Test #2 Flashcards

1
Q

When the loss of a piece of equipment or link can bring down an entire process, workflow, or even the whole organization, that lost element is called what?

Critical Asset

Critical Node

Single Point of Failure

Redundant Link

A

Single Point of Failure

A single point of failure may be a server, link, program, or something else. Any individual element that fails and results in loss of functionality of an organizational component constitutes a single point of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The boss has just read an article about zero-day attacks and rushes into your office in a panic, demanding to know what you’ll do to save the company network. What security technique would best protect against such attacks?

Use aggressive patch management.

Keep antivirus definitions updated.

Implement user awareness training.

Implement effective security policies.

A

Correct Answer:

The best defense against zero-day attacks is to implement effective security policies.

Incorrect Answers:

Because a zero-day attack exploits previously unknown software vulnerabilities, updating virus definitions and keeping your software patched wouldn’t help at all.

By definition, there’s no patch out yet for the zero-day exploit!

User awareness will help because many zero-day attacks come through users accessing dodgy Web sites, but a good security policy that includes properly implemented firewalls and restrictions on access to those sites offers the best protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where does a computer get the MAC address?

It is generated by the frame

The MAC address is another term for the IP address

It is built into the network interface card

The receiving computer applies a MAC address to each inbound frame

A

Correct Answer:

A unique MAC address is built into every network interface card.

Incorrect Answers:

A frame does not generate a MAC address, but it does contain a source and destination MAC address.

The MAC and IP addresses are different types of addresses.

The receiving computer reads the MAC addresses that are contained within inbound frames. It does not add anything to received frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A chain-of-custody document includes what information? (Select Three).

What is/are the ages of the accused.

To whom was evidence passed and when.

When was evidence taken into custody.

What was taken into custody.

What is/are name(s) of the accused.

A

Correct Answers:

To whom was evidenced passed and when.
When was evidence taken into custody.
What was taken into custody.

Chain of custody is concerned with tracking evidence to avoid loss or tampering. It documents what evidence was taken into custody, when it was collected, and who was it passed on to.

Incorrect Answers:

Names and ages of someone accused are not part of the evidence being tracked in a chain of custody document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A website just changed its IP address, and a user is unable to reach it by typing the site’s domain name into their browser. What command can the user run to make the computer learn the website’s new IP address?

Ipconfig/flushdns

Ipconfig/updatednscache

Ipconfig/dnsupdate

Ipconfig/all

A

Correct Answer:

Ipconfig/flushdns.

Ipconfig /flushdns will clear the DNS cache and force the computer to perform a fresh DNS lookup to get the current IP address of a domain name host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the choices is not a step to perform a man-in-the-middle attack?

Typosquat the DNS

Insert an attack machine between the communicators

Configure the attack machine to spoof the two communicators

Capture/manipulate MIM data

A

Typosquat the DNS

Correct Answer:

Typosquat the DNS is an invalid mix of two man-in-the-middle types of attacks. Typosquatting is to simply create an Internet resource, such as a website, that is a mis-spelling of a “real” website. DNS poisoning is a method to redirect calls to legitimate resources to go to malicious sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Upon notification of a computer crime, a first-responder performs which tasks? (Select Three).

Evaluate the severity of the situation.

Document findings.

Remove power from volatile memory (RAM).

Wipe any hard associated hard drives.

Collect information.

A

Evaluate the severity of the situation.

Document findings.

Collect information.

Correct Answers:

First responders need to preserve evidence. They must evaluate the situation and take steps to prevent the loss of evidence. To that end, they should evaluate the severity of the situation, collect information, and document their findings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What challenges do VPNs overcome? (Choose Three).

Connect remote networks across

Allow a host within a private network to connect to a host on the internet that has a VPN client running

Ensure that the data in the tunnel is secure

Assign a private address to travel across the public internet

A

Connect remote networks across the Internet

Ensure that the data in the tunnel is secure

Assign a private address to travel across the public internet

Correct Answers:

VPNs encapsulate endpoint private addresses within packets that have Internet public addresses.

Most VPNs have the option to encrypt the tunnel.

