Practice test 3 Flashcards
Which of the following port or ports does SIP use?
443
389/636
135/139/445
5060/5061
SIP works with other protocols over 5060/5061. 443 is HTTPS, 389/636 is LDAP, and 135/139/445 is NetBIOS and SMB.
What describes an IPv6 address of ::1?
Broadcast
Loopback
Classless
Multicast
In IPv6, ::1 is the loopback address, whereas in IPv4 it is 127.0.0.1. The loopback address is used to send a test signal sent to a network destination in order to diagnose problems.
Dion Training has just installed a brand new email server. Which of the following DNS records would need to be created to allow the new server to receive email on behalf of diontraining.com?
CNAME
MX
PTR
A
An MX record is required in the DNS for a domain in order for the email server to accept emails on behalf of a registered domain name..
If you have an ISDN or T-1 connection, it can deliver multiple voice calls over a copper wire using which of the following technologies?
CSMA/CD
Time division spread spectrum
Analog circuit switching
Time division mltiplexing
Time-division multiplexing allows for two or more signals or bit streams to be transferred in what appears to be simultaneous sub-channels in one communication channel, but are physically taking turns on the channel. This is the technology used in a single PRI (ISDN or T-1) service to essentially share a single cable but pass multiple voice calls over it.
Which of the following protocols are designed to avoid loops on a Layer 2 network?
OSPF
RIPv2
802.1q
802.1d
The Spanning Tree Protocol is part of the 802.1d standard and avoids loops in the switching network (layer 2).
Which of the following describes the ID of a specified native VLAN when traffic passes over a trunk?
It becomes the gateway of last resort for the switch or router
It becomes the default VLAN for untagged frames
It becomes the priority ID for all the VLAN traffic across the device
It becomes the default gateway for the port or ports
It becomes the default VLAN for untagged frames
Trunk ports carry all traffic, regardless of VLAN number, between all switches in a LAN. The VLAN designation for a trunk port is its native VLAN. If the trunk port has a native VLAN that differs from the tag placed on the frame as it entered the access port, the switch leaves the tag on the frame and sends the tagged frame along to the next switch or switches. If the trunk port’s native VLAN is the same as the access ports VLAN, then the switch drops the tag and sends the untagged frame out the trunk port.
A small law office has a network with three switches (8 ports), one hub (4 ports), and one router (2 ports). Switch 1 (switchport 8) is connected to an interface port (FastEthernet0/0) on the router. Switch 2 (switchport 8) and switch 3 (switchport 8) are connected to Switch 1 (switchports 1 and 2). The hub has three computers plugged into it on ports 1, 2, and 3. The fourth port on the hub is connected to the router’s other interface port (FastEthernet0/1). Based on the configuration described here, how many broadcast domains are there within this network?
1 2 5 16 28
2
A broadcast domain is a logical division of a computer network in which all nodes can reach each other by broadcast at the data link layer. A broadcast domain can be within the same LAN segment or it can be bridged to other LAN segments. Routers break up broadcast domains, therefore there are two broadcast domains in this network - one for each side of the router (the three switches makeup one broadcast domain, and the hub makes up the second broadcast domain).
Which of the following wireless standards should you implement if the existing wireless network only allows for three non-overlapping channels and you need additional non-overlapping channels to prevent interference with neighboring businesses in your office building?
- 11b
- 11g
- 11ac
- 1q
802.11ac
Wireless B and G only support 3 non-overlapping channels (1, 6, 11). Wireless N and Wireless AC supports 5 GHz spectrum which provides dozens of non-overlapping channels. 802.1q is used for VLANs, and is not a wireless networking standard.
Elizabeth was replacing a client’s security device that protects their DMZ. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application anymore. Which of the following devices was MOST likely misconfigured and is now causing a problem?
Content filler
Firewall
DNS
DHCP
A firewall is an integral part of a DMZ. If configured correctly, it can regulate exactly what traffic and users are allowed to access the server. This is different from a content filter because a content filter simply denies traffic to a user based on content, but not access to a server. If the firewall ruleset was not configured to allow external users to access the application remotely, the default condition is to “deny by default”.
