Networking Warm-Up 2 Flashcards
Identify the class of the following IP address: 146.203.143.101
A) Class A
B) Class B
C) Class C
D) Class D
B) Class B
What is the number 138 in binary?
A) 10001010
B) 10101010
C) 10000111
D) 11001010
A) 10001010
When DHCP Discover fails, what process will the client use to generate an address for itself?
A) ATAPI (Automatic Temporary Address Program Initiator)
B) APIPA (Automatic Private IP Addressing)
C) ATIPA (Automatic Temporary IP Address)
D) APFBA (Automatic Programmable Fall Back Address)
B) APIPA (Automatic Private IP Addressing)
What technology allows you to share a single public IP address with many computers?
A) Static Address Translation
B) Natural Address Translation
C) Computed Public Address Translation
D) Port Address Translation
D) Port Address Translation
Distance vector routing protocols such as RIP rely on what metric to determine the best route?
A) Hop count.
B) Link speed.
C) Ping time.
D) Routes are chosen at random.
A) Hop count.
What is the name of the cable that you use to connect to the console port on Cisco routers?
A) Router console cable
B) Yost cable
C) That funny blue Cisco cable
D) Null modem cable
B) Yost cable
Which of the following are key benefits of Web-based mail? (Select two.)
A) You can use a third-party application, like Microsoft Outlook, to download your e-mail.
B) You can access your e-mail from anywhere in the world using a Web browser and an Internet connection.
C) It is completely spam-free.
D) It is great for creating throw-away accounts.
B) You can access your e-mail from anywhere in the world using a Web browser and an Internet connection.
&
D) It is great for creating throw-away accounts.
Why might you use a Telnet client?
A) To see the route an IP packet takes across multiple routers
B) To see your IP address and configuration details
C) To see the endpoints of your sessions
D) To issue commands to a remote server
D) To issue commands to a remote server
Which of the following protocols are used to receive e-mail from servers? (Select two.)
A) IMAP
B) ICMP
C) IGMP
D) POP
A) IMAP
&
D) POP
What command do you run to see the DNS cache on a Windows system?
A) ping /showdns
B) ipconfig /showdns
C) ipconfig /displaydns
D) ping /displaydns
C) ipconfig /displaydns
The users on your network haven’t been able to connect to the server for 30 minutes. You check and reboot the server, but you’re unable to ping either its own loopback address or any of your client systems. What should you do?
A) Restart the DHCP server.
B) Restart the DNS server.
C) Replace the NIC on the server because it has failed.
D) Have your users ping the server.
C) Replace the NIC on the server because it has failed.
Which type of DNS record is used by mail servers to determine where to send e-mail?
A) A record
B) CNAME record
C) MX record
D) SMTP record
C) MX record
RC4 is a(n) ______________cipher.
A) block
B) forwarding
C) stream
D) asymmetric
C) stream
Which of the following is a common hash function?
A) SHA-3
B) RC4
C) AES
D) BMX
A) SHA-3
In order to have a PKI you must have a(n)_________.
A) Web server
B) Web of trust
C) root authority
D) unsigned certificate
C) root authority
Which of the following is a protocol popular with today’s VPNs?
A) PPTP
B) L2TP
C) IPsec
D) PPPoE
C) IPsec
802.1X is a great example of _____________.
A) encryption
B) content switching
C) port authentication
D) VLAN trunking
C) port authentication
Which of the following is a valid IPv6 address?
A) 2001:bead:beef::1
B) 2001:30f5::3d62::04ffe
C) 192.168.1.4:ff45:129g:48fd:1
D) 2001.0470.b33e.23f4.27de.d34a.aed2.1827
A) 2001:bead:beef::1
Is NAT needed with IPv6?
A) No, because NAT has been replaced with a new version called NAT6.
B) No, the address space is so large that rationing routable addresses is unnecessary.
C) Yes, because it is the only way to protect against hackers.
D) Yes, because of the limited nature of IPv6 addressing.