VPNs can easily support client-to-site or site-to-site connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which is true about using a straight-through or crossover cable when connecting two switches?

Autosensing in the switch will cause the switch port to re-wire itself into a crossover configuration

Straight-through cables can be used to connect modern switches but autosensing sets the switch port to half-duplex, reducing performance by half

The switch will re-wire the cable termination so that it becomes a crossover cable

Straight-through cables cannot be used to connect modern switches

A

Correct Answer:

Autosensing in the switch will cause the switch port to re-wire itself into a crossover configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SIEM is comprised of which primary elements? (Choose two).

Aggregation

Correlation

Analysis

Reporting

A

Aggregation

Correlation

Correct Answers:

Aggregation and correlation are the two primary components of security information and event management (SIEM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technician has just been hired by a company. What type of documentation should she expect to encounter? (Choose three.)

SLA

Wiring diagram

IDF/MDF diagrams

Inventory

A

Wiring diagram

IDF/MDF diagrams

Inventory

Correct Answers:

Networks should have their inventory tracked and controlled. IDF and MDF diagrams are very important for maintaining and updating networks and wiring diagrams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What media access method does 802.11 use?

CSMA/CA

CSMA/CD

CSU/DSU

CIDR

A

CSMA/CA
Carrier Sense Multiple Access/Collision Avoidance

802.11 uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) because there is NO WAY to detect collisions in the world of WIRELESS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are the network administrator with 15 users on a network. None of them have been able to connect to the server for the last 30 minutes. You try pinging the workstations from the server, but you can’t ping any of them or the loopback address, even after a reboot. Which of the following statements must be true?

There is a problem with the server NIC.

You need to reboot the DHCP server.

You need to reboot the DNS server.

All users need to reboot their systems.

A

There is a problem with the server NIC.

Correct Answer:

The main factor in all of this is that the server cannot ping the loopback address. This means that the server’s NIC is not functioning properly. As a result, the server will obviously not be able to ping the workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If nobody on your network can reach any websites using the domain names, what command utility would be good to use to determine the problem?

Nbstat

Nslookup

Telnet

Ping

A

Ping

Correct Answer:

If no one on the network can reach any websites using the hostnames, try to ping various websites using hostnames and IP addresses. If you can successfully ping the IP addresses but not the hostnames, the problem most likely lies with DNS. If you cannot ping either hostnames or IP addresses, the problem may lie somewhere else on your network, such as the gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of netstat?

Captures frames and packets for later review

Displays all connections to and from a host computer

Shows your computer’s connection(s) to any web server(s)

Graphical utility that charts amount of network data entering and leaving a host

A

Displays all connections to and from a host computer

Correct Answer:

Netstat is a command-line utility that shows a computer’s network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If a host has the IP address 23.51.126.9, which subnet mask would you use?

  1. 255.255.255
  2. 0.0.0
  3. 255.255.0
  4. 255.0.0
A

255.0.0.0

Correct Answer:

Class A IP addresses, with a range of 1.x.x.x to 126.x.x.x, use a default subnet mask of 255.0.0.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The primary command-line tool to troubleshoot Windows naming issues is what?

Netstat

Nbtstat

Net

Ipconfig

A

Nbstat

Correct Answer:

Nbtstat provides information about the NetBIOS naming service that runs in some Windows-based computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is not a fire rating for network cables?

PVC

Plenum

CAT 6a

Riser

A

Cat 6a

Correct Answer:

CAT 6A is not a fire rating. It is a performance specification.

Incorrect Answers:

Riser and Plenum cable have similar fire ratings. They burn at very high temperatures and don’t give off toxic fumes.

Even though PVC is not strictly a fire rating, PVC is what most UTP and PVC jackets are made of. It burns at low temperatures and emits chlorinate gas when it burns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Stan tells you that he cannot get on the network. You know the link light on the NIC is green and you know the cable is good. He seems to be the only one on the network having this problem. What command line utility and address do you use to run an internal test?

Ping the IP address

Ping the loopback address

Ping the broadcast address

Ping the subnet mask address

A

Ping the loopback address

Correct Answer:

Don’t let the link light and good cable fool you. The NIC could still be bad. Pinging the loopback address (127.0.0.1) runs an internal test to verify that the NIC and TCP/IP is working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which statement is true of a NAT router?

