Term
Which of the following does not accurately describe TACACS+ in comparison to RADIUS?
a. TACACS+ relies on TCP, not UDP, and the transport layer
b. TACACS+ is typically installed on a router or switch, rather than on a server.
c. TACACS+ encrypts all information transmitted for AAA rather than just the password.
d. TACACS+ was developed for proprietary use on Cisco Products
e. TACACS+ operates as a software application on a remote access server. |
|
Definition
e. TACACS+ operates as a software application on a remote access server. |
|
|
Term
Your network manager has purchased a dozen new access points and all are configured to use the new 802.11ac standard in the 5-GHz band. These access points will be backward compatible with older access points that run which of the following standards? (choose all that apply.)
a. 802.11g
b. 802.11n
c. 802.11b
d. Bluetooth
e. None of the above |
|
Definition
|
|
Term
You have installed and configured two virtual web servers and a virtual mail server on a physical server. what networking mode will you assign to each server's vNIC to ensure that the virtual machines' hosts on the Internet can access the virtual machines?
a. NAT
b. Bridged
c. Host-only
d. Internal
e. Grouped |
|
Definition
|
|
Term
Your organization contracts with a cloud computing company to store all of its data. The company promises 99.99% uptime. If ti lives up to its claims, for how many minutes each year can you expect your data to be unavailable?
a. Less than 448 minutes
b. Less than 98 minutes
c. Less than 52 minutes
d. Less than 14 minutes
e. Less than 6 minutes. |
|
Definition
|
|
Term
You are rearranging nodes on your Gigabit ethernet network. Due to a nessecarily hasty expansion, you have decided to supply power to a wireless router in a makeshift data room using PoE. What is the minimum cabling standard you must use to connect this wireless router to the network's backbone?
a. RG-6
b. RG-59
c. Cat 5e
d. SMF
e. Cat 6
|
|
Definition
|
|
Term
To ensure that your private network is always protected, you decide to install three redudant firewalls. Which of the following would allow you to assign the same IP address to all three?
a. SMTP
b. CARP
c. SNPMv3
d. IMAP
e. NTP |
|
Definition
|
|
Term
You are a networking technician in a radiology clinic, where physicians use the network to transmit and store patients' diagnostic results. Shortly after a new wing, which contains X-ray and MRI (magnetic resonance imaging) machines, is added to the building, computers in that area begin having intermittent problems saving data to the file server. After you have gathered information, identified the symptoms, questioned the users, and determined what has changed, what is your next step in troubleshooting this problem?
a. establish a plan of action to resolve the problem
b. escalate the problem
c. document findings, actions, and outcomes
d. establish a theory of probable cause
e. determine the next steps to resolve the problem |
|
Definition
d. establish a theory of probable cause |
|
|
Term
You are part of a team participating in a posture assessment of your company's WAN. Which of the following tools or strategies will help you gain a broad understanding of your network's vulnerabilities?
a. MIB
b. War chalking
c. Nmap
d. WPA cracking
e. PGP
|
|
Definition
|
|
Term
You work for an ISP. Several of your customers have called to complain about the slow response from a popular web site. You suspect that network congestion is at fault. Which TCP/IP utility would help you determine where the congestion is occurring?
a. FTP
b. Nslookup
c. Nbtstat
d. Tracert
e. Telnet |
|
Definition
|
|
Term
Which of the following WAN topologies is the most fault tolerant?
a. Full mesh
b. Bus
c. Peer-to-peer
d. Ring
e. Hierarchal |
|
Definition
|
|
Term
Which of the following is a valid MAC address?
a. C3:00:50:00:FF:FF
b. 153.101.24.3
c. ::9F53
d. FE80::32:1CA3:B0E2
E. D0:00:00:00
|
|
Definition
|
|
Term
Your organization has just ordered its first T-1 connection to the internet. Prior to that, your organization rlied on a dsl connection. Which of the following devicces must you now have that your DSL connection didn't require?
a. Modem
b. CSU/DSU
c. switch
d. hub
e. router |
|
Definition
|
|
Term
Which of the following wireless standards provides an entirely IP-based, packet-switched network for both voicce and data transmissions (Choose two)?
