Networking Reviewer Flashcards

Reviewer

1
Q

What media type is least susceptible to external interference including EMI and RFI?

A

Fiber Optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

On a wireless router, what is an SSID?

A

The broadcast ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the reason to incorporation VLANs into a network?

A

To reduce the number of nodes in a broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two characteristics of VLANs

A

To compartmentalizes a network and isolates traffic.

VLANs act as though they are on the same LAN regardless of physical location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The fiber network connection between Building A and Building B is 550 meters. There is attenuation on the
line. Which tool should you use to test this?

A

Optical Time-Domain Reflectometer (OTDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What network element uses a tunneling protocol to encapsulates data for transmission?

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are a network administrator at a small business. One morning at the start of business, you realize that no
employees at the company can access external websites. However, all employees have the same intranet connected
by a single router. You need to troubleshoot the problem. Which two actions should you complete? (Choose 2.)

Choice of answers:

A. Check the router for proper physical connectivity.
B. Check that each computer has a valid IP address.
C. Contact the internet service provider.
D. Check for bad network adapters on individual computers

A

A. Check the router for proper physical connectivity.

C. Contact the internet service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A client-server network has centralized administration. (T or F)
A client-server network requires each computer to share its resources.
(T or F)
A client-server network requires users to have a user account on every computer they need to use. (T or F)

A

TFF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an advantage of dynamic routing?

A

It automatically maintains routing tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are proprietary protocols?

A

Protocols developed by organizations who have control over their definition and operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of port supports VLAN traffic between two switches?

A

Trunk port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a justification for using ST cable instead of UT cable to wire a network expansion?

A

You are routing cables through an area with high external interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two characteristics of mesh network topology?

A

Every node connects to every other node on the network.

It is fault tolerant because of redundant connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A computer is connected to a switch through a network patch panel by using copper cable. The computer is
getting lower-than expected data speeds. Which two actions should you perform to identify the issue? (Choose 2.)

Choice of answers:
A. Search for broken wires in the cable by using a cable tester.
B. Tone the line from Unit A to Unit B.
C. Use an optical time-domain reflectometer (OTDR) to test the line.
D. Test the data speed of the cable.

A

A .Search for broken wires in the cable by using a cable tester.

D. Test the data speed of the cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Type 1 hypervisor runs directly on system hardware. (T or F)
A Type 2 hypervisor runs directly on system hardware. (T or F)
A Type 1 hypervisor is also known as a bare-metal hypervisor. (T or F)

A

TFT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You ping a server by using the fully qualified domain name (FQDN) and do not receive a response. You then ping
the same server by using its IP address and receive a response Why do you receive a response on the second
attempt but not on the first attempt?

Choice of answers:
A. The DHCP server is offline.
B. The DNS is not resolving.
C. NSLOOKUP is stopped.
D. PING is improperly configured.

A

B. The DNS is not resolving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a VPN?

Choice of answers:
A. A virtual network within your local area network (LAN)
B. A personal network for your use only
C. A communication tunnel between VLANs
D. A secure private connection over a public network

A

D. A secure private connection over a public network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CompanyPro plans to migrate several servers to cloud based virtual machines. You need to identify the
administrative responsibilities that will be reduced after the planned migration. Which two responsibilities will be
reduced? (Choose 2).

Choice of answers:

A. Managing permissions to shared documents.
B. Updating server operating systems.
C. Backing up application data.
D. Replacing failed server hardware.
E. Managing physical server security.

A

B. Updating server operating systems.

D. Replacing failed server hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What routing option is fault tolerant?

A

Dynamic Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Your home computer is having problems accessing the internet. You suspect that your internet router’s DHCP
service is not functioning, so you check your computer’s IP address. Which address indicates that your router’s
DHCP service is NOT functioning?

A

169.254.1.15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which physical network topology provides fault-tolerant communication by providing redundant communication paths?

A

Mesh Network Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the primary purpose of a perimeter network?

Choice of answers:

A. To act as a secure location for deploying highly sensitive
network servers
B. To monitor traffic between routed subnets in a private LAN
C. To provide a buffer area between a private intranet and the
public internet
D. To act as a hidden location in which to deploy network clients

A

C. To provide a buffer area between a private intranet and the public internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How is a router’s static routing table updated?

Choice of answers:

How is a router’s static routing table updated?
A. Through direct action by the network administrator
B. With updates from the physically nearest routers
C. By monitoring adjacent subnets
D. From the RIP protocol after resetting the router

A

A. Through direct action by the network administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What happens when a client’s DHCP-issues address expires?

Choice of answers:

A. The client disconnects from the network
B. The client attempts to renew its lease on the address.
C. The client continues to use the address until it is notified to stop.
D. The client generates a new address valid to the subnet and
requests approval from the DHCP server.