NAT routers allow public addresses to exist on the LAN side of the router

All hosts on the LAN side of a NAT router are assigned the same IP address as the public address in the router

NAT routers replace the source IP address with its IP address

The NAT function is performed at the ISP facility

A

NAT routers replace the source IP address with its IP address.

Correct Answer:

NAT routers replace the source IP address with its IP address and then restore the original IP header when a response comes back so that the results can be sent to the originator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Network technician Jan is assigned to install a wireless router in a company’s public common area. The company wants visitors to the company to be able to connect to the wireless network with minimal security, but they should not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this?

Allow traffic from the wireless access point

Packet filtering on the wireless access point

Content filtering on the wireless access point

Block traffic from the wireless access point

A

Packet filtering on the wireless access point

Correct Answer:

Packet filtering on the wireless access point. Packet filtering on the WAP can enable inbound and outbound traffic to the Internet, but it can block traffic to and from the internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An office would like to set up an unsecured wireless network for its customers in their lounge area. Customers should be allowed to access the Internet, but should not have access to the office’s internal network resources. Which firewall configuration can accomplish this?

Port security

NAT

Stateful inspection

Packet filtering

A

Packet filtering

Correct Answer:

Among other things, packet filtering controls access to IP-addressed devices.

Incorrect Answers:

NAT enables private IP addressed devices to access the public Internet.

Stateful inspection confirms the integrity of connections.

Port security controls the types of activities that stations engage in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Identify two characteristics of logging and analysis utilities. (Select two.)

They can identify the direction and strength of radio-frequency interference.

They can analyze the utilization of network capacity, storage use, CPU load, and other parameters.

They can present results in a graphical format.

They can proactively generate alerts to a pager or email address.

A

They can analyze the utilization of network capacity, storage use, CPU load, and other parameters.

They can present results in a graphical format.

Correct Answers:

Results can be shown in a pictorial presentation or a variety of graphs for easy interpretation. Some loggers can show and analyze a variety of performance parameters, including network traffic, storage use, CPU load, network errors, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which networking technology used in LAN’s is described as Fast Ethernet and uses two pairs of cabling for transmitting and receiving?

100BaseFX

100BaseTX

1000BaseT

100BaseT4

A

100BaseTX

Correct Answer:

100BaseTX is Fast Ethernet, which uses wire pairs 1 & 2 for sending and wire pairs 3 & 6 for receiving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You are attempting to troubleshoot an issue between two computers that are both connected to a Layer 2 unmanaged switch. Of the following, which is the BEST way to find out if the switch is the problem?

Check to make sure that 802.1d is enabled on the switch

Access the switches configuration screens and set up a log file

Connect both of the PC’s together with a crossover cable

Attach a loopback plug to the switch and monitor the traffic

A

Connect both of the PC’s together with a crossover cable

Correct Answer:

Get a crossover cable. By taking the switch out of the equation, you will find out if the problem is with the PCs or the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does QoS provide?

Redirection of low priority traffic to slower router interfaces

Prioritized throughput of different traffic types

Higher performance of selected traffic

Blocking of specific traffic type

A

Prioritized throughput of different traffic types

Correct Answer:

QoS enables the prioritization of different traffic types with bandwidth approaches a connection’s maximum capacity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You have a Class A network. What is your subnet mask?

  1. 255.255.255
  2. 255.255.0
  3. 0.0.0
  4. 255.0.0
A

255.0.0.0

Correct Answer:

The subnet mask for Class A is 255.0.0.0, making the first octet of the IP Address the Network ID.

28
Q

Before an Ethernet NIC may transmit data onto a medium, it must check to see if another NIC is transmitting data. What is this checking process called?

Multiple access

Carrier sense

Collision avoidance

Collision detection

A

Carrier sense

Correct Answer:

Carrier sense, also known as carrier detect, is the test that a NIC performs before transmitting on a network medium.

29
Q

Which of the following is not a mobile deployment option?

COBO

COPE

BYOD

BYOB

A

BYOD

Correct Answer:

BYOB is not a mobile deployment option, although it may lead to some interesting after-work events.

