Practice test sample questions Flashcards

1
Q

Once a plan of action to resolve a problem has been established, the next step in the network troubleshooting,

A

Implement the solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What commands can be used to display a routing table,

A

Route print & Netstat -r

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A MAC address consists of,

A

48 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Password combined with PIN used as an authentication requirement is an example of,

A

Something the User knows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disabling SSID,

A

Makes a WLAN harder to discover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VLAN membership can be configured through–2 answers

A

Switch ports and MAC address to VLAN mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data from multiple VLANS on single switch is carried through single network link–2 answers,

A

Trunking and VLAN multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An IPv6 address consists of,

A

128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the default port used by Kerberos,

A

88

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Window command line for displaying intermediary points on the packet route is,

A

Tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a lightly protected subnet placed on the outside of the company’s firewall consisting of publicly available servers,

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T1 lines support data transfer rates of up to,

A

1,555 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An IP address in the range 169.254.0.1 thru 169.254.255.254 indicates a problem with what type of service

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The largest data unit expressed in bytes which may be sent over a network link is also referred to as,

A

MTU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T3 lines support data transfer rates of up to,

A

44.736 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are 3 types of cabling provides protection from EMI,

A

Coaxial, Fiber-optic, and STP

17
Q

Name 3 cabling types of cabling that uses RJ-45 connectors,

A

STP, Twisted pair and UTP

18
Q

E1 lines support data transfer rates of up to,

A

34.368 Mbps

19
Q

What hides the internal ip addresses by modifying IP address info in the IP packet headers,

20
Q

Coding errors and security vulnerabilities in software that has already been released can be rectified by,

A

Patch-management

21
Q

What kind of termination would be used to create a crossover cable,

A

T568A and T568B

22
Q

What type of filtering allows for blocking or allowing access to specific Internet domains,

23
Q

What are 2 tunneling protocols,

A

PPTP and L2TP

24
Q

IPsec encrypts an entire packet in what kind of mode,

25
What type of IDS relies on known attack patterns in order to detect intrusion
Signature based
26
What 2 tools allow for obtaining domain name to IP address mapping
nslookup and dig
27
What protocols transmits data in unencrypted form,
SNMPv1
28
An ip address in the range of 172.16.00 and 172.31.255.255 is an example of what kind of address,
Non-routable
29
Frequency ranges used in 802.11 networks include--1 answers,
2.4 GHz and 5.0 GHz
30
255.255.255.248 subnet allow for how many host,
6 (/29 subnet)
31
OC-3 line supports transmission rates of up to,
44.736
32
What are the 802.11b wireless standard,
2.4 GHz and 11 Mbps
33
OSPF and IS-IS are,
Routing protocols
34
IEEE 802.11g standard is backwards compatible with,
802.11b
35
802.3 is the IEEE standard for implementing of what kind of networks,
Ethernet
36
What is the characteristics of 10GBaseT Ethernet,
802.3an
37
What is the most common type of DSL Internet service,
ADSL
38
What puts ping command in a loop,
(-t)
39
What can stop attacks on the network,
NIPS