Prep Test 5 Flashcards
If you implement Windows Server 2012-based IPAM, which of the following would be true? [Choose two that apply.]
Answers
A. It supports only a single DHCP server. B. You can use PowerShell to import non-Microsoft devices. C. It supports up to 2000 scopes. D. It supports only Microsoft devices.
A.
It supports only a single DHCP server.
D.
It supports only Microsoft devices.
IP address management (IPAM) is software that can plan, track, and manage the IP addresses used in a computer network. IPAM integrates Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) so that each is aware of changes in the other; for instance, DNS identifies the IP address of a client via DHCP and updates its database accordingly. Windows Server 2012-based IPAM only support Microsoft devices, and you can use PowerShell to import non-Microsoft devices.
Question 11 of 90
To which of the following does DiffServe provide low-latency? [Choose two that apply.]
Answers
A. Voice B. Streaming media C. Web traffic D. file transfers
A.
Voice
B.
Streaming media
There are two principal approaches to QoS in IP networks, a parameterized system based on an exchange of application requirements with the network, and a prioritized system where each packet identifies a desired service level to the network. Differentiated Services (DiffServ) marks packets according to the type of service they require. In response to these markings, routers and switches use various queueing strategies to tailor performance to requirements. DiffServ can provide low-latency to voice or streaming media. On the other hand, it can provide best-effort service to non-critical services such as web traffic or file transfers.
Question 12 of 90 When a client requests IP configuration parameter from a DHCP server, which ports are used by the client and the server respectively? Answers A. Only port 67 for client and server B. Only port 68 for client and server C. Client - 67Server - 68 D. Client - 68Server - 67
D.
Client - 68Server - 67
Dynamic Host Configuration Protocol (DHCP) automatically provides IP network configuration parameters such as IP addressing, subnet mask, gateway and DNS server information to network devices on the network. In a DHCP exchange, the client uses port 68 to communicate with the server while the server uses port 67 to communicate with the client.
Question 14 of 90
You are the security administrator for your organization. Recently, you started facing problems in connecting to the Web server on port 80. You want to troubleshoot this issue as soon as possible. What should you do?
Answers
A.
Use a protocol analyzer to capture packets between your system and the Web server
B.
Reboot the Web server
C.
Run a port scanner and check whether port 80 is opened
D.
Check the firewall ports on the Web server for port 80
E.
Check for the maximum number of users connected to the Web server
A.
Use a protocol analyzer to capture packets between your system and the Web server
A protocol analyzer is a software tool used to capture and analyze signals and data traffic over a communication channel. Such a channel varies from a local computer bus to a satellite link, that provides a means of communication using a standard communication protocol (networked or point-to-point). Ethernet and IP protocol analyzers usually organize data based on the OSI or the TCP/IP model. Using the protocol analyzer, you can capture the packets that are sent from the one system to another system.
Question 16 of 90 Which of the following devices belong to the Network layer of the OSI model? Answers A. Hub B. Router C. Switch D. Bridge
B.
Router
A router operates on the Network layer device since it examines packets at least up to their layer 3 headers. A router also performs routing based on the destination IP address found in each packet.
Question 21 of 90
You have a small network of 100 computers and 10 servers. Each computer is configured to get an IP address from DHCP server. Servers are configured with the static IP addresses. A single DHCP pool is configured to lease IP addresses for seven days. While working on a server, you are prompted with the duplicate IP address error. You check the other servers and find that most of them are receiving the same message. What should you do to resolve this issue?
Answers
A.
Create a reservation in DHCP for all servers
B.
Run ipconfig /flushdns command on each server
C.
Configure each server to get IP address from DHCP server
D.
Create a new pool of DHCP server and configure servers to get IPs from this pool
A.
Create a reservation in DHCP for all servers
If you use a DHCP server and need to assign static IP addresses to network devices or servers, you should create reservations. In reservation, the IP address is bound to the MAC address of the device or server. DHCP, then, does not lease this IP address to any other device or system on the network.
Question 23 of 90 You are creating a single IPv4 subnet that requires all computers to receive specific type of packets and process them. If the subnet has a router that protects these packets from being forward, then which of the following have you created? Answers A. Physical domain B. Broadcast domain C. Collision domain D. Multicast domain
B.
Broadcast domain
A single IPv4 subnet is always configured within a single LAN segment. This means that the subnet in question is equivalent in scope to a broadcast domain.
Question 27 of 90
For which of the following situations would a media converter be used?
Answers
A.
Convert a coaxial antenna link to a UTP video connection
B.
Connect a wireless client to a wired access point
C.
Convert a fiber optic to a copper connection
D.
Connect a 100BASE-T to a 1000BASE-T link
C.
