Networking Reviewer Flashcards

Reviewer

1
Q

What media type is least susceptible to external interference including EMI and RFI?

A

Fiber Optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

On a wireless router, what is an SSID?

A

The broadcast ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the reason to incorporation VLANs into a network?

A

To reduce the number of nodes in a broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two characteristics of VLANs

A

To compartmentalizes a network and isolates traffic.

VLANs act as though they are on the same LAN regardless of physical location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The fiber network connection between Building A and Building B is 550 meters. There is attenuation on the
line. Which tool should you use to test this?

A

Optical Time-Domain Reflectometer (OTDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What network element uses a tunneling protocol to encapsulates data for transmission?

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are a network administrator at a small business. One morning at the start of business, you realize that no
employees at the company can access external websites. However, all employees have the same intranet connected
by a single router. You need to troubleshoot the problem. Which two actions should you complete? (Choose 2.)

Choice of answers:

A. Check the router for proper physical connectivity.
B. Check that each computer has a valid IP address.
C. Contact the internet service provider.
D. Check for bad network adapters on individual computers

A

A. Check the router for proper physical connectivity.

C. Contact the internet service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A client-server network has centralized administration. (T or F)
A client-server network requires each computer to share its resources.
(T or F)
A client-server network requires users to have a user account on every computer they need to use. (T or F)

A

TFF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an advantage of dynamic routing?

A

It automatically maintains routing tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are proprietary protocols?

A

Protocols developed by organizations who have control over their definition and operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of port supports VLAN traffic between two switches?

A

Trunk port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a justification for using ST cable instead of UT cable to wire a network expansion?

A

You are routing cables through an area with high external interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two characteristics of mesh network topology?

A

Every node connects to every other node on the network.

It is fault tolerant because of redundant connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A computer is connected to a switch through a network patch panel by using copper cable. The computer is
getting lower-than expected data speeds. Which two actions should you perform to identify the issue? (Choose 2.)

Choice of answers:
A. Search for broken wires in the cable by using a cable tester.
B. Tone the line from Unit A to Unit B.
C. Use an optical time-domain reflectometer (OTDR) to test the line.
D. Test the data speed of the cable.

A

A .Search for broken wires in the cable by using a cable tester.

D. Test the data speed of the cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Type 1 hypervisor runs directly on system hardware. (T or F)
A Type 2 hypervisor runs directly on system hardware. (T or F)
A Type 1 hypervisor is also known as a bare-metal hypervisor. (T or F)

A

TFT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You ping a server by using the fully qualified domain name (FQDN) and do not receive a response. You then ping
the same server by using its IP address and receive a response Why do you receive a response on the second
attempt but not on the first attempt?

Choice of answers:
A. The DHCP server is offline.
B. The DNS is not resolving.
C. NSLOOKUP is stopped.
D. PING is improperly configured.

A

B. The DNS is not resolving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a VPN?

Choice of answers:
A. A virtual network within your local area network (LAN)
B. A personal network for your use only
C. A communication tunnel between VLANs
D. A secure private connection over a public network

A

D. A secure private connection over a public network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CompanyPro plans to migrate several servers to cloud based virtual machines. You need to identify the
administrative responsibilities that will be reduced after the planned migration. Which two responsibilities will be
reduced? (Choose 2).

Choice of answers:

A. Managing permissions to shared documents.
B. Updating server operating systems.
C. Backing up application data.
D. Replacing failed server hardware.
E. Managing physical server security.

A

B. Updating server operating systems.

D. Replacing failed server hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What routing option is fault tolerant?

A

Dynamic Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Your home computer is having problems accessing the internet. You suspect that your internet router’s DHCP
service is not functioning, so you check your computer’s IP address. Which address indicates that your router’s
DHCP service is NOT functioning?

A

169.254.1.15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which physical network topology provides fault-tolerant communication by providing redundant communication paths?

A

Mesh Network Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the primary purpose of a perimeter network?

