Practice (4) Flashcards

1
Q

You are designing a new wireless network based on the IEEE 802.11n standard. The equipment you have selected supports both the 2.4 GHz and 5 GHz frequencies, and you are undecided about which one to use. Which of the following are possible reasons why the 5 GHz frequency tends to perform better than the 2.4 GHz frequency on a wireless LAN? (Choose all correct answers.)

The 5 GHz frequency has more channels than the 2.4 GHz frequency.

The 5 GHz frequency conflicts with fewer common household devices than the 2.4 GHz frequency.

The 5 GHz frequency transmits at faster speeds than the 2.4 GHz frequency.

The 5 GHz frequency supports longer ranges than the 2.4 GHz frequency.

A

The 5 GHz frequency has more channels than the 2.4 GHz frequency.

The 5 GHz frequency conflicts with fewer common household devices than the 2.4 GHz frequency.

The 5 GHz frequency transmits at faster speeds than the 2.4 GHz frequency.

The 5 GHz frequency has 23 channels available in the United States, whereas the 2.4 GHz frequency has only 11. Many household devices, such as cordless telephones, use the 2.4 GHz frequency band, but relatively few devices use the 5 GHz band. Higher frequencies typically support faster transmission speeds, because with all other conditions equal, they can carry more data in the same amount of time. The 5 GHz frequency typically has a shorter range than 2.4 GHz, because it is less able to penetrate barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following server applications uses two well-known port numbers, one for control traffic and one for data traffic?

FTP

SNMP

NTP

A

FTP

The File Transfer Protocol (FTP) uses two port numbers. It uses the first, port 21, for a control connection that remains open during the entire client-server session. The second port, 20, is for a data connection that opens only when the protocol is actually transferring a file between the client and the server. Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), and Hypertext Transfer Protocol (HTTP) all use a single port on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are configuring the computers on a new network, and you have been given the network address 10.26.0.0/13. Which of the following subnet mask values must you use when configuring the computers?

  1. 248.0.0
  2. 252.0.0
  3. 254.0.0
A

255.248.0.0

The 13-bit prefix indicated in the network address will result in a mask with 13 ones followed by 19 zeroes. Broken into 8-bit blocks, the binary mask value is as follows:

11111111 11111000 00000000 00000000

Converted into decimal values, this results in a subnet mask value of 255.248.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are testing a twisted pair cable run using a tone generator and locator. When you apply the tone generator to each of the first seven wires at one end of the cable, you successfully detect a tone on the corresponding pin at the other end. However, when you connect the tone generator to the eighth wire, you fail to detect a tone at the other end. Which of the following fault types have you discovered?

Short circuit

Open circuit

Split pair

A

Open circuit

The failure to detect a tone on the eighth wire indicates that there is either a break in the wire somewhere inside the cable or a bad pin connection in one or both connectors. This type of fault is called an open circuit. None of the other three options are faults that manifest as described. A short circuit is when a wire is connected to two or more pins at one end of the cable. A split pair is a connection in which two wires are incorrectly mapped in exactly the same way on both ends of the cable. Crosstalk is a type of interference caused by signals on one wire bleeding over to other wires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following functions are defined as occurring at the session layer of the Open Systems Interconnection (OSI) model? (Choose all correct answers.)

Data encryption

Dialog control

Datagram routing

Dialog separation

A

Dialog control

Dialog separation

The session layer is responsible for creating and maintaining a dialog between end systems. This dialog can be a two-way alternate dialog that requires end systems to take turns transmitting, or it can be a two-way simultaneous dialog in which either end system can transmit at will. The session layer functions are called dialog control and dialog separation. Data encryption is performed at the presentation layer, and datagram routing occurs at the network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are working your company’s IT help desk, and you have had several calls from users who are reporting problems with their Voice over IP and streaming video connections. In each case, the audio or video connection experiences frequent dropouts in sound or video, causing frustrating interruptions. Which of the following terms describes a connectivity problem on a wired network that could cause these symptoms?