Convert a fiber optic to a copper connection
A media converter is a network device that allows the connection of two dissimilar network media types. Within the context of networking, a media converter is typically used to convert a fiber optic connection to copper (UTP or coaxial). Media converters are Layer 1 devices, that is, they don’t have any networking intelligence beyond the conversion of electrical signals to light and vice versa and thus they do not take any header information into account for their operation.
Question 28 of 90
Which of the following symptoms can a damaged cable cause in a network link? [Choose three that apply.]
Answers
A. Increased network speeds B. Complete link failure C. Increase in port errors D. Degraded network performance E. Decrease in error checking ability F. Increase in jitter
B. Complete link failure C. Increase in port errors D. Degraded network performance
When troubleshooting a network and when beginning from the physical layer, one of the basic things that should be examined is the integrity of the physical cables being used. This is especially the case for patch cords that are often plugged and unplugged and those that connect end devices to the network jacks. The integrity of structured cabling should also be checked although damage to such infrastructure is less likely under normal circumstances. Damaged cables can cause a degradation in network performance, an increase in several port errors as well as a complete link failure.
Question 32 of 90 Which of the following does a VLAN provide? Answers A. A logical segmentation of a network B. A physical segmentation of a network C. The partitioning of a network into collision domains D. Segmented cabling for each LAN
A.
A logical segmentation of a network
A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a network at the data link layer. VLANs work by applying tags to network packets and handling these tags in networking systems – creating the appearance and functionality of network traffic that is physically on a single network but acts as if it is split between separate networks. In this way, VLANs can keep network applications separate providing additional security despite being connected to the same physical network, and without requiring multiple sets of cabling and networking devices to be deployed.
Question 42 of 90 Which of the following technologies is likely to be used by a telecom service for cost efficient data transmissions for intermittent traffic between LANs? Answers A. SIP Trunk B. Metropolitan Ethernet C. Frame Relay D. ATM
C.
Frame Relay
Frame Relay is a standardized wide area network (WAN) technology that specifies the physical and data link layers of digital telecommunications channels using a packet switching methodology. This technology aims to provide a telecommunication service for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between end-points in a wide area network (WAN).
Question 47 of 90 You need to design a Wi-Fi network in a remote area for a holiday resort. You are asked to design it in such a way to maximize coverage while minimizing the number of access points. There will be relatively few users and bandwidth requirements will be limited. Which of the following design parameters should you choose? Answers A. Implement a wireless mesh network B. Use the 6.7 GHz frequencies C. Use the 2.4 GHz frequencies D. Provide a wired network infrastructure to support access points E. Use the 5 GHz frequencies
C.
Use the 2.4 GHz frequencies
In general, lower frequency radio waves are absorbed less by obstacles than higher frequency radio waves. Obstacles can include air, humidity as well as walls, furniture, and people. For this reason, if all else is equal, 2.4GHz frequencies provide a larger coverage area than. Also, since the area is remote, it will not be affected by interference from other 2.4GHz sources and bandwidth requirements are low. This means that the advantages of the 5 GHz frequencies are not useful in this case, so the use of 2.4GHz frequencies is the best choice.
Question 49 of 90 If you were to perform remote file system management of the network devices, which of the protocol will you use? Answers A. SMB B. FTPS C. FTP D. TFTP
B.
FTPS
File transfer protocol Secure (FTPS) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols to provide security and confidentiality to file transfers. FTPS, along with the insecure TFTP and FTP protocols, are used extensively for remote file system management of network devices.
Question 58 of 90
You configured a Web server on your Windows system to allow others on the local network to view a Web page that you created. Users attempt to connect, however, are unable to either by using the Website URL or the IP address. You can ping the Website URL and it resolves to the correct IP address. You verify that the web server is up. What is the probable cause?
Answers
A.
The Web server must be configured to accept incoming requests.
B.
The DNS service is unresponsive.
C.
The firewall on your system is blocking incoming requests
D.
The Hosts file on your system is not updated with the correct IP address for the Website.
C.
The firewall on your system is blocking incoming requests
Host-based firewall settings are those that are configured on each individual workstation. The firewall may be provided by the operating system itself or may be a standalone software package that provides security features and functionalities to the network connection of the device. If there are incorrect settings on this firewall, legitimate services may be blocked, and if so, a message usually informs the user of such a violation. In such cases, firewall settings should be adjusted to allow for desired services to function.
Question 59 of 90 A user of a corporate wireless network sees multiple networks with the same corporate SSID listed in the available wireless networks. Which of the following attacks might the user become a victim of? Answers A. Rogue access point B. Evil twin C. Wireless security breach D. War-driving E. Wi-Fi poisoning
B.
Evil twin
An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate, set up to eavesdrop on wireless communications. This type of attack may be used to steal the passwords of unsuspecting users, either by monitoring their connections or by phishing, which involves setting up a fraudulent web site and luring people there.