Term
What is the purpose of NAT? |
|
Definition
Allow multiple computers with private addresses to access the internet using a single public address. |
|
|
Term
A router does not have an entry in its routing table associated with the destination address that is encoded in a pocket. Where will the router send the packet? |
|
Definition
To its default next router. |
|
|
Term
Which WLAN security standard supports AES encryption? |
|
Definition
|
|
Term
Which media type is least susceptible to electromagnetic interference (EMI)? |
|
Definition
|
|
Term
What is the maximum segment length when wiring a 100BaseT network with Cat 5 cable? |
|
Definition
|
|
Term
The maximum length of a 100Base-TX segment is? |
|
Definition
|
|
Term
Your Windows computer is configured to automatically receive an IP address and it also has Automatic IP Addressing (APIPA) enable.
You use the ipconfig command to view the TCP/IP settings on your computer and discover that it has an IP address of 0.0.0.0.
What is the most likely wrong? |
|
Definition
Windows cannot detect a connection to the network media. |
|
|
Term
Which of the following is an APIPA address? |
|
Definition
|
|
Term
Which Domain Name System (DNS) resource record type identifies the primary DNS for a DNS zone? |
|
Definition
|
|
Term
What does a layer 2 switch use to direct packets? |
|
Definition
|
|
Term
Which protocol operates at the TCP/IP reference model Transport Layer to provide reliable, connection-oriented communication? |
|
Definition
|
|
Term
A set of interconnected local area networks (LANs) is known as a? |
|
Definition
|
|
Term
Computers connected to an Ethernet hub is an example of which kind of topology? |
|
Definition
|
|
Term
A three-homed perimeter network configuration requires? |
|
Definition
|
|
Term
How does a standard hub differ from a standard switch? |
|
Definition
A hub sends packets to alll connected computers; a switch directs packets to specific computers. |
|
|
Term
Which two cable specifications are for coaxial cable? |
|
Definition
|
|
Term
Which two protocols are TCP/IP reference model Application Layer protocols? |
|
Definition
|
|
Term
|
Definition
|
|
Term
You need to add a device to the network that will allow you to create virtual local area networks (VLANs). You must be able to manage the device remotely.
Which device should you use? |
|
Definition
|
|
Term
Wich type of firewall filtering would you configure to filter traffic based on packet content? |
|
Definition
|
|
Term
Which is the first step for a host to resolve a fully qualified domain name (FQDN) on a network that includes an authoritative Domain Name System (DNS) server? |
|
Definition
Check the FQDN against the local host name |
|
|
Term
What type of connector is used to connect a network interface card (NIC) to the network using UTP cable? |
|
Definition
|
|
Term
Which two utilies can you use to identify a router that is experiencing problems? |
|
Definition
|
|
Term
Which WAN carrier uses 23 B channels and one D channel? |
|
Definition
|
|
Term
What is the role of routing protocols? |
|
Definition
To dynamically update route information |
|
|
Term
What is the difference between STP and UTP cable? |
|
Definition
STP has outer shielding. UTP does not |
|
|
Term
Packet sequence is managed at which layer of the OSI networking model? |
|
Definition
|
|
Term
Which command would you use to view detailed TCP/IP configuration information on a computer? |
|
Definition
|
|
Term
Which two WLAN standards operate at the 2.4 GHz frequency? |
|
Definition
|
|
Term
Which of the following is a dial-up WAN connection type? |
|
Definition
|
|
Term
Which type of Digital Subscriber Line (DSL) provides 1.544 duplex transmisstion on asingle twisted pair line? |
|
Definition
|
|
Term
Which media access protocol is used by 802.11 wireless communications? |
|
Definition
|
|
Term
Which method of configuring a VLAN offers the best scalability? |
|
Definition
|
|
Term
Which kind of device is used to connect a wireless LAN segment to a wired LAN segment? |
|
Definition
Wireless Access Point (WAP) |
|
|
Term
Which routing topology would most likely continue carrying traffic to all locations even if one communication path fails? |
|
Definition
|
|
Term
The term "intranet" refers to: |
|
Definition
Your private, internal network |
|
|
Term
A set of interconnected local area networks (LANs) known as: |
|
Definition
|
|
Term
Which technology is used to allow a client computer to securely connect to a remote private network across the Internet? |
|
Definition
|
|
Term
Computers connected to an Ethernet hub is an example of which kind of topology? |
|
Definition
|
|
Term
Which type of network is only used to connect computers within a single company? |
|
Definition
|
|
Term
You want to set up a subnet from the rest of your local area network (LAN). You want to filter all traffic based on the parameters you define.