Choice of answers:

A. To act as a secure location for deploying highly sensitive
network servers
B. To monitor traffic between routed subnets in a private LAN
C. To provide a buffer area between a private intranet and the
public internet
D. To act as a hidden location in which to deploy network clients

A

C. To provide a buffer area between a private intranet and the public internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How is a router’s static routing table updated?

Choice of answers:

How is a router’s static routing table updated?
A. Through direct action by the network administrator
B. With updates from the physically nearest routers
C. By monitoring adjacent subnets
D. From the RIP protocol after resetting the router

A

A. Through direct action by the network administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What happens when a client’s DHCP-issues address expires?

Choice of answers:

A. The client disconnects from the network
B. The client attempts to renew its lease on the address.
C. The client continues to use the address until it is notified to stop.
D. The client generates a new address valid to the subnet and
requests approval from the DHCP server.

A

B. The client attempts to renew its lease on the address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which service uses PTR and A records?

Choice of answers:

A. IPS
B. DNS
C. NAT
D. IDS

A

B. Domain Name System (DNS)

26
Q

A switch seconds unicast frames to only one destination port. (T or F)
A switch floods ports if it does not know where to send a frame. (T or F)
A switch sends broadcast frames to only the uplink port. (T or F)

A

TFF

27
Q

You are trying to access a music-sharing service on the internet. The service is located at the IP address
173.194.75.105. You experience problems connecting. You run a trace route to the ip address shown from the
image.
Evaluate the image and complete the statements by selecting the correct options from the drop-down lists.
Note: You will receive partial credit for each correct selection.

Each hop in the trace route is a ___________
The trace route completed __________

A

router and successfully

28
Q

What is a cause of concern about wireless network security?

Choice of answers:

A. The radio broadcast access method
B. The potential for cross-talk
C. Frequency modulation issues
D. Inability to encrypt transmissions

A

D. Inability to encrypt transmissions

29
Q

In Linux, which command-line tool should you use to list a host’s active incoming connections?

Choice of answers:

A. netstat
B. dig
C. host
D. ip addr

A

A. netstat

30
Q

On a Windows computer, which utility should you use to determine whether your Domain Name System (DNS) service is properly resolving fully qualified domain names (FODNs) to IP addresses?

Choice of answers:

A. ipconfig
B. nbtstat
C. nslookup
D. Netstat

A

C. nslookup

31
Q

In which range are IPv4 multicast addresses?

Choice of answers:

A. From 224.0.0.0 to 239.255.255.255
B. From 127.0.0.0 to 127.255.255.255
C. From 192.168.0.0 to 192.168.255.255
D. From 172.16.0.0 to 172.31.255.255

A

A. From 224.0.0.0 to 239.255.255.255

32
Q

You work for a small office that has 15 computers. Your local ISP provides you with one public IP address. You
need to enable internet access for all 15 computers
Which routing function should you enable?

Choice of answers:

A. RIP
B. Static routing
C. NAT
D. Port forwarding (PAT)

A

C. Network Address Translation (NAT)

33
Q

Connectionless, message based protocol with best-effort service?

Connection-oriented protocol with guaranteed service?

Resolves a MAC address to an IP address?

A

User Datagram Protocol (UDP)

Transmission Control Protocol (TCP)

Address Resolution Protocol (ARP)

34
Q

You are studying for finals in the student lounge. When your laptop is connected to the wireless network, access
to the internet is slow. When you connect to the network by using an Ethernet cable, you can no longer access the
internet. You run the ipconfig /all command. The results are shown in the image Evaluate the image and complete
the statements by selecting the correct option from each drop-down list. Note: You will receive partial credit for each
correct selection.

The IP address of the wireless adapter is configured __________

The IP address of the Ethernet adapter is configured __________

A

DHCP and APIPA

35
Q

Allows a remote user to connect to a private network from anywhere on the Internet?

Securely connects two portions of a private network or two private networks?

Creates an unencrypted connection between two network devices?

A

SSL VPN

Site-to-Site VPN

Layer 2 Tunneling Protocol

36
Q

The Internet is a WAN
(T or F)
An intranet is a WAN
(T or F)
All devices connected to a WAN must be located within the same city.
(T or F)

A

TFF

37
Q

Which wireless authentication method provides the
highest level of security?

