38-366: 133-196 Flashcards

1
Q
For which two reasons should you use IPsec between computers? (Choose two.)
A. Data compression
B. Data integrity
C. Data redundancy
D. Data confidentiality
A

B. Data integrity

D. Data confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This question requires that you evaluate the underlined text to determine if it is correct.
Every router today is “TCP/IP” enabled, which is an industry-standard protocol that you use on the Internet and for local addressing.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. HTTP
B. FTP
C. SNMP
D. No change is needed

A

D. No change is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are home for vacation, and a family member wants your help to purchase and install network cable for a home office.
The cable needs to support at least 300 Mbps.
What is the least expensive option that meets this requirement?
A. Cat3
B. CAT5
C. Cat5e
D. Cat6

A

C. Cat5e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This question requires that you evaluate the underlined text to determine if it is correct.
“WEP” wireless encryption is the most susceptible to interception and decryption.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed’’ if the underlined text makes the statement correct
A. WPA-AES
B. WPA2
C. WPA-PSK
D. No change is needed

A

D. No change is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

A switch sends unicast packets to one destination port only
A switch floods ports if it does not know where to send a packet
A switch sends broadcast packets to the uplink port only

A

Yes
Yes
No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What is an example of a network device that associates a network address with a port?
A. Switch
B. Router
C. Hub
D. DSL modem
A

B. Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which wireless communication problem is caused by electromagnetic waves?
A. Fading
B. Attenuation
C. Interference
D. Diffraction
A

C. Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An Action Center alert recommends that you enable Windows Firewall.
After enabling the firewall, you can no longer access websites.
Which two TCP ports should you add exceptions for on the firewall? (Choose two.)
A. Port 21
B. Port 23
C. Port 25
D. Port 80
E. Port 443

A

Port 80: HTTP

Port 443: HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two advantages of using star topology rather than ring topology in a computer lab workgroup? (Choose two.)
A. Failure of a central connectivity device does not bring down the entire network.
B. A central connection point allows for flexibility and scalability.
C. Data travels on redundant paths, so one cable cannot stop its transmission.
D. A cable problem within the group affects two nodes, at most.

A

B. A central connection point allows for flexibility and scalability.
D. A cable problem within the group affects two nodes, at most.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are three characteristics of Ethernet network topology? (Choose three.)
A. It uses tokens to avoid collisions on the network.
B. It can use coaxial, twisted pair, and fiber optic media.
C. It comprises the largest share of the networks in place today.
D. It is a non-switching protocol.
E. It can negotiate different transmission speeds.

A

B. It can use coaxial, twisted pair, and fiber optic media.
C. It comprises the largest share of the networks in place today.
E. It can negotiate different transmission speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This question requires that you evaluate the underlined text to determine if it is correct.
Plain old telephone service (POTS), most ISDN lines, and switched T1 lines are all examples of “Message Switching”.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed’’ if the underlined text makes the statement correct.
A. Circuit Switching
B. Packet Switching
C. FDDI Switching
D. No change is needed

A

A. Circuit Switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

You use a perimeter network to grant internal clients access to external resources
A LAN has no access to the perimeter network
A perimeter network typically contains servers that require Internet access, such as web or email servers

A

No
No
Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HOTSPOT -
You are an intern for Contoso Ltd. Your supervisor asks you to configure the security zones for three new PCs so that they are able to connect to two web servers.
The servers connect to the three new PCs as shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Hot Area:

The appropriate type of security zone for https://sales.northwindtraders.com is: Restricted Sites / Local Intranet / Trusted Sites
The appropriate type of security zone for https://hr.contoso.com is Restricted Sites / Local Intranet / Trusted Sites

A

Trusted Site

Local Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your home computer is having problems accessing the Internet.
You suspect that your Internet router’s DHCP service is not functioning, so you check your computer’s IP address.
Which address indicates that your router’s DHCP service is NOT functioning?
A. 169.254.1.15
B. 172.16.1.15
C. 192.168.1.15
D. 10.19.1.15

A

A. 169.254.1.15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of these is a public address space?
A. 192.168.0.0/16
B. 197.16.0.0/12
C. 10.0.0.0/8
D. 172.16.0.0/12
A

B. 197.16.0.0/12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This question requires that you evaluate the underlined text to determine if it is correct.
In a wireless network that requires an SSL certificate, “WEP” handles the SSL certificate.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. 802.1X
B. WPA2-PSK
C. WPA-PSK
D. No change is needed

