Networking Concepts Flashcards

1
Q

You need to provide text console–based access to a server for administration. Which protocol will provide encrypted text console based access for the server?

Telnet

RDP

SSH

A

SSH

Secure Shell (SSH) is a cryptographic protocol that provides encrypted text console–based access over an IP network. It is commonly used to securely administer Linux servers. Telnet provides text-based access, but it is in clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which protocol is built into Microsoft servers for remote access purposes?

LDAP

Telnet

RDP

A

RDP

Remote Desktop Protocol (RDP) provides remote access to Microsoft servers for administration of the operating system. The RDP protocol redirects the keyboard, mouse, and monitor to the administrator’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which transport layer protocol provides assured delivery and retransmission of segments lost in transmission?

UDP

IP

TCP

A

TCP

The Transmission Control Protocol (TCP) provides sequenced and acknowledged segments. Because each segment is sequenced and acknowledged by the receiving computer, any segments lost in the delivery process will be re-requested at this layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You cannot reach a particular destination network and believe that one of the connecting networks are down. Which utility will allow you to examine the path packets are taking?

ping

tracert

NDP

A

tracert

The tracert utility will detail the path a packet is taking to get to a destination network. Tracert uses the ICMP protocol to report the path a packet takes to the destination network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which layer of the OSI does encryption and decryption occur on?

Application

Presentation

Session

A

Presentation

The presentation layer is responsible for encryption and decryption services. The presentation layer is also responsible for compression and decompression and translation services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Several of your users are complaining that the network slows down several times a day. You recently added a large number of clients to the immediate network. What should be done to reduce the impact of the additional hosts?

Create a single broadcast domain.

Create a single collision domain.

Create several broadcast domains.

A

Create several broadcast domains.

The addition of the clients added to the immediate network most likely raised the amount of broadcasts in the network. Although you could assign static IP addresses to all computers to reduce DHCP, ARP is still broadcast based. The recommended remedy is to create several broadcast domains with network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the normal maximum transmission unit (MTU) size for an Ethernet network?

1500 bytes

1548 bytes

9000 bytes

A

1500 bytes

The MTU of Ethernet is 1500 bytes, or 1518 bytes if you are including the source MAC address, destination MAC address, type field, and FCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You had captured network traffic with a network capture utility. Several of the MAC addresses are FF:FF:FF:FF:FF:FF. What could these packets be?

ICMP traffic

Broadcast traffic

Multicast traffic

A

Broadcast traffic

When a broadcast is sent, the destination MAC address will be FF:FF:FF:FF:FF:FF. This destination MAC address tells the switch to forward the traffic to all active ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to trunk two switches from two different vendors together. Which trunking protocol should you use?

ISL

  1. 1D
  2. 1Q
A

802.1Q

The 802.1Q protocol is an open standard trunking protocol. Inter-Switch Link (ISL) is another trunking protocol, but it can only be used on Cisco devices. Because your switches are from two different vendors, they are not both Cisco devices; therefore, 802.1Q must be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When calculating Spanning Tree Protocol (STP), which switch will always become the root bridge?

The switch with the highest priority

The switch with the lowest MAC address

The switch with the lowest priority

A

The switch with the lowest priority

When calculating STP, the switch with the lowest MAC address will become the root bridge if all of the priorities are set to the default. However, if the priority on a particular switch is lower than the others, it will always become the root bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have recently deployed several POE security cameras on a switch. You had chosen the switch because it met the power requirements of the cameras. However, several ports will not power up and you have now discovered that you are drawing too much power. Which option will quickly rectify the problem?

Purchase cameras with a lower power requirement.

Turn on POE+ support on the switch.

Turn on LLDP on the switch.

A

Turn on LLDP on the switch.

Link Layer Discovery Protocol (LLDP) and Cisco Discovery Protocol (CDP) communicate with neighboring devices and exchange power operating conditions. Turning on LLDP will quickly rectify the problem by adjusting power consumption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which routing type is best implemented in stub networks?

Default routing

RIP routing

Static routing

A

Default routing

Default routing is best implemented in stub networks, because all networks other than the immediate one are accessed through the default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are obtaining another Internet provider for your company’s connectivity to the Internet. You want to make sure that if there is a failure, the routing protocol will advertise your company’s IP addresses and fail over. Which routing protocol should you use?

RIPv2

OSPF

BGP

A

BGP

Border Gateway Protocol is used as an external routing protocol for the Internet. When two providers are connected to a single site using BGP, the connection can fail over in the case of one provider suffering an outage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which IPv6 address is not a valid address?

