Networking (3) Flashcards
Which of the following internet connection types offers the fastest download speed?
DSL
Fiber-optic
ISDN
Fiber-optic
Fiber-optic broadband Internet offers fast speeds (often in the 1 Gbps range) but is also the most expensive
Which TCP/IP protocol uses TCP ports 137-139 and 445 by default?
FTP
SSH
SMB
SMB
Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. It uses TCP ports 137–139 and 445
For IPv6, which of the following statements is true? (Choose two)
Each IPv6 interface can have only one address
Each IPv6 interface is required to have a link local address
IPv6 addresses are incompatible with IPv4 networks
IPv6 no longer uses broadcasts
Each IPv6 interface can have only one address
IPv6 addresses are incompatible with IPv4 networks
Each IPv6 interface can and often does have multiple addresses assigned to it. IPv6 is backward compatible with IPv4
Which of the following network architecture devices operate at Layer 1 of the OSI model? (Choose two)
Switch
Hub
Extender
Router
Hub
Extender
A hub is a device used to link several computers together. Hubs are simple devices that possess no real intelligence, and they work at Layer 1 of the OSI model. Extenders simply allow a signal to propagate for a longer distance, and they also work at Layer 1. Switches are Layer 2 devices, and routers work at Layer 3
Which TCP/IP protocol was developed by Apple and used to transfer files between computers?
FTP
AFP
ATP
AFP
The Apple Filing Protocol (AFP) was developed by Apple as a file transfer protocol similar to FTP and Server Message Block (SMB). It was the default file transfer protocol on MacOS until Apple changed to SMB2 in 2013
Which of the following IPv6 addresses is equivalent to 127.0.0.1 in IPv4?
::0
::1
::127
::1
127.0.0.1 is the loopback address, used to ping the local network interface. The IPv6 equivalent is ::1
A technician is configuring a wireless 802.1.1ac router for a home network. For security purposes, he enables the firewall. He wants to configure it so that if a computer makes an outbound request on a specific port, subsequent inbound traffic on that port would be allowed through the firewall. Which option does he need to configure to manage these settings?
Port forwarding
Port triggering
NAT
Port triggering
Port triggering allows traffic to enter the network on a specific port after a computer makes an outbound request on that specific port. For example, if a computer on your internal network makes an outbound Telnet request (port 23), subsequent inbound traffic destined for the originating computer on port 23 would be allowed through
Which networking device works at Layer 2 of the OSI model, has multiple ports in which each is its own collision domain, and examines the header of the incoming packet to determine which port it gets sent to?
Switch
Bridge
Router
Switch
Switches work at Layer 2, as do bridges, and they provide centralized connectivity just like hubs. Switches examine the Layer 2 header of the incoming packet and forward it properly to the right port and only that port. Switches are multiport bridges
A technician is going to set up a Wi-Fi network using standard omnidirectional antennae. Because of the building configuration, transmitting signals for the greatest distance is his primary criterion. Which standard should he choose?
- 1.1a
- 1.1g
- 1.1n
802.1.1n
Of the Wi-Fi standards, 802.11n has the longest range by default, at roughly 70 meters indoors and 250 meters outdoors. 802.11ac is newer and faster than 802.11n, but it transmits exclusively in the 5 GHz range, which restricts its functional distance
You are troubleshooting an intermittently failing CAT7 network connection. You suspect that there is a short in the connection. Which tool can you use to determine this?
Loopback plug
Multimeter
Crimper
Multimeter
Multimeters are versatile electronic measuring tools. A multimeter can measure voltage, current, and resistance on a wire
Which TCP/IP protocol gathers and manages network performance information using devices called agents?
SNMP
LDAP
SMB
SNMP
Simple Network Management Protocol (SNMP) gathers and manages network performance information. A management device called an SNMP server can be set up to collect data from these devices (called agents) and ensure that your network is operating properly
In which type of office environment would you perform a cable/DSL modern configuration?