30
Q

Which statement is not true of IPv6 addresses?

There are no private IPv6 addresses

EUI-64 can be traced back to the source computer

IPv4 and IPv6 are automatically translated back and forth as require

Outbound IPv6 addresses are randomized by the operating system

A

IPv4 and IPv6 are automatically translated back and forth as require

Correct Answer:

IPv4 and IPv6 are not automatically translated back and forth.

31
Q

Which of the following is not a core tenet of securing IP networks?

Availability

Performance

Integrity

Confidentiality

A

Performance

Correct Answer:

Performance is important to IP networks but is not a core tenet of securing the network.

32
Q

A network tech suspects a wiring issue in a work area. Which element does she not need to check?

Verify link lights at the workstation and the switch port

Confirm network settings in the operating system

Ping the workstation NIC with a loopback plug installed

Ensure that the connection from router to the ISP good

A

Ensure that the connection from router to the ISP good

Correct Answer:

The connection from the router to the ISP does not exist in the work area. It is found in the equipment room.

33
Q

A tech has just installed a new SOHO router for a client. Which security task should the tech perform first?

Enable MAC address cloning

Change the administrator name and password

Disable port forwarding

Disable the DHCP server

A

Change the administrator name and password

Correct Answer:

The default admin name and password of all makes and models are well known. It is critical to change these right away to prevent the router from being hacked.

34
Q

Which of the following is not a normal Windows log?

Forwarded events

Application

Security Policies

System

Setup

Network

A

Network

Correct Answer:

Windows does not log network events.

35
Q

Which of the following is not a characteristic of the BGP routing protocol?

BGP is a hybrid of distance vector and link-state routing protocols

OSPF is the primary routing protocol between ASes

BGP is broken up into divisions called Autonomous Systems (AS)

A

OSPF is the primary routing protocol between ASes

Correct Answer:

Border Gateway Protocol (BGP) uses OSPF (and other routing protocols) WITHIN autonomous systems but NOT BETWEEN different ASes.

36
Q

Here are three IP addresses: 216.53.12.11, 130.222.255.170, 223.255.6.88. What class of addresses are each one (in order)?

C, B, C

B, A, C

C, A, B

A, C, A

A

C, B, C

37
Q

I can’t see your machine (Woobie) on the network, but you insist that your machine is up. Which of the following commands might I try to test my connection with your machine?

Netstat Woobie

Nbstat Woobie

Ping Woobie

SMTP Woobie

A

Ping Woobie

Correct Answer:

I can use the ping utility to test the connection to Woobie. If your machine responds to the ping, then I know my machine can access your machine over the network.

38
Q

What is a subnet mask used for?

It is used by switches to determine the correct routes

It is used by hosts to determine whether addresses are local or remote

It is used by hosts to determine NetBIOS names

It is used by servers to resolve Domain names to IP addresses

A

It is used by hosts to determine whether addresses are local or remote.

Correct Answer:

One of the main purposes of a subnet mask is to determine if the recipient address in a packet is local or remote. Once determined, the host can then decide if the packet should remain local, or should be forwarded to a remote network.

39
Q

Which of the following utilities can you use to confirm connectivity to another TCP/IP host?

Nbstat

Ping

Netstat

ARP

A

Ping

Correct Answer:

Ping is a TCP/IP protocol that is used to test connectivity between two TCP/IP hosts.

40
Q

Ping uses which IP lay protocol?

FTP

ICMP

RIP

A

ICMP

Correct Answer:

Ping uses ICMP (Internet Control Message Protocol).

41
Q

Which statements are true of DNS? (Choose three.)

DNS uses recursive queries to find domain names and IP address

DNS is used to organize resources

DNS maps names to IP addresses

DNS uses ARP to map names to MAC addresses

A

DNS uses recursive queries to find domain names and IP address

DNS is used to organize resources

DNS maps names to IP addresses

Correct Answers:

DNS organizes resources into a tree-like structure, then uses recursive queries to find and map friendly names to IP addresses.

42
Q

A technician has been tasked with planning for equipment failures. Which specs will the technician not need to review to create a failure plan?