a. LTE
b. 802.16e
c. 802.16m
d. HSPA+
e. 802.11n |
|
Definition
|
|
Term
You have created a new Web server on a computer running the linux operating system. Which of the following programs will generate messages when modules don't load correctly or services encounter errors?
a. Event Viewer
b. IDS/IPS
c. Packet Sniffer
d. Network Monitor
e. Syslog |
|
Definition
|
|
Term
You have been asked to provide a connectivity solution for a shuttle-bus system at a large theme park. The owners of the park want a wireless network that reaches all parking lots and drop-off points throughout the park's 2.4-square-mile campus. Each shuttle is to be equipped with a wireless antenna to provide real-time pick-up and drop-off directives to each driver. The park owners plan to install their own base station antennas in order to have complete control of the amount and type of traffic traversing the WAN, but they are very concerned about the cost of equipment installation. Considering the needs and priorities of the theme park owners, what is the best solution for this client?
a. Metro ethernet
b. 802.11n
c. NFC
d. 802.11ac
e. WiMAX |
|
Definition
|
|
Term
You want to add the five virtual machines that exist on your host machine to the staff VLAN at your office. Which of the following must your host machine's NIC support?
a. CSMA/CA
b. Channel bonding
c. MIMO
d. trunking
e. OSPF |
|
Definition
|
|
Term
You have just rearranged the access points on your small office network. Now a group of employees complains that they cannot reliably get their workstations to connect with a new 802.11ac access point. You have confirmed that the workstations are using the correct SSID, security type, and passphrase. You have also confirmed that the access point is on and functioning properly because when you stand in the computer room where it's located, you can connect to the access point from your smartphone. Which of the following is likely preventing the other users' workstations from associating with the new access point?
a. the users are attempting to log on using the incorrect user IDs.
b. the workstations are located beyond the access point's range.
c. the workstations are set to use 802.11g
d. the users have turned off their wireless antennas.
e. the workstations wired NICs are causing addressing conflicts with their wireless NICs. |
|
Definition
b. the workstations are located beyond the access point's range. |
|
|
Term
Which of the following wireless security techniques uses RADIUS and AES?
a. WEP
b. WPA
c. WPA2
d. WPA-Enterprise
e. WPA2-Enterprise |
|
Definition
|
|
Term
You are the network administrator for a large university whose network contains nearly 10,000 workstations, over 100 routers, 80 switches, and 2000 printers. You are researching a proposal to both upgrade the routers and switches on your network and at the same time improve the management of your network. To make automating network management easier, what type of protocol must the new routers and switches support?
a. TFTP
b. SMTP
c. NNTP
d. ICMP
e. SNMP |
|
Definition
|
|
Term
In the process of troubleshooting an intermittent performance problem with your network's Internet connection, you attempt to run a tracert test to microsoft.com. The tracert response displays the first 12 hops in the route, but then present several "Request Timed out" messages in a row. What is the most likely reason for this?
a. your network's ISP is experiencing connectivity problems
b. the internet backbone is experiencing traffic congestion
c. your client's TCP/IP service limits the tracert command to a maximum of 12 hops.
d. your IP gateway failed while you were attempting the tracert test.
e. microsoft's network is bounded by firewalls that do not accept incoming ICMP traffic. |
|
Definition
e. microsoft's network is bounded by firewalls that do not accept incoming ICMP traffic. |
|
|
Term
What is the network ID for a network that contains the group of IP addresses from 194.73.44.10 through 194.73.44.254 and is not subnetted?
a. 194.1.1.1
b. 194.73.0.0
c. 194.73.44.1
d. 194.73.44.255
e. 194.73.44.0 |
|
Definition
|
|
Term
Which of the following 10-gigabit technologies has the longest maximum segment length?
a. 10GBase-SR
b. 10GBase-ER
c. 10GBase-T
d. 10GBase-LW
e. 10GBase-SW |
|
Definition
|
|
Term
Recently, your company's WAN experienced a disabling DDoS attack. Which of the following devices could detect such an attack and prevent it from affecting your network in the future?
a. A honeypot
b. SIEM
c. HIPS
d. Nmap
e. NIPS |
|
Definition
|
|
Term
In NAT, how does an IP gateway ensure that outgoing traffic can traverse public networks?
a. It modifies each outgoing frame's type field to indicate that the transmission is destined for a public network.
