Chap 6 - Practice Test 1 Flashcards

1
Q

6-5: You are an IT consultant who has been contracted to install new computers on a client’s Gigabit Ethernet network. You want the performance of the new computers to be as good as it can be, so you configure their network adapters to run at the full speed of 1 Gbps and to use full-duplex communication. You test the computers after installing them, and they function well. However, once the computers are in service, you begin getting complaints from the client of extremely poor network performance on the new machines. You return to the site that evening and run some ping tests, but you do not detect any problem. You call in a colleague to perform a packet analysis, and she detects large numbers of packet collisions, late collisions, Cyclic Redundancy Check (CRC) errors, and runt frames. Which of the following could be the cause of the problem?

Damaged cables
Transmit/Receive (TX/RX) reversal
Duplex mismatch
Incorrect cable type

A

Duplex mismatch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

6-12: Which of the following are port numbers used for Structured Query Language (SQL) communications? (Choose all that apply.)

1433
3389
1521
3306

A

1433 - SQL Server
1521- SQLNet
3306 - MySQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

6-15: You are setting up an 802.11n wireless network using the 2.4 GHz frequency band. You plan to install three Wireless Access Points (WAPs). Which of the following channels should you use for your access points to avoid channel overlap that can result in interference? (Choose all that apply.)

1
4
6
8
11

A

1
6
11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

6-16: Your supervisor has asked you to increase the security of the servers on your network. Which of the following procedures can be considered to be server hardening techniques? (Choose all that apply.)

Upgrading server firmware
Disabling unnecessary services
Creating privileged user accounts
Disabling unused TCP and UDP ports

A

Disabling unnecessary services
Creating privileged user accounts
Disabling unused TCP and UDP ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

6-17: You are working the IT help desk when a user calls to report that he cannot access the Internet, although he is able to connect to computers on the local network. At the user’s workstation, you run the ipconfig /all command and examine the output. Which of the options is the most likely explanation for the user’s problem, based on the following ipconfig results?

Windows IP Configuration
Host Name . . . . .Client12
Primary Dns Suffix
Node Type . . . . .Hybrid
IP Routing Enabled. No
WINS Proxy Enabled. No

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix
Description . . . . . . . . . .PCIe Family Controller
Physical Address. . . . . . . .60-EB-69-93-5E-E5
DHCP Enabled. . . . . . . . . .No
Autoconfiguration Enabled . . .Yes
Link-local IPv6 Address . . . .fe80::c955:c944:acdd:3fcb%2
IPv4 Address. . . . . . . . . .192.168.23.234
Subnet Mask . . . . . . . . . .255.255.255.0
Lease Obtained. . . . . . . . .Monday, October 23, 2017 6:23:47 PM
Lease Expires . . . . . . . . .Saturday, November 18, 2017 9:49:24 PM
Default Gateway . . . . . . . .192.168.216.99
DHCPv6 IAID . . . . . . . . . .241232745
DHCPv6 Client DUID . . . . . .00-01-00-01-18-10-22-0D-60-EB-69-93-5E-E5
DNS Servers . . . . . . . . . .192.168.22.114
NetBIOS over Tcpip. . . . . . .Enabled

DHCP is not enabled.
The Subnet Mask setting is incorrect.
The Default Gateway setting is incorrect.
The DNS Servers setting is located on another network.

A

The Default Gateway setting is incorrect.

default gateway should be on same network as workstation, but its not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6-24: Which of the following well-known ports do you use to configure outgoing mail on a POP3 email client?

110
25
143
80

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

6-25: You are a consultant who has been hired to extend a network by a client that is still running thin Ethernet. Which of the following cable types will you have to bring with you to add thin Ethernet network segments?

RG-8
RG-58
RJ45
RJ11

A

RG-58

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

6-27: Which of the following protocols does Internet Protocol Security (IPSec) use to provide data origin authentication by digitally signing packets before transmitting them over the network?

AH
SSL
ESP
RDP

A

AH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

6-28: You have constructed a network on which all of the computers are connected to a single switch. You then create Virtual Local Area Networks (VLANs) on the switch, corresponding to the company’s departments, and add the switch port for each user workstation and department server to the appropriate VLAN. Later, users report that while they can access their departmental servers and the workstations of other users in the same department, they cannot communicate with any of the other departments. What is the problem, and what must you do to correct it?

