Test #1 Flashcards

1
Q

What is the role of port numbers in IP headers?
• Port numbers identify the path of routers between any two hosts that need to communicate with each other.
• Port numbers identify which interfaces on a router should receive data in and which interfaces should forward data out.
• Port numbers identify the sending and receiving processes between two hosts.
• Port numbers identify which connectors on a switch that should receive data in and which should forward data out.

A

• Port numbers identify the sending and receiving processes between two hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
What TCP/IP protocol is used to resolve an IP address to a MAC address?
•	DHCP
•	BootP
•	ARP
•	UDP
A

• ARP

Address Resolution Protocol (ARP) is a TCP/IP protocol that is responsible for resolving an IP address to a MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A technician has been tasked with planning for equipment failures. Which specs will the technician need to review to create a failure plan?
•	MTTR
•	SLA
•	MTTF
•	MTBF
A

MTTR
MTTF
MTBF
i. Mean Time To Repair (MTTR), Mean Time To Failure (MTTF) and Mean Time Between Failures (MTBF) are all specifications that should be known in planning for inevitable future failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which is the default port for NTP?
•	123
•	231
•	321
•	132
A

123

i. NTP uses port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Using an ACL in a firewall to block known malicious Web addresses is an example of which of the following?
•	IP filtering
•	MAC filtering
•	Application filtering
•	Port filtering
A

• IP filtering

i. IP filtering is correct. Filtering prevents access by names and/or IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which protocol in the TCP/IP protocol deals with logical addresses for hosts and resides at Layer 3 (Network Layer) of the OSI model?
•	TCP
•	IP
•	UDP
•	PPP
A
Internet Protocol (IP)
i.	Internet Protocol (IP) is the TCP/IP protocol that deals with logical addresses, commonly know as IP addresses, for host computers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following is not a packet switching technology?
•	Circuit Switch
•	ATM
•	MPLS
•	Frame Relay
A

Circuit Switching
i. Circuit switching is the opposite of packet switching – it creates a hard-wired circuit between two communicating nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Oliver has inherited a network without any labeled ports on the patch panel. What tool will he need to get the patch panel properly labeled?
•	Crossover cable
•	Toner
•	TDR
•	Hardware Loopback
A

Toner
i. The only tool that will work in this situation is the toner. A toner, which consists of a tone probe and a tone generator, can be used to trace out cables to determine the two ends of each table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which techniques can a technician use to harden her network? (Choose three.)
• Avoid saving certificates, passwords, and keys in the same location
• Keep account roles separated to avoid conflicts of interest
• Avoid using privileged accounts
• Track hardware and software for patch requirements

A
  • Keep account roles separated to avoid conflicts of interest
  • Avoid using privileged accounts
  • Track hardware and software for patch requirements

It is not wise to use privileged accounts. Unless it is necessary to perform administrative tasks. Accounts should be role-based and should not be able to perform tasks that would represent a conflict of interest to reduce the potential for abuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A technician suspects that a virus has infected the network. One of its actions appears to be that it utilizes a large amount of network bandwidth. What is the BEST tool that the technician can use to quickly determine which workstations are infected?
•	Network Sniffer
•	Syslog
•	SNMP
•	Web server
A

Network Sniffer

i. A sniffer is used to examine network traffic. These are more commonly known as packet sniffers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Network upgrades have been completed, and the network protocols have been modernized. The WINS server was shut down. Since there is no need for NetBIOS traffic, it will no longer be allowed on the network. Which of the following will accomplish this objective?
•	IP filtering
•	Content filtering
•	Port filtering
•	MAC filtering
A

Port filtering
i. Port filtering, NetBIOS uses three well-known ports. Filter these (137, 139, and 15), and there will not be any more NetBIOS traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which type of fiber optic cable supports longer run lengths?
•	Laser-mode
•	Multi-mode
•	Fractal-mode
•	Single-mode
A

Single-mode

i. Single-mode cable carries laser pulses the longest distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
13.	Scott complains about slow access to the server and asks you to fix it. Which of the following utilities can you use to find the bottleneck on the network?
•	Telnet
•	Ping
•	Tracert
•	Nbtstat
A

Tracert
i. Tracert traces the route between the host and destination. When it finds a problem, it either shows the slow link with high access times or simply stops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the value of a baseline performance analysis?
• It causes CPU performance to scale up when more processing power is needed.
• It provides an inventory of all network and computer components.
• It shows the cause of network slowdowns.
• Provides a quantifiable reference to measure against current performance.

