Practice Tests - Chapter 2: Networking Flashcards
Which of the following network devices receives network traffic and makes a decision on whether to send it on based on the destination hardware address?
A. Hub
B. Bridge
C. Access point
D. Repeater
B. Bridge
Because bridges work at the Data Link layer, they are aware of only hardware (MAC) addresses. They are not aware of and do not deal with IP addresses. Bridges are more intelligent than repeaters, but they are unable to move data across multiple networks simultaneously.
A technician installed a UTP splitter on one of your network segments that has CAT6e cable. What is the maximum speed supported by this connection?
A. 10Mbps
B. 100Mbps
C. 1Gbps
D. 10Gbps
B. 100Mbps
An Ethernet splitter will take the incoming signal on two pairs and then split it, so on the output end it produces two sets of signals using two pairs each. Because of this, Ethernet splitters are limited to 100Mbps connections. It is not recommended that you use Ethernet splitters on a network. If you need to connect multiple computers using UTP, use a hub or a switch.
You are installing a fiber-optic cable between two buildings. To install the cable, you must run it through a conduit between the buildings, and access to the conduit is not easy. Before you run the cable, you want to ensure it’s working properly. Which tool should you use?
A. Cable tester
B. Multimeter
C. Loopback plug
D. Tone generator and probe
A. Cable tester
Cable testers are indispensable tools for any network technician. Usually you would use a cable tester before you install a cable to make sure it works. Of course, you can test them after they’ve been run as well.
Which TCP/IP protocol, designed to download email, allows for multiple clients to be simultaneously connected to the same mailbox?
A. SMTP
B. POP3
C. IMAP
D. SMB
C. IMAP
Internet Message Access Protocol (IMAP) is a secure protocol designed to download email. It has several advantages over the older Post Office Protocol 3 (POP3). First, IMAP4 works in connected and disconnected modes. Second, it lets you store the email on the server, as opposed to POP3, which requires you to download it. Third, IMAP4 allows multiple clients to be simultaneously connected to the same inbox.
You are using your laptop on the company network. In your web browser, you type in www.google.com and press Enter. The computer will not find Google. You open the browser on your phone, and using your cellular connection, you can open Google without a problem. Your laptop finds internal servers and can print without any issues. What is the most likely reason you can’t open Google?
A. DNS server problem
B. DHCP server problem
C. Missing subnet mask
D. Duplicate IP address
A. DNS server problem
The Domain Name System (DNS) server is responsible for resolving host names, such as www.google.com, to IP addresses to enable communication. If it’s not working properly or you can’t connect to it, you won’t be able to browse the Internet using friendly website names.
A technician needs to run a network cable to a remote building, which is approximately 15 kilometers from his base station. He’s not sure if any cable will span that distance. What is the maximum distance of SMF cable?
A. 300 meters
B. 550 meters
C. 40 kilometers
D. 100 kilometers
C. 40 kilometers
Single-mode fiber (SMF) can provide data throughput rates of 10Gbps at a distance of 40 kilometers.
You have been asked to install a run of RG-59 cable from one end of a building to the other. What is the maximum distance for this type of cable run?
A. 100 meters (328 feet)
B. 228 meters (750 feet)
C. 304 meters (1,000 feet)
D. 500 meters (1,645 feet)
B. 228 meters (750 feet)
RG-59 network cable can run for about 228 meters (750 feet). The slightly thicker RG-6 can run for about 304 meters (1,000 feet).
Which one of the following TCP/IP protocols was designed as a replacement for Telnet?
A. SMB
B. SSH
C. SFTP
D. FTPS
B. SSH
Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. Because it’s secure, it was originally designed to be a replacement for the unsecure telnet command.
Which of the following network connectivity devices operate at Layer 2 of the OSI model? (Choose two.)
A. Hub
B. Switch
C. Bridge
D. Router
B. Switch
C. Bridge
Switches and bridges work at Layer 2. Switches are multiport bridges.
