You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? |
Peer-to-peer |
You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts access those resources but do not host services of their own. What type of network do you have? |
Client-server |
Which of the following geographic network types are typically managed by a city as a public utility? |
Metropolitan Area Network (MAN) |
You have a network that uses a logical ring topology. How do messages travel through the network? |
Messages travel from one device to the next until they reached the destination device. |
You have a network that uses a logical bus topology. How do messages travel through the network? |
Messages are broadcast to all devices connected to the network. |
Which of the following topologies connects all devices to a trunk cable? |
Bus |
Which of the following topologies connects each device to a neighboring device? |
Ring |
In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device? |
Ring |
Which of the following topologies connects each network device to a central hub? |
Star |
You have implemented an ad-hoc wireless network that doesn’t employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network? |
Mesh |
You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link? |
Mesh |
You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs? |
Mesh |
What device is used to create a physical star topology? |
Switch |
You have a small network that uses a hub to connect to multiple devices. What physical topology is used? |
Star |
You have been asked to implement a wired network infrastructure that will accommodate failed connections. You don’t have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement? |
Partial Mesh |
Which two of the following are included as part of the Data Link Layer? |
-Identifying physical network device -Controlling how messages are propagated through the network |
In the OSI Model, what is the primary function of the Network Layer? |
Routes messages between networks |
In the OSI Model, which of the following functions are performed at the Presentation Layer? |
-Specify data format -Encrypt and compress data |
In the OSI Model, which of the following functions are performed at the Application Layer? |
-Integration of network functionality into the host operating system -Enabling communication between network clients and services |
Which of the following functions are performed at the Physical Layer of the OSI Model? |
Movement of data across network cables |
The Data Link Later of the OSI Model is comprised of two sublayers. |
-LLC -MAC |
Which of the following are functions of the MAC sublayer? (Select two) |
-Defining a unique hardware address for each device on the network -Letting devices on the network have access to the LAN |
Which OSI Model layer is responsible for guaranteeing reliable message delivery? |
Transport |
Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more then one. |
Presentation-Application Data Link-Network Interface Application-Application Session-Application Network-Internet Transport-Transport |
Match the network function or device on the left with the OSI model layer it is associated with on the right. |
Application-HTTP Presentation-ASCII Session-Session ID Number Transport-Port Numbers Network-Router Data Link-Switch Physical-Wireless Access Point |
At what OSI layer does a router operate to forward network messages? |
Network |
Your company purchase a new bridge, which filters packets based on the MAC address of the destination computer. On which layer of the OSI Model is this device functioning? |
Data Link |
At which layer of the OSI Model do hubs operate? |
Physical |
Which of the following devices operate at OSI Model layer 2? (Select two) |
-Network Interface Card -Switch |
Which three of the following devices operate at the Data Link Layer of the OSI Model? |
-Bridges -Network Interface Cards -Switches |
Match the description on the left with the appropriate network signal line code on the right. |
Non-Return-to-Zero Binary 1s are represented by positive voltage while 0s are represented by negative voltage. There is no zero voltage state between bits. Manchester The transition from one voltage level to another is used to represent binary data Return-to-Zero Inverted A 0 is represented by sending a light pulse. A 1 is represented by sending no light pulse. Return-to-Zero Binary 0s and 1s are transmitted by sending voltage pulses, with the voltage returning to zero between pulses. |
Match each network signaling method on the left with its corresponding definition on the right. |
Uses the entire network medium as a single transmission channel-Baseband Combines signals from multiple channels into a single channel.-De-multiplexing Assigns different frequencies to different channels on the same network medium.-Frequency-division multiplexing Divides the transmission medium into several channels.-Broadband Measures the number of times a signal in a communications channel changes state.-Baud rate Measures the number of data bits transmitted in one second in a communication channel.-Bit rate |
Network Signaling is a function of which later of the OSI Model? |
Physical Layer |
Based on the diagram, which network line code technique is being used? |
Non-Return-to-Zero |
Which protocol is used on the World Wide Web to transmit Web pages to Web browsers? |
HTTP |
Your company just acquired another company in the same city. You are given the task of integrating the two e-mail systems to that messages can be exchanged between the e-mail servers. However, each network uses an e-mail package from a different vendor. Which TCP\IP protocol will enable messages to be exchanged between systems? |
SMTP (Simple Mail Transfer Protocol) |
You are an application developer and are writing a program to exchange video files through a TCP\IP network. You need to select a transport protocol that will guarantee delivery. Which TCP\IP protocol would you implement that provides this capability? |
TCP (Transmission Control Protocol) |
Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes? |
TCP (Transmission Control Protocol) |
You have a large TCP\IP network and want to keep hosts’ real time clock synchronized. What protocol should you use? |
NTP (Network Time Protocol) |
What protocol sends e-mail to a mail server? |
SMTP (Simple Mail Transfer Protocol) |
Which of the following protocols stores e-mail on the mail server and gives users a choice to download mail or keep it on the server? |
IMAP4 (Internet Mail Access Protocol V4) |
You are asked to recommend an email retrieval protocol for a company’s sales team. The sales team needs to access email from various locations and possibly different computers. The sales team does not want to worry about transferring email messages or files back and forth between these computers. Which email protocol was designed for this purpose? |
IMAP4 (Internet Mail Access Protocol V4) |
Which of the following TCP\IP protocols do e-mail clients use to download messages from a remote mail server? |
POP3 (Post Office Protocol 3) |
The UDP transport protocol provides which of the following features? (Select all that apply) |
-Low overhead -Connectionless datagram services |
Which protocol is used for securely browsing a website? |
HTTPS |
Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery? |
ICMP (The Internet Control Message Protocol) |
Match each decimal value on the left with the corresponding hex value on the right. not all will be used. |
11-17 B-11 D-13 F-15 C-12 10-16 |
What is the binary format for the following decimal IP address? |
100000011.00001001.1001010.01101111 |
What is the decimal format for the following binary IP address? |
206.58.170.67 |
You are installing networking wiring for a new Ethernet network at your company’s main office building. The project specifications call for Category 5 UTP network cabling and RJ-45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of Category 3 network cable in storage. Upon investigation, it appears very similar to Category 5 wiring. Should you substitute Category 3 cabling for Category 5 cabling to finish the project? |