Jitter

Latency

Bottleneck

A

Jitter

When individual packets in a data stream are delayed, due to network congestion, different routing, or queuing problems, the resulting connectivity problem is called jitter. While this condition might not cause problems for asynchronous applications, real-time communications, such as Voice over IP or streaming video, can suffer interruptions from which the phenomenon gets its name. Latency describes a generalized delay in network transmissions, not individual packet delays. Attenuation is the weakening of a signal as it travels through a network medium. A bottleneck is a condition in which all traffic is delayed, due to a faulty or inadequate component. None of these three options would account for the problems reported by the users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are a consultant with a client who wants to have you install a wireless network with the highest throughput currently available. What can you tell your client is the fastest speed achievable by a wireless LAN using the currently ratified IEEE 802.11 standards?

54 Mbps

600 Mbps

1.3 Gbps

A

1.3 Gbps

The 802.11ac standard defines a wireless LAN running at speeds of up to 1.3 gigabits per second (Gbps). None of the other 802.11 standards define networks running at speeds beyond 600 Mbps. There is no currently ratified IEEE 802.11 standard that enables speeds of 2.6 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A private network uses unregistered IP addresses that are not accessible from the Internet. For computers on the private network to access Internet servers, there must be a device that substitutes registered IP addresses for the unregistered ones. Which of the following devices are capable of performing this kind of IP address substitution? (Choose all correct answers.)

RADIUS server

NAT router

UTM appliance

Proxy server

A

NAT router

Proxy server

Network address translation (NAT) is a network layer service, typically integrated into a router, that converts the private IP addresses in all of a client’s Internet transmissions to a registered IP address. NAT therefore works for all applications. A proxy server is an application layer device that performs the same type of conversion but only for specific applications. A Remote Authentication Dial-In User Service (RADIUS) server can provide authentication, authorization, and accounting services for remote access servers, but it does not convert IP addresses. A unified threat management (UTM) appliance typically performs virtual private network (VPN), firewall, and antivirus functions. It too does not convert IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user calls you at the technical support desk in the computer store where you work. He is installing a home network and is having trouble configuring the IP addresses for his computers. He starts reading off a list of the network addresses he has tried to use. Which of the following are valid IPv4 network addresses that the user can conceivably use to configure his computers? (Choose all correct answers.)

  1. 1.1.0
  2. 34.0.0
  3. 256.77.0
  4. 6.87.0
A
  1. 1.1.0
  2. 34.0.0
  3. 1.1.0 and 9.34.0.0 are both valid IPv4 network addresses. IPv4 addresses with first byte values from 224 to 239 are Class D addresses, which are reserved for use as multicast addresses. Therefore, the user cannot use 229.6.87.0 for his network. 103.256.77.0 is an invalid address because the value 256 cannot be represented by an 8-bit binary value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following terms refers to a routing protocol that relies on hop counts to measure the efficiency of routes through an internetwork?

Link state protocol

Distance vector protocol

Edge gateway protocol

A

Distance vector protocol

Distance vector protocols rely on hop counts—that is, the number of routers between a source and a destination—to evaluate the efficiency of routes. Link state protocols use a different type of calculation, usually based on Dijkstra’s algorithm. The terms interior gateway protocol and edge gateway protocol do not refer to the method of calculating routing efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have been hired by a client to connect two local area networks together, which are in different buildings 500 meters apart. The cable type you use must support Gigabit Ethernet data rates of 1000 megabits per second (Mbps) and provide a high level of resistance to electromagnetic interference (EMI). Which of the following cable types can you choose to meet the client’s needs? (Choose all correct answers.)