2001: 0db8:0:0:0:8d8:242:1
2001: 0db8::10e:0:12
2001: 0db8:45::10a::12

A

2001:0db8:45::10a::12

The IPv6 address of 2001:0db8:45::102::12 is not a valid IPv6 address. The double colon cannot be used twice in the IPv6 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of these IPv6 addresses is a multicast address?

fe80: 4e56:e423:0001:0045:a0aa:eb7c:9850
fc05: b44e:ce5d:1e67:73e5:7a3e:a86c:8a35
ff03: 0340:508e:e0ee:e2be:3cec:abd8:e24b

A

ff03:0340:508e:e0ee:e2be:3cec:abd8:e24b

The IPv6 address of ff03:0340:508e:e0ee:e2be:3cec:abd8:e24b is a multicast address. Multicast addresses always start with FF as the first two digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which quality of service (QoS) method is used at layer 2 of the OSI?

802.1Q

ToS

CoS

A

CoS

The Class of Service (CoS) marking is a 3-bit field in the 802.1Q trunk frame. This 3-bit field contains 8 possible queues for QoS at layer 2

17
Q

You have two different routers in your network, each by a different vendor. You need to provide high availability for the default gateway in your networks. What should you implement to provide high availability in the event of a router going down for maintenance?

RSTP

VRRP

HSRP

A

VRRP

The Virtual Router Redundancy Protocol (VRRP) is a First Hop Redundancy Protocol (FHRP) used for providing high availability of the default gateway. Because you have two different vendors, you must use VRRP since it is an open standard and Hot Standby Router Protocol (HSRP) is a Cisco proprietary protocol for FHRP

18
Q

Which of the following IP and CIDR mask combinations is not valid for IP addressing of a host computer?

  1. 168.20.37/28
  2. 44.26.128/25
  3. 54.22.72/29
A

208.44.26.128/25

The IP address of 208.44.26.128/25 is not a valid IP address. The /25 CIDR mask create two subnets of 208.44.26.0/25 and 208.44.26.128/25. The IP address of 208.44.26.128/25 is the network address of the second subnet and therefore cannot be used for IP addressing

19
Q

Which Internet of Things (IoT) wireless connectivity operates on the 900 MHz ISM band?

ANT+

Z-wave

Bluetooth

A

Z-wave

The Z-wave IoT wireless protocol operates in the United States on 908.42 MHz and in Europe it operates on 868.42 MHz

20
Q

Which wireless standard first introduced channel bonding?

  1. 11n
  2. 11ac
  3. 11g
A

802.11n

The 802.11n wireless standard introduced channel bonding. The 802.11n standard allows for the bonding of up to two channels to provide a 40 MHz channel

21
Q

Which cellular standard was developed by the European Telecommunications Standards Institute (ETSI)?

TDMA

CDMA

GSM

A

GSM

The Global System for Mobile Communications (GSM) was developed by the European Telecommunications Standards Institute (ETSI) and is now used globally

22
Q

Which three wireless channels on 2.4 GHz wireless are nonoverlapping?

1, 3, and 9

1, 9, and 11

1, 6, and 11

A

1, 6, and 11

The 2.4 GHz wireless band has three nonoverlapping channels of 1, 6, and 11. Although they overlap with other channels, these three channels do not overlap between themselves

23
Q

Hosting a disaster recovery (DR) site on Microsoft Azure is an example of which National Institute of Standards and Technology (NIST) type of cloud service?

IaaS

DRaaS

PaaS

A

IaaS

The National Institute of Standards and Technology (NIST) defines three cloud types of: Platform as a Service (PaaS), Software as a Service (SaaS), and Infrastructure as a Service (IaaS). A DR site hosting at a cloud provider is an example of IaaS. Although DRaaS can be used as a term to advertise a type of cloud service, it is not defined by NIST as a type of service

24
Q

You need to make sure that a printer is configured with the same IP address every time it is turned on. However, the printer is too troublesome to configure a static IP address. What can be done to achieve the goal?

Configure an A record for the printer in DNS.

Configure a DHCP exclusion for the printer.

Configure a DHCP reservation for the printer.

A

Configure a DHCP reservation for the printer.

A DHCP reservation will allow for the printer to obtain the same IP address every time it is turned on. The DHCP server will serve the same IP address to the printer based on the printer’s MAC address in the reservation