No, Category 5 cabling has more twists per inch than Category 3 cabling to reduce cross-talk and support higher data rates |
Which of the following cable types often includes a solid plastic core? |
Cat6 |
You are adding new wires in the office. The office has a false ceiling that holds the lights. You would like to run your Ethernet cable there. What type of cable must you use? |
Plenum |
Which of the following connectors is used with Ethernet 10BaseT networks? |
RJ-45 |
In which of the following situations might you use an RJ-11 connector? |
You want to connect your computer to the internet with a dial-up connection. |
When would you typically use an RJ-11 connector |
When connecting a phone to a phone line. |
Which of the following connector types would you most likely use to connect to a T1 WAN service? |
RJ48c |
Which of the following are characteristics of coaxial network cable? (Choose three) |
-It uses two concentric metallic conductors. -The ends of the cable must be terminated. -It has a conductor made from copper in the center of the cable. |
Which of the following cable classifications are typically used for cable and satellite networking with coaxial cables? |
-RG-6 -RG-59 |
You have a small home network connected to the Internet using an RG-6 cable. You need to move the router connecting the network to the Internet, but can’t find any RG-6 cable. Which cable types could you use instead? |
RG-59 |
Of the following cables, which offer the best protection against EMI? |
RG-6 |
You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use? |
F-type |
F-Type connectors are typically used with cables using which of the following standards? (Select two) |
-RG-6 -RG-59 |
You are working with an older 10Base2 Ethernet network. Which of the following connector types will you most likely encounter? |
BNC |
Which of the following forms of optical fiber would usually be used to connect two buildings across campus from each other, which are several kilometers apart? |
Single mode |
Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two) |
-Immunity to electromagnetic interference -Greater cable distances without a repeater |
Which of the following is true about single mode fiber optic network cabling? |
The central core is smaller than that of multimode fiber optic cabling |
Of the following cables, which offer the best protection against EMI? |
Single mode fiber optic |
Which of the following connectors usually require polishing as part of the assembly process? (Select two) |
-ST -SC |
Which of the following are characteristics of an LC fiber optic connector? (Choose two) |
-They use a housing and latch system similar to an RJ-45 UTP connector -They are half the size of standard connectors |
Which of the following are characteristics of an MT-RJ fiber optic connector? (Select two) |
-They can be used with multimode fiber optic cables -They use metal guide pins to ensure accurate alignment |
Which of the following connectors is used with fiber optic cables and connects using a twisting motion? |
ST |
Which of the following connectors are used with fiber optic cables and include both cables in a single connector? (Select two) |
-LC -MT-RJ |
You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task? |
Crimping tool |
What tool should you use to extend network services beyond the demarc? |
Punchdown tool |
You are making Ethernet drop cables using Cat5e cable and RJ45 connectors. You need to remove the plastic coating over the cable to expose the individual wires. What tool should you use? |
Cable Stripper |
You are working with 25 pair wires and 66 blocks. You have pushed the wires onto the 66 block, but now need to cut off the excess end of each wire. What tool do you use? |
Punchdown tool |
Which of the following connector types are used with UTP cables? (Select two) |
-RJ45 -RJ11 |
Which of the following describes the point where the service providers responsibility ends and the customers responsibility begins for installing and maintaining wiring and equipment? |
Demarc |
You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor. What would you use to connect the wiring closets together? |
Vertical Cross Connect |
You have a network that occupies the top floor of a three story building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. What would you use to relocate the WAN line into a wiring closet on your floor? |
Demarc extension |
You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a second wiring closet on the main floor. You need to connect the two wiring closets. Which of the following are typically used to connect the two wiring closets? (Select two.) |
-Horizontal Cross connect -25 Pair |
You have a network that occupies both floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a second wiring closet on the second floor directly above the wiring closet that holds Which of the following terms describes the closet on the second floor? |
IDF |
Which of the following is used to terminate individual wires from a 25 pair or 100 pair cable using female RJ-45 ports? |
Patch Panel |
You want to use the T568B standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector? |
White/orange, orange, white/green, blue, white/blue, green, white/brown, brown |
Which of the following methods would you use to create a crossover cable? |
Use the T568A standard on one connector, and the T568B standard on the other connector. |
you need to terminate a Cat 6 UTP with an RJ45 connector. Your organization’s IT policy states that all cables connectors must be wired according to TIA568A standards. Match the order. |
Pin 1 white with green stripe Pin 2 solid green Pin 3 white with orange stripe Pin 4 solid blue Pin 5 white with blue stripe Pin 6 solid orange Pin 7 white with brown stripe Pin 8 solid brown |
You need to replace a fiber optic cable that is connecting two switches together. You inspect the existing fiber cable and determine that is uses LC connectors. You also notice the cable’s ferrule has a slight slant to it. Which polish grade should you sue to replace the existing cable? |
Angled Physical Contact polish |
Which type of polish grade uses green-colored connectors to help prevent using the wrong connector type? |
Angled Physical Contact polish |
You’ve connected a cable certifier to an RJ45 wall jack, and the output shown below is displayed on the device. What does this output indicate? (Select two) |
-The cable is functioning correctly -This is a crossover cable |
Consider the 850nm multimode fiber optic cable shown below. How much loss can you expect between the transmitter and the receiver? |
-1.2db |
You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You connect each module to the switch with 1 meter multimode patch cables. Will this implementation work? |
No, you shouldn’t use multimode patch cables with single mode GBIC modules |
You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You purchase several used 1 meter multimode patch cables from Amazon…. Will this implementation work? |
No, you should purchase patch cables that use MT-RJ connectors. |
While viewing the stats of the interfaces on a Cisco with, you see an abnormally large number of CRC errors on on interface. This interface is connected to a user’s workstation located in a cubicle on the 2nd floor. What could be causing this to happen? |
A strong EMI emitter near the cable run connected to that interface |
You are troubleshooting a connectivity problem in which one client system is unable to connect to a server. Both the server and client system are connected to the same ethernet network switch. No other users have complained of a problem, and you suspect that faulty network cabling might be to blame. Which of the following troubleshoot steps are you most likely to perform first. |
Use a cable test to test the cable between the computer system and the network switch. |
Which network component connects a device with the transmission media and allows it to send and receive messages? |
Network Interface card |
What device sends signals from a computer onto a network? |