In IPv4, what is the function of the subnet mask?
A. It tells hosts where to route packets.
B. It differentiates between the network ID and host ID.
C. It determines which subnet the host is on.
D. It masks external networks from the host.
B. It differentiates between the network ID and host ID.
Computers are able to differentiate where the network ID ends and the host address begins through the use of a subnet mask.
Which of the following TCP/IP protocols is connection oriented and attempts to guarantee packet delivery?
A. IP
B. TCP
C. UDP
D. ICMP
B. TCP
Transmission Control Protocol (TCP) guarantees packet delivery through the use of a virtual circuit and data acknowledgments, and User Datagram Protocol (UDP) does not. Because of this, TCP is often referred to as connection oriented, whereas UDP is connectionless.
Which TCP/IP protocol allows a user to log into a remote computer and manage files as if they were logged in locally?
A. FTP
B. SFTP
C. SMB
D. Telnet
D. Telnet
Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, the user can manage files on that remote machine just as if they were logged in locally.
You are given a network configuration of 155.100.63.0/26 from your ISP. When you configure your network hosts, what subnet mask should you assign them?
A. 255.255.0.0
B. 255.255.255.0
C. 255.255.255.192
D. 255.255.255.240
C. 255.255.255.192
A CIDR shorthand notation of /26 corresponds to the subnet mask 255.255.255.192.
Which Wi-Fi standard specifies a maximum of 54Mbps transmissions in the 2.4GHz frequency range?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
C. 802.11g
802.11g specifies a maximum of 54Mbps transmissions in the 2.4GHz frequency range.
Which TCP/IP protocol is used to provide shared access to files and printers on the network?
A. FTP
B. SSH
C. SMB
D. SNMP
C. SMB
Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. In a way, it functions a bit like FTP only with a few more options, such as the ability to connect to printers, and more management commands.
What port number does the Telnet protocol use?
A. 21
B. 22
C. 23
D. 25
C. 23
Telnet lets users log into another machine and “see” the remote computer in a window on their screen. Although this vision is text only, the user can manage files on that remote machine just as if they were logged in locally. Telnet uses port 23.
You have just installed a wireless 802.11ac network for a client. The IT manager is concerned about competitors intercepting the wireless signal from outside the building. Which tool is designed to test how far your wireless signal travels?
A. Tone generator and probe
B. Protocol analyzer
C. Packet sniffer
D. Wi-Fi analyzer
D. Wi-Fi analyzer
A wireless locator or a Wi-Fi analyzer can be either a handheld hardware device or specialized software that is installed on a laptop and whose purpose is to detect and analyze Wi-Fi signals. It can detect where signals are strong or weak to determine whether there are potential security issues.
Some of your network users are concerned about submitting confidential information to an online website. What should you tell them?
A. It’s fine, because all Internet traffic is encrypted.
B. If the website address starts with TLS://, it should be OK to submit co fidential information to a trusted site.
C. If the website address starts with HTTPS://, it should be OK to submit confidential information to a trusted site.
D. Don’t ever submit confidential information to any online website.
C. If the website address starts with HTTPS://, it should be OK to submit confidential information to a trusted site.
Internet traffic is not encrypted by default. Websites that are secure and encrypt their transmissions will start with HTTPS://rather than HTTP://. These sites can be trusted to encrypt the data, and their identity is verified.
Which TCP/IP Internet layer protocol is responsible for delivering error messages if communication between two computers fails?
A. ICMP
B. IP
C. TCP
D. UDP
A. ICMP
The main Internet layer protocol is Internet Protocol (IP), and it’s the workhorse of TCP/IP. Another key protocol at this layer is Internet Control Message Protocol (ICMP), which is responsible for delivering error messages. If you’re familiar with the ping utility, you’ll know that it utilizes ICMP to send and receive packets.
Which type of IPv6 address identifies a single node on the network?