Choice of answers:

A. WPS authentication
B. Wi-Fi Protected Access 2 (WPA2)
C. Wired Equivalent Privacy (WEP)
D. Wi-Fi Protected Access (WPA)

A

B. Wi-Fi Protected Access 2 (WPA2)

38
Q

You are setting up a network computer game.
You need to open up ports on your firewall so your
friends can join the network. Which command displays
the ports that your computer is listening for.

Choice of answers:

A. Nbtstat
B. netstat
C. ping
D. nslookup

A

B. netstat

39
Q

You are a network administrator. Employees in the finance
departmentment are complaining about slow data speed while
accessing the company network. One of the computers in the
department shows the connection is only 100Mbps, line should be
1000Mbps.
Which network hardware tool should you use to determine whether a
cable is capable of 1000Mbps full duplex transmission?

Choice of answers:

A. Toner
B. Time-Domain reflectometer (TDR)
C. Multimeter
D. Cable Tester

A

D. Cable Tester

40
Q

You are a network support technician. The company president reports
that his wired network printer is not working. To test the line, you need
to know where the jack is plugged into the patch panel. However, there
are no labels. In the main distribution frame (MDF), you discover a
bundle of 35 cables. Which tool should you use to isolate the correct
cable?

Choice of answers:

A. Time-domain reflectometer (TDR)
B. Multimeter
C. Cable Tester
D. Toner

A

D. Toner

41
Q

What is the top-level domain of ftp.sunsetweb.org

Choice of answers:

A. ftp
B. sunsetweb
C. sunsetweb.org
D. org

A

D. org

42
Q

What are two characteristics of a wired Ethernet network topology
(choose 2).

Choice of answers:

A. it uses network adapters that are physically encoded with IP
Addresses.
B. It can negotiate different transmission speeds.
C. It is typically employed by using twisted pair or fiber optic media
D. It uses tokens to avoid collisions on the network

A

B. It can negotiate different transmission speeds.

C. It is typically employed by using twisted pair or fiber optic media

43
Q

Move the appropriate TCP port numbers from the list on the left to the
correct services on the right
A. SMTP
B. FTP
C. HTTPS

21 -
25 -
53 -
80 -
443 -

A

21 - FTP

25 - SMTP

443 - HTTPS

44
Q

You are setting up a network computer game.
You need to open up ports on your firewall so your friends can join the
network. Which command displays the ports that your computer is
listening for?

Choice of answers:

A. nslookup
B. netstat
C. ping
D. nbstat

A

B. netstat

45
Q

Iot Devices have IP Addresses (T or F)
Iot devices require human interaction to communicate with a network (T or F)
A smart thermostat and a lightbulb that can be switched on by using an app are examples of IoT devices (T or F)

A

TFT

46
Q

You are helping a friend set up a public-facing web server in their
home office. Your friend wants to protect the internal network from
intrusion. What should you do?

Choice of answers:

A. Set the Ip address of the web server to be within the LAN
B. Configure the firewall to block access on ports 80 and 443
C. Deploy the web server in the perimeter network (Also known as DMZ)
D. Configure the web server to block access on ports 80 and 44

A

C. Deploy the web server in the perimeter network (Also known as DMZ)

47
Q

What are the purpose of the ping utility? Choose 2

Choice of answers:

A. To scan for open host firewall ports
B. To determine whether a host is reachable
C. To search for duplicate addresses
D. To self-test a host own network interface
E. To resolve host names to IP Addresses

A

B. To determine whether a host is reachable.

D. To self-test a host own network interface

48
Q

For ach statement about using a Type 2 hypervisor and virtual
machine, select True or False

A. If you reboot one virtual machine, all the other virtual machines on the server reboot at
the same time.
B. You can reboot the ost machine without it having any effect on the other virtual
machines on the same physical server
C. If your need to reboot one virtual machine, you must first reboot the physical server.

