Networking (3) Flashcards

1
Q

Which of the following internet connection types offers the fastest download speed?

DSL

Fiber-optic

ISDN

A

Fiber-optic

Fiber-optic broadband Internet offers fast speeds (often in the 1 Gbps range) but is also the most expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which TCP/IP protocol uses TCP ports 137-139 and 445 by default?

FTP

SSH

SMB

A

SMB

Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. It uses TCP ports 137–139 and 445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For IPv6, which of the following statements is true? (Choose two)

Each IPv6 interface can have only one address

Each IPv6 interface is required to have a link local address

IPv6 addresses are incompatible with IPv4 networks

IPv6 no longer uses broadcasts

A

Each IPv6 interface can have only one address

IPv6 addresses are incompatible with IPv4 networks

Each IPv6 interface can and often does have multiple addresses assigned to it. IPv6 is backward compatible with IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following network architecture devices operate at Layer 1 of the OSI model? (Choose two)

Switch

Hub

Extender

Router

A

Hub

Extender

A hub is a device used to link several computers together. Hubs are simple devices that possess no real intelligence, and they work at Layer 1 of the OSI model. Extenders simply allow a signal to propagate for a longer distance, and they also work at Layer 1. Switches are Layer 2 devices, and routers work at Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which TCP/IP protocol was developed by Apple and used to transfer files between computers?

FTP

AFP

ATP

A

AFP

The Apple Filing Protocol (AFP) was developed by Apple as a file transfer protocol similar to FTP and Server Message Block (SMB). It was the default file transfer protocol on MacOS until Apple changed to SMB2 in 2013

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following IPv6 addresses is equivalent to 127.0.0.1 in IPv4?

::0

::1

::127

A

::1

127.0.0.1 is the loopback address, used to ping the local network interface. The IPv6 equivalent is ::1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A technician is configuring a wireless 802.1.1ac router for a home network. For security purposes, he enables the firewall. He wants to configure it so that if a computer makes an outbound request on a specific port, subsequent inbound traffic on that port would be allowed through the firewall. Which option does he need to configure to manage these settings?

Port forwarding

Port triggering

NAT

A

Port triggering

Port triggering allows traffic to enter the network on a specific port after a computer makes an outbound request on that specific port. For example, if a computer on your internal network makes an outbound Telnet request (port 23), subsequent inbound traffic destined for the originating computer on port 23 would be allowed through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which networking device works at Layer 2 of the OSI model, has multiple ports in which each is its own collision domain, and examines the header of the incoming packet to determine which port it gets sent to?

Switch

Bridge

Router

A

Switch

Switches work at Layer 2, as do bridges, and they provide centralized connectivity just like hubs. Switches examine the Layer 2 header of the incoming packet and forward it properly to the right port and only that port. Switches are multiport bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technician is going to set up a Wi-Fi network using standard omnidirectional antennae. Because of the building configuration, transmitting signals for the greatest distance is his primary criterion. Which standard should he choose?

  1. 1.1a
  2. 1.1g
  3. 1.1n
A

802.1.1n

Of the Wi-Fi standards, 802.11n has the longest range by default, at roughly 70 meters indoors and 250 meters outdoors. 802.11ac is newer and faster than 802.11n, but it transmits exclusively in the 5 GHz range, which restricts its functional distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are troubleshooting an intermittently failing CAT7 network connection. You suspect that there is a short in the connection. Which tool can you use to determine this?

Loopback plug

Multimeter

Crimper

A

Multimeter

Multimeters are versatile electronic measuring tools. A multimeter can measure voltage, current, and resistance on a wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which TCP/IP protocol gathers and manages network performance information using devices called agents?

SNMP

LDAP

SMB

A

SNMP

Simple Network Management Protocol (SNMP) gathers and manages network performance information. A management device called an SNMP server can be set up to collect data from these devices (called agents) and ensure that your network is operating properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In which type of office environment would you perform a cable/DSL modern configuration?

Multiple buildings in a single country

Single tenant building with 300-500 employees

Small office or home office with 3-5 employees

A

Small office or home office with 3-5 employees

The cable/DSL modem is a popular choice for configuring Internet access for the small or home office environment. It utilizes existing phone lines and provides fairly reliable high-speed access. Most DSL subscriptions are asymmetrical, meaning they offer faster download speeds than upload speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which Wi-Fi encryption standard was the first to include the use of a 128-bit dynamic per-packet encryption key?

