Practice (4) Flashcards
You are designing a new wireless network based on the IEEE 802.11n standard. The equipment you have selected supports both the 2.4 GHz and 5 GHz frequencies, and you are undecided about which one to use. Which of the following are possible reasons why the 5 GHz frequency tends to perform better than the 2.4 GHz frequency on a wireless LAN? (Choose all correct answers.)
The 5 GHz frequency has more channels than the 2.4 GHz frequency.
The 5 GHz frequency conflicts with fewer common household devices than the 2.4 GHz frequency.
The 5 GHz frequency transmits at faster speeds than the 2.4 GHz frequency.
The 5 GHz frequency supports longer ranges than the 2.4 GHz frequency.
The 5 GHz frequency has more channels than the 2.4 GHz frequency.
The 5 GHz frequency conflicts with fewer common household devices than the 2.4 GHz frequency.
The 5 GHz frequency transmits at faster speeds than the 2.4 GHz frequency.
The 5 GHz frequency has 23 channels available in the United States, whereas the 2.4 GHz frequency has only 11. Many household devices, such as cordless telephones, use the 2.4 GHz frequency band, but relatively few devices use the 5 GHz band. Higher frequencies typically support faster transmission speeds, because with all other conditions equal, they can carry more data in the same amount of time. The 5 GHz frequency typically has a shorter range than 2.4 GHz, because it is less able to penetrate barriers
Which of the following server applications uses two well-known port numbers, one for control traffic and one for data traffic?
FTP
SNMP
NTP
FTP
The File Transfer Protocol (FTP) uses two port numbers. It uses the first, port 21, for a control connection that remains open during the entire client-server session. The second port, 20, is for a data connection that opens only when the protocol is actually transferring a file between the client and the server. Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), and Hypertext Transfer Protocol (HTTP) all use a single port on the server
You are configuring the computers on a new network, and you have been given the network address 10.26.0.0/13. Which of the following subnet mask values must you use when configuring the computers?
- 248.0.0
- 252.0.0
- 254.0.0
255.248.0.0
The 13-bit prefix indicated in the network address will result in a mask with 13 ones followed by 19 zeroes. Broken into 8-bit blocks, the binary mask value is as follows:
11111111 11111000 00000000 00000000
Converted into decimal values, this results in a subnet mask value of 255.248.0.0
You are testing a twisted pair cable run using a tone generator and locator. When you apply the tone generator to each of the first seven wires at one end of the cable, you successfully detect a tone on the corresponding pin at the other end. However, when you connect the tone generator to the eighth wire, you fail to detect a tone at the other end. Which of the following fault types have you discovered?
Short circuit
Open circuit
Split pair
Open circuit
The failure to detect a tone on the eighth wire indicates that there is either a break in the wire somewhere inside the cable or a bad pin connection in one or both connectors. This type of fault is called an open circuit. None of the other three options are faults that manifest as described. A short circuit is when a wire is connected to two or more pins at one end of the cable. A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Crosstalk is a type of interference caused by signals on one wire bleeding over to other wires
Which of the following functions are defined as occurring at the session layer of the Open Systems Interconnection (OSI) model? (Choose all correct answers.)
Data encryption
Dialog control
Datagram routing
Dialog separation
Dialog control
Dialog separation
The session layer is responsible for creating and maintaining a dialog between end systems. This dialog can be a two-way alternate dialog that requires end systems to take turns transmitting, or it can be a two-way simultaneous dialog in which either end system can transmit at will. The session layer functions are called dialog control and dialog separation. Data encryption is performed at the presentation layer, and datagram routing occurs at the network layer
You are working your company’s IT help desk, and you have had several calls from users who are reporting problems with their Voice over IP and streaming video connections. In each case, the audio or video connection experiences frequent dropouts in sound or video, causing frustrating interruptions. Which of the following terms describes a connectivity problem on a wired network that could cause these symptoms?
Jitter
Latency
Bottleneck
Jitter
When individual packets in a data stream are delayed, due to network congestion, different routing, or queuing problems, the resulting connectivity problem is called jitter. While this condition might not cause problems for asynchronous applications, real-time communications, such as Voice over IP or streaming video, can suffer interruptions from which the phenomenon gets its name. Latency describes a generalized delay in network transmissions, not individual packet delays. Attenuation is the weakening of a signal as it travels through a network medium. A bottleneck is a condition in which all traffic is delayed, due to a faulty or inadequate component. None of these three options would account for the problems reported by the users
You are a consultant with a client who wants to have you install a wireless network with the highest throughput currently available. What can you tell your client is the fastest speed achievable by a wireless LAN using the currently ratified IEEE 802.11 standards?