A

A. 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This question requires that you evaluate the underlined text to determine if it is correct.
To set lower security settings in Internet Explorer for an extranet site, add the site’s URL to the “Local Intranet “zone.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Internet
B. Trusted Sites
C. Extranet Sites
D. No change is needed

A

B. Trusted Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You are helping a friend set up a public-facing web server for a home office.
Your friend wants to protect the internal network from intrusion.
What should you do?
A. Set the web server in a perimeter network.
B. Set the web server to block access on ports 80 and 443.
C. Configure the firewall to block access on ports 80 and 443.
D. Set the IP address of the web server to be within the LAN.

A

A. Set the web server in a perimeter network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

A wireless bridge connects Ethernet-based devices to the network
A wireless bridge increase the wireless signal strength of the access point
Wirelesss bridge always work in pairs

A

No
Yes
No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are two characteristics of the CSMA/CD access method? (Choose two.)
A. It checks to see if a collision has been detected.
B. It does a round robin search for requests to transmit from all nodes on the network.
C. It signals its intent to transmit on the network.
D. It waits until the transmission medium is idle.

A

A. It checks to see if a collision has been detected.

D. It waits until the transmission medium is idle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are two characteristics of a mesh network topology? (Choose two.)
A. It is fault tolerant because of redundant connections.
B. Every node connects to every other node on the network.
C. It works best for networks with a large number of nodes.
D. It requires less cabling than either a star or ring topology.

A

A. It is fault tolerant because of redundant connections.

B. Every node connects to every other node on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which protocol is responsible for automatically assigning IP addresses?
A. HTTP
B. DHCP
C. DNS
D. WINS
A

B. DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This question requires that you evaluate the underlined text to determine if it is correct.
According to the OSI model, encryption takes place on the “transport layer”.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Presentation
B. Network
C. Application
D. No change is needed

A

A. Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

An IPv4 address consist of 64 bits
It is standard practise to divide the binary bits of an IPv4 address into 8-bit fields named octets
The value of any IPv4 octet can be from 0 to 256

A

No
Yes
No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

This question requires that you evaluate the underlined text to determine if it is correct.
IPSec policies for two machines on a LAN can be modified by using the “IPSec policy snap-in” on Windows 7.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Windows Firewall with Advanced Security snap-in
B. LAN adapter properties
C. Remote Access snap-in
D. No change is needed

A

A. Windows Firewall with Advanced Security snap-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

This question requires that you evaluate the underlined text to determine if it is correct.
An Address Resolution Protocol (ARP) table is used to associate IP addresses with “host names”.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. MAC addresses
B. HomeGroup membership
C. Preferred routers
D. No change is needed

A

A. MAC addresses

27
Q
Which network device interconnects computers in a workgroup, is able to be remotely configured, and provides the best throughput?
A. Unmanaged switch
B. Hub
C. Router
D. Managed switch
A

D. Managed switch

28
Q
What is the maximum cable length for a single Cat5 UTP cable run?
A. 285 feet/86.87 meters
B. 328 feet/99.97 meters
C. 432 feet/131.67 meters
D. 600 feet/182.88 meters
A

B. 328 feet/99.97 meters

29
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

Quality of Service (QoS) allows you to define the priority traffic on the network.
Quality of Service (QoS) allows you to control bandwidth
Quality of Service (QoS) allows you to assign protocols dynamically

A

Yes
Yes
No

30
Q
Which of these cable types transmits data the greatest distance?
A. Multi-mode fiber
B. Single-mode fiber
C. Cat5e
D. Cat6
A

B. Single-mode fiber

31
Q

What is a similarity between Layer 2 and Layer 3 switches?
A. Both provide a high level of security to the network.
B. Both use logical addressing to forward transmissions.
C. Both forward packets onto the network.
D. Both allow the implementation of VLANs.