Transceiver |
Which of the following statements accurately describes how a modem works? (Select two) |
It modulates digital data from the PC into analog data and transmits it on a telephone network. It demodulates analog data from a telephone network into digital PC data. |
You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BaseTX switch ports. Which device should you use? |
Media converter |
At which OSI model layer does a media converter operate? |
Layer 1 |
What type of module might a switch use to allow it to modify the media type supported by a switch port? (Select two) |
SFP GBIC |
Which of the following is a valid MAC address? |
C0-34-FF-15-01-8E A MAC or hardware address is a unique identifier hard coded on every network adapter card. A valid MAC address has a total of 12 hexadecimal numbers. Hexadecimal numbers contain the numbers 0 to 9 and letters A to F. Valid values in a MAC address range anywhere from 00 to FF. Note that one of the answers would be valid MAC address except it uses a G value, which is beyond the range of a hexadecimal number. |
Which of the following is a valid MAC address? 95ABC2F4.ABC5.569D.43BF |
AB.07.CF.62.16.BD MAC addresses are comprised of 12 hexadecimal digits (ranging from 0-9 and A-F). They are typically represented as a three sets of four hexadecimal digits or six sets of two hexadecimal digits separated with periods. Regardless of the grouping and separator values, look for 12 hex digits for a valid MAC address. |
Which of the following is true about the MAC address? (Select two) |
It is typically represented by hexadecimal numbers. It is a 48-bit address |
A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address? |
ARP |
Which of the following describes how a switch functions? |
It connects multiple cable segments (or devices), and forwards frames to the appropriate segment |
Which of the following hardware devices regenerates a signal out all connected ports without examining the frame of packet contents? (Select two) |
-Hub -Repeater |
How do switches and bridges learn where devices are located on the network? |
When a frame enters a port, the source MAC address is copied from the frame header |
An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do? |
Send the frame out ports 2-8 |
Which of the flowing devices does not segment the network ? |
Hub |
Which of the following hardware devices links multiple networks and directs traffic between networks? |
Router |
You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization’s network to the Internet to provide users with Internet access. Since doing so, it has come to your attention that an intruder has invaded your network from the Internet on three separate occasions. What type of network hardware should you implement to prevent this from happening again? |
Firewall |
Which of the following is the best device to deploy to protect your private network from a public untrusted network? |
Firewall |
Which of the following is a good reason to install a firewall ? |
To prevent hackers from accessing your network |
You are the administrator of your company’s network. You want to prevent unauthorized access to your intranet from the Internet. Which of the following should you implement? |
Firewall |
The media access control method of all Ethernet networks is |
CSMA/CD |
A network is connected following the IEEE 802.3 specifications. Which of the following best describes when a device can transmit messages? |
The device listens to determine if the transmission media is free. |
Which of the following use the CSMA/CD access method?(2 answers) |
10BaseT 1000BaseT |
Which of the following physical topologies are used with Ethernet networks?(2 answers) |
Star Bus |
Ethernet 100BaseFX networks use what type of cabling? |
Fiber-optic |
Which of the following Ethernet standards uses fiber optic cabling?(2 answers) |
100BaseFX 1000BaseLX |
Your network follows the 100BaseTx specifications for Fast Ethernet. What is the maximum cable segment length allowed? |
100 meters |
With an Ethernet 10BaseT network, the maximum cable length between a computer and the hub is: |
100 meters |
You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings; some of which are around 300 m apart. Fiber-optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling that operates at full-duplex. Which Ethernet standard meets these guidelines?(2 answers) |
10GBaseSR 1000BaseSX |
What type of cabling is used with 100BaseTX Fast Ethernet networks? |
Type 1A STP or Category 5 UTP |
What topology is used with 100BaseTX Fast Ethernet networks?(2 answers) |
Physical star/logical bus Physical star/logical star |
Which of the following are requirements of the 1000BaseT Ethernet standards?(3 answers) |
RJ-45 connectors The cable length must be less than or equal to 100m CAT 5e cabling |
You are planning a network for an educational campus. Due to the size of the buildings and the distance between them, you have elected to use 10BaseFL hubs, cabling, and network interface cards. What is the maximum length for the network cable between a workstation and a hub? |
2000 meters |
Which Gigabit Ethernet standard uses multimode fiber-optic cabling and supports network segments up to a maximum of 550 m long? |
1000BaseSX |
You have been tasked with designing a high-speed Ethernet network. Your client’s building already has 150 ohm shielded twisted pair wiring installed. Due to budget constraints, they have asked you to reuse the existing wiring instead of installing new fiber optic cabling. Which Ethernet standard could you implement in this situation? |
1000BaseCX |
You would like to implement 10 Gbps Ethernet over a distance of 1 km or greater. Which of the following would be the minimum requirement for the implementation?(2 answers) |
10GBaseLR standards Single mode fiber |
Which of the following standards is used by SONET? |
10GBaseLW |
You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose?(2 answers) |
Single Mode Fiber 1000BaseLX |
You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch. |
Crossover |
You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. |
Crossover |
You have two switches that you need to connect using their uplink ports. The switches do not support auto-MDI. |
Crossover |
You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not sport auto-MDI. |
Straight-Through |
You have purchased a new router that you need to configure. You need to connect a workstation to the router’s console port to complete the configuration task. |
Rollover |
Which of the following connectors is typically used on one end of a rollover cable? |
serial |
Using the exhibit to match the connector type on the left with the corresponding letter on the right. |
A- DB-25 B- DB-9 C- RJ45 D- RJ11 E- LC F- BNC G- F-Type |
You want to create a rollover cable that has an RJ-45 connector on both ends. How should you connect the wires within the connectors? |
Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5 |
You are implementing a SOHO network for a local business. The ISP has already installed and connected a cable modem in the business. The business has four computers that need to communicate with each other and the internet. You examine each computer and notice only one of the four has a wireless NIC; they all have ethernet NICs. |
An unmanaged switch and Cat5e cabling |
You manage the two-location network shown in the exhibit. Workstations and servers at each location connect to a patch panel using behind-the-wall wiring. The patch panel…. |
Drop Cables Cat6 straight-through UTP Patch Cables Cat6 straight-through UTP Uplink Cables Cat6 crossover UTP WAN Cable Single-mode fiber optic |
Which of the following tests can be performed by a TDR? |
Measure the length of a cable. Identify the location of a fault on a cable. |
You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. |
No device is able to communicate. |
You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100 Mbps. |
Certifier |
You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat 6e cable to connect the wiring closet to the shipping building. |
Repeater |