54 Mbps
600 Mbps
1.3 Gbps
1.3 Gbps
The 802.11ac standard defines a wireless LAN running at speeds of up to 1.3 gigabits per second (Gbps). None of the other 802.11 standards define networks running at speeds beyond 600 Mbps. There is no currently ratified IEEE 802.11 standard that enables speeds of 2.6 Gbps
A private network uses unregistered IP addresses that are not accessible from the Internet. For computers on the private network to access Internet servers, there must be a device that substitutes registered IP addresses for the unregistered ones. Which of the following devices are capable of performing this kind of IP address substitution? (Choose all correct answers.)
RADIUS server
NAT router
UTM appliance
Proxy server
NAT router
Proxy server
Network address translation (NAT) is a network layer service, typically integrated into a router, that converts the private IP addresses in all of a client’s Internet transmissions to a registered IP address. NAT therefore works for all applications. A proxy server is an application layer device that performs the same type of conversion but only for specific applications. A Remote Authentication Dial-In User Service (RADIUS) server can provide authentication, authorization, and accounting services for remote access servers, but it does not convert IP addresses. A unified threat management (UTM) appliance typically performs virtual private network (VPN), firewall, and antivirus functions. It too does not convert IP addresses
A user calls you at the technical support desk in the computer store where you work. He is installing a home network and is having trouble configuring the IP addresses for his computers. He starts reading off a list of the network addresses he has tried to use. Which of the following are valid IPv4 network addresses that the user can conceivably use to configure his computers? (Choose all correct answers.)
- 1.1.0
- 34.0.0
- 256.77.0
- 6.87.0
- 1.1.0
- 34.0.0
- 1.1.0 and 9.34.0.0 are both valid IPv4 network addresses. IPv4 addresses with first byte values from 224 to 239 are Class D addresses, which are reserved for use as multicast addresses. Therefore, the user cannot use 229.6.87.0 for his network. 103.256.77.0 is an invalid address because the value 256 cannot be represented by an 8-bit binary value
Which of the following terms refers to a routing protocol that relies on hop counts to measure the efficiency of routes through an internetwork?
Link state protocol
Distance vector protocol
Edge gateway protocol
Distance vector protocol
Distance vector protocols rely on hop counts—that is, the number of routers between a source and a destination—to evaluate the efficiency of routes. Link state protocols use a different type of calculation, usually based on Dijkstra’s algorithm. The terms interior gateway protocol and edge gateway protocol do not refer to the method of calculating routing efficiency
You have been hired by a client to connect two local area networks together, which are in different buildings 500 meters apart. The cable type you use must support Gigabit Ethernet data rates of 1000 megabits per second (Mbps) and provide a high level of resistance to electromagnetic interference (EMI). Which of the following cable types can you choose to meet the client’s needs? (Choose all correct answers.)
Single-mode fiber-optic cable
Thin coaxial cable
Multimode fiber-optic cable
Shielded twisted pair (STP) cable
Unshielded twisted pair (UTP) cable
Single-mode fiber-optic cable
Multimode fiber-optic cable
Any type of fiber-optic cable will satisfy the client’s requirements. Fiber-optic cable supports the required 1000 Mbps data rate and can connect networks that are 500 meters apart. Fiber-optic cable is also immune to EMI. Although both multimode and single-mode fiber would meet the corporation’s general needs, multimode is substantially less expensive than single-mode fiber. Twisted pair wiring (STP or UTP) meets the data rate, but it does not support connections longer than 100 meters. Thin coaxial cable does not support the data rate or distances longer than 185 meters
You receive a call at the IT help desk from a user who has recently moved to a new office in the company building, down the hall from her old one. Since the move, she has only been able to access the company’s wireless network with her laptop intermittently. The network is based on 802.11n equipment, and it is using the 2.4 GHz frequency and the WPA2 security protocol. The user never had a problem in her previous office location. Which of the following could not possibly be the cause of her problem? (Choose all correct answers.)
The user’s laptop is connecting to the wrong SSID.
The user’s laptop is configured to use the 5 GHz frequency.
The user’s new office is farther from the access point than her old one.
There are more intervening walls between the user’s new office and the access point.
The user’s laptop is configured with the wrong WPA2 passphrase.
The user’s new office is farther from the access point than her old one.
There are more intervening walls between the user’s new office and the access point.
An incorrect frequency, SSID, or WPA2 passphrase would prevent the user’s laptop from ever connecting to the network, so these cannot be the cause of the problem. Greater distance from the access point or interference from intervening walls can both cause a weakening of wireless signals, which can result in the intermittent connectivity that the user is experiencing
Which of the following statements about static routing are not true? (Choose all correct answers.)
Static routes are automatically added to the routing table by routing protocols when a new network path becomes available.
Static routes are manually configured routes that administrators must add, modify, or delete when a change in the network occurs.
Static routes are a recommended solution for large internetworks with redundant paths to each destination network.