A

D. Both allow the implementation of VLANs.

32
Q

This question requires that you evaluate the underlined text to determine if it is correct.
“Dynamic routing” is fault tolerant.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Static routing
B. Default route
C. Least cost routing
D. No change is needed

A

D. No change is needed

33
Q

You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters.
An interference exists along the path of each drop.
You need to ensure that interference is reduced.
Which cable type should you use?
A. STP Cat5e
B. UTPCat5e
C. Cat3
D. UTPCat6

A

A. STP Cat5e

34
Q
What is an example of a Layer 3 device that connects multiple computers and networks?
A. Packet
B. Repeater
C. Switch
D. Router
A

D. Router

35
Q
Which metric does Routing Information Protocol (RIP) use to determine the least costly route?
A. Delay
B. Host ID
C. Hop count
D. Interface
A

C. Hop count

36
Q

What are two differences between switches and hubs? (Choose two.)
A. Switches are slower than hubs because of the extra addressing functions that switches perform.
B. Switches send data to all of the computers that are connected to them for efficiency.
C. Switches are capable of sending and receiving data at the same time.
D. Switches identify the intended destination of the data that they receive.

A

C. Switches are capable of sending and receiving data at the same time.
D. Switches identify the intended destination of the data that they receive.

37
Q
What is the DNS record type that specifies an alias name of another address record?
A. MX
B. CNAME
C. NS
D. SOA
A

B. CNAME

38
Q

This question requires that you evaluate the underlined text to determine if it is correct.
Each IPv4 address consists of a “MAC address and data-link laver address”.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.
A. Network ID and a host ID
B. DNS record and a default route
C. 64-bit binary number divided into octets
D. No change is needed

A

A. Network ID and a host ID

39
Q

This question requires that you evaluate the underlined text to determine if it is correct.
The “NTP” value in a resource record indicates a length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed’’ if the underlined text makes the statement correct.
A. TTL
B. GPS
C. SOA RR
D. No change is needed

A

A. TTL

40
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

HTTP, TELNET, FTP and SMTP protocols operate on Layer 7 of the OSI model
Layer 4 of the OSI model controls dialogue between computers
Layer 3 of the OSI model controls routing between network devices

A

Yes
No
Yes

41
Q

HOTSPOT -
You are studying for finals in the student lounge. When your laptop is connected to the wireless network, access to the Internet is slow. When you plug your laptop into a wall jack, you can no longer access the Internet at all.
You run the ipconfig /all command. The results are shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
Hot Area:

The wireless adapter has an IP address configured manually / through DHCP / through APIPA
The Ethrnet adapter has an IP address configured manually / through DHCP / through APIPA

A

DHCP

APIPA

42
Q

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:

IPv6 address are 64-bit length
IPv6 address are divided into 8-bit blocks
IPv6 address are represented by dotted-decimal notation

A

No
No
No

43
Q

HOTSPOT -
Where in the diagram is a T3 connection possible? (To answer, select the appropriate connection in the diagram in the answer area.)
Hot Area:

A

Najwyższy po prawej prostokąt

44
Q

What happens when an 802.11a node broadcasts within the range of an 802.11g access point?
A. The access point transmits, but the node is unable to receive.
B. A connection occurs.
C. Both the node and the access point are unable to transmit.
D. The node transmits, but the access point is unable to receive.

A

D. The node transmits, but the access point is unable to receive.

45
Q

This question requires that you evaluate the underlined text to determine if it is correct.
An ICMP ping message is sent at the application layer of the OSI model.
Review the underlined text. If it makes the statement correct, select “No change is needed.” If the statement is incorrect, select the answer choice that makes the statement correct.
A. network
B. transport
C. data-link
D. No change is needed

A

A. network

46
Q

This question requires that you evaluate the underlined text to determine if it is correct.
The query protocol used to locate resources on a network is User Datagram Protocol (UDP).
Review the underlined text. If it makes the statement correct, select “No change is needed.” If the statement is incorrect, select the answer choice that makes the statement correct.
A. Lightweight Directory Access Protocol (LDAP)
B. Internet Group Management Protocol (IGMP)
C. Network File System (NFS)
D. No change is needed

A

A. Lightweight Directory Access Protocol (LDAP)

47
Q

This question requires that you evaluate the underlined text to determine if it is correct.
The protocol that maps IP addresses to a Media Access Control (MAC) address is Domain Name Systems (DNS).
Review the underlined text. If it makes the statement correct, select “No change is needed.” If the statement is incorrect, select the answer choice that makes the statement correct.
A. Address Resolution Protocol (ARP)
B. Dynamic Host Configuration Protocol (DHCP)
C. Routing Information Protocol (RIP)
D. No change is needed

A

A. Address Resolution Protocol (ARP)

48
Q
Which utility would you use to determine if your Domain Name System (DNS) server is properly resolving fully qualified domain names (FQDNs) as IP addresses?
A. netstat
B. nslookup
C. nbtstat
D. ipconfig
A