A

Provides a quantifiable reference to measure against current performance.
i. A performance baseline can be used to verify perceived performance slowdowns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which statements is true of VLANs?
• VLANs use SSH tunnels for cross-VLAN traffic.
• VLANs can only be implemented on specified ports on a router.
• VLANs enable remote station to connect to the LAN from across the Internet.
• VLANs break up broadcast domains into multiple, smaller broadcast domains.

A

VLANs break up broadcast domains into multiple, smaller broadcast domains.
i. VLANs break up a single broadcast domain into multiple, smaller broadcast domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
What command will assign a drive letter to a network share?
•	Net drive
•	Net assign
•	Net share
•	Net use
A

Net use

i. The net use command assigns a drive letter in the local computer to a shared folder on another computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which statement is not true about 10BaseT
• 10BaseT runs at ten (10) megabits per second
• 10BaseT requires Cat 5a UTP cable
• 10BaseT supports a maximum of 1024 nodes per switch
• The maximum distance between the switch and the node is 100 meters

A

10BaseT requires Cat 5a UTP cable

i. 10BaseT can run on Cat 3 or higher UTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Doug was troubleshooting in a wiring closet in 2013. The cabling diagrams and document are five years old and have little resemblance to what Doug sees. What configuration management process has fallen behind?
•	Baselining
•	Asset management
•	Change management
•	System logs
A

• Change management
i. Change management keeps track of all system changes since the last baseline was performed, and it can save lots of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which choice is true of a rogue DHCP server?
• A rogue DHCP server increases the speed of the DHCP service.
• A rogue DHCP server can assign incompatible IP addresses to hosts.
• A rogue DHCP server ensures that hosts will get compatible APIPA address.
• A rogue DHCP server increases the pool of available IP addresses.

A

A rogue DHCP server can assign incompatible IP addresses to hosts.
i. Rogue DHCP servers can assign incompatible IP addresses to hosts on a network, making them unable to communicate with other hosts or the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Mesh networks come in two varieties. What are two primary variants? (Select two.)
•	Partial
•	Peer-to-peer
•	Client-server
•	Full
A

Partial
Full
i. Mesh network topologies can be installed as a partial mesh or full mesh.

21
Q
Which coaxial cables have a characteristic impedance of 50 ohms? (Select two)
•	RG-58
•	RG-6
•	RG-8
•	RG-59
A

RG-8
RG-58
i. RG-8 and RG-58, known as Thicknet and Thinnet, have 50-ohm impedance and were used in early ethernet installations.

22
Q
Which choices are example of asymmetric encryption?(Choose two.)
•	Rivest-Shamir-Adleman
•	Elliptic Curve Cryptography
•	Blowfish
•	Data Encryption Standard
A

• Rivest-Shamir-Adleman
• Elliptic Curve Cryptography
i. Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA) are example of asymmetric encryption.

23
Q
What utility would you use on a UNIX system to help determine where an internet connection is being slowed down?
•	Ping
•	Ifconfig
•	Tracert
•	Traceroute
A

• Traceroute
i. Traceroute is a UNIX utility that traces out the path of your packets and determines the time it takes for the packet to reach node along the path. This can help determine where the slowdown is occurring.

24
Q
Your company has just purchased 800 new PCs for a roll-out you are about to make. Of the following choices, which should you update accordingly?
•	Wire Schemes
•	Change management
•	Baselines
•	Asset management
A

Asset management

i. Asset management is the documentation we use to keep track of all the network equipment and assets.

25
Q

Which statement is NOT true of 100 megabit Ethernet?
• Both 100BaseF and 100BaseFX run over multi-mode cable
• Ethernet can run at 100mbps on fiber or copper
• 100BaseTX supports runs of up to 2KM
• Both 100BaseT and 100BaseTXa runs over unshielded twisted pair

A

100BaseTX supports runs of up to 2KM

i. 100BaseTX only supports runs of up to 100 meters.