Which type of device should you use? |
|
Definition
|
|
Term
In which of the following situations would you want to configure a virtual private network (VPN)? |
|
Definition
Home-based telecommuters need intermittent connections over the Internet to the Internal network. |
|
|
Term
What is the typical communication rate dial-up connections over a standard dial-up analog line in the United States? |
|
Definition
56 kilobits per second (kbps) |
|
|
Term
You want to configure computers in different locations on your network as if they were all part of the same subnet. You need to set up a: |
|
Definition
virtual local area network (VLAN) |
|
|
Term
Which access method is defined in the 802.5 specification? |
|
Definition
|
|
Term
Which DNS record is used to resolve a fully-qualified domain name (9FQDN) to an IPv6 address? |
|
Definition
|
|
Term
What is the role of routing protocols? |
|
Definition
To dynamically update route information |
|
|
Term
What is the difference between STP and UTP cable? |
|
Definition
STP has outer shielding. UTP does not. |
|
|
Term
A three-home perimeter network configuration requires: |
|
Definition
|
|
Term
Your network is configured to allow select businesses access to resources on your internal network through virtual private network (VPN) connections. This is an examople of an: |
|
Definition
|
|
Term
Which of the following is the default class C subnet mask? |
|
Definition
|
|
Term
How does a hub differ from a standard switch? |
|
Definition
A hub sends packets to all connected computers; a switch directs packets to specific computers. |
|
|
Term
What is the typical communication rate for a dial-up connection over a standard dial-up analog line in the United States? |
|
Definition
54 kilobits per second (Kbps) |
|
|
Term
Packet sequence is managed at which layer of the OSI networking model? |
|
Definition
|
|
Term
Which technology is used to allow a client computer to securely connect to a remote private network accross the internet? |
|
Definition
|
|
Term
OSPF (Open Shortest Path First) |
|
Definition
Sends a multicast packet as soon as a change in the network configuration is detected. |
|
|
Term
A Network Address Translation (NAT) server: |
|
Definition
Enables local computers with private addresses to connect to the internet. |
|
|
Term
A layer 2 switch determines which port to send a packet through by examining the: |
|
Definition
MAC address of the destination |
|
|
Term
After starting up your computer, it is unable to communicate with any other computers on the network. The computer has an IP of 169.254.19.21 |
|
Definition
Your computer cannot locate a Dynamic Host Configuration Protocol (DHCP) server. |
|
|
Term
Which type of Digital Subscriber Line (DSL) provides 1.544 duplex transmission on a single twisted pair line? |
|
Definition
|
|
Term
Which command would you use to view detailed TCP/IP configuration on a computer? |
|
Definition
|
|
Term
Which method does a DHCP client use to locate a DHCP server? |
|
Definition
|
|
Term
You want to set up subnet that is isolated from the rest of your locakl area network (LAN). You want to filter all traffic base on the parameters you define.
Which type of devicd should you use? |
|
Definition
|
|
Term
Which two WLAN standards opererate at the 2.4Ghz frequency? |
|
Definition
|
|
Term
Which type of network is only used to connnect computers within a single company? |
|
Definition
|
|
Term
Which of the following is a dial-up WAN connection type? |
|
Definition
|
|
Term
What kind of Domain Name System (DNS) resource is used to contain the IPv6 address of IPv6 nodes? |
|
Definition
|
|
Term
Which physical topology is often implemented using a logical ring topology? |
|
Definition
|
|
Term
You want to configure computers in different locations on your network as if they were all part of the same subnet. You need to set up a: |
|
Definition
Virtual Local Area Network (VLAN) |
|
|
Term
What is the purpose of CIDR? |
|
Definition
To allow computers at different geographical locations to be assigned to the same subnet. |
|
|
Term
What is the highest bit rate supported by 802.11g? |
|
Definition
54 megabits per second (Mbps) |
|
|
Term
Which devices use IP addresses to control network traffic? |
|
Definition
|
|
Term
Windows Internet Services (WINS) is used to map: |
|
Definition
NetBIOS names to IP addresses |
|
|
Term
Which device operates at layer 3 of the OSI model? |
|
Definition
|
|
Term
You want to allow external users access to a specific Web server, but block access to resources on your intranet. You need to configure a(n): |
|
Definition
|
|
Term
You are using unshielded twisted pair (UTP) to wire a 100BaseT Ethernet network. Which cable type should you use? |
|
Definition
|
|
Term
The default subnet mask for an IPv4 address is: |
