Test Prep 7 Flashcards

1
Q
Question 1 of 90
You are installing a twisted pair network cabling type that supports up to 1 Gbps Ethernet connectivity. However, you are asked to replace this with an improved specification of the same type of cabling that further mitigates the amount of crosstalk experienced by the twisted pairs. Which copper cabling categories would you use for this?
Answers
A.
Cat 4
B.
Cat 5e
C.
Cat 5a
D.
Cat 5
A

B.
Cat 5e

Category 5 cable, commonly referred to as Cat 5, is a twisted pair cable for computer networks. The cable standard provides the performance of up to 100 MHz and is suitable for the 10, 100 and 1000BASE-T Ethernet over twisted pair standards. The enhanced Category 5e specification improves upon the category 5 specification by revising and introducing new specifications to further mitigate the amount of crosstalk. The bandwidth (100 MHz) and physical construction remain the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following is an example of multicast communication?
Answers
A.
DHCP DISCOVER Message
B.
ARP Request
C.
IP TV
D.
Browsing a Website
A

C.
IP TV

A multicast communication is a method of sending packets to a group of recipients, but not necessarily (and almost never) to all recipients within a network. Multicast is often useful for use with streaming media such as IP TV and multipoint videoconferencing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question 20 of 90
You have recently installed a hypervisor and created multiple virtual machines. You need these virtual machines to only communicate with each other. What should you do?
Answers
A.
Clear the ARP cache on each virtual machine
B.
Configure each virtual machine to run in isolation
C.
Create a virtual switch and configure the virtual machines on it
D.
Use a physical switch and connect the hypervisor system to it
E.
Create a virtual router and use its address as a default gateway

A

C
Create a virtual switch and configure the virtual machines on it

In this scenario, the best solution would be to create a virtual switch and configure each virtual machine to connect to it. Using this method, you will be able to configure virtual machines to communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question 22 of 90
Refer to the following statements about load balancers:

Combines multiple WAN connections to the Internet
Balances CPU load of multiple network devices for efficiency
Performs wireless channel bonding to increase aggregate throughput
Which of the preceding statements is true?
Answers
A.
Statements 2 and 3
B.
Statement 2
C.
Statements 1 and 3
D.
Statements 1 and 2
E.
Statement 1
A

E.
Statement 1

A load balancer is a device that can combine or bind multiple wired WAN connections to the Internet and provide the aggregate bandwidth to an internal network. This device implements algorithms that will balance the sessions initiated by the internal network over all the available WAN connections to evenly and efficiently distribute the network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question 27 of 90
Why should multiple problems on a network be approached individually? [Choose all that apply].
Answers

A.
It will help to tackle each issue step by step.
B.
Fixing one problem will almost always fix the other.
C.
The troubleshooting procedure on one may affect the other.
D.
Symptom identification is imprecise.
A

B.
Fixing one problem will almost always fix the other.
C.
The troubleshooting procedure on one may affect the other.

When dealing with multiple problems, it is important to approach each problem individually. This is important because if one problem is being troubleshot, attempts made to correct it will may fail. These failures, however, cannot be correctly evaluated since, the failure may be due to the existence of another problem on the network and not the problem being troubleshot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Question 31 of 90
You are putting up a new FTP server. You want to secure the server using a certificate. What should you do?
Answers
A.
Implement FTPS
B.
Implement MD5 with the FTP
C.
Implement TFTP
D.
Implement SFTP
A

A.
Implement FTPS

File transfer protocol Secure (FTPS) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols to provide security and confidentiality to file transfers. FTPS, along with the insecure TFTP and FTP protocols, are used extensively for remote file system management of network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Question 32 of 90
You need to use a cable for horizontal structured cabling to interconnect end devices for Ethernet networks. Which of the following cable will meet your need?
Answers
A.
Coaxial
B.
Copper
C.
Wireless
D.
Fiber optics
A

B.
Copper

Copper is the primary material used in the manufacturing of communication cables. Twisted pair is among the most common copper cabling used as well as coaxial cable. Copper provides communication for small distances (within buildings) as well as for somewhat longer haul communications (several kilometers) depending on the technology used. Copper cabling is susceptible to detrimental effects from Electromagnetic Interference. Copper UTP cabling is used for horizontal structured cabling for Ethernet based networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Question 36 of 90
You have several computers connected to the same multi-port network device. A user accidentally connects two ports of this device directly to each other using a single cable. All computers connected to this device lose network connectivity. Which of the following devices is the multi-port network device?
Answers
A.
Firewall
B.
Hub
C.
Router
D.
Managed switch with STP enabled
Assistance
A

B.
Hub

A hub is a network device with multiple ports that connect end devices to the network. Any information that is received on one of its ports from an end device is repeated and transmitted out all its remaining ports without regard to any addressing that may be present in any frame header. Connecting one port directly to another will cause a layer two loop which results in a broadcast storm disabling the network. A network switch will also exhibit similar behavior if Spanning Tree Protocol (STP) is not enabled or supported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question 41 of 90
You need to design a network cabling solution in a factory in which there is extensive electromagnetic interference (EMI) from high voltage power lines and machinery. Which type of Ethernet cabling should be used to provide the best results in this environment?
Answers
A.
UTP because it lacks conductive shielding that can accentuate EMI.
B.
UTP because its shielding provides a barrier to attenuate EMI.
C.
STP because it lacks conductive shielding that can accentuate EMI.
D.
STP because its shielding provides a barrier to attenuate EMI.