Single-mode fiber-optic cable

Thin coaxial cable

Multimode fiber-optic cable

Shielded twisted pair (STP) cable

Unshielded twisted pair (UTP) cable

A

Single-mode fiber-optic cable

Multimode fiber-optic cable

Any type of fiber-optic cable will satisfy the client’s requirements. Fiber-optic cable supports the required 1000 Mbps data rate and can connect networks that are 500 meters apart. Fiber-optic cable is also immune to EMI. Although both multimode and single-mode fiber would meet the corporation’s general needs, multimode is substantially less expensive than single-mode fiber. Twisted pair wiring (STP or UTP) meets the data rate, but it does not support connections longer than 100 meters. Thin coaxial cable does not support the data rate or distances longer than 185 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You receive a call at the IT help desk from a user who has recently moved to a new office in the company building, down the hall from her old one. Since the move, she has only been able to access the company’s wireless network with her laptop intermittently. The network is based on 802.11n equipment, and it is using the 2.4 GHz frequency and the WPA2 security protocol. The user never had a problem in her previous office location. Which of the following could not possibly be the cause of her problem? (Choose all correct answers.)

The user’s laptop is connecting to the wrong SSID.

The user’s laptop is configured to use the 5 GHz frequency.

The user’s new office is farther from the access point than her old one.

There are more intervening walls between the user’s new office and the access point.

The user’s laptop is configured with the wrong WPA2 passphrase.

A

The user’s new office is farther from the access point than her old one.

There are more intervening walls between the user’s new office and the access point.

An incorrect frequency, SSID, or WPA2 passphrase would prevent the user’s laptop from ever connecting to the network, so these cannot be the cause of the problem. Greater distance from the access point or interference from intervening walls can both cause a weakening of wireless signals, which can result in the intermittent connectivity that the user is experiencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following statements about static routing are not true? (Choose all correct answers.)

Static routes are automatically added to the routing table by routing protocols when a new network path becomes available.

Static routes are manually configured routes that administrators must add, modify, or delete when a change in the network occurs.

Static routes are a recommended solution for large internetworks with redundant paths to each destination network.

Static routes are a recommended solution for small internetworks with a single path to each destination network.

Static routes adapt to changes in the network infrastructure automatically.

A

Static routes are automatically added to the routing table by routing protocols when a new network path becomes available.

Static routes are a recommended solution for large internetworks with redundant paths to each destination network.

Static routes adapt to changes in the network infrastructure automatically.

Static routes are not automatically added to the routing table by routing protocols and do not automatically adapt to changes in the network. They are therefore not recommended for large internetworks with redundant paths between networks. Administrators must manually add, modify, or delete static routes when a change in a network occurs. For this reason, static routes are recommended only for use in small networks without multiple paths to each destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which layer of the Open Systems Interconnection (OSI) model has its own logical addressing system and is responsible for routing packets from one network to another?

Physical

Data link

Network

Transport

Session

Presentation

Application

A

Network

Network layer protocols specify logical addresses, such as IP addresses, for end system communication. They also use those addresses to route packets to destinations on other networks. The physical layer defines standards for physical and mechanical characteristics of a network. The data link layer uses media access control (MAC) or hardware addresses, not logical addresses. The transport layer uses port numbers, not logical addresses. Session layer protocols create and maintain a dialog between end systems. Presentation layer protocols are responsible for the formatting, translation, and presentation of information. The application layer provides an entry point for applications to access the protocol stack and prepare information for transmission across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

There are several marketing consultants working in your office for the first time, and they have approached you because they are unable to connect to the company’s 802.11g wireless network with their laptops. They are selecting the correct SSID from the Available Networks list, but they still cannot connect, and there are no error messages of any kind. Which of the following tasks should you perform first to try to resolve the problem?

Examine the area where the consultants are working for possible sources of signal interference.

Change the frequency used by the wireless access point from 2.4 GHz to 5 GHz.

Make sure that the consultants’ laptops are configured to use the correct wireless security protocol.

A

Make sure that the consultants’ laptops are configured to use the correct wireless security protocol.