A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server. |
Replace the network card in the user’s computer. |
Users report that the Internet is no longer accessible. You suspect that the line connecting your building to the Internet is not working properly. |
Smart jack. |
You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the UTP patch cable is run 75 feet from the wall outlet, passes through the ceiling and over several florescent light fixtures before reaching the client system. |
EMI interfaace. |
You are moving a client to a new location within an Ethernet network. Previous to the move, the client system did not have any difficulty accessing the network. |
Failed patch cable between the client system and the wall jack. |
You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building. |
Attenuation. |
You have decided to implement Gigabit Ethernet on your network. Each switch port is connected to a single device. Following the installation, you find one device connected to a switch that is only running at 100 Mbps. |
Crosstalk. |
You have a cable Internet connection at home. The installer had connected the router near the outside wall of your house with RG-6 cable. |
Echo |
You want to measure the voltage, amps, and ohms of various devices. |
Multimeter. |
Which of the following standards is typically used in a rollover cable? |
RJ-232 |
Which of the following is a vaild IP (version 4) address? (Select 2) |
2.2.2.2 172.16.1.26 |
Consider the following IP addresses . |
Class A, B, B, C |
Which three of the following are Class B addresses? |
129.0.0.0 190.65.2.0 132.12.0.0 |
Which of the following IP addresses have a default subnet mask of 255.255.0.0? |
129.0.0.1 191.168.2.15 168.16.5.1 |
What is the default subnet mask for the IP address 203.111.3.3? |
255.255.255.0 |
A host on the network has an IP address of 129.11.99.78 using the default subnet mask. How would you identify the address and mask using CIDR notation? |
129.11.99.78/16 |
You manage a subnet that uses the following subnet address: 198.162.1.0/23. Which of the following best describes how addressing is configured for the subnet? |
Supernetting. |
You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0 Which of the following describes the address type? |
Classless |
Which organization is responsible for allocating public IP addresses? |
IANA |
Which of the following best describes the purpose of using subnets? |
Subnets divide an IP network address into multiple network addresses. |
You’ve decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (selec two) |
172.17.128.0 172.17.0.0 |
You have a small network connected to the Internet as shown in the Exhibit. You need to configure the default gateway address on Wrk1 so that it can communicate with the hosts on the Internet. Which address would you use for the default gateway address? |
The IP address assigned to Fa0/0 on Router 1 |
You have a small network with a single subnet connected to the Internet as shown in the Exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstation should use RouterA as the default gateway, and DNS1 as the DNS server address. From the drop-down lists, select the appropriate paramteres to configure the workstation’s TCP/IP settings. |
IP Address: 192.168.12.46 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.12.34 DNS Server: 192.162.1.22 |
You recently created a new network segment for Development. Because the hosts are now on a different network segment, they no longer contact the DHCP server. Both network segments are connected via a Cisco router. |
Implement an IP Helper address on the router |
Which of the following IP addresses ranges is reserved for Automatic Private IP Addressing? |
169.254.0.1 – 169.254.255.254 |
What is the network address and subnet mask used by APIPA? |
255.255.0.0 169.254.0.0 |
CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use APIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other but you are having trouble configuring Internet access. What is the likely cause of the problem? |
Private addresses cannot directly communicate to hosts outside the local subnet. |
After installing a new DHCP server on the network, you need to verify that the network devices are receiving IP addresses via DHCP. You reboot a Windows XP client system and using the ipconfig command, receive the following information: Which of the following statements are true? |
The client system is unable to reach the DHCP server. The client system is configured to use DHCP. |
You have configured your organization’s DHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days. |
Wednesday morning |
Which two of the following statementsabout the Dynamic Host Configuration Protocol (DHCP) are true? |
It can deliver other configuration information in addition to IP addresses. A DHCP server assigns addresses to requesting hosts. |
Which of the following strategies are used to prevent duplicate IP addresses being used on a network? |
Install a DHCP server on the network. Use Automatic Private IP Addressing. |
You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. |
DHCP Server. |
You are implementing a DHCP server for your segment. Your segment’s IP address is 192.168.1.0. Your default gateway address is 192.168.1.254. Your DNS server address is 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments. |
You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06). |
Due to widespread network expansion, you have decided to upgrade the network by configuring a DHCP sever for the network uses Linux, Windows, and Mac OS X client systems. You configure the server to distribute IP addresses from 12.168.2.1 to address 192.168.2.100. You use the subnet mask of 255.255.255.0. after making al setting changes on the DHCP sever, you reboot each client system but they are not able to obtain an ip address from the dhcp server. Which of the following would explain the failure? |
the clients must be configured to obtain ip addressing from a dhcp server |
You have a TCP/IP network with 50 hosts. There has been inconsistant communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned. |
DHCP |
You are configuring the DHCP Relay Agent role service on a Windows server. |
Specify which server network interface the agent listens on for DHCP messages. |
You have a Windows Server 2012 system that you want to use as a DHCP Relay Agent. |
Routing and Remote Access |
You need to configure a Cisco RFC 1542 compliant router to forward any recieved DHCP frames to the appropriate subnet. The address of the remote DHCP server is 172.16.30.1. |
IP helper-address 172.16.30.1 |
You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com Which device would you use? |
DNS server |
You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which protocol should you implement? |
DNS |
Listed below are several DNS record types. Match the record the on the left with its function on the right. |
Points a hostname to an IPv4 A Provides alternate names to hosts that already have a host record. CNAME Points an IP address to a hostname PTR Points a hostname to an IPv6 address AAAA identifies servers that can be used to deliver mail. MX |
Listed below are several DNS record types. Match the record type on the left with its function on the right. |
Identify a domain controller- SRV identify a mail server- MX Map a host name to an IPv4 address- A Map an IPv4 address to a host name- PTR |
which of the following services automatically creates and deletes host records wen an ip address lease is created or released? |
DYNAMIC DNS |
If dynamic DNS is being used, which of the following events will cause a dynamic update of the host records? |
The DHCP server renews an ip address lease The ipconfig/release command is entered on a workstation. |
Which of the following are valid IPv6 IP addresses? |
6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1 |
Which of the following is a valid IPv6 address? |
FEC0::AB:9007 |
Match the IPv6 address configuration method on the right with it’s definition on the left. |