Static routes are a recommended solution for small internetworks with a single path to each destination network.
Static routes adapt to changes in the network infrastructure automatically.
Static routes are automatically added to the routing table by routing protocols when a new network path becomes available.
Static routes are a recommended solution for large internetworks with redundant paths to each destination network.
Static routes adapt to changes in the network infrastructure automatically.
Static routes are not automatically added to the routing table by routing protocols and do not automatically adapt to changes in the network. They are therefore not recommended for large internetworks with redundant paths between networks. Administrators must manually add, modify, or delete static routes when a change in a network occurs. For this reason, static routes are recommended only for use in small networks without multiple paths to each destination
Which layer of the Open Systems Interconnection (OSI) model has its own logical addressing system and is responsible for routing packets from one network to another?
Physical
Data link
Network
Transport
Session
Presentation
Application
Network
Network layer protocols specify logical addresses, such as IP addresses, for end system communication. They also use those addresses to route packets to destinations on other networks. The physical layer defines standards for physical and mechanical characteristics of a network. The data link layer uses media access control (MAC) or hardware addresses, not logical addresses. The transport layer uses port numbers, not logical addresses. Session layer protocols create and maintain a dialog between end systems. Presentation layer protocols are responsible for the formatting, translation, and presentation of information. The application layer provides an entry point for applications to access the protocol stack and prepare information for transmission across a network
There are several marketing consultants working in your office for the first time, and they have approached you because they are unable to connect to the company’s 802.11g wireless network with their laptops. They are selecting the correct SSID from the Available Networks list, but they still cannot connect, and there are no error messages of any kind. Which of the following tasks should you perform first to try to resolve the problem?
Examine the area where the consultants are working for possible sources of signal interference.
Change the frequency used by the wireless access point from 2.4 GHz to 5 GHz.
Make sure that the consultants’ laptops are configured to use the correct wireless security protocol.
Make sure that the consultants’ laptops are configured to use the correct wireless security protocol.
The use of an incorrect wireless security protocol is a well-known source of errorless connection failures, so checking this will most likely enable you to discover the source of the problem. Channel overlap is a problem that you would check and resolve at the access point, not at the users’ workstations. It is not possible to change the frequency on the access point because the 802.11g standard only supports the 2.4 GHz frequency. Although signal interference could conceivably be the cause for a connection failure, the users can see the network’s SSID, so this is not likely to be the problem
You are researching the various types of storage area network (SAN) technologies currently available before making a purchasing recommendation to your IT director. Which of the following are genuine advantages of iSCSI over Fibre Channel? (Choose all correct answers.)
iSCSI can share the same network as standard local area network (LAN) traffic; Fibre Channel cannot.
iSCSI is routable, whereas Fibre Channel is not.
iSCSI is less expensive to implement than Fibre Channel.
iSCSI includes its own internal flow control mechanism; Fibre Channel does not.
iSCSI can share the same network as standard local area network (LAN) traffic; Fibre Channel cannot.
iSCSI is routable, whereas Fibre Channel is not.
iSCSI is less expensive to implement than Fibre Channel.
Fibre Channel requires a dedicated network using fiber-optic cable. iSCSI traffic can coexist with standard LAN traffic on a single network, although some type of quality of service (QoS) mechanism is frequently recommended. Because it runs on any IP network, iSCSI traffic is routable, and it is far less expensive to implement than Fibre Channel. iSCSI does not include its own flow control mechanism, so this option is incorrect. It runs over a TCP connection, which is the protocol responsible for flow control
In which of the following DNS transactions does the querying system generate an iterative query? (Choose all correct answers.)
A DNS client extracts the server name www.adatum.com from a URL and sends it to its designated DNS server for resolution.
A client’s DNS server sends a name resolution request to a root domain server to discover the authoritative server for the com top-level domain.
A client’s DNS server sends a name resolution request to the com top-level domain server to find the authoritative server for the adatum.com domain.
A client’s DNS server, which has been configured to function as a forwarder, sends the server name www.adatum.com from a URL to its ISP’s DNS server for resolution.
A client’s DNS server sends a name resolution request to the adatum.com domain server to discover the IP address associated with the server name www.
A client’s DNS server sends a name resolution request to a root domain server to discover the authoritative server for the com top-level domain.
A client’s DNS server sends a name resolution request to the com top-level domain server to find the authoritative server for the adatum.com domain.
A client’s DNS server sends a name resolution request to the adatum.com domain server to discover the IP address associated with the server name www.
When a client sends a name resolution query to its DNS server, it uses a recursive request so that the server will assume the responsibility for resolving the name. The only other use of recursive requests is in the case of a forwarder, which is configured to pass that responsibility on to another DNS server. The client’s DNS server uses iterative queries when sending name resolution requests to root domain servers and authoritative servers for the com and adatum.com domains
You are heading out to do a cabling job for a client who has coaxial and twisted pair Ethernet networks at their facility. You want to bring connectors and cables to prepare for any eventuality. Which of the following connector types are typically associated with Ethernet networks? (Choose all correct answers.)