A

FFF

49
Q

Remote user need to connect to your network through a server
running Windows Server that is deployed on your perimeter
network. Select true or false

A. You can use a VPN to enable users to make a secure connection to your network
through the internet.
B. If users connect to the internet through dial-up connections, the server must also
connect through a dial-up connection.
C. You can use RAS Gateway to configure a VPN connection for Windows 10 clients that is
active whenever the client connects to the internet.

A

TFT

50
Q

Which network device interconnects computers in a workgroup, can be
remotely configured, and provides the best throughput?

Choice of answers:

A. Router
B. Managed Switch
C. Unmanaged Switch
D. Hub

A

B. Managed Switch

51
Q

Which protocol does the ping utility use to test communication with a
remote host?

Choice of answers:

A. OSPF
B. ICMP
C. BOOTP
D. SNMP
E. HTTP

A

B. ICMP

52
Q

You need to install a network cable between two locations that are
approximately six miles/ten kilometers from each other. Which cable
should you use?

Choice of answers:

A. Multi-mode fiber
B. single-mode fiber
C. Cat5e
D. Cat6

A

B. single-mode fiber

53
Q

Which wireless encryption type is the most susceptible to interception
and decryption?

Choice of answers:

A. WPA2
B. WPA-PSK
C. WPA-AES
D. WEP

A

D. WEP

54
Q

In addition to switching, which feature is specific to a multilayer
switch?

Choice of answers:

A. Bridges traffic between different physical topologies
B. Provides Layer 3 routing functions
C. manages addresses for client computers
D. Translates between various network products

A

B. Provides Layer 3 routing functions

55
Q

Which technology can you use to extend and internal network across
shared or public networks?

Choice of answer:

A. Microsoft ASP Net
B. VPN
C. VLAN
D. Microsoft .Net Framework

A

B. VPN

56
Q

What does each IPV4 address consist of?

Choice of answers:

A. A DNS record and a default route
B. A MAC address and a data-link layer address
C. A network ID and a Host ID
D. A 64-bit binary number divided into octets

A

C. A network ID and a Host ID

57
Q

What is a feature of the Teredo tunneling protocol

Choice of answers:

A. It enables the passing of IPV6 traffic through IPv4 Networks
B. It translates IPv4 traffic to IPv6 traffic
C. it provides VPN Security
D. It dynamically allocates IPV6 addresses

A

B. It translates IPv4 traffic to IPv6 traffic

58
Q

Your company’s computers exchange data through a set of routed
private Wi-Fi networks at a single geographical location. What type of
network is in the example

Choice of answer:

A. Perimeter
B. Extranet
C. Intranet
D. Internet

A

C. Intranet

59
Q

Move each IP address from the list on the left to the correct IPv4 address class on the right. Note: You will receive partial credit for each correct answer

IPv4 Address

Α. 133.234.23.2

Β. 224.100.20.3

C. 201.111.22.3

D. 64.123.12.1

IPv4 Address

Class A-64.123.12.1

Class B-133.234.23.2

Class C-201.111.22.3

Class D-224.100.20.3

A

Class A : D. 64.123.12.1
Class B: A. 133.234.23.2
Class C: C. 201.111.22.3
Class D: B. 224.100.20.3

60
Q

What service is provided by Internet Messenger?

A. An application that allows real-time chatting among remote users.

B. Allows remote access to network devices and servers.

C. Resolves domain names, such as cisco.com, into IP addresses.

D. Uses encryption to provide secure remote access to network devices and servers.

A

A. An application that allows real-timr chatting amonf remote users.

61
Q

Move the appropriate address types from the list on the left to the correct ranges on the right. You may use each address type once or not at all.

Note: You will receive partial credit for each correct answer.

Address Types

Loopback addresses

Multicast addresses

Private network addresses

Public network addresses

IP Address

192.168.0.0-192.168.255.255

224.0.0.0-239.255 255.255

127.0.0.0-127.255 255.255

A

Loopback addresses - 127.0.0.0 - 127.255.255.255

Multicast addresses - 224.0.0.0 - 239.255.255.255

Private network addresses - 192.168.0.0 - 192.168.255.255