B. nslookup

49
Q
What type of DNS resource record maps an IP address to a fully qualified domain name (FQDN)?
A. CNAME
B. PTR
C. AAAA
D. A
A

B. PTR

50
Q

Your network is reconfigured as multiple subnets. Your company needs to support legacy NetBIOS applications across subnet boundaries.
Which should you use for name resolution?
A. DNS server
B. Client HOSTS file
C. WINS server
D. NetBIOS broadcasts

A

C. WINS server

51
Q
A Layer 2 device that connects multiple computers within a network is:
A. an access point
B. a switch
C. a router
D. a bridge
A

B. a switch

52
Q

What are two characteristics of switches? (Choose two.)
A. Switches identify the intended destination of the data that they receive
B. Switches cause more data collisions than hubs
C. Switches are capable of sending and receiving data at the same time
D. Switches send each packet to all of the computer that are connected to them

A

A. Switches identify the intended destination of the data that they receive
C. Switches are capable of sending and receiving data at the same time

53
Q

HOTSPOT -
Your network uses routers configured with the RIP router protocol.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

  1. A route can contain no more than 15 hops
  2. Route changes are broadcast immediately through the network
  3. Route management becomes more efficient as the network grows
  4. Routes are calculated based on the number of hops required
A

Yes
Yes
No
Yes

54
Q

HOTSPOT -
You deploy a computer running Windows Server 2016 in your perimeter network. You want to use this computer to route traffic between the Internet and your network.
Which role do you need to configure?
To answer, select the appropriate role in the answer area.
Hot Area:

A

Answer: HyperV - To deploy Network Controller, you must install the Network Controller server role on a Hyper-V virtual machine (VM) that is installed on a Hyper-V host.

55
Q
At Ethernet 1000BaseT network is wired as a physical star using switches.
What is the logical topology?
A. mesh
B. ring
C. bus
D. star
A

D. star

56
Q
Which access method is used in a physical ring topology?
A. collision
B. token passing
C. avoidance
D. polling
A

B. token passing

57
Q

What are two characteristics of wired Ethernet network topology? (Choose two.)
A. It uses network adapters physically encoded with an IP address
B. It uses tokens to avoid collisions on the network
C. It is typically employed using twisted pair of fiber optic media
D. It can negotiate different transmission speeds

A

C. It is typically employed using twisted pair of fiber optic media
D. It can negotiate different transmission speeds

58
Q

This question requires that you evaluate the underlined text to determine if it is correct.
All devices on your company network connect to the same network switch. This is an example of a physical star topology.
Review the underlined text. If it makes the statement correct, select “No change is needed.” If the statement is incorrect, select the answer choice that makes the statement correct.
A. ring
B. bus
C. mesh
D. No change is needed

A

D. No change is needed

59
Q

What is the primary purpose of a perimeter network?
A. to act as a hidden location to deploy network clients
B. to act as a secure location for deploying highly sensitive network servers
C. to provide a buffer area between a private intranet and the public Internet
D. to monitor traffic between routed subnets in a private LAN

A

C. to provide a buffer area between a private intranet and the public Internet

60
Q

This question requires that you evaluate the underlined text to determine if it is correct.
The 802.11n wireless standard specifies a maximum data rate of 54 Mbps.
Review the underlined text. If it makes the statement correct, select “No change is needed.” If the statement is incorrect, select the answer choice that makes the statement correct.
A. 10 Mbps
B. 11-128 Mbps
C. 300-600 Mbps
D. No change is needed

A

C. 300-600 Mbps

61
Q

What is the purpose of a Media Access Control (MAC) address?
A. identify a network device to the Internet
B. uniquely identify a physical network device
C. manage permissions for shared network resources
D. provide a routing address on a local area network (LAN)

A

B. uniquely identify a physical network device

62
Q

This question requires that you evaluate the underlined text to determine if it is correct.
A network that separates an organization’s private network from a public network is an extranet.
Review the underlined text. If it makes the statement correct, select “No change is needed.” If the statement is incorrect, select the answer choice that makes the statement correct.
A. a perimeter
B. an intranet
C. the Internet
D. No change is needed

A

A. a perimeter

63
Q
Which connectivity option for wide area networks (WANs) is most readily available in most geographic areas?
A. Leased line
B. ISDN
C. T1
D. Dial-up
A

D. Dial-up