B) No, the address space is so large that rationing routable addresses is unnecessary.
What does a client need to access IPv6 content on the Internet?
A) A link-local address.
B) A multicast address.
C) A global unicast address.
D) The IPv6 Internet is currently unreachable.
C) A global unicast address.
What is the /48 prefix of the address 2001:0480:b6f3:0001::0001?
A) 2001:0480:b6f3:1
B) 2001:0480:b6f3
C) 2001:0480:b6f3:1:0000::1
D) 2001:0480:b6f3:1:0000:0000:0000:1
B) 2001:0480:b6f3
Which of the following provides the fastest throughput?
A) PSTN
B) ISDN BRI
C) ADSL
D) POTS
C) ADSL
What device do you use to connect to a T1 line?
A) Router
B) CSU/DSU
C) Modem
D) WIC-2T
B) CSU/DSU
You have just had DSL installed at your house. Although the Internet connection is fast, your phones no longer work. What is the problem?
A) The installer failed to install the POTS filers on the phones.
B) Nothing; the phones can’t function at the same time as the Internet.
C) The house phone lines can’t handle the bandwidth of both the phone and DSL.
D) The DSL modem is missing the filter and causing line interference.
A) The installer failed to install the POTS filers on the phones.
What protocol do cable modems use?
A) ACMSIS
B) CMAS
C) DOCSIS
D) CCSIP
C) DOCSIS
Which wireless networking technology used the 5.0-GHz frequency range?
A) 802.11
B) 802.11a
C) 802.11b
D) 802.11g
B) 802.11a
Which of these consumer electronics may cause interference with 802.11n wireless networks?
A) Wireless telephones
B) Wireless televisions
C) Cellular telephones
D) Television remote controls
A) Wireless telephones
To achieve maximum Wi-Fi coverage in a room, where should you place the WAP?
A) Place the WAP on the north side of the room.
B) Place the WAP in the center of the room.
C) Place the WAP near a convenient electrical outlet.
D) It doesn’t matter where you place the WAP.
B) Place the WAP in the center of the room.
What hardware enables wireless PCs to connect to resources on a wired network segment in infrastructure mode? (Select two.)
A) An access point
B) A router
C) A hub
D) A wireless bridge
A) An access point&D) A wireless bridge
What feature lets you save a VM’s state so you can quickly restore to that point?
A) Replacement
B) Save
C) Snapshot
D) Zip
C) Snapshot
After the unforeseen failure of her Bigfoot-picture-sharing service, bgFootr–which got hacked when she failed to stay on top of her security updates–Janelle has a great new idea for a new service to report Loch Ness Monster sightings. Which service would help keep her from having to play system administrator?
A) Software as a Service
B) Infrastructure as a Service
C) Platform as a Service
D) Network as a Service
C) Platform as a Service
Which cellular WAN technology introduced the concept of the SIM card?
A) CDMA
B) GSM
C) EDGE
D) LTE
B) GSM
You can reduce the vulnerability of your cell phone when automatically connecting to open SSIDs by:
A) Requiring HTTPS
B) Disabling WPA
C) Forgetting all wireless networks
D) Requiring SSH
A) Requiring HTTPS
NFC tags are always:
A) Passive
B) Encoded
C) Spherical
D) Magnetic
A) Passive
Which of the following would be a loopback address?
A) 127.0.0.1
B) 10.0.0.1
C) 240.0.0.1
D) 192.168.0.1
A) 127.0.0.1
IPv4 loopback addresses range between 127.0.0.1 and 127.255.255.254, or 127.0.0.0/8.
Which of the following would BEST describe the topology of a switched Ethernet network?
A) Bus
B) Ring
C) Mesh
D) Star
D) Star
A switched Ethernet network topology consists of devices on the edge of the network connecting to a central switch to create a star topology.
What is the largest channel bandwidth supported for 802.11ac?