|
Definition
|
|
Term
Why should you avoid fluorescent lights when running unshielded twisted pair (UTP) cable? |
|
Definition
Possible signal degradation |
|
|
Term
Which two of the following are valid private IP addresses? |
|
Definition
|
|
Term
Which can be used to create a virtual local area network (VLAN)? |
|
Definition
One or more managed switches |
|
|
Term
You have a routed network with a single DHCP Relay agents on the network. All clients are configured for a dynamic addressing. What do you need to enable on the router? |
|
Definition
|
|
Term
How many bits are in an IPv6 address? |
|
Definition
|
|
Term
What is the IPv6 local loopback address? |
|
Definition
|
|
Term
The nslookup command is used to troubleshoot a: |
|
Definition
|
|
Term
The primary advantage to using a Layer 2 switch instead of a hub is to: |
|
Definition
|
|
Term
Which IPv6 address is a link-local unicast address? |
|
Definition
FE80:1234:03D4:4F83:SABC:1283:0321:ABCD |
|
|
Term
|
Definition
Allocates more bandwidth for a download traffic than for upload traffic. |
|
|
Term
Which is used to resolve a fully-qualified domain name (FQDN) to an IP address? |
|
Definition
|
|
Term
For what purpose is ad hoc networking mode used in wireless networking? |
|
Definition
To enable wireless computers to form a network when no wireless access point (WAP) is present. |
|
|
Term
The term Intranet refers to: |
|
Definition
Your private, internal network. |
|
|
Term
For what purpose is ad hoc networking mode use in wireless networking? |
|
Definition
To enable wireless computers to form a network when no wireless access point (WAP) is present. |
|
|
Term
The term "intranet" refers to: |
|
Definition
your private, internal network. |
|
|
Term
Which of the following is a valid private address that supports communication throughout its subnetted network? |
|
Definition
|
|
Term
What is the role of a RADIUS server in a wireless network that is secured using Wi-Fi Protected Access (WPA)? |
|
Definition
|
|
Term
The Internet security zone includes: |
|
Definition
all external Web sites that are not listed in the Restricted or Trusted or Trusted Sites zone. |
|
|
Term
You have managed switch with servers connected to ports 1,2,3 and 4. An attacker gains access to the server on port 2 and installs software to monitor and record communications on the network. Which statement describes the impact to network security? |
|
Definition
The attacker can access traffic to and from the server on port 2 only. |
|
|
Term
What type of server would you place in a perimeter network? |
|
Definition
A Web server that must be accessed by external users. |
|
|
Term
Which protocol is a distance-vector routing protocol? |
|
Definition
|
|
Term
Modern Ethernet networks are most commonly wired using which topology? |
|
Definition
|
|
Term
A firewall separates a management workstation from a router. You need to manage the router using telnet without specifying a port. Which traffic must the firewall allow? |
|
Definition
|
|
Term
You need to see if your computer has connectivity with a server on the same subnetwork. What coomand should you use? |
|
Definition
|
|
Term
Which type of network uses CSMA/CD as the access method? |
|
Definition
|
|
Term
When would you need to deploy Windows Routing and Remote Access (RRAS) services? |
|
Definition
To configure virtual private network (VPN) site-to-site connections. |
|
|
Term
Using a switch on an Ethernet network helps to reduce: |
|
Definition
|
|
Term
Which of the following is provided by IPSec? |
|
Definition
|
|
Term
Which layer of the OSI model is responsible for the address informationneeded to route data between different networks? |
|
Definition
|
|
Term
What is the primary reason to implement a VLAN? |
|
Definition
To manage bandwidth allocation based on the type of user. |
|
|
Term
An infrastructure model WLAN: |
|
Definition
Can be used to connect wireless clients to wired network. |
|
|
Term
The address FE80::5EFE:131.107.4.92 is an example of what kind of IPv6 address? |
|
Definition
A link-local ISATAP address |
|
|
Term
Which media access protocol is used by 802.11 wireless communications? |
|
Definition
|
|
Term
Which network service provides authentication and authorization for VPN clients and dial-up clients? |
|
Definition
|
|
Term
Which kind of device is used to connect a wireless LAN segment to a wired LAN segment? |
|
Definition
Wireless Access Point (WAP) |
|
|
Term
Which routing topology would most likely continue carrying traffic to all locations even if one communication path fails. |
|
Definition
|
|
Term
Router A has a static routing table and is not configured with a default route. What happens when Router A receives a packet that does not match any routes? |
|
Definition
|
|