The use of an incorrect wireless security protocol is a well-known source of errorless connection failures, so checking this will most likely enable you to discover the source of the problem. Channel overlap is a problem that you would check and resolve at the access point, not at the users’ workstations. It is not possible to change the frequency on the access point because the 802.11g standard only supports the 2.4 GHz frequency. Although signal interference could conceivably be the cause for a connection failure, the users can see the network’s SSID, so this is not likely to be the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are researching the various types of storage area network (SAN) technologies currently available before making a purchasing recommendation to your IT director. Which of the following are genuine advantages of iSCSI over Fibre Channel? (Choose all correct answers.)

iSCSI can share the same network as standard local area network (LAN) traffic; Fibre Channel cannot.

iSCSI is routable, whereas Fibre Channel is not.

iSCSI is less expensive to implement than Fibre Channel.

iSCSI includes its own internal flow control mechanism; Fibre Channel does not.

A

iSCSI can share the same network as standard local area network (LAN) traffic; Fibre Channel cannot.

iSCSI is routable, whereas Fibre Channel is not.

iSCSI is less expensive to implement than Fibre Channel.

Fibre Channel requires a dedicated network using fiber-optic cable. iSCSI traffic can coexist with standard LAN traffic on a single network, although some type of quality of service (QoS) mechanism is frequently recommended. Because it runs on any IP network, iSCSI traffic is routable, and it is far less expensive to implement than Fibre Channel. iSCSI does not include its own flow control mechanism, so this option is incorrect. It runs over a TCP connection, which is the protocol responsible for flow control

17
Q

In which of the following DNS transactions does the querying system generate an iterative query? (Choose all correct answers.)

A DNS client extracts the server name www.adatum.com from a URL and sends it to its designated DNS server for resolution.

A client’s DNS server sends a name resolution request to a root domain server to discover the authoritative server for the com top-level domain.

A client’s DNS server sends a name resolution request to the com top-level domain server to find the authoritative server for the adatum.com domain.

A client’s DNS server, which has been configured to function as a forwarder, sends the server name www.adatum.com from a URL to its ISP’s DNS server for resolution.

A client’s DNS server sends a name resolution request to the adatum.com domain server to discover the IP address associated with the server name www.

A

A client’s DNS server sends a name resolution request to a root domain server to discover the authoritative server for the com top-level domain.

A client’s DNS server sends a name resolution request to the com top-level domain server to find the authoritative server for the adatum.com domain.

A client’s DNS server sends a name resolution request to the adatum.com domain server to discover the IP address associated with the server name www.

When a client sends a name resolution query to its DNS server, it uses a recursive request so that the server will assume the responsibility for resolving the name. The only other use of recursive requests is in the case of a forwarder, which is configured to pass that responsibility on to another DNS server. The client’s DNS server uses iterative queries when sending name resolution requests to root domain servers and authoritative servers for the com and adatum.com domains

18
Q

You are heading out to do a cabling job for a client who has coaxial and twisted pair Ethernet networks at their facility. You want to bring connectors and cables to prepare for any eventuality. Which of the following connector types are typically associated with Ethernet networks? (Choose all correct answers.)

N-type

BNC

F-type

RJ45

DB-9

A

N-type

BNC

RJ45

Thin Ethernet networks use BNC connectors. Thick Ethernet networks use N-type connectors. All unshielded twisted pair (UTP) Ethernet networks use RJ45 connectors. You will not need F-type or DB-9 connectors. F-type connectors are used with coaxial cable but are typically used for cable television installations. DB-9 connectors are commonly used for serial communications ports

19
Q

When geofencing is used as part of a multifactor authentication system, which of the following best describes geofencing’s role?