SLA

MTBF

MTTF

MTTR

A

SLA

Correct Answer:

Service Level Agreement (SLA) is a document that describes the job of a service provider to deal with issues like equipment or service failures.

43
Q

Vicky is a network technician who has installed a new managed 10/100 Mbps switch on the LAN. The network has an old printer with a 10 Mbps NIC that will be connected to the new switch. Which of the following settings on the switch will need to be configured to support the printer?

IP address

MAC filtering

PoE

Port Speed

A

Port Speed

Correct Answer:

Port speed is correct. Older printers often require the connected switch to adjust it’s port speed manually.

44
Q

Which of the following are typically found in an MDF equipment room? (Choose three.)

Patch Panel(s)

Switch(es)

Rack

IDF

A

Patch Panel(s)

Switch(es)

Rack

Correct Answer:

Racks, switches, and patch panels are commonly found in MDF equipment rooms.

45
Q

Which statement is true of IPS and IDS systems?

IPS responds to threats with a notification to specified staff

IPS detects then attempts to defend against a threat

Passive IDS is the same as IPS

Pass IPS is the same as IDS

A

IPS detects then attempts to defend against a threat

Correct Answer:

Intrusion Prevention System (IPS) identifies a threat and attempts to prevent it.

46
Q

Of the following choices, what is the MOST likely cause that a user is unable to access a network through the wireless access point?

Faulty crossover cable

A short in the cable pairs

Incorrect WEP key

TXRX is reversed

A

Incorrect WEP key

Correct Answer:

Having the Incorrect WEP key will keep you out of the network.

47
Q

A private network has which of the following traits?

Its IP addresses are exposed to the internet

It uses only static IP addresses

Its IP addresses are not exposed to the internet

Its IP addresses must be assigned by IANA

A

Its IP addresses are not exposed to the internet

Correct Answer:

A private network’s IP address is not exposed to the Internet, and as a result, is not assigned by any organization.

48
Q

Dial-up connections require which piece of equipment?

Modem

NIC

Multi-speed switch

Cable modem

A

Modem

Correct Answer:

Dial-up communication requires a modem to convert the computer digital signals into analog signals that can travel on a telephone line. It must also convert returned analog signals back to digital signals so they can be passed into the computer.

49
Q

A network tech must connect a computer in a heavy industrial environment. The computer is located 260 meters (853 feet) away from the IDF. Which LAN technology would be the BEST choice?

Coaxial

10GBaseT

100BaseFX

MPLS

A

Correct Answer:

100BaseFX - Remember, the “F” stands for fiber, and in this case, 100Base FX is capable of reaching the 250-meter requirement.

50
Q

Which decimal number is represented by the binary number 1 0 1 1 0 1 1 0?

176

182.176.73.0

73

182

A

182

Correct Answer:

1 0 1 1 0 1 1 0 has 1s in the 128, 32, 16, 4 and 2 position. Add those together to arrive at 182.

51
Q

Which of the following blocks IP packets using any port other than the ones prescribed by the system administrator?

Encryption

Hiding IP addresses

Packet filtering

Port filtering

A

Port Filtering

Correct Answer:

Port filtering enables an administrator to allow only certain ports to be used, and block all other ports.

52
Q

What choice is not a category of malware?

Virus

Trojan horse

RAT

Adware

Spyware

Handsomeware

A

Handsomeware

Correct Answer:

Handsomeware is not a real term (but ransomware is!).

53
Q

Which field would not be found in an Ethernet frame?

Destination MAC address

Source MAC address

Destination IP address

Ethertype

A

Destination IP address

Correct Answer:

Source and destination IP addresses would be found in the IP packet, not in the Ethernet frame.

54
Q

Your company has just experienced an attack that caused the Web site www.yourwebsite.com to go down. What term does this BEST describe?

Man in the Middle

Bluesnarfing

DoS attack

Wardriving

A

DoS attack

Correct Answer:

Your company has just experienced a Denial of Service (DoS) attack on your Web site. You will have intermittent to no access.

55
Q

Which selections represent authentication services? (Choose two.)