WEP

WPA

WPA2

A

WPA

Wi-Fi Protected Access (WPA) was the first Wi-Fi encryption standard to implement the use of the Temporal Key Integrity Protocol (TKIP). Whereas WEP used a static 40- or 128-bit key, TKIP uses a 128-bit dynamic per-packet key. It generates a new key for each packet sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are installing an 802.1.1n Wi-Fi network with five wireless access points. The access points are set up so their ranges overlap each other. To avoid communications issues, what principle should you follow when configuring them?

Configure all access points to use the same channel

Configure all access points to use adjacent channels

Configure all access points to use nonoverlapping channels

A

Configure all access points to use nonoverlapping channels

When setting up wireless access points, it’s good practice to have their ranges overlap to ensure that there is no loss of communication when roaming in the network’s area. However, to avoid problems, it’s best to set up the access points with nonoverlapping channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which TCP/IP protocol is designed to send email from clients to mail servers?

SMTP

POP3

IMAP

A

SMTP

Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), and Internet Message Access Protocol (IMAP) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Youi have been asked to install a Wi-Fi network in a building that is approximately 100 meters long and 25 meters wide. Because of cost considerations, you will need to use 802.1.1g. At a minimum, how many wireless access points will you need?

Two

Three

Four

A

Three

The 802.11g standard has an indoor range of approximately 40 meters. At a minimum, you will need three access points. Depending on coverage and indoor interference, such as thick walls, you might need more though

17
Q

You need to install a wireless hub in a drop ceiling where there is no access to a power source. Which technology will allow you to get power to that device?

Ethernet over power

Power over Ethernet

Wireless access point

A

Power over Ethernet

Power over Ethernet (PoE) allows you to power an Ethernet device (such as a switch) through one of the Ethernet ports. For it to work, the access point and the device it plugs into both need to support PoE. Further, both the access point and device need to be compatible with each other

18
Q

Which of the following IP addresses is not a private address and therefore is routable on the internet?

  1. 18.31.54
  2. 168.38.155
  3. 168.38.155
A

172.168.38.155

The private IP address ranges are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. The address 172.168.38.155 is outside the private IP address range and is a public address

19
Q

You are configuring a wireless 802.1.1n router. The office manager insists that you configure the router such that traffic from her computer receives higher priority on the network than other users traffic. Which setting do you need to configure to enable this?

QoS

UPnP

DMZ

A

QoS

Quality of Service (QoS) is a strategy that allows an administrator to control resources to maintain a certain service level. By using QoS, an administrator can set different priorities for one or more types of network traffic based on different applications, data flows, or users

20
Q

If you are connecting to a website that encrypts its connection using TLS, what port does that traffic travel on?

80

143

443

A

443

To encrypt traffic between a web server and client securely, Hypertext Transfer Protocol Secure (HTTPS) can be used. HTTPS connections are secured using either Secure Sockets Layer (SSL) or Transport Layer Security (TLS). HTTPS uses port 443

21
Q

What IoT device configuration requires a microphone? (Choose two)

Voice-enabled smart speaker

Light switches

Door locks

Voice-activated Digital assistant

A

Voice-enabled smart speaker

Voice-activated Digital assistant

Any IoT device which is voice-activated or voice-enabled requires hardware capable of listening for external audio cues, such as a microphone

22
Q

Which wireless networking protocol is most limited by the number of potential connected devices?

LTE

Zigbee

Z-wave

A

Z-wave

The wireless networking protocol Z-wave is limited to just 232 total connected devices. By comparison, there is no concrete limit to how many devices Zigbee can connect. Long Term Evaluation (LTE) is a protocol stack, not a single wireless protocol

23
Q

Which wireless networking protocol is expected to reach speeds of 1 Gbps?

3G

4G

5G

A

5G

The speed of wireless networking protocol 5G is expected to surpass 1 Gbps. The speed of 4G is considered reliable at 100 Kbps, only a tenth of 5G. Earliest of the options is 3G, which reaches speeds of 144 Kbps