N-type
BNC
F-type
RJ45
DB-9
N-type
BNC
RJ45
Thin Ethernet networks use BNC connectors. Thick Ethernet networks use N-type connectors. All unshielded twisted pair (UTP) Ethernet networks use RJ45 connectors. You will not need F-type or DB-9 connectors. F-type connectors are used with coaxial cable but are typically used for cable television installations. DB-9 connectors are commonly used for serial communications ports
When geofencing is used as part of a multifactor authentication system, which of the following best describes geofencing’s role?
Somewhere you are
Something you do
Something you have
Somewhere you are
Geofencing is the generic term for a technology that limits access to a network or other resource based on the client’s location. It is therefore best described as somewhere you are. A finger gesture would be considered something you do, a password something you know, and a smartcard something you have
Some organizations maintain alternative sites that they can use as datacenters should a disaster render the main datacenter unusable. Which of the following types of disaster recovery site can be made operational in the shortest amount of time?
A hot site
A warm site
A cold site
A hot site
Hot, warm, and cold backup sites differ in the hardware and software they have installed. A cold site is just a space at a remote location. The hardware and software must be procured and installed before the network can be restored. It is therefore the least expensive and takes the most time. A warm site has hardware in place that must be installed and configured. A hot site has all of the necessary hardware installed and configured. A warm site is more expensive than a cold site, and a hot site is the most expensive and takes the shortest amount of time to be made operational
Which of the following types of virtual private networking (VPN) connection is the best solution for connecting a home user to a corporate network?
Host-to-site
Site-to-site
Host-to-host
Host-to-site
A host-to-site VPN is a remote access solution, enabling users to access the corporate network from home or while traveling. A site-to-site VPN enables one network to connect to another, enabling users on both networks to access resources on the other one. This is usually a more economical solution for branch office connections than a wide area network (WAN) link. A host-to-host VPN enables two individual users to establish a protected connection to each other. An extranet VPN is designed to provide clients, vendors, and other outside partners with the ability to connect to your corporate network with limited access
The term cloud is now in common use, referring to shared computing infrastructures, platforms, and services, frequently on the Internet. However, which of the following wide area network (WAN) services typically uses a switched fabric that was called a cloud long before the term came into general use?
Fractional T-1
Frame relay
ATM
Frame relay
Frame relay is a packet switching service that uses a single leased line to replace multiple leased lines by multiplexing traffic through a cloud. A fractional T-1 is part of a leased line that connects two points, so there is no switching involved and no cloud. Asynchronous Transfer Mode (ATM) uses a switched fabric, but it is not referred to as a cloud. SONET is a physical layer standard that defines fiber-optic connections; it does not call for switching or use the term cloud
A baseline is a performance measurement for a device or system, taken under normal operating conditions, which you can use later to quantify any changes that might have taken place. Which of the following Windows applications would you most likely use to create a baseline of system or network performance?
Event Viewer
Network Monitor
Performance Monitor
Performance Monitor
Performance Monitor is a Windows application that can create logs of specific system and network performance statistics over extended periods of time. Such a log created on a new computer can function as a baseline for future troubleshooting. Event Viewer is a Windows application for displaying system log files; it cannot create a performance baseline. Syslog is a log compilation program originally created for Unix systems; it does not create performance baselines. Network Monitor is a protocol analyzer. Although it can capture a traffic sample that can function as a reference for future troubleshooting efforts, this cannot be called a performance baseline
In most cases, a denial-of-service (DoS) attack refers to a deliberate attempt to overwhelm a server with incoming traffic. However, this is not always the case. Which of the following types of DoS attacks does not involve flooding a server with traffic?
Amplified
Distributed
Permanent
Permanent
Although a DoS attack typically involves traffic flooding, any attack that prevents a server from functioning can be called a DoS attack. A permanent DoS attack is one in which the attacker actually damages the target system and prevents it from functioning. This can be a physical attack that actually damages the server hardware, or the attacker can disable the server by altering its software or configuration settings. Flood-based attacks include the distributed denial-of-service (DDoS) attack, in which the attacker uses hundreds or thousands of computers, controlled by malware and called zombies, to send traffic to a single server or website in an attempt to overwhelm it and prevent it from functioning. An amplified DoS attack is one in which the messages sent by the attacker require an extended amount of processing by the target servers, increasing the burden on them more than simpler messages would. A reflective DoS attack is one in which the attacker sends requests containing the target server’s IP address to legitimate servers on the Internet, such as DNS servers, causing them to send a flood of responses that overwhelm the target