A. Multicast
B. Anycast
C. Unicast
D. Localcast
C. Unicast
There are three types of addresses in IPv6: unicast, anycast, and multicast. A unicast address identifies a single node on the network. An anycast address refers to one that has been assigned to multiple nodes. A multicast address is one used by multiple hosts.
You are configuring a wireless 802.11n router for a small network. When setting it up, which security option should you choose?
A. WPA2
B. WPA
C. WEP
D. SSID
A. WPA2
Of the wireless encryption methods listed, WPA2 is the newest and most secure. Some routers offer WPA2 Enterprise, which is a great choice as well.
What type of network covers large geographical areas and often supports thousands of users?
A. LAN
B. WAN
C. PAN
D. MAN
B. WAN
A wide area network (WAN) covers large geographical areas and often supports thousands of users.
Which TCP/IP protocol, developed by Microsoft, allows users to connect to remote computers and run programs on them?
A. RDP
B. SMB
C. CIFS
D. Telnet
A. RDP
Developed by Microsoft, the Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. When you use RDP, you see the desktop of the computer you’ve signed into on your screen. It’s like you’re really there, even though you’re not.
What port number does the SSH protocol use?
A. 21
B. 22
C. 23
D. 25
B. 22
Secure Shell (SSH) can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files. SSH uses port 22.
Which of the following IP addresses is not routable on the Internet?
A. 10.1.1.1
B. 11.1.1.1
C. 12.1.1.1
D. 13.1.1.1
A. 10.1.1.1
Private IP addresses are not routable on the Internet. The private IP address range for class A networks is 10.0.0.0/8.
Which network connectivity device does not forward broadcast messages, thereby creating multiple broadcast domains?
A. Hub
B. Switch
C. Bridge
D. Router
D. Router
One of the key features of routers is that they break up broadcast domains. Broadcast traffic on one side of the router will not get passed to the other side, which greatly reduces network traffic.
You have a desktop computer that is behaving erratically on the network. The wired connection will often disconnect without warning. Which tool should you use to troubleshoot the network adapter?
A. Multimeter
B. Tone generator and probe
C. Loopback plug
D. Cable tester
C. Loopback plug
A loopback plug is for testing the ability of a network adapter to send and receive. The plug gets plugged into the NIC, and then a loopback test is performed using troubleshooting software. You can then tell whether the card is working properly.
Your company just expanded and is leasing additional space in an adjacent office building. You need to extend the network to the new building. Fortunately, there is a conduit between the two. You estimate that the cable you need to run will be about 300 meters long. What type of cable should you use?
A. CAT5
B. CAT5e
C. CAT7
D. MMF
D. MMF
UTP cables are limited to 100 meters, so CAT5 and CAT7 will not work. You need fiber, and multimode fiber (MMF) can span distances of 300 meters.
You want to ensure that client computers can download email from external email servers, regardless of the protocol their email client uses. Which ports do you open on the firewall to enable this? (Choose two.)
A. 23
B. 25
C. 110
D. 143
C. 110
D. 143
Simple Mail Transfer Protocol (SMTP, port 25), Post Office Protocol 3 (POP3, port 110), and Internet Message Access Protocol (IMAP, port 143) are all email protocols. SMTP is for sending email. POP3 and IMAP are for downloading email.
You are installing network cabling in a highly secure facility. The cables need to be immune to electronic eavesdropping. What type of cable should you use?
A. Fiber-optic
B. UTP
C. STP
D. Coaxial
A. Fiber-optic
Fiber-optic cabling uses pulses of light instead of electric voltages to transmit data, so it is immune to electrical interference and to wiretapping.
Which networking device is capable of reading IP addresses and forwarding packets based on the destination IP address?
A. Hub
B. Switch
C. Bridge
D. Router
D. Router
Routers operate at the Network layer (Layer 3) of the OSI model. Because of this, they make their decisions on what to do with traffic based on logical addresses, such as an IP address.
Which network device is designed to be a security guard, blocking malicious data from entering your network?