A technician is testing a new web-based tool capable of generating automatic teller machine (ATM) cash and service availability reports. The web-based tool was developed by a consortium of financial institutions. Which of the following cloud delivery models is being described in this scenario?
Saas
Public
Community
Paas
A community or private delivery model would work best. A community cloud in computing is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. The scenario described is a community cloud created tool by the banking industry.
A technician needs to ensure wireless coverage in the green space near the center of the college campus. The antenna is being installed in the middle of the field on a pole. Which type of antenna should be installed to ensure maximum coverage?
Omnidirectional
Yagi
Unidirectional
Directional
Omnidirectional antennas send the signal out equally in all directions, therefore it will provide the best coverage since it is located in the center of the field.
A technician suspects that the email system is slow due to an excessive amount of Spam being received. Which of the following should the technician do FIRST according to the troubleshooting methodology?
Verify full system functionality
Block incoming email
Establish a plan of action
Gather information
After identifying the problem (the server is slow), the next step is to gather information. This can be from various sources such as (but not limited to) users, logs and IP addresses. After information has been gathered, the technician should establish a plan of action to resolve the issue.
You have just installed a new switch in your company’s network closet. The switch connects to your router using a SFP port on both the router and switch. Unfortunately, you only had a long cable available to make the connection, so after running the cable from the rack containing the switch to the other rack containing the router you decide to coil up the excessive cable and use a zip tie to hold the coil to the side of the rack. You head back to your office, log into the switch over SSH, and check the log file. You notice that there are several messages indicating that the signal strength on the transmit portion of the SFP is registering as too weak. What is the BEST explanation for the cause of this error?
The SFP module has gone bad
You used a MMF cable instead of a SMF cable
The bend radius of the cable has been exceeded
You used a MTRJ cable instead of a ST cable
The most likely explanation is that you coiled up the excess cable too tightly and exceeded the bend radius for the cable. By doing this, you may have broken or cracked the fiber connected to the transmit portion of the SFP. It is unlikely that the SFP failed, since only the transmit portion is registering as weak. If you used the wrong type of cable (MTRJ vs ST), you would not have been able to connect it to the SFP module as it wouldn’t fit. Similarly, if you used a MMF instead of a SMF cable, you would get no connection, not a weak connection.
A company suffers an outage due to a bad module in a core switch. What is the NEXT step to conduct in troubleshooting?
Gather information, start at the top of the OSI model, and work down.
Establish a plan of action to solve the problem
Establish a theory, identify the problem, duplicate the problem, test the theory, and repeat
Gather information, start at the bottom of the OSI model and work up
The troubleshooting steps are to (1) Identify the problem, (2) Establish a theory of probable cause, (3) Test the theory to determine the cause, (4) Establish a plan of action to resolve the problem and identify potential effects, (5) Implement the solution or escalate as necessary, and (6) Verify full system functionality and if applicable implement preventative measures. Since the cause of the problem is already known (a bad module), we can skip directly to establishing a plan of action to solve the problem.
Which of the following needs to be configured to allow jumbo frames on a network?
MTU
MAC
MIBS
IPS
MTU is the largest unit that can be transmitted across a network. If the MTU is set at a value above 1500, the network is configured to support jumbo frames.
What is a connectionless protocol?
ICMP
SSL
TCP
SSH
A connectionless protocol is a form of data transmission in which data is transmitted automatically without determining whether the receiver is ready, or even whether a receiver exists. ICMP, UDP, IP, and IPX are well-known examples.
Sarah connects a pair of switches using redundant links. When she checks the status of the links, one of them is not active, even when she changes ports. What MOST likely disabled the redundant connection to the other switch?
Spanning tree
IGRP routing
SSID mismatch
Port Mirroring
The purpose of spanning tree is to verify no loops exist in the network. If something isn’t working, it’s possibly because the switch detects that there’s a loop in the redundant connections.
A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account. What is the MOST likely reason for the problem?
Username is misspelled in the device configuration file
IDS is blocking RADIUS
Shared secret key is mismatched
Group policy has not propagated to the device
AAA through RADIUS uses a Server Secret Key (a shared secret key). A secret key mismatch could cause login problems.