b. It assigns each outgoing packet a masked ID via the options field.
c. It interprets the contents of outgoing packets to ensure that they contain no client-identifying information.
d. It replaces each outgoing packet's source address field with a public IP address.
e. it modifies the frame length to create uniformly sized frames, called cells, which are required for public network transmission. |
|
Definition
d. It replaces each outgoing packet's source address field with a public IP address. |
|
|
Term
You have purchased an access point capable of exchanging data via the 802.11n or 802.11ac wireless standard. According to these standards, what is the maximum distance, in meters, from the access point that wireless stations can travel and still reliably exchange data with the access point?
a. 20
b. 75
c. 100
d. 400
e. 550
|
|
Definition
|
|
Term
Which of the following functions does SIP perform on a VoIP network? (choose all that apply)
a. determines the locations of endpoints
b. provides cell waiting and caller ID services
c. prioritizes calls for any single endpoint in a queue
d. encrypts VoIP signals before they are transmitted over the network. |
|
Definition
|
|
Term
You suspect that a machine on your netowrk with the host name PRTSRV is issuing excessive broadcast traffic on your network. What command can you use to determine this host's IP address?
a. netstat PRTSRV
b. ipconfig PRTSRV
c. nslookup PRTSRV
d. ifconfig PRTSRV
e. nbtstat PRTSRV |
|
Definition
|
|
Term
Which of the following allows a protocol analyzer on your network's backbone switch to monitor all the traffic on a VLAN?
a. trunking
b. port mirroring
c. looping
d. spanning tree protocol
e. caching |
|
Definition
|
|
Term
What element of a network management system operates on a managed device, such as a router?
a. MIB
b. Polling
c. Agent
d. Nmap
e. chaching |
|
Definition
|
|
Term
Your company is experiencing a growth spurt and is ready to invest in a more sophisticated disaster recovery plan. Currently... acquiring additional servers to duplicate critical servers in their current network, and they want the servers to be configured identically to the servers now in use. The new servers will be stored at an off-site data center, and updated every time the on-site servers are updated. What type of disaster recovery site is your company creating?
a. hot site
b. ambient site
c. site survey
d. warm site
e. looking glass site |
|
Definition
|
|
Term
Which of the following is a single sign-on authentication method?
a. IPsec
b. EAPoL
c. SSL
d. Kerberos
e. CHAP |
|
Definition
|
|
Term
You are a network administrator for a WAN that connects two regional insurance company offices - the main office and a satellite office - to each other by a T-3. You install a firewall between main office and the internet. Shortly thereafter, users in your satellite office complain that they cannot access the file server in the main office, but users in the main office can still access the internet. What two things should you check? (choose two)
a. Whether the firewall has been configured to run in promiscuous mode.
b. Whether the firewall is placed in the appropriate location on the network.
c. whether the firewall has been configured to allow access form IP addresses in the satellite office.
d. whether the firewall has been configured to receive and transmit UDP-based packets.
e. whether the firewall has been configured to allow internet access over the main office's T-3.
|
|
Definition
b. Whether the firewall is placed in the appropriate location on the network.
c. whether the firewall has been configured to allow access form IP addresses in the satellite office.
|
|
|
Term
What is one function of a VPN concentrator?
a. to prioritize traffice on a VPN
b. to consolidate multiple VPNs into a single layer VPN
c. to cache a VPN's frequently requested content
d. to establish VPN tunnels
e. to ccollect traffic from multiple VLANs into a VPN.
|
|
Definition
d. to establish VPN tunnels |
|
|
Term
While troubleshooting a workstation connectivity problem, you type the following command: ping 127.0.0.1. The response indicates that the test failed. What can you determine about that workstation?
a. its network cable is faulty or not connected to the wall jack.
b. its TCP/IP stack is not installed properly
c. its IP address has been prevented from transmitting data past the default gateway.
d. its DHCP settings are incorrect
e. its DNS name server specification is incorrect. |
|
Definition
b. its TCP/IP stack is not installed properly |
|
|
Term
You are a support technician working in a data closet in a remote office. You suspect that a connectivity problem is related to a broken RJ-45 lug on a patch cable that connects a switch to a patch panel. You need to replace that connection, but you forgot to bring an extra patch cable. You decide to install a new RJ-45 connector to replace the broken RJ-45 connector. What two tools do you need to successfully accomplish this task?
