98-366 (1) Flashcards

(50 cards)

1
Q

One advantage of dynamic routing is

A

Automatically maintains routing tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What represents MAC address

A

Six groups of two hexadecimal digits separated by hyphens or colons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Connecting to a private network address from a public network requires

A

Network address translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network device that associates a Media access control (MAC) address with a port is a

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What confirms or adds the MAC address and the port to the lookup table

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A layer 2 device that connects multiple computers within a network is a

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A cable that meets the 1000BaseT standard has a max length of

A

100 m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Routers static route is set by the

A

Network admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which setting is used to determine the Domain Name System settings on a client computer

A

NSLOOKUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The default subnet mask for Class B network is

A

255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The default subnet mask for Class A network is

A

255.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The default subnet mask for Class C network is

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the default port used for SMTP

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ping tool is

A

Sept test hosts own network interface

Determine whether a host is reachable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What following are features of DHCP

A

Address reservation

IP address exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The command line tool used to list a hosts active incoming connections is

A

NETSTAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A computer that has an IP address of 192.254.0.1 cannot access the network. What service should you confirm is available

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which network does the IP address 220.100.100.0 belong to

A

220.100.100.0/24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which subnet mask is valid

A

255.255.255.241

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A service that revolves NetBIOS names to IP addresses is

A

Windows Internet Name Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of DNS record maps host name to addresses

A

Host (A) DNS record

22
Q

Teredo tunneling is a protocol that

A

Allows IPv6 connectivity through IPv4

23
Q

Default subnet mask for a class C internet network

A

255.255.255.”

24
Q

Default subnet mask for a class B internet network

25
Default subnet mask for a class A internet network
255.0.0.0
26
Default port used for telnet
23
27
When a clients DHCP issued address expires, the client will
Attempt to obtain a new address by broadcasting
28
You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. What’s the issue
The DNS is not resolving
29
MAC address identifies a
Network interface card
30
Two companies want to share data by using the internet. What type of network provides the solution
Extract
31
VPNs are implemented to provide
A secure connection through public networks
32
If an 802.11g internet connection has connectivity problems what may be the cause
EMI
33
Which factors has the biggest impact on data transmission speed in a wireless network
The transmission standard of the equipment used
34
What uses a tunneling protocol
VPN
35
A network that separates an organization private network from a public network is
Perimeter
36
Type of network is most vulnerable to intrusion
Wireless
37
Attenuation in a wireless network signal is a result of
Distance from the access point
38
What type of network covers the broadest area
WAN
39
In local area network LAN topologies, the primary media access methods are
Contention | Token passing
40
In a physical star topology the central device is referred to as
Hub
41
What topology can you use to extend a internal network across shared or public networks
VPN
42
Which two are published IEEE 802.11 wireless transmission standards
802. 11g | 802. 11n
43
What happens when an 802.11b node starts broadcasting within the range of an 802.12g access point
Connection will be estimated
44
What topology provides the highest but rate
DS3
45
A VPN is a
Encrypted connection across the internet
46
What determines the media access method that is used in a network
Topology and protocols
47
What wireless authentication method provides the highest level of security
WPA- WI-FI protected access
48
Topology of a local area network is defined by the
Physical and logical characteristics
49
Max throughout of a 802.11g network is
54 Mbps
50
What is an example of a class A private IP address
10.10.10.1