Prep Test 5 Flashcards
Question 3 of 90 You are connecting several remote sites of your organization to the Internet using the DOCSIS telecom standard. Which of the following type of cabling would be used to bring the network from the curb to your premises? Answers A. RG-59 B. Cat 7a C. RG-6 D. Cat 6
C.
RG-6
RG-6 is a common type of coaxial cable used in a wide variety of residential and commercial applications. The most commonly recognized variety of RG-6 is cable television (CATV) distribution coax, used to route cable television signals to homes and offices. More recently, this same RG-6 cable infrastructure is used to provide network connectivity using the DOCSIS standard for data transmission.
Question 5 of 90 You are provided with a structured cabling infrastructure of Cat 5e UTP. What is the fastest compatible Ethernet standard that can run over such a cabling infrastructure? Answers A. 10BASE-T B. 1000BASE-T C. 10GBASE-T D. 100BASE-T
B.
1000BASE-T
1000BASE-T which is defined in IEEE 802.3ab is a standard for Gigabit Ethernet over copper wiring. Each 1000BASE-T network segment can be a maximum length of 100 meters and must use Category 5 cable or better to provide the maximum available speeds. This standard is also known as Gigabit Ethernet. Its predecessor, 100BASE-T with a standard speed of 100Mbps is known as Fast Ethernet.
Question 7 of 90 You are required to determine at which frequency a specific signal is at its strongest. You also want to monitor the unwanted interference and keep it at an acceptable level. To be able to resolve this issue, which of the following tool is going to be most appropriate one? Answers A. Multimeter B. Wi-Fi Analyzer C. Tone generator D. Frequency analyzer E. Spectrum analyzer
E.
Spectrum analyzer
A spectrum analyzer measures the magnitude of an input signal versus frequency within the full frequency range of the instrument. The primary use is to measure the power of the spectrum of known and unknown signals. The input signal that a spectrum analyzer measures is electrical. A spectrum analyzer resembles a more traditional oscilloscope.
Question 15 of 90 You are asked to migrate and upgrade a set of fiber connections from a standard providing 1 Gbps speeds to an improved standard. However, the networking equipment you are currently using does not support this new standard. To interconnect the old devices with devices of a new standard, you are required to connect four 1 Gbps connectors onto one port of the new standard using a specialized cable. What is the new standard that you are implementing? Answers A. QSFP B. SFP C. SFP+ D. GBIC
A.
QSFP
Quad Small Form-factor Pluggable (QSFP) is a compact, hot-pluggable transceiver used for data communications applications. It is an improvement in the SFP standard that increases the speed of Ethernet connections by a factor of four. Specifically, it binds four 1 Gigabit-Ethernet channels into one providing 4 Gbps speeds.
Question 19 of 90
Which of the following types of media can SIP be used with? [Choose three that apply.]
Answers
A. Instant messaging B. Voice C. Photos D. E-mail E. Video
A. Instant messaging B. Voice E. Video Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling communication sessions for use with real-time communications including voice over IP technologies as well as video, presence and instant messaging functionalities. SIP uses port 5060 and SIPS uses port 5061.
Question 25 of 90 When troubleshooting a networking problem, after you establish a plan of action to resolve the problem in question, which of the following should be done? Answers A. Document the plan B. Execute the plan C. Discard the plan D. Review and revise the plan
A.
Document the plan
When troubleshooting a networking problem, after the procedures for determining a theory and a probable cause of the problem are complete and after this theory is confirmed, the troubleshooting process moves into the resolution stage. This stage involves preparing an action plan that will have specific steps that must be taken to resolve the problem. Such a plan should be documented, at least informally at first, to have a record of what must be done.
Question 33 of 90 Users on a network are complaining that they cannot connect to a Web server by its name in the Web browser. You can access the Web server using its IP address. You discover an access list is blocking several UDP ports. Which port should you remove from the access list to allow users to connect to the Web server? Answers A. 530 B. 22 C. 443 D. 53
D.
53
The Domain Name System (DNS) is a hierarchical decentralized naming system for computers services and other resources connected to the Internet. It is used to associate various information with domain names. More specifically, it is used to translate IP addresses to human-friendly domain names. DNS uses UDP port 53.
Question 46 of 90 You are asked to design a network for an enterprise that has been given a range of 16 IPv4 public addresses. The estimated number of devices on the enterprise network that will require Internet access is around 250. Which of the following mechanisms should you use to be able to leverage the use of the public-address space for all the necessary devices within the network? Answers A. Port Address Translation (PAT) B. One-to-one Network Address Translation (OTO-NAT) C. Public Address Translation(PAT) D. RFC1918 for private IP addresses E. Multiple Address Translation (MAT)
A.