a. Punch-down tool
b. crimping tool
c. wire stripper
d. cable tester
e. multimeter |
|
Definition
b. crimping tool and c. wire stripper |
|
|
Term
In IPv6, which of the following is the loopback address?
a. 1.0.0.1
b. 127:0:0:0:0:0:0:1
c. FE80::1
d. ::1
e. 127.0.0.1 |
|
Definition
|
|
Term
Which two of the following devices operate only at the Physical layer of the OSI model? (choose two)
a. Hub
b. Switch
c. Router
d. Bridge
e. Repeater |
|
Definition
|
|
Term
Which of the following is a reason for using subnetting?
a. To facilitate easier migration from IPv4 to IPv6
b. to enable a network to use DHCP
c. to limit broadcast domains
d. to reduce the likelihood for user error when modifying TCP/IP properties.
e. to reduce the number of routing table entries. |
|
Definition
c. to limit broadcast domains |
|
|
Term
Which of the following is often used to secure data traveling over VPN's that use L2TP?
a. PPTP
b. PPoE
c. Kerberos
d. SSH
e. IPsec |
|
Definition
|
|
Term
Which two of the following routing protocols offer fast convergence time and can be used on interior or border routers?
a. RIP
b. RIPv2
c. OSPF
d. BGP
e. EIGRP |
|
Definition
|
|
Term
At the beginning of the school year, students at your school must configure their computers and other devices to obtain trusted access to the student portion of the school's network. what is this process called?
a. authenticating
b. remote wiping
c. backleveling
d. onboarding
e. updating |
|
Definition
|
|
Term
Which signaling protocol is modeled after HTTP and is limited to IP networks?
a. H.323
b. RTCP
c. SIP
d. MGCP
e. RTP |
|
Definition
|
|
Term
Due to popular demand from employees who need to roam from one floor of your office building to another, you are expanding your wireless network. You want to ensure that mobile users enjoy uniterrupted network connectivity without having to reconfigure their workstations' wireless network connection settings. Which of the following variables must you configure on your new access points to match the settings on existing access points?
a. administrator password
b. scanning rate
c. SSID
d. IP address
e. signal strength |
|
Definition
|
|
Term
Which transport protocol and TCP/IP port does telnet use?
a. UDP, port 23
b. TCP, port 21
c. UDP, port 22
d. TCP, port 23
e. UDP, port 21 |
|
Definition
|
|
Term
Your 100Base-T network is wired following the TIA/EIA 568B standard. As you make your own patch cable, which wires do you crimp into pins 1 and 2 of the RJ-45 connector?
a. white with green stripe and green
b. white with brown stripe and brown
c. white with blue stripe and blue
d. white with red stripe and red
e. white with orange stripe and orange. |
|
Definition
b. white with brown stripe and brown |
|
|
Term
A regional bank manager asks you to help with an urgent network problem. Because of a sudden and severe network performance decline, the manager worries that the bank's network might be suffering a DoS attack. Viewing which of the following types of network documentation would probably give you the quickest insight into what's causing this problem?
a. wiring schematic
b. firewall log
c. logical network diagram
d. the main file server's system log
e. physical network diagram |
|
Definition
|
|
Term
You have connected ot your bank's home page. Its URL begins with "https://". Based on this information, what type of security can you assume the bank employs for receiving and transmitting data to and from its web server?
a. Kerberos
b. SSL
c. IPsec
d. L2TP
e. Packet-filtering firewall |
|
Definition
|
|
Term
What is the function of protocols and services at the network layer of the OSI model?
a. to manage the flow of communications over a channel
b. to add segmentation and assembly information
c. to encode and encrypt data
d. to add logical addresses and properly route data
e. to apply electrical pulses to the wire |
|
Definition
d. to add logical addresses and properly route data |
|
|
Term
Which of the following utilities could you use to log on to a UNIX host?
a. NTP
b. ARP
c. Ping
d. SSH
e. SNMP |
|
Definition
|
|
Term
While attempting to load a video to youtube.com, the operation freezes and the upload fails. Which characteristic of the connection is being affected?