  • There is a faulty VLAN configuration on the switch. You must recreate all of the
    VLANs and configure each VLAN for routing.
  • VLANs are limited to data link layer communication only. To enable communication between the VLANs, you must install a router or a layer 3 switch on the network and configure it to route traffic between the VLANs.
  • The VLANs are using different data link layer protocols. You must configure the VLANs to use the same data link layer protocol in order for them to communicate with each other.
  • One of the VLANs is configured to filter all of the other VLAN traffic for security purposes. You must change the filter on this one VLAN.
A

VLANs are limited to data link layer communication only. To enable communication between the VLANs, you must install a router or a layer 3 switch on the network and configure it to route traffic between the VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

6-29: The TCP/IP term socket consists of which of the following elements? (Choose all that apply.)

Port number
MAC address
IP address
Subnet mask

A

Port number

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Socket

A

A socket is one endpoint of a two way communication link between two programs running on the network.

accomplished by adding IP address + port, like this: 192.168.2.87:8080

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

6-32: Which of the following are tasks that can be performed by a protocol analyzer that could provide potential intruders with information about the network? (Choose all that apply.)

  • A protocol analyzer can decrypt protected information in packets captured from the network.
  • A protocol analyzer can detect open ports on network systems and launch attacks against them.
  • A protocol analyzer can display the IP addresses of the systems on the network.
  • A protocol analyzer can display the application data in packets captured from the network.
A
  • A protocol analyzer can display the IP addresses of the systems on the network.
  • A protocol analyzer can display the application data in packets captured from the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

6-38: You are working your company’s IT help desk, where you are required to follow a specific troubleshooting protocol when handling calls from users. In which of the following troubleshooting steps would you create a trouble ticket?

Establish a theory of probable cause
Verify full system functionality and, if applicable, implement preventive measures
Identify the problem
Test the theory to determine the cause
Document findings, actions, and outcomes
Implement the solution or escalate as necessary
Establish a plan of action to resolve the problem and identify potential effects

A

Identify the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

6-40: Which of the following Wide Area Network (WAN) services provide unequal amounts of upstream and downstream bandwidth? (Choose all that apply.)

SDSL
CATV
ADSL
FCoE

A

CATV
ADSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

6-43: Which of the following is not a term for the process of combining the bandwidth of two or more network adapters to increase the overall speed of the connection and provide fault tolerance?

Port aggregation
Link aggregation
Bonding
Clustering
NIC teaming

A

Clustering

applies to servers, not network adapters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

6-52: When starting her new position as a network administrator, Alice was given two user accounts. One account is intended for standard user activities, and another has the additional permissions needed for Alice to perform administrative tasks. This is an example of which of the following security concepts?

Zero day
Least privilege
Defense in depth
Multifactor authentication

A

Least privilege

17
Q

Defense in Depth

A

use of multiple security mechanisms to provide additional protection

18
Q

6-53: You are in the process of troubleshooting a user’s computer that is malfunctioning. Which step of the troubleshooting model involves replacing computer components until you have identified a faulty hardware device?

Establish a plan of action to resolve the problem
Duplicate the problem
Gather information
Verify full system functionality
Test the theory to determine the cause
Document findings, actions, and outcomes
Establish a theory of probable cause

A

Test the theory to determine the cause

19
Q

6-61: Which of the following protocols use tunneling to establish secured links between TCP/IP systems? (Choose all that apply.)

L2TP
IPSec
MGRE
NAT

A

L2TP
IPSec
MGRE

20
Q

MGRE

A

Multipoint Generic Routing Encapsulation

  • used to connect multiple remote sites through a VPN
  • uses hub and spoke topology
  • encapsulates and forward packets from one remote site to another
21
Q

6-62: Your supervisor has given you a Class C network IP address and has asked you to create a network with 8 subnets and 30 hosts per subnet. Which of the following subnet masks will you have to use?

255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
255.255.255.252

A

255.255.255.224

to get 8 subnets, you need 3 bits, because 2^3 = 8, out of the last octet
then convert this to binary as 11100000, which converts to 224

Class C networks are: 255.255.255.0 or /8, which gives us a value of:

255.255.255.224

22
Q

6-69: You are a consultant working on a new client’s network. The network has been in place for decades, and you have been given a diagram supplied by the original installer. The diagram says that the network computers are connected to a device called a multiport repeater. Which of the following devices can also be described as a multiport repeater?