A

B. The client attempts to renew its lease on the address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which service uses PTR and A records? Choice of answers: A. IPS B. DNS C. NAT D. IDS
B. Domain Name System (DNS)
26
A switch seconds unicast frames to only one destination port. (T or F) A switch floods ports if it does not know where to send a frame. (T or F) A switch sends broadcast frames to only the uplink port. (T or F)
TFF
27
You are trying to access a music-sharing service on the internet. The service is located at the IP address 173.194.75.105. You experience problems connecting. You run a trace route to the ip address shown from the image. Evaluate the image and complete the statements by selecting the correct options from the drop-down lists. Note: You will receive partial credit for each correct selection. Each hop in the trace route is a ___________ The trace route completed __________
router and successfully
28
What is a cause of concern about wireless network security? Choice of answers: A. The radio broadcast access method B. The potential for cross-talk C. Frequency modulation issues D. Inability to encrypt transmissions
D. Inability to encrypt transmissions
29
In Linux, which command-line tool should you use to list a host's active incoming connections? Choice of answers: A. netstat B. dig C. host D. ip addr
A. netstat
30
On a Windows computer, which utility should you use to determine whether your Domain Name System (DNS) service is properly resolving fully qualified domain names (FODNs) to IP addresses? Choice of answers: A. ipconfig B. nbtstat C. nslookup D. Netstat
C. nslookup
31
In which range are IPv4 multicast addresses? Choice of answers: A. From 224.0.0.0 to 239.255.255.255 B. From 127.0.0.0 to 127.255.255.255 C. From 192.168.0.0 to 192.168.255.255 D. From 172.16.0.0 to 172.31.255.255
A. From 224.0.0.0 to 239.255.255.255
32
You work for a small office that has 15 computers. Your local ISP provides you with one public IP address. You need to enable internet access for all 15 computers Which routing function should you enable? Choice of answers: A. RIP B. Static routing C. NAT D. Port forwarding (PAT)
C. Network Address Translation (NAT)
33
Connectionless, message based protocol with best-effort service? Connection-oriented protocol with guaranteed service? Resolves a MAC address to an IP address?
User Datagram Protocol (UDP) Transmission Control Protocol (TCP) Address Resolution Protocol (ARP)
34
You are studying for finals in the student lounge. When your laptop is connected to the wireless network, access to the internet is slow. When you connect to the network by using an Ethernet cable, you can no longer access the internet. You run the ipconfig /all command. The results are shown in the image Evaluate the image and complete the statements by selecting the correct option from each drop-down list. Note: You will receive partial credit for each correct selection. The IP address of the wireless adapter is configured __________ The IP address of the Ethernet adapter is configured __________
DHCP and APIPA
35
Allows a remote user to connect to a private network from anywhere on the Internet? Securely connects two portions of a private network or two private networks? Creates an unencrypted connection between two network devices?
SSL VPN Site-to-Site VPN Layer 2 Tunneling Protocol
36
The Internet is a WAN (T or F) An intranet is a WAN (T or F) All devices connected to a WAN must be located within the same city. (T or F)
TFF
37
Which wireless authentication method provides the highest level of security? Choice of answers: A. WPS authentication B. Wi-Fi Protected Access 2 (WPA2) C. Wired Equivalent Privacy (WEP) D. Wi-Fi Protected Access (WPA)
B. Wi-Fi Protected Access 2 (WPA2)
38
You are setting up a network computer game. You need to open up ports on your firewall so your friends can join the network. Which command displays the ports that your computer is listening for. Choice of answers: A. Nbtstat B. netstat C. ping D. nslookup
B. netstat
39
You are a network administrator. Employees in the finance departmentment are complaining about slow data speed while accessing the company network. One of the computers in the department shows the connection is only 100Mbps, line should be 1000Mbps. Which network hardware tool should you use to determine whether a cable is capable of 1000Mbps full duplex transmission? Choice of answers: A. Toner B. Time-Domain reflectometer (TDR) C. Multimeter D. Cable Tester
D. Cable Tester
40
You are a network support technician. The company president reports that his wired network printer is not working. To test the line, you need to know where the jack is plugged into the patch panel. However, there are no labels. In the main distribution frame (MDF), you discover a bundle of 35 cables. Which tool should you use to isolate the correct cable? Choice of answers: A. Time-domain reflectometer (TDR) B. Multimeter C. Cable Tester D. Toner
D. Toner
41
What is the top-level domain of ftp.sunsetweb.org Choice of answers: A. ftp B. sunsetweb C. sunsetweb.org D. org
D. org
42
What are two characteristics of a wired Ethernet network topology (choose 2). Choice of answers: A. it uses network adapters that are physically encoded with IP Addresses. B. It can negotiate different transmission speeds. C. It is typically employed by using twisted pair or fiber optic media D. It uses tokens to avoid collisions on the network
B. It can negotiate different transmission speeds. C. It is typically employed by using twisted pair or fiber optic media
43
Move the appropriate TCP port numbers from the list on the left to the correct services on the right A. SMTP B. FTP C. HTTPS 21 - 25 - 53 - 80 - 443 -
21 - FTP 25 - SMTP 443 - HTTPS
44