a. Signaling
b. signal-to-noise ratio
c. throughput
d. goodput
e. attenuation |
|
Definition
|
|
Term
As a networking professional, you might use a multimeter to do which of the following? (choose all that apply)
a. determine where the patch cable for a specific server terminates on the patch panel.
b. verify that the amount of resistance presented by terminators on coaxial cable networks is appropriate.
c. check for the presence of noise on a wire (by detecting extraneous voltage)
d. confirm that a fiber-optic cable can transmit signals from one node to another
e. validate the processing capabilities of a new router |
|
Definition
|
|
Term
A virtual switch includes several virtual ports, each of which can be considered a:
a. virtual repeater
b. virtual router
c. virtual gateway
d. virtual hub
e. virtual bridge |
|
Definition
|
|
Term
What is the default subnet mask for the following IP address: 154.13.44.87?
a. 255.255.255.255
b. 255.255.255.0
c. 255.255.0.0
d. 255.0.0.0
e. 0.0.0.0 |
|
Definition
|
|
Term
How do most modern FTP servers prevent FTP bounce attacks?
a. they will not issue data to hosts other than the client that originated the request.
b. they will deny requests to ports 21 or 22.
c. they will not allow anonymous logons.
d. they require clients to communicate using SSH.
e. they maintain an access list to determine which clients are legitimate. |
|
Definition
a. they will not issue data to hosts other than the client that originated the request. |
|
|
Term
At what layer of the TCP/IP model is routing information interpreted?
a. physical
b. data link
c. network
d. application
e. transport |
|
Definition
|
|
Term
You work for a soft drink company where the temperature of the sodas must be monitored before the drinks are bottled. What device does this industrial network require that can detect this information but is not capable of adjusting the thermostat of the food processing equipment in reaction to temperature changes?
a. PLC
b. MTU
c. TRU
d. actuator
e. HMI |
|
Definition
|
|
Term
How to identify broadcast traffic compromises (equipment)?
a. butt set
b. OTDR
c. protocol analyzer
d. multimeter
e. cable tester
|
|
Definition
|
|
Term
A colleague calls you for help with his home office internet connection. He is using an 802.11n access point/router connected to a DSL modem. The access point/router's IP private IP address is 192.168.1.1 and it has been assigned an Internet routable IP address of 76.83.125.35. Your friend cannot connect to any resources on the internet using his new windows workstation. You ask him to run the ipconfig command and read the results to you. he says his workstation's IP address is 192.168.1.3, the subnet mask is 255.255.255.0, and the default gateway address is 192.168.1.10. What do you advise him to do next?
a. display his DNS information
b. change his gateway address
c. change his subnet mask
d. try pinging the loopback address
e. use the tracert command to contact the access point/router. |
|
Definition
b. change his gateway address |
|
|
Term
You are setting up a new windows 8.1 client to connect with your LAN, which relies on DHCP. You made certain that the client has the TCP/IP protocol installed and is bound to its NIC. Which of the following must you do next to ensure that the client obtains correct TCP/IP information via DHCP?
a. make certain the client's computer name and host name are identical.
b. enter the client's MAC address in the DHCP server's ARP table.
c. make sure the client for microsoft networks service is bound to the client's NIC.
d. enter the DHCP server address in the windows 8.1 TCP/IP configuration.
e. nothing; in windows 8.1, the DHCP option is selected by default, and the client will obtain IP addressing information upon connecting to the network. |
|
Definition
e. nothing; in windows 8.1, the DHCP option is selected by default, and the client will obtain IP addressing information upon connecting to the network. |
|
|
Term
Which OSI layers(s) operate differently in wired versus wireless network connections?
a. layers 5, 6, and 7
b. layers 1, 2, and 3
c. layer 1
d. layer 2
e. layers 1 and 2
|
|
Definition
|
|
Term
Which of the following devices separates broadcast domains?
a. hub
b. switch
c. bridge
d. repeater
e. router |
|
Definition
|
|
Term
Which one of the following media is most resistant to EMI?
a. coaxial cable
b. UTP cable
c. STP cable
d. fiber-optic cable
e. microwave |
|
Definition
|
|
Term
Which of the following routing protocols has the poorest convergence time?