TKIP

AES

EAP

Kerberos

A

EAP

Kerberos

Correct Answers:

Kerberos and Extensible Authentication Protocol (EAP) both provide authentication services. Kerberos is geared toward wired environments, while EAP is better suited to wireless setups.

56
Q

A switch port can BEST be described by which of the following terms?

Collision domain

Distance vector

Broadcast domain

Link state

A

Collision Domain

Correct Answer:

Collision domain - Switched networks reduced collision domains to just at the individual ports.

57
Q

Management wants to filter data that enters or leaves a specific port on a switch. Which network management tool can perform this filtering task?

Network sniffer

Syslog server

SNMP trap

Bandwidth analyzer

A

Network sniffer

Correct Answer:

Network sniffers are used to capture and analyze data on a network.

58
Q

Which characteristic(s) make UTP and STP different from each other? (Choose two.)

STP has shielding, but UTP does not

UTP supports all ethernet speeds, but STP only supports the slower speeds

UTP costs less per foot that STP

UTP costs more per foot than STP

A

STP has shielding, but UTP does not

UTP costs less per foot that STP

Correct Answers:

Shielded Twisted Pair (STP) has shielding to improve noise rejection compared to Unshielded Twisted Pair (UTP). Because of the shielding, STP is more expensive than UTP.

59
Q

Which symptom is not a result of an IP addressing problem?

Incorrect gateway

Duplicate MAC addresses

Static IP address

Duplicate IP address

A

Static IP address

Correct Answer:

There is nothing wrong with assigning static IP addresses so long as the rules of assigning addresses are followed.

60
Q

Which of the following is not a common network problem?

Loops

Connecting switches in a tree structure

Initialization vector attack

Replay attack

A

Connecting switches in a tree structure

Correct Answer:

Connecting switches in a tree structure is common (and as such, not a problem) when networks are larger and more spread out into clusters.

61
Q

I need to find out what connections are currently open on my local machine. What utility might help me do that?

Netstat

Nbtstat

Tracert

Ping

A

Netstat

Correct Answer:

Netstat displays all the current sockets-based connections (IP and Port number) on the local machine.

62
Q

The OSI model has ____ layers, and the TCP/IP model has ____ layers.

7 and 7

4 and 7

7 and 4

4 and 4

A

7 and 4

Correct Answer:

The OSI model has 7 layers, and the TCP/IP model has 4 layers.

63
Q

Which of the following is not an element of a route metric?

MTU

Bandwidth

Hop distance

Cost

A

Hop distance

Correct Answer:

The physical distance between routers is not considered when defining a metric.

64
Q

Every day at the office, we play Counter-Strike Source over the Internet (only during lunch hour, of course). Today, however, there is a lot of lag in the action–our mutual connection is bogged down somewhere. What could I use in Windows to find out where the bottleneck is occurring?

Ping

Tracert

ARP

Traceroute

A

Tracert

Correct Answer:

In Windows, the Tracert command shows the path a packet takes from one host to another, including how long it takes for each hop.

65
Q

Which TCP ports are commonly used by e-mail clients and servers? (Choose three.)

110

143

443

25

A

110

143

25

Correct Answers:

Simple Mail Transfer Protocol (SMTP) uses port 25.

Post Office Protocol (POP) uses port 110.

Internet Message Access Protocol (IMAP) uses port 143.

66
Q

What hardware tool is used to determine the length of a cable?

Continuity Tester

Toner Generator

Time Domain Reflectometer (TDR)

Tone Probe

A

Correct Answer:

A Time Domain Reflectometer (TDR) is used to determine the length of a cable and can even tell you where a break in the cable is located. It operates by sending a signal down the cable and measuring the amount of time it takes to reflect back to calculate the cable length.

67
Q

Which statement is true of inter-VLAN routing?

InterVLAN routing calls for connecting each VLAN to a port on a router so that data can pass between VLANs

Inter-VLAN routing enables remote VLANs to connect over a public network, such as the Internet

Inter-VLAN routing encrypts and decrypts traffic between VLANs

Inter-VLAN routing is implemented within switches to enable communication between VLANS

A

Inter-VLAN routing is implemented within switches to enable communication between VLANS

Correct Answer:

Inter-VLAN routing is implemented within switches to enable communication between VLANs.