A. PoE injector
B. Bridge
C. Firewall
D. Router
C. Firewall
A firewall is a hardware or software solution that serves as your network’s security guard. Firewalls can protect you in two ways: they protect your network resources from hackers lurking in the dark corners of the Internet, and they can simultaneously prevent computers on your network from accessing undesirable content on the Internet.
You are manually configuring TCP/IP hosts on the network. What configuration parameter specifies the address of the router that enables Internet access?
A. Subnet mask
B. DHCP server
C. DNS server
D. Default gateway
D. Default gateway
The default gateway is the address to the network’s router, which will allow the host to communicate with hosts not on the local network.
A senior administrator calls you and tells you that she is working from home and trying to use RDP, but it won’t let her. What port do you need to ensure is open on the firewall to grant her access?
A. 143
B. 443
C. 548
D. 3389
D. 3389
The Remote Desktop Protocol (RDP) allows users to connect to remote computers and run programs on them. It uses port 3389.
Identify the cable connector in the picture.
A. F-connector
B. BNC
C. SC
D. ST
A. F-connector
F-connectors are threaded and screw into place. The BNC connector locks by twisting one-quarter turn. SC and ST connectors are for fiber-optic cable.
What type of network is most commonly associated with Bluetooth devices and covers a small area?
A. LAN
B. WAN
C. PAN
D. MAN
C. PAN
A personal area network (PAN) is a small-scale network designed around one person within a limited boundary area. The term generally refers to networks that use Bluetooth technology.
Identify the type of cable connectors shown here.
A. F-connector
B. BNC
C. SC
D. ST
B. BNC
The connectors pictured are BNC connectors. They are identifiable by their groove-and-notch fastening mechanism that locks by twisting one-quarter turn. F-connectors are easily identifiable because they are threaded. SC and ST connectors are for fiber-optic cable.
Which TCP/IP Internet layer protocol is responsible for resolving physical MAC addresses to logical IP addresses?
A. IP
B. ICMP
C. ARP
D. RARP
D. RARP
At the Internet layer of TCP/IP, Address Resolution Protocol (ARP) resolves logical IP addresses to physical MAC addresses built into network cards. Reverse ARP (RARP) resolves MAC addresses to IP addresses.
Which of the following IPv6 addresses is equivalent to an address in the 169.254.0.0/16 range in IPv4?
A. 2000::/3
B. FC00::/7
C. FE80::/10
D. FF00::/8
C. FE80::/10
The 169.254.0.0/16 range in IPv4 is the APIPA range, used for automatic configuration if the host can’t locate a DHCP server. The same task in IPv6 is accomplished with a link local address in the FE80::/10 range.
Identify the connectors shown here, from left to right.
A. ST and SC
B. SC and ST
C. RJ-45 and RJ-11
D. RJ-11 and RJ-45
D. RJ-11 and RJ-45
The connectors are a four-pin RJ-11, typically used for telephone installations, and an eight-pin RJ-45 connector, used on UTP and STP for network transmissions.
You need to configure a wireless router for an office network. The office manager wants new devices to be able to automatically join the network and announce their presence to other networked devices. Which service should you enable to allow this?
A. DHCP
B. NAT
C. QoS
D. UPnP
D. UPnP
Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and to enable those devices to automatically announce their presence to other devices on the network.
You are troubleshooting a computer with an IPv6 address that is in the FE80::/10 range. Which of the following statements are true? (Choose two.)
A. The computer will not be able to get on the Internet.
B. The computer will be able to get on the Internet.
C. The computer is configured with a link local unicast address.
D. The computer is configured with a global unicast address.
A. The computer will not be able to get on the Internet.
C. The computer is configured with a link local unicast address.
Addresses in the FE80::/10 range are link local unicast addresses. A link local address is assigned to each IPv6 interface but is not routable on the Internet. If this is the only address the host has, it will not be able to get on the Internet.