a. RIP
b. EIGRP
c. OSPF
d. BGP
e. IGRP |
|
Definition
|
|
Term
Which of the following ports would be used during a domain name lookup?
a. 22
b. 23
c. 53
d. 110
e. 443 |
|
Definition
|
|
Term
Suppose you have created six subnets on your network, which leases a group of class C IPv4 addresses. What subnet mask must you specify in your clients' configurations to adhere to your subnetting scheme?
a. 255.255.255.6
b. 255.255.255.128
c. 255.255.255.192
d. 255.255.255.224
e. 255.255.255.0 |
|
Definition
|
|
Term
Which of the following protocols encapsulates data for transmission over VPNs?
a. CHAP
b. SNMP
c. L2TP
d. SFTP
e. MPLS |
|
Definition
|
|
Term
You are configuring a DHCP server. Which of the following variables refers to the range of IP addresses that you will make available to all nodes on a segment?
a. Scope
b. lease
c. zone
d. prefix
e. period |
|
Definition
|
|
Term
Which of the following wireless networking standards can reliable transmit data the farthest?
a. LTE
b. WiMAX
c. 802.11b
d. 802.11c
e. 802.11n |
|
Definition
|
|
Term
How does STP (Spanning Tree Protocol) prevent or stop broadcast storms?
a. it examines the source IP address field in each broadcast packet and temporarily blocks traffic from that address.
b. it enables routers to choose one set of best paths and ensures that alternate paths are used only when the best paths are obstructed.
c. it enables switches to calculate paths that avoid potential loops and artificially blocks the links that would complete a loop.
d. it enables firewalls to keep access lists that name hosts known for high-volume broadcast traffic and block those hosts from transmitting to the network.
e. it helps routers define the boundaries of a broadcast domain. |
|
Definition
c. it enables switches to calculate paths that avoid potential loops and artificially blocks the links that would complete a loop. |
|
|
Term
Which of the following standards describes a security technique, often used on wireless networks, in which a port is prevented from receiving traffic until the transmitter's credentials are verified by an authentication server?
a. EAPoL
b. SSH
c. SSL
d. Kerberos
e. MS-CHAP |
|
Definition
|
|
Term
If a Windows workstation is configured to use DHCP, but cannot find a DHCP server, it will assign itself an address and subnet mask. Which of the following IPv4 addresses might it assign itself?
a. 129.0.0.1
b. 255.255.255.255
c. 123.45.67.89
d. 169.254.1.120
e. 987.65.432.1
|
|
Definition
|
|
Term
Suppose your windows laptop's wireless network adapter is configured to use the 802.11n wireless networking standard. Also, suppose a cafe you visit has an 802.11ac access point. Assuming you have the correct SSID and logon credentials, what will happen when you attempt to associate with the cafe's wireless network?
a. your wireless networking client will be able to see the access point, but will be unable to associate with it.
b. your wireless networking client will not be able to see the access point.
c. your wireless networking client will be able to see the access point and attempt to associate with it, but the incompatible frequencies will prevent successful authentication.
d. your wireless networking client will be able to see the access point and attempt to associate with it, but the incompatible security techniques will prevent successful authentication.
e. your wireless networking client will be able to see the access point and successfully associate with it. |
|
Definition
e. your wireless networking client will be able to see the access point and successfully associate with it. |
|
|
Term
Routers use IGMP to:
a. identify nodes belonging to a multicast group
b. communicate with other routers about the best path between nodes.
c. reserve bandwidth for priority transmissions, ensuring high QoS.
d. filter out potentially harmful packets.
e. predict the expected round-trip time of a packet over a WAN. |
|
Definition
a. identify nodes belonging to a multicast group |
|
|
Term
A virtual PBX would provide your organization with which of the following services?
a. data storage in the cloud
b. VoIP call connection
c. expedited internet routing
d. QoS guarantees for video streaming
e. load balancing for WAN connections |
|
Definition
|
|
Term
An implementation of multiple 5-GHz APs that talk to each other in order to obtain 802.11n-type speeds is accomplished with what unofficial wireless standard?
a. 802.11a-ht
b. 802.11g-ht
c. 802.11ac
d. super G
e. 802.11i |
|
Definition
|
|
Term
A user watching a youtube video over the internet is an example of what type of communication?