Hub
Bridge
Switch
Router

A

Hub

23
Q

6-75: You are designing a new wireless network based on the IEEE 802.11n standard. The equipment you have selected supports both the 2.4 GHz and 5 GHz frequencies, and you are undecided about which one to use. Which of the following are possible reasons why the 5 GHz frequency tends to perform better than the 2.4 GHz frequency on a Wireless Local Area Network (WLAN)? (Choose all.)

  • The 5 GHz frequency has more channels than the 2.4 GHz frequency.
  • The 5 GHz frequency conflicts with fewer common household devices than the 2.4 GHz frequency.
  • The 5 GHz frequency transmits at faster speeds than the 2.4 GHz frequency.
  • The 5 GHz frequency supports longer ranges than the 2.4 GHz frequency.
A
  • The 5 GHz frequency has more channels than the 2.4 GHz frequency.
  • The 5 GHz frequency conflicts with fewer common household devices than the 2.4 GHz frequency.
  • The 5 GHz frequency transmits at faster speeds than the 2.4 GHz frequency.
24
Q

6-77: Which of the following server applications uses two well-­known port numbers, one for control traffic and one for data traffic?

FTP
SNMP
NTP
HTTP

A

FTP

21 - control connection
20 - for transfering data

25
Q

6-78: You are configuring the computers on a new network, and you have been given the network address 10.26.0.0/13. Which of the following subnet mask values must you use when configuring the computers?

255.248.0.0
255.252.0.0
255.254.0.0
255.255.248.0
255.255.252.0
255.255.254.0

A

255.248.0.0

/13 prefix converts to binary in all four octets as:

11111111.1111100.00000000.00000000

or

255.248.0.0

26
Q

6-80: Which of the following functions are defined as occurring at the session layer of the Open Systems Interconnection (OSI) model? (Choose all that apply.)

Data encryption
Dialog control
Datagram routing
Dialog separation

A

Dialog control

Dialog separation

27
Q

6-81: You are working your company’s IT help desk, and you have had several calls from users who are reporting problems with their Voice over Internet Protocol (VoIP) and streaming video connections. In each case, the audio or video connection experiences frequent dropouts in sound or video, causing frustrating interruptions. Which of the following terms describes a connectivity problem on a wired network that could cause these symptoms?

Jitter
Latency
Bottleneck
Attenuation

A

Jitter

28
Q

6-82: You are a consultant with a client who wants to have you install a wireless network with the highest throughput currently available. What can you tell your client is the fastest speed achievable by a Wireless Local Area Network (WLAN) using the currently ratified IEEE 802.11 standards?

54 Mbps
600 Mbps
1.3 Gbps
2.6 Gbps

A

1.3 Gbps

29
Q

6-84: A user calls you at the technical support desk in the computer store where you work. He is installing a home network and is having trouble configuring the IP addresses for his computers. He starts reading off a list of the network addresses he has tried to use. Which of the following are valid IPv4 network addresses that the user can conceivably use to configure his computers? (Choose all that apply.)

1.1.1.0
9.34.0.0
103.256.77.0
229.6.87.0

A

1.1.1.0
9.34.0.0

103.256.77.0 - cannot have 256 as an octet
229.6.87.0 - Class D (224 -239) reserved for multicast

30
Q

6-86: You have been hired by a client to connect two local area networks together, which are in different buildings 500 meters apart. The cable type you use must support Gigabit Ethernet data rates of 1000 megabits per second (Mbps) and provide a high level of resistance to electromagnetic interference (EMI). Which of the following cable types can you choose to meet the client’s needs? (Choose all that apply.)

Single-mode fiber-optic cable
Thin coaxial cable
Multimode fiber-optic cable
Shielded Twisted Pair (STP) cable
Unshielded Twisted Pair (UTP) cable

A

Single-mode fiber-optic cable

Multimode fiber-optic cable

note: coaxial is too short for the distance requirement in this question

31
Q

6-89: Which layer of the Open Systems Interconnection (OSI) model has its own logical addressing system and is responsible for routing packets from one network to another?

