Term
which two utilities can you use to identify a router that is
expeirencing problems ? |
|
Definition
|
|
Term
In Wich of the following situations would you want to configure a VPN ? |
|
Definition
Home-based telecommuters need intermittent
connections over the internet to the internal network |
|
|
Term
Which two cable specifications
are for coaxial cable ? |
|
Definition
|
|
Term
The internet scurity
zone includes ? |
|
Definition
All external web sites that are not listed
in the restricted or trusted site zones. |
|
|
Term
A firewall seperates a management workstation from a router.
You need to manage the router using telnet without specifying a port.
wich traffic must the firewall allow ? |
|
Definition
|
|
Term
Which method does a DHCP client use to
locate a DHCP server ? |
|
Definition
|
|
Term
What is the role of
routing protocals ? |
|
Definition
To dynamically update
route information |
|
|
Term
You want to allow external users access
to a specific web server, but block access
to recources on your intranet. you need to
configure a(n) ?
|
|
Definition
|
|
Term
Which type of network isonly
used to connect computers
within a single company ? |
|
Definition
|
|
Term
Which two of the following are
valid private IP addresses ? |
|
Definition
|
|
Term
You need to see if your
computer with a server
on the same subnetwork. |
|
Definition
|
|
Term
The term "intranet" refers to ? |
|
Definition
Your private,
internal network. |
|
|
Term
Why should you avoid flouresent lights
when running unshielded twisted pair
(UTP) cable ? |
|
Definition
Possible signal degradation |
|
|
Term
You have a managed switch with servers connected to
ports 1,2,3, and 4. An attacker gains
access to the server on port 2 and installs software to monitorand record communications on the network. |
|
Definition
An attacker can access trafficto
and from the server on port 2 only. |
|
|
Term
A set of interconnected local area networks
(LANs) is known as ? |
|
Definition
|
|
Term
You need to add a device to the network which will allow you to create virtual area network (VLANs).
You must be able to manage the device remotely. |
|
Definition
|
|
Term
Your windows computer is configured to automatically recieve Private IP Addressing (APIPA) enabled.
You use the ipconfig command to view the TCP/IP settings on your computer and discover that it has an IP address of 0.0.0.0.
What is most likely wrong ? |
|
Definition
Windows cannot detect a connection
to the network media |
|
|
Term
which DNS record is used to allow a server to resolve
an IP address to a fully-qualified domain name (FQDN)? |
|
Definition
|
|
Term
Which WLAN security standard
supports AES encryption |
|
Definition
|
|
Term
The TCP/IP arp command can be used to: |
|
Definition
resolve IP addresses to media access
control (MAC) addresses |
|
|
Term
You are configuring virtual private network (VPN) access for home based users.
Communication security can be provided through which of the following ? |
|
Definition
|
|
Term
Which of the following is a dial-up
WAN connection type ? |
|
Definition
|
|
Term
A layer 2 switch determines which port
to send a packet through by examining the ? |
|
Definition
MAC address of the destination. |
|
|
Term
Which kind of device is used to connect
a wireless LAN segment to a wired LAN segment ? |
|
Definition
Wireless access point (WAP) |
|
|
Term
Which of the following is implemented at
the Application layer of the TCP model ? |
|
Definition
|
|
Term
Which of the following is implemental at
the application layer of the TCP model ? |
|
Definition
|
|
Term
Which can be used to create a virtual
local area network (VLAN) ? |
|
Definition
One or more managed switches |
|
|
Term
What is the highest bit rate
supported by 802.11g ? |
|
Definition
54 megabits per second (Mbps) |
|
|
Term
Which media type is least susceptible
to electromagnetic interference (EMI) ? |
|
Definition
|
|
Term
You are using unshielded twisted pair
(UTP) to wire a 100 BaseT ethernet network.
Which cable type should you use ? |
|
Definition
|
|
Term
What is the IPv6 local lookback address ? |
|
Definition
|
|
Term
What is the IPv6 address prefix
for a link-local unicast address ? |
|
Definition
|
|
Term
Which physical topology is often implemented
using a logical ring topology ? |
|
Definition
|
|
Term
Which command would you use to view detailed
TCP/IP configuration information on a computer ? |
|
Definition
|
|
Term
Which of the following is provided by IPSec ? |
|
Definition
Encryption an authentication |
|
|
Term
After starting up your computer, it is unable to communicatewith any other computers on th network.
the computer has an IP address of 169.254.19.21.
what is most likely wrong ? |
|
Definition
Your computer cannot locate a dynamic host protocal (DHCP) server. |
|
|
Term
The nslookup command is used to troubleshoot a: |
|
Definition
|
|
Term
Windows internet name service
(WINS) is used to map : |
|
Definition
NetBIOS names to IP addresses. |
|
|
Term
Which media access protocal is used by 802.11 wireless communications ? |
|
Definition
|
|
Term
Which is used to ressolve a fully-qualified
domain name (FQDN) to anIp addresses ? |
|
Definition
|
|
Term
The addresses FE80::5EFE:131.107.4.92 is an example ofwhat kind of IPv6 address ? |
|
Definition
A link-local ISATAP address |
|
|
Term
Which type of network uses CSMA/CD as the access method? |
|
Definition
|
|
Term
A set of interconnected locsl ares networks is known as a |
|
Definition
|
|
Term
|
Definition
alllow multiple comouter with private adr3essess to access public adress |
|
|
Term
an IPv6 is sihgn to mulitple nodes, when a message is sent to the adress. it is sent to only one node |
|
Definition
|
|
Term
the speed in which packet are transfered between the modules in a modulers switch is know as |
|
Definition
|
|
Term
windows internet name service is used to map |
|
Definition
NEtbiosnames to IP adressess |
|
|
Term
whic of the following is a IPv4 mulitcast |
|
Definition
|
|
Term
an infrstructure modeWLAN : |
|
Definition
can be used to connect wireless clients to a wired network |
|
|
Term
|
Definition
sends a multicast packet as soon as a change in the network configuration is detected. |
|
|