A) 20 MHz
B) 40 MHz
C) 80 MHz
D) 160 MHz
D) 160 MHz
802.11ac requires at least 80 MHz of available wireless bandwidth, and can use up to 160 MHz of the wireless spectrum.
Users in the accounting department are not able to visit an internal webserver using the FQDN, but can access the server using IP addresses. Which of the following would be the faulty service associated with this issue?
A) SNMP
B) DNS
C) SMTP
D) HTTP
B) DNS
DNS (Domain Name System) provides the services to resolve a name with an IP address.
Which of the following would be the best choice for connecting IDFs using the space above a drop ceiling?
A) Coax
B) Shielded twisted pair
C) Plenum-rated cable
D) Fiber optic
C) Plenum-rated cable
Plenum-rated cable is usually the best choice for network cables installed in circulating air space and between building floors.
A network administrator is connecting a 500 meter Ethernet connection using an LED light source. Which of the following would be the MOST likely network type?
A) Coax
B) Multimode fiber
C) 802.11 wireless
D) Single-mode fiber
B) Multimode fiber
Multimode fiber commonly uses LED light sources to send data over relatively short distances.
Which of the following would be the best choice for a 40 Gbit/sec fiber network link?
A) SFP
B) QSFP+
C) Category 6
D) DSL
B) QSFP+
The QSFP+ (Quad Small Form-factor Pluggable+) transceiver supports up to 40 Gbit/sec network links.
A network administrator needs to extend a Gigabit Ethernet link to a building located two kilometers away. Which of the following would be the BEST choice for this connection?
A) 1000BASE-LX
B) 1000BASE-T
C) 100BASE-TX
D) 1000BASE-SX
A) 1000BASE-LX
The 1000BASE-LX standard can support Gigabit Ethernet over single-mode fiber to a distance of five kilometers.
An IPS uses artificial intelligence to identify potential attacks. Which of the following would BEST describe this technology?
A) Behavior
B) Signature
C) Heuristics
D) Anomaly
C) Heuristics
Instead of relying on signatures or known-bad behavior, heuristics uses artificial intelligence to identify a potential attack.
Which of the following would be MOST likely associated with CCMP?
A) WPA2
B) STP
C) IPS
D) LDAP
A) WPA2
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) is the block cipher mode used with WPA2 wireless encryption.
A Windows administrator is using the SFC utility on her workstation. Which of the following would BEST describe this utility?
A) Vulnerability scanner
B) FIM
C) Port scanner
D) IPS
B) FIM
A FIM (File Integrity Monitoring) utility can identify files that may have been changed. Applications such as SFC (System File Checker) and Tripwire are common examples of a FIM utility.
A network administrator has logically separated two different broadcast domains on a single switch. Which of the following would BEST describe this configuration?
A) VPN
B) DMZ
C) VLAN
D) SSO
C) VLAN
A VLAN (Virtual Local Area Network) is a logical separation of broadcast domains on a single physical switch. Devices configured for separate VLANs cannot communicate to each other without a router.
A computer in the accounting department is incorrectly assigned a DHCP address for the marketing subnet. Which of the following would be the most likely reason for this issue?
A) DHCP server is down
B) Duplex mismatch
C) Incorrect VLAN configuration
D) Bad transceiver
C) Incorrect VLAN configuration
The VLAN configuration on a switch determines the broadcast domain used for a group of devices. If a device is in the incorrect subnet, the issue is commonly related to the VLAN setting.
Which of the following would be the best way to segment broadcast domains on a single switch?
A) 802.1Q
B) STP
C) VLANs
D) Flood Guard
C) VLANs
VLANs (Virtual Local Area Networks) are used to logically separate broadcast domains within a single physical switch.
An administrator has configured their network to prevent loops from occurring at OSI layer 2. Which of the following technologies would MOST likely be enabled?
A) Split horizon
B) RSTP
C) Half-duplex
D) QoS
B) RSTP
RSTP (Rapid Spanning Tree Protocol) provides fast convergence and backwards-compatibility with the older Spanning Tree Protocol to prevent layer 2 loops.