26
Q
Which of the following protocol is associated with monitoring devices on a network?
•	RDP
•	SNMP
•	EIGRP
•	SMTP
A

• SNMP
i. Simple Network Management Protocol (SNMP) is designed to monitor networks, reporting an incredible amount of detail about devices on the network.

27
Q
27.	Which committee governs the standards of Ethernet?
•	ISO 9002
•	ISO 9001
•	IEEE 802.3
•	IEEE 802.11n
A

• IEEE 802.3

i. IEEE 802.3 manages and maintains Ethernet standards.

28
Q
Which of the following connectors would be found on a fiber-optic cable?
•	BNC
•	RS-232
•	RJ-11
•	MT-RJ
A

• MT-RJ

29
Q

Which of the following is not a common certificate error or warning?
• Expired certificate
• Certificate not valid for the site
• Self-signed certificate
• Certificate is on the Certificate Revocation List (CRL)

A

• Certificate is on the Certificate Revocation List (CRL)

i. The CRL is the Certificate Revocation List

30
Q

Some users on a wireless network, but not all, are having trouble accessing certain network resources. Which of the following is the least likely cause?
• TCP and/UDP ports have been blocked by a firewall.
• The wireless access point has lost power.
• Access Control Lists have been changed.
• Server ports have changed to a non-standard port.

A

• The wireless access point has lost power.

i. If the WAP is unpowered, all users will be affected.

31
Q
A network technician has been tasked with monitoring the network. Which network function is it not necessary for her to monitor?
•	File hash changes
•	Server utilization
•	Bandwidth
•	Error alerts
A

• File hash changes

i. Changes to file hashes are not typical, real-world thing that requires aggressive or constant monitoring.

32
Q

Your network administrator has just added a small router to connect to the internet, but now you can’t connect to your network server. Your system is configured to obtain an IP address automatically. You ran the ipconfig command to find out your default gateway address, which is 192.168.4.152. You successfully pinged your default gateway. You still cannot connect to your server. What could be causing the problem.
• The network’s router is also running DHCP, causing DHCP conflict
• The cable connecting the switch to your system is bad
• The cable connecting the switch to the router is bad
• Your switch is malfunctioning

A

• The network’s router is also running DHCP, causing DHCP conflict
i. The network’s router may also be running DHCP, causing a DHCP conflict with the DHCP server.

33
Q
Clark is troubleshooting a user’s PC. They are using their browser to visit Web sites such as PayPal, eBay, and Newegg. They begin seeing SSL certificate mismatch warnings. Which of the following attacks could be happening?
•	Zombie
•	Smurf
•	Honey Pot
•	Man-in-the-middle
A

• Man-in-the-middle
i. A man-in-the-middle attack is a form of eavesdropping in which the attacker makes a connection with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.

34
Q
What is the quickest and easiest technology available to keep servers and equipment up and running?
•	Battery backup/UPS
•	Disaster recovery plan
•	Business continuity plan
•	RAID array
A

• Battery backup/UPS

i. A battery backup/UPS on each rack or critical node keeps systems up and running in the event of power failure.

35
Q

Which would be the best solution to make an encrypted tunnel using SSH?
• Set up a tunnel using PPTP
• Piggyback an exiting tunnel program onto SSH
• Set up a tunnel using L2TP/IPsec
• Recode an unencrypted tunneling program to support SSH encryption

A

• Piggyback an exiting tunnel program onto SSH

i. The only option here that meets the criteria of the question is to piggyback a VPN session over an SSH connection

36
Q

Which best describes a model?
• The expansion of a single process step into multiple steps
• A representation of a real object or process
• A duplicate of a real object or process
• Multiple steps of a process converted into a single step

A

• A representation of a real object or process

i. A model is a representation of a real-world object or process.

37
Q
Preparation for incidents is a multifaceted process that includes which tasks? (Selected two.)
•	Penetration testing
•	Vulnerability scanning
•	Statement of work
•	Service-level agreement
A

• Penetration testing
• Vulnerability scanning
i. Vulnerability Scanning and penetration testing show where network resources are exposed to risk. Once known, these resources can be hardened against threats.

