Shared Flashcard Set

Details

CompTIA Network + 4
Exam Study guide
50
Computer Networking
Professional
10/02/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
Which of the following WAN technologies commonly use Unsheilded twisted pair(UTP)? (choose)
B)ISDN
C)DSL modem
D)Post dial-up connection
Definition
B)ISDN
C)DSL modem
D)Post dial-up connection
Term
How many channels on E1 circuit are available for voice, video, or data
A)23
B)24
C)30
D)32
Definition
C)30
Term
Which PPP authentication method provides one-way authentication & sends credentials in clear text data?
A)WEP
B)MS-CHAP
C)PAP
D)CHAP
Definition
C)PAP
Term
What DSL variant has a distance limation of 18,000 ft. between DSL modem & its DSLAM?
A)HDSL
B)ADSL
C)SDSL
D)VDSL
Definition
B)ADSL
Term
What kind of network is used by many cable companies to service thier cable modems,& contains both fiber-optic and coaxial cable?
A)Head-end
B)DOCSIS
C)Composite
D)HFC
Definition
D)HFC
Term
What locally significant identifier is used by a frame Realy network to reference a virtual circuit?
A)VPL/VLC
B)DLCI
C)TEI
D)MAC
Definition
B)DLCI
Term
How big is the payload portion of an ATM cell?
A)5 bytes
B)48 bytes
C)53 bytes
D)64 bytes
Definition
B)48 bytes
Term
What type of antenna, radiates relatively equal power in all directions?
A)Unidirectional
B) Yagi
C)Parabolic
D)Omndirectional
Definition
D)Omnidirectonal
Term
When using the 2-4 GHz band for multiple access points in a WLAN located in the United states, which nooverlapping channels should you select? (Choose3)
A)0
B)1
C)5
D)6
E)10
F)11
G)14
Definition
B)1
D)6
F)11
Term
What technology do WLAN's use to determine when they gain access to the wireless media?
A)SPF
B)CSMA/CA
C)RSTP
D)DUAL
Definition
B)CSMA/CA
Term
What IEEE 802.11 variant supports a maximum speed of 54 Mbps&uses 2.4 Ghz band?
A)802.11a
B)802.11b
C)802.11g
D)802.11n
Definition
C)802.11g
Term
Which of the following is used by IEEE 802.11n to achieve high through-put through the used of multiple antennas for transmissions & reception?
A)MIMO
B)DSSS
C)FHSS
D)LACP
Definition
A)MIMO
Term
A WLAN formed directly between wireless clients(without the use of a wireless AP) is referred to as what type of WLAN?
A)Enterprise mode
B)IBSS
C)Personal Mode
D)BSS
Definition
B)IBSS
Term
When extending the range for a 2.4Ghz WLAN, you can use nonoverlapping in coverage between those cells (using nonoverlapping channels) to prevent a connection from as user roams from one coverage cell to another. what percentage of coverage overlap is recommended for these adjacent cell?
A)5-10 percent
B)10-15 percent
C)15-20 percent
D)20-25 percent
Definition
B) 10-15 percent
Term
If a WLAN does not require a user to provide any credentials to associate with a wireless AP & access the WLAN, what type of authentications is said to be in use?
A)WEP
B)SSID
C)Open
D)IV
Definition
C)Open
Term
WEP's RC4 approach to encryption uses a 24-bit string of characters added to transmitted data frame will never appear as the same WEP-encrypted data frame. What is this string of characters called?
A)initialization vector
B)Chips
C)Orthogonal descriptor
D)Session key
Definition
A)initialization vector
Term
What standard developed by the Wi-Fi Alliance implements the requirement of IEEE 802.11i?
A)TKIP
B)MIC
C)WEP
D)WPA2
Definition
D)WPA2
Term
What is the MPLS header?
A)4 bits
B)8 bits
C)16 bits
D)32 bits
Definition
D)32 bits
Term
Which of the following is a social engineering attack?
A)Man in the middle
B)Worms
C)Evil Twin
D)Phishing
Definition
D)Phishing
Term
What is the MPLS header?
A)4 bits
B)8 bits
C)16 bits
D)32 bits
Definition
D)32 bits
Term
Which of following is a social engineering attack?
A)Man in the middle
B)Worms
C)Evil Twin
D)Phishing
Definition
D)Phishing
Term
00:12:34:56:78 can be used in which of the following?
A)Channel selection
B)WPA-PSK password
C)WEP key
D)MAC filtering
Definition
B)WPA-PSK password
Term
Which of he following devices will monitor for propagating worms? A)IDS B)Firewall C)Proxy server D)Mail server
Definition
A) IDS
Term
T568Bwiring scheme is typically found on which of the following components?
A)66block
B)Demarc extension
C)Patch Panel
D)Vertical Cross Connect
Definition
C)Patch Panel
Term
Something you have, something you are and something you know are the three tenets of:
A)access control
B)remote access
C)change management
D)social engineering
Definition
A)access control
Term
Afteru moving office furniture around a user can no longer connect to the network. Which of the following is Most likely the reason for the problem
A)Split cables
B)Crosstalk
C)TX/RX reversed
D)DB loss
Definition
A)Split cables
Term
A company wishes to have a wireless signal broadcast only through a special tunnel. Which of the following measures will accomplish this?