A network administrator is configuring a routing protocol that is based on the number of hops between networks. Which of the following would BEST describe this dynamic routing protocol?
A) Hybrid
B) Redundant
C) Distance-vector
D) Link-state
C) Distance-vector
Distance-vector protocols make routing decisions based on the number of routers, or hops, between networks.
How do IPv6 devices identify MAC addresses of other IPv6 devices on the same subnet?
A) ARP
B) SSH
C) NDP
D) ROUTE
C) NDP
NDP (Neighbor Discovery Protocol) uses multicasts to identify workstations, routers, and test for duplicate IPv6 addresses.
Which of the following would be considered a private IP address?
A) 224.0.0.7
B) 192.168.22.7
C) 11.20.7.10
D) 165.245.152.8
B) 192.168.22.7
Private IP addresses are defined in RFC 1918, and include the 192.168.0.0/16 address range.
The power supply in the DHCP server has failed. Which of the following IP addresses might be used by new devices connecting to the network?
A) 127.0.0.1
B) 169.254.24.11
C) 10.1.2.7
D) 172.16.23.87
B) 169.254.24.11
The APIPA (Automatic Private IP Addressing) range has reserved 169.254.0.1 through 169.254.255.254. If a DHCP server isn’t available, an APIPA address will be assigned by the local device.
A system administrator is making a change to the TXT record on a DNS server. Which of the following would be the MOST common use of this record type?
A) Resolves a web server address
B) Associates a name with an IP address
C) Identifies the Windows Domain Controllers
D) Defines a public key for email messages
D) Defines a public key for email messages
The TXT (Text) record of a DNS (Domain Name System) server is used for human-readable text information, such as SPF (Sender Policy Framework) information or public keys for DKIM (Domain Keys Identified Mail).
A network administrator needs to connect a server to a network switch at 10 Gbit/sec at a distance of 75 meters. What is the lowest-level cable category that will support this connection?
A) Category 5
B) Category 5e
C) Category 6
D) Category 6A
D) Category 6A
A network administrator needs to connect a server to a network switch at 10 Gbit/sec at a distance of 75 meters.
Which of the following would be the best way to add a 10 Gbit/sec fiber connection to a switch?
A) SFP
B) TDM
C) SIEM
D) PSTN
A) SFP
An SFP (Small Form-factor Pluggable) is a modular interface that can be plugged into a network device to provide connectivity. An SFP can provide various copper and fiber options from a single device interface.
A WAN service provider has installed an Internet link at a remote site using the existing telephone cabling. Which of the following would describe this service?
A) DOCSIS
B) DSL
C) Metro E
D) T3
B) DSL
DSL (Digital Subscriber Line) uses existing telephone cabling to transport the DSL signals.
Which of these technologies would be the MOST common at the core of a WAN provider’s network?
A) Copper
B) Satellite
C) Fiber
D) Wireless
C) Fiber
The core of a WAN provider’s network uses fiber to traverse large distances using high bandwidth rates.
A system administrator needs a way to track the location and use of a CSU/DSU. Which of the following would be the BEST way to accomplish this?
A) Bluetooth
B) Asset tag
C) Electronic ID card
D) Mobile Device Manager
B) Asset tag
A network administrator would like to install a firewall that will continue to operate if a power outage occurs. Which of the following would BEST meet this requirement?
A) UPS connection
B) Load balancing
C) Server clustering
D) Auto-switching power supply
A) UPS connection
A UPS (Uninterruptible Power Supply) commonly provides backup battery power when the main power source is unavailable.
A help desk ticket has been opened with a report of excessive CRC errors on a user’s workstation. Which of the following would be the MOST likely reason for this report?
A) Bad network cable
B) Incorrect file system
C) Misconfigured network share
D) Failed OS update
A) Bad network cable
CRC (Cyclical Redundancy Check) errors are commonly reported on a network interface to describe problems with the network signal and are often caused by a bad adapter card or network cable.