You are setting up a network computer game. You need to open up ports on your firewall so your friends can join the network. Which command displays the ports that your computer is listening for? Choice of answers: A. nslookup B. netstat C. ping D. nbstat
B. netstat
45
Iot Devices have IP Addresses (T or F) Iot devices require human interaction to communicate with a network (T or F) A smart thermostat and a lightbulb that can be switched on by using an app are examples of IoT devices (T or F)
TFT
46
You are helping a friend set up a public-facing web server in their home office. Your friend wants to protect the internal network from intrusion. What should you do? Choice of answers: A. Set the Ip address of the web server to be within the LAN B. Configure the firewall to block access on ports 80 and 443 C. Deploy the web server in the perimeter network (Also known as DMZ) D. Configure the web server to block access on ports 80 and 44
C. Deploy the web server in the perimeter network (Also known as DMZ)
47
What are the purpose of the ping utility? Choose 2 Choice of answers: A. To scan for open host firewall ports B. To determine whether a host is reachable C. To search for duplicate addresses D. To self-test a host own network interface E. To resolve host names to IP Addresses
B. To determine whether a host is reachable. D. To self-test a host own network interface
48
For ach statement about using a Type 2 hypervisor and virtual machine, select True or False A. If you reboot one virtual machine, all the other virtual machines on the server reboot at the same time. B. You can reboot the ost machine without it having any effect on the other virtual machines on the same physical server C. If your need to reboot one virtual machine, you must first reboot the physical server.
FFF
49
Remote user need to connect to your network through a server running Windows Server that is deployed on your perimeter network. Select true or false A. You can use a VPN to enable users to make a secure connection to your network through the internet. B. If users connect to the internet through dial-up connections, the server must also connect through a dial-up connection. C. You can use RAS Gateway to configure a VPN connection for Windows 10 clients that is active whenever the client connects to the internet.
TFT
50
Which network device interconnects computers in a workgroup, can be remotely configured, and provides the best throughput? Choice of answers: A. Router B. Managed Switch C. Unmanaged Switch D. Hub
B. Managed Switch
51
Which protocol does the ping utility use to test communication with a remote host? Choice of answers: A. OSPF B. ICMP C. BOOTP D. SNMP E. HTTP
B. ICMP
52
You need to install a network cable between two locations that are approximately six miles/ten kilometers from each other. Which cable should you use? Choice of answers: A. Multi-mode fiber B. single-mode fiber C. Cat5e D. Cat6
B. single-mode fiber
53
Which wireless encryption type is the most susceptible to interception and decryption? Choice of answers: A. WPA2 B. WPA-PSK C. WPA-AES D. WEP
D. WEP
54
In addition to switching, which feature is specific to a multilayer switch? Choice of answers: A. Bridges traffic between different physical topologies B. Provides Layer 3 routing functions C. manages addresses for client computers D. Translates between various network products
B. Provides Layer 3 routing functions
55
Which technology can you use to extend and internal network across shared or public networks? Choice of answer: A. Microsoft ASP Net B. VPN C. VLAN D. Microsoft .Net Framework
B. VPN
56
What does each IPV4 address consist of? Choice of answers: A. A DNS record and a default route B. A MAC address and a data-link layer address C. A network ID and a Host ID D. A 64-bit binary number divided into octets
C. A network ID and a Host ID
57
What is a feature of the Teredo tunneling protocol Choice of answers: A. It enables the passing of IPV6 traffic through IPv4 Networks B. It translates IPv4 traffic to IPv6 traffic C. it provides VPN Security D. It dynamically allocates IPV6 addresses
B. It translates IPv4 traffic to IPv6 traffic
58
Your company’s computers exchange data through a set of routed private Wi-Fi networks at a single geographical location. What type of network is in the example Choice of answer: A. Perimeter B. Extranet C. Intranet D. Internet
C. Intranet
59
Move each IP address from the list on the left to the correct IPv4 address class on the right. Note: You will receive partial credit for each correct answer IPv4 Address Α. 133.234.23.2 Β. 224.100.20.3 C. 201.111.22.3 D. 64.123.12.1 IPv4 Address Class A-64.123.12.1 Class B-133.234.23.2 Class C-201.111.22.3 Class D-224.100.20.3
Class A : D. 64.123.12.1 Class B: A. 133.234.23.2 Class C: C. 201.111.22.3 Class D: B. 224.100.20.3
60
What service is provided by Internet Messenger? A. An application that allows real-time chatting among remote users. B. Allows remote access to network devices and servers. C. Resolves domain names, such as cisco.com, into IP addresses. D. Uses encryption to provide secure remote access to network devices and servers.
A. An application that allows real-timr chatting amonf remote users.
61
Move the appropriate address types from the list on the left to the correct ranges on the right. You may use each address type once or not at all. Note: You will receive partial credit for each correct answer. Address Types Loopback addresses Multicast addresses Private network addresses Public network addresses IP Address 192.168.0.0-192.168.255.255 224.0.0.0-239.255 255.255 127.0.0.0-127.255 255.255
Loopback addresses - 127.0.0.0 - 127.255.255.255 Multicast addresses - 224.0.0.0 - 239.255.255.255 Private network addresses - 192.168.0.0 - 192.168.255.255