Physical
Data link
Network
Transport
Session
Presentation
Application

A

Network

32
Q

6-91: You are researching the various types of Storage Area Network (SAN) technologies currently available before making a purchasing recommendation to your IT director. Which of the following are genuine advantages of iSCSI over Fibre Channel? (Choose all that apply.)

iSCSI can share the same network as standard Local Area Network (LAN) traffic; Fibre Channel cannot.
iSCSI is routable, whereas Fibre Channel is not.
iSCSI is less expensive to implement than Fibre Channel.
iSCSI includes its own internal flow control mechanism; Fibre Channel does not.

A

iSCSI can share the same network as standard Local Area Network (LAN) traffic; Fibre Channel cannot.
iSCSI is routable, whereas Fibre Channel is not.
iSCSI is less expensive to implement than Fibre Channel.

33
Q

6-92: In which of the following Domain Name System (DNS) transactions does the querying system generate an iterative query? (Choose all that apply.)

  • A DNS client extracts the server name www.adatum.com from a URL and sends it to its designated DNS server for resolution.
  • A client’s DNS server sends a name resolution request to a root domain server to discover the authoritative server for the com top-level domain.
  • A client’s DNS server sends a name resolution request to the com top-level domain server to find the authoritative server for the adatum.com domain.
  • A client’s DNS server, which has been configured to function as a forwarder, sends the server name www.adatum.com from a URL to its Internet Service Provider’s (ISP’s) DNS server for resolution.
  • A client’s DNS server sends a name resolution request to the adatum.com domain server to discover the IP address associated with the server name www.
A
  • A client’s DNS server sends a name resolution request to a root domain server to discover the authoritative server for the com top-level domain.
  • A client’s DNS server sends a name resolution request to the com top-level domain server to find the authoritative server for the adatum.com domain.
  • A client’s DNS server sends a name resolution request to the adatum.com domain server to discover the IP address associated with the server name www.
34
Q

DNS iterative query

A
  • where the client communicates directly with each DNS server involved in the lookup
  • sending name resolution requests to root domain and authoritative server
  • the server replies immediately with the best informationn it possesses, and the transaction ends

Google: An iterative DNS query is a request for a website name or URL. However, with this query type, the domain name system (DNS) server does not fetch the complete answer for the query. Rather, it provides a referral to other DNS servers that might have the answer.

Book: a client’s DNS server uses iterative queries when sending name resolution requests to root domain servers and to the authoritative serber for the com and [something].com domains. In an iterative query, the server replies immediately with the best informationn it possesses, and the transaction ends

35
Q

6-94: You are heading out to do a cabling job for a client who has coaxial and twisted-pair Ethernet networks at their facility. You want to bring connectors and cables to prepare for any eventuality. Which of the following connector types are typically associated with Ethernet networks? (Choose all that apply.)

N-type
BNC
F-type
RJ45
DB-9

A

N-type
BNC
RJ45

35
Q

6-98: Which of the following are valid reasons why the leaf and spine datacenter topology is superior to the standard three-tier topology? (Choose all the apply.)

  • The leaf and spine topology is less expensive to implement than the three-­tier topology.
  • In a leaf and spine topology, all data flows require the same number of hops.
  • The leaf and spine arrangement uses a full mesh switching topology.
  • The leaf and spine topology uses software-defined networking to direct traffic, rather than blocking ports using the spanning tree protocol.
A
  • In a leaf and spine topology, all data flows require the same number of hops.
  • The leaf and spine arrangement uses a full mesh switching topology.
  • The leaf and spine topology uses software-defined networking to direct traffic, rather than blocking ports using the spanning tree protocol.
36
Q

6-99: A baseline is a performance measurement for a device or system, taken under normal operating conditions, which you can use later to quantify any changes that might have taken place. Which of the following Windows applications would you most likely use to create a baseline of system or network performance?

Syslog
Event Viewer
Network Monitor
Performance Monitor

A

Performance Monitor

37
Q

6-100: In most cases, a Denial-of-Service (DoS) attack refers to a deliberate attempt to overwhelm a server with incoming traffic. However, this is not always the case. Which of the following types of DoS attacks does not involve flooding a server with traffic?

Amplified
Distributed
Permanent
Reflective

A

Permanent