Port Address Translation (PAT)
Network Address Translation (NAT) is a method of translating one IP address space into another by modifying the network information in the header of the IP packets. To allow for the translation of many internal private IP addresses to a few external public IP addresses, Port Address Translation (PAT) must be employed. PAT uses the unique IP address-port combination to uniquely identify multiple internal hosts using a single external IP address.
Question 49 of 90
You are the security administrator for your organization. You have seen a few recent incidents of ransomware attacks in the organization and would want to prevent them. Which of the following possible methods should you deploy to prevent future ransomware attacks? [Choose two that apply.]
Answers
A. Close all ports in the enterprise firewall B. Implement an E-mail content filtering solution C. Install a web content filtering solution D. Configure each system with latest antivirus updates E. Run regular Windows Update on each system
B.
Implement an E-mail content filtering solution
C.
Install a web content filtering solution
The two possible solutions that you could deploy are E-mail content filtering and Web content filtering. Both are likely to filter out the ransomware attacks. Most importantly, the users should not click on any URL in an unknown E-mail. The users must be educated on such aspects.
Question 51 of 90
You have installed and configured a Layer 3 switch with multiple VLANs. Which of the following can be accomplished by this switch that a Layer 2 switch cannot perform?
Answers
A.
Perform routing functions with multiple VLANs
B.
Use Simple Network Management Protocol (SNMP)
C.
Use Quality of Service (QoS) feature
D.
Configure, manage, and monitor a LAN
A.
Perform routing functions with multiple VLANs
The configuration of VLANs is inherent to layer two devices, specifically, switches. VLANs however are only configurable on managed switches, as unmanaged switches do not possess the appropriate software and capabilities for such configurations. In this scenario, except for performing routing functions, a Layer 2 switch will be able to perform all functions. Therefore, Layer 3 switch is required to perform a routing function. A router can be an alternate to Layer 3 switch as far as routing is concerned.
Question 64 of 90 Which of the following OSI layers is responsible for translating, formatting and delivering information to the topmost layer of the OSI model? Answers A. Presentation Layer B. Network Layer C. Transport Layer D. Application Layer E. Session Layer
A.
Presentation Layer
The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display.
Question 68 of 90 Root guard, when implemented on a switch port, will ensure which of the following? Answers A. The port will remain a designated port B. The port will become an access port C. The port will become a root port D. The port will become disabled
A.
The port will remain a designated port
The root guard feature provides a way to enforce the root bridge placement in the network. The root guard ensures that the port on which root guard is enabled is the designated port. Normally, root bridge ports are all designated ports, unless two or more ports of the root bridge are connected. If the bridge receives superior STP Bridge Protocol Data Units (BPDUs) on a root guard-enabled port, root guard moves this port to a root-inconsistent STP state. This root-inconsistent state is effectively equal to a listening state. No traffic is forwarded across this port. In this way, the root guard enforces the position of the root bridge.
Question 70 of 90 You have a configuration file of a network device that contains clear text passwords and other sensitive information. Which of the following protocols would you use to remotely backup and restore the configuration file of this device? Answers A. SFTP B. TFTP C. FTP D. SMB
A.
SFTP
Secure Shell (SSH) File Transfer Protocol, also referred to as Secure File Transfer Protocol (SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream. It is commonly used to provide secure access and management of network device file systems especially for the backup and restoration of configuration files that contain sensitive information such as passwords and cryptographic keys.
Question 71 of 90 You need to provide documentation to your colleague that contains information concerning the copper patch panels that connect end devices to switches and the patch panels that interconnect the telecom closets of the building. What information is being requested? Answers A. Maintenance assessment checklist B. IDF/MDF documentation C. Network audit documentation D. Inventory management documentation E. Network configuration and performance baselines
B.
IDF/MDF documentation
The Intermediate Distribution Frame (IDF) is a distribution infrastructure that cross-connects end user to network equipment. This is often done using patch panels and switches. The clear majority of IDF use copper media. The Main Distribution Frame (MDF) is a distribution infrastructure that cross-connects links between IDFs. This distribution frame can also use copper media but most often uses fiber optic cabling.
Question 76 of 90 One of your junior wireless network administrators has configured a wireless router with WPA+TKIP. You know it is not secured and therefore, want to make changes. Which of the following changes should you make? Answers A. WPA+CCMP B. WPA2+TKIP C. WPA+EAP D. WPA2+CCMP
D.
WPA2+CCMP
WPA is no longer considered a secure solution and has been replaced by WPA2 which is currently mandatory on all Wi-Fi devices and provides CCMP and AES encryption support.