An increased amount of web traffic to an e-commerce server is observed by a network administrator, but without an increase in the number of financial transactions. Which kind of attack might the company be experiencing?
Bluejacking
ARP cache poisoning
Phishing
DoS
A DoS attack or Denial-of-Service attack works by overloading a server with multiple requests (more than it can handle), thus eventually knocking the server offline.
Your company’s security policy states that its workstations must hide their internal IP addresses whenever they make a network request across the WAN. You have been asked to recommend a technology that would BEST implement this policy. Which of the following is the BEST solution for you to recommend?
NAT
DMZ
WPA
OSPF
Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. By using NAT, you can have the internal IP address of each workstation mapped to a public IP address or port when it crosses the router to access the WAN.
According to the OSI model, at which of the following layers is data encapsulated into a frame?
1
2
3
4
The data layer, or layer 2, is the second layer of the seven-layer OSI model. The data link layer encapsulates data into frames for delivery between nodes on the same network.
A single mode fiber is no longer providing network connectivity to a remote site. What could be used to identify the location of the break?
MT-RJ
OTDR
Media Converter
Cable certifier
An optical time-domain reflectometer (OTDR) is an optoelectronic instrument used to characterize an optical fiber.
What access control model will a network switch utilize if it requires multilayer switches to use authentication via RADIUS/TACACS+?
802.1q
802.3af
PKI
802.1x
802.1x is the standard that is used for network authentication with RADIUS and TACACS+.
You have just moved into a new apartment and need to get internet service installed. Your landlord has stated that you are not allowed to drill any holes to install new cables into the apartment. Luckily, your apartment already has cable TV installed. Which of the following technologies should you utilize to get your internet installed in your apartment?
Wireless router
DSL modem
Satelite modem
DOCSIS modem
DOCSIS (Data Over Cable Service Interface Specification) is an international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable television system. It is employed by many cable television operators to provide Internet access over their existing hybrid fiber-coaxial (HFC) infrastructure. Most people today call these ‘cable modems’, but technically they are DOCSIS modems.
You are currently troubleshooting a workstation in the office and determined that it is an issue with the cabling somewhere between the workstation and the switch. You have tested the patch cable from the workstation to the wall jack and it is not faulty. You want to check the port on the switch next, which of the following would BEST help you identify which switchport is associated with the workstation’s wall jack?
Network baseline
Proper labeling
Inventory management
Standard procedures
You should always use proper labeling of your cables, wall jacks, and patch panels to make it easy to locate which switchport is associated with each portion of the cable distribution plant.
Michael has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should he use for this subnet?
/24
/30
/28
/29
An IPv4 address consists of 32 bits. The first x number of bits in the address is the network address and the remaining bits are used for the host addresses. The subnet mask defines how many bits form the network address and from that, we can calculate how many bits are used for the host addresses. In this question, the /30 subnet mask dictates that the first 30 bits of the IP address that are used for network addressing and the remaining 2 bits are used for host addressing. The formula to calculate the number of hosts in a subnet is 2n - 2. The “n” in the host’s formula represents the number of bits used for host addressing. If we apply the formula (22 - 2), a /30 subnet mask will provide 2 usable IP addresses.
A company wants to install a new wireless network. The network must be compatible with 802.11ac protocol in order to obtain the maximum amount of throughput available. Which of the following frequencies will this wireless network utilize?
- 4GHz
- 7GHz
- 0GHz
- 0GHz
Wireless AC uses 5.0 GHz for wireless transmission, whereas Wireless B/G uses 2.4 GHz.
Patches have just been released by a third-party vendor to resolve a major vulnerability. There are over 100 critical devices that need to be updated. What action should be taken to ensure the patch is installed with minimal downtime?
Test the patch in a lab environment and then install it in the production network during the next scheduled maintenance
Download and install all patches in the production network during the next scheduled maintenance period
Configure endpoints to automatically download and install the patches
Deploy the patch in a lab environment, quickly conduct testing, and then immediately install it in the production environment
Patches should always be tested first. Once successfully tested, deployment to the production environment can then be accomplished.