Static Full Assignment: The entire 128-bit address and all other configuration information is statically assigned to the host. Static partial Assignment: The prefix is statically assignment and the interface ID is delivered from the MAC address. Stateless Auto-configuration: Clients automatically generate the interface ID and learn the subnet prefix and default gateway through the neighbor discovery protocol (NDP) Stateful DHCPv6: Provides each client an IP address, default gateway, and other IP configuration Stateless DHCPv6: Supplies the client with the DNS server IP address only. Does not provide the client with an IP address and does not track the status of each client. |
Which of the following tunneling methods is used to send IPv4 traffic through an IPv6 network? |
4-to-6 tunneling |
You manage a network with two locations: Portland and Seattle. Both locations are connected to the Internet. All computers in both locations are configured to use IPv6. You would like to implement an IPv6 solution to meet the following requirements: Hosts in each location should be able to use IPv6 to communicate with hosts in the other location through the IPv4 Internet. You want to use a site-to-site tunneling method instead of a host-to-host tunneling method. |
6-to-4 |
Which of the following are characteristics of Teredo tunneling? |
Works through NAT dual stack hosts tunnel endpoints configured on hosts |
You have a special server at work with a custom application installed. Connections to the server that use custom application must use IPv6. The server is currently running IPv4. You are the only person who connects to the server, and you always use your laptop for the connection. Your laptop supports both IPv4 and IPv6. The rest of your company network runs only IPv4. You need a cost effective solution to allow your laptop to connect to the server. Your solution must also support communication through NAT servers. Which method should you use? |
Miredo |
You manage a network that uses IPv6 addressing. When clients connect devices to the network, they generate an interface ID and use NDP to leanrthe subnet prefix and default gateway. Which IPv6 address assignment method is being used? |
Stateless auto configuration |
Which type of address is used in a packet to address the packet to a single host? |
Unicast |
Which type of address is the IP address 198.162.12.254/24? |
Unicast |
Which of the following address types is shared by multiple hosts, and is used to form groups of computers that should receive the same data stream? |
Multicast |
Which type of address is the IP address is the IP address 232.111.255.250? |
Multicast |
Which protocol does an IP host use to inform a router that it wants to receive specific multicast frames? |
IGMP |
A video conference call consisting of multiple participants uses |
Multicast |
You administer a network with windows 200 unix servers, ad windows 2000 professionl, windows 98, and macintosh clients. A user of a windows 98 computer calls you one day and says he is unable to access respurces on the network. You type IPCONFIG on the users computer and receive the following output 0 ethernet adapter |
Unavailable DHCP server |
You want to be able to view the DNS server address that a computer is using. Which of the following utilities would you use |
ifconfig Ipconfig |
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet This workstation can communicate with some hosts on private network, but not with other host. You run IPCONFIG/ALL and see the following: Ethernet adapter Local Area Connection : Connection- specific DNS Suffix . : mydomain . local Description . . . Broadcom network adapter Physical Address . : 00 – AA-BB-CC-74-EF DHCP Enabled . . . . . . . No Autoconfiguration Enabled . Yes IPv4 Address 192 . 168 . 1 . 102(Preferred) Subnet Mask . 255 . 255 . 0 . 0 Default Gateway : 192 . 168 . 1.1 DNS Servers . . 192 . 168 . 2 . 20 192.168.1.27 |
Incorrect Subnet mask |
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. Ethernet adapter Local Area Connection : Connection- specific DNS Suffix . : mydomain . local Description . .Broadcom network adapter What is the most likely cause of the problem? |
Incorrect default gateway |
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet which uses the default subnet mask. This workstation cannot communicate with any other hosts on private network. You run IPCONFIG/ALL and see the following: Ethernet adapter Local Area Connection : Connection- specific DNS Suffix . : mydomain . local Description . . . Broadcom network adapter Physical Address . : 00 – AA-BB-CC-74-EF DHCP Enabled . . . . . . . No Autoconfiguration Enabled . .: Yes IPv4 Address 192 …. :168 . 1 . 102(Preferred) Subnet Mask ……….: 255 . 255 . 225 . 0 Default Gateway …: 192 . 168 . 1.1 DNS Servers . ……: 192 . 168 . 2 . 20 |
Incorrect ip address |
You work in an office that uses NetWare servers and Windows NT 4.0 servers.The network uses both the TCP/IP and IPX/SPX protocols. You are sitting at a workstation that uses Windows 95 OSR2.An application you are using is unable to contact Windows NT server named FileSrv2. Which command can you use to determine whether your computer can still contact the server? |
Ping |
Your computer is sharing information with remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection? |
netstat |
You administer a NetBIOS-based network that uses the TCP/IP protocol.You are trying to troubleshoot a computer that is unable t ocontact a server by its Net BIOS name.Which command can you use to check the connection? |
Nbstat |
Which command displays network activity statistics for TCP,UDP, and IP? |
Netstat -s |
You have been called in to troubleshoot a connectivity problem on a newly installed Windows Server 2003 system.The system is operating satisfactorily and is able to communicate with other systems on the local network.However it is unable to access any systems on other segments of the corporate network. You suspect that the default gateway parameter for the system has not been configured,or may be configured incorrectly.Which of the following utilities are you most likely to use to view the default gateway information for the system? |
Ipconfig |
While working on a Linux server, you are unable to connect to Windows Server 2003 system across the Internet.You are able to ping the default gateway on your own network, so you suspect that the problem lies outside of the local network. |
Traceroute |
Which TCP/IP utility gives you the following output? |
arp |
Which TCP/IP utility gives you the following output? Local Area Connection: |
Nbstat -c |
Which TCP/IP utility gives you the following output? Route Table |
Netstat -r |
Which TCP/IP utility gives you the following output? Reply from 192.168.1.168 |
Ping |
Which TCP/IP utility gives you the following output? Active Connections |
Netstat -a |
Which TCP/IP utility gives you the following output? Interface:192.168.1.111 |
Arp -a |
Which TCP/IP utility gives you the following output? Ethernet adapter Local Area Connection: |
Ipconfig |
Examine the following output: Active Connections |
Netstat |
Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently? |
Arp |
You need to perform a reverse lookup of the 10.0.0.1 IP address. Which command can you use to accomplish this? (Select two. Each response is a complete solution.) A. nbtstat -a 10.0.0.3 B. ipconfig /dnslookup 10.0.0.3 C. dig -x 10.0.0.3 D. nslookup 10.0.0.3 E. arp 10.0.0.3 |
dig -x 10.0.0.3 nslookup 10.0.0.3 |
Mary calls to tell you that she can’t connect to an intranet server called WebSrvl. From her computer, you ping the server’s IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem? A. tracert B. nslookup C. nbtstat D. netstat E. arp |
nslookup |
You are troubleshooting a network connectivity issue on a Unix system. You are able to connect to remote systems by using their IP address, but unable to connect using the hostname. You check the TCP/IP configuration, and note that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Choose two .) A. traceroute B. tracert C. dig D. nslookup |
dig nslookup |
Examine the following output : Server : helicuplar.xct.takro.net Address : 209.53.4.130 Name : westsim.com Address : 64.78.193.84 Which of the following utilities produced this output? A. nslookup B. tracert C. ipconfig D. netstat |
nslookup |
Consider the following output from a dig command run on a Linux system. ; <<>> DiG 8 .2 <<>> westsimlll.com ;;res options :init recurs defnam dnsrch ;;got answer : ;;->>HEADER<< -opcode :QUERY , status : NOERROR , id :4 ;;flags : qr rd ra ; QUERY :l , ANSWER :l , AUTHORITY :2, ADDITIONAL :0 ;;QUERY SECTION : ;; westsimlll.com , type= A , class= IN ;;ANSWER SECTION : westsimlll .com . 7h33m IN A 76 .141 .43 .129 ;;AUTHORITY SECTION : westsimlll .com . 7h33m INNS dnsl .deriatctlll .com. westsimlll.com. 7h33m INNS dns2.de riatct222.com . ;;Total query time : 78 msec ;;FROM: localhost .localdomain to SERVER :default — 202 .64 .49 .150 ;;WHEN: Tue Feb 16 23 :21 :24 2005 ;;MSG SIZE sent : 30 rcvd :l03 which of the following utilities produced this output? |
Dig |
Consider the following output from a dig command run on a Linux system. ; <<>> DiG 8 .2 <<>> westsimlll.com ;;res options :init recurs defnam dnsrch ;;got answer : ;;->>HEADER<< -opcode :QUERY , status : NOERROR , id :4 ;;flags : qr rd ra ; QUERY :l , ANSWER :l , AUTHORITY :2, ADDITIONAL :0 ;;QUERY SECTION : ;; westsimlll.com , type= A , class= IN ;;ANSWER SECTION : westsimlll .com . 7h33m IN A 76 .141 .43 .129 ;;AUTHORITY SECTION : westsimlll .com . 7h33m INNS dnsl .deriatctlll .com. westsimlll.com. 7h33m INNS dns2.de riatct222.com . ;;Total query time : 78 msec ;;FROM: localhost .localdomain to SERVER :default — 202 .64 .49 .150 ;;WHEN: Tue Feb 16 23 :21 :24 2005 ;;MSG SIZE sent : 30 rcvd :l03 What is the IP address of the DNS server that performed this name resolution? A. 202.64.49.150 B. 76.141.43.129 C. 192.168.1.100 D. 16.23.21.24 |
202.64.49.150 |
A user reports that he can’t browse to a specific Web site on the Internet. From his computer, you find that a ping test to the Web server succeeds. A trace route test shows that 17 hops to the destination Web server. What is the most likely cause of the problem? |
incorrect DNS server address |
You want to be able to view the DNS server address that a computer is using. Which of the following utilities would you use? |
ipconfig. ifconfig. |
Examine the following output: Which of the following utilities produced this output? |
Netstat |
Which TCP/IP utility gives you the following output? |
nbtstat -c. |
Which TCP/IP utility gives you the following output? |
arp. |
You are troubleshooting a connectivity problem on a Linux server. You are unable to connect to another system on the local network, but are not able to connect to a server on a remote network. |
ifconfig. |
Which TCP/IP utility gives you the following output? |
ping. |
While troubleshooting a problem on a Linux system, you run a utility that generates the following output: |
traceroute |
You manage a network with multiple subnets connected to the Internet. A user reports that she can’t access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on the subnet, however the computer does access other computers on other subnets as well as the Internet. Which of the following is most likely the cause of the problem? |
Missing route on the default gateway router. |
You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. The office has two Windows 2000 servers, two UNIX severs, one Windows NT server, 90 Windows 98 clients, 40 Windows 2000 Professional clients, and five Macintosh clients. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is not working properly? |
tracert. |
You are troubleshooting access to a server in a remote network. You use the tracert command and see the following: What is the problem? |
Routing loop. |
Which of the following commands would display the output shown here? |
route print. |
You manage a network of multiple subnets connected to the Internet. A user reports that she can’t access the Internet. You investigate the problem and find that she can access all hosts on the private network, but no hosts on the Internet. Which of the following is likely the cause of the problem? |
Missing default route on a router. |
You have configured a remote access server to accept dial-up connections for remote access clients. Which action would likely correct the problem? |
Enable proxy arp on the LAN connection for the remote access server. |
Examine the following output: Which of the following produced this output? |
tracert. |
You have just connected a new computer to your network. The network user static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem Which of the configuration values would you most likely need to change? |
Default gateway. |
Which TCP/IP utility gives you the following output? |
tracert. |
Which of the following utilities would you use to view the routing table? |
route. |
What is the primary purpose of gateway redundancy? |
To overcome a single point of failure on the next hop router. |
Which of the following protocols provide gateway redundancy? select all that apply |
HSRP GLBP VRRP |
Which process reduces the size of the routing table by advertising a single route as a destination for a group of contiguous subnets? |
Route summarization |
Which of the following routing protocols uses relative link cost as a metric? |
OSPF |
Match the default administrative distance with the route type. |
IGRP/100 RIP/120 Static Route/1 EIGRP internal route/90 OSPF/110 EIGRP Summary Route/5 Connected Interface/0 EIGRP external Route/170 |
Your company has decided to temporarily partner with a third-party organization for an upcoming project. This requires your company’s network and the third-party’s network to be connected via a dedicated WAN connection. what should you do to allow routing information to the exchange? |
Configure a border router to use route redistribution. |
You computer has an IP address of 161.13.5.15. Your computer is on a: |
Public network |
Which of the following IP addresses is a valid IP address for a host on a public network? |
142.15.6.1 |
Which of the following is not one of the ranges of IP addresses defined in the RFC 1918 that are commonly used behind a NAT server? |
169.254.0.1 – 169.254.255.254 |
You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? |
10.0.12.15 172.18.188.67 192.168.12.253 |
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the Internet. From your work office, you can try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the Internet. Why can’t you access the server? |
Private addresses are not accessible through the Internet. |
Which of the following associates a port number with a host on a private network? |
PAT |
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.138.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a Web server and allow Internet hosts to contact the server to browse a personal website. |
Static NAT |
Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server? |
169.254.0.1 – 169.254.255.254 |
You are the network administrator for a small company that implements NAT to access the Internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP addresses to support these new servers but you don’t want the public to access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers? |
Static |
You want to connect your small company network to the Internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of NAT should you implement? |
Dynamic |
Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host? |
Port forwarding |
Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)? |
OSPF |
Which of the following routing protocols is classified as a balance hybrid routing protocol? |
EIGRP |
Which of the following routing protocols are classified as link state routing protocols? select two |
OSPF IS-IS |
What are the main differences between the OSPF and IS-IS routing protocols? |
OSPF requires an area 0, while IS-IS does not. |
Which of the following protocols has a limit of 15 hops between and two networks? |
RIP |
What is the main difference between RIP and RIPv2? |
Rip is a classful protocol, while RIPv2 is a classless protocol. |
Under which of the following circumstances might you implement BGP on your company network and share routes with internet routers? |
If the network is connected to the internet using multiple ISPs |
You have a private network connected to the internet. Your routers will not share routing information about your private network with internet routers. Which of the following best describes the type of routing protocol you would use? |
IPG |
You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks. The next hop router for the default has changed. You need to make the change with the least amount of effort possible. What should you do? |
Manually reconfigure the default route to point to the new next hop router. |
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. the router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. |
wait for convergence to take place. |
you have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network. |
Convergence |
When multiple routes to a destination exist, what is used to select the best possible route? |
Metric |
Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions? |
BGP |
Which of the following are true for the IS-IS routing protocol? select two |
Divides large networks into areas Supports IPv6 routing |
One method of preventing routing loops is to not send information about a route back to the router from which the information came. What is this technique called? |
Split horizon |
What information does the next hop entry in a routing table identify? |
The first router in the path to the destination network. |
A router is connected to a network 192.169.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to the network 10.1.0.0/16. What will the router do with the packet. |
Forward the packet to the next hop router specified by the route network 0.0.0.0 |
A router is connected to a network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route on router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet? |
Drop the packet. |
Which of the following is a characteristic of static routing when compared to dynamic routing? |
All routers must be manually updated on the router. |
Which two of the following tasks do routers perform? |
Maintain information about paths through an internetwork. Route data based on logical network addresses. |
You have been recently hired to mange a network for a small company. Prior to your arrival, the entire network was migrated from IPv4 to IPv6. Which strategy could you imply to help prevent these issues from occurring? |
Use a /127 prefix on the backbone segment. |
You work for a large, multinational organization that has an extensive global network that is interconnected using WAN links and routers. |
One of the intermediate routers is an MTU black hole. |
You want to maintain security on your internal network |
53 |
Using the Netstat command, you notice that a remote system |
Downloading a file |
You want to allow your users to download files from a server running the TCP |
FTP |
After blocking a number of ports to secure your server |
Open port 25 to allow SMTP service |
Users complain that they can’t connect to the website when they type |
The HTTP port should be changed to 80 |
Which of the following does a router acting as a firewall use to control packets |
ACL |
You have a company network that is connected to the Internet. You want all users |
Use firewalls to create a DMZ. Web Inside / Private Behind |
You have just installed a packet-filtering firewall |
Port number/source address of a packet/destination address of a packet |
Which of the following describes how access lists |
An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers. |
You have used firewalls to create a demilitarized zone |
Put the Database on the private network/Put the Web server inside the DMZ |
when designing a firewall, what is the recommended approach |
Close all ports, open only ports required |
Match the firewall type |
Layer 2- V Layer 3- R Counts-R Does-V Different-R Same-V |
Your Cisco router has three |
Add a permit |
Which firewall implementation creates a buffer |
DMZ |
Which of the following are true about routed firewalls |
Supports Counts |
An All-in-one security appliance is best |
a Remote |
Which of the following features are common functions |
Bandwith shaping Spam Filtering |
You recently installed a new all-in-one security appliance in a remote office |
Change the default Configure the device’s authentication |
Which of the following prevents access based on website ratings |
Content filter |
You manage a server that runs your company website |
Proxy Server |
Based on the diagram, which type of proxy is handling the client’s request |
Reverse |
Which of the following network services or protocols uses TCP/IP port 22 |
SSH |
Which port number is used by SNMP |
161 |
Which protocol and port number is used by BOOTP |
UDP 67 |
To increase security on your company’s internal network |
443 |
You are monitoring network traffic on your network and you see a large amount of traffic between a Windows |
The workstation is using NetBIOS to access shared resources on the server |
You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427 |
Someone is using Voice over IP VOIP |
You have been given a laptop to use for work |
Host-based |
You have just installed a packet-filtering firewall on your network |
Destination address Port number Source address |
You provide Internet access for a local school |
Application Level |
A small startup company has hired |
The UTM represents a single point of failure |
Match the firewall type on the right |
Packet Filtering Firewall- 3 Circuit Level Proxy – 5 Application Level Gateway – 7 Routed Firewall – 3 Transparent Firewall – 2 |
Which of the following prevents access based on website rating and classifications? |
Content filter |
You manage a server that runs your company Web site. The Web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that static Web content can be offloaded to a different server, while the Web server continues to process dynamic content. Which solution should you implement? |
Proxy server |
Based on the diagram, which type of proxy server is handling the client’s request? |
Reverse Proxy Server |
Which of the following network services or protocols uses TCP/IP port 22? |
SSH |
Which port number is used by SNMP? |
161 |
Which protocol and port number is used by BOOTP/DHCP? |
UDP 67 |
To increase security on your company’s internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions? |
443 |
You are monitoring network traffic on your network and you see a large amount of traffic between a Windows workstation and a Window server on the following ports: |
The workstation is using NetBIOS to access shared resources on the server. |
You are monitoring network traffic on your network, and you see the traffic between two network hosts on port 2427. What is the source of this network traffic? |
Someone is using Voice over IP (VoIP) to make a telephone call. |
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks. |
Host-based firewall |
You have just installed a packet-filtering firewall on your network. Which options will you be able to set on your firewall? |
Source address of a packet Destination address of a packet Port Number |
You provide Internet access for a local school. You want to control Internet access based on user, and prevent access to specific URLs. Which type of firewall should you install? |
Application-level |
A small startup company has hired you to harden their new network. Because funds are limited, you have decided to implement a unified threat management (UTM) device that provides multiple security features in a single network appliance: |
The UTM represents a single point of failure. |
Match the firewall type on the right with the OSI layers at which it operates. |
Packet Filtering Firewall OSI Layer 3 Circuit-level Proxy OSI Layer 5 Application-level Gateway OSI Layer 7 Routed Firewall OSI Layer 3 Transparent Firewall OSI Layer 2 |
You are in the process of configuring an iSCSI storage area network (SAN) for your network…. Which tool should you use? |
iSCSI Initiator |
Arrange the Fibre Channel SAN implementations tasks in the order they should be performed. |
Step 1- Install a Fibre Channel adapter in each server that will access the shared storage on the SAN. Step 2- Deploy a Fibre Channel switch. Step 3- Connect each server to the Fibre Channel switch using the appropriate fiber optic cabling for the equipment you are using. Step 4- Deploy a shared storage device, such as an external RAID device containing multiple hard disk drives. |
Which of the following does NOT accurately describe an iSCSI SAN? |
Requires special hardware and knowledge to implement. |
You manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server. Which network-based storage technology is being used? |
NAS with Clustering. |
In a SAN implementation, the servers that connect to shared storage devices are called___________________. |
initiators |
Which of the following are typical components of a NAS device? select two |
A minimal network OS. One or more NICs. |
Which of the following protocols are used with VoIP? |
SIP RTP |
Which of the following protocols are used by VoIP to set up, maintain, and terminate a phone call? |
SIP |
Which switch features are typically used with VoIP? |
PoE VLAN |
Which of the following features is used with digital IP phones to supply power through a switch port? |
PoE |
Match each UC component on the left with its corresponding definition on the right. |
UC Server – Manages the entire UC system UC Gateway – Connects a digital network to an analog network UC Server – Makes presence information available to users UC Hardware Device – An IP phone for making phone calls UC Gateway – Connects a UC network to the PSTN UC Software Device – A smart phone used to access the UC system UC Hardware Device – Designed to work specifically with the UC server |
Your company uses VoIP for phone calls. Recently, employees have been complaining about phone calls with unusual sound effects. Which type of problem is occurring on the VoIP system? |
Jitter |
At what percent is packet loss noticeable in voice traffic? |
1% |
Which protocol doies VoIP use to interface with the PSTN? |
MGCP |
Your company recently installed a unified communication system. Employees are now able to inform each other of their availability. |
Presence information |
You’ve been asked by upper management if there is a way to integrate phone calls, emails, and instant messaging into a single platform. Which of the following systems should you recommend to them? |
Unified communication |
Which of the following protocols is used during the call control process of multimedia communications? |
Session Initiation Protocol |
In virtualization, what is the role of a hypervisor? |
A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. |
What type of virtualization completely simulates a real physical host? |
Full Virtualization |
Which component is most likely to allow physical and virtual machines to communicate with each other? |
Virtual switch |
Which of the following are advantages of virtualization? select two |
Centralized administration Easy migration of systems to different hardware |
You need to provide DHCP and file sharing services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement? |
Virtual servers. |
You have configured a virtual network that includes the following virtual components: |
Virtual OS 2 Virtual OS 3 |
You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement? |
Virtual servers |
You have configured a virtual network that includes the following virtual components: |
Virtual OS 3 Physical OS 1 Physical OS 2 Physical OS 3 Physical OS 4 |
You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your testing virtual machines are connected to the production network through the hypervisor’s network interface. However, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent this, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do? |
Create a new virtual switch configured for host-only (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch. |
Match the virtualization feature on the right with the appropriate description on the left. |
Flexibility – Moving virtual machines between hypervisor hosts Testing – Verifying that security controls are working as designed Server consolidation – Performing a physical-to-virtual migration (P2V) Sandboxing – Isolating a virtual machine from the physical network |
You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working. |
Create a new virtual switch configured for bridged (external) networking Connect the virtual network interfaces in the virtual machine to the virtual switch |
What key advantage does a virtual router have over a physical router? |
Multiple networks can be connected to a single interface. |
You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do? |
Implement a virtual firewall within the hypervisor. |
Which of the following statements about virtual NICs are true? |
Virtual NICs need the appropriate driver installed to function. Multiple virtual NICs can be added to a virtual machine. |
Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network? |
SaaS |
Which of the following best describes the Platform as a Service (PaaS) cloud computing service model? |
PaaS delivers everything a developer needs to build an application onto the cloud infrastructure |
Which of the following is NOT true regarding cloud computing? |
Cloud computing requires end-user knowledge of the physical location and configuration of the system that delivers the services. |
Public cloud |
Provides cloud services to just about anyone |
Private cloud |
Provides cloud services to a single organization |
Community cloud |
Allows cloud services to be shared by several organizations |
Hybrid Cloud |
Integrates one cloud service with other cloud services |
You were hired by a small start-up company. the company is in a small office and has several remote employees. |
IaaS |
You manage the information systems for a large co-location data center. Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? |
Verify that your network’s existing security infrastrucutre is working properly. Install the latest firmware updates from the device manufacturer |
You manage the information systems for a large manufacturing firm. Supervisory control and data acquistion (SCADA) devices are used on the manfucaturing floor to manager your organization’s automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? |
Install the latest firmware updates from the device manufacturer Verify that your network’s existing security infrastrucutre is working properly. |
Why do attackers prefer static environment devices to conduct distributed network attacks? select two |
These devices tend to employ much weaker security than traditional network devices These devices are typically more difficult to monitor than traditional network devices. |
Match the definition on the left with the SCADA technology term on the right |
Remote Terminal Unit- Connects equipment to the network via a wireless signal and converts digital data from the network into signals that the equipment can process. DCS- A network of components that work together in order to remotely manage industrial equipment. Network Link- Connects the supervisory computer to the RTUs or PLCs. Supervisory Computer-Communicates with and send control commands to connected SCADA devices. Programmable logic Controller- Connects equipment to the network via a physical medium and converts digital data into signals that the equipment can process |
Which of the following is an example of smart technology embedded within networked devices associated with automated factory equipment? |
SCADA systems |
SCADA systems are typically implemented using which of the following components? |
Remote terminal units (RTUs), and programmable Logic Controllers (PLCs) |
What is the risk associated with smart technology used in network devices such as smart refrigerators, environmental controls, or industrial equipment? |
They are vulnerable to exploits due to weaker security. |
TestOut Network pro Chapters 1-9
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price