

Switch

Bridge

Router

A

Router

One of the key features of routers is that they break up broadcast domains. Broadcast traffic on one side of the router will not get passed to the other side, which greatly reduces network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to troubleshoot the network adapter?

Multimeter

Loopback plug

Cable tester

A

Loopback plug

A loopback plug is for testing the ability of a network adapter to send and receive. The plug gets plugged into the NIC, and then a loopback test is performed using troubleshooting software. You can then tell whether the card is working properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your company just expanded and is leasing additional space in an adjacent office building. You need to extend the network to the new building. Fortunately, there is a conduit between the two. You estimate that the cable you need to run will be about 300 meters long. What type of cable should you use?

CAT5

CAT7

MMF

A

MMF

UTP cables are limited to 100 meters, so CAT5 and CAT7 will not work. You need fiber, and multimode fiber (MMF) can span distances of 300 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You want to ensure that the clients computer can download email from external email servers, regardless of the protocol their email client uses. Which ports do you open on the firewall to enable this? (Choose two)

23

25

110

143

A

110

143

Simple Mail Transfer Protocol (SMTP, port 25), Post Office Protocol 3 (POP3, port 110), and Internet Message Access Protocol (IMAP, port 143) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are installing network cabling in a highly secure facility. The cables needs to be immune to electronic eavesdropping. What type of cable should you use?

Fiber-optic

STP

Coaxial

A

Fiber-optic

Fiber-optic cabling uses pulses of light instead of electric voltages to transmit data, so it is immune to electrical interference and to wiretapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which networking device is capable of reading IP addresses and forwarding packets based on the destination IP address?

Switch

Bridge

Router

A

Router

Routers operate at the Network layer (Layer 3) of the OSI model. Because of this, they make their decisions on what to do with traffic based on logical addresses, such as an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of network is most commonly associated with Bluetooth and covers a small area?

WAN

PAN

MAN

A

PAN

A personal area network (PAN) is a small-scale network designed around one person within a limited boundary area. The term generally refers to networks that use Bluetooth technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which TCP/IP internet layer protocol is responsible for resolving physical MAC addresses to logical IP addresses?

ICMP

ARP

RARP

A

RARP

At the Internet layer of TCP/IP, Address Resolution Protocol (ARP) resolves logical IP addresses to physical MAC addresses built into network cards. Reverse ARP (RARP) resolves MAC addresses to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following IPv6 addresses is equivalent to an address in the 169.254.0.0/16 range in IPv4?

FC00::/7

FE80::/10

FF00::/8

A

FE80::/10

The 169.254.0.0/16 range in IPv4 is the APIPA range, used for automatic configuration if the host can’t locate a DHCP server. The same task in IPv6 is accomplished with a link local address in the FE80::/10 range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You need to configure a wireless router for an office network. The office manager wants new devices to be able to automatically join the network and announce their presence to other networked devices. Which service should you enable to allow this?

NAT

QoS

UPnP

A

UPnP

Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and to enable those devices to automatically announce their presence to other devices on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are troubleshooting a computer with an IPv6 address that is in the FE80::/10 range Which of the following statements are true? (Choose two)

The computer will not be able to get on the internet

The computer will be able to get on the internet

The computer is configured with a link local unicast address

The computer is configured with a link global unicast address

A

The computer will not be able to get on the internet

The computer is configured with a link local unicast address

Addresses in the FE80::/10 range are link local unicast addresses. A link local address is assigned to each IPv6 interface but is not routable on the Internet. If this is the only address the host has, it will not be able to get on the Internet

17
Q

You have set up your web server to function as an FTP server as well. Users on the internet complain that they are not able to access the server using FTP clients. What port are they trying to access the server on?

21

22

23

A

21

The File Transfer Protocol (FTP) is optimized for downloading files from servers. It uses port 21

18
Q

Which TCP/IP port and protocol allows you to access data such as employee phone numbers and email addresses that are stored within a information directory?

25-SMTP

445-CIFS

389-LDAP

A

389-LDAP

The Lightweight Directory Access Protocol (LDAP) is a directory services protocol based on the X.500 standard. LDAP is designed to access information stored in an information directory typically known as an LDAP directory or LDAP database. This often includes employee phone numbers and email addresses

19
Q

You are configuring network hosts with static IP addresses. You have chosen to use a class B network address. What is the default subnet mask that you should configure on the hosts?

  1. 0.0.0
  2. 225.0.0
  3. 255.255.0
A

255.225.0.0

The default subnet mask for class B networks is 255.255.0.0, or written in shorthand, /16

20
Q

You are installing a new network and working in a wiring closet. You need to attach several network cables to a 110 block. Which tool should you use to perform this task?

Crimper

Cable stripper

Punchdown tool

A

Punchdown tool

If you’re working on a larger network installation, you might use a punchdown tool. It’s not a testing tool but one that allows you to connect (that is, punch down) the exposed ends of a wire into wiring harnesses, such as a 110 block

21
Q

Of the following fiber connectors, which is used for duplex (two stands instead of one)?

ST

SC

FC

A

SC

The SC connector can be used for both single-mode and multimode, both in simplex and duplex. The RJ-11 is, of course, not a fiber connector

22
Q

What twisted pair connectors are commonly found for telephone wire?

RJ-45

Coaxial

RJ-11

A

RJ-11

RJ-11 accommodates two pair of wires and is the standard household or office wired telephone connection. RJ-45 is the four pair connector used for twisted-pair Ethernet. Coaxial is a type of network cable and would have a BNC connector (with a locking mechanism) or an F-connector

23
Q

Using the T568B wiring standard on both ends of a cable would produce what type of network cable?

T568B on ends is not a working network cable

T568B on ends is a crossover network cable

T568B on ends is a straight-through network cable

A

T568B on ends is a straight-through network cable

T568B on both ends is a straight-through network cable. If you have a T568A on one end and a T568B on the other, that is a crossover cable

24
Q

What IoT device configuration most likely includes continuous remote monitoring?

Light switches

Security cameras

Door locks

A

Security cameras

While thermostats, light switches and door locks offer the feature of remote management, the security cameras would likely include continuous remote monitoring