Somewhere you are

Something you do

Something you have

A

Somewhere you are

Geofencing is the generic term for a technology that limits access to a network or other resource based on the client’s location. It is therefore best described as somewhere you are. A finger gesture would be considered something you do, a password something you know, and a smartcard something you have

20
Q

Some organizations maintain alternative sites that they can use as datacenters should a disaster render the main datacenter unusable. Which of the following types of disaster recovery site can be made operational in the shortest amount of time?

A hot site

A warm site

A cold site

A

A hot site

Hot, warm, and cold backup sites differ in the hardware and software they have installed. A cold site is just a space at a remote location. The hardware and software must be procured and installed before the network can be restored. It is therefore the least expensive and takes the most time. A warm site has hardware in place that must be installed and configured. A hot site has all of the necessary hardware installed and configured. A warm site is more expensive than a cold site, and a hot site is the most expensive and takes the shortest amount of time to be made operational

21
Q

Which of the following types of virtual private networking (VPN) connection is the best solution for connecting a home user to a corporate network?

Host-to-site

Site-to-site

Host-to-host

A

Host-to-site

A host-to-site VPN is a remote access solution, enabling users to access the corporate network from home or while traveling. A site-to-site VPN enables one network to connect to another, enabling users on both networks to access resources on the other one. This is usually a more economical solution for branch office connections than a wide area network (WAN) link. A host-to-host VPN enables two individual users to establish a protected connection to each other. An extranet VPN is designed to provide clients, vendors, and other outside partners with the ability to connect to your corporate network with limited access

22
Q

The term cloud is now in common use, referring to shared computing infrastructures, platforms, and services, frequently on the Internet. However, which of the following wide area network (WAN) services typically uses a switched fabric that was called a cloud long before the term came into general use?

Fractional T-1

Frame relay

ATM

A

Frame relay

Frame relay is a packet switching service that uses a single leased line to replace multiple leased lines by multiplexing traffic through a cloud. A fractional T-1 is part of a leased line that connects two points, so there is no switching involved and no cloud. Asynchronous Transfer Mode (ATM) uses a switched fabric, but it is not referred to as a cloud. SONET is a physical layer standard that defines fiber-optic connections; it does not call for switching or use the term cloud

23
Q

A baseline is a performance measurement for a device or system, taken under normal operating conditions, which you can use later to quantify any changes that might have taken place. Which of the following Windows applications would you most likely use to create a baseline of system or network performance?

Event Viewer

Network Monitor

Performance Monitor

A

Performance Monitor

Performance Monitor is a Windows application that can create logs of specific system and network performance statistics over extended periods of time. Such a log created on a new computer can function as a baseline for future troubleshooting. Event Viewer is a Windows application for displaying system log files; it cannot create a performance baseline. Syslog is a log compilation program originally created for Unix systems; it does not create performance baselines. Network Monitor is a protocol analyzer. Although it can capture a traffic sample that can function as a reference for future troubleshooting efforts, this cannot be called a performance baseline

24
Q

In most cases, a denial-of-service (DoS) attack refers to a deliberate attempt to overwhelm a server with incoming traffic. However, this is not always the case. Which of the following types of DoS attacks does not involve flooding a server with traffic?

Amplified

Distributed

Permanent

A

Permanent

Although a DoS attack typically involves traffic flooding, any attack that prevents a server from functioning can be called a DoS attack. A permanent DoS attack is one in which the attacker actually damages the target system and prevents it from functioning. This can be a physical attack that actually damages the server hardware, or the attacker can disable the server by altering its software or configuration settings. Flood-based attacks include the distributed denial-of-service (DDoS) attack, in which the attacker uses hundreds or thousands of computers, controlled by malware and called zombies, to send traffic to a single server or website in an attempt to overwhelm it and prevent it from functioning. An amplified DoS attack is one in which the messages sent by the attacker require an extended amount of processing by the target servers, increasing the burden on them more than simpler messages would. A reflective DoS attack is one in which the attacker sends requests containing the target server’s IP address to legitimate servers on the Internet, such as DNS servers, causing them to send a flood of responses that overwhelm the target