SEC+ Revision Questions Networking Basics and Terminology Flashcards

1
Q

Which network device transmits data between different networks by examining the destination network address in a packet?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have been asked to implement a solution that separates a large busy network into many smaller collision domains. Which device should you implement?

A

Layer 2 switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A busy website has not been responding well because of the large volumes of HTTP connections to the web server. Which solution would increase web server performance?

A

Install two web servers hosting the same content. Configure a load balancer to distribute incoming HTTP connections between the two web servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Your network consists of customers who connect to the Internet using their Wi-Fi mobile devices and employees who use their wired desktops for company business. You must ensure customer traffic and corporate network traffic are kept isolated. What should you do?

A

Place the wireless access point on a separate VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your company’s networks and devices were recently migrated to IPv6, although there are still a small number of IPv4 hosts online. You are asked to verify that a server named hq-01.acme.com is reachable on the network via IPv6. Write the command(s) you would use to verify this:

A

Ping -6 hq-01.acme.com

-6: This option tells the ping command to use IPv6 (Internet Protocol version 6) instead of the default IPv4 (Internet Protocol version 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your network consists of routers and switches, as well as a variety of other network devices. You are configuring a wireless router, as shown in Figure 1-1, and need to allow network management traffic through. Which protocol should be removed from the blocked list?

link to figure 1.1

A

SNMP

Simple Network Management Protocol (SNMP)
breakdown:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which protocol suite uses 128-bit IP addresses?

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your newly configured SMTP mail server is not receiving mail from the Internet. You realize you did not configure any DNS records for SMTP mail transfer. Which type of DNS resource record must you create?

A

MX

Breakdown:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

While troubleshooting connectivity to your remote file server, you realize that a firewall is preventing you from pinging the server. Which type of firewall rule should you create to allow ping traffic?

A

ICMP

Breakdown:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

199.126.19.71 is an example of which type of address?

A

IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your Linux virtual file server is running out of disk space. It has been decided that a network storage appliance on a dedicated TCP/IP network will provide disk space to your file server. Which type of SAN disk access protocol will be used by the file server?

A

iSCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your SAN solution uses optical technology designed solely for high-speed connectivity from servers to disk storage. Which type of SAN is this?

A

Fibre Channel SAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do FCoE and iSCSI differ?

A

iSCSI uses TCP/IP; FCoE does not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which TCP/IP protocol uses TCP ports 20 and 21?

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which TCP/IP protocol does not have authentication configuration options?

A

TFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is Telnet used for?

A

Performing clear-text remote command-line management

17
Q

Stacey, your assistant, has captured network traffic on your LAN for a 24-hour period, as shown in Figure 1-2. You would like to view network traffic related to users connecting to websites. Which protocol in the protocol column should you filter by?

A

HTTP

18
Q

Which network protocol is not routable?

A

NetBIOS

19
Q

In Figure 1-3, match each stated requirement with its appropriate network device

A
20
Q

Your wiring closet consists of three 24-port Ethernet switches all linked together. Computers from the Accounting department are plugged into each Ethernet switch, as are computers from the Research department. Your manager asks you to ensure computers in the Accounting
department are on a different network than computers in the Research department. What could you do? (Choose two.)

A. Replace the Ethernet switches with Ethernet hubs.

B. Configure all Accounting computers on the same TCP/IP subnet (e.g., 192.268.2.0 /24) and configure all Research computers on their own TCP/IP subnet (e.g., 192.168.3.0 /16).

C. Configure an Accounting VLAN that includes the Accounting computers and a Research VLAN that includes the Research computers.

D. Configure all Accounting computers on the same TCP/IP subnet (e.g., 192.168.2.0 /24) and configure all Research computers on their own TCP/IP subnet (e.g., 192.168.3.0 /24).

A

C. Configure an Accounting VLAN that includes the Accounting computers and a Research VLAN that includes the Research computers.

D. Configure all Accounting computers on the same TCP/IP subnet (e.g., 192.168.2.0 /24) and configure all Research computers on their own TCP/IP subnet (e.g., 192.168.3.0 /24).

21
Q

What type of address is fe80::dca6:d048:cba6:bd06?

A

IPv6

22
Q

Which of the following statements regarding DNS are true? (Choose two.)

A. It resolves NetBIOS computer names to IP addresses.

B. Client-to-server queries use TCP port 53.

C. It resolves FQDNs to IP addresses.

D. Given an IP address, DNS can return an FQDN.

A

C. It resolves FQDNs to IP addresses.
D. Given an IP address, DNS can return an FQDN.

23
Q

Which protocol uses TCP port 443?

A

HTTPS

24
Q

You are troubleshooting TCP/IP settings on a workstation. The workstation IP address is 10.17.6.8/24, the DNS server setting is set to 199.126.129.86, and the default gateway setting is set to 10.17.5.6. The router has a public IP address of 199.126.129.76/24 and a private internal IP address of 10.17.5.6/24. This workstation is the only station on the network that cannot connect to the Internet. What should you do?

A

Change the workstation IP address to 10.17.5.8

25
Q

You need a server to store router configuration files. The server must not require a username or password. Which type of server is the best choice?

A

TFTP

26
Q

Which TCP/IP protocol is designed to synchronize time between computers?

A

NTP

27
Q

Which TCP/IP protocol gives administrators a remote command prompt to a network service?

A

Telnet

28
Q

While capturing network traffic you notice some packets destined for UDP port 69. What type of network traffic is this?

A

TFTP

29
Q

Which TCP/IP protocols use encryption to secure data transmissions?

A

SSH, SCP, FTPS

30
Q
  1. Which of the following network connectivity devices function primarily using computer MAC addresses? (Choose two.)

A. Router

B. Bridge

C. Hub

D. Switch

A

B. Bridge
D. Switch

31
Q

Which of the following are considered TCP/IP transport protocols? (Choose two.)

A. HTTP

B. TCP

C. Telnet

D. UDP

A

B. TCP
D. UDP

32
Q

Your Vancouver users cannot connect to a corporate web server housed in Seattle, but they can connect to Internet web sites. The network technicians in Seattle insist the web server is running because Seattle users have no problem connecting to the Seattle web server. From the Vancouver network, you ping the Seattle web server but do not get a reply. Which tool should you use next?

A

tracert

33
Q

A workstation has an IP address of 169.254.46.86. The server administrators realize the DHCP service is offline, so they start the DHCP service. What command should be used next on the workstation to immediately obtain a valid TCP/IP configuration?

A

ipconfig /renew

34
Q

Which of the following is a security best practice for configuring an Ethernet switch?

A

Disable unused ports and assign MAC addresses to enabled ports.

35
Q

You are attempting to connect to one of your user’s computers using RDP but cannot get connected. A new firewall has been installed on your network. Which port must be opened on the firewall to allow RDP traffic?

A

3389