a. unicast
b. multicast
c. broadcast
d. point-to-multipoint
e. multipoint-to-point |
|
Definition
|
|
Term
You are configuring a connection between two backbone switches, and you want to make sure the connection doesn't fail or become overwhelmed by heavy traffic. Which of the following techniques would help you achieve both aims?
a. Round-robin DNS
b. CARP
c. Clustering
d. trunking
e. NIC teaming |
|
Definition
|
|
Term
Using RIPv2, what is the maximum number of hops a packet can take between its source and its destination?
a. 3.
b. 5.
c. 10
d. 15
e. 18 |
|
Definition
|
|
Term
Which of the following QoS techniques enables packet-switched technologies to travel over traditionally circuit-switched connections?
a. ATM
b. SONET
c. MPLS
d. frame relay
e. clustering |
|
Definition
|
|
Term
What kind of management does SSH provide for a switch?
a. remote configuration
b. management console
c. in-band management
d. virtual terminal
e. KVM |
|
Definition
|
|
Term
Which of the following makes use of channel bonding to maximize throughput?
a. bluetooth
b. satellite
c. 802.11g
d. 802.11n
e. WiMAX |
|
Definition
|
|
Term
Your organization is reassessing its WAN connections to determine how much more bandwidth it will need to purchase in the next five years. As a network administrator, which of the following data can you share that will help management make the right decision?
a. wiring schematic
b. logical network diagram
c. syslogs
d. baselines
e. physical network diagram |
|
Definition
|
|
Term
If an organization follows structured cabling standards, where would its demarc be located?
a. entrance facility
b. work area
c. IDF
d. cross-connect facility
e. backbone |
|
Definition
|
|
Term
You are helping to troubleshoot a recurring problem related to obtaining and keeping a DHCP-distributed IP address on a colleague's windows 7 workstation. What application would allow you to configure the workstation to tally these errors and send you an email message every time such a problem occurred?
a. network and internet connections
b. system logger
c. PuTTY
d. system manager
e. event viewer |
|
Definition
|
|
Term
You are creating a new Linux server as a virtual machine on your Windows 8.1 workstation. Which of the following commands will tell you the IP address that is assigned to your virtual server?
a. ipconfig/all at the windows command prompt
b. ifconfig -a at the linux server's shell prompt
c. ethtool -a at the linux server's shell prompt
d. ip addr at the windows command prompt
e. ipconfig -a at the linux server's shell prompt |
|
Definition
b. ifconfig -a at the linux server's shell prompt |
|
|
Term
In IPv6 addressing, which of the following prefixes indicates that an address belongs to a multicast group?
a. 00FF
b. 1F3E
c. FF02
d. 0001
e. FEC0 |
|
Definition
|
|
Term
Suppose your WAN contains a segment that relies on the 10GBase-EW standard. Which of the following transmission technologies might it use?
a. SONET
b. Satellite
c. broadband cable
d. DSL
e. metro ethernet |
|
Definition
|
|
Term
The software on a firewall you recently installed on your network examines each incoming packet. Based on a set of criteria, including the source IP address, source and destination ports, and protocols, it blocks or allows traffic. What type of system is this? (choose all that apply)
a. content-filtering firewall
b. stateful firewall
c. stateless firewall
d. packet-filtering firewall
e. application layer firewall |
|
Definition
c. stateless firewall and d. packet-filtering firewall |
|
|
Term
Ethernet and ATM both specify data link layer framing techniques. How do they differ?
a. ethernet uses CRC fields to confirm the validity of the frame, whereas ATM uses no error detection.
b. ethernet uses variably sized packets, whereas ATM uses asynchronous transmission.
d. ethernet uses frame headers, whereas ATM does not.
e. ethernet offers no guarantee of timely delivery, whereas ATM ensures that packets are delivered within 10ms. |
|
Definition
b. ethernet uses variably sized packets, whereas ATM uses asynchronous transmission. |
|
|
Term
What STP configuration ensures that a laptop connected to a switch cannot alter the STP paths on the network?
a. BPDU filter
b. BPDU guard
c. root bridge
d. BID
e. designated port |
|
Definition
|
|
Term
How many bits are in an IPv6 address?
a. 16
b. 32
c. 64
d. 128
e. 256
|
|
Definition
|
|