A)MAC filtering
B)WPA encryption
C)Changing antenna type
D)Decreasing radio strength
Definition
C)Changing antenna type
Term
In IPSCec, which of the following is an agreement on how devices will securely
transmit information?
A)ESP
B)SA
C)AH
D)ISAKMP
Definition
B)SA
Term
Which of the following could be used to estimate RTT across a router?
A)traceroute
B)dig
C)arp
D)uptime
Definition
A) traceroute
Term
Which of the following represents the physical address of a network access card
A)00-30-48-83-98-C8
B)FF01:D2:C4:87::11
C)09-9D-35-22-L2-34-FF-21
D)2D1A:C3:0:1:C3B2:2AD:FF:FEBE:9D3A
Definition
A) 00-30-48-83-98-C8
Term
Which of the following records would be used for a Reverse DNS lookup?
A)MX
B)PTR
C)A
D)AAAA
Definition
B)PTR
Term
Which of the following technologies allows for redundant links within a layer 2 segments?
A)OSPF
B)RIP
C)Port Mirroring
D)Spanning Tree
Definition
D)Spanning Tree
Term
Which of the following defines access for a network?
A)ACL
B)RDP
C)RAS
D)ARP
Definition
A)ACL
Term
A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?
A)Wire tap
B)Network sniffer
C)Load balancing appliance
D)NIPS
Definition
B)Network sniffer
Term
Which of the following is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?
A)Routing loop
B)MTU black hole
C)Framing error
D)SYN flood
Definition
B)MTU black hole
Term
Kim, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used? (Choose 2)
A) traceroute
B) ping
C) ipconfig
D) netstat
E) Bandwidth shaper
F) Load Balancer
G) DNS server
H) IPS
Definition
D)netstat
H)IPS
Term
A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the following can be used to connect the device to the network?
A) Fiber multiplexer
B) Repeater
C) Attenuator
D) OTDR
Definition
B)Repeater
Term
A technician is troubleshooting a replacement switch that is connected directly to another switch via fiber. The switch will not recognize the fiber connection. Which of the following is MOST likely the problem?
A) DB loss
B) EMI
C) TXRX reversed
D) Open shorts
Definition
C)TXRX reversed
Term
Which of the following is an example of two factor authentication?
A) Password device certificate and PIN
B) SSL web server certificate and password
C) User password and administrator
Password
D) Password and hardware token OTP
Definition
D) Password and hardware token OTP
Term
Which of the following is used to restrict access according to user policies?
A) Content filter
B) DHCP server
C) DNS server
D) VPN concentrator
Definition
A) Content filter
Term
Which of the following describes a rationale for a network with redundant paths?
A) VPN compatibility
B) Unified communications implementation
C) High availability requirement
D) QoS
Definition
C) High availability requirement
Term
Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue?
A) Increased uptime
B) Caching engines
C) Traffic shaping
D) Load balancing
Definition
C) Traffic shaping
Term
Zach, a technician, wants to test a laptop’s NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC?
A) Loopback plug
B) Protocol analyzer
C) Smart jack
D) Coupler
Definition
A) Loopback plug
Term
A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of192.168.1.65/27. Which configuration change will allow the PING to be successful?
A) Replace the router with a layer 2 switch that supports VLANs
B) Change VLAN 20 computers Default Gateway to 192.168.1.127/27
C) Change VLAN 10 computers Default Gateway to 192.168.1.32/27
D) Allow ICMP to pass through the router
Definition
D) Allow ICMP to pass through the router
Term
Kim, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (select two)
A) Packet sniffer
B) Honeypot
C) Port mirroring
D) IPS
E) Port scanner
F) IDS
Definition
A) Packet sniffer
C) Port mirroring
Term
For which of the following reasons could a single server’s NIC transmit packets from multiple MAC address sources?
A) The server contains several virtual machines & the MAC addresses are from the virtual machines.
B) The server is hosting a web server & the MAC addresses are from connected browsers
C) The server is hosting a proxy server & the MAC addresses are from the connected clients
D) The server NIC is starting to fail & should be replaced.
Definition
A) The server contains several virtual machines & the MAC addresses are from the virtual machines.
Term
Which of the following does SNMPv3 BEST provide over previous versions?
A) Simplified management
B) Increased security
C) More data types
D) Higher productivity
Definition
B) Increased security
Term
In which of the following would Lisa, a technician, find the LARGEST number of 110 block patch panels?
A) MDF
B) Caching engines
C) Demarc
D) IDF
Definition
A) MDF
Term
A technician has received word that the telephone company has added another POTS line to the building. Where will the technician MOST likely find the new line?
A) CSU
B) Demarc
C) Registered jack
D) DSU
Definition
B) Demarc
Term
A company’s database software runs the cloud. The device hosting the software is an example of which of the following?
A) Virtual server
B) Virtual switch
C) Virtual desktop
D) Virtual PBX
Definition
A) Virtual server
Supporting users have an ad free experience!