Multiple buildings in a single country
Single tenant building with 300-500 employees
Small office or home office with 3-5 employees
Small office or home office with 3-5 employees
The cable/DSL modem is a popular choice for configuring Internet access for the small or home office environment. It utilizes existing phone lines and provides fairly reliable high-speed access. Most DSL subscriptions are asymmetrical, meaning they offer faster download speeds than upload speeds
Which Wi-Fi encryption standard was the first to include the use of a 128-bit dynamic per-packet encryption key?
WEP
WPA
WPA2
WPA
Wi-Fi Protected Access (WPA) was the first Wi-Fi encryption standard to implement the use of the Temporal Key Integrity Protocol (TKIP). Whereas WEP used a static 40- or 128-bit key, TKIP uses a 128-bit dynamic per-packet key. It generates a new key for each packet sent
You are installing an 802.1.1n Wi-Fi network with five wireless access points. The access points are set up so their ranges overlap each other. To avoid communications issues, what principle should you follow when configuring them?
Configure all access points to use the same channel
Configure all access points to use adjacent channels
Configure all access points to use nonoverlapping channels
Configure all access points to use nonoverlapping channels
When setting up wireless access points, it’s good practice to have their ranges overlap to ensure that there is no loss of communication when roaming in the network’s area. However, to avoid problems, it’s best to set up the access points with nonoverlapping channels
Which TCP/IP protocol is designed to send email from clients to mail servers?
SMTP
POP3
IMAP
SMTP
Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), and Internet Message Access Protocol (IMAP) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email
Youi have been asked to install a Wi-Fi network in a building that is approximately 100 meters long and 25 meters wide. Because of cost considerations, you will need to use 802.1.1g. At a minimum, how many wireless access points will you need?
Two
Three
Four
Three
The 802.11g standard has an indoor range of approximately 40 meters. At a minimum, you will need three access points. Depending on coverage and indoor interference, such as thick walls, you might need more though
You need to install a wireless hub in a drop ceiling where there is no access to a power source. Which technology will allow you to get power to that device?
Ethernet over power
Power over Ethernet
Wireless access point
Power over Ethernet
Power over Ethernet (PoE) allows you to power an Ethernet device (such as a switch) through one of the Ethernet ports. For it to work, the access point and the device it plugs into both need to support PoE. Further, both the access point and device need to be compatible with each other
Which of the following IP addresses is not a private address and therefore is routable on the internet?
- 18.31.54
- 168.38.155
- 168.38.155
172.168.38.155
The private IP address ranges are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. The address 172.168.38.155 is outside the private IP address range and is a public address
You are configuring a wireless 802.1.1n router. The office manager insists that you configure the router such that traffic from her computer receives higher priority on the network than other users traffic. Which setting do you need to configure to enable this?
QoS
UPnP
DMZ
QoS
Quality of Service (QoS) is a strategy that allows an administrator to control resources to maintain a certain service level. By using QoS, an administrator can set different priorities for one or more types of network traffic based on different applications, data flows, or users
If you are connecting to a website that encrypts its connection using TLS, what port does that traffic travel on?
80
143
443
443
To encrypt traffic between a web server and client securely, Hypertext Transfer Protocol Secure (HTTPS) can be used. HTTPS connections are secured using either Secure Sockets Layer (SSL) or Transport Layer Security (TLS). HTTPS uses port 443
What IoT device configuration requires a microphone? (Choose two)
Voice-enabled smart speaker
Light switches
Door locks
Voice-activated Digital assistant
Voice-enabled smart speaker
Voice-activated Digital assistant
Any IoT device which is voice-activated or voice-enabled requires hardware capable of listening for external audio cues, such as a microphone
Which wireless networking protocol is most limited by the number of potential connected devices?
LTE
Zigbee
Z-wave
Z-wave
The wireless networking protocol Z-wave is limited to just 232 total connected devices. By comparison, there is no concrete limit to how many devices Zigbee can connect. Long Term Evaluation (LTE) is a protocol stack, not a single wireless protocol
Which wireless networking protocol is expected to reach speeds of 1 Gbps?
3G
4G
5G
5G
The speed of wireless networking protocol 5G is expected to surpass 1 Gbps. The speed of 4G is considered reliable at 100 Kbps, only a tenth of 5G. Earliest of the options is 3G, which reaches speeds of 144 Kbps