A

D.
STP because its shielding provides a barrier to attenuate EMI.

Shielded Twisted Pair (STP), like UTP, is a type of wiring in which two conductors of a single circuit are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources. STP differs from UTP in that it includes a shielding, usually in the form of a thin foil that is applied to the collection of pairs. This shielding provides an electrically conductive barrier to attenuate electromagnetic waves external to the shield, and a conduction path by which induced currents can be circulated and grounded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Question 43 of 90
You are configuring a file storage system that will be storing files whose integrity is of paramount importance. Which of the following techniques should you implement to ensure file integrity?
Answers
A.
Hard drive defragmentation
B.
File integrity monitoring
C.
FTP encryption
D.
File penetration testing
E.
Periodic file verification
A

B.
File integrity monitoring

File integrity monitoring is an internal process that validates the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline. This comparison method often involves calculating a known checksum of the file’s original baseline and comparing with the calculated checksum of the current state of the file. Generally, the act of performing file integrity monitoring is automated using internal controls such as an application or process. Such monitoring can be performed randomly, at a defined polling interval, or in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Question 55 of 90
A computer has a static IP address of 192.168.1.5 with a subnet mask of 255.255.255.128 and a gateway of 192.168.1.1. The user attempts to a network printer that has an IP address, 192.168.1.200, and a subnet mask of 255.255.255.0. However, when the user attempts to add the printer to his computer, he is not able to do. Other users on the same network can print using the same printer. What is the reason for this lack of connectivity?
Answers
A.
This computer is not part of the same domain.
B.
Incorrect subnet mask
C.
Duplicate IP address
D.
Incorrect gateway
A

B.
Incorrect subnet mask

The subnet mask as part of the IP configuration of a network device indicates to that device the scope of its local subnet. If the subnet mask is smaller than it should be, then the device will be able to access only half (or even less) of the subnet in which it resides, as addresses within its subnet will be defined as outside of it due to the smaller subnet mask. In the example, the host’s subnet ranges from 192.168.1.1 to 192.168.1.127. This means that the printer is outside of this subnet. The printer, however, has a subnet mask of 255.255.255.0 and it thinks that the host is in its subnet. This will cause connectivity issues unless the subnet mask of the host is corrected to 255.255.255.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question 56 of 90
Under what circumstances would you use IP exclusions in a DHCP pool?
Answers
A.
When applying MAC address reservations
B.
When specific addresses in the pool have been statically assigned
C.
If IPv6 is being used instead of IPv4
D.
To exclude unusable addresses such as network and broadcast address

A

B.
When specific addresses in the pool have been statically assigned

DHCP pools in a DHCP server are usually defined using a network IP address and a subnet mask, such as 192.168.5.0/24. If there are statically assigned addresses within this subnet, it is necessary to indicate to the DHCP server which addresses to exclude from this range. IP exclusions will tell the DHCP server not to assign these addresses to any host requesting an address via DHCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
You have added a new device to the network management application. What else should you add to the network management application to be able to control it?
Answers
A.
TRAP
B.
GET
C.
MIB
D.
Event notification
A

C.
MIB

Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.

SNMP uses Management Information Bases (MIBs) which are databases used for managing the entities in a communication network. MIBs refer to the complete collection of management information available on an entity. However, the term is often used to refer to a subset, more correctly referred to as MIB-module.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Question 63 of 90
You have a configuration file of a network device that contains clear text passwords and other sensitive information. Which of the following protocols would you use to remotely backup and restore the configuration file of this device?
Answers
A.
FTP
B.
SFTP
C.
TFTP
D.
SMB
A

B.
SFTP

Secure Shell (SSH) File Transfer Protocol, also referred to as Secure File Transfer Protocol (SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream. It is commonly used to provide secure access and management of network device file systems especially for the backup and restoration of configuration files that contain sensitive information such as passwords and cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Question 75 of 90
You are asked to determine which Ethernet deployment standard should be used to interconnect a telecom closet on the 10th floor of a building to the data center found on the first floor. Maximum speeds required are 1000 Mbps while multi-mode fiber is used for this link with a total cable length of no more than 450 meters. What would be the best choice?
Answers
A.
1000BASE-TX
B.
1000BASE-SX
C.
1000BASE-LX
D.
100BASE-LX
A

B.
1000BASE-SX

1000BASE-SX is an optical fiber Gigabit Ethernet standard for operation over multi-mode fiber. The standard specifies a maximum length of 550 depending on the type of multi-mode fiber used, however, in practice, with good quality fiber, optics, and terminations, 1000BASE-SX will usually work over significantly longer distances. Although the 10GBASE-T standard would also suffice for this application, it would be considered overkill so the best choice would be 1000BASE-SX.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly