Term
What is the default port for SMTP |
|
Definition
Port 25
SMTP by default uses TCP port 25 |
|
|
Term
The ping tool is used to: (Choose two.) A. Determine the network portion of a host address. B. Self-test a host's own network interface. C. Determine whether a host is reachable. D. Manage a host's session when UDP is used. |
|
Definition
B. Self-test a host's own network interface C. Determine whether a host is reachable |
|
|
Term
What is the default subnet mask for a Class B network |
|
Definition
255.255.0.0
Class A default subnet mask is 255.0.0.0. Class B default subnet mask is 255.255.0.0. Class C default subnet mask is 255.255.255.0 |
|
|
Term
Which of the following are features of DHCP? (Choose two.)
A. IP address resolution to canonical names B. Secure shell connections C. Address reservation D. Network file transfer E. IP address exclusion |
|
Definition
C. Address reservation E. IP address exclusion |
|
|
Term
The command-line tool used to list a host's active incoming connections is:
A. NETSTAT B. IPCONFIG C. NSLOOKUP D. PING |
|
Definition
A. Netstat
Without parameters netstat displays active TCP connections |
|
|
Term
Which network does the IP address 220.100.100.100 belong to?
A. 220.100.100.0/24 B. 220.100.100.1/24 C. 255.255.255.0/24 D. 255.255.255.1/24 |
|
Definition
|
|
Term
Which subnet mask is valid
A. 255.255.255.240 B. 255.255.255.228 C. 255.255.255.164 D. 255.255.255.245 |
|
Definition
|
|
Term
A service that resolves NetBIOS names to IP addresses is:
A. Domain Name Service (DNS). B. Internet Service Provider (ISP). C. Address Resolution Protocol (ARP). D. Windows Internet Name Service (WINS). |
|
Definition
D. Windows Internet Name Service (WINS)
WINS is to NetBIOS names what DNS is to domain names — a central mapping of host names to network addresses |
|
|
Term
Teredo tunneling is a protocol that:
A. Translates Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6). B. Allows IPv6 connectivity through IPv4 devices. C. Provides VPN security. D. Dynamically allocates IPv6 addresses. |
|
Definition
B. Allows IPv6 connectivity through IPv4 devices. |
|
|
Term
What type of DNS record maps host names to addresses?
A. Mail Exchanger (MX) DNS record B. Service (SRV) DNS record C. Host (A) DNS record D. Canonical (CNAME) DNS record |
|
Definition
C. Host (A) DNS record
An A or Address record (also known as a host record) links a domain to the physical IP address of a computer hosting that domain's services. |
|
|
Term
What is the default port for Telnet |
|
Definition
Port 23
The telnet protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23, where a Telnet server application (telnetd) is listening |
|
|
Term
When a client's DHCP-issued address expires, the client will:
A. Select a new address and request approval from the DHCP server. B. Require manual configuration with a static IP address. C. Attempt to obtain a new address by broadcasting. D. Continue to use the address until it is notified to stop |
|
Definition
C. Attempt to obtain a new address by broadcasting. |
|
|
Term
A Media Access Control (MAC) address identifies a/an:
A. UPnP device. B. Local broadcast domain. C. Network interface card (NIC). D. Local area network (LAN) |
|
Definition
C. Network interface card (NIC).
A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment |
|
|
Term
Two companies want to share data by using the Internet.
Which type of network provides the solution?
A. Ethernet B. Intranet C. Extranet D. Perimeter |
|
Definition
C. Extranet
An extranet is a computer network that allows controlled access from outside of an organization's intranet |
|
|
Term
You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on the first attempt?
A. PING is improperly configured. B. The DNS is not resolving. C. The DHCP server is offline. D. NSLOOKUP is stopped. |
|
Definition
B. The DNS is not resolving.
DNS is not working |
|
|
Term
VPNs are implemented to provide:
A. A secure connection within a private network. B. A secure connection through public networks. C. Additional encryption by using IPSec. D. Additional security for selected computers. |
|
Definition
B. A secure connection through public networks. |
|
|
Term
Which of these factors has the biggest impact on data transmission speed in a wireless network?
A. The access method used for the network B. The transmission standard of the equipment used C. The use of strong encryption for transmissions D. The transmission wattage rating used on the NIC |
|
Definition
B. The transmission standard of the equipment used |
|
|
Term
If an 802.llg internet connection has connectivity problems, what may be the cause?
A. A cordless phone B. A cellular phone C. Incandescent lights D. Electromagnetic interference (EMI) |
|
Definition
D. Electromagnetic interference (EMI) |
|
|
Term
Which type of network covers the broadest area?
A. WAN B. CAN C. LAN D. PAN |
|
Definition
A. WAN
A wide area network (WAN) is a network that covers a broad area |
|
|
Term
In local area network (LAN) topologies, the primary media access methods are: (Choose two.)
A. Contention B. Negotiation C. Kerberos D. Token passing |
|
Definition
A. Contention D. Token Passing
Media contention occurs when two or more network devices have data to send at the same time. Because multiple devices cannot talk on the network simultaneously, some type of method must be used to allow one device access to the network media at a time. This is done in two main ways: carrier sense multiple access collision detect (CSMA/CD) and token passing. |
|
|
Term
Which of the following uses a tunneling protocol?
A. Internet B. VPN C. Extranet D. VLAN |
|
Definition
B. VPN
Tunneling enables the encapsulation of a packet from one type of protocol within the datagram of a different protocol. For example, VPN uses PPTP to encapsulate IP packets over a public network, such as the Internet. |
|
|
Term
In a physical star topology, the central device is referred to as a:
A. Bridge B. Server C. segmenter D. Hub |
|
Definition
D. Hub
In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection |
|
|
Term
Which technology can you use to extend an internal network across shared or public networks?
A. VLAN B. Microsoft ASP-NET C. Microsoft .NET Framework D. VPN |
|
Definition
D. VPN
VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network. |
|
|
Term
A network that separates an organization's private network from a public network is a/an:
A. Firewall B. Extranet C. Perimeter D. Internet |
|
Definition
C. Perimeter
A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network |
|
|
Term
Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)
A. 802.1 If B. 802.11g C. 802.11k D. 802.11m E. 802.11n |
|
Definition
B. 802.11g E. 802.11n
The 802.11 family consists of a series of half-duplex over-the-air modulation techniques that use the same basic protocol. 802.11-1997 was the first wireless networking standard in the family, but 802.11b was the first widely accepted one, followed by 802.11a, 802.11g, 802.11n, and 802.11ac |
|
|
Term
What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point?
A. The access point will transmit, but the node will be unable to receive. B. A connection will be established. C. Both the node and the access point will be unable to transmit. D. The node will transmit, but the access point will be unable to receive |
|
Definition
B. A connection will be established.
802.11g hardware is fully backward compatible with 802.11b hardware. |
|
|
Term
Which type of network is most vulnerable to intrusion?
A. Dial-up B. Wireless C. Broadband D. Leased line |
|
Definition
B. Wireless
Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior |
|
|
Term
Attenuation in a wireless network signal is a result of:
A. Number of wireless nodes connected. B. Distance from the access point. C. Interference from cellular phones. D. Encryption of the signal |
|
Definition
B. Distance from the access point
Solid objects greatly attenuate (reduce) Wi-Fi radio signals, so clear line of sight is best |
|
|
Term
A VPN is a/an:
A. Encrypted connection across the Internet. B. Virtual network within your local area network (LAN). C. Communication tunnel between VLANs. D. Personal network for your use only |
|
Definition
A. Encrypted connection across the Internet.
VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network |
|
|
Term
Which of the following determines the media access method that is used in a network?
A. Number of hosts connected to the network B. Number of domain servers on the segment C. Maximum speed of the media D. Topology and protocol |
|
Definition
|
|
Term
Which wireless authentication method provides the highest level of security?
A. Wired Equivalency Privacy (WEP) B. IEEE 802.lln C. WI-FI Protected Access (WPA) D. IEEE 802.11 |
|
Definition
C. WI-FI Protected Access (WPA)
WPA aims to provide stronger wireless data encryption than WEP.
Wi-Fi Protected Access (WPA) is a security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks |
|
|
Term
Which technology provides the highest bit rate?
A. T1 B. El C. DS3 D. ISD |
|
Definition
C. DS3
A DS3 line (also referred to as T3) is a dedicated, high bandwidth, fiber circuit with a speed of 45 Mbps.
A: T1, 1.544Mbps B: E1, 2.048Mbps D: SDN 30B+1D (all 64K) ~ E1: 1.930Mbps |
|
|
Term
The topology of a local area network (LAN) is defined by the:
A. Number of devices to connect. B. Physical and logical characteristics. C. Distance between workstations. D. Type of cable being used |
|
Definition
B. Physical and logical characteristics.
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network and may be depicted physically or logically |
|
|
Term
Which type of port is used to support VLAN traffic between two switches?
A. Virtual port B. WAN port C. Trunk port D. LAN port |
|
Definition
C. Trunk port
Trunk links are required to pass VLAN information between switches. |
|
|
Term
The protocol that maps IP addresses to a Media Access Control (MAC) address is:
A. Internet Message Access Protocol (IMAP). B. Dynamic Host Configuration Protocol (DHCP). C. Routing Information Protocol (RIP). D. User Datagram Protocol (UDP). E. Address Resolution Protocol (ARP) |
|
Definition
E. Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address (MAC address) that is recognized in the local network. |
|
|
Term
The maximum throughput of an 802.llg network is:
A. 2.4 GHz. B. 54 GHz. C. 2.4 Mbps D. 54 Mbps. |
|
Definition
D. 54 Mbps
The 802.11g standard for wireless networking supports a maximum bandwidth of 54 Mbps. |
|
|
Term
A user reports that she cannot connect to network resources on the company network. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97.
You need to restore access to network resources.
What should you do next?
A. Flush the cache on the DNS server. B. Reset the user's password on the server. C. Check your router's current routing tables. D. Verify that the DHCP service is available. |
|
Definition
D. Verify that the DHCP service is available.
169.254.48.97 is an APIPA address. An APIPA address is used when the DHCP server is not available. |
|
|
Term
The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is:
A. corp B. com C. nwtraders D. exchange E. mail |
|
Definition
E. mail
Hostnames are composed of series of labels concatenated with dots, as are all domain names.
For example, let's break mail.google.com into its component parts:
mail is the host or local hostname; and google.com is the domain or parent domain name |
|
|
Term
To which IP configuration does the CIDR notation 192.168.1.1/25 refer?
A. 192.168.1.1    255.255.255.64
B. 192.168.1.1    255.255.255.1
C. 192.168.1.1    255.255.255.32
D. 192.168.1.1    255.255.255.256
E. 192.168.1.1    255.255.255.128
|
|
Definition
E. 192.168.1.1 255.255.255.128 |
|
|
Term
Which command is used to verify that a server is connected to the network?
A. IPCONFIG B. ROUTE C. PING D. CHECK |
|
Definition
C. Ping
Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. |
|
|
Term
A node within a local area network (LAN) must have a network interface device and a:
A. Network account B. Table of all network nodes C. Host address D. Resource to share |
|
Definition
C. Host address
In network addressing, the host address, or the host ID portion of an IP address, is the portion of the address used to identify hosts (any device requiring a Network Interface Card, such as a PC or networked printer) on the network |
|
|
Term
Which of the following is a Layer 2 WAN protocol?
A. Point-to-Point Protocol (PPP) B. Simple Network Management Protocol (SNMP) C. Transmission Control Protocol (TCP) D. Internet Protocol (IP) |
|
Definition
A. Point-to-Point Protocol (PPP) |
|
|
Term
Which of these represents the Internet Protocol version 6 (IPv6) loopback address?
A. 127.0.0.1 B. 192.168.0.1 C. FEC0:A8C0::AA01 D. ::1 |
|
Definition
D. ::1
The localhost (loopback) address, 0:0:0:0:0:0:0:1, and the IPv6 unspecified address, 0:0:0:0:0:0:0:0, are reduced to ::1 and ::, respectively |
|
|
Term
Which of these addresses is a multicast address?
A. 127.0.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 224.0.0.1 |
|
Definition
D. 224.0.0.1
The full range of multicast addresses is from 224.0.0.0 to 239.255.255.255. |
|
|
Term
Which of the following uses, pointer records and A records?
A. IDS B. DNS Server C. NAT Server D. IPS |
|
Definition
B. DNS Server
DNS records include: * A Address record * PTR Pointer record |
|
|
Term
The ipconfig command will:
A. Configure routers B. Display a client's address C. Display a client's broadcast mode D. Configure DHCP clients |
|
Definition
B. Display a client's address
ipconfig Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters |
|
|
Term
One reason to incorporate VLANs in a network is to:
A. Increase the number of available IP addresses. B. Increase the number of available Media Access Control (MAC) addresses. C. Reduce the number of broadcast domains. D. Reduce the number of nodes in a broadcast domain |
|
Definition
D. Reduce the number of nodes in a broadcast domain |
|
|
Term
Which of these is an application layer protocol?
A. TCP B. FTP C. IP D. UDP |
|
Definition
B. FTP
FTP is an application layer protocol. |
|
|
Term
In addition to switching, multilayer switches also:
A. Provide Layer 3 routing functions B. Interface with CAT3, CATS, CAT5e, and fiber optics. C. Support 10 MB, 100 MB, and 1 GB local area network (LAN) ports. D. Operate by using only Layer 1 and 2 protocols. |
|
Definition
A. Provide Layer 3 routing functions |
|
|
Term
The top-level domain of www.adventureworks.com is:
A. www B. adventureworks C. adventureworks.com D. com |
|
Definition
D. com
A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet. |
|
|
Term
One reason to replace an unmanaged switch with a managed switch is to:
A. Manage the routing tables. B. Support multiple VLANS. C. Reduce collision domains. D. Route between networks. |
|
Definition
B. Support multiple VLANS.
A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers |
|
|
Term
To directly connect the Ethernet network interface cards (NICs) of two computers, you should use a:
A. Crossover cable B. Straight cable C. Rollover cable D. Coaxial cabl |
|
Definition
A. Crossover cable
An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices together directly. Normal straight through cables were used to connect from a host network interface controller (a computer or similar device) to a network switch, hub or router. |
|
|
Term
The function of a router is to:
A. Provide IP subnet masks for hosts. B. Forward traffic to other networks. C. Broadcast routing tables to clients. D. Store tables for name resolution |
|
Definition
B. Forward traffic to other networks.
A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect |
|
|
Term
If a router cannot determine the next hop for a packet, the router will:
A. Forward the packet to the default route. B. Send the packet back to the packet's source. C. Broadcast the packet. D. Store the packet in the memory buffer |
|
Definition
A. Forward the packet to the default route.
If there is no next hop, the packets are not policy routed.
A default route of a computer that is participating in computer networking is the packet forwarding rule (route) taking effect when no other route can be determined for a given Internet Protocol (IP) destination address. |
|
|
Term
In which physical network topology is each computer connected to a central point?
A. Star B. Mesh C. Ring D. Bus |
|
Definition
A. Star
In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection. |
|
|
Term
Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)
A. Token ring B. Ethernet C. Dial-up D. Leased line |
|
Definition
C. Dial-up D. Leased line
Token ring and Ethernet are used in LANs. |
|
|
Term
A private network that allows members of an organization to exchange data is an:
A. Extranet B. Ethernet C. Intranet D. Internet |
|
Definition
C. Intranet
An intranet is a computer network that uses Internet Protocol technology to share information, operational systems, or computing services within an organization |
|
|
Term
Security is a concern on wireless networks due to:
A. The radio broadcast access method. B. Spread spectrum issues. C. Frequency modulation issues. D. The potential for cross-talk |
|
Definition
A. The radio broadcast access method. |
|
|
Term
A characteristic of the mesh topology is that it:
A. Uses a central hub. B. Cannot use wired connections. C. Uses redundant paths. D. Cannot use wireless connections. |
|
Definition
C. Uses redundant paths.
Mesh network topology is one of the key network architectures in which devices are connected with many redundant interconnections between network nodes such as routers and switches. In a mesh topology, if any cable or node fails, there are many other ways for two nodes to communicate. |
|
|
Term
To protect a network when it is connected to the Internet, you should use a:
A. Bridge B. Firewall C. Switch D. Router |
|
Definition
B. Firewall
A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings. |
|
|
Term
One purpose of a perimeter network is to:
A. Make resources available to the intranet. B. Link campus area networks (CANs). C. Link local area networks (LANs). D. Make resources available to the Internet. |
|
Definition
D. Make resources available to the Internet.
In computer security, a DMZ (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet. |
|
|
Term
Which protocol can be used to encrypt packets on the Internet?
A. SNMP B. HTTPS C. TFTP D. HTTP |
|
Definition
B. HTTPS
HTTPS, which stands for Hypertext Transfer Protocol Secure, makes it more difficult for hackers, the NSA, and others to track users. The protocol makes sure the data isn't being transmitted in plain-text format, which is much easier to eavesdrop on. |
|
|
Term
What are the Layers of the OSI model in order |
|
Definition
Layer 1 - Physical Layer 2 - Data Link Layer 3 - Network Layer 4 - Transport Layer 5 - Sessions Layer 6 - Presentation Layer 7 - Application
MNEMONIC Please Do Not Throw Sausage Pizzas Away |
|
|
Term
The service that resolves fully qualified domain names (FQDN) to IP addresses is:
A. Windows Internet Name Service (WINS). B. Domain Name Service (DNS) C. Internet Service Provider (ISP). D. Address Resolution Protocol (ARP) |
|
Definition
B. Domain Name Service (DNS)
The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites. |
|
|
Term
If a router is installed so that it separates a DHCP server from its clients, the clients will:
A. Immediately lose connectivity to all segments. B. Be unable to obtain their leases from the server. C. Immediately lose connectivity to the local segment. D. Receive an immediate renewal of their lease. |
|
Definition
B. Be unable to obtain their leases from the server. |
|
|
Term
Which of the following services masks internal IP addresses from outside the network?
A. DHCP B. WINS C. NAT D. DNS |
|
Definition
C. NAT
The majority of NATs map multiple private hosts to one publicly exposed IP address. |
|
|
Term
Tracert is used to:
A. Manage routing tables dynamically. B. Manage session-oriented connections between nodes. C. Report the route taken by packets across an IP network. D. Report the shortest route between different networks. |
|
Definition
C. Report the route taken by packets across an IP network.
In computing, traceroute (treacert) is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network. |
|
|
Term
In which OSI layer does routing occur?
A. Transport B. Network C. Data Link D. Physical |
|
Definition
B. Network
In the seven-layer OSI model of computer networking, the network layer is layer 3. The network layer is responsible for packet forwarding including routing through intermediate routers |
|
|
Term
What type of record does DNS use to find a mail service?
A. Service (SRV) DNS record B. Canonical (CNAME) DNS record C. Mail Exchanger (MX) DNS record D. Host (A) DNS recor |
|
Definition
C. Mail Exchanger (MX) DNS record
A mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available. |
|
|
Term
The default gateway address identifies the:
A. Device that will connect the computer to the local network. B. Device that will connect the computer to a remote network. C. Server that will provide name services for the computer. D. Server that will authenticate the user of the computer. |
|
Definition
B. Device that will connect the computer to a remote network.
A default gateway is the node on the computer network that the network software uses when an IP address does not match any other routes in the routing table. In home computing configurations, an ISP often provides a physical device which both connects local hardware to the Internet and serves as a gateway. |
|
|
Term
How many bits are there in an Internet Protocol version 6 (IPv6) address?
A. 32 B. 64 C. 128 D. 256 |
|
Definition
C. 128
IPv6 uses a 128-bit address, IPv4 uses a 32-bit addresse |
|
|
Term
What is the minimum cabling requirement for a 100BaseTX network?
A. Category 3 UTP cable B. Category 5 UTP cable C. Category 6 UTP cable D. Multimode fiber cable |
|
Definition
B. Category 5 UTP cable
100BASE-TX is the predominant form of Fast Ethernet, and runs over two wire-pairs inside a category 5 or above cable. 100BASE-TX and 1000BASE-T were both designed to require a minimum of Category 5 cable and also specify a maximum cable length of 100 meters. Category 5 cable has since been deprecated and new installations use Category 5e. |
|
|
Term
Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.)
A. Establishing network speed parameters B. Verifying the client's patch level C. Negotiating algorithms to use D. Exchanging key information |
|
Definition
C. Negotiating algorithms to use D. Exchanging key information
Internet Key Exchange (IKE) negotiates the IPSec security associations (SAs). This process requires that the IPSec systems first authenticate themselves to each other and establish ISAKMP (IKE) shared keys. |
|
|
Term
The query protocol used to locate resources on a network is:
A. User Datagram Protocol (UDP). B. Lightweight Directory Access Protocol (LDAP) C. Tracert D. Telnet. |
|
Definition
B. Lightweight Directory Access Protocol (LDAP)
The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. |
|
|
Term
Which of the following is a public IP address?
A. 10.156.89.1 B. 68.24.78.221 C. 172.16.152.48 D. 192.168.25.101 |
|
Definition
|
|
Term
All session data is "Encrypted between all machines" while using telnet.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. Not encrypted
B. Encrypted between any Windows machines
C. Encrypted only to any non-Windows machines
D. No change is needed
|
|
Definition
A. Not encrypted
Telnet, by default, does not encrypt any data sent over the connection (including passwords), and so it is often practical to eavesdrop on the communications and use the password later for malicious purposes; anybody who has access to a router, switch, hub or gateway located on the network between the two hosts where Telnet is being used can intercept the packets passing by and obtain login, password and whatever else is typed with a packet analyzer |
|
|
Term
Which protocol is a transport layer protocol?
A. FTP B. IP C. UDP D. ASCI |
|
Definition
C. UDP
Transport layer protocols include: UDP, TCP |
|
|
Term
Which DNS record type specifies the host that is the authority for a given domain?
A. NS B. MX C. CNAME D. SOA |
|
Definition
D. SOA
The start of authority (SOA) resource record indicates the name of origin for the zone and contains the name of the server that is the primary source for information about the zone. It also indicates other basic properties of the zone |
|
|
Term
IPv4 multicast addresses range from
"192.168.0.0 to 192.168.255.255".
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
A. 127.0.0.0 to 127.255.255.255
B. 172.16.0.0 to 172.31.255.255
C. 224.0.0.0 to 239.255.255.255
D. No change is needed
|
|
Definition
C. 224.0.0.0 to 239.255.255.255
Class D is multicast.
Class A: 0.0.0.0 - 127.255.255.255 Class B: 128.0.0.0 - 191.255.255.255 Class C: 192.0.0.0 - 223.255.255.25 Class D: 224.0.0.0 - 239.255.255.25 |
|
|
Term
The four IEEE standards, 802.11a, b, g, and n, are collectively known as "mobile ad hoc" networks.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. WiMAX
B. Bluetooth
C. WiFi
D. No change is needed
|
|
Definition
C. WiFi
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5, and 60 GHz frequency bands |
|
|
Term
A university has network links between various locations. Where would a T3 connection be appropriate?
A. Server to network in the main campus server room B. Main campus to a large satellite campus C. Computer lab PC to lab printer D. Library laptop PC to Internet |
|
Definition
A. Server to network in the main campus server room
T3 lines are a common aggregation of 28 T1 circuits that yields 44.736 Mbps total network bandwidth . Besides being used for long-distance traffic, T3 lines are also often used to build the core of a business network at its headquarters |
|
|
Term
Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router? (Choose two.)
A. Network Policy and Access Services B. Routing and Remote Access Services C. Remote Administration D. DirectAccess |
|
Definition
A. Network Policy and Access Services B. Routing and Remote Access Services |
|
|
Term
What are two characteristics of fiber optic cable? (Choose two.)
A. Conducts electricity B. Requires metal conduit C. Supports splicing D. Requires a polish for end connectors |
|
Definition
C. Supports splicing D. Requires a polish for end connectors |
|
|
Term
Which Microsoft network service can you use to establish a connection to a corporate LAN without any user action?
A. VPN B. Remote Desktop C. DirectAccess D. Nap |
|
Definition
C. DirectAccess
DirectAccess allows remote users to securely access internal network file shares, Web sites, and applications without connecting to a virtual private network (VPN) |
|
|
Term
A "secondary zone" is the first DNS zone to which all updates for the records that belong to that zone are written.
Select the correct answer if the QUOTED text does not make the statement correct. Select 'No change is needed" if the QUOTED text makes the statement correct.
A. Primary zone
B. Stub zone
C. Conditional forwarding zone
D. No change is needed
|
|
Definition
A. Primary zone
When a zone that this DNS server hosts is a primary zone, the DNS server is the primary source for information about this zone, and it stores the master copy of zone data in a local file or in AD DS. |
|
|
Term
You are setting up a network computer game. You need to open up ports on your firewall so your friends can join the network.
Which command displays the ports that your computer is listening for?
A. nslookup B. nbtstat C. ping D. netstat |
|
Definition
D. netstat
netstat (network statistics) is a command-line tool that displays network connections for the Transmission Control Protocol (both incoming and outgoing), routing tables, and a number of network interface (network interface controller or software-defined network interface) and network protocol statistics. |
|
|
Term
"A/an virtual private network (VPN)" protects a network's perimeter by monitoring traffic as it enters and leaves.
Select the correct answer if the QUOTED text does not make the statement correct. Select 'No change is needed" if the QUOTED text makes the statement correct.
A. Extranet
B. Firewall
C. Intranet
D. No change is needed
|
|
Definition
B. Firewall
A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings |
|
|
Term
The loopback address of your computer is "127.0.0.1".
Select the correct answer if the QUOTED text does not make the statement correct. Select 'No change is needed" if the QUOTED text makes the statement correct.
A. 10.0.1.1
B. 169.254.0.5
C. 192168.1.1
D. No change is needed
|
|
Definition
D. No change is needed
127.0.0.1 is the IPv4 loopback address |
|
|
Term
Which Ports do the following use.
1. SMTP 2. FTP 3. HTTPS |
|
Definition
1. SMTP uses port 25 2. FTP uses port 21 3. HTTPS uses port 443
25 SMTP (Send Mail Transfer Protocol) 21 FTP (File Transfer Protocol) 443 Hypertext Transfer Protocol over TLS/SSL (HTTPS) |
|
|
Term
When a client computer is unable to reach a DHCP server, it will automatically assign an IP address in the "10.0.0.0 -10.0.0.255" range.
Select the correct answer if the QUOTED text does not make the statement correct. Select 'No change is needed" if the QUOTED text makes the statement correct
A. 127.0.0.0-127.0.0.255
B. 169.254.0.0-169.254.255.255
C. 192168.100.0 -192.168.100.255
D. No change is needed
|
|
Definition
B. 169.254.0.0-169.254.255.255
169.254.0.0 - 169.254.255.255 is the APIPA address range. An APIPA address is used when the DHCP server is not available |
|
|
Term
A node within a local area network (LAN) must have which two of the following? (Choose two.)
A. Username and password B. Share name C. NIC D. IP address E. Table of all network node |
|
Definition
C. NIC D. IP address
A node must be able to access the LAN through a network interface. A node must also have an IP address. |
|
|
Term
Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies?
A. 802.11a B. 802.11b C. 802.11g D. 802.11n |
|
Definition
D. 802.11n
IEEE 802.11n-2009, commonly shortened to 802.11n, is a wireless networking standard that uses multiple antennas to increase data rates |
|
|
Term
What is the bit rate for a North American T3 circuit?
A. 6.312 Mbit/s B. 44.736 Mbit/s C. 274.176 Mbit/s D. 400.352 Mbit/s |
|
Definition
B. 44.736 Mbit/s
Data Rates. DS3/T3 = 44.7 Mbp |
|
|
Term
Which feature of Category 5e STP cable reduces external interference?
A. Crosstalk B. Shielding C. Length D. Twisting |
|
Definition
D. Twisting
Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources |
|
|
Term
What are three advantages of VLANs? (Choose three.)
A. They can logically address packets by using IP. B. They require a router to connect to VLANs on another switch. C. They compartmentalize a network and isolate traffic. D. They are efficient because a single switch can implement only a single VLAN. E. They act as though they are on the same LAN regardless of physical location. |
|
Definition
B. They require a router to connect to VLANs on another switch. C. They compartmentalize a network and isolate traffic E. They act as though they are on the same LAN regardless of physical location. |
|
|
Term
For which two reasons should you use IPsec between computers? (Choose two.)
A. Data compression B. Data integrity C. Data redundancy D. Data confidentiality |
|
Definition
B. Data integrity D. Data confidentiality
IPSEC (Internet Protocol Security) is a security protocol that provides encryption and authentication over the Internet. IPSEC supports network-level data integrity, data confidentiality, data origin authentication, and replay protection. |
|
|
Term
Every router today is "TCP/IP" enabled, which is an industry-standard protocol that you use on the Internet and for local addressing.
Select the correct answer if the QUOTED text does not make the statement correct. Select 'No change is needed" if the QUOTED text makes the statement correct.
A. HTTP
B. FTP
C. SNMP
D. No change is needed
|
|
Definition
|
|
Term
You are home for vacation, and a family member wants your help to purchase and install network cable for a home office.
The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement?
A. Cat3 B. CAT5 C. Cat5e D. Cat6 |
|
Definition
C. Cat5e
Cat5e cables support up to 1000BASE-T (Gigabit Ethernet).
Incorrect: Cat5: Max speed is 100Mbps Cat6: 20% higher cost than Cat 5e. |
|
|
Term
What is an example of a network device that associates a network address with a port?
A. Switch B. Router C. Hub D. DSL modem |
|
Definition
B. Router
A router is a Layer 3 gateway device, meaning that it connects two or more networks and that the router operates at the network layer of the OSI model. |
|
|
Term
"WEP" wireless encryption is the most susceptible to interception and decryption.
Select the correct answer if the QUOTED text does not make the statement correct. Select 'No change is needed'' if the QUOTED text makes the statement correct
A. WPA-AES
B. WPA2
C. WPA-PSK
D. No change is needed
|
|
Definition
D. No change is needed
Several weaknesses have been discovered using WEP encryption that allows an attacker using readily available software to crack the key within minutes. |
|
|
Term
Which wireless communication problem is caused by electromagnetic waves? A. Fading B. Attenuation C. Interference D. Diffraction |
|
Definition
C. Interference
Because the air is shared by all transmitters, transmissions by any device at the same frequency as an access point's radio can cause interference. Because 802.11 wireless networks operate in unlicensed bands used by many technologies, such as microwave ovens, video surveillance cameras, cordless phones, they are subject to interference. |
|
|
Term
An Action Center alert recommends that you enable Windows Firewall.
After enabling the firewall, you can no longer access websites.
Which two TCP ports should you add exceptions for on the firewall? (Choose two.)
A.Port 21 B.Port 23 C.Port 25 D.Port 80 E.Port 443 |
|
Definition
D.Port 80 E.Port 443
Port 80: HTTP Port 443: HTTPS |
|
|
Term
What are two advantages of using star topology rather than ring topology in a computer lab workgroup? (Choose two.)
A. Failure of a central connectivity device does not bring down the entire network. B. A central connection point allows for flexibility and scalability. C. Data travels on redundant paths, so one cable cannot stop its transmission. D. A cable problem within the group affects two nodes, at most. |
|
Definition
B. A central connection point allows for flexibility and scalability. D. A cable problem within the group affects two nodes, at most. |
|
|
Term
What are three characteristics of Ethernet network topology? (Choose three.)
A. It uses tokens to avoid collisions on the network. B. It can use coaxial, twisted pair, and fiber optic media. C. It comprises the largest share of the networks in place today. D. It is a non-switching protocol. E. It can negotiate different transmission speeds |
|
Definition
B. It can use coaxial, twisted pair, and fiber optic media. C. It comprises the largest share of the networks in place today. E. It can negotiate different transmission speeds |
|
|
Term
Your home computer is having problems accessing the Internet.
You suspect that your Internet router's DHCP service is not functioning, so you check your computer's IP address.
Which address indicates that your router's DHCP service is NOT functioning?
A.169.254.1.15 B.172.16.1.15 C.192.168.1.15 D.10.19.1.15 |
|
Definition
A.169.254.1.15
169.254.1.15 is an APIPA address. An APIPA address is used when the DHCP server is not available |
|
|
Term
Which of these is a public address space?
A. 192.168.0.0/16 B. 197.16.0.0/12 C. 10.0.0.0/8 D. 172.16.0.0/12 |
|
Definition
|
|
Term
In a wireless network that requires an SSL certificate, "WEP" handles the SSL certificate.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. 802.1X
B. WPA2-PSK
C. WPA-PSK
D. No change is needed
|
|
Definition
A. 802.1X
802.1x This deployment scenario requires server certificates for each NPS server that performs 802.1X authentication. |
|
|
Term
To set lower security settings in Internet Explorer for an extranet site, add the site's URL to the "Local Intranet" zone.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. Internet
B. Trusted Sites
C. Extranet Sites
D. No change is needed
|
|
Definition
B. Trusted Sites
Trusted sites The level of security set for Trusted sites is applied to sites that you have specifically indicated to be ones that you trust not to damage your computer or information. |
|
|
Term
You are helping a friend set up a public-facing web server for a home office.
Your friend wants to protect the internal network from intrusion.
What should you do?
A. Set the web server in a perimeter network. B. Set the web server to block access on ports 80 and 443. C. Configure the firewall to block access on ports 80 and 443. D. Set the IP address of the web server to be within the LAN |
|
Definition
A. Set the web server in a perimeter network.
In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet |
|
|
Term
Which protocol is responsible for automatically assigning IP addresses?
A. HTTP B. DHCP C. DNS D. WINS |
|
Definition
B. DHCP
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network. |
|
|
Term
What are two characteristics of a mesh network topology? (Choose two.)
A. It is fault tolerant because of redundant connections. B. Every node connects to every other node on the network. C. It works best for networks with a large number of nodes. D. It requires less cabling than either a star or ring topology. |
|
Definition
A. It is fault tolerant because of redundant connections. B. Every node connects to every other node on the network. |
|
|
Term
According to the OSI model, encryption takes place on the "transport layer".
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. Presentation
B. Network
C. Application
D. No change is needed
|
|
Definition
A. Presentation
SSL or TLS encryption takes place at the presentation layer, Layer 6 of the OSI model. |
|
|
Term
IPsec policies for two machines on a LAN can be modified by using the "IPSec policy snap-in" on Windows 7.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. Windows Firewall with Advanced Security snap-in
B. LAN adapter properties
C. Remote Access snap-in
D. No change is needed
|
|
Definition
A. Windows Firewall with Advanced Security snap-in
Windows Firewall with Advanced Security is an advanced interface for IT professionals to use to configure both Windows Firewall and Internet Protocol security (IPsec) settings for the computers on their networks.
Applies To: Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows Vista |
|
|
Term
An Address Resolution Protocol (ARP) table is used to associate IP addresses with "host names".
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. MAC addresses
B. HomeGroup membership
C. Preferred routers
D. No change is needed
|
|
Definition
A. MAC addresses
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address (MAC address) that is recognized in the local network. |
|
|
Term
"Dynamic routing" is fault tolerant.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. Static routing
B. Default route
C. Least cost routing
D. No change is needed
|
|
Definition
D. No change is needed
Dynamic routing protocols can be fault tolerant. |
|
|
Term
Which metric does Routing Information Protocol (RIP) use to determine the least costly route?
A. Delay B. Host ID C. Hop count D. Interface |
|
Definition
C. Hop count
RIP uses a single routing metric (hop count) to measure the distance between the source and a destination network. |
|
|
Term
What is the maximum cable length for a single Cat5 UTP cable run?
A. 285 feet/86.87 meters B. 328 feet/99.97 meters C. 432 feet/131.67 meters D. 600 feet/182.88 meter |
|
Definition
B. 328 feet/99.97 meters
Cat5/5e/6 Ethernet Copper Cabling has a Maximum Segment Length of 100 Meters. |
|
|
Term
What are two differences between switches and hubs? (Choose two.)
A. Switches are slower than hubs because of the extra addressing functions that switches perform. B. Switches send data to all of the computers that are connected to them for efficiency. C. Switches are capable of sending and receiving data at the same time. D. Switches identify the intended destination of the data that they receive |
|
Definition
A. Switches are slower than hubs because of the extra addressing functions that switches perform. D. Switches identify the intended destination of the data that they receive |
|
|
Term
Which of these cable types transmits data the greatest distance?
A. Multi-mode fiber B. Single-mode fiber C. Cat5e D. Cat6 |
|
Definition
B. Single-mode fiber
When working with distances up to 2 km, use multimode optical-fiber cable.
Cat5e and Cat6 max cable length is 100 metres. |
|
|
Term
What is a similarity between Layer 2 and Layer 3 switches?
A. Both provide a high level of security to the network. B. Both use logical addressing to forward transmissions. C. Both forward packets onto the network. D. Both allow the implementation of VLANs. |
|
Definition
D. Both allow the implementation of VLANs. |
|
|