Test #1 Flashcards
What is the role of port numbers in IP headers?
• Port numbers identify the path of routers between any two hosts that need to communicate with each other.
• Port numbers identify which interfaces on a router should receive data in and which interfaces should forward data out.
• Port numbers identify the sending and receiving processes between two hosts.
• Port numbers identify which connectors on a switch that should receive data in and which should forward data out.
• Port numbers identify the sending and receiving processes between two hosts.
What TCP/IP protocol is used to resolve an IP address to a MAC address? • DHCP • BootP • ARP • UDP
• ARP
Address Resolution Protocol (ARP) is a TCP/IP protocol that is responsible for resolving an IP address to a MAC address.
A technician has been tasked with planning for equipment failures. Which specs will the technician need to review to create a failure plan? • MTTR • SLA • MTTF • MTBF
MTTR
MTTF
MTBF
i. Mean Time To Repair (MTTR), Mean Time To Failure (MTTF) and Mean Time Between Failures (MTBF) are all specifications that should be known in planning for inevitable future failures.
Which is the default port for NTP? • 123 • 231 • 321 • 132
123
i. NTP uses port 123
Using an ACL in a firewall to block known malicious Web addresses is an example of which of the following? • IP filtering • MAC filtering • Application filtering • Port filtering
• IP filtering
i. IP filtering is correct. Filtering prevents access by names and/or IP addresses.
Which protocol in the TCP/IP protocol deals with logical addresses for hosts and resides at Layer 3 (Network Layer) of the OSI model? • TCP • IP • UDP • PPP
Internet Protocol (IP) i. Internet Protocol (IP) is the TCP/IP protocol that deals with logical addresses, commonly know as IP addresses, for host computers.
Which of the following is not a packet switching technology? • Circuit Switch • ATM • MPLS • Frame Relay
Circuit Switching
i. Circuit switching is the opposite of packet switching – it creates a hard-wired circuit between two communicating nodes
Oliver has inherited a network without any labeled ports on the patch panel. What tool will he need to get the patch panel properly labeled? • Crossover cable • Toner • TDR • Hardware Loopback
Toner
i. The only tool that will work in this situation is the toner. A toner, which consists of a tone probe and a tone generator, can be used to trace out cables to determine the two ends of each table.
Which techniques can a technician use to harden her network? (Choose three.)
• Avoid saving certificates, passwords, and keys in the same location
• Keep account roles separated to avoid conflicts of interest
• Avoid using privileged accounts
• Track hardware and software for patch requirements
- Keep account roles separated to avoid conflicts of interest
- Avoid using privileged accounts
- Track hardware and software for patch requirements
It is not wise to use privileged accounts. Unless it is necessary to perform administrative tasks. Accounts should be role-based and should not be able to perform tasks that would represent a conflict of interest to reduce the potential for abuse.
A technician suspects that a virus has infected the network. One of its actions appears to be that it utilizes a large amount of network bandwidth. What is the BEST tool that the technician can use to quickly determine which workstations are infected? • Network Sniffer • Syslog • SNMP • Web server
Network Sniffer
i. A sniffer is used to examine network traffic. These are more commonly known as packet sniffers.
Network upgrades have been completed, and the network protocols have been modernized. The WINS server was shut down. Since there is no need for NetBIOS traffic, it will no longer be allowed on the network. Which of the following will accomplish this objective? • IP filtering • Content filtering • Port filtering • MAC filtering
Port filtering
i. Port filtering, NetBIOS uses three well-known ports. Filter these (137, 139, and 15), and there will not be any more NetBIOS traffic.
Which type of fiber optic cable supports longer run lengths? • Laser-mode • Multi-mode • Fractal-mode • Single-mode
Single-mode
i. Single-mode cable carries laser pulses the longest distance
13. Scott complains about slow access to the server and asks you to fix it. Which of the following utilities can you use to find the bottleneck on the network? • Telnet • Ping • Tracert • Nbtstat
Tracert
i. Tracert traces the route between the host and destination. When it finds a problem, it either shows the slow link with high access times or simply stops.
What is the value of a baseline performance analysis?
• It causes CPU performance to scale up when more processing power is needed.
• It provides an inventory of all network and computer components.
• It shows the cause of network slowdowns.
• Provides a quantifiable reference to measure against current performance.
Provides a quantifiable reference to measure against current performance.
i. A performance baseline can be used to verify perceived performance slowdowns.
Which statements is true of VLANs?
• VLANs use SSH tunnels for cross-VLAN traffic.
• VLANs can only be implemented on specified ports on a router.
• VLANs enable remote station to connect to the LAN from across the Internet.
• VLANs break up broadcast domains into multiple, smaller broadcast domains.
VLANs break up broadcast domains into multiple, smaller broadcast domains.
i. VLANs break up a single broadcast domain into multiple, smaller broadcast domains.
What command will assign a drive letter to a network share? • Net drive • Net assign • Net share • Net use
Net use
i. The net use command assigns a drive letter in the local computer to a shared folder on another computer.
Which statement is not true about 10BaseT
• 10BaseT runs at ten (10) megabits per second
• 10BaseT requires Cat 5a UTP cable
• 10BaseT supports a maximum of 1024 nodes per switch
• The maximum distance between the switch and the node is 100 meters
10BaseT requires Cat 5a UTP cable
i. 10BaseT can run on Cat 3 or higher UTP
Doug was troubleshooting in a wiring closet in 2013. The cabling diagrams and document are five years old and have little resemblance to what Doug sees. What configuration management process has fallen behind? • Baselining • Asset management • Change management • System logs
• Change management
i. Change management keeps track of all system changes since the last baseline was performed, and it can save lots of time.
Which choice is true of a rogue DHCP server?
• A rogue DHCP server increases the speed of the DHCP service.
• A rogue DHCP server can assign incompatible IP addresses to hosts.
• A rogue DHCP server ensures that hosts will get compatible APIPA address.
• A rogue DHCP server increases the pool of available IP addresses.
A rogue DHCP server can assign incompatible IP addresses to hosts.
i. Rogue DHCP servers can assign incompatible IP addresses to hosts on a network, making them unable to communicate with other hosts or the internet.