38
Q
In what folder is the HOSTS file located on a Windows computer?
•	C:\Windows\System32\Drivers\etc
•	C:\etc
•	C:\Windows\etc
•	C:\Windows\System32\etc
A

• C:\Windows\System32\etc

i. In a Windows-based computer, the HOSTS file is found in the C:\Windows\System32\etc

39
Q
A company has subnetted its Class C network address into four subnets with a /26 subnet mask. What are the addresses of the four subnets?
•	0, 64, 128, 192
•	1, 2, 4, 8
•	128, 64, 32, 16
•	0, 1, 2, 3
A

• 0, 64,128, 192
i. 0, 64, 128, 192 represent all of the possible values of 1s and 0s in the first two columns of the fourth octet in a Class C address 0 0, 0 1, 1 0, and 11. Place those values under a 128 and 64 column and calculate the results.

40
Q
What is a chunk of data that has been sent of out a NIC called?
•	MAC
•	Frame
•	Segment
•	Packet
A

• Frame

i. Network interface cards generate and receive frames.

41
Q
Which choice is not found in a change request?
•	Type of change
•	Configuration procedures
•	Rollback process
•	Notification
•	Cost of implementation
•	Potential impact
A

• Cost of implementation
i. The cost is not included in a change request. Cost is evaluated by the change-management team and approved or denied by management.

42
Q
Which of the following is not a DDoS attack profile?
•	Protocol Attack
•	Certificate attack
•	Volume attack
•	Application attack
A

• Certificate attack

i. Certificate attack is made-up term

43
Q
Which of the following is not an element of risk management?
•	Security Policies
•	Security Procedures
•	Security Controls
•	Secure infrastructure from threats
A

• Secure infrastructure from threats

i. While it is important to secure a network’s infrastructure, it is not an element of risk management

44
Q

Which choice is not true about protocol analyzers such as Wireshark?
• Protocol analyzers can capture packets.
• Protocol analyzers can show the contents of packets and frames.
• Protocol analyzers can filter packets and frames
• Protocol analyzers can generate packets and frames

A

Protocol analyzers can generate packets and frames

i. Protocol analyzers cannot create packets and frames. They can only capture and display them

45
Q
Which protocol maps IP addresses to Layer 2 (Data Link Layer) addresses?
•	Ping
•	ARP
•	Netstat
•	TCP
A

• ARP
i. ARP is the protocol used to resolve an IP address into a MAC address, which functions at Layer 2 (Data Link Layer) of the OSI 70layer model.

46
Q
DHCP servers pull IP addresses from a pool of IP addresses. This pool is called the: 
•	DHCP lease
•	DHCP scope
•	DHCP pool
•	DHCP array
A

• DHCP scope

i. The pool of IP addresses available for the DHCP server to hand out is called the DHCP scope.

47
Q
Which network solution provides at least 50Mbps of bandwidth and supports full-duplex communication?
•	10/100 layer 2 switch
•	10Base2 Ethernet
•	5.0 GHz 802.11a
•	2.4GHz 802.11g
A

• 10/100 layer 2 switch
i. 10/100 layer 2 switch is correct. Switches are usually configured to be full-duplex, and the 100 part of the label means that the switch supports 100Mbps.

48
Q
Which techniques should a technician utilize to achieve HA (High Availability)? (Choose 3)
•	Redundant Systems
•	Back up server drives
•	Aggregate links
•	Install RAID
A

• Redundant Systems
• Aggregate links
• Install RAID
i. Backups don’t keep systems running, they make it easy to recover. High availability is achieved with tools such as RAID arrays, Link Aggregation, of multiple NICs and redundant systems. Redundant system may include power supplies, routers, etc. will help keep systems running in the event of a failure.

49
Q

Which choices are characteristic of an IP address? (Select Two)
• IP addresses are physical addresses.
• IP networks are connected with routers.
• IP addresses are logical addresses.
• IP networks are connected with switches

A

• IP networks are connected with routers.
• IP addresses are logical addresses.
i. IP addresses are logically assigned to hosts; they are not fixed values and so can be changed or re-assigned. IP networks (not hosts) are connected with routers.